User manual
Virtual Private Networking 
235
Solution: Ensure that the tunnel settings for the SG unit and the remote party are 
configured correctly. 
•  Symptom: The tunnel appears to be up and I can ping across it, but HTTP, FTP, 
SSH, telnet, etc. don’t work 
Possible Cause: The MTU of the IPSec interface is too large. 
Solution: Reduce the MTU of the IPSec interface. 
•  Symptom: Tunnel goes down after a while 
Possible Cause: The remote party has gone down. 
The remote party has disabled IPSec. 
The remote party has disabled the tunnel. 
The tunnel on the SG unit has been configured not to rekey the tunnel. 
The remote party is not rekeying correctly with the SG unit. 
Solution: Confirm that the remote party has IPSec and the tunnel enabled and has 
an Internet IP address. Ensure that the SG unit has rekeying enabled. If the tunnel 
still goes down after a period of time, it may be due to the SG unit and remote party 
not recognising the need to renegotiate the tunnel. This situation arises when the 
remote party is configured to accept incoming tunnel connections (as opposed to 
initiate tunnel connections) and reboots. The tunnel has no ability to let the other 
party know that a tunnel renegotiation is required. This is an inherent drawback to 
the IPSec protocol. Different vendors have implemented their own proprietry method 
to support the ability to detect whether to renegotiate the tunnel. Dead peer detection 
has been implemented based on the draft produced by Cisco Systems (draft-ietf-
ipsec-dpd-00.txt). Unfortunately, unless the remote party implements this draft, the 
only method to renegotiate the tunnel is to reduce the key lifetimes for Phase 1 and 
Phase 2 for Automatic Keying (IKE). This does not occur for Manual Keying. 
•  Symptom: Dead Peer Detection does not seem to be working 
Possible Cause: The tunnel has Dead Peer Detection disabled. 
The remote party does not support Dead Peer Detection according to draft-ietf-ipsec-
dpd-00.txt 
Solution: Enable Dead Peer Detection support for the tunnel. Do not use Dead Peer 
Detection if the remote party does not support draft-ietf-ipsec-dpd-00.txt. 
•  Symptom: Tunnels using x.509 certificate authentication do not work 
Possible Cause: The date and time settings on the SG unit has not been configured 
correctly. 
The certificates have expired. 
The Distinguished Name of the remote party has not be configured correctly on the 
SG unit's tunnel. 
The certificates do not authenticate correctly against the CA certificate. 










