Ethernet over VPN

For some organizations with many distributed remote offices (or branches, or retail outlets, such as retail chain or F&B companies), the remote networks are usually connected back to HQ network via layer 3 IP networks, either through public Internet, MPLS, or private leased-line etc. But sometimes it may be desirable to connect remote sites "seamlessly", as if the sites are directly connected via an Ethernet cable and sit in the same layer-2 Ethernet network (eg. emulated Metro-E backbone network).

There are a few options to achieve such objective. 

To achieve "Ethernet over SSLVPN", we will use a few built-in features from mbox CMG and HSA product families:

In this section, we're going to use CMG and HSA to demonstrate this feature.

A few key points to NOTE:

CLI CONFIG ON CMG (VPN Server)

-------------------------------------------------

!hostname CMG!interface eth0 description "to WAN/Internet" enable ip address 118.189.158.3/29!interface eth1 enable bridge-group 0!interface eth2 enable bridge-group 0!interface bridge 0 description "to LAN" enable ip address 10.1.1.254/24!ip dhcp-server start!ip default-gateway 118.189.158.1!security sslvpn-server 1 server address 118.189.15.3 1443 server tap-mode tap bridge-group 0 client ethernet-sslvpn start!firewall-input 010 permit all tcp dport 1443 remark "SSLVPN port"!firewall-access 10 permit all src 10.0.0.0/8firewall-access 10 permit all dst 10.0.0.0/8!

CLI CONFIG ON HSA (VPN Client)

-------------------------------------------------

Step 1: configure LTE settings, configure tap interface and assign to firewall zone "lan"

Step 2: configure MWAN for link fail-over across dual LTE (more details)

Step 3: configure CLI and import VPN profile (more details)

----------!hostname HSA!security sslvpn-client 1 tap bridge-group br-lan start!----------

Step 4: configure tap, lan interface, and assign both interface to lan firewall zone  (more details on similar config)

TROUBLESHOOTING COMMANDS (CMG)

-------------------------------------------------

CMG-ISP# show security sslvpn-server status 1Info: SSLVPN server 1 is running.CMG-ISP# CMG-ISP# show services tcp include 1443tcp        0      0 0.0.0.0:1443            0.0.0.0:*               LISTEN  <--check VPN service port is upCMG-ISP#CMG-ISP# show ip interface brief Interface   IP_Address       NetMask          Broadcast        MAC_Address     --------------------------------------------------------------------------------br0         10.1.1.254       255.255.255.0    10.1.1.255       00:90:0B:34:B4:7Feth0        118.189.158.34   255.255.255.0    118.189.158.255  00:90:0B:34:B4:7Eeth1        NON-IP           NON-IP           NON-IP           00:90:0B:34:B4:7Feth2        NON-IP           NON-IP           NON-IP           00:90:0B:34:B4:80eth3        192.168.199.1    255.255.255.0    192.168.199.255  00:90:0B:34:B4:81lo          127.0.0.1        255.0.0.0        0.0.0.0          00:00:00:00:00:00tap1        NON-IP           NON-IP           NON-IP           06:B6:B4:A2:15:B5    <--check tap1 is createdCMG-ISP# CMG-ISP# show interface bridge br0 bridge name     bridge id               STP enabled     interfacesbr0             8000.00900b34b47f       no              eth1                                                        eth2                                                        tap1   <--check tap1 is part of bridge with LAN portsCMG-ISP# 

TROUBLESHOOTING COMMANDS (HSA)

-------------------------------------------------mbox# show interface......22: br-lan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP mode DEFAULT group default     link/ether 1c:40:e8:04:38:38 brd ff:ff:ff:ff:ff:ff23: 3g-lte0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN mode DEFAULT group default qlen 3    link/ppp 24: 3g-lte1: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN mode DEFAULT group default qlen 3    link/ppp 25: tap1: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 100    link/ether 0a:07:60:16:52:92 brd ff:ff:ff:ff:ff:ffmbox# mbox# show interface bridge br-lanbridge name     bridge id               STP enabled     interfacesbr-lan          7fff.1c40e8043838       no              eth1                                                        tap1    <--check tap1 is part of bridge with LAN portsmbox# 

use tcpdump on tap interfaces to make sure traffic is passing through tap

You can download attached sample backup config for testing. Please remember to change SSLVPN profile to your actual CMG vpn profile.

watch it on youtube