Created on 09-17-2023 08:07 PM Edited on 09-29-2023 06:06 AM By Jean-Philippe_P
Description |
This article describes how to troubleshoot or monitor an IPSEC tunnel that has sudden communication issues with the remote site even though both phases 1 and 2 are still up and the remote network/device should be reachable.
It would be necessary to collect the IKE debugs to verify what is happening in the IPSEC tunnel, but as the tunnel itself does not go down and the issue is suddenly, it would be possible to collect these debug via an automation stitch to be triggered when the VPN goes down. Also, in some situations, a flush of the tunnel would make the tunnel work correctly again.
Can also be extremely useful when both FortiGate devices are using DDNS (Dynamic DNS) / FQDN to create the IPsec tunnels. If it is not necessary to debug logs, it is possible to configure the 'Flush_tunnel' only. |
Scope | FortiGate, IPSEC, VPN, Automation Stitch, Link Monitor. |
Solution | In this scenario, the below topology will be used. Both FortiGates are running the 7.2.5 version:
Use the above-mentioned event and then, create an automation stitch trigger to use the above events to collect data, send emails, or even flush the tunnel.
diagnose vpn tunnel list diagnose vpn tunnel list name VPN_Test
Action to send the email with the above-mentioned results:
As a last resort, create the stitch to flush the tunnel:
config system automation-action
To create the stitch to collect the IKE debugs and send them via email:
In the first situation, an email will be received as below, containing the necessary debugs to troubleshoot the issue:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.