Challenges in Automatic switching for Site-to-Site VPN Tunnels : Investigating Issues Post AWS Maintenance

0

I set up a site-to-site VPN connection between our on-premises network (PaloAlto) firewall and private sub in AWS. Initially, both tunnels were established, and the specified traffic flowed smoothly.

However, during routine maintenance by AWS, our VPN was temporarily affected. After the maintenance, although both tunnels showed as established and UP upon rechecking their status, the traffic did not balance between the tunnels.

I tested the option of manually forcing one tunnel to go down by adjusting the Dead Peer Detection (DPD) timeout parameter, which worked but is not the desired solution.

The automatic switch between the tunnels should occur, but it is not happening. What could be the cause of this issue?

已提問 5 個月前檢視次數 125 次
1 個回答
0

Are you sing Static route based VPN or BGP? If you are using BGP then the failover/failback of the traffic between the Tunnels is handled by BGP, see below from the documentation

We recommend that you use BGP-capable devices, when available, because the BGP protocol offers robust liveness detection checks that can assist failover to the second VPN tunnel if the first tunnel goes down. Devices that don't support BGP may also perform health checks to assist failover to the second tunnel when needed.

If you are already using BGP but the failover of the traffic isn't working then opening a support ticket with PA and AWS is the best course of action.

profile pictureAWS
專家
已回答 5 個月前

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。

回答問題指南