Create IPsec tunnels in VMware SD-WAN
Before you begin:
These are the high-level steps that are required to set up IPsec tunnels between VMware SD-WAN and SIA.
To create IPsec tunnels in VMware SD-WAN:
If your organization uses ETP Client, make sure you disable the client in policies that are associated with the IPsec tunnel locations.
Configure SIA as a non SD-WAN destination
Before creating the tunnels, you must configure SIA as a non SD-WAN destination. For detailed instructions, see the VMware SD-WAN documentation.
To configure SIA as a non SD-WAN destination:
-
Log in to VMware SD-WAN Orchestrator (VCO) as an enterprise user.
-
From the navigation menu, select Configure > Network Services.
-
In the Non SD-WAN Destinations via Edge area, click New. A dialog appears.
-
In the Service Name field, enter a name for this destination.
-
From the Service Type menu, select Generic IKEv2 Router (Route Based VPN).
-
Click Next.
-
In the Primary VPN Gateway IP address field, enter
primary.ipsec.akaetp.net
-
Click Advanced and specify the security settings:
-
For Encryption, select AES 256.
-
For DH Group, select 14 or above.
-
For Hash, select SHA-256.
-
-
Select the checkbox for the Secondary VPN Gateway to create a secondary tunnel. Enter the
secondary.ipsec.akamaetp.net
FQDN in the IP address field. -
Select Keep Tunnel Active.
-
Select Tunnel settings are same as Primary VPN Gateway checkbox to apply the advanced tunnel security settings to the secondary tunnel.
-
Click Save Changes.
Next step:
Configure a tunnel between a branch and SIA
Configure a tunnel between a branch and SIA
Before you begin:
Configure SIA as a non SD-WAN destination
Complete this procedure to create a tunnel between a branch and SIA.
To configure a tunnel between a branch and SIA:
-
In the SD-WAN Orchestrator, select Configure > Profiles.
-
Select a profile where you want to configure Cloud VPN and under Device, go to Cloud VPN.
-
Toggle Cloud VPN to on.
-
Under Branch to Non SD-WAN Destination via Edge, select the check box.
-
In the proceeding menu, select the service you created for SIA in Configure SIA as a non SD-WAN destination.
-
Click Save Changes.
Next step:
Configure tunnel settings at the Edge.
Configure tunnel settings at the Edge
Complete this procedure to configure tunnel settings at the Edge level. These settings are prioritized over the settings that are inherited from a profile. For detailed instructions, see the VMware SD-WAN Administration Guide
To configure tunnels settings at the Edge:
-
In the SD-WAN Orchestrator, select Configure > Edges.
-
Select the edge that contains the Non SD-WAN destination settings you configured in Configure SIA as a non SD-WAN destination.
-
Navigate to Cloud VPN and go to the Branch to Non SD-WAN Destination via Edge area.
-
In the Action column, click the plus sign icon. The Add Tunnel dialog appears.
-
Complete these fields:
-
In the Public WAN Link menu, select the name of the WAN that you want to use for the primary tunnel.
-
In the Local Identification Type menu, select User FQDN and in the provided field, enter the user FQDN (IKE Identifier) that you defined in SIA. For more information, see Configure IPsec credentials in SIA.
-
In the PSK field, enter the PSK that you generated and also provided in SIA.
-
In the Destination Primary Public IP, enter
primary.ipsec.akaetp.net
-
In the Destination Secondary Public IP, enter
secondary.ipsec.akamaetp.net
-
-
Click Save Changes.
-
Repeat steps 4 to 6 for the secondary tunnel. Make sure you select the name of the WAN that you want to use for the secondary tunnel. Provide the primary IPsec FQDN for the primary destination and the secondary IPsec FQDN for the secondary destination.
Next steps:
-
Verify that the tunnels are available as a network service. From the navigation menu, go to Monitor > Network Services. Review the tunnels that are configured under Non SD-WAN Destinations via Gateway.
Configure your business policy
Before you begin:
Configure tunnel settings at the Edge
A business policy defines how an application behaves, controls bandwidth utilization, mitigates network errors, and more. For more on a business policy, see the VMware SD-WAN documentation.
To configure a business policy:
-
Create an object group for TCP ports 80 and 443.
-
From the Orchestrator navigation menu, select Configure > Object Groups.
-
Click the Port Groups tab and select Actions > New.
-
In the window, enter a name and description for the port group.
-
Select TCP as the protocol for two port fields.
-
Enter ports 80 and 443.
-
Click Create.
-
-
Create a business policy on the Edge profile:
-
From the navigation menu, select Configure > Profiles.
-
Click a profile.
-
Under the Business Policy tab, click New Rule.
-
Enter a rule name.
-
In the Match section, complete these steps for the Destination:
-
Select the Object Group tab and then select HTTP/HTTPS as the Port Group.
-
Select the Define tab, and then select Internet.
-
-
In the Action section, select Internet Backhaul as the Network Service and then select Non SD-WAN Destination via Edge / Cloud Security Service. From the menu that appears, select the SIA service you configured as a non SD-WAN destination in Configure SIA as a non SD-WAN destination.
-
Click OK.
-
Next steps:
- Make sure the rule you created is associated with the business policy. For the profile, click the Business Policy tab to confirm that the rule appears.
- Verify that traffic is flowing through the tunnel.
Verify that traffic is flowing through the tunnel
Before you begin:
Configure your business policy
Complete this procedure to confirm that traffic is flowing through the tunnels you created.
To verify that traffic is flowing through the tunnel:
-
In the Orchestrator menu, select Test & Troubleshoot > Remote Diagnostics.
-
Select the Edge where the policy was applied.
-
Go to the List Active Flows section and in the Segment menu, select a segment.
-
In the Destination Port field, enter port 443 or 80.
-
Click Run. If traffic uses the configured policy, the Route column shows Internet Backhaul. The Business Policy also shows the rule you created in Configure your business policy.
Updated about 2 years ago