Creating Site-to-Site VPN

Prev Next

What is Graphiant’s Site-to-Site VPN?

Graphiant’s site-to-site VPN creates encrypted and authenticated communication via a secure IPsec tunnel over the internet to connect two or more separate networks (or "sites"). This allows devices at one site to securely communicate with devices at the other site as if they were on the same local network.

If you are connected to the Graphiant Core, and your remote site connects via Graphiant’s IPsec service, you can quickly and effectively extend your private, policy-based network fabric (via Graphiant) to reach locations that don’t directly peer with the Graphiant Core — like remote offices or partner networks — using a standard site-to-site IPsec tunnel.

Step 1: Creating a VPN Profile

A VPN Profile contains all of the detailed information regarding the encryption for your site-to-site communication.

Graphiant provides you with a default VPN profile, but you also have the ability to configure and specify different VPN profiles that best suit your needs.

Creating a new VPN Profile is optional:

If left unspecified, the VPN Profile will use the default values.

To view the default or create a new VPN Profile,  from the Portal home page, navigate to System Objects by one of the following:

  • Locate the "Configurations" section within the top left of the screen;  select 'Create System Object'.

OR

  • Click 'Configure' in the sidebar;  select 'System Objects'.

Dashboard interface showing configuration options and system usage statistics for Graphiant.

Select ‘3rd Party IPsec’;  click ‘VPN Profile’.

Configuration settings for IPFIX collectors and VPN profiles in the system interface.

To View the Default VPN

To view the information of the default VPN, click it’s link.

VPN Profiles section showing the Default VPN Profile and its details.

Here you will see the options set for the Graphiant default VPN profile.

Configuration settings for a Default VPN Profile including encryption and integrity options.

Note:

The default VPN cannot be edited nor deleted.

VPN Profile Fields

The configuration fields for the VPN profile are defined as follows:

IKE (Internet Key Exchange) Settings

  • Encryption Algorithm: The algorithm used to encrypt messages for key exchange security

  • Diffie-Hellman Group: The mathematical parameters used for securely exchanging cryptographic keys

  • Integrity:  The hash algorithm used to verify that data hasn’t been altered during IKE

  • Reauthentication Interval : How often the IKE session should be reestablished to maintain security

IPsec Settings (Phase 2)

  • Encryption Algorithm: The cipher used to encrypt VPN traffic (data packets) during IPsec tunnel operation

  • Perfect Forward Secrecy: Enforces additional key exchange for each session, ensuring that compromise of one session doesn’t affect others

  • Integrity: The algorithm for verifying the integrity of encrypted data packets during IPsec transmission

  • Rekey Interval: How frequently new IPsec keys are generated to maintain secure communication

  • Replay Window: How many packets the system will accept out of order, helping to prevent replay attacks while allowing minor reordering

  • Extended Sequence Number: Enables 64-bit sequence numbers instead of 32-bit, to prevent rollover in long-lived IPsec sessions

Dead Peer Detection (DPD)

  • DPD Interval: How often the system checks that the remote VPN peer is still reachable

To Create a Custom VPN Profile

Should you desire to create your own VPN Profile, from the System Objects VPN Profiles table click ‘Create VPN Profile’ at the top right.

User interface displaying VPN profiles with an option to create a new profile.

Fill out the fields as described above here.

Click ‘Create’.

VPN profile configuration settings including encryption algorithms and integrity options.

You will see a green banner at the top right stating that the VPN Profile has been successfully created, and the profile will now appear in the table.

Successfully created a VPN profile, displaying VPN profiles and their details.

You are now ready to configure site-to-site VPN.

Viewing VPN Profile Associations

If you would like to see the VPNs using any given Profile, that is shown in the VPN Profile table in the “IPsec VPNs” column.

The value there represents the number of VPN that are utilizing that Profile.

List of VPN profiles with corresponding IPsec VPN counts displayed in a table format.

To view the associated VPNs that are using that Profile, click the number value for that Profile.

List of VPN profiles with item counts and options for management.

This will open a. modal that shows the name and type of every VPN utilizing that Profile.

To see details on any of these VPNs, click anywhere in the “Name” field of the desired VPN.

List of VPN profiles with one highlighted entry for Venu's Macbook.

You will be directed to the details of that VPN configuration.

Site to Site VPN configuration showing IP addresses and preshared keys for tunnels.

Editing a VPN Profile

To make changes to your VPM profile, from the VPN Profiles table, locate the VPN profile to be edited.

Click the ellipses;  select ‘Configure’.

VPN Profiles section displaying configuration options and available profiles for management.

Change the desired values;  click ‘Save & Apply’.

When editing a VPN Profile:

  • Any changed field will be highlighted in yellow prior to saving

  • Only the name is not editable;  should you need to use the same values for another VPN Profile name, follow the instructions for duplicating a VPN profile.

Configuration settings for Documentation VPN, highlighting Diffie-Hellman Group and Save option.

A green banner will appear stating that the edit was successful.

Successfully edited VPN profile displayed in the system services interface.

Duplicating a VPN Profile

To duplicate your VPM profile, from the VPN Profiles table, locate the VPN profile to be edited.

Click the ellipses;  select ‘Duplicate’.

VPN Profiles section displaying options to duplicate or delete profiles in a system interface.

The new name will be automatically be labeled “[Original name]-copy”;  enter a new name if desired.

Any field here can also be edited.

Once you have the profile the way you would like it, click ‘Create’.

VPN profile configuration screen highlighting the name field for documentation purposes.

A green banner will appear stating that the duplicated VPN Profile has been successfully created, and the new profile will appear in the table.

Successfully created VPN profile displayed in the system objects interface with highlighted elements.

Deleting a VPN Profile

To delete your VPM profile, from the VPN Profiles table, locate the VPN profile to be deleted.

Click the ellipses;  select ‘Delete’.

Graphiant system interface displaying VPN profiles with delete option highlighted.

A modal will appear to confirm that you are sure you want to delete this system object VPN profile.

Click ‘Confirm’.

Confirmation dialog asking to delete an object with cancel and confirm options.

That VPN profile will be deleted and no longer appear in the table.

VPN Profiles section displaying three items with options to manage them.

Step 2: Configure Site-to-Site VPN

There are two methods of configuring Site-to-Site VPN:

  • Via the Graphiant Gateway service

    • For a VPN tunnel between a 3rd party router/firewall and the Gateway to the Graphiant Core

  • Locally on your Graphiant Edge

    • For a VPN tunnel between a 3rd party router/firewall and your Graphiant Edge

Configuring Site-to-Site VPN via the Graphiant Gateway Service

This will create a VPN between a 3rd party router or firewall and the Gateway to the Graphiant Core.

Locating Gateway Service in the Graphiant Portal

From the Home screen, navigate to the “Create Gateway Services” screen by one of the following options:

**Option A:  Reaching the Gateway Service via Quickstart

Locate the "Quickstart" section on the left of the screen;  select 'Setup Gateway Service'.

Dashboard overview showing services and usage statistics for the Graphiant platform.

This will take you to the Gateway Services page of the Graphiant Portal.

Interface for creating a gateway service with region selection options displayed.

Follow the instructions here to configure your Site-to-Site VPN.

**Option B:  Reaching the Gateway Service via the Sidebar Menu

Click 'Services' in the sidebar;  select 'Gateway’.

Dashboard overview showing services, billing, and quickstart options for user management.

This will take you to the Gateway Services page of the Graphiant Portal where you will be able to view existing Gateway services as well as provision new ones.

To configure the Site-to-Site VPN, click the 'Create New' button.

Note:

To view an existing gateway service, simply click on the ellipses to the right of that service in the table.

Gateway services interface displaying network connection options and a 'Create New' button.

This will take you to the Gateway Services page of the Graphiant Portal.

Follow these instructions to configure your Site-to-Site VPN.

Interface for creating a gateway service with region selection options displayed.

Select the Graphiant region that is closest to the VPN’s origination location.

This opens the Gateway Service screen.

Under “Connectivity”, click ‘Site to Site VPN”.

Creating a gateway service with options for various cloud providers and VPN connectivity.

This opens the configuration page for the Site-to-Site VPN.

There are 3 categories to configure:

Configuration page for Site to Site VPN Gateway Service with input fields and options.

General:

Fill out these required fields:

  • Name:  The name for this particular VPN

  • LAN Segment:  The Graphiant LAN Segment that your 3rd party device will connect to

  • Primary Destination IP Address:  Public IP address of the 3rd party device with which you will connect to the Graphiant core

Ensure that:

Your destination IP address are unique for every site-to-site VPN.

Configuration settings for VPN Gateway Service including name, LAN segment, and IP address.

Routing:

In the routing section, you have a choice of Static or BGP routes.

Note:

This section is completely optional if you are using a Static route without a return route to your Graphiant LAN network.  Should you need a return route or wish to choose BGP routes, expand the section and complete as desired.

Static Routes

The default Routing Type is “Static”.

For Static routes:

Although it’s not required to include a return route to your Graphiant LAN network, if you need such a route, be sure to include one under ‘Subnet’.

  • Subnet:  Enter the remote subnet(s) that your devices on the prior selected Graphiant LAN Segment will need to reach via the VPN

Static routing configuration showing subnet 192.168.1.0/24 for network settings.

BGP Routes

Should you choose to utilize BGP routes for your VPN connection, the “Routing” section will expand to include the fields shown below.

Click the toggle to turn on ‘BGP’.

Enter the AS Number from the 3rd party device’s BGP setting.

The remaining fields are optional, and if left blank will be populated with default values.

  • Hold Timer:  The period of time to wait for messages from the BGP neighbor before considering that neighbor unreachable;  default is 90 seconds.

  • Keep Alive Timer:  The interval at which messages to the neighbor are sent to maintain the BGP session and check that the neighbor is reachable.

  • MD5 Password:  The shared password for authentication between the BGP neighbors.

  • Send Community:  Specifies that the router should support sending BGP communities to that neighbor.  Sending Communities is 'Off' by default.

  • Inbound Filters:  Control what routes you accept from a neighbor

  • Outbound Filters:  Control what routes you advertise to a neighbor

BGP routing configuration with remote AS number and filter options displayed.

Advanced Settings:

Note:

This section is completely optional, to be used if you would like to specify more detailed information for your VPN.

The fields are as follows, and if left blank will be populated with default values.

  • TCP MSS:  Maximum TCP segment size allowed through the VPN to prevent fragmentation

  • IP MTU:  Largest IP packet size (including headers) that can be transmitted without fragmentation

  • ID Remote End Point:  Identifier for the remote VPN device used during IKE authentication

  • IKE Initiation Mode:  Determines whether this gateway starts the VPN negotiation (Initiator) or waits for the remote side (Responder)

  • ID Local End Point:  Identifier for the local VPN device used in IKE authentication

  • Inside Subnets:  The internal network behind this VPN endpoint that should be reachable over the tunnel

  • Preshared Key:  Shared secret used to authenticate both ends of the VPN tunnel

  • System VPN Profile:  The VPN Profile that best matches your encryption needs.

Note:

The System VPN Profile will be prefilled with the default profile, but you can also:

  • Select any profile you have created by using the drop-down menu.

  • Create a new profile by clicking ‘Create New +’.  This will open a modal to configure a new VPN profile.  For more information regarding creating VPN Profiles, click here.

After all sections are filled out to your specifications, click ‘Next’ in the bottom right.

Form for creating a gateway service with advanced VPN settings and profile details.

A summary page will appear, where you can confirm all of your selections for your VPN.

Take Note:

All of the information you will need to configure the remote end will be here.

You can download a copy of this configuration by following these instructions.

Once you have ensured that everything is correct, click ‘Confirm’ at the bottom right.

Configuration settings for Site to Site VPN Gateway Service with routing details and profiles.

You will be brought to the Audit Trail page.

Click ‘Gateway’ in the sidebar to return to the Gateway Services table.

Audit trail showing user logout actions and their completion status in the system.

Click the ‘Connectivity’ tab.

Gateway Services interface displaying connectivity options and network connection details.

The new VPN is now listed in the Gateway Services table, as “Requested”.

The VPN will be live within 24 hours (next business day).

Overview of Gateway Services with requested Documentation VPN Gateway Service details displayed.

Downloading the Gateway VPN Configuration

To have the configuration information available to send to your remote site, you can download the configuration once the VPN has been provisioned.

To download the configuration of a VPN, navigate to the Gateway Services table “Connectivity” tab.

Click the ellipses to the right of that VPN;  select ‘View Status’.

Gateway services table showing connectivity status and options for each service.

This will bring up the configuration information for that VPN.

Click ‘Download’.

Site to Site VPN configuration showing IP addresses and download option.

You will now have the information in a txt file to share with your remote site.

Monitoring Your Gateway Site-to-Site VPN

To monitor a site-to-site VPN, navigate to the Gateway Services table “Connectivity” tab.

Click the ellipses to the right of that VPN;  select ‘Monitor’.

Gateway services overview showing connectivity status and monitoring options for VPNs.

Here you can monitor every aspect of your site-to-site VPN.

Overview of tunnel monitoring between service and customer with connection status.

Editing a Gateway VPN

To edit a site-to-site VPN, navigate to the Gateway Services table “Connectivity” tab.

Click the ellipses to the right of that VPN;  select ‘Configure’.

Note:

Even though you are selecting ‘Configure’, the VPN will only be able to be accessed and edited;  to configure a new VPN follow the instructions here.

Gateway services table showing connectivity status and configuration options for various services.

You will be brought to the edit area of the  VPN.

All fields are editable EXCEPT:

  • LAN Segment:  

  • Preshared Key:

    • To change the preshared key you will need to click ‘Use New Key’.      Advanced settings for network configuration, including tunnels and IP subnets.

      You can then either enter a key, or autogenerate one;   click ‘Save’.

      Interface for creating a new shared key with options to save or auto-generate.

Make any edits needed;  the fields changed will be highlighted in yellow.

Click ‘Apply’.

Configuration settings for Site to Site VPN Gateway Service with highlighted apply button.

You will receive a green banner stating that the gateway configuration has been successfully updated.

Configuration settings for Site to Site VPN Gateway Service with updated status.

Deleting a Gateway VPN

To delete a site-to-site VPN, navigate to the Gateway Services table “Connectivity” tab.

Click the ellipses to the right of that VPN;  select ‘Delete’.

Gateway services overview showing connectivity status and options for managing services.

A modal will appear to confirm that you wish to permanently delete the site-to-site VPN.

Warning:

This action cannot be reversed.

If you are sure that you want to delete the site-to-site VPN, click ‘Confirm’.

Confirmation modal for deleting the gateway service with options to confirm or cancel.

The site-to-site VPN will be deleted, and no longer appear in the Gateway Services table.

Configuring a Site-to-Site VPN Locally on Your Graphiant Edge

This will create a VPN between a 3rd party router or firewall and your Graphiant Edge.

Locating Site-to-Site VPN on Your Graphiant Edge

From the Home screen, navigate to the Edge Configuration screen by one of the following:

  • Locate the "Configurations" section within the “Quickstart” area of the screen;  select ‘Configure Edges’.

or

  • Click 'Configure' in the sidebar;  select 'Devices'.

This will take you to the ‘Configuration’ page of the Graphiant Portal where you can view all Active, Staged, and Deactivated Edges. From here you can select among the Active Edges which Edge(s) you would like to be configured with Site-to-Site VPN.

On the right hand side, select and click ‘Configure’ in tandem with the Edge you wish to manage.

Configuration page displaying active edges and device details for network management.


Under “System”, click ‘Configure Services’;  select ‘Edge Services’.

Configuration settings for Graphiant-Edge, including host name and location details.

Select the ‘Site to Site VPN’ tab.

Configuration settings for Edge Services, highlighting Site to Site VPN option.

This will take you to the landing page for any site-to-site VPNs that are local to your Graphiant Edge, along with the capability to create new ones.

Site to Site VPN configuration page with options for local setup and services.

Click ‘Create’ to create a new site-to-site VPN.

Site to Site VPN configuration page with a prompt to create a new configuration.

This opens the configuration page for the Site-to-Site VPN.

Configuration settings for Site to Site VPN with IPsec options and fields.

You are now ready to create a site-to-site VPN on your Graphiant Edge.

There are 3 categories to configure:

  • General

  • Routing

  • Advanced Settings

Configuration settings for Site to Site VPN with IPsec options displayed.

General:

Fill out the followiing fields:

  • Name:  The name for this particular VPN

  • LAN Segment:  The Graphiant LAN Segment that your 3rd party device will connect to

  • WAN Circuit:  The WAN Circuit on which to terminate the incoming VPN connection

  • Primary Destination IP Address:  Public IP address of the 3rd party device with which you will connect to the Graphiant core

  • Label (optional):  An identifier so that you can quickly recognize which of your site-to-site VPNs are associated with the same tunnel

Ensure that:

Your destination IP address are unique for every site-to-site VPN.

Configuration settings for a VPN including name, LAN segment, WAN circuit, and IP address.

Routing:

In the routing section, you have a choice of Static or BGP routes.

Note:

This section is completely optional if you are using a Static route without a return route to your Graphiant LAN network.  Should you need a return route or wish to choose BGP routes, expand the section and complete as desired.

Static Routes

The default Routing Type is “Static”.

For Static routes:

Although it’s not required to include a return route to your Graphiant LAN network, if you need such a route, be sure to include one under ‘Subnet’.

  • Subnet:  Enter the remote subnet(s) that your devices on the prior selected Graphiant LAN Segment will need to reach via the VPN

Static routing configuration showing subnet 192.168.1.0/24 for network settings.

BGP Routes

Should you choose to utilize BGP routes for your VPN connection, the “Routing” section will expand to include the fields shown below.

Click the toggle to turn on ‘BGP’.

Enter the AS Number from the 3rd party device’s BGP setting.

The AS Number is the only required field for BGP.

The remaining fields are optional, and if left blank will be populated with default values:

  • Hold Timer: The period of time to wait for messages from the BGP neighbor before considering that neighbor unreachable;  default is 90 seconds.

  • Keep Alive Timer: The interval at which messages to the neighbor are sent to maintain the BGP session and check that the neighbor is reachable.

  • MD5 Password:  The shared password for authentication between the BGP neighbors.

  • Send Community:  Specifies that the router should support sending BGP communities to that neighbor.  Sending Communities is 'Off' by default.

  • Inbound Filters:  Control what routes you accept from a neighbor

  • Outbound Filters:  Control what routes you advertise to a neighbor

BGP routing configuration with remote AS number and filter options displayed.

Advanced Settings

These fields are required:

  • Inside Address and Subnets (IPv4 or IPv6):  The inside tunnel address assigned to your local VPN device

  • Remote Address and Subnets (IPv4 or IPv6):  The inside tunnel address assigned to the remote VPN device

    Caution:

    The Inside and Remote addresses must be on the same subnet.

  • Preshared Key:  Shared secret used to authenticate both ends of the VPN tunnel

The optional fields are as follows, and if left blank will be populated with default values:

  • TCP MSS:  Maximum TCP segment size allowed through the VPN to prevent fragmentation

  • IP MTU:  Largest IP packet size (including headers) that can be transmitted without fragmentation

  • IKE Remote ID:  Your device’s identity in the IKE negotiation

  • IKE Initiation Mode:  Determines whether this gateway starts the VPN negotiation (Initiator) or waits for the remote side (Responder)

  • IKE Local ID:  The identity of the peer device

  • System VPN Profile:  The VPN Profile that best matches your encryption needs.

Note:

The System VPN Profile will be prefilled with the default profile, but you can also:

  • Select any profile you have created by using the drop-down menu.

  • Create a new profile by clicking ‘Create New +’.  This will open a modal to configure a new VPN profile.  For more information regarding creating VPN Profiles, click here.

VPN settings showing IP addresses, encryption algorithms, and preshared key details.

After all sections are filled out to your specifications, click ‘Review’ at the top right.

Configuration settings for Site to Site VPN including routing and advanced settings.

This will open a screen where you can review and verify your configuration by clicking on the caret next to “IPSEC”.

If desired, you can label the details of this configuration by entering the Version Name and a Description.

Configuration changes warning for live network with version details and IPSEC option.

A summary page will appear, where you can confirm all of your selections for your VPN.

Take Note:

All of the information you will need to configure the remote end will be here to share with your remote site.

Once you have ensured that everything is correct, click ‘Apply’ at the top right.

Configuration settings for IPsec tunnels including host address and BGP settings.

You will be taken to the screen where you can see that the configuration was applied as the most recent change.

Click ‘Edge Services’ to return to the site-to-site VPN.

Configuration details for Edge Services, including version history and current state information.

The newly created VPN will be visible here.

Configuration settings for Site to Site VPN with IPsec details and options.

Monitoring Your Site-to-Site VPN on Your Graphiant Edge

To monitor a site-to-site VPN, from the Edge configuration screen, click ‘Switch to Monitoring’.

Configuration settings for Site to Site VPN with IPsec details displayed.

Select the ‘Network’ tab.

Network dashboard displaying device health and connectivity status for edge-1-se-58712.

From this landing page you can also go into the Summary and Statistics areas and monitor every aspect of your site-to-site VPN.

IPsec statistics dashboard showing transmit and receive data over time.

Editing a Local VPN on Your Graphiant Edge

To edit a site-to-site VPN, navigate to the Site to Site VPN configuration page as shown here.

Simply change any field(s) desired.

All fields are editable EXCEPT:

  • Name

  • LAN Segment  

    To assign either a new Name or LAN Segment:

    • Click ‘Duplicate’ at the bottom right.  This will create an exact copy of the VPN where you can select a new name, as well as edit any other fields.  

    • Follow the same ‘Review’ and ‘Apply’ procedure once all fields are as needed.

Make any edits needed;  the fields changed will be highlighted in yellow.

Click ‘Review’.

Configuration settings for IPsec VPN, including routing and advanced settings details.

If desired, you can label the details of this configuration by entering the Version Name and a Description.

Click ‘Apply’ to update the configuration.

Warning:

This action cannot be reversed.

Configuration changes warning for live network with version details and apply button.

Your Site-to-Site VPN has been successfully updated.

Deleting a Local VPN on Your Graphiant Edge

To delete a site-to-site VPN, navigate to the Site to Site VPN configuration page as shown here.

Click ‘Remove’ at the bottom left of that VPN.

Configuration settings for Site to Site VPN with options for IPsec and routing.

The VPN will no longer appear as a configuration on this page;  click ‘Review’.

Configuration interface for Site to Site VPN with options for local setup.

If desired, you can label the details of this change by entering the Version Name and a Description.

Click ‘Apply’ to delete the configuration.

Configuration changes warning for live network with version details and apply button.

The site-to-site VPN will be deleted.