Working with VPN Connect

This topic contains some details about working with VPN Connect and the related components. Also see these topics:

Warning

Avoid entering confidential information when assigning descriptions, tags, or friendly names to your cloud resources through the Oracle Cloud Infrastructure Console, API, or CLI.

Viewing Tunnel Status and Configuration

When you successfully create the IPSec connection, Oracle produces important configuration information for each of the resulting IPSec tunnels. For example, see task 2h in the overall setup process. You can view that information and the status of the tunnels at any time. This includes the BGP status if the tunnel is configured to use BGP dynamic routing.

To view the status and configuration information for the IPSec tunnels
  1. Open the navigation menu. Under Core Infrastructure, go to Networking and click IPSec Connections.

    A list of the IPSec connections in the compartment that you're viewing is displayed. If you don’t see the one you're looking for, verify that you’re viewing the correct compartment (select from the list on the left side of the page).

  2. Click the IPSec connection you're interested in.

    Each tunnel's details are displayed, including the IPSec status, the BGP status (if the tunnel uses BGP dynamic routing), and the Oracle VPN IP address (the VPN headend).

  3. To view a tunnel's shared secret:
    1. Click the tunnel you're interested in.
    2. Next to the Shared Secret field, click Show.

Using the CPE Configuration Helper

After you set up VPN Connect, your network engineer must configure the customer-premises equipment (CPE) at your end of the connection. The configuration includes details about your virtual cloud network (VCN) and the IPSec tunnels in the VPN Connect. The CPE Configuration Helper generates the information for your network engineer. For more information, see Using the CPE Configuration Helper.

Changing the Static Routes

You can change the static routes for an existing IPSec connection. You can provide up to 10 static routes.

Remember that an IPSec connection can use either static routing or BGP dynamic routing. You associate the static routes with the overall IPSec connection and not the individual tunnels. If an IPSec connection has static routes associated with it, Oracle uses them for routing a tunnel's traffic only if the tunnel itself is configured to use static routing. If it's configured to use BGP dynamic routing, the IPSec connection's static routes are ignored.

Important

The IPSec connection goes down while it is reprovisioned with your static route changes.
To edit the static routes
  1. Open the navigation menu. Under Core Infrastructure, go to Networking and click IPSec Connections.

    A list of the IPSec connections in the compartment that you're viewing is displayed. If you don’t see the one you're looking for, verify that you’re viewing the correct compartment (select from the list on the left side of the page).

  2. For the IPSec connection you're interested in, click the Actions icon (three dots), and then click Edit.

    The current static routes are displayed.

  3. Make your changes and click Save Changes.

Changing the CPE IKE Identifier That Oracle Uses

If your CPE is behind a NAT device, you might need to give Oracle your CPE IKE identifier. You can either specify it when you create the IPSec connection, or later edit the IPSec connection and change the value. Oracle expects the value to be an IP address or fully qualified domain name (FQDN). When you specify the value, you also specify which type it is.

Important

The IPSec connection goes down while it is reprovisioned to use your CPE IKE identifier.
To change the CPE IKE identifier that Oracle uses
  1. Open the navigation menu. Under Core Infrastructure, go to Networking and click IPSec Connections.

    A list of the IPSec connections in the compartment that you're viewing is displayed. If you don’t see the one you're looking for, verify that you’re viewing the correct compartment (select from the list on the left side of the page).

  2. For the IPSec connection you're interested in, click the Actions icon (three dots), and then click Edit.

    The current CPE IKE identifier that Oracle is using is displayed at the bottom of the dialog.

  3. Enter your new values for CPE IKE Identifier Type and CPE IKE Identifier, and then click Save Changes.

Using IKEv2

Oracle supports Internet Key Exchange (IKE) version 1 and version 2 (IKEv2).

If you want to use IKEv2 and your CPE supports it, you must:

  • Configure each IPSec tunnel to use IKEv2 in the Oracle Console. See the following procedures.
  • Configure your CPE to use IKEv2 encryption parameters that the CPE supports. For a list of parameters that Oracle supports, see Supported IPSec Parameters.
New IPSec connection: using IKEv2
Note

If you create a new IPSec connection manually, you can specify IKEv2 when you create the IPSec connection in the Oracle Console. See the procedure that immediately follows.

If you instead use the VPN quickstart workflow, the IPSec connection is configured to use IKEv1 only. However, after the workflow is complete, you can edit the resulting IPSec tunnels in the Oracle Console and change them to use IKEv2.

To manually set up a new IPSec connection that uses IKEv2:

  1. While creating the IPSec connection in the Oracle Console, in the Advanced Options section, click the Tunnel 1 tab.
  2. From the IKE Version menu, select IKEv2.
  3. Repeat the preceding step for the Tunnel 2 tab.
  4. Later when configuring your CPE, configure it to use only IKEv2 and related IKEv2 encryption parameters that the CPE supports.
Existing IPSec connection: upgrading to IKEv2
Important

Oracle recommends performing the following process for one tunnel at a time to avoid disruption in your overall connection. If your connection is not redundant (for example, does not have multiple tunnels), expect downtime while you upgrade to IKEv2.
  1. Change the tunnel's IKE version in the Oracle Console:
    1. Open the navigation menu. Under Core Infrastructure, go to Networking and click IPSec Connections.

    2. Click the IPSec connection you're interested in.
    3. Click the tunnel to view its details.
    4. Click Edit.
    5. From the IKE Version menu, select IKEv2.
    6. Click Save Changes.
  2. Update your CPE configuration for the tunnel to use IKEv2 and the related encryption parameters that the CPE supports. For a list of parameters that Oracle supports, see Supported IPSec Parameters.
  3. If the security associations did not rekey immediately, force a rekey for that tunnel on your CPE. In other words, clear the phase 1 and phase 2 security associations and do not wait for them to expire. Some CPE devices wait for the SAs to expire before rekeying. Forcing the rekey lets you confirm immediately that the IKE version configuration is correct.
  4. To verify, ensure that the security associations for the tunnel rekey correctly. If they don't, confirm that the correct IKE version is set in the Oracle Console and on your CPE, and that the CPE is using the desired parameters.

After you've confirmed the first tunnel is up and running again, repeat the preceding steps for the second tunnel.

Changing the Shared Secret That an IPSec Tunnel Uses

When you set up an IPSec VPN, by default Oracle provides each tunnel's shared secret (also called the pre-shared key). You might have a particular shared secret that you want to use instead. You can specify each tunnel's shared secret when you create the IPSec connection, or you can edit the tunnels and provide each new shared secret then. For the shared secret, only numbers, letters, and spaces are allowed. Oracle recommends using a different shared secret for each tunnel.

Important

When you change a tunnel's shared secret, both the overall IPSec connection and the tunnel go into the Provisioning state while the tunnel is reprovisioned with the new shared secret. The other tunnel in the IPSec connection remains in the Available state. However, while the first tunnel is being reprovisioned, you cannot change the second tunnel's configuration.
To change the shared secret that an IPSec tunnel uses
  1. Open the navigation menu. Under Core Infrastructure, go to Networking and click IPSec Connections.

    A list of the IPSec connections in the compartment that you're viewing is displayed. If you don’t see the one you're looking for, verify that you’re viewing the correct compartment (select from the list on the left side of the page).

  2. Click the IPSec connection you're interested in.
  3. Click the tunnel you're interested in.
  4. Next to the Shared Secret field, click Edit.
  5. Enter your new value. Only numbers, letters, and spaces are allowed.
  6. Click Save Changes.

Changing from Static Routing to BGP Dynamic Routing

If you want to change an existing IPSec VPN from using static routing to using BGP dynamic routing, follow the process in this section.

Warning

When you change a tunnel's routing type, the tunnel's IPSec status does not change during reprovisioning. However, routing through the tunnel is affected. Traffic is temporarily disrupted until your network engineer configures your CPE device in accordance with the routing type change. If your existing IPSec VPN is currently configured to use only a single tunnel, this process will disrupt your connection to Oracle. If your IPSec VPN instead uses multiple tunnels, Oracle recommends reconfiguring one tunnel at a time to avoid disrupting your connection to Oracle.
To change from static routing to BGP dynamic routing

Prerequisites:

  • You've read this section: Routing for the Oracle IPSec VPN
  • You've gathered the necessary BGP routing information:

    • Your network's ASN. Oracle's BGP ASN for the commercial cloud is 31898. For the Government Cloud, see Oracle's BGP ASN.
    • For each tunnel: The BGP IP address for each end of the tunnel (the two addresses for a given tunnel must be a pair from a /30 or /31 subnet, and they must be part of the IPSec VPN's encryption domain)

Repeat the following process for each tunnel in the IPSec connection:

  1. Reconfigure the tunnel's routing type from static routing to BGP dynamic routing:

    1. Open the navigation menu. Under Core Infrastructure, go to Networking and click IPSec Connections.

    2. Click the IPSec connection you're interested in.

      The tunnels are listed, and the status for each tunnel is shown. The BGP Status for the tunnel you're interested in should show only a hyphen (no value), which means that the tunnel is currently configured to use static routing.

    3. Click the tunnel to view all of its details.
    4. Click Edit.
    5. Do the following:

      • Routing Type: Select the radio button for BGP Dynamic Routing.
      • BGP ASN: Enter your network's BGP ASN.
      • Inside Tunnel Interface - CPE: Enter the BGP IP address with subnet mask (either /30 or /31) for the CPE end of the tunnel. For example: 10.0.0.16/31.
      • Inside Tunnel Interface - Oracle: Enter the BGP IP address with subnet mask (either /30 or /31) for the Oracle end of the tunnel. For example: 10.0.0.17/31.
    6. Click Save Changes.

    The tunnel's BGP Status changes to Down.

  2. Have your network engineer update your CPE device's tunnel configuration to use BGP.
  3. On your side of the connection, confirm that the tunnel's BGP session is in an established state. If it is not, make sure you've configured the correct IP addresses for the tunnel in the Oracle Console and also for your CPE device.
  4. In the Oracle Console, confirm that the tunnel's BGP Status is now Up.
  5. Confirm that your CPE device is learning routes from Oracle, and your CPE device is advertising routes to Oracle. If you want to re-advertise the Oracle routes from BGP back to your on-premises network, make sure your CPE device is configured accordingly. Your existing policy to advertise the static routes to your on-premises network may not work for the BGP learned routes.
  6. Ping the Oracle BGP IP address from your side of the connection to confirm that traffic is flowing.

After you've confirmed the first tunnel is up and running with BGP, repeat the process for the second tunnel.

Important

As noted in Routing for the Oracle IPSec VPN, the static routes that are still configured for the overall IPSec connection do NOT override the BGP routing. Those static routes are ignored when Oracle routes traffic through a tunnel that is configured to use BGP.

Also, you can change a tunnel's routing type back to static routing if necessary. You might do this if the scheduled downtime window for the CPE device is ending soon and you're having trouble establishing the BGP session. When you switch back to static routing, make sure the overall IPSec connection still has your desired static routes configured.

Monitoring Your IPSec VPN

You can monitor the health, capacity, and performance of your Oracle Cloud Infrastructure resources by using metrics, alarms, and notifications. For more information, see Monitoring Overview and Notifications Overview.

For information about monitoring your connection, see VPN Connect Metrics.

Disabling or Terminating the IPSec VPN

If you want to disable the IPSec VPN between your on-premises network and VCN, you can simply detach the DRG from the VCN instead of deleting the IPSec connection. If you're also using the DRG with FastConnect, detaching the DRG would also interrupt the flow of traffic over FastConnect.

You can delete the IPSec connection. However, if you later want to re-establish it, your network engineer would have to configure your CPE device again with a new set of tunnel configuration information from Oracle.

If you want to permanently delete the entire IPSec VPN, you must first terminate the IPSec connection. Then you can delete the CPE object. If you're not using the DRG for another connection to your on-premises network, you can detach it from the VCN and then delete it.

To delete an IPSec connection
  1. Open the navigation menu. Under Core Infrastructure, go to Networking and click IPSec Connections.

    A list of the IPSec connections in the compartment you're viewing is displayed. If you don’t see the one you're looking for, verify that you’re viewing the correct compartment (select from the list on the left side of the page).

  2. Click the IPSec connection you're interested in.
  3. Click Terminate.
  4. Confirm the deletion when prompted.

The IPSec connection will be in the Terminating state for a short period while it's being deleted.

To delete a CPE object

Prerequisite: There must not be an IPSec connection between the CPE object and a DRG.

  1. Open the navigation menu. Under Core Infrastructure, go to Networking and click Customer-Premises Equipment.

    A list of the CPE objects in the compartment you're viewing is displayed. If you don’t see the one you're looking for, verify that you’re viewing the correct compartment (select from the list on the left side of the page).

  2. For the CPE object that you want to delete, click the Actions icon (three dots), and then click Delete.
  3. Confirm the deletion when prompted.

The object will be in the Terminating state for a short period while it's being deleted.

Managing Tags for an IPSec Connection or CPE Object

You can apply tags to your resources to help you organize them according to your business needs. You can apply tags at the time you create a resource, or you can update the resource later with the desired tags. For general information about applying tags, see Resource Tags.

To manage tags for an IPSec connection
  1. Open the navigation menu. Under Core Infrastructure, go to Networking and click IPSec Connections.

    A list of the IPSec connections in the compartment you're viewing is displayed. If you don’t see the one you're looking for, verify that you’re viewing the correct compartment (select from the list on the left side of the page).

  2. Click the IPSec connection you're interested in.
  3. Click the Tags tab to view or edit the existing tags. Or click Add tags to add new ones.
To manage tags for a CPE object
  1. Open the navigation menu. Under Core Infrastructure, go to Networking and click Customer-Premises Equipment.

    A list of the CPE objects in the compartment you're viewing is displayed. If you don’t see the one you're looking for, verify that you’re viewing the correct compartment (select from the list on the left side of the page).

  2. Click the CPE object you're interested in.
  3. Click the Tags tab to view or edit the existing tags. Or click Apply tag(s) to add new ones.

Moving an IPSec Connection or CPE Object to a Different Compartment

You can move your resources from one compartment to another. After you move the resource to the new compartment, inherent policies apply immediately and affect access to the resource through the Console. Moving the CPE object to a different compartment does not affect the connection between your data center and Oracle Cloud Infrastructure. For more information, see Working with Compartments.

To move a CPE object to a different compartment
  1. Open the navigation menu. Under Core Infrastructure, go to Networking and click Customer-Premises Equipment.

  2. Find the CPE object in the list, click the the Actions icon (three dots), and then click Move Resource.
  3. Choose the destination compartment from the list.
  4. Click Move Resource.