3.8. VT AIR Amazon AWS

VT AIR AWS brings you all VT AIR feature to Amazon’s Cloud.

VT AIR AWS AMI can be run in any region where EC2 offers service on various sizes of instance. VT AIR for AWS is available in the AWS Marketplace.

Two different versions are currently available:

  • Intel Based VT AIR Version

  • Graviton Based VT AIR Version

The graviton version will only run on the AWS Graviton EC2 instances.

All features are available in the AWS Version and you can use VT AIR as a firewall to protect your EC2 instances or as a VPN server to connect via IPSec, OpenVPN or WireGuard.

VT AIR AWS


In order to configure your AWS environment to utilize VT AIR as a firewall in front of other VMs, a couple of configuration steps have to be done.

  1. VPC configuration

    1. New VPC

    2. Public Subnet

    3. Private Subnet

    4. Public Routing Table

      • Internet Gateway for default route

    5. Private Routing Table

      • Default route pointing to VT AIR LAN interface

    6. Public Security Group

    7. Private Security Group

  2. EC2 VT AIR Appliance

    1. Public Network Interface (WAN)

      • In the Public Subnet

      • Public Security Group

    2. Private Network Interface (LAN)

      • In the Private Subnet

      • Private Security Group

    3. Disable Source and Destination Check

    4. Allocate Elastic IP

      • Connect to the Public Network Interface (WAN)

  3. VT AIR configuration

    1. Enable and set LAN Interface

    2. Create DNAT Rules and VPN Configuration

  4. EC2 VMs

    1. Add to the Private Network Subnet

    2. Set Private Security Group

3.8.1. Default Login

Default login data for the WebGUI are user admin and the password is the instance id of the VM. For example i-0198da08d22664a39. You can find the instance id in the ec2 console.

For SSH or the console the default user is admin and your ssh key from the instance launch is automatically added to the user. You can get root access by using sudo.

3.8.2. VPC Configuration

Login to your AWS Account and change to the VPC configuration page.

VT AIR AWS VPC


We have created videos to show the entire configurations.

3.8.2.1. New VPC

We will create a new VPC for the VT AIR setup. If you already have a VPC or two subnets configured, you can skip these steps.

Go to Your VPCs and click on Create VPC.

Choose VPC only give the VPC a name, in our case we choose VTAIR-VPC and select a network. The network has to be large enough to hold both the Public and Private Subnet. We are going to use 192.168.0.0/16.

VT AIR AWS VT AIR VPC


3.8.2.2. Public Subnet

Navigate to Subnets and click on Create subnet. Select the newly created VPC VTAIR VPC and give the subnet a name. We will use vtair-public-subnet and choose the first ip network 192.168.0.0/24.

Make sure to select the same availability zone for both subnets.

VT AIR AWS Public Subnet


3.8.2.3. Private Subnet

Navigate to Subnets and click on Create subnet. Select the newly created VPC VTAIR VPC and give the subnet a name. We will use vtair-private-subnet and choose the first ip network 192.168.1.0/24.

Make sure to select the same availability zone for both subnets.

VT AIR AWS Private Subnet


3.8.2.4. Public Routing Table

We will create a Public Routing Table that is used with the Public Subnet. It will contain an Internet Gateway that we connect to the default route of the Routing Table.

Navigate to Route Tables and click on Create route table. Select the newly created VPC VTAIR VPC and give the routing table a name. We will use vtair-public-routetable.

VT AIR AWS Public Routing Table

We need to connect the routing table to the Public Subnet.

Navigate to Subnets and select the vtair-public-subnet. In the menu on the bottom select the Route Table tab and press Edit route table association.

VT AIR AWS Public Routing Table Association

Select the vtair-public-routetable in the dropdown menu and save.

VT AIR AWS Public Routing Table Association


3.8.2.4.1. Internet Gateway

We need to create an Internet Gateway for the Public Routing Table as a default route. Navigate to Internet Gateways and click on Create internet gateway.

We will use the name vtair-public-gateway.

VT AIR AWS Internet Gateway

We now have to connect the Internet Gateway with the routing table. Navigate to Route Tables and click on the vtair-public-routetable. In the menu on the bottom select the Routes tab and press Edit routes.

VT AIR AWS Public Routing Edit Route

Create a new route with destination 0.0.0.0/0 and as target select Internet Gateway and select the newly created Gateway in the dropdown.

VT AIR AWS Public Routing Table Internet Gateway Association


3.8.2.5. Private Routing Table

We will create a Private Routing Table that is used with the Private Subnet. It will contain the VT AIR LAN Interface that we connect to the default route of the Routing Table. This step needs to be done after the VT AIR EC2 VM is up and running.

Navigate to Route Tables and click on Create route table. Select the newly created VPC VTAIR VPC and give the routing table a name. We will use vtair-private-routetable.

VT AIR AWS Private Routing Table

We need to connect the routing table to the Private Subnet.

Navigate to Subnets and select the vtair-private-subnet. In the menu on the bottom select the Route Table tab and press Edit route table association.

VT AIR AWS Private Routing Table Association

Select the vtair-private-routetable in the dropdown menu and save.

VT AIR AWS Private Routing Table Association


3.8.2.6. Public Security Group

We need to create a Public Security Group that will be associated with the VT AIR Public Network Interface. You can customize the group to your needs, we do recommend to add at least the following entries:

  • Port 22 (TCP)

  • Port 443 (TCP)

and depending on which VPN is used:

  • 1194 (UDP) for OpenVPN

  • 51280 (UDP) for Wireguard

  • 500 and 4500 (UDP) for IPSec

  • ESP/AH for IPSec

Navigate to Security Groups and click on Create security group. Select the newly created VPC VTAIR VPC and give the security group a name and a description. We will use VTAIR-Public-SecurityGroup and VT AIR Public Access.

VT AIR AWS Private Security Group

For the inbound traffic we created all rules above.

VT AIR AWS Private Security Group Inbound Rules


3.8.2.7. Private Security Group

We need to create a Private Security Group that will be associated with the VT AIR Private Network Interface. We will allow all traffic on the private side as it is protected by the VT AIR Firewall.

Navigate to Security Groups and click on Create security group. Select the newly created VPC VTAIR VPC and give the security group a name and a description. We will use VTAIR-Private-SecurityGroup and VT AIR Private Access.

VT AIR AWS Private Security Group

For the inbound traffic we created the allow all rule.

VT AIR AWS Private Security Group Inbound Rules


3.8.3. EC2 VT AIR Appliance

It is time to create and start the VT AIR Appliance.

We have created videos to show the entire configurations.

Navigate to EC2 and select Instances and press Launch instances.

VT AIR AWS EC2

We will name the instance VTAIR. Search for VT AIR in the Amazon Machine Image.

Choose your preferred Instance type.

Select your instance type and a key pair for the default SSH connection.

The instance will also be available via the webgui.

VT AIR AWS EC2 Instance


3.8.3.1. Public Network Interface (WAN)

In the network settings choose the create VPC VT AIR VPC. Also choose the public network vtair-public-subnet. You need to disable the Auto-assign public IP option as it will not working with multiple network interfaces.

VT AIR AWS EC2 Instance Network

For the security group select Select existing security group

Click on Advanced network configuration

The Network Interface 1 will be our Public Network Interface (WAN). Select the Security Group VTAIR-Public-SecurityGroup for this interface. We also want to give a static IP to the interface, the first 4 or 5 IPs are in use by the subnet so we start at 10. The IP is assigned via DHCP. We set the IP to 192.168.0.10.

VT AIR AWS EC2 Instance Network WAN


3.8.3.2. Private Network Interface (LAN)

Click on the Add network interface button to create a second interface for the LAN side. As subnet select vtair-private-subnet and also choose the security group VTAIR-Private-SecurityGroup

We also want to give a static IP to the interface, the first 4 or 5 IPs are in use by the subnet so we start at 10. The IP is assigned via DHCP. We set the IP to 192.168.1.10.

VT AIR AWS EC2 Instance Network LAN


3.8.3.3. Storage

Make sure to select a large enough storage space. We recommend 30GB or more.

All settings are finished, you can create and run the instance.

VT AIR AWS EC2 Instance Storage


3.8.3.4. Disable Source and Destination Check

In order to forward traffic, the option Disable Source and Destination Check has to be disabled. In EC2 -> Instances select the newly created VT AIR instance.

VT AIR AWS EC2 Instance Source and Destination Check

In the menu select Actions -> Networking -> Change source/destination check. A new popup will appear. Select the option Stop at the bottom and press Save

VT AIR AWS EC2 Instance Source and Destination Check


3.8.3.5. Allocate Elastic IP

For the VT AIR instance to be reachable via the internet, a new Elastic IP has to be created and attached to the Public Network Interface.

First go to EC2 -> Instances and write down the network interface names. Make sure to select the public network interface for the Elastic IP and the private network interface for the next step to connect it to the private routing table.

VT AIR AWS EC2 Instance Network Cards

Navigate to EC2 -> Network Security -> Elastic IP and click on Allocate Elastic IP address.

VT AIR AWS EC2 Instance Elastic IP Screen

Allocate the IP with the appropriate settings.

VT AIR AWS EC2 Instance Elastic IP Create

Select the newly created Elastic IP and click on the Action button. Choose the option Associate Elastic IP address and choose the option Network interface.

VT AIR AWS EC2 Instance Elastic IP Select

Look for the public network interface of the VT AIR instance and also select the IP address, in our case 192.168.0.10.

VT AIR AWS EC2 Instance Elastic IP Select

Save the settings.

3.8.3.5.1. Default route pointing to VT AIR LAN interface

The next step needs to be completed in the VPC settings. The Private Network Interface (LAN) needs to be the default gateway for the vtair-private-routetable

Navigate to Route Tables and click on the vtair-private-routetable. In the menu on the bottom select the Routes tab and press Edit routes.

VT AIR AWS Private Routing Edit Route

Create a new route with destination 0.0.0.0/0 and as target select Network Interface and select the Private Network Interface from the VT AIR instance.

VT AIR AWS Public Routing Table Private Gateway Association


3.8.4. VT AIR configuration

We will now need to login to the VT AIR instance webgui to configure the LAN interface and additional settings.

3.8.4.1. Enable and set LAN Interface

In the webgui navigate to Interfaces -> Assign. Select the edit button next to the LAN interface and assign the new interface to it.

VT AIR EC2 Instance LAN Assign

Switch to the LAN interface settings by going to Interfaces -> LAN. Enable the interface and set the IPv4 type to DHCP. Save the settings.

VT AIR EC2 Instance LAN Interface

This will enable the LAN interface and the IP 192.168.1.10 will be assigned.

VT AIR EC2 Instance Dashboard


3.8.4.2. Create DNAT Rules and VPN Configuration

You can now create all the different setting you need for your setup. To make instances behind VT AIR available to the elastic IP, configure a DNAT rule.

You can also configure the different VPN options.

3.8.5. EC2 VMs

Connect EC2 VMs to the private subnet so they are in the LAN network of the VT AIR.

We have created videos to show the entire configurations.

3.8.5.1. Add to the Private Network Subnet

If you have already running instances, you need to create an AMI image of the VM, stop it and relaunch it in the new VPC and private subnet. AWS unfortunately does not offer an option to move a running VM to the new VPC/subnet.

When you create a new VM, you can select the VPC and private subnet in the network settings when you create it.

VT AIR EC2 Server


3.8.5.2. Set Private Security Group

Make sure to select an appropriate Security Group so the VM can be accessed by the VT AIR.

VT AIR EC2 Server Security Group