How To Configure BGP Routing Over IPsec VPN
How To Configure BGP Routing Over IPsec VPN
Follow the instructions in this article to configure the BGP service with an intermediary /30 network
between a local and remote VPN gateway. The BGP service uses the IPsec tunnel to dynamically learn
the routes of the remote network. You must configure both the local and remote NG Firewalls.
In this article:
Before you configure BGP over an IPsec VPN, obtain the following:
1. Open the VPN Settings page (Config > Full Config > Box > Virtual Servers > your
virtual server > Assigned Services > VPN -Service).
2. Click Lock.
3. In the Settings tab, click the Click here for Server Settings link.
4. In the Server Settings window, click the Advanced tab.
5. Next to the VPN Next Hop Interface Configuration table, click Add.
Click OK. The VPN next hop interface is listed in the VPN Next Hop Interface
Configuration table.
7. Click OK.
8. Click Send Changes and Activate.
Add the IP address of the virtual interface to the list of IP addresses that the virtual server listens on.
1. Open the Server Properties page (Config > Full Config > Box > Virtual Servers > your
virtual server > Server Properties).
2. Click Lock.
3. In the Additional IP table, add the intermediary VPN IP address of the local VPN interface.
E.g., 192.168.22.1 for the local NG Firewall or 192.168.22.2 for the remote NG Firewall
4. Click Send Changes and Activate.
Configure a site-to-site VPN IPsec tunnel including the VPN next hop interface.
1. Open the Site to Site page (Config > Full Config > Box > Virtual Servers > your
virtual server > Assigned Services > VPN-Service > Site to Site).
2. Click Lock.
3. Click the IPSEC Tunnels tab.
4. Right-click the table under the IPSEC Tunnels tab and then select New IPsec tunnel.
5. In the IPsec Tunnel window:
5. Click OK.
6. Click Send Changes and Activate.
Enable and configure the BGP service. Configure the remote VPN interface IP address as a BGP
neighbor to dynamically learn the routes of the neighboring network.
You can either enter the networks you want to propagate manually or set the Advertise Route
parameter to yes for routes you want propagated.
1. Open the Network page (Config > Full Config > Box).
2. Click Lock.
3. To propagate the management network, set Advertise Route to yes in the Management IP
and Network section.
1. Open the OSPF/RIP/BGP Settings page (Config > Full Config > Box > Virtual Servers
> your virtual server > Assigned Services > OSPF-RIP-BGP-Service).
2. Set Run BGP Router to Yes.
3. (optional)To learn routes from the remote ASN set Operation Mode to advertise-learn.
4. Enter the Router ID. Typically the local VPN next hop interface IP address is used. E.g.,
192.168.22.2 for the local NG Firewall 192.168.22.1 for the remote NG Firewall.
8. To propagate the directly attached and gateway routes configured in Step 1 set Connected
Routes to yes.
To dynamically learn the routing of the neighboring network, set up a BGP neighbor for the remote
VPN next hop interface.
1. In the left menu of the OSPF/RIP/BGP Settings page, click Neighbor Setup IPv4.
2. Click Lock.
3. Next to the Neighbors table, click the plus sign (+) to add a new neighbor.
4. Enter a Name for the neighbor and click OK. The Neighbors window opens.
5. Configure the following settings in the Usage and IP section:
Neighbor IPv4: Enter the remote address for the VPN next hop interface. E.g.,
192.168.22.2 for the local NG Firewall 192.168.22.1 for the remote NG Firewall.
OSPF Routing Protocol Usage: Select no.
RIP Routing Protocol Usage: Select no.
BGP Routing Protocol Usage: Select yes.
6. In the BGP Parameters section, configure the following settings:
AS Number: Enter the ASN for the remote network. E.g., 64579 for the local NG Firewall
64577 for the remote NG Firewall.
Update Source: Select Interface.
Update Source Interface: Enter the VPN next hop interface in the format:
vpnr<interface number>. E.g., vpnr13
7. Click OK.
8. Click Send Changes and Activate.
On the Control > Network page, verify that BGP routes are learned. Click the BGP tab and expand
the relevant AS tree. It can take up to three minutes for new routes to be learned.
Figures
1. BGPOverIPsecVPN.png
2. ipsec_bgp00.png
3. ipsec_bgp01.png
4. ipsec_bgp02.png
5. ipsec_bgp03.png
6. tina_bgp06d.png
7. tina_bgp06c.png
8. ipsec-bgp04.png
9. tina_bgp06a.png
10. tina_bgp06e.png
11. tina_bgp06b.png
12. ipsec_bgp06.png
13. ipsec-bgp07.png
14. ipsec-bgp08.png
© Barracuda Networks Inc., 2023 The information contained within this document is confidential and proprietary to Barracuda Networks Inc. No
portion of this document may be copied, distributed, publicized or used for other than internal documentary purposes without the written consent of
an official representative of Barracuda Networks Inc. All specifications are subject to change without notice. Barracuda Networks Inc. assumes no
responsibility for any inaccuracies in this document. Barracuda Networks Inc. reserves the right to change, modify, transfer, or otherwise revise this
publication without notice.