View on GitHub

vmwaresolutions

vCD - IPSec Tunnel over IBM Private Network Endpoint (PNE) using ESG

Updated: 2020-10-21

In order to use a PNE for your IPSec tunnel between your IBM account to your IBM VMWare Solutions Shared virtual datacenter (vDC), you must first have a PNE ordered in your vDC. See how to Order IBM Private Network Endpoint (PNE). Only one side requires a PNE.

If you are connecting your IBM account to your vDC, you only need the PNE deployed in one of your vDCs (you can share the network linked in your tunnel across multiple vDCs).

This example will demonstrate how to connect two vCloud Director vDCs located in two different physical datacenters to each other using an IPSec tunnel and one PNE. This allows bi-directional communication from virtual machines in both virtual datacenters using the IBM Cloud backbone.

The diagram below describes the flow of the connection between the two datacenters

The Datacenter information on the left:

The Datacenter information on the right:

Configuring the Dallas vDC.

Create a network.

Create a 172.16.0.0 Network

Deploy at least 1 VM to test your tunnel. 172.16.0.2 will be our Dallas-side example. Attach it to your network and ensure the network interface is configured properly.

Configure the Dallas Edge Service Gateway (ESG) services.

Firewall rules:

Network Address Translation SourceNAT rule:

IPSec VPN:

To enabled the service, toggle the status switch to show green.

Create the IPSec VPN Site:

In our example we did not change the Encryption Algorithm, Authentication, Diffie-Hellman Group, Digest Algorithm, IKE Option, Session Type

NOTE: Some additional items will be created from this IPSec VPN Site:

Configuring the Frankfurt vDC.

Create a network.

Create a 172.15.0.0 Network

Deploy at least 1 VM to test your tunnel. 172.15.0.2 will be our Frankfurt-side example. Attach it to your network and ensure the network interface is configured properly.

Configure the Frankfurt Edge Service Gateway (ESG) services.

Firewall rules:

Network Address Translation SourceNAT rule:

IPSec VPN:

To enabled the service, toggle the status switch to show green.

Create the IPSec VPN Site:

Test the tunnel

From the web-console, we log into the VMs in each side. Then ensure we can ssh into the other VM as shown in the screenshot.

Full config screenshots

Complete config from the FRA side of the tunnel

Complete config from the DAL side of the tunnel

Note the information described in this example are guidelines. There are multiple ways to configure the various parts of the example. Please adjust accordingly for your needs.

VMWare vCloud Director
Main Page