Site-to-site VPN
In order to be able to use NMaaS, a secure site-to-site tunnel connection is required that will be used for all the monitoring traffic between the network management applications deployed on the NMaaS infrastructure and the customer's network devices. As mentioned above, two VPN technologies are currently actively supported for establishing a site-to-site VPN tunnel: OpenVPN and WireGuard. Any one of these can be chosen, depending on the customer's preference or existing networking stack.
No matter the chosen VPN technology, the NMaaS team requires the following information before VPN connectivity can be established:
- a list of subnets in your local network that you would like to be reachable from NMaaS. This is required so that we can configure the necessary routing rules and policies on our side. Most likely this will be your management VLAN(s).
- the public IP of the device that you will use to establish the VPN connection
If WireGuard is the chosen connection method, then information about the public keys will have to be exchanged between the customer and the NMaaS team as well.
Establishing the VPN connection
Once the necessary information has been exchanged, the NMaaS team will provision the necessary VPN and the customer will be sent additional information on how to connect to it. This information will include:
- the VPN tunnel subnet used for interconnecting the customer's site to NMaaS
- the private subnet that has been assigned to the customer and that will be used as an IP pool for every deployed application through NMaaS
- a list of additional auxiliary subnets for which the necessary routing information will have to be added by the customer at their end
If the customer does not have an existing network device that can be used for terminating the VPN connection, then a simple GNU/Linux virtual machine can be deployed, no matter the chosen VPN technology. This virtual machine will act as a VPN client in terms of the site-to-site tunnel , and as a gateway towards the NMaaS infrastructure for all the network devices in the customer's network. The customer must make sure that appropriate routing rules are configured so that traffic destined for the NMaaS subnets goes through the VPN client, and not through the default gateway in this scenario.
Testing the VPN connection
After establishing the VPN connection, the client can perform a simple test to verify that everything is working as expected. The test involves accessing a special IP address on port 80. This special address is customer dependent and will be provided by the NMaaS team during the registration process. Any command line utility that can open TCP sessions on an arbitrary port can be used for this test, depending on the platform that you are testing from.
Note that ICMP and echo requests are not supported on this IP, and ping is not expected to work.