Configuring Site-to-site Open VPN

The availability of this feature depends on the service quotas that are enabled for your account.

Requirements for the VPN appliance

System requirements

  • 1 CPU
  • 1 GB RAM
  • 8 GB disk space

Ports

Ensure that your firewalls and other components of your network security system allow connections through these ports to any IP address.

Configuring a Site-to-site Open VPN connection

The VPN appliance extends your local network to the cloud through a secure VPN tunnel. This kind of connection is often referred to as a "Site-to-site" (S2S) connection. You can follow the procedure below or watch the video tutorial.

To configure a connection through the VPN appliance

  1. In the service console, go to Disaster Recovery > Connectivity.
  2. Select Site-to-site Open VPN connection, and click Configure.

    The system starts deploying the VPN gateway in the cloud. This will take some time. Meanwhile, you can proceed to the next step.

    The VPN gateway is provided without additional charge. It will be deleted if the Disaster Recovery functionality is not used, i.e. no primary or recovery server is present in the cloud for seven days.

  3. In the VPN appliance block, click Download and deploy. Depending on the virtualization platform you are using, download the VPN appliance for VMware vSphere or Microsoft Hyper-V.

  4. Deploy the appliance and connect it to the production networks.

    In vSphere, ensure that Promiscuous mode and Forged transmits are enabled and set to Accept for all virtual switches that connect the VPN appliance to the production networks. To access these settings, in vSphere Client, select the host > Summary > Network, and then select the switch > Edit settings... > Security.

    In Hyper-V, create a Generation 1 virtual machine with 1024 MB of memory. We also recommend enabling Dynamic Memory for the machine. Once the machine is created, go to Settings > Hardware > Network Adapter > Advanced Features and select the Enable MAC address spoofing check box.

  5. Power on the appliance.
  6. Open the appliance console and log in with the "admin"/"admin" user name and password.
  7. [Optional] Change the password.
  8. [Optional] Change the network settings if needed. Define which interface will be used as the WAN for Internet connection.
  9. Register the appliance in the Cyber Protection service by using the credentials of the company administrator.

    These credentials are only used once to retrieve the certificate. The data center URL is predefined.

    If two-factor authentication is configured for your account, you will also be prompted to enter the TOTP code. If two-factor authentication is enabled but not configured for your account, you cannot register the VPN appliance. First, you must go to the service console login page and complete the two-factor authentication configuration for your account. For more details on two-factor authentication, go to the Management Portal Administrator's Guide.

Once the configuration is complete, the appliance will have the Online status. The appliance connects to the VPN gateway and starts to report information about networks from all active interfaces to the Cyber Disaster Recovery Cloud service. The service console shows the interfaces, based on the information from the VPN appliance.