> when using vpn tu to delete IPSec SAs/IKE, it didn't recover.
Then there is a problem with the VPN configuration. To troubleshoot further , additional information is needed.
E.g. which Phase is failing?
what does "vpn tu list peer_ipsec <peer_IP>" show?
What do you see in tcpdump on the external interface of the firewall? tcpdump -nnni <ext_iface> host <peer_IP>
What do you see in the FW logs for the <peer_IP>?
What does "the other side" see in their logs?
Next step is to allow IKE debugging. Keep in mind, in R81.20 iked is multithreaded, so the IKE debug info can go into any of the /etc/fw/log/iked?.* file, and there is no corresponding ikeview utility anymore to conveniently "decipher" these files.