IBM Cloud Docs
Getting help and support

Getting help and support

If you experience an issue or have questions when using IBM Cloud Gateway Appliances (vFSA, VRA or vSRX), you can use the following resources before you open a support case.

If you still can't resolve the problem, you can open a support case. For more information, see Creating support cases.

Providing support case details for vFSA

To ensure a timely resolution to your issue, include the following information in your support case for issues with your vFSA:

  1. The IP address (10 network or public network) or hostname of your Fortinet vFSA as well as its version.
  2. To track down where issues are occurring across a network connection, provide the source IP address, destination IP address, the destination port and protocol, as well as any relevant output from network tools, such as ping, traceroute, mtr, or nmap/netcat.
  3. For more complicated issues, a basic explanation of the expected network path of the connection or a network topology diagram is necessary.
  4. Other useful information includes the security policy name that contains the expected allow or block.

Providing support case details for Virtual Router Appliance

To ensure a timely resolution to your issue, include the following information in your support case for issues with Vyatta:

  1. The IP address (10 network or public network) or hostname of your VRA, as well as its NOS version.
  2. To track down where issues are occuring across a network connection, provide the source IP address, destination IP address, the destination port and protocol, as well as any relevant output from network tools, such as ping, traceroute, mtr, or nmap/netcat.
  3. For more complicated issues, a basic explanation of the expected network path of the connection or a network topology diagram is necessary.
  4. Other useful troubleshooting information includes the firewall ruleset name and rule number of the expected rule for allowing or blocking traffic, including the output of show firewall. You can also enable logging to illustrate whether traffic is being allowed or not. In addition, you can use the monitor, tshark, and tcpdump (packet capturing) commands to show traffic on the ingress and egress interfaces. You can also use these commands to illustrate if traffice shows on one expected interface and not another. This can help prove a blocking or routing issue.
  5. Gather any logs that are relevant to the issue. To do so, use journlctl -a, view the syslog entries, or use the show log commands.

Providing support case details for vSRX

To ensure a timely resolution to your issue, include the following information in your support case for issues with your vSRX:

  1. The IP address (10 network or public network) or hostname of your Juniper vSRX as well as its version. As a reminder, versions 19.4R2-S3 and older have consistent cluster and crashing issues. If you are on any of those versions, please reboot to temporarily fix any clustering issues. You should also update to the latest version as soon as possible.
  2. To track down where issues are occurring across a network connection, provide the source IP address, destination IP address, the destination port and protocol, as well as any relevant output from network tools, such as ping, traceroute, mtr, or nmap/netcat.
  3. For more complicated issues, a basic explanation of the expected network path of the connection or a network topology diagram is necessary.
  4. Other useful information includes the security policy name that contains the expected allow or block. You can also illustrate that traffic is being allowed or not using show security match-policies (tab-complete to finish the rest of the command). In addition, the show security flow session command shows the forward and response traffic on the ingress interfaces, as well as if packets are incrementing in one expected direction or not. You can also use traceoptions to receive Debug level output for the specified traffic.
  5. For local sourced and destined traffic, please determine if the PROTECT-IN policy contains the proper allow settings, as this is used for control plane policing.