1 Alarm Description
The alarm is raised when an IP Security (IPsec) tunnel goes down ungracefully between an Evolved Virtual IP (eVIP)-enabled cluster and a peer.
To clear the alarm, the possible error causes must be investigated. The causes can be the following:
- Faulty configuration
- Network connectivity issue
If the IPsec tunnel configuration has been added or changed on the local side or the remote side, or both, the most probable reason is configuration mismatch.
- Note:
- On a system with properly configured tunnels, the alarm is cleared automatically when the nodes are successfully restarted.
|
Alarm Cause |
Description |
Fault Reason |
Fault Location |
Impact |
|---|---|---|---|---|
|
Faulty peer |
The peer is faulty |
Faulty peer |
Peer |
The peer cannot communicate with the IKE daemon on the eVIP side. IPsec key negotiation fails. |
|
Faulty connection between the peer and the eVIP cluster |
The connection between the peer and the eVIP cluster is faulty |
Faulty connection between the peer and the eVIP cluster |
Connection between the peer and the eVIP cluster |
There is a networking issue between the eVIP cluster and the peer. IPsec key negotiation fails. |
|
Faulty configuration |
The configuration is faulty |
Faulty configuration |
Faulty configuration in the Managed Element |
The IPsec tunnel goes down |
- Note:
- The alarm can appear after a cluster or a node restart.
2 Procedure
2.1 Handle Alarm eVIP, IPSEC Tunnel Fault
Prerequisites
- This instruction references the following document:
- No tools are required.
- The following conditions must apply:
- The alarm is raised.
- The user has knowledge in basic UNIX® commands.
- An Ericsson Command-Line Interface (ECLI) session in Exec mode is in progress.
Steps
- Identify the tunnel instance, shown in alarm attribute source, for example, ipsecPolicyId=1,Evip_IpsecipsecTunnelId=1min,Evip_HosthostId=eVIP_ALB_alb_1.
- View the configuration
parameters for the IpsecTunnel Managed
Object (MO), for example:
>show -r ManagedElement=NODE06ST,Transport=1,Host=eVIP_ALB_alb_1,IpsecTunnel=1min
The following is an example output:
IpsecTunnel=1min localAddressStr="10.0.20.101" remoteAddressStr="10.128.171.101" Ikev2Session=1 ikev2PolicyProfile="ManagedElement=1,Transport=1,⇒ Host=eVIP_ALB_alb_1,Ikev2PolicyProfile=1min" IpsecPolicy=1 ipsecProposalProfile="ManagedElement=1,Transport=1,⇒ Host=eVIP_ALB_alb_1,IpsecProposalProfile=1min" localTrafficSelector addressRange="10.0.20.1/32" remoteTrafficSelector addressRange="10.128.171.1/32" - View the referenced
profiles, for example:
- >show -r ManagedElement=NODE06ST,Transport=1,Host=eVIP_ALB_alb_1,Ikev2PolicyProfile=1min
The following is an example output:
Ikev2PolicyProfile=1min [...] ikev2Proposal diffieHellmanGroup MODP_2048_GROUP_14 encryptionAlgorithm ENCR_AES_CBC_128 integrityAlgorithm AUTH_HMAC_SHA1_96 [...] - >show -r ManagedElement=NODE06ST,Transport=1,Host=eVIP_ALB_alb_1,IpsecProposalProfile=1min
The following is an example output:
IpsecProposalProfile=1min childSaLifetime timeLimit=200 ipsecProposal diffieHellmanGroup MODP_2048_GROUP_14 encryptionAlgorithm ENCR_AES_CBC_256 integrityAlgorithm AUTH_HMAC_SHA1_96
- >show -r ManagedElement=NODE06ST,Transport=1,Host=eVIP_ALB_alb_1,Ikev2PolicyProfile=1min
- Is there any mismatch between the configurations shown
in Step 2 and Step 3, and the configuration on
the peer?
Yes: Determine if the configuration has been changed compared to previously known working configuration. Further actions are outside the scope of this instruction. Proceed with Step 15.
- Note:
- If there is a mismatch that can cause IKE negotiation to fail, the configuration parameters must be changed.
No: Continue with the next step.
- Check that the IKE authentication information is also
correct:
- For Preshared Keys (PSKs):
Check that the same PSKs are installed on both gateways (it is not possible to list or reveal the previously installed PSK), for example:
>ManagedElement=NODE06ST,Transport=1,Host=eVIP_ALB_alb_1,IpsecTunnel=1min,Ikev2Session=1,installPreSharedKey mySecr3t123XC
- For certificates:
Check the certificate references, for example:
>show ManagedElement=NODE06ST,Transport=1,Host=eVIP_ALB_alb_1,Ikev2PolicyProfile=1min,credential
>show ManagedElement=NODE06ST,Transport=1,Host=eVIP_ALB_alb_1,Ikev2PolicyProfile=1min,trustCategory
- For Preshared Keys (PSKs):
- Check Network Connectivity; in most configurations, the
security gateways can ping each other (the addresses used as security
gateways).
The security gateway addresses cannot be pinged, for example, if the traffic selectors also cover these addresses or some discard policies are added on either side.
The security gateway addresses can be listed using the ECLI, for example:
- >show ManagedElement=NODE06ST,Transport=1,Host=eVIP_ALB_alb_1,IpsecTunnel=1min,localAddressStr="10.0.20.101"
- >show ManagedElement=NODE06ST,Transport=1,Host=eVIP_ALB_alb_1,IpsecTunnel=1min,remoteAddressStr="10.128.171.101"
To ping the address configured in remoteAddressStr from eVIP, find a node that is part of that specific Abstract Load Balancer (ALB).
- Identify the ALB, for example.
>show ManagedElement=NODE06ST,Transport=1,Host=eVIP_ALB_alb_1,l3Ref
The following is an example output:
l3Ref="ManagedElement=NODE06ST,Transport=1,Evip=1,⇒ EvipAlbs=1,EvipAlb=alb_1"
- View the target pools in the ALB, for example:
>show -r ManagedElement=NODE06ST,Transport=1,Evip=1,EvipAlbs=1,EvipAlb=alb_1,EvipTargetPools=1
The following is an example output:
EvipTargetPools=1 EvipTargetPool=6PLs_lc distributionMethod="least_connection" stickyGroup="no" udpStateless="no" EvipPayload=3 EvipPayload=4 [...] - Select an EvipPayload from
a target pool that is referenced by a flow policy having the IP address
that is set as localAddressStr and log
on to the corresponding node in the cluster, for example:
>ssh –l <user> PL-3
- Use the information from Step 2 to test connectivity between the
gateway addresses, for example:
PL-2-3:~ #ping -I 10.0.20.101 10.128.171.101
The following is an example output:
PING 10.128.171.101 (10.128.171.101) from 10.0.20.101 : 56(84) bytes ⇒ of data. 64 bytes from 10.128.171.101: icmp_seq=1 ttl=60 time=0.610 ms 64 bytes from 10.128.171.101: icmp_seq=2 ttl=60 time=0.446 ms [...]
- Is there connectivity between the gateway addresses?
Yes: Continue with the next step.
No: If the remote gateway cannot be reached (and there are no policies blocking this traffic), the two IKE daemons cannot communicate. Ensure that there are no connectivity issues. Proceed with Step 13.
- Is the alarm cleared?
Yes: Proceed with Step 15.
No: Continue with the next step.
- Perform data collection, refer to Data Collection Guideline.
- Consult the next level of maintenance support. Further actions are outside the scope of this instruction.
- Job is completed.

Contents