aws 서비스는 여러군대의 resion이 있음.
region간에 가상망 통신에 관련하여서 test한 내용 정리
참조한 링크
https://www.youtube.com/watch?v=lnyT9FnVKcs
ㄴ openswan - openswan multi cross region 연결 관련내용
http://blog.leedoing.com/32
ㄴ openswan - vgw 연결
test 환경
tokyo region (openswan) - singapore region (VGW)
ㅁ tokyo region
ㄴ VPC 생성 (10.71.0.0/16)
ㄴ subnet 생성 (10.71.0.0/24, 10.71.10.0/24)
ㄴ security group은 평범하게 구성해도 이상없음
ㄴ nat instance혹은 nat gateway 구성 (tokyo region은 nat gateway을 지원함으로 nat gateway구성)
ㄴ route table 구성
ㄴㄴ 10.71.0.0/24 -> 기본 VPN route 정책, 0.0.0.0/0 IGW구성
ㄴㄴ 10.71.10.0/24 -> 기본 VPN route 정책 0.0.0.0/0 NAT Gateway추가
ㄴ openswan 설치용 instance 구성
ㄴㄴ 기본 instance(아무거나 괜찬음)
ㄴㄴ EIP (외부 연결용) 할당, 10.71.0.0/24 route table 적용
ㅁ singapore region
ㄴ VPC 생성 (10.61.0.0/16)
ㄴ subnet 생성 (10.61.0.0/24, 10.61.10.0/24)
ㄴ security group은 평범하게 구성해도 이상없음
ㄴ VGW 생성 (10.61.0.0/16 vpc)
ㄴ route table 0.0.0.0/0 IGW, 10.71.0.0/16 VGW 추가
ㄴ VPN connect
ㄴㄴ Virtual Private Gateway -> vgw선택
ㄴㄴ Customer Gateway -> new -> IP Address (tokyo region의 openswan IP
ㄴㄴ Routing Options -> Static
ㄴㄴ Static IP Prefixes -> 10.71.0.0/16
생성후 설정파일 다운로드해서 연결할 터널 IP및 키값 확인
IPSec Tunnel #1
- Pre-Shared Key : XrNEvlQO_UJ_fft5ubrqHa817Z6dwVHI
Outside IP Addresses:
- Customer Gateway : 52.197.5.200
- Virtual Private Gateway : 52.77.123.186
해당 subnet에 테스트용 instance 생성 (ping check)
ㅁ openswan 설치 (tokyo region)
yum update -y && yum install openswan -y
chkconfig ipsec on
vi /etc/sysctl.conf
...
### openswan config
net.ipv4.ip_forward = 1
...
sysctl -p
vim ipsec.conf
leftid=52.197.5.200 -> openswan용 instance pubilc IP
leftsubnet=10.71.0.0/16 -> tokyo VPC 사설망
vi /etc/ipsec.secrets
52.197.5.200 52.77.123.186: PSK "XrNEvlQO_UJ_fft5ubrqHa817Z6dwVHI"
52.197.5.200 -> openswan IP
52.77.123.186 -> VGW 터널 IP
XrNEvlQO_UJ_fft5ubrqHa817Z6dwVHI -> VPN config download 설정파일중 터널 IP에 해당되는 PSK키값
[root@ip-10-71-0-104 ~]# service ipsec restart
ipsec_setup: Stopping Openswan IPsec...
could not open include filename: '/etc/ipsec.d/*.conf' (tried and )
ipsec_setup: Starting Openswan IPsec U2.6.37/K4.4.11-23.53.amzn1.x86_64...
ipsec_setup: could not open include filename: '/etc/ipsec.d/*.conf' (tried and )
ipsec_setup: /usr/libexec/ipsec/addconn Non-fips mode set in /proc/sys/crypto/fips_enabled
[root@ip-10-71-0-104 ~]#
[root@ip-10-71-0-104 ~]# service ipsec status
IPsec running - pluto pid: 28384
pluto pid 28384
1 tunnels up
some eroutes exist
[root@ip-10-71-0-104 ~]#
[root@ip-10-71-0-104 ~]# ping 10.61.10.165
PING 10.61.10.165 (10.61.10.165) 56(84) bytes of data.
64 bytes from 10.61.10.165: icmp_seq=1 ttl=254 time=92.5 ms
64 bytes from 10.61.10.165: icmp_seq=2 ttl=254 time=92.4 ms
^C
--- 10.61.10.165 ping statistics ---
2 packets transmitted, 2 received, 0% packet loss, time 1001ms
rtt min/avg/max/mdev = 92.466/92.529/92.592/0.063 ms
[root@ip-10-71-0-104 ~]#
[root@ip-10-71-0-104 ~]# iptables --table nat --appen POSTROUTING --source 10.61.0.0/16 -j MASQUERADE
[root@ip-10-71-0-104 ~]# iptables -t nat -nvL
Chain PREROUTING (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 MASQUERADE all -- * * 10.61.0.0/16 0.0.0.0/0
[root@ip-10-71-0-104 ~]#
ㅁ singapore region
[root@ip-10-61-10-165 ~]# ping 10.71.0.104
PING 10.71.0.104 (10.71.0.104) 56(84) bytes of data.
64 bytes from 10.71.0.104: icmp_seq=1 ttl=254 time=92.6 ms
64 bytes from 10.71.0.104: icmp_seq=2 ttl=254 time=92.5 ms
64 bytes from 10.71.0.104: icmp_seq=3 ttl=254 time=92.4 ms
^C
--- 10.71.0.104 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2003ms
rtt min/avg/max/mdev = 92.493/92.582/92.674/0.073 ms
[root@ip-10-61-10-165 ~]#
서로 Ping 하는데 이상없음
openswan을 frontend로 설정하고 그 내부에 backend subnet을 구성하여서 테스트를 하려 하였으나, 업무시간에 쫒겨 테스트 하지못함
최종적으로
tokyo (10.71.0.0/24 subnet) - singapore (10.61.10.0/24) 연결 테스트를 이상없이 구현하였음
'AWS > 응용' 카테고리의 다른 글
ELB 를 통한 내부네트워크 EC2 FTP 접속 (0) | 2017.12.12 |
---|---|
ec2 user data tomcat start test (0) | 2017.12.05 |
amazon linux redis install & cluster config (0) | 2017.02.28 |
aws vpc, openstack neutron (0) | 2016.07.18 |