XG115W - v20.0.2 MR-2 - Home
XG on VM 8 - v21 GA
If a post solves your question please use the 'Verify Answer' button.
Cleight, the only virus I've gotten in over ten years was when I clicked on an infected picture file here in the User BB six years ago. [:O] The best way to attach pictures here is to click on [Go Advanced].
Based on your description, I would use Static Routing, Uplink Balancing with Multipathing, Uplink Monitoring and an IPsec VPN.
For example, in the Primary site:
Except for the last two steps, do the complementary config on the other side. Note that there are thus three different VPN tunnels created; one lets Primary get to the world via the Secondary's WAN connection, another lets Secondary get to the world via the Primary's WAN connection and the third allows the two sites to communicate with each other if the PTP is down. Any luck with that?
Cheers - Bob
Cleight, the only virus I've gotten in over ten years was when I clicked on an infected picture file here in the User BB six years ago. [:O] The best way to attach pictures here is to click on [Go Advanced].
Based on your description, I would use Static Routing, Uplink Balancing with Multipathing, Uplink Monitoring and an IPsec VPN.
For example, in the Primary site:Gateway Route {192.168.1.0/24} -> 10.10.10.3
- Firewall rule: Allow : {192.168.0.0/22} -> Any -> Any
- Activate Uplink Balancing with PTP WAN and External WAN
- Add 10.10.10.3 as Default gateway to the PTP WAN interface
- Create a Multipath Rule: {192.168.2.0/24} -> Any -> Internet : Bind to External WAN interface
- Create an IPsec VPN : 192.168.2.0/24=10.10.10.110.10.10.3=Internet and do not enable it
- Set Uplink Monitoring to enable the VPN if the ISP is down
Do the complementary config on the other side. Note that there are thus two different VPN tunnels created; one lets Primary get to the world via the Secondary's WAN connection and the other lets Secondary get to the world via the Primary's WAN connection. Any luck with that?
Cheers - Bob
Thanks - no apology required! [:)]
Your last post and the picture confuse me as it looks like you intend to have two, active paths to the same subnets. That will cause routing problems. I also don't understand what an existing IPsec tunnel might o.
The approach recommended above sends traffic between the two sites over the PTP if it's up. If it's down, an IPsec tunnel is enabled between the two sites. Traffic to the Internet from each LAN goes out its local ISP connection. If the ISP connection is down, the traffic goes through the PTP to the other site and out via its ISP. Isn't that your goal?
Cheers - Bob
Interface: PTP
Local networks: {LAN at this site}
"Initiate Connection"
Remote networks: Any
Cheers - Bob
Bob,
I'm attempting basically the same thing, however, I'm experiencing issues with the ISP failover VPNs over the PTP interface. They say Error: No connection and I notice the VPN ID's are different on each connection
Also, with uplink monitoring, how do you differentiate between the ISP connection and the PTP connection going down. How do you specify that the UTM needs to enable the Site to Site VPN over the internet connection, or the one over the PTP to redirect internet traffic?
I'm running UTM 9.403-4
Thanks,
JR