RE: OT: VPN redundancy

From: Mark Lewis (markl11@hotmail.com)
Date: Wed Apr 05 2006 - 19:36:44 GMT-3


Hi,

From your question it seems that you have a good idea of the various
alternatives as far as IPsec VPN redundancy/high availability are concerned!
I havent read the whole thread, so I hope that I am not just repeating what
has already been discussed :)

You didnt specify whether it you are considering redundancy for a
site-to-site or a remote access VPN, but it seems that it is a site-to-site
VPN. There are several approaches to ensuring high availability for
site-to-site VPNs, the two most popular of which are, as you mention,
configuring high availability with HSRP and configuring high availability
with GRE.

When provisioning high availability at a hub site with HSRP, an HSRP group
is configured between redundant central site IPsec gateways. Traffic from
remote routers can then be forwarded to the virtual IP (and MAC) address,
and as long as one of the routers in the central site HSRP group is in an up
state, traffic continues to be forwarded.

You can configure either stateless or stateful IPsec high availability with
HSRP. When the central site IPsec gateways are configured for stateless
IPsec high availability, no IPsec state information is replicated from the
active HSRP peer to the standby HSRP peer. This means that if the existing
active HSRP router (which maintains the IPsec SAs in its SADB) fails, remote
IPsec gateways detect the failure via IKE (ISAKMP) keepalives and
re-initiate IKE negotiation with the new active HSRP peer.
The renegotiation of SAs does mean that some user traffic is dropped. The
failover time and associated amount of user traffic dropped depends, to a
great extent, on the HSRP holdtime (the amount of time before the standby
HSRP peer becomes active) and the IKE keepalive interval.
Stateless IPsec high availability can be configured in two ways, stateless
IPsec high availability with reverse route injection (RRI), or stateless
IPsec high availability with HSRP on the inside interface.

Stateless IPsec high availability is fine if you can tolerate losing a
certain amount of user traffic as IKE is renegotiated when the (previously)
active HSRP router fails. But, if you cannot or do not want to tolerate this
loss of user traffic, the solution is stateful IPsec high availability. When
using stateful IPsec high availability, IPsec state, including IKE and IPsec
SAs, is replicated to the standby HSRP peer, and so failover is
instantaneous, and little or no user traffic is lost.

Failover with IPsec state replication is achieved via the stateful
switchover (SSO) mechanism or using the State Synchronization Protocol
(SSP). SSP was intended to provide stateful failover for IPsec only, whereas
SSO can provide stateful failover for a number of protocols, including
IPsec. SSO is the preferred method of provisioning IPsec high availability.

An alternative method of provisioning high availability for IPsec VPNs is to
use GRE tunnels. High availability for IPsec VPNs using GRE can be
provisioned in two ways, using point-to-point GRE tunnels, or using
multipoint GRE tunnels (with DMVPN).

One advantage of using GRE/IPsec tunnels for high availability is that
GRE/IPsec tunnels can be used to provide high availability where hub site
gateways are co-located or when hub site gateways are located at
geographically dispersed sites.

Point-to-point GRE/IPsec tunnels can work well as a solution for providing
high availability in an IPsec VPN, but the use of point-to-point GRE/IPsec
tunnels does not scale well (because of the amount of hub site configuration
required). A more scalable solution for high availability with GRE/IPsec is
to use DMVPN. In this case, the hub site gateways are configured with
multipoint GRE (mGRE) interfaces, and the spoke site gateways are configured
with either point-to-point GRE or mGRE interfaces.
There are two ways to configure DMVPN for high availability: the gateways
are connected over one DMVPN, or the gateways are connected over two DMVPNs.
The advantage of using two DMVPNs is that control of user traffic is easier
than when using a single DMVPN for high availability.

Finally, just in case you really wanted to know about remote access VPN
redundancy/high availability (!), there are thee basic methods of
provisioning high availability for IPsec remote access VPNs: load balancing
of IPsec remote access VPN connections over a number of VPN gateways at the
same central site (using a cluster of VPN gateways), failover between a
number of VPN gateways at the same central site using the Virtual Router
Redundancy Protocol (VRRP), or the use of backup VPN gateways (servers) at
geographically dispersed sites.

As far as using ASA 5500s for VPNs is concerned, they can do a pretty good
job as site-to-site VPN gateways, but it they are really positioned as
remote access VPN gateways. For site-to-site VPNs, IOS routers can generally
give you more flexibility.

HTH,

Mark

CCIE#6280 / CCSI#21051 / JNCIS#121 / etc.

Author:

www.ciscopress.com/title/1587051796

www.ciscopress.com/title/1587051044

>From: "Guyler, Rik" <rguyler@shp-dayton.org>
>Reply-To: "Guyler, Rik" <rguyler@shp-dayton.org>
>To: "'ccielab@groupstudy.com'" <ccielab@groupstudy.com>
>Subject: OT: VPN redundancy
>Date: Wed, 5 Apr 2006 09:28:30 -0400
>
>I currently have a 3660 router that terminates nearly 25 vendor VPN
>tunnels.
>These tunnels are considered mission critical to our hospital operations
>and
>so an outage of much duration would be a hardship. Even with a 4-hour
>SmartNet it could take several hours to get this back up and running.
>
>I'm looking at various redundant setups so I could lose this router and
>still maintain connectivity. Here are the options I have considered so far
>in order of preference:
>
>1) add a second router and setup HSRP/VRRP on both the inside and outside
>interfaces and terminate the tunnels to the virtual address on the outside.
>
>2) setup a pair of ASA5500s and setup failover
>
>3) setup a second router and build secondary tunnels to each vendor
>
>I like the sound of number one the best but not sure if it will work. I'll
>lab it up to verify that unless somebody can say for sure it won't work. I
>really don't want to move over to the ASA boxes...I just love VPN on
>routers. Secondary tunnels would require a lot of work and time so that's
>really the last option.
>
>Does anybody know of any other possible solutions to throw in the mix?
>Even
>some outrageous ideas might be fun to try and who knows...might just work.
>I'm open to any ideas or suggestions at this point!
>
>Thanks!
>
>Rik
>
>_______________________________________________________________________
>Subscription information may be found at:
>http://www.groupstudy.com/list/CCIELab.html



This archive was generated by hypermail 2.1.4 : Mon May 01 2006 - 11:41:56 GMT-3