When troubleshooting L2 VPN there are a few things to check and consider. This articles examines the different areas to verify, validate and Troubleshoot L2 VPN.
VMware NSX
The following are the most common reasons why L2 VPN tunnels go down or stop processing traffic:
In troubleshooting an issue the below are some are some pointers to consider:
If the IPsec session is down, troubleshoot the IPsec session first:
get ipsecvpn session summary → Obtain the session id and review quickly the status.get ipsecvpn session summary → Obtain the session id and review quickly the status.get ipsecvpn session sessionid <session_id> → Review local and remote peers and the DOWNget ipsecvpn ikesa <session_id> → review the algorithms config / IPSEC Phase 1:ISAKMPget ipsecvpn sad <policy_id> || get ipsecvpn sad <UUID> → Review the SPIs.get ipsecvpn ipsecsa →Review IPSEC Tunnel Phase 2get ipsecvpn ipsecsa session-id <session_id> →Review IPSEC SA infoget ipsecvpn tunnel stats → Review IPSEC VPN statisticsget ipsecvpn config peer-endpoint → Review IKE config
If the IPsec session is up and L2 VPN session has a problem, troubleshoot the L2 VPN session as follows:
nsx-edge> get l2vpn sessions config
nsx-edge>get logical-router <T0 Service Router UUID> forwarding
L2vpn tunnel is UP but workload not communicating possible causes:
Tunnel ID mismatch
get l2vpn session <session UUID> logical-switch <logical-switch UUID> statsget l2vpn session <session UUID> logical-switchget logical-router <logical-router UUID> interfacesget l2vpn sessions configstart capture interface <uuid>If the Session status is seen as Negotiating, it indicates Edge has initiated IKESA request for the session, but SA negotiation is not complete.
Common down reasons for Session and their potential remedies are noted in the table below
|
Common down reasons for Tunnel and their potential remedies are noted in the table below
|
Down Reason
|
Meaning
|
Remedy
|
|---|---|---|
| IKE SA Down | IKE Session corresponding to this Policy rule is Down. Hence the Tunnel is down. | Troubleshoot reason for Session being in Down state. |
| No Proposal chosen | Crypto algorithms configured for IPSec SA do not match that in peer | Check for configuration of algorithms in tunnel profile associated to session, with the corresponding configuration at the peer |
| Selector Mismatch | IPSec SA negotiation failed because of mismatch in Policy rules configured at Edge and corresponding configuration at Peer Gateway. | Check for matching subnets in both the Gateways. |
| Negotiation not started | IPSec SA negotiation was not started for this session. | Either IKESA is not established OR there is no traffic matching the IPSec SP. |
| Peer sent delete | Peer has deleted IPSec SA and sent message to Edge to Delete SA. | Check why did the peer sent Delete. In most such cases, Edge would not be configured to initiate tunnel and therefore Edge is waiting for tunnel to be initiated from peer side. |
| Phase-1 failed | Phase 1 negotiation as failed. | |
| No IKE peers | All IKE peers are dead, No peer left to try the connection | Check peer connectivity, whether it is up. |
If you are contacting Broadcom support about this issue, please provide the following:
Handling Log Bundles for offline review with Broadcom support