How to Configure IPsec VPN within VMware NSX Edge
This article shows you how to create an IPsec VPN between a
NSX Edge Gateway with a vCloud Director/NSX Manager and a remote Client
site.
First you need basic details from client so that you can
configure IPSec VPN from your end.Like you need Phase 1 and Phase 2
Details. (This document related to NSX Edge 6.3.2)
Image Credit VMware
Note: NSX Edge supports Main Mode for Phase 1 and Quick Mode for Phase 2.
Phase 1 Parameters
Phase
1 sets up mutual authentication of the peers, negotiates cryptographic
parameters, and creates session keys. The Phase 1 parameters used by NSX
Edge are:
- Main mode
- TripleDES / AES [Configurable]
- SHA-1
- MODP group 2 (1024 bits)
- pre-shared secret [Configurable]
- SA lifetime of 28800 seconds (eight hours) with no kbytes rekeying
- ISAKMP aggressive mode disabled
In
6.3.2 you Can see basic details or you can say this is mixed mode like
Phase 1 and Phase 2 they don’t have different tabs or options.
Here are details which you have to fill while configuring IPSec VPN for client.
Note: If you are doing this from HTML5 Console then in “Peer Subnets” You have to provide IP range from Increasing to Decreasing order like (192.168.11.0/24 and after that 192.168.10.0/24).
I
was trying to update this tab from vCloud Director Web and i was not
able to do so i changed this from vCenter > NSX manager > Edge
settings.
Client side settings must match with your Edge settings.
If
your Client have old router (Cisco) then you have to ask them to do
settings with supported parameter and these parameters are:
1. SHA1
2. Diffie-Hellman Group – DH5 or DH2 (Old router can only support this IOS 12.4)
3. Encryption Algorithm – AES256
2. Diffie-Hellman Group – DH5 or DH2 (Old router can only support this IOS 12.4)
3. Encryption Algorithm – AES256
NSX Edge to Cisco
- proposal: encrypt 3des-cbc, sha, psk, group5(group2)
After
setup you can export Settings from Edge and share it with Client
Network Team so that they can run it in their router and do the same
setup which you have done in your Edge gateway.
Go to
vCenter > NSX Manager > NSX Edges > Search your Edge and double
click > Manage (R.H.S) > VPN Tab > IPSec VPN and from here you
can download script for Cisco router.
You can copy and send it to client IT team.
Note: It will copy Shared key also so before sending to Client IT team remove that.
After this check the Tunnel status.
Go
to vCenter > NSX Manager > NSX Edges > Search your Edge and
double click > Manage (R.H.S) > VPN Tab > IPSec VPN
Comments
Post a Comment