top of page

SD-WAN Dual Hub (Policy routing with ADVPN over BGP)


ree

Hoy vamos a tratar la tecnología de SD-WAN, llevamos un tiempo conviviendo con esta terminología, SD-WAN se traduce como Software-Defined Wide Area Networt , es decir, la gestión y monitorización por software de redes WAN pero una forma sencilla y ágil, sin la intervención del operador. Hay diferentes fabricantes que están implantando esta tecnología, unos tienen ventajas como una implementación muy sencilla en dispositivos específicos pero sin ofrecer servicios de seguridad, nosotros vamos a tratar sobre el el SD-WAN de Fortinet, las ventajas del mismo es que todos sus Fortigates soportan está tecnología por defecto y como dispositivo NGFW en la misma caja, ya tenemos la seguridad para analizar el tráfico que esta pasando por el mismo, además de ser uno de los pocos fabricantes que ha desarrollado un ASIC especifico para SD-WAN en algunos de sus modelos. Podemos meter dentro del SD-WAN todo tipo de interfaces: FTTH, MPLS, 5G, Satélite, etc y aunque no es obligatorio, sí que es conveniente meter más de un enlace dentro de nuestro SD-WAN con diferentes proveedores o por lo menos con diferentes tecnologías.


Como he comentado anteriormente se puede meter dentro del SD-WAN conexiones MPLS, se habla mucho como una de las principales ventajas del SD-WAN es la reducción de costes. Las MPLS nacionales/locales no son conexiones caras y te ofrecen otra serie ventanas sobre las lineas normales de internet, simplicidad, aislamientoo, qos, etc ..no ocurre lo mismo con las MPLSs internacionales, este tipo de conexiones son caras y tiene más sentido sustituirlas por conexiones a Internet más económicas con operadores locales e implantar sobre las mismas SD-WAN.


Fortigate soporta que los spokes estén detrás de un NAT mediante la técnica de UDP Hole punching. En el caso de que el HUB este detrás de un NAT hay que abrir los puertos necesarios en el dispositivo que hace NAT(DNAT) para establecer la VPN.


Implantando SD-WAN podemos encaminar el tráfico WAN y VPN por diferentes enlaces no solo mediante reglas de ip origen, destino y puerto, sino también por grupo de usuarios, aplicación o por servicio de internet. Además podemos generar unos chequeos para saber cuando uno de los interfaces deja de cursar tráfico y poder encaminar el tráfico por otro interfaz e incluso aplicar SLAs al tráfico para en caso de que el interfaz deje de cumplirlos no curse el tráfico por este y automáticamente conmute el tráfico por otro interfaz de que si lo cumpla.


Hay varias algoritmos disponibles para poder decidir a través de que interfaz sacamos el tráfico, ejemplos son de forma manual, por menor coste del interfaz, mejor calidad del interfaz o cumplimiento del SLAs de los interfaces.


La implantación de SD-WAN en Fortigate se basa en 3 funcionalidades:

	- SD-WAN (Policy Routing)
	- ADVPN 
	- BGP

Hay varias formas de implantar este esquema:

	- Single HUB 
	- Dual HUB 
	- Dual Region

Una anexo dentro de los diferentes esquemas sería el caso en el que el HUB también se implemente SD-WAN


Nosotros trataremos en este blog en esquema de Dual HUB por ser el esquema que ofrece mayor redundancia, en otro blog posterior trataremos el caso de Dual Región, en el cual dos regiones independientes se unen para dar acceso a los spokes de diferentes regiones.




ree




No vamos a detallar toda la configuración solo de aquellas partes que incluyen el SD-WAN, el ADVPN y el BGP.


- HUB1 con SDWAN


El HUB1 es un hub con 2 enlaces que usa SD-WAN, podría ser un en vez de un CPD la sede central donde además de albergar los servidores la sede funciona para salida a Internet.


- INTERFACES

config system interface
    edit "wan1"
        set vdom "root"
        set ip 12.81.206.194 255.255.255.252
        set allowaccess ping https ssh   
        set alias "wan1"
        set type physical
        set role wan
    next
    edit "wan2"
        set vdom "root"
        set ip 12.81.182.98 255.255.255.252
        set allowaccess ping https ssh 
        set type physical
        set alias "wan2"
        set role wan
    next
    edit "port5"
        set vdom "root"
        set ip 10.254.254.1 255.255.255.0
        set allowaccess ping https ssh 
        set type physical
        set role lan
    next
    edit "Gestion"
        set vdom "root"
        set ip 172.17.1.1 255.255.255.255
        set allowaccess ping
        set type loopback
        set role lan
    next
    edit "OL_INET2"
        set vdom "root"
        set ip 10.200.21.10 255.255.255.255
        set allowaccess ping
        set bfd enable
        set type tunnel
        set remote-ip 10.200.21.253 255.255.255.0
        set interface "wan2"
    next
    edit "OL_INET1"
        set vdom "root"
        set ip 10.200.11.10 255.255.255.255
        set allowaccess ping
        set bfd enable
        set type tunnel
        set remote-ip 10.200.11.253 255.255.255.0
        set interface "wan1"
    next
    edit "port1"
        set vdom "root"
        set ip 10.250.250.2 255.255.255.0
        set allowaccess ping https ssh
        set type physical
        set vrrp-virtual-mac enable
        config vrrp
            edit 1
                set vrip 10.250.250.1
                set priority 200
                set vrdst 8.8.8.8
                set vrdst-priority 50
            next
        end
    next
end


- ROUTES


Podemos generar una sola ruta estática por el interface SD--WAN, pero en nuestro caso no vamos a usar los interfaces de VPNS para sacar trafico a Internet. Por lo que para simplificar el rutado generamos 2 rutas por defecto con el mismo peso por cada uno de los enlaces WAN.

config router static
    edit 1
        set gateway 12.81.206.193
        set device "wan1"
    next
    edit 2
        set gateway 12.81.182.97
        set device "wan2"
    next
    edit 3
        set dst 192.168.0.0 255.255.0.0
        set distance 255
        set blackhole enable
    next
    edit 5
        set dst 172.17.1.0 255.255.255.0
        set distance 255
        set blackhole enable
    next
end

- POLICY ROUTING


config router policy
    edit 4
        set dst "172.17.1.0/255.255.255.0"
        set action deny
        set status enable
    next
    edit 1
        set input-device "OL_INET1"
        set output-device "OL_INET1"
    next
    edit 2
        set input-device "OL_INET2"
        set output-device "OL_INET2"
    next
end

- SD-WAN


Hemos creado 2 zonas dentro del SD-WAN, la zona Underline se utiliza para los enlaces con salida a Internet, mientras que la zona Overline se usa para los enlaces de VPN, tanto para llegar a los Hubs coma los spokes.


config system sdwan
    set status enable
    config zone
        edit "virtual-wan-link"
        next
        edit "Overline"
        next
        edit "Underline"
        next
    end
    config members
        edit 2
            set interface "wan2"
            set zone "Underline"
            set gateway 12.81.182.97
        next
        edit 1
            set interface "wan1"
            set zone "Underline"
            set gateway 12.81.206.193
        next
        edit 3
            set interface "OL_INET1"
            set zone "Overline"
        next
        edit 4
            set interface "OL_INET2"
            set zone "Overline"
        next
    end
    config health-check
        edit "HealthCheckWAN"
            set server "8.8.8.8"
            set members 1 2
        next
        edit "HealthCheckSpoke1"
            set server "172.17.1.2"
            set members 3 4
        next
        edit "HealthCheckSpoke2"
            set server "172.17.1.3"
            set members 3 4
        next
    end
    config service
        edit 3
            set name "VPN"
            set dst "Red Spoke"
            set src "all"
            set priority-members 4 3
        next
        edit 2
            set name "App"
            set mode priority
            set src "all"
            set internet-service enable
            set internet-service-app-ctrl 15832 34527 28057
            set health-check "HealthCheckWAN"
            set priority-members 2 1
            set status disable
        next
        edit 4
            set name "clone_App"
            set mode priority
            set src "all"
            set internet-service enable
            set internet-service-app-ctrl 16554 17534 15817 16170 38726 41703 41694
            set health-check "HealthCheckWAN"
            set priority-members 2 1
            set status disable
        next
        edit 1
            set name "Default"
            set dst "all"
            set src "all"
            set priority-members 1 2
        next
    end
end

- ADVPN


Cómo se puede ver en el diagrama se genera 2 VPNs dinámicas IKEv2 por cada uno de los enlaces WAN que tenemos en el hub. Los Spokes con 2 interfaces WAN generaran una VPN contra los 2 enlaces WAN del HUB respectivamente.


config vpn ipsec phase1-interface
    edit "OL_INET2"
        set type dynamic
        set interface "wan2"
        set ike-version 2
        set keylife 28800
        set peertype any
        set net-device disable
        set mode-cfg enable
        set proposal aes256-sha256 aes256gcm-prfsha384
        set add-route disable
        set dpd on-idle
        set auto-discovery-sender enable
        set network-overlay enable
        set network-id 21
        set tunnel-search nexthop
        set ipv4-start-ip 10.200.21.1
        set ipv4-end-ip 10.200.21.253
        set ipv4-netmask 255.255.255.0
        set psksecret CLAVE
        set dpd-retrycount 2
        set dpd-retryinterval 10
    next
    edit "OL_INET1"
        set type dynamic
        set interface "wan1"
        set ike-version 2
        set keylife 28800
        set peertype any
        set net-device disable
        set mode-cfg enable
        set proposal aes256-sha256 aes256gcm-prfsha384
        set add-route disable
        set dpd on-idle
        set auto-discovery-sender enable
        set network-overlay enable
        set network-id 11
        set tunnel-search nexthop
        set ipv4-start-ip 10.200.11.1
        set ipv4-end-ip 10.200.11.253
        set ipv4-netmask 255.255.255.0
        set psksecret  CLAVE
        set dpd-retrycount 2
        set dpd-retryinterval 10
    next
end
config vpn ipsec phase2-interface
    edit "OL_INET1"
        set phase1name "OL_INET1"
        set proposal aes256-sha256 aes256gcm
        set keepalive enable
        set keylifeseconds 1800
    next
    edit "OL_INET2"
        set phase1name "OL_INET2"
        set proposal aes256-sha256 aes256gcm
        set keepalive enable
        set keylifeseconds 1800
    next
end

- BGP


Usamos BGP para intercambios los prefijos entre los hubs y los spokes. Los hubs funcionan como reflectores de rutas de los spokes. Generamos route-maps para que el tráfico de VPN de cada OL_INET, es decir del OL_INET1 vaya por el OL_INET1 y el tráfico del OL_INET2 vaya por el OL_INET2, así evitamos el tráfico asimétrico.


- PREFIX

config router prefix-list
    edit "NH_INET1"
        config rule
            edit 1
                set prefix 10.200.11.0 255.255.255.0
                unset ge
                set le 32
            next
        end
    next
    edit "NH_LOCAL"
        config rule
            edit 1
                set prefix 0.0.0.0 255.255.255.255
                unset ge
                unset le
            next
        end
    next
    edit "NH_INET2"
        config rule
            edit 1
                set prefix 10.200.21.0 255.255.255.0
                unset ge
                set le 32
            next
        end
    next
end

- ROUTE-MAP

config router route-map
    edit "INET1_OUT"
        config rule
            edit 1
                set match-ip-nexthop "NH_INET1"
            next
            edit 2
                set match-ip-nexthop "NH_LOCAL"
            next
            edit 100
                set action deny
            next
        end
    next
    edit "INET2_OUT"
        config rule
            edit 1
                set match-ip-nexthop "NH_INET2"
         next
            edit 2
                set match-ip-nexthop "NH_LOCAL"
         next
            edit 100
                set action deny
          next
        end
    next
end

- BGP PEERs

config router bgp
    set as 65000
    set router-id 10.254.254.1
    set keepalive-timer 5
    set holdtime-timer 15
    set ibgp-multipath enable
    set additional-path enable
    set scan-time 20
    config neighbor-group
        edit "OL_INET1"
            set advertisement-interval 1
            set bfd enable
            set soft-reconfiguration enable
            set interface "OL_INET1"
            set remote-as 65000
            set route-map-out "INET1_OUT"
            set additional-path send
            set route-reflector-client enable
        next
        edit "OL_INET2"
            set advertisement-interval 1
            set bfd enable
            set soft-reconfiguration enable
            set interface "OL_INET2"
            set remote-as 65000
            set route-map-out "INET1_OUT"
            set additional-path send
            set route-reflector-client enable
        next
    end
    config neighbor-range
        edit 1
            set prefix 10.200.11.0 255.255.255.0
            set neighbor-group "OL_INET1"
        next
        edit 2
            set prefix 10.200.21.0 255.255.255.0
            set neighbor-group "OL_INET2"
        next
    end
    config network
        edit 1
            set prefix 10.254.254.0 255.255.255.0
        next
        edit 2
            set prefix 10.250.250.0 255.255.255.0
        next
        edit 3
            set prefix 172.17.1.1 255.255.255.255
        next
    end
end


- POLICIES


Tenemos que generar las políticas para permitir el tráfico entre las diferentes zonas, generamos las políticas para acceso desde los Overline(spokes) a la lan del hub, así como el acceso a la ip de gestión que la usamos como healthcheck. Además generamos una política para que los spokes puedan acceder entre ellos, este tipo de acceso se denominan shortcuts y son vpns al vuelo, cuando se genera tráfico entre los spokes se genera una vpn directa entre los spokes sin pasar por el hub.

config firewall policy
    edit 5
        set srcintf "Overline"
        set dstintf "Overline"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set logtraffic all
    next
    edit 6
        set srcintf "Overline"
        set dstintf "Gestion"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set logtraffic all
    next
    edit 7
        set srcintf "Gestion"
        set dstintf "Overline"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set logtraffic all
    next
    edit 1
        set srcintf "port5"
        set dstintf "Overline"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set logtraffic all
    next
    edit 3
	set name  "Internet"
        set srcintf "port5"
        set dstintf "Underline"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set logtraffic all
        set nat enable
    next
    edit 4
        set srcintf "Overline"
        set dstintf "port5"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set logtraffic all
    next
    edit 8
        set srcintf "Overline"
        set dstintf "port1"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
    next
end


- HUB2 sin SDWAN


- INTERFACES


config system interface
    edit "wan1"
        set vdom "root"
        set ip 12.81.221.166 255.255.255.252
        set allowaccess ping https ssh
        set type physical
    next
   edit "port5"
        set vdom "root"
        set ip 10.254.253.1 255.255.255.0
        set allowaccess ping https ssh 
        set type switch
        set role lan
    next
    edit "OL_INET1"
        set vdom "root"
        set ip 10.200.12.10 255.255.255.255
        set allowaccess ping
        set type tunnel
        set remote-ip 10.200.12.253 255.255.255.0
        set interface "wan1"
    next
    edit "Gestion-Hub2"
        set vdom "root"
        set ip 172.17.1.100 255.255.255.255
        set allowaccess ping
        set type loopback
        set role lan
    next
    edit "OL_INET2"
        set vdom "root"
        set ip 10.200.22.10 255.255.255.255
        set allowaccess ping
        set type tunnel
        set remote-ip 10.200.22.253 255.255.255.0
        set interface "wan1"
    next
    edit "port1"
        set vdom "root"
        set ip 10.250.250.3 255.255.255.0
        set allowaccess ping https ssh 
        set type physical
        set vrrp-virtual-mac enable
        config vrrp
            edit 1
                set vrip 10.250.250.1
                set vrdst 8.8.8.8
                set vrdst-priority 30
            next
        end
    next
end

- ROUTE



config router static
    edit 1
        set gateway 12.81.221.165
        set device "wan1"
    next
    edit 2
        set dst 192.168.0.0 255.255.0.0
        set distance 255
        set blackhole enable
    next
    edit 3
        set dst 172.17.0.0 255.255.0.0
        set distance 255
        set blackhole enable
    next
end

- ZONE



config system zone
    edit "Spokes"
        set interface "OL_INET2" "OL_INET1"
    next
end

- ADVPN

config vpn ipsec phase1-interface
    edit "OL_INET1"
        set type dynamic
        set interface "wan1"
        set ike-version 2
        set keylife 28800
        set peertype any
        set net-device disable
        set mode-cfg enable
        set proposal aes256-sha256 aes256gcm-prfsha384
        set add-route disable
        set dpd on-idle
        set auto-discovery-sender enable
        set network-overlay enable
        set network-id 12
        set tunnel-search nexthop
        set ipv4-start-ip 10.200.12.1
        set ipv4-end-ip 10.200.12.253
        set ipv4-netmask 255.255.255.0
        set psksecret CLAVE
        set dpd-retrycount 2
        set dpd-retryinterval 10
    next
    edit "OL_INET2"
        set type dynamic
        set interface "wan1"
        set ike-version 2
        set keylife 28800
        set peertype any
        set net-device disable
        set mode-cfg enable
        set proposal aes256-sha256 aes256gcm-prfsha384
        set add-route disable
        set dpd on-idle
        set auto-discovery-sender enable
        set network-overlay enable
        set network-id 22
        set tunnel-search nexthop
        set ipv4-start-ip 10.200.22.1
        set ipv4-end-ip 10.200.22.253
        set ipv4-netmask 255.255.255.0
        set psksecret CLAVE
        set dpd-retrycount 2
        set dpd-retryinterval 10
    next
end
config vpn ipsec phase2-interface
    edit "OL_INET1"
        set phase1name "OL_INET1"
        set proposal aes256-sha256 aes256gcm
        set keepalive enable
        set keylifeseconds 1800
    next
    edit "OL_INET2"
        set phase1name "OL_INET2"
        set proposal aes256-sha256 aes256gcm
        set keepalive enable
        set keylifeseconds 1800
    next
end

- BGP


- PREFIX

config router prefix-list
    edit "NH_INET1"
        config rule
            edit 1
                set prefix 10.200.12.0 255.255.255.0
                unset ge
                set le 32
            next
        end
    next
    edit "NH_LOCAL"
        config rule
            edit 1
                set prefix 0.0.0.0 255.255.255.255
                unset ge
                unset le
            next
        end
    next
    edit "NH_INET2"
        config rule
            edit 1
                set prefix 10.200.22.0 255.255.255.0
                unset ge
                set le 32
            next
        end
    next
end

- ROUTE-MAP

config router route-map
    edit "INET1_OUT"
        config rule
            edit 1
                set match-ip-nexthop "NH_INET1"
            next
            edit 2
                set match-ip-nexthop "NH_LOCAL"
            next
            edit 100
                set action deny
            next
        end
    next
    edit "INET2_OUT"
        config rule
            edit 1
                set match-ip-nexthop "NH_INET2"
         next
            edit 2
                set match-ip-nexthop "NH_LOCAL"
         next
            edit 100
                set action deny
          next
        end
    next
end

- PEER



config router bgp
    set as 65000
    set router-id 10.254.253.1
    set keepalive-timer 5
    set holdtime-timer 15
    set ibgp-multipath enable
    set additional-path enable
    set scan-time 20
    config neighbor-group
        edit "OL_INET1"
            set advertisement-interval 1
            set bfd enable
            set soft-reconfiguration enable
            set interface "OL_INET1"
            set remote-as 65000
            set route-map-out "INET1_OUT"
            set additional-path send
            set route-reflector-client enable
        next
        edit "OL_INET2"
            set advertisement-interval 1
            set bfd enable
            set soft-reconfiguration enable
            set interface "OL_INET2"
            set remote-as 65000
            set route-map-out "INET2_OUT"
            set additional-path send
            set route-reflector-client enable
        next
    end
    config neighbor-range
        edit 1
            set prefix 10.200.12.0 255.255.255.0
            set neighbor-group "OL_INET1"
        next
        edit 2
            set prefix 10.200.22.0 255.255.255.0
            set neighbor-group "OL_INET2"
        next
    end
    config network
        edit 1
            set prefix 10.254.253.0 255.255.255.0
        next
        edit 2
            set prefix 10.250.250.0 255.255.255.0
        next
        edit 3
	    set prefix 172.17.1.100 255.255.255.255
        next
    end
end

- POLICIES



config firewall policy
    edit 1
        set name "Internet"
        set srcintf "port5"
        set dstintf "wan1"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set nat enable
    next
    edit 2
        set srcintf "port5"
        set dstintf "Spokes"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
    next
    edit 3
        set srcintf "Spokes"
        set dstintf "port5"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
    next
    edit 5
        set srcintf "Spokes"
        set dstintf "Gestion-Hub2"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
    next
    edit 6
        set srcintf "Spokes"
        set dstintf "Spokes"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
    next
    edit 7
        set srcintf "Spokes"
        set dstintf "port1"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
    next
end

- SPOKE2


- INTERFACES


config system interface
    edit "wan1"
        set vdom "root"
        set ip 12.81.177.34 255.255.255.252
        set allowaccess ping https ssh
        set type physical
        set role wan
    next
    edit "wan2"
        set vdom "root"
        set ip 12.81.177.38 255.255.255.252
        set allowaccess ping https ssh
        set type physical
        set role wan
    next
    edit "lan"
        set vdom "root"
        set ip 192.168.11.99 255.255.255.0
        set allowaccess ping https ssh 
        set type hard-switch
        set stp enable
        set role lan
	next
    edit "Gestion"
        set vdom "root"
        set ip 172.17.1.4 255.255.255.255
        set allowaccess ping
        set type loopback
    next
    edit "OL_INET1_2"
        set vdom "root"
        set allowaccess ping
        set bfd enable
        set type tunnel
        set interface "wan2"
    next
    edit "OL_INET1_1"
        set vdom "root"
        set allowaccess ping
        set bfd enable
        set type tunnel
        set interface "wan1"
    next
    edit "OL_INET1_2"
        set vdom "root"
        set allowaccess ping
        set bfd enable
        set type tunnel
        set interface "wan1"
    next
    edit "OL_INET2_2"
        set vdom "root"
        set allowaccess ping
        set bfd enable
        set type tunnel
        set interface "wan2"
    next
end

- ROUTE


config router static
    edit 1
        set gateway 12.81.177.33
        set device "wan1"
    next
    edit 2
        set gateway 12.81.177.37
        set device "wan2"
    next
    edit 3
        set dst 172.17.1.0 255.255.255.0
        set distance 255
        set blackhole enable
    next
    edit 4
        set dst 10.254.254.0 255.255.255.0
        set distance 255
        set blackhole enable
    next
    edit 6
        set dst 192.168.0.0 255.255.0.0
        set distance 255
        set blackhole enable
    next
    edit 7
        set dst 10.254.253.0 255.255.255.0
        set distance 255
        set blackhole enable
    next
edit 0
        set dst 10.250.250.0 255.255.255.0
        set distance 255
        set blackhole enable
    next
end

- POLICY ROUTING


config router policy
    edit 1
        set dst "172.17.1.0/255.255.255.0"
        set action deny
    next
end

- SDWAN


config system sdwan
    set status enable
    config zone
        edit "virtual-wan-link"
        next
        edit "Underline"
        next
        edit "Overline"
        next
    end
    config members
        edit 1
            set interface "wan1"
            set zone "Underline"
            set gateway 12.81.177.33
        next
        edit 2
            set interface "wan2"
            set zone "Underline"
            set gateway 12.81.177.37
        next
        edit 3
            set interface "OL_INET1_1"
            set zone "Overline"
        next
        edit 4
            set interface "OL_INET2_1"
            set zone "Overline"
        next
        edit 5
            set interface "OL_INET1_2"
            set zone "Overline"
        next
        edit 6
            set interface "OL_INET2_2"
            set zone "Overline"
        next
    end
    config health-check
        edit "HealtechCheck8.8.8.8"
            set server "8.8.8.8"
            set members 1 2
        next
        edit "HealthCheckVPNHub1"
            set server "172.17.1.1"
            set members 3 4
        next
        edit "HealthCheckVPNHub2"
            set server "172.17.1.100"
            set members 5 6
        next
    end
    config service
        edit 4
            set name "SPOKES"
            set dst "SPOKES"
            set priority-members 4 3 5 6
        next
        edit 3
            set name "HUBs"
            set dst "HUB1" "HUB2 HUB-port1"
            set priority-members 4 3 5 6
        next
        edit 2
            set name "APP"
            set mode priority
            set src "all"
            set internet-service enable
            set internet-service-app-ctrl 16001 38131
            set health-check "HealtechCheck8.8.8.8"
            set priority-members 1 2
            set status disable
        next
        edit 1
            set name "Default"
            set dst "all"
            set src "all"
            set priority-members 1 2
        next
    end
end


- ADVPN


config vpn ipsec phase1-interface
    edit "OL_INET1_2"
        set interface "wan2"
        set ike-version 2
        set keylife 28800
        set peertype any
        set net-device enable
        set mode-cfg enable
        set proposal aes256-sha256 aes256gcm-prfsha384
        set add-route disable
        set dpd on-idle
        set idle-timeout enable
        set idle-timeoutinterval 5
        set auto-discovery-receiver enable
        set network-overlay enable
        set network-id 21
        set remote-gw 12.81.182.98
        set psksecret CLAVE
        set dpd-retrycount 2
        set dpd-retryinterval 10
    next
    edit "OL_INET1_1"
        set interface "wan1"
        set ike-version 2
        set keylife 28800
        set peertype any
        set net-device enable
        set mode-cfg enable
        set proposal aes256-sha256 aes256gcm-prfsha384
        set add-route disable
        set dpd on-idle
        set idle-timeout enable
        set idle-timeoutinterval 5
        set auto-discovery-receiver enable
        set network-overlay enable
        set network-id 11
        set remote-gw 12.81.206.194
        set psksecret CLAVE
        set dpd-retrycount 2
        set dpd-retryinterval 10
    next
    edit "OL_INET1_2"
        set interface "wan1"
        set ike-version 2
        set keylife 28800
        set peertype any
        set net-device enable
        set mode-cfg enable
        set proposal aes256-sha256 aes256gcm-prfsha384
        set add-route disable
        set dpd on-idle
        set idle-timeout enable
        set idle-timeoutinterval 5
        set auto-discovery-receiver enable
        set network-overlay enable
        set network-id 12
        set remote-gw 12.81.221.166
        set psksecret CLAVE
        set dpd-retrycount 2
        set dpd-retryinterval 10
    next
    edit "OL_INET2_2"
        set interface "wan2"
        set ike-version 2
        set keylife 28800
        set peertype any
        set net-device enable
        set mode-cfg enable
        set proposal aes256-sha256 aes256gcm-prfsha384
        set add-route disable
        set dpd on-idle
        set idle-timeout enable
        set idle-timeoutinterval 5
        set auto-discovery-receiver enable
        set network-overlay enable
        set network-id 22
        set remote-gw 12.81.221.166
        set psksecret CLAVE
        set dpd-retrycount 2
        set dpd-retryinterval 10
    next
end
config vpn ipsec phase2-interface
    edit "OL_INET1_1"
        set phase1name "OL_INET1_1"
        set proposal aes256-sha256 aes256gcm
        set auto-negotiate enable
        set keylifeseconds 1800
    next
    edit "OL_INET1_2"
        set phase1name "OL_INET1_2"
        set proposal aes256-sha256 aes256gcm
        set auto-negotiate enable
        set keylifeseconds 1800
    next
    edit "OL_INET2_1"
        set phase1name "OL_INET2_1"
        set proposal aes256-sha256 aes256gcm
        set auto-negotiate enable
        set keylifeseconds 1800
    next
    edit "OL_INET2_2"
        set phase1name "OL_INET2_2"
        set proposal aes256-sha256 aes256gcm
        set auto-negotiate enable
        set keylifeseconds 1800
    next
end

-BGP


- BGP PEER


config router bgp
    set as 65000
    set router-id 192.168.11.99
    set keepalive-timer 5
    set holdtime-timer 15
    set ibgp-multipath enable
    set additional-path enable
    set scan-time 20
    config neighbor
        edit "10.200.11.10"
            set bfd enable
            set soft-reconfiguration enable
            set interface "OL_INET1_1"
            set remote-as 65000
            set connect-timer 1
            set additional-path receive
        next
        edit "10.200.21.10"
            set bfd enable
            set soft-reconfiguration enable
            set interface "OL_INET2_1"
            set remote-as 65000
            set connect-timer 1
            set additional-path receive
        next
        edit "10.200.12.10"
            set bfd enable
            set soft-reconfiguration enable
            set interface "OL_INET1_2"
            set remote-as 65000
            set connect-timer 1
            set additional-path receive
        next
        edit "10.200.22.10"
            set bfd enable
            set soft-reconfiguration enable
            set interface "OL_INET2_2"
            set remote-as 65000
            set connect-timer 1
            set additional-path receive
        next
    end
    config network
        edit 1
            set prefix 192.168.11.0 255.255.255.0
        next
        edit 2
            set prefix 172.17.1.4 255.255.255.255
        next
    end
    end

- POLICIES


config firewall policy
    edit 1
        set srcintf "lan"
        set dstintf "Underline"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set logtraffic all
        set nat enable
    next
    edit 2
        set srcintf "lan"
        set dstintf "Overline"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set logtraffic all
    next
    edit 3
        set srcintf "Overline"
        set dstintf "lan"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set logtraffic all
    next
    edit 4
        set srcintf "Gestion"
        set dstintf "Overline"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set logtraffic all
    next
    edit 5
        set srcintf "Overline"
        set dstintf "Gestion"
        set srcaddr "all"
        set dstaddr "all"
        set action accept
        set schedule "always"
        set service "ALL"
        set logtraffic all
    next
end

- VRRP


Uso del VRRP para una red que comparten ambos CPDs


Como se puede ver en el diagrama tenemos los 2 hubs conectados por un enlace de nivel2 con el direccionamiento 10.250.250.0/24. Nuestro SD-WAN prioriza los enlaces del HUB1 frente a los del HUB2, para llegara esa red, por lo que podemos usar VRRP para tener el gateway de esa red en el HUb1 mientras este siga vivo, si este CPD cae el gateway se pone como master en el HUB2.



- TROUBLESHOOTING


Analizaremos la información que generan al HUB1 y el SPOKE2 para poder solucionar los problemas que se puedan generar.


- HUB1


get vpn ipsec tunnel summary

'OL_INET1' 12.81.177.34:0  selectors(total,up): 1/1  rx(pkt,err): 12930/0  tx(pkt,err): 28418/0
'OL_INET1' 12.81.209.10:0  selectors(total,up): 1/1  rx(pkt,err): 8834/0  tx(pkt,err): 21520/0
'OL_INET2' 12.81.206.198:0  selectors(total,up): 1/1  rx(pkt,err): 12930/0  tx(pkt,err): 28514/0
'OL_INET2' 12.81.177.38:0  selectors(total,up): 1/1  rx(pkt,err): 12930/0  tx(pkt,err): 28428/0

diagnose vpn tunnel list

list all ipsec tunnel in vd 0
------------------------------------------------------
name=OL_INET1_0 ver=2 serial=4 12.81.206.194:0->12.81.177.34:0 dst_mtu=1500
bound_if=6 lgwy=static/1 tun=intf/0 mode=dial_inst/3 encap=none/680 options[02a8]=npu search-nexthop rgwy-chg frag-rfc  run_state=1 accept_traffic=1 overlay_id=11

 parent=OL_INET1 index=0
proxyid_num=1 child_num=0 refcnt=9 ilast=0 olast=0 ad=s/1
stat: rxp=43906 txp=90640 rxb=5816356 txb=4819001
dpd: mode=on-idle on=1 idle=10000ms retry=2 count=0 seqno=0
natt: mode=none draft=0 interval=0 remote_port=0
proxyid=OL_INET1_0 proto=0 sa=1 ref=7 serial=1 ads
  src: 0:0.0.0.0-255.255.255.255:0
  dst: 0:0.0.0.0-255.255.255.255:0
  SA:  ref=6 options=a27 type=00 soft=0 mtu=1438 expire=171/0B replaywin=1024
       seqno=37f2 esn=0 replaywin_lastseq=00003680 itn=0 qat=0 hash_search_len=1
  life: type=01 bytes=0/0 timeout=1791/1800
  dec: spi=bc3401a8 esp=aes key=32 4d7ccde0e0e4b67535acc0127947ad7f6ac9bfa3a8b46eb8128a6cec7464c41b
       ah=sha256 key=32 ec34b6e12e9e3b553018092701146496ca86a6dae3131e16975e4247a4380f97
  enc: spi=0d94f444 esp=aes key=32 ee46601f1a0954f66335fd7b68d6ae0e24f3fbed6e435e58da46b01ddc22775e
       ah=sha256 key=32 5e680733fc78099c708cf7dae2530967029ad81a76976ee5701d9235449a8a03
  dec:pkts/bytes=13952/1851282, enc:pkts/bytes=27632/2481953
  npu_flag=03 npu_rgwy=12.81.177.34 npu_lgwy=12.81.206.194 npu_selid=1 dec_npuid=1 enc_npuid=1
------------------------------------------------------
name=OL_INET1_1 ver=2 serial=7 12.81.206.194:0->12.81.209.10:0 dst_mtu=1500
bound_if=6 lgwy=static/1 tun=intf/0 mode=dial_inst/3 encap=none/680 options[02a8]=npu search-nexthop rgwy-chg frag-rfc  run_state=1 accept_traffic=1 overlay_id=11

 parent=OL_INET1 index=1
proxyid_num=1 child_num=0 refcnt=9 ilast=0 olast=0 ad=s/1
stat: rxp=7810 txp=18158 rxb=1065188 txb=962961
dpd: mode=on-idle on=1 idle=10000ms retry=2 count=0 seqno=0
natt: mode=none draft=0 interval=0 remote_port=0
proxyid=OL_INET1_0 proto=0 sa=1 ref=7 serial=1 ads
  src: 0:0.0.0.0-255.255.255.255:0
  dst: 0:0.0.0.0-255.255.255.255:0
  SA:  ref=6 options=a27 type=00 soft=0 mtu=1438 expire=769/0B replaywin=1024
       seqno=26f0 esn=0 replaywin_lastseq=00001e80 itn=0 qat=0 hash_search_len=1
  life: type=01 bytes=0/0 timeout=1785/1800
  dec: spi=bc3401a9 esp=aes key=32 5363b7159bdff81a73122a20d710f625cf53bad11db74ede95ee491d9177c754
       ah=sha256 key=32 e56e73ce627f059a45064062b956557beb62830772966b3577c21f8d2392c53b
  enc: spi=16a2ff04 esp=aes key=32 3033b93a2a59e674d465893185930b59943d9cb355b64b6439ef3453144e4534
       ah=sha256 key=32 fb1b4db4477f9dc76dc14ae6382c22670e89bfb4aeec94f17c470a319da4d558
  dec:pkts/bytes=7810/1065052, enc:pkts/bytes=18158/1590312
  npu_flag=03 npu_rgwy=12.81.209.10 npu_lgwy=12.81.206.194 npu_selid=4 dec_npuid=1 enc_npuid=1
------------------------------------------------------
name=OL_INET2_0 ver=2 serial=8 12.81.182.98:0->12.81.206.198:0 dst_mtu=1500
bound_if=7 lgwy=static/1 tun=intf/0 mode=dial_inst/3 encap=none/680 options[02a8]=npu search-nexthop rgwy-chg frag-rfc  run_state=1 accept_traffic=1 overlay_id=21

 parent=OL_INET2 index=0
proxyid_num=1 child_num=0 refcnt=10 ilast=0 olast=0 ad=s/1
stat: rxp=7810 txp=18408 rxb=1196170 txb=1003716
dpd: mode=on-idle on=1 idle=10000ms retry=2 count=0 seqno=0
natt: mode=none draft=0 interval=0 remote_port=0
proxyid=OL_INET2_0 proto=0 sa=1 ref=8 serial=1 ads
  src: 0:0.0.0.0-255.255.255.255:0
  dst: 0:0.0.0.0-255.255.255.255:0
  SA:  ref=6 options=a27 type=00 soft=0 mtu=1438 expire=774/0B replaywin=1024
       seqno=27ea esn=0 replaywin_lastseq=00001e80 itn=0 qat=0 hash_search_len=1
  life: type=01 bytes=0/0 timeout=1790/1800
  dec: spi=bc3401aa esp=aes key=32 cbc5ddd8e1979d3ac1a876086b0da99f92d4ee757e68e1c5261f23a3b69d4868
       ah=sha256 key=32 c66a0a9c9c4ca69d58642866947e010ee9671e68520d8521b08646fcc217dfaf
  enc: spi=16a2ff06 esp=aes key=32 c977fc0a2dc22ccbad3434ad427e7fb45524dc0eff21433f93ed2140933cd881
       ah=sha256 key=32 6f37f381be89aa7d3427469ac50225472a64cc3f93875b9ec02c154c8bda7386
  dec:pkts/bytes=7810/1196034, enc:pkts/bytes=18408/1649070
  npu_flag=03 npu_rgwy=12.81.206.198 npu_lgwy=12.81.182.98 npu_selid=5 dec_npuid=1 enc_npuid=1
------------------------------------------------------
name=OL_INET2_1 ver=2 serial=5 12.81.182.98:0->12.81.177.38:0 dst_mtu=1500
bound_if=7 lgwy=static/1 tun=intf/0 mode=dial_inst/3 encap=none/680 options[02a8]=npu search-nexthop rgwy-chg frag-rfc  run_state=1 accept_traffic=1 overlay_id=21

 parent=OL_INET2 index=1
proxyid_num=1 child_num=0 refcnt=9 ilast=0 olast=0 ad=s/1
stat: rxp=43906 txp=91670 rxb=5816424 txb=4819412
dpd: mode=on-idle on=1 idle=10000ms retry=2 count=0 seqno=0
natt: mode=none draft=0 interval=0 remote_port=0
proxyid=OL_INET2_0 proto=0 sa=1 ref=7 serial=1 ads
  src: 0:0.0.0.0-255.255.255.255:0
  dst: 0:0.0.0.0-255.255.255.255:0
  SA:  ref=6 options=a27 type=00 soft=0 mtu=1438 expire=158/0B replaywin=1024
       seqno=3837 esn=0 replaywin_lastseq=00003680 itn=0 qat=0 hash_search_len=1
  life: type=01 bytes=0/0 timeout=1785/1800
  dec: spi=bc3401a7 esp=aes key=32 6c58131f506cf53babb02e6dd728a506de4cc6fa7e122f9fa3901770f3ff115a
       ah=sha256 key=32 211023e2a28b3d703feee0d22355f1c4a2f023275146a6316bc9a2f2820f5084
  enc: spi=0d94f443 esp=aes key=32 9649f0dfe4b9041f9bf800469019371035d9da4137b5293a081713d15bfdb61c
       ah=sha256 key=32 882e47ebe607acd3995042075850d930bc51ab449b8f1273a1fe463d65c78e52
  dec:pkts/bytes=13952/1851382, enc:pkts/bytes=28725/2490056
  npu_flag=03 npu_rgwy=12.81.177.38 npu_lgwy=12.81.182.98 npu_selid=2 dec_npuid=1 enc_npuid=1
------------------------------------------------------
name=OL_INET1 ver=2 serial=2 12.81.206.194:0->0.0.0.0:0 dst_mtu=0
bound_if=6 lgwy=static/1 tun=intf/0 mode=dialup/2 encap=none/552 options[0228]=npu search-nexthop frag-rfc  accept_traffic=1 overlay_id=11

proxyid_num=0 child_num=2 refcnt=26 ilast=5223 olast=5223 ad=/0
stat: rxp=67334 txp=143653 rxb=9011558 txb=7555493
dpd: mode=on-idle on=0 idle=10000ms retry=2 count=0 seqno=0
natt: mode=none draft=0 interval=0 remote_port=0
run_tally=2
ipv4 route tree:
10.200.11.1 0
10.200.11.2 1
12.81.177.34 0
12.81.209.10 1
------------------------------------------------------
name=OL_INET2 ver=2 serial=1 12.81.182.98:0->0.0.0.0:0 dst_mtu=0
bound_if=7 lgwy=static/1 tun=intf/0 mode=dialup/2 encap=none/552 options[0228]=npu search-nexthop frag-rfc  accept_traffic=1 overlay_id=21

proxyid_num=0 child_num=2 refcnt=27 ilast=5223 olast=5223 ad=/0
stat: rxp=71430 txp=152978 rxb=9666950 txb=8054736
dpd: mode=on-idle on=0 idle=10000ms retry=2 count=0 seqno=0
natt: mode=none draft=0 interval=0 remote_port=0
run_tally=2
ipv4 route tree:
10.200.21.1 0
10.200.21.2 1
12.81.177.38 1
12.81.206.198 0

get router info bgp sum

VRF 0 BGP router identifier 10.254.254.1, local AS number 65000
BGP table version is 7
1 BGP AS-PATH entries
0 BGP community entries
Next peer check timer due in 10 seconds

Neighbor    V         AS MsgRcvd MsgSent   TblVer  InQ OutQ Up/Down  State/PfxRcd
10.200.11.1 4      65000     270     269        6    0    0 00:19:31        2
10.200.11.2 4      65000     173     171        5    0    0 00:12:17        2
10.200.21.1 4      65000     269     271        4    0    0 00:19:40        2
10.200.21.2 4      65000     267     270        6    0    0 00:19:33        2

Total number of neighbors 4
get router info routing-table all

Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP
       O - OSPF, IA - OSPF inter area
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
       E1 - OSPF external type 1, E2 - OSPF external type 2
       i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
       * - candidate default

Routing table for VRF=0
S*      0.0.0.0/0 [1/0] via 12.81.182.97, wan2
                  [1/0] via 12.81.206.193, wan1
C       10.200.11.0/24 is directly connected, OL_INET1
C       10.200.11.10/32 is directly connected, OL_INET1
C       10.200.21.0/24 is directly connected, OL_INET2
C       10.200.21.10/32 is directly connected, OL_INET2
C       10.250.250.0/24 is directly connected, port1
C       10.250.250.1/32 is directly connected, port1
C       10.254.254.0/24 is directly connected, port5
C       172.17.1.1/32 is directly connected, Gestion
B       172.17.1.2/32 [200/0] via 10.200.11.2, OL_INET1, 00:12:44
                      [200/0] via 10.200.21.1, OL_INET2, 00:12:44
B       172.17.1.3/32 [200/0] via 10.200.11.1, OL_INET1, 00:19:58
                      [200/0] via 10.200.21.2, OL_INET2, 00:19:58
B       192.168.1.0/24 [200/0] via 10.200.11.2, OL_INET1, 00:12:44
                       [200/0] via 10.200.21.1, OL_INET2, 00:12:44
B       192.168.11.0/24 [200/0] via 10.200.11.1, OL_INET1, 00:19:58
                        [200/0] via 10.200.21.2, OL_INET2, 00:19:58
C       12.81.182.96/30 is directly connected, wan2
C       12.81.206.192/30 is directly connected, wan1

HUB2


 get vpn ipsec tunnel summary

'OL_INET2' 12.81.177.34:0  selectors(total,up): 1/1  rx(pkt,err): 11522/0  tx(pkt,err): 27227/0
'OL_INET2' 12.81.209.10:0  selectors(total,up): 1/1  rx(pkt,err): 7810/0  tx(pkt,err): 17552/0
'OL_INET1' 12.81.206.198:0  selectors(total,up): 1/1  rx(pkt,err): 9858/0  tx(pkt,err): 23610/0
'OL_INET1' 12.81.177.38:0  selectors(total,up): 1/1  rx(pkt,err): 11523/0  tx(pkt,err): 27214/0

get router info bgp sum

VRF 0 BGP router identifier 10.254.253.1, local AS number 65000
BGP table version is 16
1 BGP AS-PATH entries
0 BGP community entries
Next peer check timer due in 7 seconds

Neighbor    V         AS MsgRcvd MsgSent   TblVer  InQ OutQ Up/Down  State/PfxRcd
10.200.12.1 4      65000     236     240       15    0    0 00:17:07        2
10.200.12.2 4      65000      50      51       14    0    0 00:03:32        2
10.200.22.1 4      65000     150     155       12    0    0 00:10:54        2
10.200.22.2 4      65000     234     245       15    0    0 00:17:07        2

get router info routing-table all

Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP
       O - OSPF, IA - OSPF inter area
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
       E1 - OSPF external type 1, E2 - OSPF external type 2
       i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
       * - candidate default

Routing table for VRF=0
S*      0.0.0.0/0 [10/0] via 12.81.221.165, wan1
C       10.200.12.0/24 is directly connected, OL_INET1
C       10.200.12.10/32 is directly connected, OL_INET1
C       10.200.22.0/24 is directly connected, OL_INET2
C       10.200.22.10/32 is directly connected, OL_INET2
C       10.250.250.0/24 is directly connected, port1
C       10.254.253.0/24 is directly connected, port5
B       172.17.1.2/32 [200/0] via 10.200.12.2, OL_INET1, 00:00:44
                      [200/0] via 10.200.22.1, OL_INET2, 00:00:44
B       172.17.1.3/32 [200/0] via 10.200.12.1, OL_INET1, 00:14:20
                      [200/0] via 10.200.22.2, OL_INET2, 00:14:20
C       172.17.1.100/32 is directly connected, Gestion-Hub2
B       192.168.1.0/24 [200/0] via 10.200.12.2, OL_INET1, 00:00:44
                       [200/0] via 10.200.22.1, OL_INET2, 00:00:44
B       192.168.11.0/24 [200/0] via 10.200.12.1, OL_INET1, 00:14:20
                        [200/0] via 10.200.22.2, OL_INET2, 00:14:20
C       12.81.221.164/30 is directly connected, wan1

- SPOKE2


diagnose ip address list | grep OL_
IP=10.200.21.2->10.200.21.2/255.255.255.0 index=33 devname=OL_INET1_2
IP=10.200.11.1->10.200.11.1/255.255.255.0 index=34 devname=OL_INET1_1
IP=10.200.12.1->10.200.12.1/255.255.255.0 index=35 devname=OL_INET2_1
IP=10.200.22.2->10.200.22.2/255.255.255.0 index=36 devname=OL_INET2_2
IP=10.200.12.10->10.200.12.253/255.255.255.0 index=37 devname=OL_INET1
IP=10.200.22.10->10.200.22.253/255.255.255.0 index=38 devname=OL_INET2
IP=10.200.21.2->10.200.21.1/255.255.255.255 index=42 devname=OL_INET2_1_0


 diagnose ip proute match 192.168.11.99 192.168.1.1 "lan" 1 0-65535

dst=192.168.11.99 src=192.168.1.14 smac=00:00:00:00:00:00 iif=21 protocol=1 dport=0
id=7f000008 type=SDWAN
seq-num=4

 diagnose sys sdwan service 4

Service(4): Address Mode(IPV4) flags=0x200
  Gen(9), TOS(0x0/0x0), Protocol(0: 1->65535), Mode(manual)
  Member sub interface(5):
    2: seq_num(4), interface(OL_INET1_2):
       1: OL_INET2_1_0(43)
  Members(5):
    1: Seq_num(4 OL_INET2_1_0), alive, selected
    2: Seq_num(4 OL_INET1_2), alive, selected
    3: Seq_num(3 OL_INET1_1), alive, selected
    4: Seq_num(5 OL_INET2_2), alive, selected
    5: Seq_num(6 OL_INET2_2), alive, selected
  Dst address(1):
  192.168.0.0-192.168.255.255

diagnose sys sdwan health-check
 
Health Check(HealtechCheck8.8.8.8):
Seq(1 wan1): state(alive), packet-loss(0.000%) latency(6.965), jitter(0.119) sla_map=0x0
Seq(2 wan2): state(alive), packet-loss(0.000%) latency(7.274), jitter(0.272) sla_map=0x0
Health Check(HelathCheckVPN2):
Seq(3 OL_INET1_1): state(alive), packet-loss(0.000%) latency(0.169), jitter(0.013) sla_map=0x0
Seq(4 OL_INET2_1): state(alive), packet-loss(0.000%) latency(0.154), jitter(0.011) sla_map=0x0
Seq(4 OL_INET2_1_0): state(alive), packet-loss(93.000%) latency(0.173), jitter(0.030) sla_map=0x0
Health Check(HealthCheckVPNhub2):
Seq(5 OL_INET1_2): state(alive), packet-loss(0.000%) latency(0.160), jitter(0.011) sla_map=0x0
Seq(6 OL_INET2_2): state(alive), packet-loss(0.000%) latency(0.162), jitter(0.011) sla_map=0x0


 get router info routing-table all
Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP
       O - OSPF, IA - OSPF inter area
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
       E1 - OSPF external type 1, E2 - OSPF external type 2
       i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
       * - candidate default

Routing table for VRF=0
S*      0.0.0.0/0 [1/0] via 12.81.177.33, wan1
                  [1/0] via 12.81.177.37, wan2
C       10.200.11.0/24 is directly connected, OL_INET1_1
C       10.200.11.1/32 is directly connected, OL_INET1_1
C       10.200.12.0/24 is directly connected, OL_INET2_1
C       10.200.12.1/32 is directly connected, OL_INET2_1
C       10.200.21.0/24 is directly connected, OL_INET2_1
C       10.200.21.1/32 is directly connected, OL_INET2_1_0
C       10.200.21.2/32 is directly connected, OL_INET2_1
                       is directly connected, OL_INET2_1_0
C       10.200.22.0/24 is directly connected, OL_INET2_2
C       10.200.22.2/32 is directly connected, OL_INET2_2
B       10.250.250.0/24 [200/0] via 10.200.12.10, OL_INET2_1, 00:04:19
                        [200/0] via 10.200.22.10, OL_INET2_2, 00:04:19
                        [200/0] via 10.200.11.10, OL_INET1_1, 00:04:19
                        [200/0] via 10.200.21.10, OL_INET2_1, 00:04:19
B       10.254.253.0/24 [200/0] via 10.200.12.10, OL_INET2_1, 00:04:19
                        [200/0] via 10.200.22.10, OL_INET2_2, 00:04:19
B       10.254.254.0/24 [200/0] via 10.200.11.10, OL_INET1_1, 02:12:18
                        [200/0] via 10.200.21.10, OL_INET2_1, 02:12:18
C       169.254.1.0/24 is directly connected, fortilink
B       172.17.1.1/32 [200/0] via 10.200.11.10, OL_INET1_1, 02:12:18
                      [200/0] via 10.200.21.10, OL_INET2_1, 02:12:18
B       172.17.1.2/32 [200/0] via 10.200.11.2, OL_INET1_1, 00:04:18
                      [200/0] via 10.200.12.2, OL_INET2_1, 00:04:18
                      [200/0] via 10.200.21.1, OL_INET2_1_0, 00:04:18
                      [200/0] via 10.200.22.1, OL_INET2_2, 00:04:18
C       172.17.1.3/32 is directly connected, Gestion
B       172.17.1.100/32 [200/0] via 10.200.12.10, OL_INET2_1, 00:04:19
                        [200/0] via 10.200.22.10, OL_INET2_2, 00:04:19
B       192.168.1.0/24 [200/0] via 10.200.11.2, OL_INET1_1, 00:04:18
                       [200/0] via 10.200.12.2, OL_INET2_1, 00:04:18
                       [200/0] via 10.200.21.1, OL_INET2_1_0, 00:04:18
                       [200/0] via 10.200.22.1, OL_INET2_2, 00:04:18
C       192.168.11.0/24 is directly connected, lan
C       12.81.177.32/30 is directly connected, wan1
C       12.81.177.36/30 is directly connected, wan2

get router info bgp sum

VRF 0 BGP router identifier 192.168.11.99, local AS number 65000
BGP table version is 5
1 BGP AS-PATH entries
0 BGP community entries

Neighbor     V         AS MsgRcvd MsgSent   TblVer  InQ OutQ Up/Down  State/PfxRcd
10.200.11.10 4      65000    1858    1854        3    0    0 02:15:30        6
10.200.12.10 4      65000    1949    1941        4    0    0 00:07:31        6
10.200.21.10 4      65000    1861    1842        2    0    0 02:15:32        6
10.200.22.10 4      65000    1955    1939        1    0    0 02:21:53        6


get router info routing-table detail 192.168.1.0/24

Routing table for VRF=0
Routing entry for 192.168.1.0/24
  Known via "bgp", distance 200, metric 0, best
  Last update 00:00:43 ago
  * 10.200.11.2, via OL_INET1_1 distance 0
  * 10.200.12.2, via OL_INET1_2 distance 0
  * 10.200.21.1, via OL_INET2_1 distance 0
  * 10.200.22.1, via OL_INET2_2 distance 0

Routing entry for 192.168.1.0/24
  Known via "static", distance 255, metric 0
    directly connected, Null distance 0

- COMANDOS ÚTILES


- Reiniciar los túneles VPN

diagnose vpn tunnel flush -->ALL
diagnose vpn tunnel flush tunel-name --> Only that túnel

 - Reiniciar las sesiones BGP

execute router clear BGP all --> Reiniciar el BGP contra todos los vecinos
execute router clear BGP ip/as --> Reiniciar el BGP contra ese vecino o sistema autónomo

- BIBLIOGRAFÍA








 
 
 

Comentarios


Publicar: Blog2_Post

Formulario de suscripción

¡Gracias por tu mensaje!

  • Twitter

©2020 por SecuriBlog. Creada por i.urrutxi@gmail.com

bottom of page