Consider a typical corporate network scenario where all the branch network traffic passes through a route-based VPN of the corporate network and diverges to the extranet, when required. Accessing the web-based applications that address day-to-day operations through the corporate network results in huge network expansion and maintenance costs. This example illustrates the PBR configuration procedure for direct internet access.
The following figure depicts the topology of a corporate network. The branch network is connected to the corporate network through a route-based VPN. Traditionally, the corporate threat
defense is configured to handle both the internal and external traffic of the branch office. With the PBR policy, the branch threat
defense is configured with a policy that routes specific traffic to the WAN network instead of the virtual tunnels. The rest of the traffic flows through the route-based VPN, as usual.
This example also illustrates the configuring of the WAN and the VTI interfaces with ECMP zones to achieve load balancing.
Before you begin
This example assumes that you have already configured WAN and VTI interfaces for the branch threat
defense in management center.
Procedure
Step 1
Configure policy based routing for the branch threat
defense, select the ingress interfaces:
Choose Devices > Device Management, and edit the threat
defense device.
Choose Routing > Policy Based Routing, and on the Policy Based Routing page, click Add.
In the Add Policy Based Route dialog box, select the interfaces (say, Inside 1, and Inside 2) from the Ingress Interface drop-down list.
Step 2
Specify the match criteria:
Click Add.
To define the match criteria, click the Add () button.
In New Extended Access List Object, enter the name for the ACL (say, DIA-FTD-Branch), and click Add.
In the Add Extended Access List Entry dialog box, choose the required web-based applications from the Application tab:
On the threat
defense, the application group in an ACL is configured as a network service group and each of the applications as a network service object.
Click Save.
Select DIA-FTD-Branch from the Match ACL drop-down list.
Step 3
Specify the egress interfaces:
From the Send To and Interface Ordering drop-down lists, choose Egress Interfaces, and Interface Priority respectively.
Under Available Interfaces, click the button against the respective interface names to add WAN1 and WAN2:
Click Save.
Step 4
Interface priority configuration:
You can set the priority value for the interfaces either in the Edit Physical Interface page, or in the Policy Based Routing page (Configure Interface Priority). In this example, the Edit Physical Interface method is described.
Choose Devices > Device Management, and edit the branch threat
defense.
Set the priority for the interfaces. Click Edit against the interface and enter the priority value:
Click Ok and Save.
Step 5
Create ECMP zones for load balancing:
In the Routing page, click ECMP.
To associate interfaces to the ECMP zone, click Add.
Select WAN1 and WAN 2 and create an ECMP zone—ECMP-WAN. Similarly, add VTI01 and VTI02 and create an ECMP zone—ECMP-VTI:
Step 6
Configure static routes for the zone interfaces for load balancing:
In the Routing page, click Static Route.
Click Add and specify the static routes for WAN1, WAN2, VTI01, and VTI02. Ensure that you specify the same metric value for the interfaces belonging to the same ECMP zones (Step 5):
Note
Ensure that the zone interfaces have the same destination address and metric, but different gateway addresses.
Step 7
Configure trusted DNS on the WAN objects of the branch threat
defense to ensure secured flow of traffic to the internet:
Choose Devices > Platform Settings, and create a DNS policy on the branch threat
defense.
To specify the trusted DNS, Edit the policy and click DNS.
To specify the DNS servers for the DNS resolution to be used by WAN objects, in the DNS Settings tab, provide the DNS server group details and select WAN from the interface objects.
Use the Trusted DNS Servers tab to provide specific DNS servers that you trust for the DNS resolution.
Step 8
Save and Deploy.
Any YouTube related access requests from the branch inside network INSIDE1 or INSIDE2 are routed to WAN1 or WAN2 as they would match the DIA-FTD-Branch ACL. Any other request, say google.com, are routed through VTI01 or VTI02 as configured in the Site to Site VPN Settings.
With the ECMP configured, the network traffic is seamlessly balanced.