Troubleshooting Playbooks

Step-by-step diagnostic workflows for identifying and resolving complex network and security infrastructure issues.

FortiGate → IKEv2 Phase 1 Fail

1
Check IKE SA status
Look for established SA. If empty, Phase 1 is failing.
2
Check Phase 1 proposals
Keep an eye out to match encryption / hash / DH with peer.
3
Check PSK
Verify PSK matches exactly (passwords are case sensitive).
4
Check interface binding
Confirm correct outbound interface used for tunnel.
5
Check firewall policy
Ensure zone-to-zone policy allows UDP 500/4500.
6
Check routing to peer
Valid route to peer IP must exist for Phase 1 to initiate.
7
Run IKE debug
Look for INVALID_ID or TS_UNACCEPTABLE errors in deep debug output.
8
Check logs
Review last VPN events for explicit failure codes.

Zscaler ZIA → Upload Degradation

1
Check ZCC tunnel status
Confirm tunnel is established, not in a fallback state.
2
Check forwarding profile
Confirm correct rule hitting for source IP/user.
3
Check SSL inspection bypass
Check if upload domain is being inspected — which may cause slowness.
4
Test without Zscaler
If speed restores, it confirms Zscaler is in the path causing the issue.
5
Check bandwidth control policy
Confirm no throttling rule is matching the affected user/group.
6
Check ZCC logs
Look for tunnel resets or fallback events occurring during upload.
7
Run packet capture
Look for TCP retransmissions or RST packets returning from the Zscaler node.
8
Check Zscaler node performance
Verify that the node the user is connected to has no ongoing degradation alerts.

Cisco ISE → 802.1X Auth Fail

1
Check live authentications
Find the specific failed auth event.
2
Check failure reason
Note exact error code causing the failure.
3
Check authentication policy
Confirm the correct policy set is accurately matching the condition.
4
Check identity source
Confirm if AD or LDAP identity source is connected and up.
5
Verify AD join status
Confirm ISE can successfully reach AD and resolve the user.
6
Check supplicant config
The supplicant configuration must match the configured ISE policy.
7
Check switch config
Confirm dot1x is enabled globally and on interface, and in the correct mode.
8
Check RADIUS shared secret
Verify secret matches switch config exactly (watch out for special characters).