Google Cloud VPN Interop Guide  Using Cloud VPN With VyOS   

 

       

 

Contents    Contents  Introduction  Environment Overview  Topology  Preparation  Overview  Getting Started  IPsec Parameters  Configuration  Configuration ­ GCP  Verifying the GCP Configuration  Updating the Firewall Rules in GCP  Configuration ­ VyOS  Prerequisites  Entering Configuration Mode  IPsec ESP Configuration  Saving the Configuration  Testing the IPsec connection  Troubleshooting the IPsec connection  Resetting the IPsec connection     

   

 

Introduction  This guide walks you through the process of configuring Vyos, a Linux­based network operating  system that provides software­based network routing, firewall, and VPN functionality, for  integration with the ​Google Cloud VPN service​.  This information is provided as an example  only. Please note that this guide is not meant to be a comprehensive overview of IPsec and  assumes basic familiarity with the IPsec protocol.   

Environment Overview  The equipment used in the creation of this guide is as follows:    Vendor: VyOS  Model: amd64.iso  Software Rev: 1.1.7 

Topology  The topology outlined by this guide is a basic site­to­site IPsec VPN tunnel configuration using  the referenced device:       

 

Preparation  Overview  The configuration samples which follow will include numerous value substitutions provided for  the purposes of example only.  Any references to IP addresses, device IDs, shared secrets or  keys, account information or project names should be replaced with the appropriate values for  your environment when following this guide.  Values unique to your environment will be  highlighted in ​bold​.      This guide is not meant to be a comprehensive setup overview for the device referenced, but  rather is only intended to assist in the creation of IPsec connectivity to Google Compute Engine.  The following is a high level overview of the configuration process which will be covered:    ● Selecting the appropriate IPsec configuration  ● Configuring the internet facing interface of your device (outside interface)  ● Configuring IKEv2 and IPsec  ● Testing the tunnel 

Getting Started  The first step in configuring your VyOS virtual route for use with the Google Cloud VPN service  is to ensure that the following prerequisite conditions have been met:      ● VyOS successfully deployed to either virtual or physical hardware.  Installation is out of  scope for this guide, but detailed installation instructions can be found at the ​VyOS  project homepage​.  ● At least one configured and verified functional internal interface  ● One configured and verified functional external interface                       

IPsec Parameters   For the VyOS Router IPsec configuration, the following details will be used:    Parameter 

Value 

IPsec Mode 

ESP+Auth Tunnel mode (Site­to­Site) 

Auth Protocol 

Pre­shared Key 

Key Exchange 

IKEv2 

Start 

auto  

Perfect Forward Secrecy 

on 

(PFS) 

Dead Peer Detection 

aggressive 

(DPD) 

INITIAL_CONTACT  (uniqueids) 

           

on 

The IPsec configuration used in this guide is specified below:    Phase 

Phase 1 

Phase 2 

 

 

                     

Cipher Role 

Cipher 

Encryption 

aes­256 

Integrity 

sha­256 

prf 

sha1­96 

Diffie­Hellman (DH) 

Group 14 (modp_2048) 

Phase 1 lifetime 

36,000 seconds (10 hours) 

Encryption 

aes­cbc­256 

Integrity 

sha­256 

Phase 2 lifetime 

10,800 seconds (3 hours) 

Configuration  Configuration ­ GCP  This section provides a step­by­step walkthrough of the Google Cloud VPN configuration.  Log  on to the Google Cloud Platform Developers Console and select Networking from the main  menu.  To create a new VPN instance, select the VPN node and click  ​Create a VPN​ from the  main task pane:   

    All parameters needed to create a new VPN connection are entered on this page.  Provide a  Name​ and ​Description​ for the VPN instance.  The VPN instance requires a ​public IP address.  An existing address can be selected if available, or a ​New static IP address​ can be assigned:   

 

      To reserve a new static IP, enter a ​Name​ and ​Description​ and click  Reserve:   

   

Select the newly created static IP under ​IP­address​.  This IP will be used as the ​remote peer​ in  the VyOS configuration.  Enter the ​outside interface address​ of the VyOS router as the  Remote peer IP address​.  Select an IKE version (IKEv2 is recommended) and enter a ​Shared  secret​ to be used for IPsec mutual authentication.  Finally, enter the IP range of the VyOS  router ​inside network​ under ​Remote network IP ranges​:     

   

Click ​Create​, then click the back arrow to return to the status screen.  Note that the connection  will fail until the VyOS router has been configured.  Successful connection shown for reference:   

 

Verifying the GCP Configuration  With the VyOS virtual router configuration complete, and the IPsec connection initiated, the  GCP Developer Console should reflect a connected status under VPN connections: 

 

Updating the Firewall Rules in GCP  At this point IPsec configuration is complete and the firewall rules in GCP should be verified to  ensure that the required port rules are in place allowing traffic to pass between the local and remote  networks: 

 

Configuration ­ VyOS  Prerequisites  This section provides a step­by­step walkthrough of the VyOS virtual router configuration.  As a  prerequisite, the router should be configured with at least one ​outside interface (public routable  IP address) and at least one ​inside interface (internal IP space which will be connected to GCP  via VPN.  Verify the interfaces are setup correctly by checking the running configuration:    vyos@vyos:~$  show configuration   

A sample interface configuration is provided below for reference: 

  ethernet eth0 {       address 1.1.1.1/24       description OUTSIDE       duplex auto       hw­id 00:0c:29:44:3b:0f   }  ethernet eth1 {         address 192.168.0.1/24         description INSIDE         duplex auto         hw­id 00:0c:29:44:3b:19         smp_affinity auto         speed auto     }   loopback lo {   }   

Entering Configuration Mode  To get started with the VyOS virtual router configuration, connect to the router via SSH.  Once  connected, enter ​configure ​mode to begin configuration:   

vyos@vyos:~$ ​configure  [edit] 

IPsec ESP Configuration  set vpn ipsec esp­group gcp­esp compression 'disable'  set vpn ipsec esp­group gcp­esp lifetime '10800'  set vpn ipsec esp­group gcp­esp mode 'tunnel'  set vpn ipsec esp­group gcp­esp pfs 'enable'  set vpn ipsec esp­group gcp­esp proposal 1 encryption 'aes256'  set vpn ipsec esp­group gcp­esp proposal 1 hash 'sha1'   

IPsec IKE Configuration  set vpn ipsec ike­group gcp­ike ikev2­reauth 'no'  set vpn ipsec ike­group gcp­ike key­exchange 'ikev2'  set vpn ipsec ike­group gcp­ike lifetime '36000'  set vpn ipsec ike­group gcp­ike proposal 1 encryption 'aes256'  set vpn ipsec ike­group gcp­ike proposal 1 hash 'sha1'  set vpn ipsec ike­group gcp­ike proposal 1 dh­group 14 

   

IPsec Tunnel Configuration  The last step is to configure the IPsec tunnel.  In the example below, the ​peer should be set to  the ​Google Cloud VPN static IP address​ configured above.  The ​pre­shared­secret should be  set to the ​PreSharedKey​ set in the Google Cloud VPN configuration above.    set vpn ipsec ipsec­interfaces interface 'eth1'  set vpn ipsec site­to­site peer 2.2.2.2 authentication id '1.1.1.1'  set vpn ipsec site­to­site peer 2.2.2.2 authentication mode 'pre­shared­secret'  set vpn ipsec site­to­site peer 2.2.2.2 authentication pre­shared­secret  'SomePreSharedKey'  set vpn ipsec site­to­site peer 2.2.2.2 ike­group 'gcp­ike'  set vpn ipsec site­to­site peer 2.2.2.2 local­address '1.1.1.1'  set vpn ipsec site­to­site peer 2.2.2.2 tunnel 0 allow­nat­networks 'disable'  set vpn ipsec site­to­site peer 2.2.2.2 tunnel 0 allow­public­networks 'disable'  set vpn ipsec site­to­site peer 2.2.2.2 tunnel 0 esp­group 'gcp­esp'  set vpn ipsec site­to­site peer 2.2.2.2 tunnel 0 local prefix '192.168.0.0/24'  set vpn ipsec site­to­site peer 2.2.2.2 tunnel 0 remote prefix '10.0.0.0/21' 

Saving the Configuration  To save the running configuration and set it as the startup default, use the following commands:    vyos@vyos# ​commit  [edit] 

  vyos@vyos# ​save 

Saving configuration to '/config/config.boot'...  Done  [edit]  vyos@vyos# 

 

Once saved, exist configuration mode:  vyos@vyos# ​exit  exit 

vyos@vyos:~$ 

Testing the IPsec connection  The IPsec tunnel can be tested from the router by using ICMP to ping a host on GCP.  Be sure  to use the ​inside ​interface on the VyOS and make sure that the firewall rules have been set  correctly to allow ICMP. 

 

Troubleshooting the IPsec connection  In the event of connection problems, the following commands can be useful for troubleshooting.  To display the status of the IKEv2 security association use the ​sh vpn ike sa​ command:  vyos@srv­gw0:~$ ​sh vpn ike sa 

Peer ID / IP                            Local ID / IP 

 

­­­­­­­­­­­­                            ­­­­­­­­­­­­­  2.2.2.2                                 1.1.1.1 

 

   State  Encrypt  Hash    D­H Grp  NAT­T  A­Time  L­Time     ­­­­­  ­­­­­­­  ­­­­    ­­­­­­­  ­­­­­  ­­­­­­  ­­­­­­     up     aes256   sha1    5        no     734     3600     

To display the status of the IKEv2 security association use the ​sh vpn ipsec sa​ command:    vyos@srv­gw0:~$ ​show vpn ipsec sa 

Peer ID / IP                            Local ID / IP 

 

­­­­­­­­­­­­                            ­­­­­­­­­­­­­  2.2.2.2                                 1.1.1.1     Tunnel  State  Bytes Out/In   Encrypt  Hash    NAT­T  A­Time  L­Time  Proto     ­­­­­­  ­­­­­  ­­­­­­­­­­­­­  ­­­­­­­  ­­­­    ­­­­­  ­­­­­­  ­­­­­­  ­­­­­     0       up     7.5M/230.6K    aes256   sha1    no     567     1800    all 

 

Resetting the IPsec connection  To reset the IPsec connection (initiate a reconnect), use the following command:   

clear ipsec sa peer  

           

Google Cloud VPN Interop Guide Cloud Platform

Model: amd64.iso. Software Rev: 1.1.7 ... keys, account information or project names should be replaced with the appropriate values for your environment when ...

555KB Sizes 24 Downloads 343 Views

Recommend Documents

Google Cloud VPN Interop Guide Cloud Platform
Phase 1. Encryption aes256. Integrity sha256 prf sha196. DiffieHellman (DH) ... Virtual Networks​ – these are private networks defined in the cloud service.

Google Cloud VPN Interop Guide Cloud Platform
Google Cloud VPN service​. This information is ... authentication. Finally, enter the IP range of the Cisco ASA ​inside network​under ​Remote network IP ranges​: .... crypto map gcp-vpn-map 1 set ikev2 ipsec-proposal gcp crypto map ...

Google Cloud VPN Interop Guide Cloud Platform
the ​Google Cloud VPN service​. .... Create two firewall policies, one for Google Cloud Platform network ingress to the 300C local subnets, and one for 300C ...

Google Cloud VPN Interop Guide Cloud Platform
Using Cloud VPN With Amazon Web Services​TM​ Virtual Private Gateway ... 1. A site-to-site policy based IPsec VPN tunnel configuration using static routing. 2. ... Virtual Private Cloud ​– customer defined private network space in AWS.

Google Cloud VPN Interop Guide Using Cloud VPN with A Palo Alto ...
Palo Alto Networks®, PANOS®, and other Palo Alto Networks marks are trademarks of Palo Alto Networks, Inc. ... integration with the Google Cloud VPN service . ... Topology. This guide will describe two Cloud VPN connection topologies: 1.

Google Cloud VPN Interop Guide Using Cloud VPN with A Palo Alto ...
ESP+Auth Tunnel mode (SitetoSite). Auth Protocol. Preshared Key. Key Exchange. IKEv2. Start auto. Perfect Forward Secrecy. (PFS) on. Dead Peer Detection.

Google Cloud Storage Cloud Platform
Store application data Google Cloud Storage provides fast access to application data, such as images for a photo editing app. • Share data with colleagues and ...

WebFilings Cloud Platform
The mission is to help companies find new ways to reduce the time, risk, and ... Solution. As the development team worked to create the software they envisioned, ... WebFilings customers say they have filed their quarterly 10-Qs a week earlier.

Certificate Cloud Platform
Apr 15, 2016 - Sites API. • Sheets API. • Apps Activity API. Google Apps Admin SDK APIs: • Admin Settings API. • Domain Shared Contacts API. • Directory API.

Gigya Cloud Platform
Gigya enables its customers to integrate social media into their website applications through ... One of Gigya's most popular apps lets customers enhance live.

Untitled Cloud Platform
Page 1. Updated document version now lives in https://developers.google.com/appengine/pdf/HowtofileaGESCsupportcase.pdf.

Certificate Cloud Platform
Apr 15, 2016 - the Information Security Management System as defined and implemented by located in Mountain View, California, United States of America,.

kahuna Cloud Platform
Google App Engine, a Google Cloud Platform service, provided the scalability they needed. A platform to handle size. Kahuna's customer engagement engine ...

G Suite Cloud Platform
Barrow Street. Dublin 4. 30 December 2016. Re: Application for a common opinion regarding Google Apps (now G-Suite utilisation of model contract clauses.

Interactions Marketing Cloud Platform
solutions, the company focused on Google BigQuery. With previous ... Interactions worked closely with Google and software company Tableau while conducting ...

News Limited Cloud Platform
customers in just 3 weeks. • Published five ... testing within two to three months ... A mix of either field sales teams, call centre agents, or basic online tools. Ads .... solution. “We've fundamentally changed the way consumers engage with.

MAG Interactive Cloud Platform
Build Ruzzle for both Android and iOS ... Sell premium Android version through .... Ruzzle saw rapid growth at launch, and is currently handling over 10M.

Google Cloud Platform Services
Dec 21, 2017 - Because the circumstances and types of deployments in GCP can range so ... with the ability to manage the Cloud Platform and other Google ... network services and security features—such as routing, firewalling, ... storage system, Da

Google Cloud Platform Services
Dec 21, 2017 - Platform, nor have we considered the impact of any security concerns on a specific workflow or piece of software. The assessment ... similar to a traditional file system, including fine-grained access control lists for each object. ...

Pocket Gems Cloud Platform
“We're really excited about the Android platform,” Crystal says. “I'm hopeful that the Tap series will become one of the most popular Android apps, too.

SOC 3 Cloud Platform
Jul 29, 2016 - Confidentiality. For the Period 1 May 2015 to 30 April 2016 ... Google Cloud Platform, and Other Google Services System ..... virtual machines on-demand, manage network connectivity using a simple but flexible networking.

D3.2 Cloud Platform v2 - NUBOMEDIA
Jan 27, 2015 - NUBOMEDIA: an elastic Platform as a Service (PaaS) cloud ..... 4.1.1 Network Service Record (NSR) deployment sequence diagram . ...... 3 https://www.openstack.org/assets/pdf-downloads/Containers-and-OpenStack.pdf ...

D3.3 Cloud Platform v3 - NUBOMEDIA
Apr 5, 2017 - NUBOMEDIA: an elastic PaaS cloud for interactive social multimedia. 2 ..... while the Media Service components are deployed on the IaaS using the NFV layers. ...... defined as Network Service (refer to section 2.3.3 for more details), t

Google Cloud and Australian Privacy Principles Cloud Platform
Principles (APP), regulates the way organisations and government agencies handle the personal ... Direct marketing. 8. Cross-border disclosure of personal information. 9. Adoption, use or disclosure of government related identifiers. 10. Quality of p