Skip to main content
Versa Networks

Troubleshoot the SASE Client

Versa-logo-release-icon.pngFor supported software information, click here.

This article describes some of the error messages that an end user might see when using the Versa SASE client and the reasons that the errors might occur. However, it does not cover all the issues that might be caused by the underlying operating system, because there can be various conditions that differ for each operating system and platform.

This article also describes a few cases when the SASE service might become unavailable so that an MSP can appropriately assign these issues to the Versa Networks Managed Services NOC team.

The article describes errors from an end customer perspective and it assumes that the MSP has no access to any troubleshooting on the Versa Secure Access (VSA) or SASE gateways that are managed by the Versa Managed Services team.

After you go through the steps to fix the issues described in this article, collect the debug logs before contacting Versa Support for help. For more information, see Collect Complete Debug Logs, below.

Note that for releases prior to Release 7.4.3 for Android, Release 7.3.7 for MacOS, and Release 7.4.5 for Windows, the Versa SASE client was called the Versa Secure Access (VSA) client application software.

SASE Client Connectivity Flow

To understand the SASE client error messages, you must understand the normal flow of events that occur when an end user connects to an enterprise using the SASE client: 

  1. The end user downloads the SASE client software using the link provided by Versa Networks.
  2. The end user installs the SASE client on the client device by following instructions provided.
  3. During the installation, a Versa root authority certificate is pushed to the client and installed in the user’s certificate trust store. For this to occur, the user must have administrative privileges on the client.
  4. The client registers using the following information provided by the enterprise's IT administrator: the FQDN of the registrar portal, the name of the enterprise as configured on the gateways, and the user credentials.
  5. When the registration successfully authenticates the user, the portal pushes a set of Versa SASE profiles based on the username, user group, device, and posture to the client. The SASE profiles determine the connection type, the selection of the gateways to which the client can connect, the encryption standards to use, the traffic-steering policies, and other parameters. The connection to the gateway can be manual or automatic, depending on the policies.
  6. When the connection successfully establishes, the client uses the IP address assigned to it.
  7. The end user can then use the SASE client to access their corporate internal network, and to access general public networks and applications. Access depends on the policies that the gateway pushes to the end user's device.
  8. If the end user wants to disconnect from the private network, they can click Disconnect, if the option is available. If Always On is enabled on the end user’s device, you cannot disconnect the client.

Troubleshoot Client Installation

You can install the SASE client can on various operating systems and versions. For more information, see Install and Configure Versa SASE Clients.

Installation Failure

The following error message may display if client installation fails:

  • Registration failed Error. Object reference not set to an instance of an object. 

To verify on Windows OS:

  1. If the application is unavailable or does not display in the application list, try to reinstall the client as Administrator.
  2. Check the system tray for the active Versa SASE client icon to ensure it is running, as shown in the screenshot below.

    client-icon-system-tray.png
  3. Go to services.msc and confirm that all Versa-related services are running. For example:

    msc-vsa-services.png

To verify on MacOS:

  1. If the application is unavailable or does not display in the application list, try to reinstall the client as Administrator.
  2. If the installation is successful and the application is running, the client icon displays on the MacOS menu bar, as shown in the screenshot below. 

    macos-client-icon.png
  3. Open the terminal and run the grep command for versa services and ensure that all Versa-related services are running. For example:
usern@abcMBP ~ % ps aux | grep Versa
root             520  0.0  0.0  411746048   13728   ??  Ss   Mon08PM   0:00.23 /Applications/Versa SASE Client.app/Contents/XPCServices/SCAXPCServices.xpc/Contents/MacOS/SCAXPCServices
root             515  0.0  0.0  410794048    3040   ??  Ss   Mon08PM   0:00.02 /Applications/Versa SASE Client.app/Contents/XPCServices/DEMXPCService.xpc/Contents/MacOS/DEMXPCService
root             518  0.0  0.0  410768976    3136   ??  Ss   Mon08PM   0:00.03 /Applications/Versa SASE Client.app/Contents/XPCServices/EIPXPCServices.xpc/Contents/MacOS/EIPXPCServices
[masked]       10666  0.0  0.0  410740096   1408  s000  S+    3:06PM   0:00.00 grep Versa
[masked]       10644  0.2  0.0  412005104  60160   ??  S      3:05PM   0:00.66 /Applications/Versa SASE Client.app/Contents/MacOS/Versa SASE Client /bin
[masked]       10588  0.2  0.0  411834736  62384   ??  S      3:03PM   0:00.47 /Applications/Versa SASE Client.app/Contents/MacOS/VSATrayApp.app/Contents/MacOS/VSATrayApp /bin

Troubleshoot Client Registration

SASE client registration may fail due to various factors such as certificate issues, DNS resolution problems, blocked ports, or interference from captive portal configurations. These underlying causes can prevent the client from successfully connecting and completing the registration process. To identify the root cause, review the error messages that display during failure and follow the troubleshooting steps described in this section.

Gateway CA Certificate

The following error messages may display if client registration fails:

  • Registration failed. Error: Failed to register. Use alternate FQDN for registration. Error: The underlying connection was closed: Could not establish trust relationship for the SSL/TSL secure channel. 
  • Registration failed; the underlying connection was closed the connection was closed unexpectedly.
  • Failed to connect. Retry after some time, OR choose a different gateway and connect.

A gateway certificate authority (CA) certificate is required to establish secure VPN connections. Ensure that all essential CA certificates are installed in the device's certificate store. Missing or invalid certificates may hinder successful authentication between the SASE client and SASE gateway.

To verify CA certificates (on Windows OS):

  1. In Windows, navigate to Run > certlm.msc > Trusted Root Certificate.
  2. Verify the relevant CA server in Gateway Secure Access. If a publicly signed certificate is used for VPN authentication, it must also be included in the list.

Port Requirements for Portal and Gateway

The following error messages display in case of port and protocol issues related to SASE portal or gateway:

  • Registration failed; the underlying connection was closed the connection was closed unexpectedly.
  • Retry after some time OR use alternate FQDN for registration. Error: The underlying connection was closed: The connection was closed unexpectedly. 
  • RAS809 network connection between your computer and VPN server could not be established because remote server is not responding.

The SASE client requires the following ports to be open for outbound connections to all portal and gateway FQDN or IP addresses:

Port Number Protocol

500

UDP

4500

UDP

50 (ESP)

IP Protocol 50

443

HTTPS, TCP (TLS) and UDP (DTLS)

ICMP ECHO

ICMP

If any of the error messages display, check that the required ports and protocols are allowed from the SASE client to the SASE gateway. 

DNS Resolution of Portal, Group, and Gateway FQDN

The DNS server on end-user devices resolves the SASE gateway portal and gateway FQDN IP addresses. In case of issues, the following error messages display:

  • Failed to connect. Error: Failed to resolve global.versanow.net 
  • Registration failed. Error: Failed to register. Please check your DNS Settings. Error: The remote name could not be resolved: ‘url'
  • Retry after some time OR use alternate FQDN for registration. Error: The underlying connection was closed: The connection was closed unexpectedly. 

(For Windows OS) To verify if portal and gateway FQDNs resolve to valid IP addresses, run the ping FQDN CLI command in the command prompt. For example: 

C:\Users\user-1>ping chn-sse-gw1.versanow.net
Pinging chn-sse-gwl.versanow.net [10.163.107.22] with 32 bytes of data: 
Reply from 10.163.107.22: bytes=32 time=3ms TTL=63 
Reply from 10.163.107.22: bytes=32 time=2ms TTL=63 
Reply from 10.163.107.22: bytes=32 time=2ms TTL=63 
Reply from 10.163.107.22: bytes=32 time=2ms TTL=63
Ping statistics for 10.163.107.22:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds:
Minimum = 2ms, Maximum = 3ms, Average = 2ms

To verify that the portal, group, and gateway FQDNs resolve all their required IP addresses correctly, in the command prompt, run nslookup portal.example.com (for Windows) or dig portal.example.com (Linux). The following is an example for Windows:

C:\Users\user-1>nslookup
Default Server: dns.versa-networks.com 
Address: 10.75.0.53
> sse-blr-lab-gw1.pslab.versanow.net
Server: dns.versa-networks.com
Address: 10.75.0.53

Non-authoritative answer:
Name: sse-blr-lab-gw1.pslab.versanow.net 
Addresses: 18x.1x.14x.17x
           18x.1x.14x.17x

Note that the portal and gateway FQDNs resolve to the private IP segment for internal networks by using gateway-assisted trusted network detection. For more information, see Configure Detection of Trusted Networks for SASE Gateways.

Test Portal API

To verify that the SASE gateway processes SASE client requests, check the portal API to confirm its accessibility and that you receive a “200 OK” status code. If the browser indicates that sites cannot be trusted, it means that the gateway CA certificate is missing. Refer to “Gateway and SSL Decryption CA Verification.”

For example:

https://portal-FQDN/secure-access/services/gateway?action=discover&ent_name=ENT-NAME

portal-api-test.png

Bypass SSE FQDNs in Third-Party Clients and Security Devices

Third-party endpoint tools such as antivirus, endpoint detection and response (EDR), firewall agents, and web proxies can interfere with SASE gateway connections (HTTPS, IPsec, TLS, or DTLS). To prevent this, do the following: 

  • Ensure that portal, gateway group, and gateway FQDNs and IP addresses are allowed in all the endpoints installed on the machine and transit security devices (firewalls and proxies).
  • Test the SASE client on a clean device, without additional security agents, to ensure it works in a default environment. 

Troubleshoot User Authentication

User authentication may fail due to reasons such as incorrect passwords, LDAP connection issues, or failures in SAML or certificate-based authentication. These issues prevent successful login and access to services. Review the specific error messages to help pinpoint the cause, and follow the procedures below to troubleshoot and resolve the issue.

LDAP User Authentication Failure 

Error messages:

  • Authentication failed! Please check UserName and Password, and then resubmit.
  • Registration failed. Error: Failed to register. Retry after sometime OR use alternate FQDN for registration.\nError: Unable to reach to the remote server.

User authentication may fail due to the following conditions: 

  • The password the user enters is incorrect or locked.
  • The SASE gateway is unable to communicate with the LDAP servers. Check reachability of LDAP from the gateway, or check the Administrator user password entered in the LDAP profile configuration.

User with Locked or Expired Password Connects to Client

  • If a user’s password expires or changes after connecting to the SASE gateway, the connection remains active. Versa SASE gateway's default authentication cache interval is 10 minutes. If a user disconnects and then reconnects after this interval, the user password is validated.
  • In the Concerto UI, navigate to View > User > Live Users, and then force SASE user to disconnect. This clears the SASE gateway cache. The user is forced to validate the password after disconnection. 

SAML Authentication Failure

SAML authentication can fail due to misconfiguration by the identity provider (IdP) or service provider. Try the following checks for such failures:

Validate the Certificate

  • Ensure that the certificate provided by the IdP is correctly configured and trusted by the service provider.

Verify Entity ID Configuration

  • Confirm that the entity ID configured on both the IdP and service provider sides is an exact match. A mismatch in entity ID can cause assertion rejection or redirection failure. In such cases, authentication goes through, but token validation fails and registration cannot be completed. 
  • Verify that the correct IdP certificate is uploaded in Concerto. You must download certificates from the IdP after all configurations.

Device Certificate Authentication Issues

To verify device certificate authentication issues:

  • Ping the SASE gateway FQDN in the certificate that is reachable from the client device for validation. To get FQDN details:
    1. In the SASE client, click the vsa-settings-icon.png Settings icon > select the enterprise profile under Enterprise > Gateways > select the primary gateway > copy the FQDN of all the gateways. 
    2. Add the keyword “-cert” keyword between the gateway hostname and root domain in all the gateway FQDNs. For example, if the abc-sse-gw1.versa.net, edit it to abc-sse-gw1-cert.versa.net. 

      client-gateway-fqdn.png
  • Ensure that the SASE gateway and device certificates issued by the customer have extended key usage client and server authentication. For example:

    device-certificate-enhanced-key-usage.png
  • The SASE gateway and device (endpoint) certificate must not include the email attribute enabled in the Subject because this may fail during certificate trust chain validation, since the email identifier is not a valid distinguished name (DN). For example:

    certificate-dn.png
    Client error message:

    client-ike-auth-error.png
  • To verify if the CA root certificate is in the Certificates (Local Computer) > Trusted Root Certificate Authorities > Certificates folder of your device, run the certlm.msc CLI command from the command prompt. For example:

    trusted-root-ca.png
  • Check if the device certificate is present in the Certificates (Local Computer) > Personal > Certificates folder. For example: 

    device-certificate-present.png
  • Verify that the device certificate has the Extended Key Usage: Client Authentication. For example:

    device-certificate-extended-key-usage.png

If the correct device certificate is not present in the Certificates (Local Computer) > Personal > Certificates folder, authentication fails and the following message displays:

authentication-failure-error.png 

  • Ensure that the SASE gateways certificate has been imported to the customer organization in “gateway-name-device-auth” format.
  • On the SASE gateway, verify if the device certificate authentication profile is configured with the correct Certificate Authority (CA):
    1. Go to Configure > Security Service Edge > User and Device Authentication > Profiles. For more information, see Configure User and Device Authentication Profiles
    2. Select the required device certificate-based authentication profile and the check the following in the Edit Device Certificate Authentication Profile screen > Settings tab:

      edit-device-certificate-authentication-profile.png

User Certificate Authentication Issues

To verify user certificate authentication issues: 

  • In user certificates, the Common Name (CN) field typically contains either the User Principal Name (UPN) or the display name. The Username Identifying Field in Certificate matches the user's simple name or principal name when connecting via the SASE client.
    1. Go to Configure > Security Service Edge > User and Device Authentication > Profiles. The User and Device Authentication Profiles screen displays.  
    2. Click + Add. The Add User Device Authentication Profile screen displays.  

      add-user-and-device-authentication-profile-user-cert-option.png
    3. Select User Certificate Based in and click Get Started. The Add User Certificate Authentication Profile screen displays.

      add-user-certificate-authentication-profile.png
    4. Select the appropriate value from the Username Identifying Field in Certificate field.
    5. For information about configuring other paramaters, see Configure User and Device Authentication Profiles.
    6. Click Save in the Review and Submit field.  
  • The CA certificate must be available in the Trusted Root Certificate Authorities folder. Access the certificate store to verify if the CA is present in the Certificates - Current User > Trusted Root Certificate Authorities > Certificates folder:

    trusted-root-ca-certificates-folder.png
  • Verify if the user certificate is present in the Certificates - Current User > Personal > Certificates folder.

    personal-certificates-folder.png
  • Verify that the user certificate common name (CN) is the username of the user to authenticate.

     cn-username.png
  • Verify that the user certificate has Extended Key Usage: Client Authentication.

    enhanced-key-usage-client-auth.png

Multifactor Authentication TOTP Issues

Multifactor authentication (MFA) is a key component of SASE security and adds a layer of protection beyond traditional passwords. Users may encounter issues with MFA when connecting through the SASE client, preventing them from accessing necessary applications and data. This section highlights some of the common issues and solutions related to MFA and time-based one-time password (TOTP). 

The following error messages display in case of TOTP issues:

  • OTP verification failed! Please enter the correct OTP and then resubmit
  • Unable to communicate with Versa Service. Please retry again

If the SASE client fails to authenticate using TOTP and displays errors such as “User authentication failed” or “Invalid OTP”, verify that the endpoint device time zone and the SASE gateway clock are accurate.

To verify: 

  • In VOS, you must configure NTP with the appropriate time zone and synchronize NTP.
  • Ensure that the end user device clock is synchronized with NTP.
  • A difference of more than a minute between the SASE gateways and the end user device can cause TOTP to fail. A TOTP is valid for 3 minutes.

SASE Client Tunnel Issues

SASE displays the following RAS error if there is any issue with the tunnel:

  • RAS_ReturnCode[809]: The network connection between your computer and the VPN server could not be established because the remote server is not responding. This could be because one of the network devices (e.g, firewalls, NAT, routers, etc) between your computer and the remote server is not configured to allow VPN connections. Please contact your Administrator or your service provider to determine which device may be causing the problem. 

To verify:

  • Ensure that ports 500 and 4500 are open for the SASE gateway FQDNs. For DTLS/TLS, ensure TCP/UDP port 443 is also open.
  • MTU may cause problems on PPPoE and LTE circuits. Ensure that you use the latest SASE client version to prevent these issues. 
  • Ensure that the SASE gateway certificate issued by the SSE MSP has server and client authentication for Enhanced Key Usage:

    certificate-enhanced-key-usage.png

SSL Decryption Issues

SSL/TLS decryption is crucial to facilitate advanced security features, such as application control, data loss prevention (DLP), Cloud Access Security Broker (CASB), and antivirus, to inspect threats and policy violations. This section describes how to troubleshoot common SSL decryption-related issues on the client side. 

Verify CA Installation for Decryption

  1. In Windows, go to: Run > certlm.msc > Trusted Root Certificates.
  2. Check if Versa Networks Root Certificate Authority is present. If the customer provided a CA certificate for SSL decryption, ensure that it is included in the list. For example:

    versa-ca-authority-cert.png
  3. If any certificate is missing, install it in the Certificates folder under Trusted Root Certificate Authority store.

Verify SSL Decryption for Browser-Based Traffic

  1. Open any web browser and go to any accessible HTTPS site that utilizes SASE gateways with SSL decryption enabled. Then, to HTTPS > click the lock icon in the address bar > select "Connection secure" and click "More information". 
    "Verified by:" must display the Internal CA server name or the SSE organization name. For example:

    verfied-by-sse.png
  2. If you want to validate further, open the certificate and check for the issuer, which is an internal certificate. For example:

    cerficate-details-box.png

    If the certificates are validated by a public C) such DigiCert or GoDaddy, SSL decryption does not function. For example:

    securely-connected-message.png
  3. Check if DNS resolution is resolving to IPv6, as this bypasses the tunnel.
  4. Verify decryption policies on the SASE gateway.

VSPA Traffic Issues

With the Versa Secure Private Access (VSPA) solution, only private traffic is directed towards the SASE gateway and then forwarded to the customer datacenters.

Users may experience difficulties while accessing these private resources. This section provides details about common issues, troubleshooting steps, and solutions for private access issues.

Unable to Access Private Applications

If you are unable to access private applications when the SASE client is connected:

  • Check to make sure the DNS servers learned through the SASE gateway are valid and configured with the domain name. To verify, run the ipconfig /all CLI command from the command prompt. For example:
    C:\Users\ExampleUser>ipconfig /all
    
    Windows IP Configuration
    
       Host Name . . . . . . . . . . . . : ExampleHost
       Primary Dns Suffix  . . . . . . . : example.local
       Node Type . . . . . . . . . . . . : Hybrid
       IP Routing Enabled. . . . . . . . : No
       WINS Proxy Enabled. . . . . . . . : No
       DNS Suffix Search List. . . . . . : abc-networks.com
    
    Unknown adapter Versa-Networks-VPN-DC:
    
       Connection-specific DNS Suffix  . : abc-Networks-Bangalore-DC
       Description . . . . . . . . . . . : abc-Networks-Bangalore-DC Adapter
       Physical Address. . . . . . . . . : AB-CD-EF-12-34-56
       DHCP Enabled. . . . . . . . . . . : No
       Autoconfiguration Enabled . . . . : Yes
       Link-local IPv6 Address . . . . . : fe80::1234:abcd:5678:9abc%7(Preferred)
       IPv4 Address. . . . . . . . . . . : 192.168.100.2(Preferred)
       Subnet Mask . . . . . . . . . . . : 255.255.255.0
       Default Gateway . . . . . . . . . : 192.168.100.1
       DNS Servers . . . . . . . . . . . : 8.8.8.8
       NetBIOS over Tcpip. . . . . . . . : Enabled
  • From the PowerShell prompt, run the Get-DnsClientNrptRule CLI command to check if the specific domain name is matched to the private DNS server. For example:
    Name                : {8B0059AE-XXXX-XXXX-XXXX-XXXXXXXXXXXX}
    Version             : 3
    Namespace           : {pslab.example.net, testlab.abc.net, india.example.net, sse-chn.example.org, ...}
    IPsecCARestriction  : 
    DirectAccessDnsServers      : 
    DirectAccessEnabled         : False
    DirectAccessProxyType       : 
    DirectAccessProxyName       : 
    DirectAccessQueryIPsecEncryption : 
    DirectAccessQueryIPsecRequired   : 
    NameServers         : 192.0.2.5
    DnsSecEnabled       : False
  • To verify if routes are added on endpoints for the private network and DNS server, run the route print CLI command from the command prompt. Check that the valid routes for DNS and private applications are directed to the IPsec interface.
  • To verify if you can resolve private domains, ping them and telnet on required ports. For example, run the following CLI commands from command prompt:
    • ping private URL/application FQDN
    • telnet private URL/application <port number>

Validate VSIA and VISA+VPSA Traffic 

In instances involving only VISA-VSPA, the SASE client operates in full tunnel mode, where all Internet and private traffic is directed to the SASE gateway by default. This sections provides details about common issues, troubleshooting steps and solutions related to traffic validation and access issues.

Internet Applications via SASE Gateway are Inaccessible

If applications are not functioning as expected after establishing a connection with the SASE client, follow these steps to isolate the Issue:

  • Verify that the SASE client is configured with a default route for Internet access directed towards the SASE gateway virtual adapter.  To do this, run the route print CLI command in the command prompt, and then if check the default route points to the IPsec interface IP address. For example:
    C:\Users\admin>route print
    ===========================================================================
    Interface List
     29...XX XX XX XX XX XX ......Example-VPN-Interface
     10...YY YY YY YY YY YY ......Intel(R) PRO/1000 MT Network Connection
      1...........................Software Loopback Interface 1
    ===========================================================================
    IPv4 Route Table
    ===========================================================================
    Active Routes:
    Network Destination        Netmask          Gateway        Interface     Metric
              0.0.0.0          0.0.0.0          10.10.0.1      10.10.0.100      281
              0.0.0.0          0.0.0.0          On-link        192.168.1.3        2
              4.2.2.2  255.255.255.255          10.10.0.1      10.10.0.100      525
              8.8.4.4  255.255.255.255          On-link        192.168.1.3        2
  • Ensure that the DNS learned from the SASE gateway does not have a domain mapped to it (even if its VISA+VSPA). The namespace must be empty.
  • Ping the application FQDN and confirm that it resolves to a valid IPv4 address and not to an IPv6 address. If it resolves to an IPv6 address:
    1. Disable the IPv6 address.
    2. Enable DNS filtering on SASE Gateways to block “AAAA" records.
    3. Deactivate the IPv6 adapter on the client and prohibit IPv6 DNS requests in the SASE gateway.
      C:\Users\ExampleUser>ping google.com
      
      Pinging google.com [142.250.189.206] with 32 bytes of data:
      Reply from 142.250.189.206: bytes=32 time=207ms TTL=109
      Reply from 142.250.189.206: bytes=32 time=208ms TTL=109
      Reply from 142.250.189.206: bytes=32 time=207ms TTL=109
      Reply from 142.250.189.206: bytes=32 time=209ms TTL=109
      
      Ping statistics for 142.250.189.206:
          Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
      Approximate round trip times in milli-seconds:
          Minimum = 207ms, Maximum = 209ms, Average = 207ms
      IPv6 Ping Output:
      PING ipv6.google.com(muc12s12-in-x0e.1e100.net (2a00:1450:4016:809::200e)) 32 data bytes
      40 bytes from muc12s12-in-x0e.1e100.net (2a00:1450:4016:809::200e): icmp_seq=1 ttl=118 time=7.39 ms
      40 bytes from muc12s12-in-x0e.1e100.net (2a00:1450:4016:809::200e): icmp_seq=2 ttl=118 time=7.09 ms
      40 bytes from muc12s12-in-x0e.1e100.net (2a00:1450:4016:809::200e): icmp_seq=3 ttl=118 time=7.26 ms
      40 bytes from muc12s12-in-x0e.1e100.net (2a00:1450:4016:809::200e): icmp_seq=4 ttl=118 time=7.09 ms
      
  • Verify that the resolved IP address in the ping test does not appear in the route print output and is directed to the local network Interface. If yes, it means that an application bypass is configured for the application in the secure access rule on SASE gateways. Verify this configuration. 

    In this case, the default route points to the SASE gateway and all internet traffic is routed through a VPN tunnel interface. All applications take the default route unless an application is configured with application bypass. For example:

    IP configuration:
    PPP adapter Example-VPN-Interface:
       Connection-specific DNS Suffix  . :
       Description . . . . . . . . . . . : Example-VPN-Interface
       Physical Address. . . . . . . . . : XX-XX-XX-XX-XX-XX
       DHCP Enabled. . . . . . . . . . . : No
       Autoconfiguration Enabled . . . . : Yes
       IPv4 Address. . . . . . . . . . . : 10.10.10.136(Preferred)
       Subnet Mask . . . . . . . . . . . : 255.255.255.255
       Default Gateway . . . . . . . . . : 0.0.0.0
       DNS Servers . . . . . . . . . . . :
       NetBIOS over Tcpip. . . . . . . . : Enabled
    
    Ethernet adapter Ethernet Instance 0:
       Connection-specific DNS Suffix  . :
       Description . . . . . . . . . . . : Intel(R) Ethernet Connection
       Physical Address. . . . . . . . . : XX-XX-XX-XX-XX-XX
       DHCP Enabled. . . . . . . . . . . : No
       Autoconfiguration Enabled . . . . : Yes
       Link-local IPv6 Address . . . . . : fe80::abcd:bcf9:6035:5734%3(Preferred)
       IPv4 Address. . . . . . . . . . . : 10.195.62.139(Preferred)
       Subnet Mask . . . . . . . . . . . : 255.255.0.0
       Default Gateway . . . . . . . . . : 10.195.0.1
       DNS Servers . . . . . . . . . . . : 8.8.8.8
       NetBIOS over Tcpip. . . . . . . . : Enabled

    ping output:
    C:\Users\admin>ping outlook.com
    
    Pinging outlook.com [52.96.91.34] with 32 bytes of data:
    Reply from 52.96.91.34: bytes=32 time=240ms TTL=228
    Reply from 52.96.91.34: bytes=32 time=240ms TTL=228
    Reply from 52.96.91.34: bytes=32 time=240ms TTL=228
    Reply from 52.96.91.34: bytes=32 time=239ms TTL=228
    
    Ping statistics for 52.96.91.34:
        Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
    Approximate round trip times in milli-seconds:
        Minimum = 239ms, Maximum = 240ms, Average = 239ms

    route print output:
    C:\Users\admin>route print
    ===========================================================================
    Interface List
     29...XX XX XX XX XX XX ......Example-VPN-Interface
     10...XX XX XX XX XX XX ......Intel(R) Ethernet Connection
     11...XX XX XX XX XX XX ......Intel(R) Ethernet Connection #3
      1...........................Software Loopback Interface 1
    ===========================================================================
    
    IPv4 Route Table
    ===========================================================================
    Active Routes:
    Network Destination        Netmask          Gateway       Interface  Metric
              0.0.0.0          0.0.0.0          10.195.0.1    10.195.62.139   281
            10.10.10.136  255.255.255.255       On-link       10.10.10.136   425
            10.195.0.0      255.255.0.0         On-link       10.195.62.139   281
            10.195.62.139  255.255.255.255      On-link       10.195.62.139   425
            10.195.255.255 255.255.255.255      On-link       10.195.62.139   425
            127.0.0.0      255.0.0.0            On-link       127.0.0.1       331
            127.0.0.1      255.255.255.255      On-link       127.0.0.1       331
            127.255.255.255 255.255.255.255     On-link       127.0.0.1       331
          169.254.0.0      255.255.0.0          On-link       169.254.84.224  281
      169.254.84.224        255.255.255.255     On-link       169.254.84.224  281
      169.254.255.255      255.255.255.255      On-link       169.254.84.224  281
            224.0.0.0      240.0.0.0            On-link       10.195.62.139   281
            224.0.0.0      240.0.0.0            On-link       169.254.84.224  281
            255.255.255.255 255.255.255.255     On-link       10.195.62.139   281
            255.255.255.255 255.255.255.255     On-link       169.254.84.224  281

    nslookup output:
    C:\Users\admin>nslookup
    Default Server:  dns.google
    Address:  8.8.8.8
    
    > outlook.com
    Server:  dns.google
    Address:  8.8.8.8
    
    DNS request timed out.
        timeout was 2 seconds.
    DNS request timed out.
        timeout was 2 seconds.
    Non-authoritative answer:
    Name:    outlook.com
    Addresses: 52.96.229.242
               52.96.228.130
               52.96.222.226
               52.96.111.82
               52.96.222.240
               52.96.3.2
               52.96.91.34
               52.96.214.50
               52.96.172.98
               52.96.222.194
  • Verify third-party proxy applications or proxies configured in the endpoint device browser. If any are enabled, disable them and test again. To verify:
    • Navigate to Settings > Network & internet > Proxy. For example:

      network-internet-proxy.png
    • Otherwise, from the PowerShell command, run the Get-ItemProperty -Path "HKCU:\Software\Microsoft\Windows\CurrentVersion\Internet Settings" CLI command. For example:
      PS C:\Users\admin> Get-ItemProperty -Path "HKCU:\Software\Microsoft\Windows\CurrentVersion\Internet Settings"
      
      CertificateRevocation    : 1
      DisableCachingOfSSLPages : 0
      IE5_UA_Backup_Flag       : 5
      PrivacyAdvanced          : 1
      SecureProtocols          : 1200
      User Agent               : Mozilla/4.0 (compatible; MSIE 8.0; Win32)
      ZonesSecurityUpgrade     : {182, 113, 75, 18...}
      WarnonZoneCrossing       : 0
      EnableNegotiate          : 1
      ProxyEnable              : 1
      MigrateProxy             : 1
      LockDatabase             : 133868971572318107
      ProxyServer              : 1.1.1.1:8080
      PSPath                   : Microsoft.PowerShell.Core\Registry::HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
      PSParentPath             : Microsoft.PowerShell.Core\Registry::HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion
      PSChildName              : Internet Settings
      PSDrive                  : HKCU
      PSProvider               : Microsoft.PowerShell.Core\Registr

Local Breakout Application Does Not Work

In scenarios where where specific applications or FQDNs must break out locally before they are forwarded to the SASE gateway, verify the following:

  • Ensure that the SASE gateway secure access rule configuration includes the required FQDN in the application bypass list, and that changes are published after the SASE client is re-registered.
  • Run the ping CLI command to validate FQDN resolution and check if an entry populates in the route print output for the resolved IP address, which points to the device's local interface and not the SASE gateway.

    In the following example, the Dropbox application is routed through local internet or adapter:

    VPN adapter (PPP)
    PPP adapter sulaisse-SSE-GW2-001:
    
       Connection-specific DNS Suffix  . :
       Description . . . . . . . . . . . : sulaisse-SSE-GW2-001
       Physical Address. . . . . . . . . :
       DHCP Enabled. . . . . . . . . . . : Yes
       Autoconfiguration Enabled . . . . : Yes
       IPv4 Address. . . . . . . . . . . : 10.10.13.106 (Preferred)
       Subnet Mask . . . . . . . . . . . : 255.255.255.255
       Default Gateway . . . . . . . . . :
       DNS Servers . . . . . . . . . . . : 8.8.8.8
       NetBIOS over Tcpip. . . . . . . . : Enabled

    Local adapter (Ethernet)
    Ethernet adapter Ethernet Instance 0:
    
       Connection-specific DNS Suffix  . :
       Description . . . . . . . . . . . : Intel(R) Ethernet Adapter
       Physical Address. . . . . . . . . : 52-54-00-5E-F2-02
       DHCP Enabled. . . . . . . . . . . : Yes
       Autoconfiguration Enabled . . . . : Yes
       IPv4 Address. . . . . . . . . . . : 10.195.62.139 (Preferred)
       Subnet Mask . . . . . . . . . . . : 255.255.0.0
       Default Gateway . . . . . . . . . : 10.195.0.1
       DHCPv6 IAID . . . . . . . . . . . : ########
       DHCPv6 Client DUID. . . . . . . . : ###########
       DNS Servers . . . . . . . . . . . : 8.8.8.8

    ping output (Dropbox):
    C:\Users\admin>ping dropbox.com
    
    Pinging dropbox.com [162.125.248.18] with 32 bytes of data:
    Reply from 162.125.248.18: bytes=32 time=134ms TTL=55
    Reply from 162.125.248.18: bytes=32 time=134ms TTL=55
    Reply from 162.125.248.18: bytes=32 time=134ms TTL=55
    Reply from 162.125.248.18: bytes=32 time=134ms TTL=55
    
    Ping statistics for 162.125.248.18:
        Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
    Approximate round trip times in milli-seconds:
        Minimum = 134ms, Maximum = 134ms, Average = 134ms
    

    nslookup output (Dropbox):
    C:\Users\admin>nslookup
    
    DNS request timed out.
        timeout was 2 seconds.
    Default Server:  Unknown
    Address:  8.8.8.8
    
    > dropbox.com
    Server:  Unknown
    Address:  8.8.8.8
    
    DNS request timed out.
    DNS request timed out.
    Non-authoritative answer:
    Name:    dropbox.com
    Addresses:  2620:100:6018:18::a27d:f812
               162.125.248.18
    

    route print output (the highlighted text shows Dropbox route pointing to VPN adapter):
    C:\Users\admin>route print
    
    Interface List
     23...00 00 00 00 00 00 ...... sulaisse-SSE-GW2-001
     12...52 54 00 5e f2 02 ...... Intel(R) Ethernet Adapter
      3...52 54 00 ca 24 1a ...... Intel(R) Ethernet Adapter #3
      1........................... Software Loopback Interface 1
    
    IPv4 Route Table
    ===========================================================================
    Active Routes:
    Network Destination        Netmask          Gateway       Interface  Metric
              0.0.0.0          0.0.0.0       10.195.0.1   10.195.62.139    281
           10.10.13.106  255.255.255.255       On-link     10.10.13.106      2
           10.195.0.0      255.255.0.0       On-link      10.195.62.139    281
           10.195.62.139   255.255.255.255   On-link      10.195.62.139    281
         127.0.0.0        255.0.0.0         On-link          127.0.0.1    331
        162.125.248.18    255.255.255.255   10.195.0.1   10.195.62.139    425
         ...
    

Troubleshoot Services Dependent on Third-Party Clients or Proxy

In some cases, SASE client deployment has to integrate with existing third-party clients or proxy-dependent services. These integrations enhance overall security posture; however, they can also add to complexity and may lead to connectivity and performance issues. In such cases compatibility between the Versa SASE and other vendor VPN, EIP, DLP or network-related agents can affect the function of each other. Use the following steps to troubleshoot such issues: 

  • Navigate to Control Panel > Programs > Programs and Features and check for software such as Cisco AnyConnect, Fortinet/FortiClient, Zscaler, OpenVPN, or similar VPN or security clients. DLP and EDR agents may conflict with Versa SASE client.
  • Temporarily disable or uninstall conflicting software one at a time. After disabling each agent, restart your computer to and verify if conflicts are resolved.

EIP Rule Match Issues

Endpoint Information Profiles (EIP) is a key component of SASE solutions. It is a set of data points and characteristics that describe an endpoint device (client), that allows you to evaluate its security posture and decide whether to grant access to network resources. You may face issues if the client does not match the right EIP rule. This section covers common issues, troubleshooting steps, and solutions for EIP rule-related problems. To verify:

If you face EIP rule-related issues, ensure that the EIP agent matched in the secure access rules is installed and running on the end user machine. To verify:

  • Collect the EIP data from SASE Client by clicking the Seetting icon > App Settings > Collect EIP: 

    sase-client-eip-collection.png
  • Access the generated EIP File from:  C:\ProgramData\Versa Secure Access\config\EIPCollectedData.json.
  • Open the JSON file to check that the matched EIP agent details are present and its attribute information matches the EIP policy. For example:
    eip:
      antimalware:
        softwares:
          software:
            0:
              vendor: "Microsoft Corporation"
              product: "Microsoft Defender ATP"
              major: 10
              minor: 0
              service: 22631
              patch: 5189
              raw_version: "10.0.22631.5189"
              is-running: true
              is-configured: true
              is-installed: true
              realtime-protection: true

Fail-Close Issues

You can enable Fail-Close on the SASE client to ensure control and compliance for user endpoints. You can configure it to block all traffic except for certain bypassed URLs (defined in secure access rules) and default captive portals in cases where the client is not connected or is manually disconnected by the user. This section covers common configuration issues that may prevent Fail-Close mode from working as expected, along with solutions to rectify them. 

To troubleshoot Fail-Close: 

  • You must enable auto connect and Fail-Close for SASE gateway secure access rules and when a user connects, the user is matched to the appropriate rule.
  • Check if the user has manually updated client settings and disabled the auto connect from the client. If yes, the user must disconnect the client and then re-register or delete the account.
  • Check the Versa secure access logs to ensure the driver is configured with Fail-Close mode. To check client logs, look for FAIL_CLOSE state in the log file at C:\ProgramData\Versa Secure Access\logs\ versa_secure_access_service.log. If driver has not enforced Fail-Close, contact support.
    2025-06-04 14:04:16,471 [35] DEBUG VNNetworkLib.RouteMgr:0 - <Route_IP>/32, NextHop <Gateway_IP>, Metric 500, ifIndex 13 is not present, skip delete route
    2025-06-04 14:04:16,472 [35] DEBUG VNServiceUtils.SystemOperations:0 - Deleted Route <Route_IP>/32 failed/does not exist
    2025-06-04 14:04:16,473 [NetworkEventHandler] DEBUG VNVersaSecureAccessWcfService.ProfileMgrSystem.TunnelDriverMgr:0 - Configured Driver mode FAIL_OPEN, Running Driver mode FAIL_OPEN, New driver mode FAIL_OPEN, Driver Filter Enabled: False
    2025-06-04 14:04:16,474 [NetworkEventHandler] DEBUG VNVersaSecureAccessWcfService.ProfileMgrSystem.TunnelDriverMgr:0 - No change in Driver mode FAIL_OPEN
    2025-06-04 14:04:16,475 [NetworkEventHandler] DEBUG VNVersaSecureAccessWcfService.INetworkChangeHandler:0 - DriverModeConfigured: FAIL_OPEN
    2025-06-04 14:04:16,475 [NetworkEventHandler] DEBUG VNVersaSecureAccessWcfService.INetworkChangeHandler:0 - Refresh app tunnel driver loaded profiles.
    2025-06-04 14:04:17,832 [23] DEBUG VNVersaSecureAccessWcfService.VPNConnectionManager:0 - No connected N/W interfaces found
    2025-06-04 14:04:17,834 [23] DEBUG VNUtilities.OSUtil:0 - IsX86Mode :False, Windows OS Version is 10 Or Above:True
    2025-06-04 14:04:27,768 [23] DEBUG VNVersaSecureAccessWcfService.VPNConnectionManager:0 - No connected N/W interfaces found

Pre-Logon Issues

To troubleshoot pre-logon issues:

  • Try to load the pre-login file using the command prompt in Windows as Administrator. To load the file, run the VersaSecureAccessClientConsole.exe prelogon –prelogon_config file path and file name CLI command. If the command output displays 'Failed', it indicates an issue with the pre-login JSON file. For example:
    C:\Users\user1\TempDownloads>VersaSecureAccessClientConsole.exe prelogon --prelogon_config "Win-Secure-Policy-prelogon-config (1).json" 292 [1] INFO Versa Secure Access (null) - Starting application in console mode. Version 7.9.1_45ee8d413
    381 [1] DEBUG Versa Secure Access (null) - Prelogon configuration initiated
    382 [1] DEBUG Versa Secure Access (null) - Verifying and Applying Prelogon Configuration
    650 [1] ERROR Versa Secure Access (null)
    651 [1] ERROR Versa Secure Access (null) - Failed!

    The following is a sample output when the file loads successfully:
    C:\Users\user1\TempDownloads >VersaSecureAccessClientConsole.exe prelogon --prelogon_config "Win-Secure-Policy-prelogon-config (1).json" 295 [1] INFO Versa Secure Access (null) Starting application in console mode. Version 7.9.1_45ee8d413
    385 [1] DEBUG Versa Secure Access (null) - Prelogon configuration initiated
    386 [1] DEBUG Versa Secure Access (null) - Verifying and Applying Prelogon Configuration
    1701 [1] DEBUG Versa Secure Access (null)- Prelogon Configuration Applied Successfully!
    

Tunnel Flapping Issue

Multiple reasons can cause the tunnel on the SASE client flap or disconnect. To troubleshoot:

  • Check if the client internet connection is stable. To do this, open the command prompt on the client machine and run the ping google.com -t CLI command. Packet loss or consistently high latency in the output indicates an unstable internet connection. For example:
    C:\Users\admin>ping youtube.com -t
    Pinging youtube.com [142.251.222.206] with 32 bytes of data: 
    Reply from 142.251.222.206: bytes=32 time=9ms TTL=114 
    Reply from 142.251.222.206: bytes=32 time=9ms TTL=114 
    Reply from 142.251.222.206: bytes=32 time=9ms TTL=114 
    
    Ping statistics for 142.251.222.206:
        Packets: Sent = 30, Received = 30, Lost = 0 (0% loss), 
    Approximate round trip times in milli-seconds:
        Minimum 9ms, Maximum = 9ms, Average = 9ms
  • Check if the tunnel monitoring IP address is reachable when tunnel monitoring is enabled. To do this:
    1. In the SASE client, go to Profile > Account Details > Tunnel Monitoring to check the tunnel IP address.
    2. Ping this IP address to check the connectivity and if the tunnel is stable. The tunnel is up and functioning correctly if the IP address is reachable without drops. Lack of response or intermittent replies indicates tunnel instability.
    3. Ensure that the monitoring IP address is allowed in the internet protection rules on SASE gateways.
      C:\Users\admin>ping 8.8.8.8 -t
      Pinging 8.8.8.8 with 32 bytes of data:
      Reply from 8.8.8.8: bytes=32 time=12ms TTL=114 
      Reply from 8.8.8.8: bytes=32 time=11ms TTL=114 
      Reply from 8.8.8.8: bytes=32 time=11ms TTL=114 
      
      Ping statistics for 8.8.8.8:
          Packets: Sent = 17, Received = 17, Lost = 0 (0% loss), 
      Approximate round trip times in milli-seconds:
          Minimum = 11ms, Maximum = 26ms, Average = 12ms Control-C

SASE Client Error Message Categories

There are eight categories of SASE client errors. The initial owner of each error category is the end user, the customer IT department, or Versa Networks. The following are the SASE client error categories organized by who is responsible for addressing the error condition:

  • End user or the customer IT department
    • Authentication errors
    • Configuration errors
    • Internet connectivity errors
    • Network access errors
    • Operating system errors
  • Versa Networks
    • Client application errors
    • Gateway connectivity errors
    • Unknown errors

Error Messages Reported on the SASE client

This section describes the error messages reported on the SASE client. This section lists the error messages in an order as described Flow of SASE Client Connectivity above.

Error Message: Your attention is needed to restore internet
Error Message: You are not connected to the internet. Please check your connection.

Description There is no Internet connection for the client device to reach the registrar portal or the cloud gateway.
Error type Internet connectivity
Responsible party End user, customer IT team
Possible reasons
  • The device does not have Internet connection.
  • Interface failed because of operating system issues.
  • Wireless network is down.
  • Internet router is up, but that are internet connection issues from the internet service provider (ISP).
Next steps
  • Work with customer IT team to ensure that the details provided on the client are valid and correct.
  • If the details are correct, create a support ticket with Versa Networks to debug the issue further.


Error Message: Account creation failed! Please try again later

Description Registration with the cloud gateway failed.
Error type Internet connectivity
Responsible party End user, customer IT team
Possible reasons
  • Registration information provided for the client are incorrect.
  • Registration portal rejected the registration process.
Next steps
  • Work with customer's IT team to ensure that the details provided on the client are valid and correct.
  • If the details are correct, create a support ticket with Versa Networks to debug the issue further.

 

Error Message: Please enter all the fields to add a connection! Cancel otherwise

Description Not all registration values are provided.
Error type Configuration
Responsible party End user, customer IT team
Possible reasons
  • Not all the values required for registration have been provided on the SASE client.
Next steps
  • Work with customer's IT team to obtain and enter all necessary details provided on the Versa client.

 

Error Message: Change password failed! Please enter correct OTP and then resubmit

Description Procedure to change the password has failed because the OTP entered is incorrect.
Error type Authentication
Responsible party End user
Possible reasons
  • User did not provide correct the OTP values during the password change procedure.
  • The OTP expired, as the user took longer than the expiry time to enter the password during password change.
Next steps
  • Initiate the password reset process again on the client agent to obtain a new OTP and use the new OTP to reset the password.

 

Error Message: Passwords don't match! Please use same password and then submit

Description During the password reset process, the user is prompted twice to enter the new password. The two passwords do not match.
Error type Authentication
Responsible party End user
Possible reasons
  • User entered the passwords incorrectly.
Next steps
  • Initiate the password reset option again, and enter the details correctly.


Error Message: Authentication failed! Please check Username and Password, and then resubmit

Description The credentials provided for user authentication are incorrect.
Error type Authentication
Responsible party End user, customer IT team, Versa Networks
Possible reasons
  • User did not provide the correct username/password combination for registration or for the connection process.
  • The IT Administrator did not enter the correct details on the identity provider (IdP).
Next steps
  • End user should try again with correct credentials.
  • If the failure is not resolved, work with the customer's IT team to verify the credentials and, if necessary, to reset the credentials on the IdP.
  • If the failure is still not resolved, contact the Versa Networks Managed Services NOC to debug the client issues.


Error Message: OTP verification failed! Please enter correct OTP and then resubmit

Description User has not entered the correct one-time password (OTP) during the multifactor authentication (MFA) authentication process
Error type Authentication
Responsible party End user
Possible reasons
  • User did not provide the correct OTP.
  • The OTP has expired.
Next steps
  • Initiate the credential validation again to obtain a new OTP, and then resubmit.


Error Message: Password has expired! Please use your new password

Description User password has expired.
Error type Authentication
Responsible party End user, customer IT team
Possible reasons
  • User password expired as the result of the password expiration policy on the IdP.
Next steps
  • Initiate the password reset process.
  • Try to connect again after the password has been reset.


Error Message: Failed to register! Please try after some time

Description The user was not able to connect to the registrar portal to register the device.
Error type Gateway connectivity
Responsible party Customer IT team, Versa Networks
Possible reasons
  • Operating system issues occurred while running the SASE client software.
  • The Versa client is having issues reaching the Versa Networks gateway.
  • There may be configuration issues with the Versa networks gateway.
Next steps
  • End user must work with the customer IT team to ensure that there is no issue with the operating system.
  • Create a support ticket with the Versa Managed Services NOC team to debug the issue further.


Error Message: Failed to connect! Please try after some time

Description The user was not able to connect to the registrar portal to register the device.
Error type Gateway connectivity
Responsible party Customer IT team, Versa Networks
Possible reasons
  • Operating system issues occurred while running the SASE client software.
  • The Versa client is having issues reaching the Versa Networks gateway.
  • There may be configuration issues with the Versa networks gateway.
Next steps
  • End user should work with the customer IT team to ensure that there is no issue with the operating system.
  • Create a support ticket with the Versa Managed Services NOC team to debug the issue further.


Error Message: Failed to connect! Please restore your Internet connection and try again

Description Client is not able to access Internet to reach the Versa Cloud Gateway (VCG).
Error type Internet connectivity
Responsible party Customer IT team
Possible reasons
  • Failure to reach the internet.
Next steps
  • End user should work with the customer IT team to restore Internet connectivity on the user device.


Error Message: Permission Denied or Config Error! Please allow VPN configuration to connect

Description The profile pushed during the registration process failed. The user did not allow the configuration to be saved on the device. This is error message usually seen on MacOS.
Error type Configuration
Responsible party End user
Possible reasons
  • On MacOS, the user should accept the configuration profile that is pushed by the registrar portal during the registration process. If the profile is not accepted, the client is unable to use the profile to connect to the VCG.
Next steps
  • End user should accept or allow the configuration that was pushed, and then retry connection to the VCG.


Error Message: Tunnel network identified! Tunnel bypassed

Description Client does not trust the cloud gateway and hence is bypassing the tunnel.
Error type Gateway connectivity
Responsible party Versa Networks
Possible reasons
  • The certificate on the gateway has expired or has some issues.
  • The Certificate Authority (CA) on the user device does not recognize the certificate presented by the gateway.
Next steps
  • Create a support ticket with the Versa Managed Services NOC team to debug the issue further.


Error Message: Service Restart Failed! Please retry after some time

Description On MacOS, internal services restart after the initial configuration has failed.
Error type Operating system
Responsible party Versa Networks
Possible reasons
  • Possible issues with MacOS.
  • Possible issues with Versa client on MacOS.
Next steps
  • Create a support ticket with the Versa Managed Services NOC team to debug the issue further.


Error Message: Failed to connect! System would reconnect in 60 seconds

Description The Versa Client is not able to connect to the VCG even though it has detected that the gateway is reachable.
Error type Gateway connectivity
Responsible party End user, Versa Networks
Possible reasons
  • Possible internet congestion-related issues at the user device.
  • Possible internet congestion or reliable connection issues at the VCG.
Next steps
  • Wait some amount time for the internet at the user device to get more reliable.
  • Create a support ticket with the Versa Managed Services NOC team to debug the issue further.


Error Message: Unknown Error Occurred

Description The Versa client is not able to connect, but the error is an unexpected one.
Error type Unknown
Responsible party Customer IT team, Versa Networks
Possible reasons
  • Possible issues with the 0perating system or Versa client.
Next steps
  • Create a support ticket with the Versa Managed Services NOC team to debug the issue further.


Error Message: Failed to Reconnect. Please try connect manually.

Description Graceful restart from the client has failed, and manual intervention or attention required.
Error type Gateway connectivity
Responsible party Customer IT team, Versa Networks
Possible reasons
  • The client tries to reconnect automatically to the VCG when a connection fails, but is unable to reconnect.
Next steps
  • Create a support ticket with the Versa Managed Services NOC team to debug the issue further.


Error Message: Check DNS settings OR choose different server and connect

Description DNS resolution to the preferred VCG has failed.
Error type Internet connectivity
Responsible party Customer IT team, Versa Networks
Possible reasons
  • Client is unable to connect to the VCG because the FQDN of the gateway cannot be resolved to an IP address, possibly because the DNS server is not reachable from the client.
  • The gateway is down and has not responded.
Next steps
  • Customer IT team should resolve DNS settings for the client device.
  • Choose an alternate gateway from the drop-down list, and use it while the customer IT team is resolving the DNS settings.
  • Choose alternate DNS servers on the client device.
  • Create a support ticket with the Versa Managed Services NOC team to debug the issue further.


Error Message: Check DNS settings OR use alternate FQDN for registration

Description DNS resolution to the Versa registration has failed.
Error type Internet connectivity
Responsible party Customer IT team, Versa Networks
Possible reasons
  • Client is unable to resolve the DNS address, possibly because the DNS server is not reachable.
Next steps
  • Customer IT team should resolve DNS settings for the client device.
  • Choose an alternate registrar portal from the drop-down list, and use it while the customer IT team is resolving the DNS settings.
  • Choose alternate DNS servers on the client device.
  • Create a support ticket with the Versa Managed Services NOC team to debug the issue further.


Error Message: Failed to connect to gateway group! Please try connecting to a specific gateway

Description The Versa client chooses a best gateway from a group of gateways available for the user to connect to. While connecting to this gateway group, the Versa client is unable to connect to any available best gateway.
Error type Gateway connectivity
Responsible party Customer IT team, Versa Networks
Possible reasons
  • Connectivity issues at the client.
  • All gateways are down.
  • Enterprise subscription has expired.
Next steps
  • Create a support ticket with Versa Networks to determine whether some of the gateways are down and, if so, to determine alternative gateways to use.
  • If the subscription has expired, renew the subscription to the Versa service.


Error Message: Authentication failed. Disconnected from enterprise-name

Description A reauthentication request from the server has failed, and the user has been disconnected from the enterprise network.
Error type Authentication
Responsible party End user
Possible reasons
  • When the authentication server requests the user to reauthenticate for continuous security, the user did not complete the authentication process within specified time. Hence, for security reasons, the Versa client terminates the end user's connection to the gateway.
Next steps
  • End user should connect to the gateway again and provide authentication credentials to connect again to their enterprise network.


Error Message: Record not found for VPN Profile gateway-name
Error Message: Profile not found

Description Information the gateway that was chosen to connect is not found..
Error type Configuration
Responsible party End user, customer IT team, Versa Networks
Possible reasons
  • Possible corruption of the configuration on the Versa Client because of operating system issues.
  • Possible deletion of the configuration on the Versa client.
  • Registration of the client did not happen correctly.
Next steps
  • End user should reregister with the registration portal.
  • If the end user registration does not fix the issue, the customer IT team should collect debug logs and provide them to Versa Managed Service NOC team
  • Create a support ticket with the Versa Managed Services NOC team to debug the issue further.


Error Message: Failed to connect. Unable to communicate to Versa Service. Please retry again

Description Issue with the Versa client software on a Windows machine.
Error type Operating system
Responsible party Customer IT team, Versa Networks
Possible reasons
  • The Windows WCF service that the Versa client uses has malfunctioned.
  • New security software installed on the Windows machine has blocked the service from running.
Next steps
  • Restart the Windows WCF service on the client device.
  • Restart Windows.
  • Create a support ticket with the Versa Managed Services NOC team to debug the issue further.


Error Message: Failed to save configuration

Description Error while saving user changes made to the VPN profiles on the Versa client.
Error type Client application, operating system
Responsible party Customer IT team, Versa Networks
Possible reasons
  • User privilege issues in the operating system.
  • Versa client misbehavior.
Next steps
  • Customer IT team should confirm whether end user has appropriate privileges to make changes on the device.
  • Restart the Versa client software.
  • Create a support ticket with the Versa Managed Services NOC team to debug the issue further.


Error Message: Failed to fetch the secure access servers

Description Error while trying to read the server details from the configuration file.
Error type Client application, operating system
Responsible party End user, Versa Networks
Possible reasons
  • Operating system misbehavior.
  • Versa client misbehavior.
Next steps
  • Restart the Versa client software.
  • Restart the device
  • Create a support ticket with the Versa Managed Services NOC team to debug the issue further.


Error Message: Authentication failed! User forbidden.

Description During the OTP verification process, a Forbidden error was received from the server.
Error type Authentication
Responsible party Customer IT team
Possible reasons
  • User account issues.
  • IdP is misconfigured.
Next steps
  • Customer IT team to verify the user account.


Error Message: Captive Portal Detected! Your attention is needed to restore Internet.

Description A captive portal has been detected at the customer location, possibly at a public or hotel internet location.
Error type Internet connectivity
Responsible party Customer IT team
Possible reasons
  • User is at a location where they need to accept certain conditions before they are provided with access to the internet.
Next steps
  • User must accept captive portal terms and conditions or provide a password to access the internet at the location.


Error Message: enterprise-name is already Registered

Description User is trying to register with an enterprise name with which they have already registered.
Error type Configuration
Responsible party End user, customer IT team
Possible reasons
  • User is trying to register with an enterprise name with which they have already registered.
Next steps
  • User to obtain a different enterprise name from the customer IT team to use to register with.

Other Issues

This section describes how to handle other issues that the user might experience on the SASE client.

Issue: I am able to connect to the gateway, but I am not able to access anything on the network.

Description The user is able to connect to any of the Versa VCGs but cannot access their private network or their applications.
Error type Network access
Responsible party End user, customer IT team
Possible reasons
  • IPsec tunnel from the VCG to the customer network is down.
  • Remote application or network is down.
  • Internet on the gateway to connect to the customer data center is down.
Next steps
  • User to work with customer IT team to resolve connectivity issue.


Issue: I am able to connect to the gateway, but I am not able to access the internet.

Description The user is able to connect to any of the Versa VCGs but cannot access the internet using the customer network.
Error type Network access
Responsible party End user, customer IT team
Possible reasons
  • IPsec tunnel from the VCG to the customer network is down.
  • Remote application or network is down.
  • Internet on the gateway to connect to the customer data center is down.
Next steps
  • User to work with customer IT team to resolve connectivity issue.


Issue: I am able to connect to the gateway, but able to access only a few private networks or applications.

Description The user is able to connect to any of the Versa VCGs and is able to access only some parts of the private network, but not others.
Error type Network access
Responsible party End user, customer IT team
Possible reasons
  • IPsec tunnel from the VCG to the customer network is down.
  • Remote application or network is down.
  • Internet on the gateway to connect to the customer data center is down.
Next steps
  • User to work with customer IT team to resolve connectivity issue.


Issue: I am not able to connect to one of the gateways in the gateway list on the client.

Description The user is able to select and connect with only some of the VCGs in the list of gateways in the Versa client software, but is unable to connect with others.
Error type Gateway connectivity
Responsible party Versa Networks
Possible reasons
  • IPsec tunnel from the VCG to the customer network is down.
  • Remote application or network is down.
  • Internet on the gateway to connect to the customer data center is down.
Next steps Create a support ticket with the Versa Managed Services NOC team to debug the issue further.

Debug the SASE client

Perform Diagnostics

To automatically fix basic issues on the Versa Client, perform the diagnostics procedure:

  1. In the SASE client home screen, click the vsa-settings-icon.png Settings icon.
  2. Click App Settings and then click click Diagnostics.

    diagnostics-menu.png

    When the diagnostics complete, a message displays.

    diagnostics-run-completed-message.png

Collect Complete Debug Logs

To collect a complete set of debug logs to help the Versa Managed Services NOG team debug issues on the Versa client and the operating system:

  1. In the SASE client home screen, click the vsa-settings-icon.png Settings icon.
  2. Click App Settings.

    app-settings-menu.png
  3. Click Log Settings.

    log-settings.png
  4. In the Log Settings screen, click Log Level, and select a log severity level:
    • Debug—Log application debug-level information.
    • Error—Log error-level information.
    • Info—Log informational-level information. This is the default.
    • Verbose—Log additional information during the interaction with the client user interface.
    • Warm—Log warming-level information.

To save the log files:

  1. In the App Settings screen, click Export Logs.

    export-logs.png
  2. Select a folder and save the log file on your computer. The saved log file is in .zip format.
  3. Share the .zip file with the Versa Managed Services NOC team.

Verify the FQDN Used for Portal Registration

To verify that that FQDN used for portal registration resolves to the correct SASE portal WAN IP address, issue an nslookup or ping command for the FQDN that you use used for registration from your computer or laptop. The FQDN must resolve to the SASE portal WAN IP address. For example:

C:\Users\user1>nslookup sj-sandbox.versa-test.net
Server: dns-aa.versa-networks.com
Address: 10.10.11.111
Non-authoritative answer:
Name: sj-sandbox.versa-test.net Address: 200.40.10.10

Verify that HTTP and HTTPS Packets Are Allowed

To verify that HTTP and HTTPS packets destined to the SASE portal are allowed, check that your computer or laptop is set to allow HTTP and HTTPS packets to the VCG and registration portal. Make sure that the firewall on computer or laptop is not set to block HTTP and HTTPS packets bidirectionally.

To troubleshoot firewall issues on your computer or laptop, see the documentation from computer OS provider.

Supported Software Information

VOS Releases 20.2.3 and later support all content described in this article.

SASE client Releases 7.2.0 and later support all content described in this article.

  • Was this article helpful?