Connecting a local FortiGate to an Azure FortiGate via site-to-site VPN Troubleshooting Commands
Connecting a local FortiGate to an Azure FortiGate via site-to-site VPN Troubleshooting Commands.
Following information capture to help identify the issue.
# get sys status
# exec ping <peer IP>
# show full vpn ipsec phase1-interface <tunnel name>
# show full vpn ipsec phase2-interface <tunnel name>
# get vpn ipsec tunnel summary
# diag vpn ike gateway list name <tunnel name>
# diag vpn tunnel list name <tunnel name>
Please run packet sniffer capture and ike debug in the event the VPN tunnel is down.
# diag sniffer packet any 'host <peer IP> and port (500 or 4500)' 4 0 1
# diagnose vpn ike log-filter dst-addr4 <remote peer IP>
# diagnose debug application ike -1
# diagnose debug enable
=== Try initial VPN tunnel from remote peer===
To disable Debug:
diag debug disable
diag debug reset
Please use the below link to save the output of the putty:
https://community.fortinet.com/t5/FortiGate/Technical-Tip-How-to-create-a-log-file-of-a-session-using-PuTTY/ta-p/194148?cmd=displayKC&docType=kc&externalId=FD36043
Troubleshooting Tip: IPsec VPNs tunnels
https://community.fortinet.com/t5/FortiGate/Troubleshooting-Tip-IPsec-VPNs-tunnels/ta-p/195955
When troubleshooting a site-to-site VPN connection between a local FortiGate and an Azure FortiGate, there are several commands that can be used to gather information and help identify the root cause of the issue.
diagnose vpn ike log-filter
- This command will display the IKE (Internet Key Exchange) logs for the VPN connection, which can be useful in identifying any issues with the initial VPN negotiation.diagnose vpn ipsec log-filter
- This command will display the IPsec (Internet Protocol Security) logs for the VPN connection, which can be useful in identifying issues with the encrypted data traffic.diagnose vpn tunnel list
- This command will show the current status of all VPN tunnels, including the peer IP address and the negotiated encryption and authentication settings.get vpn ipsec phase1-interface
- This command will display the Phase 1 settings for the VPN connection, including the encryption and authentication settings, the local and remote subnets, and the IKE version.get vpn ipsec phase2-interface
- This command will display the Phase 2 settings for the VPN connection, including the encryption and authentication settings, the local and remote subnets, and the IPsec protocol.diag sys connection list
- This command will show all current IPsec connections, including the source and destination IP addresses, the encryption and authentication settings, and the connection status.
It is important to also check the Azure FortiGate's logs and configuration, firewall rules and network configurations in Azure.
It is also recommended to check the routes and firewall policies on both the local and Azure FortiGates, and to verify that the public IP addresses and pre-shared keys are configured correctly.
Comments
Post a Comment