AWS Site-to-Site VPN
1
© Sonata Software Ltd, 2019. Confidential.
VPC
Platform Architecture Led Management (PALM) Framework
Subnet
Route Table
AMI Athena CodeCommit
Account Creation Users Security Group EC2 Instance Block Storage RDS CloudWatch Inspector
DMS
Object Storage (S3) Elastic Search
AWS Organizations (EBS) CloudTrail
Volume Snapshot CodeBuild
Roles DynamoDB GuardDuty Service SMS
NACL Lambda File Storage (EFS, FSx) RDS Backup
AD Key Management Kinesis CodeDeploy
Policies Elasticache Trusted Advisor Cloud Endure
SSO ELB/ALB /NLB AWS Backup Service DR Setup
Elastic Beanstalk Cloud Pipeline
MFA Amazon Timestream Config EMR
Nat Gateway WAF & Shield
CloudShell
EC2 Image Builder Amazon Keyspaces AWS Auto Scaling AWS Firewall Amazon Redshift
IGW Manager CodeStar
CloudFormation AWS Glue
VPC Flow Logs Security Hub CodeArtifact
System Manager Data Pipeline
CloudFront
Route53
Transit Gateway
Site-to-Site VPN
Direct Connect
Gateway
Management
Network Compute Security & Developer
Account IAM Storage DB & Backup & DR Analytics Migration
(VPC) (EC2) Compliance Tools
Governance
2
© Sonata Software Ltd, 2019. Confidential.
Prerequisites for Site-to-Site VPN
S:NO Prerequisites Options Customer Input
1 AWS Account setup refer Account setup SOP
Example : User : test or test@sonata-
2 AWS login credentials IAM User creation with necessary(S3) privileges (Refer IAM user SOP)
software.com Passowrd : 12345
AWS Region name (where you want to create Asia Pacific (Mumbai) ap-south-1 (As per
3 In AWS Console right side top corner,you can select Region from drop-down list your requrment you can choose the
the S3 Bucket)
US East (N. Virginia)us-east-1,US East (Ohio)us-east-2, ect region )
Enter the Name
4 Name tag Choose as per your requiest
Creates a tag with key = Name and value set to specified string.
Select the Target Gateway type based on the requirement
5 Target Gateway Type Virtual Private Gateway
Transit Gateway
6 Virtual Private Gateway Select from the drop down,Based on the requirement
New
7 Customer Gateway Existing
Select from the drop down
8 Customer Gateway ID Select from the drop down
Dynamic (requires BGP)
9 Routing Options
Static
Select based on the requirement
10 Tunnel Inside Ip Version IPv4
IPv6
11 Local IPv4 Network Cidr Customer Gateway CIDR range
3
© Sonata Software Ltd, 2019. Confidential.
Prerequisites for Site-to-Site VPN
S:NO Prerequisites Options Customer Input
12 Remote IPv4 Network Cidr AWS side CIDR range
13 Inside IPv4 CIDR for Tunnel 1 A /30 CIDR in the 169.254.0.0/16 range.
14 Pre-Shared Key for Tunnel 1 A /30 CIDR in the 169.254.0.0/16 range.
15 Inside IPv4 CIDR for Tunnel 2 A /30 CIDR in the 169.254.0.0/16 range.
A 8-64 character string with alphanumeric, underscore(_), and dot(.). It
16 Pre-shared key for Tunnel 2
cannot start with 0
Use Default Options
17 Advanced Options for Tunnel 1
Edit Tunnel 1 Options
Use Default Options
18 Advanced Options for Tunnel 2
Edit Tunnel 2 Options
4
© Sonata Software Ltd, 2019. Confidential.
AWS Single Site-to-Site VPN connection
5
© Sonata Software Ltd, 2019. Confidential.
Steps to create VPN Connection
Step1: Create VPC
Login to AWS Console and navigate to VPC services. Create a VPC in AWS with the specific CIDR range or use an existing
VPC and extract the CIDR range.
Example VPC name and CIDR : my-demo-vpc and the CIDR range is 10.0.0.0/16
Step2: Create Customer gateway
Click on Customer Gateways link in VPC service page and enter the following details. You might need some
details from your On-Premises Network administrator before you fill this section.
6
© Sonata Software Ltd, 2019. Confidential.
Step 3: Create Customer gateway
Name: demo-customer-gateway
Routing: You can select either Static/Dynamic.
In-case of Static routing, you need to enter the PUBLIC IP of your On-Premise router. You can
choose Dynamic routing option, if your On-Premises router supports dynamic routing. Check with
your On-Premise Network Administrator to get more details.
IP Address: Enter the Public IP address given by your On-Premise Network Administrator
BGP ASN : You can use an existing ASN number or enter Private ASN range given by AWS.
Certificate ARN: This is a fairly new feature. You can provide certificate created using ACM to take
advantage of the added security and flexibility. If you do not want to use pre-shared keys, you can use a
private certificate from AWS Certificate Manager(ACM) Private Certificate Authority to authenticate your
VPN
Click on Create Customer Gateway button
Newly created Customer Gateway name is demo-customer-gateway
7
© Sonata Software Ltd, 2019. Confidential.
Step 4 :Create VPN Connection
Final step of creating a Site-to-Site VPN Connection to bridge between On-Premise data center to AWS
VPC
Click on Site-to-Site VPN Connections link from below
Enter the details as mentioned below and click on Create VPN Connection button
8
© Sonata Software Ltd, 2019. Confidential.
Virtual Private Gateway: Enter VGW Id Created in demo-customer-gateway
Customer Gateway: Existing
Customer Gateway ID: Enter CGW Id Created in Create Customer gateway
Routing Options: Static
Static IP Address: Full IP range of Customer network CIDR (Ask
On-Prem Admin)
Tunnel Options: Leave this option as default. Amazon always creates two tunnels by default in two
different availability zones using two different public IP addresses for high availability
Select the options according to the prerequisites collected.
9
© Sonata Software Ltd, 2019. Confidential.
Create VPN Connection
10
© Sonata Software Ltd, 2019. Confidential.
Once you click on Create VPN Connection, It may take sometime and you can see the create state
as PENDING for sometime.
Once the VPN connection is created then you need to select the newly created VPN
connection and click on Download Configuration button.
Choose Vendor, Platform and Software before clicking on download button. This
information can be provided by your On-Premise administrator.
Once you have the configuration file downloaded for specific Vendor and platform then send
this file to your On-Premise administrator who will complete the final step of configuring the
On-Premises network.
Note: We have established a connection between On-Premise to AWS VPC. Now you can add
extra security in your VPC using NACLs and Security Groups to limit the IP range that you allow
from On-Premise.
11
© Sonata Software Ltd, 2019. Confidential.
Thank You
For any clarifications, please get back to
Product Support
[email protected]