diff --git a/docs/vpn/umn/.placeholder b/docs/vpn/umn/.placeholder deleted file mode 100644 index e69de29b..00000000 diff --git a/docs/vpn/umn/ALL_META.TXT.json b/docs/vpn/umn/ALL_META.TXT.json index 8d6736bd..6995c1d1 100644 --- a/docs/vpn/umn/ALL_META.TXT.json +++ b/docs/vpn/umn/ALL_META.TXT.json @@ -1,372 +1,1981 @@ [ { - "uri":"en-us_topic_0035391332.html", + "dockw":"User Guide" + }, + { + "uri":"vpn_01_0000.html", + "node_id":"en-us_topic_0000001920877881.xml", "product_code":"vpn", "code":"1", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Overview", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], "title":"Overview", "githuburl":"" }, { "uri":"en-us_topic_0035391393.html", + "node_id":"en-us_topic_0000001937647830.xml", "product_code":"vpn", "code":"2", - "des":"A Virtual Private Network (VPN) establishes an encrypted, Internet-based communications tunnel between a user and a Virtual Private Cloud (VPC). With VPN, you can connect", + "des":"Virtual Private Network (VPN) establishes secure, reliable, and cost-effective encrypted connections between your on-premises network or data center and a virtual network", "doc_type":"usermanual", - "kw":"Virtual Private Network,Overview,User Guide", - "title":"Virtual Private Network", + "kw":"What Is VPN?,Overview,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"What Is VPN?", "githuburl":"" }, { - "uri":"en-us_topic_0160974607.html", + "uri":"vpn_01_0002.html", + "node_id":"en-us_topic_0000001937807170.xml", "product_code":"vpn", "code":"3", - "des":"The Internet Protocol Security (IPsec) VPN is an encrypted tunneling technology that uses encrypted security services to establish confidential and secure communication t", + "des":"Enterprise Edition VPN has the following advantages:High securityData is encrypted using IKE/IPsec, ensuring high data security.A VPN gateway is exclusive to a tenant, is", "doc_type":"usermanual", - "kw":"IPsec VPN,Overview,User Guide", - "title":"IPsec VPN", + "kw":"Product Advantages,Overview,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Product Advantages", "githuburl":"" }, { - "uri":"en-us_topic_0035391412.html", + "uri":"vpn_01_0032.html", + "node_id":"en-us_topic_0000001965006185.xml", "product_code":"vpn", "code":"4", - "des":"With the VPN between the VPC and your traditional data center, you can easily use the ECSs and block storage resources provided by the cloud platform.Applications can be ", + "des":"You can use a VPN to connect your on-premises data center to a VPC and use the elastic and fast scaling capabilities of the cloud to expand application computing capabili", "doc_type":"usermanual", "kw":"Application Scenarios,Overview,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], "title":"Application Scenarios", "githuburl":"" }, { - "uri":"en-us_topic_0081947484.html", + "uri":"vpn_01_0036.html", + "node_id":"en-us_topic_0000001699872529.xml", "product_code":"vpn", "code":"5", - "des":"The following standards and protocols are associated with the IPsec VPN:RFC 4301: Security Architecture for the Internet ProtocolRFC 2403: The Use of HMAC-MD5-96 within E", + "des":"The specification of a VPN gateway can be changed between Basic and Professional 1.The specification of a VPN gateway can be changed between Professional 1 and Profession", + "doc_type":"usermanual", + "kw":"Product Specifications,Overview,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Product Specifications", + "githuburl":"" + }, + { + "uri":"vpn_01_0005.html", + "node_id":"en-us_topic_0000001542174382.xml", + "product_code":"vpn", + "code":"6", + "des":"By default, the maximum length of TCP packets supported by a VPN gateway is 1300 bytes.Enable NAT traversal on the customer gateway based on the networking.If the custome", + "doc_type":"usermanual", + "kw":"Quotas and Limitations,Overview,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Quotas and Limitations", + "githuburl":"" + }, + { + "uri":"vpn_01_0006.html", + "node_id":"en-us_topic_0000001964846405.xml", + "product_code":"vpn", + "code":"7", + "des":"The following standards and protocols are associated with VPN:RFC 2403: The Use of HMAC-MD5-96 within ESP and AHRFC 2404: The Use of HMAC-SHA-1-96 within ESP and AHRFC 24", "doc_type":"usermanual", "kw":"Reference Standards and Protocols,Overview,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], "title":"Reference Standards and Protocols", "githuburl":"" }, { - "uri":"en-us_topic_0185622695.html", - "product_code":"vpn", - "code":"6", - "des":"A region and availability zone (AZ) identify the location of a data center. You can create resources in a specific region and AZ.A region is a physical data center, which", - "doc_type":"usermanual", - "kw":"Region and AZ,Overview,User Guide", - "title":"Region and AZ", - "githuburl":"" - }, - { - "uri":"en-us_topic_0035391382.html", - "product_code":"vpn", - "code":"7", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"usermanual", - "kw":"Getting Started", - "title":"Getting Started", - "githuburl":"" - }, - { - "uri":"en-us_topic_0122970066.html", + "uri":"vpn_01_0033.html", + "node_id":"en-us_topic_0000001937807178.xml", "product_code":"vpn", "code":"8", - "des":"A VPC provides an isolated virtual network for ECSs. You can configure and manage the network as required.Create a VPC by following the procedure provided in this section", - "doc_type":"usermanual", - "kw":"(Optional) Create a VPC,Getting Started,User Guide", - "title":"(Optional) Create a VPC", - "githuburl":"" - }, - { - "uri":"en-us_topic_0122970067.html", - "product_code":"vpn", - "code":"9", - "des":"You can add subnets during VPC creation. If required, you can also create subnets for an existing VPC.The created subnet is configured with DHCP by default. After an ECS ", - "doc_type":"usermanual", - "kw":"(Optional) Create a Subnet for the VPC,Getting Started,User Guide", - "title":"(Optional) Create a Subnet for the VPC", - "githuburl":"" - }, - { - "uri":"en-us_topic_0060118606.html", - "product_code":"vpn", - "code":"10", - "des":"By default, ECSs in a VPC cannot communicate with your data center or private network. To enable communication between them, use a VPN. You need to create a VPN in your V", - "doc_type":"usermanual", - "kw":"Creating a VPN,Getting Started,User Guide", - "title":"Creating a VPN", - "githuburl":"" - }, - { - "uri":"en-us_topic_0035634996.html", - "product_code":"vpn", - "code":"11", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", - "kw":"(Optional) Configure Security Group Rules", - "title":"(Optional) Configure Security Group Rules", + "kw":"Differences between Enterprise Edition VPN and Classic VPN,Overview,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Differences between Enterprise Edition VPN and Classic VPN", "githuburl":"" }, { - "uri":"en-us_topic_0013748715.html", + "uri":"vpn_08_1503.html", + "node_id":"en-us_topic_0000001964846401.xml", + "product_code":"vpn", + "code":"9", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Security", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Security", + "githuburl":"" + }, + { + "uri":"vpn_01_0020.html", + "node_id":"en-us_topic_0000001965006193.xml", + "product_code":"vpn", + "code":"10", + "des":"A VPN connection supports authentication of a customer gateway using a pre-shared key (PSK).The identity authentication succeeds and the VPN connection can be set up only", + "doc_type":"usermanual", + "kw":"Identity Authentication and Access Control,Security,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Identity Authentication and Access Control", + "githuburl":"" + }, + { + "uri":"vpn_01_0021.html", + "node_id":"en-us_topic_0000001964846421.xml", + "product_code":"vpn", + "code":"11", + "des":"VPN is a tunneling technology that provides IP-layer security using the IKE/IPsec protocol suite. It ensures confidentiality and integrity of IP data packets and prevents", + "doc_type":"usermanual", + "kw":"Data Protection Technologies,Security,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Data Protection Technologies", + "githuburl":"" + }, + { + "uri":"vpn_01_0022.html", + "node_id":"en-us_topic_0000001937647854.xml", "product_code":"vpn", "code":"12", - "des":"To improve ECS access security, you can create a security group, define security group rules, and add ECSs in the VPC to the security group. We recommend that you allocat", + "des":"VPN records the create, delete, and modify operations performed on all resources initiated by your account, and sends the records to Cloud Trace Service (CTS) in log file", "doc_type":"usermanual", - "kw":"Creating a Security Group,(Optional) Configure Security Group Rules,User Guide", - "title":"Creating a Security Group", + "kw":"Audit and Logs,Security,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Audit and Logs", "githuburl":"" }, { - "uri":"en-us_topic_0030969470.html", + "uri":"vpn_01_0023.html", + "node_id":"en-us_topic_0000001937807186.xml", "product_code":"vpn", "code":"13", - "des":"After a security group is created, you can add rules to the security group. A rule applies either to inbound traffic (ingress) or outbound traffic (egress). After ECSs ar", + "des":"VPN provides the dual-AZ disaster recovery function. You can create a VPN gateway in two AZs in the same region, and create a VPN connection between the customer gateway ", "doc_type":"usermanual", - "kw":"Adding a Security Group Rule,(Optional) Configure Security Group Rules,User Guide", - "title":"Adding a Security Group Rule", + "kw":"Service Resilience,Security,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Service Resilience", "githuburl":"" }, { - "uri":"en-us_topic_0030969471.html", + "uri":"vpn_01_0011.html", + "node_id":"en-us_topic_0000001965006205.xml", "product_code":"vpn", "code":"14", - "des":"If the source of an inbound security group rule or destination of an outbound security group rule needs to be changed, you need to first delete the security group rule an", + "des":"If you need to assign different permissions to personnel in your enterprise to access your VPN resources created on the cloud service platform, Identity and Access Manage", "doc_type":"usermanual", - "kw":"Deleting a Security Group Rule,(Optional) Configure Security Group Rules,User Guide", - "title":"Deleting a Security Group Rule", + "kw":"Permissions Management,Overview,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Permissions Management", "githuburl":"" }, { - "uri":"en-us_topic_0035391378.html", + "uri":"vpn_01_0034.html", + "node_id":"en-us_topic_0000001964846429.xml", "product_code":"vpn", "code":"15", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", - "kw":"Management", - "title":"Management", + "kw":"Basic Concepts", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Basic Concepts", "githuburl":"" }, { - "uri":"en-us_topic_0035506845.html", + "uri":"vpn_01_0035.html", + "node_id":"en-us_topic_0000001937647862.xml", "product_code":"vpn", "code":"16", - "des":"You can view details about an existing VPN.Log in to the management console.Click in the upper left corner and select the desired region and project.On the console homep", + "des":"Internet Protocol Security (IPsec) VPN uses a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication ", "doc_type":"usermanual", - "kw":"Viewing a VPN,Management,User Guide", - "title":"Viewing a VPN", + "kw":"IPsec VPN,Basic Concepts,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"IPsec VPN", "githuburl":"" }, { - "uri":"en-us_topic_0035391295.html", + "uri":"vpn_08_1504.html", + "node_id":"en-us_topic_0000001937807198.xml", "product_code":"vpn", "code":"17", - "des":"If the VPN network information conflicts the VPC network information or you need to adjust VPN configurations, you can modify a VPN.Log in to the management console.Click", + "des":"SSL VPN is a virtual private network technology using the SSL protocol. It allows remote users to securely access enterprise intranet resources.", "doc_type":"usermanual", - "kw":"Modifying a VPN,Management,User Guide", - "title":"Modifying a VPN", + "kw":"SSL VPN,Basic Concepts,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"SSL VPN", "githuburl":"" }, { - "uri":"en-us_topic_0035616925.html", + "uri":"vpn_01_0012.html", + "node_id":"en-us_topic_0000001965006209.xml", "product_code":"vpn", "code":"18", - "des":"You can delete a VPN to release network resources if the VPN is no longer required.Log in to the management console.Click in the upper left corner and select a region an", + "des":"A VPN gateway is a virtual gateway of VPN on the cloud. It establishes secure private connections with a customer gateway in your on-premises network or data center.A VPN", "doc_type":"usermanual", - "kw":"Deleting a VPN,Management,User Guide", - "title":"Deleting a VPN", + "kw":"VPN Gateway,Basic Concepts,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"VPN Gateway", "githuburl":"" }, { - "uri":"en-us_topic_0107396413.html", + "uri":"vpn_01_0013.html", + "node_id":"en-us_topic_0000001964846441.xml", "product_code":"vpn", "code":"19", - "des":"A VPN tag identifies a VPN. Tags can be added to VPNs to facilitate VPN identification and administration. You can add a tag to a VPN when creating the VPN. Alternatively", + "des":"A VPN connection is a secure channel between a VPN gateway and a customer gateway. VPN connections use the IKE and IPsec protocols to encrypt the transmitted data.A VPN c", "doc_type":"usermanual", - "kw":"Managing VPN Tags,Management,User Guide", - "title":"Managing VPN Tags", + "kw":"VPN Connection,Basic Concepts,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"VPN Connection", "githuburl":"" }, { - "uri":"en-us_topic_0114174493.html", + "uri":"vpn_01_0014.html", + "node_id":"en-us_topic_0000001937647870.xml", "product_code":"vpn", "code":"20", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "des":"The bandwidth you purchased for a VPN gateway refers to outbound bandwidth, that is, bandwidth for traffic sent from a VPC on the cloud to a customer gateway in an on-pre", "doc_type":"usermanual", - "kw":"VPN Best Practice", - "title":"VPN Best Practice", + "kw":"VPN Gateway Bandwidth,Basic Concepts,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"VPN Gateway Bandwidth", "githuburl":"" }, { - "uri":"en-us_topic_0066871940.html", + "uri":"vpn_01_0015.html", + "node_id":"en-us_topic_0000001937807218.xml", "product_code":"vpn", "code":"21", - "des":"By default, ECSs in a VPC cannot communicate with your data center or private network. To enable communication between them, use a VPN. After a VPN is created, configure ", + "des":"Local subnets are VPC subnets that need to communicate with an on-premises network through VPN. When you buy a VPN gateway, you can set Local Subnet to either of the foll", "doc_type":"usermanual", - "kw":"Connecting to a VPC Through a VPN,VPN Best Practice,User Guide", - "title":"Connecting to a VPC Through a VPN", + "kw":"Local Subnet,Basic Concepts,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Local Subnet", "githuburl":"" }, { - "uri":"en-us_topic_0035391365.html", + "uri":"vpn_01_0016.html", + "node_id":"en-us_topic_0000001965006217.xml", "product_code":"vpn", "code":"22", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "des":"A customer gateway is a resource that provides information on the console about your customer gateway device, which can be a physical device or software application in yo", "doc_type":"usermanual", - "kw":"FAQs", - "title":"FAQs", + "kw":"Customer Gateway,Basic Concepts,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Customer Gateway", "githuburl":"" }, { - "uri":"vpn_faq_0021.html", + "uri":"vpn_01_0017.html", + "node_id":"en-us_topic_0000001964846449.xml", "product_code":"vpn", "code":"23", - "des":"By default, a user can have a maximum of five IPsec VPNs. If your quota cannot fulfill your service requirements, submit a service ticket to increase the quota.", + "des":"Customer subnets are subnets in an on-premises data center that access a VPC on the cloud through a VPN. You need to enter subnets using CIDR notation (example: 192.168.0", "doc_type":"usermanual", - "kw":"How Many IPsec VPNs Can I Have?,FAQs,User Guide", - "title":"How Many IPsec VPNs Can I Have?", + "kw":"Customer Subnet,Basic Concepts,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Customer Subnet", "githuburl":"" }, { - "uri":"en-us_topic_0036149069.html", + "uri":"vpn_01_0018.html", + "node_id":"en-us_topic_0000001937647878.xml", "product_code":"vpn", "code":"24", - "des":"The IPsec VPN tunnel works in passive mode, which triggers automatic negotiation only when traffic sent by the local end passes through the tunnel.", + "des":"A pre-shared key (PSK) is a key configured for a VPN connection on the cloud. It is used for IKE negotiation between VPN devices at both ends of a VPN connection. Ensure ", "doc_type":"usermanual", - "kw":"Do IPsec VPNs Support Automatic Negotiation?,FAQs,User Guide", - "title":"Do IPsec VPNs Support Automatic Negotiation?", + "kw":"PSK,Basic Concepts,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"PSK", "githuburl":"" }, { - "uri":"vpn_faq_0055.html", + "uri":"vpn_01_0027.html", + "node_id":"en-us_topic_0000001937807222.xml", "product_code":"vpn", "code":"25", - "des":"Log in to the management console and click Virtual Private Network.In the VPN list, locate the target VPN and click View Policyin the Operationcolumn to view IKE and IPse", + "des":"Regions and availability zones (AZs) identify the locations of data centers. You can create resources in regions and AZs.A region is a physical data center location. Each", "doc_type":"usermanual", - "kw":"What Do I Do If VPN Setup Fails?,FAQs,User Guide", - "title":"What Do I Do If VPN Setup Fails?", + "kw":"Region and AZ,Basic Concepts,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Region and AZ", "githuburl":"" }, { - "uri":"vpn_faq_0056.html", + "uri":"vpn_03_0000.html", + "node_id":"en-us_topic_0000001875078390.xml", "product_code":"vpn", "code":"26", - "des":"The security group denies the access from all sources by default. If you want to access your ECSs, modify the security group configuration and allow the access from the r", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", - "kw":"How Can I Handle the Failure in Accessing the ECSs from My Data Center or LAN Even If the VPN Has Be", - "title":"How Can I Handle the Failure in Accessing the ECSs from My Data Center or LAN Even If the VPN Has Been Set Up?", + "kw":"Getting Started", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Getting Started", "githuburl":"" }, { - "uri":"vpn_faq_0057.html", + "uri":"vpn_08_1505.html", + "node_id":"en-us_topic_0000001920890921.xml", "product_code":"vpn", "code":"27", - "des":"Check whether you have properly configured the firewall policies for the access from the public IP address of the cloud VPN to the public IP address of your data center o", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", - "kw":"What Do I Do If I Cannot Access My Data Center or LAN from the ECSs After a VPN Connection Has Been ", - "title":"What Do I Do If I Cannot Access My Data Center or LAN from the ECSs After a VPN Connection Has Been Set Up?", + "kw":"Enterprise Edition VPN", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Enterprise Edition VPN", "githuburl":"" }, { - "uri":"vpn_faq_0058.html", + "uri":"vpn_qs_00003.html", + "node_id":"en-us_topic_0000002000327309.xml", "product_code":"vpn", "code":"28", - "des":"If the two VPCs are in the same region, you can use a VPC peering connection to enable communication between them.If the two VPCs are in different regions, you can use a ", + "des":"The supported regions are subject to those available on the console.To meet business development requirements, enterprise A needs to implement communication between its o", "doc_type":"usermanual", - "kw":"Does a VPN Allow for Communication Between Two VPCs?,FAQs,User Guide", - "title":"Does a VPN Allow for Communication Between Two VPCs?", + "kw":"Overview,Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Overview", "githuburl":"" }, { - "uri":"en-us_topic_0044789110.html", + "uri":"vpn_03_0204.html", + "node_id":"en-us_topic_0000001963686660.xml", "product_code":"vpn", "code":"29", - "des":"The maximum number obtained by multiplying the number of local subnets and that of remote subnets cannot exceed 2500.", + "des":"A VPC has been created. For details about how to create a VPC, see the Virtual Private Cloud User Guide.Security group rules have been configured for ECSs in the VPC, and", "doc_type":"usermanual", - "kw":"What Is the Limitation on the Number of Local and Remote Subnets of a VPN?,FAQs,User Guide", - "title":"What Is the Limitation on the Number of Local and Remote Subnets of a VPN?", + "kw":"Step 1: Creating a VPN Gateway,Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Step 1: Creating a VPN Gateway", "githuburl":"" }, { - "uri":"en-us_topic_0045305370.html", + "uri":"vpn_qs_00007.html", + "node_id":"en-us_topic_0000002000246717.xml", "product_code":"vpn", "code":"30", - "des":"After a VPN is created, its status changes to Normalonly after the VMs or physical servers on the two sides of the VPN communicate with each other.IKE v1:If no traffic go", + "des":"The following describes only key parameters.Check the created customer gateway on the Customer Gateways page.", "doc_type":"usermanual", - "kw":"Why Is Not Connected Displayed as the Status for a Successfully Created VPN?,FAQs,User Guide", - "title":"Why Is Not Connected Displayed as the Status for a Successfully Created VPN?", + "kw":"Step 2: Creating a Customer Gateway,Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Step 2: Creating a Customer Gateway", "githuburl":"" }, { - "uri":"en-us_topic_0051518174.html", + "uri":"vpn_qs_00008.html", + "node_id":"en-us_topic_0000001963846432.xml", "product_code":"vpn", "code":"31", - "des":"The time required for VPN configurations to take effect increases linearly with the number obtained by multiplying the number of local subnets and that of remote subnets.", + "des":"The following describes only key parameters.Check the created VPN connection on the VPN Connections page. The initial state of the VPN connection is Creating. As the cust", "doc_type":"usermanual", - "kw":"How Long Is Required for Issued VPN Configurations to Take Effect?,FAQs,User Guide", - "title":"How Long Is Required for Issued VPN Configurations to Take Effect?", + "kw":"Step 3: Creating VPN Connection 1,Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Step 3: Creating VPN Connection 1", "githuburl":"" }, { - "uri":"en-us_topic_0109312453.html", + "uri":"vpn_03_0335.html", + "node_id":"en-us_topic_0000002000327313.xml", "product_code":"vpn", "code":"32", - "des":"Due to the symmetry of the tunnel, the VPN parameters configured on the cloud must be the same as those configured in your own data center. If they are different, a VPN c", + "des":"For VPN connection 2, you are advised to use the same settings as VPN connection 1, except the connection name, gateway IP address, local tunnel interface IP address, and", "doc_type":"usermanual", - "kw":"How Do I Configure a Remote Device for a VPN?,FAQs,User Guide", - "title":"How Do I Configure a Remote Device for a VPN?", + "kw":"Step 4: Creating VPN Connection 2,Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Step 4: Creating VPN Connection 2", "githuburl":"" }, { - "uri":"en-us_topic_0109676043.html", + "uri":"vpn_03_0336.html", + "node_id":"en-us_topic_0000001963686664.xml", "product_code":"vpn", "code":"33", - "des":"Most devices that meet IPsec VPN standard and reference protocol requirements can be used as the remote VPN devices, for example, Cisco ASA firewalls, Huawei USG6xxxxseri", + "des":"In this example, the customer gateway device is an AR router.In this command, 22.xx.xx.1 is the gateway address of the AR router's public IP address. Replace it with the ", "doc_type":"usermanual", - "kw":"Which Remote VPN Devices Are Supported?,FAQs,User Guide", - "title":"Which Remote VPN Devices Are Supported?", + "kw":"Step 5: Configuring the Customer Gateway Device,Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Step 5: Configuring the Customer Gateway Device", "githuburl":"" }, { - "uri":"en-us_topic_0142368417.html", + "uri":"vpn_03_0337.html", + "node_id":"en-us_topic_0000002000246725.xml", "product_code":"vpn", "code":"34", - "des":"You can perform the following steps to handle the issues:Check the ECS specifications. Rate limiting is not performed for the VPN ingress on the cloud, so the issue may b", + "des":"In this example, use VNC provided on the management console to log in to an ECS.ping 172.16.0.100172.16.0.100 is the IP address of a server in the on-premises data center", "doc_type":"usermanual", - "kw":"What Can I Do If the VPN Fails or the Network Speed of the VPN Is Slow?,FAQs,User Guide", - "title":"What Can I Do If the VPN Fails or the Network Speed of the VPN Is Slow?", + "kw":"Step 6: Verifying Network Connectivity,Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Step 6: Verifying Network Connectivity", "githuburl":"" }, { - "uri":"en-us_topic_0142373840.html", + "uri":"vpn_08_1507.html", + "node_id":"en-us_topic_0000001875091418.xml", "product_code":"vpn", "code":"35", - "des":"Currently, the VPN service does not support the SSL VPNs.", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", - "kw":"Are SSL VPNs Supported?,FAQs,User Guide", - "title":"Are SSL VPNs Supported?", + "kw":"Classic VPN", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Classic VPN", "githuburl":"" }, { - "uri":"en-us_topic_0035391366.html", + "uri":"vpn_03_0004.html", + "node_id":"en-us_topic_0000001963846436.xml", "product_code":"vpn", "code":"36", - "des":"Quotas are enforced for service resources on the platform to prevent unforeseen spikes in resource usage. Quotas can limit the number or amount of resources available to ", + "des":"By default, ECSs in a VPC cannot communicate with devices in your on-premises data center or private network. To enable communication between them, you can use a VPN by c", "doc_type":"usermanual", - "kw":"What Is the VPN Quota?,FAQs,User Guide", - "title":"What Is the VPN Quota?", + "kw":"Creating a VPN,Classic VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Creating a VPN", "githuburl":"" }, { - "uri":"en-us_topic_0041174633.html", + "uri":"vpn_04_0000.html", + "node_id":"en-us_topic_0000001920877885.xml", "product_code":"vpn", "code":"37", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", - "kw":"A Change History,User Guide", - "title":"A Change History", + "kw":"Management", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Management", + "githuburl":"" + }, + { + "uri":"vpn_08_1509.html", + "node_id":"en-us_topic_0000001921050589.xml", + "product_code":"vpn", + "code":"38", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Enterprise Edition VPN", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Enterprise Edition VPN", + "githuburl":"" + }, + { + "uri":"vpn_ug_00001.html", + "node_id":"en-us_topic_0000001592573629.xml", + "product_code":"vpn", + "code":"39", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Enterprise Edition VPN Gateway Management", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Enterprise Edition VPN Gateway Management", + "githuburl":"" + }, + { + "uri":"vpn_04_0421.html", + "node_id":"en-us_topic_0000001542174206.xml", + "product_code":"vpn", + "code":"40", + "des":"To connect your on-premises data center or private network to your ECSs in a VPC, you need to create a VPN gateway before creating a VPN connection.The recommended networ", + "doc_type":"usermanual", + "kw":"Creating a VPN Gateway,Enterprise Edition VPN Gateway Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Creating a VPN Gateway", + "githuburl":"" + }, + { + "uri":"vpn_ug_00002.html", + "node_id":"en-us_topic_0000001542333958.xml", + "product_code":"vpn", + "code":"41", + "des":"After creating a VPN gateway, you can view its details.Log in to the management console.Click in the upper left corner and select the desired region and project.Click i", + "doc_type":"usermanual", + "kw":"Viewing a VPN Gateway,Enterprise Edition VPN Gateway Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Viewing a VPN Gateway", + "githuburl":"" + }, + { + "uri":"vpn_ug_00003.html", + "node_id":"en-us_topic_0000001542014738.xml", + "product_code":"vpn", + "code":"42", + "des":"You can modify basic information about a VPN gateway, including the name and local subnet.Log in to the management console.Click in the upper left corner and select the ", + "doc_type":"usermanual", + "kw":"Modifying a VPN Gateway,Enterprise Edition VPN Gateway Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Modifying a VPN Gateway", + "githuburl":"" + }, + { + "uri":"vpn_ug_00004.html", + "node_id":"en-us_topic_0000001592573533.xml", + "product_code":"vpn", + "code":"43", + "des":"You can bind EIPs to a VPN gateway that has been created.Log in to the management console.Click in the upper left corner and select the desired region and project.Click ", + "doc_type":"usermanual", + "kw":"Binding an EIP to a VPN Gateway,Enterprise Edition VPN Gateway Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Binding an EIP to a VPN Gateway", + "githuburl":"" + }, + { + "uri":"vpn_04_0807.html", + "node_id":"en-us_topic_0000001592573841.xml", + "product_code":"vpn", + "code":"44", + "des":"After a VPN gateway is created, you can unbind an EIP from it.An EIP that is in use by a VPN connection cannot be unbound from a VPN gateway.Log in to the management cons", + "doc_type":"usermanual", + "kw":"Unbinding an EIP from a VPN Gateway,Enterprise Edition VPN Gateway Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Unbinding an EIP from a VPN Gateway", + "githuburl":"" + }, + { + "uri":"vpn_ug_00007.html", + "node_id":"en-us_topic_0000001592773781.xml", + "product_code":"vpn", + "code":"45", + "des":"You can delete a VPN gateway that is no longer required.The delete operation is not supported for a VPN gateway that is being created, updated, or deleted.If a VPN gatewa", + "doc_type":"usermanual", + "kw":"Deleting a VPN Gateway,Enterprise Edition VPN Gateway Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Deleting a VPN Gateway", + "githuburl":"" + }, + { + "uri":"vpn_ug_00008.html", + "node_id":"en-us_topic_0000001542173998.xml", + "product_code":"vpn", + "code":"46", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Customer Gateway Management of Enterprise Edition VPN", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Customer Gateway Management of Enterprise Edition VPN", + "githuburl":"" + }, + { + "uri":"vpn_04_0431.html", + "node_id":"en-us_topic_0000001542014850.xml", + "product_code":"vpn", + "code":"47", + "des":"To connect your on-premises data center or private network to your ECSs in a VPC, you need to create a customer gateway before creating a VPN connection.Log in to the man", + "doc_type":"usermanual", + "kw":"Creating a Customer Gateway,Customer Gateway Management of Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Creating a Customer Gateway", + "githuburl":"" + }, + { + "uri":"vpn_ug_00009.html", + "node_id":"en-us_topic_0000001542174362.xml", + "product_code":"vpn", + "code":"48", + "des":"After creating a customer gateway, you can view its details.Log in to the management console.Click in the upper left corner and select the desired region and project.Cli", + "doc_type":"usermanual", + "kw":"Viewing a Customer Gateway,Customer Gateway Management of Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Viewing a Customer Gateway", + "githuburl":"" + }, + { + "uri":"vpn_ug_00010.html", + "node_id":"en-us_topic_0000001592773721.xml", + "product_code":"vpn", + "code":"49", + "des":"After creating a customer gateway, you can modify its name.Log in to the management console.Click in the upper left corner and select the desired region and project.Clic", + "doc_type":"usermanual", + "kw":"Modifying a Customer Gateway,Customer Gateway Management of Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Modifying a Customer Gateway", + "githuburl":"" + }, + { + "uri":"vpn_ug_00011.html", + "node_id":"en-us_topic_0000001592694113.xml", + "product_code":"vpn", + "code":"50", + "des":"You can delete a customer gateway that you have created.Before deleting a customer gateway associated with a VPN connection, remove the customer gateway from the VPN conn", + "doc_type":"usermanual", + "kw":"Deleting a Customer Gateway,Customer Gateway Management of Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Deleting a Customer Gateway", + "githuburl":"" + }, + { + "uri":"vpn_ug_00012.html", + "node_id":"en-us_topic_0000001542334078.xml", + "product_code":"vpn", + "code":"51", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Enterprise Edition VPN Connection Management", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Enterprise Edition VPN Connection Management", + "githuburl":"" + }, + { + "uri":"vpn_04_0441.html", + "node_id":"en-us_topic_0000001592573765.xml", + "product_code":"vpn", + "code":"52", + "des":"To connect your on-premises data center or private network to your ECSs in a VPC, you need to create VPN connections after creating a VPN gateway and a customer gateway.W", + "doc_type":"usermanual", + "kw":"Creating a VPN Connection,Enterprise Edition VPN Connection Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Creating a VPN Connection", + "githuburl":"" + }, + { + "uri":"vpn_ug_00023.html", + "node_id":"en-us_topic_0000001671018948.xml", + "product_code":"vpn", + "code":"53", + "des":"After VPN connections are created, you can configure health check to enable the VPN gateway to send probe packets to the customer gateway to collect statistics about the ", + "doc_type":"usermanual", + "kw":"Configuring Health Check,Enterprise Edition VPN Connection Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Configuring Health Check", + "githuburl":"" + }, + { + "uri":"vpn_ug_00013.html", + "node_id":"en-us_topic_0000001542333826.xml", + "product_code":"vpn", + "code":"54", + "des":"After creating a VPN connection, you can view its details.Log in to the management console.Click in the upper left corner and select the desired region and project.Click", + "doc_type":"usermanual", + "kw":"Viewing a VPN Connection,Enterprise Edition VPN Connection Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Viewing a VPN Connection", + "githuburl":"" + }, + { + "uri":"vpn_ug_00014.html", + "node_id":"en-us_topic_0000001592773861.xml", + "product_code":"vpn", + "code":"55", + "des":"A VPN connection is an encrypted communications channel established between a VPN gateway in a VPC and a customer gateway in your on-premises data center. You can modify ", + "doc_type":"usermanual", + "kw":"Modifying a VPN Connection,Enterprise Edition VPN Connection Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Modifying a VPN Connection", + "githuburl":"" + }, + { + "uri":"vpn_04_1003.html", + "node_id":"en-us_topic_0000001542174334.xml", + "product_code":"vpn", + "code":"56", + "des":"If a VPN connection is no longer required, you can delete it to release network resources.Log in to the management console.Click in the upper left corner and select the ", + "doc_type":"usermanual", + "kw":"Deleting a VPN Connection,Enterprise Edition VPN Connection Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Deleting a VPN Connection", + "githuburl":"" + }, + { + "uri":"vpn_08_1511.html", + "node_id":"en-us_topic_0000001874931578.xml", + "product_code":"vpn", + "code":"57", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Classic VPN", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Classic VPN", + "githuburl":"" + }, + { + "uri":"vpn_04_0470.html", + "node_id":"en-us_topic_0000001542493834.xml", + "product_code":"vpn", + "code":"58", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Classic VPN Management", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Classic VPN Management", + "githuburl":"" + }, + { + "uri":"vpn_04_0002.html", + "node_id":"en-us_topic_0000001542494026.xml", + "product_code":"vpn", + "code":"59", + "des":"You can view details about an existing VPN.Log in to the management console.Click in the upper left corner and select the desired region and project.Click Service List a", + "doc_type":"usermanual", + "kw":"Viewing Created VPNs,Classic VPN Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Viewing Created VPNs", + "githuburl":"" + }, + { + "uri":"vpn_04_0003.html", + "node_id":"en-us_topic_0000001592573553.xml", + "product_code":"vpn", + "code":"60", + "des":"If VPN network information conflicts with VPC network information or needs to be adjusted based on the latest network environment, you can modify the VPN.Log in to the ma", + "doc_type":"usermanual", + "kw":"Modifying a Created VPN,Classic VPN Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Modifying a Created VPN", + "githuburl":"" + }, + { + "uri":"vpn_04_0004.html", + "node_id":"en-us_topic_0000001592773709.xml", + "product_code":"vpn", + "code":"61", + "des":"You can delete a VPN if it is no longer required.Log in to the management console.Click in the upper left corner and select the desired region and project.Click Service ", + "doc_type":"usermanual", + "kw":"Deleting a VPN,Classic VPN Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Deleting a VPN", + "githuburl":"" + }, + { + "uri":"vpn_04_0700.html", + "node_id":"en-us_topic_0000001875296738.xml", + "product_code":"vpn", + "code":"62", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Monitoring", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Monitoring", + "githuburl":"" + }, + { + "uri":"vpn_04_0701.html", + "node_id":"en-us_topic_0000001875136910.xml", + "product_code":"vpn", + "code":"63", + "des":"Cloud Eye lets you keep a close eye on the performance and resource utilization of VPNs, ensuring VPN reliability and availability. You can use Cloud Eye to automatically", + "doc_type":"usermanual", + "kw":"Monitoring VPN,Monitoring,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Monitoring VPN", + "githuburl":"" + }, + { + "uri":"vpn_04_0702.html", + "node_id":"en-us_topic_0000001921096257.xml", + "product_code":"vpn", + "code":"64", + "des":"This section describes monitored metrics reported by VPN to Cloud Eye as well as their namespaces and dimensions. You can use the Cloud Eye management console to query th", + "doc_type":"usermanual", + "kw":"Metrics (Enterprise Edition VPN),Monitoring,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Metrics (Enterprise Edition VPN)", + "githuburl":"" + }, + { + "uri":"vpn_04_0705.html", + "node_id":"en-us_topic_0000001921215905.xml", + "product_code":"vpn", + "code":"65", + "des":"This section describes monitored metrics reported by VPN to Cloud Eye as well as their namespaces and dimensions. You can use the Cloud Eye management console to query th", + "doc_type":"usermanual", + "kw":"Metrics (Classic VPN),Monitoring,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Metrics (Classic VPN)", + "githuburl":"" + }, + { + "uri":"vpn_04_0704.html", + "node_id":"en-us_topic_0000001875296742.xml", + "product_code":"vpn", + "code":"66", + "des":"View the VPN connection status and usages of bandwidth and EIP. You can view data of the last 1, 3, 12, or 24 hours, or last 7 days.Viewing metrics on the Cloud Eye conso", + "doc_type":"usermanual", + "kw":"Viewing Metrics,Monitoring,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Viewing Metrics", + "githuburl":"" + }, + { + "uri":"vpn_04_0703.html", + "node_id":"en-us_topic_0000001875136914.xml", + "product_code":"vpn", + "code":"67", + "des":"You can configure alarm rules on the Cloud Eye console to keep track of your VPN status at any time.Log in to the management console.Click in the upper left corner and s", + "doc_type":"usermanual", + "kw":"Creating Alarm Rules,Monitoring,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Creating Alarm Rules", + "githuburl":"" + }, + { + "uri":"vpn_ug_00016.html", + "node_id":"en-us_topic_0000001921096261.xml", + "product_code":"vpn", + "code":"68", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Audit", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Audit", + "githuburl":"" + }, + { + "uri":"vpn_ug_00017.html", + "node_id":"en-us_topic_0000001921215913.xml", + "product_code":"vpn", + "code":"69", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"VPN Operations That Can Be Recorded by CTS,Audit,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"VPN Operations That Can Be Recorded by CTS", + "githuburl":"" + }, + { + "uri":"vpn_ug_00018.html", + "node_id":"en-us_topic_0000001875296746.xml", + "product_code":"vpn", + "code":"70", + "des":"After you enable CTS and the management tracker is created, CTS starts recording operations performed on VPN resources. You can view the operation records in the last sev", + "doc_type":"usermanual", + "kw":"Querying CTS Traces,Audit,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Querying CTS Traces", + "githuburl":"" + }, + { + "uri":"vpn_04_1200.html", + "node_id":"en-us_topic_0000001875136918.xml", + "product_code":"vpn", + "code":"71", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Permissions Management", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Permissions Management", + "githuburl":"" + }, + { + "uri":"vpn_04_1201.html", + "node_id":"en-us_topic_0000001921096265.xml", + "product_code":"vpn", + "code":"72", + "des":"Use the Identity and Access Management (IAM) service to implement fine-grained permissions control over your VPN resources. With IAM, you can:Create IAM users for employe", + "doc_type":"usermanual", + "kw":"Creating a User and Granting VPN Permissions,Permissions Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Creating a User and Granting VPN Permissions", + "githuburl":"" + }, + { + "uri":"vpn_04_1202.html", + "node_id":"en-us_topic_0000001921215917.xml", + "product_code":"vpn", + "code":"73", + "des":"Custom policies can be created to supplement the system-defined policies of VPN.You can create custom policies in either of the following ways:Visual editor: Select cloud", + "doc_type":"usermanual", + "kw":"VPN Custom Policies,Permissions Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"VPN Custom Policies", + "githuburl":"" + }, + { + "uri":"vpn_08_1513.html", + "node_id":"en-us_topic_0000001917855174.xml", + "product_code":"vpn", + "code":"74", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Tag Management", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Tag Management", + "githuburl":"" + }, + { + "uri":"vpn_08_1514.html", + "node_id":"en-us_topic_0000001917695266.xml", + "product_code":"vpn", + "code":"75", + "des":"VPN tags are used to identify VPN resources, facilitating VPN resource identification and management. You can add tags for a VPN resource when you create the VPN resource", + "doc_type":"usermanual", + "kw":"Scenario,Tag Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Scenario", + "githuburl":"" + }, + { + "uri":"vpn_08_1515.html", + "node_id":"en-us_topic_0000001947814261.xml", + "product_code":"vpn", + "code":"76", + "des":"You can search for VPN gateways, customer gateways, and VPN connections based on the tag keys and values that have been added for these VPN resources.Searching for Enterp", + "doc_type":"usermanual", + "kw":"Searching for Resources by Tag,Tag Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Searching for Resources by Tag", + "githuburl":"" + }, + { + "uri":"vpn_08_1516.html", + "node_id":"en-us_topic_0000001917855182.xml", + "product_code":"vpn", + "code":"77", + "des":"You can add, delete, modify, and view tags of VPN gateways.Managing tags of Enterprise Edition VPN gatewaysLog in to the management console.Click in the upper left corne", + "doc_type":"usermanual", + "kw":"Managing Tags,Tag Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Managing Tags", + "githuburl":"" + }, + { + "uri":"vpn_04_0411.html", + "node_id":"en-us_topic_0000001875296754.xml", + "product_code":"vpn", + "code":"78", + "des":"VPN resources include VPN gateways, VPN connection groups, and customer gateways.The total quota of each resource type varies according to regions.", + "doc_type":"usermanual", + "kw":"Quotas,Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Quotas", + "githuburl":"" + }, + { + "uri":"vpn_09_0000.html", + "node_id":"en-us_topic_0000001990602386.xml", + "product_code":"vpn", + "code":"79", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Administrator Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Administrator Guide", + "githuburl":"" + }, + { + "uri":"vpn_admin_0016.html", + "node_id":"en-us_topic_0000001990762094.xml", + "product_code":"vpn", + "code":"80", + "des":"This section describes how to create a VPN gateway and VPN connections to connect your on-premises network to a VPC subnet if your local data center uses FortiGate firewa", + "doc_type":"usermanual", + "kw":"Configuring VPN When Fortinet FortiGate Firewall Is Used,Administrator Guide,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Configuring VPN When Fortinet FortiGate Firewall Is Used", + "githuburl":"" + }, + { + "uri":"vpn_08_0000.html", + "node_id":"en-us_topic_0000001921037529.xml", + "product_code":"vpn", + "code":"81", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"FAQs", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"FAQs", + "githuburl":"" + }, + { + "uri":"vpn_08_1517.html", + "node_id":"en-us_topic_0000001921050593.xml", + "product_code":"vpn", + "code":"82", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Enterprise Edition VPN", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Enterprise Edition VPN", + "githuburl":"" + }, + { + "uri":"vpn_faq_00031.html", + "node_id":"en-us_topic_0000001956631549.xml", + "product_code":"vpn", + "code":"83", + "des":"A VPN is a point-to-point connection that implements private network access between two points.Applicable scenarios:A VPN is created between different regions to enable c", + "doc_type":"usermanual", + "kw":"What Are the Typical Scenarios of IPsec VPN?,Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"What Are the Typical Scenarios of IPsec VPN?", + "githuburl":"" + }, + { + "uri":"vpn_faq_00032.html", + "node_id":"en-us_topic_0000001956471773.xml", + "product_code":"vpn", + "code":"84", + "des":"VPC enables you to create private, isolated virtual networks. You can use VPN to securely access ECSs in VPCs.A VPN gateway is an egress gateway for a VPC. With a VPN gat", + "doc_type":"usermanual", + "kw":"What Are a VPC, a VPN Gateway, and a VPN Connection?,Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"What Are a VPC, a VPN Gateway, and a VPN Connection?", + "githuburl":"" + }, + { + "uri":"vpn_faq_00036.html", + "node_id":"en-us_topic_0000001929312950.xml", + "product_code":"vpn", + "code":"85", + "des":"The CIDR blocks of a VPC cannot conflict with on-premises CIDR blocks.To avoid conflicts with cloud service addresses, do not use 127.0.0.0/8, 169.254.0.0/16, 224.0.0.0/3", + "doc_type":"usermanual", + "kw":"How Do I Plan CIDR Blocks for Access to a VPC Through a VPN Connection?,Enterprise Edition VPN,User ", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"How Do I Plan CIDR Blocks for Access to a VPC Through a VPN Connection?", + "githuburl":"" + }, + { + "uri":"vpn_faq_00037.html", + "node_id":"en-us_topic_0000001929472290.xml", + "product_code":"vpn", + "code":"86", + "des":"Yes. An IPsec VPN connection is automatically established.", + "doc_type":"usermanual", + "kw":"Is an IPsec VPN Connection Automatically Established?,Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Is an IPsec VPN Connection Automatically Established?", + "githuburl":"" + }, + { + "uri":"vpn_faq_00040.html", + "node_id":"en-us_topic_0000001956631553.xml", + "product_code":"vpn", + "code":"87", + "des":"Perfect Forward Secrecy (PFS) is a security feature.IKE negotiation has two phases, phase one and phase two. The key of phase two (IPsec SA) is derived from the key gener", + "doc_type":"usermanual", + "kw":"What Are VPN Negotiation Parameters? What Are Their Default Values?,Enterprise Edition VPN,User Guid", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"What Are VPN Negotiation Parameters? What Are Their Default Values?", + "githuburl":"" + }, + { + "uri":"vpn_faq_00041.html", + "node_id":"en-us_topic_0000001956471777.xml", + "product_code":"vpn", + "code":"88", + "des":"No. IPsec VPN uses a pre-shared key (PSK) for authentication. The PSK is configured on a VPN gateway, and a connection will be established after VPN negotiation is comple", + "doc_type":"usermanual", + "kw":"Are a Username and Password Required for Creating an IPsec VPN Connection?,Enterprise Edition VPN,Us", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Are a Username and Password Required for Creating an IPsec VPN Connection?", + "githuburl":"" + }, + { + "uri":"vpn_faq_00043.html", + "node_id":"en-us_topic_0000001929312954.xml", + "product_code":"vpn", + "code":"89", + "des":"VPN gatewayThe following bandwidth information of a VPN gateway IP address can be monitored: inbound traffic, inbound bandwidth, outbound traffic, outbound bandwidth, and", + "doc_type":"usermanual", + "kw":"What VPN Resources Can Be Monitored?,Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"What VPN Resources Can Be Monitored?", + "githuburl":"" + }, + { + "uri":"vpn_faq_00044.html", + "node_id":"en-us_topic_0000001929472294.xml", + "product_code":"vpn", + "code":"90", + "des":"Yes.When creating a VPN gateway, you can bind EIPs as the gateway IP addresses.", + "doc_type":"usermanual", + "kw":"Can EIPs Be Used as VPN Gateway IP Addresses?,Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Can EIPs Be Used as VPN Gateway IP Addresses?", + "githuburl":"" + }, + { + "uri":"vpn_faq_00051.html", + "node_id":"en-us_topic_0000001956631557.xml", + "product_code":"vpn", + "code":"91", + "des":"IKEv2 is recommended because IKEv1 is not secure. In addition, IKEv2 outperforms IKEv1 in connection negotiation and establishment, authentication methods, dead peer dete", + "doc_type":"usermanual", + "kw":"Which IKE Version Should I Select When I Create a VPN Connection?,Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Which IKE Version Should I Select When I Create a VPN Connection?", + "githuburl":"" + }, + { + "uri":"vpn_faq_00144.html", + "node_id":"en-us_topic_0000001956471781.xml", + "product_code":"vpn", + "code":"92", + "des":"Log in to the management console and choose Virtual Private Network > Enterprise – VPN Connections.In the VPN connection list, locate the target VPN connection, and choos", + "doc_type":"usermanual", + "kw":"What Do I Do If a VPN Connection Fails to Be Established?,Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"What Do I Do If a VPN Connection Fails to Be Established?", + "githuburl":"" + }, + { + "uri":"vpn_08_1518.html", + "node_id":"en-us_topic_0000001874931582.xml", + "product_code":"vpn", + "code":"93", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Classic VPN", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Classic VPN", + "githuburl":"" + }, + { + "uri":"vpn_08_0305.html", + "node_id":"en-us_topic_0000001929312958.xml", + "product_code":"vpn", + "code":"94", + "des":"IPsec VPN connects two LANs, such as a branch and its headquarters (or a VPC), or an on-premises data center and a VPC.SSL VPN connects a client to a LAN. For example, th", + "doc_type":"usermanual", + "kw":"What Are the Differences Between the Application Scenarios and Connection Modes of IPsec and SSL VPN", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"What Are the Differences Between the Application Scenarios and Connection Modes of IPsec and SSL VPNs?", + "githuburl":"" + }, + { + "uri":"vpn_08_0232.html", + "node_id":"en-us_topic_0000001929472298.xml", + "product_code":"vpn", + "code":"95", + "des":"When a VPN connection is created, routes are automatically delivered to reach the remote subnets.", + "doc_type":"usermanual", + "kw":"Where Can I Add Routes on the VPN Console to Reach the Remote Subnets?,Classic VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Where Can I Add Routes on the VPN Console to Reach the Remote Subnets?", + "githuburl":"" + }, + { + "uri":"vpn_08_0233.html", + "node_id":"en-us_topic_0000001956631561.xml", + "product_code":"vpn", + "code":"96", + "des":"The VPN connection status can be monitored. After a VPN connection is created, the VPN service reports the connection status information to Cloud Eye, but does not automa", + "doc_type":"usermanual", + "kw":"Will I Be Notified If a VPN Connection Is Interrupted?,Classic VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Will I Be Notified If a VPN Connection Is Interrupted?", + "githuburl":"" + }, + { + "uri":"vpn_08_0323.html", + "node_id":"en-us_topic_0000001956471785.xml", + "product_code":"vpn", + "code":"97", + "des":"VPN uses the IPsec technology to connect your on-premises data center to a VPC on the cloud. As such, the number of VPN connections is related to the number of data cente", + "doc_type":"usermanual", + "kw":"How Many VPN Connections Do I Need to Connect to Multiple On-premises Servers?,Classic VPN,User Guid", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"How Many VPN Connections Do I Need to Connect to Multiple On-premises Servers?", + "githuburl":"" + }, + { + "uri":"vpn_08_0325.html", + "node_id":"en-us_topic_0000001929472302.xml", + "product_code":"vpn", + "code":"98", + "des":"When you configure a VPN, perform the following operations on the on-premises gateway:Configure IKE and IPsec policies.Specify the to-be-protected traffic (firewall).Chec", + "doc_type":"usermanual", + "kw":"What Are the Impacts of a VPN on an On-premises Network? What Are the Changes to the Route for Acces", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"What Are the Impacts of a VPN on an On-premises Network? What Are the Changes to the Route for Accessing an ECS?", + "githuburl":"" + }, + { + "uri":"vpn_08_0312.html", + "node_id":"en-us_topic_0000001956631565.xml", + "product_code":"vpn", + "code":"99", + "des":"Ensure that the on-premises gateway supports IPsec VPN.Create a VPN gateway and a VPN connection on the cloud. Select the VPC to which the Direct Connect connection uses ", + "doc_type":"usermanual", + "kw":"How Do I Replace a Direct Connect Connection with a VPN?,Classic VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"How Do I Replace a Direct Connect Connection with a VPN?", + "githuburl":"" + }, + { + "uri":"vpn_08_0318.html", + "node_id":"en-us_topic_0000001956471789.xml", + "product_code":"vpn", + "code":"100", + "des":"A VPN connects a VPC on the cloud and an on-premises local area network (LAN).The home network is not a part of the LAN of your enterprise and cannot be directly connecte", + "doc_type":"usermanual", + "kw":"How Do I Access ECSs at Home When My Enterprise Network Has Been Connected to the Cloud Through a VP", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"How Do I Access ECSs at Home When My Enterprise Network Has Been Connected to the Cloud Through a VPN?", + "githuburl":"" + }, + { + "uri":"vpn_08_0614.html", + "node_id":"en-us_topic_0000001929472306.xml", + "product_code":"vpn", + "code":"101", + "des":"By default, DPD is enabled on the cloud side and cannot be disabled.Configure DPD as follows:DPD-type: on-demandDPD idle-time: 30sDPD retransmit-interval: 15sDPD retry-li", + "doc_type":"usermanual", + "kw":"How Do I Configure DPD for Interconnection with the Cloud?,Classic VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"How Do I Configure DPD for Interconnection with the Cloud?", + "githuburl":"" + }, + { + "uri":"vpn_08_1501.html", + "node_id":"en-us_topic_0000001979423939.xml", + "product_code":"vpn", + "code":"102", + "des":"Quotas can limit the number or amount of resources available to users, such as the maximum number of ECSs or EVS disks that can be created.If the existing resource quota ", + "doc_type":"usermanual", + "kw":"What Is the VPN Quota?,Classic VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"What Is the VPN Quota?", + "githuburl":"" + }, + { + "uri":"vpn_08_0713.html", + "node_id":"en-us_topic_0000001986263977.xml", + "product_code":"vpn", + "code":"103", + "des":"After a VPN connection is created, its status changes to Normal only after servers at both ends of the VPN connection communicate with each other.IKE v1:If no traffic goe", + "doc_type":"usermanual", + "kw":"Why Is Not Connected Displayed as the Status for a Successfully Created VPN Connection?,Classic VPN,", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Why Is Not Connected Displayed as the Status for a Successfully Created VPN Connection?", + "githuburl":"" + }, + { + "uri":"vpn_08_1519.html", + "node_id":"en-us_topic_0000001874918542.xml", + "product_code":"vpn", + "code":"104", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Change History,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Change History", "githuburl":"" } ] \ No newline at end of file diff --git a/docs/vpn/umn/CLASS.TXT.json b/docs/vpn/umn/CLASS.TXT.json index 07b96ae3..eaea4736 100644 --- a/docs/vpn/umn/CLASS.TXT.json +++ b/docs/vpn/umn/CLASS.TXT.json @@ -3,333 +3,936 @@ "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"vpn", "title":"Overview", - "uri":"en-us_topic_0035391332.html", + "uri":"vpn_01_0000.html", "doc_type":"usermanual", "p_code":"", "code":"1" }, { - "desc":"A Virtual Private Network (VPN) establishes an encrypted, Internet-based communications tunnel between a user and a Virtual Private Cloud (VPC). With VPN, you can connect", + "desc":"Virtual Private Network (VPN) establishes secure, reliable, and cost-effective encrypted connections between your on-premises network or data center and a virtual network", "product_code":"vpn", - "title":"Virtual Private Network", + "title":"What Is VPN?", "uri":"en-us_topic_0035391393.html", "doc_type":"usermanual", "p_code":"1", "code":"2" }, { - "desc":"The Internet Protocol Security (IPsec) VPN is an encrypted tunneling technology that uses encrypted security services to establish confidential and secure communication t", + "desc":"Enterprise Edition VPN has the following advantages:High securityData is encrypted using IKE/IPsec, ensuring high data security.A VPN gateway is exclusive to a tenant, is", "product_code":"vpn", - "title":"IPsec VPN", - "uri":"en-us_topic_0160974607.html", + "title":"Product Advantages", + "uri":"vpn_01_0002.html", "doc_type":"usermanual", "p_code":"1", "code":"3" }, { - "desc":"With the VPN between the VPC and your traditional data center, you can easily use the ECSs and block storage resources provided by the cloud platform.Applications can be ", + "desc":"You can use a VPN to connect your on-premises data center to a VPC and use the elastic and fast scaling capabilities of the cloud to expand application computing capabili", "product_code":"vpn", "title":"Application Scenarios", - "uri":"en-us_topic_0035391412.html", + "uri":"vpn_01_0032.html", "doc_type":"usermanual", "p_code":"1", "code":"4" }, { - "desc":"The following standards and protocols are associated with the IPsec VPN:RFC 4301: Security Architecture for the Internet ProtocolRFC 2403: The Use of HMAC-MD5-96 within E", + "desc":"The specification of a VPN gateway can be changed between Basic and Professional 1.The specification of a VPN gateway can be changed between Professional 1 and Profession", "product_code":"vpn", - "title":"Reference Standards and Protocols", - "uri":"en-us_topic_0081947484.html", + "title":"Product Specifications", + "uri":"vpn_01_0036.html", "doc_type":"usermanual", "p_code":"1", "code":"5" }, { - "desc":"A region and availability zone (AZ) identify the location of a data center. You can create resources in a specific region and AZ.A region is a physical data center, which", + "desc":"By default, the maximum length of TCP packets supported by a VPN gateway is 1300 bytes.Enable NAT traversal on the customer gateway based on the networking.If the custome", "product_code":"vpn", - "title":"Region and AZ", - "uri":"en-us_topic_0185622695.html", + "title":"Quotas and Limitations", + "uri":"vpn_01_0005.html", "doc_type":"usermanual", "p_code":"1", "code":"6" }, { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "desc":"The following standards and protocols are associated with VPN:RFC 2403: The Use of HMAC-MD5-96 within ESP and AHRFC 2404: The Use of HMAC-SHA-1-96 within ESP and AHRFC 24", "product_code":"vpn", - "title":"Getting Started", - "uri":"en-us_topic_0035391382.html", + "title":"Reference Standards and Protocols", + "uri":"vpn_01_0006.html", "doc_type":"usermanual", - "p_code":"", + "p_code":"1", "code":"7" }, { - "desc":"A VPC provides an isolated virtual network for ECSs. You can configure and manage the network as required.Create a VPC by following the procedure provided in this section", + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"vpn", - "title":"(Optional) Create a VPC", - "uri":"en-us_topic_0122970066.html", + "title":"Differences between Enterprise Edition VPN and Classic VPN", + "uri":"vpn_01_0033.html", "doc_type":"usermanual", - "p_code":"7", + "p_code":"1", "code":"8" }, - { - "desc":"You can add subnets during VPC creation. If required, you can also create subnets for an existing VPC.The created subnet is configured with DHCP by default. After an ECS ", - "product_code":"vpn", - "title":"(Optional) Create a Subnet for the VPC", - "uri":"en-us_topic_0122970067.html", - "doc_type":"usermanual", - "p_code":"7", - "code":"9" - }, - { - "desc":"By default, ECSs in a VPC cannot communicate with your data center or private network. To enable communication between them, use a VPN. You need to create a VPN in your V", - "product_code":"vpn", - "title":"Creating a VPN", - "uri":"en-us_topic_0060118606.html", - "doc_type":"usermanual", - "p_code":"7", - "code":"10" - }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"vpn", - "title":"(Optional) Configure Security Group Rules", - "uri":"en-us_topic_0035634996.html", + "title":"Security", + "uri":"vpn_08_1503.html", "doc_type":"usermanual", - "p_code":"7", + "p_code":"1", + "code":"9" + }, + { + "desc":"A VPN connection supports authentication of a customer gateway using a pre-shared key (PSK).The identity authentication succeeds and the VPN connection can be set up only", + "product_code":"vpn", + "title":"Identity Authentication and Access Control", + "uri":"vpn_01_0020.html", + "doc_type":"usermanual", + "p_code":"9", + "code":"10" + }, + { + "desc":"VPN is a tunneling technology that provides IP-layer security using the IKE/IPsec protocol suite. It ensures confidentiality and integrity of IP data packets and prevents", + "product_code":"vpn", + "title":"Data Protection Technologies", + "uri":"vpn_01_0021.html", + "doc_type":"usermanual", + "p_code":"9", "code":"11" }, { - "desc":"To improve ECS access security, you can create a security group, define security group rules, and add ECSs in the VPC to the security group. We recommend that you allocat", + "desc":"VPN records the create, delete, and modify operations performed on all resources initiated by your account, and sends the records to Cloud Trace Service (CTS) in log file", "product_code":"vpn", - "title":"Creating a Security Group", - "uri":"en-us_topic_0013748715.html", + "title":"Audit and Logs", + "uri":"vpn_01_0022.html", "doc_type":"usermanual", - "p_code":"11", + "p_code":"9", "code":"12" }, { - "desc":"After a security group is created, you can add rules to the security group. A rule applies either to inbound traffic (ingress) or outbound traffic (egress). After ECSs ar", + "desc":"VPN provides the dual-AZ disaster recovery function. You can create a VPN gateway in two AZs in the same region, and create a VPN connection between the customer gateway ", "product_code":"vpn", - "title":"Adding a Security Group Rule", - "uri":"en-us_topic_0030969470.html", + "title":"Service Resilience", + "uri":"vpn_01_0023.html", "doc_type":"usermanual", - "p_code":"11", + "p_code":"9", "code":"13" }, { - "desc":"If the source of an inbound security group rule or destination of an outbound security group rule needs to be changed, you need to first delete the security group rule an", + "desc":"If you need to assign different permissions to personnel in your enterprise to access your VPN resources created on the cloud service platform, Identity and Access Manage", "product_code":"vpn", - "title":"Deleting a Security Group Rule", - "uri":"en-us_topic_0030969471.html", + "title":"Permissions Management", + "uri":"vpn_01_0011.html", "doc_type":"usermanual", - "p_code":"11", + "p_code":"1", "code":"14" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"vpn", - "title":"Management", - "uri":"en-us_topic_0035391378.html", + "title":"Basic Concepts", + "uri":"vpn_01_0034.html", "doc_type":"usermanual", - "p_code":"", + "p_code":"1", "code":"15" }, { - "desc":"You can view details about an existing VPN.Log in to the management console.Click in the upper left corner and select the desired region and project.On the console homep", + "desc":"Internet Protocol Security (IPsec) VPN uses a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication ", "product_code":"vpn", - "title":"Viewing a VPN", - "uri":"en-us_topic_0035506845.html", + "title":"IPsec VPN", + "uri":"vpn_01_0035.html", "doc_type":"usermanual", "p_code":"15", "code":"16" }, { - "desc":"If the VPN network information conflicts the VPC network information or you need to adjust VPN configurations, you can modify a VPN.Log in to the management console.Click", + "desc":"SSL VPN is a virtual private network technology using the SSL protocol. It allows remote users to securely access enterprise intranet resources.", "product_code":"vpn", - "title":"Modifying a VPN", - "uri":"en-us_topic_0035391295.html", + "title":"SSL VPN", + "uri":"vpn_08_1504.html", "doc_type":"usermanual", "p_code":"15", "code":"17" }, { - "desc":"You can delete a VPN to release network resources if the VPN is no longer required.Log in to the management console.Click in the upper left corner and select a region an", + "desc":"A VPN gateway is a virtual gateway of VPN on the cloud. It establishes secure private connections with a customer gateway in your on-premises network or data center.A VPN", "product_code":"vpn", - "title":"Deleting a VPN", - "uri":"en-us_topic_0035616925.html", + "title":"VPN Gateway", + "uri":"vpn_01_0012.html", "doc_type":"usermanual", "p_code":"15", "code":"18" }, { - "desc":"A VPN tag identifies a VPN. Tags can be added to VPNs to facilitate VPN identification and administration. You can add a tag to a VPN when creating the VPN. Alternatively", + "desc":"A VPN connection is a secure channel between a VPN gateway and a customer gateway. VPN connections use the IKE and IPsec protocols to encrypt the transmitted data.A VPN c", "product_code":"vpn", - "title":"Managing VPN Tags", - "uri":"en-us_topic_0107396413.html", + "title":"VPN Connection", + "uri":"vpn_01_0013.html", "doc_type":"usermanual", "p_code":"15", "code":"19" }, { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "desc":"The bandwidth you purchased for a VPN gateway refers to outbound bandwidth, that is, bandwidth for traffic sent from a VPC on the cloud to a customer gateway in an on-pre", "product_code":"vpn", - "title":"VPN Best Practice", - "uri":"en-us_topic_0114174493.html", + "title":"VPN Gateway Bandwidth", + "uri":"vpn_01_0014.html", "doc_type":"usermanual", - "p_code":"", + "p_code":"15", "code":"20" }, { - "desc":"By default, ECSs in a VPC cannot communicate with your data center or private network. To enable communication between them, use a VPN. After a VPN is created, configure ", + "desc":"Local subnets are VPC subnets that need to communicate with an on-premises network through VPN. When you buy a VPN gateway, you can set Local Subnet to either of the foll", "product_code":"vpn", - "title":"Connecting to a VPC Through a VPN", - "uri":"en-us_topic_0066871940.html", + "title":"Local Subnet", + "uri":"vpn_01_0015.html", "doc_type":"usermanual", - "p_code":"20", + "p_code":"15", "code":"21" }, + { + "desc":"A customer gateway is a resource that provides information on the console about your customer gateway device, which can be a physical device or software application in yo", + "product_code":"vpn", + "title":"Customer Gateway", + "uri":"vpn_01_0016.html", + "doc_type":"usermanual", + "p_code":"15", + "code":"22" + }, + { + "desc":"Customer subnets are subnets in an on-premises data center that access a VPC on the cloud through a VPN. You need to enter subnets using CIDR notation (example: 192.168.0", + "product_code":"vpn", + "title":"Customer Subnet", + "uri":"vpn_01_0017.html", + "doc_type":"usermanual", + "p_code":"15", + "code":"23" + }, + { + "desc":"A pre-shared key (PSK) is a key configured for a VPN connection on the cloud. It is used for IKE negotiation between VPN devices at both ends of a VPN connection. Ensure ", + "product_code":"vpn", + "title":"PSK", + "uri":"vpn_01_0018.html", + "doc_type":"usermanual", + "p_code":"15", + "code":"24" + }, + { + "desc":"Regions and availability zones (AZs) identify the locations of data centers. You can create resources in regions and AZs.A region is a physical data center location. Each", + "product_code":"vpn", + "title":"Region and AZ", + "uri":"vpn_01_0027.html", + "doc_type":"usermanual", + "p_code":"15", + "code":"25" + }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"vpn", - "title":"FAQs", - "uri":"en-us_topic_0035391365.html", + "title":"Getting Started", + "uri":"vpn_03_0000.html", "doc_type":"usermanual", "p_code":"", - "code":"22" - }, - { - "desc":"By default, a user can have a maximum of five IPsec VPNs. If your quota cannot fulfill your service requirements, submit a service ticket to increase the quota.", - "product_code":"vpn", - "title":"How Many IPsec VPNs Can I Have?", - "uri":"vpn_faq_0021.html", - "doc_type":"usermanual", - "p_code":"22", - "code":"23" - }, - { - "desc":"The IPsec VPN tunnel works in passive mode, which triggers automatic negotiation only when traffic sent by the local end passes through the tunnel.", - "product_code":"vpn", - "title":"Do IPsec VPNs Support Automatic Negotiation?", - "uri":"en-us_topic_0036149069.html", - "doc_type":"usermanual", - "p_code":"22", - "code":"24" - }, - { - "desc":"Log in to the management console and click Virtual Private Network.In the VPN list, locate the target VPN and click View Policyin the Operationcolumn to view IKE and IPse", - "product_code":"vpn", - "title":"What Do I Do If VPN Setup Fails?", - "uri":"vpn_faq_0055.html", - "doc_type":"usermanual", - "p_code":"22", - "code":"25" - }, - { - "desc":"The security group denies the access from all sources by default. If you want to access your ECSs, modify the security group configuration and allow the access from the r", - "product_code":"vpn", - "title":"How Can I Handle the Failure in Accessing the ECSs from My Data Center or LAN Even If the VPN Has Been Set Up?", - "uri":"vpn_faq_0056.html", - "doc_type":"usermanual", - "p_code":"22", "code":"26" }, { - "desc":"Check whether you have properly configured the firewall policies for the access from the public IP address of the cloud VPN to the public IP address of your data center o", + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"vpn", - "title":"What Do I Do If I Cannot Access My Data Center or LAN from the ECSs After a VPN Connection Has Been Set Up?", - "uri":"vpn_faq_0057.html", + "title":"Enterprise Edition VPN", + "uri":"vpn_08_1505.html", "doc_type":"usermanual", - "p_code":"22", + "p_code":"26", "code":"27" }, { - "desc":"If the two VPCs are in the same region, you can use a VPC peering connection to enable communication between them.If the two VPCs are in different regions, you can use a ", + "desc":"The supported regions are subject to those available on the console.To meet business development requirements, enterprise A needs to implement communication between its o", "product_code":"vpn", - "title":"Does a VPN Allow for Communication Between Two VPCs?", - "uri":"vpn_faq_0058.html", + "title":"Overview", + "uri":"vpn_qs_00003.html", "doc_type":"usermanual", - "p_code":"22", + "p_code":"27", "code":"28" }, { - "desc":"The maximum number obtained by multiplying the number of local subnets and that of remote subnets cannot exceed 2500.", + "desc":"A VPC has been created. For details about how to create a VPC, see the Virtual Private Cloud User Guide.Security group rules have been configured for ECSs in the VPC, and", "product_code":"vpn", - "title":"What Is the Limitation on the Number of Local and Remote Subnets of a VPN?", - "uri":"en-us_topic_0044789110.html", + "title":"Step 1: Creating a VPN Gateway", + "uri":"vpn_03_0204.html", "doc_type":"usermanual", - "p_code":"22", + "p_code":"27", "code":"29" }, { - "desc":"After a VPN is created, its status changes to Normalonly after the VMs or physical servers on the two sides of the VPN communicate with each other.IKE v1:If no traffic go", + "desc":"The following describes only key parameters.Check the created customer gateway on the Customer Gateways page.", "product_code":"vpn", - "title":"Why Is Not Connected Displayed as the Status for a Successfully Created VPN?", - "uri":"en-us_topic_0045305370.html", + "title":"Step 2: Creating a Customer Gateway", + "uri":"vpn_qs_00007.html", "doc_type":"usermanual", - "p_code":"22", + "p_code":"27", "code":"30" }, { - "desc":"The time required for VPN configurations to take effect increases linearly with the number obtained by multiplying the number of local subnets and that of remote subnets.", + "desc":"The following describes only key parameters.Check the created VPN connection on the VPN Connections page. The initial state of the VPN connection is Creating. As the cust", "product_code":"vpn", - "title":"How Long Is Required for Issued VPN Configurations to Take Effect?", - "uri":"en-us_topic_0051518174.html", + "title":"Step 3: Creating VPN Connection 1", + "uri":"vpn_qs_00008.html", "doc_type":"usermanual", - "p_code":"22", + "p_code":"27", "code":"31" }, { - "desc":"Due to the symmetry of the tunnel, the VPN parameters configured on the cloud must be the same as those configured in your own data center. If they are different, a VPN c", + "desc":"For VPN connection 2, you are advised to use the same settings as VPN connection 1, except the connection name, gateway IP address, local tunnel interface IP address, and", "product_code":"vpn", - "title":"How Do I Configure a Remote Device for a VPN?", - "uri":"en-us_topic_0109312453.html", + "title":"Step 4: Creating VPN Connection 2", + "uri":"vpn_03_0335.html", "doc_type":"usermanual", - "p_code":"22", + "p_code":"27", "code":"32" }, { - "desc":"Most devices that meet IPsec VPN standard and reference protocol requirements can be used as the remote VPN devices, for example, Cisco ASA firewalls, Huawei USG6xxxxseri", + "desc":"In this example, the customer gateway device is an AR router.In this command, 22.xx.xx.1 is the gateway address of the AR router's public IP address. Replace it with the ", "product_code":"vpn", - "title":"Which Remote VPN Devices Are Supported?", - "uri":"en-us_topic_0109676043.html", + "title":"Step 5: Configuring the Customer Gateway Device", + "uri":"vpn_03_0336.html", "doc_type":"usermanual", - "p_code":"22", + "p_code":"27", "code":"33" }, { - "desc":"You can perform the following steps to handle the issues:Check the ECS specifications. Rate limiting is not performed for the VPN ingress on the cloud, so the issue may b", + "desc":"In this example, use VNC provided on the management console to log in to an ECS.ping 172.16.0.100172.16.0.100 is the IP address of a server in the on-premises data center", "product_code":"vpn", - "title":"What Can I Do If the VPN Fails or the Network Speed of the VPN Is Slow?", - "uri":"en-us_topic_0142368417.html", + "title":"Step 6: Verifying Network Connectivity", + "uri":"vpn_03_0337.html", "doc_type":"usermanual", - "p_code":"22", + "p_code":"27", "code":"34" }, { - "desc":"Currently, the VPN service does not support the SSL VPNs.", + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"vpn", - "title":"Are SSL VPNs Supported?", - "uri":"en-us_topic_0142373840.html", + "title":"Classic VPN", + "uri":"vpn_08_1507.html", "doc_type":"usermanual", - "p_code":"22", + "p_code":"26", "code":"35" }, { - "desc":"Quotas are enforced for service resources on the platform to prevent unforeseen spikes in resource usage. Quotas can limit the number or amount of resources available to ", + "desc":"By default, ECSs in a VPC cannot communicate with devices in your on-premises data center or private network. To enable communication between them, you can use a VPN by c", "product_code":"vpn", - "title":"What Is the VPN Quota?", - "uri":"en-us_topic_0035391366.html", + "title":"Creating a VPN", + "uri":"vpn_03_0004.html", "doc_type":"usermanual", - "p_code":"22", + "p_code":"35", "code":"36" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"vpn", - "title":"A Change History", - "uri":"en-us_topic_0041174633.html", + "title":"Management", + "uri":"vpn_04_0000.html", "doc_type":"usermanual", "p_code":"", "code":"37" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"Enterprise Edition VPN", + "uri":"vpn_08_1509.html", + "doc_type":"usermanual", + "p_code":"37", + "code":"38" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"Enterprise Edition VPN Gateway Management", + "uri":"vpn_ug_00001.html", + "doc_type":"usermanual", + "p_code":"38", + "code":"39" + }, + { + "desc":"To connect your on-premises data center or private network to your ECSs in a VPC, you need to create a VPN gateway before creating a VPN connection.The recommended networ", + "product_code":"vpn", + "title":"Creating a VPN Gateway", + "uri":"vpn_04_0421.html", + "doc_type":"usermanual", + "p_code":"39", + "code":"40" + }, + { + "desc":"After creating a VPN gateway, you can view its details.Log in to the management console.Click in the upper left corner and select the desired region and project.Click i", + "product_code":"vpn", + "title":"Viewing a VPN Gateway", + "uri":"vpn_ug_00002.html", + "doc_type":"usermanual", + "p_code":"39", + "code":"41" + }, + { + "desc":"You can modify basic information about a VPN gateway, including the name and local subnet.Log in to the management console.Click in the upper left corner and select the ", + "product_code":"vpn", + "title":"Modifying a VPN Gateway", + "uri":"vpn_ug_00003.html", + "doc_type":"usermanual", + "p_code":"39", + "code":"42" + }, + { + "desc":"You can bind EIPs to a VPN gateway that has been created.Log in to the management console.Click in the upper left corner and select the desired region and project.Click ", + "product_code":"vpn", + "title":"Binding an EIP to a VPN Gateway", + "uri":"vpn_ug_00004.html", + "doc_type":"usermanual", + "p_code":"39", + "code":"43" + }, + { + "desc":"After a VPN gateway is created, you can unbind an EIP from it.An EIP that is in use by a VPN connection cannot be unbound from a VPN gateway.Log in to the management cons", + "product_code":"vpn", + "title":"Unbinding an EIP from a VPN Gateway", + "uri":"vpn_04_0807.html", + "doc_type":"usermanual", + "p_code":"39", + "code":"44" + }, + { + "desc":"You can delete a VPN gateway that is no longer required.The delete operation is not supported for a VPN gateway that is being created, updated, or deleted.If a VPN gatewa", + "product_code":"vpn", + "title":"Deleting a VPN Gateway", + "uri":"vpn_ug_00007.html", + "doc_type":"usermanual", + "p_code":"39", + "code":"45" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"Customer Gateway Management of Enterprise Edition VPN", + "uri":"vpn_ug_00008.html", + "doc_type":"usermanual", + "p_code":"38", + "code":"46" + }, + { + "desc":"To connect your on-premises data center or private network to your ECSs in a VPC, you need to create a customer gateway before creating a VPN connection.Log in to the man", + "product_code":"vpn", + "title":"Creating a Customer Gateway", + "uri":"vpn_04_0431.html", + "doc_type":"usermanual", + "p_code":"46", + "code":"47" + }, + { + "desc":"After creating a customer gateway, you can view its details.Log in to the management console.Click in the upper left corner and select the desired region and project.Cli", + "product_code":"vpn", + "title":"Viewing a Customer Gateway", + "uri":"vpn_ug_00009.html", + "doc_type":"usermanual", + "p_code":"46", + "code":"48" + }, + { + "desc":"After creating a customer gateway, you can modify its name.Log in to the management console.Click in the upper left corner and select the desired region and project.Clic", + "product_code":"vpn", + "title":"Modifying a Customer Gateway", + "uri":"vpn_ug_00010.html", + "doc_type":"usermanual", + "p_code":"46", + "code":"49" + }, + { + "desc":"You can delete a customer gateway that you have created.Before deleting a customer gateway associated with a VPN connection, remove the customer gateway from the VPN conn", + "product_code":"vpn", + "title":"Deleting a Customer Gateway", + "uri":"vpn_ug_00011.html", + "doc_type":"usermanual", + "p_code":"46", + "code":"50" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"Enterprise Edition VPN Connection Management", + "uri":"vpn_ug_00012.html", + "doc_type":"usermanual", + "p_code":"38", + "code":"51" + }, + { + "desc":"To connect your on-premises data center or private network to your ECSs in a VPC, you need to create VPN connections after creating a VPN gateway and a customer gateway.W", + "product_code":"vpn", + "title":"Creating a VPN Connection", + "uri":"vpn_04_0441.html", + "doc_type":"usermanual", + "p_code":"51", + "code":"52" + }, + { + "desc":"After VPN connections are created, you can configure health check to enable the VPN gateway to send probe packets to the customer gateway to collect statistics about the ", + "product_code":"vpn", + "title":"Configuring Health Check", + "uri":"vpn_ug_00023.html", + "doc_type":"usermanual", + "p_code":"51", + "code":"53" + }, + { + "desc":"After creating a VPN connection, you can view its details.Log in to the management console.Click in the upper left corner and select the desired region and project.Click", + "product_code":"vpn", + "title":"Viewing a VPN Connection", + "uri":"vpn_ug_00013.html", + "doc_type":"usermanual", + "p_code":"51", + "code":"54" + }, + { + "desc":"A VPN connection is an encrypted communications channel established between a VPN gateway in a VPC and a customer gateway in your on-premises data center. You can modify ", + "product_code":"vpn", + "title":"Modifying a VPN Connection", + "uri":"vpn_ug_00014.html", + "doc_type":"usermanual", + "p_code":"51", + "code":"55" + }, + { + "desc":"If a VPN connection is no longer required, you can delete it to release network resources.Log in to the management console.Click in the upper left corner and select the ", + "product_code":"vpn", + "title":"Deleting a VPN Connection", + "uri":"vpn_04_1003.html", + "doc_type":"usermanual", + "p_code":"51", + "code":"56" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"Classic VPN", + "uri":"vpn_08_1511.html", + "doc_type":"usermanual", + "p_code":"37", + "code":"57" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"Classic VPN Management", + "uri":"vpn_04_0470.html", + "doc_type":"usermanual", + "p_code":"57", + "code":"58" + }, + { + "desc":"You can view details about an existing VPN.Log in to the management console.Click in the upper left corner and select the desired region and project.Click Service List a", + "product_code":"vpn", + "title":"Viewing Created VPNs", + "uri":"vpn_04_0002.html", + "doc_type":"usermanual", + "p_code":"58", + "code":"59" + }, + { + "desc":"If VPN network information conflicts with VPC network information or needs to be adjusted based on the latest network environment, you can modify the VPN.Log in to the ma", + "product_code":"vpn", + "title":"Modifying a Created VPN", + "uri":"vpn_04_0003.html", + "doc_type":"usermanual", + "p_code":"58", + "code":"60" + }, + { + "desc":"You can delete a VPN if it is no longer required.Log in to the management console.Click in the upper left corner and select the desired region and project.Click Service ", + "product_code":"vpn", + "title":"Deleting a VPN", + "uri":"vpn_04_0004.html", + "doc_type":"usermanual", + "p_code":"58", + "code":"61" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"Monitoring", + "uri":"vpn_04_0700.html", + "doc_type":"usermanual", + "p_code":"37", + "code":"62" + }, + { + "desc":"Cloud Eye lets you keep a close eye on the performance and resource utilization of VPNs, ensuring VPN reliability and availability. You can use Cloud Eye to automatically", + "product_code":"vpn", + "title":"Monitoring VPN", + "uri":"vpn_04_0701.html", + "doc_type":"usermanual", + "p_code":"62", + "code":"63" + }, + { + "desc":"This section describes monitored metrics reported by VPN to Cloud Eye as well as their namespaces and dimensions. You can use the Cloud Eye management console to query th", + "product_code":"vpn", + "title":"Metrics (Enterprise Edition VPN)", + "uri":"vpn_04_0702.html", + "doc_type":"usermanual", + "p_code":"62", + "code":"64" + }, + { + "desc":"This section describes monitored metrics reported by VPN to Cloud Eye as well as their namespaces and dimensions. You can use the Cloud Eye management console to query th", + "product_code":"vpn", + "title":"Metrics (Classic VPN)", + "uri":"vpn_04_0705.html", + "doc_type":"usermanual", + "p_code":"62", + "code":"65" + }, + { + "desc":"View the VPN connection status and usages of bandwidth and EIP. You can view data of the last 1, 3, 12, or 24 hours, or last 7 days.Viewing metrics on the Cloud Eye conso", + "product_code":"vpn", + "title":"Viewing Metrics", + "uri":"vpn_04_0704.html", + "doc_type":"usermanual", + "p_code":"62", + "code":"66" + }, + { + "desc":"You can configure alarm rules on the Cloud Eye console to keep track of your VPN status at any time.Log in to the management console.Click in the upper left corner and s", + "product_code":"vpn", + "title":"Creating Alarm Rules", + "uri":"vpn_04_0703.html", + "doc_type":"usermanual", + "p_code":"62", + "code":"67" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"Audit", + "uri":"vpn_ug_00016.html", + "doc_type":"usermanual", + "p_code":"37", + "code":"68" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"VPN Operations That Can Be Recorded by CTS", + "uri":"vpn_ug_00017.html", + "doc_type":"usermanual", + "p_code":"68", + "code":"69" + }, + { + "desc":"After you enable CTS and the management tracker is created, CTS starts recording operations performed on VPN resources. You can view the operation records in the last sev", + "product_code":"vpn", + "title":"Querying CTS Traces", + "uri":"vpn_ug_00018.html", + "doc_type":"usermanual", + "p_code":"68", + "code":"70" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"Permissions Management", + "uri":"vpn_04_1200.html", + "doc_type":"usermanual", + "p_code":"37", + "code":"71" + }, + { + "desc":"Use the Identity and Access Management (IAM) service to implement fine-grained permissions control over your VPN resources. With IAM, you can:Create IAM users for employe", + "product_code":"vpn", + "title":"Creating a User and Granting VPN Permissions", + "uri":"vpn_04_1201.html", + "doc_type":"usermanual", + "p_code":"71", + "code":"72" + }, + { + "desc":"Custom policies can be created to supplement the system-defined policies of VPN.You can create custom policies in either of the following ways:Visual editor: Select cloud", + "product_code":"vpn", + "title":"VPN Custom Policies", + "uri":"vpn_04_1202.html", + "doc_type":"usermanual", + "p_code":"71", + "code":"73" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"Tag Management", + "uri":"vpn_08_1513.html", + "doc_type":"usermanual", + "p_code":"37", + "code":"74" + }, + { + "desc":"VPN tags are used to identify VPN resources, facilitating VPN resource identification and management. You can add tags for a VPN resource when you create the VPN resource", + "product_code":"vpn", + "title":"Scenario", + "uri":"vpn_08_1514.html", + "doc_type":"usermanual", + "p_code":"74", + "code":"75" + }, + { + "desc":"You can search for VPN gateways, customer gateways, and VPN connections based on the tag keys and values that have been added for these VPN resources.Searching for Enterp", + "product_code":"vpn", + "title":"Searching for Resources by Tag", + "uri":"vpn_08_1515.html", + "doc_type":"usermanual", + "p_code":"74", + "code":"76" + }, + { + "desc":"You can add, delete, modify, and view tags of VPN gateways.Managing tags of Enterprise Edition VPN gatewaysLog in to the management console.Click in the upper left corne", + "product_code":"vpn", + "title":"Managing Tags", + "uri":"vpn_08_1516.html", + "doc_type":"usermanual", + "p_code":"74", + "code":"77" + }, + { + "desc":"VPN resources include VPN gateways, VPN connection groups, and customer gateways.The total quota of each resource type varies according to regions.", + "product_code":"vpn", + "title":"Quotas", + "uri":"vpn_04_0411.html", + "doc_type":"usermanual", + "p_code":"37", + "code":"78" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"Administrator Guide", + "uri":"vpn_09_0000.html", + "doc_type":"usermanual", + "p_code":"", + "code":"79" + }, + { + "desc":"This section describes how to create a VPN gateway and VPN connections to connect your on-premises network to a VPC subnet if your local data center uses FortiGate firewa", + "product_code":"vpn", + "title":"Configuring VPN When Fortinet FortiGate Firewall Is Used", + "uri":"vpn_admin_0016.html", + "doc_type":"usermanual", + "p_code":"79", + "code":"80" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"FAQs", + "uri":"vpn_08_0000.html", + "doc_type":"usermanual", + "p_code":"", + "code":"81" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"Enterprise Edition VPN", + "uri":"vpn_08_1517.html", + "doc_type":"usermanual", + "p_code":"81", + "code":"82" + }, + { + "desc":"A VPN is a point-to-point connection that implements private network access between two points.Applicable scenarios:A VPN is created between different regions to enable c", + "product_code":"vpn", + "title":"What Are the Typical Scenarios of IPsec VPN?", + "uri":"vpn_faq_00031.html", + "doc_type":"usermanual", + "p_code":"82", + "code":"83" + }, + { + "desc":"VPC enables you to create private, isolated virtual networks. You can use VPN to securely access ECSs in VPCs.A VPN gateway is an egress gateway for a VPC. With a VPN gat", + "product_code":"vpn", + "title":"What Are a VPC, a VPN Gateway, and a VPN Connection?", + "uri":"vpn_faq_00032.html", + "doc_type":"usermanual", + "p_code":"82", + "code":"84" + }, + { + "desc":"The CIDR blocks of a VPC cannot conflict with on-premises CIDR blocks.To avoid conflicts with cloud service addresses, do not use 127.0.0.0/8, 169.254.0.0/16, 224.0.0.0/3", + "product_code":"vpn", + "title":"How Do I Plan CIDR Blocks for Access to a VPC Through a VPN Connection?", + "uri":"vpn_faq_00036.html", + "doc_type":"usermanual", + "p_code":"82", + "code":"85" + }, + { + "desc":"Yes. An IPsec VPN connection is automatically established.", + "product_code":"vpn", + "title":"Is an IPsec VPN Connection Automatically Established?", + "uri":"vpn_faq_00037.html", + "doc_type":"usermanual", + "p_code":"82", + "code":"86" + }, + { + "desc":"Perfect Forward Secrecy (PFS) is a security feature.IKE negotiation has two phases, phase one and phase two. The key of phase two (IPsec SA) is derived from the key gener", + "product_code":"vpn", + "title":"What Are VPN Negotiation Parameters? What Are Their Default Values?", + "uri":"vpn_faq_00040.html", + "doc_type":"usermanual", + "p_code":"82", + "code":"87" + }, + { + "desc":"No. IPsec VPN uses a pre-shared key (PSK) for authentication. The PSK is configured on a VPN gateway, and a connection will be established after VPN negotiation is comple", + "product_code":"vpn", + "title":"Are a Username and Password Required for Creating an IPsec VPN Connection?", + "uri":"vpn_faq_00041.html", + "doc_type":"usermanual", + "p_code":"82", + "code":"88" + }, + { + "desc":"VPN gatewayThe following bandwidth information of a VPN gateway IP address can be monitored: inbound traffic, inbound bandwidth, outbound traffic, outbound bandwidth, and", + "product_code":"vpn", + "title":"What VPN Resources Can Be Monitored?", + "uri":"vpn_faq_00043.html", + "doc_type":"usermanual", + "p_code":"82", + "code":"89" + }, + { + "desc":"Yes.When creating a VPN gateway, you can bind EIPs as the gateway IP addresses.", + "product_code":"vpn", + "title":"Can EIPs Be Used as VPN Gateway IP Addresses?", + "uri":"vpn_faq_00044.html", + "doc_type":"usermanual", + "p_code":"82", + "code":"90" + }, + { + "desc":"IKEv2 is recommended because IKEv1 is not secure. In addition, IKEv2 outperforms IKEv1 in connection negotiation and establishment, authentication methods, dead peer dete", + "product_code":"vpn", + "title":"Which IKE Version Should I Select When I Create a VPN Connection?", + "uri":"vpn_faq_00051.html", + "doc_type":"usermanual", + "p_code":"82", + "code":"91" + }, + { + "desc":"Log in to the management console and choose Virtual Private Network > Enterprise – VPN Connections.In the VPN connection list, locate the target VPN connection, and choos", + "product_code":"vpn", + "title":"What Do I Do If a VPN Connection Fails to Be Established?", + "uri":"vpn_faq_00144.html", + "doc_type":"usermanual", + "p_code":"82", + "code":"92" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"Classic VPN", + "uri":"vpn_08_1518.html", + "doc_type":"usermanual", + "p_code":"81", + "code":"93" + }, + { + "desc":"IPsec VPN connects two LANs, such as a branch and its headquarters (or a VPC), or an on-premises data center and a VPC.SSL VPN connects a client to a LAN. For example, th", + "product_code":"vpn", + "title":"What Are the Differences Between the Application Scenarios and Connection Modes of IPsec and SSL VPNs?", + "uri":"vpn_08_0305.html", + "doc_type":"usermanual", + "p_code":"93", + "code":"94" + }, + { + "desc":"When a VPN connection is created, routes are automatically delivered to reach the remote subnets.", + "product_code":"vpn", + "title":"Where Can I Add Routes on the VPN Console to Reach the Remote Subnets?", + "uri":"vpn_08_0232.html", + "doc_type":"usermanual", + "p_code":"93", + "code":"95" + }, + { + "desc":"The VPN connection status can be monitored. After a VPN connection is created, the VPN service reports the connection status information to Cloud Eye, but does not automa", + "product_code":"vpn", + "title":"Will I Be Notified If a VPN Connection Is Interrupted?", + "uri":"vpn_08_0233.html", + "doc_type":"usermanual", + "p_code":"93", + "code":"96" + }, + { + "desc":"VPN uses the IPsec technology to connect your on-premises data center to a VPC on the cloud. As such, the number of VPN connections is related to the number of data cente", + "product_code":"vpn", + "title":"How Many VPN Connections Do I Need to Connect to Multiple On-premises Servers?", + "uri":"vpn_08_0323.html", + "doc_type":"usermanual", + "p_code":"93", + "code":"97" + }, + { + "desc":"When you configure a VPN, perform the following operations on the on-premises gateway:Configure IKE and IPsec policies.Specify the to-be-protected traffic (firewall).Chec", + "product_code":"vpn", + "title":"What Are the Impacts of a VPN on an On-premises Network? What Are the Changes to the Route for Accessing an ECS?", + "uri":"vpn_08_0325.html", + "doc_type":"usermanual", + "p_code":"93", + "code":"98" + }, + { + "desc":"Ensure that the on-premises gateway supports IPsec VPN.Create a VPN gateway and a VPN connection on the cloud. Select the VPC to which the Direct Connect connection uses ", + "product_code":"vpn", + "title":"How Do I Replace a Direct Connect Connection with a VPN?", + "uri":"vpn_08_0312.html", + "doc_type":"usermanual", + "p_code":"93", + "code":"99" + }, + { + "desc":"A VPN connects a VPC on the cloud and an on-premises local area network (LAN).The home network is not a part of the LAN of your enterprise and cannot be directly connecte", + "product_code":"vpn", + "title":"How Do I Access ECSs at Home When My Enterprise Network Has Been Connected to the Cloud Through a VPN?", + "uri":"vpn_08_0318.html", + "doc_type":"usermanual", + "p_code":"93", + "code":"100" + }, + { + "desc":"By default, DPD is enabled on the cloud side and cannot be disabled.Configure DPD as follows:DPD-type: on-demandDPD idle-time: 30sDPD retransmit-interval: 15sDPD retry-li", + "product_code":"vpn", + "title":"How Do I Configure DPD for Interconnection with the Cloud?", + "uri":"vpn_08_0614.html", + "doc_type":"usermanual", + "p_code":"93", + "code":"101" + }, + { + "desc":"Quotas can limit the number or amount of resources available to users, such as the maximum number of ECSs or EVS disks that can be created.If the existing resource quota ", + "product_code":"vpn", + "title":"What Is the VPN Quota?", + "uri":"vpn_08_1501.html", + "doc_type":"usermanual", + "p_code":"93", + "code":"102" + }, + { + "desc":"After a VPN connection is created, its status changes to Normal only after servers at both ends of the VPN connection communicate with each other.IKE v1:If no traffic goe", + "product_code":"vpn", + "title":"Why Is Not Connected Displayed as the Status for a Successfully Created VPN Connection?", + "uri":"vpn_08_0713.html", + "doc_type":"usermanual", + "p_code":"93", + "code":"103" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"Change History", + "uri":"vpn_08_1519.html", + "doc_type":"usermanual", + "p_code":"", + "code":"104" } ] \ No newline at end of file diff --git a/docs/vpn/umn/en-us_image_0000001404528466.png b/docs/vpn/umn/en-us_image_0000001404528466.png deleted file mode 100644 index daf53fd4..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001404528466.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001404848230.jpg b/docs/vpn/umn/en-us_image_0000001404848230.jpg deleted file mode 100644 index b02afe63..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001404848230.jpg and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001405148354.jpg b/docs/vpn/umn/en-us_image_0000001405148354.jpg deleted file mode 100644 index 28092c10..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001405148354.jpg and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001405148570.png b/docs/vpn/umn/en-us_image_0000001405148570.png deleted file mode 100644 index fcd4cf4b..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001405148570.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001405151706.png b/docs/vpn/umn/en-us_image_0000001405151706.png deleted file mode 100644 index a06a2136..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001405151706.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001405171846.png b/docs/vpn/umn/en-us_image_0000001405171846.png deleted file mode 100644 index 1a8fd5bd..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001405171846.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001405176804.png b/docs/vpn/umn/en-us_image_0000001405176804.png deleted file mode 100644 index 28a39f44..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001405176804.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001405314402.jpg b/docs/vpn/umn/en-us_image_0000001405314402.jpg deleted file mode 100644 index 949fed3e..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001405314402.jpg and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001405317654.png b/docs/vpn/umn/en-us_image_0000001405317654.png deleted file mode 100644 index 9e0a935f..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001405317654.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001405485434.png b/docs/vpn/umn/en-us_image_0000001405485434.png deleted file mode 100644 index a06a2136..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001405485434.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001405496560.png b/docs/vpn/umn/en-us_image_0000001405496560.png deleted file mode 100644 index a06a2136..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001405496560.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001405630570.png b/docs/vpn/umn/en-us_image_0000001405630570.png deleted file mode 100644 index 10e3a9d7..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001405630570.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001405640430.png b/docs/vpn/umn/en-us_image_0000001405640430.png deleted file mode 100644 index 3880d33d..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001405640430.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001405646142.png b/docs/vpn/umn/en-us_image_0000001405646142.png deleted file mode 100644 index e2b98462..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001405646142.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001405650458.png b/docs/vpn/umn/en-us_image_0000001405650458.png deleted file mode 100644 index a06a2136..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001405650458.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001405655248.png b/docs/vpn/umn/en-us_image_0000001405655248.png deleted file mode 100644 index 8530092e..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001405655248.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001455555929.png b/docs/vpn/umn/en-us_image_0000001455555929.png deleted file mode 100644 index 5ac6e2e6..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001455555929.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001455557817.png b/docs/vpn/umn/en-us_image_0000001455557817.png deleted file mode 100644 index e65a9f18..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001455557817.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001455569161.png b/docs/vpn/umn/en-us_image_0000001455569161.png deleted file mode 100644 index a06a2136..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001455569161.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001455570241.png b/docs/vpn/umn/en-us_image_0000001455570241.png deleted file mode 100644 index a06a2136..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001455570241.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001455711269.jpg b/docs/vpn/umn/en-us_image_0000001455711269.jpg deleted file mode 100644 index 49464ad5..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001455711269.jpg and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001455717309.png b/docs/vpn/umn/en-us_image_0000001455717309.png deleted file mode 100644 index 3880d33d..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001455717309.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001455827749.jpg b/docs/vpn/umn/en-us_image_0000001455827749.jpg deleted file mode 100644 index 50d93d43..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001455827749.jpg and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001455829029.png b/docs/vpn/umn/en-us_image_0000001455829029.png deleted file mode 100644 index 3880d33d..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001455829029.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001455829553.jpg b/docs/vpn/umn/en-us_image_0000001455829553.jpg deleted file mode 100644 index 6c709cff..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001455829553.jpg and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001455845961.png b/docs/vpn/umn/en-us_image_0000001455845961.png deleted file mode 100644 index a06a2136..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001455845961.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001455909921.png b/docs/vpn/umn/en-us_image_0000001455909921.png deleted file mode 100644 index 3880d33d..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001455909921.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001455916097.png b/docs/vpn/umn/en-us_image_0000001455916097.png deleted file mode 100644 index 3880d33d..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001455916097.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0109860229.png b/docs/vpn/umn/en-us_image_0109860229.png deleted file mode 100644 index 32d225a3..00000000 Binary files a/docs/vpn/umn/en-us_image_0109860229.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0118534037.png b/docs/vpn/umn/en-us_image_0118534037.png deleted file mode 100644 index 595a9b05..00000000 Binary files a/docs/vpn/umn/en-us_image_0118534037.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0147165026.png b/docs/vpn/umn/en-us_image_0147165026.png deleted file mode 100644 index 1909444d..00000000 Binary files a/docs/vpn/umn/en-us_image_0147165026.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0154037992.png b/docs/vpn/umn/en-us_image_0154037992.png deleted file mode 100644 index 13e196ca..00000000 Binary files a/docs/vpn/umn/en-us_image_0154037992.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0155717676.png b/docs/vpn/umn/en-us_image_0155717676.png deleted file mode 100644 index 12f0d879..00000000 Binary files a/docs/vpn/umn/en-us_image_0155717676.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0155784843.png b/docs/vpn/umn/en-us_image_0155784843.png deleted file mode 100644 index cbb48915..00000000 Binary files a/docs/vpn/umn/en-us_image_0155784843.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0159197475.png b/docs/vpn/umn/en-us_image_0159197475.png deleted file mode 100644 index 33c84403..00000000 Binary files a/docs/vpn/umn/en-us_image_0159197475.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0159201188.png b/docs/vpn/umn/en-us_image_0159201188.png deleted file mode 100644 index 8e09bc61..00000000 Binary files a/docs/vpn/umn/en-us_image_0159201188.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0159206951.png b/docs/vpn/umn/en-us_image_0159206951.png deleted file mode 100644 index 1466ed0b..00000000 Binary files a/docs/vpn/umn/en-us_image_0159206951.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0160993816.png b/docs/vpn/umn/en-us_image_0160993816.png deleted file mode 100644 index 8f203989..00000000 Binary files a/docs/vpn/umn/en-us_image_0160993816.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0161052507.png b/docs/vpn/umn/en-us_image_0161052507.png deleted file mode 100644 index 1909444d..00000000 Binary files a/docs/vpn/umn/en-us_image_0161052507.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0161052509.png b/docs/vpn/umn/en-us_image_0161052509.png deleted file mode 100644 index 3322328b..00000000 Binary files a/docs/vpn/umn/en-us_image_0161052509.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0170041086.png b/docs/vpn/umn/en-us_image_0170041086.png deleted file mode 100644 index e6ce3d56..00000000 Binary files a/docs/vpn/umn/en-us_image_0170041086.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0210485645.png b/docs/vpn/umn/en-us_image_0210485645.png deleted file mode 100644 index 5666bb1f..00000000 Binary files a/docs/vpn/umn/en-us_image_0210485645.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0210486152.png b/docs/vpn/umn/en-us_image_0210486152.png deleted file mode 100644 index d36739fd..00000000 Binary files a/docs/vpn/umn/en-us_image_0210486152.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_topic_0013748715.html b/docs/vpn/umn/en-us_topic_0013748715.html deleted file mode 100644 index 2bcbe330..00000000 --- a/docs/vpn/umn/en-us_topic_0013748715.html +++ /dev/null @@ -1,45 +0,0 @@ - - -
To improve ECS access security, you can create a security group, define security group rules, and add ECSs in the VPC to the security group. We recommend that you allocate ECSs that have different Internet access policies to different security groups.
-Parameter - |
-Description - |
-Example Value - |
-
---|---|---|
Name - |
-Specifies the security group name. This parameter is mandatory. -The security group name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces. - NOTE:
-You can change the security group name after a security group is created. It is recommended that you use different names for different security groups. - |
-sg-318b - |
-
Description - |
-Provides supplementary information about the security group. This parameter is optional. -The security group description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). - |
-N/A - |
-
After a security group is created, you can add rules to the security group. A rule applies either to inbound traffic (ingress) or outbound traffic (egress). After ECSs are added to the security group, they are protected by the rules of that group.
-You can click + to add more inbound rules.
-Parameter - |
-Description - |
-Example Value - |
-
---|---|---|
Protocol/ Application - |
-Specifies the network protocol. Currently, the value can be All, TCP, UDP, ICMP, GRE, or others. - |
-TCP - |
-
Port & Source - |
-Port: specifies the port or port range over which the traffic can reach your ECS. The value ranges from 1 to 65535. - |
-22 or 22-30 - |
-
Source: specifies the source of the security group rule. The value can be another security group, a CIDR block, or a single IP address. For example: -
|
-0.0.0.0/0 -default - |
-|
Description - |
-Provides supplementary information about the security group rule. This parameter is optional. -The security group rule description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). - |
-N/A - |
-
You can click + to add more outbound rules.
-Parameter - |
-Description - |
-Example Value - |
-
---|---|---|
Protocol/ Application - |
-Specifies the network protocol. Currently, the value can be All, TCP, UDP, ICMP, GRE, or others. - |
-TCP - |
-
Port & Destination - |
-Port: specifies the port or port range over which the traffic can leave your ECS. The value ranges from 1 to 65535. - |
-22 or 22-30 - |
-
Destination: specifies the destination of the security group rule. The value can be another security group, a CIDR block, or a single IP address. For example: -
|
-0.0.0.0/0 -default - |
-|
Description - |
-Provides supplementary information about the security group rule. This parameter is optional. -The security group rule description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). - |
-N/A - |
-
If the source of an inbound security group rule or destination of an outbound security group rule needs to be changed, you need to first delete the security group rule and add a new one.
-Security group rules use whitelists. Deleting a security group rule may result in ECS access failures. Exercise caution when deleting security group rules.
-Deleting Multiple Security Group Rules at Once.
-You can also select multiple security group rules and click Delete above the security group rule list to delete multiple rules at a time.
-If the VPN network information conflicts the VPC network information or you need to adjust VPN configurations, you can modify a VPN.
-Quotas are enforced for service resources on the platform to prevent unforeseen spikes in resource usage. Quotas can limit the number or amount of resources available to users. For example, the VPN quota limits the number of VPNs that you can create. You can also request more quotas if you need them.
-This section describes how to view the VPN resource usage and the total quotas in a specified region.
-The Service Quota page is displayed.
-If a quota cannot meet service requirements, click Increase Quota to adjust it.
-The system does not support online quota adjustment. If you need to adjust a quota, call the hotline or send an email to the customer service mailbox. Customer service personnel will timely process your request for quota adjustment and inform you of the real-time progress by making a call or sending an email.
-You need to prepare the following information before dialing the hotline number or sending an email:
-Log in to the management console using the cloud account, click the username in the upper right corner, select My Credential from the drop-down list, and obtain the domain name, project name, and project ID on the My Credential page.
-A Virtual Private Network (VPN) establishes an encrypted, Internet-based communications tunnel between a user and a Virtual Private Cloud (VPC). With VPN, you can connect to a VPC and access service resources in it.
-By default, ECSs in a VPC cannot communicate with your data center or private network. To enable communication between them, use a VPN.
-A VPN consists of a VPN gateway and one or more VPN connections. A VPN gateway provides an Internet egress for a VPC and works together with the remote gateway in the local data center. A VPN connection uses the Internet- based encryption technology to connect the VPN gateway and the remote gateway to enable communication between the local data center and VPC. The VPN connection allows you to quickly build secure hybrid cloud environment.
-Figure 1 shows the VPN networking.
- +Virtual Private Network (VPN) establishes secure, reliable, and cost-effective encrypted connections between your on-premises network or data center and a virtual network on the cloud.
+VPN supports only non-cross-border connections.
+Figure 1 shows the VPN networking.
+ +With the VPN between the VPC and your traditional data center, you can easily use the ECSs and block storage resources provided by the cloud platform.
-Applications can be migrated to the cloud and additional web servers can be deployed to increase the computing capacity on a network. In this way, a hybrid cloud is built, which reduces IT O&M costs and protects enterprise core data from being leaked.
-The VPN service allows you to set up site-to-site VPN connections or VPN connections from one site to multiple sites.
-You can set up a VPN to connect a local data center to a VPC, thus building a hybrid cloud. Figure 1 shows a site-to-site VPN connection.
- -You can also set up a VPN to connect multiple local data centers to a VPC, thus building a hybrid cloud. Figure 2 shows a VPN connection from one site to multiple sites.
-The subnet CIDR blocks of each site involved in the VPN connection cannot overlap.
-You can view details about an existing VPN.
-Status - |
-Description - |
-
---|---|
Normal - |
-Indicates that the VPN is successfully created and communication with the local data center through the VPN is normal. - |
-
Not connected - |
-Indicates that the VPN is successfully created but has not been used for communication with the local data center. - |
-
Creating - |
-Indicates that the VPN is being created. - |
-
Updating - |
-Indicates that VPN information is being updated. - |
-
Deleting - |
-Indicates that the VPN is being deleted. - |
-
Abnormal - |
-Indicates that the VPN is abnormal. - |
-
Frozen - |
-Indicates that the VPN is frozen. - |
-
You can delete a VPN to release network resources if the VPN is no longer required.
-The IPsec VPN tunnel works in passive mode, which triggers automatic negotiation only when traffic sent by the local end passes through the tunnel.
-Release Date - |
-What's New - |
-
---|---|
2019-02-22 - |
-This release incorporates the following changes: Updated the region description in Table 2. - |
-
2019-02-18 - |
-Accepted in OTC-4.0/Agile-02.2019 - |
-
2019-02-11 - |
-This release incorporates the following changes: -
|
-
2019-02-02 - |
-This release incorporates the following changes: -
|
-
2019-01-30 - |
-This release incorporates the following changes: -
|
-
2019-01-23 - |
-This release incorporates the following changes: -
|
-
2019-01-02 - |
-This release incorporates the following change: -Added description about the PFS function to the section for configuring the IPsec policy of a VPN. - |
-
2018-04-30 - |
-This issue is the eighth official release, which incorporates the following change: -Added description about how to add tags during VPN creation. - |
-
2017-08-30 - |
-This issue is the seventh official release, which incorporates the following change: -Added description about VPC and subnet tags. - |
-
2017-07-30 - |
-This issue is the sixth official release, which incorporates the following change: -
|
-
2017-04-28 - |
-This issue is the fifth official release, which incorporates the following change: -
|
-
2017-03-30 - |
-This issue is the fourth official release, which incorporates the following change: -
|
-
2017-01-20 - |
-This issue is the third official release, which incorporates the following change: -
|
-
2016-12-30 - |
-This issue is the second official release, which incorporates the following change: -
|
-
2016-10-19 - |
-This issue is the first official release. - |
-
The maximum number obtained by multiplying the number of local subnets and that of remote subnets cannot exceed 2500.
-After a VPN is created, its status changes to Normal only after the VMs or physical servers on the two sides of the VPN communicate with each other.
-If no traffic goes through the VPN for a period of time, the VPN needs to be renegotiated. The negotiation time depends on the value of Lifecycle (s) in the IPsec policy. Generally, the value of Lifecycle (s) is 3600 (1 hour), indicating that the negotiation will be initiated in the fifty-fourth minute. If the negotiation succeeds, the connection remains to the next round of negotiation. If the negotiation fails, the status is set to be disconnected within one hour. The connection can be restored after the two sides of the VPN communicates with each other. The disconnection can be avoided by using a network monitoring tool, such as IP SLA, to generate packets.
-The time required for VPN configurations to take effect increases linearly with the number obtained by multiplying the number of local subnets and that of remote subnets.
-By default, ECSs in a VPC cannot communicate with your data center or private network. To enable communication between them, use a VPN. You need to create a VPN in your VPC and update the security group rules.
-In Figure 1, a VPC has two subnets: 192.168.1.0/24 and 192.168.2.0/24. On your router deployed in your physical data center, you also have two subnets: 192.168.3.0/24 and 192.168.4.0/24. You can create a VPN to enable subnets in your VPC to communicate with those in your data center.
- -Currently, the site-to-site VPN and hub-spoke VPN are supported. You need to set up VPNs in both your data center and the VPC to establish the VPN connection.
-Ensure that the VPN in your VPC and that in your data center use the same Internet Key Exchange (IKE) and IPsec policy configurations. Before creating a VPN, familiarize yourself with the protocols described in Table 1 and ensure that your device meets the requirements and configuration constraints of the involved protocols.
- -Parameter - |
-Description - |
-Constraint - |
-
---|---|---|
RFC 2409 - |
-Defines the IKE protocol, which negotiates and verifies key information to safeguard VPNs. - |
-
|
-
RFC 4301 - |
-Defines the IPsec architecture, the security services that IPsec offers, and the collaboration between components. - |
-Use the IPsec tunnel to set up a VPN connection. - |
-
Perform the following procedure to create a VPN that sets up a secure, isolated communication tunnel between your data center and cloud services.
-Parameter - |
-Description - |
-Example Value - |
-
---|---|---|
Region - |
-Specifies the desired region. Regions are geographic areas isolated from each other. -Resources are region-specific and cannot be used across regions through internal network connections. For low network latency and quick resource access, select the nearest region. - |
-eu-de - |
-
Name - |
-Specifies the VPN name. - |
-VPN-001 - |
-
VPC - |
-Specifies the VPC name. - |
-VPC-001 - |
-
Local Subnet - |
-A local subnet is a VPC subnet that accesses a customer network through a VPN. -
|
-192.168.1.0/24,192.168.2.0/24 - |
-
Remote Gateway - |
-Specifies the public IP address of the VPN in your data center or on the private network. This IP address is used for communicating with the VPN in the VPC. - |
-N/A - |
-
Remote Subnet - |
-A remote subnet is a subnet in the customer data center that accesses a VPC through a VPN. The remote and local subnets cannot have overlapping or matching CIDR blocks. The remote subnet CIDR block cannot overlap with CIDR blocks involved in existing VPC peering connections created for the local VPC. - |
-192.168.3.0/24,192.168.4.0/24 - |
-
PSK - |
-Specifies the pre-shared key, which is a private key shared by two ends of a VPN connection. The PSK configurations for both ends of a VPN connection must be the same. This key is used for VPN connection negotiation. -The value is a string of 6 to 128 characters. - |
-Test@123 - |
-
Confirm PSK - |
-Specifies the confirm pre-shared key. - |
-Test@123 - |
-
Tag - |
-Specifies the VPN tag, which consists of a key and value pair. You can add a maximum of ten tags to each VPN. -The tag key and value must meet the requirements listed in Table 3. - |
-
|
-
Advanced Settings - |
-- | -Custom - |
-
Parameter - |
-Requirement - |
-Example Value - |
-
---|---|---|
Key - |
-
|
-vpn_key1 - |
-
Value - |
-
|
-vpn-01 - |
-
Parameter - |
-Description - |
-Example Value - |
-
---|---|---|
Authentication Algorithm - |
-Specifies the authentication hash algorithm. The value can be SHA1, SHA2-256, SHA2-384, SHA2-512, or MD5. -The default value is SHA1. - |
-SHA1 - |
-
Encryption Algorithm - |
-Specifies the encryption algorithm. The value can be AES-128, AES-192, -AES-256, or 3DES. The 3DES algorithm is not recommended because it is risky. -The default value is AES-128. - |
-AES-128 - |
-
DH Algorithm - |
-Specifies the Diffie-Hellman key exchange algorithm. The value can be Group 1, Group 2, Group 5, Group 14, -Group 15, Group 16, Group 19, Group -20, or Group 21. -The DH group security level from the highest to lowest is as follows: Group 21> Group 20 > Group 19 > Group 16 > Group 15 > Group 14 > Group 5 > Group 2 > Group 1. -The default value is Group 5. - |
-Group 5 - |
-
Version - |
-Specifies the version of the IKE protocol. The value can be v1 or v2. -The default value is v1. - |
-v1 - |
-
Lifecycle (s) - |
-Specifies the lifetime of the security association (SA), in seconds. -The SA will be renegotiated if its lifetime expires. -The default value is 86400. - |
-86400 - |
-
Negotiation Mode - |
-If the IKE policy version is v1, the negotiation mode can be configured. The value can only be Main. -The default value is Main. - |
-Main - |
-
Parameter - |
-Description - |
-Example Value - |
-
---|---|---|
Authentication Algorithm - |
-Specifies the authentication hash algorithm. The value can be SHA1, SHA2-256, SHA2-384, SHA2-512, or MD5. -The default value is SHA1. - |
-SHA1 - |
-
Encryption Algorithm - |
-Specifies the encryption algorithm. The value can be AES-128, AES-192, AES-256, or 3DES. The 3DES algorithm is not recommended because it is risky. -The default value is AES-128. - |
-AES-128 - |
-
PFS - |
-Specifies the perfect forward secrecy (PFS), which is used to configure the IPsec tunnel negotiation. -This function enables two parties to exchange the DH keys during the phase-two negotiation, improving key security. It is recommended that you enable this function. -You can disable this function by selecting Disable from the drop- down list. -The PFS used at the two sides of a VPN must be the same. Otherwise, the negotiation will fail. If you disable this function on the console, you also need to disable it at the customer side of the VPN. -The value can be DH group 1, DH group 2, DH group 5, DH group 14, DH group 15, DH group 16, DH group 19, DH group 20, or DH group 21. -The PFS group security level from the highest to lowest is as follows: DH group 21 > DH group 20 > DH group 19 > DH group 16 > DH group 15 > DH group 14 > DH group 5 > DH group 2 > DH group 1. -The default value is DH group 5. - |
-DH group 5 - |
-
Transfer Protocol - |
-Specifies the security protocol used for IPsec to transmit and encapsulate user data. The value can be AH, ESP, or AH-ESP. -The default value is ESP. - |
-ESP - |
-
Lifecycle (s) - |
-Specifies the lifetime of the SA, in seconds. -The SA will be renegotiated if its lifetime expires. -The default value is 3600. - |
-3600 - |
-
The IKE policy specifies the encryption and authentication algorithms to use in the negotiation phase of an IPsec tunnel. The IPsec policy specifies the protocol, encryption algorithm, and authentication algorithm to use in the data transmission phase of an IPsec tunnel. These parameters must be the same between the VPN in your VPC and that in your data center. If they are different, the VPN cannot be set up.
-After the IPsec VPN is created, a public network egress IP address is assigned to the IPsec VPN. The IP address is the local gateway address of a created VPN on the network console. When configuring the remote tunnel in your data center, you must set the remote gateway address to this IP address.
- -By default, ECSs in a VPC cannot communicate with your data center or private network. To enable communication between them, use a VPN. After a VPN is created, configure the security group and check the connectivity between the local and remote networks to ensure that the VPN is available. VPNs can be classified into the following two types:
-Ensure that the following requirements are met when configuring a VPN:
-You have created the VPC and subnet required by the VPN.
-In Figure 1, a VPC has two subnets: 192.168.1.0/24 and 192.168.2.0/24. On your router deployed in your physical data center, you also have two subnets: 192.168.3.0/24 and 192.168.4.0/24. You can create a VPN to enable subnets in your VPC to communicate with those in your data center.
- -The IP address pools for the local and remote subnets cannot overlap with each other. For example, if the local VPC has two subnets, 192.168.1.0/24 and 192.168.2.0/24, the IP address pool for the remote subnets cannot contain these two subnets.
-The security group must allow packets from the VPN to pass. You can run the ping command to check whether the security group of the VPC allows packets from the VPN to pass.
-A route must be configured for the remote LAN to enable VPN traffic to be forwarded to network devices on the LAN. If the VPN traffic cannot be forwarded to the network devices, check whether the remote LAN has policies configured to refuse the traffic.
-The following standards and protocols are associated with the IPsec VPN:
-A VPN tag identifies a VPN. Tags can be added to VPNs to facilitate VPN identification and administration. You can add a tag to a VPN when creating the VPN. Alternatively, you can add a tag to a created VPN on the VPN details page. A maximum of ten tags can be added to each VPN.
-A tag consists of a key and value pair. Table 1 lists the tag key and value requirements.
- -Parameter - |
-Requirement - |
-Example Value - |
-
---|---|---|
Key - |
-
|
-vpn_key1 - |
-
Value - |
-
|
-vpn-01 - |
-
Search for VPNs by Tag Key and Value on the Page Showing the VPN List.
-You can add multiple tag keys and values to refine your search results. If you add more than one tag to search for VPCs, the VPCs containing all specified tags will be displayed.
-The system displays the VPNs you are looking for based on the entered tag keys and values.
-Add, Delete, Edit, and View Tags on the Tags Tab of a VPN.
-The page showing details about the particular VPN is displayed.
-On the Tags tab, you can view details about tags added to the current VPN, including the number of tags and the key and value of each tag.
-Click Add Tag in the upper left corner. In the displayed dialog box, enter the key and value of the tag to be added, and click OK.
-Locate the row that contains the tag to be edited and click Edit in the Operation column. In the Edit Tag dialog box, change the tag value and click OK.
-Locate the row that contains the tag to be deleted, and click Delete in the Operation column. In the displayed Delete Tag dialog box, click Yes.
-Due to the symmetry of the tunnel, the VPN parameters configured on the cloud must be the same as those configured in your own data center. If they are different, a VPN cannot be established.
-To set up a VPN, you also need to configure the IPsec VPN on the router or firewall in your own data center. The configuration method may vary depending on your network device in use. For details, see the configuration guide of your network device.
-This section describes how to configure the IPsec VPN on a Huawei USG6600 series V100R001C30SPC300 firewall for your reference.
-For example, the subnets of the data center are 192.168.3.0/24 and 192.168.4.0/24, the subnets of the VPC are 192.168.1.0/24 and 192.168.2.0/24, and the public IP address of the IPsec tunnel egress in the VPC is XXX.XXX.XX.XX, which can be obtained from the local gateway parameters of the IPsec VPN in the VPC.
-display version 17:20:502017/03/09 -Huawei Versatile Security Platform Software -Software Version: USG6600 V100R001C30SPC300 (VRP (R) Software, Version 5.30)-
acl number 3065 vpn-instance vpn64 -rule 1 permit ip source 192.168.3.0 0.0.0.255 destination 192.168.1.0 0.0.0.255 -rule 2 permit ip source 192.168.3.0 0.0.0.255 destination 192.168.2.0 0.0.0.255 -rule 3 permit ip source 192.168.4.0 0.0.0.255 destination 192.168.1.0 0.0.0.255 -rule 4 permit ip source 192.168.4.0 0.0.0.255 destination 192.168.2.0 0.0.0.255 -q-
ike proposal 64 -dh group5 -authentication-algorithm sha1 -integrity-algorithm hmac-sha2-256 -sa duration 3600 -q-
ike peer vpnikepeer_64 -pre-shared-key ******** (******** specifies the pre-shared key.) -ike-proposal 64 -undo version 2 -remote-address vpn-instance vpn64 93.188.242.110 -sa binding vpn-instance vpn64 -q-
ipsec proposal ipsecpro64 -encapsulation-mode tunnel -esp authentication-algorithm sha1 -q-
ipsec policy vpnipsec64 1 isakmp -security acl 3065 -pfs dh-group5 -ike-peer vpnikepeer_64 -proposal ipsecpro64 -local-address xx.xx.xx.xx -q-
interface GigabitEthernet0/0/2.64 -ipsec policy vpnipsec64 -q-
After you perform the preceding operations, you can test the connectivity between your ECSs in the cloud and the hosts in your data center. For details, see the following figure.
-Most devices that meet IPsec VPN standard and reference protocol requirements can be used as the remote VPN devices, for example, Cisco ASA firewalls, Huawei USG6xxxx series firewalls, USG9xxxx series firewalls, Hillstone firewalls, and Cisco ISR routers. Table 1 lists the supported Huawei USG6xxxx and USG9xxxx firewalls.
- -Supported Remote VPN Device - |
-Description - |
-
---|---|
Huawei USG6000 series - |
-USG6320/6310/6510-SJJ -USG6306/6308/6330/6350/6360/6370/6380/6390/6507/6530/6550/6570:2048 -USG6620/6630/6650/6660/6670/6680 - |
-
Huawei USG9000 series - |
-USG9520/USG9560/USG9580 - |
-
Other devices that meet the requirements in the reference protocols described in section Reference Standards and Protocols can also be deployed. However, some devices may fail to add because of inconsistent protocol implementation methods of these devices. If the connection setup fails, rectify the fault by following the instructions provided in section What Do I Do If VPN Setup Fails? or contact customer service.
-A VPC provides an isolated virtual network for ECSs. You can configure and manage the network as required.
-Create a VPC by following the procedure provided in this section. Then, create subnets, security groups, and VPNs, and assign EIPs by following the procedure provided in subsequent sections based on your actual network requirements.
-During VPC creation, a default subnet will be created and you can also click Add Subnet to create more subnets for the VPC.
- -Catego ry - |
-Parameter - |
-Description - |
-Example Value - |
-
---|---|---|---|
Basic Information - |
-Region - |
-Specifies the desired region. Regions are geographic areas isolated from each other. Resources are region-specific and cannot be used across regions through internal network connections. For low network latency and quick resource access, select the nearest region. - |
-eu-de - |
-
Basic Information - |
-Name - |
-Specifies the VPC name. - |
-VPC-001 - |
-
Basic Information - |
-CIDR Block - |
-Specifies the CIDR block for the VPC. The CIDR block of a subnet can be the same as the CIDR block for the VPC (for a single subnet in the VPC) or a subset (for multiple subnets in the VPC). -The following CIDR blocks are supported: -10.0.0.0 – 10.255.255.255 -172.16.0.0 –172.31.255.255 -192.168.0.0 –192.168.255.255 - |
-192.168.0.0/16 - |
-
Basic Information - |
-Tag - |
-Specifies the VPC tag, which consists of a key and value pair. You can add a maximum of ten tags to each VPC. -The tag key and value must meet the requirements listed in Table 2. - |
-
|
-
Subnet Settings - |
-Name - |
-Specifies the subnet name. - |
-Subnet - |
-
Subnet Settings - |
-CIDR Block - |
-Specifies the CIDR block for the subnet. This value -must be within the VPC CIDR range. - |
-192.168.0.0/24 - |
-
Subnet Settings - |
-Gateway - |
-Specifies the gateway address of the subnet. - |
-192.168.0.1 - |
-
Subnet Settings - |
-DNS Server Address - |
-The external DNS server address is used by default. If you need to change the DNS server address, ensure that the configured DNS server address is available. - |
-192.168.1.0 - |
-
Subnet Settings - |
-NTP Server Address - |
-Specifies the NTP server IP address. A maximum of four IP addresses can be configured. Multiple IP addresses must be separated using commas (,). - |
-192.168.2.1 - |
-
Subnet Settings - |
-Tag - |
-Specifies the subnet tag, which consists of a key and value pair. You can add a maximum of ten tags to each subnet. -The tag key and value must meet the requirements listed in Table 3. - |
-
|
-
Parameter - |
-Requirements - |
-Example Value - |
-
---|---|---|
Key - |
-
|
-vpc_key1 - |
-
Value - |
-
|
-vpc-01 - |
-
Parameter - |
-Requirements - |
-Example Value - |
-
---|---|---|
Key - |
-
|
-subnet_key1 - |
-
Value - |
-
|
-subnet-01 - |
-
You can add subnets during VPC creation. If required, you can also create subnets for an existing VPC.
-The created subnet is configured with DHCP by default. After an ECS using this VPC starts, the ECS automatically obtains an IP address using DHCP.
-Parameter - |
-Description - |
-Example Value - |
-
---|---|---|
Name - |
-Specifies the subnet name. - |
-Subnet - |
-
CIDR Block - |
-Specifies the CIDR block for the subnet. This value must be within the VPC CIDR range. - |
-192.168.0.0/24 - |
-
Gateway - |
-Specifies the gateway address of the subnet. - |
-192.168.0.1 - |
-
NTP Server Address - |
-Specifies the NTP server IP address. A maximum of four IP addresses can be configured. Multiple IP addresses must be separated using commas (,). - |
-192.168.2.1 - |
-
Tag - |
-Specifies the subnet tag, which consists of a key and value pair. You can add a maximum of ten tags to each subnet. -The tag key and value must meet the requirements listed in Table 2. - |
-- | -
DNS Server Address - |
-The external DNS server address is used by default. If you need to change the DNS server address, ensure that the configured DNS server address is available. - |
-- - |
-
Parameter - |
-Requirements - |
-Example Value - |
-
---|---|---|
Key - |
-
|
-subnet_key1 - |
-
Value - |
-
|
-subnet-01 - |
-
After a subnet is created, five IP addresses in the subnet will be reserved and cannot be used. For example, in a subnet with CIDR block 192.168.0.0/24, the following IP addresses are reserved:
-If you set Advanced Settings to Custom during subnet creation, the reserved IP addresses may be different from the preceding default ones. The system will reserve five IP addresses based on your subnet settings.
-You can perform the following steps to handle the issues:
-Currently, the VPN service does not support the SSL VPNs.
-The Internet Protocol Security (IPsec) VPN is an encrypted tunneling technology that uses encrypted security services to establish confidential and secure communication tunnels between different networks.
-In Figure 1, a VPC has two subnets: 192.168.1.0/24 and 192.168.2.0/24. On your router deployed in your physical data center, you also have two subnets:192.168.3.0/24 and 192.168.4.0/24. You can use VPN to enable subnets in your VPC to communicate with those in your data center.
- -Currently, the site-to-site VPN and hub-spoke VPN are supported. You need to set up VPNs in both your data center and the VPC to establish the VPN connection.
-You must ensure that the VPN in your VPC and that in your data center use the same IKE and IPsec policy configurations. Before creating a VPN, familiarize yourself with the protocols described in Table 1 and ensure that your device meets the requirements and configuration constraints of the involved protocols.
- -Protocol - |
-Description - |
-Constraint - |
-
---|---|---|
RFC 2409 - |
-Defines the IKE protocol, which negotiates and verifies key information to safeguard VPNs. - |
-
|
-
RFC 4301 - |
-Defines the IPsec architecture, the security services that IPsec offers, and the collaboration between components. - |
-Use the IPsec tunnel to set up a VPN connection. - |
-
A region and availability zone (AZ) identify the location of a data center. You can create resources in a specific region and AZ.
-Figure 1 shows the relationship between regions and AZs.
- -Select a region closest to your target users for low network latency and quick access.
-When deploying resources, consider your applications' requirements on disaster recovery (DR) and network latency.
-Before you use an API to call resources, specify its region and endpoint. For more details, see Regions and Endpoints.
-Enterprise Edition VPN has the following advantages:
+Classic VPN has the following advantages:
+Dedicated devices are used to encrypt data through IKE and IPsec protocols, offering carrier-class reliability and ensuring stable VPN connections from perspectives of hardware, software, and links.
+You can connect your on-premises data center to your VPC to quickly extend services at the local data center to the cloud, forming a hybrid cloud.
+IPsec connections over the Internet provide a cost-effective alternative to Direct Connect.
+A VPN connection can be created in a few simple steps on the VPN device in an on-premises data center and on the VPN console, and is ready to use immediately after being created.
+VPN Type + |
+Resource + |
+Default Quota + |
+
---|---|---|
Enterprise Edition VPN + |
+VPN gateways per tenant in each region + |
+50 +
|
+
Enterprise Edition VPN + |
+VPN connection groups per VPN gateway + |
+100 + |
+
Enterprise Edition VPN + |
+Local subnets per VPN gateway + |
+50 + |
+
Enterprise Edition VPN + |
+Number of BGP routes that a VPN gateway can receive from a customer gateway through a connection + |
+100 + |
+
VPN Type + |
+Resource + |
+Default Quota + |
+
---|---|---|
Classic VPN + |
+VPNs per tenant in each region + |
+2 +Only one VPN can be created for a VPC. + |
+
VPN Type + |
+Resource + |
+Default Quota + |
+
---|---|---|
Enterprise Edition VPN + |
+Customer gateways per tenant in each region + |
+100 + |
+
VPN Type + |
+Resource + |
+Default Quota + |
+How to Increase Quota + |
+
---|---|---|---|
Enterprise Edition VPN + |
+Policy rules per VPN connection + |
+5 + |
+The quotas cannot be increased. + |
+
Enterprise Edition VPN + |
+Customer subnets per VPN connection + |
+50 + |
+This quota cannot be increased. + |
+
VPN Type + |
+Resource + |
+Default Quota + |
+How to Increase Quota + |
+
---|---|---|---|
Classic VPN + |
+VPN connections per tenant in each region + |
+12 + |
+This quota cannot be increased. + |
+
Each IP address of a VPN gateway supports a maximum of 100 communications tunnels for connecting to customer gateways.
+If the number of communications tunnels occupied by all VPN connections in different modes established by a single gateway IP address has reached 100, excess VPN connections will fail to be created.
+The following standards and protocols are associated with VPN:
+If you need to assign different permissions to personnel in your enterprise to access your VPN resources created on the cloud service platform, Identity and Access Management (IAM) is a good choice for fine-grained permissions management. IAM provides identity authentication, permissions management, and access control, helping you securely manage access to your resources.
+With IAM, you can use your account to create IAM users, and assign permissions to the users to control their access to specific cloud resources. For example, some software developers in your enterprise need to use VPN resources but should not be allowed to delete them or perform any high-risk operations. In this scenario, you can create IAM users for the software developers and grant them only the permissions required for using VPN resources.
+If your account does not need individual IAM users for permissions management, skip this section, which has no impact on using functions of VPN.
+IAM is a free service. You only pay for the resources in your account.
+For more information about IAM, see IAM Service Overview.
+New IAM users do not have any permissions assigned by default. You need to first add them to one or more groups and attach policies or roles to these groups. The users then inherit permissions from the groups and can perform specified operations on cloud services based on the permissions they have been assigned.
+VPN is a project-level service deployed for specific regions. When you set Scope to Region-specific projects and select the specified projects in the specified regions, the users only have permissions for VPN in the selected projects. If you set Scope to All resources, users have permissions for VPN in all region-specific projects. When accessing VPN, the users need to switch to the authorized region.
+You can grant permissions by using roles or policies.
+System Role/Policy Name + |
+Description + |
+Dependency + |
+
---|---|---|
VPN Administrator (not recommended) + |
+Administrator permissions for VPN. Users with these permissions can perform all operations on VPN. +Users with these permissions have the VPC Administrator and Tenant Guest permissions by default. +
|
+- + |
+
VPN FullAccess (recommended) + |
+Full permissions for VPN. + |
+The actions of global services and the region-level actions cannot be configured in the same policy. As such, the following global actions are added: +"tms:predefineTags:list" +"scm:cert:list" +"scm:cert:get" +"scm:cert:download" + |
+
VPN ReadOnlyAccess + |
+Read-only permissions on VPN resources. Users who have these permissions can only view information about VPN resources. + |
+The actions of global services and the region-level actions cannot be configured in the same policy. As such, the following global actions are added: +"tms:predefineTags:list" +"scm:cert:list" +"scm:cert:get" + |
+
Table 2 lists the common operations supported by system-defined permissions for VPN.
+ +Operation + |
+VPN Administrator (Not Recommended) + |
+VPN FullAccess (Recommended) + |
+VPN ReadOnlyAccess + |
+
---|---|---|---|
Creating a VPN gateway + |
+√ + |
+
|
+× + |
+
Viewing a VPN gateway + |
+√ + |
+√ + |
+√ + |
+
Querying the VPN gateway list + |
+√ + |
+√ + |
+√ + |
+
Updating a VPN gateway + |
+√ + |
+
|
+× + |
+
Deleting a VPN gateway + |
+√ + |
+
|
+× + |
+
Creating a VPN connection + |
+√ + |
+
|
+× + |
+
Viewing a VPN connection + |
+√ + |
+√ + |
+√ + |
+
Querying the VPN connection list + |
+√ + |
+√ + |
+√ + |
+
Updating a VPN connection + |
+√ + |
+
|
+× + |
+
Deleting a VPN connection + |
+√ + |
+
|
+× + |
+
Creating a customer gateway + |
+√ + |
+
|
+× + |
+
Viewing a customer gateway + |
+√ + |
+
|
+√ + |
+
Querying the customer gateway list + |
+√ + |
+
|
+√ + |
+
Updating a customer gateway + |
+√ + |
+
|
+× + |
+
Deleting a customer gateway + |
+√ + |
+
|
+× + |
+
Creating a VPN connection monitor + |
+√ + |
+
|
+× + |
+
Querying a VPN connection monitor + |
+√ + |
+
|
+√ + |
+
Querying the VPN connection monitor list + |
+√ + |
+
|
+√ + |
+
Deleting a VPN connection monitor + |
+√ + |
+
|
+× + |
+
Classic VPN: For details about how to create a user and grant VPC permissions to the user, see Creating a User and Granting VPC Permissions.
+A VPN gateway is a virtual gateway of VPN on the cloud. It establishes secure private connections with a customer gateway in your on-premises network or data center.
+A VPN gateway needs to work with a customer gateway in your on-premises data center.
+A VPN connection is a secure channel between a VPN gateway and a customer gateway. VPN connections use the IKE and IPsec protocols to encrypt the transmitted data.
+A VPN connection uses the IKE and IPsec protocols to encrypt transmitted data, ensuring data security and reliability.
+The bandwidth you purchased for a VPN gateway refers to outbound bandwidth, that is, bandwidth for traffic sent from a VPC on the cloud to a customer gateway in an on-premises data center.
+Local subnets are VPC subnets that need to communicate with an on-premises network through VPN. When you buy a VPN gateway, you can set Local Subnet to either of the following options:
+A customer gateway is a resource that provides information on the console about your customer gateway device, which can be a physical device or software application in your on-premises data center.
+Customer subnets are subnets in an on-premises data center that access a VPC on the cloud through a VPN. You need to enter subnets using CIDR notation (example: 192.168.0.0/16), and with each entry separated by a comma.
+After configuring a customer subnet, you do not need to add a route for it. The VPN service will automatically deliver routes pointing to the customer subnet.
+A customer subnet cannot be set to a Class D or Class E IP address or an IP address starting with 127.
+A pre-shared key (PSK) is a key configured for a VPN connection on the cloud. It is used for IKE negotiation between VPN devices at both ends of a VPN connection. Ensure that the PSK configurations at both ends of the VPN connection are the same. Otherwise, the IKE negotiation will fail.
+ +A VPN connection supports authentication of a customer gateway using a pre-shared key (PSK).
+The identity authentication succeeds and the VPN connection can be set up only when the PSK configured on the customer gateway is the same as that configured for the VPN connection.
+Table 1 lists the algorithms recommended for VPN in descending order of security.
+ +Parameter + |
+Description + |
+|
---|---|---|
IKE Policy + |
+Version + |
+
The default value is v2. + |
+
Authentication Algorithm + |
+Hash algorithm used for authentication. The following algorithms are supported: +
By default, the SHA2-256 algorithm is used. + |
+|
Encryption Algorithm + |
+The following encryption algorithms are supported: +
By default, the AES-128 algorithm is used. + |
+|
DH Algorithm + |
+The following algorithms are supported: +
By default, Group 15 is used. + |
+|
IPsec Policy + |
+Authentication Algorithm + |
+Hash algorithm used for authentication. The following algorithms are supported: +
By default, the SHA2-256 algorithm is used. + |
+
Encryption Algorithm + |
+The following encryption algorithms are supported: +
By default, the AES-128 algorithm is used. + |
+
Perfect Forward Secrecy (PFS) ensures that the compromise of the keys of an IPsec tunnel does not affect the security of other tunnels by leveraging that the keys of these tunnels are irrelevant to each other. By default, the PFS function is enabled for VPN.
+Each IPsec VPN connection consists of at least one IPsec tunnel, each of which uses an independent set of keys to protect user traffic.
+VPN supports the following algorithms:
+Anti-replay uses sequence numbers to protect IPsec encrypted packets against replay attacks, which are initiated by repeatedly sending intercepted data packets. By default, the anti-replay function is enabled for the VPN service.
+A VPN gateway is exclusive to a tenant. As such, tenants are isolated from each, ensuring tenant data security.
+VPN records the create, delete, and modify operations performed on all resources initiated by your account, and sends the records to Cloud Trace Service (CTS) in log files for query, audit, and source tracing.
+VPN provides the dual-AZ disaster recovery function. You can create a VPN gateway in two AZs in the same region, and create a VPN connection between the customer gateway and each AZ.
+If the VPN gateway or VPN connection in an AZ is faulty, traffic is automatically switched to the other VPN connection, ensuring normal service running.
+Regions and availability zones (AZs) identify the locations of data centers. You can create resources in regions and AZs.
+Figure 1 shows the relationship between regions and AZs.
+ +You are advised to select a region close to you or your target users to reduce network latency and improve the access speed.
+When selecting a region to deploy resources, consider your applications' requirements on disaster recovery (DR) and network latency.
+Before you use an API to call resources, specify its region and endpoint. For more information, see Regions and Endpoints.
+With VPNs, you can connect VPCs in different regions to enable connectivity between user services in these regions, as shown in Figure 2.
+ +A VPN gateway functions as a VPN hub to connect enterprise branches, as shown in Figure 3. This eliminates the need to configure VPN connections between every two branches.
+ +For high reliability purposes, you can connect your on-premises data center to a VPC on the cloud through Direct Connect and VPN that back up each other, as shown in Figure 4.
+ +Category + |
+Item + |
+Enterprise Edition VPN + |
+Classic VPN + |
+
---|---|---|---|
Tenant isolation + |
+Tenant-exclusive gateway + |
+Supported + |
+Not supported + |
+
Features + |
+Policy-based mode + |
+Supported + |
+Supported + |
+
Features + |
+Routing mode + |
+Static routing and BGP routing + |
+Not supported + |
+
Features + |
+VPN hub + |
+Supported + |
+Not supported + |
+
Features + |
+Enterprise router + |
+Supported + |
+Not supported + |
+
Features + |
+Network type + |
+Public network and private network + |
+Public network + |
+
Capacity + |
+Number of subnets + |
+
|
+Policy-based mode: 5 + |
+
Capacity + |
+For more information, see Table 1. + |
+- + |
+- + |
+
Reliability + |
+Gateway protection mode + |
+Active/Standby or active-active + |
+- + |
+
Reliability + |
+Cross-AZ gateway deployment + |
+Supported + |
+Not supported + |
+
Reliability + |
+Active-active VPN connections + |
+Supported + |
+Not supported + |
+
Reliability + |
+Backup with Direct Connect + |
+Supported + |
+Not supported + |
+
Internet Protocol Security (IPsec) VPN uses a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between different networks.
+In the example shown in Figure 1, assume that you have created a VPC with two subnets (192.168.1.0/24 and 192.168.2.0/24) on the cloud, and the router in your on-premises data center also has two subnets (192.168.3.0/24 and 192.168.4.0/24). In this case, you can create a VPN to connect the VPC subnets and the data center subnets.
+ +Site-to-site VPN is supported to enable communication between VPC subnets and on-premises data center subnets.
+Item + |
+Basic + |
+Professional 1 + |
+Professional 2 + |
+
---|---|---|---|
Exclusive gateway resources + |
+Supported + |
+Supported + |
+Supported + |
+
Dual connections + |
+Supported + |
+Supported + |
+Supported + |
+
Active-active gateways + |
+Supported + |
+Supported + |
+Supported + |
+
Active/Standby gateways + |
+Supported + |
+Supported + |
+Supported + |
+
Policy-based mode + |
+Supported + |
+Supported + |
+Supported + |
+
Routing mode: static routing + |
+Supported + |
+Supported + |
+Supported + |
+
Routing mode: BGP routing + |
+Supported + |
+Supported + |
+Supported + |
+
Policy template mode + |
+Not supported + |
+Not supported + |
+Not supported + |
+
Maximum forwarding bandwidth + |
+100 Mbit/s + |
+300 Mbit/s + |
+1 Gbit/s + |
+
Maximum number of VPN connection groups + |
+10 + |
+100 + |
+100 + |
+
Interconnection with an enterprise router + |
+Not supported + |
+Supported + |
+Supported + |
+
Private network + |
+Not supported + |
+Supported + |
+Supported + |
+
Supported regions + |
+Subject to the regions available on the console + |
+Subject to the regions available on the console + |
+Subject to the regions available on the console + |
+
By default, ECSs in a VPC cannot communicate with devices in your on-premises data center or private network. To enable communication between them, you can use a VPN by creating it in your VPC and updating security group rules.
+In Figure 1, the VPC has subnets 192.168.1.0/24 and 192.168.2.0/24. Your on-premises data center has subnets 192.168.3.0/24 and 192.168.4.0/24. You can use VPN to enable subnets in the VPC to communicate with those in your data center.
+ +Site-to-site VPN is supported to enable communication between VPC subnets and on-premises data center subnets. Before establishing an IPsec VPN, ensure that the on-premises data center where the VPN is to be established meets the following conditions:
+If the preceding conditions are met, ensure that the IKE policies and IPsec policies at both ends are consistent and the subnets at both ends are matched pairs when configuring IPsec VPN.
+After the configuration is complete, VPN negotiation needs to be triggered by private network data flows.
+You need a VPN that sets up a secure, isolated communications tunnel between your on-premises data center and cloud services.
+If Enterprise Edition VPN is available for the selected region, choose Virtual Private Network > Classic.
+If Enterprise Edition VPN is available for the selected region, click Create VPN on the Classic page.
+Table 1, Table 2, and Table 3 describe the parameters.
+ +Parameter + |
+Description + |
+Example Value + |
+
---|---|---|
Region + |
+Regions are geographic areas that are physically isolated from each other. The networks inside different regions are not connected to each other, so resources cannot be shared across regions. For low network latency and fast resource access, select the region nearest to your target users. + |
+
+ eu-de + |
+
Name + |
+The VPN name + |
+VPN-001 + |
+
VPC + |
+The VPC name + |
+VPC-001 + |
+
Local Subnet + |
+VPC subnets that will access your on-premises network through a VPN. + |
+192.168.1.0/24, +192.168.2.0/24 + |
+
Remote Gateway + |
+The public IP address of the gateway in your data center or on the private network. This IP address is used for communicating with your VPC. + |
+N/A + |
+
Remote Subnet + |
+The subnets of your on-premises network that will access a VPC through a VPN. The remote and local subnets cannot overlap with each other. The remote subnets cannot overlap with CIDR blocks involved in existing VPC peering connections created for the VPC. + |
+192.168.3.0/24, +192.168.4.0/24 + |
+
PSK + |
+Private key shared by two ends of a VPN connection for negotiation. PSKs configured at both ends of the VPN connection must be the same. +The PSK can contain 6 to 128 characters. + |
+Test@123 + |
+
Confirm PSK + |
+Enter the PSK again. + |
+Test@123 + |
+
Advanced Settings + |
++ | +Custom + |
+
Advanced Settings > Tags + |
+Configure Tags in Advanced Settings. + |
+- + |
+
Parameter + |
+Description + |
+Example Value + |
+
---|---|---|
Authentication Algorithm + |
+Hash algorithm used for authentication. The following algorithms are supported: +
The default value is SHA2-256. + |
+SHA2-256 + |
+
Encryption Algorithm + |
+Encryption algorithm. The following algorithms are supported: +
The default value is AES-128. + |
+AES-128 + |
+
DH Algorithm + |
+Diffie-Hellman key exchange algorithm. The following algorithms are supported: +
The default value is Group 14. + |
+Group 14 + |
+
Version + |
+Version of the IKE protocol. The value can be one of the following: +
The default value is v2. + |
+v2 + |
+
Lifetime (s) + |
+Lifetime of an SA, in seconds +An SA will be renegotiated when its lifetime expires. +The default value is 86400. + |
+86400 + |
+
Negotiation Mode + |
+The value is Main. This parameter is available only when Version is set to v1. +The default value is Main. + |
+Main + |
+
Parameter + |
+Description + |
+Example Value + |
+
---|---|---|
Authentication Algorithm + |
+Hash algorithm used for authentication. The following algorithms are supported: +
The default value is SHA2-256. + |
+SHA2-256 + |
+
Encryption Algorithm + |
+Encryption algorithm. The following algorithms are supported: +
The default value is AES-128. + |
+AES-128 + |
+
PFS + |
+Algorithm used by the Perfect forward secrecy (PFS) function. +PFS supports the following algorithms: +
The default value is DH group 14. + |
+DH group 14 + |
+
Transfer Protocol + |
+Security protocol used in IPsec to transmit and encapsulate user data. The following protocols are supported: +
The default value is ESP. + |
+ESP + |
+
Lifetime (s) + |
+Lifetime of an SA, in seconds +An SA will be renegotiated when its lifetime expires. +The default value is 3600. + |
+3600 + |
+
An IKE policy specifies the encryption and authentication algorithms to be used in the negotiation phase of an IPsec tunnel. An IPsec policy specifies the protocol, encryption algorithm, and authentication algorithm to be used in the data transmission phase of an IPsec tunnel. The IKE and IPsec policies must be the same at both ends of a VPN connection. Otherwise, the VPN connection cannot be set up.
+Other devices that meet the requirements outlined in the reference protocols described in section Reference Standards and Protocols can also be deployed. However, some devices may not be supported because of the inconsistent protocol implementation methods of these devices. If connections cannot be set up, rectify the fault by referring to What Do I Do If a VPN Connection Fails to Be Established? or contact technical support.
++
Check the created VPN gateway on the VPN Gateways page. The initial state of the VPN gateway is Creating. When the VPN gateway state changes to Normal, the VPN gateway is successfully created.
+For VPN connection 2, you are advised to use the same settings as VPN connection 1, except the connection name, gateway IP address, local tunnel interface IP address, and customer tunnel interface IP address.
+ +Parameter + |
+Description + |
+Example Value + |
+
---|---|---|
Name + |
+Enter the name of VPN connection 2. + |
+vpn-002 + |
+
VPN Gateway + |
+Select the VPN gateway created in Step 1: Creating a VPN Gateway. + |
+vpngw-001 + |
+
Gateway IP Address + |
+Select active EIP 2 of the VPN gateway. + |
+11.xx.xx.12 + |
+
Customer Gateway + |
+Select the customer gateway created in Step 2: Creating a Customer Gateway. + |
+cgw-001 + |
+
VPN Type + |
+Select Static routing. + |
+Static routing + |
+
Customer Subnet + |
+Enter the subnet of the on-premises data center that needs to access the VPC. + NOTE:
+
|
+172.16.0.0/16 + |
+
Interface IP Address Assignment + |
+The options include Manually specify and Automatically assign. + |
+Manually specify + |
+
Local Tunnel Interface Address + |
+Specify the tunnel interface address configured on the VPN gateway. + NOTE:
+The local and remote interface addresses configured on the customer gateway device must be the same as the values of Customer Tunnel Interface IP Address and Local Tunnel Interface IP Address, respectively. + |
+169.254.71.2/30 + |
+
Customer Tunnel Interface Address + |
+Specify the tunnel interface address configured on the customer gateway device. + |
+169.254.71.1/30 + |
+
Link Detection + |
+This function is used for route reliability detection in multi-link scenarios. + NOTE:
+When enabling this function, ensure that the customer gateway supports ICMP and is correctly configured with the customer interface IP address of the VPN connection. Otherwise, VPN traffic will fail to be forwarded. + |
+NQA enabled + |
+
PSK, Confirm PSK + |
+Specify the negotiation key of the VPN connection. +The PSKs configured on the VPN console and the customer gateway device must be the same. + |
+Test@123 + |
+
Policy Settings + |
+Configure the IKE and IPsec policies, which define the encryption algorithms used by the VPN tunnel. +The policy settings on the VPN console and the customer gateway device must be the same. + |
+Default + |
+
Check the created VPN connection on the VPN Connections page. The initial state of the VPN connection is Creating. As the customer gateway device has not been configured, no VPN connection can be established. After about 2 minutes, the VPN connection state changes to Not connected.
+In this example, the customer gateway device is an AR router.
+<AR651>system-view+
[AR651]interface GigabitEthernet 0/0/8 +[AR651-GigabitEthernet0/0/8]ip address 22.xx.xx.22 255.255.255.0 +[AR651-GigabitEthernet0/0/8]quit+
[AR651]ip route-static 0.0.0.0 0.0.0.0 22.xx.xx.1+
In this command, 22.xx.xx.1 is the gateway address of the AR router's public IP address. Replace it with the actual gateway address.
+[AR651]IPsec authentication sha2 compatible enable+
[AR651]IPsec proposal hwproposal1 +[AR651-IPsec-proposal-hwproposal1]esp authentication-algorithm sha2-256 +[AR651-IPsec-proposal-hwproposal1]esp encryption-algorithm aes-128 +[AR651-IPsec-proposal-hwproposal1]quit+
[AR651]ike proposal 2 +[AR651-ike-proposal-2]encryption-algorithm aes-128 +[AR651-ike-proposal-2]dh group14 +[AR651-ike-proposal-2]authentication-algorithm sha2-256 +[AR651-ike-proposal-2]authentication-method pre-share +[AR651-ike-proposal-2]integrity-algorithm hmac-sha2-256 +[AR651-ike-proposal-2]prf hmac-sha2-256 +[AR651-ike-proposal-2]quit+
[AR651]ike peer hwpeer1 +[AR651-ike-peer-hwpeer1]undo version 1 +[AR651-ike-peer-hwpeer1]pre-shared-key cipher Test@123 +[AR651-ike-peer-hwpeer1]ike-proposal 2 +[AR651-ike-peer-hwpeer1]local-address 22.xx.xx.22 +[AR651-ike-peer-hwpeer1]remote-address 11.xx.xx.11 +[AR651-ike-peer-hwpeer1]rsa encryption-padding oaep +[AR651-ike-peer-hwpeer1]rsa signature-padding pss +[AR651-ike-peer-hwpeer1]ikev2 authentication sign-hash sha2-256 +[AR651-ike-peer-hwpeer1]quit +[AR651]ike peer hwpeer2 +[AR651-ike-peer-hwpeer2]undo version 1 +[AR651-ike-peer-hwpeer2]pre-shared-key cipher Test@123 +[AR651-ike-peer-hwpeer2]ike-proposal 2 +[AR651-ike-peer-hwpeer2]local-address 22.xx.xx.22 +[AR651-ike-peer-hwpeer2]remote-address 11.xx.xx.12 +[AR651-ike-peer-hwpeer2]rsa encryption-padding oaep +[AR651-ike-peer-hwpeer2]rsa signature-padding pss +[AR651-ike-peer-hwpeer2]ikev2 authentication sign-hash sha2-256 +[AR651-ike-peer-hwpeer2]quit+
The commands are described as follows:
+[AR651]IPsec profile hwpro1 +[AR651-IPsec-profile-hwpro1]ike-peer hwpeer1 +[AR651-IPsec-profile-hwpro1]proposal hwproposal1 +[AR651-IPsec-profile-hwpro1]pfs dh-group14 +[AR651-IPsec-profile-hwpro1]quit +[AR651]IPsec profile hwpro2 +[AR651-IPsec-profile-hwpro2]ike-peer hwpeer2 +[AR651-IPsec-profile-hwpro2]proposal hwproposal1 +[AR651-IPsec-profile-hwpro2]pfs dh-group14 +[AR651-IPsec-profile-hwpro2]quit+
[AR651]interface Tunnel0/0/1 +[AR651-Tunnel0/0/1]mtu 1400 +[AR651-Tunnel0/0/1]ip address 169.254.70.1 255.255.255.252 +[AR651-Tunnel0/0/1]tunnel-protocol IPsec +[AR651-Tunnel0/0/1]source 22.xx.xx.22 +[AR651-Tunnel0/0/1]destination 11.xx.xx.11 +[AR651-Tunnel0/0/1]IPsec profile hwpro1 +[AR651-Tunnel0/0/1]quit +[AR651]interface Tunnel0/0/2 +[AR651-Tunnel0/0/2]mtu 1400 +[AR651-Tunnel0/0/2]ip address 169.254.71.1 255.255.255.252 +[AR651-Tunnel0/0/2]tunnel-protocol IPsec +[AR651-Tunnel0/0/2]source 22.xx.xx.22 +[AR651-Tunnel0/0/2]destination 11.xx.xx.12 +[AR651-Tunnel0/0/2]IPsec profile hwpro2 +[AR651-Tunnel0/0/2]quit+
The commands are described as follows:
+In this example, Tunnel0/0/1 establishes a VPN connection with the active EIP of the VPN gateway, and Tunnel0/0/2 establishes a VPN connection with active EIP 2 of the VPN gateway.
+[AR651]nqa test-instance IPsec_nqa1 IPsec_nqa1 +[AR651-nqa-IPsec_nqa1-IPsec_nqa1]test-type icmp +[AR651-nqa-IPsec_nqa1-IPsec_nqa1]destination-address ipv4 169.254.70.2 +[AR651-nqa-IPsec_nqa1-IPsec_nqa1]source-address ipv4 169.254.70.1 +[AR651-nqa-IPsec_nqa1-IPsec_nqa1]frequency 15 +[AR651-nqa-IPsec_nqa1-IPsec_nqa1]ttl 255 +[AR651-nqa-IPsec_nqa1-IPsec_nqa1]start now +[AR651-nqa-IPsec_nqa1-IPsec_nqa1]quit +[AR651]nqa test-instance IPsec_nqa2 IPsec_nqa2 +[AR651-nqa-IPsec_nqa2-IPsec_nqa2]test-type icmp +[AR651-nqa-IPsec_nqa2-IPsec_nqa2]destination-address ipv4 169.254.71.2 +[AR651-nqa-IPsec_nqa2-IPsec_nqa2]source-address ipv4 169.254.71.1 +[AR651-nqa-IPsec_nqa2-IPsec_nqa2]frequency 15 +[AR651-nqa-IPsec_nqa2-IPsec_nqa2]ttl 255 +[AR651-nqa-IPsec_nqa2-IPsec_nqa2]start now +[AR651-nqa-IPsec_nqa2-IPsec_nqa2]quit+
The commands are described as follows:
+In this example, the test instance IPsec_nqa1 is created for the VPN connection to which the active EIP of the VPN gateway belongs; the test instance IPsec_nqa2 is created for the VPN connection to which active EIP 2 of the VPN gateway belongs.
+[AR651]ip route-static 192.168.0.0 255.255.255.0 Tunnel0/0/1 track nqa IPsec_nqa1 IPsec_nqa1 +[AR651]ip route-static 192.168.0.0 255.255.255.0 Tunnel0/0/2 track nqa IPsec_nqa2 IPsec_nqa2+
The parameters are described as follows:
+Verify that the states of the two VPN connections are both Normal.
+In this example, use VNC provided on the management console to log in to an ECS.
+ping 172.16.0.100
+172.16.0.100 is the IP address of a server in the on-premises data center. Replace it with an actual server IP address.
+If information similar to the following is displayed, the VPC on the cloud and the on-premises data center can communicate with each other.
+Reply from xx.xx.xx.xx: bytes=32 time=28ms TTL=245 +Reply from xx.xx.xx.xx: bytes=32 time=28ms TTL=245 +Reply from xx.xx.xx.xx: bytes=32 time=28ms TTL=245 +Reply from xx.xx.xx.xx: bytes=32 time=27ms TTL=245+
You can view details about an existing VPN.
+If Enterprise Edition VPN is available for the selected region, choose Virtual Private Network > Classic.
+If Enterprise Edition VPN is available for the selected region, view the target VPN on the Classic page.
+Status + |
+Description + |
+
---|---|
Normal + |
+The VPN is successfully created, and the on-premises data center can access the VPC properly. + |
+
Not connected + |
+The VPN is successfully created but has not been used for communication with the on-premises data center. + |
+
Creating + |
+The VPN is being created. + |
+
Updating + |
+VPN information is being updated. + |
+
Deleting + |
+The VPN is being deleted. + |
+
Abnormal + |
+The VPN is abnormal. + |
+
Frozen + |
+The VPN is frozen. + |
+
If VPN network information conflicts with VPC network information or needs to be adjusted based on the latest network environment, you can modify the VPN.
+If Enterprise Edition VPN is available for the selected region, choose Virtual Private Network > Classic.
+If Enterprise Edition VPN is available for the selected region, locate the target VPN and click Modify on the Classic page.
+You can delete a VPN if it is no longer required.
+If Enterprise Edition VPN is available for the selected region, choose Virtual Private Network > Classic.
+If Enterprise Edition VPN is available for the selected region, locate the target VPN and click Delete on the Classic page.
+The total quota of each resource type varies according to regions.
+To connect your on-premises data center or private network to your ECSs in a VPC, you need to create a VPN gateway before creating a VPN connection.
+Number of Customer Gateway IP Addresses + |
+Recommended Networking + |
+Description + |
+
---|---|---|
1 + |
+It is recommended that the VPN gateway uses the active-active mode. In this case, one VPN connection group is used. + |
+|
2 + |
+It is recommended that the VPN gateway uses the active/standby mode. In this case, two VPN connection groups are used. + |
+
Table 2 lists the VPN gateway parameters.
+ +Parameter + |
+Description + |
+Example Value + |
+
---|---|---|
Region + |
+For low network latency and fast resource access, select the region nearest to your target users. +Resources cannot be shared across regions. + |
+Select a region as required.eu-de + |
+
Name + |
+Name of a VPN gateway. The value can contain only letters, digits, underscores (_), hyphens (-), and periods (.). + |
+vpngw-001 + |
+
Network Type + |
+
|
+Public network + |
+
Associate With + |
+
|
+VPC + |
+
VPC + |
+Select a VPC. +For the VPC parameter configuration, see Figure 2 and Figure 3. + |
+vpc-001(192.168.0.0/16) + |
+
Enterprise Router + |
+Select an enterprise router. +For the enterprise router parameter configuration, see Figure 4. + |
+er-001 + |
+
Interconnection Subnet + |
+This subnet is used for communication between the VPN gateway and VPC. Ensure that the selected interconnection subnet has four or more assignable IP addresses. + |
+192.168.66.0/24 + |
+
Local Subnet + |
+VPC subnets with which your on-premises data center needs to communicate through the customer gateway. + + |
+192.168.1.0/24,192.168.2.0/24 + |
+
BGP ASN + |
+BGP ASN of the VPN gateway, which must be different from that of the customer gateway. + |
+64512 + |
+
Specification + |
+Three options are available: Basic, Professional 1 and Professional 2. + |
+Professional 1 + |
+
AZ + |
+An AZ is a geographic location with independent power supply and network facilities in a region. AZs in the same VPC are interconnected through private networks and are physically isolated. + + |
+AZ1, AZ2 + |
+
HA Mode + |
+
|
+Active-active + |
+
Active EIP + |
+EIP used by the VPN gateway to communicate with a customer gateway. +
|
+Create Now + |
+
Bandwidth (Mbit/s) + |
+Bandwidth of the EIP, in Mbit/s. +
|
+10 Mbit/s + |
+
Bandwidth Name + |
+EIP bandwidth name. + |
+Vpngw-bandwidth1 + |
+
Active EIP 2 + |
+A VPN gateway needs to be bound to a group of EIPs (active EIP and active EIP 2). You can plan the bandwidth for each EIP. The EIPs can share bandwidth with the EIPs of other network services. + |
+Create Now + |
+
Standby EIP + |
+A VPN gateway needs to be bound to a group of EIPs (active EIP and standby EIP). You can plan the bandwidth for each EIP. The EIPs can share bandwidth with the EIPs of other network services. + |
+Create Now + |
+
Bandwidth (Mbit/s) + |
+Bandwidth of the EIP, in Mbit/s. +
|
+10 Mbit/s + |
+
Bandwidth Name + |
+EIP bandwidth name. + |
+Vpngw-bandwidth2 + |
+
Enterprise Project + |
+Enterprise project to which the VPN belongs. +An enterprise project facilitates project-level management and grouping of cloud resources and users. The default project is default. +For details about how to create and manage enterprise projects, see the Enterprise Management User Guide. + |
+default + |
+
Access VPC + |
+
If a VPN gateway needs to connect to different VPCs in the southbound and northbound directions, set the VPC in the northbound direction as the access VPC. The VPC in the southbound direction is the VPC associated with the VPN gateway. + |
+Same as the associated VPC + |
+
Access Subnet + |
+
By default, a VPN gateway uses the interconnection subnet to connect to the associated VPC. Set this parameter when another subnet needs to be used. + |
+Same as the interconnection subnet + |
+
Gateway IP Address + |
+This parameter is available only when Associate With is set to Enterprise Router and Network Type is set to Private network. +
|
+Self-assigned IP address + |
+
Advanced Settings > Access VPC + |
+
If a VPN gateway needs to connect to different VPCs in the southbound and northbound directions, set the VPC in the northbound direction as the access VPC. The VPC in the southbound direction is the VPC associated with the VPN gateway. + |
+Same as the associated VPC + |
+
Advanced Settings > Access Subnet + |
+
By default, a VPN gateway uses the interconnection subnet to connect to the associated VPC. Set this parameter when another subnet needs to be used. + |
+Same as the interconnection subnet + |
+
Advanced Settings > Gateway IP Address + |
+This parameter is available only when Associate With is set to VPC and Network Type is set to Private network. +
|
+Self-assigned IP address + |
+
Advanced Settings > Tags + |
+Configure Tags in Advanced Settings. + |
+- + |
+
To connect your on-premises data center or private network to your ECSs in a VPC, you need to create a customer gateway before creating a VPN connection.
+Table 1 lists the customer gateway parameters.
+ +Parameter + |
+Description + |
+Example Value + |
+
---|---|---|
Name + |
+Name of a customer gateway. The value can contain only letters, digits, underscores (_), hyphens (-), and periods (.). + |
+cgw-001 + |
+
Routing Mode + |
+Routing mode of the customer gateway. +
|
+Static + |
+
BGP ASN + |
+Enter the ASN of your on-premises data center or private network. +The BGP ASN of the customer gateway must be different from that of the VPN gateway. + |
+65000 + |
+
Gateway IP Address + |
+IP address used by the customer gateway to communicate with the VPN gateway. The value must be a static address. +Ensure that UDP port 4500 is permitted in a firewall rule on the customer gateway in your on-premises data center or private network. + |
+1.2.3.4 + |
+
Advanced Settings > Tags + |
+Configure Tags in Advanced Settings. + |
+- + |
+
You need to configure an IPsec VPN tunnel on the router or firewall in your on-premises data center.
+To connect your on-premises data center or private network to your ECSs in a VPC, you need to create VPN connections after creating a VPN gateway and a customer gateway.
+For higher reliability, you are advised to create a VPN connection between each of the two EIPs of a VPN gateway and a customer gateway.
+Parameter + |
+Description + |
+Example Value + |
+
---|---|---|
Name + |
+Name of a VPN connection. The value can contain only letters, digits, underscores (_), hyphens (-), and periods (.). + |
+vpn-001 + |
+
VPN Gateway + |
+Name of the VPN gateway for which the VPN connection is created. +You can also click Create VPN Gateway to create a VPN gateway. For details about related parameters, see Table 2. + |
+vpngw-001 + |
+
Gateway IP Address + |
+IP address of the VPN gateway. +The same EIP of a VPN gateway cannot be repeatedly selected when you create VPN connections between the VPN gateway and the same customer gateway. + |
+Available gateway IP address + |
+
Customer Gateway + |
+Name of a customer gateway. +You can also click Create Customer Gateway to create a customer gateway. For details about related parameters, see Table 1. + NOTE:
+If a customer gateway connects to multiple VPN gateways, the BGP ASNs and VPN types of the VPN gateways must be the same. + |
+cgw-001 + |
+
VPN Type + |
+IPsec connection mode, which can be route-based or policy-based. +
|
+Static routing + |
+
Customer Subnet + |
+Customer-side subnet that needs to access the VPC on the cloud through VPN connections. +If there are multiple customer subnets, separate them with commas (,). + NOTE:
+
|
+172.16.1.0/24,172.16.2.0/24 + |
+
Interface IP Address Assignment + |
+This parameter is available only when VPN Type is set to Static routing or BGP routing. + NOTE:
+
|
+Automatically assign + |
+
Local Tunnel Interface Address + |
+This parameter is available only when Interface IP Address Assignment is set to Manually specify. +Tunnel interface IP address configured on the VPN gateway. + |
+N/A + |
+
Customer Tunnel Interface Address + |
+This parameter is available only when Interface IP Address Assignment is set to Manually specify. +Tunnel interface IP address configured on the customer gateway device. + |
+N/A + |
+
Link Detection + |
+This parameter is available only when VPN Type is set to Static routing. + NOTE:
+When enabling this function, ensure that the customer gateway supports ICMP and is correctly configured with the customer interface IP address of the VPN connection. Otherwise, traffic will fail to be forwarded. +After this function is enabled, the VPN gateway automatically performs Network Quality Analysis (NQA) on the customer interface IP address of the customer gateway. + |
+Selected + |
+
PSK + |
+The PSKs configured for the VPN gateway and customer gateway must be the same. +The PSK: +
|
+Test@123 + |
+
Confirm PSK + |
+Enter the PSK again. + |
+Test@123 + |
+
Policy + |
+This parameter is available only when VPN Type is set to Policy-based. +Defines the data flow that enters the encrypted VPN connection between the local and customer subnets. You need to configure the source and destination CIDR blocks in each policy rule. By default, a maximum of five policy rules can be configured. + + + |
+
|
+
Advanced Settings + |
++ | +Custom + |
+
Parameter + |
+Description + |
+Example Value + |
+
---|---|---|
Authentication Algorithm + |
+Hash algorithm used for authentication. The following options are available: +
The default value is SHA2-256. + |
+SHA2-256 + |
+
Encryption Algorithm + |
+Encryption algorithm. The following options are available: +
The default value is AES-128. + |
+AES-128 + |
+
PFS + |
+Algorithm used by the Perfect forward secrecy (PFS) function. +PFS supports the following algorithms: +
The default value is DH group 15. + |
+DH group 15 + |
+
Transfer Protocol + |
+Security protocol used in IPsec to transmit and encapsulate user data. The following protocols are supported: +
The default value is ESP. + |
+ESP + |
+
Lifetime (s) + |
+Lifetime of an SA. +An SA will be renegotiated when its lifetime expires. +
|
+3600 + |
+
An IKE policy specifies the encryption and authentication algorithms to use in the negotiation phase of an IPsec tunnel. An IPsec policy specifies the protocol, encryption algorithm, and authentication algorithm to use in the data transmission phase of an IPsec tunnel. The policy settings for VPN connections must be the same at the VPC and on-premises data center sides. If they are different, VPN negotiation will fail, causing the failure to establish VPN connections.
+The following algorithms are not recommended because they are not secure enough:
+Because some customer devices do not support secure encryption algorithms, the default encryption algorithm of VPN connections is still AES-128. You are advised to use a more secure encryption algorithm if customer devices support secure encryption algorithms.
+For details about IP address configuration, see Context.
+Cloud Eye lets you keep a close eye on the performance and resource utilization of VPNs, ensuring VPN reliability and availability. You can use Cloud Eye to automatically monitor VPNs in real time and manage alarms and notifications, so that you can keep track of VPN performance metrics.
+This section describes monitored metrics reported by VPN to Cloud Eye as well as their namespaces and dimensions. You can use the Cloud Eye management console to query the metrics of the monitored objects and alarms generated for VPN.
+SYS.VPN
+Metric ID + |
+Metric Name + |
+Description + |
+Value Range + |
+Monitored Object + |
+Monitoring Interval (Raw Data) + |
+
---|---|---|---|---|---|
gateway_send_pkt_rate + |
+Outbound Packet Rate + |
+Average number of data packets leaving the cloud per second. + |
+≥ 0 pps + |
+Gateway + |
+1 minute + |
+
gateway_recv_pkt_rate + |
+Inbound Packet Rate + |
+Average number of data packets entering the cloud per second. + |
+≥ 0 pps + |
+Gateway + |
+1 minute + |
+
gateway_send_rate + |
+Outbound Bandwidth + |
+Average volume of traffic leaving the cloud per second. + |
+0–1 Gbit/s + |
+Gateway + |
+1 minute + |
+
gateway_recv_rate + |
+Inbound Bandwidth + |
+Average volume of traffic entering the cloud per second. + |
+0–1 Gbit/s + |
+Gateway + |
+1 minute + |
+
gateway_send_rate_usage + |
+Outbound Bandwidth Usage + |
+Bandwidth utilization for traffic leaving the cloud. + |
+0-100% + |
+Gateway + |
+1 minute + |
+
gateway_recv_rate_usage + |
+Inbound Bandwidth Usage + |
+Bandwidth utilization for traffic entering the cloud. + |
+0-100% + |
+Gateway + |
+1 minute + |
+
gateway_connection_num + |
+Number of Connections + |
+Number of VPN connections. + |
+≥ 0 + |
+Gateway + |
+1 minute + |
+
Metric ID + |
+Metric Name + |
+Description + |
+Value Range + |
+Monitored Object + |
+Monitoring Interval (Raw Data) + |
+
---|---|---|---|---|---|
tunnel_average_latency + |
+Average Tunnel RTT + |
+Average round-trip time on the tunnel between the VPN gateway and customer gateway. + |
+0–5000 ms + |
+VPN connection + |
+1 minute + |
+
tunnel_max_latency + |
+Maximum Tunnel RTT + |
+Maximum round-trip time on the tunnel between the VPN gateway and customer gateway. + |
+0–5000 ms + |
+VPN connection + |
+1 minute + |
+
tunnel_packet_loss_rate + |
+Tunnel Packet Loss Rate + |
+Packet loss rate on the tunnel between the VPN gateway and customer gateway. + |
+0–100 % + |
+VPN connection + |
+1 minute + |
+
link_average_latency + |
+Average Link RTT + |
+Average round-trip time on the physical link between the VPN gateway and customer gateway. + |
+0–5000 ms + |
+VPN connection + |
+1 minute + |
+
link_max_latency + |
+Maximum Link RTT + |
+Maximum round-trip time on the physical link between the VPN gateway and customer gateway. + |
+0–5000 ms + |
+VPN connection + |
+1 minute + |
+
link_packet_loss_rate + |
+Link Packet Loss Rate + |
+Packet loss rate on the physical link between the VPN gateway and customer gateway. + |
+0–100 % + |
+VPN connection + |
+1 minute + |
+
connection_status + |
+VPN Connection Status + |
+Status of a VPN connection: +0: not connected +1: connected +2: unknown + |
+0, 1, or 2 + |
+VPN connection + |
+1 minute + |
+
recv_pkt_rate + |
+Packet Receive Rate + |
+Average number of data packets received per second. + |
+≥ 0 pps + |
+VPN connection + |
+1 minute + |
+
send_pkt_rate + |
+Packet Send Rate + |
+Average number of data packets sent per second. + |
+≥ 0 pps + |
+VPN connection + |
+1 minute + |
+
recv_rate + |
+Traffic Receive Rate + |
+Average volume of traffic received per second. + |
+0~1Gbit/s + |
+VPN connection + |
+1 minute + |
+
send_rate + |
+Traffic Send Rate + |
+Average volume of traffic sent per second. + |
+0~1Gbit/s + |
+VPN connection + |
+1 minute + |
+
key + |
+Value + |
+
---|---|
evpn_connection_id + |
+Enterprise Edition VPN connection + |
+
evpn_gateway_id + |
+Enterprise Edition VPN gateway + |
+
You can configure alarm rules on the Cloud Eye console to keep track of your VPN status at any time.
+After the alarm rule is created, if you have enabled Alarm Notification and configured required parameters, you will receive notifications once an alarm is triggered.
+For more information about VPN alarm rules, see the Cloud Eye User Guide.
+View the VPN connection status and usages of bandwidth and EIP. You can view data of the last 1, 3, 12, or 24 hours, or last 7 days.
+You can view data of the last 1, 3, 12, or 24 hours, or last 7 days.
+The metrics include the following:
+These metrics are displayed only after the health check function is enabled. To enable this function, click the name of a VPN connection and add health check items on the Summary tab page.
+These metrics are displayed only when VPN Type is set to Static routing and the NQA function is enabled.
+You can view data of the last 1, 3, 12, or 24 hours, or last 7 days.
+This section describes monitored metrics reported by VPN to Cloud Eye as well as their namespaces and dimensions. You can use the Cloud Eye management console to query the metrics of the monitored objects and alarms generated for VPN.
+SYS.VPC
+Metric ID + |
+Metric Name + |
+Description + |
+Value Range + |
+Monitored Object + |
+Monitoring Interval (Raw Data) + |
+
---|---|---|---|---|---|
upstream_bandwidth + |
+Outbound Bandwidth + |
+Network rate of outbound traffic (previously called "Upstream Bandwidth"). +Unit: bit/s + |
+≥ 0 bit/s + |
+Bandwidth or EIP + |
+1 minute + |
+
downstream_bandwidth + |
+Inbound Bandwidth + |
+Network rate of inbound traffic (previously called "Downstream Bandwidth"). +Unit: bit/s + |
+≥ 0 bit/s + |
+Bandwidth or EIP + |
+1 minute + |
+
upstream_bandwidth_usage + |
+Outbound Bandwidth Usage + |
+Usage of outbound bandwidth, in percentage. +Outbound bandwidth usage = Outbound bandwidth/Purchased bandwidth + |
+0-100% + |
+Bandwidth or EIP + |
+1 minute + |
+
downstream_bandwidth_usage + |
+Inbound Bandwidth Usage + |
+Usage of inbound bandwidth, in percentage. +Inbound bandwidth usage = Inbound bandwidth/Purchased bandwidth + NOTE:
+
|
+0-100% + |
+Bandwidth or EIP + |
+1 minute + |
+
up_stream + |
+Outbound Traffic + |
+Outbound network traffic (previously called "Upstream Traffic") +Unit: byte + |
+≥ 0 bytes + |
+Bandwidth or EIP + |
+1 minute + |
+
down_stream + |
+Inbound Traffic + |
+Inbound network traffic (previously called "Downstream Traffic") +Unit: byte + |
+≥ 0 bytes + |
+Bandwidth or EIP + |
+1 minute + |
+
Metric ID + |
+Metric Name + |
+Description + |
+Value Range + |
+Monitored Object + |
+Monitoring Interval (Raw Data) + |
+
---|---|---|---|---|---|
connection_status + |
+VPN Connection Status + |
+Status of a VPN connection: +0: not connected +1: connected + |
+0 or 1 + |
+VPN connection + |
+5 minutes + |
+
key + |
+Value + |
+
---|---|
vpn_connection_id + |
+VPN Connections + |
+
After a VPN gateway is created, you can unbind an EIP from it.
+An EIP that is in use by a VPN connection cannot be unbound from a VPN gateway.
+If a VPN connection is no longer required, you can delete it to release network resources.
+Use the Identity and Access Management (IAM) service to implement fine-grained permissions control over your VPN resources. With IAM, you can:
+If your account meets your permissions requirements, you can skip this section.
+This section describes the procedure for granting permissions (see Figure 1).
+You have learned about the permissions supported by VPN, and determined the permissions to be granted to a user group. Before granting permissions of other services, learn about all permissions supported by IAM.
+Create a user group on the IAM console and attach the VPN Administrator policy to the group.
+Create a user on the IAM console and add the user to the group created in 1.
+Log in to the management console as the created user. Switch to the authorized region and verify the permissions.
+Classic VPN: For details about how to create a user and grant VPC permissions to the user, see Creating a User and Granting VPC Permissions.
+Custom policies can be created to supplement the system-defined policies of VPN.
+You can create custom policies in either of the following ways:
+For details, see Creating a Custom Policy. The following section contains examples of common VPN custom policies.
+{ + "Version": "1.1", + "Statement": [ + { + "Effect": "Allow", + "Action": [ + "vpn:vpnGateways:delete" + ] + } + ] +}+
A policy with only "Deny" permissions must be used together with other policies. If the permissions granted to an IAM user contain both "Allow" and "Deny", the "Deny" permissions take precedence over the "Allow" permissions.
+The following method can be used if you need to assign permissions of the VPN FullAccess policy to a user but also forbid the user from deleting VPN connections. Create a custom policy for denying VPN connection deletion, and assign both policies to the group the user belongs to. Then the user can perform all operations on VPN except deleting VPN connections. The following is an example of a deny policy:
+{ + "Version": "1.1", + "Statement": [ + { + "Effect": "Deny", + "Action": [ + "vpn:vpnGateways:delete" + ] + } + ] +}+
A custom policy can contain the actions of one or multiple services that are of the same type (global or project-level). The following is an example policy containing multiple actions.
+{ + "Version": "1.1", + "Statement": [ + { + "Effect": "Allow", + "Action": [ + "vpn:vpnGateways:create", + "vpn:vpnConnections:create", + "vpn:customerGateways:create" + ] + }, + { + "Effect": "Deny", + "Action": [ + "vpn:vpnGateways:delete", + "vpn:vpnConnections:delete", + "vpn:customerGateways:create" + ] + }, + { + "Effect": "Allow", + "Action": [ + "vpc:vpcs:list", + "vpc:subnets:get" + ] + } + ] +}+
When a VPN connection is created, routes are automatically delivered to reach the remote subnets.
+The VPN connection status can be monitored. After a VPN connection is created, the VPN service reports the connection status information to Cloud Eye, but does not automatically send alarm notifications to you. To receive notifications, create alarm rules and enable Alarm Notification on the Cloud Eye console.
+After a VPN connection is created, you can locate the row that contains the VPN connection and choose Operation > View Metric to view the VPN connection status.
+IPsec VPN connects two LANs, such as a branch and its headquarters (or a VPC), or an on-premises data center and a VPC.
+SSL VPN connects a client to a LAN. For example, the portable computer of an employee on a business trip accesses the internal network of the company.
+IPsec VPN requires fixed gateways, such as firewalls or routers, at both ends. The administrator needs to configure gateways at both ends to complete IPsec VPN negotiation.
+SSL VPN needs to install a specified client software on the server, then the server connects to the SSL device through the username and password.
+Currently, only IPsec VPN is supported; SSL VPN is not supported.
+When creating a VPN connection, configure its remote subnet as follows to avoid routing conflicts.
+A VPN connects a VPC on the cloud and an on-premises local area network (LAN).
+The home network is not a part of the LAN of your enterprise and cannot be directly connected to the VPC on the cloud.
+If your host at home needs to access VPC resources on the cloud, your host can directly access the EIP of the cloud service or connect to the LAN of your enterprise through SSL VPN (if your enterprise supports SSL access) and then access VPC resources on the cloud through the LAN.
+VPN uses the IPsec technology to connect your on-premises data center to a VPC on the cloud. As such, the number of VPN connections is related to the number of data centers where the servers to be connected to the cloud are located, but not to the number of servers.
+In most cases, one on-premises data center has one public gateway. All servers connect to the Internet through this gateway. Therefore, you only need to configure one VPN connection to allow communications between the VPC and your on-premises data center.
+When you configure a VPN, perform the following operations on the on-premises gateway:
+After the VPN configuration is complete, only the traffic matching the ACL rules enters the VPN tunnel.
+For example, before a VPN is created, on-premises users access the ECS through the EIP bound to the ECS. After a VPN is created, data flows matching the firewall rules access the private IP address of the ECS through the VPN tunnel.
+By default, DPD is enabled on the cloud side and cannot be disabled.
+Configure DPD as follows:
+The DPD msg format at both ends of the VPN connection must be the same, but the DPD type, idle time, retransmission interval, and retry limit can be different.
+After a VPN connection is created, its status changes to Normal only after servers at both ends of the VPN connection communicate with each other.
+If no traffic goes through the VPN connection for a period of time, the VPN connection needs to be renegotiated. The negotiation time depends on the value of Lifetime (s) in the IPsec policy. Generally, Lifetime (s) is set to 3600 (1 hour), indicating that the negotiation will be initiated in the fifty-fourth minute. If the negotiation succeeds, the connection remains to the next round of negotiation. If the negotiation fails, the VPN connection status changes to Not Connected within one hour. The connection can be restored only after the two ends of the VPN connection communicate with each other. The disconnection can be avoided by using a network monitoring tool, such as IP SLA, to generate packets.
+Quotas can limit the number or amount of resources available to users, such as the maximum number of ECSs or EVS disks that can be created.
+If the existing resource quota cannot meet your service requirements, you can apply for a higher quota.
+The Service Quota page is displayed.
+If a quota cannot meet service requirements, apply for a higher quota.
+SSL VPN is a virtual private network technology using the SSL protocol. It allows remote users to securely access enterprise intranet resources.
+VPN tags are used to identify VPN resources, facilitating VPN resource identification and management. You can add tags for a VPN resource when you create the VPN resource. Alternatively, you add tags for an existing VPN resource on the resource details page. A maximum of 20 tags can be added for each VPN resource.
+A tag consists of a key and a value. Table 1 describes the requirements on the keys and values of VPN tags.
+ + +You can search for VPN gateways, customer gateways, and VPN connections based on the tag keys and values that have been added for these VPN resources.
+Searching for Enterprise Edition VPN gateways by tag
+Searching for customer gateways of Enterprise Edition VPN by tag
+Searching for Enterprise Edition VPN connections by tag
+Searching for Classic VPN gateways by tag
+You can add, delete, modify, and view tags of VPN gateways.
+Click Add Tag. In the Add Tag dialog box, enter the key and value of a tag to be added, and click OK.
+Click Edit in the Operation column of the target tag. In the Edit Tag dialog box, change the tag value and click OK.
+Click Delete in the Operation column of the target tag. In the Delete Tag dialog box, click OK.
+On the Tags page, view tag details, including the number of new tags that can be created and the key and value of each existing tag.
+Managing tags of Classic VPN gateways
+Click Add Tag. In the Add Tag dialog box, enter the key and value of a tag to be added, and click OK.
+Click Edit in the Operation column of the target tag. In the Edit Tag dialog box, change the tag value and click OK.
+Click Delete in the Operation column of the target tag. In the Delete Tag dialog box, click OK.
+On the Tags page, view tag details, including the number of new tags that can be created and the key and value of each existing tag.
+Released On + |
+Description + |
+
---|---|
2024-08-23 + |
+This release incorporates the following changes: +
|
+
2024-03-15 + |
+This release incorporates the following changes: +
|
+
2020-11-01 + |
+This release incorporates the following changes: +
|
+
2019-02-22 + |
+This release incorporates the following changes: +Updated the region description in Table 1. + |
+
2019-02-18 + |
+Accepted in OTC-4.0/Agile-02.2019 + |
+
2019-02-11 + |
+This release incorporates the following changes: +
|
+
2019-02-02 + |
+This release incorporates the following changes: +
|
+
2019-01-30 + |
+This release incorporates the following changes: + + |
+
2019-01-23 + |
+This release incorporates the following changes: +
|
+
2019-01-02 + |
+This release incorporates the following changes: +Added description about the PFS function to the section for configuring the IPsec policy of a VPN. + |
+
2018-04-30 + |
+This issue is the eighth official release, which incorporates the following change: +Added support for tags configured during VPN creation. + |
+
2017-08-30 + |
+This issue is the seventh official release, which incorporates the following change: +Added description about VPC and subnet tags. + |
+
2017-07-30 + |
+This issue is the sixth official release, which incorporates the following change: +
|
+
2017-04-28 + |
+This issue is the fifth official release, which incorporates the following change: +
|
+
2017-03-30 + |
+This issue is the fourth official release, which incorporates the following change: +Added an example illustrating how to configure the remote device of a VPN. + |
+
2017-01-20 + |
+This issue is the third official release, which incorporates the following change: +
|
+
2016-12-30 + |
+This issue is the second official release, which incorporates the following change: +Added FAQs. + |
+
2016-10-19 + |
+This issue is the first official release. + |
+
This section describes how to create a VPN gateway and VPN connections to connect your on-premises network to a VPC subnet if your local data center uses FortiGate firewalls as Internet egresses.
+As shown in Figure 1, the local data center has multiple Internet egresses. The egress 11.11.11.11 is specified to establish a VPN connection with a VPC. The subnet of the local data center is 10.10.0.0/16, and the VPC subnet is 172.16.0.0/24. The IP address of the VPN gateway you created is 22.22.22.22. Create a VPN connection to connect your on-premises network to the VPC subnet.
+ + +Configure the VPN connection policies based on Figure 2.
+ +This example describes how to configure a VPN if a FortiGate firewall is used in your local data center.
+Add a route to the cloud VPC subnet 172.16.0.0/24, with the outbound interface being the VPN tunnel interface.
+Set the source address to the subnet of the local data center and the destination address to the subnet of the VPC. Adjust the configuration sequence of the policy-based routes to ensure that the policy-based routes will be preferentially used.
+config system interface + edit "port1" + set vdom "root" + set ip 11.11.11.11 255.255.255.0 + set type physical +next + edit "IPsec" //Tunnel interface configuration + set vdom "root" + set type tunnel + set interface "port1" //Physical interface bound to the tunnel + next + end+
config system zone + edit "trust" + set intrazone allow + set interface "A1" + next + edit "untrust" + set intrazone allow + set interface "port1 " + next +end+
config firewall address + edit "hw-172.16.0.0/24" + set uuid f612b4bc-5487-51e9-e755-08456712a7a0 + set subnet 172.16.0.0 255.255.255.0 //Subnet on the cloud + next + edit "local-10.10.0.0/16" + set uuid 9f268868-5489-45e9-d409-5abc9a946c0c + set subnet 10.10.0.0 255.255.0.0 //Subnet of the local data center + next+
config vpn IPsec phase1-interface //Phase 1 configuration + edit "IPsec" + set interface "port1" + set nattraversal disable + set proposal aes128-sha1 + set comments "IPsec" + set dhgrp 5 + set remote-gw 22.22.22.22 + set psksecret ENC dmFyLzF4tRrIjV3T+lSzhQeU2nGEoYKC31NaYRWFJl8krlwNmZX5SfwUi5W5RLJqFu82VYKYsXp5+HZJ13VYY8O2Sn/vruzdLxqu84zbHEIQkTlf5n/63KEru1rRoNiHDTWfh3A3ep3fKJmxf43pQ7OD64t151ol06FMjUBLHgJ1ep9d32Q0F3f3oUxfDQs21Bi9RA== + next +end +config vpn IPsec phase2-interface //Phase 2 configuration + edit "IP-TEST" + set phase1name "IPsec " + set proposal aes128-sha1 + set dhgrp 5 + set keylifeseconds 3600 + set src-subnet 10.10.0.0 255.255.0.0 + set dst-subnet 172.16.0.0 255.255.255.0 + next +end+
config firewall policy + edit 15 //Policy 15 is used to access the on-premises data center from the cloud. NAT is disabled. + set uuid 4f452870-ddb2-51e5-35c9-38a987ebdb6c + set srcintf "IPsec" + set dstintf "trust" + set srcaddr "hw-172.16.0.0/24" + set dstaddr "local-10.10.0.0/16" + set action accept + set schedule "always" + set service "ALL" + set logtraffic all + next + edit 29 //Policy 29 is used to access the cloud from the on-premises data center. NAT is disabled. + set uuid c2d0ec77-5254-51e9-80dc-2813ccf51463 + set srcintf "trust" + set dstintf "IPsec" + set srcaddr "local-10.10.0.0/16" + set dstaddr "hw-172.16.0.0/24" + set action accept + set schedule "always" + set service "ALL" + set logtraffic all + next+
config router static + edit 24 //Route 24 is a static route that is used to access on the cloud. + set dst 172.16.0.0 255.255.255.0 + set gateway 11.11.11.1 + set distance 10 + set device "port1" +config router policy +edit 2 //Policy-based route 2 is used to access the cloud from the on-premises data center. + set input-device "A1" + set src "10.10.00/255.255.0.0" + set dst "172.16.0.0/255.255.255.0" + set gateway 11.11.11.1 + set output-device "port1"+
A VPN is a point-to-point connection that implements private network access between two points.
+VPC enables you to create private, isolated virtual networks. You can use VPN to securely access ECSs in VPCs.
+A VPN gateway is an egress gateway for a VPC. With a VPN gateway, you can create a secure, reliable, and encrypted connection between a VPC and an on-premises data center or between two VPCs in different regions.
+A VPN connection is a secure and reliable IPsec encrypted communications tunnel established between a VPN gateway and the customer gateway in an on-premises data center.
+To create a VPN on the cloud, perform the following operations:
+Yes. An IPsec VPN connection is automatically established.
+IKE negotiation has two phases, phase one and phase two. The key of phase two (IPsec SA) is derived from the key generated in phase one. Once the key in phase one is disclosed, the security of the IPsec VPN may be adversely affected. To improve the key security, IKE provides PFS. When PFS is enabled, an additional DH exchange will be performed during IPsec SA negotiation to generate a new IPsec SA key, improving IPsec SA security.
+No. IPsec VPN uses a pre-shared key (PSK) for authentication. The PSK is configured on a VPN gateway, and a connection will be established after VPN negotiation is complete. Therefore, no username or password is required for creating an IPsec VPN connection. Generally, SSL, PPTP, and L2TP VPNs use usernames and passwords for authentication.
+IPsec XAUTH provides extended authentication for IPsec VPN. It requires users to enter their usernames and passwords during VPN negotiation.
+Currently, VPN does not support IPsec XAUTH.
+VPN gateway
+The following bandwidth information of a VPN gateway IP address can be monitored: inbound traffic, inbound bandwidth, outbound traffic, outbound bandwidth, and outbound bandwidth usage.
+VPN connection
+The following information about a VPN connection can be monitored: VPN connection status, average link round-trip time (RTT), maximum link RTT, link packet loss rate, average tunnel RTT, maximum tunnel RTT, and tunnel packet loss rate.
+To monitor average link RTT, maximum link RTT, link packet loss rate, average tunnel RTT, maximum tunnel RTT, and tunnel packet loss rate, click the VPN connection name and click Add in the Health Check area on the Summary tab page to add health check items.
+Yes.
+When creating a VPN gateway, you can bind EIPs as the gateway IP addresses.
+IKEv2 is recommended because IKEv1 is not secure. In addition, IKEv2 outperforms IKEv1 in connection negotiation and establishment, authentication methods, dead peer detection (DPD) timeout processing, and security association (SA) timeout processing.
+IKEv2 will be widely used, and IKEv1 will gradually phase out.
+For IKEv1 negotiation, its main mode involves nine (6+3) messages, and its aggressive mode involves six (3+3) messages. In contrast, IKEv2 negotiation requires only four (2+2) messages.
+In IKEv2, the IKE SA soft lifetime is 9/10 of the IKE SA hard lifetime plus or minus a random number. This reduces the likelihood that two ends initiate renegotiation simultaneously. Therefore, you do not manually set the soft lifetime in IKEv2.
+EAP is an authentication protocol that supports multiple authentication methods. The biggest advantage of EAP is its scalability. That is, new authentication methods can be added without changing the original authentication system. EAP authentication has been widely used in dial-up access networks.
+If the IKE SA has been set up in phase 1 but no IPsec SA has been established in phase 2, the IPsec policies at both ends of the VPN connection may be inconsistent.
+If the subnets of your on-premises data center are 192.168.3.0/24 and 192.168.4.0/24, and the VPC subnets are 192.168.1.0/24 and 192.168.2.0/24, configure the firewall function for each on-premises subnet to allow communication with the VPC subnets. The following provides an example of firewall configurations:
+rule 1 permit ip source 192.168.3.0 0.0.0.255 destination 192.168.1.0 0.0.0.255 +rule 2 permit ip source 192.168.3.0 0.0.0.255 destination 192.168.2.0 0.0.0.255 +rule 3 permit ip source 192.168.4.0 0.0.0.255 destination 192.168.1.0 0.0.0.255 +rule 4 permit ip source 192.168.4.0 0.0.0.255 destination 192.168.2.0 0.0.0.255+
By default, a user can have a maximum of five IPsec VPNs. If your quota cannot fulfill your service requirements, submit a service ticket to increase the quota.
-column to view IKE and IPsec policy details about the VPN.
-If the subnets of your data center are 192.168.3.0/24 and 192.168.4.0/24, and the VPC subnets are 192.168.1.0/24 and 192.168.2.0/24, configure the ACL rules for each data center subnet to permit the communication with the VPC subnets. The following provides an example of ACL configurations:
-rule 1 permit ip source 192.168.3.0 0.0.0.255 destination 192.168.1.0 0.0.0.255 -rule 2 permit ip source 192.168.3.0 0.0.0.255 destination 192.168.2.0 0.0.0.255 -rule 3 permit ip source 192.168.4.0 0.0.0.255 destination 192.168.1.0 0.0.0.255 -rule 4 permit ip source 192.168.4.0 0.0.0.255 destination 192.168.2.0 0.0.0.255-
The security group denies the access from all sources by default. If you want to access your ECSs, modify the security group configuration and allow the access from the remote subnets.
-Check whether you have properly configured the firewall policies for the access from the public IP address of the cloud VPN to the public IP address of your data center or LAN. No policies are configured to limit the access by default.
-If the two VPCs are in the same region, you can use a VPC peering connection to enable communication between them.
-If the two VPCs are in different regions, you can use a VPN to enable communication between the VPCs. The CIDR blocks of the two VPCs are the local and remote subnets, respectively.
-The supported regions are subject to those available on the console.
+To meet business development requirements, enterprise A needs to implement communication between its on-premises data center and its VPC. In this case, enterprise A can use the VPN service to create connections between the on-premises data center and the VPC.
+If the VPC uses Direct Cloud or Cloud Connect connections to communicate with other VPCs, the on-premises data center subnets cannot overlap with those of these VPCs.
+Category + |
+Item + |
+Data + |
+
---|---|---|
VPC + |
+Subnet that needs to access the on-premises data center + |
+192.168.0.0/16 + |
+
VPN gateway + |
+Interconnection subnet + |
+This subnet is used for communication between the VPN gateway and VPC. Ensure that the selected interconnection subnet has four or more assignable IP addresses. +192.168.2.0/24 + |
+
VPN gateway + |
+HA mode + |
+Active-active + |
+
VPN gateway + |
+EIP + |
+EIPs are automatically generated when you buy them. By default, a VPN gateway uses two EIPs. In this example, the EIPs are as follows: +
|
+
VPN connection + |
+Tunnel interface address + |
+This address is used by a VPN gateway to establish an IPsec tunnel with a customer gateway. At the two ends of the IPsec tunnel, the configured local and remote tunnel interface addresses must be reversed. +
|
+
On-premises data center + |
+Subnet that needs to access the VPC + |
+172.16.0.0/16 + |
+
Customer gateway + |
+Gateway IP address + |
+The gateway IP address is assigned by a carrier. In this example, the gateway IP address is: +22.xx.xx.22 + |
+
Customer gateway + |
+Tunnel interface address + |
+
|
+
Figure 3 shows the process of using the VPN service to enable communication between an on-premises data center and a VPC.
+ + +No. + |
+Step + |
+Description + |
+
---|---|---|
1 + |
++ | +Bind two EIPs to the VPN gateway. +If you have purchased EIPs, you can directly bind them to the VPN gateway. + |
+
2 + |
++ | +Configure the VPN device in the on-premises data center as the customer gateway. + |
+
3 + |
++ | +Create a VPN connection between the active EIP of the VPN gateway and the customer gateway. + |
+
4 + |
++ | +Create a VPN connection between active EIP 2 of the VPN gateway and the customer gateway. +It is recommended that the routing mode, PSK, IKE policy, and IPsec policy settings of the two VPN connections be the same. + |
+
5 + |
++ | +
|
+
6 + |
++ | +Log in to an ECS and run the ping command to verify the network connectivity. + |
+
The following describes only key parameters.
+ +Parameter + |
+Description + |
+Example Value + |
+
---|---|---|
Name + |
+Name a customer gateway. + |
+cgw-001 + |
+
Routing Mode + |
+Set the routing mode of the customer gateway. +The options include Dynamic (BGP) and Static. + |
+Static + |
+
Gateway IP Address + |
+Enter the IP address of the customer gateway. + |
+IP Address, 22.xx.xx.22 + |
+
BGP ASN + |
+The BGP ASN needs to be specified only when Routing Mode is set to Dynamic (BGP). +Enter the ASN of your on-premises data center or private network. +The BGP ASN of the customer gateway must be different from that of the VPN gateway. + |
+65000 + |
+
Advanced Settings > Tags + |
+Configure Tags in Advanced Settings. + |
+- + |
+
Check the created customer gateway on the Customer Gateways page.
+The following describes only key parameters.
+ +Parameter + |
+Description + |
+Example Value + |
+
---|---|---|
Name + |
+Enter the name of VPN connection 1. + |
+vpn-001 + |
+
VPN Gateway + |
+Select the VPN gateway created in Step 1: Creating a VPN Gateway. + |
+vpngw-001 + |
+
Gateway IP Address + |
+Select the active EIP of the VPN gateway. + |
+11.xx.xx.11 + |
+
Customer Gateway + |
+Select the customer gateway created in Step 2: Creating a Customer Gateway. + |
+cgw-001 + |
+
VPN Type + |
+Select Static routing. + |
+Static routing + |
+
Customer Subnet + |
+Enter the subnet of the on-premises data center that needs to access the VPC. + NOTE:
+
|
+172.16.0.0/16 + |
+
Interface IP Address Assignment + |
+The options include Manually specify and Automatically assign. + |
+Manually specify + |
+
Local Tunnel Interface Address + |
+Specify the tunnel interface address configured on the VPN gateway. + NOTE:
+The local and remote interface addresses configured on the customer gateway device must be the same as the values of Customer Tunnel Interface IP Address and Local Tunnel Interface IP Address, respectively. + |
+169.254.70.2/30 + |
+
Customer Tunnel Interface Address + |
+Specify the tunnel interface address configured on the customer gateway device. + |
+169.254.70.1/30 + |
+
Link Detection + |
+This function is used for route reliability detection in multi-link scenarios. + NOTE:
+When enabling this function, ensure that the customer gateway supports ICMP and is correctly configured with the customer interface IP address of the VPN connection. Otherwise, VPN traffic will fail to be forwarded. + |
+NQA enabled + |
+
PSK, Confirm PSK + |
+Specify the negotiation key of the VPN connection. +The PSKs configured on the VPN console and the customer gateway device must be the same. + |
+Test@123 + |
+
Policy Settings + |
+Configure the IKE and IPsec policies, which define the encryption algorithms used by the VPN tunnel. +The policy settings on the VPN console and the customer gateway device must be the same. + |
+Default + |
+
Check the created VPN connection on the VPN Connections page. The initial state of the VPN connection is Creating. As the customer gateway device has not been configured, no VPN connection can be established. After about 2 minutes, the VPN connection state changes to Not connected.
+After creating a VPN gateway, you can view its details.
+In the VPN gateway list, you can click a public IP address in the Gateway IP Address column of a VPN gateway to go to the EIP page, where you can check EIP metrics by clicking .
You can modify basic information about a VPN gateway, including the name and local subnet.
+To modify only the name of a VPN gateway, you can also click on the right of the VPN gateway name.
Table 1 describes the parameters for modifying the VPN gateway.
+ +Parameter + |
+Description + |
+Modifiable or Not + |
+
---|---|---|
Name + |
+Name of a VPN connection. The value can contain only letters, digits, underscores (_), hyphens (-), and periods (.). + |
+Y + |
+
Local Subnet + |
+VPC subnets with which your on-premises data center needs to communicate through the customer gateway. + |
+Y + |
+
Region + |
+For low network latency and fast resource access, select the region nearest to your target users. +Resources cannot be shared across regions. + |
+N + |
+
Associate With + |
+Select VPC. + |
+N + |
+
VPC + |
+VPC that the on-premises data center needs to access. + |
+N + |
+
Interconnection Subnet + |
+This subnet is used for communication between the VPN gateway and VPC. Ensure that the selected interconnection subnet has four or more assignable IP addresses. + |
+N + |
+
BGP ASN + |
+BGP AS number. + |
+N + |
+
Specification + |
+Three options are available: Basic, Professional 1 and Professional 2. + |
+N + |
+
AZ + |
+An AZ is a geographic location with independent power supply and network facilities in a region. AZs in the same VPC are interconnected through private networks and are physically isolated. + + |
+N + |
+
You can bind EIPs to a VPN gateway that has been created.
+You can delete a VPN gateway that is no longer required.
+For details about how to delete a VPN connection, see Deleting a VPN Connection.
+If the number of bound EIPs is greater than 1, click Delete in the Operation column of the target VPN gateway.
+After creating a customer gateway, you can view its details.
+After creating a customer gateway, you can modify its name.
+Parameter + |
+Description + |
+Modifiable or Not + |
+
---|---|---|
Name + |
+Name of a VPN connection. The value can contain only letters, digits, underscores (_), hyphens (-), and periods (.). + |
+Y + |
+
BGP ASN + |
+The BGP ASN needs to be specified only when Routing Mode is set to Dynamic (BGP). | +N + |
+
Gateway IP Address + |
+IP address used by the customer gateway to communicate with the VPN gateway. The value must be a static address. +Ensure that UDP port 4500 is permitted in a firewall rule on the customer gateway in your on-premises data center or private network. + |
+N + |
+
You can delete a customer gateway that you have created.
+Before deleting a customer gateway associated with a VPN connection, remove the customer gateway from the VPN connection.
+After creating a VPN connection, you can view its details.
+A VPN connection is an encrypted communications channel established between a VPN gateway in a VPC and a customer gateway in your on-premises data center. You can modify a VPN connection when required.
+If you change the PSK or modify the IKE or IPsec policy of a VPN connection, ensure that the new configurations are consistent with those on the customer gateway. Otherwise, the VPN connection will be interrupted.
+Only some of the parameters take effect immediately after being modified, as described in Table 1.
+ +Item + |
+Parameter + |
+When New Settings Take Effect + |
+How to Modify + |
+
---|---|---|---|
- + |
+PSK + |
+
|
++ | +
IKEv1 policy + |
+
|
+The new settings take effect in the next negotiation period. + |
+Locate the VPN connection to delete, and choose More > Modify Policy Settings in the Operation column. + |
+
IKEv1 policy + |
+Version + |
+The new setting takes effect immediately. + |
+Locate the VPN connection to delete, and choose More > Modify Policy Settings in the Operation column. + |
+
IKEv2 policy + |
+
|
+The new settings take effect in the next negotiation period. + + |
+Locate the VPN connection to delete, and choose More > Modify Policy Settings in the Operation column. + |
+
IKEv2 policy + |
+Version + |
+The new setting takes effect immediately. + |
+Locate the VPN connection to delete, and choose More > Modify Policy Settings in the Operation column. + |
+
IKEv2 policy + |
+
|
+The new settings take effect after the VPN connection is re-established. + |
+
|
+
IPsec policy + |
+
|
+The new settings take effect in the next negotiation period. + |
+Locate the VPN connection to delete, and choose More > Modify Policy Settings in the Operation column. + |
+
IPsec policy + |
+Transfer Protocol + |
+This parameter cannot be modified on the management console. + |
+Locate the VPN connection to delete, and choose More > Modify Policy Settings in the Operation column. + |
+
Table 2 describes the parameters related to VPN connection modification.
+ +Parameter + |
+Description + |
+Modifiable or Not + |
+
---|---|---|
Name + |
+Name of a VPN connection. The value can contain only letters, digits, underscores (_), hyphens (-), and periods (.). + |
+Y + |
+
Customer Gateway + |
+Gateway used for communicating with a VPC through VPN. + |
+Y + |
+
Customer Subnet + |
+Subnet in the on-premises data center that needs to access the VPC. + |
+Y + |
+
Policy Settings + |
+There are IKE and IPsec policies. + |
+Y + |
+
PSK + |
+The PSKs configured for the VPN gateway and customer gateway must be the same. + |
+Y + |
+
VPN Gateway + |
+VPN gateway that has been created. + |
+N + |
+
Gateway IP Address + |
+IP address used by the customer gateway to communicate with the VPN gateway. The value must be a static address. +Ensure that UDP port 4500 is permitted in a firewall rule on the customer gateway in your on-premises data center or private network. + |
+N + |
+
Interface IP Address Assignment + |
+Mode in which IP addresses of the local and customer interfaces are assigned. The options include Manually specify and Automatically assign. + |
+N + |
+
Local Tunnel Interface Address + |
+Tunnel interface IP address configured on the VPN gateway. + |
+N + |
+
Customer Tunnel Interface Address + |
+Tunnel interface IP address configured on the customer gateway device. + |
+N + |
+
Operation + |
+Resource Type + |
+Trace Name + |
+
---|---|---|
Creating a customer gateway + |
+customer-gateway + |
+createCgw + |
+
Updating a customer gateway + |
+customer-gateway + |
+updateCgw + |
+
Deleting a customer gateway + |
+customer-gateway + |
+deleteCgw + |
+
Creating a VPN gateway + |
+vpn-gateway + |
+createVgw + |
+
Updating a VPN gateway + |
+vpn-gateway + |
+updateVgw + |
+
Deleting a VPN gateway + |
+vpn-gateway + |
+deleteVgw + |
+
Updating the VPN gateway status + |
+vpn-gateway + |
+UpdateResourceState + |
+
Creating a VPN connection + |
+vpn-connection + |
+createVpnConnection + |
+
Updating a VPN connection + |
+vpn-connection + |
+updateVpnConnection + |
+
Deleting a VPN connection + |
+vpn-connection + |
+deleteVpnConnection + |
+
Creating a resource tag + |
+instance + |
+createResourceTag + |
+
Deleting a resource tag + |
+instance + |
+deleteResourceTag + |
+
After you enable CTS and the management tracker is created, CTS starts recording operations performed on VPN resources. You can view the operation records in the last seven days on the CTS console.
+For details about how to view audit logs, see the Cloud Trace Service User Guide.
+After VPN connections are created, you can configure health check to enable the VPN gateway to send probe packets to the customer gateway to collect statistics about the round-trip time and packet loss rate of physical links. The statistics help you learn about the VPN connection quality. The Cloud Eye service monitors the round-trip time and packet loss rate of VPN links. For details, see Metrics (Enterprise Edition VPN).
+