Created on
07-12-2022
09:14 AM
Edited on
04-07-2025
07:00 AM
By
Jean-Philippe_P
Description |
This article describes how to handle a scenario where the IPsec Tunnel is up and traffic seems to be leaving FortiGate but is not reaching the remote end.
This article applies to all the possible scenarios mentioned below:
|
Scope | FortiGate. |
Solution |
Follow these steps:
diagnose vpn ike gateway list name <tunnel_name> diagnose vpn tunnel list name <tunnel_name>
config vpn ipsec phase1-interface
Make sure NAT-Traversal is also enabled on the remote end on a Third-party device.
diagnose vpn tunnel flush <tunnel_name> diagnose vpn ike gateway flush name <tunnel_name>
Or:
diagnose vpn ike gateway clear name <tunnel_name>
Host X (x.x.x.x) -> FGT-A (IPsec VPN) FGT-B -> (y.y.y.y) Host Y. For debug flow, run the following commands:
diagnose debug reset diagnose debug flow filter daddr y.y.y.y diagnose debug flow show iprope enable For packet capture, run the command:
diagnose sniffer packet any "host x.x.x.x and host y.y.y.y" 4 0 l
After initiating the above commands on the SSH session, then try to initiate the traffic from source IP x.x.x.x to destination IP y.y.y.y.
Related article: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.