Use Cases for SD-WAN Capabilities in Cisco Secure Firewall

PDF

Troubleshoot Route-based VPN Tunnels

Updated: February 5, 2026

Overview

Troubleshoot route-based VPN tunnels, using debug commands to identify connectivity,or routing, issues in Threat Defense (FTD) devices.

After the deployment, use the following CLI to debug issues related to route-based VPN tunnels on Firewall Threat Defense devices.

Caution

Proceed with caution when you run debug commands on the threat defense device in production environments.You can set various debug levels on the device that may have verbose outputs.

How to...

CLI Command

Enable conditional debugging for a particular peer​

debug crypto condition peer <peer-IP>​

Debug the Virtual Tunnel Interface information​

debug vti 255​

Debug the IKEv2 protocol related transactions​

debug crypto ikev2 protocol 255​

Debug the IKEv2 platform related transactions​

debug crypto ikev2 platform 255​

Debug the common IKE related transactions​

debug crypto ike-common 255​

Debug the IPSec related transactions​

debug crypto ipsec 255​