I have 2 site-site VPN tunnels going out to AWS, but I can't seem to force a failover to make sure redundancy is working. We have a cluster of 2 19100 appliances, so I know redundancy would work if we lost a gateway, but for some reason the steps I have taken to force a failover for the tunnels doesn't seem to work. I have performed the following:
- Logged into GAIA and disabled the vti interface (vpnt2 in this case) and pushed policy
- When logged into the active gateway and looking at the tunnel list, I still see the tunnel associated with the vti interface I had disabled still showing connected
- After deleting the SA's for the gateway on the AWS end of this tunnel, it still showed connected, no matter how many times I performed those actions
The vendor on the AWS end said the tunnel never went down, and they were seeing traffic flowing in and out of their server, so that attempt was a bust. I then got CP on a conference call with us and the ONLY way we could get it to "fail over" was to remove the gateway that is associated with the vti from the community. However, the same symptoms were still present (i.e the tunnel still showing connected, etc), but it was when the tunnel negotiation timer ran out that it FINALLY showed disconnected (after pushing policy the AWS side finally went down, but it took approximately 60ish seconds). When we ran fw monitor, we saw that traffic on our end was still trying to send things out the tunnel that was apparently down, so it just broke things, and we had to revert back.
TLDR: Am I missing something here?
Here is my configuration:
- Cluster of 2 19100 CheckPoint appliances running R81.20 with JHF 76
- 2 vti interfaces pointing to their respective AWS gateways, using addressing provided by AWS
- A star community consisting of our cluster as the satellite gateway and the 2 AWS gateways as the center
- Both AWS gateways set with empty groups to facilitate the routed based configuration (instructions provided by AWS and CP TAC)
- Static routes set on both vti's using a priority of 1 and 2 for each gateway (1 being the primary tunnel and 2 being the secondary) so the gateways know which vti to "prefer" to send traffic out
- Directional rules set up in Smart Console to allow the traffic that is to be accepted
The site-site VPN IS working, I just can't seem to perform a forced fail over to go from one tunnel to the other.
Any thoughts? Am I missing anything? Let me know if I need to show or explain anything further. Thanks all!