Hello Stuart,

Wednesday, August 6, 2014, 8:01:21 AM, you wrote:

SH> On 2014-08-05, David Dahlberg <[email protected]> wrote:
>> I do not know enough of Cisco to be able to tell you whether or not 
>> one may cluster their routers/VPN gateways. But you have multiple
>> options to emulate the fallback behaviour that you described above.
>>
>> 1) Just configure two tunnels, to both Cisco gateways. Give one route(8)
>>  -priority, or use a dynamic routing protocol.
>>
>> 2) You may use ifstated or similar to monitor the gateways and tunnels 
>>  and switch over, when indicated.

SH> Note that for these methods you'll need to use some explicit encapsulation
SH> (for example, gif or gre) rather than using standard ipsec tunnels. On
SH> OpenBSD IPsec is flow-based and there is no option for route-based like
SH> various other vendors support.

  I couldn't directly manipulate IPSec related routing, but there is a way
to do it indirectly. The "narrower" route takes priority, so you can
slightly adjust one the tunnels. For example, if it goes from
192.168.1.0/24 to 10.0.0.0/8 you can make the primary one from
192.168.1.0/24 to 10.0.0.0/9 (and maybe the second primary to 10.128.0.0/9
if you really need it). Or you can make the secondary one from
192.168.0.0/23 to 10.0.0.0/8.
  If you make just two tunnels it will be redundant, but not very
responsive to a lost connection, because tunnels don't check themselves
very often (sometimes this is what you need). If you need something more
responsive you can play with phase 2 lifetimes (not sure if this is a good
idea) or have some watchdog process (ifstated?) to force phase 2
renegotiation if the connection is lost.

-- 
Best regards,
 Boris                            mailto:[email protected]

Reply via email to