GRE over IPSec VPN Tunnel –VPN Failover

Options
Zyxel_Cooldia
Zyxel_Cooldia Posts: 1,450  Zyxel Employee
First Anniversary 10 Comments Friend Collector First Answer
edited June 2022 in VPN

Application scenario

We want to use VPN tunnels to transfer important files between the

branch Office and HQ. To prevent the network from getting

disconnected , we configure four WAN interfaces to do redundancy.

Now, we want to establish two VPN tunnels between the two USGs to

perform failover, to ensure that the transfer will not be interrupted when

the fi rst connection encounters a problem. This will create a stable

environment for the transfer.


Configuration Guide

Network conditions:

USG1

WAN1 IP: 192.168.1.33

WAN2 IP: 192.168.2.33

GRE tunnel interface1:10.0.0.1

GRE tunnel interface2:10.10.0.2

USG2

WAN1 IP: 192.168.3.33

WAN2 IP: 192.168.4.33

GRE tunnel interface1:10.0.0.3

GRE tunnel interface2:10.10.0.4

Goals to achieve:

Use GRE over IPSec VPN to perform the VPN fail over.

USG configuration

Step 1. Add two GRE tunnels on USG1. Go to CONFIGURATION > Tunnel.

a. Add the first tunnel

IP Address: 10.0.0.1, Subnet Mask: 255.255.255.0

My Address: WAN1, Remote Gateway Address: 192.168.3.33

Place a check in the Enable Connectivity Check checkbox. Ensure that the Address is the remote GRE tunnel interface.

b. Add the second tunnel

IP Address: 10.10.0.2, Subnet Mask: 255.255.255.0

My Address: WAN2, Remote Gateway Address: 192.168.4.33

Place a check in the Enable Connectivity Check checkbox. Ensure that the Address is the remote GRE tunnel interface.

Step 2. Add a GRE tunnel trunk on USG1. Go to CONFIGURATION > Network > Interface > Trunk.

gre_trunk member:

tunnel0: Active

tunnel1: Passive

Step3. Add two IPSec VPN tunnels on USG1. Go to CONFIGURATION > VPN > IPSec VPN.

a. Add two VPN gateway policies.

First VPN Gateway policy (USG1 wan1 to USG2 wan1)

My Address: wan1, Peer Gateway Address: 192.168.3.33

Pre-Shared Key: 12345678

Secondary Gateway policy (USG1 wan2 to USG2 wan2)

My Address: wan2, Peer Gateway Address: 192.168.4.33

Pre-Shared Key: 12345678

b. Add two VPN Connections

First VPN Connection

Enable Nailed-Up

Application Scenario: Site-to-Site

VPN Gateway: GRE0_GW

Local policy: 192.168.1.33

Remote policy: 192.168.3.33

Enable GRE over IPSec

Second VPN Connection

Enable Nailed-Up

Application Scenario: Site-to-Site

VPN Gateway: GRE1_GW

Local policy: 192.168.2.33

Remote policy: 192.168.4.33

Enable GRE over IPSec

Step 4. Add a policy routes on USG1. Go to CONFIGURATION> Network > Routing.

Source: LAN1_Subnet

Destination: Remote subnet

Next-Hop: gre_trunk

SNAT: none

Step5. Add two GRE tunnels on the USG2. Go to CONFIGURATION > Tunnel.

a. Add first tunnel

IP Address: 10.0.0.3, Subnet Mask: 255.255.255.0

My Address: WAN1, Remote Gateway Address: 192.168.1.33

Place a check in the Enable Connectivity Check checkbox. Ensure that the Address is the remote GRE tunnel interface.

b. Add Second tunnel

IP Address: 10.10.0.4, Subnet Mask: 255.255.255.0

My Address: WAN2, Remote Gateway Address: 192.168.2.33

Place a check in the Enable Connectivity Check checkbox. Ensure that the Address is the remote GRE tunnel interface.

Step6. Add a GRE tunnel trunk on USG2. Go to CONFIGURATION > Network > Interface > Trunk.

gre_trunk member:

tunnel0: Active

Tunnel1: Passive

Step 7. Add two IPSec VPN tunnels on USG2. Go to CONFIGURATION > VPN > IPSec VPN.

a. Add two VPN Gateways.

First VPN Gateway

My Address: wan1, Peer Gateway Address: 192.168.1.33

Pre-Shared Key: 12345678

Second VPN Gateway

My Address: wan2, Peer Gateway Address: 192.168.2.33

Pre-Shared Key: 12345678

b. Add two VPN Connections.

First VPN connection

Application Scenario: Site-to-Site

VPN Gateway: GRE0_GW

Local policy: 192.168.3.33

Remote policy: 192.168.1.33

Enable GRE over IPSec

Second VPN connection

Enable Nailed-Up

Application Scenario: Site-to-Site

VPN Gateway: GRE1_GW

Local policy: 192.168.4.33

Remote policy: 192.168.2.33

Enable GRE over IPSec

Step 8. Add a policy routes on USG2. Go to CONFIGURATION > Network > Routing.

Source: LAN1_Subnet

Destination: Remote subnet

Next-Hop: gre_trunk

SNAT: none