AWS Redundant Tunnels - Transit Gateway

Prerequisites

  • An active Harmony SASE Administrator Portal account and network.

  • Make sure you have installed the Harmony SASE Agent on your devices.

  • Administrator account in the Firewall/ Router/ Cloud Management Portal.

  • Your Harmony SASE network must have at least two different gateways in the same network.

    Notes -

    • You can deploy the gateways in two separate regions for comprehensive ISP redundancy.

    • You can scale up the network. Adding another region does not affect the connection.

Step 1 - Configurations in the AWS Management Console

Creating a Transit Gateway

Note - If you already have a Transit Gateway in your AWS region, skip this procedure.

  1. Access the AWS Management Console and go to the TRANSIT GATEWAYS section.

  2. Click Transit Gateway > Create transit Gateway.

  3. Create the Transit Gateway with the default settings.

  4. In the VPC section, go to Transit Gateway Attachments and create a Transit Gateway Attachment for your VPC.

Creating Two Site-to-Site VPN Connections

  1. Access the AWS Management Console and go to your AWS VPC > VIRTUAL PRIVATE NETWORK(VPN) section.

  2. Click Site-to-Site VPN Connections > Create VPN Connection.

    The Create VPN connection window appears.

  3. Enter these:

    1. Transit Gateway - Transit gateway you created.

    2. Customer gateway - New.

    3. IP address - IP address of the first Harmony SASE gateway.

    4. BGP ASN - ASN you plan to use for the Harmony SASE network. The default is 64512.

    5. Routing options - Dynamic (requires BGP).

      (Recommended) Use suitable naming conventions so that you can locate and distinguish between the connections later.

  4. In the TRANSIT GATEWAYS section, go to Transit Gateway attachments and find the Transit Gateway Attachment you created.

    Rename it with a meaningful name.

  5. Go back to Site-to-Site VPN Connections, select the VPN connection you created, and then click Download Configuration.

    The Download configuration window appears.

  6. Enter these:

    1. Vendor - Generic
    2. Platform - Generic

    3. Software - Vendor Agnostic

    4. Ike version - Ikev2

  7. Click Download.

    The system downloads the file. Rename the file as Tunnel1.txt.

  8. Repeat steps 1-7 for the other Site-to-Site Tunnel with the IP address of the second Harmony SASE gateway.

  9. Rename the second downloaded file as Tunnel2.txt.

  10. In the TRANSIT GATEWAYS section, go to Transit Gateway attachments and find the Transit Gateway Attachment you created.

    Rename it with a meaningful name.

Note - To access your VPC through the redundant connection, you must have a VPC Attachment connected to the Transit gateway.

Creating Static Routes

  1. Access the AWS Management Console and go to VPC.

  2. Select the corresponding VPC attached to the Transit Gateway and then select the Main Route Table for the VPC.

  3. Edit the main Route Table for the VPC:

    1. In the Destination column, add the subnet mask of your Harmony SASE network.

    2. In the Target column, select Transit Gateway (Route for reverse traffic).

      Note - If this is not the Main Route Table for the VPC, locate each subnet associated with the VPC and add the reverse route for the Harmony SASE internal subnet range.

Step 2 - Creating the Tunnels in the Harmony SASE Administrator Portal

  1. Access the Harmony SASEAdministrator Portal and click Networks.

  2. Click the network where you want to create the tunnel.

  3. In one of the gateways, click > Add Tunnel.

  4. Click IPSec Site-2-Site Tunnel and click Continue.

  5. Select Redundant Tunnels and click Continue.

    The Redundant IPSec Tunnels window appears.

  6. For the first tunnel:

    1. Expand the Tunnel 01 drop-down.

    2. To automatically populate the tunnel configuration values, click Upload File and upload Tunnel_1.txt file.

    3. For manual configuration, copy the values from Tunnel_1.txt file as shown below.

      1. Shared Secret - Pre-Shared Key

      2. Harmony SASE gateway Internal IP - Inside IP Addresses of Customer Gateway.

      3. Remote Public IP & Remote ID - Outside IP Addresses of Virtual Private Gateway.

      4. Remote Gateway internal IP - Inside IP Addresses of Virtual Private Gateway. The IP on the AWS side has a subnet (/30), discard it when pasting.

      5. Remote Gateway ASN - BGP Configuration Options of Virtual Private Gateway ASN from the file.

  7. Enter the above copied values.

  8. For the second tunnel, expand the Tunnel 02 drop-down and repeat step 6 with the values from Tunnel_2.txt file.

  9. In the Shared Settings section:

    1. In Proposal Subnets, select Any(0.0.0.0/0) for both sides.

    2. The ASN number should be the same as the Customer Gateway ASN you configured on the AWS Management console.

  10. In the Advanced Settings section, enter the information for your tunnel type:

    Field

    IKE Version

    IKE Lifetime

    Tunnel Lifetime

    Dead Peer Detection Delay

    Dead Peer Detection Timeout

    Encryption (Phase 1)

    Encryption (Phase 2)

    Integrity (Phase 1)

    Integrity (Phase 2)

    Diffie Hellman Groups (Phase 1)

    Diffie Hellman Groups (Phase 2)

    Cloud Vendor

    Amazon AWS

    Single Tunnel - AWS Virtual Gateway V2 8h 1h 10s 30s aes256 aes256 sha512 sha512 21 21
    Single Tunnel - AWS Transit Gateway V2 8h 1h 10s 30s aes256 aes256 sha512 sha512 21 21
    Redundant Tunnels - AWS Virtual Private Gateway V2 8h 1h 10s 30s aes256 aes256 sha512 sha512 21 21
    Redundant Tunnels - AWS Transit Gateway V2 8h 1h 10s 30s aes256 aes256 sha512 sha512 21 21

    Google Cloud Platform

    Single Tunnel 1 V2 8h 1h 10s 30s aes256 aes256 sha512 sha512 21 21

    Redundant Tunnels

    V2 8h 1h 10s 30s aes256 aes256 sha512 sha512 21

    21

    Microsoft Azure  

    Single Tunnel -

    Azure Virtual Network Gateway

    V2

    3600s

    27000s

    10s

    45s

    aes256 aes256 sha1 sha1

    2

    2

    Redundant Tunnels - Virtual Network Gateway

    V2

    9h

    9h

    10s 30s aes256 aes256 sha1 sha1

    2

    2

    Redundant Tunnels - Virtual WAN

    V2

    8h

    1h 10s 30s aes256 aes256

    sha256

    sha256

    14

    14

    Other tunnel types

     

    Alibaba Cloud V1 8h 1h 10s 30s aes256 aes256 sha1 sha1 2 2

    IBM Cloud

    V1

    8h 1h 10s 30s aes256 aes256

    sha256

    sha256

    21

    21

    1 Suggested values. For other supported ciphers, see this Google article.

  11. Click Add Tunnel.