Configuring a site-to-site VPN tunnel with Coro Network and AWS

As part of a virtual office, Coro enables customers to configure virtual private networks (VPNs) together with site-to-site tunnels.

This guide describes how to configure a site-to-site VPN tunnel between your Coro virtual office (VO) and Amazon Web Services (AWS). In this setup, AWS hosts the remote virtual private cloud (VPC), and Coro acts as the on-premises VPN gateway through your VO.

Prerequisites

Before you start, make sure you have:

  • Access as an admin user to the Coro console for your workspace.
  • An active subscription (or trial) for the Coro Network module.
  • An active AWS subscription and access to the AWS Management Console.

Configuration steps

To complete this guide, perform each of the following procedures in turn:

  1. Select the VPC .
  2. Create the VPG .
  3. Configure the site-to-site VPN connection .
  4. Configure Coro Network .
  5. Activate the AWS site-to-site VPN tunnel .

Selecting the VPC

To set up a secure site-to-site VPN tunnel between AWS and your Coro VO, you must first select a virtual private cloud (VPC) the AWS Management Console. The VPC acts as your isolated network environment where AWS resources operate. You can use an existing VPC or create a new one if required.

To create the VPC:

  1. Sign in to the AWS Management Console ( https://aws.amazon.com/console/ ).
  2. From the top toolbar, select the region dropdown and choose a region in which to create the virtual network:

    region

    Important

    The AWS region you choose affects the cost of your VPN connection.

    For more information, see AWS VPN pricing (https://aws.amazon.com/vpn/pricing/).

  3. Enter vpc into the search field, and then select VPC from the Services section:

    VPC search

  4. From the left pane, select Your VPCs from the Virtual private cloud section:

    Your VPCs

  5. From the Your VPCs page, select the VPC that you want to use for the site-to-site VPN connection.
    note

    If there are no VPCs listed, you must first create one.

    Important

    Make a note of the:

    • IPv4 CIDR block: You will use this when configuring the Coro Network.
    • VPC ID : You will use this when configuring the site-to-site VPN connection.

    Select VPCs

Creating the VPG

After selecting your VPC, you must create a virtual private gateway (VPG) in the AWS Management Console. This gateway acts as the AWS endpoint for your site-to-site VPN tunnel, enabling encrypted traffic between your AWS VPC and the Coro VO.

To create the VPG:

  1. From the left pane, select Customer gateways from the Virtual private network (VPN) section:

    Customer gateways

  2. Select Create customer gateway :

    Create customer gateways

    AWS displays the Create customer gateway page:

    Create customer gateway page

    Important

    The customer gateway defines the on-premises (Coro) side of the VPN tunnel. You will use it when configuring the site-to-site VPN connection.

  3. Enter the following details:

    • Name tag : (Optional) Enter a suitable name.
    • BGP ASN : Leave as 65000 .
    • IP address : Enter your Coro public IP address.

      To retrieve your Coro public IP address:

      1. Sign in to the Coro console .
      2. From the sidebar, select Control Panel to access the Control Panel .
      3. Select Network :

        Network

      4. Make a note of the Coro public IP address that displays on the Virtual Office tab:

        Public IP

    • Certificate ARN : (Optional) Leave blank.
    • Device : (Optional) Leave blank.
    note

    Leave the Tags section empty.

  4. Select Create customer gateway :

    Create customer gateway select

    AWS adds the customer gateway to the list.

  5. From the left pane, select Virtual private gateways from the Virtual private network (VPN) section:

    Virtual private gateways

  6. Select Create virtual private gateway :

    Create virtual private gateway

    AWS displays the Create virtual private gateway page:

    Create customer gateway page

  7. Enter the following details:

    • Name tag : (Optional) Enter a suitable name.
    • Autonomous System Number (ASN) : Leave as Amazon default ASN .
    note

    Leave the Tags section empty.

  8. Select Create virtual private gateway :

    Create virtual private gateway select

    AWS creates the VPG.

  9. From the Virtual private gateways list, select the new VPG, and then select Actions > Attach to VPC :

    Attach to VPC

    AWS displays the Attach to VPC page:

    Attach to VPC page

  10. Select a VPC from the Available VPCs dropdown, and then select Attach to VPC :

    Attach to VPC select

    note

    AWS might take a few minutes to attach the gateway to the VPC.

    After AWS completes the process, the VPC attachment state column displays Attached:

    VPC attached

Configuring the site-to-site VPN connection

After you create the VPC and VPG, configure the site-to-site VPN connection as follows:

  1. From the left pane, select Site-to-Site VPN connections from the Virtual private network (VPN) section:

    Site-to-Site VPN connections

  2. Select Create VPN connection :

    Create VPN connection

    AWS displays the Create VPN connection page:

    Create VPN connection page

  3. Enter the following details:
    • Name tag : (Optional) Enter a suitable name.
    • Target gateway type : Leave as Virtual private gateway .
    • Virtual private gateway : Select your virtual private gateway .
    • Customer gateway : Leave as Existing .
    • Customer gateway ID : Select your customer gateway .
    • Routing options : Select Static .
    • Static IP prefixes : Enter 10.8.0.0/16 , 10.9.0.0/16 , and 10.10.0.0/16 .
    • Pre-shared key storage : Leave as Standard .
    • Local IPv4 network CIDR : (Optional) Leave blank.
    • Remote IPv4 network CIDR : (Optional) Leave blank.
    note

    Leave the Tunnel 1 options, Tunnel 2 options, and Tags sections empty.

  4. Select Create VPN connection :

    Create VPN connection

  5. From the left pane, select Route tables from the Virtual private cloud section:

    Route tables

  6. Select the route table where:

    Route table select

  7. Select Actions > Edit routes :

    Edit routes

  8. Select Add route :

    Add route select

  9. Enter the following details:
    • Destination : Enter 10.8.0.0/16 .
    • Target : Select Virtual Private Gateway and then select your virtual private gateway .
  10. Repeat for the following destinations:
    • 10.9.0.0/16
    • 10.10.0.0/16 (only required if your VPN clients connect to Coro Network using WireGuard).
  11. Select Save changes :

    Add route save

    AWS applies the routing configuration.

  12. From the left pane, select Site-to-Site VPN connections from the Virtual private network (VPN) section:

    Site-to-Site VPN connections

  13. Select your VPN connection , and then select Download configuration :

    Download configuration

    AWS displays the Download configuration dialog.

  14. Enter the following details:
    • Vendor : Select Generic .
    • Platform : Select Generic .
    • Software : Select Vendor Agnostic .
    • IKE version : Select ikev2 .
    • Include sample type : (Optional) Leave disabled.
  15. Select Download :

    Download configuration

    AWS generates and downloads a .txt configuration file containing the tunnel parameters required for configuring the Coro Network site-to-site connection.

  16. Locate and open the downloaded configuration file.
  17. Note the following values under the #1: Internet Key Exchange Configuration section:

    • Pre-Shared Key
    • Authentication Algorithm
    • Encryption Algorithm
    • Lifetime
    • Diffie-Hellman

    site-to-site tunnel config values

  18. Note the Virtual Private Gateway value under the Outside IP Addresses subsection of the #3: Tunnel Interface Configuration section:

    site-to-site tunnel config values

Configuring Coro Network

Configure Coro with details of your site-to-site tunnel and firewall settings:

  1. Sign in to the Coro console .
  2. From the sidebar, select Control Panel to access the Control Panel .
  3. Select Network :

    Network

  4. Select Site-to-site tunnels :

    Settings

  5. Select + ADD to create a new site-to-site tunnel.
  6. Configure your Site details :

    Add tunnel dialog

    note

    Avoid using special characters or spaces in your site details or preshared key.

    • Site name : Enter a suitable name for your site-to-site tunnel.
    • Site description : Enter a suitable short description for this tunnel.
    • Remote gateway IP : Enter the Virtual Private Gateway value you recorded earlier from your AWS VPN configuration.
    • Remote network IP : Enter the IPv4 CIDR address of your AWS VPC.
    • Preshared key : Enter the Pre-Shared Key from your AWS VPN configuration.
    • Lifetime key : Enter the Lifetime value from your AWS VPN configuration.
  7. In the same dialog, configure the Firewall settings :
    • Remote network mask : Enter the subnet mask based on your IPv4 CIDR address . For example, 16 or 24 .
    • IKE version : Select IKEv2 .
    • Phase 1 encryption : Select the encryption setting that matches the Authentication Algorithm, Encryption Algorithm, and Diffie-Hellman you configured in AWS. For example, AES-128-SHA1-D2 .
    • Phase 2 encryption : Select the same value as Phase 1 encryption .
    • Aggressive mode : Select No .
  8. To save your configuration, select SAVE .

Activating the AWS site-to-site VPN tunnel

After configuring the Coro Network and AWS VPN tunnel, the tunnel might still show a Down status in AWS. Follow the steps below to activate it:

  1. Sign in to the AWS Management Console ( https://aws.amazon.com/console/ ).
  2. From the left pane of the Your VPCs page, select Site-to-Site VPN connections from the Virtual private network (VPN) section:

    Site-to-Site VPN connections

  3. Select your VPN and then select Tunnel details .

    In the Tunnel state section, AWS displays the tunnel with a Down status:

    Site-to-Site tunnel down

  4. Select Actions > Modify VPN tunnel options :

    Modify VPN Tunnel options

    AWS displays the Modify VPN tunnel options page.

  5. Select your VPN tunnel outside IP address from the VPN tunnel outside IP address dropdown:

    VPN tunnel outside IP address

  6. Scroll down and configure the following:
    • DPD timeout action : Select Restart .
    • Startup action : Select Start .
  7. Select Save changes :

    DPD Startup action

    AWS updates the VPN State to Modifying:

    VPN state modify

    note

    It might take a few minutes for AWS to activate the VPN tunnel.

  8. Select Retry . AWS updates the VPN State to Available :

    VPN state available

  9. Select your VPN and then select Tunnel details .

    The Status now shows as Up:

    VPN state up

    note

    AWS can take up to 10 minutes to connect your VPN tunnel.

Troubleshooting site-to-site VPN connection issues

If your VPN is not connecting, try the following troubleshooting options:

  • Run the following command on the Coro VPN gateway device (either locally or via SSH) to restart the IPsec service:
    Copy
    Copied
    ipsec restart
  • Edit the VPN tunnel options:
    1. Go to the Modify VPN tunnel options page.
    2. Set DPD timeout action to None .
      Important

      Do not save the configuration.

    3. Change DPD timeout action back to Restart .
    4. Select Save changes :
    note

    It might take a few minutes for AWS to activate the VPN tunnel.

  • Make sure there are no inbound or outbound rules blocking the VPN connection:
    1. From the Your VPCs page, select Network ACLs from the Security section.
    2. Review the Inbound rules and Outbound rules for entries that may block the VPN connection:

      VPN rules Network ACLs

    3. From the Your VPCs page, select Security groups from the Security section.
    4. Review the Inbound rules and Outbound rules for entries that may block the VPN connection:
      Important

      If your AWS environment includes existing security groups, update them to allow traffic from the following Coro Network subnets:

      • 10.8.0.0/16
      • 10.9.0.0/16
      • 10.10.0.0/16

      Alternatively, configure your security groups to allow only the required ports and protocols used by the VPN tunnel.

      VPN rules Security groups

  • Make sure that all required subnets are explicitly associated:
    1. From the Your VPCs page, select Route tables from the Virtual private cloud section and then select your route table.
    2. Select Subnet associations .
    3. Make sure you have added all required explicit subnet associations.

    Route tables

    Important

    By default, AWS does not automatically add explicit subnet associations.