Self-service IP allowlist management is not available for Site Factory subscribers.
This feature is not yet available to applications running on Cloud Next technologies.
Shield provides isolated networks for Cloud Platform applications. Subscriber deployments in an isolated network environment are separated from other subscriber deployments at the network level.
Shield combines the benefits of Cloud Platform-as-a-service with extra security benefits and capabilities, giving you a greater degree of isolation for your Cloud Platform instances.
Shield includes the following product features:
Shield access management: Provides self-service IP allowlisting for occasions when you must manage SSH access to the environments in your subscription. This feature is available only for Cloud Platform subscribers and not for Site Factory.
Private IP range with optional VPN connection: Adds an optional Virtual Private Network (VPN) hosted by Cloud Platform to connect between Cloud Platform and your private network. The VPN connection ensures you have secure bi-directional interaction between your websites and your internal IT systems (such as a CRM). Packaged in the price of Shield is the VPN configured to connect Cloud Platform with one subscriber-defined gateway device point. Added virtual private cloud (VPC) peering connections are available for a fee.
To enable the VPN, you must first buy a subscription to Cloud Platform.
If you change endpoints during the Subscription Term, you will incur added fees of $250 per hour of work. For Acquia to enable the VPN connection, you must meet the technical requirements described in the Amazon VPC FAQs.
AWS VPC Peering Connection: Enables a VPC peering connection between your Shield VPC and another AWS VPC. You can enable added VPC peering connections for a fee.
Note for Acquia Search users
Although you can access search from your Shield applications, the Acquia Search servers are located outside of your Shield dedicated section. Shield does not protect your search index, because of the Acquia Search servers’ location.
To use Shield, ensure you buy Shield with your Cloud Platform or Site Factory subscription. Acquia then provisions your servers within your dedicated network.
To use Shield with VPN, you must buy Shield with VPN and have either a Cloud Platform or Site Factory subscription. The following list describes the main steps to complete when configuring Shield with VPN:
You buy and deploy a VPN device.
You provide Acquia with detailed information about your VPN device, and your network.
Acquia provisions and configures a dedicated section for your applications.
Acquia provides you with the Internet Protocol Security (IPSec)/ Internet Key Exchange information to properly configure your VPN.
Shield supports Internet Key Exchange version 1 (IKEv1) and Internet Key Exchange version 2 (IKEv2).
For more information, see:
For Acquia to configure Shield, you must provide Acquia with the following information:
Contact information (such as name, phone, and email) for the members of your internal network team.
VPN device details:
VPN device type (vendor and model)
The Gateway IP address of the subscriber VPN device
Confirm your VPN device meets the requirements.
Network details, including the following:
A network diagram, showing which systems Shield will connect to
Maintenance plan or schedule for your network services and hardware
CIDR IP blocks
Shield requires a private, non-routable
private address space conforming with RFC 1597.
Shield can use private, non-routable
CIDR blocks from the
192.168.0.0/16 ranges. Blocks of this size provide resources for
Acquia-controlled servers (such as Elastic Load Balancers) and other
elastic scaling needs, and also provide expansion space for your
application’s future needs.
A list of networks requiring traffic statically routed to them
(Optional) A name for the Acquia VPN. If you have various VPNs, providing a name to Acquia may be useful for later communication.
Contact your Acquia Account Manager for more information.
To connect to Shield with VPN, your network must use a VPN (a secure Internet gateway) using IPsec. The gateway devices listed here are compatible with Shield with VPN. Other devices may work, but Acquia does not support them.
You must properly configure your network’s gateway to connect to Shield with VPN. After provisioning your dedicated section, Acquia will provide you with the configuration and VPN details containing the Pre-Shared Key (PSK) information you must use to properly configure your VPN. Using SSH, you will access the information stored in a secure location.
Shield uses Dead Peer Detection (DPD), exchanging UDP packets between VPN peers to ensure that both ends are available. If no traffic crosses the VPN tunnel in ten seconds, Shield sends a request. Three successive requests without a response will cause Shield to close the VPN tunnel.
After Acquia provisions Shield and provides connection information to you, it’s your responsibility to configure your VPN device, establish the secure tunnel, and keep the network connection alive.
You must also confirm your secondary tunnel is configured properly in case your primary tunnel becomes unavailable. When properly configured, your gateway must fail over to the secondary tunnel in your Shield tunnel pair, if needed.
Moving an existing application hosted by Cloud Platform or Site Factory to Shield with VPN will change your IP address, including any elastic IP addresses (EIPs). You can’t move IP addresses into or out of a VPC.
As a result, when you configure your application in Shield with VPN, you must point the DNS records of your application to the new IP address in the VPC. For more information, see Configuring DNS records for your application.