Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
sean3
New Contributor III

IPSec tunnel is down

hi all,

trying to create site to site ipsec vpn with the other site on Azure virtual gateway, the tunnel is down and i follow the article https://community.fortinet.com/t5/FortiGate/Troubleshooting-Tip-IPsec-VPNs-tunnels/ta-p/195955 to troubleshoot, I got the log as below screenshot when doing step Confirm that IKE traffic for port 500 or 4500 is not blocked somewhere along the path. does it mean that it is so good so far to the step? what is UDP 384 there?

udp384.PNG

4 REPLIES 4
ozkanaltas
Valued Contributor III

Hello @sean3 ,

 

As per your screenshot, the Azure side is not responding to your ipsec package. Did you do all the configuration on the Azure side? 

 

If you say yes, can you run these debug commands for ipsec debugging? After running these commands can you trigger the tunnel by using the bring-up button?

 

 

 

diag debug disable
diag debug reset
diag vpn ike log-filter clear
diag vpn ike log-filter name <IPSEC_NAME>
diag debug application ike -1
diag debug enable

 

 

  

If you have found a solution, please like and accept it to make it easily accessible to others.
NSE 4-5-6-7 OT Sec - ENT FW
If you have found a solution, please like and accept it to make it easily accessible to others.NSE 4-5-6-7 OT Sec - ENT FW
sean3
New Contributor III

thanks for the help!

since Azure is managed by other team I will check it when they are available.

sean3
New Contributor III

after re-creation from Azure side, the tunnel was up for a while, but later it went down again. will check further.

sean3
New Contributor III

(we have 4 sites as spoke connecting to Azure, 3 of which are in West europe, 1 is in China. In this case, we are talking about China site, it is an ipsec to Azure East Asia).

I compared several things across sites, the only different thing is the tun_id displayed by command show vpn ipsec phase1-interface. All other 3 sites are displaying the remote-gateway IP as well as the public IP of virtual gateway in Azure west europe, as their tun_id.

But China site is also displaying the same IP (PIP of vgw from West europe) as the tun_id, though we explicitly configured the public ip of VWG residing in Azure East-Asia as the remote gateway IP for China Firewall.

but it is said tun_id is just an identifier in this article, nothing matters.

Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors