[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]

Configuring the Remote Address and Backup Remote Address

To specify the remote address to which the IPSec traffic is directed, include the remote-gateway statement at the [edit services ipsec-vpn rule rule-name term term-name then] hierarchy level:

remote-gateway address;

To specify a backup remote address, include the backup-remote-gateway statement at the [edit services ipsec-vpn rule rule-name term term-name then] hierarchy level:

backup-remote-gateway address;

These two statements support both IPv4 and IPv6 address formats.

Configuring the backup-remote-gateway statement enables the dead peer detection (DPD) protocol, which monitors the tunnel state and remote peer availability. When the primary tunnel defined by the remote-gateway statement is active, the backup tunnel is in standby mode. If the DPD protocol determines that the primary remote gateway address is no longer reachable, a new tunnel is established to the backup address.

Note: Configuration of the backup-remote-gateway statement is not supported on J-series Services Routers. These routers cannot send DPD Hello messages but can respond to Hello messages sent by the peer.

If there is no incoming traffic from a peer during a defined interval of 10 seconds, the router detects a tunnel as inactive. A global timer polls all tunnels every 10 seconds and the Adaptive Services (AS) or MultiServices Physical Interface Card (PIC) sends a message listing any inactive tunnels. If a tunnel becomes inactive, the router takes the following steps to failover to the backup address:

  1. The adaptive services message triggers the DPD protocol to send a hello message to the peer.
  2. If no acknowledgment is received, two retries are sent at 2-second intervals, and then the tunnel is declared dead.
  3. Failover takes place if the tunnel is declared dead or there is an IPSec Phase 1 negotiation timeout. The primary tunnel is put in standby mode and the backup becomes active.
  4. If the negotiation to the backup tunnel times out, the router switches back to the primary tunnel. If both peers are down, it tries the failover six times. It then stops failing over and reverts to the original configuration, with the primary tunnel active and the backup in standby mode.

You can also enable triggering of DPD Hello messages without configuring a backup remote gateway by including the initiate-dead-peer-detection statement at the [edit services ipsec-vpn rule rule-name term term-name then] hierarchy level:

initiate-dead-peer-detection;

The monitoring behavior is the same as described for the backup-remote-gateway statement. This configuration enables the router to initiate DPD Hellos when a backup IPSec gateway does not exist and clean up the IKE and IPSec SAs in case the IKE peer is not reachable.

If the DPD protocol determines that the primary remote gateway address is no longer reachable, a new tunnel is established to the backup address. However, when you configure initiate-dead-peer-detection without a backup remote gateway address and the DPD protocol determines that the primary remote gateway address is no longer reachable, the tunnel is declared dead and IKE and IPSec SAs are cleaned up.

For more information on the DPD protocol, see RFC 3706, A Traffic-Based Method of Detecting Dead Internet Key Exchange (IKE) Peers.


[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]