Oracle Network Cloud Service VPN Corente Shared Network
Oracle Network Cloud Service VPN Corente Shared Network
February 2017
Documentation for setting up VPN access for Oracle Compute
Cloud Service, Oracle Java Cloud Service, and Oracle Database
Cloud Service instances.
Oracle Cloud Setting Up VPN from Corente Services Gateway On-Premises to the Shared Network,
E72381-10
Copyright © 2016, 2017, Oracle and/or its affiliates. All rights reserved.
This software and related documentation are provided under a license agreement containing restrictions on
use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your
license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license,
transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse
engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is
prohibited.
The information contained herein is subject to change without notice and is not warranted to be error-free. If
you find any errors, please report them to us in writing.
If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on
behalf of the U.S. Government, then the following notice is applicable:
U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software,
any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are
"commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-
specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the
programs, including any operating system, integrated software, any programs installed on the hardware,
and/or documentation, shall be subject to license terms and license restrictions applicable to the programs.
No other rights are granted to the U.S. Government.
This software or hardware is developed for general use in a variety of information management applications.
It is not developed or intended for use in any inherently dangerous applications, including applications that
may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you
shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its
safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this
software or hardware in dangerous applications.
Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of
their respective owners.
Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are
used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron,
the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro
Devices. UNIX is a registered trademark of The Open Group.
This software or hardware and documentation may provide access to or information about content, products,
and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly
disclaim all warranties of any kind with respect to third-party content, products, and services unless
otherwise set forth in an applicable agreement between you and Oracle. Oracle Corporation and its affiliates
will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party
content, products, or services, except as set forth in an applicable agreement between you and Oracle.
Contents
Preface ................................................................................................................................................................. v
Audience ........................................................................................................................................................ v
Conventions................................................................................................................................................... v
iii
iv
Preface
Setting Up VPN Using a Third-Party VPN Device describes how to set up Corente
Services Gateway for secure access to your Oracle Compute Cloud Service, Oracle Java
Cloud Service, and Oracle Database Cloud Service instances.
Topics
• Audience
• Conventions
Audience
This document is intended for administrators of Oracle Compute Cloud Service,
Oracle Java Cloud Service, and Oracle Database Cloud Service.
Conventions
This table describes the text conventions used in this document.
Convention Meaning
boldface Boldface type indicates graphical user interface elements associated with an
action, or terms defined in text or the glossary.
italic Italic type indicates book titles, emphasis, or placeholder variables for
which you supply particular values.
v
1
About Setting Up VPN Using Corente
Services Gateway
You can set up VPN access to Oracle Cloud Service instances by installing Corente
Service Gateway, which is an Oracle-provided IPsec solution, in both your data center
as well as in Oracle Cloud.
Topics
Note: The following other VPN solutions are available for instances in
multitenant sites:
VPN access through a third-party gateway or Corente Services Gateway in
your data center to instances attached to the Oracle-provided shared network.
See the following documentation:
1-2 Setting Up VPN from Corente Services Gateway On-Premises to the Shared Network
specified in Creating a New Linux Instance and Configuring a GRE Tunnel)
to the Corente Services Gateway installed in your data center.
Your administration can access the App Net Manager service portal only via a
computer connected to the Corente Services Gateway installed in your data
center. Direct access to App Net Manager — without the Corente Services
Gateway in your data center — is not permitted.
1-4 Setting Up VPN from Corente Services Gateway On-Premises to the Shared Network
2
Setting Up Corente Services Gateway in
Your Data Center
You must set up Corente Services Gateway in your data center. This section provides
steps to install Corente Services Gateway on a virtual machine in your data center. In
this procedure, you’re installing Corente Services Gateway to run as a guest VM on
your host.
Topics
• Setting Up Virtualization
• Setting Up Networking
1. Ensure that you have sudo privilege on the host where the gateway will be
installed.
b. If you’re using a proxy, set the HTTP proxy and the HTTPS proxy, as in the
following example:
export http_proxy=your_http_proxy_server:port
export https_proxy=your_https_proxy_server:port
Note:
Instructions are provided in this section are specific to Oracle Linux 6. For
other versions of Linux, instructions may vary. For more information, see your
operating system documentation.
• Verify that you have at least 40 GB of free disk space on the host where the on-
premises gateway will be installed. If the partition used by /var/lib/libvert/
images/ is small, mount the directory to a large disk.
modprobe -v kvm-intel
Setting Up Virtualization
After preparing the host for the installation, you need to set up virtualization.
Note:
If you encounter fatal errors while preparing your host for the installation,
contact your IT administrator to fix the errors before proceeding with
virtualization.
2. Check /etc/login.defs, and add the following lines if they are absent:
SYS_GID_MIN 2000
SYS_GID_MAX 9000
3. Verify the existence of group and user qemu with ID 107 by running the following
commands:
2-2 Setting Up VPN from Corente Services Gateway On-Premises to the Shared Network
Setting Up Virtualization
# groupadd qemu
Note:
If group ID 107 is taken, then assign a new ID to the application using it, and
use group ID 107 for qemu.
e. Verify using the ID qemu that the user qemu has 107 as both user ID and group
ID, as in the following:
5. Install KVM, libvirt, qemu and other packages required for the setup:
If the installation of the packages fails with an error “invalid GPG key”, then do
the following to import the GPG key and try to run yum install one more time:
-bash-4.1$ locate GPG
/etc/pki/rpm-gpg/RPM-GPG-KEY
/etc/pki/rpm-gpg/RPM-GPG-KEY-fedora
/etc/pki/rpm-gpg/RPM-GPG-KEY-fedora-test
/etc/pki/rpm-gpg/RPM-GPG-KEY-oracle
/usr/share/rhn/RPM-GPG-KEY
-bash-4.1$ rpm --import /etc/pki/rpm-gpg/RPM-GPG-KEY-oracle
7. If the avahi-daemon service is installed, verify its status by running the following
command:
If the status is dead with subsys lock, try to stop the service and restart:
# service libvirtd stop
# service libvirtd start
# modprobe -v kvm
# modprobe -v kvm-intel
Setting Up Networking
Topics
If the default virtual network is present, you should see virbr0 in the command
output, as in the following example:
# brctl show
bridge name bridge id STP enabled interfaces
virbr0 8000.000000000000 yes
2. (Optional): If you don’t see the default virtual network (virbr0), run the
following commands:
2-4 Setting Up VPN from Corente Services Gateway On-Premises to the Shared Network
Setting Up Networking
Note: The names of network interfaces in the diagram are examples only.
Bridge interfaces are created in the host operating system to accommodate networking
requirements of guest VMs.
Interface Description
You must create two bridges on the host and two virtual interfaces on your on-
premises gateway and connect them, as illustrated in the diagram. The WAN interface
connects to the Internet, and the LAN interface is for your internal network.
Complete the following steps:
ifcfg-br0 DEVICE=br0
TYPE=Bridge
BOOTPROTO=static
IPADDR=
NETMASK=
ONBOOT=yes
DELAY=0
NM_CONTROLLED=no
2-6 Setting Up VPN from Corente Services Gateway On-Premises to the Shared Network
Downloading and Installing the Corente Services Gateway
ifcfg-eth0 DEVICE=eth0
HWADDR=90:E2:BA:80:40:34
ONBOOT=yes
TYPE=Ethernet
BRIDGE=br0
NM_CONTROLLED=no
IPADDR
NETMASK
BOOTPROTO
ifcfg-br1 DEVICE=br1
TYPE=Bridge
IPADDR=192.168.37.10
NETMASK=255.255.255.0
BOOTPROTO=static
ONBOOT=yes
DELAY=0
NM_CONTROLLED=no
ifcfg-eth1 DEVICE=eth1
HWADDR=00:10:E0:5F:9A:B3
TYPE=Ethernet
UUID=521fffed-8905-465a-a0ec-
ea4739c62871
ONBOOT=yes
NM_CONTROLLED=no
BRIDGE=br1
Download and install Corente Services Gateway in your data center as follows:
1. In your data center, identify the host you had prepared in the previous section.
2. Download the Corente Services Gateway software (Corente Gateway Image) from
the following URL:
http://www.oracle.com/technetwork/topics/cloud/downloads/network-cloud-
service-2952583.html
3. Ensure that you have root access to the host where you want to install the on-
premises Corente Services Gateway (referred to as on-premises gateway).
4. Create a new virtual machine for the on-premises gateway. Take care of the
following points while creating the virtual machine:
• Use the ISO image file of the Corente Gateway Image that you have
downloaded to create the virtual machine.
• Configure memory and CPU for the virtual machine being created.
• Ensure that the size of the hard disk is more than 40 GB.
• Configure two NICs for the on-premises gateway: one for br0 and another for
br1. The virtual machine should have two network adapters or interfaces, one
for WAN and another for LAN. One network interface or adapter is used for
Internet connection and another one for internal communication with the
Corente guest virtual machines.
5. When you create the virtual machine, the following virtual machine terminal
screen is displayed:
2-8 Setting Up VPN from Corente Services Gateway On-Premises to the Shared Network
Downloading and Installing the Corente Services Gateway
Enter yes, and then press Enter to proceed with the installation. The installation
continues. Reboot the virtual machine, when prompted.
When the on-premises gateway virtual machine starts up, you’ll see the following
screen:
6. Select Download Config and press Enter. The network configuration screen is
displayed, as in the following:
7. In this screen, enter information about your network interface facing Oracle Cloud
(Internet). Move to Advanced to configure proxy.
Select Continue.
2-10 Setting Up VPN from Corente Services Gateway On-Premises to the Shared Network
Downloading and Installing the Corente Services Gateway
9. In the next screen, enter www.corente.com as the Download site, and then select
Next.
10. In the next screen, enter the username and password to log into the App Net
Manager and the name of the gateway that you have created using App Net
Manager as part of the prerequisite tasks. The location configuration file that you
have created in App Net Manager is downloaded onto your on-premises gateway.
After the download is complete, your on-premises gateway reboots. When the
gateway comes back up, you can’t log into it due to security reasons. Your network
administrator should use App Net Manager to start managing your on-premises
gateway.
2-12 Setting Up VPN from Corente Services Gateway On-Premises to the Shared Network
3
Setting Up Corente Services Gateway on
Oracle Cloud
You must set up Corente Services Gateway on an Oracle Compute Cloud Service
instance.
This is the Oracle Cloud gateway that communicates with the on-premises gateway.
Note:
Do not follow the instructions in this section if you want to create the Corente
Services Gateway using the Oracle Compute Cloud Service user interface.
1. Go to the Oracle Compute Cloud Service Console. Sign in as a user with the
Compute_Operations role.
2. Reserve a public NAT IP address to be used by the new Corente Services Gateway
(cloud gateway). See Reserving a Public IP Address in Using Oracle Compute Cloud
Service (IaaS).
Following is the workflow to set up an Corente Services Gateway on an Oracle
Compute Cloud Service instance using App Net Manager and orchestrations:
3. From the Domains panel on the left, select Locations, and then click New.
Complete all the fields in the Identity and Location panel, select the Enable Zero
Touch Configuration option, and enter your own unique identifier in the Unique
Identifier field in the Zero Touch Configuration panel.
Important:
Note the value that you enter in the Unique Identifier field. You’ll need to
specify the same value in the uid attribute while creating the orchestration for
the cloud gateway instance.
5. Click Add at the bottom of the Network Interfaces pane. In the dialog box that
appears, select WAN/LAN Interface in the Peer Configuration pane, and then
click OK.
8. Select Use GRE Tunnels in the GRE Tunnels pane to specify the configuration
preference for the location gateway. 172.16.254.1 appears in GRE Tunnel IP
field.
9. Ensure that the Internet Access via Proxy Server option is not selected, and then
click OK.
10. Go to the User Groups tab. Highlight Default User Group and then click Edit at
the bottom of the screen. The Edit User Group screen appears.
11. In the Edit User Group screen, click Add button at the bottom of the User Group
Subnets/Address Ranges panel. The Add Address Range screen appears.
12. In the Add Address Range screen, select Include Subnet. Enter the network range
and the subnet mask for the GRE tunnel space for your VPN environment in the
cloud.
The following are some basic rules for this address space:
• The range cannot overlap with any addresses in use in your environment. For
now, do not use any address in the 10.0.0.0/8 range.
• The range must be large enough to accommodate all instances that will be
behind the Corente VPN appliance, plus two for the GRE tunnel.
13. Set Outbound NAT to Permitted, and then click OK at the bottom of the screen.
14. Click OK in the Edit User Group screen, and then click OK at the bottom of the
Add Location screen. You will return to the main App Net Manager screen, and
the Save button at the top of the screen will be active. Note that the red square
with yellow center to the upper left of the location icon; it indicates that there are
unsaved changes.
15. Click Save at the top of the App New Manager screen. A Save All Changes pop-
screen is displayed. Click Start at the bottom of this screen to save the
configuration.
3-2 Setting Up VPN from Corente Services Gateway On-Premises to the Shared Network
Creating an Orchestration for the Boot Volume
16. When the save operation is complete, click Finished at the bottom of the screen.
Attribute Details
imagelist Go to the Oracle Compute Cloud Service Console, note the Compute
image that you want to use for the storage volume, replace the image
name in the sample orchestration with /oracle/public/
vpnServiceGateway_corente_9.4.1062.
name in the The name attribute should be specified in the following format:
objects array /Compute-yourIdentityDomainName/yourUserName/volumeName
Important:
You must create a new boot storage volume when you create a new gateway
instance. Don’t use an existing boot storage volume that has been used by
another gateway instance even if the gateway instance is shut down.
Attribute Details
If the instance is created with an orchestration that has ha_policy of active, then
the instance will be restarted with the same filesystem and the configuration will be
preserved when the instance crashes or fails.
Parameter Description
nat The value for this parameter must be the same as the IP reservation
created earlier.
seclists The value for this parameter must be the same as the seclists defined
earlier.
uid Make a note of the value of the uid so that you can use it in the App Net
Manager user interface later.
The uid field value must match the unique identifier used when
configuring your Corente Services Gateway, and each Corente Services
Gateway must have its own unique identifier.
volume The value for this parameter must be the boot volume you had created
earlier.
3-4 Setting Up VPN from Corente Services Gateway On-Premises to the Shared Network
Starting the Orchestrations
Note:
1. Upload all the orchestrations to Oracle Compute Cloud Service. The upload order
doesn’t matter.
Important: The order of these steps is critical. Don’t start the orchestrations
in any order other than as described here.
a. Start the orchestrations for the boot volume and the networking objects. See
Starting an Orchestration in Using Oracle Compute Cloud Service (IaaS).
b. Wait for the boot volume and networking orchestrations to be in the ready
state.
c. Verify that a location configuration has been defined for the cloud gateway
instance in App Net Manager. See Defining a Location Configuration for the
Cloud Gateway.
Important:
Do not start the GRE-enabled Compute service instance orchestration file until
you have created the Corente gateway, and inserted its unique ID in the
gateway configuration with App Net Manager utility. Wait until you see the
download icon in App Net Manager before starting the JSON orchestration.
d. After the boot volume and networking orchestrations are in the ready state,
start the instance orchestration.
f. After the instance orchestration is in the ready state, start the route
orchestration.
3. Start the orchestration for the boot volume and the network objects.
4. After the boot volume orchestration is started and in ready state, you must start the
instance orchestration. See Starting an Orchestration in Using Oracle Compute Cloud
Service (IaaS).
3-6 Setting Up VPN from Corente Services Gateway On-Premises to the Shared Network
4
Establishing Partnership Between Your On-
Premises Gateway and Cloud Gateway
After verifying that your on-premises gateway and cloud gateway are running, you
must add partnership between the two gateways.
Do the following:
2. In App Net Manager, in the Domains pane, click Locations to expand and show all
of your gateways.
3. Select your Corente Services Gateway cloud instance and click to expand.
4. Click the Partner option under your Corente Services Gateway cloud instance in
App Net Manager.
6. Select Intranet in the Connection to Partner panel, and then select your corporate
gateway in the drop-down (right side of your selection).
7. Click Add at the bottom of the Tubes pane at the bottom of the Add Partner screen.
8. In the Local Side of Tube pane in the Add Tube screen, select Default User Group
in the User Group selector.
9. In the Remote Side of Tube pane in the Add Tube screen, select Default User
Group in the User Group selector.
13. Select your corporate Corente Services Gateway in the Locations in the Domains
pane of App Net Manager.
15. Click New at the top of the App Net Manager screen.
16. Select Intranet in the Connection to Partner panel, and then select your cloud
gateway in the drop-down next to your selection.
17. Click Add at the bottom of the Tubes pane at the bottom of the Add Partner screen
Establishing Partnership Between Your On-Premises Gateway and Cloud Gateway 4-1
18. In the Local Side of Tube pane in the Add Tube screen, select Default User Group
in the User Group selector.
19. In the Remote Side of Tube pane in the Add Tube screen, select Default User
Group in the User Group selector.
23. Click Save at the top of the App Net Manager screen.
You should now see a connection line appear between the gateways in App Net
Manager. You’ll see a yellow line first. The line turns green as the tunnel becomes
active.
4-2 Setting Up VPN from Corente Services Gateway On-Premises to the Shared Network
5
Configuring a GRE Tunnel on a Guest
Instance in Oracle Cloud
To complete the VPN setup, configure a GRE tunnel between your guest instances in
Oracle Cloud and your Corente Services Gateway instance in Oracle Cloud.
Topics
1. Create a bootable storage volume. Use an image that is Oracle Linux 6.6 or later
versions as only these versions support GRE tunneling. See Creating a Bootable
Storage Volume in Using Oracle Compute Cloud Service (IaaS).
http://www.oracle.com/technetwork/topics/cloud/downloads/network-cloud-
service-2952583.html
3. Modify values in the sample orchestration file based on your environment. While
modifying corente-guest-launchplan.json, take care of the following
requirements:
• Ensure that you create the guest instance using the bootable storage volume
you have created in step 1.
• The client instance and the gateway instance should be in the same security
list.
In this example, a Compute instance in the Corente network is assigned to an
internal security list, csg-internal.
• The GRE tunnel addresses (both local and cloud gateway) should not be in the
10.x.x.x subnet.
4. Upload the modified orchestration to Oracle Compute Cloud Service, and then
start the orchestration. For information about uploading and starting an
orchestration, see Managing Orchestrations in Using Oracle Compute Cloud Service
(IaaS).
6. Note the DNS hostname assigned to the cloud gateway instance. You will need
this hostname later, when running the configuration script. This is needed for HA.
The cloud gateway hostname is automatically populated, and should point to the
private IP address of the cloud gateway.
Sample Orchestration with Corente Tunnel Arguments
{
"name": "/Compute-myIdentityDomain/[email protected]/corente-guest-instance",
"label": "corente-guest",
"description": "Corente guest instance",
"oplans": [
{
"obj_type": "launchplan",
"label": "corente-guest-launchplan-1",
"ha_policy: "active",
"objects": [
{
"instances": [
{
"name": "/Compute-myIdentityDomain/[email protected]/corente-guest",
"networking": {
"eth0": {
"model": "e1000",
"dns": [
"corente-guest"
],
"seclists": [
"/Compute-myIdentityDomain/[email protected]/csg-internal"
5-2 Setting Up VPN from Corente Services Gateway On-Premises to the Shared Network
Creating a New Linux Instance and Configuring a GRE Tunnel
],
"nat": "ippool:/oracle/public/ippool"
}
},
"boot_order": [
1
],
"storage_attachments": [
{
"index": 1,
"volume": "/Compute-myIdentityDomain/[email protected]/corente-
guest-boot-vol"
}
],
"label": "corente-guest",
"shape": "oc3",
"attributes": {
"userdata": {
"corente-tunnel-args": "--local-tunnel-address=172.16.1.4 --csg-
hostname=c9fcb5.compute-acme.oraclecloud.internal. --csg-tunnel-address=172.16.254.1
--onprem-subnets=10.2.3.0/24,10.3.2.0/24"
}
},
"sshkeys": [
"/Compute-myIdentityDomain/[email protected]/adminkey"
]
}
]
}
]
}
]
}
Note:
You'll need superuser privileges to copy to /usr/bin.
7. Add the following entry to /etc/rc.local so that the script runs automatically
every time the instance boots:
bash /usr/bin/oc-config-corente-tunnel
5-4 Setting Up VPN from Corente Services Gateway On-Premises to the Shared Network
Configuring a GRE Tunnel on Running Linux Instances
Note: You may have to wait up to 1 minute before the GRE tunnel is up.
4. Verify that the GRE tunnel is functional by running the ping command to any
live IP address within your data center network directly.
Topics
1. Identify the Windows image that you are going to use while creating the instance.
Ensure that you use an image of Windows Server 2012 R2 as only Windows
Server 2012 R2 with a hotfix applied supports GRE tunneling. Windows images
are available in Oracle Cloud Marketplace.
2. Create your Windows guest instance using the Create Instance wizard. See
Workflow for Creating Your First Windows Instance in Using Oracle Compute
Cloud Service (IaaS). Take care of the following requirements:
• By default, High Availability (HA) policy is set to active. Retain this value.
• By default, RDP is enabled. Retain this value to use RDP to access your
Windows instance.
5-6 Setting Up VPN from Corente Services Gateway On-Premises to the Shared Network
Configuring a GRE Tunnel on a Windows Instance
4. Enable RDP access to your Windows instance. RDP access to your Windows
instance is not enabled by default. See Accessing a Windows Instance Using RDP
in Using Oracle Compute Cloud Service (IaaS).
After creating the instance, create a GRE tunnel on the instance by using the
instructions provided in Creating a GRE Tunnel on a Windows Guest Instance.
• The Windows guest instance and the Oracle Compute Cloud Service instance on
which you have set up Corente Services Gateway must be part of the csg-
internal security list. The csg-internal security list is created when you run
the secrule.json orchestration that you have defined in Creating an
Orchestration for the Networking Objects. Add the Windows guest instance to the
csg-internal security list. For information about adding an instance to a
security list, see Adding an Instance to a Security List in Using Oracle Compute
Cloud Service (IaaS).
Caution:
Improper editing of registry keys can cause serious problems. For the
instructions to edit registry keys, see the Windows documentation.
• Apply the hotfix provided by Microsoft to your Windows 2012 R2 server instance.
For more information about downloading and applying the hotfix, see https://
support.microsoft.com/en-us/kb/3022776.
Ensure that the instance is running after applying the hotfix.
If you don't see Remote Access in the list, use the Server Manager tool to add
Remote Access as a role. Select the Direct Access and VPN (RAS) role service
while adding the Remote Access role.
• Ensure that you can RDP to your Windows instance. RDP access to your
Windows instance is not enabled by default. To enable RDP access on your
Windows instance, see Accessing a Windows Instance Using RDP in Using Oracle
Compute Cloud Service (IaaS).
Ensure that the Windows instance is running after enabling RDP access.
To create a GRE tunnel on your guest Windows instance after completing the
prerequisites:
2. Enter the following command at the command prompt to run the oc-config-
corente-tunnel.ps1 script. You must provide values for all the parameters. In
the following example, it is considered that the oc-config-corente-
tunnel.ps1 script is available at C:\. When you run this command, specify the
complete path of the location where you have downloaded the script file.
Syntax
powershell —File C:\oc-config-corente-tunnel.ps1 Name-of-
tunnel CSG-hostname GRE-tunnel-destination-prefix GRE-local-
IPAddress Remote-IPv4Subnet:Metric Prefix-length
Example: Creating a GRE tunnel by specifying a single remote route
powershell —File C:\oc-config-corente-tunnel.ps1 GREtoCSG
c9fcb5.compute-acme.oraclecloud.internal. 172.16.254.1/32
172.16.31.9 192.168.10.0/24:100 16
Example: Creating a GRE tunnel by specifying multiple remote routes
powershell —File C:\oc-config-corente-tunnel.ps1 GREtoCSG
c9fcb5.compute-acme.oraclecloud.internal. 172.16.254.1/32
172.16.31.9 “192.168.10.0/24:100,192.168.133.0/24:100” 16
The script runs checks to ensure that the prerequisites are met, and then
establishes a GRE tunnel. The time taken to establish the tunnel varies depending
on your environment. Do not close or quit the terminal window while the script is
running.
Note:
If you provide incorrect parameters, stop the script, and then enter the correct
parameters to run the oc-config-corente-tunnel.ps1 script.
5-8 Setting Up VPN from Corente Services Gateway On-Premises to the Shared Network
Configuring a GRE Tunnel on a Windows Instance
3. To automatically set up the GRE tunnel to Corente Services Gateway every time
the system restarts, use the Task Scheduler in Windows to run the following
command on system restart. The example provided here is uses sample values.
Specify values for the parameters based on your environment.
cmd /C powershell —File C:\oc-config-corente-tunnel.ps1 GREtoCSG c9fcb5.compute-
acme.oraclecloud.internal. 172.16.254.1/32 172.16.31.9 192.168.10.0/24:100 16>>c:
\corente.log 2>>&1
For more information about using Task Scheduler to run a PowerShell script, see
Windows documentation.
Note:
When the system restarts, the Remote Access service may not be available
immediately. You might find a few error messages logged in the C:
\corente.log file to indicate that Remote Access service is not available.
However, the script runs continuously and the GRE tunnel is established
when the Remote Access service becomes available.
5-10 Setting Up VPN from Corente Services Gateway On-Premises to the Shared Network