Introduction

The IPsec VPN is one of the encrypted connection solutions from the business’s on-prem network to the OCI cloud. Nowadays, many customers use SD-WAN as their enterprise WAN solution. In this blog, I will demonstrate how you can connect OCI and VMware Velocloud SD-WAN via IPsec VPN and Velocloud Gateway.

 

Topology Architecture Diagram

 

Diagram

Prerequisites

1. Knowledge of the OCI networking concept. (Reference: OCI Networking Concept)

2. knowledge of VMware Velocloud SD-WAN concept. (Reference: VMware Velocloud )

3. Create VCN with DRG attached, ready for configuring site-to-site VPN on OCI.

    (Reference: Network-managingVCNs and Network-managingDRGs )

 

Agenda

1. Velocloud: Configure a “Non SD-WAN Destination via Edge.”

2. OCI: Configure a Site-to-Site VPN connection to Velocloud.

3. OCI: Edit Tunnels Phase One and Shared Secret Key.

4. Velocloud: Edit and match the Tunnels with OCI public IP addresses, Phase one, and PreSharedKey.

5. Velocloud: Enable the Cloud VPN at the Profile level and associate the created “Non SD-WAN Destination via Edge” VPN.

6. Confirm the connection from both sides!

7.Conclusion.

 

Let’s get started it!

Step 1: Configure a Non SD-WAN Destination via Edge.

Login to the Velocloud orchestrator.

From the navigation panel on the left side, click on Configure > Network Services.

From the Services screen, find the Non SD-WAN Destination via Gateway service and click the New button to create a new connection to OCI.

Please check the screenshot below.

Pic1

As you see below, we need a name, type, and OCI public IP address (Tunnel IPs) to configure this connection.

pic2

 

 

Note: We don’t have OCI headend IPs available yet, so I assigned the random IPs (Dummy IPs) to have the Velocloud gateway public IP address after creating this connection.

Note: For the service Type, you can select either Generic IKEv2 Router (Route Based VPN) or Generic IKEv1 Router (Route Based VPN) as the IPSec tunnel type.

 

Click on “Next” and continue to configure the IPSec connection.

Now, your route-base Non SD-WAN Destination VPN has been created, and you need to note the SD-WAN Gateway public IP address by clicking on the View IKE/IPSec Template button, Check the screenshot below, please.

pic3

 

pic4

 

Now, you have Tunnel Interface Outside IP address for SD-WAN Gateway that is 64.186.25.73

We need this IP to create a CPE on the OCI side.

 

Step 2: Configure a Site-to-Site VPN connection to Velocloud.

Login to the OCI dashboard and choose your desired region (I chose US West – San Jose region)

Navigate to Networking from the left menu.

From the “Customer Connectivity” list, click on Site-to-Site VPN.

Click on “Start VPN Wizard.”

Select your proper compartment, VCN, DRG, and IGW from the Basic Information tab on the first page and click “Next.”

In the Subnet and Security tab, Select the existing Security list or create a new one and the proper Subnet and click on “Next.”

pic5

pic6

 

In the site-to-Site tab, fill in the name of the VPN (VPN-OCI-Velocloud-VCN), Select Static Routing as a routing type, and fill in the route to your on-premises network.

Note: I considered the IP CIDR of 10.0.0.0/8 for your on-prem. You can have up to 10 static routes to your on-premises network.

pic7

For the tunnel configuration part, I changed Tunnel 1 and 2, IKE Version, to IKEv2 and clicked “Next.”

pic8

On the Customer-Premises Equipment page, you need to create a new CPE with the IP address of Velocloud Gateway (64.186.25.73), which we got from step 1. Please check the screenshot below.

Note: In our case, the CPE Vendor Information type is “Other.”

pic9

Click “Next” to review and create the Site-to-Site VPN, then click “Create VPN Solution.”

pic10

VPN solution just created. Please click on ” View VPN Solution Summary” to see the result.

pic11

 

pic12

As you see above, Oracle VPN IP Addresses are ready to be updated on the Velocloud side.

Tunnel 1- OCI-Velocloud-VCN 129.159.43.26

Tunnel 2- OCI-Velocloud-VCN 152.67.231.102

 

Step 3: Edit Tunnels Phase One and Shared Secret Key.

Before we jump to the Velocloud orchestrator to update the tunnel IPs, I applied some custom configurations to follow the best practice with VPN configs, like Phase one and Shared Secret Key (Velocloud Secret Key password must be between 8 and 63 characters)!

Click the three dots on the right side of the page in front of Tunnel 1- OCI-Velocloud-VCN to see the Edit option; check the screenshot below.

pic13

As soon as you click on “Edit,” you will see the window below. Click on “Show advance options” to continue.

pic14

Check the “Set Custom Configurations” box under Phase One (ISAKMP) Configuration and choose your desired Encryption and Authentication Algorithms plus Diffe-Helman Group.

Note: Please check the reference links for the supported IPSec parameters.

OCI  Supported IPSec Parameters (oracle.com)

Velocloud VMware-SD-WAN-IPSec

pic15

Save the changes and wait for Tunnel 1 Lifecycle state status to be green again. Re-do the step above for tunnel 2.

To have the custom Shred Secret for each tunnel, please click “CPE & Tunnels Information” See the screenshot below.

pic16

Click on Edit next to the Shared Secret under tunnels information and put your custom password there.

(We will need that to update the Velocloud side for having the same secret key on both sides)

 

Step 4: Edit and match the Tunnels with OCI public IP addresses, Phase one, and PreSharedKey.

Login to the Velocloud orchestrator.

From the navigation panel on the left side, click on Configure > Network Services.

From the Services screen, find the Non SD-WAN Destination via Gateway service and click on the “VPN to OCI.”

pic17

After the VPN to OCI dialog box appears, click on the “Advanced” button and modify the Public IPs for Primary and Secondary VPN Gateways, PSKs, Encryption, DH Group, and Authentication Algorithm. Check the screenshots below.

pic18

pic19

Save the Changes. Then you need to Enable the Tunnels check box, add the OCI VCN CIDR under the Site Subnets, and “Save Changes.”

pic20

 

Step 5: Enable the Cloud VPN at the Profile level and associate the created “Non-SD-WAN Destination via Edge” VPN.

From the Navigation panel, Click on Configure > Profiles.

Select the profile you plan to associate your Non SD-WAN Destination (OCI IPSec VPN) to, move to the Device tab

Enabling the Cloud VPN and apply the “VPN to OCI” Non SD-WAN Destination via Gateway there.

Check below, please.

pic21

Click on “Save Changes.”

Step 6: Confirm the connection from both sides!

Velocloud

From the navigation menu, Click on Monitor > Network Services.

Check the Non SD_WAN Destinations via Gateway. As you see below, the tunnels are up!

pic22

OCI

Navigate to the Networking menu> Customer Connectivity > Site-to-Site VPN> VPN-OCI-Velocloud-VCN .

As you also see below, both tunnels are up!

pic23

Step 7: Conclusion

As I demonstrated, you can quickly establish a secure IPSec VPN tunnel directly from your VMware Velocloud SD-WAN Edge to your OCI Public Cloud Solution.

 

I hope you enjoyed it!

Atefeh(Ati) Yousefi Attaei