Network Security
Troubleshoot Site-to-Site VPN Issues Using CLI
Table of Contents
Expand All
|
Collapse All
Network Security Docs
-
- Security Policy
-
- Security Profile Groups
- Security Profile: AI Security
- Security Profile: WildFire® Analysis
- Security Profile: Antivirus
- Security Profile: Vulnerability Protection
- Security Profile: Anti-Spyware
- Security Profile: DNS Security
- Security Profile: DoS Protection Profile
- Security Profile: File Blocking
- Security Profile: URL Filtering
- Security Profile: Data Filtering
- Security Profile: Zone Protection
-
- Policy Object: Address Groups
- Policy Object: Regions
- Policy Object: Traffic Objects
- Policy Object: Applications
- Policy Object: Application Groups
- Policy Object: Application Filter
- Policy Object: Services
- Policy Object: Auto-Tag Actions
- Policy Object: Devices
-
- Uses for External Dynamic Lists in Policy
- Formatting Guidelines for an External Dynamic List
- Built-in External Dynamic Lists
- Configure Your Environment to Access an External Dynamic List
- Configure your Environment to Access an External Dynamic List from the EDL Hosting Service
- Retrieve an External Dynamic List from the Web Server
- View External Dynamic List Entries
- Enforce Policy on an External Dynamic List
- Find External Dynamic Lists That Failed Authentication
- Disable Authentication for an External Dynamic List
- Policy Object: HIP Objects
- Policy Object: Schedules
- Policy Object: Quarantine Device Lists
- Policy Object: Dynamic User Groups
- Policy Object: Custom Objects
- Policy Object: Log Forwarding
- Policy Object: Authentication
- Policy Object: Decryption Profile
- Policy Object: Packet Broker Profile
-
-
-
- The Quantum Computing Threat
- How RFC 8784 Resists Quantum Computing Threats
- How RFC 9242 and RFC 9370 Resist Quantum Computing Threats
- Support for Post-Quantum Features
- Post-Quantum Migration Planning and Preparation
- Best Practices for Resisting Post-Quantum Attacks
- Learn More About Post-Quantum Security
-
-
-
- Investigate Reasons for Decryption Failure
- Identify Weak Protocols and Cipher Suites
- Troubleshoot Version Errors
- Troubleshoot Unsupported Cipher Suites
- Identify Untrusted CA Certificates
- Repair Incomplete Certificate Chains
- Troubleshoot Pinned Certificates
- Troubleshoot Expired Certificates
- Troubleshoot Revoked Certificates
Troubleshoot Site-to-Site VPN Issues Using CLI
Troubleshoot site-to-site VPN issues using show, clear, test, and debug
commands.
Where Can I Use This? | What Do I Need? |
---|---|
| No license required |
Use the following CLI commands to troubleshoot phase 1 and phase 2 site-to-site VPN
issues:
- Show Commands
- Clear Commands
- Test Commands
- Debug Commands
Show Commands
If you want to . . .
|
Use . . .
|
---|---|
|
> show running tunnel flow info
|
|
> show vpn ike-sa gateway <gateway> | match <x.x.x.x/Y>
|
|
> show vpn ike-sa tunnel <tunnel>
|
|
> show vpn flow
|
|
> show vpn gateway
|
|
> show vpn ike-sa
|
|
> show vpn ipsec-sa
|
|
> show vpn tunnel
|
Clear Commands
If you want to . . .
|
Use . . .
|
---|---|
|
> clear vpn ike-sa gateway <gateway>
|
|
> clear vpn ike-sa tunnel <tunnel>
|
|
> clear vpn ipsec-sa tunnel <tunnel>
|
Test Commands
If you want to . . .
|
Use . . .
|
---|---|
|
> test vpn ike-sa gateway <gateway>
|
|
> test vpn ipsec-sa tunnel <tunnel>
|
Debug Commands
If you want to . . .
|
Use . . .
|
---|---|
|
> debug ike global on debug less mp-log ikemgr.log debug ike stat
|
|
> debug ike pcap on view-pcap no-dns-lookup yes no-port-lookup yes debug-pcap ikemgr.pcap
|
|
> debug ike pcap off
|