05-21-2024 09:25 AM
With using only FDM to manage a NGFW FTD device, has anyone been able to configure AS_PATH Prepending via the neighbor route-map policy?
I can configure this in the LINA Config tool (config t under system support diagnostic-cli), but as many are aware, any changes here are overwritten/reverted after any deployment through FDM.
router bgp 65000
**bleep**-family ipv4 unicast
neighbor 169.254.19.189 route-map BGP_Outbound_AS-PATH-Prepend_RouteMap out
neighbor 169.254.14.209 route-map BGP_Outbound_AS-PATH-Prepend_RouteMap out
!
I haven't found a way to configure this in the BGP Object under Routing.
For context, I need this for an AWS Site-to-Site VPN connection. This means using one NGFW FTD firewall, but terminating it to both AWS VPN tunnels. I use AS_PATH Prepend to influence how AWS routes to the on-premise network. Otherwise, the AWS connections recalculate routes
Thanks
Solved! Go to Solution.
05-21-2024 09:48 AM
05-24-2024 07:23 AM
To manage routing across redundant Site-to-Site VPN tunnels to AWS over VPN (using VTI interfaces on an FTD firewall, it's not intuitive. It’s buried deeply under a false flag of “filtering”.
First, to build the route-map in Advanced Configuration → Smart CLI → Objects.
First, add a Standard Access List to permit all subnets you wish to affect when advertised to the BGP neighbors across the VPNs. You only need to list the subnets to match, since DENY is implicit at the end.
Next, create a Policy List:
Above, you can see how AS_Path Prepending is applied using a route-map (BGP_Outbound_AS-PATH-Prepend_RouteMap and direction out). Note the neighbor referenced here is the BGP neighbor of the second VPN tunnel, not the first. This helps influence AWS to lower the priority of this VPN tunnel, instead preferring to route traffic over the first tunnel.
Obviously, only AWS Support can tell you if this is actually working, but it appears to in our work.
05-21-2024 09:48 AM
05-24-2024 07:23 AM
To manage routing across redundant Site-to-Site VPN tunnels to AWS over VPN (using VTI interfaces on an FTD firewall, it's not intuitive. It’s buried deeply under a false flag of “filtering”.
First, to build the route-map in Advanced Configuration → Smart CLI → Objects.
First, add a Standard Access List to permit all subnets you wish to affect when advertised to the BGP neighbors across the VPNs. You only need to list the subnets to match, since DENY is implicit at the end.
Next, create a Policy List:
Above, you can see how AS_Path Prepending is applied using a route-map (BGP_Outbound_AS-PATH-Prepend_RouteMap and direction out). Note the neighbor referenced here is the BGP neighbor of the second VPN tunnel, not the first. This helps influence AWS to lower the priority of this VPN tunnel, instead preferring to route traffic over the first tunnel.
Obviously, only AWS Support can tell you if this is actually working, but it appears to in our work.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide