Route Based VPN configuration, introduced in SonicOS Enhanced 5.5, creates a Tunnel Interface between two end points. Static routes can then be added to the Tunnel Interface for reaching the remote networks.The static route may contain the source, destination and service to the Tunnel Interface. The advantages of Route Based VPN are:
This article illustrates how to configure redundant static routes to route traffic to a destination network over a secondary Tunnel Interface when the primary interface fails.
This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.
The scenario illustrated here is of 3 sites connected to each other over VPN using static routes. Each site has two VPN tunnels to the other side. The objective is - when one VPN tunnel is down, traffic is automatically routed throught second tunnel. The IP addresses shown here are examples only.
Site A (New York) Configuration | Site B (Seattle) Configuration | Site C (San Jose) Configuration |
WAN (X1) IP: 192.168.160.161 LAN (X0) Subnet: 192.168.168.0/24 | WAN (X1) IP: 192.168.160.224 LAN (X0) Subnet: 10.20.30.0/24 | WAN (X1) IP: 192.168.160.243 LAN (X0) Subnet: 192.168.16.0/24 |
This article does not describe how to create a Route-Based VPN. For configuring a Route-Based VPN, please check this KB article ID: 7902
Site A (New York) Configuration
Login to the SonicWall Management GUI.
Under Manage in the top navigation menu. Click VPN | Base Settings and create the following Tunnel Interface VPNs:
Create the following Address Objects for the destination networks under Objects | Address Objects.
Create the following Address Groups containing the local subnet and one of the destination network in each group.
Create the following static routes under Network | Routing. Make sure the metric for the redundant routes are higher than for the primary routes. This way the redundant routes are never used unless the primary routes are disabled.
When creating the routes enable the following options:
Site B (Seattle) Configuration
Login to the SonicWall Management GUI.
Under Manage in the top navigation menu. Click VPN | Base Settings and create the following Tunnel Interface VPNs:
Create the following Address Objects for the destination networks under Objects | Address Objects.
Create the following Address Groups containing the local subnet and one of the destination network in each group.
Create the following static routes under Network | Routing. Make sure the metric for the redundant routes are higher than for the primary routes. This way the redundant routes are never used unless the primary routes are disabled.
When creating the routes enable the following options:
Site C (San Jose) Configuration
Login to the SonicWall Management GUI.
Under Manage in the top navigation menu. Click VPN | Base Settings and create the following Tunnel Interface VPNs:
Create the following Address Objects for the destination networks under Objects | Address Objects.
Create the following Address Groups containing the local subnet and one of the destination network in each group.
Create the following static routes under Network | Routing. Make sure the metric for the redundant routes are higher than for the primary routes. This way the redundant routes are never used unless the primary routes are disabled.
When creating the routes enable the following options:
How to Test:
Troubleshooting:
If unable to ping the remote site when the VPN to that site is down, the failover routes are not working.
The below resolution is for customers using SonicOS 6.2 and earlier firmware. For firewalls that are generation 6 and newer we suggest to upgrade to the latest general release of SonicOS 6.5 firmware.
The scenario illustrated here is of 3 sites connected to each other over VPN using static routes. Each site has two VPN tunnels to the other side. The objective is - when one VPN tunnel is down, traffic is automatically routed throught second tunnel. The IP addresses shown here are examples only.
Site A (New York) Configuration | Site B (Seattle) Configuration | Site C (San Jose) Configuration |
WAN (X1) IP: 192.168.160.161 LAN (X0) Subnet: 192.168.168.0/24 | WAN (X1) IP: 192.168.160.224 LAN (X0) Subnet: 10.20.30.0/24 | WAN (X1) IP: 192.168.160.243 LAN (X0) Subnet: 192.168.16.0/24 |
This article does not describe how to create a Route-Based VPN. For configuring a Route-Based VPN, please check this KB article ID: 7902
Site A (New York) Configuration
Login to the SonicWall Management GUI.
Create the following Tunnel Interface VPNs under VPN > Settings.
Create the following Address Objects for the destination networks under Network > Address Objects.
Create the following Address groups containing the local subnet and one of the destination network in each group.
Create the following static routes under Network > Routing. Make sure the metric for the redundant routes are higher than for the primary routes. This way the redundant routes are never used unless the primary routes are disabled.
When creating the routes enable the following options:
Site B (Seattle) Configuration
Login to the SonicWall Management GUI.
Create the following Tunnel Interface VPNs under VPN > Settings.
Create the following Address Objects for the destination networks under Network > Address Objects.
Create the following Address Groups containing the local subnet and one of the destination network in each group.
Create the following static routes under Network > Routing. Make sure the metric for the redundant routes are higher than for the primary routes. This way the redundant routes are never used unless the primary routes are disabled.
When creating the routes enable the following options:
Site C (San Jose) Configuration
Login to the SonicWall Management GUI.
Create the following Tunnel Interface VPNs under VPN > Settings.
Create the following Address Objects for the destination networks under Network > Address Objects.
Create the following Address Groups containing the local subnet and one of the destination network in each group.
Create the following static routes under Network > Routing. Make sure the metric for the redundant routes are higher than for the primary routes. This way the redundant routes are never used unless the primary routes are disabled.
When creating the routes enable the following options:
How to Test:
Troubleshooting:
If unable to ping the remote site when the VPN to that site is down, the failover routes are not working.