This article describes configuring a Route-Based Site-to-Site IPsec VPN between an Acreto Ecosystem and the Amazon Web Services (AWS) Transit Gateway to access multiple VPCs.
In order to setup IPsec Site-to-Site VPN tunnel between Acreto Ecosystem and AWS VPS you need:
Acreto as a Cloud Provider allows to connect and integrate multiple physical and virtual networks. All connections require stable and secure links. Virtual (EC2) Instances running on Amazon VPC can’t communicate securely with your own (remote) network by default. However, it is possible to connect your network to Acreto Ecosystem. Then you can enable access to your remote network from your VPC by creating an AWS Site-to-Site VPN (Site-to-Site VPN) connection and configuring routing to pass traffic through the connection.
Acreto Ecosystem configures the routing automatically and passes the traffic between AWS VPC and your network. Additionally, the traffic is scanned by the Acreto Threat Engine to block suspicious traffic and malware.
Use the following procedures to manually set up the AWS Site-to-Site VPN connection transit gateway on Amazon AWS.
Create a new Customer Gateway with Acreto’s public IP.
From the VPC Dashboard in the left sidebar, goto VIRTUAL PRIVATE NETWORK (VPN) » Customer Gateways
Click Create Customer Gateway
Provide the following values :
Click Create Customer Gateway.
Create a Transit gateway that will be used to form the Ipsec tunnel with Acreto.
From the VPC Dashboard in the left sidebar, goto TRANSIT GATEWAYS » Transit Gateways
Click Create Transit Gateway
Give the name and click Create Transit Gateway
Wait for few minutes to get the state of Transit Gateway to Available
Create a Transit gateway attachment that will attach to the primary VPC
From the VPC Dashboard in the left sidebar, goto TRANSIT GATEWAYS » Transit Gateways Attachment
Click Create Transit Gateway Attachment
Provide the following values
Click Create Transit Gateway attachment
Create a new VPN connection and associate the previously created Virtual Gateway in Step 2 and Customer gateway in Step 1.
From the VPC Dashboard in the left sidebar, go to VIRTUAL PRIVATE NETWORK (VPN) » Site-to-Site VPN Connections.
Click Create VPN Connection.
Provide the following values in the tunnel setting:
Click Create VPN Connection.
Select the VPN created and click the tab Tunnel Details. Copy the Outside IP address of the tunnel to form a VPN with Acreto.
This Outside IP address will be used in the next steps to configure the Acreto gateway on Wedge Ecosystem.
Create Gateway on Ecosystem by following the instruction in the link. Provide the following values:
Click the gateway created on the wedge.
Click the Play button under Configuration Options to generate the strongSwan Config.
Once the Config file is generated, click the Download button to download the configuration on the local computer.
Unzip the downloaded file and copy the psk from the file ipsec.secrets
Goto AWS Site-to-Site VPN connections
Select the VPN and click Actions » Modify VPN Tunnel Option
Select the tunnel used to create the VPN with Acreto.
Update the password copied from the ipsec.secrets file from strongSwan config file downloaded from Wedge
In the same window “Modify VPN Tunnel Options” scroll down and select the following action under tunnel configuration:
Click Save
Configure Route table to set the default route to VPN tunnel
From the VPC Dashboard, click Transit Gateway Route Table under TRANSIT GATEWAYS in the left sidebar
Select the Transit gateway Route table entry.
Select tab Routes and click Create Static Route
Click Create Static Route
From the VPC Dashboard, click Route Tables under VIRTUAL PRIVATE CLOUD in the left sidebar
Select the Route table and click Edit routes. Add the following values :
Click Save changes.
From the VPC Dashboard in the left sidebar, goto TRANSIT GATEWAYS » Transit Gateways Attachment
Click Create Transit Gateway Attachment
Provide the following values
.
Click Create Transit Gateway attachment
Configure Routes from the new VPC transit gateway attachment appears in the Transit Gateway Route table
From the VPC Dashboard, click Transit Gateway Route Table under TRANSIT GATEWAYS in the left sidebar
Select the Transit gateway Route table entry.
Select tab Routes
Check the Static route from the new VPC Transit Gateway attachment is available
Follow Step 1.9 to add the route for Acreto subnet 100.64.0.0/10 through the transit gateway.
Once the tunnel connection is successfully established, the status of the connection will be up.
To verify on AWS, navigate to the VPN created under VIRTUAL PRIVATE NETWORK (VPN) » Site-to-Site VPN Connections. Verify the following:
Connect a Remote user with Acreto Connect Client and access the resources in the VPC connected using Transit Gateway.
Acreto Gateway allows to set up IPsec VPN tunnel with AWS Transit Gateway which can be used to access resources in multiple VPC.