AWS Networking Setup

To establish a stable, persistent connection between Amazon Virtual Private Cloud (Amazon VPC) and your MacStadium private cloud, you need to configure an IPsec site-to-site VPN between the two clouds.

Currently, Amazon lets you create a site-to-site VPN where at all times one tunnel is active (up) and one is passive (down). A monitoring service checks frequently if the active tunnel is up and, if not, brings the passive tunnel up instead. This ensures minimal downtime.

Routing from Amazon to MacStadium is static.

To create a site-to-site VPN from your Amazon VPC to your MacStadium private cloud, you need to go through the following high-level steps:

  1. Log in to your VPC service
  2. Create a customer gateway
  3. Set up a virtual private gateway
  4. Create the site-to-site VPN connection
  5. Ensure that AWS allows inbound traffic

Log in to your VPC service

  1. Log in to your AWS Management Console and access your VPC service.
  2. In the top right corner of the screen, make sure that you're working in the correct region.

Create a customer gateway

In Amazon, the customer gateway represents the MacStadium endpoint of the site-to-site VPN connection. When you configure the customer gateway, you need to use the networking information for your public network. By default, this is the FW1-Outside network. You can find the networking information for this network in Appendix B of your IP Plan.

For more information about the customer gateway, see Amazon VPC Documentation: Components of Your Site-to-Site VPN.

  1. In the VPC service sidebar, locate the Virtual Private Network menu and select Customer Gateways.
  1. Click Create Customer Gateway.
  1. Provide a Name.
    Set a name that helps you identify the gateway easily.
  2. Select Static routing.
  3. In the IP Address text box, provide the IP address of the public network listed in Appendix B of the IP Plan.
    By default, this is the FW1-Outside network.
  4. Click Create Customer Gateway.

Set up a virtual private gateway

In Amazon, the virtual private gateway represents the Amazon endpoint of the site-to-site VPN connection.

For more information about the virtual private gateway, see Amazon VPC Documentation: Components of Your Site-to-Site VPN.

  1. In the VPC service sidebar, locate the Virtual Private Network menu and select Virtual Private Gateways.

  2. Click Create Virtual Private Gateway.

  1. Provide a Name tag.
    Set a name that helps you identify the gateway easily.
  2. Select Amazon default ASN and click Create Virtual Private Gateway.
  3. On the Virtual Private Gаteways dashboard, right-click the newly created virtual private gateway and select Attach to VPC.

Next, you need to manually enable route propagation for the virtual private gateway. For more information about VPN routing, see Amazon VPC Documentation: Site-to-Site VPN Routing Options.

  1. In the VPC service sidebar, locate the Virtual Private Cloud menu and select Route Tables.
  1. In the list of routing tables, select the main route table for your VPC.
  2. At the bottom of the screen, select Route Propagation.
    If your virtual private gateway is not listed, make sure that it's attached to the VPC.
  3. Click Edit route propagation.
  1. Select the Propagate checkbox and click Save.

Create the site-to-site VPN connection

After you have a customer gateway and a virtual private gateway in place, you can configure the site-to-site VPN connection. During setup, you need to choose the customer gateway and the virtual private gateway that you want to use and configure routing. You need to route traffic to your internal, private network. By default, this is the Private-1 network. You can find the networking information for this network in Appendix B of your IP Plan.

  1. In the VPC service sidebar, locate the Virtual Private Network menu and select Site-to-Site VPN Connections.
  1. Click Create VPN Connection.
  1. Provide Name tag.
  2. For Target Gateway Type, select Virtual Private Gateway, and from the Virtual Private Gateway drop-down menu, select the virtual private gateway you created earlier.
  3. Select that you want to use an Existing customer gateway, and from the Customer Gateway ID drop-down menu, select the customer gateway that you created earlier.
  4. For Routing Options, select Static.
  5. In Static IP Prefixes, provide the CIDR notation for the private network listed in Appendix A of the IP Plan (by default, the Private-1 network).
    For more information about CIDR notations, see Understanding IP Addresses, Subnets, and CIDR Notation for Networking. You can also use a CIDR calculator such as this CIDR/Netmask Lookup Tool.
  6. Do not edit the Tunnel Options section.
  7. Click Create VPN Connection.

Ensure that AWS allows inbound traffic

Based on your requirements and current setup, you might need to enable inbound traffic from MacStadium to AWS. For more information, see Amazon VPC Documentation: Security Groups for Your VPC and Amazon VPC Documentation: Network ACLs.

Next steps

If you are ready to proceed with the MacStadium side of the configuration, see Preparing the VPN Configuration for Input into Cisco ASA/ASAv.

Updated 2 months ago


AWS Networking Setup


Suggested Edits are limited on API Reference Pages

You can only suggest edits to Markdown body content, but not to the API spec.