Creating an AWS Hosted Connection for an MVE with Versa Secure SD-WAN

A Hosted Connection with a capacity of 500 Mbps or less can support one private or public virtual interface. A Hosted Connection with a capacity of 1 Gbps or more can support one private, public, or transit virtual interface. These are dedicated connections and are recommended for production environments.

To create a Hosted Connection from an MVE to AWS

  1. In the Megaport Portal, go to the Services page and select the MVE for the connection.

  2. Click +Connection and click Cloud.

  3. Select AWS as the service provider, select Hosted Connection as the AWS Connection Type, select the destination port, and click Next.
    You can use the Country filter to narrow the selection.
    Each destination port has either a blue or an orange icon to indicate its diversity zone. To achieve diversity, you need to create two connections with each one in a different zone.
    Add AWS Hosted Connection

  4. Specify these connection details:

    • Connection Name – The name of your VXC to be shown in the Megaport Portal.
    • Service Level Reference (optional) – Specify a unique identifying number for the VXC to be used for billing purposes, such as a cost center number or a unique customer ID. The service level reference number appears for each service under the Product section of the invoice. You can also edit this field for an existing service.
    • Rate Limit – This is the speed of your connection in Mbps. The speed cannot be changed once deployed. The drop-down list shows predefined rate limits available for your MVE, up to 10 Gbps. (Note: Transit gateway is available only for speeds at 1 Gbps or above.)
    • Preferred A-End VLAN – Optionally, specify an unused VLAN ID for this connection. This must be a unique VLAN ID on this MVE and can range from 2 to 4093. If you specify a VLAN ID that is already in use, the system displays the next available VLAN number. The VLAN ID must be unique to proceed with the order. If you don’t specify a value, Megaport will assign one.
      Connection details
  5. Click Next.

  6. Specify the connection details for the AWS service.

    • AWS Connection Name – This is a text field and will be the name of your virtual interface that appears in the AWS console. The AWS Connection Name is automatically populated with the name specified in a previous step.

    • AWS Account ID – This is the ID of the account you want to connect. You can find this value in the management section of your AWS console.
      AWS connection details

  7. Click Next to proceed to the connection detail summary, click Add VXC, and order the connection.

Once the VXC connection is deployed successfully, it appears on the Megaport Portal Services page and is associated with the MVE. Click the VXC title to display the details of this connection. Note that the service status (Layer 2) is up but BGP (Layer 3) will be down because the configuration does not exist yet.

VXC details

Once deployed in the Megaport Portal, you need to accept the connection in the AWS console and create a Virtual Interface for the connection:

To accept a Hosted Connection

  1. In AWS, go to Services > AWS Direct Connect > Connections and click the connection name.
    AWS Connections

  2. Click Accept at the top right of the window.
    Accept AWS Connections

    The state will be pending for a few minutes while AWS deploys the connection. After it is deployed, the state changes from ordering to available.

The connection is now available, however you need to create a VIF to connect to AWS services.

Tip

For more information about accepting AWS connections, see the AWS documentation.

Creating a virtual interface

Once you have created and accepted a Hosted Connection, create a VIF and attach the Hosted Connection to a gateway.

Tip

AWS provides detailed instructions for creating Public, Private, and Transit interfaces.

To create and attach a VIF

  1. In the AWS console, click Create Virtual Interface.
    AWS virtual interface

  2. Select the interface type.

    The type will vary depending on the type of service you need to access.

    • Private – Access resources running into a VPC using their private IP addresses. You can choose to terminate a private virtual interface on a private virtual gateway (to access a single VPC) or to a Direct Connect gateway (and map up to 10 VPCs to the VIF).
    • Public – Access all AWS public endpoints, as well as all AWS resources that are reachable by a public IP address.
    • Transit – Transport traffic from a Direct Connect gateway to one or more transit gateways. A transit virtual interface is available only on a Hosted Connection with a capacity of at least 1 Gbps. When you select Transit for the VIF, slower connections are filtered and no longer appear in the interface.
      AWS interface type
  3. Specify the configuration details:

    • Virtual interface name – Enter a name for the virtual interface.
    • Connection – The physical connection where you want this virtual interface to be provisioned. The name you provided for the Hosted Connection in the Megaport Portal appears here.
    • Virtual interface owner – The account that will own the virtual interface. Select My AWS account.
    • Direct Connect gateway – Select the Direct Connect gateway to attach this virtual interface to. A transit VIF is not directly attached to a Transit gateway, but to a Direct Connect gateway.
    • VLAN – The VLAN assigned to the virtual interface. Leave this value as is. The VLAN address is populated and appears to be editable; however, you will get an error if you try to change it.
    • BGP ASN – Enter the Border Gateway Protocol (BGP) autonomous system number (ASN) for the MVE side of the BGP session.

    The following BGP details can be filled out or left blank. When left blank, they are auto-populated by AWS.
    AWS BGP details

    You can also choose whether you want the virtual interface to support Jumbo frames. Enable Jumbo MTU to support an Ethernet packet of 8500 bytes.

  4. Click Create virtual interface.

    To view the VIF details and state, navigate to Services > AWS Direct Connect > Connections > Name of the Megaport-Created-Hosted Connection.
    VIF details

    BGP hasn’t been configured, so the interface state appears as down.

Once you accept the connection and create the VIF in AWS, the VXC state changes to configured in the Megaport Portal.

Adding AWS connection details to Versa Director

After you create the connection from your MVE to AWS and set up the connection in the AWS console, you need to configure it in Versa Director. This involves revising Versa Director templates to add a subinterface for the device and configure BGP settings, ASNs, VLANs, and MD5 values.

To add a subinterface in Versa Director

  1. Collect the connection details from the Megaport Portal.

    To display the details, click the Gear icon Gear icon for the AWS connection from your MVE and click the Details view. Note the values for the A-End VLAN, Customer Address (and CIDR), Amazon IP Address, and Customer ASN.

    AWS connection details

  2. Log in to Versa Director.

  3. Select the Workflows tab in the top menu bar.

  4. Select Template > Templates in the left navigation.

    Workflow templates

  5. Click the template you want to edit, then select the Interfaces tab.

  6. In the WAN Interfaces section, locate the Sub Interface column and click the Add icon Add icon to add a subinterface.

    Add a subinterface

    A new row appears in the table.

  7. Specify these values for the new subinterface.

    • VLAN ID - Enter the A-End VLAN value from the Megaport Portal (collected in step 1).

    • Network Name - Choose + Create WAN Network from the dropdown menu to open the Create WAN Network window. Specify a meaningful name for the network, click OK, and then select the WAN network you created.

    • IPv4 - Choose Static from the dropdown menu.

    Subinterface details

  8. Select the Routing tab to add BGP configuration information.

  9. In the BGP section, select the network name in the Network column.

    BGP details

  10. Specify the following values according to your MVE configuration:

    • Local AS - This is the Customer ASN (your local MVE), collected in Step 1.
    • Neighbor IP Address - This is the Amazon IP address, collected in Step 1.
    • Peer AS - This is the AWS ASN. By default, this value is 64512.
    • Optionally, you can enable BFD (as appropriate for your network).
  11. Click the Add icon Add icon to the right of the settings.

  12. Select the Management Servers tab, then click Recreate or Create (at the bottom of the page.).

    A window opens that shows the differences of the configuration. The auto-merged version is recommended, and selected by default.

  13. Click Deploy.

You can use variables in the template to specify values per device for these fields: Router ID, Local AS, Peer AS, Static IP address, and Password.

Note

The Instance ID cannot be modified (the system automatically specifies a value) and Static Address is parameterized by default.

To parameterize Router ID, BGP Local AS, Peer AS, and Password

  1. Select the Configuration tab in the top menu bar.

  2. Select Templates > Device Templates in the horizontal menu bar.

    Device Templates

  3. Click your template.

    By default, the Interfaces column appears.

  4. In the left navigation, select Virtual Routers, and click your device to open the Edit window.

    Edit device templates

  5. In the Edit window, select BGP, then click the Instance ID to open the Edit BGP Instance window.

    Edit BGP Instance window

  6. In the Edit BGP Instance window, click the Parameterize icon Parameterize icon next to each of the following fields: Router ID, Local AS, Peer AS, and Password.

    Parameterize fields

  7. Click OK two times to update.

  8. Select the Workflows tab in the top menu bar, then select Devices > Devices in the left navigation.

  9. Click your device to specify values for the variables you just created.

    Define variables

    The Add Device window opens.

  10. Select the Bind Data tab.

    Bind Data tab

  11. Specify values for the variables.

    • Local AS - Enter the Customer ASN.
    • Password - Enter the MD5 password.
    • Peer AS - Enter the Amazon side ASN.
    • Router ID - Enter the Customer IP address (your local IP address).
    • Hop Address - Enter the Amazon IP address.
    • Static Address - Enter the Customer IP address (your local IP address, including the mask value).
  12. Click Redeploy when finished.

    When the new configurations for the device are prepared successfully, a green checkmark appears at the bottom of the Versa Director window.

  13. To push the changes to the device, click Commit Template (on the upper right).

    Commit Template link

    The Commit Template to Devices window opens.

    Commit Template

  14. Specify the following in the Commit Template to Devices window:

    • Organization - Select your organization from the dropdown menu.

    • Select Template - Select the template to push to the device from the dropdown menu.

    Note that the Template State is OUT_OF_SYNC.

  15. Click the eye icon in the Differences column to verify your configuration changes.

  16. Click Commit to Device.

    A green checkmark appears at the bottom right of the screen when the push is successful. The Template State is now IN_SYNC.

Validating your AWS connection

  1. Select the Monitor tab in the top navigation bar, select Devices in the horizontal navigation bar, and then select your device to view details in the Summary screen.

    AWS Session Status

  2. In the Summary screen you can review your subinterface in the Interface column, and the Operational and Admin Status.

    AWS Session Summary

  3. In the AWS Direct Connect portal, refresh the screen and verify that the Virtual interface state is available and BGP Status is up. An AWS BGP session that is up looks like this:

    AWS session from AWS side


Last update: