SlideShare uma empresa Scribd logo
1 de 22
Baixar para ler offline
© 2016
Google Compute Engine
Configuration
GCE Setup for VNS3
2016
© 2016
Table of Contents
2
Requirements 3
Step 1: GCE VNS3 Image Delivery 9
Step 2: GCE Network Setup 16
Step 3: Launching a VNS3 Controller 19
VNS3 Configuration Document Links 21
© 2016
Requirements
3
© 2016
Requirements
4
•You have a Google cloud account where you can control the API access and Service Accounts
so Cohesive Networks can delivery a VNS3 Image to your account.
•Ability to configure a client (whether desktop based or cloud based) to use OpenVPN client
software.
•You have a compliant IPsec firewall/router networking device:
Preferred  Most models from Cisco Systems*, Juniper, Watchguard, Dell SONICWALL, Netgear,
Fortinet, Barracuda Networks, Check Point*, Zyxel USA, McAfee Retail, Citrix Systems, Hewlett
Packard, D-Link, WatchGuard, Palo Alto Networks, OpenSwan, pfSense, and Vyatta.
Best Effort  Any IPsec device that supports: IKE1 or IKE2, AES256 or AES128 or 3DES, SHA1 or
MD5.
*Known Exclusions  Checkpoint R65+ requires native IPSec connections as Checkpoint does
not conform to NAT-Traversal Standards and Cisco ASA 8.4(2)-8.4(4) bugs prevent a stable
connection from being maintained.
© 2016
Getting Help with VNS3
5
Google Compute Cloud surfaces some advanced network controls to the user such as
network routing. This guide covers a very generic VNS3 GCE setup. If you need specific
help with project planning, POCs, or audits, contact our professional services team via
sales@cohesive.net for details.
This guide uses Cisco’s Adaptive Security Device Controller UI. Setting up your IPsec
Extranet device may have a different user experience than what is shown here. All the
information entered in this guide will be same regardless of your UI or cmd line setup.


Please review the VNS3 Support Plans and Contacts before sending support inquiries.
© 2016
Firewall Considerations
6
VNS3 Controller instances use the following TCP and UDP ports.

• UDP port 1194 

For client VPN connections; must be accessible from all servers that will join VNS3 topology as clients.

• UDP 1195-1203*

For tunnels between Controller peers; must be accessible from all peers in a given topology.
• TCP port 8000 

HTTPS admin interface; must be accessible from hosts where you will want to obtain runtime status or configure peering, also needs to be open to and from
the Controllers at least for the peering process, and needs to be accessible when downloading credentials for installation on overlay network clients.
• UDP port 500

UDP port 500 is used the phase 1 or IKE (Internet Key Exchange) component of an IPsec VPN connection.

• ESP Protocol 50 and possibly UDP port 4500

Protocol 50 is used for phase 2 or ESP (Encapsulated Security Payload) component of an IPsec VPN connection only when negotiating with native IPsec. UDP
port 4500** is used for the phase 2 or ESP (Encapsulated Security Payload) component of an IPsec VPN connection when using NAT-Traversal Encapsulation.
*VNS3:vpn and VNS3:net Lite Edition will not require UDP ports 1195-1197 access as it is not licensed for Controller Peering.
** Some public cloud providers require IPsec connections to use NAT-Traversal encapsulation on UDP port 4500
© 2016
Sizing Considerations
7
Image Size and Architecture
VNS3 Controller Images are available as 64bit images to allow the greatest flexibility for your use-case. We
recommend Controller instances be launched with at least 512MB of RAM. Smaller sizes are supported but the
performance will depend on the use-case.
Clientpack Key Size
VNS3 Controllers currently generate 1024 bit keys for connecting the clients to the overlay network via the
“clientpacks”. Smaller or larger encryption keys can be provided upon request (from 64 bit to 2048 bit). Future
releases of VNS3 will provide the user control over key size and cipher during initialization and configuration.
© 2016
Remote Support
8
Note that TCP 22 (ssh) is not required for normal operations.
Each VNS3 Controller is running a restricted SSH daemon, with
access limited only to Cohesive for debugging purposes controlled
by the user via the Remote Support toggle and key exchange
generation.
In the event Cohesive needs to observe runtime state of a VNS3
Controller in response to a tech support request, we will ask you to
open Security Group access to SSH from our support IP range and
Enable Remote Support via the Web UI.
Cohesive will send you an encrypted passphrase to generate a
private key used by Cohesive Support staff to access your
Controller. Access to the restricted SSH daemon is completely
controlled by the user. Once the support ticket has been closed
you can disable remote support access and invalidate the access
key.
© 2016
Step 1: GCE VNS3 Image Delivery
9
© 2016
VNS3 Image Availability in GCE
10
Google Compute Engine currently does not have Image sharing semantics. In order to
provide a VNS3 Image to your GCE account you will need to provide a temporary service
account for our use. Cohesive Networks will use this service account to deliver the VNS3
image to you.
You will also need three of the Google APIs enabled for your account. If you are using
Google Compute Engine, these should already be enabled. These are the Google Cloud
Storage API, Google Cloud Storage JSON API, Google Compute Engine API.
© 2016
Create a Service Account for Use by Cohesive Networks
11
1) In the GCE Developer’s Console, select your
project



2) From the left-side “APIs & Auth”
menu, select “Credentials”



3) Under the OAuth heading, click “CREATE
NEW CLIENT ID”, and select Service account on
the pop-up window.
© 2016
Create a Service Account for Use by Cohesive Networks
12
Your service account private key will download
to the Downloads directory specified by your
Web Browser. It will be a file of the form (for
example)



“2c91976353f8264bb5b6926d9b295a03e62b
b9bb-privatekey.p12”



GCE will generate a new Service Account for
you with a public key fingerprint matching the
name of the key file that was downloaded.



Send the key file and the contents of the
service account window to Cohesive Networks.
© 2016
Create a Service Account for Use by Cohesive Networks
13
Cohesive Networks will deliver the VNS3 image to your account using the service account
information. 



You can leave the service account active for Cohesive Networks’s use to provide image
updates in the future. Or you can delete the service account which will revoke any keys
generated for it. 



Remove your service account after you’ve received VNS3 unless you want to keep it active
for future images from Cohesive Networks.
© 2016
Ensure necessary GCE APIs are enabled
14
Please ensure that the Google Cloud Storage API, Google Cloud Storage JSON API, and the
Google Compute Engine API are enabled for your account or Cohesive Networks will not
be able to push the VNS3 Image to your GCE Account.
© 2016
Send the Keys to Cohesive Networks
15
Please provide the key file and service account information to Cohesive Networks. They
will notify you when the VNS3 Image appears to be delivered to your account.
Any questions please contact your Account Manager, or email support@cohesive.net.
© 2016
Step 2: GCE Network Setup
16
© 2016
GCE Network Option 1:
Default Network
17
Configure Network from the GCE Console.
Click Networks in the left column menu under the
Compute Engine section. Select the Default network.
The default settings allow inbound connections on all
ports from servers launched in the Default network
and allow outbound connections on all ports to all
routes (0.0.0.0/0).
Add the following Firewall rules:
• TCP port 8000 from your public IP (you can find your
IP address by navigating to http://whatismyip.com)
• UDP port 500 from the IP of your Datacenter-based
IPsec Device
• UDP port 4500 from the IP of your Datacenter-based
IPsec Device (NAT-Traversal encapsulation is required
for all IPsec connection to GCE)
© 2016
GCE Network Option 2:
Multiple Networks
18
An alternative to just using the Default network is to
separate the Controllers from the Client Servers into two
networks. To do this we recommend creating two
networks: vns3-mgr and vns3-client. Note: no rules are
needed in the vns3-client network by default.
Initially you will only need to add the following Firewall
rules to the vns3-mgr network:
• TCP port 8000 from your public IP (you can find your IP
address by navigating to http://whatismyip.com)
• UDP port 500 from the IP of your Datacenter-based
IPsec Device
• UDP port 4500 from the IP of your Datacenter-based
IPsec Device (NAT-Traversal encapsulation is required for
all IPsec connection to GCE)
• UDP port 1194 from the vns3-client network IP range
© 2016
Step 3: Launching a VNS3 Controller Instance
19
© 2016
Launch a VNS3 Controller
20
Launch a VNS3 instance from the GCE Console.
Click VM Instances in the left column menu under the Compute Engine
section.
Click the New Instance button at the top of the VM Instance page and fill out
the fields as follows:
• Name: vns3-mgr1 or some variation
• Metadata: leave blank
• Zone: select where you want to run your instances
• Machine Type: select a size that will support your use case, g1-small or
larger is recommended
• Boot source: New form images
• Image: select the VNS3 image that Cohesive Networks delivered to your
account
• Network: select either default or vns3-mgr depending on the network
option you choose.
• External IP: you can choose to use an ephemeral IP but Cohesive Networks
recommend assigning a Static IP which will speed recovery in the event you
need to relaunch the VNS3 Controller or during operational windows for
upgrades.
© 2016
VNS3 Configuration Document Links
21
© 2016
VNS3 Configuration Document Links
22
VNS3 Product Resources - Documentation | Add-ons
VNS3 Configuration Instructions

Instructions and screenshots for configuring a VNS3 Controller in a single or multiple Controller topology. Specific steps include,
initializing a new Controller, generating clientpack keys, setting up peering, building IPsec tunnels, and connecting client servers to
the Overlay Network. 

VNS3 Administration Document

Covers the administration and operation of a configured VNS3 Controller. Additional detail is provided around the VNS3 Firewall,
all administration menu items, upgrade licenses, other routes and SNMP traps.

VNS3 Docker Instructions

Explains the value of the VNS3 3.5 Docker integration and covers uploading, allocating and exporting application containers.
VNS3 Troubleshooting

Troubleshooting document that provides explanation issues that are more commonly experienced with VNS3.


Mais conteúdo relacionado

Mais procurados

Securing your AWS Resources with Amazon VPC - AWS Summit 2012 - NYC
Securing your AWS Resources with Amazon VPC - AWS Summit 2012 - NYCSecuring your AWS Resources with Amazon VPC - AWS Summit 2012 - NYC
Securing your AWS Resources with Amazon VPC - AWS Summit 2012 - NYC
Amazon Web Services
 
利用AWS建立企業全球化網路
利用AWS建立企業全球化網路利用AWS建立企業全球化網路
利用AWS建立企業全球化網路
Amazon Web Services
 

Mais procurados (19)

Cohesive Networks Support Docs: VNS3 Administration
Cohesive Networks Support Docs: VNS3 AdministrationCohesive Networks Support Docs: VNS3 Administration
Cohesive Networks Support Docs: VNS3 Administration
 
Cohesive Networks Support Docs: VNS3 Setup for Fortigate
Cohesive Networks Support Docs: VNS3 Setup for FortigateCohesive Networks Support Docs: VNS3 Setup for Fortigate
Cohesive Networks Support Docs: VNS3 Setup for Fortigate
 
Cohesive Networks Support Docs: VNS3 version 3.5+ API Guide
Cohesive Networks Support Docs: VNS3 version 3.5+ API Guide Cohesive Networks Support Docs: VNS3 version 3.5+ API Guide
Cohesive Networks Support Docs: VNS3 version 3.5+ API Guide
 
Cohesive Networks Support Docs: VNS3 Setup for Sonicwall
Cohesive Networks Support Docs: VNS3 Setup for SonicwallCohesive Networks Support Docs: VNS3 Setup for Sonicwall
Cohesive Networks Support Docs: VNS3 Setup for Sonicwall
 
Securing your AWS Resources with Amazon VPC - AWS Summit 2012 - NYC
Securing your AWS Resources with Amazon VPC - AWS Summit 2012 - NYCSecuring your AWS Resources with Amazon VPC - AWS Summit 2012 - NYC
Securing your AWS Resources with Amazon VPC - AWS Summit 2012 - NYC
 
Deep Dive: Amazon Virtual Private Cloud
Deep Dive: Amazon Virtual Private CloudDeep Dive: Amazon Virtual Private Cloud
Deep Dive: Amazon Virtual Private Cloud
 
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
 
Consolidating DNS with Amazon Toute 53 - Pop-up Loft Tel Aviv
Consolidating DNS with Amazon Toute 53 - Pop-up Loft Tel AvivConsolidating DNS with Amazon Toute 53 - Pop-up Loft Tel Aviv
Consolidating DNS with Amazon Toute 53 - Pop-up Loft Tel Aviv
 
Creating Your Virtual Data Center
Creating Your Virtual Data CenterCreating Your Virtual Data Center
Creating Your Virtual Data Center
 
Deep Dive - Amazon Virtual Private Cloud (VPC)
Deep Dive - Amazon Virtual Private Cloud (VPC)Deep Dive - Amazon Virtual Private Cloud (VPC)
Deep Dive - Amazon Virtual Private Cloud (VPC)
 
MQTC 2016: Monitoring and Tracking MQ and Applications
MQTC 2016: Monitoring and Tracking MQ and ApplicationsMQTC 2016: Monitoring and Tracking MQ and Applications
MQTC 2016: Monitoring and Tracking MQ and Applications
 
Vpc (virtual private cloud)
Vpc (virtual private cloud)Vpc (virtual private cloud)
Vpc (virtual private cloud)
 
Network & Connectivity Fundamentals
Network & Connectivity FundamentalsNetwork & Connectivity Fundamentals
Network & Connectivity Fundamentals
 
AWS VPN with Juniper SRX- Lab Sheet
AWS VPN with Juniper SRX- Lab SheetAWS VPN with Juniper SRX- Lab Sheet
AWS VPN with Juniper SRX- Lab Sheet
 
Amazon Virtual Private Cloud (VPC) - Networking Fundamentals and Connectivity...
Amazon Virtual Private Cloud (VPC) - Networking Fundamentals and Connectivity...Amazon Virtual Private Cloud (VPC) - Networking Fundamentals and Connectivity...
Amazon Virtual Private Cloud (VPC) - Networking Fundamentals and Connectivity...
 
IBM Datapower Security Scenarios - Using JWT to secure microservices
IBM Datapower Security Scenarios - Using JWT  to secure microservicesIBM Datapower Security Scenarios - Using JWT  to secure microservices
IBM Datapower Security Scenarios - Using JWT to secure microservices
 
利用AWS建立企業全球化網路
利用AWS建立企業全球化網路利用AWS建立企業全球化網路
利用AWS建立企業全球化網路
 
AWS VPC Fundamentals- Webinar
AWS VPC Fundamentals- WebinarAWS VPC Fundamentals- Webinar
AWS VPC Fundamentals- Webinar
 
MQTC 2016 - IBM MQ Security: Overview & recap
MQTC 2016 - IBM MQ Security: Overview & recapMQTC 2016 - IBM MQ Security: Overview & recap
MQTC 2016 - IBM MQ Security: Overview & recap
 

Semelhante a Cohesive Networks Support Docs: VNS3 Configuration for GCE

Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 ClassicCohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks
 
AWS VPC NOTES _ LEARN AWS EFFECTIVELY and Easily
AWS VPC NOTES _ LEARN AWS EFFECTIVELY and EasilyAWS VPC NOTES _ LEARN AWS EFFECTIVELY and Easily
AWS VPC NOTES _ LEARN AWS EFFECTIVELY and Easily
akramemohemat
 

Semelhante a Cohesive Networks Support Docs: VNS3 Configuration for GCE (20)

Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 ClassicCohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
 
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
 
Creating Your Virtual Data Center: VPC Fundamentals and Connectivity Options
Creating Your Virtual Data Center: VPC Fundamentals and Connectivity OptionsCreating Your Virtual Data Center: VPC Fundamentals and Connectivity Options
Creating Your Virtual Data Center: VPC Fundamentals and Connectivity Options
 
Creando una estrategia en el Cloud y acelerar los resultados
Creando una estrategia en el Cloud y acelerar los resultadosCreando una estrategia en el Cloud y acelerar los resultados
Creando una estrategia en el Cloud y acelerar los resultados
 
GPSTEC322-GPS Creating Your Virtual Data Center VPC Fundamentals Connectivity...
GPSTEC322-GPS Creating Your Virtual Data Center VPC Fundamentals Connectivity...GPSTEC322-GPS Creating Your Virtual Data Center VPC Fundamentals Connectivity...
GPSTEC322-GPS Creating Your Virtual Data Center VPC Fundamentals Connectivity...
 
Creating Your Virtual Data Center
Creating Your Virtual Data CenterCreating Your Virtual Data Center
Creating Your Virtual Data Center
 
Creating a Virtual Data Center
Creating a Virtual Data CenterCreating a Virtual Data Center
Creating a Virtual Data Center
 
VPC Fundamentals & Connectivity - Pop-up Loft Tel Aviv
VPC Fundamentals & Connectivity - Pop-up Loft Tel AvivVPC Fundamentals & Connectivity - Pop-up Loft Tel Aviv
VPC Fundamentals & Connectivity - Pop-up Loft Tel Aviv
 
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
 
Cohesive Networks Support Docs: VNS3:turret Base Container Guide
Cohesive Networks Support Docs: VNS3:turret Base Container GuideCohesive Networks Support Docs: VNS3:turret Base Container Guide
Cohesive Networks Support Docs: VNS3:turret Base Container Guide
 
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
 
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
 
Creating Your Virtual Data Center: VPC Fundamentals
Creating Your Virtual Data Center: VPC FundamentalsCreating Your Virtual Data Center: VPC Fundamentals
Creating Your Virtual Data Center: VPC Fundamentals
 
Creating Your Virtual Data Center: VPC Fundamentals and Connectivity
Creating Your Virtual Data Center: VPC Fundamentals and ConnectivityCreating Your Virtual Data Center: VPC Fundamentals and Connectivity
Creating Your Virtual Data Center: VPC Fundamentals and Connectivity
 
Creating Your Virtual Data Center: VPC Fundamentals and Connectivity Options
 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity Options Creating Your Virtual Data Center: VPC Fundamentals and Connectivity Options
Creating Your Virtual Data Center: VPC Fundamentals and Connectivity Options
 
VPC - Module 2 Part 2 - AWSome Day 2017
VPC - Module 2 Part 2 - AWSome Day 2017VPC - Module 2 Part 2 - AWSome Day 2017
VPC - Module 2 Part 2 - AWSome Day 2017
 
Cohesive Networks Support Docs: VNS3 Setup for Juniper
Cohesive Networks Support Docs: VNS3 Setup for JuniperCohesive Networks Support Docs: VNS3 Setup for Juniper
Cohesive Networks Support Docs: VNS3 Setup for Juniper
 
Creating your virtual data center - Toronto
Creating your virtual data center - TorontoCreating your virtual data center - Toronto
Creating your virtual data center - Toronto
 
Cohesive networks Support Docs: VNS3 3.5 Upgrade Guide
Cohesive networks Support Docs: VNS3 3.5 Upgrade GuideCohesive networks Support Docs: VNS3 3.5 Upgrade Guide
Cohesive networks Support Docs: VNS3 3.5 Upgrade Guide
 
AWS VPC NOTES _ LEARN AWS EFFECTIVELY and Easily
AWS VPC NOTES _ LEARN AWS EFFECTIVELY and EasilyAWS VPC NOTES _ LEARN AWS EFFECTIVELY and Easily
AWS VPC NOTES _ LEARN AWS EFFECTIVELY and Easily
 

Mais de Cohesive Networks

Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Cohesive Networks
 

Mais de Cohesive Networks (15)

CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
 
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
 
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
 
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
 
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
 
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
 
Comparison: VNS3 vs Vyatta
Comparison: VNS3 vs VyattaComparison: VNS3 vs Vyatta
Comparison: VNS3 vs Vyatta
 
Comparison: VNS3 and Openswan
Comparison: VNS3 and OpenswanComparison: VNS3 and Openswan
Comparison: VNS3 and Openswan
 
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
 
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-OnsCohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
 
Cohesive Networks Support Docs: VNS3 Setup for Cisco ASA
Cohesive Networks Support Docs: VNS3 Setup for Cisco ASACohesive Networks Support Docs: VNS3 Setup for Cisco ASA
Cohesive Networks Support Docs: VNS3 Setup for Cisco ASA
 
Cohesive Networks Support Docs: VNS3:turret NIDS Guide
Cohesive Networks Support Docs: VNS3:turret NIDS GuideCohesive Networks Support Docs: VNS3:turret NIDS Guide
Cohesive Networks Support Docs: VNS3:turret NIDS Guide
 
Cohesive networks Support Docs: VNS3:turret WAF Guide
Cohesive networks Support Docs: VNS3:turret WAF GuideCohesive networks Support Docs: VNS3:turret WAF Guide
Cohesive networks Support Docs: VNS3:turret WAF Guide
 
Cohesive Networks Support Docs: VNS3 Trend Micro Agent
Cohesive Networks Support Docs: VNS3 Trend Micro Agent Cohesive Networks Support Docs: VNS3 Trend Micro Agent
Cohesive Networks Support Docs: VNS3 Trend Micro Agent
 
Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...
Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...
Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Cohesive Networks Support Docs: VNS3 Configuration for GCE

  • 1. © 2016 Google Compute Engine Configuration GCE Setup for VNS3 2016
  • 2. © 2016 Table of Contents 2 Requirements 3 Step 1: GCE VNS3 Image Delivery 9 Step 2: GCE Network Setup 16 Step 3: Launching a VNS3 Controller 19 VNS3 Configuration Document Links 21
  • 4. © 2016 Requirements 4 •You have a Google cloud account where you can control the API access and Service Accounts so Cohesive Networks can delivery a VNS3 Image to your account. •Ability to configure a client (whether desktop based or cloud based) to use OpenVPN client software. •You have a compliant IPsec firewall/router networking device: Preferred  Most models from Cisco Systems*, Juniper, Watchguard, Dell SONICWALL, Netgear, Fortinet, Barracuda Networks, Check Point*, Zyxel USA, McAfee Retail, Citrix Systems, Hewlett Packard, D-Link, WatchGuard, Palo Alto Networks, OpenSwan, pfSense, and Vyatta. Best Effort  Any IPsec device that supports: IKE1 or IKE2, AES256 or AES128 or 3DES, SHA1 or MD5. *Known Exclusions  Checkpoint R65+ requires native IPSec connections as Checkpoint does not conform to NAT-Traversal Standards and Cisco ASA 8.4(2)-8.4(4) bugs prevent a stable connection from being maintained.
  • 5. © 2016 Getting Help with VNS3 5 Google Compute Cloud surfaces some advanced network controls to the user such as network routing. This guide covers a very generic VNS3 GCE setup. If you need specific help with project planning, POCs, or audits, contact our professional services team via sales@cohesive.net for details. This guide uses Cisco’s Adaptive Security Device Controller UI. Setting up your IPsec Extranet device may have a different user experience than what is shown here. All the information entered in this guide will be same regardless of your UI or cmd line setup. 
 Please review the VNS3 Support Plans and Contacts before sending support inquiries.
  • 6. © 2016 Firewall Considerations 6 VNS3 Controller instances use the following TCP and UDP ports.
 • UDP port 1194 
 For client VPN connections; must be accessible from all servers that will join VNS3 topology as clients.
 • UDP 1195-1203*
 For tunnels between Controller peers; must be accessible from all peers in a given topology. • TCP port 8000 
 HTTPS admin interface; must be accessible from hosts where you will want to obtain runtime status or configure peering, also needs to be open to and from the Controllers at least for the peering process, and needs to be accessible when downloading credentials for installation on overlay network clients. • UDP port 500
 UDP port 500 is used the phase 1 or IKE (Internet Key Exchange) component of an IPsec VPN connection.
 • ESP Protocol 50 and possibly UDP port 4500
 Protocol 50 is used for phase 2 or ESP (Encapsulated Security Payload) component of an IPsec VPN connection only when negotiating with native IPsec. UDP port 4500** is used for the phase 2 or ESP (Encapsulated Security Payload) component of an IPsec VPN connection when using NAT-Traversal Encapsulation. *VNS3:vpn and VNS3:net Lite Edition will not require UDP ports 1195-1197 access as it is not licensed for Controller Peering. ** Some public cloud providers require IPsec connections to use NAT-Traversal encapsulation on UDP port 4500
  • 7. © 2016 Sizing Considerations 7 Image Size and Architecture VNS3 Controller Images are available as 64bit images to allow the greatest flexibility for your use-case. We recommend Controller instances be launched with at least 512MB of RAM. Smaller sizes are supported but the performance will depend on the use-case. Clientpack Key Size VNS3 Controllers currently generate 1024 bit keys for connecting the clients to the overlay network via the “clientpacks”. Smaller or larger encryption keys can be provided upon request (from 64 bit to 2048 bit). Future releases of VNS3 will provide the user control over key size and cipher during initialization and configuration.
  • 8. © 2016 Remote Support 8 Note that TCP 22 (ssh) is not required for normal operations. Each VNS3 Controller is running a restricted SSH daemon, with access limited only to Cohesive for debugging purposes controlled by the user via the Remote Support toggle and key exchange generation. In the event Cohesive needs to observe runtime state of a VNS3 Controller in response to a tech support request, we will ask you to open Security Group access to SSH from our support IP range and Enable Remote Support via the Web UI. Cohesive will send you an encrypted passphrase to generate a private key used by Cohesive Support staff to access your Controller. Access to the restricted SSH daemon is completely controlled by the user. Once the support ticket has been closed you can disable remote support access and invalidate the access key.
  • 9. © 2016 Step 1: GCE VNS3 Image Delivery 9
  • 10. © 2016 VNS3 Image Availability in GCE 10 Google Compute Engine currently does not have Image sharing semantics. In order to provide a VNS3 Image to your GCE account you will need to provide a temporary service account for our use. Cohesive Networks will use this service account to deliver the VNS3 image to you. You will also need three of the Google APIs enabled for your account. If you are using Google Compute Engine, these should already be enabled. These are the Google Cloud Storage API, Google Cloud Storage JSON API, Google Compute Engine API.
  • 11. © 2016 Create a Service Account for Use by Cohesive Networks 11 1) In the GCE Developer’s Console, select your project
 
 2) From the left-side “APIs & Auth” menu, select “Credentials”
 
 3) Under the OAuth heading, click “CREATE NEW CLIENT ID”, and select Service account on the pop-up window.
  • 12. © 2016 Create a Service Account for Use by Cohesive Networks 12 Your service account private key will download to the Downloads directory specified by your Web Browser. It will be a file of the form (for example)
 
 “2c91976353f8264bb5b6926d9b295a03e62b b9bb-privatekey.p12”
 
 GCE will generate a new Service Account for you with a public key fingerprint matching the name of the key file that was downloaded.
 
 Send the key file and the contents of the service account window to Cohesive Networks.
  • 13. © 2016 Create a Service Account for Use by Cohesive Networks 13 Cohesive Networks will deliver the VNS3 image to your account using the service account information. 
 
 You can leave the service account active for Cohesive Networks’s use to provide image updates in the future. Or you can delete the service account which will revoke any keys generated for it. 
 
 Remove your service account after you’ve received VNS3 unless you want to keep it active for future images from Cohesive Networks.
  • 14. © 2016 Ensure necessary GCE APIs are enabled 14 Please ensure that the Google Cloud Storage API, Google Cloud Storage JSON API, and the Google Compute Engine API are enabled for your account or Cohesive Networks will not be able to push the VNS3 Image to your GCE Account.
  • 15. © 2016 Send the Keys to Cohesive Networks 15 Please provide the key file and service account information to Cohesive Networks. They will notify you when the VNS3 Image appears to be delivered to your account. Any questions please contact your Account Manager, or email support@cohesive.net.
  • 16. © 2016 Step 2: GCE Network Setup 16
  • 17. © 2016 GCE Network Option 1: Default Network 17 Configure Network from the GCE Console. Click Networks in the left column menu under the Compute Engine section. Select the Default network. The default settings allow inbound connections on all ports from servers launched in the Default network and allow outbound connections on all ports to all routes (0.0.0.0/0). Add the following Firewall rules: • TCP port 8000 from your public IP (you can find your IP address by navigating to http://whatismyip.com) • UDP port 500 from the IP of your Datacenter-based IPsec Device • UDP port 4500 from the IP of your Datacenter-based IPsec Device (NAT-Traversal encapsulation is required for all IPsec connection to GCE)
  • 18. © 2016 GCE Network Option 2: Multiple Networks 18 An alternative to just using the Default network is to separate the Controllers from the Client Servers into two networks. To do this we recommend creating two networks: vns3-mgr and vns3-client. Note: no rules are needed in the vns3-client network by default. Initially you will only need to add the following Firewall rules to the vns3-mgr network: • TCP port 8000 from your public IP (you can find your IP address by navigating to http://whatismyip.com) • UDP port 500 from the IP of your Datacenter-based IPsec Device • UDP port 4500 from the IP of your Datacenter-based IPsec Device (NAT-Traversal encapsulation is required for all IPsec connection to GCE) • UDP port 1194 from the vns3-client network IP range
  • 19. © 2016 Step 3: Launching a VNS3 Controller Instance 19
  • 20. © 2016 Launch a VNS3 Controller 20 Launch a VNS3 instance from the GCE Console. Click VM Instances in the left column menu under the Compute Engine section. Click the New Instance button at the top of the VM Instance page and fill out the fields as follows: • Name: vns3-mgr1 or some variation • Metadata: leave blank • Zone: select where you want to run your instances • Machine Type: select a size that will support your use case, g1-small or larger is recommended • Boot source: New form images • Image: select the VNS3 image that Cohesive Networks delivered to your account • Network: select either default or vns3-mgr depending on the network option you choose. • External IP: you can choose to use an ephemeral IP but Cohesive Networks recommend assigning a Static IP which will speed recovery in the event you need to relaunch the VNS3 Controller or during operational windows for upgrades.
  • 21. © 2016 VNS3 Configuration Document Links 21
  • 22. © 2016 VNS3 Configuration Document Links 22 VNS3 Product Resources - Documentation | Add-ons VNS3 Configuration Instructions
 Instructions and screenshots for configuring a VNS3 Controller in a single or multiple Controller topology. Specific steps include, initializing a new Controller, generating clientpack keys, setting up peering, building IPsec tunnels, and connecting client servers to the Overlay Network. 
 VNS3 Administration Document
 Covers the administration and operation of a configured VNS3 Controller. Additional detail is provided around the VNS3 Firewall, all administration menu items, upgrade licenses, other routes and SNMP traps.
 VNS3 Docker Instructions
 Explains the value of the VNS3 3.5 Docker integration and covers uploading, allocating and exporting application containers. VNS3 Troubleshooting
 Troubleshooting document that provides explanation issues that are more commonly experienced with VNS3.