[Osaka/Yokohama/Tokushima] Looking for infrastructure/server side engineers!

[Osaka/Yokohama/Tokushima] Looking for infrastructure/server side engineers!

[Deployed by over 500 companies] AWS construction, operation, maintenance, and monitoring services

[Deployed by over 500 companies] AWS construction, operation, maintenance, and monitoring services

[Successor to CentOS] AlmaLinux OS server construction/migration service

[Successor to CentOS] AlmaLinux OS server construction/migration service

[For WordPress only] Cloud server “Web Speed”

[For WordPress only] Cloud server “Web Speed”

[Cheap] Website security automatic diagnosis “Quick Scanner”

[Cheap] Website security automatic diagnosis “Quick Scanner”

[Reservation system development] EDISONE customization development service

[Reservation system development] EDISONE customization development service

[Registration of 100 URLs is 0 yen] Website monitoring service “Appmill”

[Registration of 100 URLs is 0 yen] Website monitoring service “Appmill”

[Compatible with over 200 countries] Global eSIM “Beyond SIM”

[Compatible with over 200 countries] Global eSIM “Beyond SIM”

[If you are traveling, business trip, or stationed in China] Chinese SIM service “Choco SIM”

[If you are traveling, business trip, or stationed in China] Chinese SIM service “Choco SIM”

[Global exclusive service] Beyond's MSP in North America and China

[Global exclusive service] Beyond's MSP in North America and China

[YouTube] Beyond official channel “Biyomaru Channel”

[YouTube] Beyond official channel “Biyomaru Channel”

Let's make a VPN connection between GCP and home NW (RTX1200)

Hello everyone.
My name is Hirata and I belong to the Operations Management Division of the System Solutions Department.

In the previous blog, I introduced AWS and local VPN connection, so
this time I will introduce how to connect GCP and home NW (RTX1200) with VPN.

The slides have been uploaded below as they were presented at an in-house study session.

https://www.slideshare.net/BeyondCorporation/20191017-byd-lthirata-194555992

Most of the content I would like to introduce this time is described in the slides above, so
in this blog I will mainly provide supplementary information.

 

Configuration diagram

The configuration diagram is shown below.

 

GCP settings

Configure the following four settings on the GCP side.
・VPC network settings
・Instance settings
・Firewall settings
・Cloud VPN settings

I will omit the VPC network, instance, and firewall settings as they are outside the main focus of this blog.

Configuring Cloud VPN

Display the Cloud VPN settings on GCP by following the steps below.

Hybrid connection -> VPN

If you have never set up a VPN before, entering this screen will start the VPN setup wizard.

VPNs to choose from: High Availability (HA) VPN and Traditional VPN.
The difference between the two is whether the VPN tunnel is redundant or not.
This time, we will configure the settings using "traditional VPN".

For the following settings, I will introduce the settings screen with an image on the slide, but since it is difficult to see, I will also introduce the settings screen here.

The VPN settings on the cloud side are as follows.

 

Router settings

The router config is listed below. The router uses RTX1200.

[gcp-vpn-test]# show config login password * administrator password * console character ascii console prompt [gcp-vpn-test] login timer 1200 ip route default gateway pp 1 ip route (GCP VPC network) gateway tunnel 1 ip lan1 address (router's private IP address)/24 ip lan1 proxyarp on pp select 1 pp always-on on pppoe use lan2 pppoe auto disconnect off pp auth accept pap chap pp auth myname (ISP connection ID) (ISP connection password) ppp lcp mru on 1454 ppp ipcp ipaddress on ppp ipcp msext on ip pp mtu 1454 ip pp secure filter in 210000 ip pp secure filter out 201000 ip pp intrusion detection in on ip pp nat descriptor 1 pp enable 1 tunnel select 1 ipsec tunnel 1 ipsec sa policy 1 1 esp aes-cbc sha-hmac ipsec ike version 1 2 ipsec ike always-on 1 on ipsec ike encryption 1 aes-cbc ipsec ike group 1 modp1024 ipsec ike hash 1 sha ipsec ike keepalive log 1 off ipsec ike local address 1 (router private IP address) ipsec ike local name 1 (router public IP address) ipv4-addr ipsec ike nat-traversal 1 on ipsec ike pfs 1 on ipsec ike pre-shared-key 1 text (VPN private key passphrase) ipsec ike remote address 1 (public IP address for VPN reserved in GCP) ipsec ike remote name 1 (public IP address for VPN reserved in GCP) ipv4-addr ipsec auto refresh 1 on ip tunnel tcp mss limit auto tunnel enable 1 ip filter 201000 pass * * ip filter 210000 pass * * nat descriptor type 1 masquerade nat descriptor masquerade static 1 3 (router private IP address) esp nat descriptor masquerade static 1 4 (router private IP address) udp 500 ipsec use on ipsec auto refresh on dhcp service server dhcp server rfc2131 compliant except remain-silent dhcp scope 1 192.168.253.2-192.168.253.39/24 dns server 8.8.4.4 8.8.8.8 dns server pp 1 dns private address spoof on

Since I am using a router that was initialized for testing, all filters are allowed. Please be careful when actually using it!

Points to note when setting up RTX

There are some things to keep in mind when setting up RTX.

The settings are "ipsec ike local address" and "ipsec ike local name".

that "ipsec ike local address" requires setting the private IP address set on the router's LAN, while
"ipsec ike local name" requires setting the router's public IP address.

because the settings on the GCP side, ``ipsec ike remote address'' and ``ipsec ike remote name,''
both require setting the public IP address for the VPN reserved by GCP.

However, other than that, the settings are common, so if you keep this in mind, you won't have much trouble setting up RTX.

 

confirmation

The VPN settings are now complete.

Once the VPN is established, the status will be displayed as "established" on the GCP VPN screen.

 

Comparison of GCP and AWS for VPN

We will introduce the results of comparing GCP and AWS regarding VPN.

AWS GCP
Router config automatic generation function can be none
Cloud side setting items many few
Configuration and routing With HA: dynamic (BGP), static With HA: Dynamic (BGP)
Without HA: Dynamic (BGP), Static

Regarding the configuration, there are expressions such as "with HA" and "without HA", but
this is the difference between whether or not the VPN tunnel is redundant.

In AWS, VPN is always set up with redundant VPN tunnels.

To explain the distinctive parts of each,
GCP has fewer configuration items on the cloud side and is all on one screen, making configuration easier.

AWS has a feature that automatically generates router config,
which not only makes router configuration easier, but also allows AWS to introduce supported vendors
to customers I felt that it also had the advantage of being easy to use.

 

summary

Continuing from the previous AWS article, we introduced VPN connections with GCP.

In the future, we would like to continue to create articles introducing how to connect the cloud services we handle with local NW using VPN, so please look forward to it!

 

 

If you found this article helpful , please give it a like!
0
Loading...
0 votes, average: 0.00 / 10
4,949
X facebook Hatena Bookmark pocket
[2025.6.30 Amazon Linux 2 support ended] Amazon Linux server migration solution

[2025.6.30 Amazon Linux 2 support ended] Amazon Linux server migration solution

The person who wrote this article

About the author

Kenshiro Hirata

Joined mid-career in 2019.
Since I have experience in the past, there may be more NW-related articles. I want to make camping my hobby.