Two types of VPN connections are configured before a user is able to deploy and effectively used NMaaS applications:
Currently, two site-to-site VPN technologies are actively supported: OpenVPN and WireGuard.
For client-access VPN we are using OpenVPN.
To use NMaaS, prospective customers require two VPN connections:
Currently, two site-to-site VPN technologies are actively supported: OpenVPN and WireGuard.
More details are available in the subsections below.
Site-to-site VPNIn order to be able to use NMaaS, a secure site-to-site tunnel connection is required that will be used for all the monitoring traffic between the network management applications deployed on the NMaaS infrastructure and the customer's network devices. As mentioned above, two VPN technologies are currently actively supported for establishing a site-to-site VPN tunnel: OpenVPN and WireGuard. Any one of these can be chosen, depending on the customer's preference or existing networking stack. Required InformationNo matter the chosen VPN technology, the NMaaS team requires the following information before VPN connectivity can be established:
If WireGuard is the chosen connection method, then information about the public keys will have to be exchanged between the customer and the NMaaS team as well. Establishing the VPN connectionOnce the necessary information has been exchanged, the NMaaS team will provision the necessary VPN and the customer will be sent additional information on how to connect to it. This information will include:
If the customer does not have an existing network device that can be used for terminating the VPN connection, then a simple GNU/Linux virtual machine can be deployed, no matter the chosen VPN technology. This virtual machine will act as a VPN client in terms of the site-to-site tunnel , and as a gateway towards the NMaaS infrastructure for all the network devices in the customer's network. The customer must make sure that appropriate routing rules are configured so that traffic destined for the NMaaS subnets goes through the VPN client, and not through the default gateway in this scenario.
Testing the VPN connectionAfter establishing the VPN connection, the client can perform a simple test to verify that everything is working as expected. The test involves accessing a special IP address on port 80. This special address is customer dependent and will be provided by the NMaaS team during the registration process. Any command line utility that can open TCP sessions on an arbitrary port can be used for this test, depending on the platform that you are testing from. Note that ICMP and echo requests are not supported on this IP, and ping is not expected to work. |
Client-access VPNA client-access VPN connection is used for accessing and interacting with the deployed applications within NMaaS. In order to provide greater security and isolation between the customers, by default, all applications deployed by NMaaS are accessible only through the respective client-access profiles, and not publicly. However, the option for publicly exposing a given application is also possible. Currently, the preferred way for establishing the client-access connections is by using an OpenVPN tunnel, since it offers stable packages for all major operating systems. The only information required before the client-access profiles can be generated is a list of individuals, along with their full names and email addresses that should have access to the new NMaaS domain being created. Testing the VPN connectionThe client-access connection can be tested in a similar fashion to the site-to-site connection. The operator, after connecting to the NMaaS VPN server can simply open a browser and type in the IP address provided by the NMaaS team during the registration process. |
Required information for the VPN profilesIn conclusion, accessing NMaaS requires two types of VPN connections: a site-to-site, and a client-access. Before the site-to-site profiles can be created, NMaaS requires the following information:
Before the client-access profile can be created, the following information is needed:
|