When troubleshooting NSX IPSEC VPNs, a specific set of data must be gathered at the time of the event. This article details what documentation is required and how to gather it prior to opening a support request with Broadcom.
VMware NSX
When it comes to troubleshooting NSX IPSEC VPNs, there are several layers of troubleshooting involved. The purpose of this troubleshooting article is to list them so as to aid such troubleshooting.
If Policy Based:
If Route Based:
get ipsecvpn session summary
: Obtain the session id and review quickly the status.
get ipsecvpn session sessionid <session_id>
: Review local and remote peers and the DOWN reason.
get ipsecvpn ikesa <session_id>
: Review the algorithms config / IPSEC Phase 1:ISAKMP
get ipsecvpn sad <policy_id> || get ipsecvpn sad <UUID>
: Review the SPIs.
get ipsecvpn ipsecsa :
Review IPSEC Tunnel Phase 2
get ipsecvpn ipsecsa session-id <session_id>
: Review IPSEC SA info
get ipsecvpn tunnel stats
: Review IPSEC VPN statistics
get ipsecvpn config peer-endpoint
: Review IKE config
Check Edge /var/log/syslog and search for IKE
In some cases it may be helpful to decrypt IPSEC VPN traffic via these steps: Decrypting IPSEC VPN traffic
Known issues : IPsec VPN does not get established with the error “Remote ID mismatch errorCode="EDG1000028
If you are contacting Broadcom support about this issue, please provide the following:
NSX Edge log bundles for all Edges in the Edge Cluster containing the T0 or T1 where the IPSEC VPN is configured
Ensure log date range covers the full date of the event(s) being investigated. When in doubt, retrieve logs for all time.
NSX Manager log bundles
ESXi host log bundles for all hosts where the affected Edge VMs are running
Text of any error messages seen in NSX GUI or command lines pertinent to the investigation
The configuration and logs from the device on the other end of the IPSEC VPN