There are certain limitations in the VMware Cloud on AWS such as VPNs configured terminating on T0. Hence we do not have a self-service VPN solution with CDS. VMware recommends openVPN as an alternate solution.
This document describes the steps to establish VPN connectivity between premises and the VMware Cloud Director using openVPN on PFSense firewalls running on LAN of premises and cloud end.
In this example, the premises side openVPN server would be running on PFSense (2.4.4-RELEASE) on the private network 10.105.0.0/19. Port TCP/1194 and TCP/443 would be used for openVPN server.
Since clients would be connecting to the public IP, we have forwarded TCP traffic coming to the premises firewall to the port TCP/1194 and TCP/443 to PFSense running on 10.105.0.0/19 network.
In this example we have SonicWall as the firewall. Steps for other firewalls would be different.
Where,
You need to install fresh PFSense on the premises side before you go ahead. You can assign static or DHCP IP to the PFSense WAN interface and access through GUI.
To configure openVPN server on PFsense click on “VPN” -> “OpenVPN” -> “Servers”
Important fields and their values:
Please refer following screenshot for more details:
On the same server configuration page, scroll down to the Tunnel Setting section
Where,
Private communication can happen using private IP addresses. In this case we used 10.8.0.0/24 subnet and Server pfsense can pick the 1st usable IP from that subnet and the 2nd usable IP can be automatically assigned to the client pfsense.
Note : This subnet should not conflict with On-premise and on-cloud networks.
We assign WAN interface while configuring PFsense after installation, also make sure LAN interface is assigned to the ovpnc1 which gets created after client configuration is done. Please make sure that the LAN interface is in enabled mode.
In this example we have allowed traffic for all services on WAN and OpenVPN interface, but if you want to specify the ports or services please follow the service-port-level-requirement-for-hdm section.
WAN interface firewall rules
OpenVPN firewall rules
We need to set a static route so that traffic for the required network can be routed through the otherside tunnel gateway which is 10.8.0.2 in this case. Default gateways for WAN and LAN interface
Static route to route a traffic to tunnel gateway for remote subnet.
Where,
In the Tenant portal, customers will need to create the NAT and FW rules to allow OUTBOUND internet access for Virtual Machines.
As a tenant customer will have to modify OVDC Gateway Services in Cloud Director:
The access can be controlled via the firewall rules. Like in the following example all ports and services are open for the routes network:
You need to install fresh PFSense on the premises side before you go ahead. You can assign static or DHCP IP to the PFSense WAN interface and access through GUI. PFSense server should be deployed on UPLINK_WAN_NETWORK created during Org. VDC configuration.
To configure openVPN Client on PFsense click on “VPN” -> “OpenVPN” -> “Client” ->”clients”
Where,
Server host or address is a public IP address on the premises side.
Scroll down to Cryptographic section
Where,
On the same server configuration page, scroll down to the Tunnel Setting section
Where,
We assign WAN interface while configuring PFsense after installation, also make sure LAN interface is assigned to the ovpnc1 network port which gets created after client configuration is done.
Please make sure that the LAN interface is in enabled state, to enable it click on “Interfaces” -> Interface name and tick “Enable” as shown below.
In this example we have allowed traffic for all services on WAN and OpenVPN interface, but if you want to specify the ports or services please follow the service-port-level-requirement-for-hdm section.
WAN interface firewall rules
OpenVPN firewall rules
We need to set a static route so that traffic for the required network can be routed through the tunnel gateway which is 10.8.0.1 in this case.
Defined gateways for LAN and WAN Interface,
Static route to route a traffic to tunnel gateway for remote subnet.
Where,
If you make any changes in OpenVPN settings either on server or client, you need to restart the OpenVPN services.
Click on “services” -> “OpenVPN” -> Click on the blue restart icon at left bottom.