This section provides step-by-step procedures on how to achieve connectivity between a Gateway and a VMware Cloud Gateway.
Overview
The following topology illustrates the Integration of Arista VeloCloud SD-WAN and VMware Cloud on AWS, which uses IPSec connectivity between the Arista VeloCloud SD-WAN Gateway and the VMware Cloud to Router.
Figure 1. Integration of Arista VeloCloud SD-WAN and VMware Cloud on AWS
Perform the following steps to configure Policy Based NSD through Gateway to VMware Cloud on AWS Gateway
Log into the VMware Cloud Console based on the URL for your SDDC organization.
On the Cloud Services Platform, select VMware Cloud on AWS.
Find the Public IP used for VPN connectivity by selecting the Networking and Security tab. The VPN Public IP displays below the Overview pane.
Figure 2. Networking and Security Overview
Determine the networks/subnets for traffic encryption selection and note them down. These should originate from Segments in Networking/Security in the VMware Cloud. Locate them by selecting Segments, under Network.
Log into the Orchestrator and verify the Edges are present with a green status icon displayed next to them.
Figure 3. Edges Overview
Go to the Configure tab and select Network Services, and then under Non-VeloCloud Sites, select the New button.
Figure 4. Network Services
Provide a name for the Non VeloCloud Site, select the type, in this case, Generic Firewall (Policy Based VPN), and Enter the Public IP from the VMC obtained in Step 2, and select Next.
Figure 5. New Non-VeloCloud Site
Select Advanced, and under the Primary VPN Gateway:
Change to the desired PSK.
Ensure encryption set to AES 256.
Change DH group to 5.
Enable PFS to 5.
Enter the site-subnets captured in Step 3.
Select the check box to Enable Tunnels.
Select Save Changes.
Figure 6. Tunnel to VMC
Select View IKE/IPSec Template and copy the information into a text file, and then close the window.
Figure 7. IKE IPSec Configuration
Select Configure > Profiles in the left pane.
Figure 8. Configuration Profiles
Navigate to the profile for the associated Edge and select the appropriate Profile.
Select the correct profile and perform the below steps:
Go to the Device tab, under Cloud VPN and Branch to Non-VeloCloud Site, select the check box next to Enable.
From the menu, select the NVS Network Service created in Step 5).
Select Save Changes at the top of the screen.
Figure 9. Configure Segments
The tunnel should be ready on the Orchestrator.
Log into the VMware Cloud Console.
Go to Networking and Security and select the VPN tab. In the VPN area, select Policy Based VPN, and select Add VPN
Figure 10. Single CSE
Provide a name for the Policy Based VPN and configure the following:
Select a name that starts with To_SDWAN_Gateway so the VPN can be easily identified during troubleshooting and future support).
Select the Public IP.
Enter the remote Public IP.
Specify the remote networks located on the Orchestrator.
Select the Local Networks.
Under Tunnel Encryption, select AES 256.
Under Tunnel Digest Algorithm, select SHA1.
Make sure Perfect Forward Secrecy is set to Enabled.
Enter the PSK, to match Step 7A.
Under IKE Encryption, select AES 256.
Under IKE Digest Algorithm, select SHA 1.
Under IKE Type, select IKEv2.
Under Diffie Hellman, select Group 5.
Select Save.
Figure 11. Policy Based VPN
Once the configuration completes, the tunnel automatically activates and proceeds to negotiate the IKE Phase 1 and Phase 2 parameters with the peer, which is the Gateway.
Figure 12. Gateway
Once the tunnel displays green, verify that the tunnel displays green in the Orchestrator (go to Monitor > Network Services)).
Figure 13. Network Services
Start a ping from a client connected at each end towards the opposite client, and verify ping reachability.