Hello All,
I am currently trying to configure redundant IPSEC Tunnels between 2 Fortigate Units (a 60E and a 50E), with each site having 2 ISPs each.
While I have successfully configured the redundant tunnels, the times between failovers are very long.
If I'm running a ping from one end to the other and I disable the primary interface on one Fortigate unit, it will take about 90 seconds (15-16 timed out requests) before the Fortigates decide to use the secondary/tertiary routes. Reverting to the primary tunnel when the primary interfaces are up however are all very fast -- only about 5 seconds or 1 timed out request long.
Is there anything I can configure via the command line or something to speed up the failover process?
I have followed the following guides without success:
http://docs.fortinet.com/uploaded/files/1693/using-redundant-OSPF-routing-over-IPsec-VPN.pdf
http://kb.fortinet.com/kb...f&documentID=10684
Thank you very much!
Edit: I have tried this with 5.4.3 and 5.4.4 with similar results.
Fortigate 60E (5.4.4)
Fortigate 50E (5.4.4)
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hi mda, I've seen this happen due to the default DPD timers in 5.4 being so high. The default timers when you create a interface based VPN are as follow:
dpd-retrycount : 3
dpd-retryinterval : 20
So the FGT will send a DPD packet every 20 seconds, and if three fail it will failover (so 60 seconds in total).
I'd recommend changing these timers to something more suitable for your environment. The CLI commands below will cause it to fail-over after 9 seconds:
config vpn ipsec phase1-interface
edit <vpn name>
set dpd-retrycount 3
set dpd-retryinterval 3
end
Hi neonbit.
Thanks for this info. Will try tomorrow.
In my limited experience & understanding, this seems to be the answer I am looking for.
Will update this thread again. Many thanks for your help! :)
Fortigate 60E (5.4.4)
Fortigate 50E (5.4.4)
Be careful not to set it TOO short though
Mike Pruett
Thanks. What would you have any recommended values for these two variables?
If it would help in your recommendation, the internet can be a little spotty in my country, which is why I am doing this to begin with.
Fortigate 60E (5.4.4)
Fortigate 50E (5.4.4)
Thank you, Mike and neonbit.
This indeed has changed the failover time.
Will experiment to see which variables will suit us the most.
Thanks again!
Fortigate 60E (5.4.4)
Fortigate 50E (5.4.4)
Good deal MDA. Yeah, too short and you end up having interfaces flap at the first sign of brief intermittent connectivity.
Mike Pruett
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1713 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.