How can we help?
-
zWAN
-
-
-
-
- Firewall & Layer 7 Application Filtering
- VPN Site-to-Site Tunnel Setup & Connectivity (z40 to Cloud vGR)
- Intrusion Prevention System (IPS) / Intrusion Detection System (IDS) Testing
- DNS Filtering
- DDoS Protection & Logging
- MAC Address Filtering & Geo-fencing
- Application Control & Protocol Blocking
- Authentication & Access Control (zID)
-
- WAN Link Failover & Load Balancing (ACI Mode)
- Dynamic Path Selection & Application-Aware Routing
- SaaS & Internet Breakout Validation
- QoS for Microsoft Teams (Datacenter vGR + Branch z40)
- Tunnel Failover (z40 ↔ vGR) — WAN00 (wired) primary, WAN03 (4G) & WAN04 (5G) backups
- IP Routing & Static Route Steering (z40 Branch)
- VLAN & Layer-2 Bridging
-
-
-
-
-
-
- Articles coming soon
-
-
-
- Articles coming soon
-
- Articles coming soon
-
-
-
-
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
-
-
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
-
-
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
- Articles coming soon
-
-
-
- Articles coming soon
-
- IPsec Tunnel not Establishing
- SSL-VPN Tunnel not Establishing
- Mobile Network Issues
- Management Tunnel does not Establish
- DNS not Resolving from Local Network Appliance
- DNS Resolution Issues in Tunnel Configuration
- DHCP Server not Leasing IP to LAN PC
- Debugging EC Events - Unknown Status Issue
- Trusted-MAC Geofencing Issues
- DNS Issues from DC LAN PC
- Troubleshooting LAN Connectivity to Internet via WAN, Remote Branch LAN, or Local Branch LAN
- NetBalancer gateways displaying Faulty/Inactive
- Packet Drop Issues
-
-
zTC
-
-
-
-
-
- Citrix HDX + USB Headset (Call-Center Baseline)
- VMware Horizon + Smart Card / CAC Login
- Microsoft AVD/RDP + Teams Optimized Video
- Multi-Monitor & 4K Performance
- USB Device Management - Block Storage
- Printing to Local USB & Network Printers
- Barcode Scanner (HID) with Line-of-Business App
- Kiosk / Assigned-Access Auto-Launch
- Wi-Fi Roaming & Link Change Mid-Session
- Power Management and Session State
- OS/Firmware Update & Rollback
-
-
StorTrends
-
zAccess
-
zGuardian
You are here:
Print
Tunnel Failover (z40 ↔ vGR) — WAN00 (wired) primary, WAN03 (4G) & WAN04 (5G) backups
0 out Of 5 Stars
| 5 Stars | 0% | |
| 4 Stars | 0% | |
| 3 Stars | 0% | |
| 2 Stars | 0% | |
| 1 Stars | 0% |
Objective
Demonstrate that when the primary wired WAN (WAN00) at the branch fails, the z40 automatically fails over its VPN connectivity to cellular WANs (WAN03 = 4G, WAN04 = 5G), and then fails back to WAN00 when restored—without manual intervention.
Topology & Mappings
- Branch: 1× z40 with three uplinks
- WAN00 = wired Ethernet (primary) → IPSEC00
- WAN03 = 4G (backup) → IPSEC01
- WAN04 = 5G (backup) → IPSEC02
- Datacenter: 1× vGR concentrator.
- One tunnel per WAN; tunnels are used by Net Balancer (Tunnel gateways) for aggregation/failover.
- Client: Windows system on z40 LAN (LAN00 or Wi-Fi LAN05).
Prerequisites
- Admin access to zWAN Director.
- z40 and vGR already onboarded; tunnels pre-configured (POC default).
- Ability to physically disconnect WAN00; and (for optional test) enable/disable which cellular backup you want to demonstrate.
- No Dynamic Path/steering rules enabled for this test (pure failover).
Pre-Checks (no changes—verify only)
- Confirm tunnel status
Path: Edge Controllers > [z40] > Network > Tunnels- Verify the following rows show Status = ESTABLISHED (green):
- IPSEC00 (bound to WAN00)
- IPSEC01 (bound to WAN03/4G)
- IPSEC02 (bound to WAN04/5G)
- Screenshot for evidence.
- Verify the following rows show Status = ESTABLISHED (green):
- Confirm Net Balancer tunnel preference (weights)
Path: Edge Controllers > [z40] > Network > Net Balancer > BRANCHES- Ensure you have Tunnel gateways for each WAN with Configured Status = ON and weights that prefer WAN00. Example:
- Tunnel (WAN00/IPSEC00) = weight 100 (highest)
- Tunnel (WAN04/IPSEC02) = weight 20
- Tunnel (WAN03/IPSEC01) = weight 10
- Ensure you have Tunnel gateways for each WAN with Configured Status = ON and weights that prefer WAN00. Example:
- Open per-tunnel stats for the primary
Path: Edge Controllers > [z40] > Network > Tunnels → click the Statistics (bar-chart) icon on IPSEC00.- You’ll land in Analytics > Statistics filtered for IPSEC00.
- Keep Interfaces and Logs & Events tabs handy.
Baseline (show traffic over primary)
- Generate modest WAN traffic from the LAN client (60–90 seconds)
- Browse a couple of public sites and/or run:
ping -n 50 1.1.1.1 - In Analytics > Statistics > Interfaces (for IPSEC00), confirm TX/RX and packet counters increase.
- Screenshot: “Before failover (IPSEC00 over WAN00)”.
- Browse a couple of public sites and/or run:
Failover A — Wired → 5G (WAN00 → WAN04/IPSEC02)
- Drop the primary wired link
- Physically disconnect WAN00 (or drop its upstream handoff).
- Observe continuity and path shift
- IPSEC00 counters should stop rising; IPSEC02 (5G) should begin carrying traffic (rising TX/RX).
- In Analytics > Statistics for IPSEC00, check Logs & Events around the moment of failure; you should see tunnel/link change entries.
- Keep client traffic running; the user experience should continue with minimal impact.
- Screenshot(s): Interfaces view showing IPSEC02 active; Logs & Events around the failover time.
- Confirm tunnel health overview
Path: Network > Tunnels- Verify IPSEC02 is ESTABLISHED and active; other tunnels should also show ESTABLISHED.
Fail-Back A — 5G → Wired (WAN04/IPSEC02 → WAN00/IPSEC00)
- Restore WAN00
- Reconnect WAN00 and allow link health to recover.
- Verify return to preferred
- Net Balancer immediately prefers the higher-weight tunnel (IPSEC00).
- In Analytics > Statistics > Interfaces for IPSEC00, watch counters resume rising for new flows; IPSEC02 should stabilize.
- Screenshot: “After fail-back (IPSEC00 preferred again)”.
(Optional) Failover B — Wired → 4G (WAN00 → WAN03/IPSEC01)
Use this if you want to demonstrate 4G independently of 5G.
- Prepare the test
- Temporarily disable the Tunnel gateway for WAN04/IPSEC02 (or physically down WAN04) so the system will fail to WAN03/IPSEC01.
- Repeat failover steps
- Drop WAN00 again.
- Verify IPSEC01 counters rise while traffic continues.
- Restore WAN00; confirm preference returns to IPSEC00.
Validation Criteria
- Before failure:
- IPSEC00 (WAN00) ESTABLISHED and carrying traffic (Interfaces counters rising).
- During failure of WAN00:
- Traffic continues on cellular backup per weights; IPSEC02 (5G) or IPSEC01 (4G) ESTABLISHED and carrying traffic.
- Logs & Events record the link/tunnel change.
- After restore:
- Preference returns to IPSEC00 (WAN00) automatically; new flows use the wired path.
- User impact minimal (pings continue, browsing/downloads proceed).
Evidence to Capture
- Tunnels page (pre-test, during failover, post-fail-back) with statuses.
- Analytics > Statistics > Interfaces for:
- IPSEC00 before failover
- IPSEC02 (or IPSEC01) during failover
- IPSEC00 after fail-back
- Logs & Events around the failover window.
Notes & Tips
- No DPS/steering: Make sure Balancing Rules are off for this test (we’re validating default tunnel failover only).
- Watch the right tunnel: Always click the Statistics icon from the tunnel row you’re validating so the Analytics view is correctly filtered.
- Traffic level: Keep it modest so you don’t saturate cellular; just enough to make counters move clearly.
- If counters don’t move:
- Confirm your client traffic is WAN-bound (not cached/local).
- Verify which tunnel’s Analytics page you’re viewing.
- Ensure the intended backup tunnel (IPSEC02 or IPSEC01) is ESTABLISHED and its Tunnel gateway is Enabled under Net Balancer > BRANCHES.
Was this article helpful?
0 out Of 5 Stars
| 5 Stars | 0% | |
| 4 Stars | 0% | |
| 3 Stars | 0% | |
| 2 Stars | 0% | |
| 1 Stars | 0% |
5
Table of Contents