Overview
The goal of this documentation is to update the Site-To-Site VPN configuration with AWS and add specific configuration details for the Cisco Adaptive Security Appliance (ASA) feature TCP State-bypass, which is required in HA VPN scenarios (HA-VPN is a regional per VPC VPN solution. HA-VPN gateways have two interfaces, each with their own public IP address). NOTES :- A one-time or temporary access to the MacStadium cloud from a single virtual or physical machine is required.
- Cisco AnyConnect VPN is recommended.
- For more information, see Connecting to Your Cloud (via VPN)
Creating Stable IPSec Site-to-Site VPN
- Check the software version and model ( of the Cisco ASA/ASAv device of the MacStadium cloud.
- Configure the private cloud to connect to your MacStadium cloud. One or more of the following must be configured:
- Provide the public endpoint of the MacStadium cloud.
- This is the public network IP listed for the FW1-Outside network in Appendix B of the IP Plan.
- Enable policy-based routing between the private cloud and the internal private network the MacStadium cloud (default the Private-1 network).
- This is the private network host and range listed in Appendix A of the IP Plan.
- Enable inbound traffic to the private cloud.
- Provide the public endpoint of the MacStadium cloud.
- Set up the Cisco ASA/ASAv device of the MacStadium cloud. One or more of the following must be configured:
- A nat exemption rule for traffic between the two clouds.
- This allows traffic from the private cloud to the private network and the outside interface of the MacStadium cloud. By default, these are respectively the Private-1 and Outside networks listed in Appendix A of the IP Plan.
access-listrules permitting traffic from the private cloud to the public endpoint of the MacStadium cloud.- By default, this is the FW1-Outside network listed in Appendix B of the IP Plan.
- A crypto map rule that maps traffic between the two clouds.
- By default, this is the Outside network listed in Appendix A of the IP Plan.
- IPSec and IKE policies.
tunnel-grouprules that point to the private cloud that connect to the MacStadium cloud.
- Prepare these settings based on the Cisco ASA/ASAv software and model
Helpful Links
Cisco Documentation: Navigating the Cisco ASA Series Documentation Cisco Documentation: Managing Site-to-Site VPNs: The Basics Cisco Documentation: Cisco ASA Series Syslog Messages Logging into Your Cisco FirewallNetworking Setup for Private Cloud
WARNING : Because of the highly customizable nature of on-premises private clouds, this guide is not exact steps but rather general guidelines. NOTE : A one-time or temporary access must be established from a single virtual or physical machine to the MacStadium cloud. It is recommended to use Cisco AnyConnect VPN. For more information, see Connect to Your Cloud via VPN. To establish a stable and persistent connection, between the entire private cloud to the MacStadium cloud, then establish an IPsec Site-To-Site VPN between the two clouds.Creating IPSec Site-To-Site VPN between Two Clouds
- Check and document the software version and model of the Cisco ASA/ASAv device for the MacStadium cloud.
- Configure the private cloud to connect to the MacStadium cloud.
- One or more of the following might need to be configured.
- Provide the public endpoint of the MacStadium cloud.
- Usually, this is the public network IP listed for the FW1-Outside network in Appendix B of the IP Plan.
- Enable routing between the private cloud and the internal private network of the MacStadium cloud (by, default the Private-1 network).
- Usually, this is the private network host and range listed in Appendix A of the IP Plan (.).
- Enable inbound traffic to the private cloud.
- Provide the public endpoint of the MacStadium cloud.
- One or more of the following might need to be configured.
- Set up the Cisco ASA/ASAv device of the MacStadium cloud.
- You might need to configure one or more of the following rules:
- A NAT exemption rule for traffic between the two clouds. It might need to allow traffic from the private cloud to the private network and the outside interface of the MacStadium cloud. By default, these are respectively the Private-1 and Outside networks listed in Appendix A of the IP Plan.
- NOTE : NAT exemption allows the ability to exclude traffic from being translated with NAT. One scenario where this is typically done is for a site-to-site VPN tunnel.
- Access-list rules permitting traffic from the private cloud to the public endpoint of your MacStadium cloud. By default, this is the FW1-Outside network listed in Appendix B of the IP Plan.
- A crypto map rule that maps traffic between the two clouds. Usually, this is mapped to the outside interface of the MacStadium cloud. By default, this is the Outside network listed in Appendix A of the IP Plan.
- IPSec and IKE policies.
- Tunnel-group rules that point to the private cloud to connect to the MacStadium cloud.
- The TCP State Bypass feature, which requires an access-list, class-map, policy-map, and a service-policy. This is a requirement for Site-To-Site VPN with Virtual Tunnel Interfaces only and is configured to allow asynchronous routing between separate VPN tunnels.
- A NAT exemption rule for traffic between the two clouds. It might need to allow traffic from the private cloud to the private network and the outside interface of the MacStadium cloud. By default, these are respectively the Private-1 and Outside networks listed in Appendix A of the IP Plan.
- You might need to configure one or more of the following rules:
Networking Setup AWS
To establish a stable, persistent connection between Amazon Virtual Private Cloud (Amazon VPC) and the MacStadium private cloud, configure an IPsec Site-To-Site VPN between the two clouds. There are two VPN configuration options available, Policy-based and Route-based (VTI) VPN;- Policy-based VPN, there are two VPN tunnels where in AWS one tunnel is active (up), and one is passive (down). A monitoring service checks frequently if the active tunnel is up and, if not, brings the passive tunnel up, what ensures minimal downtime.
- Route-based (VTI) VPN, both tunnels are active at the same time and can route traffic in and out simultaneously. Also, this allows routing between MacStadium and AWS to be configured statically or dynamically with BGP. Route-based VPN is the preferred option as it offers enhanced routing and monitoring control.
Creating Site-To-Site VPN
This is done from an Amazon VPC to the MacStadium private cloud.- Log into the VPC service.
- Create a customer gateway.
- Set up a virtual private gateway.
- Create the Site-To-Site VPN connection.
- Ensure that AWS allows inbound traffic.
- Log in to the WS Management Console and access the VPC service.
Creating Customer Gateway
In AWS, the customer gateway represents the MacStadium endpoint of the Site-To-Site VPN connection. When you configure the customer gateway, use the networking information of the public network. By default, this is the FW1-Outside network. The networking information for this network in your IP plan. NOTE : For more information about the customer gateway, see Amazon VPC Documentation: Components of YourSite-To-Site VPN.- In the VPC service sidebar, locate the Virtual Private Network (VPN) menu and select Customer gateways.
- Click Create Customer Gateway.
- Provide a Name. Set a name that is easy to remember.
- In BGP ASN, use a private ASN in the range of 64,512–65,534. This is used later as the BGP process number in the MacStadium firewall.
- In the IP Address text box, provide the IP address of the public network listed in Appendix B of the IP IP Plan ( ). By default, this is the FW1-Outside network.
- Keep the other options with the default values and click Create Customer Gateway.
Setting Up Virtual Private Gateway
In AWS, the virtual private gateway represents the Amazon endpoint of the Site-To-Site VPN connection. NOTE : For more information about the virtual private gateway, see Amazon VPC Documentation: Components of Your Site-To-Site VPN.- In the VPC service sidebar, locate the Virtual Private Network (VPN) menu and select Virtual Private Gateways.
- Click Create Virtual Private Gateway.
- Provide a Name tag. Set a name that is easy to remember.
- Select Amazon default ASN and click Create Virtual Private Gateway.
- Connect to the VPN.
- After signing up, the IP Plan is sent. Review that information to configure access to the cloud environment. The recommended method of gaining access is via a Virtual Private Network (VPN), which is both easy to implement and secure.
- After signing up, the IP Plan is sent. Review that information to configure access to the cloud environment. The recommended method of gaining access is via a Virtual Private Network (VPN), which is both easy to implement and secure.
- On the Virtual Private Gateways dashboard, right-click the newly created virtual private gateway and select Attach to VPC.
- Select the VPC to attach the Virtual Private Gateway to and click Attach to VPC.
- Select the Propagation Enable checkbox.
- Click Save.
Creating Site-To-Site VPN Connection
If the customer gateway and a virtual private gateway are in place, then configure the Site-To-Site VPN connection. During setup, choose the customer gateway and the virtual private gateway to use, and configure that routing. NOTE : Route traffic to the internal, private network. By default, this is the Private-1 network. The networking information for this network in Appendix B of the IP Plan.- In the VPC service sidebar, locate the Virtual Private Network menu and select Site-To-Site VPN Connections.
- Click Create VPN Connection.
- Provide Name tag.
- For Target Gateway Type, select Virtual Private Gateway.
- For Virtual Private Gateway, select the virtual private gateway that was created earlier.
- Select Existing customer gateway, and from the Customer Gateway ID dropdown menu, select the customer gateway that was created earlier.
- Select the Routing Options:
- Static manually specifies the destination subnets of the VPN.
- Do not edit the Tunnel Options section.
- Click Create VPN Connection.
Allowing AWS Inbound Traffic
Based on the requirements and current setup, it might be necessary to enable inbound traffic from MacStadium to AWS. NOTE : For more information, see Amazon VPC Documentation: Security Groups for Your VPC and Amazon VPC Documentation: Network ACLs.AWS VPN Configuration for Cisco ASA/ASAv
NOTE : Proceed with the AWS VPN configuration for Cisco. After creating theSite-To-Site VPN connection in Amazon, configure the Cisco firewall to recognize the connection and let traffic into the MacStadium private cloud. Amazon provides a prefilled configuration file with very detailed instructions. Download the b configuration file and provide any missing information (indicated by placeholders). Then feed the configuration into the Cisco ASA/ASAv to complete the Site-To-Site VPN setup.- Download the configuration from Amazon
- Fill in the configuration blank
Downloading Amazon Configuration
Amazon has prefilled configurations ready for download, from a variety of vendors. The default firewall vendor for MacStadium private clouds is Cisco Systems, Inc.- Verify there is a Site-To-Site VPN connection in Amazon.
- For more information about how to set up your VPN, see Setting Up the AWS Side of the Site-To-Site VPN.
- Log in to the AWS Management Console and access your VPC service, which is located in the top right corner of the screen.
- In the VPC service sidebar, locate the Virtual Private Network menu and select Site-To-Site VPN Connections.
- In the list, select the newly created VPN connection and click Download Configuration.
- Vendor, select Cisco Systems, Inc.
- Platform, select ASA 5500 Series.
- Software:
- For a policy-based VPN, select ASA 9.x
- For a route-based VPN, select ASA 9.7 + VTI
- NOTE : If ASA 9.7 + VTI was selected, choose ikev2 as the IKE version and click Download.
Configuration Blanks
WARNING : Do not attempt AWS and ASA/ASAv configuration without proper experience, or unexpected consequences may happen. Manually replace the placeholders in the configuration file that were downloaded from Amazon (with the values for the MacStadium configuration). Policy-based VPN - ASA 9.x NOTE : Make sure that the name of all configuration elements in this script are unique, not currently in use in your environment.Configuration Parameters
| Placeholder Example | Description | More Information | Example |
|---|
Management Console and navigating to the VPC
dashboard. Select the VPC and checking the Description at the bottom of the screen. | 172.31.0.0
Management Console, and navigating to the VPC dashboard. Select the VPC, and check the Details at the bottom of the screen. Then convert the subnet mask bit notation to the
correct subnet mask
(For example, the /16 notation converts to a 255.255.0.0
subnet mask). | 255.255.0.0
AWS VPC. The host must reply to ICMP echo requests | 172.31.0.5
By default, this is the Private-1 network. | The IP Plan | 10.221.254.0
- Verify the configuration file from the AWS Management Console.
- Open the configuration file.
- Replace all placeholders with their respective values. Use Configuration parameters for reference.
- Uncomment the line:
access-list amzn-filter extended permit ip<.code> touncomment, remove !at the start of the line. </.code> - Uncomment the lines for object and nat configuration at the end of the config file.
- To uncomment, remove ! at the start of the line.
- Keep the following line to ensure the SLA monitor works as expected.
object network obj-SrcNet subnet 0.0.0.0 0.0.0.0- WARNING : Based on the network configuration and requirements, the line can be modified to map to the subnet and the subnet mask for the Private-1 network from your IP Plan. If this line is modified, then do not configure the <sla_monitor_address> value.
- On the following line, change 0.0.0.0 0.0.0.0 to a combination of the IP address and the subnet mask for your Amazon VPC.
- These values are in the AWS Management Console. Navigate to the VPC dashboard and select the VPC, and check the Description at the bottom of the screen.
- Convert the subnet mask bit notation to the correct subnet mask (for example, the /16 notation converts to a 255.255.0.0 subnet mask).
- For example:
- object network obj-amzn subnet 0.0.0.0 0.0.0.0
- On the following line, change inside and outside to the names of the internal private network and the outside interface of the MacStadium private cloud, respectively, as provided in Appendix A of the IP Plan. By default, these are Private-1 and Outside, respectively.
- nat (inside,outside) 1 source static obj-SrcNet obj-SrcNet destination static obj-amzn obj-amzn
- nat (Private-1,Outside) 1 source static obj-SrcNet obj-SrcNet destination static obj-amzn obj-amzn
- (Optional) Delete the remaining commented lines to clean up the file. Commented lines are indicated by ! at the beginning of the line.
- Save the changes.
Configuration Parameters for Route-based VPN - ASA 9.7 + VTI
| Placeholder Examples | Description | More Information | Example |
|---|
Plan.
By default, the value is Outside. | The IP Plan | Outside
MacStadium cloud as provided in
Appendix A of your IP Plan. By default, this is the Private-1 network. | The IP Plan | 10.221.254.0
VPC (without the subnet mask bit notation). | This value can be found by logging in to the AWS
Management Console, and navigate to your VPC dashboard.
Select the VPC and check the Description at the bottom of the
screen. | 172.31.0.0
- Verify the configuration file from the AWS Management Console.
- Open the configuration file.
- Replace the placeholders with their respective values. Currently, only the placeholder <outside_interface> is available in the AWS script. Use Table 1: Configuration parameters for reference.
- Change the name of the tunnel interfaces. Example:
- Replace the network address and mask on the BGP configuration. Example: router bgp 65513 address-family ipv4 unicast network <local_subnet> mask <local_subnet_mask>
- Replace the placeholders with their respective values.
- For a route-based VPN, enable the TCP State Bypass feature to allow the outbound and inbound traffic to flow through separate VPN tunnels as follows:
| Placeholder Example | Description | More Information | Example |
|---|
Access Control Lists | acl-state-bypass
TCP State Bypass | cm-state-bypass
TCP State Bypass | pm-state-bypass
- Define the Access list with the source and destination networks: access-list <acl-state-bypass> extended permit ip
- <local_subnet> <local_subnet_mask> <vpc_subnet> <vpc_subnet_mask>
- Save changes
Completing Cisco ASA/ASAv Configuration
To complete configuration into the Cisco ASA/ASAv, see Setting Up the MacStadium Side of the Site-To-Site VPN.Manually Enabling Route Propagation
Manually enable route propagation for the virtual private gateway. For more information about VPN routing, see Amazon VPC Documentation: Site-To-Site VPN Routing Options.- In the VPC service sidebar, locate the Virtual Private Cloud menu and select Route Tables.
- In the list of routing tables, select the main route table for your VPC.
- Select Route Propagation. If the virtual private gateway is not listed, the make sure that it is attached to the VPC.
- Click Edit route propagation.
(Open-Source Option) OpenConnect
Why OpenConnect?
For mostly CLI users, use OpenConnect - an open-source VPN client available from the command line.Download and Install OpenConnect
If Homebrew is enabled, then runbrew install openconnect from the command line.
For Windows users, download (build) the OpenConnect package or use Cisco AnyConnect.
Why OpenConnect?
Cisco firewalls are designed to work with the Cisco AnyConnect Secure Mobility Client as a VPN client. Users who prefer a GUI VPN client or prefer running on Windows, use Cisco AnyConnect.Download AnyConnect
- Download a VPN client. The recommend VPN client for MacStadium Private Clouds is Cisco AnyConnect.
- Open MacStadium Portal > Account Menu > Files.
- Open the file and locate the VPN Server section.
- From the browser, visit
https://<YOUR_VPN_SERVER_ADDRESS_HERE>.- NOTE : Firefox is required to get past the self-signed certificate blocker.
- When prompted, provide the VPN credentials from the IP Plan.
- After log in, download a licensed version of AnyConnect directly from the firewall.
Setup Process
- Log in using the username and password from the IP Plan.
- Cisco AnyConnect SecureMobility checks to see if Java is installed.
- If Java is installed, then Java is used.
- If Java is not installed, then a link for download is provided.
- Follow the installation prompts to complete the install.
- Once installation has completed:
- Select Settings
- Uncheck “Block connections to untrusted servers,” as the Cisco ASA appliance by default will be using a self signed certificate.
- From the main screen, enter the IP Address provided in theIP Plan.
- Click connect.
- Enter your username and password to confirm the connection.