To connect your on-premises data center or private network to your ECSs in a VPC, you need to create VPN connections after creating a VPN gateway and a customer gateway.
For higher reliability, you are advised to create a VPN connection between each of the two EIPs of a VPN gateway and a customer gateway.
Parameter |
Description |
Example Value |
---|---|---|
Name |
Name of a VPN connection. The value can contain only letters, digits, underscores (_), hyphens (-), and periods (.). |
vpn-001 |
VPN Gateway |
Name of the VPN gateway for which the VPN connection is created. You can also click Create VPN Gateway to create a VPN gateway. For details about related parameters, see Table 2. |
vpngw-001 |
Gateway IP Address |
IP address of the VPN gateway. The same EIP of a VPN gateway cannot be repeatedly selected when you create VPN connections between the VPN gateway and the same customer gateway. |
Available gateway IP address |
Customer Gateway |
Name of a customer gateway. You can also click Create Customer Gateway to create a customer gateway. For details about related parameters, see Table 1. NOTE:
If a customer gateway connects to multiple VPN gateways, the BGP ASNs and VPN types of the VPN gateways must be the same. |
cgw-001 |
VPN Type |
IPsec connection mode, which can be route-based or policy-based.
|
Static routing |
Customer Subnet |
Customer-side subnet that needs to access the VPC on the cloud through VPN connections. If there are multiple customer subnets, separate them with commas (,). NOTE:
|
172.16.1.0/24,172.16.2.0/24 |
Interface IP Address Assignment |
This parameter is available only when VPN Type is set to Static routing or BGP routing. NOTE:
|
Automatically assign |
Local Tunnel Interface Address |
This parameter is available only when Interface IP Address Assignment is set to Manually specify. Tunnel interface IP address configured on the VPN gateway. |
N/A |
Customer Tunnel Interface Address |
This parameter is available only when Interface IP Address Assignment is set to Manually specify. Tunnel interface IP address configured on the customer gateway device. |
N/A |
Link Detection |
This parameter is available only when VPN Type is set to Static routing. NOTE:
When enabling this function, ensure that the customer gateway supports ICMP and is correctly configured with the customer interface IP address of the VPN connection. Otherwise, traffic will fail to be forwarded. After this function is enabled, the VPN gateway automatically performs Network Quality Analysis (NQA) on the customer interface IP address of the customer gateway. |
Selected |
PSK |
The PSKs configured for the VPN gateway and customer gateway must be the same. The PSK:
|
Test@123 |
Confirm PSK |
Enter the PSK again. |
Test@123 |
Policy |
This parameter is available only when VPN Type is set to Policy-based. Defines the data flow that enters the encrypted VPN connection between the local and customer subnets. You need to configure the source and destination CIDR blocks in each policy rule. By default, a maximum of five policy rules can be configured. |
|
Advanced Settings |
Custom |
Parameter |
Description |
Example Value |
---|---|---|
Authentication Algorithm |
Hash algorithm used for authentication. The following options are available:
The default value is SHA2-256. |
SHA2-256 |
Encryption Algorithm |
Encryption algorithm. The following options are available:
The default value is AES-128. |
AES-128 |
PFS |
Algorithm used by the Perfect forward secrecy (PFS) function. PFS supports the following algorithms:
The default value is DH group 15. |
DH group 15 |
Transfer Protocol |
Security protocol used in IPsec to transmit and encapsulate user data. The following protocols are supported:
The default value is ESP. |
ESP |
Lifetime (s) |
Lifetime of an SA. An SA will be renegotiated when its lifetime expires.
|
3600 |
An IKE policy specifies the encryption and authentication algorithms to use in the negotiation phase of an IPsec tunnel. An IPsec policy specifies the protocol, encryption algorithm, and authentication algorithm to use in the data transmission phase of an IPsec tunnel. The policy settings for VPN connections must be the same at the VPC and on-premises data center sides. If they are different, VPN negotiation will fail, causing the failure to establish VPN connections.
The following algorithms are not recommended because they are not secure enough:
Because some customer devices do not support secure encryption algorithms, the default encryption algorithm of VPN connections is still AES-128. You are advised to use a more secure encryption algorithm if customer devices support secure encryption algorithms.
For details about IP address configuration, see Context.