Loading

15, Oct 2023
Multiple Tier-1 Gateway VPNs – Understanding Networking and Security Configurations

Tier-1 gateways can terminate VPNs for multi-tenancy environments, where direct connectivity over the VPN is required by a tenant, as seen in the following architecture diagram:

Figure 6.41 – Tier-1 gateway VPN termination diagram

The configuration is available at Networking | VPN | Tier-1 VPN Services, as seen in the following screenshot:

Figure 6.42 – Tier-1 gateway VPN termination

Information

Route-based VPNs terminating on Tier-1 Gateways do not support BGP; they support static routes instead.

Further configuration details can be found in the user guide at https://docs.vmware.com/en/VMware-Cloud-on-AWS/services/com.vmware.vmc-aws-networking-security/GUID-5AF45CE6-FA53-45C0-83E5-25F8E3A055E9.html.

Connected VPC

Each VMware Cloud on AWS SDDC must be linked to an organization’s customer-managed AWS account. Inside the AWS account, organizations must create a VPC with subnets and connect it to the SDDC. This is referred to as the connected VPC.

The connected VPC setup is done during the SDDC provisioning process. You can review the configuration using the Connected VPC section in the Networking tab – the connection details of the AWS account will appear, including AWS Account ID, VPC ID, and VPC Subnet.

Figure 6.43 – Reviewing connected Amazon VPC information

Aggregation Prefixes Lists enables Route aggregation are used to create aggregate prefixes behind customer-configured Tier-1 gateways. The routes part of the Aggregated Prefix Lists will be advertised either on the INTRANET endpoint or the SERVICES endpoint. As shown in Figure 6.44, an Aggregation Prefix List named Connected – VPC with aggregated prefixes that include the 10.12.0.0/22 and 10.12.4.0/22 CIDRs is created and advertised over the SERVICES endpoint.

Figure 6.44 – Connected VPC route aggregation configuration

The Advertised tab in Connected Amazon VPC shows the same aggregated routes have been advertised. This can be seen in Figure 6.45:

Figure 6.45 – Aggregated routes created using prefix lists advertised to connected VPC

Now that we have reviewed the connected VPC connectivity options, let’s review how to configure a Direct Connect connection in the SDDC.

Direct Connect

The VMware NSX version available with VMware Cloud on AWS has a number of features that were specifically developed for the service and are not available on any other NSX deployment. One of the most important is the ability to attach a DX Virtual Interface (VIF) directly from the NSX web interface.

While a thoughtful discussion about different DX design and deployment configurations is outside of the scope of this book, we still would like to mention a few important things to consider when using DX connectivity with a VMware Cloud on AWS SDDC:

  • Both public and private VIFs are supported. However, only a private VIF can be used for hybrid cloud connectivity
  • Attachment to a DX gateway through Transit Connect is supported
  • You can use AWS-provided DX connectivity or opt for a cloud connectivity provider
  • DX information is located on the Networking tab in the Direct Connect menu item:

Figure 6.46 – Direct Connect configuration

The creation of a VIF should be performed in the AWS Management Console. You must export a VIF to the AWS account associated with the SDDC. You can find this account in the AWS Account ID field in the Direct Connect menu item.

Information

You can find further technical information on the VMware Cloud Tech Zone at https://vmc.techzone.vmware.com/resource/designlet-vmware-cloud-aws-sddc-connectivity-direct-connect-private-vif.

Leave a Reply

Your email address will not be published. Required fields are marked *