Evaluate OCI VPN Services

Summary

Site-to-site VPN connects on-premises equipment through a CPE and a DRG with tunnels of encrypted traffic passing over the Internet.

Reference

Site-to-Site VPN

Connecting On-Premises to OCI

Public Internet
  • Connectivity over Internet via Internet Gateway or NAT Gateway
  • For apps in development, or in test/pilot phase
Site-to-Site VPN
  • Secure connectivity over Internet through encryption of data, then tunnels it through the public Internet for enhanced security and privacy with an IPSec VPN connection
  • No throughput guarantee
  • OCI-managed service with easy setup on Console with no provider negaitiations or circuits provisioning
  • Free service - no tunnel or egree data transfer charges
  • For site connectivity when geographically isolated from OCI regions or lacks partner connections
  • Industry Standard Security Protocol - IPSec adn IKEv1/IKEv2
  • Hign Availability support
  • Static or BGP routing
  • Route-based or policy-based VPN support
FastConnect
  • Dedicated, secure connectivity
  • Low larency interconnect
  • High Bandwidth - up to 100 Gbps
  • OCI-managed service
  • Competitive pricing
  • For business-critical applications

Site-to-Site VPN: Use Cases

Secure connectivity from on-premises to OCI
Securely connect your existing infrastructure to the cloud
Connect multiple locations to the cloud
Connect your headquarters, branch locations, and private data centers to OCI so all of your offices can access applications directly.
Build redundant connectivity for FastConnect
Already have Oracle FastConnect? Site-to-Site IPSec VPN can provide a redundant connection to Oracle Cloud Infrastructure
Use for Proof of Concept
No contracts or commitment. Build as many VPN tunnels to Oracle Cloud Infrastructure as desired and decide how long you want them active.

Site-to-Site VPN: Redundancy Overview

  • OCI provisions redundant IPSec VPN tunnels located on physically and logically diverse tunnel endpoints in the same region.
  • Routing type can be configured per tunnel. It is higly recommended to use the same routing type for all tunnels.
  • Use routing to configure active/passive or active/active tunnels and failover behaviour
  • By default, redundancy is provided only on the Oracle end. Customers must ensure end-to-end redundancy by configuring redundant tunnels to 1 or more CPEs, and 1 or more Internet providers.

Site-to-Site VPN: Routing Overview

Longest Prefix Match
Adverise more specific routes for the preferred primary tunnel
BGP Local Preference
Configure on CPE to influence traffic egressing on-premises
BGP AS PATH Prepending
Use prepending when advertising routes to OCI to influence which tunnel has the shortest path for any given route. Oracle will use the shortest AS PATH as a tiebreaker when sending traffic to on-premises

Site-to-Site VPN: Negotiation, Behaviour

  • Phase 1: Participants authenticate the IPSec peer and a secure channel to negotiate the IPSec Security Associations (SA). The outcome of a Phase 1 negotiation is the IKE SA (Phase 1 SA)
  • Phase 2: Using keying material derived from the Pahse 1 negotiation, participants negotiate IPSec SAs (Phase 2 SA) which will specify what traffic to send over the VPN and how to encrypt/authenticate the traffic.
  • When traffic is routed to a VPN, a SA lookeup is performed before encrypting traffic.
  • A similar method is performed for an icoming packet.

Policy-Based and Route-BAsed VPNs

  • CPE configuration mechanism. Different with each vendor. Some vendors may support both methods.
  • The main difference is the encryption decision.
  • Policy based
    • A subset of traffic flowing through an interface is encrypted according to a specific policy.
    • A special policy is used to determine whether specific traffic is sent across a VPN tunnel.
    • An IPSec SA is created for each source/destination policy combination. This may also be referred to as an encryption domain.
    • Each encryption domain is treated as a separate tunnel.
    • Example: 1 local subnet, 3 remote subnets = 3 IPSec SAs.
  • Route based
    • Uses a Virtual Tunnel Interface (VTI). Any traffic routed to the VTI is encrypted and sent to the remote VPN peer.
    • Relies on routing decisions to determine if specific is sent across a VPN tunnel.
    • A single IPSec SA is generated for each VPN tunnel.
    • Default VTI encryption domain of any/any, meaning any traffic routed to the VTI is encrypted without an additional policy lookup.