Setting up site-to-site VPN

We recommend that you first read through our Prerequisites for site-2-site VPN guide. Follow these steps to setup site-to-site VPN using the cloud management portal:

  • Press “VPN” and then “Ipsec” in the sidebar menu.

  • Click the “+” symbol in the lower right corner.

  • Fill in the required information:

    • Name: This is a friendly name that will be used to distinguish the resources created by this template.

    • Admin SSH key pair: Your SSH key pair that can be used to access the pfSense instance by SSH.

    • Admin IP ranges: IP ranges in CIDR notation that will be allowed to access the pfSense instances WebUI and SSH server through the router. Usually this would be your offices (or like) public IP-address followed by “/32” (for instance 8.8.8.8/32) in which case traffic from 8.8.8.8 would be able to reach management. If you prefer open access to the VPN server, you can enter 0.0.0.0/32 here (not recommended) or leave the standard “127.0.0.1/32” which will not allow access other than from inside the cloud (for instance via the client-vpn). This can also be changed later by editing the security group IPSec-<name>-<random string>_management

    • Availability zone: This needs to be set to the same availability zone that was used for the private network that you intend to use.

    • pfSense instance flavor: The instance flavor used for the pfSense instance. The default gp.1x2 should be enough for most use cases.

    • Private network: The desired private network that will be exposed through IPSec.

    • IPSec pre-shared key: If you want to use a specific pre-shared key you may enter that here. If left at default, a random key will be generated for you.

    • IPSec peer IP: This should contain the public gateway address for the remote IPSec endpoint. It should not be a DNS name but an IP-address.

    • IPSec remote network: This should contain the network address (in CIDR notation) for the tunneled remote network.

  • Press “Create”. VPN creation takes considerably longer than setting up a standard instance. This is due to the (comparably) long first time bootstrap of the VPN instance when generating ciphers, etc.

  • Post installation tasks:

    • In the output of the stack, a “mgmt_url” parameter is shown. Save this, along with the “admin password” (the username is always “admin”). These are for doing additional configuration.

    • We recommend logging into the above URL and changing the password and pre-shared key, please see Advanced configuration for more information on this.

    • After the service creation is complete you will need to add routes to the remote subnets to get traffic flowing over VPN.

    • Add the newly created security group IPSec-<name>-<random string>_access to all instances that should be accessible from the remote end of the IPSec tunnel.

    • Once you are ready, proceed to configure the remote end of the tunnel.

Note

There are some steps included in the setup that may hit a pre-defined quota (for instance if you cant create more security groups or floating ips), these can then be raised by the support team. If the installation fails, you are able to get the reason by clicking the service and checking error messages.