Skip to main content

Extending l2 networks using wireguard & gretap

At some cases, you might need to extend a vlan over l3 links, and for some reason while;

  • you don't want to spend money on devices
  • change routing/interface configurations on firewalls.
  • No vxlan capable devices in use (i know, there vpls, l2tpv3 and some other solutions but hey it's linux so why not ?)

Then here is your solution, with a simple dnat entry you can extend your vlan.

In my case, customer was in need to backup their vm's using VMWare's replication to their DR center and whenever they needed, they do like to use the DR as Active data center. And changing configs on a disaster situation was the least they want to deal with.

Of course this is only a half of a complete DR solution may less, but restoring a services directly from DR was the requirement as i've been told.

Requirements:

  • 2 ubuntu 18.04 machines on both data centers
  • for each ubuntu vm 1 interface for l3 tunnel as underlay and one interface to use as tap to extend vlan
  • 2 cores were quite powerfull for 200 mbits of througput
  • 1 gb ram per machine
  • Allowing forged ethernet frames on both tap ports
  • 1 cup of coffee and a slice of good chestnut cake

Some caveats ;

  • good cpu = good throughput, and the opposite
  • do not loop !
  • be carefull with the Xstp or you might have a lame root bridge
  • My config was interface per vlan, so somone might have a trunk solution.
  • No HA solution, those machines needs to be monitored closely, use observium and it's agent

install wireguard

To install wireguard vpn on ubuntu 18.04

#sudo apt update
#sudo apt-get install libmnl-dev libelf-dev linux-headers-$(uname -r) build-essential pkg-config
#sudo apt install wireguard 

After installation you'll need to restart operating system and check for installed module, output should be as shown below.

#lsmod| grep wireguard
udp_tunnel	16384 1 wireguard
ip6_udp_tunnel 16384 1 wireguard

generete keys

Wireguard need public and private keys to operate, there is a tool called wg which can generate them as shown below

#wg genkey | sudo tee /etc/wireguard/privatekey | wg pubkey | sudo tee /etc/wireguard/publickey

You can find the keys at /etc/wireguard

create wireguard0.conf

You'll need to create a file called wireguard0.conf at /etc/wireguard

Contents of the file should be like this ;

For initiator:

[interface]
private_key= the_private_key_you_generated
address= 10.10.10.1/24 #ip address of the wireguard0 

[peer]
PublicKey = #he public key that you generated on the responder host
AllowedIPs = 10.10.10.0/24 #and the other networks that you'd like route through
EndPoint = internet_address:port 
PersistenKeepAlive = 15 #seconds

For responder:

[interface]
private_key= the_private_key_you_generated
address= 10.10.10.2/24 #ip address of the wireguard0 
listenPort = 4900

[peer]
PublicKey = #he public key that you generated on the initiator host
AllowedIPs = 10.10.10.0/24 #nd the other networks that you'd like route through
PersistenKeepAlive = 15 #seconds

initiate tunnel

to start the tunnel

wg-quick up wireguard0

to check the status

wg show wireguard0
interface: wireguard0
  public key: +/1R3JqLKlszbaGUSBtckoxNOMuSvLYKUCl03ShoFw8=
  private key: (hidden)
  listening port: 4900

peer: 2f/RmbuvKtR/L2ZFlQBHsVGkTXkA6d1pJO1ay5EjwSQ=
  endpoint: 172.21.23.111:49792
  allowed ips: 10.10.10.0/24, 192.168.5.0/24
  latest handshake: 1 minute, 31 seconds ago
  transfer: 19.10 MiB received, 11.95 MiB sent

install bridge-utils

To install bridge utils

#apt install bridge-utils

enable br_netfilter

to enable

#modprobe br_netfilter

to keep loading on boot

#sudo sh -c 'echo "br_netfilter" > /etc/modules-load.d/br_netfilter.conf'
#cat net.bridge.bridge-nf-call-ip6tables = 1 >> /etc/sysctl.d/bridge.conf

enable routing

To enable routing on the fly

sysctl -w net.ipv4.ip_forward=1

to make it permanent, add lines below to /etc/sysctl.conf ;

# Uncomment the next line to enable packet forwarding for IPv4
net.ipv4.ip_forward=1

fix mss on exit interface

When you are going to use ip tunnel for underlay and gretap for overlay, there will be some serious mss/mtu size problems to fix that, we need the br_netfilter module that we installed before and a special chain to limit the mss size to the max mtu of interface

#iptables -I FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu

We specially use -I to put it at the top of the forward chain.

configure gretap interface

For the initiator:

For responder

configure bridge

Now you will add the interfaces to bridge

#brctl addbr br0

add interfaces to bridge br0

#brctl addif br0 ens4
#brctl addif br0 gretap0

Bring everything up

#wp-quick up wireguard0
#ip link set up dev br0
#ip link set up dev gretap0
#ip link et up dev ens4

tests

do pings i've checked that dhcp is working,

what needs to be done are ;

  • Multicast packets
  • the situation about protocols like vrrp and hsrp
  • The effect of broadcast packets to cpu