Challenges in Automatic switching for Site-to-Site VPN Tunnels : Investigating Issues Post AWS Maintenance

0

I set up a site-to-site VPN connection between our on-premises network (PaloAlto) firewall and private sub in AWS. Initially, both tunnels were established, and the specified traffic flowed smoothly.

However, during routine maintenance by AWS, our VPN was temporarily affected. After the maintenance, although both tunnels showed as established and UP upon rechecking their status, the traffic did not balance between the tunnels.

I tested the option of manually forcing one tunnel to go down by adjusting the Dead Peer Detection (DPD) timeout parameter, which worked but is not the desired solution.

The automatic switch between the tunnels should occur, but it is not happening. What could be the cause of this issue?

1 Answer
0

Are you sing Static route based VPN or BGP? If you are using BGP then the failover/failback of the traffic between the Tunnels is handled by BGP, see below from the documentation

We recommend that you use BGP-capable devices, when available, because the BGP protocol offers robust liveness detection checks that can assist failover to the second VPN tunnel if the first tunnel goes down. Devices that don't support BGP may also perform health checks to assist failover to the second tunnel when needed.

If you are already using BGP but the failover of the traffic isn't working then opening a support ticket with PA and AWS is the best course of action.

profile pictureAWS
EXPERT
answered 5 months ago

You are not logged in. Log in to post an answer.

A good answer clearly answers the question and provides constructive feedback and encourages professional growth in the question asker.

Guidelines for Answering Questions