This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Can't use Link-Local IP as unicast route gateway

Just setup a VTI / route-based VPN with a customer who is using AWS VPC.  Unfortunately, AWS side is using a link-local address (169.254.x.x/30) for the tunnel interfaces.  I was able to assign the xfrm interface the needed IP, I can ping the aws side interface as well.  The issue is I went to go and add a route to the VPC, but the WebAdmin won't allow this as it's a link-local address. Seems a lot of firewalls use this address space for this, so what kind of testing was done with RBVPNs in v18?

I was able to add this route in the advanced console, and reach the needed server in AWS, but I understand these kernel routes won't persist reboots, so what now?  Any scripts that I can inject at boot to insert this route?


ip route add 10.0.0.1 via 169.254.111.205 proto zebra



This thread was automatically locked due to age.
Parents Reply Children
  • I appreciate the answer, but I guess I'm not following you when you say "interface routing", I see references in the article to BGP, so going to assume that's what you mean.  Unfortunately, I'm unable to use BGP because this customer's side is another one of their vendors and they are configured with static routing in AWS, and I believe it's hosting other customers so they won't change.

    I can do this with virtually any other firewall, so I don't get it.  Going to be a lot of work to replace ~75 XG firewalls in Azure with another vendor, but this on top of sub par support and numerous other limitations (some are top of list on https://ideas.sophos.com) is starting to weigh on our company and we are being pushed.

  • Try a static interface route. It should work. Instead of gateway, choose the XFRM. 

    __________________________________________________________________________________________________________________