How to Use Dual-WAN to Perform Fail-Over on VPN Using the VPN Concentrator

Zyxel_CharlieZyxel_Charlie Zyxel Official Agent Posts: 857  mod

This is an example of using Dual-WAN to perform fail-over on a hub-and-spoke VPN with the HQ ZyWALL/USG as the hub and spoke VPNs to Branches A and B. When the VPN tunnel is configured, traffic passes between branches via the hub (HQ). Traffic can also pass between spoke-and-spoke through the hub. If the primary WAN interface is unavailable, the backup WAN interface will be used. When the primary WAN interface is available again, traffic will use that interface again. 

 


SETUP/STEP BY STEP PROCEDURE:

Set Up the IPSec VPN Tunnel on the ZyWALL/USG

Hub_HQ-to-Branch_A

1     Go to CONFIGURATION > VPN > IPSec VPN > VPN Gateway, select Enable. Type the VPN Gateway Name used to identify this VPN gateway.  

 

Then, configure the Primary Gateway IP as the Branch A’s wan1 IP address (in the example, 172.16.20.1) and Secondary Gateway IP as the Branch A’s wan2IP address (in the example, 172.100.120.1). Select Fall back to Primary Peer Gateway when possible and set desired Fall Back Check Interval time.  

 

Type a secure Pre-Shared Key (8-32 characters) which must match your Branch A’s Pre-Shared Key and click OK.

 

CONFIGURATION > VPN > IPSec VPN > VPN Gateway

2     Go to CONFIGURATION > VPN > IPSec VPN > VPN Connection and select Enable. Type the Connection Name used to identify this VPN connection. Select scenario as Site-to-site and VPN Gateway which is configured in Step 1.

 

CONFIGURATION > VPN > IPSec VPN > VPN Connection > General Settings and VPN Gateway

 

Click Create new Object to add the address of local network behind Hub_HQ and an address of local network behind Branch A.

 

 

CONFIGURATION > VPN > IPSec VPN > VPN Connection > Create new Object

Set Local Policy to be Hub_HQ and Remote Policy to Branch_A which are newly created. Click OK.

 

CONFIGURATION > VPN > IPSec VPN > VPN Connection > Policy

Hub_HQ-to-Branch_B

1     Go to CONFIGURATION > VPN > IPSec VPN > VPN Gateway, select Enable. Type the VPN Gateway Name used to identify this VPN gateway.

 

Then, configure the Primary Gateway IP as the Branch B’s wan1 IP address (in the example, 172.16.30.1) and Secondary Gateway IP as the Branch B’s wan2IP address (in the example, 172.100.130.1). Select Fall back to Primary Peer Gateway when possible and set desired Fall Back Check Interval time.  

 

Type a secure Pre-Shared Key (8-32 characters) which must match your Branch A’s Pre-Shared Key and click OK.

 

 

CONFIGURATION > VPN > IPSec VPN > VPN Gateway

 

2     Go to CONFIGURATION > VPN > IPSec VPN > VPN Connection to enable VPN Connection. Select scenario as Site-to-site and VPN Gateway which is configured in Step 1.

 

CONFIGURATION > VPN > IPSec VPN > VPN Connection > General Settings and VPN Gateway

Click Create new Object to add an address of local network behind Hub_HQ and an address of local network behind Branch B.

 

 

CONFIGURATION > VPN > IPSec VPN > VPN Connection > Create new Object

Set Local Policy to be Hub_HQ and Remote Policy to Branch_B which are newly created. Click OK.

 

CONFIGURATION > VPN > IPSec VPN > VPN Connection > Policy

 

Hub_HQ Concentrator

 

1     In the ZyWALL/USG, go to CONFIGURATION > VPN > IPSec VPN > Concentrator, add a VPN Concentrator rule. Select VPN tunnels to the same member group and click Save.

 

 

 

 

 

Spoke_Branch_A

1     Go to CONFIGURATION > VPN > IPSec VPN > VPN Gateway, select Enable. Type the VPN Gateway Name used to identify this VPN gateway.  

 

Then, configure the Primary Gateway IP as the Hub_HQ’s wan1 IP address (in the example, 172.16.10.1) and Secondary Gateway IP as the Hub_HQ’s wan2 IP address (in the example, 172.100.110.1). Select Fall back to Primary Peer Gateway when possible and set desired Fall Back Check Interval time.  

 

Type a secure Pre-Shared Key (8-32 characters) which must match your Hub_HQ’s Pre-Shared Key and click OK.

 

CONFIGURATION > VPN > IPSec VPN > VPN Gateway

 

2     Go to CONFIGURATION > VPN > IPSec VPN > VPN Connection and select Enable. Type the Connection Name used to identify this VPN connection. Select scenario as Site-to-site and VPN Gateway which is configured in Step 1.

 

CONFIGURATION > VPN > IPSec VPN > VPN Connection > General Settings and VPN Gateway

 

Click Create new Object to add the address of local network behind Branch A and an address of local network behind Hub_HQ

 

 

CONFIGURATION > VPN > IPSec VPN > VPN Connection > Create new Object

 

Set Local Policy to be Spoke_Branch_A_LOCAL and Remote Policy to Hub_HQ which are newly created. Click OK.

 

CONFIGURATION > VPN > IPSec VPN > VPN Connection > Policy

3     Go to Network > Routing > Policy Route to add a Policy Route to allow traffic from Spoke_Branch_A to Spoke_Branch_B.

 

Click Create new Object and set the address to be the local network behind the Spoke_Branch_B. Select Source Address to be the local network behind the Spoke_Branch_A. Then, scroll down the Destination Address list to choose the newly created Spoke_Branch_B_LOCAL address. Click OK.

 

Network > Routing > Policy Route

 

 

 

Spoke_Branch_B

1     Go to CONFIGURATION > VPN > IPSec VPN > VPN Gateway, select Enable. Type the VPN Gateway Name used to identify this VPN gateway.  

 

Then, configure the Primary Gateway IP as the Hub_HQ’s wan1 IP address (in the example, 172.16.10.1) and Secondary Gateway IP as the Hub_HQ’s wan2 IP address (in the example, 172.100.110.1). Select Fall back to Primary Peer Gateway when possible and set desired Fall Back Check Interval time.  

 

Type a secure Pre-Shared Key (8-32 characters) which must match your Hub_HQ’s Pre-Shared Key and click OK.

 

CONFIGURATION > VPN > IPSec VPN > VPN Gateway

 

2     Go to CONFIGURATION > VPN > IPSec VPN > VPN Connection and select Enable. Type the Connection Name used to identify this VPN connection. Select scenario as Site-to-site and VPN Gateway which is configured in Step 1.

 

CONFIGURATION > VPN > IPSec VPN > VPN Connection > General Settings and VPN Gateway

 

Click Create new Object to add the address of local network behind Branch B and an address of local network behind Hub_HQ.

 

CONFIGURATION > VPN > IPSec VPN > VPN Connection > Create new Object

Set Local Policy to be Spoke_Branch_B_LOCAL and Remote Policy to Hub_HQ which are newly created. Click OK.

CONFIGURATION > VPN > IPSec VPN > VPN Connection > Policy

 

3     Go to Network > Routing > Policy Route to add a Policy Route to allow traffic from Spoke_Branch_B to Spoke_Branch_A.

 

Click Create new Object and set the address to be the local network behind the Spoke_Branch_A. Select Source Address to be the local network behind the Spoke_Branch_B. Then, scroll down the Destination Address list to choose the newly created Spoke_Branch_A_LOCAL address. Click OK.

 

Network > Routing > Policy Route


VERIFICATION:

Test the IPSec VPN Tunnel

 

 

1     Go to ZyWALL/USG CONFIGURATION > VPN > IPSec VPN > VPN Connection, click Connect on the upper bar. The Status connect icon is lit when the interface is connected.

 

Hub_HQ > CONFIGURATION > VPN > IPSec VPN > VPN Connection

 

Spoke_Branch_A > CONFIGURATION > VPN > IPSec VPN > VPN Connection

 

Spoke_Branch_B > CONFIGURATION > VPN > IPSec VPN > VPN Connection

 

2     Go to ZyWALL/USG MONITOR > VPN Monitor > IPSec and verify the tunnel Up Time and the Inbound(Bytes)/Outbound(Bytes) traffic. Click Connectivity Check to verify the result of ICMP Connectivity.

 

 

Hub_HQ > MONITOR > VPN Monitor > IPSec > Hub_HQ-to-Branch_A

 

 

 

Hub_HQ > MONITOR > VPN Monitor > IPSec > Hub_HQ-to-Branch_B

 

 

Spoke_Branch_B > MONITOR > VPN Monitor > IPSec

 

Spoke_Branch_A > MONITOR > VPN Monitor > IPSec

What Can Go Wrong?

 

 

1        If you see [info] or [error] log message such as below, please check ZyWALL/USG Phase 1 Settings. All ZyWALL/USG units must use the same Pre-Shared Key, Encryption, Authentication method, DH key group and ID Type to establish the IKE SA. 

 

2        If you see that Phase 1 IKE SA process done but still get [info] log message as below, please check ZyWALL/USG Phase 2 Settings. All ZyWALL/USG units must use the same Protocol, Encapsulation, Encryption, Authentication method and PFS to establish the IKE SA. 

 

3        Make sure the all ZyWALL/USG units’ security policies allow IPSec VPN traffic. IKE uses UDP port 500, AH uses IP protocol 51, and ESP uses IP protocol 50.

 

4        By default, NAT traversal is enabled on ZyWALL/USG, so please make sure the remote IPSec device also has NAT traversal enabled.

Sign In to comment.