Anypoint VPC DLB and VPN - Part VII | MuleSoft | VPN Architecture | IPSec Tunneling and VPC Peering

Mule Technology Academy - Zero To Hero
15 Jul 202018:00

Summary

TLDRIn this educational video, Jeetendra, a senior music architect, explains the concept of a MuleSoft Anypoint Virtual Private Network (VPN). He covers how to set up a secure connection between cloud environments and on-premise data centers using Anypoint VPN. The tutorial includes details on IPSec tunneling, dynamic vs. static routing, and configuring VPN endpoints. It also touches on VPC peering for connecting private subnets within the same region, emphasizing the importance of proper configuration for stable cloud-to-datacenter communication.

Takeaways

  • 😀 Jeetendra and Bhavna introduce themselves as senior music architects.
  • 🔒 The video discusses Anypoint VPN, a secure connection between cloud and on-premise data centers.
  • 🌐 Anypoint VPN supports IPSec tunneling, creating side-to-side Internet Protocol security connections.
  • 🛠️ Each Anypoint VPN consists of two tunnels, allowing connection to a single IP address at a remote location.
  • 🔗 A VPN device on the on-premise data center has a remote IP address, which is connected to from the cloud.
  • 🌐 Anypoint VPN supports up to 10 VPN connections per VPN gateway, associated with a single VPC.
  • 🚀 The maximum throughput provided by Anypoint VPN is approximately 1.25 Gbps.
  • 🔄 Anypoint VPN supports two types of routing: dynamic routing (using BGP protocol) and static routing.
  • 🔑 Static routing requires specifying CIDR blocks that need to be accessible through the VPN endpoint.
  • 🖥️ The video provides a step-by-step guide on setting up an Anypoint VPN, including selecting a VPC, entering a remote IP address, and choosing routing types.
  • 🔧 The video also explains how to set up IPSec tunneling for a VPN, including configuring tunnels and selecting tunnel configurations.

Q & A

  • What is a MuleSoft Virtual Private Network (VPN)?

    -A MuleSoft VPN, also known as Anypoint VPN, creates a secure connection between a cloud environment and an on-premise data center.

  • Why is it necessary to set up a VPN between cloud and on-premise data centers?

    -It's necessary to access databases, services, or systems located in an on-premise data center when your application is deployed in the cloud.

  • What are the capabilities of Anypoint VPN?

    -Anypoint VPN supports site-to-site Internet Protocol security connections, enabling you to connect to a single IP address at a remote location and to another VPN.

  • What is the maximum throughput provided by Anypoint VPN?

    -The maximum throughput provided by Anypoint VPN is around 1.25 Gbps.

  • What are the two types of routing supported by Anypoint VPN?

    -Anypoint VPN supports dynamic routing (using BGP protocol) and static routing.

  • What is a VPN endpoint and how is it related to a VPN connection?

    -A VPN endpoint is a physical or software appliance that terminates the connection on the on-premise side. Each VPN device has a remote IP address that is connected to the cloud environment.

  • How many VPN connections can one VPN support?

    -One VPN can support up to 10 VPN connections.

  • What is the difference between dynamic and static routing in the context of VPN?

    -In dynamic routing, if the VPN device supports BGP protocol, it can be used. In static routing, you have to provide the CIDR blocks that need to be accessible through the VPN endpoint.

  • What is the role of a pre-shared key (PSK) in setting up a VPN?

    -A pre-shared key (PSK) is used for authentication between the on-premise and cloud VPN connection and can be from 8 to 64 characters long.

  • What is the purpose of downloading a VPN config after setting up a VPN?

    -The VPN config is downloaded to provide the necessary configuration details to the network administrator for setting up the VPN device and ensuring a stable connection between the cloud and on-premise data centers.

  • What is VPC peering and when should it be used?

    -VPC peering is used to connect VPCs, allowing direct routing of traffic between them. It should be used when you want to peer between two subnets or private VPCs.

Outlines

00:00

🌐 Introduction to Anypoint VPN

The paragraph introduces the concept of a Virtual Private Network (VPN) and specifically, Anypoint VPN. The speaker, Jeetendra, explains that a VPN creates a secure connection between a cloud environment and an on-premise data center. He discusses the need for such a connection when applications are deployed in the cloud and require access to databases or services located on-premises. Anypoint VPN supports IPSec tunneling, which allows for the creation of two tunnels to connect to a single IP address at a remote location. The paragraph also touches on the capabilities of Anypoint VPN, such as supporting up to 10 VPN connections per VPC and offering a maximum throughput of 1.25 Gbps. It also explains the difference between dynamic and static routing, with dynamic routing requiring support for the BGP protocol and static routing requiring manual configuration of CIDR blocks.

05:01

🛠️ Setting Up IPSec Tunneling VPN

This section provides a step-by-step guide on how to set up an IPSec tunneling VPN between a cloud environment and an on-premise data center. The speaker describes the process of configuring a VPN, starting with setting up a VPC and then creating a VPN connection. He explains the need to provide a name for the VPN, select the appropriate VPC, and enter the remote IP address of the VPN endpoint. The paragraph also discusses the two types of routing: dynamic and static. For dynamic routing, the speaker mentions the requirement for the VPN device to support the BGP protocol and the need to enter a remote ASN. For static routing, he explains the need to provide CIDR blocks that need to be accessible through the VPN. The speaker also mentions the ability to add up to 95 CIDR blocks for static routing. A diagram is referenced to illustrate the process.

10:02

🔐 Tunnel Configuration and VPN Status

The paragraph discusses the tunnel configuration options for setting up a VPN, which include automatic and custom configurations. In automatic configuration, the system handles the creation of tunnels (tunnel 1 and tunnel 2) without additional input from the user. For custom configuration, the user must provide a pre-shared key (PSK) for authentication and specify a point-to-point CIDR block, which must be unique across all VPN connections and cannot be one of the reserved CIDR blocks. The speaker also explains the various statuses a VPN can have, such as pending, down, up/down, and up/up, each indicating a different stage in the VPN creation or operational process. The paragraph concludes with instructions on downloading the VPN configuration once the VPN has been successfully created, which can then be shared with network administrators for further setup.

15:03

🔄 VPC Peering as an Alternative to VPN

In this paragraph, the speaker introduces VPC Peering as an alternative to VPN for connecting to AWS private subnets when all applications are within the private subnet of an AWS cloud. VPC Peering allows for direct routing of traffic between two VPCs, making them appear as if they are on the same network. The speaker explains that VPC Peering is used when there is a need to peer between two subnets or a private VPC with an AWS cloud. He mentions that for setting up VPC Peering, the cloud VPC and the AWS private VPC must be in the same region. The paragraph concludes with a note that if a user wishes to set up VPC Peering, they must contact MuleSoft support and fill out a discovery template. The speaker also points out that while VPN setup can be done as a self-service, VPC Peering requires assistance from MuleSoft support.

Mindmap

Keywords

💡MuleSoft

MuleSoft refers to a company that specializes in providing integration software for connecting applications, data, and devices. In the context of the video, MuleSoft is likely the platform on which the presenter is demonstrating the setup of a Virtual Private Network (VPN). The script mentions setting up a VPN on MuleSoft, indicating that it is part of the integration process for connecting different systems.

💡Virtual Private Network (VPN)

A Virtual Private Network is a service that creates a secure, encrypted connection over the internet, allowing users to send and receive data while maintaining privacy and security. In the video, the presenter discusses setting up an Anypoint VPN, which is a type of VPN service provided by MuleSoft, to create a secure connection between a cloud environment and an on-premise data center.

💡Anypoint VPN

Anypoint VPN is a specific type of VPN service offered by MuleSoft that allows for secure connections between cloud environments and on-premise data centers. The video script explains how to set up an Anypoint VPN, emphasizing its role in creating a secure tunnel for data transmission between different network environments.

💡Cloud Environment

A cloud environment refers to the infrastructure where computing resources such as servers, storage, and applications are delivered over the internet. In the video, the cloud environment is where the presenter's application is deployed, and they need to access databases and services located in an on-premise data center via a VPN.

💡On-Premise Data Center

An on-premise data center is a physical facility that houses a company's servers and other computing hardware. In the script, the presenter mentions needing to access databases and services that exist within an on-premise data center, which is separate from the cloud environment where the application is deployed.

💡IPSec Tunneling

IPSec (Internet Protocol Security) tunneling is a protocol used to secure communications over an IP network. In the video, IPSec tunneling is a key feature of the Anypoint VPN, creating a secure connection between the cloud and on-premise data centers. The script describes how to configure IPSec tunneling as part of setting up the VPN.

💡Dedicated Load Balancer

A dedicated load balancer is a device that distributes network traffic across multiple servers to ensure no single server becomes overwhelmed. The video script references setting up a dedicated load balancer in a previous video, which is a separate concept from VPN but related to network infrastructure management.

💡Shared Load Balancer

A shared load balancer is a load balancer that is shared among multiple clients or applications. The script contrasts shared load balancers with dedicated ones, suggesting that there are different configurations depending on the needs of the network infrastructure.

💡VPC

VPC stands for Virtual Private Cloud, a term used in cloud computing to describe a dedicated portion of a cloud infrastructure where organizations can have virtual networks. The script mentions setting up a VPC as a prerequisite for creating an Anypoint VPN, indicating that the VPC is the cloud environment within which the VPN is configured.

💡Routing

Routing refers to the process of selecting paths for data to travel in a network. The video script discusses two types of routing for VPNs: dynamic routing, which uses a protocol like BGP, and static routing, where specific routes are manually configured. The presenter explains how to choose between these two options when setting up an Anypoint VPN.

💡VPN Endpoint

A VPN endpoint is one end of a VPN connection, typically located in an on-premise data center. The script describes the VPN endpoint as the device that terminates the connection on the on-premise side, with a remote IP address that needs to be configured as part of setting up the VPN.

Highlights

Introduction to Anypoint VPN for creating a secure connection between cloud and on-premise data centers.

Explanation of VPN and its function to access databases or services on-premises from the cloud.

Description of Anypoint VPN's capability to support side-to-side IPSec tunneling.

Details on how Anypoint VPN connects to a single IP address at a remote location.

Mention of the physical or software implementation called a VPN endpoint.

Information on how one VPN is associated with a single VPC but can support up to 10 VPN connections.

Explanation of the maximum throughput provided by Anypoint VPN, which is around 1.25 Gbps.

Description of the two types of routing supported by Anypoint VPN: dynamic and static.

Instructions on setting up an IPSec tunneling VPN between cloud and on-premise data centers.

Step-by-step guide on configuring Anypoint VPN, including selecting the VPC and entering the remote IP address.

Discussion on dynamic routing with BCP protocol and static routing with CIDR blocks.

Clarification on the local ASN and remote ASN for dynamic routing configuration.

Explanation of the tunnel configuration process in Anypoint VPN, including automatic and custom options.

Description of VPN status changes from pending to available and the actions required for configuration.

Instructions on downloading the VPN configuration for various devices.

Differentiation between Anypoint VPN for cloud-to-on-premise connectivity and VPC peering for cloud-to-cloud connectivity.

Process of setting up VPC peering and considerations for its configuration.

Advice on contacting MuleSoft support for setting up VPC peering.

Transcripts

play00:06

hello friends my name is Jeetendra

play00:09

Bhavna I am a senior music architect in

play00:12

today's video we are going to see what

play00:14

is a mule soft virtual private network

play00:17

that is any point VPN in last video we

play00:20

have seen like how we can set up the VPC

play00:22

how we can set up the dedicated load

play00:24

balancer what is the difference between

play00:25

shared load balancer and the dedicated

play00:27

load balancer so I will suggest before

play00:30

watching this video please go through

play00:32

those to do so it will give the idea on

play00:35

like what is the vbc what is dedicated

play00:37

load balancer and it will make no easy

play00:40

for you to understand the moonship

play00:42

Virtual Private Network okay so we'll

play00:46

start it with what is the muse of pipian

play00:48

or any point VPN so VPN is basically

play00:51

stand for virtual private network and

play00:53

any point VPN a create a secure

play00:55

connection between a cloud up and your

play00:57

on-premise data center what does this

play00:59

means basically let consider you have

play01:02

deployed your application on the cloud

play01:04

up and now you want to access a micro

play01:07

subsequent database or any any database

play01:09

which is exist on on-premise data data

play01:12

center or maybe any services or any

play01:15

system which exists on the on-premises

play01:18

data center okay so how you can access

play01:21

that so for that you need to create a

play01:23

VPN between your cloud up and your

play01:26

on-premise data center so what are the

play01:29

various capability of any point VPN so

play01:32

any point VPN support a side to side

play01:34

Internet Protocol security connections

play01:37

so that is the IPSec tunneling each any

play01:41

point consists of two tunnels that

play01:43

enables you to connect to a single IP

play01:46

address at the remote location and to

play01:48

connect the additional remote location

play01:50

here at another VPN so what does this

play01:52

mean so basically you have one VPN

play01:56

device on your on-premise data center so

play01:58

each VPN device have a a remote IP

play02:01

address right so what we are doing from

play02:04

cloud of we are connecting to that

play02:06

remote IP address or to that remote or

play02:08

to that VPN endpoint so in other guess

play02:12

like you know in some cases

play02:13

you may have to do you know connect to

play02:15

the multiple VPN devices so cause some

play02:17

data center may have a multiple VPN

play02:19

devices so in that case you create a

play02:22

multiple VPN to connect them multiple

play02:24

VPN devices okay

play02:27

so what is like you know the physical or

play02:29

software implants is called as a VPN

play02:31

endpoint which I mentioned that is the

play02:32

VPN device is a terminator on your side

play02:35

of the connection the mule side mule

play02:38

sub-site of a connection is

play02:40

implementation of a virtual private

play02:41

gateway so basically mules of all vgw is

play02:48

associated with a single V PC okay so

play02:50

one VPN is associated with a single V PC

play02:53

but can support up to 10 VPN connections

play02:57

ok so you can like one V PC can be

play03:00

associated with no I like are 10 VPNs

play03:04

basically and they split provided by a

play03:07

muse of VPN is are around like know the

play03:09

maximum throughput is around one point

play03:11

25 Gbps so what is like what kind of you

play03:18

know it supports two kind of routing one

play03:21

is dynamic routing and one is static

play03:23

routing

play03:24

so in dynamic routing basically you know

play03:26

if your VPN device is supporting a BCP

play03:29

protocol in that case you can go with a

play03:31

dynamic routing that is the border

play03:32

gateway protocol okay in case if your

play03:35

VPN device or if your VPN endpoint it

play03:39

doesn't support a dynamic routing then

play03:41

you can use the static routing in static

play03:42

routing what you have to do you have to

play03:44

provide the CIDR mass you know subnets

play03:46

that needs to be accessible through your

play03:49

endpoint VPN so basically you have a one

play03:53

premise data center and your application

play03:55

might be exist in some subnet right

play03:57

right but you're like you want to egg

play04:00

you know X is the MS sequel database or

play04:02

some services you know some back-end

play04:03

services they might be existing on some

play04:05

subnet so you have to configure do

play04:08

subnet in the any point of VPN so you

play04:12

are saying like I am along allowing this

play04:14

particular subnet for cloud up to

play04:18

connect on premise data center so that

play04:22

is how the IPSec VPN I personally look

play04:25

so I have created

play04:27

my VPC which is ten dot zero dot one dot

play04:29

zero 24 I have on pretty much the data

play04:32

center which ever like CIDR block or up

play04:35

one ninety two dot one sixty eight dot

play04:36

zero dot zero dot slash twenty two which

play04:39

our database and some back in services

play04:40

and I deployed some of the application

play04:42

in my cloud of within the V PC and I

play04:44

want to access these databases and

play04:46

service so for that what I will do I

play04:48

will set up a VPN between a cloud of and

play04:51

the on-premise data center so VPN will

play04:53

have its remote IP address so VPN device

play04:55

will have a remote ID IP address or it

play04:57

is also known known as you know it is

play05:01

also known as basically like the VP an

play05:07

endpoint basically okay so this is how

play05:11

we can set up a IPSec tunneling VPN

play05:13

between cloud and on-premise data center

play05:15

so that is the secure connection between

play05:17

your cloud up and the on-premise data

play05:19

center so basically I will explain once

play05:21

again so I have a cloud up within the

play05:23

cloud of I have set up the V PC which

play05:25

like which I was CID or mask up ten dot

play05:28

zero dot one dot 0/24

play05:30

I have deployed multiple annual shopped

play05:32

application and this particular muse of

play05:34

application has to access the databases

play05:36

and the services exist on the on-premise

play05:38

data center which have a subnet of one

play05:41

ninety two dot one sixty eight dot zero

play05:42

dot zero dot slash twenty two so this

play05:44

database and services exist within this

play05:46

particular sealed er block or subnet so

play05:49

apart from that like I have VPN endpoint

play05:52

which is 197 dot eighty cent or sixty

play05:54

eight dot ninety and what happens so

play05:56

when we configure the V pin we have to

play05:58

keep this particular VPN remote IP

play06:00

address I will show you in demo or how

play06:04

we can configure that so once you clear

play06:06

configure or any point VPN and it will

play06:08

also give you know the crowd of external

play06:10

gateway IP addresses that we need to

play06:12

configure on the VPN device let's start

play06:17

like how we can set up any point VPN

play06:19

IPSec tunnel for setting of VPN so what

play06:22

you have to do you you have to make sure

play06:24

like your V PC is already set up

play06:26

so without BBC you cannot set up the

play06:28

view in first step you need to set up

play06:29

the V PC in my last video I've already

play06:31

shown how you can set up of the PC okay

play06:34

so for setting of VPN you need to give

play06:36

it navigate to run time in is a VPN so

play06:39

you can see you go

play06:40

you know run time manager and like you

play06:43

will see the VP ins so now once you see

play06:45

the VPN so you can say you know create a

play06:47

VPN once you click on create VPN you

play06:50

have to provide the name of VPN you have

play06:52

to select the VPC from the drop-down for

play06:54

which we need to create a VPN so

play06:55

basically you need to give it the you

play06:56

know you need to select the VPC from the

play06:58

dropdown basically okay

play07:00

you select the VPC so when you're saying

play07:02

like I want to create basically this is

play07:05

my V PC so this is the subnet of no

play07:07

particular acedia block allowed in that

play07:10

particular V PC No

play07:11

so we are selecting that particular V PC

play07:12

then remote IP address so you need to

play07:14

enter the remote IP address this

play07:16

particular remote IP address of your

play07:17

remote of your VPN endpoint or VPN

play07:20

device that is 197 this can be you know

play07:23

this is just an example there are two

play07:25

topic writing routing which I've already

play07:27

described dynamic and static routing in

play07:30

case of dynamic routing so basically you

play07:32

need to make sure your VPN device

play07:34

support the BCP protocol that is a

play07:35

border gateway protocol in that dynamic

play07:38

routing we have to enter a remote ASN so

play07:41

that can be between 6 4 5 1 2 6 5 5 3 4

play07:44

and default age 6 5 0 0 1 you can use

play07:47

any existing ASN in your network ok or

play07:51

privatization that is not assigned to

play07:53

your network basically so basically this

play07:56

remote ASM is for your on-premise data

play07:58

center ok so you put like either you can

play08:01

use some existing ASN which is already

play08:03

called available or you can select

play08:05

anyone any anything from this

play08:07

particularly in 6 4 5 1 2 6 5 5 3 4 and

play08:10

which should not be assigned to your

play08:13

network basically then secondly you have

play08:16

to also enter a local lesson that is the

play08:18

mule rob TSN for the mule public for the

play08:21

VPN no mules or VPN you have to enter so

play08:23

default is 6 4 5 1 2 and use the private

play08:26

ASN and that should not be assigned to

play08:28

your network so basically don't use the

play08:30

ASN which is already assigned to your

play08:32

network and this is basically from

play08:34

Europe in case of static routing so you

play08:37

either you can go with dynamic routing

play08:39

or static in case of static routing I

play08:41

mentioned like you know if you want to

play08:43

accessible VPN like you know select the

play08:45

static routing and enter the CIDR ends

play08:48

that need to be accessible to the VPN so

play08:50

in that in this case so I want to access

play08:52

this particular seed

play08:54

see idea rains one 92.6 to do sled 0:22

play08:57

so i will configure that shield see

play08:58

ideally in my any point VPN ok there can

play09:02

be multiple CID arranged so basically up

play09:04

to 90 up you can add up to 95 CID

play09:06

arranged so as you mentioned you can add

play09:09

more CI de RINs using add noodles in

play09:11

static route up to 95 subnets can be

play09:14

added let me go with diagram it no so

play09:17

basically I mentioned like you select

play09:18

the name you can give any name up to

play09:21

your VPN select the V PC for which you

play09:23

are creating 3 pins and remote IP

play09:24

address this is the remote IP address

play09:26

belong to your VPN endpoint you are on

play09:28

to my sweep in device so that will that

play09:30

should be a public key publicly

play09:32

available then routing you can select

play09:34

static or BGP if you are selecting

play09:36

static you know so you have to provide

play09:38

the CIDR in so like in in our case the

play09:41

CID range will be this 192 or sixty dot

play09:43

0 dot slash 22 where your end system

play09:46

exists so you provide silly ring if you

play09:48

want to add more CID arrange so there

play09:50

can be multiple CID arranged for your

play09:52

mesh data center so you can add all

play09:54

those things up to 95 cid range is

play09:56

allowed within one VPN then the local is

play10:00

in its default I have used 6 4 5 1 2

play10:02

okay and for adding new CI deter you

play10:05

just click on this add new rules no

play10:08

force a BCP as I mentioned same thing

play10:10

like name V PC you know remote IP

play10:12

routing type b zp and you provide the

play10:15

remote ESN that is by default 6 5 0 0 1

play10:18

and localizing that is the mule Rob TSN

play10:20

that is 6 4 5 1 2 4 es n means like you

play10:23

know autonomous system number basically

play10:26

ok so generally mostly like it depend

play10:29

like you know like if your deviant

play10:32

device support a busy bee protocol then

play10:34

in that case you can go with busy P

play10:35

otherwise you with static then apart

play10:38

from that the next step you have to

play10:39

select the tunnel configuration either

play10:41

you can select the automatic or either

play10:43

you can select the custom so basically

play10:45

when we create a VPN

play10:46

88 to tunnel tunnel 1 and the tunnel to

play10:48

basically okay so I will show you what

play10:50

does this mean so in case of automatic

play10:53

you you don't require any configuration

play10:54

ok it will automatically create the

play10:57

tunnels for you for your any point

play10:58

European which can be visible after the

play11:00

creation of the vehicle user select

play11:02

automatic and just click on this create

play11:04

libyan

play11:04

it will create the tunnel for you tunnel

play11:07

one in 1004

play11:08

you in case of custom right which which

play11:12

is bit complex so you need to provide

play11:14

PSK that is pre shared key Betty which

play11:17

is used for authentication between you

play11:19

know on premise in the cloud of VPN

play11:21

connection so it can be from 8 to 64

play11:24

character it should not start with 0 and

play11:26

you have to provide point-to-point CA

play11:28

idea so basically you can specify a size

play11:31

of Celestra TC idea block from you know

play11:34

I 169 dot 254 dot 0 dot 0 / 16 greens

play11:38

and see idea block must be nice unique

play11:41

across all the VPN connection

play11:42

Celia see idea block not supported these

play11:45

are the few CIDR block you cannot use

play11:49

for this point-to-point see idea so make

play11:51

sure like - 50.0 slash 30 cannot be used

play11:53

1 2 3 4 5 6 this cannot be used you can

play11:56

use 1 69.2 54.6 dot 0 / 34 tunnel to 160

play12:01

9.2 54.6 7.0 is less 34 tunnel one like

play12:05

that you know and that you can provide

play12:10

the P of PSK tunnel 0 and the tunnel 1

play12:13

either you can get it from your network

play12:15

administrator and either you can use

play12:17

anything then you can share with your

play12:18

network and mistresses - they can

play12:20

configure on you know on their device so

play12:24

once you set up the VPN so there are

play12:26

various status you know the status keep

play12:28

changing the 5 status will be pending at

play12:30

the tunnel 1 internal 2 will be down so

play12:32

both will be down so in that case what

play12:34

is happening the it VPN is creating so

play12:36

VPN is just created ok and there are

play12:39

some actions pending on the background

play12:40

you might see this status for 10 to 15

play12:42

minute after creating VPN so basically

play12:45

what will happen so your tunnel will be

play12:48

down down and you know like and the

play12:50

status will be the pending so you it

play12:52

creating the VPN and performing some

play12:54

excess on the bacon so once it get at

play12:56

the VPN successfully you know everything

play12:58

is done so status will become available

play13:00

and down down to basically a VPN has

play13:03

successfully created but you need to do

play13:07

some configuration on your VPN device ok

play13:10

so for that then other status is up up

play13:13

or up / down up up means like you know

play13:16

your tunnel 1 and the tunnel 2 is active

play13:19

in working in active active mode so

play13:20

basically the VPN D

play13:22

supporting active active mode no type of

play13:25

configuration if your tunnel one is up

play13:28

and tunnel two is down or tunnel two is

play13:30

up and tunnel one is down in that case

play13:32

your VPN device is working in active

play13:34

passive mode okay so to achieve this we

play13:37

have to do some configuration on the VPN

play13:39

device okay

play13:40

in case of failed down down it means

play13:43

your VPN has not been created properly

play13:45

there is some issue with your VPN you

play13:47

need to create you know you need to

play13:49

delete the weekend injury try it okay so

play13:53

some time you will see would turn on one

play13:54

tunnel to is up in that case that

play13:56

particular VPN device is working in

play13:58

activity mode in case one tunnel is up

play14:00

and other is down so one is you know

play14:02

active working inactive board and

play14:03

another is the know it's back up service

play14:06

in case of a tunnel one goes down so

play14:09

tunnel two will be come up you know and

play14:10

it will make sure like you know your

play14:12

there is a communication between cloud

play14:14

up and any point doesn't break up and in

play14:17

case of up up it's fine like if one

play14:18

tunnel goes down the other is already

play14:20

available okay so what you have to do so

play14:23

once the VPN is created you can download

play14:25

a VPN config so basically once you

play14:27

create a you know once you come VPN has

play14:30

been successfully graded this option

play14:31

called get VPN config you will see just

play14:33

click on get weave in concrete you can

play14:35

device you can select your device vendor

play14:37

so basically you have a some VPN device

play14:38

it might be Cisco Palo Alto whatever so

play14:41

you APN select if there is no device

play14:43

mention you know in this particular

play14:45

device vendor you can see use 10 Eric

play14:46

one then select the device platform and

play14:49

device software these are the country

play14:50

and just download the config you know

play14:53

and just share with your network

play14:55

administration and miss later so you can

play14:57

perform the configuration on we print

play14:59

email and make sure the connection is

play15:00

stabilized between a cloud and any point

play15:02

cloud up in the datacenter

play15:05

the other concept let me correct it this

play15:13

is the other concept like you know

play15:15

sometimes what happens like you don't

play15:17

have a want too much data center like

play15:19

you have your all the application within

play15:21

the private subnet or a of your AWS

play15:24

cloud in that case you know you like you

play15:28

can use IPSec tunneling but you know in

play15:29

that case like when you want to do the

play15:31

peer between two subnet to private

play15:33

subnet you can use the V PC peering let

play15:35

go

play15:35

you have cloud up you have a VP in the

play15:39

cloud up and like you have a private

play15:40

subnet VPC in the AWS so you are you are

play15:44

all the application back-end services

play15:45

running on the AWS private subnet in

play15:48

that case you can make use of the PC

play15:49

peering so rebus availing basically

play15:51

connect to VP sees in case it pierce

play15:54

your private Amazon will be seen

play15:55

directly to your any point be busy did

play15:57

this enables you to router traffic

play15:59

between two pieces so they can

play16:01

communicate escrow they are in the same

play16:03

network so this is how of the piece

play16:06

appearing works so let me do one thing

play16:08

here it's a wee piece appearing so

play16:12

basically you have like you know the

play16:14

cloud up environment in u.s. east one

play16:16

and this is my V PC ten dot zero dot one

play16:18

dot zero and like my AWS private V PC

play16:21

our private subnet which is 192 or 62

play16:23

toward zero slash 22 which is also in

play16:25

u.s. one so you can set up the V PC

play16:26

peering between your cloud up and the

play16:29

EWS privately PC basically so so

play16:33

basically so this is how you can set up

play16:36

the PC and when you need to set up the

play16:37

PC when you want to do the pierre-pierre

play16:40

between your cloud up V PC and the EWS

play16:43

private subnet or private V PC in that

play16:46

risk you can use the sweep is appearing

play16:48

so there are certain points you need to

play16:49

consider so basically when you are

play16:51

creating a V PC it must be when you want

play16:54

to do the V PC bearing you need to make

play16:55

sure your cloud of the PC and the AWS

play16:58

privately PC are in the same reason okay

play17:01

so basically if you see on the any point

play17:03

platform you don't have an option to get

play17:05

rid of you piss appearing for that you

play17:07

have to reduce the ticket with the mules

play17:08

of support team and you have to field

play17:10

one discovery template so basically I

play17:12

provided link here so you can go to here

play17:14

you know in this particular link so you

play17:19

can fill that particular this discovery

play17:21

template so and we will rock will create

play17:23

a V PC for you

play17:24

so the it pro it we need to provide some

play17:26

basic detail like what is the subnet of

play17:28

the AWS V PC what is the subnet of your

play17:31

cloud of who are the contact person such

play17:33

kind of information even like you know

play17:35

you can ask you can read a ticket with

play17:37

mules of support to setup your VPN IPSec

play17:40

tunneling also but you can also do you

play17:43

know yourself also so that's why VP and

play17:45

IP SEC Tournament sometimes also known

play17:47

as the self-service okay for view PC

play17:49

pleasing you

play17:49

to connect contact universe of

play17:52

supportive to creatively piss appearing

play17:54

okay thanks I hope you liked the video

play17:56

thanks for watching it

Rate This

5.0 / 5 (0 votes)

相关标签
VPN SetupCloud SecurityNetwork ArchitectureAWS NetworkingIPSec TunnelingVPN ConfigurationData CenterCloud ConnectivityNetwork ProtocolsIT Tutorial
您是否需要英文摘要?