IPsec diagnosis

This help contains the following topics:

Introduction

IPsec diagnosis can detect the status of IPsec connections. If the diagnosed IPsec connection is faulty, you can use the diagnosis results to check for misconfigurations and find possible causes.

The following diagnosis modes are supported:

Table-1 IPsec diagnosis items

Item

Description

IPsec peer reachability

Determines whether a route to the peer IP address exists in the routing table.

Interface state

Determines the physical layer status and IP protocol layer status of the interface.

The system determines the interface to check according to the diagnosis mode:

  • In data flow and IP address modes, the outgoing interface found through routing table lookup is checked.

  • In interface mode, the interface specified by the user is checked.

If IPsec policy applied on interface

Determines whether an IPsec policy is applied to the interface.

If ACL rule in IPsec policy matches specified flow

This item is available only for IPsec diagnosis in data flow mode.

Check the IPsec policy configuration if this item displays No.

If ACL rule can match flow on the interface

This item is available only for IPsec diagnosis in interface mode.

This item shows whether the ACL used in the IPsec policy contains permit rules to identify traffic that needs IPsec protection. The permit rules are required for IPsec to operate correctly.

IPsec policy configuration check

Checks if the IPsec policy configuration is complete.

  • In data flow or interface mode, the following settings are checked:

    • ACL used to identify the traffic to be protected.

    • Security parameters for IPsec SA negotiation.

    • Local and remote IP addresses of the IPsec tunnel.

    • SA parameters.

  • In IP address mode, the following settings are checked:

    • Security parameters for IPsec SA negotiation.

    • SA parameters.

IKE negotiation result

If the IKE negotiation is operating correctly, this item displays IKE negotiation succeeded or IKE SA already exists.

Any other information indicates that the IKE negotiation is faulty. Follow the instructions to find the cause. For example, verify that the local end and peer end have correct and matching IKE profiles.

IPsec negotiation result

If the IPsec negotiation is operating correctly, this item displays IPsec negotiation succeeded or IPsec tunnel already exists.

Any other information indicates that the IPsec negotiation is faulty. Follow the instructions to find the cause. For example, verify that the local end and peer end have correct and matching IPsec policy settings.

vSystem support information

Support of non-default vSystems for this feature depends on the device model. This feature is available on the Web interface only if it is supported.

Restrictions and guidelines

Configure IPsec diagnosis

Prerequisites

Complete the following tasks before you configure this feature:

  • Assign IP addresses to interfaces on the Network > Interface Configuration > Interfaces page.

  • Configure routes on the Network > Routing page. Make sure the routes are available.

  • Create security zones on the Network > Security Zones page.

  • Add interfaces to security zones. You can add interfaces to a security zone on the Security Zones page or select a security zone for an interface on the Interfaces page.

  • Configure security policies to permit the target traffic on the Policies > Security Policies page.

Configure IPsec diagnosis settings

  1. Click the System tab.

  2. Select Diagnosis Center > IPsec Diagnosis.

  3. Configure IPsec diagnosis parameters.

    Figure-1 Configuring IPsec diagnosis parameters

    Table-2 IPsec diagnosis configuration items

    Item

    Description

    Diagnosis mode

    Specify the diagnosis mode. Options include:

    • Data flow—Obtains the IPsec policy according to the specified data flow to initiate diagnosis of IPsec with the peer.

    • Interface—Obtains the IPsec policy according to the specified interface to initiate diagnosis of IPsec with the peer.

    • IP address—Starts IPsec diagnosis after receiving a packet from the specified peer IP address.

    Source IP address

    Source IP address of the data flow before IPsec encapsulation.

    Destination IP address

    Destination IP address of the data flow before IPsec encapsulation.

    Source port

    Source port of the data flow before IPsec encapsulation.

    Destination port

    Destination port of the data flow before IPsec encapsulation.

    Protocol

    Protocol used by the data flow before IPsec encapsulation.

    VRF

    VRF to which the data flow before IPsec encapsulation belongs.

    Policy-applied interface

    Interface where the IPsec policy is applied.

    Peer IP address

    Peer IP address of the IPsec tunnel, namely the peer IP address of the data flow after IPsec encapsulation.

    VRF

    VRF to which the peer IP address belongs.

  4. Click Diagnose and view diagnosis results.