If certificates have been used in a VPN solution then the following should be looked at as a source
of potential problems:
•
Check that the correct certificates have been used for the right purposes.
•
Check that the certificate .cer and .key files have the same filename. For example, my_cert.key
and my_cert.cer.
•
Check that the certificates have not expired. Certificates have a specific lifetime and when this
expires they cannot be used and new certificates must be issued.
•
Check that the NetDefendOS date and time is set correctly. If the system time and date is wrong
then certificates can appear as being expired when, in fact, they are not.
•
Consider time-zone issues with newly generated certificates. The NetDefend Firewall's time
zone may not be the same as the CA server's time zone and the certificate may not yet be valid
in the local zone.
•
Disable CRL (revocation list) checking to see if CA server access could be the problem. CA
Server issues are discussed further in Section 9.6, “CA Server Access”.
9.7.3. IPsec Troubleshooting Commands
A number of commands can be used to diagnose IPsec tunnels:
The ipsecstat console command
ipsecstat can be used to show that IPsec tunnels have correctly established. A representative
example of output is:
gw-world:/> ipsecstat
--- IPsec SAs:
Displaying one line per SA-bundle
IPsec Tunnel
Local Net
Remote Net
Remote GW
------------
--------------
------------
-------------
L2TP_IPSec
214.237.225.43
84.13.193.179
84.13.193.179
IPsec_Tun1
192.168.0.0/24
172.16.1.0/24
82.242.91.203
To examine the first IKE negotiation phase of tunnel setup use:
gw-world:/> ipsecstat -ike
To get complete details of tunnel setup use:
gw-world:/> ipsecstat -u -v
Warning: Be careful using the -num=all option
When using any IPsec related commands, if there are large numbers of tunnels then
avoid using the -num=all option since this will generate correspondingly large
amounts of output.
For example, with a large number of tunnels avoid using:
gw-world:/> ipsecstat -num=all
9.7.3. IPsec Troubleshooting
Commands
Chapter 9. VPN
444
Summary of Contents for NetDefend DFL-260E
Page 27: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 27...
Page 79: ...2 7 3 Restore to Factory Defaults Chapter 2 Management and Maintenance 79...
Page 146: ...3 9 DNS Chapter 3 Fundamentals 146...
Page 227: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 227...
Page 241: ...5 4 IP Pools Chapter 5 DHCP Services 241...
Page 339: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 339...
Page 360: ...7 4 7 SAT and FwdFast Rules Chapter 7 Address Translation 360...
Page 382: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 382...
Page 386: ...The TLS ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 386...
Page 439: ...Figure 9 3 PPTP Client Usage 9 5 4 PPTP L2TP Clients Chapter 9 VPN 439...
Page 450: ...9 7 6 Specific Symptoms Chapter 9 VPN 450...
Page 488: ...10 4 6 Setting Up SLB_SAT Rules Chapter 10 Traffic Management 488...
Page 503: ...11 6 HA Advanced Settings Chapter 11 High Availability 503...
Page 510: ...12 3 5 Limitations Chapter 12 ZoneDefense 510...
Page 533: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 533...