This use case illustrates how GlobalProtect
LSVPN securely connects distributed office locations with primary
and disaster recovery data centers that house critical applications
for users and how internal border gateway protocol (iBGP) eases
deployment and upkeep. Using this method, you can extend up to 500
satellite offices connecting to a single gateway.
BGP is a
highly scalable, dynamic routing protocol that is ideal for hub-and-spoke
deployments such as LSVPN. As a dynamic routing protocol, it eliminates
much of the overhead associated with access routes (static routes)
by making it relatively easy to deploy additional satellite firewalls.
Due to its route filtering capabilities and features such as multiple
tunable timers, route dampening, and route refresh, BGP scales to
a much higher number of routing prefixes with greater stability
than other routing protocols like RIP and OSPF. In the case of iBGP,
a peer group, which includes all the satellites and gateways in
the LSVPN deployment, establishes adjacencies over the tunnel endpoints.
The protocol then implicitly takes control of route advertisements,
updates, and convergence.
In this example configuration, an
active/passive HA pair of PA-5200 firewalls is deployed in the primary
(active) data center and acts as the portal and primary gateway.
The disaster recovery data center also has two PA-5200s in an active/passive
HA pair acting as the backup LSVPN gateway. The portal and gateways
serve 500 PA-220s deployed as LSVPN satellites in branch offices.
Both
data center sites advertise routes but with different metrics. As
a result, the satellites prefer and install the active data center’s
routes. However, the backup routes also exist in the local routing
information base (RIB). If the active data center fails, the routes
advertised by that data center are removed and replaced with routes
from the disaster recovery data center’s routes. The failover time
depends on selection of iBGP times and routing convergence associated
with iBGP.
The
following workflow shows the steps for configuring this deployment:
Configure
the zones, interfaces, and IP addresses on each satellite. The interface
and local IP address will be different for each satellite. This
interface is used for the VPN connection to the portal and gateway.
The gateway uses the self-signed root certificate authority
(CA) to issue certificates for the satellites in a GlobalProtect
LSVPN. Because one firewall houses the portal and primary gateway,
a single certificate is used for authenticating to the satellites.
The same CA is used to generate a certificate for the backup gateway.
The CA generates certificates that pushed to the satellites from
the portal and then used by the satellites to authenticate to the
gateways.
You must also generate a certificate from the same
CA for the backup gateway, allowing it to authenticate with the
satellites.
Select NetworkGlobalProtectGateways and
click Add.
On the General tab, name the
primary gateway LSVPN-Scale.
Under Network Settings, select ethernet1/21 as
the primary gateway interface and enter 172.16.22.1/24 as
the IP address.
On the Authentication tab,
select the LSVPN-Scale certificate created in
3
.
Select SatelliteTunnel Settings and select Tunnel
Configuration. Set the Tunnel Interface to
tunnel.5. All satellites in this use case connect to a single gateway,
so a single satellite configuration is needed. Satellites are matched
based on their serial numbers, so no satellites will need to authenticate
as a user.
On SatelliteNetwork Settings, define the
pool of IP address to assign to the tunnel interface on the satellite
once the VPN connection is established. Because this use case uses
dynamic routing, the Access Routes setting remains blank.
Repeat steps 1 through 5 on the backup gateway with
the following settings:
Name: LSVPN-backup
Gateway interface: ethernet1/5
Gateway IP: 172.16.22.25/24
Server cert: LSVPN-backup-GW-cert
Tunnel interface: tunnel.1
Configure iBGP on the primary and backup gateways and
add a redistribution profile to allow the satellites to inject local
routes back to the gateways.
Each satellite office manages its own network and firewall,
so the redistribution profile called ToAllSat is configured to redistribute
local routes back to the GlobalProtect gateway.
Select NetworkVirtual Routers and Add a
virtual router.
On Router Settings, add the Name and Interface for
the virtual router.
On Redistribution Profile and
select Add.
Name the redistribution profile ToAllSat and
set the Priority to 1.
Set Redistribute to Redist.
Addethernet1/23 from
the Interface drop-down.
Click OK.
Select BGP on the Virtual Router
to configure BGP.
On BGPGeneral, select Enable.
Enter the gateway IP address as the Router ID (172.16.22.1)
and 1000 as the AS Number.
In the Options section, select Install Route.
On BGPPeer
Group, click Add a
peer group with all the satellites that will connect to the gateway.
On BGPRedist
Rules, Add the ToAllSat redistribution
profile you created previously.
Click OK.
Repeat steps 1 through 5 on the backup gateway using ethernet1/6 for
the redistribution profile.
Both data centers advertise their routes but with different
routing priorities to ensure that the active data center is the preferred
gateway.
Select NetworkGlobalProtectPortals and
click Add.
On General, enter LSVPN-Portal as
the portal name.
On Network Settings, select ethernet1/21 as
the Interface and select 172.16.22.1/24 as
the IP Address.
On the Authentication tab,
select the previously created primary gateway SSL/TLS Profile LSVPN-Scale from
the SSL/TLS Service Profile drop-down menu.
On the Satellite tab, Add a
satellite and Name it sat-config-1.
Set the Configuration Refresh Interval to 12.
On GlobalProtect SatelliteDevices, add the serial number
and hostname of each satellite device in the LSVPN.
On GlobalProtect SatelliteGateways, add the name and
IP address of each gateway. Set the routing priority of the primary
gateway to 1 and the backup gateway to 10 to ensure that the active
data center is the preferred gateway.
(Optional) Add a new site to the LSVPN deployment.
Select NetworkGlobalProtectPortalsGlobalProtect PortalSatellite
ConfigurationGlobalProtect SatelliteDevices to add the serial number
of the new satellite to the GlobalProtect portal.
Configure the IPSec tunnel on the satellite with the
GlobalProtect Portal IP address.
Select NetworkVirtual RouterBGPPeer Group to add the satellite
to the BGP Peer Group configuration on each gateway.
Select NetworkVirtual RouterBGPPeer Group to add the gateways
to the BGP Peer Group configuration on the new satellite.