Created on 01-29-2024 05:29 AM Edited on 01-29-2024 05:30 AM By Jean-Philippe_P
Description | This article describes how to configure BGP on Loopback with SD-WAN to achieve correct BGP failover over the secondary tunnel in case of failure. |
Scope | FortiGate v7.0+. |
Solution |
How to configure BGP on Loopback is not part of this article. For configuration information, visit the below article: Technical Tip: ADVPN with BGP on loopback
BGP on Loopack is commonly used in ADVPN topology together with SD-WAN on spokes. To have a correct failover of BGP over an available tunnel, an SD-WAN health-check is used.
From Spoke's perspective important parts of the configuration. Loopback used for BGP:
Spoke1 # show system interface Loopback
Partial BGP configuration showing neighbor configuration:
Spoke1 # show router bgp
This device has 2 tunnels, both are members of SD-WAN. As this example used BGP on Loopback configuration, tunnels do not have their own IP address and because, here let's use SD-WAN health-checks to probe connection to HUB, it is necessary to specify source-ip address for health-check packets:
Spoke1 # show system sdwan
Health-check configuration is simple. One rule should be followed, the IP address that is used for health-check should be different from the Loopback IP address used by HUB for BGP. In this example, HUB's Loopback IP address used by BGP is 172.16.100.1. For the health-check purposes, it will be used different IP address:
Spoke1 #
The reason for this is that the kernel route for the health-check IP will be created over members:
Spoke1 # get router info kernel | grep 172.99.99.1
If the health-check IP is the same as the Loopback IP address on HUB (in this case 172.16.100.1) it would interfere with failover in case the current select egress tunnel would go down. The result would be delayed or non-working failover over the secondary tunnel. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.