
To view the discussion, please refer to the following link: Using Loopback interfaces for a site-to-site IPSEC VPNĪll comments or suggestions are encouraged. Route the appropriate subnets into the tunnel on either side by adding a route:

(optional) Step 3 - Create a Static Route using Named Address with Destination (loopback. (testing in Step 6) Step 2 - Create an Address object for your Loopback Interface IP. Lastly, the IPSec Tunnel object can be created without any special configuration: Step 1 - Create your Loopback Interface and assign it the IP of your choice, apply WAN role and allow PING temporarily to be sure you can reach the interface from outside. Peer identification on the remote end is required, as the host receives the loopback's private IP as an identification parameter, but the physical IP address is different due to the NAT configurtion. Set the remote peer's configuration for a dynamic peer, including NAT-T:

The local IKE gateway can be configured as usual with a static remote peer. To accomplish this, the following command is important to instruct the router to treat the loopback address as the VPN endpoint. To allow the loopback interface to make outbound and receive inbound VPN connections, create appropriate NAT rules:Īnd create appropriate security policy to allow the loopback interface to communicate with ipsec peers and the tunnel interface to connect to internal resouces 'Because the public IP is defined in the loopback interface, it must be our VPN endpoint. The tunnel interface is set to the vpn-int zone: In this example, the loopback interface is set to private IP 10.2.2.2 in the vpn-ext zone: The tunnel interface should be in a different zone, allowing for more granular security policies for sessions inside the tunnel.īelow, I'll highlight a less common implementation of performing NAT on an internal loopback in a different zone, to highlight some requirements: This setup allows for a seamless configuration, nearly identical to configuring the VPN on the external interface. The recommended configuration is to make sure the loopback IP address in the same subnet as the external interface. VPN Tunnel Traffic Encapsulation Incrementing but no Decaps

Refer: ESP packets dropped with error cannot handle IPv4 host bound ESP/AH packet"" The loopback interface must be in the same zone as the external interface (usually referred to as the untrust zone), if not the tunnel traffic would not work, as ESP packets would be dropped. A common use case is the need to set the VPN interface to an alternate IP address than the external interface. In this week's Discussion of the Week, we highlight a question posed by user 'merrick' about using a loopback interface in a site-to-site VPN configuration.Īlthough configuring a site-to-site VPN on a loopback interface introduces additional complexity, some situations may merit its use. A loopback interface is a logical interface that is always up (no physical link dependency) and the attached subnet is always present in the routing table.
