Solved

Sonicwall filter ospf routes

Posted on 2013-12-22
6
1,391 Views
Last Modified: 2014-01-05
Hi all,
we are moving from old cisco router to new sonicwall devices.

We have multiple locations, connected via mpls, each location has it's own internet access. For routing through the mpls network ospf is used. With sonicwall (NSA-2400 and NSA-220, all 5.8.1, by the way) I check redistribute connected networks to distribute the lan at X0. But in this case the WAN-Network at X1 is also distributed.

Is there a way to filter routing information to or from ospf process, or say just redistribute connected LAN networks? With cisco we used distribute-list <acl> <in|out>

Kind regards
0
Comment
Question by:acbxyz
  • 4
  • 2
6 Comments
 
LVL 11

Expert Comment

by:Miftaul
ID: 39735354
Enable the multicast support under the SonicWALL Interface advanced configuration. OSPF needs musticast traffics to be traversed for ospf adjacency.
0
 
LVL 10

Author Comment

by:acbxyz
ID: 39735547
I activated it on both ends, but don't know how it changes things.

OSPF is up and running, the problem is it is running too good for me.
0
 
LVL 11

Expert Comment

by:Miftaul
ID: 39735890
Please check this Here
0
What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

 
LVL 10

Author Comment

by:acbxyz
ID: 39736708
I cannot reach my lab over christmas and will do more testing next year. My lab mpls emulating was used as spare part, so now I have only access to the main office sonicwall :-(

In my case it was this:
Tunnel created as in Route based VPN. See also my other question: http://www.experts-exchange.com/Networking/Security/Q_28322181.html#a39735045
ospf should only be used on X2, which is used for mpls on both ends.

If ospf is disabled: default route directs to gateway of each ISP. Main location has two of it, connected to VLAN-interfaces of X1. VPN tunnel goes up, everything is fine.

If ospf is enabled: default route still directs to gateway of each ISP, but the WAN address range is propagated by branch location sonicwall through MPLS to main location sonicwall. Since the subnet mask is more specific (0 <-> 29 in my lab) this route gets a higher priority, even so its metric is higher (20 <->110). It seems the VPN tunnel packages should be routed through X2 (MPLS) of both routers, which is prohibited through firewall and vpn bind option and thus the vpn tunnel gets disconnected.

No problem in an ordinary believe-in-failover scenario (mpls up, ospf routes active, workload routing ok / / mpls down, ospf routes vanish, vpn up, workload-routing ok). But we need the vpn tunnel up all the time.

The only way working seems to be a custom defined routing policy with source and destination defined as host ip directing to the gateway for each branch office and each ISP at the main office.
0
 
LVL 10

Accepted Solution

by:
acbxyz earned 0 total points
ID: 39736756
Think I found a solution here (german)
I must not check redistribute connected networks. Instead I have to define the X0 interface (LAN) as ospf passive.

I'll keep this thread open until I can test it a bit more.
0
 
LVL 10

Author Closing Comment

by:acbxyz
ID: 39757149
Not exactly what I wanted, but since no one provided a sonicwall-replacement for distribute-in and distribute-out acl it is at least working for us. Though the routing lists gets very full, the disturbing entries are not there any more since disabling redistribute connected networks on the mpls interface and enabling ospf passive service at the lan interface.
0

Featured Post

Live: Real-Time Solutions, Start Here

Receive instant 1:1 support from technology experts, using our real-time conversation and whiteboard interface. Your first 5 minutes are always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question