IPSec Policy Based Tunnel Down in NSX Edge alarm
search cancel

IPSec Policy Based Tunnel Down in NSX Edge alarm

book

Article ID: 370176

calendar_today

Updated On:

Products

VMware NSX

Issue/Introduction

Title: Alarm for ipsec_policy_based_tunnel_down
Event ID: vpn.ipsec_policy_based_tunnel_down
Alarm Description

One or more policy based IPsec VPN tunnels in session <Session UUID> are down. 

  • Purpose: Alarm is raised when one or more Policy Based IPSec VPN Tunnels for session with UUID <Session UUID> are Down.
  • Impact: Datapath traffic stops working for configured local and remote networks.

Environment

VMware NSX-T Data Center
VMware NSX

Edge Form factors:

  • Bare Metal Edge
  • VM Edge

Resolution

Steps to Resolve
For 3.0.0 and higher

Recommended Action:

  • Get the tunnel down reason from UI/API/CLI:
    • On UI, go to VPNā†’IPSec Sessions page and check particular session Status. Check IKE Status info icon, which will show session status along with the down reason.
    • For API, use "GET /policy/api/v1/infra/tier-0s/{tier-0-id}/ipsec-vpn-services/{service-id}/sessions/{session-id}/statistics" or "GET /policy/api/v1/infra/tier-1s/{tier-1-id}/ipsec-vpn-services/{service-id}/sessions/{session-id}/statistics" to get the session status details. Check the fail_reason in the output.
    • For CLI, use "get ipsecvpn session summary", "get ipsecvpn session sessionid <session-id>" CLIs to check the down reason.
  • As per the tunnel down reason, check the necessary actions to resolve the alarm in table mentioned at Alarms When an IPsec VPN Session or Tunnel Is Down.

Maintenance window required for remediation? No

Additional Information