Description: This document describes how to configure a vpn load balancer operating two VPN connections that are divided between two WAN connections, as required by the load. This configuration example is adaptable for more than two WAN connections.
Requirements: Scenario: - A link is to be established between a branch office and the headquarters based on two IKEv2 site-to-site VPN connections using VPN load balancing to spread the load of the data traffic between them.
- The branch office has two WAN connections, which should be used for WAN load balancing and also for VPN load balancing.
- All of the LANCOM routers in the following scenarios have at least a basic configuration and can be reached in their respective LAN (or via the WAN).
- The required WAN connections are already operational at both ends.
Procedure: 1) Configuring IKEv2 connections and VPN load balancing on the branch office router: 1.1) Open the Setup Wizard on the LANCOM router at the branch office and select
Connect two local area networks (VPN).
1.2) In the next dialog, select the
exchange mode IKEv2.
1.3) In this example, we
do not use IPSec-over-HTTPS.
1.4) In the next dialog, enter the
name of the
LANCOM router at the remote site. In this example it is
HEADQUARTER.
1.5) To establish an encrypted VPN connection, we need an identity that is known to both sites.
In this example, the
identity is the e-mail address
office@company.com.
1.6) Create
passwords for the local and the remote identity. 1.7) Since the
LANCOM router at the branch office should establish the VPN connection to the headquarters, you need to
choose the upper option.
1.8) The
gateway needs to be set to the
public IP address (or the DNS name) of the LANCOM router at the headquarters.
Because the local network in the
headquarters has the address range 192.168.100.0/24, this need to be entered into the fields
Address and
Netmask.
1.9) Click on
Finish to close the Wizard and write the configuration back to the LANCOM router.
1.10) Open the configuration for the LANCOM router, switch to the menu item
IP router -> Routing and
enable load balancing.
1.11) Create a
new entry for WAN load balancing with the name
LB_WAN and
two WAN remote sites INTERNET and INTERNET2.
1.12) Navigate to the menu
IP router -> Routing -> IPv4 routing table.
- Configure the default routes for the two Internet connections and the WAN load balancer as shown in the following figure
Each of the two Internet connections receives its own routing tag in order to bind a VPN tunnel to an Internet connection.
1.13) Switch to the menu
VPN -> IKEv2/IPSec -> Authentication.
- Select the entry for the headquarters and click on Copy.
- Change the name of the new entry to HEADQUARTER_2, for example.
- Change the e-mail address of local and remote identities to office_2@company.com.
1.14) Switch to the menu
VPN -> IKEv2/IPSec -> Connection list.
- Choose the entry for the headquarters.
- Set the routing tag to 1 (routing tag of the first WAN connection, see step 1.12).
- Close the dialog with OK.
- Select the entry for the headquarters and click on Copy.
- Change the name of the new entry to HEADQUARTER_2, for example.
- Set the routing tag to 2 (routing tag of the second WAN connection, see step 1.12).
- Switch the Authentication to the entry HEADQUARTER_2 (see step 1.13).
1.15) The entries in the connection list must then be configured as shown in the
following figure. 1.16) Navigate to the menu
IP Router -> Routing -> Load balancing and create a new entry with the name
LB_HEADQUARTER and the
two IKEv2 VPN remote sites HEADQUARTER and HEADQUARTER_2.
1.17) Navigate to the menu
IP router -> Routing -> IPv4 routing table.
- Select the entry for the Headquarters and click on Edit.
- Select the load balancer remote site LB_HEADQUARTER.
- Switch IP masquerading off.
- Close the dialog with OK.
- Select the entry for the Headquarters and click on Copy.
- Assign a previously unused routing tag.
- Select the VPN remote site HEADQUARTER.
- Switch IP masquerading off.
- Close the dialog with OK.
- Select the entry for the Headquarters again and click on Copy.
- Assign a previously unused routing tag.
- Select the VPN remote site HEADQUARTER_2.
- Switch IP masquerading off.
- Close the dialog with OK.
1.18) Close the dialog with
OK and
write the configuration back to the LANCOM router.
2) Configuring IKEv2 connections and VPN load balancing on the router at the headquarters: 2.1) Open the Setup Wizard on the LANCOM router at the headquarters and select
Connect two local area networks (VPN).
2.2) In the next dialog, select the
exchange mode IKEv2.
2.3) In this example, we
do not use IPSec-over-HTTPS.
2.4) In the next dialog, enter the
name of the
LANCOM router at the remote site. In this example it is
OFFICE.
2.5) To establish an encrypted VPN connection, we need an identity that is known to both sites.
In this example, the
identity is set to the e-mail address
office@company.com (this identity must match the one specified in step 1.5).
2.6) Create
passwords for the local and the remote identity. These must match the passwords set in step 1.6).
2.7) Since the
LANCOM router at the headquarters should receive the VPN connection from the branch office, you need to
choose the lower option.
2.8) The
gateway needs to be set to the
public IP address (or the DNS name) of the first WAN connection at the branch office.
Note: - This configuration example uses
fixed public IP addresses at the branch office- . How to set up the VPN connection
when the branch office uses dynamic IP addresses- is described in the following Knowledge Base article
Because the local network in the
branch office has the address range 192.168.99.0/24, this needs to be entered into the fields
Address and
Netmask.
2.9) Click on
Finish to close the Wizard and write the configuration back to the LANCOM router.
2.10) Open the the LANCOM router configuration and navigate to
VPN -> IKEv2/IPSec -> Authentication. - Select the entry for the branch office and click on Copy.
- Change the name of the new entry to OFFICE_2, for example.
- Change the e-mail address of local and remote identities to office_2@company.com. The e-mail address entered here must match the address given in step 1.13.
2.11) The authentication rules must then be configured as shown in the
following figure. 2.12) Switch to the menu
VPN -> IKEv2/IPSec -> Connection list.
- Select the entry for the branch office and click on Copy.
- Change the name of the new entry to OFFICE_2, for example.
- Set the remote gateway to the public IP address (or the DNS name) of the second WAN connection of the LANCOM router at the branch office. If the branch office uses dynamic public IP addresses this field must be left blank.
- Switch the Authentication to the entry OFFICE_2 (see step 2.10).
2.13) The entries in the connection list must then be configured as shown in the
following figure. 2.14) Navigate to the menu
IP router -> Routing and
enable the load balancing.
2.15) Create a new entry with the name
LB_OFFICE and the
two IKEv2 VPN remote stations OFFICE and OFFICE_2.
2.16) Navigate to the menu
IP router -> Routing -> IPv4 routing table.
- Select the entry for the branch office and click on Copy.
- Assign a previously unused routing tag.
- Select the VPN remote site OFFICE.
- Switch IP masquerading off.
- Close the dialog with OK.
- Select the entry for the office again and click on Copy.
- Assign a previously unused routing tag.
- Select the VPN remote site OFFICE_2.
- Switch IP masquerading off.
- Close the dialog with OK.
- Select the entry for the office again and click on Copy.
- Select the load balancer remote site LB_OFFICE.
- Switch IP masquerading off.
- Close the dialog with OK.
2.17) Close the dialog with
OK and
write the configuration back to the LANCOM router.
2.18)
This concludes the configuration.