IPSEC-VPN/4/IPSECTUNNELSTOP: OID [oid] The IPSec tunnel is deleted. (Ifindex=[Ifindex], SeqNum=[SeqNum],TunnelIndex=[TunnelIndex], RuleNum=[RuleNum], DstIP=[DstIP], InsideIP=[InsideIP], RemotePort=[RemotePort], CpuID=[CpuID], SrcIP=[SrcIP], FlowInfo=[FlowInfo], OfflineReason=[offlinereason], VsysName=[vsys-name], InterfaceName=[InterfaceName], SlotID=[SlotID])
An IPSec tunnel is deleted.
Alarm ID | Alarm Severity | Alarm Type |
---|---|---|
1.3.6.1.4.1.2011.6.122.26.6.2 | Warning | Communications alarm |
Name | Meaning |
---|---|
oid | Indicates the MIB object ID of the alarm. |
Ifindex | Indicates the interface index. |
SeqNum | Indicates the policy number. |
TunnelIndex | Indicates the tunnel index. |
RuleNum | Indicates the rule number. |
DstIP | Indicates the IP address of the peer end of the IPSec tunnel. |
InsideIP | Indicates the intranet IP address of the peer end of the tunnel. |
RemotePort | Indicates the port number of the peer end of the IPSec tunnel. |
CpuID | Indicates the CPU number. |
SrcIP | Indicates the IP address of the local end of the IPSec tunnel. |
FlowInfo | Indicates the data flow information of the IPSec tunnel, including the source address, destination address, ACL port number, ACL protocol number, and DSCP. |
offlinereason | Indicates the reason why the IPSec tunnel was deleted. |
vsys-name |
Indicates the name of the virtual system to which the IPSec policy belongs. NOTE:
The device does not support this parameter. |
InterfaceName | Indicates the interface name. |
SlotID | Indicates the Slot number. NOTE:
The device does not support this parameter. |
An IPSec tunnel has been deleted due to the following causes:
Perform the ping operation to check link reachability. If the link is unreachable, check the link and network configuration.
Perform the ping operation to check link reachability. If the link is unreachable, check the link configuration.
Check the heartbeat configuration on the two ends. If the configuration is incorrect, correct it.
Check whether the IKE SA lifetime is proper. If not, modify the IKE SA lifetime.
Check whether the IPSec SA lifetime is proper. If not, modify the IPSec SA lifetime.
Check whether the two ends use the same NAT port number. If not, modify the NAT port numbers to be the same.
Check log information of the remote device and determine the causes for the IPSec tunnel fault accordingly.
If this fault occurs frequently, check whether the remote device status or configurations are abnormal.
This symptom is normal and no operation is required if the devices at two ends can renegotiate the IKE SA and IPSec SA. Otherwise, you are advised to run the undo ikev1 phase1-phase2 sa dependent command on the local device to cancel dependency between IPSec SA and IKE SA during IKEv1 negotiation.
Ensure that the link is normal and the IPSec configuration is correct.
Run the ipsec remote traffic-identical accept command to allow branch or other users to quickly access the headquarters network.
This symptom is normal and no operation is required.