[root@test01 ipsec.d]# cat aws-az-vpn.conf \nconn Tunnel1\n authby=secret\n auto=start\n encapsulation=yes\n left=%defaultroute\n leftid=[Azure VM IP]\n right=[AWS VPN Tunnel 1 IP]\n type=tunnel\n phase2alg=aes128-sha1;modp1024\n ike=aes128-sha1;modp1024\n leftsubnet=10.0.1.0\/16\n rightsubnet=172.31.0.0\/16\n\nconn Tunnel2\n authby=secret\n auto=add\n encapsulation=yes\n left=%defaultroute\n leftid=[Azure VM IP]\n right=[AWS VPN Tunnel 2 IP]\n type=tunnel\n phase2alg=aes128-sha1;modp1024\n ike=aes128-sha1;modp1024\n leftsubnet=10.0.1.0\/16\n rightsubnet=172.31.0.0\/16\n\n[root@test01 ipsec.d]# cat aws-az-vpn.secrets \n52.188.118.56 18.214.218.99: PSK \"Qgn...............mn\"\n52.188.118.56 52.3.140.122: PSK \"cWu..................87\"<\/code><\/pre>\nTunnel switch<\/h2>\n
Although Libreswan can't manage two tunnels to the same right side without something like Quagga at least I did a very quick and dirty switchover script. It works and very minimal pings missed.<\/p>\n
[root@test01 ~]# cat switch-aws-tunnel.sh \n#!\/bin\/bash\necho \"Current Tunnel Status\"\nipsec status | grep routed\n\nactive=$(ipsec status | grep erouted | cut -d \\\" -f2)\ninactive=$(ipsec status | grep unrouted | cut -d \\\" -f2)\n\necho \"Showing active and inactive in tunnels\"\necho \"active: $active\"\necho \"inactive: $inactive\"\n\necho \"down tunnels....\"\nipsec auto --down $active\nipsec auto --down $inactive\n\necho \"adding tunnels....\"\nipsec auto --add Tunnel1\nipsec auto --add Tunnel2\n\necho \"up the tunnel that was inactive before....\"\nipsec auto --up $inactive\n\necho \"Current Tunnel Status\"\nipsec status | grep routed<\/code><\/pre>\n","protected":false},"excerpt":{"rendered":"AWS VPN to Azure VM with Libreswan NOTE: As of this article AWS Site to Site VPN gateway can generate<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[73,103,20],"tags":[],"class_list":["post-1668","post","type-post","status-publish","format-standard","hentry","category-aws","category-azure","category-vpn"],"_links":{"self":[{"href":"https:\/\/blog.ls-al.com\/wp-json\/wp\/v2\/posts\/1668","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ls-al.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ls-al.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ls-al.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ls-al.com\/wp-json\/wp\/v2\/comments?post=1668"}],"version-history":[{"count":0,"href":"https:\/\/blog.ls-al.com\/wp-json\/wp\/v2\/posts\/1668\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ls-al.com\/wp-json\/wp\/v2\/media?parent=1668"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ls-al.com\/wp-json\/wp\/v2\/categories?post=1668"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ls-al.com\/wp-json\/wp\/v2\/tags?post=1668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}