110C - Hub & Spoke IPSEC vpn (interface mode tunnels)
- 2 ISP' s, 1 is fibre for VPN tunnels and the 2nd is DSL for surfing
- In order to split the traffic for surfing I had to use PBR' s.
- I have a PBR for my vpn tunnels so any traffic from inside the branch is passed through the vpn interface then I create a PBR for each service I want to go out my DSL for surfing.
40C - Remote Branch
- This remote branch is in Surrey, BC and I' ve had horrible ISP service from the local cable provider. They' re blaming it on " crack heads" climbing the towers to steal the copper wire... I setup a Huawei 4G modem as a redundant backup to WAN1. If WAN1 goes down, the 4G modem should dial out, create a VPN connection to the 110C and start passing citrix and email etc, to the staff.
Now, what I' ve done is setup the 40C @ home, in testing I found that the PBR was still trying to push packets out through the VPN interface that was down. It' d be nice if PBR was smart enough to know if an interface was working or not...
Static Routes
edit 18
set device " VPN_SUR_4G_STA"
set distance 100
set dst 192.168.100.0 255.255.255.0
set priority 10
set weight 50
next
edit 21
set device " NS_VPN_TEST"
set distance 100
set dst 192.168.100.0 255.255.255.0
set weight 50
next
PBR
edit 23
set input-device " port1"
set src 192.168.30.0 255.255.255.0
set dst 192.168.100.0 255.255.255.0
set gateway 10.200.200.50
set output-device " NS_VPN_TEST"
next
edit 20
set input-device " port1"
set src 192.168.30.0 255.255.255.0
set dst 192.168.100.0 255.255.255.0
set gateway 10.200.200.38
set output-device " VPN_SUR_4G_STA"
next
-Richard
FGT110Cx2 HA A-P - 4.2.11
FGT 80C,60B,50B x 3,FWF50B - 4.2.11
FGT50B - 4.3.3
FGT40C x 2 - 4.3.7
FAMS