HP VPN Firewall Appliances VPN Configuration Guide
51
# Display the tunnel entry information on Firewall A. The output shows that no tunnel entry exists.
[FirewallA] display gre p2mp tunnel-table interface tunnel 0
Dest Addr Mask Tunnel Dest Addr Gre Key
# Ping Host A from Host B. The operation succeeds.
# View tunnel entry information on Firewall A again. Because the branch has initiated tunnel
establishment by sending packets to the headquarters, a tunnel entry should be installed, as shown
in the following output information:
[FirewallA] display gre p2mp tunnel-table interface tunnel 0
Dest Addr Mask Tunnel Dest Addr Gre Key
192.168.12.0 255.255.255.0 11.1.1.2
Configuration example for backing up a P2MP GRE tunnel at
the headquarters
Network requirements
As shown in Figure 54, the headquarters uses two gateways at the egress of the internal network, with
Firewall B for backup. Two GRE tunnels are created on Firewall C (the gateway at the branch): one for
connecting Firewall A and the other for connecting Firewall B. Packets are forwarded along the tunnel
between Firewall A and Firewall C. When a failure occurs along this path, the tunnel between Firewall
B and Firewall C is used to transmit packets.
To meet the requirements:
• Establish a P2MP GRE tunnel with the branch on both Firewall A and Firewall B.
• Establish a GRE over IPv4 tunnel between Firewall A and Firewall B.
• On Firewall A, configure the tunnel interface of the GRE over IPv4 tunnel as the backup interface of
the P2MP GRE tunnel interface.
With this configuration, when Firewall A cannot find the corresponding tunnel entry for a packet, it
delivers the packet to Firewall B, which then forwards the packet to Firewall C.
NOTE:
To avoid looping, do not confi
g
ure the tunnel interface of the GRE over IPv4 tunnel as the backup interface
of the P2MP GRE tunnel interface on Firewall B.