AWS IPSec tunnel active/active HA with BGP

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

AWS IPSec tunnel active/active HA with BGP

L1 Bithead

Looking for some help here.  I have an ongoing case with support concerning AWS tunnel issues.  My production FWs are active/active but not in sync.  Just always been that way, it's the way I inherited it.  I have 4 tunnels to AWS (2 on each FW) BGP all works fine but if I reboot one FW when it comes back it blows up all the tunnels.  So support says I need to have the FWs in sync and then build them with a floating IP on each side and that will fix all my issues.  So in my lab I have the same setup, got the FWs in sync but the documentation to build this is pretty much nonexistent.  Support gave me a doc from 2011 which has about a page on the topic and doesn't mention dynamic routing at all.  

So my first question is anyone doing this?  

From there my questions are a bit more all over the place.  First the document says a tunnel interface on each device needs to be defined with a unique IP.  Do you add the /30 network AWS gives you for each side and then create a floating IP for the BGP peer in your VR?  I have tried to build this a few different ways and can't get it to work.  The best I have had was 2 of the 4 tunnels up and none of the BGP to come up.  Meanwhile the tunnels I build the other way are all still up so with BGP peers working (just don't reboot).  

With them in sync it is strange what gets synced and what doesn't and then what will break the sync and need to be forced or fixed to get them back in sync.  Do you build all this from one side and just change the priority of the floating IP to the other device if you want some of the tunnels to live on the other FW?  Do you replicated everything to the other FW if it doesn't get synched?  Sorry like I said I am all over the place at the end of a frustrating day.

Thanks for any help.

1 REPLY 1

L1 Bithead

hi jdemares

this is 3 years ago post but have you figured the way already?

I am using A/A configuration for our firewall as well.,

I guess the super mystery is that traditional single firewall+ concentrator, are everything you do in one box is okay for Active Active

as you mentioned you have 4 VPN tunnels - I assumed your company set up 2 "site-to-site VPN connections" on AWS, as 1 VPN connection in AWS, they actually created 2 VPN tunnels from difference AWS IP TO On-Prem single IP address End Point.

 

so assumed the situation like this you should setup 

Tunnel 1 - using floating IP bias on Device 0

Tunnel 2 - using floating IP bias on Device 0

Tunnel 3 - using floating IP bias on Device 1

Tunnel 4 - using floating IP bias on Device 1

as this is tunnel, it will sync both side
Then Tunnel 1,2 will IKE up on Device 0

Then Tunnel 3,4 will IKE up on Device 1
For the routing perspective, assuming you are using BGP, and you need to know the fact that Palo wont Sync the VR setting on both router
You may need to setup 4 pair on EACH firewall, so what ever of time you will have 2 BGP peer up on single firewall.

 

I hope that is the right answer what you and other people looking for

 

 

HELLO WORLD
  • 2259 Views
  • 1 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!