Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
maiconp340
New Contributor

Two Dialup VPN actives

Hello,

On my Branch office I need stablish two active Dialup VPN with my HQ.

On my HQ I have two ISPs Internet links and at the my BR only one.

At the Fortigate on BR I have set Two Dialup client to ISP1 and ISP2 for HQ.

My problem is never two tunnels is UP at the same time, when one come up other to Down.

I wonder if is possible to keep active the two tunnels Dialup at the same time on client side.

 

follow the configuration on two box, version is 6.0.9. please disregard psk and peerid

 

#HQ VPN Dialup server Config config vpn ipsec phase1-interface edit "Dialup-MGT" set type dynamic set interface "INTERNET-MGT" set mode aggressive set peertype one set mode-cfg enable set proposal 3des-md5 aes128-md5 set dpd disable set nattraversal disable set peerid "c.c.c.c" set assign-ip disable set psksecret fffff next edit "Dialup-EQX" set type dynamic set interface "INTERNET-EQX" set local-gw t.t.t.t set mode aggressive set peertype one set mode-cfg enable set proposal 3des-md5 aes128-md5 set dpd disable set nattraversal disable set peerid "ffff" set assign-ip disable set psksecret next end

#HQ VPN Dialup server Config phase 2

config vpn ipsec phase2-interface edit "Dialup-ph2" set phase1name "Dialup-MGT" set proposal 3des-md5 aes128-md5 set src-addr-type name set dst-addr-type name set src-name "all" set dst-name "all" next edit "Dialup-ph2-eqx" set phase1name "Dialup-EQX" set proposal 3des-md5 aes128-md5 set src-addr-type name set dst-addr-type name set src-name "all" set dst-name "all" next end

#BR VPN Config phase 1

config vpn ipsec phase1-interface edit "Dialup-ctl" set interface "INTERNET" set local-gw x.x.x.x set mode aggressive set peertype any set mode-cfg enable set proposal 3des-md5 aes128-md5 set localid "h.h.h.h" set dpd disable set nattraversal disable set remote-gw y.y.y.y set assign-ip disable set psksecret hhhhh next edit "Dialup-eqx" set interface "INTERNET" set mode aggressive set peertype any set mode-cfg enable set proposal 3des-md5 aes128-md5 set localid "g.g.g.g" set dpd disable set nattraversal disable set remote-gw t.t.t.t (DIFFERENT FROM Dialup-ctl ) set assign-ip disable set psksecret bbbbb next end

 

#BR VPN CONFIG PHASE2

config vpn ipsec phase2-interface edit "dialup-ph2-ctl" set phase1name "Dialup-ctl" set proposal 3des-md5 aes128-md5 next edit "dialup-ph2-eqx" set phase1name "Dialup-eqx" set proposal 3des-md5 aes128-md5 next end

 

1 Solution
Toshi_Esumi
SuperUser
SuperUser

What is your goal with those two parallel VPNs? Failover or load-balance?

The direct problem is you're trying to bring up two [network selectors: 0/0<->0/0] IPsec vpns. It's not allowed (or possible) without  "set add-route disable" in phase1 config. That's it would be dropped when the second tunnel comes up.

Depending on the goal and the version of FortiOS, how to accomplish routing through two (or one at a time) would be different in addition to "net-device enable/disable" setting with phase1-int config.

View solution in original post

8 REPLIES 8
Toshi_Esumi
SuperUser
SuperUser

What is your goal with those two parallel VPNs? Failover or load-balance?

The direct problem is you're trying to bring up two [network selectors: 0/0<->0/0] IPsec vpns. It's not allowed (or possible) without  "set add-route disable" in phase1 config. That's it would be dropped when the second tunnel comes up.

Depending on the goal and the version of FortiOS, how to accomplish routing through two (or one at a time) would be different in addition to "net-device enable/disable" setting with phase1-int config.

maiconp340

Hello, my goal is load balance with SD-WAN, after that two VPNs Dialup come up at the same time they go are under SD-WAN Interface so Fortigate will do load balance Traffic regard SLA.

maybe you wonder yourself why I don´t use Site-to-Site IPsec, it´s the issue, I can´t because I have 140 Branch with 3 Links each so I overcome interfaces member under SD-WAN ( 256 is the limit ) and my target is load balance with SD-WAN.

I will do more some test and report here.

 

Thanks, with you have any other idea or doc about SD-WAN with Dialup VPN please post here.

 

 

Toshi_Esumi

SD-WAN shouldn't care the type of circuits in the members (at least its design). If you are running 6.2.x, "IPsec aggregate" is the easiest load-balancing method between two tunnels. Still need to bring up two tunnels though.

maiconp340

Hello,

I did some test trying come up two Dialup tunnel as explained before.

After some changes on my configurations now it´s possible to connect two Dialup at the same time.

But when one come down my BGP routing stop and the failover doesen´t work.

 

My target is overcome the sd-wan limit from 256 interfaces, so I´m trying figure out with Dialup VPNs.

On my real environment I Have 140 Spoke each one with 4 tunnels VPNs to hub so I need overcome this limit interface under sd-wan on hub, this my issue, I should like use sd-wan on all spoke as well as on my Hub. I´m think use Dialup to overcome this limit but with you have other idea please post here.

 

in attached there is a image from my environment test and follow the main configurations on hub and spoke.

 

Please ,again, with you have other idea to overcome of the limit members interface under sd-wan post here.

 

#VPN DIALUP CONFIGURATION HUB SIDE

 

config vpn ipsec phase1-interface edit "DialEQX" set type dynamic set interface "INTERNET-EQX" set peertype any set net-device disable set exchange-interface-ip enable set proposal 3des-md5 aes128-md5 set add-route disable set dpd on-idle set tunnel-search nexthop set psksecret ccccccc set dpd-retrycount 2 set dpd-retryinterval 2 next edit "DialMGT" set type dynamic set interface "INTERNET-MGT" set peertype any set net-device disable set exchange-interface-ip enable set proposal 3des-md5 aes128-md5 set add-route disable set dpd on-idle set tunnel-search nexthop set psksecret ddddddd set dpd-retrycount 2 set dpd-retryinterval 2 next end

#PHASE2 INTERFACE ON HUB

config vpn ipsec phase2-interface edit "Dialph2Eqx" set phase1name "DialEQX" set proposal 3des-md5 aes128-md5 next edit "Dialph2Mgt" set phase1name "DialMGT" set proposal 3des-md5 aes128-md5 next end

#STATIC ROUTER ON HUB FOR ACHIEVE SPOKE SIDE BY DIALUP INTERFACES edit 12 set dst 10.231.0.1 255.255.255.255 set device "DialEQX" next edit 13 set dst 10.231.2.1 255.255.255.255 set device "DialMGT" next

# INTERFACE DIAL UP ON HUB SIDE, SET IP ADDRESS

edit "DialEQX" set vdom "root" set ip 10.231.0.254 255.255.255.255 set allowaccess ping set type tunnel set remote-ip 10.231.0.1 255.255.254.0 set snmp-index 38 set interface "INTERNET-EQX" next edit "DialMGT" set vdom "root" set ip 10.231.2.254 255.255.255.255 set allowaccess ping set type tunnel set remote-ip 10.231.2.1 255.255.254.0 set snmp-index 39 set interface "INTERNET-MGT" next

# BGP ON HUB SIDE

config router bgp set as 64500 set router-id 10.100.100.1 set keepalive-timer 5 set holdtime-timer 15 set ibgp-multipath enable set graceful-restart enable config neighbor-group edit "VPN-PEERS" set soft-reconfiguration enable set remote-as 64500 set route-map-in "Set-Ingress-Route-Tag" set route-map-out "Set-Main-Site-Community" set keep-alive-timer 5 set holdtime-timer 15 set route-reflector-client enable next end config neighbor-range edit 1 set prefix 10.231.0.0 255.255.0.0 set neighbor-group "VPN-PEERS" next end config network edit 1 set prefix 10.255.1.0 255.255.255.240 next edit 2 set prefix 10.2.0.0 255.255.0.0 next edit 3 set prefix 10.4.0.0 255.255.0.0 next edit 4 set prefix 192.168.99.0 255.255.255.0 next end config redistribute "connected" end config redistribute "rip" end config redistribute "ospf" end config redistribute "static" end config redistribute "isis" end config redistribute6 "connected" end config redistribute6 "rip" end config redistribute6 "ospf" end config redistribute6 "static" end config redistribute6 "isis" end end

#VPN PHASE1 FROM SPOKE SIDE

config vpn ipsec phase1-interface edit "Dialeqx" set interface "INTERNET" set local-gw Spoke-isp1_ip_x set peertype any set exchange-interface-ip enable set proposal 3des-md5 aes128-md5 set dpd on-idle set nattraversal disable set remote-gw INTERNET-EQX set psksecret XXXXXX set dpd-retrycount 2 next edit "Dialmgt" set interface "INTERNET" set peertype any set exchange-interface-ip enable set proposal 3des-md5 aes128-md5 set dpd on-idle set nattraversal disable set remote-gw INTERNET-MGT set psksecret xxxxxxxx next end

# PHASE2 SPOKE SIDE

config vpn ipsec phase2-interface edit "Dialph2eqx" set phase1name "Dialeqx" set proposal 3des-md5 aes128-md5 set auto-negotiate enable next edit "Dialph2mgt" set phase1name "Dialmgt" set proposal 3des-md5 aes128-md5 set auto-negotiate enable next end

##INTERFACES DIALUP ON SPOKE SIDE, SET IP

edit "Dialeqx" set vdom "root" set ip 10.231.0.1 255.255.255.255 set allowaccess ping set type tunnel set remote-ip 10.231.0.254 255.255.254.0 set role wan set snmp-index 34 set interface "INTERNET" next edit "Dialmgt" set vdom "root" set ip 10.231.2.1 255.255.255.255 set allowaccess ping set type tunnel set remote-ip 10.231.2.254 255.255.254.0 set role wan set snmp-index 35 set interface "INTERNET" next end

#STATIC ROUTER ON SPOKE FOR ACHIEVE HUB SIDE BY DIALUP INTERFACES edit 153 set dst 10.231.0.254 255.255.255.255 set device "Dialeqx" next edit 155 set dst 10.231.2.254 255.255.255.255 set device "Dialmgt"

# BGP ON SPOKE SIDE

config router bgp set as 64500 set router-id 10.1.1.1 set keepalive-timer 5 set holdtime-timer 15 set ibgp-multipath enable set graceful-restart enable config neighbor edit "10.231.0.254" set soft-reconfiguration enable set remote-as 64500 set route-map-in "Set-Ingress-Route-Tag" set route-map-out "Bad-Connection" next edit "10.231.2.254" set soft-reconfiguration enable set remote-as 64500 set route-map-in "Set-Ingress-Route-Tag" set route-map-out "Bad-Connection" next end config network edit 1 set prefix 10.11.0.0 255.255.254.0 next end config redistribute "connected" end config redistribute "rip" end config redistribute "ospf" end config redistribute "static" end config redistribute "isis" end config redistribute6 "connected" end config redistribute6 "rip" end config redistribute6 "ospf" end config redistribute6 "static" end config redistribute6 "isis" end end

 

 

 

 

Toshi_Esumi

6.2.x improved SD-WAN as well as bug fixes. But still some issues reported on the forum. So I know you want to stay with 6.0.9. I wasn't aware that the "max members" in SD-WAN were 256.

I would wait until 6.2.4 comes out then at that time consider upgrading all of them after a small scale test. Then use IPsec aggregate to bind multiple IPsecs per remote location. That would eliminate the necessity you have now for both SD-WAN and BGP per location for this particular purpose.

 

For the current BGP set up, you seem to be using iBGP for all remote (ASN=64500). If you do that, remote A's routes are not advertised into remote B via HUB. But again, all this complex wouldn't be necessary with IPsec aggregate. BGP would be useful in case you have multiple HUBs or additional remote-to-remote VPNs to get to HUB and fail it over. By nature BGP doesn't have "tie", and always pick the best route. I'm not sure if it applies to Fortinet's BGP implementation. But to load balance, OSFP or something else would be necessary.

 

 

 

maiconp340

Hello, member aggregation it´s not supported with Dialup VPN

 

https://docs.fortinet.com/document/fortigate/6.2.0/cookbook/625774/per-packet-distribution-and-tunne...

 

I think ospf it´s supported for sd-wan on 6.2 version. 

Toshi_Esumi

I don't understand the reasoning "...tend to have different locations and hence different routing." Are you kidding? If they're terminated by the same FGT on both ends, it shouldn't be a problem. You might want to open a case with TAC to clarify why it's not allowed with dialup/dynamic vpns.

maiconp340

thank you Toshi for yours repley.

yes I have only a FGT100F on my DC ( which is the Hub ) and many ( 140 FGT 60D/E ) spread on my country which are the spokes. 

Currently I´m doing test with sd-wan on test environment so after I will apply on production environment.

 

 

 

  

Labels
Top Kudoed Authors