Skip to main content
This document describes how to configure an IPsec tunnel between an Aviatrix Gateway and an Oracle Dynamic Routing Gateway (DRG). gw2drg

Deployment

For this use case, you will create an IPsec connection from DRG first and then configure a Site2Cloud connection in Aviatrix CoPilot.

Creating an IPsec Connection from DRG

Prerequisites
  1. You have a DRG created and attached to a VCN.
  2. You have an Aviatrix Gateway provisioned in a VPC/VNet. You will need this gateway’s public IP address and its VPC/VNet CIDR for the steps below.
  1. Log in to your Oracle Cloud Console and create a route rule for the DRG. You need to modify the desired route table and create a route rule to take any traffic destined for the Aviatrix Gateway’s VPC/VNet CIDR and route it to the DRG.
    1. Under Core Infrastructure, go to Networking and click Virtual Cloud Networks.
    2. Click your VCN.
    3. Select the desired route table(s) for your VCN.
    4. Click Edit Route Rules.
    5. Create a new route rule as follows and save it.
      FieldDescription
      Target TypeDynamic Route Gateway
      Destination CIDR BlockAviatrix GW’s VPC/VNet CIDR (172.19.0.0/16 in this example)
      Target Dynamic Routing GatewaySelect the desired existing DRG
      vcn_route_table
  2. Log in to your Oracle Cloud Console and create security rules. Edit the security list associated with your VCN subnets by adding two new rules: one ingress rule for traffic coming from the Aviatrix Gateway’s VPC/VNet and one egress rule for traffic going to the Aviatrix Gateway’s VPC/VNet.
    1. Under Core Infrastructure, go to Networking and click Virtual Cloud Networks.
    2. Click your VCN.
    3. Select the desired security list(s) associated with your subnets.
    4. Click Edit All Rules.
    5. In Allowed Rule for Ingress section, enter the following values to create a rule to allow incoming traffic from Aviatrix Gateway’s VPC/VNet.
      FieldDescription
      Source TypeCIDR
      Source CIDRAviatrix GW’s VPC/VNet CIDR (172.19.0.0/16 in this example)
      IP ProtocolsAll Protocols
      vcn-security-rule-ingress
    6. In Allowed Rule for Egress section, enter the following values to create a rule to allow outgoing traffic to the Aviatrix Gateway’s VPC/VNet.
      FieldDescription
      Destination TypeCIDR
      Destination CIDRAviatrix GW’s VPC/VNet CIDR (172.19.0.0/16 in this example)
      IP ProtocolsAll Protocols
      vcn-security-rule-egress
  3. Create a CPE object. In this task, you create the CPE object, which is a logical representation of the Aviatrix Gateway.
    1. Under Core Infrastructure, go to Networking and click Customer-Premises Equipment.
    2. Click Create Customer-Premises Equipment.
    3. Enter the following values and click Create.
      FieldDescription
      Create in CompartmentLeave as is (the VCN’s compartment)
      NameA descriptive name for the CPE object
      IP AddressPublic IP address of Aviatrix Gateway
      TagsOptional
      cpe
  4. From the DRG, create an IPsec connection to the CPE object.
    1. Under Core Infrastructure, go to Networking and click Dynamic Routing Gateways.
    2. Click the DRG created earlier.
    3. Click Create IPsec Connection.
    4. Enter the following values and click Create IPsec Connection.
      FieldDescription
      Create in CompartmentLeave as is (the VCN’s compartment)
      NameA descriptive name for the IPsec connection
      Customer-Premises Equipment CompartmentLeave as is (the VCN’s compartment)
      Customer-Premises EquipmentSelect the CPE object created earlier
      Static Route CIDRAviatrix GW’s VPC/VNet CIDR (172.19.0.0/16 in this example)
      TagsOptional
      ipsec-connection
    5. Once the IPsec connection enters the Available state, click the Action icon (three dots), and then click Tunnel Information. Copy the IP Address of the VPN headend and the Shared Secret for configuring an external (S2C) connection in Aviatrix CoPilot. ipsec-info
  5. Log into Aviatrix CoPilot.
  6. Create a Transit Gateway.
If you want to add HA to the Transit Gateway, you must do it when you initially create the Transit Gateway. You must also follow the steps here to add a new IPsec connection in Oracle.
  1. Follow the steps in Site2Cloud Configuration Workflow.
  2. Use one of these tables for specific field values (Unmapped):
  3. Replace the following values as noted:
    • Remote Device Type: Oracle
    • Remote Subnet CIDR(s): Oracle VCN CIDR (10.1.1.0/24 in this example).
    • Remote Device IP: IP address copied from the Oracle IPsec connection.
    • Pre-Shared Key: Shared Secret copied from the Oracle IPsec connection.

Test

Once complete, test the communication using the tunnel by sending traffic between instances in the Aviatrix Gateway’s VPC/VNet and Oracle VCN.
  1. In CoPilot, go to Diagnostics > Cloud Routes > External Connections.
  2. Verify that the external (S2C) connection Tunnel Status is Up.

Troubleshoot

Wait 2-3 minutes for the tunnel to come up. If it does not come up within that time, check the IP addresses to confirm they are accurate. Additional troubleshooting is available from Diagnostics > Diagnostic Tools.

Creating a Second IPsec Connection Between the Same DRG and Aviatrix HA Gateway (Optional)

From the Oracle Cloud console, create a second IPsec connection between the same DRG and the Aviatrix HA Gateway created here.
  1. Create a new CPE at Oracle Cloud Console for the Aviatrix HA Gateway:
    FieldDescription
    Create in CompartmentLeave as is (the VCN’s compartment)
    NameA descriptive name for the second CPE object
    IP AddressPublic IP address of Aviatrix HA Gateway
    TagsOptional
  2. Create a new IPsec connection at Oracle Cloud Console for the Aviatrix HA Gateway:
    FieldDescription
    Create in CompartmentLeave as is (the VCN’s compartment)
    NameA descriptive name for the second IPsec connection
    Customer-Premises Equipment CompartmentLeave as is (the VCN’s compartment)
    Customer-Premises EquipmentSelect the second CPE object created earlier
    Static Route CIDRAviatrix GW’s VPC/VNet CIDR (172.19.0.0/16 in this example)
    TagsOptional
  3. Once the second IPsec connection enters the Available state, click the Action icon (three dots), and then click Tunnel Information. Please copy the IP Address of the VPN headend and the Shared Secret.