Using Zerto between OVHcloud and a third party platform
Learn how to setup Zerto between your OVHcloud Private Cloud and another platform
Learn how to setup Zerto between your OVHcloud Private Cloud and another platform
Last updated 11th February 2022
This guide provides an outline of how to configure a virtual private network between an OVHcloud Hosted Private Cloud and a different platform. We will use the OPNsense open-source VPN Solution as an example, and explain the simplest way to set up a VPN tunnel to the Zerto network.
Check out Zerto between two OVHcloud datacenters for the other scenario.
Find out how to get started with a VPN for OVHcloud Zerto DRP.
Listed parameters:
On-premises side:
OVHcloud side:
You need to decide which network to deploy the OVHcloud ZVM in. This avoids any overlap with local networks, which would prevent routing.
You can either accept the suggested network or provide your own, as long as it is within a valid /23 range.
It is easy to activate Zerto features from the OVHcloud Control Panel. You just need to select the datacentre linked to the Hosted Private Cloud solution that you want to use, from the Disaster Recovery Plan
tab.
First select Between your infrastructure and an OVHcloud Private Cloud
, then click Activate Zerto DRP
. Next, select a free public IP from the dropdown menu and enter the desired network range for the ZVM deployment. Confirm the VRA Network range and then click Install
.
From the OPNsense interface, go to the VPN
menu on the left, IPSec
section and select Tunnel Setting
. Click Enable IPsec
and click save.
You can configure the IPSec tunnel by defining two sets of parameters: Phase 1 and Phase 2.
In the VPN
menu, go to Tunnel settings
, and click on the +
to add a new Phase 1:
If the default values are correct:
The only required parameter is the OVHcloud IPSec endpoint IP address.
Once the default values are valid, you only need to provide the shared secret for authentication.
Supported values for each parameters:
You can keep the default values for the other parameters. Click Save
, then Apply changes
.
The new Phase 1 is now present in the interface:
Click on Show Phase 2 entries
.
There is no phase 2 available, so you will need to add one:
Click on +
.
Check that the mode is set to "Tunnel IPv4".
The local network type must be set to "Lan subnet".
You need to give the ZVM IP and the associated network range.
On OVHcloud side, the ZVM network is always a /23 network (512 IPs).
Make sure to double-check the parameters, otherwise the VPN tunnel won't come up.
Supported values are:
You can leave advanced parameters to their default value. Click Save
, then Apply changes
.
Click the orange triangle on the right to initialise the connection:
If all the parameters are correct, the tunnel will come up and two new icons will appear:
Click on the information icon.
The tunnel is now up. Make sure to add, if required, a route to the OVHcloud ZVM network on your local ZVM.
Troubleshooting
If the tunnel is not coming up, make sure that the parameters values are identical on both sides:
Make sure that a firewall is not interfering in the dialog between the local and remote endpoints.
You can check the IPSec logfile in /var/log/ipsec.log on the OPNsense appliance to get more information.
To allow pairings of on-premises and OVHcloud instances, traffic must be authorised on the following ports:
Go to the Firewall
menu, Rules
section, IPSec
interface:
Click on Add
to create a new rule.
Rule parameters are as follow:
For "Source" and "Destination", select "Single host or Network" type. The source is the OVHcloud ZVM, and the destination is your on-premises ZVM.
Destination TCP port is 9081. Click Save
and Apply Change
.
vRAs opening is a bit more complex since there are multiple vRAs on each side that need to be able to exchange information on TCP ports 4007 and 4008. To simplify this setup, we are going to use the alias feature of OPNsense. An alias is a group of objects IPs, networks, URLs…) that can be used in firewall rules.
We will define three aliases:
You can get the OVHcloud vRAs IP from the destination Private Cloud vCenter interface.
Let's create the OVH_VRA alias for OVHCLoud vRAs:
Similarly, we can create an alias for the on-premises vRAs:
Finally, you need to create the ports alias:
We have now all the elements we need to implement the required firewall rules to authorise data coming from the OVHcloud platform. It is the same procedure as before, we just need to use the aliases instead of explicit IPs or ports:
At this point, we have a functional and secure link between our on-premises platform and cloud instance.
Log in in to your on-premises ZVM. The following screen is displayed:
Select Pair to a site with a licence
, enter the OVHcloud ZVM IP and press Start
.
In the dashboard, you can see the pairing is ongoing:
You will be notified when the pairing is successfull:
You can check that your OVHcloud PCC is visible in the Sites
tab.
At this point, your Zerto setup is functional and you can start to create your virtual protection groups (VPGs).
If the on-premises ZVM is not able to successfully contact the OVHcloud ZVM (due to an incorrect firewall setup, for example) you will get the following message:
You will then be brought back to the log-in screen, with the following error message:
The most probable cause is that the OVHcloud ZVM is not authorised to contact your on-premises ZVM on TCP 9081 (it needs to be able to initiate the connection).
Join our community of users on https://community.ovh.com/en/.
Please feel free to give any suggestions in order to improve this documentation.
Whether your feedback is about images, content, or structure, please share it, so that we can improve it together.
Your support requests will not be processed via this form. To do this, please use the "Create a ticket" form.
Thank you. Your feedback has been received.
Access your community space. Ask questions, search for information, post content, and interact with other OVHcloud Community members.
Discuss with the OVHcloud community