Fortinet black logo
7.2.0

Verifying spoke-to-spoke ADVPN communication

Verifying spoke-to-spoke ADVPN communication

To verify spoke-to-spoke ADVPN communication:
  1. From Branch1, ping Branch2 (10.20.1.3):
    Branch1 # exec ping-options source 10.20.1.2
    Branch1 # exec ping 10.20.1.3
    PING 10.20.1.3 (10.20.1.3): 56 data bytes
    64 bytes from 10.20.1.3: icmp_seq=0 ttl=254 time=27.7 ms
    64 bytes from 10.20.1.3: icmp_seq=2 ttl=255 time=17.4 ms
    64 bytes from 10.20.1.3: icmp_seq=3 ttl=255 time=17.5 ms
    64 bytes from 10.20.1.3: icmp_seq=4 ttl=255 time=17.4 ms
    
    --- 10.20.1.3 ping statistics ---
    5 packets transmitted, 4 packets received, 20% packet loss
    round-trip min/avg/max = 17.4/20.0/27.7 ms
  2. Verify the IPsec tunnel summary.
    • In the CLI, enter the following:

      Branch1 # get vpn ipsec tunnel summary
      'fabric_vpn_1_0' 10.198.3.2:0  selectors(total,up): 1/1  rx(pkt,err): 25/0  tx(pkt,err): 26/2
      'fabric_vpn_1' 10.198.5.2:0  selectors(total,up): 1/1  rx(pkt,err): 8032/0  tx(pkt,err): 8022/2
      'fabric_vpn_2' 10.198.6.2:0  selectors(total,up): 1/1  rx(pkt,err): 7462/0  tx(pkt,err): 7478/1

      The fabric_vpn_1_0 tunnel was created for spoke 1-to-spoke 2 communication.

    • In the GUI, go to Dashboard > Network and click the IPsec widget to expand it.

  3. Verify that the performance SLA was updated. Go to Network > SD-WAN and select the Performance SLAs tab.

    The first performance SLA, fabric_vpn_1, that corresponds to the spoke-to-hub VPN tunnel is shown as up. The second one, fabric_vpn_1 that corresponds to the spoke-to-spoke VPN tunnel (fabric_vpn_1_0) is shown as down since 10.20.1.1 is the IP address corresponding to the hub’s loopback interface that is not present on another spoke.

Verifying spoke-to-spoke ADVPN communication

To verify spoke-to-spoke ADVPN communication:
  1. From Branch1, ping Branch2 (10.20.1.3):
    Branch1 # exec ping-options source 10.20.1.2
    Branch1 # exec ping 10.20.1.3
    PING 10.20.1.3 (10.20.1.3): 56 data bytes
    64 bytes from 10.20.1.3: icmp_seq=0 ttl=254 time=27.7 ms
    64 bytes from 10.20.1.3: icmp_seq=2 ttl=255 time=17.4 ms
    64 bytes from 10.20.1.3: icmp_seq=3 ttl=255 time=17.5 ms
    64 bytes from 10.20.1.3: icmp_seq=4 ttl=255 time=17.4 ms
    
    --- 10.20.1.3 ping statistics ---
    5 packets transmitted, 4 packets received, 20% packet loss
    round-trip min/avg/max = 17.4/20.0/27.7 ms
  2. Verify the IPsec tunnel summary.
    • In the CLI, enter the following:

      Branch1 # get vpn ipsec tunnel summary
      'fabric_vpn_1_0' 10.198.3.2:0  selectors(total,up): 1/1  rx(pkt,err): 25/0  tx(pkt,err): 26/2
      'fabric_vpn_1' 10.198.5.2:0  selectors(total,up): 1/1  rx(pkt,err): 8032/0  tx(pkt,err): 8022/2
      'fabric_vpn_2' 10.198.6.2:0  selectors(total,up): 1/1  rx(pkt,err): 7462/0  tx(pkt,err): 7478/1

      The fabric_vpn_1_0 tunnel was created for spoke 1-to-spoke 2 communication.

    • In the GUI, go to Dashboard > Network and click the IPsec widget to expand it.

  3. Verify that the performance SLA was updated. Go to Network > SD-WAN and select the Performance SLAs tab.

    The first performance SLA, fabric_vpn_1, that corresponds to the spoke-to-hub VPN tunnel is shown as up. The second one, fabric_vpn_1 that corresponds to the spoke-to-spoke VPN tunnel (fabric_vpn_1_0) is shown as down since 10.20.1.1 is the IP address corresponding to the hub’s loopback interface that is not present on another spoke.