This project assumes only public Internet traffic will be allowed to access the Web/Application servers via the Load Balancer Service which is listening on TCP port 80. The security groups and network acls prevent direct connectivity via SSH except through the VPN tunnel. A less secure approach would have been to attach floating public IP's to the VSIs and allow specific IP addresses to communicate over the public Internet. However, to demonstrate how the VPC can be secured the choice to use a VPN was made. The security group and network ACLs configured in this project allow all network traffic from the on-prem network, but additional security could be implemented by restricting the specific protocols and ports.
-
Infrastructure has been successfully provisioned using the Terraform plan in the previous step
-
a pre-shared-key was identified and was correctly specified in the terraform variables section
-
The on-prem CIDR block was identified and correctly specified in the terraform variables section
-
An on-prem VPN concentrator is available and you have the ability to configure remote connections to the VPC VPN on it
We will establish two IPSEC connections between a local on-prem VPN and the VPNaaS instances in the VPC zone 1 and zone 2 which were created as part of the Terraform Plan exeuction. You only need to configure the on-prem instance
- Configure the phase 1 parameters required to authenticate the remote peers
zone1-vpn-peer
andzone2-vpn-peer
noted on the output of the Terraform execution- Use
IKEv2
for authentication - Use
DH-group 2
in the phase 1 proposal - Use
lifetime = 36000
in the phase 1 proposal
- Use
- Configure the phase 2 parameters for required to create the VPN tunnel with
zone1-vpn-peer
andzone2-vpn-peer
noted on the output of the Terraform execution- Disable
PFS
in the Phase 2 proposal - Set
lifetime = 10800
- Specify the local and remote subnets that match what was specified in the
variables.tf
file for zone 1 and zone2 - Use the preshared key specificed in the
variables.tf
file.
- Disable
- Specify the pre-shared-secret which was specified in the
variables.tf
file. - Save configuration
- Start VPN connections
- Test connectivity to the VPC
- Once connectivity is established proceed to Configuring the Application Layer using Ansible