Description | This article describes how to configure BGP on Loopback with SD-WAN to achieve correct BGP failover over the secondary tunnel in case of failure. |
Scope | FortiGate v7.0+. |
Solution |
For configuration information, visit the following KB article: Technical Tip: ADVPN with BGP on loopback
BGP on Loopback is commonly used in ADVPN topology together with SD-WAN on spokes. To have a correct failover of BGP over an available tunnel, an SD-WAN health-check is used.
Spoke1 sample configuration:
config system interface
config router bgp end end
This device has 2 tunnels, and both are members of SD-WAN. The tunnels do not have their IP address, and therefor,e it is necessary to specify a source IP address for health-check packets on Spoke 1 as follows:
config system sdwan config members end
The server IP address used for health-check on the Spoke must be different from the Hub Loopback IP address used for the BGP neighborship. In this example, the HUB's Loopback IP address used for BGP is 172.16.100.1. For the health-check, a different remote IP address is used as the server:
config health-check
The reason a different target IP address is required for the health check is a kernel route for the health-check server IP will be created over the members as follows:
get router info kernel | grep 172.31.100.1
These Kernel routes exist to support the health check and will not be removed even when the health check fails. If the BGP neighbor configuration incorrectly references the same IP address as the health check, the spoke will continue to send BGP traffic over the tunnel that the peering was initially established over, even if the health check for this tunnel is failing. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.