Use the steps in this topic to enable IPSec VPN on the NSX Edge instance.
Prerequisites
To enable certificate authentication, server certificates and corresponding CA-signed certificates must be imported. Optionally, you can use an open-source command-line tool such as OpenSSL to generate CA-signed certificates.
Self-signed certificates cannot be used for IPSec VPN. They can only be used in load balancing and SSL VPN.
Procedure
- Log in to the vSphere Web Client.
- Click .
- Double-click an NSX Edge.
- Click .
- Next to Global Configuration, click Edit or Change.
- Enter a global pre-shared key for those sites whose peer endpoint is set to "any".
To view the pre-shared key, click the
Show Pre-Shared Key (
) icon or select the
Display shared key check box.
- Configure the global extensions.
The following table describes the global extensions.
Extension |
Description |
add_spd |
Allowed values are on and off . The default value is on , even when you do not configure this extension.
When
add_spd=off :
- Security policies are installed only when the tunnel is up.
- If the tunnel is up, packets are sent encrypted through the tunnel.
- If the tunnel is down, packets are sent unencrypted, if a route is available.
When
add_spd=on :
- Security policies are installed regardless of whether the tunnel is established.
- If the tunnel is up, packets are sent encrypted through the tunnel.
- If the tunnel is down, packets are dropped.
|
ike_fragment_size |
If the maximum transmission unit (MTU) is small, you can set the IKE fragment size by using this extension to avoid failures in the IKE negotiation. For example, ike_fragment_size=900 |
ignore_df |
Allowed values are
on and
off . Default value is
off .
- When
ignore_df=off , NSX Edge copies the value of the "don't fragment (DF)" bit from the clear text packet to the encrypted packet. This implies that if the clear text packet has the DF bit set, after encryption, the packet also has the DF bit set.
- When
ignore_df=on , NSX Edge ignores the value of the DF bit in the clear text packet, and the DF bit is always 0 in the encrypted packet.
-
Set this flag to on when the DF bit is set in the clear text packet and the size of the packet after encryption exceeds the MTU of the TCP packet. If the DF bit is set, the packet is dropped, but if the bit is cleared, the packet gets fragmented.
|
- Enable certificate authentication, and then select the appropriate Service certificate, CA certificate, and the certificate revocation list (CRL).
- Click Save or OK, and then click Publish Changes.