Skip to main content

Problem Statement



Enterprises and SaaS providers need to extend secure connectivity from their Aviatrix multi-cloud architectures to the IBM cloud. In cases of mergers, acquisitions, and on-prem migrations, etc., this connectivity often results in overlapping IP addresses between the IBM cloud and other CSP deployments.



Solution



Aviatrix spoke gateways deployed in any cloud can establish secure IPsec VPN connections directly to VPN Gateways deployed in the IBM Cloud. The Aviatrix spoke gateways can perform NAT to handle the overlapping IP address space. In this article, we’re using mapped NAT to translate the overlapping real CIDRs into NAT’d virtual CIDRs. This removes the need to configure individual SNAT/DNAT rules. Custom NAT is also an option for use cases where it’s required.





For more examples of mapped NAT provisioning, please refer to this article: Site2Cloud Overlapping CIDR with Branch





Architecture Diagram





 



Deployment Workflow



IBM Cloud Side





  1. Navigate to the VPN Gateway creation page





    1. Under NetworkVPNs, select Create

       





  2. Create a Site-to-site VPN Gateway:





    1. Select Site-to-site gateway



    2. Enter the VPN gateway name and Resource group



    3. Select the Region



    4. Select the Virtual private cloud and the Subnet for the VPN gateway



    5. Select Route-based for Mode



    6. Create the first of two VPN connections for VPC (there will be one to each of the Aviatrix HA gateways)



    7. Enter the VPN connection name, the Peer gateway address of the Aviatrix primary gateway, and a Preshared key of your choosing



    8. Leave the other parameters as default



    9. Select Create VPN gateway.

       





  3. Create the second VPN connection for VPC by selecting the VPN gateway you just created

     



  4. Under VPN connections select Create

     



  5. Create the second VPN connection





    1. Enter the VPN connection name, the Peer gateway address of the Aviatrix HA gateway, and the same Preshared key as the primary gateway



    2. Leave the other parameters as default



    3. Select Create VPN gateway.

       





  6. Note the Public IP addresses of the VPN gateway

     



  7. Add route entries to the IBM Cloud VPC Routing table for the mapped (virtual NAT’d subnet) that will be created from the Aviatrix controller. The route next hop will be the VPN connection to the Aviatrix spoke gateway.

     





Aviatrix Side





  1. Navigate to SITE2CLOUDSetup and select + ADD NEW

     



  2. Create the Site2Cloud connection from the spoke landing VPC to the IBM VPN Gateway





    1. Select the landing VPC ID



    2. Select a Connection Type of Mapped



    3. Enter the Connection Name and select Remote Gateway Type of Generic



    4. Select Route-based for Tunnel Type



    5. Select the IKEv2 check box



    6. Select Enable HA



    7. Select the primary spoke gateway for the Primary Cloud Gateway



    8. In the Remote Gateway IP Address box, enter the first Public IP address from the IBM Cloud VPN Gateway



    9. Enter the same Pre-shared Key used for the IBM Cloud VPN connection for VPC



    10. Select the HA spoke gateway for the Backup Gateway



    11. In the Remote Gateway IP Address (Backup) box, enter the second Public IP address from the IBM Cloud VPN Gateway



    12. Select Same Pre-shared Key as Primary



    13. For Remote Subnet (Real), enter the real subnet of the IBM Cloud VPC



    14. For Remote Subnet (Virtual), enter a virtual subnet



    15. For Local Subnet (Real), enter the real subnet of the Aviatrix spoke VPC(s)



    16. For Local Subnet (Virtual), enter a virtual subnet (different from the Remote Subnet (Virtual))



    17. Select OK to build the connection

       





  3. Navigate to SITE2CLOUD, select the newly created connection, and select EDIT.

     



  4. Scroll down to Forward Traffic to Transit Gateway and select Enable

     



  5. In Multi-Cloud Transit -> List -> Spoke select the spoke gateway where the S2C connection was built, then select Actions and select Auto Advertise Spoke Site2Cloud CIDRs. Select EnabledTransit List — aviatrix_docs documentation

     





Validation





  1. Navigate to SITE2CLOUD and verify that the Status is Up. Select the newly created connection, and select EDIT.

     



  2. Verify one tunnel shows Active and Up. The other tunnel will show Standby and Down because IBM VPN Gateway only supports active standby (see note below).





    Note from IBM Cloud Documentation: A static, route-based VPN is deployed in Active-Active redundancy mode; however, only one tunnel can be used for active tunnel traffic. The other tunnel acts as hot standby so that traffic can be easily diverted to the second tunnel if the first tunnel goes down. Both tunnels are always up on the IBM Cloud side, which gives the peer side the advantage to control the traffic on their end. The peer side needs to use either only one tunnel, or keep the status of the other tunnel down and activate it only if the first tunnel goes down.



     



  3. On Aviatrix CoPilot, navigate to Cloud Routes → Site 2 Cloud and verify S2C Status, Tunnel Status is Up/Green for the Active tunnel.

     



  4. On IBM Cloud, navigate to the VPN gateway details, and under VPN connections, verify the Status is Active for one of the connections.

     



Be the first to reply!

Reply