Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
random_guy
New Contributor III

ADVPN - Spoke config - redundancy

Currently running an ADVPN (BGP) with a couple dozen spokes. All the spokes are a single WAN connection. Now one of the sites wants to add a redundant WAN connection. There are two hubs at the 'hub' so if ISP 1 at the hub goes down, the spokes failover to Hub ISP 2. On the spokes, the backup hub monitors the first hub. How can I add a 3rd advpn connection from the spoke which would use spoke WAN2 if spoke WAN1 fails? 

 

 

 edit "ADVPN-PRIMARY"
    set interface "wan1"
    set peertype any
    set net-device enable
    set proposal aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1
    set add-route disable
    set dpd on-idle
    set wizard-type spoke-fortigate-auto-discovery
    set auto-discovery-receiver enable
    set auto-discovery-shortcuts dependent
    set remote-gw <ISP1 at HUB>
next
edit "ADVPN-BACKUP"
    set interface "wan1"
    set peertype any
    set net-device enable
    set proposal aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1
    set dpd on-idle
    set wizard-type spoke-fortigate-auto-discovery
    set auto-discovery-receiver enable
    set auto-discovery-shortcuts dependent
    set remote-gw <ISP2 at HUB>

 

 

1 Solution
distillednetwork

I just assumed you were using SD-WAN since the tunnels were named ADVPN.  If you are just using routes and the fact the tunnel is up/down to control the traffic, you don't have to then, but SDWAN will give you a lot more control and monitoring capabilities.

 

You can create the two new tunnels I mentioned but use the option "set monitor <primary tunnel name>".  This will keep the tunnel down unless the primary tunnel specified goes down then it will try to build the tunnel on the secondary interface.  Its a slower process then if the tunnel was always up, but should accomplish the goal.

View solution in original post

3 REPLIES 3
distillednetwork
Contributor III

You will need to create two more tunnels like the one you have that use:

set interface "wan2"

(or what ever the second wan port is).  Then your policies will have four vpn overlay tunnels for SD-WAN rules.

random_guy

Is SDWAN required on the spoke for this setup? I also don't want the backup connection to be in use unless the primary fails. 

distillednetwork

I just assumed you were using SD-WAN since the tunnels were named ADVPN.  If you are just using routes and the fact the tunnel is up/down to control the traffic, you don't have to then, but SDWAN will give you a lot more control and monitoring capabilities.

 

You can create the two new tunnels I mentioned but use the option "set monitor <primary tunnel name>".  This will keep the tunnel down unless the primary tunnel specified goes down then it will try to build the tunnel on the secondary interface.  Its a slower process then if the tunnel was always up, but should accomplish the goal.

Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors