IPSEC-VPN/5/IPSEC_TUNNEL_TEARED_DOWN:An IPSec tunnel is teared down. (PolicyName=[policy-name], IfIndex=[if-index], SeqNum=[seq-num], RuleNum=[rule-num], SrcIP=[src-ip], DstIP=[det-ip], InboundSPI=[inboundspi], Slot=[slot-id], CpuID=[cpu-id], OfflineReason=[offline-reason], State=[state])
Parameter Name | Parameter Meaning |
---|---|
PolicyName | Indicates an IPSec policy name. |
IfIndex | Indicates an interface index. |
SeqNum | Indicates the sequence number of the IPSec policy. |
RuleNum | Indicates the number of an ACL rule. |
SrcIP | Indicates the source IP address of the IPSec tunnel. |
DstIP | Indicates the destination IP address of the IPSec tunnel. |
InboundSPI | Indicates the security parameter index value in the inbound direction. |
Slot | Indicates the slot ID of the Service Processing Unit (SPU). |
CpuID | Indicates a CPU ID. |
OfflineReason | Indicates the cause for tunnel down. |
State | Indicates the IPSec tunnel status.
|
An IPSec tunnel has been torn down due to the following causes:
Perform the ping operation to check link reachability. If the link is unreachable, check the link and network configuration.
Perform the ping operation to check link reachability. If the link is unreachable, check the link configuration.
Check the heartbeat configuration on the two ends. If the configuration is incorrect, correct it.
Check whether the IKE SA lifetime is proper. If not, modify the IKE SA lifetime.
Check whether the IPSec SA lifetime is proper. If not, modify the IPSec SA lifetime.
Check whether the two ends use the same NAT port number. If not, modify the NAT port numbers to be the same.
Check log information of the remote device and determine the causes for the IPSec tunnel fault accordingly.
If this fault occurs frequently, check whether the remote device status or configurations are abnormal.
This symptom is normal and no operation is required if the devices at two ends can renegotiate the IKE SA and IPSec SA. Otherwise, you are advised to run the undo ikev1 phase1-phase2 sa dependent command on the local device to cancel dependency between IPSec SA and IKE SA during IKEv1 negotiation.
Ensure that the link is normal and the IPSec configuration is correct.
Run the ipsec remote traffic-identical accept command to allow branch or other users to quickly access the headquarters network.
This symptom is normal and no operation is required.