Description |
This article describes how to handle a scenario where the IPsec Tunnel is up and traffic seems to be leaving FortiGate but is not reaching the remote end.
This article applies to all the possible scenarios mentioned below:
|
Scope | FortiGate. |
Solution |
Follow these steps:
diagnose vpn ike gateway list name <tunnel_name> diagnose vpn tunnel list name <tunnel_name>
config vpn ipsec phase1-interface
Make sure NAT-Traversal is also enabled on the remote end on a Third-party device.
diagnose vpn tunnel flush <tunnel_name> diagnose vpn ike gateway flush name <tunnel_name>
Or:
diagnose vpn ike gateway clear name <tunnel_name>
Host X (x.x.x.x) -> FGT-A (IPsec VPN) FGT-B -> (y.y.y.y) Host Y. For debug flow, run the following commands:
diagnose debug reset diagnose debug flow show iprope enable
diagnose debug disable diagnose debug reset
For packet capture, run the command:
diagnose sniffer packet any "host x.x.x.x and host y.y.y.y" 4 0 l
To stop the capture, press Ctrl + C.
After initiating the above commands on the SSH session, try to initiate the traffic from source IP x.x.x.x to destination IP y.y.y.y.
Always try to take packet capture for the destination network: Take the sniffer for the destination address. In this setup, the destination address is the SSL VPN IP after connecting to VPN.
dia sniffer packet any " host y.y.y.y " 4 0 l
Useful commands:
Diagnose VPN tunnel list:
Related article: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.