AWS Site to Site VPN with Cisco FTD


We are trying to create a VPN tunnel between our VPC and a customer running a Cisco FTD appliance. He is stating that Cisco doesn't recommend running two tunnels in wither Active\Active or Active\Passive. Not sure if the customer just isnt familiar enough with this device or... From what Ive read, it looks like it does support Active\Passive configuration to AWS. When he does get both tunnels working, it will only route out the initial one. I shut down the working tunnel and the redundant tunnel fails to route traffic either way. Does anyone have any experience with this? Thank you in advance.

asked 7 months ago783 views
1 Answer

Hi TJ,

Going by Cisco FTD documentation:

If you have chosen point-to-point topology and only IKEv1, you can configure backup peer by entering the primary IP address and backup peer IP addresses separated by a comma.

Cisco documentation does not specify if IKEv2 can have a backup peer. Possible it is not supported.

Assuming you are using IKEv1 in active/passive mode, could you let us know what you see on the AWS side when you shut down tunnel 1 on Cisco?

  1. Does the aws tunnel 1 go down and tunnel 2 come UP? If Tunnel does not come UP, try enabling AWS Site-to-Site VPN logs and check for error messages :
  2. If Tunnel 2 does come UP. Monitor the CloudWatch metrics for "TunnelDataIN" and "TunnelDataOut" for both tunnels when you perform the failover. Do you see traffic in either direction?

Feel free to respond and ask any additional clarifying questions and we'd be happy to answer.

profile pictureAWS
answered 7 months ago

You are not logged in. Log in to post an answer.

A good answer clearly answers the question and provides constructive feedback and encourages professional growth in the question asker.

Guidelines for Answering Questions