VMware Cloud Director supports site-to-site policy-based and route-based IPSec VPN between an NSX edge gateway instance and a remote site.
IPSec VPN offers site-to-site connectivity between an edge gateway and remote sites which also use NSX or which have either third-party hardware routers or VPN gateways that support IPSec.
Policy-based IPSec VPN requires a VPN policy to be applied to packets to determine which traffic is to be protected by IPSec before being passed through a VPN tunnel. This type of VPN is considered static because when a local network topology and configuration change, the VPN policy settings must also be updated to accommodate the changes.
NSX edge gateways support split tunnel configuration, with IPSec traffic taking routing precedence.
VMware Cloud Director supports automatic route redistribution when you use IPSec VPN on an NSX edge gateway.
Starting with version 10.6, you can configure site-to-site route-based IPSec VPN. For route-based IPSec VPN for NSX edge gateways, VMware Cloud Director supports only static routes. Route-based IPSec VPN uses standard routing protocols and provides better scalability. It is better suited for larger and more complex networks.
Configure NSX IPSec VPN in the VMware Cloud Director Service Provider Admin Portal
You can configure site-to-site connectivity between an NSX edge gateway and remote sites. The remote sites must use NSX, have third-party hardware routers, or VPN gateways that support IPSec.
VMware Cloud Director supports automatic route redistribution when you configure IPSec VPN on an NSX edge gateway.
Prerequisites
- If you want to configure an NSX route-based IPSec VPN tunnel, configure static routing. See Configure Static Routing on an NSX Edge Gateway in the VMware Cloud Director Service Provider Admin Portal.
- If you plan to use certificate authentication to secure the IPSec VPN communication, verify that your system administrator has uploaded the server certificate for the local NSX edge gateway and a CA certificate for your organization to the VMware Cloud Director certificates library.
-
If you want to restrict the number of security profiles available to your tenants, you can use the
manage-config
subcommand of the VMware Cloud Director cell management tool (CMT). For example, if you want to restrict the list toFIPS
andFoundation
, run the following CMT command./opt/vmware/vcloud-director/bin/cell-management-tool manage-config -n networking.gatewayIpSecVpnTunnelSecurityTypeDisallowList -v PROVIDER_PREFERRED,FIPS,FOUNDATION
Procedure
Results
What to do next
- To verify that the tunnel is functioning, select it, and click View Statisticts.
If the tunnel is functioning, Tunnel Status and IKE Service Status both display Up.
- Configure the remote endpoint of the IPSec VPN tunnel.
- You can edit the IPSec VPN tunnel settings and customize its security profile as needed.
Customize the Security Profile of an IPSec VPN Tunnel in the VMware Cloud Director Service Provider Admin Portal
If you decide not to use the system-generated security profile that was assigned to your IPSec VPN tunnel upon creation, you can customize it.