SSL VPN

Introduction

VMware NSX-T only supports site-to-site VPN. The SSL VPN-Plus feature that existed in NSX-V will no longer be permittable.

This limitation requires you to choose another solution depending on your requirements for features. Common products used are OpenVPN or Wireguard.

What is a site-to-site VPN?

As an alternative to SSL VPN, VMware NSX-T Data Center supports IPSec VPN and Layer 2 VPN

A site-to-site VPN is a connection between two or more networks using an encrypted tunnel. The primary usage is to connect networks in multiple physical locations where a dedicated, always-on, connection between the locations is required. This is typically set up as a permanent connection between networking equipment.

  • Internet Protocol Security (IPSec) VPN secures traffic flowing between two networks connected over a public network through IPSec gateways called endpoints.

  • With Layer 2 VPN (L2 VPN), you can extend Layer 2 networks across multiple sites on the same broadcast domain


How to install and configure OpenVPN to replace SSL VPN Plus

Prerequisites


Create a new VDC network

It is recommended that you deploy the OpenVPN appliance into a new, dedicated routed VDC network.

This allows you to more tightly control access from VPN clients to the virtual machines in your environment using firewall rules on the edge gateway. However it is possible to deploy the OpenVPN appliance into an existing network/shared with existing virtual machines.

Configuring the edge gateway

You will need to configure the edge gateway to control access to the VMs in your environment by creating:

  • A Source NAT rule to allow the OpenVPN appliance outbound access to the internet.

  • A Destination NAT rule to allow inbound access from the internet.

  • A Firewall Rule to allow inbound access from the internet on port 443

Deploying the OpenVPN appliance

Please note there is a version of the OpenVPN appliance already added to the Marketplace Catalog

To deploy the OpenVPN appliance:

 

You may need to reboot the virtual machine once after deployment for networking changes to effect

Performing initial configuration

To perform initial configuration:

  • Under Compute, Virtual Machines, open the console for your OpenVPN VM

  • Log in to the VM as the root user.

    • To obtain the root password, click Details then select Guest OS Customization and Edit. Make a note of the generated root password

 

  • You'll be prompted to answer:

    • License agreement:

      • Enter yes to accept

    • Will this be the primary Access Server node?

      • Enter yes

    • Please specify the network interface and IP address to be used by the Admin Web UI:

      • This should default to eth0, which should be configured with the IP address you selected/assigned during deployment

    • Please specify the port number for the Admin Web UI:

      • Enter your required port number, or accept the default of 943

    • Please specify the TCP port number for the OpenVPN Daemon:

      • Accept the default of 443

    • Should client traffic be routed by default through VPN?

      • We recommend you answer no to this question. Entering yes will prevent your client device from accessing any other networks while the VPN is connected

    • Should client DNS traffic be routed by default through the VPN?

      • Answer no to this question so your DNS queries are configured against the usual servers

    • Use local authentication via internal DB?

      • Enter yes unless you want to authenticate users from an existing directory service (Active Directory/LDAP)

    • Should private subnets be accessible to clients by default?

      • Answer yes to enable access to your VDC networks via the VPN

    • Do you wish to login to the Admin UI as "openvpn"?

      • Answer yes to create a local user account named openvpn. If you answer no you will need to set up a different account

    • Please specify your OpenVPN-AS license key

      • If you've purchased a license you may enter it now or leave it blank

  • When you've completed the setup wizard you will need to create user accounts and passwords on the local operating system (unless you configured an LDAP directory).

  • If you opted to use the default openvpn account, you'll need to configure its password:

    • #passwd openvpn

Apply updates

apply the latest upgrades to the system.

  • Enter the following:

    • # apt-get update && apt-get upgrade

Configure admin options

To configure admin options:

  • Log on to the admin interface at:

    • https://<ip_address>:943/admin

  • To set the hostname, under Configuration, select Network Settings and then set the Hostname or IP Address to either a public IP address or a fully qualified domain name (FQDN) that your client will be able to resolve

    • Save the settings

  • Under Configuration, select VPN settings

    • in the Routing section, add any additional subnets that your users should have access to. These will usually be the subnets configured in your VDC networks

  • To create new user accounts, go to User Management, select User Permissions.

Logging in as a user

You can download the VPN client software and connection profiles directly from the appliance by logging in with a valid user name and password:

  • https://<ip_address>/

The downloaded client software and profile includes what is required for authentication, including client certificate and connection properties