Overview
Troubleshoot route-based VPN tunnels, using debug commands to identify connectivity,or routing, issues in Threat Defense (FTD) devices.
After the deployment, use the following CLI to debug issues related to route-based VPN tunnels on Firewall Threat Defense devices.
Proceed with caution when you run debug commands on the threat defense device in production environments.You can set various debug levels on the device that may have verbose outputs.
| How to... |
CLI Command |
|---|---|
| Enable conditional debugging for a particular peer |
debug crypto condition peer <peer-IP> |
| Debug the Virtual Tunnel Interface information |
debug vti 255 |
| Debug the IKEv2 protocol related transactions |
debug crypto ikev2 protocol 255 |
| Debug the IKEv2 platform related transactions |
debug crypto ikev2 platform 255 |
| Debug the common IKE related transactions |
debug crypto ike-common 255 |
| Debug the IPSec related transactions |
debug crypto ipsec 255 |