SD-WAN over SSLVPN bonding (OSPF)

VPN "bonding" is part of our SD-WAN deployment technique for connecting multiple remote sites to HQ/DC securely, over redundant WAN connections  at remote sites. It uses our CMG at hub end as VPN concentrator, and HSA at each remote end.

There're three main options for achieving VPN "bonding", depending on the exact requirements.

In this section, we focus on VPN bonding using OSPF, for large deployment scenario. We will have a separate topic on VPN bonding with LACP.

In this design, we're using HSA with dual LTE/SIM to provide multiple WAN connections to tunnel to the hub CMG. Then build VPN tunnel across each LTE connection. But in real live deployment, we can also have different WAN connections (eg. MPLS, Fiber, PPPoE) to the HSA WAN port.

A few key points to NOTE:

NOTE:


CLI CONFIG ON CMG (VPN Server)

-------------------------------------------------

!mbox# show running-config !hostname mbox!interface eth0 description "to ISP" enable ip address 118.189.158.34/29!interface eth1 enable bridge-group 0!interface eth2 enable bridge-group 0!interface bridge 0 description "to LAN" enable ip address 10.1.1.254/24 ip ospf priority 255 dhcp-server range 10.1.1.10 10.1.1.100!ip dhcp-server start!ip default-gateway 118.189.158.1!!VPN configsecurity sslvpn-server 1 server address 118.189.158.34 1443 server tap-mode tunnel-pool 11.1.1.0 255.255.255.0 tap ospf priority 255 client client hsa-test-cmgisp start!security sslvpn-server 2 server address 118.189.158.34 2443 server tap-mode tunnel-pool 12.1.1.0 255.255.255.0 tap ospf priority 255 client client hsa-test-cmgisp start!firewall-input 010 permit all tcp dport 1443firewall-input 011 permit all tcp dport 2443firewall-input 100 permit all ospf!firewall-access 20 permit all src 10.1.1.0/24 remark "intranet traffic"firewall-access 21 permit all dst 10.1.1.0/24 remark "intranet traffic"!!Dynamic routing configip access-list 10 permit 10.1.1.0 0.0.0.255        <--change this to map to your own LAN subnet!route-map HQ-LAN permit 10 match ip address 10!router ospf router-id 10.1.1.254 network 11.1.1.0/24 area 0 network 12.1.1.0/24 area 0 redistribute connected route-map HQ-LAN!

CLI CONFIG ON HSA (VPN Client, please remove any MWAN config)

-------------------------------------------------

(download complete sample HSA config here)


!mbox# show running-config !hostname mbox!ip route 0.0.0.0/0 nexthop lo distance 200 remark dummy-default!firewall-set 10 mark 1443 output tcp dport 1443 remark "mark tap1"firewall-set 11 mark 2443 output tcp dport 2443 remark "mark tap2"!ip pbr policy 10 fwmark 1443ip pbr policy 11 fwmark 2443!ip pbr route 10 0.0.0.0/0 nexthop interface 3g-lte0 remark "map tap1 to lte0"ip pbr route 11 0.0.0.0/0 nexthop interface 3g-lte1 remark "map tap2 to lte1"!security sslvpn-client 1 tap ospf priority 0track-host 11.1.1.1 1 tap1 start!security sslvpn-client 2 tap ospf priority 0track-host 12.1.1.1 1 tap2 start!ip access-list 30 permit 192.168.2.0 0.0.0.255 remark "match local LAN subnet"!route-map ATM-LAN permit 10 match ip address 30!router ospf network 11.1.1.0/24 area 0 network 12.1.1.0/24 area 0 redistribute connected route-map ATM-LAN!

NOTE: if you're using physical WAN interfaces instead of LTE interface, you need to add the nexthop IP of the interface, eg. 

!ip pbr route 11 0.0.0.0/0 nexthop 202.120.13.100 interface eth0ip pbr route 11 0.0.0.0/0 nexthop 100.20.33.3 interface br-vlan10

TROUBLESHOOTING COMMANDS-------------------------------------------------show ip interfaceshow ip ospf neighborshow ip ospf interfaceshow ip route ospftcpdump interface tap1tcpdump interface tap2