ii.
Remote Network.
iii.
IPsec Algorithms.
iv.
Encapsulation Mode.
v.
PFS/DH Group.
vi.
Setup SA Per.
9.4.8. IPsec Tunnel Monitoring
Overview
An
IPsec Tunnel
object has some additional properties which, together, provide a feature called
tunnel monitoring
. This is used for checking the health of a tunnel and re-establishing it should a
problem be detected. When tunnel monitoring is enabled, the following happens:
•
A single external IPv4 address is specified in setting up the monitor and ICMP ping messages
are then sent once per second through the IPsec tunnel to this IP address. This happens
during the entire time the tunnel is established.
•
The source IP of these ICMP messages will be the value set for the
Originator IP
property of
the tunnel.
•
If a specified number of replies to consecutive ICMP ping messages are not received back, the
tunnel is assumed to be no longer operational and a new IPsec tunnel connection will be
automatically negotiated.
The tunnel monitor feature has similarities to the host monitoring described in
Section 4.2.3,
and shares the same underlying mechanism.
Tunnel Health Monitoring Alternatives
Tunnel monitoring is an efficient way of monitoring IPsec tunnel health but requires an external
host. However, it is preferable to using the
Auto Establish
option. Auto establish has the
disadvantage that it works at the IKE level and does not monitor the traffic flowing inside the
tunnel. There is no reason to use both tunnel monitoring and auto establish at the same time
and this should be avoided.
Dead peer detection (DPD) should not be disabled because tunnel monitoring is being used
(unless the external IPsec peer does not support DPD). DPD can work as a compliment to tunnel
monitoring if both are enabled.
Setting Up IPsec Tunnel Monitoring
The following steps are needed to set up monitoring for an
IPsec Tunnel
object:
•
Enable monitoring on the IPsec tunnel.
•
Specify a single IPv4 address as the host that should be accessible through the tunnel. The IP
address must always be part of the tunnel's remote network so no route needs to be added
for it. The host itself should be configured to respond to ICMP ping requests.
•
Optionally set the number of consecutive replies that are not received before the tunnel is
Chapter 9: VPN
721
Summary of Contents for NetDefendOS
Page 30: ...Figure 1 3 Packet Flow Schematic Part III Chapter 1 NetDefendOS Overview 30 ...
Page 32: ...Chapter 1 NetDefendOS Overview 32 ...
Page 144: ...Chapter 2 Management and Maintenance 144 ...
Page 284: ...Chapter 3 Fundamentals 284 ...
Page 392: ...Chapter 4 Routing 392 ...
Page 419: ... Host 2001 DB8 1 MAC 00 90 12 13 14 15 5 Click OK Chapter 5 DHCP Services 419 ...
Page 420: ...Chapter 5 DHCP Services 420 ...
Page 573: ...Chapter 6 Security Mechanisms 573 ...
Page 607: ...Chapter 7 Address Translation 607 ...
Page 666: ...Chapter 8 User Authentication 666 ...
Page 775: ...Chapter 9 VPN 775 ...
Page 819: ...Chapter 10 Traffic Management 819 ...
Page 842: ...Chapter 11 High Availability 842 ...
Page 866: ...Default Enabled Chapter 13 Advanced Settings 866 ...
Page 879: ...Chapter 13 Advanced Settings 879 ...