Environment
Cloud
### CIDR : 172.31.0.0/16
### Public : X.X.X.X
On-Premise
### CIDR : 172.16.0.0/16
### Public : Y.Y.Y.Y
# How To
## Part of AWS
### Create Customer Gateway (CGW)
#### Create CGW
Enter Name tag, GP ASN, Certificate ARN
### Create Virtual Private Gateway (VGW)
#### Create VGW
Enter The Name, And Choice ASN
Attach VPC
Setting Route Table
Create Static Route Table
Create Site to Site VPN Connect
Create VPN Connect
Enter, Choice VPN Tunnel Information
Enter Tunnel Options
After Create Then Wait
Download Conf If Needed
Part of Edge Router X
ssh adm@fw
# Conf mode
configure
# Enable the auto-firewall-nat-exclude feature which automatically creates the IPsec firewall/NAT policies in the firewall.iptables
set vpn ipsec auto-firewall-nat-exclude enable
# Create the IKE / Phase 1 (P1) Security Associations (SAs) and enable Dead Peer Detection (DPD).
set vpn ipsec ike-group FOO0 key-exchange ikev1
set vpn ipsec ike-group FOO0 lifetime 28800
set vpn ipsec ike-group FOO0 proposal 1 dh-group 2
set vpn ipsec ike-group FOO0 proposal 1 encryption aes128
set vpn ipsec ike-group FOO0 proposal 1 hash sha1
set vpn ipsec ike-group FOO0 dead-peer-detection action restart
set vpn ipsec ike-group FOO0 dead-peer-detection interval 15
set vpn ipsec ike-group FOO0 dead-peer-detection timeout 30
# Create the ESP / Phase 2 (P2) SAs and enable Perfect Forward Secrecy (PFS)
set vpn ipsec esp-group FOO0 lifetime 3600
set vpn ipsec esp-group FOO0 pfs enable
set vpn ipsec esp-group FOO0 proposal 1 encryption aes128
set vpn ipsec esp-group FOO0 proposal 1 hash sha1
# Define the first AWS peer address
set vpn ipsec site-to-site peer <VGW_IP> authentication mode pre-shared-secret
set vpn ipsec site-to-site peer <VGW_IP> authentication pre-shared-secret <Secret_From_Download_File>
set vpn ipsec site-to-site peer <VGW_IP> connection-type initiate
set vpn ipsec site-to-site peer <VGW_IP> description ipsec-aws
set vpn ipsec site-to-site peer <VGW_IP> local-address <Your_Pub_IP>
# Link the SAs created above to the first AWS peer and bind the VPN to a virtual tunnel interface (vti0).
set vpn ipsec site-to-site peer 192.0.2.1 ike-group FOO0
set vpn ipsec site-to-site peer 192.0.2.1 vti bind vti0
set vpn ipsec site-to-site peer 192.0.2.1 vti esp-group FOO0
# Configure the RFC 3927 IP addresses on the virtual tunnel interfaces
set interfaces vti vti0 address 169.254.x.x/30
# Lower the TCP Maximum Segment Size (MSS) on the vti interfaces to 1379.
set firewall options mss-clamp interface-type vti
set firewall options mss-clamp mss 1379
# Set route table
set protocols static interface-route 172.31.0.0/16 next-hop-interface vti0
# Apply conf & save conf
commit ; save
# Verify ike
show vpn ipsec ike-group FOO0
dead-peer-detection {
action restart
interval 15
timeout 30
}
ikev2-reauth no
key-exchange ikev1
lifetime 28800
proposal 1 {
dh-group 2
encryption aes128
hash sha1
# Verify esp
show vpn ipsec esp-group FOO0
compression disable
lifetime 3600
mode tunnel
pfs enable
proposal 1 {
encryption aes128
hash sha1
}
# Verify ipsec
show vpn ipsec site-to-site peer
peer <AWS_VGW_IP> {
authentication {
mode pre-shared-secret
pre-shared-secret <AWS_Secret>
}
connection-type initiate
description ipsec-AWS
ike-group FOO0
local-address <Local_Pub_IP>
vti {
bind vti0
esp-group FOO0
}
}
Enter fullscreen mode
Exit fullscreen mode
Wait To Tunnel Up
Verify
Top comments (0)