Configuring connectivity between CloudStack hosted VPCs can be done by either using private gateways – which has to be configured by CloudStack root administrators to use dedicated network segments – or by using VPC-to-VPC connections, which can be configured by the CloudStack end user without admin input.
In this blog post we will cover how to configure the VPC-to-VPC VPN connections and ensuring that these are up and working as expected. This is covered in the CloudStack administration guide – but the terms used may be unfamiliar to anyone new to CloudStack and VPC networking, and we hope to add some clarity to this. In addition to the configuration of VPN we also cover some troubleshooting and operational steps.
To be able to route traffic from a VM in one VPC to a VM in another VPC the IP ranges used in the two VPCs must be unique and can not overlap. If the same IP ranges were used the traffic from one side of the VPN tunnel to the other would not route over the tunnel itself, hence connectivity could not be established.
As an example the two VPC networks could be configured as follows:
Tier 1: 10.1.0.0/24
Tier 2: 10.1.1.0/24
Tier 1: 10.2.0.0/24
Tier 2: 10.2.1.0/24
Apart from this the VPC-to-VPC VPN tunnel will be using the CloudStack public network – hence the two VPC networks can be:
On the same CloudStack infrastructure, using the same account.
On the same CloudStack infrastructure, using different accounts.
On different CloudStack infrastructures altogether (please note however different versions of CloudStack may run different VPN versions hence there may be incompatibilities under some circumstances).
For the purpose of this article we are going to use the following network topology:
The VPN gateway is the term used for the local VPN endpoint. This is simply enabled on the source-NAT IP address of the VPC virtual router – and it allows the local VR to accept incoming VPN connections.
VPN customer gateway
The VPN customer gateway is the remote endpoint we target when we configure the VPN connection. When we configure these we need to specify all the details for this VPN connection:
Name: user friendly name for the gateway
Gateway: the public facing IP address of the remote VPC virtual router.
CIDR list: this is a list of CIDR networks which are reachable at the remote end of the tunnel. Multiple CIDR ranges can be specified, separated my commas.
IPsec pre-shared key: this is effectively the VPN passphrase used when the VPN connection is negotiated – and it should therefore follow standard password best practices in a production environment.
IKE / ESP encryption details for the VPN tunnels.
The VPN connection is the pairing from the source – or local – VPN gateway to the remove VPN customer gateway. This is configured in one of two modes:
Active: the connection which initiates the VPN tunnel, typically from the VPC hosting VMs which consumes resources on the remote VPC.
Passive: this connection waits for the opposite VPC VR to initiate the connection, and is typically on the VPC hosting the resources to be consumed.
Please note for both of these connections the resources either end must be reachable over the CIDR list configured for the VPN customer gateway.
Configuring the VPN tunnels
Create and configure the VPC networks
First of all configure the VPC networks at either end with the required VPC ACL lists.
Create customer gateways
Navigate to “Network” and select “VPN customer gateway” on the pulldown menu, the click the “Add VPN customer gateway” button.
In this example we assume that VMs on both VPC1 tier 1 and 2 will consume resources on VPC2. Please note in this case we only configure the name, public gateway, CIDR list and the IPsec preshared key, all other fields are left as defaults.
Repeat this step for the customer gateway on VPC2:
Create the VPN gateway on each VPC
Navigate to each VPC, click the configure button and then click the “Site to site VPN” pane under “Router”. Confirm you want to create the VPN gateway:
This will simply configure the local VPN gateway – and no further configuration input is required. The only actions that can be carried out against a VPN gateway is to delete this from the VPC.
Repeat the above step for VPC2 before continuing.
Configure the VPN connections
First of all configure the active connection – in this example we will configure this to be the connection from VPC1 to VPC2.
Navigate to VPC1, click “configure”, then click on the “Site to site VPN” pane. From the “select view” pulldown menu select “VPN connections” and click the “Create VPN connection” button.
Next select the remote Customer VPN gateway – and do not tick the “active” tick box. Click OK.
Repeat this step for the passive connection from VPC2 to VPC1, but for this one tick the “passive” tick box:
Once both VPN connection have been configured refresh the screen and ensure the VPN connection state is “connected”.
If the VPN connection doesn’t come up automatically simply go back to the active connection (from VPC1 to VPC2) and click the “Reset VPN connection” button:
Once the VPN connections are in a “connected” state VMs on VPC1 should be able to connect to VMs on VPC2.
Operation and troubleshooting
If the VPC-to-VPC connection doesn’t work as expected check the following:
ACL lists: all VPC-to-VPC connections still adhere to the Access Control Lists set for each VPC tier, i.e. if a tier is configured to use e.g. “default_deny” then neither traffic on a different tier locally or traffic from remote VPCs will reach the VMs in question.
To check the VPN tunnels on the VPC virtual router, log in using the standard connection method for the hypervisor in use, then check the status of the VPN tunnels with the “ipsec statusall” command:
The logs for the IPsec VPN connections can be found in:
/var/log/cloud.log: CloudStack handshaking for the VPN tunnels.
/var/log/auth.log: shows the IPsec handshakes for the VPN tunnel.
/var/log/daemon.log: similar to auth.log, shows the VPN tunnel handshaking and output.
To stop a VPN connection simply delete it from the VPC configuration screen – this will remove the VPN connection but leave the VPN gateway and VPN customer gateway in place:
We hope this article will clarify the terms used and the configuration steps required to configure a VPC-to-VPC VPN connection. As always we’re happy to receive feedback , so please get in touch with any comments, questions or suggestions.
About The Author
Dag Sonstebo is a Cloud Architect at ShapeBlue, The Cloud Specialists. Dag spends most of his time designing, implementing and automating IaaS solutions based on on Apache CloudStack.
https://www.shapeblue.com/wp-content/uploads/2017/06/VPC-VPN.jpg300300BlinkRevshttps://www.shapeblue.com/wp-content/uploads/2017/06/logo-340x156.pngBlinkRevs2017-06-29 13:14:312017-09-08 09:36:27VPC to VPC VPN configuration in CloudStack