Last adaptation to the version: 12.7.0
- Selection of the default route if the DNS server is used by the provider
Preliminary note
General
This HowTo explains what multipath routing is and how it can be set up on a Securepoint UTM. It also describes how traffic from specific services/end devices can be routed over a specific line.
What is multipath routing?
The combination of several Internet lines into one logical "Internet" is called multipath routing. Here, two or more default routes exist on the firewall and the packets are distributed accordingly. In addition to multipath routing, the Securepoint UTM also handles the distribution of data traffic (load balancing). In load balancing, a desired weighting can be entered for the individual routes. The Securepoint UTM can thus, for example, load two or more lines with a respective bandwidth of e.g. 16 MBit/s and 100 MBit/s equally.
Set-up
This manual explains two typical set-up options. One is multipath routing with two directly connected DSL lines (Scenario I) and the other is with one DSL line and one router connection (Scenario 2).
Example scenario 1

Two DSL lines are connected to the Securepoint UTM (wan0 and wan1). Line 1 (wan0) has a bandwidth of 500 MBit/s and line 2 (wan1) has a bandwidth of 250 MBit/s.
ZonesScenario 1, Step 1 - Zones
| |||||||||||||||||||||||||||||
The PPP interfaces are configured so that both have unique zones. In this example, we create the zones "external-2" and "firewall-external-2" and assign them to the interface wan1. The wan0 has the zones "external" and "firewall-external". The zones are necessary so that corresponding network objects and rules can be created later. |
UTMuser@firewall.name.fqdnNetwork ![]() | ||||||||||||||||||||||||||||
RoutesScenario 1, Step 2 - Routes
| |||||||||||||||||||||||||||||
A default route is required for each line so that data traffic can be sent over both lines. This can be created under Routing. Since the lines have different bandwidths (500 MBit/s and 250 MBit/s respectively), an even load on the lines can be achieved using the Weighting option. AreaNew as of v12.7 If the function "DNS server from provider" Area is activated, this can be set via CLI with the following command: extc runtimevar set { variable PROVIDER_DNS value "192.168.5.2" }.The value is queried as follows: extc runtimevar get { variable PROVIDER_DNS } variable |value ------------+----- PROVIDER_DNS|192.168.5.1 |
UTMuser@firewall.name.fqdnNetwork ![]() | ||||||||||||||||||||||||||||
Create network objectsScenario 1, Step 3 - Create network objects
| |||||||||||||||||||||||||||||
Rules are created in Securepoint UTM using network objects under | |||||||||||||||||||||||||||||
Name: | Internet-2 | Choose a name | UTMuser@firewall.name.fqdnFirewallNetwork objects ![]() | ||||||||||||||||||||||||||
Type: | Select types in the drop-down menu | ||||||||||||||||||||||||||||
Address: | 0.0.0.0/0 | Network IP for the entire internet | |||||||||||||||||||||||||||
Zone: | Select created zone | ||||||||||||||||||||||||||||
Groups: | |||||||||||||||||||||||||||||
Name: | external-interface-2 | Choose a name | UTMuser@firewall.name.fqdnFirewallNetwork objects ![]() | ||||||||||||||||||||||||||
Type: | Select types in the drop-down menu | ||||||||||||||||||||||||||||
Address: | Select Wan1 as interface | ||||||||||||||||||||||||||||
Zone: | Select created zone | ||||||||||||||||||||||||||||
Groups: | |||||||||||||||||||||||||||||
Create rulesScenario 1, Step 4 - Create rules
| |||||||||||||||||||||||||||||
Now the rules are created. In this example, "default-internet" must be released to the Internet. Here it must be ensured that the Internet object matches the selected HideNAT object as a rule! The rules will then look like this: |
UTMuser@firewall.name.fqdnFirewallPacket filter ![]() | ||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
Example scenario 2

A modem is connected to LAN0 of the firewall, with the Securepoint UTM taking over dialing in. A Fritzbox, which acts as a router, is connected to LAN2. Line 1 (wan0) has a bandwidth of 500 MBit/s and line 2 (LAN2) has a bandwidth of 250 MBit/s.
ZonesScenario 2, Step 1 - Zones
| |||||||||||||||||||||||||||||
The external interfaces (wan0 and LAN2) are configured so that both have unique zones. In this example, the zones "external-2" and "firewall-external-2" are also created and assigned to LAN2. The wan0 has the zones "external" and "firewall-external". The zones are necessary so that corresponding network objects and rules can be created later. | |||||||||||||||||||||||||||||
RoutesScenario 2, Step 2 - Routes
| |||||||||||||||||||||||||||||
In order for the data traffic to be send over both lines, a default route is required for each line. In this scenario, however, there is a special feature due to the router in front of the LAN2: | |||||||||||||||||||||||||||||
MTU: | 1500 | Default | UTMuser@firewall.name.fqdnNetworkNetwork configuration ![]() | ||||||||||||||||||||||||||
Autonegotion: | On | Must be activated | |||||||||||||||||||||||||||
Route Hint IPv4: | Specify the IPv4 address here | ||||||||||||||||||||||||||||
Route Hint IPv6: | If available, enter the IPv6 address here | ||||||||||||||||||||||||||||
Now the two default routes must be created. Since the lines have different bandwidths (500 MBit/s and 250 MBit/s respectively), the Weighting option can be used to achieve an even load on the lines.
New as of v12.7 If the function "DNS server from provider" Area is activated, this can be set via CLI with the following command: extc runtimevar set { variable PROVIDER_DNS value "192.168.5.2" }.The value is queried as follows: extc runtimevar get { variable PROVIDER_DNS } variable |value ------------+----- PROVIDER_DNS|192.168.5.1 |
UTMuser@firewall.name.fqdnNetwork ![]() | ||||||||||||||||||||||||||||
Create network objects Scenario 2, Step 3 - Create network objects
| |||||||||||||||||||||||||||||
Rules are created in Securepoint UTM using network objects under The network objects should look like the following: | Button . Since there is no network object for a second line by default, it must now be created. On the one hand we need the network object for the network (Internet-2) and on the other hand the network object for the interface of the firewall in this zone (external-interface-2).|||||||||||||||||||||||||||||
Name: | Internet-2 | Choose a name | UTMuser@firewall.name.fqdnFirewallNetwork objects ![]() | ||||||||||||||||||||||||||
Type: | Select types in the drop-down menu | ||||||||||||||||||||||||||||
Address: | 0.0.0.0/0 | Network IP for the entire internet | |||||||||||||||||||||||||||
Zone: | Select created zone | ||||||||||||||||||||||||||||
Groups: | |||||||||||||||||||||||||||||
Name: | external-interface-2 | Choose a name | UTMuser@firewall.name.fqdnFirewallNetwork objects ![]() | ||||||||||||||||||||||||||
Type: | Select types in the drop-down menu | ||||||||||||||||||||||||||||
Interface: | Select Wan1 as interface | ||||||||||||||||||||||||||||
Zone: | Select created zone | ||||||||||||||||||||||||||||
Groups: | |||||||||||||||||||||||||||||
Create ruleScenario 2, Step 4 - Create rules
| |||||||||||||||||||||||||||||
Now the rules are created. In this example, "default-internet" must be released to the Internet. Here it must be ensured that the Internet object matches the selected HideNAT object as a rule! The rules will then look like this: |
UTMuser@firewall.name.fqdnFirewallPacket filter ![]() | ||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||