Purpose:

This document provides a structured, customer-facing troubleshooting guide to resolve connectivity issues between Versa Operating System (VOS) and Versa Management Server (VMS). Please follow the steps in the order listed below.

Step 1: Verify VMS Status on VOS

Check the VMS session status from the branch device:

show orgs org-services <Org-Name> vms status

Expected Result

  • Status should display Connected

  • If status shows Connected, VOS to VMS connectivity is up.

If status shows not connected, proceed to the next steps.


Step 2: Verify FQDN Resolution

Ensure the configured VMS FQDN resolves correctly from the appropriate routing instance:

ping <VMS-FQDN> routing-instance <Routing-Instance>

If resolution fails:

  • Verify DNS configuration

  • Confirm routing-instance reachability

  • Check address manager resolution:

vsh connect vsmd

show vsf tenant all brief | grep <your tenant>

<collect tenant ID from above output>

vsh connect addrmgr show address <Tenant ID>

Confirm:

  • Correct IP address

  • Resolved state


Step 3: Verify Network Reachability

3.1 ICMP Test

Get routing instance using following CLI on VOS:

ping <VMS-FQDN> routing-instance <Routing-Instance>


Or from director GUI:


Ping using routing instance found using above CLI or GUI:

ping <VMS-FQDN> routing-instance <Routing-Instance>

If ICMP is blocked, test TCP connectivity.


3.2 TCP Port Test (Port 1376)

From the relevant namespace:

sudo ip netns exec <Routing-Instance> bash

Then run:

while true; do echo "$(date) - Checking port 1376..." nc -zv -w 3 <VMS-FQDN> 1376 sleep 2 done

Expected Result

Connection to <VMS-FQDN> 1376 port [tcp/*] succeeded!

If unsuccessful, proceed to Controller validation.


Step 4: Validate Controller Path (If Traffic Traverses Controller)

If VMS connectivity is via Controller:

4.1 Check Session on Controller

  • Verify session exists between branch device and VMS IP on port 1376.

  • Use Monitor Dashboard or CLI 'show orgs org <org> sessions extensive | select destination-port 1376'



If session is not present:

  • Traffic is not reaching Controller.

If session exists:

  • Run tcpdump on egress interface toward VMS.

  • Confirm packets are leaving Controller.

4.2 Firewall Validation

If packets reach Controller but are not forwarded:

  • Check security policies.

  • Update Allow-From-CPE-Ports policy.

  • Add required VMS service (port 1376).




Step 5: Verify Packet Reception on VMS

On the VMS server:

  • Run tcpdump on the appropriate interface.

  • Confirm packets are received.

  • Validate reverse routing path back to branch device.


Step 6: Validate Certificates (Common Root Cause)

If network reachability is confirmed but VOS–VMS session does not establish, verify certificates.


6.1 Check Server Certificate on VMS

On VMS:

openssl x509 -in /opt/versa/vms/certs/server-cert.pem -text -noout

Verify:

  • Common Name (CN)

  • Subject Alternative Name (SAN)

Example:

Subject: CN = inline-vms1.versa-test.net X509v3 Subject Alternative Name: DNS:inline-vms1.versa-test.net DNS:inline-vms1-elastic.versa-test.net DNS:inline-vms2.versa-test.net

Important

The IP or FQDN used for connection must match either CN or SAN.


6.2 Verify CA Installed on VOS

On VOS:

show orgs org-services <Org-Name> crypto pki ca-chains <CA-Name>
show orgs org-services <Org-Name> crypto pki ca-chains <CA-Name> | match "Issuer CN"
show orgs org-services <Org-Name> crypto pki ca-chains <CA-Name> | match "Subject Alternative Name"

Confirm:

  • Issuer CN matches

  • SAN values (if applicable)


Resolution

If CN or SAN does not match:

  1. Regenerate the certificate with correct CN/SAN values.

  2. Install updated certificate on VMS.

  3. Install matching CA chain on VOS.

  4. Restart services if required.

  5. Re-validate connectivity.


Step 7: We can also check versa-service logs on VOS and get the issue why VOS-VMS connectivity is not up:

Need to check what is the error in VOS - /var/log/versa/versa-service.log.


7.1 i/o time out issues:

On VOS:

vMsClientServiceConnectThread:1372 Message Server connect failed(retrying) for token ClientAuth:mobility, error rpc error: code = Unavailable desc = connection error: desc = "transport: Error while dialing: dial tcp4 172.17.254.254:1376: i/o timeout"

Verify:

  • Reachability is there to VMS server over port 1376

  • If step 3.2 is successfulucessful, we should not be seeing this error.




7.2 Cert mismatch issues:

On VOS:

Unable to connect to the server: tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, vms-1,vms-1-elastic not vms-vos.versa.com

Verify:

  • SAN values for server cert in VMS
    (openssl x509 -in /opt/versa/vms/certs/server-cert.pem -noout -text)


7.3 FQDN not resolved issues:

On VOS:

ERROR [0x200] vmsctrl_init_grpc_to_vms_srvr_for_svc:340 Resolved IP not available for vms_prof 40 fqdn vms-vos.versa.com from tenant 1

Verify:

  • If Step 2 above does resolve to a valid IP address, this issue should not be seen in VMS



Successful log message after connection is up in Versa service logs:

vmsctrl_lef_vms_status_handler:84 tenant_id:1 vms_prof:VMS (41) : VmsServerStatus_t { isConnected: True }

cli status command:

admin@DC1-GW1-cli> show orgs org-services Versa vms status server VMS

Server profile name : VMS

IP Address          : n/a

FQDN                : vms-vos.versa.com

Port number         : 1376

  Service name : passive-authentication

  ----------------------------------------------------------------

    Session Details:

    -----------------

      gRPC Handle                        : 100001

      Creation Time                      : 2026-02-17, 16:31:22

      Number of disconnects              : 0

      Status                             : Connected

      Connect time                       : 2026-02-27, 14:12:42

      Number of reconnects               : n/a

      Last reconnect attempt time        : n/a

      Last reconnect status message      : VMSAPI_OK

      Previous connect time              : 2026-02-27, 14:09:50

      Disconnect time                    : 2026-02-27, 14:11:44

      Disconnect error message           : VMSAPI_ERR_UNKNOWN

      Last sequence number received      : 0

      VOS-VMS latency                    : 0 msec

      Timestamp of last received message : 0-12-31, 16:07:02

    Current Statistics:

    --------------------

      Messages received   : 0

      Messages dispatched : 0

      Messages dropped    : 0

      Messages published  : 0

      Publish errors      : 0

    Total Statistics:

    ------------------

      Messages received   : 0

      Messages dispatched : 0

      Messages dropped    : 0

      Messages published  : 0

      Publish errors      : 0

      Failovers detected  : 0




If none of the above help debug the VOS-VMS connectivity issue, please enable debug and contact Versa Support. Enable debug on VOS:

 set debug vms level all set debug vms all-flags set debug vmsctrl set debug vmsctrl level all set debug vmsctrl all-flags



Summary Checklist

✔ VMS status shows Connected
✔ FQDN resolves correctly
✔ Port 1376 reachable
✔ Controller not dropping traffic
✔ VMS receives and responds to packets
✔ CN/SAN matches connection FQDN
✔ Correct CA installed on VOS



Summary Checklist

Use this checklist to confirm all validation steps have been completed before closing the issue or escalating to Versa Support.

 

Checkpoint

Expected

Verified

VMS status shows

Connected

FQDN resolves correctly from routing instance

Pass

TCP Port 1376 reachable from VOS

Pass

Controller not dropping or blocking traffic

Pass

VMS receives packets and responds to packets

Pass

Certificate CN/SAN matches the connection FQDN

Pass

Correct CA chain installed on VOS

Pass

 

Need Additional Assistance?

If the issue persists after completing all steps in this guide, contact Versa Networks Technical Support with the following information:

  • Output of all CLI commands executed in this guide.
  • tcpdump packet captures from VOS, Controller, and VMS.
  • Certificate details (openssl output) from VMS.
  • VOS and VMS software versions.