Create an AWS Site-to-Site VPN attachment for AWS Cloud WAN
You can create an Site-to-Site VPN attachment for AWS Cloud WAN follow the procedure below. For more information about VPN attachments and Cloud WAN, see Site-to-site VPN attachments in AWS Cloud WAN in the AWS Cloud WAN User Guide.
Cloud WAN VPN attachments support both IPv4 or IPv6 protocols. For more information on using either of these protocols for a Cloud WAN VPN attachment, see IPv4 and IPv6 traffic in AWS Site-to-Site VPN.
To create a VPN attachment for AWS Cloud WAN using the console
-
Open the Amazon VPC console at https://console.aws.amazon.com/vpc/
. -
In the navigation pane, choose Site-to-Site VPN connections.
-
Choose Create VPN connection.
-
(Optional) For Name tag, enter a name for the connection. Doing so creates a tag with a key of
Name
and the value that you specify. -
For Target gateway type, choose Not associated.
-
For Customer gateway, do one of the following:
-
To use an existing customer gateway, choose Existing, and then choose the Customer gateway ID.
-
To create a new customer gateway, choose New.
-
For the IP address , enter a static IPv4 or IPv6 address.
-
(Optional) For Certificate ARN, choose the ARN of your private certificate (if using certificate-based authentication).
-
For BGP ASN, enter the Border Gateway Protocol (BGP) Autonomous System Number (ASN) of your customer gateway. For more information, see Customer gateway options.
-
-
For Routing options, choose Dynamic (requires BGP) or Static.
-
For Pre-shared key storage choose either Standard or Secrets Manager. The default selection is Standard. For more information about using AWS Secrets Manager, see Security.
-
For Tunnel inside IP version, choose IPv4 or IPv6.
-
(Optional) For Enable acceleration, choose the check box to enable acceleration. For more information, see Accelerated VPN connections.
If you enable acceleration, we create two accelerators that are used by your VPN connection. Additional charges apply.
-
(Optional) Depending on which tunnel inside IP version you've chosen, do one of the following:
-
IPv4 — For Local IPv4 network CIDR, specify the IPv4 CIDR range on the customer gateway (on-premises) side that is allowed to communicate over the VPN tunnels. For Remote IPv4 network CIDR, choose the CIDR range on the AWS side that is allowed to communicate over VPN tunnels. The default value for both fields is
0.0.0.0/0
. -
IPv6 — For Local IPv6 network CIDR, specify the IPv6 CIDR range on the customer gateway (on-premises) side that is allowed to communicate over the VPN tunnels. For Remote IPv6 network CIDR, choose the CIDR range on the AWS side that is allowed to communicate over VPN tunnels. The default value for both fields is
::/0
-
-
For Outside IP address type, choose one of the following options:
-
Public IPv4 - (Default) Use IPv4 addresses for the outer tunnel IPs.
-
Private IPv4 - Use a private IPv4 address for use within private networks.
-
IPv6 - Use IPv6 addresses for the outer tunnel IPs. This option requires that your customer gateway device supports IPv6 addressing.
Note
If you select IPv6 for the outside IP address type, you must create a customer gateway with an IPv6 address
-
-
(Optional) For Tunnel 1 options, you can specify the following information for each tunnel:
-
A size /30 IPv4 CIDR block from the
169.254.0.0/16
range for the inside tunnel IPv4 addresses. -
If you specified IPv6 for Tunnel inside IP version, a /126 IPv6 CIDR block from the
fd00::/8
range for the inside tunnel IPv6 addresses. -
The IKE pre-shared key (PSK). The following versions are supported: IKEv1 or IKEv2.
-
To edit the advanced options for your tunnel, choose Edit tunnel options. For more information, see VPN tunnel options.
-
(Optional) Choose Enable for the Tunnel activity log to capture log messages for IPsec activity and DPD protocol messages.
-
(Optional) Choose Turn on for Tunnel endpoint lifecycle to control the schedule for endpoint replacements. For more information about tunnel endpoint lifecycle, see Tunnel endpoint lifecycle.
-
-
(Optional) Choose Tunnel 2 options and follow the previous steps to set up a second tunnel.
-
Choose Create VPN connection.
To create a Site-to-Site VPN connection using the command line or API
-
CreateVpnConnection (Amazon EC2 Query API)
-
create-vpn-connection
(AWS CLI) Example for creating a VPN connection with IPv6 outer tunnel IPs and IPv6 inner tunnel IPs:
aws ec2 create-vpn-connection --type ipsec.1 --customer-gateway-id cgw-001122334455aabbc --options OutsideIPAddressType=Ipv6,TunnelInsideIpVersion=pv6,TunnelOptions=[{StartupAction=start},{StartupAction=start}]