AntonioFeijaoUK / networkworkshop

Network lab for private link and route53 resolvers

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Networking Workshop

The cloudformation template sets up intial VPCs and instances as depicted below. It is recommend to run the CF template in a new account as it creates 3 VPCs and 4 EIPs in eu-west-1.

Note: Please delete the default VPC to remove the clutter

Initial Setup

  • Set up the VPN with DC VPC

  1. Ensure that VPN status in your AWS environment is in 'available' state before setting up the VPN on the openswan instance.

  2. Capture the VPN endpoint IP and secret key from your AWS environment. We will only set up one tunnel due to limitations with OpenSwan routing capabilities.

  3. Open a session to your OpenSwan instance using sessions manager and run the following commands.

cd / 
sudo ./connection-setup.sh <VPN-Endpoint-IP> <secret>

example: sudo ./connection-setup.sh 1.1.1.1 Amazon123
  1. Verify ipsec service and tunnel status.
sudo ipsec verify
sudo ipsec status
  1. Verify ip xfrm policies ( you should have an In, Out and Fwd rule)
sudo ip xfrm policy
  • Workshop tasks

  1. The "webserver" instance should be able to reach a web api on the "servicesapp" instance in the "Services" VPC. You can use "curl http://10.0.2.100" to verify connectivity.
  2. You should setup bidirectional connectivty between "DCVPC" and "ServicesVPC". OpenSwan Instance and appropriate VPN configuration is already setup in the DCVPC.
  3. Set up a hybrid private DNS environment so that instances in DCVPC private subnet are able to reach the app instance in ServicesVPC using domain names. The private hosted zone and bind servers are already set up for you.

About

Network lab for private link and route53 resolvers