AWS VPC: VPN configuration example
This page provides more specific values for configuring a VPN connection between Kyndryl Cloud Uplift and an AWS VPC. It contains sample VPN configuration parameters to enter on the Kyndryl Cloud Uplift VPN page, as well as the configuration values to enter in your AWS account.
For general information about the configuration process for each side of the VPN connection, first see:
Contents
Sample VPN configuration
In your AWS account:
-
Follow the instructions at Setting Up an AWS VPN Connection.
-
Use the following values for the Customer Gateway,
- Routing: Static
- IP address: Enter the static public IP address that is (or will be) associated with your Kyndryl Cloud Uplift VPN. This is either automatically assigned when you click Create VPN in Kyndryl Cloud Uplift, or you can manually select from the available static public IP addresses in your Kyndryl Cloud Uplift account.
-
Use the following values for the VPN connection:
- Routing option: Static
- Static IP prefixes: Enter the subnet range for the IP addresses you want to access in your Kyndryl Cloud Uplift account. This value must match the Kyndryl Cloud Uplift subnet range defined in your Kyndryl Cloud Uplift VPN configuration.
-
- Download the VPN configuration file. This contains the pre-shared key you’ll need to enter in the Kyndryl Cloud Uplift VPN configuration page.
- Note the Outside IP Address from the Tunnel Details tab for the VPN connection. This is the Remote Peer IP value for the Kyndryl Cloud Uplift VPN configuration.
-
Edit your Route Tables and Security Groups to allow traffic from the VPN connection you set up. For example:
-
Create a Route and set the following values:
- Destination: One of the Kyndryl Cloud Uplift subnet ranges defined in the VPN Static IP prefixes field of the VPN connection.
- Target: The AWS Virtual Private Gateway you created earlier.
-
Create a Security Group and allows incoming traffic over all ports for IP addresses in the Kyndryl Cloud Uplift subnet ranges.
Traffic can't flow through the VPN unless it's explicitly allowed.
-
Kyndryl Cloud Uplift VPN configuration
Parameters to enter on your Kyndryl Cloud Uplift VPN page:
| Parameter Name | Value to enter |
|---|---|
| Name | Name for your Kyndryl Cloud Uplift VPN Example: aws-us-east-1-vpn |
| Remote Peer IP | Enter the Outside IP Address from the Tunnel Details tab of the AWS VPN connection. |
| Region | N/A. This is automatically populated when you select a public IP address for the Kyndryl Cloud Uplift peer IP field (see below). Example: US-East-2 |
| Kyndryl Cloud Uplift peer IP | An available public IP address in your Kyndryl Cloud Uplift account in the same region as the VMs you want to connect to. Example: 199.199.199.199This value is entered in the IP address field of the Remote Gateway in your AWS account. |
| Kyndryl Cloud Uplift subnet | The range of VM IP addresses in Kyndryl Cloud Uplift that sends and receives traffic through this VPN. This can’t overlap with the included remote subnets defined below and must match the value in the Static IP prefixes field of the AWS VPN connection. You can specify the default route (0.0.0.0/0) for either the remote subnet or the local subnet. You can’t use 0.0.0.0/0 for both local and remote subnets. |
| Apply NAT for Connected Networks | Either YES or NO, depending on your configuration and needs.See Editing the network NAT subnet for details about configuring NAT subnets. |
| Topology | Route-based |
| Phase 1 Encryption Algorithm | aes 256 |
| Phase 1 Hash Algorithm | sha1 |
| Phase 1 pre-shared Key | [SHARED SECRET KEY]This must match the pre-shared key in the VPN configuration file you downloaded from AWS. |
| Phase 1 SA lifetime | 28800 |
| Phase 1 DH group | modp1536 |
| Phase 2 encryption algorithm | aes 256 |
| Phase 2 authentication algorithm | hmac_sha1 |
| Phase 2 perfect forward secrecy (PFS) | YES |
| Phase 2 PFS group | modp1536 |
| Phase 2 SA lifetime | 3600 |
| SA policy level | require |
| Specify maximum segment size | YES |
| Maximum segment size | 1379 |
| Dead peer detection | ON |
| Included remote subnets | Enter the IP addresses and subnets on your AWS VPC that will send and receive traffic through this VPN. Example: 10.1.15.0/24The subnets should be based on the traffic allowed by your AWS Route Tables and Security Groups. You can specify the default route (0.0.0.0/0) for either the remote subnet or the local subnet. You can’t use 0.0.0.0/0 for both local and remote subnets. |
| Excluded remote subnets | Subset of IP addresses and subnets on the AWS VPC that should be excluded from using the VPN tunnel. This is used only to define exclusions for VPN traffic from larger included remote subnets (defined above). Example: 10.1.15.17/32 |