Skip to content

Commit e2631c3

Browse files
authored
Merge pull request #95452 from sharaths-cs/sharaths
Added missing article to TOC
2 parents ddbbb56 + dcb5b16 commit e2631c3

File tree

2 files changed

+9
-30
lines changed

2 files changed

+9
-30
lines changed

articles/vmware-cloudsimple/high-availability-vpn-connection.md

Lines changed: 7 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -16,38 +16,15 @@ Network administrators can configure a high availability IPsec Site-to-Site VPN
1616

1717
This guide presents steps to configure an on-premises firewall for an IPsec Site-to-Site VPN high availability connection. The detailed steps are specific to the type of on-premises firewall. As examples, this guide presents steps for two types of firewalls: Cisco ASA and Palo Alto Networks.
1818

19-
## Default configuration for CloudSimple VPN gateways
20-
21-
By default, CloudSimple VPN gateways are configured in IKEv1 mode along with the following Phase 1 and Phase 2 attributes. If you want to use different VPN attributes or use IKEv2 instead of IKEV1, <a href="https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest" target="_blank">open a support request</a>.
22-
23-
### Phase 1
24-
25-
| Parameter | Value |
26-
|-----------|-------|
27-
| IKE Version | IKEv1 |
28-
| Encryption | AES 256 |
29-
| Hash Algorithm| SHA 256 |
30-
| Diffie Hellman Group (DH Group) | 1 |
31-
| Life Time | 86,400 seconds |
32-
| Data Size | 4 GB |
33-
34-
### Phase 2
35-
36-
| Parameter | Value |
37-
|-----------|-------|
38-
| Encryption | AES 256 |
39-
| Hash Algorithm| SHA 256 |
40-
| Perfect Forward Secrecy Group (PFS Group) | None |
41-
| Life Time | 28,800 seconds |
42-
| Data Size | 4 GB |
43-
4419
## Before you begin
4520

4621
Complete the following tasks before you configure the on-premises firewall.
4722

4823
1. Verify that your organization has [provisioned](create-nodes.md) the required nodes and created at least one CloudSimple Private Cloud.
4924
2. [Configure a Site-to-Site VPN gateway](vpn-gateway.md#set-up-a-site-to-site-vpn-gateway) between your on-premises network and your CloudSimple Private Cloud.
5025

26+
See [VPN gateways overview](cloudsimple-vpn-gateways.md) for supported phase 1 and phase 2 proposals.
27+
5128
## Configure on-premises Cisco ASA firewall
5229

5330
The instructions in this section apply to Cisco ASA version 8.4 and later. In the configuration example, Cisco Adaptive Security Appliance Software Version 9.10 is deployed and configured in IKEv1 mode.
@@ -115,7 +92,7 @@ access-list ipsec-acl extended permit ip object AZ_inside object CS_inside
11592

11693
### 5. Configure the transform set
11794

118-
Configure the transform set (TS), which must involve the keyword ```ikev1```. The encryption and hash attributes specified in the TS must match with the parameters listed in [Default configuration for CloudSimple VPN gateways](#default-configuration-for-cloudsimple-vpn-gateways).
95+
Configure the transform set (TS), which must involve the keyword ```ikev1```. The encryption and hash attributes specified in the TS must match with the parameters listed in [Default configuration for CloudSimple VPN gateways](cloudsimple-vpn-gateways.md).
11996

12097
```
12198
crypto ipsec ikev1 transform-set devtest39 esp-aes-256 esp-sha-hmac
@@ -180,12 +157,12 @@ Because this configuration is for a high availability VPN, two tunnel interfaces
180157

181158
### 2. Set up static routes for Private Cloud subnets to be reached over the Site-to-Site VPN
182159

183-
Routes are necessary for the on-premise subnets to reach CloudSimple private cloud subnets.
160+
Routes are necessary for the on-premises subnets to reach CloudSimple private cloud subnets.
184161

185162
Select **Network** > **Virtual Routers** > *default* > **Static Routes** > **Add**, configure the following fields, and click **OK**.
186163

187164
* Name. Enter any name for easy identification of the purpose of the route.
188-
* Destination. Specify the CloudSimple private cloud subnets to be reached over S2S tunnel interfaces from on-premise
165+
* Destination. Specify the CloudSimple private cloud subnets to be reached over S2S tunnel interfaces from on-premises
189166
* Interface. Select the primary tunnel interface created in step-1(Section-2) from the dropdown. In this example, it is tunnel.20.
190167
* Next Hop. Select **None**.
191168
* Admin Distance. Leave default.
@@ -309,13 +286,13 @@ Configuring IPsec Site-to-Site VPN on Cisco ASA with version 8.4 and later:
309286

310287
Configuring Cisco Adaptive Security Appliance virtual (ASAv) on Azure:
311288

312-
<a href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/asav/quick-start-book/asav-96-qsg/asav-azure.html" target="_blank">Cisco Adaptive Security Virtual Appliance (ASAv) Quick Start Guide</a>
289+
<a href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/asav/quick-start-book/asav-96-qsg/asav-azure.html" target="_blank">Cisco Adaptive Security Virtual Appliance (ASAv) quickstart Guide</a>
313290

314291
Configuring Site-to-Site VPN with Proxy IDs on Palo Alto:
315292

316293
[Set Up Site-to-Site VPN](https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/vpns/set-up-site-to-site-vpn#)
317294

318-
Setting up up tunnel monitor:
295+
Setting up tunnel monitor:
319296

320297
[Set Up Tunnel Monitoring](https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-admin/vpns/set-up-tunnel-monitoring.html)
321298

articles/vmware-cloudsimple/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -134,6 +134,8 @@
134134
href: azure-expressroute-connection.md
135135
- name: Configure DNS name resolution
136136
href: on-premises-dns-setup.md
137+
- name: Configure highly available Site-to-Site VPN connections
138+
href: high-availability-vpn-connection.md
137139
- name: VMware platform
138140
items:
139141
- name: Learn Private Cloud permission model

0 commit comments

Comments
 (0)