Main Menu
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
SonicWall
  • Products
    • Network Security
      • Next Generation FirewallNext-generation firewall for SMB, Enterprise, and Government
      • Security ServicesComprehensive security for your network security solution
      • Network Security ManagerModern Security Management for today’s security landscape
    • Advanced Threat Protection
      • Capture ATPMulti-engine advanced threat detection
      • Capture Security applianceAdvanced Threat Protection for modern threat landscape
    • Access Security
      • Cloud Edge Secure AccessDeploy Zero-Trust Security in minutes
      • Secure Mobile AccessRemote, best-in-class, secure access
      • Wireless Access PointsEasy to manage, fast and secure Wi-FI
      • SwitchesHigh-speed network switching for business connectivity
    • Email Security
      • Email SecurityProtect against today’s advanced email threats
    • Cloud Security
      • Cloud App SecurityVisibility and security for Cloud Apps
      • Cloud Firewall (NSv)Next-generation firewall capabilities in the cloud
    • Endpoint Security
      • Capture ClientStop advanced threats and rollback the damage caused by malware
      • Content Filtering ClientControl access to unwanted and unsecure web content
    • Product Widgets
      • Product Menu Right Image
      • Capture Cloud Platform
        Capture Cloud Platform

        A security ecosystem to harness the power of the cloud

    • Button Widgets
      • Products A-Z
        all products A–Z FREE TRIALS
  • Solutions
    • Industries
      • Distributed Enterprises
      • Retail & Hospitality
      • K-12 Education
      • Higher Education
      • State & Local
      • Federal
      • Healthcare
      • Financial Services
      • Carriers
    • Use Cases
      • Secure SD-Branch
      • Zero Trust Security
      • Secure SD-WAN
      • Office 365 Security
      • SaaS Security
      • Secure WiFi
    • Solutions Widgets
      • Solutions Content Widgets
        Federal

        Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions

      • Solutions Image Widgets
  • Partners
    • SonicWall Partners
      • Partners Overview
      • Find a Partner
      • Authorized Distributors
      • Technology Partners
    • Partner Resources
      • Become a Partner
      • SonicWall University
      • Training & Certification
    • Partner Widgets
      • Custom HTML : Partners Content WIdgets
        Partner Portal

        Access to deal registration, MDF, sales and marketing tools, training and more

      • Partners Image Widgets
  • Support
    • Support
      • Support Portal
      • Knowledge Base
      • Technical Documentation
      • Community
      • Video Tutorials
      • Product Life Cycle Tables
      • Partner Enabled Services
      • Contact Support
    • Resources
      • Resource Center
      • Free Trials
      • Blog
      • SonicWall University
      • MySonicWall
    • Capture Labs
      • Capture Labs
      • Security Center
      • Security News
      • PSIRT
      • Application Catalog
    • Support Widget
      • Custom HTML : Support Content WIdgets
        Support Portal

        Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials

      • Support Image Widgets
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
  • Contact Sales
  • English English English en
  • BLOG
  • CONTACT SALES
  • FREE TRIALS
  • English English English en
SonicWall
  • Products
    • Network Security
      • Next Generation FirewallNext-generation firewall for SMB, Enterprise, and Government
      • Security ServicesComprehensive security for your network security solution
      • Network Security ManagerModern Security Management for today’s security landscape
    • Advanced Threat Protection
      • Capture ATPMulti-engine advanced threat detection
      • Capture Security applianceAdvanced Threat Protection for modern threat landscape
    • Access Security
      • Cloud Edge Secure AccessDeploy Zero-Trust Security in minutes
      • Secure Mobile AccessRemote, best-in-class, secure access
      • Wireless Access PointsEasy to manage, fast and secure Wi-FI
      • SwitchesHigh-speed network switching for business connectivity
    • Email Security
      • Email SecurityProtect against today’s advanced email threats
    • Cloud Security
      • Cloud App SecurityVisibility and security for Cloud Apps
      • Cloud Firewall (NSv)Next-generation firewall capabilities in the cloud
    • Endpoint Security
      • Capture ClientStop advanced threats and rollback the damage caused by malware
      • Content Filtering ClientControl access to unwanted and unsecure web content
    • Product Widgets
      • Product Menu Right Image
      • Capture Cloud Platform
        Capture Cloud Platform

        A security ecosystem to harness the power of the cloud

    • Button Widgets
      • Products A-Z
        all products A–Z FREE TRIALS
  • Solutions
    • Industries
      • Distributed Enterprises
      • Retail & Hospitality
      • K-12 Education
      • Higher Education
      • State & Local
      • Federal
      • Healthcare
      • Financial Services
      • Carriers
    • Use Cases
      • Secure SD-Branch
      • Zero Trust Security
      • Secure SD-WAN
      • Office 365 Security
      • SaaS Security
      • Secure WiFi
    • Solutions Widgets
      • Solutions Content Widgets
        Federal

        Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions

      • Solutions Image Widgets
  • Partners
    • SonicWall Partners
      • Partners Overview
      • Find a Partner
      • Authorized Distributors
      • Technology Partners
    • Partner Resources
      • Become a Partner
      • SonicWall University
      • Training & Certification
    • Partner Widgets
      • Custom HTML : Partners Content WIdgets
        Partner Portal

        Access to deal registration, MDF, sales and marketing tools, training and more

      • Partners Image Widgets
  • Support
    • Support
      • Support Portal
      • Knowledge Base
      • Technical Documentation
      • Community
      • Video Tutorials
      • Product Life Cycle Tables
      • Partner Enabled Services
      • Contact Support
    • Resources
      • Resource Center
      • Free Trials
      • Blog
      • SonicWall University
      • MySonicWall
    • Capture Labs
      • Capture Labs
      • Security Center
      • Security News
      • PSIRT
      • Application Catalog
    • Support Widget
      • Custom HTML : Support Content WIdgets
        Support Portal

        Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials

      • Support Image Widgets
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
  • Contact Sales
  • Menu

How to configure redundant routes for Route Based VPN

10/14/2021 840 People found this article helpful 106,564 Views

    Download
    Print
    Share
    • LinkedIn
    • Twitter
    • Facebook
    • Email
    • Copy URL The link has been copied to clipboard

    Description

    Route Based VPN configuration, introduced in SonicOS Enhanced 5.5, creates a Tunnel Interface between two end points. Static routes can then be added to the Tunnel Interface for reaching the remote networks.The static route may contain the source, destination and service to the Tunnel Interface. The advantages of Route Based VPN are:

    • Any number of overlapping static routes can be added for the tunneled traffic.
    • Multiple route entries can be configured to use the same tunnel interface for different networks.
    • Multiple overlapping static routes, each static route using a different tunnel interface to route the traffic, provides  routing redundancy for the traffic to reach the destination.

    This article illustrates how to configure redundant static routes to route traffic to a destination network over a secondary Tunnel Interface when the primary interface fails.
    Image

    Resolution

    Resolution for SonicOS 6.5

    This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.

    The scenario illustrated here is of 3 sites connected to each other over VPN using static routes. Each site has two VPN tunnels to the other side. The objective is - when one VPN tunnel is down, traffic is automatically routed throught second tunnel.  The IP addresses shown here are examples only.

    Site A (New York) Configuration Site B (Seattle) Configuration Site C (San Jose) Configuration
    WAN (X1) IP: 192.168.160.161
    LAN (X0) Subnet: 192.168.168.0/24
    WAN (X1) IP: 192.168.160.224
    LAN (X0) Subnet: 10.20.30.0/24
    WAN (X1) IP: 192.168.160.243
    LAN (X0) Subnet: 192.168.16.0/24

    This article does not describe how to create a Route-Based VPN. For configuring a Route-Based VPN, please check this KB article ID: 7902

    Site A (New York) Configuration

    Login to the SonicWall Management GUI.
    Under Manage in the top navigation menu. Click VPN | Base Settings and create the following Tunnel Interface VPNs:

    Image

     

    Create the following Address Objects for the destination networks under Objects | Address Objects.

    Image     Image

     

    Create the following Address Groups containing the local subnet and one of the destination network in each group.

    Image

     

    Create the following static routes under Network | Routing. Make sure the metric for the redundant routes are higher than for the primary routes. This way the redundant routes are never used unless the primary routes are disabled. 

    When creating the routes enable the following options:

    • Enable option Auto-add Access Rule to create LAN to VPN and VPN to LAN access rules
    • Enable option Disable route when the interface is disconnected

    Image


    Site B (Seattle) Configuration

    Login to the SonicWall Management GUI.
    Under Manage in the top navigation menu. Click VPN | Base Settings and create the following Tunnel Interface VPNs:

    Image


    Create the following Address Objects for the destination networks under Objects | Address Objects.

     Image     Image  

    Create the following Address Groups containing the local subnet and one of the destination network in each group.

    Create the following static routes under Network | Routing. Make sure the metric for the redundant routes are higher than for the primary routes. This way the redundant routes are never used unless the primary routes are disabled. 

    When creating the routes enable the following options:

    • Enable option Auto-add Access Rule to create LAN > VPN and VPN > LAN access rules
    • Enable option Disable route when the interface is disconnected.

    Site C (San Jose) Configuration

    Login to the SonicWall Management GUI.
    Under Manage in the top navigation menu. Click VPN | Base Settings and create the following Tunnel Interface VPNs:

    Create the following Address Objects for the destination networks under Objects | Address Objects.

    Image     Image

     

    Create the following Address Groups containing the local subnet and one of the destination network in each group.

     Image

     

    Create the following static routes under Network | Routing. Make sure the metric for the redundant routes are higher than for the primary routes. This way the redundant routes are never used unless the primary routes are disabled. 

    When creating the routes enable the following options:

    • Enable option Auto-add Access Rule to create LAN > VPN and VPN > LAN access rules
    • Enable option Disable route when the interface is disconnected.

     Image

     


    How to Test:

    • Make sure the tunnels are up and traffic is passing between all sites.
    • Start a continuous ping from Site A to Site C.
    • In Site A, disable the VPN to Site C.
    • The ping to Site C should continue after a brief interruption during the switch over to the alternate route.
    • This would prove the redundant routes are working.
    • Perform similar tests from Site B and Site C.

     Troubleshooting:

    If unable to ping the remote site when the VPN to that site is down, the failover routes are not working.

    • Check whether the Zones of the address objects for the remote sites is VPN.
    • Make sure Disable route when the interface is disconnected is checked is enabled.
    • Check whether LAN > VPN and VPN > LAN access rules have been auto-added. If not added, create them manually.
    • Make sure there are no conflicting deny rules in the Access Rules.
    • Check whether the Source of each route, across all sites, contains the local subnet as well as one of the remote sites. For eg. a route to reach Site C should have in its Source the local subnet and Site B network.
    • Do a packet capture to see where the packet is dropping.

     

    Resolution for SonicOS 6.2 and Below

    The below resolution is for customers using SonicOS 6.2 and earlier firmware. For firewalls that are generation 6 and newer we suggest to upgrade to the latest general release of SonicOS 6.5 firmware.

    The scenario illustrated here is of 3 sites connected to each other over VPN using static routes. Each site has two VPN tunnels to the other side. The objective is - when one VPN tunnel is down, traffic is automatically routed throught second tunnel.  The IP addresses shown here are examples only.

    Site A (New York) Configuration Site B (Seattle) Configuration Site C (San Jose) Configuration
    WAN (X1) IP: 192.168.160.161
    LAN (X0) Subnet: 192.168.168.0/24
    WAN (X1) IP: 192.168.160.224
    LAN (X0) Subnet: 10.20.30.0/24
    WAN (X1) IP: 192.168.160.243
    LAN (X0) Subnet: 192.168.16.0/24

    This article does not describe how to create a Route-Based VPN. For configuring a Route-Based VPN, please check this KB article ID: 7902

    Site A (New York) Configuration

    Login to the SonicWall Management GUI.
    Create the following Tunnel Interface VPNs under VPN > Settings.

    Image

    Create the following Address Objects for the destination networks under Network > Address Objects.

    ImageImage

    Create the following Address groups containing the local subnet and one of the destination network in each group.

    Image

    Create the following static routes under Network > Routing. Make sure the metric for the redundant routes are higher than for the primary routes. This way the redundant routes are never used unless the primary routes are disabled.

    When creating the routes enable the following options:

    • Enable option Auto-add Access Rule to create LAN to VPN and VPN to LAN access rules
    • Enable option Disable route when the interface is disconnected

    Image


    Site B (Seattle) Configuration

    Login to the SonicWall Management GUI.
    Create the following Tunnel Interface VPNs under VPN > Settings.

    Image


    Create the following Address Objects for the destination networks under Network > Address Objects.

    Image Image

     Create the following Address Groups containing the local subnet and one of the destination network in each group.

    Image

    Create the following static routes under Network > Routing. Make sure the metric for the redundant routes are higher than for the primary routes. This way the redundant routes are never used unless the primary routes are disabled.

    When creating the routes enable the following options:

    • Enable option Auto-add Access Rule to create LAN > VPN and VPN > LAN access rules
    • Enable option Disable route when the interface is disconnected.

    Image


    Site C (San Jose) Configuration

    Login to the SonicWall Management GUI.
    Create the following Tunnel Interface VPNs under VPN > Settings.

     Image

     

    Create the following Address Objects for the destination networks under Network > Address Objects.

    ImageImage

    Create the following Address Groups containing the local subnet and one of the destination network in each group.

     

     Image

    Create the following static routes under Network > Routing. Make sure the metric for the redundant routes are higher than for the primary routes. This way the redundant routes are never used unless the primary routes are disabled.

    When creating the routes enable the following options:

    • Enable option Auto-add Access Rule to create LAN > VPN and VPN > LAN access rules
    • Enable option Disable route when the interface is disconnected.

    Image


    How to Test:

    • Make sure the tunnels are up and traffic is passing between all sites.
    • Start a continuous ping from Site A to Site C.
    • In Site A, disable the VPN to Site C.
    • The ping to Site C should continue after a brief interruption during the switch over to the alternate route.
    • This would prove the redundant routes are working.
    • Perform similar tests from Site B and Site C.

     Troubleshooting:

    If unable to ping the remote site when the VPN to that site is down, the failover routes are not working.

    • Check whether the Zones of the address objects for the remote sites is VPN.
    • Make sure Disable route when the interface is disconnected is checked is enabled.
    • Check whether LAN > VPN and VPN > LAN access rules have been auto-added. If not added, create them manually.
    • Make sure there are no conflicting deny rules in the Access Rules.
    • Check whether the Source of each route, across all sites, contains the local subnet as well as one of the remote sites. For eg. a route to reach Site C should have in its Source the local subnet and Site B network.
    • Do a packet capture to see where the packet is dropping.

    Related Articles

    • How to configure SSLVPN Tunnel all mode for one or more particular users (Local or Domain users)
    • How to disable TOTP for a Local User with admin privileges via CLI.
    • Parserror on Event logs.

    Categories

    • Firewalls > TZ Series
    • Firewalls > SonicWall NSA Series
    • Firewalls > SonicWall SuperMassive 9000 Series
    • Firewalls > SonicWall SuperMassive E10000 Series

    Not Finding Your Answers?

    ASK THE COMMUNITY

    Was This Article Helpful?

    YESNO

    Article Helpful Form

    Article Not Helpful Form

    Company
    • Careers
    • News
    • Leadership
    • Awards
    • Press Kit
    • Contact Us
    Popular resources
    • Communities
    • Blog
    • SonicWall Capture Labs

    Stay In Touch

    • By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. You can unsubscribe at any time from the Preference Center.
    • This field is for validation purposes and should be left unchanged.
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
    • Instagram

    © 2022 SonicWall. All Rights Reserved.

    • Legal
    • Privacy
    • English
    Scroll to top
    Trace:bc25ceab620983726ed9b9f9e3bc8474-80