AWS VPN menggunakan IPFire (Net-to-net)

AWS VPN over IPFIRE. Di tulisan kali ini saya bakal kasih cara mebuat konesi VPN tunel dari AWS (Amazon Web Service) menggunakan IPFire. Tujuannya adalah supaya perangkat di local bisa berkomunikasi dengan instance/RDS. Cara ini sudah saya terapkan di kantor saya, PT Bobobobo.

Jadi begini kurang lebih gambarannya:


To The Point: 
  1. Login to AWS Console
  2. Goto VPC > VPN Connection > Customer Gateways
  3. Create Customer Gateway
Name: name of Customer Gateway
Routing: Static
IP Address: Your Office  Public IP Address


  1. Goto VPC > VPN Connection > Virtual Private Gateways
  2. Create Virtual Private Gateway
Name: Name Of your VPG
ASN: Amazone by Default
  1. Then Attach VPC to your Virtual Private Gateways



  1. Goto VPC > VPN Connection > VPN Connections
Name tag: Your VPN Name
Virtual Private Gateway: Select your VPG
Customer Gateway ID: Selec your CG id
Routing Option: Your Local IP (Green / local LAN IPFire) and CIDR



  1. Download Configuration > Generic > Download
  2. Enable Route Propagation
Goto VPC > Route Tables > Select Subnet > Route Propagation > Edit > [Propagate YES]







10. Open Configuration File from AWS



GO TO IP FIRE
  1. Go to Services > IPSec
  2. Scroll to Connection Status and Control > add
  3. Select Net-To-Net Virtual Private Network > add
Name: Name of your IP Sec
Enabled: [yes]
Remote host/IP: IP from AWS VPN Configuration File (Virtual Private Gateway / Outside IP Address)
Local Subnet: GREEN IP / Local IP Ipfire
Remote subnet: IP address from AWS VPC / AWS Subnet (Local EC2 IP)
Edit advanced Setting: [tick yes]
Use pre-shared key: Paste from AWS VPN Configuration File
Save




  1. Advanced Configuration
Keyexchange: IKEv1
Encription : 128 bit AES CBC
128 bit AES CBC
Integrity: SHA1
SHA1
Lifetime: 8 H
1 H
Grouptype: just leave default
 just leave default

  1. Save

  1. Make sure connection is Connect!

  1. Go to Firewal > Firewall Rules > add
Source: Standard networks GREEN
NAT: Source NAT (GREEN)
Destination: IPSec Network : your ipsec Name
Save




DNS FORWARDING
  1. Go to Network > DNS Forwarding
    1. Zone: Name off DNS Forwaring
    2. Nameserver : your AWS VPC Subnet / IP Address (Local EC2 IP)
    3. Enabled: Tick [yes]
    4. Add
  2. (If Needed, add DNS Forwarding again if you have more VPC Subnet)




TESTING
Now Ping your local EC2 IP Address

DONE!
Latest