- CheckMates
- :
- Products
- :
- Quantum
- :
- SD-WAN
- :
- Re: SD-WAN and symmetric return of packets from in...
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
SD-WAN and symmetric return of packets from inbound connections
In the list of limitations of SD-WAN, we see this:
"PMTR-104986: For inbound connections from the internet, SD-WAN does not support the symmetric return of packets through the same interface on which the connection was originally received, in case of multiple ISPs.
The return will be determined based on the OS routes."
That seems like a very basic limitation. and a step back since it is even supported in ISP redundancy, which was already a very archaic feature.
This means that differently from IPS redundancy, which returns packets through the same interface the connection was received, SD-WAN will route traffic through the prefered OS route. Thus, you cannot have a server published through more than one isp link and one inbound NAT rule for each isp link, it will only work through one link.
The methods I found to deal with this are:
- Lock the server through an ISP. No redundancy.
- Having 2 IP addresses configured in the server and NAT rules and PBR configured for each address. (A lot of extra work)
- Having 2 servers running this service. (Even more extra work!)
I'm interested to know how other people in this forum are dealing with this. Does everyone have load balancers for inbound connections? Am I missing something?
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi,
Indeed, this is basic limitation.
We already have the fix for it. So the return (s2c) packets will be routed back from the same ISP the connection (c2s) originally came through.
it should be merged into JHF that will be released in the next month or so for GAIA.
As a temp workaround:
If you need the redundancy to the server works as active/backup, you can just set two default routes on your GAIA with different priorities, with "IP Reachability Detection" configured (if you want to probe the line. Otherwise just with "ping on"). So once main line is dead, the active route would be the second ISP, and then the server would be accesible through it.
In case you need it to be accesible in parallel via multiple ISPs, i afraid only your PBR idea can work.
Let me know if you need further assistance,
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
i would like to update that the mentioned feature is now available on GAIA GWs from R81.20 JHF 79 that was released.
in order to enable this feature after installing this JHF:
until we will make it enabled by default, it's needed to edit (or create) the file: $FWDIR/conf/sdwan/sdwan_steering_params.json
and add this line to the file:
{ "sdw_default_symmetric_return_value" : true }
then restart the steering process:
sdwan_steering_stop;sdwan_steering_start
Thanks
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi,
Indeed, this is basic limitation.
We already have the fix for it. So the return (s2c) packets will be routed back from the same ISP the connection (c2s) originally came through.
it should be merged into JHF that will be released in the next month or so for GAIA.
As a temp workaround:
If you need the redundancy to the server works as active/backup, you can just set two default routes on your GAIA with different priorities, with "IP Reachability Detection" configured (if you want to probe the line. Otherwise just with "ping on"). So once main line is dead, the active route would be the second ISP, and then the server would be accesible through it.
In case you need it to be accesible in parallel via multiple ISPs, i afraid only your PBR idea can work.
Let me know if you need further assistance,
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Amir,
Thank you for the information. That's great news!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You are welcome
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
i would like to update that the mentioned feature is now available on GAIA GWs from R81.20 JHF 79 that was released.
in order to enable this feature after installing this JHF:
until we will make it enabled by default, it's needed to edit (or create) the file: $FWDIR/conf/sdwan/sdwan_steering_params.json
and add this line to the file:
{ "sdw_default_symmetric_return_value" : true }
then restart the steering process:
sdwan_steering_stop;sdwan_steering_start
Thanks
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Amir,
Thank you for the information!
I installed this JHF, but after that I'm unable to push the SD-WAN policy. It shows the following error:
“Failed to enforce new policy. Reason: Failed to lower support_fec flag(Return code: 10)”
Any ideas about what support_fec flag is?
I'm running a PoC of this feature, so I'm unable to open a ticket with TAC about this.
I'm aware that this take is ongoing and there might be issues.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
it's related to the new fec feature that also comes with that JHF.
This issue is currently under investigation. either open TAC or DM me to get updates on this.
Thanks
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Just to update everyone reading this thread:
We found an issue with GAIA GWs working in Kernel Space firewall (KSFW) on JHF 79 running SD-WAN.
The issue would result in a SD-WAN policy enforce failure with the following message:
“Failed to enforce new policy. Reason: Failed to lower support_fec flag(Return code: 10)”
If you have any GAIA GW with SD-WAN Enabled which running as Kernel space firewall (usually open servers, or cloud GWs), please avoid upgrading to JHF 79 for now until further notice.
We already have the HOTFIX for that which should be released very soon (probably tomorrow) as a HF or as a new JHF, and once it’s there I will send an update with the details.
Feel free to ask me here or on DM if needed.
Thanks,
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello,
The fix to the policy enforcement issue above ("Failed to lower support_fec flag") for Kernel Space Firewall mode, is now available in JHF 84 that was released today.
https://sc1.checkpoint.com/documents/Jumbo_HFA/R81.20/R81.20/Take_84.htm?tocpath=_____6
if for any reason, you need the fix as a small hotfix on top of JHF 79, please contact me directly.
Thanks
