When you configure a VPN, perform the following operations on the on-premises gateway:
After the VPN configuration is complete, only the traffic matching the ACL rules enters the VPN tunnel.
For example, before a VPN is created, on-premises users access the ECS through the EIP bound to the ECS. After a VPN is created, data flows matching the firewall rules access the private IP address of the ECS through the VPN tunnel.