diff --git a/docs/vpn/umn/.placeholder b/docs/vpn/umn/.placeholder deleted file mode 100644 index e69de29b..00000000 diff --git a/docs/vpn/umn/ALL_META.TXT.json b/docs/vpn/umn/ALL_META.TXT.json index 8d6736bd..6995c1d1 100644 --- a/docs/vpn/umn/ALL_META.TXT.json +++ b/docs/vpn/umn/ALL_META.TXT.json @@ -1,372 +1,1981 @@ [ { - "uri":"en-us_topic_0035391332.html", + "dockw":"User Guide" + }, + { + "uri":"vpn_01_0000.html", + "node_id":"en-us_topic_0000001920877881.xml", "product_code":"vpn", "code":"1", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Overview", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], "title":"Overview", "githuburl":"" }, { "uri":"en-us_topic_0035391393.html", + "node_id":"en-us_topic_0000001937647830.xml", "product_code":"vpn", "code":"2", - "des":"A Virtual Private Network (VPN) establishes an encrypted, Internet-based communications tunnel between a user and a Virtual Private Cloud (VPC). With VPN, you can connect", + "des":"Virtual Private Network (VPN) establishes secure, reliable, and cost-effective encrypted connections between your on-premises network or data center and a virtual network", "doc_type":"usermanual", - "kw":"Virtual Private Network,Overview,User Guide", - "title":"Virtual Private Network", + "kw":"What Is VPN?,Overview,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"What Is VPN?", "githuburl":"" }, { - "uri":"en-us_topic_0160974607.html", + "uri":"vpn_01_0002.html", + "node_id":"en-us_topic_0000001937807170.xml", "product_code":"vpn", "code":"3", - "des":"The Internet Protocol Security (IPsec) VPN is an encrypted tunneling technology that uses encrypted security services to establish confidential and secure communication t", + "des":"Enterprise Edition VPN has the following advantages:High securityData is encrypted using IKE/IPsec, ensuring high data security.A VPN gateway is exclusive to a tenant, is", "doc_type":"usermanual", - "kw":"IPsec VPN,Overview,User Guide", - "title":"IPsec VPN", + "kw":"Product Advantages,Overview,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Product Advantages", "githuburl":"" }, { - "uri":"en-us_topic_0035391412.html", + "uri":"vpn_01_0032.html", + "node_id":"en-us_topic_0000001965006185.xml", "product_code":"vpn", "code":"4", - "des":"With the VPN between the VPC and your traditional data center, you can easily use the ECSs and block storage resources provided by the cloud platform.Applications can be ", + "des":"You can use a VPN to connect your on-premises data center to a VPC and use the elastic and fast scaling capabilities of the cloud to expand application computing capabili", "doc_type":"usermanual", "kw":"Application Scenarios,Overview,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], "title":"Application Scenarios", "githuburl":"" }, { - "uri":"en-us_topic_0081947484.html", + "uri":"vpn_01_0036.html", + "node_id":"en-us_topic_0000001699872529.xml", "product_code":"vpn", "code":"5", - "des":"The following standards and protocols are associated with the IPsec VPN:RFC 4301: Security Architecture for the Internet ProtocolRFC 2403: The Use of HMAC-MD5-96 within E", + "des":"The specification of a VPN gateway can be changed between Basic and Professional 1.The specification of a VPN gateway can be changed between Professional 1 and Profession", + "doc_type":"usermanual", + "kw":"Product Specifications,Overview,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Product Specifications", + "githuburl":"" + }, + { + "uri":"vpn_01_0005.html", + "node_id":"en-us_topic_0000001542174382.xml", + "product_code":"vpn", + "code":"6", + "des":"By default, the maximum length of TCP packets supported by a VPN gateway is 1300 bytes.Enable NAT traversal on the customer gateway based on the networking.If the custome", + "doc_type":"usermanual", + "kw":"Quotas and Limitations,Overview,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Quotas and Limitations", + "githuburl":"" + }, + { + "uri":"vpn_01_0006.html", + "node_id":"en-us_topic_0000001964846405.xml", + "product_code":"vpn", + "code":"7", + "des":"The following standards and protocols are associated with VPN:RFC 2403: The Use of HMAC-MD5-96 within ESP and AHRFC 2404: The Use of HMAC-SHA-1-96 within ESP and AHRFC 24", "doc_type":"usermanual", "kw":"Reference Standards and Protocols,Overview,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], "title":"Reference Standards and Protocols", "githuburl":"" }, { - "uri":"en-us_topic_0185622695.html", - "product_code":"vpn", - "code":"6", - "des":"A region and availability zone (AZ) identify the location of a data center. You can create resources in a specific region and AZ.A region is a physical data center, which", - "doc_type":"usermanual", - "kw":"Region and AZ,Overview,User Guide", - "title":"Region and AZ", - "githuburl":"" - }, - { - "uri":"en-us_topic_0035391382.html", - "product_code":"vpn", - "code":"7", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"usermanual", - "kw":"Getting Started", - "title":"Getting Started", - "githuburl":"" - }, - { - "uri":"en-us_topic_0122970066.html", + "uri":"vpn_01_0033.html", + "node_id":"en-us_topic_0000001937807178.xml", "product_code":"vpn", "code":"8", - "des":"A VPC provides an isolated virtual network for ECSs. You can configure and manage the network as required.Create a VPC by following the procedure provided in this section", - "doc_type":"usermanual", - "kw":"(Optional) Create a VPC,Getting Started,User Guide", - "title":"(Optional) Create a VPC", - "githuburl":"" - }, - { - "uri":"en-us_topic_0122970067.html", - "product_code":"vpn", - "code":"9", - "des":"You can add subnets during VPC creation. If required, you can also create subnets for an existing VPC.The created subnet is configured with DHCP by default. After an ECS ", - "doc_type":"usermanual", - "kw":"(Optional) Create a Subnet for the VPC,Getting Started,User Guide", - "title":"(Optional) Create a Subnet for the VPC", - "githuburl":"" - }, - { - "uri":"en-us_topic_0060118606.html", - "product_code":"vpn", - "code":"10", - "des":"By default, ECSs in a VPC cannot communicate with your data center or private network. To enable communication between them, use a VPN. You need to create a VPN in your V", - "doc_type":"usermanual", - "kw":"Creating a VPN,Getting Started,User Guide", - "title":"Creating a VPN", - "githuburl":"" - }, - { - "uri":"en-us_topic_0035634996.html", - "product_code":"vpn", - "code":"11", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", - "kw":"(Optional) Configure Security Group Rules", - "title":"(Optional) Configure Security Group Rules", + "kw":"Differences between Enterprise Edition VPN and Classic VPN,Overview,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Differences between Enterprise Edition VPN and Classic VPN", "githuburl":"" }, { - "uri":"en-us_topic_0013748715.html", + "uri":"vpn_08_1503.html", + "node_id":"en-us_topic_0000001964846401.xml", + "product_code":"vpn", + "code":"9", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Security", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Security", + "githuburl":"" + }, + { + "uri":"vpn_01_0020.html", + "node_id":"en-us_topic_0000001965006193.xml", + "product_code":"vpn", + "code":"10", + "des":"A VPN connection supports authentication of a customer gateway using a pre-shared key (PSK).The identity authentication succeeds and the VPN connection can be set up only", + "doc_type":"usermanual", + "kw":"Identity Authentication and Access Control,Security,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Identity Authentication and Access Control", + "githuburl":"" + }, + { + "uri":"vpn_01_0021.html", + "node_id":"en-us_topic_0000001964846421.xml", + "product_code":"vpn", + "code":"11", + "des":"VPN is a tunneling technology that provides IP-layer security using the IKE/IPsec protocol suite. It ensures confidentiality and integrity of IP data packets and prevents", + "doc_type":"usermanual", + "kw":"Data Protection Technologies,Security,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Data Protection Technologies", + "githuburl":"" + }, + { + "uri":"vpn_01_0022.html", + "node_id":"en-us_topic_0000001937647854.xml", "product_code":"vpn", "code":"12", - "des":"To improve ECS access security, you can create a security group, define security group rules, and add ECSs in the VPC to the security group. We recommend that you allocat", + "des":"VPN records the create, delete, and modify operations performed on all resources initiated by your account, and sends the records to Cloud Trace Service (CTS) in log file", "doc_type":"usermanual", - "kw":"Creating a Security Group,(Optional) Configure Security Group Rules,User Guide", - "title":"Creating a Security Group", + "kw":"Audit and Logs,Security,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Audit and Logs", "githuburl":"" }, { - "uri":"en-us_topic_0030969470.html", + "uri":"vpn_01_0023.html", + "node_id":"en-us_topic_0000001937807186.xml", "product_code":"vpn", "code":"13", - "des":"After a security group is created, you can add rules to the security group. A rule applies either to inbound traffic (ingress) or outbound traffic (egress). After ECSs ar", + "des":"VPN provides the dual-AZ disaster recovery function. You can create a VPN gateway in two AZs in the same region, and create a VPN connection between the customer gateway ", "doc_type":"usermanual", - "kw":"Adding a Security Group Rule,(Optional) Configure Security Group Rules,User Guide", - "title":"Adding a Security Group Rule", + "kw":"Service Resilience,Security,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Service Resilience", "githuburl":"" }, { - "uri":"en-us_topic_0030969471.html", + "uri":"vpn_01_0011.html", + "node_id":"en-us_topic_0000001965006205.xml", "product_code":"vpn", "code":"14", - "des":"If the source of an inbound security group rule or destination of an outbound security group rule needs to be changed, you need to first delete the security group rule an", + "des":"If you need to assign different permissions to personnel in your enterprise to access your VPN resources created on the cloud service platform, Identity and Access Manage", "doc_type":"usermanual", - "kw":"Deleting a Security Group Rule,(Optional) Configure Security Group Rules,User Guide", - "title":"Deleting a Security Group Rule", + "kw":"Permissions Management,Overview,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Permissions Management", "githuburl":"" }, { - "uri":"en-us_topic_0035391378.html", + "uri":"vpn_01_0034.html", + "node_id":"en-us_topic_0000001964846429.xml", "product_code":"vpn", "code":"15", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", - "kw":"Management", - "title":"Management", + "kw":"Basic Concepts", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Basic Concepts", "githuburl":"" }, { - "uri":"en-us_topic_0035506845.html", + "uri":"vpn_01_0035.html", + "node_id":"en-us_topic_0000001937647862.xml", "product_code":"vpn", "code":"16", - "des":"You can view details about an existing VPN.Log in to the management console.Click in the upper left corner and select the desired region and project.On the console homep", + "des":"Internet Protocol Security (IPsec) VPN uses a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication ", "doc_type":"usermanual", - "kw":"Viewing a VPN,Management,User Guide", - "title":"Viewing a VPN", + "kw":"IPsec VPN,Basic Concepts,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"IPsec VPN", "githuburl":"" }, { - "uri":"en-us_topic_0035391295.html", + "uri":"vpn_08_1504.html", + "node_id":"en-us_topic_0000001937807198.xml", "product_code":"vpn", "code":"17", - "des":"If the VPN network information conflicts the VPC network information or you need to adjust VPN configurations, you can modify a VPN.Log in to the management console.Click", + "des":"SSL VPN is a virtual private network technology using the SSL protocol. It allows remote users to securely access enterprise intranet resources.", "doc_type":"usermanual", - "kw":"Modifying a VPN,Management,User Guide", - "title":"Modifying a VPN", + "kw":"SSL VPN,Basic Concepts,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"SSL VPN", "githuburl":"" }, { - "uri":"en-us_topic_0035616925.html", + "uri":"vpn_01_0012.html", + "node_id":"en-us_topic_0000001965006209.xml", "product_code":"vpn", "code":"18", - "des":"You can delete a VPN to release network resources if the VPN is no longer required.Log in to the management console.Click in the upper left corner and select a region an", + "des":"A VPN gateway is a virtual gateway of VPN on the cloud. It establishes secure private connections with a customer gateway in your on-premises network or data center.A VPN", "doc_type":"usermanual", - "kw":"Deleting a VPN,Management,User Guide", - "title":"Deleting a VPN", + "kw":"VPN Gateway,Basic Concepts,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"VPN Gateway", "githuburl":"" }, { - "uri":"en-us_topic_0107396413.html", + "uri":"vpn_01_0013.html", + "node_id":"en-us_topic_0000001964846441.xml", "product_code":"vpn", "code":"19", - "des":"A VPN tag identifies a VPN. Tags can be added to VPNs to facilitate VPN identification and administration. You can add a tag to a VPN when creating the VPN. Alternatively", + "des":"A VPN connection is a secure channel between a VPN gateway and a customer gateway. VPN connections use the IKE and IPsec protocols to encrypt the transmitted data.A VPN c", "doc_type":"usermanual", - "kw":"Managing VPN Tags,Management,User Guide", - "title":"Managing VPN Tags", + "kw":"VPN Connection,Basic Concepts,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"VPN Connection", "githuburl":"" }, { - "uri":"en-us_topic_0114174493.html", + "uri":"vpn_01_0014.html", + "node_id":"en-us_topic_0000001937647870.xml", "product_code":"vpn", "code":"20", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "des":"The bandwidth you purchased for a VPN gateway refers to outbound bandwidth, that is, bandwidth for traffic sent from a VPC on the cloud to a customer gateway in an on-pre", "doc_type":"usermanual", - "kw":"VPN Best Practice", - "title":"VPN Best Practice", + "kw":"VPN Gateway Bandwidth,Basic Concepts,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"VPN Gateway Bandwidth", "githuburl":"" }, { - "uri":"en-us_topic_0066871940.html", + "uri":"vpn_01_0015.html", + "node_id":"en-us_topic_0000001937807218.xml", "product_code":"vpn", "code":"21", - "des":"By default, ECSs in a VPC cannot communicate with your data center or private network. To enable communication between them, use a VPN. After a VPN is created, configure ", + "des":"Local subnets are VPC subnets that need to communicate with an on-premises network through VPN. When you buy a VPN gateway, you can set Local Subnet to either of the foll", "doc_type":"usermanual", - "kw":"Connecting to a VPC Through a VPN,VPN Best Practice,User Guide", - "title":"Connecting to a VPC Through a VPN", + "kw":"Local Subnet,Basic Concepts,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Local Subnet", "githuburl":"" }, { - "uri":"en-us_topic_0035391365.html", + "uri":"vpn_01_0016.html", + "node_id":"en-us_topic_0000001965006217.xml", "product_code":"vpn", "code":"22", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "des":"A customer gateway is a resource that provides information on the console about your customer gateway device, which can be a physical device or software application in yo", "doc_type":"usermanual", - "kw":"FAQs", - "title":"FAQs", + "kw":"Customer Gateway,Basic Concepts,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Customer Gateway", "githuburl":"" }, { - "uri":"vpn_faq_0021.html", + "uri":"vpn_01_0017.html", + "node_id":"en-us_topic_0000001964846449.xml", "product_code":"vpn", "code":"23", - "des":"By default, a user can have a maximum of five IPsec VPNs. If your quota cannot fulfill your service requirements, submit a service ticket to increase the quota.", + "des":"Customer subnets are subnets in an on-premises data center that access a VPC on the cloud through a VPN. You need to enter subnets using CIDR notation (example: 192.168.0", "doc_type":"usermanual", - "kw":"How Many IPsec VPNs Can I Have?,FAQs,User Guide", - "title":"How Many IPsec VPNs Can I Have?", + "kw":"Customer Subnet,Basic Concepts,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Customer Subnet", "githuburl":"" }, { - "uri":"en-us_topic_0036149069.html", + "uri":"vpn_01_0018.html", + "node_id":"en-us_topic_0000001937647878.xml", "product_code":"vpn", "code":"24", - "des":"The IPsec VPN tunnel works in passive mode, which triggers automatic negotiation only when traffic sent by the local end passes through the tunnel.", + "des":"A pre-shared key (PSK) is a key configured for a VPN connection on the cloud. It is used for IKE negotiation between VPN devices at both ends of a VPN connection. Ensure ", "doc_type":"usermanual", - "kw":"Do IPsec VPNs Support Automatic Negotiation?,FAQs,User Guide", - "title":"Do IPsec VPNs Support Automatic Negotiation?", + "kw":"PSK,Basic Concepts,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"PSK", "githuburl":"" }, { - "uri":"vpn_faq_0055.html", + "uri":"vpn_01_0027.html", + "node_id":"en-us_topic_0000001937807222.xml", "product_code":"vpn", "code":"25", - "des":"Log in to the management console and click Virtual Private Network.In the VPN list, locate the target VPN and click View Policyin the Operationcolumn to view IKE and IPse", + "des":"Regions and availability zones (AZs) identify the locations of data centers. You can create resources in regions and AZs.A region is a physical data center location. Each", "doc_type":"usermanual", - "kw":"What Do I Do If VPN Setup Fails?,FAQs,User Guide", - "title":"What Do I Do If VPN Setup Fails?", + "kw":"Region and AZ,Basic Concepts,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Region and AZ", "githuburl":"" }, { - "uri":"vpn_faq_0056.html", + "uri":"vpn_03_0000.html", + "node_id":"en-us_topic_0000001875078390.xml", "product_code":"vpn", "code":"26", - "des":"The security group denies the access from all sources by default. If you want to access your ECSs, modify the security group configuration and allow the access from the r", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", - "kw":"How Can I Handle the Failure in Accessing the ECSs from My Data Center or LAN Even If the VPN Has Be", - "title":"How Can I Handle the Failure in Accessing the ECSs from My Data Center or LAN Even If the VPN Has Been Set Up?", + "kw":"Getting Started", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Getting Started", "githuburl":"" }, { - "uri":"vpn_faq_0057.html", + "uri":"vpn_08_1505.html", + "node_id":"en-us_topic_0000001920890921.xml", "product_code":"vpn", "code":"27", - "des":"Check whether you have properly configured the firewall policies for the access from the public IP address of the cloud VPN to the public IP address of your data center o", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", - "kw":"What Do I Do If I Cannot Access My Data Center or LAN from the ECSs After a VPN Connection Has Been ", - "title":"What Do I Do If I Cannot Access My Data Center or LAN from the ECSs After a VPN Connection Has Been Set Up?", + "kw":"Enterprise Edition VPN", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Enterprise Edition VPN", "githuburl":"" }, { - "uri":"vpn_faq_0058.html", + "uri":"vpn_qs_00003.html", + "node_id":"en-us_topic_0000002000327309.xml", "product_code":"vpn", "code":"28", - "des":"If the two VPCs are in the same region, you can use a VPC peering connection to enable communication between them.If the two VPCs are in different regions, you can use a ", + "des":"The supported regions are subject to those available on the console.To meet business development requirements, enterprise A needs to implement communication between its o", "doc_type":"usermanual", - "kw":"Does a VPN Allow for Communication Between Two VPCs?,FAQs,User Guide", - "title":"Does a VPN Allow for Communication Between Two VPCs?", + "kw":"Overview,Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Overview", "githuburl":"" }, { - "uri":"en-us_topic_0044789110.html", + "uri":"vpn_03_0204.html", + "node_id":"en-us_topic_0000001963686660.xml", "product_code":"vpn", "code":"29", - "des":"The maximum number obtained by multiplying the number of local subnets and that of remote subnets cannot exceed 2500.", + "des":"A VPC has been created. For details about how to create a VPC, see the Virtual Private Cloud User Guide.Security group rules have been configured for ECSs in the VPC, and", "doc_type":"usermanual", - "kw":"What Is the Limitation on the Number of Local and Remote Subnets of a VPN?,FAQs,User Guide", - "title":"What Is the Limitation on the Number of Local and Remote Subnets of a VPN?", + "kw":"Step 1: Creating a VPN Gateway,Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Step 1: Creating a VPN Gateway", "githuburl":"" }, { - "uri":"en-us_topic_0045305370.html", + "uri":"vpn_qs_00007.html", + "node_id":"en-us_topic_0000002000246717.xml", "product_code":"vpn", "code":"30", - "des":"After a VPN is created, its status changes to Normalonly after the VMs or physical servers on the two sides of the VPN communicate with each other.IKE v1:If no traffic go", + "des":"The following describes only key parameters.Check the created customer gateway on the Customer Gateways page.", "doc_type":"usermanual", - "kw":"Why Is Not Connected Displayed as the Status for a Successfully Created VPN?,FAQs,User Guide", - "title":"Why Is Not Connected Displayed as the Status for a Successfully Created VPN?", + "kw":"Step 2: Creating a Customer Gateway,Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Step 2: Creating a Customer Gateway", "githuburl":"" }, { - "uri":"en-us_topic_0051518174.html", + "uri":"vpn_qs_00008.html", + "node_id":"en-us_topic_0000001963846432.xml", "product_code":"vpn", "code":"31", - "des":"The time required for VPN configurations to take effect increases linearly with the number obtained by multiplying the number of local subnets and that of remote subnets.", + "des":"The following describes only key parameters.Check the created VPN connection on the VPN Connections page. The initial state of the VPN connection is Creating. As the cust", "doc_type":"usermanual", - "kw":"How Long Is Required for Issued VPN Configurations to Take Effect?,FAQs,User Guide", - "title":"How Long Is Required for Issued VPN Configurations to Take Effect?", + "kw":"Step 3: Creating VPN Connection 1,Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Step 3: Creating VPN Connection 1", "githuburl":"" }, { - "uri":"en-us_topic_0109312453.html", + "uri":"vpn_03_0335.html", + "node_id":"en-us_topic_0000002000327313.xml", "product_code":"vpn", "code":"32", - "des":"Due to the symmetry of the tunnel, the VPN parameters configured on the cloud must be the same as those configured in your own data center. If they are different, a VPN c", + "des":"For VPN connection 2, you are advised to use the same settings as VPN connection 1, except the connection name, gateway IP address, local tunnel interface IP address, and", "doc_type":"usermanual", - "kw":"How Do I Configure a Remote Device for a VPN?,FAQs,User Guide", - "title":"How Do I Configure a Remote Device for a VPN?", + "kw":"Step 4: Creating VPN Connection 2,Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Step 4: Creating VPN Connection 2", "githuburl":"" }, { - "uri":"en-us_topic_0109676043.html", + "uri":"vpn_03_0336.html", + "node_id":"en-us_topic_0000001963686664.xml", "product_code":"vpn", "code":"33", - "des":"Most devices that meet IPsec VPN standard and reference protocol requirements can be used as the remote VPN devices, for example, Cisco ASA firewalls, Huawei USG6xxxxseri", + "des":"In this example, the customer gateway device is an AR router.In this command, 22.xx.xx.1 is the gateway address of the AR router's public IP address. Replace it with the ", "doc_type":"usermanual", - "kw":"Which Remote VPN Devices Are Supported?,FAQs,User Guide", - "title":"Which Remote VPN Devices Are Supported?", + "kw":"Step 5: Configuring the Customer Gateway Device,Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Step 5: Configuring the Customer Gateway Device", "githuburl":"" }, { - "uri":"en-us_topic_0142368417.html", + "uri":"vpn_03_0337.html", + "node_id":"en-us_topic_0000002000246725.xml", "product_code":"vpn", "code":"34", - "des":"You can perform the following steps to handle the issues:Check the ECS specifications. Rate limiting is not performed for the VPN ingress on the cloud, so the issue may b", + "des":"In this example, use VNC provided on the management console to log in to an ECS.ping 172.16.0.100172.16.0.100 is the IP address of a server in the on-premises data center", "doc_type":"usermanual", - "kw":"What Can I Do If the VPN Fails or the Network Speed of the VPN Is Slow?,FAQs,User Guide", - "title":"What Can I Do If the VPN Fails or the Network Speed of the VPN Is Slow?", + "kw":"Step 6: Verifying Network Connectivity,Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Step 6: Verifying Network Connectivity", "githuburl":"" }, { - "uri":"en-us_topic_0142373840.html", + "uri":"vpn_08_1507.html", + "node_id":"en-us_topic_0000001875091418.xml", "product_code":"vpn", "code":"35", - "des":"Currently, the VPN service does not support the SSL VPNs.", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", - "kw":"Are SSL VPNs Supported?,FAQs,User Guide", - "title":"Are SSL VPNs Supported?", + "kw":"Classic VPN", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Classic VPN", "githuburl":"" }, { - "uri":"en-us_topic_0035391366.html", + "uri":"vpn_03_0004.html", + "node_id":"en-us_topic_0000001963846436.xml", "product_code":"vpn", "code":"36", - "des":"Quotas are enforced for service resources on the platform to prevent unforeseen spikes in resource usage. Quotas can limit the number or amount of resources available to ", + "des":"By default, ECSs in a VPC cannot communicate with devices in your on-premises data center or private network. To enable communication between them, you can use a VPN by c", "doc_type":"usermanual", - "kw":"What Is the VPN Quota?,FAQs,User Guide", - "title":"What Is the VPN Quota?", + "kw":"Creating a VPN,Classic VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Creating a VPN", "githuburl":"" }, { - "uri":"en-us_topic_0041174633.html", + "uri":"vpn_04_0000.html", + "node_id":"en-us_topic_0000001920877885.xml", "product_code":"vpn", "code":"37", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", - "kw":"A Change History,User Guide", - "title":"A Change History", + "kw":"Management", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Management", + "githuburl":"" + }, + { + "uri":"vpn_08_1509.html", + "node_id":"en-us_topic_0000001921050589.xml", + "product_code":"vpn", + "code":"38", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Enterprise Edition VPN", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Enterprise Edition VPN", + "githuburl":"" + }, + { + "uri":"vpn_ug_00001.html", + "node_id":"en-us_topic_0000001592573629.xml", + "product_code":"vpn", + "code":"39", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Enterprise Edition VPN Gateway Management", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Enterprise Edition VPN Gateway Management", + "githuburl":"" + }, + { + "uri":"vpn_04_0421.html", + "node_id":"en-us_topic_0000001542174206.xml", + "product_code":"vpn", + "code":"40", + "des":"To connect your on-premises data center or private network to your ECSs in a VPC, you need to create a VPN gateway before creating a VPN connection.The recommended networ", + "doc_type":"usermanual", + "kw":"Creating a VPN Gateway,Enterprise Edition VPN Gateway Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Creating a VPN Gateway", + "githuburl":"" + }, + { + "uri":"vpn_ug_00002.html", + "node_id":"en-us_topic_0000001542333958.xml", + "product_code":"vpn", + "code":"41", + "des":"After creating a VPN gateway, you can view its details.Log in to the management console.Click in the upper left corner and select the desired region and project.Click i", + "doc_type":"usermanual", + "kw":"Viewing a VPN Gateway,Enterprise Edition VPN Gateway Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Viewing a VPN Gateway", + "githuburl":"" + }, + { + "uri":"vpn_ug_00003.html", + "node_id":"en-us_topic_0000001542014738.xml", + "product_code":"vpn", + "code":"42", + "des":"You can modify basic information about a VPN gateway, including the name and local subnet.Log in to the management console.Click in the upper left corner and select the ", + "doc_type":"usermanual", + "kw":"Modifying a VPN Gateway,Enterprise Edition VPN Gateway Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Modifying a VPN Gateway", + "githuburl":"" + }, + { + "uri":"vpn_ug_00004.html", + "node_id":"en-us_topic_0000001592573533.xml", + "product_code":"vpn", + "code":"43", + "des":"You can bind EIPs to a VPN gateway that has been created.Log in to the management console.Click in the upper left corner and select the desired region and project.Click ", + "doc_type":"usermanual", + "kw":"Binding an EIP to a VPN Gateway,Enterprise Edition VPN Gateway Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Binding an EIP to a VPN Gateway", + "githuburl":"" + }, + { + "uri":"vpn_04_0807.html", + "node_id":"en-us_topic_0000001592573841.xml", + "product_code":"vpn", + "code":"44", + "des":"After a VPN gateway is created, you can unbind an EIP from it.An EIP that is in use by a VPN connection cannot be unbound from a VPN gateway.Log in to the management cons", + "doc_type":"usermanual", + "kw":"Unbinding an EIP from a VPN Gateway,Enterprise Edition VPN Gateway Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Unbinding an EIP from a VPN Gateway", + "githuburl":"" + }, + { + "uri":"vpn_ug_00007.html", + "node_id":"en-us_topic_0000001592773781.xml", + "product_code":"vpn", + "code":"45", + "des":"You can delete a VPN gateway that is no longer required.The delete operation is not supported for a VPN gateway that is being created, updated, or deleted.If a VPN gatewa", + "doc_type":"usermanual", + "kw":"Deleting a VPN Gateway,Enterprise Edition VPN Gateway Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Deleting a VPN Gateway", + "githuburl":"" + }, + { + "uri":"vpn_ug_00008.html", + "node_id":"en-us_topic_0000001542173998.xml", + "product_code":"vpn", + "code":"46", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Customer Gateway Management of Enterprise Edition VPN", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Customer Gateway Management of Enterprise Edition VPN", + "githuburl":"" + }, + { + "uri":"vpn_04_0431.html", + "node_id":"en-us_topic_0000001542014850.xml", + "product_code":"vpn", + "code":"47", + "des":"To connect your on-premises data center or private network to your ECSs in a VPC, you need to create a customer gateway before creating a VPN connection.Log in to the man", + "doc_type":"usermanual", + "kw":"Creating a Customer Gateway,Customer Gateway Management of Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Creating a Customer Gateway", + "githuburl":"" + }, + { + "uri":"vpn_ug_00009.html", + "node_id":"en-us_topic_0000001542174362.xml", + "product_code":"vpn", + "code":"48", + "des":"After creating a customer gateway, you can view its details.Log in to the management console.Click in the upper left corner and select the desired region and project.Cli", + "doc_type":"usermanual", + "kw":"Viewing a Customer Gateway,Customer Gateway Management of Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Viewing a Customer Gateway", + "githuburl":"" + }, + { + "uri":"vpn_ug_00010.html", + "node_id":"en-us_topic_0000001592773721.xml", + "product_code":"vpn", + "code":"49", + "des":"After creating a customer gateway, you can modify its name.Log in to the management console.Click in the upper left corner and select the desired region and project.Clic", + "doc_type":"usermanual", + "kw":"Modifying a Customer Gateway,Customer Gateway Management of Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Modifying a Customer Gateway", + "githuburl":"" + }, + { + "uri":"vpn_ug_00011.html", + "node_id":"en-us_topic_0000001592694113.xml", + "product_code":"vpn", + "code":"50", + "des":"You can delete a customer gateway that you have created.Before deleting a customer gateway associated with a VPN connection, remove the customer gateway from the VPN conn", + "doc_type":"usermanual", + "kw":"Deleting a Customer Gateway,Customer Gateway Management of Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Deleting a Customer Gateway", + "githuburl":"" + }, + { + "uri":"vpn_ug_00012.html", + "node_id":"en-us_topic_0000001542334078.xml", + "product_code":"vpn", + "code":"51", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Enterprise Edition VPN Connection Management", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Enterprise Edition VPN Connection Management", + "githuburl":"" + }, + { + "uri":"vpn_04_0441.html", + "node_id":"en-us_topic_0000001592573765.xml", + "product_code":"vpn", + "code":"52", + "des":"To connect your on-premises data center or private network to your ECSs in a VPC, you need to create VPN connections after creating a VPN gateway and a customer gateway.W", + "doc_type":"usermanual", + "kw":"Creating a VPN Connection,Enterprise Edition VPN Connection Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Creating a VPN Connection", + "githuburl":"" + }, + { + "uri":"vpn_ug_00023.html", + "node_id":"en-us_topic_0000001671018948.xml", + "product_code":"vpn", + "code":"53", + "des":"After VPN connections are created, you can configure health check to enable the VPN gateway to send probe packets to the customer gateway to collect statistics about the ", + "doc_type":"usermanual", + "kw":"Configuring Health Check,Enterprise Edition VPN Connection Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Configuring Health Check", + "githuburl":"" + }, + { + "uri":"vpn_ug_00013.html", + "node_id":"en-us_topic_0000001542333826.xml", + "product_code":"vpn", + "code":"54", + "des":"After creating a VPN connection, you can view its details.Log in to the management console.Click in the upper left corner and select the desired region and project.Click", + "doc_type":"usermanual", + "kw":"Viewing a VPN Connection,Enterprise Edition VPN Connection Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Viewing a VPN Connection", + "githuburl":"" + }, + { + "uri":"vpn_ug_00014.html", + "node_id":"en-us_topic_0000001592773861.xml", + "product_code":"vpn", + "code":"55", + "des":"A VPN connection is an encrypted communications channel established between a VPN gateway in a VPC and a customer gateway in your on-premises data center. You can modify ", + "doc_type":"usermanual", + "kw":"Modifying a VPN Connection,Enterprise Edition VPN Connection Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Modifying a VPN Connection", + "githuburl":"" + }, + { + "uri":"vpn_04_1003.html", + "node_id":"en-us_topic_0000001542174334.xml", + "product_code":"vpn", + "code":"56", + "des":"If a VPN connection is no longer required, you can delete it to release network resources.Log in to the management console.Click in the upper left corner and select the ", + "doc_type":"usermanual", + "kw":"Deleting a VPN Connection,Enterprise Edition VPN Connection Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Deleting a VPN Connection", + "githuburl":"" + }, + { + "uri":"vpn_08_1511.html", + "node_id":"en-us_topic_0000001874931578.xml", + "product_code":"vpn", + "code":"57", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Classic VPN", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Classic VPN", + "githuburl":"" + }, + { + "uri":"vpn_04_0470.html", + "node_id":"en-us_topic_0000001542493834.xml", + "product_code":"vpn", + "code":"58", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Classic VPN Management", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Classic VPN Management", + "githuburl":"" + }, + { + "uri":"vpn_04_0002.html", + "node_id":"en-us_topic_0000001542494026.xml", + "product_code":"vpn", + "code":"59", + "des":"You can view details about an existing VPN.Log in to the management console.Click in the upper left corner and select the desired region and project.Click Service List a", + "doc_type":"usermanual", + "kw":"Viewing Created VPNs,Classic VPN Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Viewing Created VPNs", + "githuburl":"" + }, + { + "uri":"vpn_04_0003.html", + "node_id":"en-us_topic_0000001592573553.xml", + "product_code":"vpn", + "code":"60", + "des":"If VPN network information conflicts with VPC network information or needs to be adjusted based on the latest network environment, you can modify the VPN.Log in to the ma", + "doc_type":"usermanual", + "kw":"Modifying a Created VPN,Classic VPN Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Modifying a Created VPN", + "githuburl":"" + }, + { + "uri":"vpn_04_0004.html", + "node_id":"en-us_topic_0000001592773709.xml", + "product_code":"vpn", + "code":"61", + "des":"You can delete a VPN if it is no longer required.Log in to the management console.Click in the upper left corner and select the desired region and project.Click Service ", + "doc_type":"usermanual", + "kw":"Deleting a VPN,Classic VPN Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Deleting a VPN", + "githuburl":"" + }, + { + "uri":"vpn_04_0700.html", + "node_id":"en-us_topic_0000001875296738.xml", + "product_code":"vpn", + "code":"62", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Monitoring", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Monitoring", + "githuburl":"" + }, + { + "uri":"vpn_04_0701.html", + "node_id":"en-us_topic_0000001875136910.xml", + "product_code":"vpn", + "code":"63", + "des":"Cloud Eye lets you keep a close eye on the performance and resource utilization of VPNs, ensuring VPN reliability and availability. You can use Cloud Eye to automatically", + "doc_type":"usermanual", + "kw":"Monitoring VPN,Monitoring,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Monitoring VPN", + "githuburl":"" + }, + { + "uri":"vpn_04_0702.html", + "node_id":"en-us_topic_0000001921096257.xml", + "product_code":"vpn", + "code":"64", + "des":"This section describes monitored metrics reported by VPN to Cloud Eye as well as their namespaces and dimensions. You can use the Cloud Eye management console to query th", + "doc_type":"usermanual", + "kw":"Metrics (Enterprise Edition VPN),Monitoring,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Metrics (Enterprise Edition VPN)", + "githuburl":"" + }, + { + "uri":"vpn_04_0705.html", + "node_id":"en-us_topic_0000001921215905.xml", + "product_code":"vpn", + "code":"65", + "des":"This section describes monitored metrics reported by VPN to Cloud Eye as well as their namespaces and dimensions. You can use the Cloud Eye management console to query th", + "doc_type":"usermanual", + "kw":"Metrics (Classic VPN),Monitoring,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Metrics (Classic VPN)", + "githuburl":"" + }, + { + "uri":"vpn_04_0704.html", + "node_id":"en-us_topic_0000001875296742.xml", + "product_code":"vpn", + "code":"66", + "des":"View the VPN connection status and usages of bandwidth and EIP. You can view data of the last 1, 3, 12, or 24 hours, or last 7 days.Viewing metrics on the Cloud Eye conso", + "doc_type":"usermanual", + "kw":"Viewing Metrics,Monitoring,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Viewing Metrics", + "githuburl":"" + }, + { + "uri":"vpn_04_0703.html", + "node_id":"en-us_topic_0000001875136914.xml", + "product_code":"vpn", + "code":"67", + "des":"You can configure alarm rules on the Cloud Eye console to keep track of your VPN status at any time.Log in to the management console.Click in the upper left corner and s", + "doc_type":"usermanual", + "kw":"Creating Alarm Rules,Monitoring,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Creating Alarm Rules", + "githuburl":"" + }, + { + "uri":"vpn_ug_00016.html", + "node_id":"en-us_topic_0000001921096261.xml", + "product_code":"vpn", + "code":"68", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Audit", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Audit", + "githuburl":"" + }, + { + "uri":"vpn_ug_00017.html", + "node_id":"en-us_topic_0000001921215913.xml", + "product_code":"vpn", + "code":"69", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"VPN Operations That Can Be Recorded by CTS,Audit,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"VPN Operations That Can Be Recorded by CTS", + "githuburl":"" + }, + { + "uri":"vpn_ug_00018.html", + "node_id":"en-us_topic_0000001875296746.xml", + "product_code":"vpn", + "code":"70", + "des":"After you enable CTS and the management tracker is created, CTS starts recording operations performed on VPN resources. You can view the operation records in the last sev", + "doc_type":"usermanual", + "kw":"Querying CTS Traces,Audit,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Querying CTS Traces", + "githuburl":"" + }, + { + "uri":"vpn_04_1200.html", + "node_id":"en-us_topic_0000001875136918.xml", + "product_code":"vpn", + "code":"71", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Permissions Management", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Permissions Management", + "githuburl":"" + }, + { + "uri":"vpn_04_1201.html", + "node_id":"en-us_topic_0000001921096265.xml", + "product_code":"vpn", + "code":"72", + "des":"Use the Identity and Access Management (IAM) service to implement fine-grained permissions control over your VPN resources. With IAM, you can:Create IAM users for employe", + "doc_type":"usermanual", + "kw":"Creating a User and Granting VPN Permissions,Permissions Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Creating a User and Granting VPN Permissions", + "githuburl":"" + }, + { + "uri":"vpn_04_1202.html", + "node_id":"en-us_topic_0000001921215917.xml", + "product_code":"vpn", + "code":"73", + "des":"Custom policies can be created to supplement the system-defined policies of VPN.You can create custom policies in either of the following ways:Visual editor: Select cloud", + "doc_type":"usermanual", + "kw":"VPN Custom Policies,Permissions Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"VPN Custom Policies", + "githuburl":"" + }, + { + "uri":"vpn_08_1513.html", + "node_id":"en-us_topic_0000001917855174.xml", + "product_code":"vpn", + "code":"74", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Tag Management", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Tag Management", + "githuburl":"" + }, + { + "uri":"vpn_08_1514.html", + "node_id":"en-us_topic_0000001917695266.xml", + "product_code":"vpn", + "code":"75", + "des":"VPN tags are used to identify VPN resources, facilitating VPN resource identification and management. You can add tags for a VPN resource when you create the VPN resource", + "doc_type":"usermanual", + "kw":"Scenario,Tag Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Scenario", + "githuburl":"" + }, + { + "uri":"vpn_08_1515.html", + "node_id":"en-us_topic_0000001947814261.xml", + "product_code":"vpn", + "code":"76", + "des":"You can search for VPN gateways, customer gateways, and VPN connections based on the tag keys and values that have been added for these VPN resources.Searching for Enterp", + "doc_type":"usermanual", + "kw":"Searching for Resources by Tag,Tag Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Searching for Resources by Tag", + "githuburl":"" + }, + { + "uri":"vpn_08_1516.html", + "node_id":"en-us_topic_0000001917855182.xml", + "product_code":"vpn", + "code":"77", + "des":"You can add, delete, modify, and view tags of VPN gateways.Managing tags of Enterprise Edition VPN gatewaysLog in to the management console.Click in the upper left corne", + "doc_type":"usermanual", + "kw":"Managing Tags,Tag Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Managing Tags", + "githuburl":"" + }, + { + "uri":"vpn_04_0411.html", + "node_id":"en-us_topic_0000001875296754.xml", + "product_code":"vpn", + "code":"78", + "des":"VPN resources include VPN gateways, VPN connection groups, and customer gateways.The total quota of each resource type varies according to regions.", + "doc_type":"usermanual", + "kw":"Quotas,Management,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Quotas", + "githuburl":"" + }, + { + "uri":"vpn_09_0000.html", + "node_id":"en-us_topic_0000001990602386.xml", + "product_code":"vpn", + "code":"79", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Administrator Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Administrator Guide", + "githuburl":"" + }, + { + "uri":"vpn_admin_0016.html", + "node_id":"en-us_topic_0000001990762094.xml", + "product_code":"vpn", + "code":"80", + "des":"This section describes how to create a VPN gateway and VPN connections to connect your on-premises network to a VPC subnet if your local data center uses FortiGate firewa", + "doc_type":"usermanual", + "kw":"Configuring VPN When Fortinet FortiGate Firewall Is Used,Administrator Guide,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Configuring VPN When Fortinet FortiGate Firewall Is Used", + "githuburl":"" + }, + { + "uri":"vpn_08_0000.html", + "node_id":"en-us_topic_0000001921037529.xml", + "product_code":"vpn", + "code":"81", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"FAQs", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"FAQs", + "githuburl":"" + }, + { + "uri":"vpn_08_1517.html", + "node_id":"en-us_topic_0000001921050593.xml", + "product_code":"vpn", + "code":"82", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Enterprise Edition VPN", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Enterprise Edition VPN", + "githuburl":"" + }, + { + "uri":"vpn_faq_00031.html", + "node_id":"en-us_topic_0000001956631549.xml", + "product_code":"vpn", + "code":"83", + "des":"A VPN is a point-to-point connection that implements private network access between two points.Applicable scenarios:A VPN is created between different regions to enable c", + "doc_type":"usermanual", + "kw":"What Are the Typical Scenarios of IPsec VPN?,Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"What Are the Typical Scenarios of IPsec VPN?", + "githuburl":"" + }, + { + "uri":"vpn_faq_00032.html", + "node_id":"en-us_topic_0000001956471773.xml", + "product_code":"vpn", + "code":"84", + "des":"VPC enables you to create private, isolated virtual networks. You can use VPN to securely access ECSs in VPCs.A VPN gateway is an egress gateway for a VPC. With a VPN gat", + "doc_type":"usermanual", + "kw":"What Are a VPC, a VPN Gateway, and a VPN Connection?,Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"What Are a VPC, a VPN Gateway, and a VPN Connection?", + "githuburl":"" + }, + { + "uri":"vpn_faq_00036.html", + "node_id":"en-us_topic_0000001929312950.xml", + "product_code":"vpn", + "code":"85", + "des":"The CIDR blocks of a VPC cannot conflict with on-premises CIDR blocks.To avoid conflicts with cloud service addresses, do not use 127.0.0.0/8, 169.254.0.0/16, 224.0.0.0/3", + "doc_type":"usermanual", + "kw":"How Do I Plan CIDR Blocks for Access to a VPC Through a VPN Connection?,Enterprise Edition VPN,User ", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"How Do I Plan CIDR Blocks for Access to a VPC Through a VPN Connection?", + "githuburl":"" + }, + { + "uri":"vpn_faq_00037.html", + "node_id":"en-us_topic_0000001929472290.xml", + "product_code":"vpn", + "code":"86", + "des":"Yes. An IPsec VPN connection is automatically established.", + "doc_type":"usermanual", + "kw":"Is an IPsec VPN Connection Automatically Established?,Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Is an IPsec VPN Connection Automatically Established?", + "githuburl":"" + }, + { + "uri":"vpn_faq_00040.html", + "node_id":"en-us_topic_0000001956631553.xml", + "product_code":"vpn", + "code":"87", + "des":"Perfect Forward Secrecy (PFS) is a security feature.IKE negotiation has two phases, phase one and phase two. The key of phase two (IPsec SA) is derived from the key gener", + "doc_type":"usermanual", + "kw":"What Are VPN Negotiation Parameters? What Are Their Default Values?,Enterprise Edition VPN,User Guid", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"What Are VPN Negotiation Parameters? What Are Their Default Values?", + "githuburl":"" + }, + { + "uri":"vpn_faq_00041.html", + "node_id":"en-us_topic_0000001956471777.xml", + "product_code":"vpn", + "code":"88", + "des":"No. IPsec VPN uses a pre-shared key (PSK) for authentication. The PSK is configured on a VPN gateway, and a connection will be established after VPN negotiation is comple", + "doc_type":"usermanual", + "kw":"Are a Username and Password Required for Creating an IPsec VPN Connection?,Enterprise Edition VPN,Us", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Are a Username and Password Required for Creating an IPsec VPN Connection?", + "githuburl":"" + }, + { + "uri":"vpn_faq_00043.html", + "node_id":"en-us_topic_0000001929312954.xml", + "product_code":"vpn", + "code":"89", + "des":"VPN gatewayThe following bandwidth information of a VPN gateway IP address can be monitored: inbound traffic, inbound bandwidth, outbound traffic, outbound bandwidth, and", + "doc_type":"usermanual", + "kw":"What VPN Resources Can Be Monitored?,Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"What VPN Resources Can Be Monitored?", + "githuburl":"" + }, + { + "uri":"vpn_faq_00044.html", + "node_id":"en-us_topic_0000001929472294.xml", + "product_code":"vpn", + "code":"90", + "des":"Yes.When creating a VPN gateway, you can bind EIPs as the gateway IP addresses.", + "doc_type":"usermanual", + "kw":"Can EIPs Be Used as VPN Gateway IP Addresses?,Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Can EIPs Be Used as VPN Gateway IP Addresses?", + "githuburl":"" + }, + { + "uri":"vpn_faq_00051.html", + "node_id":"en-us_topic_0000001956631557.xml", + "product_code":"vpn", + "code":"91", + "des":"IKEv2 is recommended because IKEv1 is not secure. In addition, IKEv2 outperforms IKEv1 in connection negotiation and establishment, authentication methods, dead peer dete", + "doc_type":"usermanual", + "kw":"Which IKE Version Should I Select When I Create a VPN Connection?,Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Which IKE Version Should I Select When I Create a VPN Connection?", + "githuburl":"" + }, + { + "uri":"vpn_faq_00144.html", + "node_id":"en-us_topic_0000001956471781.xml", + "product_code":"vpn", + "code":"92", + "des":"Log in to the management console and choose Virtual Private Network > Enterprise – VPN Connections.In the VPN connection list, locate the target VPN connection, and choos", + "doc_type":"usermanual", + "kw":"What Do I Do If a VPN Connection Fails to Be Established?,Enterprise Edition VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"What Do I Do If a VPN Connection Fails to Be Established?", + "githuburl":"" + }, + { + "uri":"vpn_08_1518.html", + "node_id":"en-us_topic_0000001874931582.xml", + "product_code":"vpn", + "code":"93", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Classic VPN", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Classic VPN", + "githuburl":"" + }, + { + "uri":"vpn_08_0305.html", + "node_id":"en-us_topic_0000001929312958.xml", + "product_code":"vpn", + "code":"94", + "des":"IPsec VPN connects two LANs, such as a branch and its headquarters (or a VPC), or an on-premises data center and a VPC.SSL VPN connects a client to a LAN. For example, th", + "doc_type":"usermanual", + "kw":"What Are the Differences Between the Application Scenarios and Connection Modes of IPsec and SSL VPN", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"What Are the Differences Between the Application Scenarios and Connection Modes of IPsec and SSL VPNs?", + "githuburl":"" + }, + { + "uri":"vpn_08_0232.html", + "node_id":"en-us_topic_0000001929472298.xml", + "product_code":"vpn", + "code":"95", + "des":"When a VPN connection is created, routes are automatically delivered to reach the remote subnets.", + "doc_type":"usermanual", + "kw":"Where Can I Add Routes on the VPN Console to Reach the Remote Subnets?,Classic VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Where Can I Add Routes on the VPN Console to Reach the Remote Subnets?", + "githuburl":"" + }, + { + "uri":"vpn_08_0233.html", + "node_id":"en-us_topic_0000001956631561.xml", + "product_code":"vpn", + "code":"96", + "des":"The VPN connection status can be monitored. After a VPN connection is created, the VPN service reports the connection status information to Cloud Eye, but does not automa", + "doc_type":"usermanual", + "kw":"Will I Be Notified If a VPN Connection Is Interrupted?,Classic VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Will I Be Notified If a VPN Connection Is Interrupted?", + "githuburl":"" + }, + { + "uri":"vpn_08_0323.html", + "node_id":"en-us_topic_0000001956471785.xml", + "product_code":"vpn", + "code":"97", + "des":"VPN uses the IPsec technology to connect your on-premises data center to a VPC on the cloud. As such, the number of VPN connections is related to the number of data cente", + "doc_type":"usermanual", + "kw":"How Many VPN Connections Do I Need to Connect to Multiple On-premises Servers?,Classic VPN,User Guid", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"How Many VPN Connections Do I Need to Connect to Multiple On-premises Servers?", + "githuburl":"" + }, + { + "uri":"vpn_08_0325.html", + "node_id":"en-us_topic_0000001929472302.xml", + "product_code":"vpn", + "code":"98", + "des":"When you configure a VPN, perform the following operations on the on-premises gateway:Configure IKE and IPsec policies.Specify the to-be-protected traffic (firewall).Chec", + "doc_type":"usermanual", + "kw":"What Are the Impacts of a VPN on an On-premises Network? What Are the Changes to the Route for Acces", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"What Are the Impacts of a VPN on an On-premises Network? What Are the Changes to the Route for Accessing an ECS?", + "githuburl":"" + }, + { + "uri":"vpn_08_0312.html", + "node_id":"en-us_topic_0000001956631565.xml", + "product_code":"vpn", + "code":"99", + "des":"Ensure that the on-premises gateway supports IPsec VPN.Create a VPN gateway and a VPN connection on the cloud. Select the VPC to which the Direct Connect connection uses ", + "doc_type":"usermanual", + "kw":"How Do I Replace a Direct Connect Connection with a VPN?,Classic VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"How Do I Replace a Direct Connect Connection with a VPN?", + "githuburl":"" + }, + { + "uri":"vpn_08_0318.html", + "node_id":"en-us_topic_0000001956471789.xml", + "product_code":"vpn", + "code":"100", + "des":"A VPN connects a VPC on the cloud and an on-premises local area network (LAN).The home network is not a part of the LAN of your enterprise and cannot be directly connecte", + "doc_type":"usermanual", + "kw":"How Do I Access ECSs at Home When My Enterprise Network Has Been Connected to the Cloud Through a VP", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"How Do I Access ECSs at Home When My Enterprise Network Has Been Connected to the Cloud Through a VPN?", + "githuburl":"" + }, + { + "uri":"vpn_08_0614.html", + "node_id":"en-us_topic_0000001929472306.xml", + "product_code":"vpn", + "code":"101", + "des":"By default, DPD is enabled on the cloud side and cannot be disabled.Configure DPD as follows:DPD-type: on-demandDPD idle-time: 30sDPD retransmit-interval: 15sDPD retry-li", + "doc_type":"usermanual", + "kw":"How Do I Configure DPD for Interconnection with the Cloud?,Classic VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"How Do I Configure DPD for Interconnection with the Cloud?", + "githuburl":"" + }, + { + "uri":"vpn_08_1501.html", + "node_id":"en-us_topic_0000001979423939.xml", + "product_code":"vpn", + "code":"102", + "des":"Quotas can limit the number or amount of resources available to users, such as the maximum number of ECSs or EVS disks that can be created.If the existing resource quota ", + "doc_type":"usermanual", + "kw":"What Is the VPN Quota?,Classic VPN,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"What Is the VPN Quota?", + "githuburl":"" + }, + { + "uri":"vpn_08_0713.html", + "node_id":"en-us_topic_0000001986263977.xml", + "product_code":"vpn", + "code":"103", + "des":"After a VPN connection is created, its status changes to Normal only after servers at both ends of the VPN connection communicate with each other.IKE v1:If no traffic goe", + "doc_type":"usermanual", + "kw":"Why Is Not Connected Displayed as the Status for a Successfully Created VPN Connection?,Classic VPN,", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Why Is Not Connected Displayed as the Status for a Successfully Created VPN Connection?", + "githuburl":"" + }, + { + "uri":"vpn_08_1519.html", + "node_id":"en-us_topic_0000001874918542.xml", + "product_code":"vpn", + "code":"104", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Change History,User Guide", + "search_title":"", + "metedata":[ + { + "documenttype":"usermanual", + "prodname":"vpn", + "opensource":"true" + } + ], + "title":"Change History", "githuburl":"" } ] \ No newline at end of file diff --git a/docs/vpn/umn/CLASS.TXT.json b/docs/vpn/umn/CLASS.TXT.json index 07b96ae3..eaea4736 100644 --- a/docs/vpn/umn/CLASS.TXT.json +++ b/docs/vpn/umn/CLASS.TXT.json @@ -3,333 +3,936 @@ "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"vpn", "title":"Overview", - "uri":"en-us_topic_0035391332.html", + "uri":"vpn_01_0000.html", "doc_type":"usermanual", "p_code":"", "code":"1" }, { - "desc":"A Virtual Private Network (VPN) establishes an encrypted, Internet-based communications tunnel between a user and a Virtual Private Cloud (VPC). With VPN, you can connect", + "desc":"Virtual Private Network (VPN) establishes secure, reliable, and cost-effective encrypted connections between your on-premises network or data center and a virtual network", "product_code":"vpn", - "title":"Virtual Private Network", + "title":"What Is VPN?", "uri":"en-us_topic_0035391393.html", "doc_type":"usermanual", "p_code":"1", "code":"2" }, { - "desc":"The Internet Protocol Security (IPsec) VPN is an encrypted tunneling technology that uses encrypted security services to establish confidential and secure communication t", + "desc":"Enterprise Edition VPN has the following advantages:High securityData is encrypted using IKE/IPsec, ensuring high data security.A VPN gateway is exclusive to a tenant, is", "product_code":"vpn", - "title":"IPsec VPN", - "uri":"en-us_topic_0160974607.html", + "title":"Product Advantages", + "uri":"vpn_01_0002.html", "doc_type":"usermanual", "p_code":"1", "code":"3" }, { - "desc":"With the VPN between the VPC and your traditional data center, you can easily use the ECSs and block storage resources provided by the cloud platform.Applications can be ", + "desc":"You can use a VPN to connect your on-premises data center to a VPC and use the elastic and fast scaling capabilities of the cloud to expand application computing capabili", "product_code":"vpn", "title":"Application Scenarios", - "uri":"en-us_topic_0035391412.html", + "uri":"vpn_01_0032.html", "doc_type":"usermanual", "p_code":"1", "code":"4" }, { - "desc":"The following standards and protocols are associated with the IPsec VPN:RFC 4301: Security Architecture for the Internet ProtocolRFC 2403: The Use of HMAC-MD5-96 within E", + "desc":"The specification of a VPN gateway can be changed between Basic and Professional 1.The specification of a VPN gateway can be changed between Professional 1 and Profession", "product_code":"vpn", - "title":"Reference Standards and Protocols", - "uri":"en-us_topic_0081947484.html", + "title":"Product Specifications", + "uri":"vpn_01_0036.html", "doc_type":"usermanual", "p_code":"1", "code":"5" }, { - "desc":"A region and availability zone (AZ) identify the location of a data center. You can create resources in a specific region and AZ.A region is a physical data center, which", + "desc":"By default, the maximum length of TCP packets supported by a VPN gateway is 1300 bytes.Enable NAT traversal on the customer gateway based on the networking.If the custome", "product_code":"vpn", - "title":"Region and AZ", - "uri":"en-us_topic_0185622695.html", + "title":"Quotas and Limitations", + "uri":"vpn_01_0005.html", "doc_type":"usermanual", "p_code":"1", "code":"6" }, { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "desc":"The following standards and protocols are associated with VPN:RFC 2403: The Use of HMAC-MD5-96 within ESP and AHRFC 2404: The Use of HMAC-SHA-1-96 within ESP and AHRFC 24", "product_code":"vpn", - "title":"Getting Started", - "uri":"en-us_topic_0035391382.html", + "title":"Reference Standards and Protocols", + "uri":"vpn_01_0006.html", "doc_type":"usermanual", - "p_code":"", + "p_code":"1", "code":"7" }, { - "desc":"A VPC provides an isolated virtual network for ECSs. You can configure and manage the network as required.Create a VPC by following the procedure provided in this section", + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"vpn", - "title":"(Optional) Create a VPC", - "uri":"en-us_topic_0122970066.html", + "title":"Differences between Enterprise Edition VPN and Classic VPN", + "uri":"vpn_01_0033.html", "doc_type":"usermanual", - "p_code":"7", + "p_code":"1", "code":"8" }, - { - "desc":"You can add subnets during VPC creation. If required, you can also create subnets for an existing VPC.The created subnet is configured with DHCP by default. After an ECS ", - "product_code":"vpn", - "title":"(Optional) Create a Subnet for the VPC", - "uri":"en-us_topic_0122970067.html", - "doc_type":"usermanual", - "p_code":"7", - "code":"9" - }, - { - "desc":"By default, ECSs in a VPC cannot communicate with your data center or private network. To enable communication between them, use a VPN. You need to create a VPN in your V", - "product_code":"vpn", - "title":"Creating a VPN", - "uri":"en-us_topic_0060118606.html", - "doc_type":"usermanual", - "p_code":"7", - "code":"10" - }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"vpn", - "title":"(Optional) Configure Security Group Rules", - "uri":"en-us_topic_0035634996.html", + "title":"Security", + "uri":"vpn_08_1503.html", "doc_type":"usermanual", - "p_code":"7", + "p_code":"1", + "code":"9" + }, + { + "desc":"A VPN connection supports authentication of a customer gateway using a pre-shared key (PSK).The identity authentication succeeds and the VPN connection can be set up only", + "product_code":"vpn", + "title":"Identity Authentication and Access Control", + "uri":"vpn_01_0020.html", + "doc_type":"usermanual", + "p_code":"9", + "code":"10" + }, + { + "desc":"VPN is a tunneling technology that provides IP-layer security using the IKE/IPsec protocol suite. It ensures confidentiality and integrity of IP data packets and prevents", + "product_code":"vpn", + "title":"Data Protection Technologies", + "uri":"vpn_01_0021.html", + "doc_type":"usermanual", + "p_code":"9", "code":"11" }, { - "desc":"To improve ECS access security, you can create a security group, define security group rules, and add ECSs in the VPC to the security group. We recommend that you allocat", + "desc":"VPN records the create, delete, and modify operations performed on all resources initiated by your account, and sends the records to Cloud Trace Service (CTS) in log file", "product_code":"vpn", - "title":"Creating a Security Group", - "uri":"en-us_topic_0013748715.html", + "title":"Audit and Logs", + "uri":"vpn_01_0022.html", "doc_type":"usermanual", - "p_code":"11", + "p_code":"9", "code":"12" }, { - "desc":"After a security group is created, you can add rules to the security group. A rule applies either to inbound traffic (ingress) or outbound traffic (egress). After ECSs ar", + "desc":"VPN provides the dual-AZ disaster recovery function. You can create a VPN gateway in two AZs in the same region, and create a VPN connection between the customer gateway ", "product_code":"vpn", - "title":"Adding a Security Group Rule", - "uri":"en-us_topic_0030969470.html", + "title":"Service Resilience", + "uri":"vpn_01_0023.html", "doc_type":"usermanual", - "p_code":"11", + "p_code":"9", "code":"13" }, { - "desc":"If the source of an inbound security group rule or destination of an outbound security group rule needs to be changed, you need to first delete the security group rule an", + "desc":"If you need to assign different permissions to personnel in your enterprise to access your VPN resources created on the cloud service platform, Identity and Access Manage", "product_code":"vpn", - "title":"Deleting a Security Group Rule", - "uri":"en-us_topic_0030969471.html", + "title":"Permissions Management", + "uri":"vpn_01_0011.html", "doc_type":"usermanual", - "p_code":"11", + "p_code":"1", "code":"14" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"vpn", - "title":"Management", - "uri":"en-us_topic_0035391378.html", + "title":"Basic Concepts", + "uri":"vpn_01_0034.html", "doc_type":"usermanual", - "p_code":"", + "p_code":"1", "code":"15" }, { - "desc":"You can view details about an existing VPN.Log in to the management console.Click in the upper left corner and select the desired region and project.On the console homep", + "desc":"Internet Protocol Security (IPsec) VPN uses a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication ", "product_code":"vpn", - "title":"Viewing a VPN", - "uri":"en-us_topic_0035506845.html", + "title":"IPsec VPN", + "uri":"vpn_01_0035.html", "doc_type":"usermanual", "p_code":"15", "code":"16" }, { - "desc":"If the VPN network information conflicts the VPC network information or you need to adjust VPN configurations, you can modify a VPN.Log in to the management console.Click", + "desc":"SSL VPN is a virtual private network technology using the SSL protocol. It allows remote users to securely access enterprise intranet resources.", "product_code":"vpn", - "title":"Modifying a VPN", - "uri":"en-us_topic_0035391295.html", + "title":"SSL VPN", + "uri":"vpn_08_1504.html", "doc_type":"usermanual", "p_code":"15", "code":"17" }, { - "desc":"You can delete a VPN to release network resources if the VPN is no longer required.Log in to the management console.Click in the upper left corner and select a region an", + "desc":"A VPN gateway is a virtual gateway of VPN on the cloud. It establishes secure private connections with a customer gateway in your on-premises network or data center.A VPN", "product_code":"vpn", - "title":"Deleting a VPN", - "uri":"en-us_topic_0035616925.html", + "title":"VPN Gateway", + "uri":"vpn_01_0012.html", "doc_type":"usermanual", "p_code":"15", "code":"18" }, { - "desc":"A VPN tag identifies a VPN. Tags can be added to VPNs to facilitate VPN identification and administration. You can add a tag to a VPN when creating the VPN. Alternatively", + "desc":"A VPN connection is a secure channel between a VPN gateway and a customer gateway. VPN connections use the IKE and IPsec protocols to encrypt the transmitted data.A VPN c", "product_code":"vpn", - "title":"Managing VPN Tags", - "uri":"en-us_topic_0107396413.html", + "title":"VPN Connection", + "uri":"vpn_01_0013.html", "doc_type":"usermanual", "p_code":"15", "code":"19" }, { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "desc":"The bandwidth you purchased for a VPN gateway refers to outbound bandwidth, that is, bandwidth for traffic sent from a VPC on the cloud to a customer gateway in an on-pre", "product_code":"vpn", - "title":"VPN Best Practice", - "uri":"en-us_topic_0114174493.html", + "title":"VPN Gateway Bandwidth", + "uri":"vpn_01_0014.html", "doc_type":"usermanual", - "p_code":"", + "p_code":"15", "code":"20" }, { - "desc":"By default, ECSs in a VPC cannot communicate with your data center or private network. To enable communication between them, use a VPN. After a VPN is created, configure ", + "desc":"Local subnets are VPC subnets that need to communicate with an on-premises network through VPN. When you buy a VPN gateway, you can set Local Subnet to either of the foll", "product_code":"vpn", - "title":"Connecting to a VPC Through a VPN", - "uri":"en-us_topic_0066871940.html", + "title":"Local Subnet", + "uri":"vpn_01_0015.html", "doc_type":"usermanual", - "p_code":"20", + "p_code":"15", "code":"21" }, + { + "desc":"A customer gateway is a resource that provides information on the console about your customer gateway device, which can be a physical device or software application in yo", + "product_code":"vpn", + "title":"Customer Gateway", + "uri":"vpn_01_0016.html", + "doc_type":"usermanual", + "p_code":"15", + "code":"22" + }, + { + "desc":"Customer subnets are subnets in an on-premises data center that access a VPC on the cloud through a VPN. You need to enter subnets using CIDR notation (example: 192.168.0", + "product_code":"vpn", + "title":"Customer Subnet", + "uri":"vpn_01_0017.html", + "doc_type":"usermanual", + "p_code":"15", + "code":"23" + }, + { + "desc":"A pre-shared key (PSK) is a key configured for a VPN connection on the cloud. It is used for IKE negotiation between VPN devices at both ends of a VPN connection. Ensure ", + "product_code":"vpn", + "title":"PSK", + "uri":"vpn_01_0018.html", + "doc_type":"usermanual", + "p_code":"15", + "code":"24" + }, + { + "desc":"Regions and availability zones (AZs) identify the locations of data centers. You can create resources in regions and AZs.A region is a physical data center location. Each", + "product_code":"vpn", + "title":"Region and AZ", + "uri":"vpn_01_0027.html", + "doc_type":"usermanual", + "p_code":"15", + "code":"25" + }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"vpn", - "title":"FAQs", - "uri":"en-us_topic_0035391365.html", + "title":"Getting Started", + "uri":"vpn_03_0000.html", "doc_type":"usermanual", "p_code":"", - "code":"22" - }, - { - "desc":"By default, a user can have a maximum of five IPsec VPNs. If your quota cannot fulfill your service requirements, submit a service ticket to increase the quota.", - "product_code":"vpn", - "title":"How Many IPsec VPNs Can I Have?", - "uri":"vpn_faq_0021.html", - "doc_type":"usermanual", - "p_code":"22", - "code":"23" - }, - { - "desc":"The IPsec VPN tunnel works in passive mode, which triggers automatic negotiation only when traffic sent by the local end passes through the tunnel.", - "product_code":"vpn", - "title":"Do IPsec VPNs Support Automatic Negotiation?", - "uri":"en-us_topic_0036149069.html", - "doc_type":"usermanual", - "p_code":"22", - "code":"24" - }, - { - "desc":"Log in to the management console and click Virtual Private Network.In the VPN list, locate the target VPN and click View Policyin the Operationcolumn to view IKE and IPse", - "product_code":"vpn", - "title":"What Do I Do If VPN Setup Fails?", - "uri":"vpn_faq_0055.html", - "doc_type":"usermanual", - "p_code":"22", - "code":"25" - }, - { - "desc":"The security group denies the access from all sources by default. If you want to access your ECSs, modify the security group configuration and allow the access from the r", - "product_code":"vpn", - "title":"How Can I Handle the Failure in Accessing the ECSs from My Data Center or LAN Even If the VPN Has Been Set Up?", - "uri":"vpn_faq_0056.html", - "doc_type":"usermanual", - "p_code":"22", "code":"26" }, { - "desc":"Check whether you have properly configured the firewall policies for the access from the public IP address of the cloud VPN to the public IP address of your data center o", + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"vpn", - "title":"What Do I Do If I Cannot Access My Data Center or LAN from the ECSs After a VPN Connection Has Been Set Up?", - "uri":"vpn_faq_0057.html", + "title":"Enterprise Edition VPN", + "uri":"vpn_08_1505.html", "doc_type":"usermanual", - "p_code":"22", + "p_code":"26", "code":"27" }, { - "desc":"If the two VPCs are in the same region, you can use a VPC peering connection to enable communication between them.If the two VPCs are in different regions, you can use a ", + "desc":"The supported regions are subject to those available on the console.To meet business development requirements, enterprise A needs to implement communication between its o", "product_code":"vpn", - "title":"Does a VPN Allow for Communication Between Two VPCs?", - "uri":"vpn_faq_0058.html", + "title":"Overview", + "uri":"vpn_qs_00003.html", "doc_type":"usermanual", - "p_code":"22", + "p_code":"27", "code":"28" }, { - "desc":"The maximum number obtained by multiplying the number of local subnets and that of remote subnets cannot exceed 2500.", + "desc":"A VPC has been created. For details about how to create a VPC, see the Virtual Private Cloud User Guide.Security group rules have been configured for ECSs in the VPC, and", "product_code":"vpn", - "title":"What Is the Limitation on the Number of Local and Remote Subnets of a VPN?", - "uri":"en-us_topic_0044789110.html", + "title":"Step 1: Creating a VPN Gateway", + "uri":"vpn_03_0204.html", "doc_type":"usermanual", - "p_code":"22", + "p_code":"27", "code":"29" }, { - "desc":"After a VPN is created, its status changes to Normalonly after the VMs or physical servers on the two sides of the VPN communicate with each other.IKE v1:If no traffic go", + "desc":"The following describes only key parameters.Check the created customer gateway on the Customer Gateways page.", "product_code":"vpn", - "title":"Why Is Not Connected Displayed as the Status for a Successfully Created VPN?", - "uri":"en-us_topic_0045305370.html", + "title":"Step 2: Creating a Customer Gateway", + "uri":"vpn_qs_00007.html", "doc_type":"usermanual", - "p_code":"22", + "p_code":"27", "code":"30" }, { - "desc":"The time required for VPN configurations to take effect increases linearly with the number obtained by multiplying the number of local subnets and that of remote subnets.", + "desc":"The following describes only key parameters.Check the created VPN connection on the VPN Connections page. The initial state of the VPN connection is Creating. As the cust", "product_code":"vpn", - "title":"How Long Is Required for Issued VPN Configurations to Take Effect?", - "uri":"en-us_topic_0051518174.html", + "title":"Step 3: Creating VPN Connection 1", + "uri":"vpn_qs_00008.html", "doc_type":"usermanual", - "p_code":"22", + "p_code":"27", "code":"31" }, { - "desc":"Due to the symmetry of the tunnel, the VPN parameters configured on the cloud must be the same as those configured in your own data center. If they are different, a VPN c", + "desc":"For VPN connection 2, you are advised to use the same settings as VPN connection 1, except the connection name, gateway IP address, local tunnel interface IP address, and", "product_code":"vpn", - "title":"How Do I Configure a Remote Device for a VPN?", - "uri":"en-us_topic_0109312453.html", + "title":"Step 4: Creating VPN Connection 2", + "uri":"vpn_03_0335.html", "doc_type":"usermanual", - "p_code":"22", + "p_code":"27", "code":"32" }, { - "desc":"Most devices that meet IPsec VPN standard and reference protocol requirements can be used as the remote VPN devices, for example, Cisco ASA firewalls, Huawei USG6xxxxseri", + "desc":"In this example, the customer gateway device is an AR router.In this command, 22.xx.xx.1 is the gateway address of the AR router's public IP address. Replace it with the ", "product_code":"vpn", - "title":"Which Remote VPN Devices Are Supported?", - "uri":"en-us_topic_0109676043.html", + "title":"Step 5: Configuring the Customer Gateway Device", + "uri":"vpn_03_0336.html", "doc_type":"usermanual", - "p_code":"22", + "p_code":"27", "code":"33" }, { - "desc":"You can perform the following steps to handle the issues:Check the ECS specifications. Rate limiting is not performed for the VPN ingress on the cloud, so the issue may b", + "desc":"In this example, use VNC provided on the management console to log in to an ECS.ping 172.16.0.100172.16.0.100 is the IP address of a server in the on-premises data center", "product_code":"vpn", - "title":"What Can I Do If the VPN Fails or the Network Speed of the VPN Is Slow?", - "uri":"en-us_topic_0142368417.html", + "title":"Step 6: Verifying Network Connectivity", + "uri":"vpn_03_0337.html", "doc_type":"usermanual", - "p_code":"22", + "p_code":"27", "code":"34" }, { - "desc":"Currently, the VPN service does not support the SSL VPNs.", + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"vpn", - "title":"Are SSL VPNs Supported?", - "uri":"en-us_topic_0142373840.html", + "title":"Classic VPN", + "uri":"vpn_08_1507.html", "doc_type":"usermanual", - "p_code":"22", + "p_code":"26", "code":"35" }, { - "desc":"Quotas are enforced for service resources on the platform to prevent unforeseen spikes in resource usage. Quotas can limit the number or amount of resources available to ", + "desc":"By default, ECSs in a VPC cannot communicate with devices in your on-premises data center or private network. To enable communication between them, you can use a VPN by c", "product_code":"vpn", - "title":"What Is the VPN Quota?", - "uri":"en-us_topic_0035391366.html", + "title":"Creating a VPN", + "uri":"vpn_03_0004.html", "doc_type":"usermanual", - "p_code":"22", + "p_code":"35", "code":"36" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"vpn", - "title":"A Change History", - "uri":"en-us_topic_0041174633.html", + "title":"Management", + "uri":"vpn_04_0000.html", "doc_type":"usermanual", "p_code":"", "code":"37" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"Enterprise Edition VPN", + "uri":"vpn_08_1509.html", + "doc_type":"usermanual", + "p_code":"37", + "code":"38" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"Enterprise Edition VPN Gateway Management", + "uri":"vpn_ug_00001.html", + "doc_type":"usermanual", + "p_code":"38", + "code":"39" + }, + { + "desc":"To connect your on-premises data center or private network to your ECSs in a VPC, you need to create a VPN gateway before creating a VPN connection.The recommended networ", + "product_code":"vpn", + "title":"Creating a VPN Gateway", + "uri":"vpn_04_0421.html", + "doc_type":"usermanual", + "p_code":"39", + "code":"40" + }, + { + "desc":"After creating a VPN gateway, you can view its details.Log in to the management console.Click in the upper left corner and select the desired region and project.Click i", + "product_code":"vpn", + "title":"Viewing a VPN Gateway", + "uri":"vpn_ug_00002.html", + "doc_type":"usermanual", + "p_code":"39", + "code":"41" + }, + { + "desc":"You can modify basic information about a VPN gateway, including the name and local subnet.Log in to the management console.Click in the upper left corner and select the ", + "product_code":"vpn", + "title":"Modifying a VPN Gateway", + "uri":"vpn_ug_00003.html", + "doc_type":"usermanual", + "p_code":"39", + "code":"42" + }, + { + "desc":"You can bind EIPs to a VPN gateway that has been created.Log in to the management console.Click in the upper left corner and select the desired region and project.Click ", + "product_code":"vpn", + "title":"Binding an EIP to a VPN Gateway", + "uri":"vpn_ug_00004.html", + "doc_type":"usermanual", + "p_code":"39", + "code":"43" + }, + { + "desc":"After a VPN gateway is created, you can unbind an EIP from it.An EIP that is in use by a VPN connection cannot be unbound from a VPN gateway.Log in to the management cons", + "product_code":"vpn", + "title":"Unbinding an EIP from a VPN Gateway", + "uri":"vpn_04_0807.html", + "doc_type":"usermanual", + "p_code":"39", + "code":"44" + }, + { + "desc":"You can delete a VPN gateway that is no longer required.The delete operation is not supported for a VPN gateway that is being created, updated, or deleted.If a VPN gatewa", + "product_code":"vpn", + "title":"Deleting a VPN Gateway", + "uri":"vpn_ug_00007.html", + "doc_type":"usermanual", + "p_code":"39", + "code":"45" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"Customer Gateway Management of Enterprise Edition VPN", + "uri":"vpn_ug_00008.html", + "doc_type":"usermanual", + "p_code":"38", + "code":"46" + }, + { + "desc":"To connect your on-premises data center or private network to your ECSs in a VPC, you need to create a customer gateway before creating a VPN connection.Log in to the man", + "product_code":"vpn", + "title":"Creating a Customer Gateway", + "uri":"vpn_04_0431.html", + "doc_type":"usermanual", + "p_code":"46", + "code":"47" + }, + { + "desc":"After creating a customer gateway, you can view its details.Log in to the management console.Click in the upper left corner and select the desired region and project.Cli", + "product_code":"vpn", + "title":"Viewing a Customer Gateway", + "uri":"vpn_ug_00009.html", + "doc_type":"usermanual", + "p_code":"46", + "code":"48" + }, + { + "desc":"After creating a customer gateway, you can modify its name.Log in to the management console.Click in the upper left corner and select the desired region and project.Clic", + "product_code":"vpn", + "title":"Modifying a Customer Gateway", + "uri":"vpn_ug_00010.html", + "doc_type":"usermanual", + "p_code":"46", + "code":"49" + }, + { + "desc":"You can delete a customer gateway that you have created.Before deleting a customer gateway associated with a VPN connection, remove the customer gateway from the VPN conn", + "product_code":"vpn", + "title":"Deleting a Customer Gateway", + "uri":"vpn_ug_00011.html", + "doc_type":"usermanual", + "p_code":"46", + "code":"50" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"Enterprise Edition VPN Connection Management", + "uri":"vpn_ug_00012.html", + "doc_type":"usermanual", + "p_code":"38", + "code":"51" + }, + { + "desc":"To connect your on-premises data center or private network to your ECSs in a VPC, you need to create VPN connections after creating a VPN gateway and a customer gateway.W", + "product_code":"vpn", + "title":"Creating a VPN Connection", + "uri":"vpn_04_0441.html", + "doc_type":"usermanual", + "p_code":"51", + "code":"52" + }, + { + "desc":"After VPN connections are created, you can configure health check to enable the VPN gateway to send probe packets to the customer gateway to collect statistics about the ", + "product_code":"vpn", + "title":"Configuring Health Check", + "uri":"vpn_ug_00023.html", + "doc_type":"usermanual", + "p_code":"51", + "code":"53" + }, + { + "desc":"After creating a VPN connection, you can view its details.Log in to the management console.Click in the upper left corner and select the desired region and project.Click", + "product_code":"vpn", + "title":"Viewing a VPN Connection", + "uri":"vpn_ug_00013.html", + "doc_type":"usermanual", + "p_code":"51", + "code":"54" + }, + { + "desc":"A VPN connection is an encrypted communications channel established between a VPN gateway in a VPC and a customer gateway in your on-premises data center. You can modify ", + "product_code":"vpn", + "title":"Modifying a VPN Connection", + "uri":"vpn_ug_00014.html", + "doc_type":"usermanual", + "p_code":"51", + "code":"55" + }, + { + "desc":"If a VPN connection is no longer required, you can delete it to release network resources.Log in to the management console.Click in the upper left corner and select the ", + "product_code":"vpn", + "title":"Deleting a VPN Connection", + "uri":"vpn_04_1003.html", + "doc_type":"usermanual", + "p_code":"51", + "code":"56" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"Classic VPN", + "uri":"vpn_08_1511.html", + "doc_type":"usermanual", + "p_code":"37", + "code":"57" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"Classic VPN Management", + "uri":"vpn_04_0470.html", + "doc_type":"usermanual", + "p_code":"57", + "code":"58" + }, + { + "desc":"You can view details about an existing VPN.Log in to the management console.Click in the upper left corner and select the desired region and project.Click Service List a", + "product_code":"vpn", + "title":"Viewing Created VPNs", + "uri":"vpn_04_0002.html", + "doc_type":"usermanual", + "p_code":"58", + "code":"59" + }, + { + "desc":"If VPN network information conflicts with VPC network information or needs to be adjusted based on the latest network environment, you can modify the VPN.Log in to the ma", + "product_code":"vpn", + "title":"Modifying a Created VPN", + "uri":"vpn_04_0003.html", + "doc_type":"usermanual", + "p_code":"58", + "code":"60" + }, + { + "desc":"You can delete a VPN if it is no longer required.Log in to the management console.Click in the upper left corner and select the desired region and project.Click Service ", + "product_code":"vpn", + "title":"Deleting a VPN", + "uri":"vpn_04_0004.html", + "doc_type":"usermanual", + "p_code":"58", + "code":"61" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"Monitoring", + "uri":"vpn_04_0700.html", + "doc_type":"usermanual", + "p_code":"37", + "code":"62" + }, + { + "desc":"Cloud Eye lets you keep a close eye on the performance and resource utilization of VPNs, ensuring VPN reliability and availability. You can use Cloud Eye to automatically", + "product_code":"vpn", + "title":"Monitoring VPN", + "uri":"vpn_04_0701.html", + "doc_type":"usermanual", + "p_code":"62", + "code":"63" + }, + { + "desc":"This section describes monitored metrics reported by VPN to Cloud Eye as well as their namespaces and dimensions. You can use the Cloud Eye management console to query th", + "product_code":"vpn", + "title":"Metrics (Enterprise Edition VPN)", + "uri":"vpn_04_0702.html", + "doc_type":"usermanual", + "p_code":"62", + "code":"64" + }, + { + "desc":"This section describes monitored metrics reported by VPN to Cloud Eye as well as their namespaces and dimensions. You can use the Cloud Eye management console to query th", + "product_code":"vpn", + "title":"Metrics (Classic VPN)", + "uri":"vpn_04_0705.html", + "doc_type":"usermanual", + "p_code":"62", + "code":"65" + }, + { + "desc":"View the VPN connection status and usages of bandwidth and EIP. You can view data of the last 1, 3, 12, or 24 hours, or last 7 days.Viewing metrics on the Cloud Eye conso", + "product_code":"vpn", + "title":"Viewing Metrics", + "uri":"vpn_04_0704.html", + "doc_type":"usermanual", + "p_code":"62", + "code":"66" + }, + { + "desc":"You can configure alarm rules on the Cloud Eye console to keep track of your VPN status at any time.Log in to the management console.Click in the upper left corner and s", + "product_code":"vpn", + "title":"Creating Alarm Rules", + "uri":"vpn_04_0703.html", + "doc_type":"usermanual", + "p_code":"62", + "code":"67" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"Audit", + "uri":"vpn_ug_00016.html", + "doc_type":"usermanual", + "p_code":"37", + "code":"68" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"VPN Operations That Can Be Recorded by CTS", + "uri":"vpn_ug_00017.html", + "doc_type":"usermanual", + "p_code":"68", + "code":"69" + }, + { + "desc":"After you enable CTS and the management tracker is created, CTS starts recording operations performed on VPN resources. You can view the operation records in the last sev", + "product_code":"vpn", + "title":"Querying CTS Traces", + "uri":"vpn_ug_00018.html", + "doc_type":"usermanual", + "p_code":"68", + "code":"70" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"Permissions Management", + "uri":"vpn_04_1200.html", + "doc_type":"usermanual", + "p_code":"37", + "code":"71" + }, + { + "desc":"Use the Identity and Access Management (IAM) service to implement fine-grained permissions control over your VPN resources. With IAM, you can:Create IAM users for employe", + "product_code":"vpn", + "title":"Creating a User and Granting VPN Permissions", + "uri":"vpn_04_1201.html", + "doc_type":"usermanual", + "p_code":"71", + "code":"72" + }, + { + "desc":"Custom policies can be created to supplement the system-defined policies of VPN.You can create custom policies in either of the following ways:Visual editor: Select cloud", + "product_code":"vpn", + "title":"VPN Custom Policies", + "uri":"vpn_04_1202.html", + "doc_type":"usermanual", + "p_code":"71", + "code":"73" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"Tag Management", + "uri":"vpn_08_1513.html", + "doc_type":"usermanual", + "p_code":"37", + "code":"74" + }, + { + "desc":"VPN tags are used to identify VPN resources, facilitating VPN resource identification and management. You can add tags for a VPN resource when you create the VPN resource", + "product_code":"vpn", + "title":"Scenario", + "uri":"vpn_08_1514.html", + "doc_type":"usermanual", + "p_code":"74", + "code":"75" + }, + { + "desc":"You can search for VPN gateways, customer gateways, and VPN connections based on the tag keys and values that have been added for these VPN resources.Searching for Enterp", + "product_code":"vpn", + "title":"Searching for Resources by Tag", + "uri":"vpn_08_1515.html", + "doc_type":"usermanual", + "p_code":"74", + "code":"76" + }, + { + "desc":"You can add, delete, modify, and view tags of VPN gateways.Managing tags of Enterprise Edition VPN gatewaysLog in to the management console.Click in the upper left corne", + "product_code":"vpn", + "title":"Managing Tags", + "uri":"vpn_08_1516.html", + "doc_type":"usermanual", + "p_code":"74", + "code":"77" + }, + { + "desc":"VPN resources include VPN gateways, VPN connection groups, and customer gateways.The total quota of each resource type varies according to regions.", + "product_code":"vpn", + "title":"Quotas", + "uri":"vpn_04_0411.html", + "doc_type":"usermanual", + "p_code":"37", + "code":"78" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"Administrator Guide", + "uri":"vpn_09_0000.html", + "doc_type":"usermanual", + "p_code":"", + "code":"79" + }, + { + "desc":"This section describes how to create a VPN gateway and VPN connections to connect your on-premises network to a VPC subnet if your local data center uses FortiGate firewa", + "product_code":"vpn", + "title":"Configuring VPN When Fortinet FortiGate Firewall Is Used", + "uri":"vpn_admin_0016.html", + "doc_type":"usermanual", + "p_code":"79", + "code":"80" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"FAQs", + "uri":"vpn_08_0000.html", + "doc_type":"usermanual", + "p_code":"", + "code":"81" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"Enterprise Edition VPN", + "uri":"vpn_08_1517.html", + "doc_type":"usermanual", + "p_code":"81", + "code":"82" + }, + { + "desc":"A VPN is a point-to-point connection that implements private network access between two points.Applicable scenarios:A VPN is created between different regions to enable c", + "product_code":"vpn", + "title":"What Are the Typical Scenarios of IPsec VPN?", + "uri":"vpn_faq_00031.html", + "doc_type":"usermanual", + "p_code":"82", + "code":"83" + }, + { + "desc":"VPC enables you to create private, isolated virtual networks. You can use VPN to securely access ECSs in VPCs.A VPN gateway is an egress gateway for a VPC. With a VPN gat", + "product_code":"vpn", + "title":"What Are a VPC, a VPN Gateway, and a VPN Connection?", + "uri":"vpn_faq_00032.html", + "doc_type":"usermanual", + "p_code":"82", + "code":"84" + }, + { + "desc":"The CIDR blocks of a VPC cannot conflict with on-premises CIDR blocks.To avoid conflicts with cloud service addresses, do not use 127.0.0.0/8, 169.254.0.0/16, 224.0.0.0/3", + "product_code":"vpn", + "title":"How Do I Plan CIDR Blocks for Access to a VPC Through a VPN Connection?", + "uri":"vpn_faq_00036.html", + "doc_type":"usermanual", + "p_code":"82", + "code":"85" + }, + { + "desc":"Yes. An IPsec VPN connection is automatically established.", + "product_code":"vpn", + "title":"Is an IPsec VPN Connection Automatically Established?", + "uri":"vpn_faq_00037.html", + "doc_type":"usermanual", + "p_code":"82", + "code":"86" + }, + { + "desc":"Perfect Forward Secrecy (PFS) is a security feature.IKE negotiation has two phases, phase one and phase two. The key of phase two (IPsec SA) is derived from the key gener", + "product_code":"vpn", + "title":"What Are VPN Negotiation Parameters? What Are Their Default Values?", + "uri":"vpn_faq_00040.html", + "doc_type":"usermanual", + "p_code":"82", + "code":"87" + }, + { + "desc":"No. IPsec VPN uses a pre-shared key (PSK) for authentication. The PSK is configured on a VPN gateway, and a connection will be established after VPN negotiation is comple", + "product_code":"vpn", + "title":"Are a Username and Password Required for Creating an IPsec VPN Connection?", + "uri":"vpn_faq_00041.html", + "doc_type":"usermanual", + "p_code":"82", + "code":"88" + }, + { + "desc":"VPN gatewayThe following bandwidth information of a VPN gateway IP address can be monitored: inbound traffic, inbound bandwidth, outbound traffic, outbound bandwidth, and", + "product_code":"vpn", + "title":"What VPN Resources Can Be Monitored?", + "uri":"vpn_faq_00043.html", + "doc_type":"usermanual", + "p_code":"82", + "code":"89" + }, + { + "desc":"Yes.When creating a VPN gateway, you can bind EIPs as the gateway IP addresses.", + "product_code":"vpn", + "title":"Can EIPs Be Used as VPN Gateway IP Addresses?", + "uri":"vpn_faq_00044.html", + "doc_type":"usermanual", + "p_code":"82", + "code":"90" + }, + { + "desc":"IKEv2 is recommended because IKEv1 is not secure. In addition, IKEv2 outperforms IKEv1 in connection negotiation and establishment, authentication methods, dead peer dete", + "product_code":"vpn", + "title":"Which IKE Version Should I Select When I Create a VPN Connection?", + "uri":"vpn_faq_00051.html", + "doc_type":"usermanual", + "p_code":"82", + "code":"91" + }, + { + "desc":"Log in to the management console and choose Virtual Private Network > Enterprise – VPN Connections.In the VPN connection list, locate the target VPN connection, and choos", + "product_code":"vpn", + "title":"What Do I Do If a VPN Connection Fails to Be Established?", + "uri":"vpn_faq_00144.html", + "doc_type":"usermanual", + "p_code":"82", + "code":"92" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"Classic VPN", + "uri":"vpn_08_1518.html", + "doc_type":"usermanual", + "p_code":"81", + "code":"93" + }, + { + "desc":"IPsec VPN connects two LANs, such as a branch and its headquarters (or a VPC), or an on-premises data center and a VPC.SSL VPN connects a client to a LAN. For example, th", + "product_code":"vpn", + "title":"What Are the Differences Between the Application Scenarios and Connection Modes of IPsec and SSL VPNs?", + "uri":"vpn_08_0305.html", + "doc_type":"usermanual", + "p_code":"93", + "code":"94" + }, + { + "desc":"When a VPN connection is created, routes are automatically delivered to reach the remote subnets.", + "product_code":"vpn", + "title":"Where Can I Add Routes on the VPN Console to Reach the Remote Subnets?", + "uri":"vpn_08_0232.html", + "doc_type":"usermanual", + "p_code":"93", + "code":"95" + }, + { + "desc":"The VPN connection status can be monitored. After a VPN connection is created, the VPN service reports the connection status information to Cloud Eye, but does not automa", + "product_code":"vpn", + "title":"Will I Be Notified If a VPN Connection Is Interrupted?", + "uri":"vpn_08_0233.html", + "doc_type":"usermanual", + "p_code":"93", + "code":"96" + }, + { + "desc":"VPN uses the IPsec technology to connect your on-premises data center to a VPC on the cloud. As such, the number of VPN connections is related to the number of data cente", + "product_code":"vpn", + "title":"How Many VPN Connections Do I Need to Connect to Multiple On-premises Servers?", + "uri":"vpn_08_0323.html", + "doc_type":"usermanual", + "p_code":"93", + "code":"97" + }, + { + "desc":"When you configure a VPN, perform the following operations on the on-premises gateway:Configure IKE and IPsec policies.Specify the to-be-protected traffic (firewall).Chec", + "product_code":"vpn", + "title":"What Are the Impacts of a VPN on an On-premises Network? What Are the Changes to the Route for Accessing an ECS?", + "uri":"vpn_08_0325.html", + "doc_type":"usermanual", + "p_code":"93", + "code":"98" + }, + { + "desc":"Ensure that the on-premises gateway supports IPsec VPN.Create a VPN gateway and a VPN connection on the cloud. Select the VPC to which the Direct Connect connection uses ", + "product_code":"vpn", + "title":"How Do I Replace a Direct Connect Connection with a VPN?", + "uri":"vpn_08_0312.html", + "doc_type":"usermanual", + "p_code":"93", + "code":"99" + }, + { + "desc":"A VPN connects a VPC on the cloud and an on-premises local area network (LAN).The home network is not a part of the LAN of your enterprise and cannot be directly connecte", + "product_code":"vpn", + "title":"How Do I Access ECSs at Home When My Enterprise Network Has Been Connected to the Cloud Through a VPN?", + "uri":"vpn_08_0318.html", + "doc_type":"usermanual", + "p_code":"93", + "code":"100" + }, + { + "desc":"By default, DPD is enabled on the cloud side and cannot be disabled.Configure DPD as follows:DPD-type: on-demandDPD idle-time: 30sDPD retransmit-interval: 15sDPD retry-li", + "product_code":"vpn", + "title":"How Do I Configure DPD for Interconnection with the Cloud?", + "uri":"vpn_08_0614.html", + "doc_type":"usermanual", + "p_code":"93", + "code":"101" + }, + { + "desc":"Quotas can limit the number or amount of resources available to users, such as the maximum number of ECSs or EVS disks that can be created.If the existing resource quota ", + "product_code":"vpn", + "title":"What Is the VPN Quota?", + "uri":"vpn_08_1501.html", + "doc_type":"usermanual", + "p_code":"93", + "code":"102" + }, + { + "desc":"After a VPN connection is created, its status changes to Normal only after servers at both ends of the VPN connection communicate with each other.IKE v1:If no traffic goe", + "product_code":"vpn", + "title":"Why Is Not Connected Displayed as the Status for a Successfully Created VPN Connection?", + "uri":"vpn_08_0713.html", + "doc_type":"usermanual", + "p_code":"93", + "code":"103" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpn", + "title":"Change History", + "uri":"vpn_08_1519.html", + "doc_type":"usermanual", + "p_code":"", + "code":"104" } ] \ No newline at end of file diff --git a/docs/vpn/umn/en-us_image_0000001404528466.png b/docs/vpn/umn/en-us_image_0000001404528466.png deleted file mode 100644 index daf53fd4..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001404528466.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001404848230.jpg b/docs/vpn/umn/en-us_image_0000001404848230.jpg deleted file mode 100644 index b02afe63..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001404848230.jpg and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001405148354.jpg b/docs/vpn/umn/en-us_image_0000001405148354.jpg deleted file mode 100644 index 28092c10..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001405148354.jpg and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001405148570.png b/docs/vpn/umn/en-us_image_0000001405148570.png deleted file mode 100644 index fcd4cf4b..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001405148570.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001405151706.png b/docs/vpn/umn/en-us_image_0000001405151706.png deleted file mode 100644 index a06a2136..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001405151706.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001405171846.png b/docs/vpn/umn/en-us_image_0000001405171846.png deleted file mode 100644 index 1a8fd5bd..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001405171846.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001405176804.png b/docs/vpn/umn/en-us_image_0000001405176804.png deleted file mode 100644 index 28a39f44..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001405176804.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001405314402.jpg b/docs/vpn/umn/en-us_image_0000001405314402.jpg deleted file mode 100644 index 949fed3e..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001405314402.jpg and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001405317654.png b/docs/vpn/umn/en-us_image_0000001405317654.png deleted file mode 100644 index 9e0a935f..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001405317654.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001405485434.png b/docs/vpn/umn/en-us_image_0000001405485434.png deleted file mode 100644 index a06a2136..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001405485434.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001405496560.png b/docs/vpn/umn/en-us_image_0000001405496560.png deleted file mode 100644 index a06a2136..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001405496560.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001405630570.png b/docs/vpn/umn/en-us_image_0000001405630570.png deleted file mode 100644 index 10e3a9d7..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001405630570.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001405640430.png b/docs/vpn/umn/en-us_image_0000001405640430.png deleted file mode 100644 index 3880d33d..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001405640430.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001405646142.png b/docs/vpn/umn/en-us_image_0000001405646142.png deleted file mode 100644 index e2b98462..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001405646142.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001405650458.png b/docs/vpn/umn/en-us_image_0000001405650458.png deleted file mode 100644 index a06a2136..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001405650458.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001405655248.png b/docs/vpn/umn/en-us_image_0000001405655248.png deleted file mode 100644 index 8530092e..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001405655248.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001455555929.png b/docs/vpn/umn/en-us_image_0000001455555929.png deleted file mode 100644 index 5ac6e2e6..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001455555929.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001455557817.png b/docs/vpn/umn/en-us_image_0000001455557817.png deleted file mode 100644 index e65a9f18..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001455557817.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001455569161.png b/docs/vpn/umn/en-us_image_0000001455569161.png deleted file mode 100644 index a06a2136..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001455569161.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001455570241.png b/docs/vpn/umn/en-us_image_0000001455570241.png deleted file mode 100644 index a06a2136..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001455570241.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001455711269.jpg b/docs/vpn/umn/en-us_image_0000001455711269.jpg deleted file mode 100644 index 49464ad5..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001455711269.jpg and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001455717309.png b/docs/vpn/umn/en-us_image_0000001455717309.png deleted file mode 100644 index 3880d33d..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001455717309.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001455827749.jpg b/docs/vpn/umn/en-us_image_0000001455827749.jpg deleted file mode 100644 index 50d93d43..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001455827749.jpg and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001455829029.png b/docs/vpn/umn/en-us_image_0000001455829029.png deleted file mode 100644 index 3880d33d..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001455829029.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001455829553.jpg b/docs/vpn/umn/en-us_image_0000001455829553.jpg deleted file mode 100644 index 6c709cff..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001455829553.jpg and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001455845961.png b/docs/vpn/umn/en-us_image_0000001455845961.png deleted file mode 100644 index a06a2136..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001455845961.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001455909921.png b/docs/vpn/umn/en-us_image_0000001455909921.png deleted file mode 100644 index 3880d33d..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001455909921.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0000001455916097.png b/docs/vpn/umn/en-us_image_0000001455916097.png deleted file mode 100644 index 3880d33d..00000000 Binary files a/docs/vpn/umn/en-us_image_0000001455916097.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0109860229.png b/docs/vpn/umn/en-us_image_0109860229.png deleted file mode 100644 index 32d225a3..00000000 Binary files a/docs/vpn/umn/en-us_image_0109860229.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0118534037.png b/docs/vpn/umn/en-us_image_0118534037.png deleted file mode 100644 index 595a9b05..00000000 Binary files a/docs/vpn/umn/en-us_image_0118534037.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0147165026.png b/docs/vpn/umn/en-us_image_0147165026.png deleted file mode 100644 index 1909444d..00000000 Binary files a/docs/vpn/umn/en-us_image_0147165026.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0154037992.png b/docs/vpn/umn/en-us_image_0154037992.png deleted file mode 100644 index 13e196ca..00000000 Binary files a/docs/vpn/umn/en-us_image_0154037992.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0155717676.png b/docs/vpn/umn/en-us_image_0155717676.png deleted file mode 100644 index 12f0d879..00000000 Binary files a/docs/vpn/umn/en-us_image_0155717676.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0155784843.png b/docs/vpn/umn/en-us_image_0155784843.png deleted file mode 100644 index cbb48915..00000000 Binary files a/docs/vpn/umn/en-us_image_0155784843.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0159197475.png b/docs/vpn/umn/en-us_image_0159197475.png deleted file mode 100644 index 33c84403..00000000 Binary files a/docs/vpn/umn/en-us_image_0159197475.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0159201188.png b/docs/vpn/umn/en-us_image_0159201188.png deleted file mode 100644 index 8e09bc61..00000000 Binary files a/docs/vpn/umn/en-us_image_0159201188.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0159206951.png b/docs/vpn/umn/en-us_image_0159206951.png deleted file mode 100644 index 1466ed0b..00000000 Binary files a/docs/vpn/umn/en-us_image_0159206951.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0160993816.png b/docs/vpn/umn/en-us_image_0160993816.png deleted file mode 100644 index 8f203989..00000000 Binary files a/docs/vpn/umn/en-us_image_0160993816.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0161052507.png b/docs/vpn/umn/en-us_image_0161052507.png deleted file mode 100644 index 1909444d..00000000 Binary files a/docs/vpn/umn/en-us_image_0161052507.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0161052509.png b/docs/vpn/umn/en-us_image_0161052509.png deleted file mode 100644 index 3322328b..00000000 Binary files a/docs/vpn/umn/en-us_image_0161052509.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0170041086.png b/docs/vpn/umn/en-us_image_0170041086.png deleted file mode 100644 index e6ce3d56..00000000 Binary files a/docs/vpn/umn/en-us_image_0170041086.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0210485645.png b/docs/vpn/umn/en-us_image_0210485645.png deleted file mode 100644 index 5666bb1f..00000000 Binary files a/docs/vpn/umn/en-us_image_0210485645.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_image_0210486152.png b/docs/vpn/umn/en-us_image_0210486152.png deleted file mode 100644 index d36739fd..00000000 Binary files a/docs/vpn/umn/en-us_image_0210486152.png and /dev/null differ diff --git a/docs/vpn/umn/en-us_topic_0013748715.html b/docs/vpn/umn/en-us_topic_0013748715.html deleted file mode 100644 index 2bcbe330..00000000 --- a/docs/vpn/umn/en-us_topic_0013748715.html +++ /dev/null @@ -1,45 +0,0 @@ - - -

Creating a Security Group

-

Scenarios

To improve ECS access security, you can create a security group, define security group rules, and add ECSs in the VPC to the security group. We recommend that you allocate ECSs that have different Internet access policies to different security groups.

-
-

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. On the console homepage, under Network, click Virtual Private Cloud.
  4. In the navigation pane on the left, choose Access Control > Security Groups.
  5. On the Security Groups page, click Create Security Group.
  6. In the Create Security Group area, set the parameters as prompted. Table 1 lists the parameters to be configured.
    Figure 1 Create Security Group
    - -
    - - - - - - - - - - - - - -
    Table 1 Parameter description

    Parameter

    -

    Description

    -

    Example Value

    -

    Name

    -

    Specifies the security group name. This parameter is mandatory.

    -

    The security group name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces.

    -
    NOTE:

    You can change the security group name after a security group is created. It is recommended that you use different names for different security groups.

    -
    -

    sg-318b

    -

    Description

    -

    Provides supplementary information about the security group. This parameter is optional.

    -

    The security group description can contain a maximum of 255 characters and cannot contain angle brackets (< or >).

    -

    N/A

    -
    -
    -
  7. Click OK.
-
-
-
- -
- diff --git a/docs/vpn/umn/en-us_topic_0030969470.html b/docs/vpn/umn/en-us_topic_0030969470.html deleted file mode 100644 index 693f1487..00000000 --- a/docs/vpn/umn/en-us_topic_0030969470.html +++ /dev/null @@ -1,101 +0,0 @@ - - -

Adding a Security Group Rule

-

Scenarios

After a security group is created, you can add rules to the security group. A rule applies either to inbound traffic (ingress) or outbound traffic (egress). After ECSs are added to the security group, they are protected by the rules of that group.

- -
-

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. On the console homepage, under Network, click Virtual Private Cloud.
  4. In the navigation pane on the left, choose Access Control > Security Groups.
  5. On the Security Groups page, locate the target security group and click Manage Rule in the Operation column to switch to the page for managing inbound and outbound rules.
  6. On the inbound rule tab, click Add Rule. In the displayed dialog box, set required parameters to add an inbound rule.

    You can click + to add more inbound rules.

    -
    Figure 1 Add Inbound Rule
    - -
    - - - - - - - - - - - - - - - - - - - - -
    Table 1 Inbound rule parameter description

    Parameter

    -

    Description

    -

    Example Value

    -

    Protocol/ Application

    -

    Specifies the network protocol. Currently, the value can be All, TCP, UDP, ICMP, GRE, or others.

    -

    TCP

    -

    Port & Source

    -

    Port: specifies the port or port range over which the traffic can reach your ECS. The value ranges from 1 to 65535.

    -

    22 or 22-30

    -

    Source: specifies the source of the security group rule. The value can be another security group, a CIDR block, or a single IP address. For example:

    -
    • xxx.xxx.xxx.xxx/32 (IPv4 address)
    • xxx.xxx.xxx.0/24 (subnet CIDR block)
    • 0.0.0.0/0 (any IP address)
    -

    0.0.0.0/0

    -

    default

    -

    Description

    -

    Provides supplementary information about the security group rule. This parameter is optional.

    -

    The security group rule description can contain a maximum of 255 characters and cannot contain angle brackets (< or >).

    -

    N/A

    -
    -
    -
  7. On the outbound rule tab, click Add Rule. In the displayed dialog box, set required parameters to add an outbound rule.

    You can click + to add more outbound rules.

    -
    Figure 2 Add Outbound Rule
    - -
    - - - - - - - - - - - - - - - - - - - - -
    Table 2 Outbound rule parameter description

    Parameter

    -

    Description

    -

    Example Value

    -

    Protocol/ Application

    -

    Specifies the network protocol. Currently, the value can be All, TCP, UDP, ICMP, GRE, or others.

    -

    TCP

    -

    Port & Destination

    -

    Port: specifies the port or port range over which the traffic can leave your ECS. The value ranges from 1 to 65535.

    -

    22 or 22-30

    -

    Destination: specifies the destination of the security group rule. The value can be another security group, a CIDR block, or a single IP address. For example:

    -
    • xxx.xxx.xxx.xxx/32 (IPv4 address)
    • xxx.xxx.xxx.0/24 (subnet CIDR block)
    • 0.0.0.0/0 (any IP address)
    -

    0.0.0.0/0

    -

    default

    -

    Description

    -

    Provides supplementary information about the security group rule. This parameter is optional.

    -

    The security group rule description can contain a maximum of 255 characters and cannot contain angle brackets (< or >).

    -

    N/A

    -
    -
    -
  8. Click OK.
-
-
-
- -
- diff --git a/docs/vpn/umn/en-us_topic_0030969471.html b/docs/vpn/umn/en-us_topic_0030969471.html deleted file mode 100644 index b1668542..00000000 --- a/docs/vpn/umn/en-us_topic_0030969471.html +++ /dev/null @@ -1,18 +0,0 @@ - - -

Deleting a Security Group Rule

-

Scenarios

If the source of an inbound security group rule or destination of an outbound security group rule needs to be changed, you need to first delete the security group rule and add a new one.

-

Security group rules use whitelists. Deleting a security group rule may result in ECS access failures. Exercise caution when deleting security group rules.

-
-
-

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. On the console homepage, under Network, click Virtual Private Cloud.
  4. In the navigation pane on the left, choose Access Control > Security Groups.
  5. On the Security Groups page, click the security group name.
  6. If you do not need a security group rule, locate the row that contains the target rule, and click Delete.
  7. Click Yes in the displayed dialog box.
-

Deleting Multiple Security Group Rules at Once.

-

You can also select multiple security group rules and click Delete above the security group rule list to delete multiple rules at a time.

-
-
-
- -
- diff --git a/docs/vpn/umn/en-us_topic_0035391295.html b/docs/vpn/umn/en-us_topic_0035391295.html deleted file mode 100644 index 0b70fea5..00000000 --- a/docs/vpn/umn/en-us_topic_0035391295.html +++ /dev/null @@ -1,15 +0,0 @@ - - -

Modifying a VPN

-

Scenarios

If the VPN network information conflicts the VPC network information or you need to adjust VPN configurations, you can modify a VPN.

-
-

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select a region and project.
  3. On the console homepage, under Network, click Virtual Private Network.
  4. On the Virtual Private Network page, locate the target VPN and click Modify.
  5. In the displayed dialog box, set parameters as prompted.
    Figure 1 Modifying a VPN
    -
  6. Click OK.
-
-
-
- -
- diff --git a/docs/vpn/umn/en-us_topic_0035391332.html b/docs/vpn/umn/en-us_topic_0035391332.html deleted file mode 100644 index bc6608a4..00000000 --- a/docs/vpn/umn/en-us_topic_0035391332.html +++ /dev/null @@ -1,19 +0,0 @@ - - -

Overview

-
-
- -
- diff --git a/docs/vpn/umn/en-us_topic_0035391365.html b/docs/vpn/umn/en-us_topic_0035391365.html deleted file mode 100644 index 16d31754..00000000 --- a/docs/vpn/umn/en-us_topic_0035391365.html +++ /dev/null @@ -1,37 +0,0 @@ - - -

FAQs

-
-
- -
- diff --git a/docs/vpn/umn/en-us_topic_0035391366.html b/docs/vpn/umn/en-us_topic_0035391366.html deleted file mode 100644 index a7e13cae..00000000 --- a/docs/vpn/umn/en-us_topic_0035391366.html +++ /dev/null @@ -1,24 +0,0 @@ - - -

What Is the VPN Quota?

-

What Is a Quota?

Quotas are enforced for service resources on the platform to prevent unforeseen spikes in resource usage. Quotas can limit the number or amount of resources available to users. For example, the VPN quota limits the number of VPNs that you can create. You can also request more quotas if you need them.

-

This section describes how to view the VPN resource usage and the total quotas in a specified region.

-
-

How Do I View My Quotas?

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. In the upper right corner of the page, click .

    The Service Quota page is displayed.

    -
  4. View the used and total quota of each type of resources on the displayed page.

    If a quota cannot meet service requirements, click Increase Quota to adjust it.

    -
-
-

How Do I Apply for a Higher Quota?

The system does not support online quota adjustment. If you need to adjust a quota, call the hotline or send an email to the customer service mailbox. Customer service personnel will timely process your request for quota adjustment and inform you of the real-time progress by making a call or sending an email.

-

You need to prepare the following information before dialing the hotline number or sending an email:

- -

Learn how to obtain the service hotline and email address.

-
-
-
- -
- diff --git a/docs/vpn/umn/en-us_topic_0035391378.html b/docs/vpn/umn/en-us_topic_0035391378.html deleted file mode 100644 index 9768b593..00000000 --- a/docs/vpn/umn/en-us_topic_0035391378.html +++ /dev/null @@ -1,17 +0,0 @@ - - -

Management

-
-
- -
- diff --git a/docs/vpn/umn/en-us_topic_0035391382.html b/docs/vpn/umn/en-us_topic_0035391382.html deleted file mode 100644 index cce24f1f..00000000 --- a/docs/vpn/umn/en-us_topic_0035391382.html +++ /dev/null @@ -1,17 +0,0 @@ - - -

Getting Started

-
-
- -
- diff --git a/docs/vpn/umn/en-us_topic_0035391393.html b/docs/vpn/umn/en-us_topic_0035391393.html index 9107166b..748f212a 100644 --- a/docs/vpn/umn/en-us_topic_0035391393.html +++ b/docs/vpn/umn/en-us_topic_0035391393.html @@ -1,15 +1,26 @@ - + -

Virtual Private Network

-

A Virtual Private Network (VPN) establishes an encrypted, Internet-based communications tunnel between a user and a Virtual Private Cloud (VPC). With VPN, you can connect to a VPC and access service resources in it.

-

By default, ECSs in a VPC cannot communicate with your data center or private network. To enable communication between them, use a VPN.

-

A VPN consists of a VPN gateway and one or more VPN connections. A VPN gateway provides an Internet egress for a VPC and works together with the remote gateway in the local data center. A VPN connection uses the Internet- based encryption technology to connect the VPN gateway and the remote gateway to enable communication between the local data center and VPC. The VPN connection allows you to quickly build secure hybrid cloud environment.

-

Figure 1 shows the VPN networking.

-
Figure 1 VPN networking
+

What Is VPN?

+

Overview

Virtual Private Network (VPN) establishes secure, reliable, and cost-effective encrypted connections between your on-premises network or data center and a virtual network on the cloud.

+

VPN supports only non-cross-border connections.

+
+
  • A VPN gateway provides an Internet egress for a Virtual Private Cloud (VPC) to connect to a customer gateway in your on-premises data center.
  • A VPN connection connects a VPN gateway to a customer gateway through encrypted tunnels, enabling communication between a VPC and your on-premises data center. This helps quickly establish a secure hybrid cloud environment.
+

Figure 1 shows the VPN networking.

+
Figure 1 VPN networking
+
+

Components

  • VPN gateway: a virtual gateway of VPN on the cloud. It establishes secure private connections with a customer gateway in your on-premises network or data center.
  • Customer gateway: a resource that provides information to the cloud about your customer gateway device. It can be a physical device or software application in your on-premises data center.
  • VPN connection: a secure channel between a VPN gateway and a customer gateway. VPN connections use the Internet Key Exchange (IKE) and IPsec protocols to encrypt the transmitted data.
+
+ + \ No newline at end of file diff --git a/docs/vpn/umn/en-us_topic_0035391412.html b/docs/vpn/umn/en-us_topic_0035391412.html deleted file mode 100644 index 525c3e6a..00000000 --- a/docs/vpn/umn/en-us_topic_0035391412.html +++ /dev/null @@ -1,21 +0,0 @@ - - -

Application Scenarios

-

With the VPN between the VPC and your traditional data center, you can easily use the ECSs and block storage resources provided by the cloud platform.

-

Applications can be migrated to the cloud and additional web servers can be deployed to increase the computing capacity on a network. In this way, a hybrid cloud is built, which reduces IT O&M costs and protects enterprise core data from being leaked.

-

The VPN service allows you to set up site-to-site VPN connections or VPN connections from one site to multiple sites.

-

Site-to-site VPN connection

You can set up a VPN to connect a local data center to a VPC, thus building a hybrid cloud. Figure 1 shows a site-to-site VPN connection.

-
Figure 1 Site-to-site VPN connection
-
-

VPN connection from one site to multiple sites

You can also set up a VPN to connect multiple local data centers to a VPC, thus building a hybrid cloud. Figure 2 shows a VPN connection from one site to multiple sites.

-

The subnet CIDR blocks of each site involved in the VPN connection cannot overlap.

-
-
Figure 2 VPN connection from one site to multiple sites
-
-
-
- -
- diff --git a/docs/vpn/umn/en-us_topic_0035506845.html b/docs/vpn/umn/en-us_topic_0035506845.html deleted file mode 100644 index 6c6bdabf..00000000 --- a/docs/vpn/umn/en-us_topic_0035506845.html +++ /dev/null @@ -1,59 +0,0 @@ - - -

Viewing a VPN

-

Scenarios

You can view details about an existing VPN.

-
-

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. On the console homepage, under Network, click Virtual Private Network.
  4. On the displayed Virtual Private Network page, view the target VPN. Table 1 describes the VPN status. -
    - - - - - - - - - - - - - - - - - - - - - - - - - -
    Table 1 VPN status

    Status

    -

    Description

    -

    Normal

    -

    Indicates that the VPN is successfully created and communication with the local data center through the VPN is normal.

    -

    Not connected

    -

    Indicates that the VPN is successfully created but has not been used for communication with the local data center.

    -

    Creating

    -

    Indicates that the VPN is being created.

    -

    Updating

    -

    Indicates that VPN information is being updated.

    -

    Deleting

    -

    Indicates that the VPN is being deleted.

    -

    Abnormal

    -

    Indicates that the VPN is abnormal.

    -

    Frozen

    -

    Indicates that the VPN is frozen.

    -
    -
    -
-
-
-
- -
- diff --git a/docs/vpn/umn/en-us_topic_0035616925.html b/docs/vpn/umn/en-us_topic_0035616925.html deleted file mode 100644 index 47bc74b7..00000000 --- a/docs/vpn/umn/en-us_topic_0035616925.html +++ /dev/null @@ -1,14 +0,0 @@ - - -

Deleting a VPN

-

Scenarios

You can delete a VPN to release network resources if the VPN is no longer required.

-
-

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select a region and project.
  3. On the console homepage, under Network, click Virtual Private Network.
  4. On the Virtual Private Network page, locate the target VPN and click Delete.
  5. Click Yes in the displayed dialog box.
-
-
-
- -
- diff --git a/docs/vpn/umn/en-us_topic_0035634996.html b/docs/vpn/umn/en-us_topic_0035634996.html deleted file mode 100644 index 003c5969..00000000 --- a/docs/vpn/umn/en-us_topic_0035634996.html +++ /dev/null @@ -1,19 +0,0 @@ - - -

(Optional) Configure Security Group Rules

-
-
- - - -
- diff --git a/docs/vpn/umn/en-us_topic_0036149069.html b/docs/vpn/umn/en-us_topic_0036149069.html deleted file mode 100644 index fd3a0e42..00000000 --- a/docs/vpn/umn/en-us_topic_0036149069.html +++ /dev/null @@ -1,11 +0,0 @@ - - -

Do IPsec VPNs Support Automatic Negotiation?

-

The IPsec VPN tunnel works in passive mode, which triggers automatic negotiation only when traffic sent by the local end passes through the tunnel.

-
-
- -
- diff --git a/docs/vpn/umn/en-us_topic_0041174633.html b/docs/vpn/umn/en-us_topic_0041174633.html deleted file mode 100644 index 8d76a307..00000000 --- a/docs/vpn/umn/en-us_topic_0041174633.html +++ /dev/null @@ -1,106 +0,0 @@ - - -

A Change History

-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Release Date

-

What's New

-

2019-02-22

-

This release incorporates the following changes: Updated the region description in Table 2.

-

2019-02-18

-

Accepted in OTC-4.0/Agile-02.2019

-

2019-02-11

-

This release incorporates the following changes:

-
  • Deleted content about the firewall version from section Creating a VPN.
  • Added Table 1.
  • Updated the tag key and value requirements in

    Table 3 and Table 1.

    -
  • Updated content about searching for VPNs by tag key and value in section Managing VPN Tags.
  • Adjusted the column width.
-

2019-02-02

-

This release incorporates the following changes:

- -

2019-01-30

-

This release incorporates the following changes:

- -

2019-01-23

-

This release incorporates the following changes:

- -

2019-01-02

-

This release incorporates the following change:

-

Added description about the PFS function to the section for configuring the IPsec policy of a VPN.

-

2018-04-30

-

This issue is the eighth official release, which incorporates the following change:

-

Added description about how to add tags during VPN creation.

-

2017-08-30

-

This issue is the seventh official release, which incorporates the following change:

-

Added description about VPC and subnet tags.

-

2017-07-30

-

This issue is the sixth official release, which incorporates the following change:

-
  • Added the best practice.
  • Added description about the multi-project feature.
-

2017-04-28

-

This issue is the fifth official release, which incorporates the following change:

-
  • Changed the maximum number obtained by multiplying the number of local subnets and that of remote subnets of a VPN to 2500.
-

2017-03-30

-

This issue is the fourth official release, which incorporates the following change:

-
  • Added an example illustrating how to configure the remote device of a VPN.
-

2017-01-20

-

This issue is the third official release, which incorporates the following change:

-
  • Added description about the IPsec VPN created between multiple local gateways in different VPCs and the same remote gateway
-

2016-12-30

-

This issue is the second official release, which incorporates the following change:

-
  • Added FAQs.
-

2016-10-19

-

This issue is the first official release.

-
-
-
- diff --git a/docs/vpn/umn/en-us_topic_0044789110.html b/docs/vpn/umn/en-us_topic_0044789110.html deleted file mode 100644 index 3756c14f..00000000 --- a/docs/vpn/umn/en-us_topic_0044789110.html +++ /dev/null @@ -1,11 +0,0 @@ - - -

What Is the Limitation on the Number of Local and Remote Subnets of a VPN?

-

The maximum number obtained by multiplying the number of local subnets and that of remote subnets cannot exceed 2500.

-
-
- -
- diff --git a/docs/vpn/umn/en-us_topic_0045305370.html b/docs/vpn/umn/en-us_topic_0045305370.html deleted file mode 100644 index 5602b7c0..00000000 --- a/docs/vpn/umn/en-us_topic_0045305370.html +++ /dev/null @@ -1,13 +0,0 @@ - - -

Why Is Not Connected Displayed as the Status for a Successfully Created VPN?

-

After a VPN is created, its status changes to Normal only after the VMs or physical servers on the two sides of the VPN communicate with each other.

- -
-
- -
- diff --git a/docs/vpn/umn/en-us_topic_0051518174.html b/docs/vpn/umn/en-us_topic_0051518174.html deleted file mode 100644 index 8e72032d..00000000 --- a/docs/vpn/umn/en-us_topic_0051518174.html +++ /dev/null @@ -1,11 +0,0 @@ - - -

How Long Is Required for Issued VPN Configurations to Take Effect?

-

The time required for VPN configurations to take effect increases linearly with the number obtained by multiplying the number of local subnets and that of remote subnets.

-
-
- -
- diff --git a/docs/vpn/umn/en-us_topic_0060118606.html b/docs/vpn/umn/en-us_topic_0060118606.html deleted file mode 100644 index 1b9c9d47..00000000 --- a/docs/vpn/umn/en-us_topic_0060118606.html +++ /dev/null @@ -1,290 +0,0 @@ - - -

Creating a VPN

-

Overview

By default, ECSs in a VPC cannot communicate with your data center or private network. To enable communication between them, use a VPN. You need to create a VPN in your VPC and update the security group rules.

-
-

Description of a Simple IPsec VPN Intranet Topology

In Figure 1, a VPC has two subnets: 192.168.1.0/24 and 192.168.2.0/24. On your router deployed in your physical data center, you also have two subnets: 192.168.3.0/24 and 192.168.4.0/24. You can create a VPN to enable subnets in your VPC to communicate with those in your data center.

-
Figure 1 IPsec VPN
-

Currently, the site-to-site VPN and hub-spoke VPN are supported. You need to set up VPNs in both your data center and the VPC to establish the VPN connection.

-

Ensure that the VPN in your VPC and that in your data center use the same Internet Key Exchange (IKE) and IPsec policy configurations. Before creating a VPN, familiarize yourself with the protocols described in Table 1 and ensure that your device meets the requirements and configuration constraints of the involved protocols.

- -
- - - - - - - - - - - - - -
Table 1 Involved protocols

Parameter

-

Description

-

Constraint

-

RFC 2409

-

Defines the IKE protocol, which negotiates and verifies key information to safeguard VPNs.

-
  • Use the pre-shared key (PSK) to reach an IKE peer agreement.
  • Use the main mode and aggressive mode for negotiation.
-

RFC 4301

-

Defines the IPsec architecture, the security services that IPsec offers, and the collaboration between components.

-

Use the IPsec tunnel to set up a VPN connection.

-
-
-
-

Scenarios

Perform the following procedure to create a VPN that sets up a secure, isolated communication tunnel between your data center and cloud services.

-
-

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. On the console homepage, under Network, click Virtual Private Network.
  4. On the Virtual Private Network page, click Create VPN.
  5. Set the parameters as prompted and click Create Now.
    Figure 2 Creating a VPN
    - -
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Table 2 Basic parameters

    Parameter

    -

    Description

    -

    Example Value

    -

    Region

    -

    Specifies the desired region. Regions are geographic areas isolated from each other.

    -

    Resources are region-specific and cannot be used across regions through internal network connections. For low network latency and quick resource access, select the nearest region.

    -

    eu-de

    -

    Name

    -

    Specifies the VPN name.

    -

    VPN-001

    -

    VPC

    -

    Specifies the VPC name.

    -

    VPC-001

    -

    Local Subnet

    -

    A local subnet is a VPC subnet that accesses a customer network through a VPN.

    -
    • Select subnet: If you select this option, you can then select the subnets that need to communicate with your data center.
    • Specify CIDR block: If you select this option, you can then enter the CIDR blocks that need to communicate with your data center.
    -

    192.168.1.0/24,192.168.2.0/24

    -

    Remote Gateway

    -

    Specifies the public IP address of the VPN in your data center or on the private network. This IP address is used for communicating with the VPN in the VPC.

    -

    N/A

    -

    Remote Subnet

    -

    A remote subnet is a subnet in the customer data center that accesses a VPC through a VPN. The remote and local subnets cannot have overlapping or matching CIDR blocks. The remote subnet CIDR block cannot overlap with CIDR blocks involved in existing VPC peering connections created for the local VPC.

    -

    192.168.3.0/24,192.168.4.0/24

    -

    PSK

    -

    Specifies the pre-shared key, which is a private key shared by two ends of a VPN connection. The PSK configurations for both ends of a VPN connection must be the same. This key is used for VPN connection negotiation.

    -

    The value is a string of 6 to 128 characters.

    -

    Test@123

    -

    Confirm PSK

    -

    Specifies the confirm pre-shared key.

    -

    Test@123

    -

    Tag

    -

    Specifies the VPN tag, which consists of a key and value pair. You can add a maximum of ten tags to each VPN.

    -

    The tag key and value must meet the requirements listed in Table 3.

    -
    • Key: vpn_key1
    • Value: vpn-01
    -

    Advanced Settings

    -
    • Default: uses default IKE and IPsec policies.
    • Existing: uses existing IKE and IPsec policies. This option is available only after you have created IKE and IPsec policies.
    • Custom: uses custom IKE and IPsec policies. For details about the policies, see Table 4 and Table 5.
    -

    Custom

    -
    -
    - -
    - - - - - - - - - - - - - -
    Table 3 VPN tag key and value requirements

    Parameter

    -

    Requirement

    -

    Example Value

    -

    Key

    -
    • Cannot be left blank.
    • Must be unique for the same VPN and can be the same for different VPNs.
    • Contains a maximum of 36 characters.
    • Can contain only the following character types:
      • Uppercase letters
      • Lowercase letters
      • Digits
      • Special characters, including hyphens (-) and underscores (_)
      -
    -

    vpn_key1

    -

    Value

    -
    • Can contain a maximum of 43 characters.
    • Can contain only the following character types:
      • Uppercase letters
      • Lowercase letters
      • Digits
      • Special characters, including hyphens (-) and underscores (_)
      -
    -

    vpn-01

    -
    -
    - -
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Table 4 IKE policy

    Parameter

    -

    Description

    -

    Example Value

    -

    Authentication Algorithm

    -

    Specifies the authentication hash algorithm. The value can be SHA1, SHA2-256, SHA2-384, SHA2-512, or MD5.

    -

    The default value is SHA1.

    -

    SHA1

    -

    Encryption Algorithm

    -

    Specifies the encryption algorithm. The value can be AES-128, AES-192,

    -

    AES-256, or 3DES. The 3DES algorithm is not recommended because it is risky.

    -

    The default value is AES-128.

    -

    AES-128

    -

    DH Algorithm

    -

    Specifies the Diffie-Hellman key exchange algorithm. The value can be Group 1, Group 2, Group 5, Group 14,

    -

    Group 15, Group 16, Group 19, Group

    -

    20, or Group 21.

    -

    The DH group security level from the highest to lowest is as follows: Group 21> Group 20 > Group 19 > Group 16 > Group 15 > Group 14 > Group 5 > Group 2 > Group 1.

    -

    The default value is Group 5.

    -

    Group 5

    -

    Version

    -

    Specifies the version of the IKE protocol. The value can be v1 or v2.

    -

    The default value is v1.

    -

    v1

    -

    Lifecycle (s)

    -

    Specifies the lifetime of the security association (SA), in seconds.

    -

    The SA will be renegotiated if its lifetime expires.

    -

    The default value is 86400.

    -

    86400

    -

    Negotiation Mode

    -

    If the IKE policy version is v1, the negotiation mode can be configured. The value can only be Main.

    -

    The default value is Main.

    -

    Main

    -
    -
    - -
    - - - - - - - - - - - - - - - - - - - - - - - - - -
    Table 5 IPsec policy

    Parameter

    -

    Description

    -

    Example Value

    -

    Authentication Algorithm

    -

    Specifies the authentication hash algorithm. The value can be SHA1, SHA2-256, SHA2-384, SHA2-512, or MD5.

    -

    The default value is SHA1.

    -

    SHA1

    -

    Encryption Algorithm

    -

    Specifies the encryption algorithm. The value can be AES-128, AES-192, AES-256, or 3DES. The 3DES algorithm is not recommended because it is risky.

    -

    The default value is AES-128.

    -

    AES-128

    -

    PFS

    -

    Specifies the perfect forward secrecy (PFS), which is used to configure the IPsec tunnel negotiation.

    -

    This function enables two parties to exchange the DH keys during the phase-two negotiation, improving key security. It is recommended that you enable this function.

    -

    You can disable this function by selecting Disable from the drop- down list.

    -

    The PFS used at the two sides of a VPN must be the same. Otherwise, the negotiation will fail. If you disable this function on the console, you also need to disable it at the customer side of the VPN.

    -

    The value can be DH group 1, DH group 2, DH group 5, DH group 14, DH group 15, DH group 16, DH group 19, DH group 20, or DH group 21.

    -

    The PFS group security level from the highest to lowest is as follows: DH group 21 > DH group 20 > DH group 19 > DH group 16 > DH group 15 > DH group 14 > DH group 5 > DH group 2 > DH group 1.

    -

    The default value is DH group 5.

    -

    DH group 5

    -

    Transfer Protocol

    -

    Specifies the security protocol used for IPsec to transmit and encapsulate user data. The value can be AH, ESP, or AH-ESP.

    -

    The default value is ESP.

    -

    ESP

    -

    Lifecycle (s)

    -

    Specifies the lifetime of the SA, in seconds.

    -

    The SA will be renegotiated if its lifetime expires.

    -

    The default value is 3600.

    -

    3600

    -
    -
    -

    The IKE policy specifies the encryption and authentication algorithms to use in the negotiation phase of an IPsec tunnel. The IPsec policy specifies the protocol, encryption algorithm, and authentication algorithm to use in the data transmission phase of an IPsec tunnel. These parameters must be the same between the VPN in your VPC and that in your data center. If they are different, the VPN cannot be set up.

    -
    -
  6. Click Submit.

    After the IPsec VPN is created, a public network egress IP address is assigned to the IPsec VPN. The IP address is the local gateway address of a created VPN on the network console. When configuring the remote tunnel in your data center, you must set the remote gateway address to this IP address.

    -
    Figure 3 Gateway egress IP address
    -
  7. Due to the symmetry of the tunnel, you also need to configure the IPsec VPN on your router or firewall in the data center. -
-
-
-
- -
- diff --git a/docs/vpn/umn/en-us_topic_0066871940.html b/docs/vpn/umn/en-us_topic_0066871940.html deleted file mode 100644 index f6ca2d46..00000000 --- a/docs/vpn/umn/en-us_topic_0066871940.html +++ /dev/null @@ -1,24 +0,0 @@ - - -

Connecting to a VPC Through a VPN

-

Scenarios

By default, ECSs in a VPC cannot communicate with your data center or private network. To enable communication between them, use a VPN. After a VPN is created, configure the security group and check the connectivity between the local and remote networks to ensure that the VPN is available. VPNs can be classified into the following two types:

-
  • Site-to-site VPN: The local side is a VPC on the cloud service platform, and the remote side is a user data center. A site-to-site VPN is a communication tunnel between a user data center and a single VPC.
  • Hub-and-spoke VPN: The local side is a VPC on the cloud service platform, and the remote side is user data centers. A hub-and-spoke VPN is a communication tunnel between user data centers and a VPC.
-

Ensure that the following requirements are met when configuring a VPN:

-
  • The local and remote subnets cannot overlap.
  • Different local subnets cannot overlap.
  • The local and remote sides use the same IKE and IPsec policies and PSK.
  • The local and remote subnet and gateway parameters must be symmetric.
  • The security group used by ECSs in the VPC allows traffic from and to the remote side.
  • After a VPN is created, its status changes to Normal only after the VMs or physical servers on the two sides of the VPN communicate with each other.
-
-

Prerequisites

You have created the VPC and subnet required by the VPN.

-
-

Procedure

  1. On the management console, select the appropriate IKE and IPsec policies to create a VPN.
  2. Check the IP address pools for the local and remote subnets.

    In Figure 1, a VPC has two subnets: 192.168.1.0/24 and 192.168.2.0/24. On your router deployed in your physical data center, you also have two subnets: 192.168.3.0/24 and 192.168.4.0/24. You can create a VPN to enable subnets in your VPC to communicate with those in your data center.

    -
    Figure 1 IPsec VPN
    -

    The IP address pools for the local and remote subnets cannot overlap with each other. For example, if the local VPC has two subnets, 192.168.1.0/24 and 192.168.2.0/24, the IP address pool for the remote subnets cannot contain these two subnets.

    -
  3. Configure security group rules for the VPC.
  4. Check the security group of the VPC.

    The security group must allow packets from the VPN to pass. You can run the ping command to check whether the security group of the VPC allows packets from the VPN to pass.

    -
  5. Check the remote LAN configuration (network configuration of the remote data center).

    A route must be configured for the remote LAN to enable VPN traffic to be forwarded to network devices on the LAN. If the VPN traffic cannot be forwarded to the network devices, check whether the remote LAN has policies configured to refuse the traffic.

    -
-
-
-
- -
- diff --git a/docs/vpn/umn/en-us_topic_0081947484.html b/docs/vpn/umn/en-us_topic_0081947484.html deleted file mode 100644 index fc845e45..00000000 --- a/docs/vpn/umn/en-us_topic_0081947484.html +++ /dev/null @@ -1,12 +0,0 @@ - - -

Reference Standards and Protocols

-

The following standards and protocols are associated with the IPsec VPN:

- -
-
- -
- diff --git a/docs/vpn/umn/en-us_topic_0107396413.html b/docs/vpn/umn/en-us_topic_0107396413.html deleted file mode 100644 index 447026b9..00000000 --- a/docs/vpn/umn/en-us_topic_0107396413.html +++ /dev/null @@ -1,55 +0,0 @@ - - -

Managing VPN Tags

-

Application Scenarios

A VPN tag identifies a VPN. Tags can be added to VPNs to facilitate VPN identification and administration. You can add a tag to a VPN when creating the VPN. Alternatively, you can add a tag to a created VPN on the VPN details page. A maximum of ten tags can be added to each VPN.

-

A tag consists of a key and value pair. Table 1 lists the tag key and value requirements.

- -
- - - - - - - - - - - - - -
Table 1 VPN tag key and value requirements

Parameter

-

Requirement

-

Example Value

-

Key

-
  • Cannot be left blank.
  • Must be unique for the same VPN and can be the same for different VPNs.
  • Contains a maximum of 36 characters.
  • Can contain only the following character types:
    • Uppercase letters
    • Lowercase letters
    • Digits
    • Special characters, including hyphens (-) and underscores (_)
    -
-

vpn_key1

-

Value

-
  • Can contain a maximum of 43 characters.
  • Can contain only the following character types:
    • Uppercase letters
    • Lowercase letters
    • Digits
    • Special characters, including hyphens (-) and underscores (_)
    -
-

vpn-01

-
-
-
-

Procedure

Search for VPNs by Tag Key and Value on the Page Showing the VPN List.

-
  1. Log in to the management console.
  2. Click in the upper left corner and select a region and project.
  3. On the console homepage, under Network, click Virtual Private Network.
  4. In the upper right corner of the VPN list, click Search by Tag.
  5. In the displayed area, enter the tag key and value of the VPN you are looking for.

    Both the tag key and value must be specified.

    -
  6. Click + to add the entered tag key and value.

    You can add multiple tag keys and values to refine your search results. If you add more than one tag to search for VPCs, the VPCs containing all specified tags will be displayed.

    -
  7. Click Search.

    The system displays the VPNs you are looking for based on the entered tag keys and values.

    -
-

Add, Delete, Edit, and View Tags on the Tags Tab of a VPN.

-
  1. Log in to the management console.
  2. Click in the upper left corner and select a region and project.
  3. On the console homepage, under Network, click Virtual Private Network.
  4. On the Virtual Private Network page, locate the VPN whose tags are to be managed and click the VPN name.

    The page showing details about the particular VPN is displayed.

    -
  5. Click the Tags tab and perform desired operations on tags.
    • View tags.

      On the Tags tab, you can view details about tags added to the current VPN, including the number of tags and the key and value of each tag.

      -
    • Add a tag.

      Click Add Tag in the upper left corner. In the displayed dialog box, enter the key and value of the tag to be added, and click OK.

      -
    • Edit a tag.

      Locate the row that contains the tag to be edited and click Edit in the Operation column. In the Edit Tag dialog box, change the tag value and click OK.

      -
    • Delete a tag.

      Locate the row that contains the tag to be deleted, and click Delete in the Operation column. In the displayed Delete Tag dialog box, click Yes.

      -
    -
-
-
-
- -
- diff --git a/docs/vpn/umn/en-us_topic_0109312453.html b/docs/vpn/umn/en-us_topic_0109312453.html deleted file mode 100644 index 481ffea3..00000000 --- a/docs/vpn/umn/en-us_topic_0109312453.html +++ /dev/null @@ -1,54 +0,0 @@ - - -

How Do I Configure a Remote Device for a VPN?

-

Due to the symmetry of the tunnel, the VPN parameters configured on the cloud must be the same as those configured in your own data center. If they are different, a VPN cannot be established.

-

To set up a VPN, you also need to configure the IPsec VPN on the router or firewall in your own data center. The configuration method may vary depending on your network device in use. For details, see the configuration guide of your network device.

-

This section describes how to configure the IPsec VPN on a Huawei USG6600 series V100R001C30SPC300 firewall for your reference.

-

For example, the subnets of the data center are 192.168.3.0/24 and 192.168.4.0/24, the subnets of the VPC are 192.168.1.0/24 and 192.168.2.0/24, and the public IP address of the IPsec tunnel egress in the VPC is XXX.XXX.XX.XX, which can be obtained from the local gateway parameters of the IPsec VPN in the VPC.

-

Procedure

  1. Log in to the CLI of the firewall.
  2. Check firewall version information.
    display version 17:20:502017/03/09
    -Huawei Versatile Security Platform Software
    -Software Version: USG6600 V100R001C30SPC300 (VRP (R) Software, Version 5.30)
    -
  3. Create an access control list (ACL) and bind it to the target VPN instance.
    acl number 3065 vpn-instance vpn64
    -rule 1 permit ip source 192.168.3.0 0.0.0.255 destination 192.168.1.0 0.0.0.255
    -rule 2 permit ip source 192.168.3.0 0.0.0.255 destination 192.168.2.0 0.0.0.255
    -rule 3 permit ip source 192.168.4.0 0.0.0.255 destination 192.168.1.0 0.0.0.255
    -rule 4 permit ip source 192.168.4.0 0.0.0.255 destination 192.168.2.0 0.0.0.255 
    -q
    -
  4. Create an IKE proposal.
    ike proposal 64 
    -dh group5
    -authentication-algorithm sha1 
    -integrity-algorithm hmac-sha2-256 
    -sa duration 3600
    -q
    -
  5. Create an IKE peer and reference the created IKE proposal. The peer IP address is 93.188.242.110.
    ike peer vpnikepeer_64
    -pre-shared-key ******** (******** specifies the pre-shared key.)
    -ike-proposal 64
    -undo version 2
    -remote-address vpn-instance vpn64 93.188.242.110 
    -sa binding vpn-instance vpn64
    -q
    -
  6. Create an IPsec protocol.
    ipsec proposal ipsecpro64
    -encapsulation-mode tunnel
    -esp authentication-algorithm sha1 
    -q
    -
  7. Create an IPsec policy and reference the IKE policy and IPsec proposal.
    ipsec policy vpnipsec64 1 isakmp 
    -security acl 3065
    -pfs dh-group5
    -ike-peer vpnikepeer_64 
    -proposal ipsecpro64 
    -local-address xx.xx.xx.xx 
    -q
    -
  8. Apply the IPsec policy to the subinterface.
    interface GigabitEthernet0/0/2.64 
    -ipsec policy vpnipsec64
    -q
    -
  9. Test the connectivity.

    After you perform the preceding operations, you can test the connectivity between your ECSs in the cloud and the hosts in your data center. For details, see the following figure.

    -

    -
-
-
-
- -
- diff --git a/docs/vpn/umn/en-us_topic_0109676043.html b/docs/vpn/umn/en-us_topic_0109676043.html deleted file mode 100644 index 0aaf8011..00000000 --- a/docs/vpn/umn/en-us_topic_0109676043.html +++ /dev/null @@ -1,34 +0,0 @@ - - -

Which Remote VPN Devices Are Supported?

-

Most devices that meet IPsec VPN standard and reference protocol requirements can be used as the remote VPN devices, for example, Cisco ASA firewalls, Huawei USG6xxxx series firewalls, USG9xxxx series firewalls, Hillstone firewalls, and Cisco ISR routers. Table 1 lists the supported Huawei USG6xxxx and USG9xxxx firewalls.

- -
- - - - - - - - - - -
Table 1 Huawei VPN devices

Supported Remote VPN Device

-

Description

-

Huawei USG6000 series

-

USG6320/6310/6510-SJJ

-

USG6306/6308/6330/6350/6360/6370/6380/6390/6507/6530/6550/6570:2048

-

USG6620/6630/6650/6660/6670/6680

-

Huawei USG9000 series

-

USG9520/USG9560/USG9580

-
-
-

Other devices that meet the requirements in the reference protocols described in section Reference Standards and Protocols can also be deployed. However, some devices may fail to add because of inconsistent protocol implementation methods of these devices. If the connection setup fails, rectify the fault by following the instructions provided in section What Do I Do If VPN Setup Fails? or contact customer service.

-
-
- -
- diff --git a/docs/vpn/umn/en-us_topic_0114174493.html b/docs/vpn/umn/en-us_topic_0114174493.html deleted file mode 100644 index 8d6df130..00000000 --- a/docs/vpn/umn/en-us_topic_0114174493.html +++ /dev/null @@ -1,11 +0,0 @@ - - -

VPN Best Practice

-
-
- -
- diff --git a/docs/vpn/umn/en-us_topic_0122970066.html b/docs/vpn/umn/en-us_topic_0122970066.html deleted file mode 100644 index 48f8840a..00000000 --- a/docs/vpn/umn/en-us_topic_0122970066.html +++ /dev/null @@ -1,183 +0,0 @@ - - -

(Optional) Create a VPC

-

Scenarios

A VPC provides an isolated virtual network for ECSs. You can configure and manage the network as required.

-

Create a VPC by following the procedure provided in this section. Then, create subnets, security groups, and VPNs, and assign EIPs by following the procedure provided in subsequent sections based on your actual network requirements.

-
-

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. On the console homepage, under Network, click Virtual Private Cloud.
  4. Click Create VPC.
  5. On the Create VPC page, set parameters as prompted.

    During VPC creation, a default subnet will be created and you can also click Add Subnet to create more subnets for the VPC.

    - -
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Table 1 VPC parameter description

    Catego ry

    -

    Parameter

    -

    Description

    -

    Example Value

    -

    Basic Information

    -

    Region

    -

    Specifies the desired region. Regions are geographic areas isolated from each other. Resources are region-specific and cannot be used across regions through internal network connections. For low network latency and quick resource access, select the nearest region.

    -

    eu-de

    -

    Basic Information

    -

    Name

    -

    Specifies the VPC name.

    -

    VPC-001

    -

    Basic Information

    -

    CIDR Block

    -

    Specifies the CIDR block for the VPC. The CIDR block of a subnet can be the same as the CIDR block for the VPC (for a single subnet in the VPC) or a subset (for multiple subnets in the VPC).

    -

    The following CIDR blocks are supported:

    -

    10.0.0.0 – 10.255.255.255

    -

    172.16.0.0 –172.31.255.255

    -

    192.168.0.0 –192.168.255.255

    -

    192.168.0.0/16

    -

    Basic Information

    -

    Tag

    -

    Specifies the VPC tag, which consists of a key and value pair. You can add a maximum of ten tags to each VPC.

    -

    The tag key and value must meet the requirements listed in Table 2.

    -
    • Key: vpc_key1
    • Value: vpc-01
    -

    Subnet Settings

    -

    Name

    -

    Specifies the subnet name.

    -

    Subnet

    -

    Subnet Settings

    -

    CIDR Block

    -

    Specifies the CIDR block for the subnet. This value

    -

    must be within the VPC CIDR range.

    -

    192.168.0.0/24

    -

    Subnet Settings

    -

    Gateway

    -

    Specifies the gateway address of the subnet.

    -

    192.168.0.1

    -

    Subnet Settings

    -

    DNS Server Address

    -

    The external DNS server address is used by default. If you need to change the DNS server address, ensure that the configured DNS server address is available.

    -

    192.168.1.0

    -

    Subnet Settings

    -

    NTP Server Address

    -

    Specifies the NTP server IP address. A maximum of four IP addresses can be configured. Multiple IP addresses must be separated using commas (,).

    -

    192.168.2.1

    -

    Subnet Settings

    -

    Tag

    -

    Specifies the subnet tag, which consists of a key and value pair. You can add a maximum of ten tags to each subnet.

    -

    The tag key and value must meet the requirements listed in Table 3.

    -
    • Key: subnet_key1
    • Value: subnet-01
    -
    -
    - -
    - - - - - - - - - - - - - -
    Table 2 VPC tag key and value requirements

    Parameter

    -

    Requirements

    -

    Example Value

    -

    Key

    -
    • Cannot be left blank.
    • Must be unique for the same VPC and can be the same for different VPCs.
    • Can contain a maximum of 36 characters.
    • Can contain only the following character types:
      • Uppercase letters
      • Lowercase letters
      • Digits
      • Special characters, including hyphens (-) and underscores (_)
      -
    -

    vpc_key1

    -

    Value

    -
    • Can contain a maximum of 43 characters.
    • Can contain only the following character types:
      • Uppercase letters
      • Lowercase letters
      • Digits
      • Special characters, including hyphens (-) and underscores (_)
      -
    -

    vpc-01

    -
    -
    - -
    - - - - - - - - - - - - - -
    Table 3 Subnet tag key and value requirements

    Parameter

    -

    Requirements

    -

    Example Value

    -

    Key

    -
    • Cannot be left blank.
    • Must be unique for each subnet.
    • Can contain a maximum of 36 characters.
    • Can contain only the following character types:
      • Uppercase letters
      • Lowercase letters
      • Digits
      • Special characters, including hyphens (-) and underscores (_)
      -
    -

    subnet_key1

    -

    Value

    -
    • Can contain a maximum of 43 characters.
    • Can contain only the following character types:
      • Uppercase letters
      • Lowercase letters
      • Digits
      • Special characters, including hyphens (-) and underscores (_)
      -
    -

    subnet-01

    -
    -
    -
  6. The external DNS server address is used by default. If you need to change the DNS server address, select Custom for Advanced Settings and configure the DNS server addresses. You must ensure that the configured DNS server addresses are available.
  7. Click Create Now.
-
-
-
- -
- diff --git a/docs/vpn/umn/en-us_topic_0122970067.html b/docs/vpn/umn/en-us_topic_0122970067.html deleted file mode 100644 index e2b5766d..00000000 --- a/docs/vpn/umn/en-us_topic_0122970067.html +++ /dev/null @@ -1,104 +0,0 @@ - - -

(Optional) Create a Subnet for the VPC

-

Scenarios

You can add subnets during VPC creation. If required, you can also create subnets for an existing VPC.

-

The created subnet is configured with DHCP by default. After an ECS using this VPC starts, the ECS automatically obtains an IP address using DHCP.

-
-

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. On the console homepage, under Network, click Virtual Private Cloud.
  4. In the navigation pane on the left, click Virtual Private Cloud.
  5. On the Virtual Private Cloud page, locate the VPC for which a subnet is to be created and click the VPC name.
  6. On the displayed Subnets tab, click Create Subnet.
  7. In the Create Subnet area, set parameters as prompted.
    Figure 1 Create Subnet
    - -
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Table 1 Parameter description

    Parameter

    -

    Description

    -

    Example Value

    -

    Name

    -

    Specifies the subnet name.

    -

    Subnet

    -

    CIDR Block

    -

    Specifies the CIDR block for the subnet. This value must be within the VPC CIDR range.

    -

    192.168.0.0/24

    -

    Gateway

    -

    Specifies the gateway address of the subnet.

    -

    192.168.0.1

    -

    NTP Server Address

    -

    Specifies the NTP server IP address. A maximum of four IP addresses can be configured. Multiple IP addresses must be separated using commas (,).

    -

    192.168.2.1

    -

    Tag

    -

    Specifies the subnet tag, which consists of a key and value pair. You can add a maximum of ten tags to each subnet.

    -

    The tag key and value must meet the requirements listed in Table 2.

    -
    • Key: subnet_key1
    • Value:

      subnet-01

      -
    -

    DNS Server Address

    -

    The external DNS server address is used by default. If you need to change the DNS server address, ensure that the configured DNS server address is available.

    -

    -

    -
    -
    - -
    - - - - - - - - - - - - - -
    Table 2 Subnet tag key and value requirements

    Parameter

    -

    Requirements

    -

    Example Value

    -

    Key

    -
    • Cannot be left blank.
    • Must be unique for each subnet.
    • Can contain a maximum of 36 characters.
    • Can contain only the following character types:
      • Uppercase letters
      • Lowercase letters
      • Digits
      • Special characters, including hyphens (-) and underscores (_)
      -
    -

    subnet_key1

    -

    Value

    -
    • Can contain a maximum of 43 characters.
    • Can contain only the following character types:
      • Uppercase letters
      • Lowercase letters
      • Digits
      • Special characters, including hyphens (-) and underscores (_)
      -
    -

    subnet-01

    -
    -
    -
  8. The external DNS server address is used by default. If you need to change the DNS server address, select Custom for Advanced Settings and configure the DNS server addresses. You must ensure that the configured DNS server addresses are available.
  9. Click OK.
-
-

Precautions

After a subnet is created, five IP addresses in the subnet will be reserved and cannot be used. For example, in a subnet with CIDR block 192.168.0.0/24, the following IP addresses are reserved:

-
  • 192.168.0.0: Network address.
  • 192.168.0.1: Gateway address.
  • 192.168.0.253: Reserved for the system interface. This IP address is used by the VPC for external communication.
  • 192.168.0.254: DHCP service address.
  • 192.168.0.255: Network broadcast address.
-

If you set Advanced Settings to Custom during subnet creation, the reserved IP addresses may be different from the preceding default ones. The system will reserve five IP addresses based on your subnet settings.

-
-
-
- -
- diff --git a/docs/vpn/umn/en-us_topic_0142368417.html b/docs/vpn/umn/en-us_topic_0142368417.html deleted file mode 100644 index bce4e86f..00000000 --- a/docs/vpn/umn/en-us_topic_0142368417.html +++ /dev/null @@ -1,12 +0,0 @@ - - -

What Can I Do If the VPN Fails or the Network Speed of the VPN Is Slow?

-

You can perform the following steps to handle the issues:

-
  1. Check the ECS specifications. Rate limiting is not performed for the VPN ingress on the cloud, so the issue may be caused by the ECS specifications.
  2. Rate limiting has been configured for the VPN egress on the cloud. Check whether your bandwidth has reached or exceeded the maximum limit allowed.
  3. Check your local network to see whether the network speed is slow.
  4. Check whether packets sent between the cloud and the customer data center have been lost.
-
-
- -
- diff --git a/docs/vpn/umn/en-us_topic_0142373840.html b/docs/vpn/umn/en-us_topic_0142373840.html deleted file mode 100644 index 90ee73a0..00000000 --- a/docs/vpn/umn/en-us_topic_0142373840.html +++ /dev/null @@ -1,11 +0,0 @@ - - -

Are SSL VPNs Supported?

-

Currently, the VPN service does not support the SSL VPNs.

-
-
- -
- diff --git a/docs/vpn/umn/en-us_topic_0160974607.html b/docs/vpn/umn/en-us_topic_0160974607.html deleted file mode 100644 index 629362b6..00000000 --- a/docs/vpn/umn/en-us_topic_0160974607.html +++ /dev/null @@ -1,41 +0,0 @@ - - -

IPsec VPN

-

The Internet Protocol Security (IPsec) VPN is an encrypted tunneling technology that uses encrypted security services to establish confidential and secure communication tunnels between different networks.

-

In Figure 1, a VPC has two subnets: 192.168.1.0/24 and 192.168.2.0/24. On your router deployed in your physical data center, you also have two subnets:192.168.3.0/24 and 192.168.4.0/24. You can use VPN to enable subnets in your VPC to communicate with those in your data center.

-
Figure 1 IPsec VPN
-

Currently, the site-to-site VPN and hub-spoke VPN are supported. You need to set up VPNs in both your data center and the VPC to establish the VPN connection.

-

You must ensure that the VPN in your VPC and that in your data center use the same IKE and IPsec policy configurations. Before creating a VPN, familiarize yourself with the protocols described in Table 1 and ensure that your device meets the requirements and configuration constraints of the involved protocols.

- -
- - - - - - - - - - - - - -
Table 1 Involved protocols

Protocol

-

Description

-

Constraint

-

RFC 2409

-

Defines the IKE protocol, which negotiates and verifies key information to safeguard VPNs.

-
  • Use the pre-shared key (PSK) to reach an IKE peer agreement.
  • Use the main mode for negotiation.
-

RFC 4301

-

Defines the IPsec architecture, the security services that IPsec offers, and the collaboration between components.

-

Use the IPsec tunnel to set up a VPN connection.

-
-
-
-
- -
- diff --git a/docs/vpn/umn/en-us_topic_0185622695.html b/docs/vpn/umn/en-us_topic_0185622695.html deleted file mode 100644 index 3578a999..00000000 --- a/docs/vpn/umn/en-us_topic_0185622695.html +++ /dev/null @@ -1,22 +0,0 @@ - - -

Region and AZ

-

Concept

A region and availability zone (AZ) identify the location of a data center. You can create resources in a specific region and AZ.

-
  • A region is a physical data center, which is completely isolated to improve fault tolerance and stability. The region that is selected during resource creation cannot be changed after the resource is created.
  • An AZ is a physical location where resources use independent power supplies and networks. A region contains one or more AZs that are physically isolated but interconnected through internal networks. Because AZs are isolated from each other, any fault that occurs in an AZ will not affect other AZs.
-

Figure 1 shows the relationship between regions and AZs.

-
Figure 1 Regions and AZs
-
-

Selecting a Region

Select a region closest to your target users for low network latency and quick access.

-
-

Selecting an AZ

When deploying resources, consider your applications' requirements on disaster recovery (DR) and network latency.

-
  • For high DR capability, deploy resources in different AZs within the same region.
  • For low network latency, deploy resources in the same AZ.
-
-

Regions and Endpoints

Before you use an API to call resources, specify its region and endpoint. For more details, see Regions and Endpoints.

-
-
-
- -
- diff --git a/docs/vpn/umn/en-us_image_0184026531.png b/docs/vpn/umn/figure/en-us_image_0000001542015014.png similarity index 100% rename from docs/vpn/umn/en-us_image_0184026531.png rename to docs/vpn/umn/figure/en-us_image_0000001542015014.png diff --git a/docs/vpn/umn/en-us_image_0107432228.png b/docs/vpn/umn/figure/en-us_image_0000001542015046.png similarity index 100% rename from docs/vpn/umn/en-us_image_0107432228.png rename to docs/vpn/umn/figure/en-us_image_0000001542015046.png diff --git a/docs/vpn/umn/figure/en-us_image_0000001542174442.png b/docs/vpn/umn/figure/en-us_image_0000001542174442.png new file mode 100644 index 00000000..0e4547df Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001542174442.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001542174462.png b/docs/vpn/umn/figure/en-us_image_0000001542174462.png new file mode 100644 index 00000000..49d6b08f Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001542174462.png differ diff --git a/docs/vpn/umn/en-us_image_0152926732.png b/docs/vpn/umn/figure/en-us_image_0000001542334190.png similarity index 100% rename from docs/vpn/umn/en-us_image_0152926732.png rename to docs/vpn/umn/figure/en-us_image_0000001542334190.png diff --git a/docs/vpn/umn/figure/en-us_image_0000001542334206.png b/docs/vpn/umn/figure/en-us_image_0000001542334206.png new file mode 100644 index 00000000..0e4547df Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001542334206.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001542334214.png b/docs/vpn/umn/figure/en-us_image_0000001542334214.png new file mode 100644 index 00000000..b63464b8 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001542334214.png differ diff --git a/docs/vpn/umn/en-us_image_0118696493.png b/docs/vpn/umn/figure/en-us_image_0000001542334238.png similarity index 100% rename from docs/vpn/umn/en-us_image_0118696493.png rename to docs/vpn/umn/figure/en-us_image_0000001542334238.png diff --git a/docs/vpn/umn/figure/en-us_image_0000001542493866.jpg b/docs/vpn/umn/figure/en-us_image_0000001542493866.jpg new file mode 100644 index 00000000..13fa7894 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001542493866.jpg differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001542494126.png b/docs/vpn/umn/figure/en-us_image_0000001542494126.png new file mode 100644 index 00000000..0e4547df Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001542494126.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001542494178.png b/docs/vpn/umn/figure/en-us_image_0000001542494178.png new file mode 100644 index 00000000..8236d3cf Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001542494178.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001592573989.png b/docs/vpn/umn/figure/en-us_image_0000001592573989.png new file mode 100644 index 00000000..2ce24f4a Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001592573989.png differ diff --git a/docs/vpn/umn/en-us_image_0152727234.png b/docs/vpn/umn/figure/en-us_image_0000001592574041.png similarity index 100% rename from docs/vpn/umn/en-us_image_0152727234.png rename to docs/vpn/umn/figure/en-us_image_0000001592574041.png diff --git a/docs/vpn/umn/figure/en-us_image_0000001592694309.png b/docs/vpn/umn/figure/en-us_image_0000001592694309.png new file mode 100644 index 00000000..9b9dc88c Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001592694309.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001592773953.png b/docs/vpn/umn/figure/en-us_image_0000001592773953.png new file mode 100644 index 00000000..0e4547df Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001592773953.png differ diff --git a/docs/vpn/umn/en-us_image_0118696764.png b/docs/vpn/umn/figure/en-us_image_0000001592773969.png similarity index 100% rename from docs/vpn/umn/en-us_image_0118696764.png rename to docs/vpn/umn/figure/en-us_image_0000001592773969.png diff --git a/docs/vpn/umn/figure/en-us_image_0000001592774029.png b/docs/vpn/umn/figure/en-us_image_0000001592774029.png new file mode 100644 index 00000000..80a6105d Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001592774029.png differ diff --git a/docs/vpn/umn/en-us_image_0118696766.png b/docs/vpn/umn/figure/en-us_image_0000001592879209.png similarity index 100% rename from docs/vpn/umn/en-us_image_0118696766.png rename to docs/vpn/umn/figure/en-us_image_0000001592879209.png diff --git a/docs/vpn/umn/en-us_image_0123091916.png b/docs/vpn/umn/figure/en-us_image_0000001592879265.png similarity index 100% rename from docs/vpn/umn/en-us_image_0123091916.png rename to docs/vpn/umn/figure/en-us_image_0000001592879265.png diff --git a/docs/vpn/umn/figure/en-us_image_0000001592879273.png b/docs/vpn/umn/figure/en-us_image_0000001592879273.png new file mode 100644 index 00000000..ec23c730 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001592879273.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001592879305.png b/docs/vpn/umn/figure/en-us_image_0000001592879305.png new file mode 100644 index 00000000..f0916b28 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001592879305.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001594572920.png b/docs/vpn/umn/figure/en-us_image_0000001594572920.png new file mode 100644 index 00000000..f67072b4 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001594572920.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001609202724.png b/docs/vpn/umn/figure/en-us_image_0000001609202724.png new file mode 100644 index 00000000..7d1d2343 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001609202724.png differ diff --git a/docs/vpn/umn/en-us_image_0141273034.png b/docs/vpn/umn/figure/en-us_image_0000001628070572.png similarity index 76% rename from docs/vpn/umn/en-us_image_0141273034.png rename to docs/vpn/umn/figure/en-us_image_0000001628070572.png index 1909444d..57e8d5b5 100644 Binary files a/docs/vpn/umn/en-us_image_0141273034.png and b/docs/vpn/umn/figure/en-us_image_0000001628070572.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001651244201.png b/docs/vpn/umn/figure/en-us_image_0000001651244201.png new file mode 100644 index 00000000..b60f433a Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001651244201.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001841927836.png b/docs/vpn/umn/figure/en-us_image_0000001841927836.png new file mode 100644 index 00000000..5fbecc8f Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001841927836.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001841932888.png b/docs/vpn/umn/figure/en-us_image_0000001841932888.png new file mode 100644 index 00000000..7ee442db Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001841932888.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001842101730.png b/docs/vpn/umn/figure/en-us_image_0000001842101730.png new file mode 100644 index 00000000..af51b0d1 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001842101730.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001867256192.png b/docs/vpn/umn/figure/en-us_image_0000001867256192.png new file mode 100644 index 00000000..888039ca Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001867256192.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001877145402.png b/docs/vpn/umn/figure/en-us_image_0000001877145402.png new file mode 100644 index 00000000..036e0302 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001877145402.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001878270362.png b/docs/vpn/umn/figure/en-us_image_0000001878270362.png new file mode 100644 index 00000000..692e4cd6 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001878270362.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001878346114.png b/docs/vpn/umn/figure/en-us_image_0000001878346114.png new file mode 100644 index 00000000..95b64e8a Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001878346114.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001883151862.png b/docs/vpn/umn/figure/en-us_image_0000001883151862.png new file mode 100644 index 00000000..813cb808 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001883151862.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001883323518.png b/docs/vpn/umn/figure/en-us_image_0000001883323518.png new file mode 100644 index 00000000..97fcfe07 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001883323518.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001888091881.png b/docs/vpn/umn/figure/en-us_image_0000001888091881.png new file mode 100644 index 00000000..10339bd1 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001888091881.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001888093441.png b/docs/vpn/umn/figure/en-us_image_0000001888093441.png new file mode 100644 index 00000000..f6474c87 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001888093441.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001888117061.png b/docs/vpn/umn/figure/en-us_image_0000001888117061.png new file mode 100644 index 00000000..2c98cae5 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001888117061.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001888252021.png b/docs/vpn/umn/figure/en-us_image_0000001888252021.png new file mode 100644 index 00000000..3e503f51 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001888252021.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001903603225.png b/docs/vpn/umn/figure/en-us_image_0000001903603225.png new file mode 100644 index 00000000..6c15d401 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001903603225.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001911324937.png b/docs/vpn/umn/figure/en-us_image_0000001911324937.png new file mode 100644 index 00000000..7b53acd5 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001911324937.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001923096425.png b/docs/vpn/umn/figure/en-us_image_0000001923096425.png new file mode 100644 index 00000000..09eb3a1d Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001923096425.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001924344277.png b/docs/vpn/umn/figure/en-us_image_0000001924344277.png new file mode 100644 index 00000000..692e4cd6 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001924344277.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001929162353.png b/docs/vpn/umn/figure/en-us_image_0000001929162353.png new file mode 100644 index 00000000..f9876318 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001929162353.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001960951864.png b/docs/vpn/umn/figure/en-us_image_0000001960951864.png new file mode 100644 index 00000000..afe1ac0f Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001960951864.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001970660305.png b/docs/vpn/umn/figure/en-us_image_0000001970660305.png new file mode 100644 index 00000000..3d3c59d8 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001970660305.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001972602221.png b/docs/vpn/umn/figure/en-us_image_0000001972602221.png new file mode 100644 index 00000000..3936a646 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001972602221.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001972697961.png b/docs/vpn/umn/figure/en-us_image_0000001972697961.png new file mode 100644 index 00000000..b018a7ab Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001972697961.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001972699077.png b/docs/vpn/umn/figure/en-us_image_0000001972699077.png new file mode 100644 index 00000000..5443f913 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001972699077.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001976650417.png b/docs/vpn/umn/figure/en-us_image_0000001976650417.png new file mode 100644 index 00000000..7267525c Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001976650417.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001987376506.png b/docs/vpn/umn/figure/en-us_image_0000001987376506.png new file mode 100644 index 00000000..975599da Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001987376506.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001987536262.png b/docs/vpn/umn/figure/en-us_image_0000001987536262.png new file mode 100644 index 00000000..814c2985 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001987536262.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001987536950.png b/docs/vpn/umn/figure/en-us_image_0000001987536950.png new file mode 100644 index 00000000..6e6e8f3b Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001987536950.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001987537386.png b/docs/vpn/umn/figure/en-us_image_0000001987537386.png new file mode 100644 index 00000000..a910a0dd Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001987537386.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001987537886.png b/docs/vpn/umn/figure/en-us_image_0000001987537886.png new file mode 100644 index 00000000..f500f182 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001987537886.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001987560070.png b/docs/vpn/umn/figure/en-us_image_0000001987560070.png new file mode 100644 index 00000000..65f49897 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001987560070.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000001987560190.png b/docs/vpn/umn/figure/en-us_image_0000001987560190.png new file mode 100644 index 00000000..b756b900 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000001987560190.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000002023936425.png b/docs/vpn/umn/figure/en-us_image_0000002023936425.png new file mode 100644 index 00000000..0284f7b2 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000002023936425.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000002023936993.png b/docs/vpn/umn/figure/en-us_image_0000002023936993.png new file mode 100644 index 00000000..71046077 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000002023936993.png differ diff --git a/docs/vpn/umn/figure/en-us_image_0000002024056937.png b/docs/vpn/umn/figure/en-us_image_0000002024056937.png new file mode 100644 index 00000000..1306d7e9 Binary files /dev/null and b/docs/vpn/umn/figure/en-us_image_0000002024056937.png differ diff --git a/docs/vpn/umn/public_sys-resources/ExpandCollapse.js b/docs/vpn/umn/public_sys-resources/ExpandCollapse.js index 116ddaab..c281dc99 100644 --- a/docs/vpn/umn/public_sys-resources/ExpandCollapse.js +++ b/docs/vpn/umn/public_sys-resources/ExpandCollapse.js @@ -1 +1 @@ -var expandClassName="dropdownexpand";var collapseClassName="dropdowncollapse";var collapseTableClassName="dropdowncollapsetable";function ExpandorCollapseNode(a){a=a.parentNode;if(a.className==expandClassName){a.className=collapseClassName}else{a.className=expandClassName}}function ExpandorCollapseTableNode(a){a=a.parentNode;if(a.className==expandClassName){a.className=collapseTableClassName}else{a.className=expandClassName}}function ExpandorCollapseAllNodes(g,h,c){var a=g.getAttribute("title");var b=g.parentNode;if(a=="collapse"){g.setAttribute("title","expand");g.className="dropdownAllButtonexpand";g.innerHTML=h}else{g.setAttribute("title","collapse");g.className="dropdownAllButtoncollapse";g.innerHTML=c}var f=b.getElementsByTagName("*");for(var d=0;d-1){ExpandForHref(a.substring(a.lastIndexOf("#")+1))}}catch(c){}}; \ No newline at end of file +var collapseTableClassName="dropdowncollapsetable";var collapseClassName="dropdowncollapse";var expandClassName="dropdownexpand";function ExpandorCollapseNode(a){a=a.parentNode;if(a.className==expandClassName){a.className=collapseClassName}else{a.className=expandClassName}}function ExpandorCollapseTableNode(a){a=a.parentNode;if(a.className==expandClassName){a.className=collapseTableClassName}else{a.className=expandClassName}}function ExpandorCollapseAllNodes(g,h,c){var a=g.getAttribute("title");var b=g.parentNode;if(a=="collapse"){g.setAttribute("title","expand");g.className="dropdownAllButtonexpand";g.innerHTML=h}else{g.setAttribute("title","collapse");g.className="dropdownAllButtoncollapse";g.innerHTML=c}var f=b.getElementsByTagName("*");for(var d=0;d-1){ExpandForHref(a.substring(a.lastIndexOf("#")+1))}}window.onload=function(){var b=document.getElementsByTagName("div");for(var c=0;c-1){ExpandForHref(a.substring(a.lastIndexOf("#")+1))}}catch(c){}}; \ No newline at end of file diff --git a/docs/vpn/umn/public_sys-resources/commonrtl.css b/docs/vpn/umn/public_sys-resources/commonrtl.css index f261da75..947a9a03 100644 --- a/docs/vpn/umn/public_sys-resources/commonrtl.css +++ b/docs/vpn/umn/public_sys-resources/commonrtl.css @@ -1,2 +1,2 @@ -/*! Copyright (c) Huawei Technologies Co., Ltd. 2020-2022. All rights reserved. */.msgph{font-family:Courier New}.unresolved{background-color:#87ceeb}.noTemplate{background-color:#ff0}.base{background-color:#fff}/*! Add space for top level topics */.nested0,.p{margin-top:1em}/*! div with class=p is used for paragraphs that contain blocks, to keep the XHTML valid *//*! Default of italics to set apart figure captions */.figcap,.italic,.var{font-style:italic}.figdesc{font-style:normal}/*! Use @frame to create frames on figures */.figborder{padding-left:3px;padding-right:3px;margin-top:1em;border:2px solid Silver}.figsides{margin-top:1em;padding-left:3px;padding-right:3px;border-left:2px solid Silver;border-right:2px solid Silver}.figtop{border-top:2px solid Silver;margin-top:1em}.figbottom{border-bottom:2px solid Silver}.figtopbot{border-top:2px solid Silver;border-bottom:2px solid Silver;margin-top:1em}/*! Most link groups are created with
. Ensure they have space before and after. */.ullinks,ul.simple{list-style-type:none}.attention,.danger,.ddexpand,.dlexpand,.example,.fastpath,.important,.liexpand,.linklist,.note,.notice,.olchildlink,.relconcepts,.relinfo,.relref,.reltasks,.remember,.restriction,.section,.sliexpand,.stepexpand,.substepexpand,.tip,.ulchildlink,.warning{margin-top:1em;margin-bottom:1em}.linklistwithchild,.sublinklist{margin-top:1em;margin-right:1.5em;margin-bottom:1em}.breadcrumb{font-size:smaller;margin-bottom:1em}.prereq{margin-right:20px}/*! Set heading sizes, getting smaller for deeper nesting */.topictitle1{font-size:1.34em;margin-top:0;margin-bottom:.1em}.topictitle2,.topictitle3,.topictitle4,.topictitle5,.topictitle6,.sectiontitle{font-size:1.17em}.topictitle2{margin-top:1pc;margin-bottom:.45em}.topictitle3{margin-top:1pc;margin-bottom:.17em;font-weight:700}.topictitle4{margin-top:.83em;font-weight:700}.topictitle5{font-weight:700}.topictitle6{font-style:italic}.sectiontitle{margin-top:1em;margin-bottom:0;color:#000;font-weight:700}/*! All note formats have the same default presentation */.attentiontitle,.bold,.cautiontitle,.dangertitle,.dlterm,.fastpathtitle,.firstcol,.importanttitle,.notelisttitle,.notetitle,.noticetitle,.parmname,.remembertitle,.restrictiontitle,.tiptitle,.uicontrol,.warningtitle{font-weight:700}.caution{font-weight:700;margin-bottom:1em}/*! Simple lists do not get a bullet *//*! Used on the first column of a table, when rowheader="firstcol" is used *//*! Various basic phrase styles */.boldItalic{font-weight:700;font-style:italic}.shortcut,.underlined{text-decoration:underline}/*! 2008-10-27 keyword采用跟随上下文的样式 +.msgph{font-family:Courier New}.unresolved{background-color:#87ceeb}.noTemplate{background-color:#ff0}.base{background-color:#fff}/*! Add space for top level topics */.nested0,.p{margin-top:1em}/*! div with class=p is used for paragraphs that contain blocks, to keep the XHTML valid *//*! Default of italics to set apart figure captions */.figcap,.italic,.var{font-style:italic}.figdesc{font-style:normal}/*! Use @frame to create frames on figures */.figborder{padding-left:3px;padding-right:3px;margin-top:1em;border:2px solid Silver}.figsides{margin-top:1em;padding-left:3px;padding-right:3px;border-left:2px solid Silver;border-right:2px solid Silver}.figtop{border-top:2px solid Silver;margin-top:1em}.figbottom{border-bottom:2px solid Silver}.figtopbot{border-top:2px solid Silver;border-bottom:2px solid Silver;margin-top:1em}/*! Most link groups are created with
. Ensure they have space before and after. */.ullinks,ul.simple{list-style-type:none}.attention,.danger,.ddexpand,.dlexpand,.example,.fastpath,.important,.liexpand,.linklist,.note,.notice,.olchildlink,.relconcepts,.relinfo,.relref,.reltasks,.remember,.restriction,.section,.sliexpand,.stepexpand,.substepexpand,.tip,.ulchildlink,.warning{margin-top:1em;margin-bottom:1em}.linklistwithchild,.sublinklist{margin-top:1em;margin-right:1.5em;margin-bottom:1em}.breadcrumb{font-size:smaller;margin-bottom:1em}.prereq{margin-right:20px}/*! Set heading sizes, getting smaller for deeper nesting */.topictitle1{font-size:1.34em;margin-top:0;margin-bottom:.1em}.topictitle2,.topictitle3,.topictitle4,.topictitle5,.topictitle6,.sectiontitle{font-size:1.17em}.topictitle2{margin-top:1pc;margin-bottom:.45em}.topictitle3{margin-top:1pc;margin-bottom:.17em;font-weight:700}.topictitle4{margin-top:.83em;font-weight:700}.topictitle5{font-weight:700}.topictitle6{font-style:italic}.sectiontitle{margin-top:1em;margin-bottom:0;color:#000;font-weight:700}/*! All note formats have the same default presentation */.attentiontitle,.bold,.cautiontitle,.dangertitle,.dlterm,.fastpathtitle,.firstcol,.importanttitle,.notelisttitle,.notetitle,.noticetitle,.parmname,.remembertitle,.restrictiontitle,.tiptitle,.uicontrol,.warningtitle{font-weight:700}.caution{font-weight:700;margin-bottom:1em}/*! Simple lists do not get a bullet *//*! Used on the first column of a table, when rowheader="firstcol" is used *//*! Various basic phrase styles */.boldItalic{font-weight:700;font-style:italic}.shortcut,.underlined{text-decoration:underline}/*! 2008-10-27 keyword采用跟随上下文的样式 *//*! Default of bold for definition list terms *//*! Use CSS to expand lists with @compact="no" */.dltermexpand{font-weight:700;margin-top:1em}[compact="yes"]>li{margin-top:0}[compact="no"]>li{margin-top:.53em}/*! Align images based on @align on topic/image */div.imageleft,.text-align-left{text-align:left}div.imagecenter,.text-align-center{text-align:center}div.imageright,.text-align-right{text-align:right}div.imagejustify,.text-align-justify{text-align:justify}.cellrowborder{border-right:0;border-top:0;border-left:1px solid;border-bottom:1px solid}.row-nocellborder{border-left:hidden;border-right:0;border-top:0;border-bottom:1px solid}.cell-norowborder{border-top:0;border-bottom:hidden;border-right:0;border-left:1px solid}.nocellnorowborder{border:0;border-left:hidden;border-bottom:hidden}pre.codeblock,pre.screen{padding:5px;border:outset;background-color:#ccc;margin-top:2px;margin-bottom:2px;white-space:pre} \ No newline at end of file diff --git a/docs/vpn/umn/public_sys-resources/imageclose.gif b/docs/vpn/umn/public_sys-resources/imageclose.gif new file mode 100644 index 00000000..3a3344af Binary files /dev/null and b/docs/vpn/umn/public_sys-resources/imageclose.gif differ diff --git a/docs/vpn/umn/public_sys-resources/imageclosehover.gif b/docs/vpn/umn/public_sys-resources/imageclosehover.gif new file mode 100644 index 00000000..8699d5e3 Binary files /dev/null and b/docs/vpn/umn/public_sys-resources/imageclosehover.gif differ diff --git a/docs/vpn/umn/public_sys-resources/imagemax.gif b/docs/vpn/umn/public_sys-resources/imagemax.gif new file mode 100644 index 00000000..99c07dc2 Binary files /dev/null and b/docs/vpn/umn/public_sys-resources/imagemax.gif differ diff --git a/docs/vpn/umn/public_sys-resources/imagemaxhover.gif b/docs/vpn/umn/public_sys-resources/imagemaxhover.gif new file mode 100644 index 00000000..d01d77d6 Binary files /dev/null and b/docs/vpn/umn/public_sys-resources/imagemaxhover.gif differ diff --git a/docs/vpn/umn/public_sys-resources/macFFBgHack.png b/docs/vpn/umn/public_sys-resources/macFFBgHack.png new file mode 100644 index 00000000..ec811470 Binary files /dev/null and b/docs/vpn/umn/public_sys-resources/macFFBgHack.png differ diff --git a/docs/vpn/umn/public_sys-resources/popup.js b/docs/vpn/umn/public_sys-resources/popup.js index a550862e..bae3e929 100644 --- a/docs/vpn/umn/public_sys-resources/popup.js +++ b/docs/vpn/umn/public_sys-resources/popup.js @@ -1 +1 @@ -var i=0;var dhtmlgoodies_tooltipFlag=false;var dhtmlgoodies_tooltip="";var dhtmlgoodies_tooltipShadow="";var dhtmlgoodies_shadowSize=3;var dhtmlgoodies_tooltipMaxWidth=500;var dhtmlgoodies_tooltipMinWidth=100;var dhtmlgoodies_iframe=false;var timeId;var clickFlag=false;var tooltip_is_msie=(navigator.userAgent.indexOf("MSIE")>=0&&navigator.userAgent.indexOf("opera")==-1&&document.all)?true:false;var xPos;var yPos;window.document.onmousemove=function(a){a=a||window.event;if(a.pageX){xPos=a.pageX;yPos=a.pageY}else{if(document.body!==null&&typeof document.body!=="undefined"){xPos=a.clientX+document.body.scrollLeft-document.body.clientLeft;yPos=a.clientY+document.body.scrollTop-document.body.clientTop}}};function showTooltip(e){if(document.body===null||typeof document.body==="undefined"){return}if(i==0){return}clickFlag=true;var f=Json.parse("jsonData."+e);var a=Math.max(document.body.clientWidth,document.documentElement.clientWidth)-20;if(!dhtmlgoodies_tooltipFlag){dhtmlgoodies_tooltip=document.createElement("DIV");dhtmlgoodies_tooltip.id="dhtmlgoodies_tooltip";dhtmlgoodies_tooltipShadow=document.createElement("DIV");dhtmlgoodies_tooltipShadow.id="dhtmlgoodies_tooltipShadow";document.body.appendChild(dhtmlgoodies_tooltip);document.body.appendChild(dhtmlgoodies_tooltipShadow);if(tooltip_is_msie){dhtmlgoodies_iframe=document.createElement("IFRAME");dhtmlgoodies_iframe.frameborder="5";dhtmlgoodies_iframe.style.backgroundColor="#FFFFFF";dhtmlgoodies_iframe.src="#";dhtmlgoodies_iframe.style.zIndex=100;dhtmlgoodies_iframe.style.position="absolute";document.body.appendChild(dhtmlgoodies_iframe)}}dhtmlgoodies_tooltip.style.display="block";dhtmlgoodies_tooltipShadow.style.display="block";if(tooltip_is_msie){dhtmlgoodies_iframe.style.display="block"}var b=Math.max(document.body.scrollTop,document.documentElement.scrollTop);if(navigator.userAgent.toLowerCase().indexOf("safari")>=0){b=0}var c=xPos+10;dhtmlgoodies_tooltip.style.width=null;dhtmlgoodies_tooltip.innerHTML=f;dhtmlgoodies_tooltip.style.left=c+"px";if(tooltip_is_msie){dhtmlgoodies_tooltip.style.top=yPos+20+b+"px"}else{dhtmlgoodies_tooltip.style.top=yPos+20+"px"}dhtmlgoodies_tooltipShadow.style.left=c+dhtmlgoodies_shadowSize+"px";if(tooltip_is_msie){dhtmlgoodies_tooltipShadow.style.top=yPos+20+b+dhtmlgoodies_shadowSize+"px"}else{dhtmlgoodies_tooltipShadow.style.top=yPos+20+dhtmlgoodies_shadowSize+"px"}if(dhtmlgoodies_tooltip.offsetWidth>dhtmlgoodies_tooltipMaxWidth){dhtmlgoodies_tooltip.style.width=dhtmlgoodies_tooltipMaxWidth+"px"}var d=dhtmlgoodies_tooltip.offsetWidth;if(da){dhtmlgoodies_tooltip.style.left=(dhtmlgoodies_tooltipShadow.style.left.replace("px","")-((c+d)-a))+"px";dhtmlgoodies_tooltipShadow.style.left=(dhtmlgoodies_tooltipShadow.style.left.replace("px","")-((c+d)-a)+dhtmlgoodies_shadowSize)+"px"}if(tooltip_is_msie){dhtmlgoodies_iframe.style.left=dhtmlgoodies_tooltip.style.left;dhtmlgoodies_iframe.style.top=dhtmlgoodies_tooltip.style.top;dhtmlgoodies_iframe.style.width=dhtmlgoodies_tooltip.offsetWidth+"px";dhtmlgoodies_iframe.style.height=dhtmlgoodies_tooltip.offsetHeight+"px"}}function hideTooltip(){i=0;clickFlag=false;if((dhtmlgoodies_tooltip!==null&&typeof dhtmlgoodies_tooltip!=="undefined")&&+(dhtmlgoodies_tooltip.style!==null&&typeof dhtmlgoodies_tooltip.style!=="undefined")){dhtmlgoodies_tooltip.style.display="none";dhtmlgoodies_tooltipShadow.style.display="none";if(tooltip_is_msie){dhtmlgoodies_iframe.style.display="none"}}if(timeId!==null&&typeof timeId!=="undefined"&&timeId!=""){clearTimeout(timeId)}}function showText(a){i=1;timeId=setTimeout(function(){showTooltip(a)},500)}function showText2(a){if(!clickFlag){i=1;showTooltip(a);i=0;if(timeId!==null&&typeof timeId!=="undefined"&&timeId!=""){clearTimeout(timeId)}}}function anchorScroll(b){var d=document.getElementsByName(b);if(d!=null&&d.length>0){var c=d[0];var a=c.getBoundingClientRect().left+(document.body.scrollLeft||(document.documentElement&&document.documentElement.scrollLeft));var e=c.getBoundingClientRect().top+(document.body.scrollTop||(document.documentElement&&document.documentElement.scrollTop));window.scrollTo(a,e-30)}}; \ No newline at end of file +var i=0;var dhtmlgoodies_tooltip="";var dhtmlgoodies_tooltipFlag=false;var dhtmlgoodies_shadowSize=3;var dhtmlgoodies_tooltipShadow="";var dhtmlgoodies_tooltipMinWidth=100;var dhtmlgoodies_tooltipMaxWidth=500;var timeId;var dhtmlgoodies_iframe=false;var tooltip_is_msie=(navigator.userAgent.indexOf("MSIE")>=0&&navigator.userAgent.indexOf("opera")==-1&&document.all)?true:false;var clickFlag=false;var yPos;var xPos;window.document.onmousemove=function(a){a=a||window.event;if(a.pageX){yPos=a.pageY;xPos=a.pageX}else{if(document.body!==null&&typeof document.body!=="undefined"){yPos=a.clientY+document.body.scrollTop-document.body.clientTop;xPos=a.clientX+document.body.scrollLeft-document.body.clientLeft}}};function showTooltip(e){if(document.body===null||typeof document.body==="undefined"||i==0){return}clickFlag=true;var f=Json.parse("jsonData."+e);var a=Math.max(document.body.clientWidth,document.documentElement.clientWidth)-20;if(!dhtmlgoodies_tooltipFlag){dhtmlgoodies_tooltipShadow=document.createElement("DIV");dhtmlgoodies_tooltipShadow.id="dhtmlgoodies_tooltipShadow";dhtmlgoodies_tooltip=document.createElement("DIV");dhtmlgoodies_tooltip.id="dhtmlgoodies_tooltip";document.body.appendChild(dhtmlgoodies_tooltip);document.body.appendChild(dhtmlgoodies_tooltipShadow);if(tooltip_is_msie){dhtmlgoodies_iframe=document.createElement("IFRAME");dhtmlgoodies_iframe.style.backgroundColor="#FFFFFF";dhtmlgoodies_iframe.frameborder="5";dhtmlgoodies_iframe.src="#";dhtmlgoodies_iframe.style.position="absolute";dhtmlgoodies_iframe.style.zIndex=100;document.body.appendChild(dhtmlgoodies_iframe)}}dhtmlgoodies_tooltipShadow.style.display="block";dhtmlgoodies_tooltip.style.display="block";if(tooltip_is_msie){dhtmlgoodies_iframe.style.display="block"}var b=Math.max(document.body.scrollTop,document.documentElement.scrollTop);if(navigator.userAgent.toLowerCase().indexOf("safari")>=0){b=0}dhtmlgoodies_tooltip.style.width=null;dhtmlgoodies_tooltip.innerHTML=f;var c=xPos+10;dhtmlgoodies_tooltip.style.left=c+"px";if(tooltip_is_msie){dhtmlgoodies_tooltip.style.top=yPos+20+b+"px"}else{dhtmlgoodies_tooltip.style.top=yPos+20+"px"}dhtmlgoodies_tooltipShadow.style.left=c+dhtmlgoodies_shadowSize+"px";if(tooltip_is_msie){dhtmlgoodies_tooltipShadow.style.top=yPos+20+b+dhtmlgoodies_shadowSize+"px"}else{dhtmlgoodies_tooltipShadow.style.top=yPos+20+dhtmlgoodies_shadowSize+"px"}if(dhtmlgoodies_tooltip.offsetWidth>dhtmlgoodies_tooltipMaxWidth){dhtmlgoodies_tooltip.style.width=dhtmlgoodies_tooltipMaxWidth+"px"}var d=dhtmlgoodies_tooltip.offsetWidth;if(da){dhtmlgoodies_tooltip.style.left=(dhtmlgoodies_tooltipShadow.style.left.replace("px","")-((c+d)-a))+"px";dhtmlgoodies_tooltipShadow.style.left=(dhtmlgoodies_tooltipShadow.style.left.replace("px","")-((c+d)-a)+dhtmlgoodies_shadowSize)+"px"}if(tooltip_is_msie){dhtmlgoodies_iframe.style.top=dhtmlgoodies_tooltip.style.top;dhtmlgoodies_iframe.style.left=dhtmlgoodies_tooltip.style.left;dhtmlgoodies_iframe.style.height=dhtmlgoodies_tooltip.offsetHeight+"px";dhtmlgoodies_iframe.style.width=dhtmlgoodies_tooltip.offsetWidth+"px"}}function hideTooltip(){i=0;clickFlag=false;if((dhtmlgoodies_tooltip!==null&&typeof dhtmlgoodies_tooltip!=="undefined")&&+(dhtmlgoodies_tooltip.style!==null&&typeof dhtmlgoodies_tooltip.style!=="undefined")){dhtmlgoodies_tooltip.style.display="none";dhtmlgoodies_tooltipShadow.style.display="none";if(tooltip_is_msie){dhtmlgoodies_iframe.style.display="none"}}if(timeId!==null&&typeof timeId!=="undefined"&&timeId!=""){clearTimeout(timeId)}}function showText(a){i=1;timeId=setTimeout(function(){showTooltip(a)},500)}function showText2(a){if(!clickFlag){i=1;showTooltip(a);i=0;if(timeId!==null&&typeof timeId!=="undefined"&&timeId!=""){clearTimeout(timeId)}}}function anchorScroll(b){var d=document.getElementsByName(b);if(d!=null&&d.length>0){var c=d[0];var a=c.getBoundingClientRect().left+(document.body.scrollLeft||(document.documentElement&&document.documentElement.scrollLeft));var e=c.getBoundingClientRect().top+(document.body.scrollTop||(document.documentElement&&document.documentElement.scrollTop));window.scrollTo(a,e-30)}}; \ No newline at end of file diff --git a/docs/vpn/umn/vpn_01_0000.html b/docs/vpn/umn/vpn_01_0000.html new file mode 100644 index 00000000..c9b98246 --- /dev/null +++ b/docs/vpn/umn/vpn_01_0000.html @@ -0,0 +1,29 @@ + + +

Overview

+
+ + diff --git a/docs/vpn/umn/vpn_01_0002.html b/docs/vpn/umn/vpn_01_0002.html new file mode 100644 index 00000000..ede6de73 --- /dev/null +++ b/docs/vpn/umn/vpn_01_0002.html @@ -0,0 +1,26 @@ + + +

Product Advantages

+

Enterprise Edition VPN has the following advantages:

+
  • High security
    • Data is encrypted using IKE/IPsec, ensuring high data security.
    • A VPN gateway is exclusive to a tenant, isolating tenants from each other.
    +
  • High availability
    • A VPN gateway provides two IP addresses to establish dual independent VPN connections with a customer gateway. If one VPN connection fails, traffic can be quickly switched to the other VPN connection.
    • Active-active gateways are deployed in different availability zones (AZs) to ensure AZ-level high availability.
    • Active/Standby mode: In normal cases, a VPN gateway communicates with a customer gateway through the active connection. If the active connection fails, traffic is automatically switched to the standby VPN connection. After the fault is rectified, traffic is switched back to the active VPN connection.
    +
  • Cost-effectiveness
    • IPsec connections over the Internet provide a cost-effective alternative to Direct Connect.
    • A VPN gateway can be bound to elastic IP addresses (EIPs) that share bandwidth, reducing bandwidth costs.
    • The bandwidth can be adjusted when an EIP instance is created.
    +
+
  • Easy to use
    • A VPN gateway supports multiple connection modes, including policy-based, static routing, and BGP routing, to meet different access requirements of customer gateways.
    • A VPN gateway on the cloud can function as a VPN hub, enabling on-premises branch sites to access each other.
    • A VPN connection can be created in a few simple steps on the VPN device in an on-premises data center and on the VPN console, and is ready to use immediately after being created.
    • VPN can be used together with the enterprise router service, allowing enterprises to build more flexible cloud-based networks.
    • Private VPN gateways are supported to encrypt traffic transmitted over Direct Connect connections, improving data transmission security.
    +
+

Classic VPN has the following advantages:

+
  • High security

    Dedicated devices are used to encrypt data through IKE and IPsec protocols, offering carrier-class reliability and ensuring stable VPN connections from perspectives of hardware, software, and links.

    +
+
  • Seamless scaling

    You can connect your on-premises data center to your VPC to quickly extend services at the local data center to the cloud, forming a hybrid cloud.

    +
+
  • Cost-effectiveness

    IPsec connections over the Internet provide a cost-effective alternative to Direct Connect.

    +
+
  • Easy to use

    A VPN connection can be created in a few simple steps on the VPN device in an on-premises data center and on the VPN console, and is ready to use immediately after being created.

    +
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_01_0005.html b/docs/vpn/umn/vpn_01_0005.html new file mode 100644 index 00000000..3a41dc89 --- /dev/null +++ b/docs/vpn/umn/vpn_01_0005.html @@ -0,0 +1,155 @@ + + +

Quotas and Limitations

+

VPN Gateway

+
+ + + + + + + + + + + + + + + + + + + + + +
Table 1 Constraints on Enterprise Edition VPN gateways

VPN Type

+

Resource

+

Default Quota

+

Enterprise Edition VPN

+

VPN gateways per tenant in each region

+

50

+
  • If you have only one VPC, you can create a maximum of 50 VPN gateways for the VPC.
  • If you have multiple VPCs, you can create a maximum of 50 VPN gateways for all these VPCs.
+

Enterprise Edition VPN

+

VPN connection groups per VPN gateway

+

100

+

Enterprise Edition VPN

+

Local subnets per VPN gateway

+

50

+

Enterprise Edition VPN

+

Number of BGP routes that a VPN gateway can receive from a customer gateway through a connection

+

100

+
+
+ +
+ + + + + + + + + +
Table 2 Constraints on Classic VPN

VPN Type

+

Resource

+

Default Quota

+

Classic VPN

+

VPNs per tenant in each region

+

2

+

Only one VPN can be created for a VPC.

+
+
+
  • By default, the maximum length of TCP packets supported by a VPN gateway is 1300 bytes.
+
+

Customer Gateway

+
+ + + + + + + + + +
Table 3 Constraints on customer gateways

VPN Type

+

Resource

+

Default Quota

+

Enterprise Edition VPN

+

Customer gateways per tenant in each region

+

100

+
+
+
  • Enable NAT traversal on the customer gateway based on the networking.
    • If the customer gateway is connected to the Internet through a NAT device, enable NAT traversal on the customer gateway.
    • If the customer gateway is directly connected to the Internet, you do not need to enabled NAT traversal on the customer gateway.
    +
  • Dead Peer Detection (DPD) must be enabled on a customer gateway.
  • A customer gateway must support IPsec tunnel interfaces and be configured with a corresponding security policy.
  • When Network Quality Analysis (NQA) is enabled for a connection in static routing mode, the IPsec tunnel interface of a customer gateway must have an IP address and be able to respond to ICMP requests.
  • It is recommended that the maximum segment size (MSS) of TCP packets be set to a value less than 1399 on a customer gateway, so as to prevent fragmentation caused by addition of an IPsec header.
+
+

VPN Connection

+
+ + + + + + + + + + + + + + + + +
Table 4 Constraints on Enterprise Edition VPN connections

VPN Type

+

Resource

+

Default Quota

+

How to Increase Quota

+

Enterprise Edition VPN

+

Policy rules per VPN connection

+

5

+

The quotas cannot be increased.

+

Enterprise Edition VPN

+

Customer subnets per VPN connection

+

50

+

This quota cannot be increased.

+
+
+ +
+ + + + + + + + + + + +
Table 5 Constraints on Classic VPN connections

VPN Type

+

Resource

+

Default Quota

+

How to Increase Quota

+

Classic VPN

+

VPN connections per tenant in each region

+

12

+

This quota cannot be increased.

+
+
+
  • In multi-subnet scenarios, you are advised to use VPN connections in routing mode. For a VPN connection in policy-based or policy template mode, a VPN gateway creates a communications tunnel for each pair of the local and customer subnets by default. If there are multiple local or customer subnets for a VPN connection in policy-based or policy template mode, multiple communications tunnels are created.

    Each IP address of a VPN gateway supports a maximum of 100 communications tunnels for connecting to customer gateways.

    +
    • In routing mode, each VPN connection occupies only one communications tunnel of the corresponding VPN gateway IP address.
    • In policy-based or policy template mode, each VPN connection occupies M x N communications tunnels of the corresponding VPN gateway IP address. M indicates the number of local subnets, and N indicates the number of customer subnets.
    +

    If the number of communications tunnels occupied by all VPN connections in different modes established by a single gateway IP address has reached 100, excess VPN connections will fail to be created.

    +
  • When creating a VPN connection in policy-based mode and adding multiple policy rules, ensure that the source and destination CIDR blocks in different policy rules do not overlap. Otherwise, data flows may be incorrectly matched or IPsec tunnels may flap.
+
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_01_0006.html b/docs/vpn/umn/vpn_01_0006.html new file mode 100644 index 00000000..562f5df4 --- /dev/null +++ b/docs/vpn/umn/vpn_01_0006.html @@ -0,0 +1,12 @@ + + +

Reference Standards and Protocols

+

The following standards and protocols are associated with VPN:

+
  • RFC 2403: The Use of HMAC-MD5-96 within ESP and AH
  • RFC 2404: The Use of HMAC-SHA-1-96 within ESP and AH
  • RFC 2409: The Internet Key Exchange (IKE)
  • RFC 2451: The ESP CBC-Mode Cipher Algorithms
  • RFC 3526: More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE)
  • RFC 3566: The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec
  • RFC 3602: The AES-CBC Cipher Algorithm and Its Use with IPsec
  • RFC 3664: The AES-XCBC-PRF-128 Algorithm for the Internet Key Exchange Protocol (IKE)
  • RFC 4106: The Use of Galois/Counter Mode (GCM) in IPsec Encapsulating Security Payload (ESP)
  • RFC 4109: Algorithms for Internet Key Exchange version 1 (IKEv1)
  • RFC 4434: The AES-XCBC-PRF-128 Algorithm for the Internet Key Exchange Protocol (IKE)
  • RFC 4868: Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec
  • RFC 4301: Security Architecture for the Internet Protocol
  • RFC 4302: IP Authentication Header
  • RFC 4303: IP Encapsulating Security Payload (ESP)
  • RFC 4305: Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH)
  • RFC 4306: Internet Key Exchange (IKEv2)Protocol
  • RFC 4307: Cryptographic Algorithms for Use in the Internet Key Exchange Version 2 (IKEv2)
  • RFC 4308: Cryptographic Suites for IPsec
  • RFC 5282: Using Authenticated Encryption Algorithms with the Encrypted Payload of the Internet Key Exchange version 2 (IKEv2) Protocol
  • RFC 6989: Additional Diffie-Hellman Tests for the Internet Key Exchange Protocol Version 2 (IKEv2)
  • RFC 7296: Internet Key Exchange Protocol Version 2 (IKEv2)
  • RFC 7321: Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)
  • RFC 8247: Algorithm Implementation Requirements and Usage Guidance for the Internet Key Exchange Protocol Version 2 (IKEv2)
  • RFC 3947: Negotiation of NAT-Traversal in the IKE
  • RFC 3948: UDP Encapsulation of IPsec ESP Packets
  • RFC 3706: A Traffic-Based Method of Detecting Dead Internet Key Exchange (IKE) Peers
  • RFC 4271: A Border Gateway Protocol 4 (BGP-4)
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_01_0011.html b/docs/vpn/umn/vpn_01_0011.html new file mode 100644 index 00000000..4a28bcc9 --- /dev/null +++ b/docs/vpn/umn/vpn_01_0011.html @@ -0,0 +1,253 @@ + + +

Permissions Management

+

If you need to assign different permissions to personnel in your enterprise to access your VPN resources created on the cloud service platform, Identity and Access Management (IAM) is a good choice for fine-grained permissions management. IAM provides identity authentication, permissions management, and access control, helping you securely manage access to your resources.

+

With IAM, you can use your account to create IAM users, and assign permissions to the users to control their access to specific cloud resources. For example, some software developers in your enterprise need to use VPN resources but should not be allowed to delete them or perform any high-risk operations. In this scenario, you can create IAM users for the software developers and grant them only the permissions required for using VPN resources.

+

If your account does not need individual IAM users for permissions management, skip this section, which has no impact on using functions of VPN.

+

IAM is a free service. You only pay for the resources in your account.

+

For more information about IAM, see IAM Service Overview.

+

VPN Permissions

New IAM users do not have any permissions assigned by default. You need to first add them to one or more groups and attach policies or roles to these groups. The users then inherit permissions from the groups and can perform specified operations on cloud services based on the permissions they have been assigned.

+

VPN is a project-level service deployed for specific regions. When you set Scope to Region-specific projects and select the specified projects in the specified regions, the users only have permissions for VPN in the selected projects. If you set Scope to All resources, users have permissions for VPN in all region-specific projects. When accessing VPN, the users need to switch to the authorized region.

+

You can grant permissions by using roles or policies.

+
  • Roles: A type of coarse-grained authorization mechanism that defines permissions related to user responsibilities. There are only a limited number of roles for granting permissions to users. Some roles depend other roles to take effect. When you assign such roles to users, remember to assign the roles they depend on. However, roles are not an ideal choice for fine-grained authorization and secure access control.
  • Policies: a type of fine-grained authorization mechanism that defines permissions required to perform operations on specific cloud resources under certain conditions. This mechanism allows for more flexible policy-based authorization, meeting requirements for secure access control. For example, administrators can grant IAM users only permissions to manage VPN resources of a certain type.
+
Table 1 lists all system-defined permissions for VPN. +
+ + + + + + + + + + + + + + + + + +
Table 1 System-defined permissions for VPN

System Role/Policy Name

+

Description

+

Dependency

+

VPN Administrator (not recommended)

+

Administrator permissions for VPN. Users with these permissions can perform all operations on VPN.

+

Users with these permissions have the VPC Administrator and Tenant Guest permissions by default.

+
  • VPC Administrator: project-level policy, which is selected in the same project as VPN Administrator.
  • Tenant Guest: project-level policy, which is selected in the same project as VPN Administrator.
+

-

+

VPN FullAccess (recommended)

+

Full permissions for VPN.

+

The actions of global services and the region-level actions cannot be configured in the same policy. As such, the following global actions are added:

+

"tms:predefineTags:list"

+

"scm:cert:list"

+

"scm:cert:get"

+

"scm:cert:download"

+

VPN ReadOnlyAccess

+

Read-only permissions on VPN resources. Users who have these permissions can only view information about VPN resources.

+

The actions of global services and the region-level actions cannot be configured in the same policy. As such, the following global actions are added:

+

"tms:predefineTags:list"

+

"scm:cert:list"

+

"scm:cert:get"

+
+
+
+

Table 2 lists the common operations supported by system-defined permissions for VPN.

+ +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Table 2 Common operations supported by system-defined permissions for VPN

Operation

+

VPN Administrator (Not Recommended)

+

VPN FullAccess (Recommended)

+

VPN ReadOnlyAccess

+

Creating a VPN gateway

+

+
  • Enterprise Edition VPN: √
  • Classic VPN: ×
+

×

+

Viewing a VPN gateway

+

+

+

+

Querying the VPN gateway list

+

+

+

+

Updating a VPN gateway

+

+
  • Enterprise Edition VPN: √
  • Classic VPN: ×
+

×

+

Deleting a VPN gateway

+

+
  • Enterprise Edition VPN: √
  • Classic VPN: ×
+

×

+

Creating a VPN connection

+

+
  • Enterprise Edition VPN: √
  • Classic VPN: √
+

×

+

Viewing a VPN connection

+

+

+

+

Querying the VPN connection list

+

+

+

+

Updating a VPN connection

+

+
  • Enterprise Edition VPN: √
  • Classic VPN: √
+

×

+

Deleting a VPN connection

+

+
  • Enterprise Edition VPN: ×
  • Classic VPN: √
+

×

+

Creating a customer gateway

+

+
  • Enterprise Edition VPN: √
  • Classic VPN: N/A
+

×

+

Viewing a customer gateway

+

+
  • Enterprise Edition VPN: √
  • Classic VPN: N/A
+

+

Querying the customer gateway list

+

+
  • Enterprise Edition VPN: √
  • Classic VPN: N/A
+

+

Updating a customer gateway

+

+
  • Enterprise Edition VPN: √
  • Classic VPN: N/A
+

×

+

Deleting a customer gateway

+

+
  • Enterprise Edition VPN: √
  • Classic VPN: N/A
+

×

+

Creating a VPN connection monitor

+

+
  • Enterprise Edition VPN: √
  • Classic VPN: ×
+

×

+

Querying a VPN connection monitor

+

+
  • Enterprise Edition VPN: √
  • Classic VPN: ×
+

+

Querying the VPN connection monitor list

+

+
  • Enterprise Edition VPN: √
  • Classic VPN: ×
+

+

Deleting a VPN connection monitor

+

+
  • Enterprise Edition VPN: √
  • Classic VPN: ×
+

×

+
+
+

Classic VPN: For details about how to create a user and grant VPC permissions to the user, see Creating a User and Granting VPC Permissions.

+
+
+

Helpful Links

+
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_01_0012.html b/docs/vpn/umn/vpn_01_0012.html new file mode 100644 index 00000000..913bd8d6 --- /dev/null +++ b/docs/vpn/umn/vpn_01_0012.html @@ -0,0 +1,12 @@ + + +

VPN Gateway

+

A VPN gateway is a virtual gateway of VPN on the cloud. It establishes secure private connections with a customer gateway in your on-premises network or data center.

+

A VPN gateway needs to work with a customer gateway in your on-premises data center.

+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_01_0013.html b/docs/vpn/umn/vpn_01_0013.html new file mode 100644 index 00000000..b179f710 --- /dev/null +++ b/docs/vpn/umn/vpn_01_0013.html @@ -0,0 +1,12 @@ + + +

VPN Connection

+

A VPN connection is a secure channel between a VPN gateway and a customer gateway. VPN connections use the IKE and IPsec protocols to encrypt the transmitted data.

+

A VPN connection uses the IKE and IPsec protocols to encrypt transmitted data, ensuring data security and reliability.

+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_01_0014.html b/docs/vpn/umn/vpn_01_0014.html new file mode 100644 index 00000000..04aba15a --- /dev/null +++ b/docs/vpn/umn/vpn_01_0014.html @@ -0,0 +1,12 @@ + + +

VPN Gateway Bandwidth

+

The bandwidth you purchased for a VPN gateway refers to outbound bandwidth, that is, bandwidth for traffic sent from a VPC on the cloud to a customer gateway in an on-premises data center.

+
  • If the purchased bandwidth is 10 Mbit/s or less, the inbound bandwidth is limited to 10 Mbit/s.
  • If the purchased bandwidth is greater than 10 Mbit/s, the inbound bandwidth is the same as the EIP bandwidth.
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_01_0015.html b/docs/vpn/umn/vpn_01_0015.html new file mode 100644 index 00000000..4acdfcea --- /dev/null +++ b/docs/vpn/umn/vpn_01_0015.html @@ -0,0 +1,12 @@ + + +

Local Subnet

+

Local subnets are VPC subnets that need to communicate with an on-premises network through VPN. When you buy a VPN gateway, you can set Local Subnet to either of the following options:

+
  • Select subnet: Select subnets from the drop-down list. This is recommended if all subnets that require VPN communication are in the VPC.
  • Enter CIDR block: Enter a subnet using CIDR notation (example: 192.168.0.0/16). If multiple subnets are specified, separate them by a comma (,). This is recommended if the CIDR blocks requiring VPN communication are not in the VPC to which the VPN gateway belongs. For example, CIDR blocks (such as 0.0.0.0/0) that are connected using a VPC peering are not in the VPC to which the VPN gateway belongs.
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_01_0016.html b/docs/vpn/umn/vpn_01_0016.html new file mode 100644 index 00000000..33017a74 --- /dev/null +++ b/docs/vpn/umn/vpn_01_0016.html @@ -0,0 +1,11 @@ + + +

Customer Gateway

+

A customer gateway is a resource that provides information on the console about your customer gateway device, which can be a physical device or software application in your on-premises data center.

+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_01_0017.html b/docs/vpn/umn/vpn_01_0017.html new file mode 100644 index 00000000..63050dd2 --- /dev/null +++ b/docs/vpn/umn/vpn_01_0017.html @@ -0,0 +1,14 @@ + + +

Customer Subnet

+

Customer subnets are subnets in an on-premises data center that access a VPC on the cloud through a VPN. You need to enter subnets using CIDR notation (example: 192.168.0.0/16), and with each entry separated by a comma.

+

After configuring a customer subnet, you do not need to add a route for it. The VPN service will automatically deliver routes pointing to the customer subnet.

+

A customer subnet cannot be set to a Class D or Class E IP address or an IP address starting with 127.

+
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_01_0018.html b/docs/vpn/umn/vpn_01_0018.html new file mode 100644 index 00000000..3f5d0f47 --- /dev/null +++ b/docs/vpn/umn/vpn_01_0018.html @@ -0,0 +1,12 @@ + + +

PSK

+

A pre-shared key (PSK) is a key configured for a VPN connection on the cloud. It is used for IKE negotiation between VPN devices at both ends of a VPN connection. Ensure that the PSK configurations at both ends of the VPN connection are the same. Otherwise, the IKE negotiation will fail.

+

+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_01_0020.html b/docs/vpn/umn/vpn_01_0020.html new file mode 100644 index 00000000..d44afd99 --- /dev/null +++ b/docs/vpn/umn/vpn_01_0020.html @@ -0,0 +1,12 @@ + + +

Identity Authentication and Access Control

+

A VPN connection supports authentication of a customer gateway using a pre-shared key (PSK).

+

The identity authentication succeeds and the VPN connection can be set up only when the PSK configured on the customer gateway is the same as that configured for the VPN connection.

+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_01_0021.html b/docs/vpn/umn/vpn_01_0021.html new file mode 100644 index 00000000..61daf5cc --- /dev/null +++ b/docs/vpn/umn/vpn_01_0021.html @@ -0,0 +1,76 @@ + + +

Data Protection Technologies

+
  • VPN is a tunneling technology that provides IP-layer security using the IKE/IPsec protocol suite. It ensures confidentiality and integrity of IP data packets and prevents them from being intercepted, disclosed, or tampered with on insecure networks (such as the Internet).
  • When creating a VPN connection, you can configure data encryption and authentication algorithms in a policy.

    Table 1 lists the algorithms recommended for VPN in descending order of security.

    + +
    + + + + + + + + + + + + + + + + + + + + + + + + +
    Table 1 Parameters for configuring a VPN policy

    Parameter

    +

    Description

    +

    IKE Policy

    +

    Version

    +
    • v2
    • v1 (v1 has low security. If the device supports v2, v2 is recommended.)
    +

    The default value is v2.

    +

    Authentication Algorithm

    +

    Hash algorithm used for authentication. The following algorithms are supported:

    +
    • SHA2-512
    • SHA2-384
    • SHA2-256
    • MD5(Insecure. Not recommended.)
    • SHA1(Insecure. Not recommended.)
    +

    By default, the SHA2-256 algorithm is used.

    +

    Encryption Algorithm

    +

    The following encryption algorithms are supported:

    +
    • AES-256-GCM-16 (supported only by Enterprise Edition VPN)
    • AES-128-GCM-16 (supported only by Enterprise Edition VPN)
    • AES-256(Insecure. Not recommended.)
    • AES-192(Insecure. Not recommended.)
    • AES-128(Insecure. Not recommended.)
    • 3DES(Insecure. Not recommended.)
    +

    By default, the AES-128 algorithm is used.

    +

    DH Algorithm

    +

    The following algorithms are supported:

    +
    • Group 21
    • Group 20
    • Group 19
    • Group 16
    • Group 15
    • Group 14(Insecure. Not recommended.)
    • Group 5(Insecure. Not recommended.)
    • Group 2(Insecure. Not recommended.)
    • Group 1(Insecure. Not recommended.)
    +

    By default, Group 15 is used.

    +

    IPsec Policy

    +

    Authentication Algorithm

    +

    Hash algorithm used for authentication. The following algorithms are supported:

    +
    • SHA2-512
    • SHA2-384
    • SHA2-256
    • MD5(Insecure. Not recommended.)
    • SHA1(Insecure. Not recommended.)
    +

    By default, the SHA2-256 algorithm is used.

    +

    Encryption Algorithm

    +

    The following encryption algorithms are supported:

    +
    • AES-256-GCM-16
    • AES-128-GCM-16
    • AES-256(Insecure. Not recommended.)
    • AES-192(Insecure. Not recommended.)
    • AES-128(Insecure. Not recommended.)
    • 3DES(Insecure. Not recommended.)
    +

    By default, the AES-128 algorithm is used.

    +
    +
    +
+

PFS

Perfect Forward Secrecy (PFS) ensures that the compromise of the keys of an IPsec tunnel does not affect the security of other tunnels by leveraging that the keys of these tunnels are irrelevant to each other. By default, the PFS function is enabled for VPN.

+

Each IPsec VPN connection consists of at least one IPsec tunnel, each of which uses an independent set of keys to protect user traffic.

+

VPN supports the following algorithms:

+
  • DH group 1 (This algorithm is insecure. Exercise caution when using it.)
  • DH group 2 (This algorithm is insecure. Exercise caution when using it.)
  • DH group 5 (This algorithm is insecure. Exercise caution when using it.)
  • DH group 14
  • DH group 15
  • DH group 16
  • DH group 19
  • DH group 20
  • DH group 21
+
+

Anti-replay

Anti-replay uses sequence numbers to protect IPsec encrypted packets against replay attacks, which are initiated by repeatedly sending intercepted data packets. By default, the anti-replay function is enabled for the VPN service.

+
+

Resource Isolation

A VPN gateway is exclusive to a tenant. As such, tenants are isolated from each, ensuring tenant data security.

+
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_01_0022.html b/docs/vpn/umn/vpn_01_0022.html new file mode 100644 index 00000000..fd3fea1f --- /dev/null +++ b/docs/vpn/umn/vpn_01_0022.html @@ -0,0 +1,12 @@ + + +

Audit and Logs

+

VPN records the create, delete, and modify operations performed on all resources initiated by your account, and sends the records to Cloud Trace Service (CTS) in log files for query, audit, and source tracing.

+
Figure 1 Audit and logs
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_01_0023.html b/docs/vpn/umn/vpn_01_0023.html new file mode 100644 index 00000000..770fab82 --- /dev/null +++ b/docs/vpn/umn/vpn_01_0023.html @@ -0,0 +1,12 @@ + + +

Service Resilience

+

VPN provides the dual-AZ disaster recovery function. You can create a VPN gateway in two AZs in the same region, and create a VPN connection between the customer gateway and each AZ.

+

If the VPN gateway or VPN connection in an AZ is faulty, traffic is automatically switched to the other VPN connection, ensuring normal service running.

+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_01_0027.html b/docs/vpn/umn/vpn_01_0027.html new file mode 100644 index 00000000..93f12816 --- /dev/null +++ b/docs/vpn/umn/vpn_01_0027.html @@ -0,0 +1,25 @@ + + +

Region and AZ

+

Concepts

Regions and availability zones (AZs) identify the locations of data centers. You can create resources in regions and AZs.

+
  • A region is a physical data center location. Each region is completely independent, maximizing the fault tolerance capability and stability. After you create resources in a region, the region cannot be changed.
  • An AZ is a physical location with independent power supplies and network in a region. A region can contain multiple AZs that are physically isolated but internally interconnected. Faults that occur in one AZ will not affect other AZs. The inter-AZ connections are low-latency and unexpensive.
+

Figure 1 shows the relationship between regions and AZs.

+
Figure 1 Regions and AZs
+
+

Selecting a Region

  • Resource price

    Resource prices may vary in different regions.

    +
+
+

Selecting a Region

You are advised to select a region close to you or your target users to reduce network latency and improve the access speed.

+
+

Selecting an AZ

When selecting a region to deploy resources, consider your applications' requirements on disaster recovery (DR) and network latency.

+
  • For robust DR, deploy resources in different AZs within the same region.
  • For a low network latency, deploy resources in the same AZ.
+
+

Regions and Endpoints

Before you use an API to call resources, specify its region and endpoint. For more information, see Regions and Endpoints.

+
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_01_0032.html b/docs/vpn/umn/vpn_01_0032.html new file mode 100644 index 00000000..e24d0d51 --- /dev/null +++ b/docs/vpn/umn/vpn_01_0032.html @@ -0,0 +1,29 @@ + + +

Application Scenarios

+

Hybrid Cloud Deployment

You can use a VPN to connect your on-premises data center to a VPC and use the elastic and fast scaling capabilities of the cloud to expand application computing capabilities. Figure 1 shows the hybrid cloud deployment.
Figure 1 Hybrid cloud deployment
+
+
+

Cross-Region Interconnection Between VPCs

With VPNs, you can connect VPCs in different regions to enable connectivity between user services in these regions, as shown in Figure 2.

+
Figure 2 Cross-region interconnection between VPCs
+
+

Enterprise Branch Interconnection

A VPN gateway functions as a VPN hub to connect enterprise branches, as shown in Figure 3. This eliminates the need to configure VPN connections between every two branches.

+
Figure 3 Enterprise branch interconnection
+
+

Backup Between VPN and Direct Connect

For high reliability purposes, you can connect your on-premises data center to a VPC on the cloud through Direct Connect and VPN that back up each other, as shown in Figure 4.

+
Figure 4 Backup between VPN and Direct Connect
+
+
+
+ +
+ + + \ No newline at end of file diff --git a/docs/vpn/umn/vpn_01_0033.html b/docs/vpn/umn/vpn_01_0033.html new file mode 100644 index 00000000..8b4f60ac --- /dev/null +++ b/docs/vpn/umn/vpn_01_0033.html @@ -0,0 +1,132 @@ + + +

Differences between Enterprise Edition VPN and Classic VPN

+
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Table 1 Differences between Enterprise Edition VPN and Classic VPN

Category

+

Item

+

Enterprise Edition VPN

+

Classic VPN

+

Tenant isolation

+

Tenant-exclusive gateway

+

Supported

+

Not supported

+

Features

+

Policy-based mode

+

Supported

+

Supported

+

Features

+

Routing mode

+

Static routing and BGP routing

+

Not supported

+

Features

+

VPN hub

+

Supported

+

Not supported

+

Features

+

Enterprise router

+

Supported

+

Not supported

+

Features

+

Network type

+

Public network and private network

+

Public network

+

Capacity

+

Number of subnets

+
  • Route-based mode: 50
  • Policy-based mode: 5
+

Policy-based mode: 5

+

Capacity

+

For more information, see Table 1.

+

-

+

-

+

Reliability

+

Gateway protection mode

+

Active/Standby or active-active

+

-

+

Reliability

+

Cross-AZ gateway deployment

+

Supported

+

Not supported

+

Reliability

+

Active-active VPN connections

+

Supported

+

Not supported

+

Reliability

+

Backup with Direct Connect

+

Supported

+

Not supported

+
+
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_01_0034.html b/docs/vpn/umn/vpn_01_0034.html new file mode 100644 index 00000000..a5360314 --- /dev/null +++ b/docs/vpn/umn/vpn_01_0034.html @@ -0,0 +1,33 @@ + + +

Basic Concepts

+
+ + diff --git a/docs/vpn/umn/vpn_01_0035.html b/docs/vpn/umn/vpn_01_0035.html new file mode 100644 index 00000000..5b80bebb --- /dev/null +++ b/docs/vpn/umn/vpn_01_0035.html @@ -0,0 +1,21 @@ + + +

IPsec VPN

+

Internet Protocol Security (IPsec) VPN uses a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between different networks.

+

In the example shown in Figure 1, assume that you have created a VPC with two subnets (192.168.1.0/24 and 192.168.2.0/24) on the cloud, and the router in your on-premises data center also has two subnets (192.168.3.0/24 and 192.168.4.0/24). In this case, you can create a VPN to connect the VPC subnets and the data center subnets.

+
Figure 1 IPsec VPN
+

Site-to-site VPN is supported to enable communication between VPC subnets and on-premises data center subnets.

+
+
+ +
+ + + \ No newline at end of file diff --git a/docs/vpn/umn/vpn_01_0036.html b/docs/vpn/umn/vpn_01_0036.html new file mode 100644 index 00000000..f6b3df62 --- /dev/null +++ b/docs/vpn/umn/vpn_01_0036.html @@ -0,0 +1,143 @@ + + +

Product Specifications

+
  • The specification of a VPN gateway can be changed between Basic and Professional 1.
  • The specification of a VPN gateway can be changed between Professional 1 and Professional 2.
  • The preceding specification changes are subject to the console.
+
+ +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Table 1 VPN specifications

Item

+

Basic

+

Professional 1

+

Professional 2

+

Exclusive gateway resources

+

Supported

+

Supported

+

Supported

+

Dual connections

+

Supported

+

Supported

+

Supported

+

Active-active gateways

+

Supported

+

Supported

+

Supported

+

Active/Standby gateways

+

Supported

+

Supported

+

Supported

+

Policy-based mode

+

Supported

+

Supported

+

Supported

+

Routing mode: static routing

+

Supported

+

Supported

+

Supported

+

Routing mode: BGP routing

+

Supported

+

Supported

+

Supported

+

Policy template mode

+

Not supported

+

Not supported

+

Not supported

+

Maximum forwarding bandwidth

+

100 Mbit/s

+

300 Mbit/s

+

1 Gbit/s

+

Maximum number of VPN connection groups

+

10

+

100

+

100

+

Interconnection with an enterprise router

+

Not supported

+

Supported

+

Supported

+

Private network

+

Not supported

+

Supported

+

Supported

+

Supported regions

+

Subject to the regions available on the console

+

Subject to the regions available on the console

+

Subject to the regions available on the console

+
+
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_03_0000.html b/docs/vpn/umn/vpn_03_0000.html new file mode 100644 index 00000000..a75bca45 --- /dev/null +++ b/docs/vpn/umn/vpn_03_0000.html @@ -0,0 +1,13 @@ + + +

Getting Started

+
+ + diff --git a/docs/vpn/umn/vpn_03_0004.html b/docs/vpn/umn/vpn_03_0004.html new file mode 100644 index 00000000..fdfbbe76 --- /dev/null +++ b/docs/vpn/umn/vpn_03_0004.html @@ -0,0 +1,249 @@ + + +

Creating a VPN

+

Overview

By default, ECSs in a VPC cannot communicate with devices in your on-premises data center or private network. To enable communication between them, you can use a VPN by creating it in your VPC and updating security group rules.

+
+

IPsec VPN Topology

In Figure 1, the VPC has subnets 192.168.1.0/24 and 192.168.2.0/24. Your on-premises data center has subnets 192.168.3.0/24 and 192.168.4.0/24. You can use VPN to enable subnets in the VPC to communicate with those in your data center.

+
Figure 1 IPsec VPN
+

Site-to-site VPN is supported to enable communication between VPC subnets and on-premises data center subnets. Before establishing an IPsec VPN, ensure that the on-premises data center where the VPN is to be established meets the following conditions:

+
  • On-premises devices that support the standard IPsec protocol are available.
  • The on-premises devices have fixed public IP addresses, which can be statically configured or translated by NAT.
  • The on-premises subnets do not conflict with VPC subnets, and devices in the on-premises subnets can communicate with the on-premises devices.
+

If the preceding conditions are met, ensure that the IKE policies and IPsec policies at both ends are consistent and the subnets at both ends are matched pairs when configuring IPsec VPN.

+

After the configuration is complete, VPN negotiation needs to be triggered by private network data flows.

+
+

Scenarios

You need a VPN that sets up a secure, isolated communications tunnel between your on-premises data center and cloud services.

+
+

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Click Service List and choose Network > Virtual Private Network.
  4. In the navigation pane on the left, choose Virtual Private Network.

    If Enterprise Edition VPN is available for the selected region, choose Virtual Private Network > Classic.

    +
  5. On the Virtual Private Network page, click Create VPN.

    If Enterprise Edition VPN is available for the selected region, click Create VPN on the Classic page.

    +
  6. Configure required parameters and click Create Now.

    Table 1, Table 2, and Table 3 describe the parameters.

    + +
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Table 1 Basic parameters

    Parameter

    +

    Description

    +

    Example Value

    +

    Region

    +

    Regions are geographic areas that are physically isolated from each other. The networks inside different regions are not connected to each other, so resources cannot be shared across regions. For low network latency and fast resource access, select the region nearest to your target users.

    +

    +

    eu-de

    +

    Name

    +

    The VPN name

    +

    VPN-001

    +

    VPC

    +

    The VPC name

    +

    VPC-001

    +

    Local Subnet

    +

    VPC subnets that will access your on-premises network through a VPN.

    +

    192.168.1.0/24,

    +

    192.168.2.0/24

    +

    Remote Gateway

    +

    The public IP address of the gateway in your data center or on the private network. This IP address is used for communicating with your VPC.

    +

    N/A

    +

    Remote Subnet

    +

    The subnets of your on-premises network that will access a VPC through a VPN. The remote and local subnets cannot overlap with each other. The remote subnets cannot overlap with CIDR blocks involved in existing VPC peering connections created for the VPC.

    +

    192.168.3.0/24,

    +

    192.168.4.0/24

    +

    PSK

    +

    Private key shared by two ends of a VPN connection for negotiation. PSKs configured at both ends of the VPN connection must be the same.

    +

    The PSK can contain 6 to 128 characters.

    +

    Test@123

    +

    Confirm PSK

    +

    Enter the PSK again.

    +

    Test@123

    +

    Advanced Settings

    +
    • Default: Use default IKE and IPsec policies.
    • Custom: Use custom IKE and IPsec policies. For details, see Table 2 and Table 3.
    +

    Custom

    +

    Advanced Settings > Tags

    +

    Configure Tags in Advanced Settings.

    +

    -

    +
    +
    + +
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Table 2 IKE policy

    Parameter

    +

    Description

    +

    Example Value

    +

    Authentication Algorithm

    +

    Hash algorithm used for authentication. The following algorithms are supported:

    +
    • MD5(Insecure. Not recommended.)
    • SHA1(Insecure. Not recommended.)
    • SHA2-256
    • SHA2-384
    • SHA2-512
    +

    The default value is SHA2-256.

    +

    SHA2-256

    +

    Encryption Algorithm

    +

    Encryption algorithm. The following algorithms are supported:

    +
    • AES-128
    • AES-192
    • AES-256
    • 3DES(Insecure. Not recommended.)
    +

    The default value is AES-128.

    +

    AES-128

    +

    DH Algorithm

    +

    Diffie-Hellman key exchange algorithm. The following algorithms are supported:

    +
    • DH group 1(Insecure. Not recommended.)
    • DH group 2(Insecure. Not recommended.)
    • DH group 5(Insecure. Not recommended.)
    • DH group 14
    • Group 15
    +
    • Group 16
    • Group 19
    • Group 20
    • Group 21
    +

    The default value is Group 14.

    +

    Group 14

    +

    Version

    +

    Version of the IKE protocol. The value can be one of the following:

    +
    • v1 (For security reasons, IKEv1 is not recommended. If your devices support IKEv2, select IKEv2.)
    • v2
    +

    The default value is v2.

    +

    v2

    +

    Lifetime (s)

    +

    Lifetime of an SA, in seconds

    +

    An SA will be renegotiated when its lifetime expires.

    +

    The default value is 86400.

    +

    86400

    +

    Negotiation Mode

    +

    The value is Main. This parameter is available only when Version is set to v1.

    +

    The default value is Main.

    +

    Main

    +
    +
    + +
    + + + + + + + + + + + + + + + + + + + + + + + + + +
    Table 3 IPsec policy

    Parameter

    +

    Description

    +

    Example Value

    +

    Authentication Algorithm

    +

    Hash algorithm used for authentication. The following algorithms are supported:

    +
    • SHA1(Insecure. Not recommended.)
    • MD5(Insecure. Not recommended.)
    • SHA2-256
    • SHA2-384
    • SHA2-512
    +

    The default value is SHA2-256.

    +

    SHA2-256

    +

    Encryption Algorithm

    +

    Encryption algorithm. The following algorithms are supported:

    +
    • AES-128
    • AES-192
    • AES-256
    • 3DES(Insecure. Not recommended.)
    +

    The default value is AES-128.

    +

    AES-128

    +

    PFS

    +

    Algorithm used by the Perfect forward secrecy (PFS) function.

    +

    PFS supports the following algorithms:

    +
    • Disable
    • DH group 1(Insecure. Not recommended.)
    • DH group 2(Insecure. Not recommended.)
    • DH group 5(Insecure. Not recommended.)
    • DH group 14
    • DH group 15
    • DH group 16
    • DH group 19
    • DH group 20
    • DH group 21
    +

    The default value is DH group 14.

    +

    DH group 14

    +

    Transfer Protocol

    +

    Security protocol used in IPsec to transmit and encapsulate user data. The following protocols are supported:

    +
    • AH
    • AH-ESP
    • ESP
    +

    The default value is ESP.

    +

    ESP

    +

    Lifetime (s)

    +

    Lifetime of an SA, in seconds

    +

    An SA will be renegotiated when its lifetime expires.

    +

    The default value is 3600.

    +

    3600

    +
    +
    +

    An IKE policy specifies the encryption and authentication algorithms to be used in the negotiation phase of an IPsec tunnel. An IPsec policy specifies the protocol, encryption algorithm, and authentication algorithm to be used in the data transmission phase of an IPsec tunnel. The IKE and IPsec policies must be the same at both ends of a VPN connection. Otherwise, the VPN connection cannot be set up.

    +
    +
  7. Submit your application.
    After the IPsec VPN is created, a public IP address is assigned to the VPN. The IP address is the local gateway address of the created VPN. When configuring the remote tunnel in your data center, you must set the remote gateway address to this IP address.
    Figure 2 Gateway IP address
    +
    +
  8. You need to configure an IPsec VPN tunnel on the router or firewall in your on-premises data center. +
+
+
+
+ +
+ + + \ No newline at end of file diff --git a/docs/vpn/umn/vpn_03_0204.html b/docs/vpn/umn/vpn_03_0204.html new file mode 100644 index 00000000..3b50b6a9 --- /dev/null +++ b/docs/vpn/umn/vpn_03_0204.html @@ -0,0 +1,138 @@ + + +

Step 1: Creating a VPN Gateway

+

Prerequisites

  • A VPC has been created. For details about how to create a VPC, see the Virtual Private Cloud User Guide.
  • Security group rules have been configured for ECSs in the VPC, and allow the customer gateway in the on-premises data center to access VPC resources. For details about how to configure security group rules, see Security Group Rules.
+
+

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner of the page, and choose Network > Virtual Private Network.
  3. In the navigation pane on the left, choose Virtual Private Network > Enterprise – VPN Gateways.
  4. Set parameters as prompted, click , and complete the payment.
  5. The following describes only key parameters.

    +

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Table 1 Key VPN gateway parameters

    Parameter

    +

    Description

    +

    Example Value

    +

    Region

    +

    Select the region nearest to you.

    +

    eu-de

    +

    Name

    +

    Name a VPN gateway.

    +

    vpngw-001

    +

    Network Type

    +

    Select Public network.

    +

    Public network

    +

    Associate With

    +

    Select VPC.

    +

    VPC

    +

    VPC

    +

    Select the VPC that needs to access the on-premises data center.

    +

    vpc-001(192.168.0.0/16)

    +

    Interconnection Subnet

    +

    This subnet is used for communication between the VPN gateway and VPC. Ensure that the selected interconnection subnet has four or more assignable IP addresses.

    +

    192.168.2.0/24

    +

    Local Subnet

    +

    Specify the VPC subnet that needs to access the on-premises data center.

    +

    You can manually enter a CIDR block or select a subnet from the drop-down list box.

    +

    192.168.0.0/24

    +

    BGP ASN

    +

    BGP AS number.

    +

    64512

    +

    Specification

    +

    Select Professional 1 and deselect Access via a non-fixed IP address.

    +

    Professional 1

    +

    AZ

    +

    AZ1 and AZ2 are supported.

    +

    AZ1, AZ2

    +

    Gateway IP Address

    +

    This parameter is available only when Network Type is set to Private network.

    +
    • Self-assigned IP address (default)

      An IP address on the access subnet will be automatically assigned to the VPN gateway.

      +

      You can view the automatically assigned IP address on the VPN Gateways page.

      +
    • Manually-specified IP address

      Manually configure IP addresses on the access subnet for the VPN gateway.

      +
    +

    Self-assigned IP address

    +

    Advanced Settings > Tags

    +

    Configure Tags in Advanced Settings.

    +

    -

    +

    HA Mode

    +

    Select Active-active.

    +

    Active-active

    +

    Active EIP

    +

    You can buy a new EIP or use an existing EIP.

    +

    11.xx.xx.11

    +

    Active EIP 2

    +

    You can buy a new EIP or use an existing EIP.

    +

    11.xx.xx.12

    +
    +
    +

+
+

Verification

Check the created VPN gateway on the VPN Gateways page. The initial state of the VPN gateway is Creating. When the VPN gateway state changes to Normal, the VPN gateway is successfully created.

+
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_03_0335.html b/docs/vpn/umn/vpn_03_0335.html new file mode 100644 index 00000000..210ddc87 --- /dev/null +++ b/docs/vpn/umn/vpn_03_0335.html @@ -0,0 +1,119 @@ + + +

Step 4: Creating VPN Connection 2

+

Procedure

  1. In the navigation pane on the left, choose Virtual Private Network > Enterprise – VPN Connections.
  2. On the VPN Connections page, click Create VPN Connection.

    For VPN connection 2, you are advised to use the same settings as VPN connection 1, except the connection name, gateway IP address, local tunnel interface IP address, and customer tunnel interface IP address.

    + +
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Table 1 Parameter settings for VPN connection 2

    Parameter

    +

    Description

    +

    Example Value

    +

    Name

    +

    Enter the name of VPN connection 2.

    +

    vpn-002

    +

    VPN Gateway

    +

    Select the VPN gateway created in Step 1: Creating a VPN Gateway.

    +

    vpngw-001

    +

    Gateway IP Address

    +

    Select active EIP 2 of the VPN gateway.

    +

    11.xx.xx.12

    +

    Customer Gateway

    +

    Select the customer gateway created in Step 2: Creating a Customer Gateway.

    +

    cgw-001

    +

    VPN Type

    +

    Select Static routing.

    +

    Static routing

    +

    Customer Subnet

    +

    Enter the subnet of the on-premises data center that needs to access the VPC.

    +
    NOTE:
    • The customer subnet can overlap with the local subnet but cannot be the same as the local subnet.
    • A customer subnet cannot be included in the existing subnets of the VPC associated with the VPN gateway. It also cannot be the destination address in the route table of the VPC associated with the VPN gateway.
    • Customer subnets cannot be the reserved CIDR blocks of VPCs, for example, 100.64.0.0/10 or 214.0.0.0/8.
    • If the interconnection subnet is associated with an ACL rule, ensure that the ACL rule permits the TCP port for traffic between all local and customer subnets.
    • Address groups cannot be used to configure the source and destination subnets in a policy on customer gateway devices.
    +
    +

    172.16.0.0/16

    +

    Interface IP Address Assignment

    +

    The options include Manually specify and Automatically assign.

    +

    Manually specify

    +

    Local Tunnel Interface Address

    +

    Specify the tunnel interface address configured on the VPN gateway.

    +
    NOTE:

    The local and remote interface addresses configured on the customer gateway device must be the same as the values of Customer Tunnel Interface IP Address and Local Tunnel Interface IP Address, respectively.

    +
    +

    169.254.71.2/30

    +

    Customer Tunnel Interface Address

    +

    Specify the tunnel interface address configured on the customer gateway device.

    +

    169.254.71.1/30

    +

    Link Detection

    +

    This function is used for route reliability detection in multi-link scenarios.

    +
    NOTE:

    When enabling this function, ensure that the customer gateway supports ICMP and is correctly configured with the customer interface IP address of the VPN connection. Otherwise, VPN traffic will fail to be forwarded.

    +
    +

    NQA enabled

    +

    PSK, Confirm PSK

    +

    Specify the negotiation key of the VPN connection.

    +

    The PSKs configured on the VPN console and the customer gateway device must be the same.

    +

    Test@123

    +

    Policy Settings

    +

    Configure the IKE and IPsec policies, which define the encryption algorithms used by the VPN tunnel.

    +

    The policy settings on the VPN console and the customer gateway device must be the same.

    +

    Default

    +
    +
    +

+
+

Verification

Check the created VPN connection on the VPN Connections page. The initial state of the VPN connection is Creating. As the customer gateway device has not been configured, no VPN connection can be established. After about 2 minutes, the VPN connection state changes to Not connected.

+
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_03_0336.html b/docs/vpn/umn/vpn_03_0336.html new file mode 100644 index 00000000..9a01371a --- /dev/null +++ b/docs/vpn/umn/vpn_03_0336.html @@ -0,0 +1,110 @@ + + +

Step 5: Configuring the Customer Gateway Device

+

Procedure

In this example, the customer gateway device is an AR router.

+
+
  1. Log in to the AR router.
  2. Enter the system view.

    <AR651>system-view
    +

  3. Configure an IP address for the WAN interface. In this example, the WAN interface of the AR router is GigabitEthernet 0/0/8.

    [AR651]interface GigabitEthernet 0/0/8
    +[AR651-GigabitEthernet0/0/8]ip address 22.xx.xx.22 255.255.255.0
    +[AR651-GigabitEthernet0/0/8]quit
    +

  4. Configure a default route.

    [AR651]ip route-static 0.0.0.0 0.0.0.0 22.xx.xx.1
    +

    In this command, 22.xx.xx.1 is the gateway address of the AR router's public IP address. Replace it with the actual gateway address.

    +

  5. Enable the SHA-2 algorithm to be compatible with the standard RFC algorithms.

    [AR651]IPsec authentication sha2 compatible enable
    +

  6. Configure an IPsec proposal.

    [AR651]IPsec proposal hwproposal1
    +[AR651-IPsec-proposal-hwproposal1]esp authentication-algorithm sha2-256
    +[AR651-IPsec-proposal-hwproposal1]esp encryption-algorithm aes-128
    +[AR651-IPsec-proposal-hwproposal1]quit
    +

  7. Configure an IKE proposal.

    [AR651]ike proposal 2
    +[AR651-ike-proposal-2]encryption-algorithm aes-128
    +[AR651-ike-proposal-2]dh group14
    +[AR651-ike-proposal-2]authentication-algorithm sha2-256
    +[AR651-ike-proposal-2]authentication-method pre-share
    +[AR651-ike-proposal-2]integrity-algorithm hmac-sha2-256
    +[AR651-ike-proposal-2]prf hmac-sha2-256
    +[AR651-ike-proposal-2]quit
    +

  8. Configure IKE peers.

    [AR651]ike peer hwpeer1
    +[AR651-ike-peer-hwpeer1]undo version 1
    +[AR651-ike-peer-hwpeer1]pre-shared-key cipher Test@123
    +[AR651-ike-peer-hwpeer1]ike-proposal 2
    +[AR651-ike-peer-hwpeer1]local-address 22.xx.xx.22
    +[AR651-ike-peer-hwpeer1]remote-address 11.xx.xx.11
    +[AR651-ike-peer-hwpeer1]rsa encryption-padding oaep
    +[AR651-ike-peer-hwpeer1]rsa signature-padding pss
    +[AR651-ike-peer-hwpeer1]ikev2 authentication sign-hash sha2-256
    +[AR651-ike-peer-hwpeer1]quit
    +[AR651]ike peer hwpeer2
    +[AR651-ike-peer-hwpeer2]undo version 1
    +[AR651-ike-peer-hwpeer2]pre-shared-key cipher Test@123
    +[AR651-ike-peer-hwpeer2]ike-proposal 2
    +[AR651-ike-peer-hwpeer2]local-address 22.xx.xx.22
    +[AR651-ike-peer-hwpeer2]remote-address 11.xx.xx.12
    +[AR651-ike-peer-hwpeer2]rsa encryption-padding oaep
    +[AR651-ike-peer-hwpeer2]rsa signature-padding pss
    +[AR651-ike-peer-hwpeer2]ikev2 authentication sign-hash sha2-256
    +[AR651-ike-peer-hwpeer2]quit
    +

    The commands are described as follows:

    +
    • pre-shared-key cipher: configures a PSK, which must be the same as that configured on the VPN console.
    • local-address: specifies the public IP address of the AR router.
    • remote-address: specifies the active EIP or active EIP 2 of the VPN gateway.
    +

  9. Configure an IPsec profile.

    [AR651]IPsec profile hwpro1
    +[AR651-IPsec-profile-hwpro1]ike-peer hwpeer1
    +[AR651-IPsec-profile-hwpro1]proposal hwproposal1
    +[AR651-IPsec-profile-hwpro1]pfs dh-group14
    +[AR651-IPsec-profile-hwpro1]quit
    +[AR651]IPsec profile hwpro2
    +[AR651-IPsec-profile-hwpro2]ike-peer hwpeer2
    +[AR651-IPsec-profile-hwpro2]proposal hwproposal1
    +[AR651-IPsec-profile-hwpro2]pfs dh-group14
    +[AR651-IPsec-profile-hwpro2]quit
    +

  10. Configure virtual tunnel interfaces.

    [AR651]interface Tunnel0/0/1
    +[AR651-Tunnel0/0/1]mtu 1400
    +[AR651-Tunnel0/0/1]ip address 169.254.70.1 255.255.255.252
    +[AR651-Tunnel0/0/1]tunnel-protocol IPsec
    +[AR651-Tunnel0/0/1]source 22.xx.xx.22
    +[AR651-Tunnel0/0/1]destination 11.xx.xx.11
    +[AR651-Tunnel0/0/1]IPsec profile hwpro1
    +[AR651-Tunnel0/0/1]quit
    +[AR651]interface Tunnel0/0/2
    +[AR651-Tunnel0/0/2]mtu 1400
    +[AR651-Tunnel0/0/2]ip address 169.254.71.1 255.255.255.252
    +[AR651-Tunnel0/0/2]tunnel-protocol IPsec
    +[AR651-Tunnel0/0/2]source 22.xx.xx.22
    +[AR651-Tunnel0/0/2]destination 11.xx.xx.12
    +[AR651-Tunnel0/0/2]IPsec profile hwpro2
    +[AR651-Tunnel0/0/2]quit
    +

    The commands are described as follows:

    +
    • interface Tunnel0/0/1 and interface Tunnel0/0/2: indicate the tunnel interfaces corresponding to the two VPN connections.

      In this example, Tunnel0/0/1 establishes a VPN connection with the active EIP of the VPN gateway, and Tunnel0/0/2 establishes a VPN connection with active EIP 2 of the VPN gateway.

      +
    • ip address: configures an IP address for a tunnel interface on the AR router.
    • source: specifies the public IP address of the AR router.
    • destination: specifies the active EIP or active EIP 2 of the VPN gateway.
    +

  11. Configure NQA.

    [AR651]nqa test-instance IPsec_nqa1 IPsec_nqa1
    +[AR651-nqa-IPsec_nqa1-IPsec_nqa1]test-type icmp
    +[AR651-nqa-IPsec_nqa1-IPsec_nqa1]destination-address ipv4 169.254.70.2
    +[AR651-nqa-IPsec_nqa1-IPsec_nqa1]source-address ipv4 169.254.70.1
    +[AR651-nqa-IPsec_nqa1-IPsec_nqa1]frequency 15
    +[AR651-nqa-IPsec_nqa1-IPsec_nqa1]ttl 255
    +[AR651-nqa-IPsec_nqa1-IPsec_nqa1]start now
    +[AR651-nqa-IPsec_nqa1-IPsec_nqa1]quit
    +[AR651]nqa test-instance IPsec_nqa2 IPsec_nqa2
    +[AR651-nqa-IPsec_nqa2-IPsec_nqa2]test-type icmp
    +[AR651-nqa-IPsec_nqa2-IPsec_nqa2]destination-address ipv4 169.254.71.2
    +[AR651-nqa-IPsec_nqa2-IPsec_nqa2]source-address ipv4 169.254.71.1
    +[AR651-nqa-IPsec_nqa2-IPsec_nqa2]frequency 15
    +[AR651-nqa-IPsec_nqa2-IPsec_nqa2]ttl 255
    +[AR651-nqa-IPsec_nqa2-IPsec_nqa2]start now
    +[AR651-nqa-IPsec_nqa2-IPsec_nqa2]quit
    +

    The commands are described as follows:

    +
    • nqa test-instance IPsec_nqa1 IPsec_nqa1 and nqa test-instance IPsec_nqa2 IPsec_nqa2: configure two NQA test instances named IPsec_nqa1 and IPsec_nqa2.

      In this example, the test instance IPsec_nqa1 is created for the VPN connection to which the active EIP of the VPN gateway belongs; the test instance IPsec_nqa2 is created for the VPN connection to which active EIP 2 of the VPN gateway belongs.

      +
    • destination-address: specifies the tunnel interface address of the VPN gateway.
    • source-address: specifies the tunnel interface address of the AR router.
    +

  12. Configure association between the static route and NQA.

    [AR651]ip route-static 192.168.0.0 255.255.255.0 Tunnel0/0/1 track nqa IPsec_nqa1 IPsec_nqa1
    +[AR651]ip route-static 192.168.0.0 255.255.255.0 Tunnel0/0/2 track nqa IPsec_nqa2 IPsec_nqa2
    +

    The parameters are described as follows:

    +
    • 192.168.0.0 indicates the local subnet of the VPC.
    • Tunnelx and IPsec_nqax in the same command correspond to the same VPN connection.
    +

+
+

Verification

  1. Log in to the management console.
  2. Click in the upper left corner of the page, and choose Network > Virtual Private Network.
  3. In the navigation pane on the left, choose Virtual Private Network > Enterprise – VPN Connections.

    Verify that the states of the two VPN connections are both Normal.

    +

+
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_03_0337.html b/docs/vpn/umn/vpn_03_0337.html new file mode 100644 index 00000000..ef53f24e --- /dev/null +++ b/docs/vpn/umn/vpn_03_0337.html @@ -0,0 +1,27 @@ + + +

Step 6: Verifying Network Connectivity

+

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Click Service List and choose Compute > Elastic Cloud Server.
  4. Log in to an ECS.

    In this example, use VNC provided on the management console to log in to an ECS.

    +

  5. Run the following command on the ECS:

    ping 172.16.0.100

    +

    172.16.0.100 is the IP address of a server in the on-premises data center. Replace it with an actual server IP address.

    +

    If information similar to the following is displayed, the VPC on the cloud and the on-premises data center can communicate with each other.

    +
    Reply from xx.xx.xx.xx: bytes=32 time=28ms TTL=245
    +Reply from xx.xx.xx.xx: bytes=32 time=28ms TTL=245
    +Reply from xx.xx.xx.xx: bytes=32 time=28ms TTL=245
    +Reply from xx.xx.xx.xx: bytes=32 time=27ms TTL=245
    +

+
+
+
+ +
+ + + \ No newline at end of file diff --git a/docs/vpn/umn/vpn_04_0000.html b/docs/vpn/umn/vpn_04_0000.html new file mode 100644 index 00000000..6c8c1548 --- /dev/null +++ b/docs/vpn/umn/vpn_04_0000.html @@ -0,0 +1,23 @@ + + +

Management

+
+ + diff --git a/docs/vpn/umn/vpn_04_0002.html b/docs/vpn/umn/vpn_04_0002.html new file mode 100644 index 00000000..c0223c0a --- /dev/null +++ b/docs/vpn/umn/vpn_04_0002.html @@ -0,0 +1,71 @@ + + +

Viewing Created VPNs

+

Scenarios

You can view details about an existing VPN.

+
+

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Click Service List and choose Networking > Virtual Private Network.
  4. In the navigation pane on the left, choose Virtual Private Network.

    If Enterprise Edition VPN is available for the selected region, choose Virtual Private Network > Classic.

    +
  5. On the Virtual Private Network page, view the target VPN.

    If Enterprise Edition VPN is available for the selected region, view the target VPN on the Classic page.

    +
    Table 1 describes the VPN status. +
    + + + + + + + + + + + + + + + + + + + + + + + + + +
    Table 1 VPN status

    Status

    +

    Description

    +

    Normal

    +

    The VPN is successfully created, and the on-premises data center can access the VPC properly.

    +

    Not connected

    +

    The VPN is successfully created but has not been used for communication with the on-premises data center.

    +

    Creating

    +

    The VPN is being created.

    +

    Updating

    +

    VPN information is being updated.

    +

    Deleting

    +

    The VPN is being deleted.

    +

    Abnormal

    +

    The VPN is abnormal.

    +

    Frozen

    +

    The VPN is frozen.

    +
    +
    +
    Figure 1 Viewing the created VPN
    +
    +

    +
+
+
+
+ +
+ + + \ No newline at end of file diff --git a/docs/vpn/umn/vpn_04_0003.html b/docs/vpn/umn/vpn_04_0003.html new file mode 100644 index 00000000..88b6e9ad --- /dev/null +++ b/docs/vpn/umn/vpn_04_0003.html @@ -0,0 +1,24 @@ + + +

Modifying a Created VPN

+

Scenarios

If VPN network information conflicts with VPC network information or needs to be adjusted based on the latest network environment, you can modify the VPN.

+
+

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Click Service List and choose Networking > Virtual Private Network.
  4. In the navigation pane on the left, choose Virtual Private Network.

    If Enterprise Edition VPN is available for the selected region, choose Virtual Private Network > Classic.

    +
  5. On the Virtual Private Network page, locate the target VPN and click Modify.

    If Enterprise Edition VPN is available for the selected region, locate the target VPN and click Modify on the Classic page.

    +
  6. In the displayed dialog box, modify parameters as required.
    Figure 1 Modify VPN page
    +
  7. Click OK.
+
+
+
+ +
+ + + \ No newline at end of file diff --git a/docs/vpn/umn/vpn_04_0004.html b/docs/vpn/umn/vpn_04_0004.html new file mode 100644 index 00000000..0306d57d --- /dev/null +++ b/docs/vpn/umn/vpn_04_0004.html @@ -0,0 +1,23 @@ + + +

Deleting a VPN

+

Scenarios

You can delete a VPN if it is no longer required.

+
+

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Click Service List and choose Networking > Virtual Private Network.
  4. In the navigation pane on the left, choose Virtual Private Network.

    If Enterprise Edition VPN is available for the selected region, choose Virtual Private Network > Classic.

    +
  5. On the Virtual Private Network page, locate the target VPN and click Delete.

    If Enterprise Edition VPN is available for the selected region, locate the target VPN and click Delete on the Classic page.

    +
  6. In the displayed dialog box, click Yes.
+
+
+
+ +
+ + + \ No newline at end of file diff --git a/docs/vpn/umn/vpn_04_0411.html b/docs/vpn/umn/vpn_04_0411.html new file mode 100644 index 00000000..4d2c7763 --- /dev/null +++ b/docs/vpn/umn/vpn_04_0411.html @@ -0,0 +1,13 @@ + + +

Quotas

+

Resource Types

  • VPN resources include VPN gateways, VPN connection groups, and customer gateways.
+

The total quota of each resource type varies according to regions.

+
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_04_0421.html b/docs/vpn/umn/vpn_04_0421.html new file mode 100644 index 00000000..ea712bc2 --- /dev/null +++ b/docs/vpn/umn/vpn_04_0421.html @@ -0,0 +1,293 @@ + + +

Creating a VPN Gateway

+

Scenario

To connect your on-premises data center or private network to your ECSs in a VPC, you need to create a VPN gateway before creating a VPN connection.

+
+

Context

The recommended networking varies according to the number of customer gateway IP addresses, as described in Table 1. +
+ + + + + + + + + + + + + +
Table 1 Networking

Number of Customer Gateway IP Addresses

+

Recommended Networking

+

Description

+

1

+

+

It is recommended that the VPN gateway uses the active-active mode. In this case, one VPN connection group is used.

+

2

+

+

It is recommended that the VPN gateway uses the active/standby mode. In this case, two VPN connection groups are used.

+
+
+
  • If your on-premises data center has only one customer gateway configured with only one IP address, it is recommended that the VPN gateway uses the active-active mode. In this mode, you need to create a VPN connection between each of the active EIP and active EIP 2 of the VPN gateway and the IP address of the customer gateway. In this scenario, only one VPN connection group is used.
  • If your on-premises data center has two customer gateways or one customer gateway configured with two IP addresses, it is recommended that the VPN gateway uses the active/standby mode. In this mode, you need to create a VPN connection with each of the customer gateway IP addresses using the active and standby EIPs of the VPN gateway. In this scenario, two VPN connection groups are used.
+
+
+

Notes and Constraints

  • When an enterprise router is associated, pay attention to the upper limit of entries in the routing table of the enterprise router.
+
+

Prerequisites

  • A VPC has been created. For details about how to create a VPC, see the Virtual Private Cloud User Guide.
  • Security group rules have been configured for the VPC, and ECSs can communicate with other devices on the cloud. For details about how to configure security group rules, see the Virtual Private Cloud User Guide.
  • An enterprise router has been created if you want to use it to connect to a VPN gateway. For details, see the enterprise router documentation.
+
+

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Click in the upper left corner of the page, and choose Network > Virtual Private Network.
  4. In the navigation pane on the left, choose Virtual Private Network > Enterprise – VPN Gateways.
  5. Click Create VPN Gateway.
  6. Set parameters as prompted and click Create Now.

    Figure 1 Creating a VPN gateway
    +

    Table 2 lists the VPN gateway parameters.

    + +
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Table 2 Description of VPN gateway parameters

    Parameter

    +

    Description

    +

    Example Value

    +

    Region

    +

    For low network latency and fast resource access, select the region nearest to your target users.

    +

    Resources cannot be shared across regions.

    +

    Select a region as required.eu-de

    +

    Name

    +

    Name of a VPN gateway. The value can contain only letters, digits, underscores (_), hyphens (-), and periods (.).

    +

    vpngw-001

    +

    Network Type

    +
    • Public network: A VPN gateway establishes VPN connections through the Internet. Public network is the default value.
    • Private network: A VPN gateway establishes VPN connections through a private network.
    +

    Public network

    +

    Associate With

    +
    • VPC

      Through a VPC, the VPN gateway sends messages to the customer gateway or servers in the local subnet.

      +
    • Enterprise Router

      Through an enterprise router, the VPN gateway sends messages to the customer gateway or servers in the subnets of all VPCs connected to the enterprise router.

      +
      NOTE:

      In this scenario, pay attention to the upper limit of entries in the routing table of the enterprise router. If the number of routes advertised by the customer gateway and VPN gateway exceeds this upper limit, the enterprise router cannot learn the excess routes. As a result, traffic will fail to be forwarded between the VPN gateway and the customer gateway.

      +
      +
    +

    VPC

    +

    VPC

    +

    Select a VPC.

    +

    For the VPC parameter configuration, see Figure 2 and Figure 3.

    +

    vpc-001(192.168.0.0/16)

    +

    Enterprise Router

    +

    Select an enterprise router.

    +

    For the enterprise router parameter configuration, see Figure 4.

    +

    er-001

    +

    Interconnection Subnet

    +

    This subnet is used for communication between the VPN gateway and VPC. Ensure that the selected interconnection subnet has four or more assignable IP addresses.

    +

    192.168.66.0/24

    +

    Local Subnet

    +

    VPC subnets with which your on-premises data center needs to communicate through the customer gateway.

    +
    • Select subnet

      Select subnets of the local VPC.

      +
    • Enter CIDR block

      Enter subnets of the local VPC or subnets of the VPC that establishes a peering connection with the local VPC.

      +
    +

    192.168.1.0/24,192.168.2.0/24

    +

    BGP ASN

    +

    BGP ASN of the VPN gateway, which must be different from that of the customer gateway.

    +

    64512

    +

    Specification

    +

    Three options are available: Basic, Professional 1 and Professional 2.

    +

    Professional 1

    +

    AZ

    +

    An AZ is a geographic location with independent power supply and network facilities in a region. AZs in the same VPC are interconnected through private networks and are physically isolated.

    +
    • If two or more AZs are available, select two AZs.

      The VPN gateway deployed in two AZs has higher availability. You are advised to select the AZs where resources in the VPC are located.

      +
    • If only one AZ is available, select this AZ.
    +

    AZ1, AZ2

    +

    HA Mode

    +
    • Active-active
      • When Associate With is set to VPC, the outgoing traffic from the VPN gateway to the customer subnet is preferentially forwarded through the first VPN connection (VPN connection 1) set up between the customer subnet and an EIP. If VPN connection 1 fails, the outgoing traffic is automatically switched to the other VPN connection (VPN connection 2) set up with the customer subnet. After VPN connection 1 recovers, the outgoing traffic is still transmitted through VPN connection 2 and will not be switched back to VPN connection 1.
      • When Associate With is set to Enterprise Router, the outgoing traffic from the VPN gateway to the customer subnet is load balanced among all VPN connections set up with the customer subnet.
      +
    • Active/Standby

      The outgoing traffic from the VPN gateway to the customer subnet is preferentially transmitted through the VPN connection (VPN connection 1) set up between the customer subnet and the active EIP. If VPN connection 1 fails, the outgoing traffic is automatically switched to the other VPN connection (VPN connection 2) set up between the customer subnet and the standby EIP. After VPN connection 1 recovers, the outgoing traffic is automatically switched back to VPN connection 1.

      +
    +

    Active-active

    +

    Active EIP

    +

    EIP used by the VPN gateway to communicate with a customer gateway.

    +
    • Create Now: Create an EIP.
    • Use existing: Use an existing EIP.
    +

    Create Now

    +

    Bandwidth (Mbit/s)

    +

    Bandwidth of the EIP, in Mbit/s.

    +
    • All VPN connections created using the EIP share the bandwidth of the EIP. The total bandwidth consumed by all the VPN connections cannot exceed the bandwidth of the EIP.

      If network traffic exceeds the bandwidth of the EIP, network congestion may occur and VPN connections may be interrupted. As such, ensure that you configure enough bandwidth.

      +
    • You can configure alarm rules on Cloud Eye to monitor the bandwidth.
    • You can customize the bandwidth within the allowed range.
    +

    10 Mbit/s

    +

    Bandwidth Name

    +

    EIP bandwidth name.

    +

    Vpngw-bandwidth1

    +

    Active EIP 2

    +

    A VPN gateway needs to be bound to a group of EIPs (active EIP and active EIP 2). You can plan the bandwidth for each EIP. The EIPs can share bandwidth with the EIPs of other network services.

    +

    Create Now

    +

    Standby EIP

    +

    A VPN gateway needs to be bound to a group of EIPs (active EIP and standby EIP). You can plan the bandwidth for each EIP. The EIPs can share bandwidth with the EIPs of other network services.

    +

    Create Now

    +

    Bandwidth (Mbit/s)

    +

    Bandwidth of the EIP, in Mbit/s.

    +
    • All VPN connections created using the EIP share the bandwidth of the EIP. The total bandwidth consumed by all the VPN connections cannot exceed the bandwidth of the EIP.

      If network traffic exceeds the bandwidth of the EIP, network congestion may occur and VPN connections may be interrupted. As such, ensure that you configure enough bandwidth.

      +
    • You can configure alarm rules on Cloud Eye to monitor the bandwidth.
    • You can customize the bandwidth within the allowed range.
    +

    10 Mbit/s

    +

    Bandwidth Name

    +

    EIP bandwidth name.

    +

    Vpngw-bandwidth2

    +

    Enterprise Project

    +

    Enterprise project to which the VPN belongs.

    +

    An enterprise project facilitates project-level management and grouping of cloud resources and users. The default project is default.

    +

    For details about how to create and manage enterprise projects, see the Enterprise Management User Guide.

    +

    default

    +

    Access VPC

    +
    • This parameter is available only when Associate With is set to Enterprise Router.
    +

    If a VPN gateway needs to connect to different VPCs in the southbound and northbound directions, set the VPC in the northbound direction as the access VPC. The VPC in the southbound direction is the VPC associated with the VPN gateway.

    +

    Same as the associated VPC

    +

    Access Subnet

    +
    • This parameter is available only when Associate With is set to Enterprise Router.
    +

    By default, a VPN gateway uses the interconnection subnet to connect to the associated VPC. Set this parameter when another subnet needs to be used.

    +

    Same as the interconnection subnet

    +

    Gateway IP Address

    +

    This parameter is available only when Associate With is set to Enterprise Router and Network Type is set to Private network.

    +
    • Self-assigned IP address (default)

      An IP address on the access subnet will be automatically assigned to the VPN gateway.

      +

      You can view the automatically assigned IP address on the VPN Gateways page.

      +
    • Manually-specified IP address

      Manually configure IP addresses on the access subnet for the VPN gateway.

      +
    +

    Self-assigned IP address

    +

    Advanced Settings > Access VPC

    +
    • This parameter is available only when Associate With is set to VPC and Network Type is set to Private network.
    +

    If a VPN gateway needs to connect to different VPCs in the southbound and northbound directions, set the VPC in the northbound direction as the access VPC. The VPC in the southbound direction is the VPC associated with the VPN gateway.

    +

    Same as the associated VPC

    +

    Advanced Settings > Access Subnet

    +
    • This parameter is available only when Associate With is set to VPC and Network Type is set to Private network.
    +

    By default, a VPN gateway uses the interconnection subnet to connect to the associated VPC. Set this parameter when another subnet needs to be used.

    +

    Same as the interconnection subnet

    +

    Advanced Settings > Gateway IP Address

    +

    This parameter is available only when Associate With is set to VPC and Network Type is set to Private network.

    +
    • Self-assigned IP address (default)

      An IP address on the access subnet will be automatically assigned to the VPN gateway.

      +

      You can view the automatically assigned IP address on the VPN Gateways page.

      +
    • Manually-specified IP address

      Manually configure IP addresses on the access subnet for the VPN gateway.

      +
    +

    Self-assigned IP address

    +

    Advanced Settings > Tags

    +

    Configure Tags in Advanced Settings.

    +

    -

    +
    +
    +
    Figure 2 VPC parameter configuration when Network Type is set to Public network
    +
    Figure 3 VPC parameter configuration when Network Type is set to Private network
    +
    Figure 4 Enterprise router parameter configuration
    +

  7. Confirm the VPN gateway information and click Submit.
+
+
+ + + + \ No newline at end of file diff --git a/docs/vpn/umn/vpn_04_0431.html b/docs/vpn/umn/vpn_04_0431.html new file mode 100644 index 00000000..2985c3d8 --- /dev/null +++ b/docs/vpn/umn/vpn_04_0431.html @@ -0,0 +1,77 @@ + + +

Creating a Customer Gateway

+

Scenario

To connect your on-premises data center or private network to your ECSs in a VPC, you need to create a customer gateway before creating a VPN connection.

+
+

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Click in the upper left corner of the page, and choose Network > Virtual Private Network.
  4. In the navigation pane on the left, choose Virtual Private Network > Enterprise – Customer Gateways.
  5. On the Customer Gateways page, click Create Customer Gateway.
  6. Set parameters as prompted and click Create Now.
    Figure 1 Creating a customer gateway
    +

    Table 1 lists the customer gateway parameters.

    + +
    + + + + + + + + + + + + + + + + + + + + + + + + + +
    Table 1 Description of customer gateway parameters

    Parameter

    +

    Description

    +

    Example Value

    +

    Name

    +

    Name of a customer gateway. The value can contain only letters, digits, underscores (_), hyphens (-), and periods (.).

    +

    cgw-001

    +

    Routing Mode

    +

    Routing mode of the customer gateway.

    +
    • Select Dynamic (BGP) when VPN Type is set to Route-based and Routing Mode is set to Dynamic (BGP) for the VPN connection.
      • When selecting this option, ensure that the customer gateway supports dynamic BGP.
      • The customer gateway can advertise a maximum of 100 BGP routes to the VPN gateway. If more than 100 BGP routes are advertised, the BGP peer relationship is disconnected, causing traffic interruption between the VPN gateway and customer gateway.
      +
    +
    • Select Static when VPN Type is set to Route-based and Routing Mode is set to Static for the VPN connection.
    • You are advised to select Static when VPN Type is set to Policy-based for the VPN connection.
    +

    Static

    +

    BGP ASN

    +

    Enter the ASN of your on-premises data center or private network.

    +

    The BGP ASN of the customer gateway must be different from that of the VPN gateway.

    +

    65000

    +

    Gateway IP Address

    +

    IP address used by the customer gateway to communicate with the VPN gateway. The value must be a static address.

    +

    Ensure that UDP port 4500 is permitted in a firewall rule on the customer gateway in your on-premises data center or private network.

    +

    1.2.3.4

    +

    Advanced Settings > Tags

    +

    Configure Tags in Advanced Settings.

    +

    -

    +
    +
    +
  7. (Optional) If there are two customer gateways, repeat the preceding operations to configure the other customer gateway with a different identifier.
+
+

Related Operations

You need to configure an IPsec VPN tunnel on the router or firewall in your on-premises data center.

+
+
+ + + + \ No newline at end of file diff --git a/docs/vpn/umn/vpn_04_0441.html b/docs/vpn/umn/vpn_04_0441.html new file mode 100644 index 00000000..3b34f207 --- /dev/null +++ b/docs/vpn/umn/vpn_04_0441.html @@ -0,0 +1,321 @@ + + +

Creating a VPN Connection

+

Scenario

To connect your on-premises data center or private network to your ECSs in a VPC, you need to create VPN connections after creating a VPN gateway and a customer gateway.

+
+

Notes and Constraints

  • When creating a VPN connection in static routing mode, ensure that the customer gateway supports ICMP and is correctly configured with the customer interface IP address of the VPN connection before enabling NQA. Otherwise, traffic will fail to be forwarded.
+
+

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Click in the upper left corner of the page, and choose Network > Virtual Private Network.
  4. In the navigation pane on the left, choose Virtual Private Network > Enterprise – VPN Connections.
  5. On the VPN Connections page, click Create VPN Connection.

    For higher reliability, you are advised to create a VPN connection between each of the two EIPs of a VPN gateway and a customer gateway.

    +
    +
  6. Set parameters as prompted and click Create Now.
    Table 1 lists the VPN connection parameters. +
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Table 1 Description of VPN connection parameters

    Parameter

    +

    Description

    +

    Example Value

    +

    Name

    +

    Name of a VPN connection. The value can contain only letters, digits, underscores (_), hyphens (-), and periods (.).

    +

    vpn-001

    +

    VPN Gateway

    +

    Name of the VPN gateway for which the VPN connection is created.

    +

    You can also click Create VPN Gateway to create a VPN gateway. For details about related parameters, see Table 2.

    +

    vpngw-001

    +

    Gateway IP Address

    +

    IP address of the VPN gateway.

    +

    The same EIP of a VPN gateway cannot be repeatedly selected when you create VPN connections between the VPN gateway and the same customer gateway.

    +

    Available gateway IP address

    +

    Customer Gateway

    +

    Name of a customer gateway.

    +

    You can also click Create Customer Gateway to create a customer gateway. For details about related parameters, see Table 1.

    +
    NOTE:

    If a customer gateway connects to multiple VPN gateways, the BGP ASNs and VPN types of the VPN gateways must be the same.

    +
    +

    cgw-001

    +

    VPN Type

    +

    IPsec connection mode, which can be route-based or policy-based.

    +
    • Static routing

      Determines the data that enters the IPsec VPN tunnel based on the route configuration (local subnet and customer subnet).

      +

      Application scenario: Communication between customer gateways

      +
    • BGP routing

      Determines the traffic that can enter the IPsec VPN tunnel based on BGP routes.

      +

      Application scenario: Communication between customer gateways, many or frequently changing interconnection subnets, or backup between VPN and Direct Connect

      +
    • Policy-based

      Determines the data that enters the IPsec VPN tunnel based on the policy (between the customer network and VPC). Policy rules can be defined based on the source and destination CIDR blocks.

      +

      Application scenario: Isolation between customer gateways

      +
    +

    Static routing

    +

    Customer Subnet

    +

    Customer-side subnet that needs to access the VPC on the cloud through VPN connections.

    +

    If there are multiple customer subnets, separate them with commas (,).

    +
    NOTE:
    • The customer subnet can overlap with the local subnet but cannot be the same as the local subnet.
    • A customer subnet cannot be included in the existing subnets of the VPC associated with the VPN gateway. It also cannot be the destination address in the route table of the VPC associated with the VPN gateway.
    • Customer subnets cannot be the reserved CIDR blocks of VPCs, for example, 100.64.0.0/10 or 214.0.0.0/8.
    • If the interconnection subnet is associated with an ACL rule, ensure that the ACL rule permits the TCP port for traffic between all local and customer subnets.
    • Address groups cannot be used to configure the source and destination subnets in a policy on customer gateway devices.
    +
    +

    172.16.1.0/24,172.16.2.0/24

    +

    Interface IP Address Assignment

    +

    This parameter is available only when VPN Type is set to Static routing or BGP routing.

    +
    NOTE:
    • Set interface IP addresses to the tunnel interface IP addresses used by the VPN gateway and customer gateway to communicate with each other.
    • If the tunnel interface address of the customer gateway is fixed, select Manually specify, and set the tunnel interface address of the VPN gateway based on the tunnel interface address of the customer gateway.
    +
    +
    • Manually specify
      • Set Local Tunnel Interface Address to the tunnel interface address of the VPN gateway, which can reside only on the 169.254.x.x/30 CIDR block (except 169.254.195.x/30). Then, the system automatically sets Customer Tunnel Interface Address to a random value based on the setting of Local Tunnel Interface Address.

        For example, when you set Local Tunnel Interface Address to 169.254.1.6/30, the system automatically sets Customer Tunnel Interface Address to 169.254.1.5/30.

        +
      • When you set VPN Type to BGP routing and configure tunnel interface addresses in Manually specify mode, ensure that the local and remote tunnel interface addresses configured on the customer gateway device (the other end of the VPN connection) are the same as the values of Customer Tunnel Interface Address and Local Tunnel Interface Address, respectively.
      +
    • Automatically assign
      • By default, an IP address on the 169.254.x.x/30 CIDR block is assigned to the tunnel interface of the VPN gateway.
      • To view the automatically assigned local and customer interface IP addresses, click Modify VPN Connection on the VPN Connections page.
      • When you set VPN Type to BGP routing and select Automatically assign, check the automatically assigned local and customer tunnel interface addresses after the VPN connection is created. Ensure that the local and remote tunnel interface addresses configured on the customer gateway device (the other end of the VPN connection) are the reverse of the settings on the cloud side.
      +
    +

    Automatically assign

    +

    Local Tunnel Interface Address

    +

    This parameter is available only when Interface IP Address Assignment is set to Manually specify.

    +

    Tunnel interface IP address configured on the VPN gateway.

    +

    N/A

    +

    Customer Tunnel Interface Address

    +

    This parameter is available only when Interface IP Address Assignment is set to Manually specify.

    +

    Tunnel interface IP address configured on the customer gateway device.

    +

    N/A

    +

    Link Detection

    +

    This parameter is available only when VPN Type is set to Static routing.

    +
    NOTE:

    When enabling this function, ensure that the customer gateway supports ICMP and is correctly configured with the customer interface IP address of the VPN connection. Otherwise, traffic will fail to be forwarded.

    +
    +

    After this function is enabled, the VPN gateway automatically performs Network Quality Analysis (NQA) on the customer interface IP address of the customer gateway.

    +

    Selected

    +

    PSK

    +

    The PSKs configured for the VPN gateway and customer gateway must be the same.

    +

    The PSK:

    +
    • Contains 8 to 128 characters.
    • Can contain only three or more types of the following characters:
      • Digits
      • Uppercase letters
      • Lowercase letters
      • Special characters: ~ ! @ # $ % ^ ( ) - _ + = { } , . / : ;
      +
    +

    Test@123

    +

    Confirm PSK

    +

    Enter the PSK again.

    +

    Test@123

    +

    Policy

    +

    This parameter is available only when VPN Type is set to Policy-based.

    +

    Defines the data flow that enters the encrypted VPN connection between the local and customer subnets. You need to configure the source and destination CIDR blocks in each policy rule. By default, a maximum of five policy rules can be configured.

    +
    • Source CIDR Block

      The source CIDR block must contain some CIDR blocks of the local subnets. 0.0.0.0/0 indicates any IP address.

      +
    +
    • Destination CIDR Block

      The destination CIDR block must contain all the CIDR blocks of the customer subnets. A policy rule supports a maximum of five destination CIDR blocks, which are separated by commas (,).

      +
    +
    • Source CIDR block 1: 192.168.1.0/24
    • Destination CIDR block 1: 172.16.1.0/24,172.16.2.0/24
    • Source CIDR block 2: 192.168.2.0/24
    • Destination CIDR block 2: 172.16.1.0/24,172.16.2.0/24
    +

    Advanced Settings

    +
    • Default: Use default IKE and IPsec policies.
    • Existing: Use existing IKE and IPsec policies.
    • Custom: Use custom IKE and IPsec policies. For details about the policies, see Table 2 and Table 3.
    +

    Custom

    +
    +
    + +
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Table 2 IKE policy

    Parameter

    +

    Description

    +

    Example Value

    +

    Version

    +

    Version of the IKE protocol. The value can be one of the following:

    +
    • v1 (v1 has low security. If the device supports v2, v2 is recommended.)
    • v2
    +

    The default value is v2.

    +

    v2

    +

    Negotiation Mode

    +

    This parameter is available only when Version is v1.

    +
    • Main
    • Aggressive
    +

    Main

    +

    Authentication Algorithm

    +

    Hash algorithm used for authentication. The following options are available:

    +
    • SHA1(Insecure. Not recommended.)
    • MD5(Insecure. Not recommended.)
    • SHA2-256
    • SHA2-384
    • SHA2-512
    +

    The default value is SHA2-256.

    +

    SHA2-256

    +

    Encryption Algorithm

    +

    Encryption algorithm. The following options are available:

    +
    • 3DES(Insecure. Not recommended.)
    • AES-128(Insecure. Not recommended.)
    • AES-192(Insecure. Not recommended.)
    • AES-256(Insecure. Not recommended.)
    • AES-256-GCM-16

      When this encryption algorithm is used, the IKE version can only be v2.

      +
    +

    The default value is AES-128.

    +

    AES-128

    +

    DH Algorithm

    +

    The following algorithms are supported:

    +
    • Group 1(Insecure. Not recommended.)
    • Group 2(Insecure. Not recommended.)
    • Group 5(Insecure. Not recommended.)
    • Group 14(Insecure. Not recommended.)
    • Group 15
    • Group 16
    • Group 19
    • Group 20
    • Group 21
    +

    The default value is Group 15.

    +

    Group 15

    +

    Lifetime (s)

    +

    Lifetime of a security association (SA).

    +

    An SA will be renegotiated when its lifetime expires.

    +
    • Unit: second
    • The value ranges from 60 to 604800.
    • The default value is 86400.
    +

    86400

    +

    Local ID

    +

    Authentication identifier of the VPN gateway used in IPsec negotiation. The VPN gateway ID configured on the customer gateway must be the same as the local ID configured here. Otherwise, IPsec negotiation fails.

    +
    • IP Address (default value)

      The system automatically sets this parameter to the selected EIP of the VPN gateway.

      +
    • FQDN

      Set the FQDN to a string of 1 to 128 case-sensitive characters that can contain letters, digits, and special characters (excluding &, <, >, [, ], \, ?, and spaces).

      +
    +

    IP Address

    +

    Customer ID

    +

    Authentication identifier of the customer gateway used in IPsec negotiation. The customer gateway ID configured on the customer gateway must be the same as the customer ID configured here. Otherwise, IPsec negotiation fails.

    +
    • IP Address (default value)

      The system automatically sets this parameter to the IP address of the customer gateway.

      +
    • FQDN

      Set the FQDN to a string of 1 to 128 case-sensitive characters that can contain letters, digits, and special characters (excluding &, <, >, [, ], \, ?, and spaces).

      +
    +

    IP Address

    +
    +
    + +
    + + + + + + + + + + + + + + + + + + + + + + + + + +
    Table 3 IPsec policy

    Parameter

    +

    Description

    +

    Example Value

    +

    Authentication Algorithm

    +

    Hash algorithm used for authentication. The following options are available:

    +
    • SHA1(Insecure. Not recommended.)
    • MD5(Insecure. Not recommended.)
    • SHA2-256
    • SHA2-384
    • SHA2-512
    +

    The default value is SHA2-256.

    +

    SHA2-256

    +

    Encryption Algorithm

    +

    Encryption algorithm. The following options are available:

    +
    • 3DES(Insecure. Not recommended.)
    • AES-128(Insecure. Not recommended.)
    • AES-192(Insecure. Not recommended.)
    • AES-256(Insecure. Not recommended.)
    • AES-128-GCM-16
    • AES-256-GCM-16
    +

    The default value is AES-128.

    +

    AES-128

    +

    PFS

    +

    Algorithm used by the Perfect forward secrecy (PFS) function.

    +

    PFS supports the following algorithms:

    +
    • Disable(Insecure. Not recommended.)
    • DH group 1(Insecure. Not recommended.)
    • DH group 2(Insecure. Not recommended.)
    • DH group 5(Insecure. Not recommended.)
    • DH group 14(Insecure. Not recommended.)
    • DH group 15
    • DH group 16
    • DH group 19
    • DH group 20
    • DH group 21
    +

    The default value is DH group 15.

    +

    DH group 15

    +

    Transfer Protocol

    +

    Security protocol used in IPsec to transmit and encapsulate user data. The following protocols are supported:

    +
    • ESP
    +

    The default value is ESP.

    +

    ESP

    +

    Lifetime (s)

    +

    Lifetime of an SA.

    +

    An SA will be renegotiated when its lifetime expires.

    +
    • Unit: second
    • The value ranges from 30 to 604800.
    • The default value is 3600.
    +

    3600

    +
    +
    +

    An IKE policy specifies the encryption and authentication algorithms to use in the negotiation phase of an IPsec tunnel. An IPsec policy specifies the protocol, encryption algorithm, and authentication algorithm to use in the data transmission phase of an IPsec tunnel. The policy settings for VPN connections must be the same at the VPC and on-premises data center sides. If they are different, VPN negotiation will fail, causing the failure to establish VPN connections.

    +

    The following algorithms are not recommended because they are not secure enough:

    +
    • Authentication algorithms: SHA1 and MD5
    • Encryption algorithms: 3DES, AES-128, AES-192, and AES-256

      Because some customer devices do not support secure encryption algorithms, the default encryption algorithm of VPN connections is still AES-128. You are advised to use a more secure encryption algorithm if customer devices support secure encryption algorithms.

      +
    • DH algorithms: Group 1, Group 2, Group 5, and Group 14
    +
    +
    +
  7. Confirm the VPN connection configuration and click Submit.
  8. Repeat the preceding operations to create the other VPN connection.

    For details about IP address configuration, see Context.

    +
    Figure 1 Creating a VPN connection
    +
+
+
+ + + + \ No newline at end of file diff --git a/docs/vpn/umn/vpn_04_0470.html b/docs/vpn/umn/vpn_04_0470.html new file mode 100644 index 00000000..abd037c7 --- /dev/null +++ b/docs/vpn/umn/vpn_04_0470.html @@ -0,0 +1,19 @@ + + +

Classic VPN Management

+
+ + diff --git a/docs/vpn/umn/vpn_04_0700.html b/docs/vpn/umn/vpn_04_0700.html new file mode 100644 index 00000000..b65e417c --- /dev/null +++ b/docs/vpn/umn/vpn_04_0700.html @@ -0,0 +1,23 @@ + + +

Monitoring

+
+ + diff --git a/docs/vpn/umn/vpn_04_0701.html b/docs/vpn/umn/vpn_04_0701.html new file mode 100644 index 00000000..93f4e182 --- /dev/null +++ b/docs/vpn/umn/vpn_04_0701.html @@ -0,0 +1,11 @@ + + +

Monitoring VPN

+

Cloud Eye lets you keep a close eye on the performance and resource utilization of VPNs, ensuring VPN reliability and availability. You can use Cloud Eye to automatically monitor VPNs in real time and manage alarms and notifications, so that you can keep track of VPN performance metrics.

+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_04_0702.html b/docs/vpn/umn/vpn_04_0702.html new file mode 100644 index 00000000..702d3886 --- /dev/null +++ b/docs/vpn/umn/vpn_04_0702.html @@ -0,0 +1,309 @@ + + +

Metrics (Enterprise Edition VPN)

+

Description

This section describes monitored metrics reported by VPN to Cloud Eye as well as their namespaces and dimensions. You can use the Cloud Eye management console to query the metrics of the monitored objects and alarms generated for VPN.

+
+

Namespace

SYS.VPN

+
+

Metrics

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Table 1 Metrics supported for Enterprise Edition VPN gateways

Metric ID

+

Metric Name

+

Description

+

Value Range

+

Monitored Object

+

Monitoring Interval (Raw Data)

+

gateway_send_pkt_rate

+

Outbound Packet Rate

+

Average number of data packets leaving the cloud per second.

+

≥ 0 pps

+

Gateway

+

1 minute

+

gateway_recv_pkt_rate

+

Inbound Packet Rate

+

Average number of data packets entering the cloud per second.

+

≥ 0 pps

+

Gateway

+

1 minute

+

gateway_send_rate

+

Outbound Bandwidth

+

Average volume of traffic leaving the cloud per second.

+

0–1 Gbit/s

+

Gateway

+

1 minute

+

gateway_recv_rate

+

Inbound Bandwidth

+

Average volume of traffic entering the cloud per second.

+

0–1 Gbit/s

+

Gateway

+

1 minute

+

gateway_send_rate_usage

+

Outbound Bandwidth Usage

+

Bandwidth utilization for traffic leaving the cloud.

+

0-100%

+

Gateway

+

1 minute

+

gateway_recv_rate_usage

+

Inbound Bandwidth Usage

+

Bandwidth utilization for traffic entering the cloud.

+

0-100%

+

Gateway

+

1 minute

+

gateway_connection_num

+

Number of Connections

+

Number of VPN connections.

+

≥ 0

+

Gateway

+

1 minute

+
+
+ +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Table 2 Enterprise Edition VPN connection metrics

Metric ID

+

Metric Name

+

Description

+

Value Range

+

Monitored Object

+

Monitoring Interval (Raw Data)

+

tunnel_average_latency

+

Average Tunnel RTT

+

Average round-trip time on the tunnel between the VPN gateway and customer gateway.

+

0–5000 ms

+

VPN connection

+

1 minute

+

tunnel_max_latency

+

Maximum Tunnel RTT

+

Maximum round-trip time on the tunnel between the VPN gateway and customer gateway.

+

0–5000 ms

+

VPN connection

+

1 minute

+

tunnel_packet_loss_rate

+

Tunnel Packet Loss Rate

+

Packet loss rate on the tunnel between the VPN gateway and customer gateway.

+

0–100 %

+

VPN connection

+

1 minute

+

link_average_latency

+

Average Link RTT

+

Average round-trip time on the physical link between the VPN gateway and customer gateway.

+

0–5000 ms

+

VPN connection

+

1 minute

+

link_max_latency

+

Maximum Link RTT

+

Maximum round-trip time on the physical link between the VPN gateway and customer gateway.

+

0–5000 ms

+

VPN connection

+

1 minute

+

link_packet_loss_rate

+

Link Packet Loss Rate

+

Packet loss rate on the physical link between the VPN gateway and customer gateway.

+

0–100 %

+

VPN connection

+

1 minute

+

connection_status

+

VPN Connection Status

+

Status of a VPN connection:

+

0: not connected

+

1: connected

+

2: unknown

+

0, 1, or 2

+

VPN connection

+

1 minute

+

recv_pkt_rate

+

Packet Receive Rate

+

Average number of data packets received per second.

+

≥ 0 pps

+

VPN connection

+

1 minute

+

send_pkt_rate

+

Packet Send Rate

+

Average number of data packets sent per second.

+

≥ 0 pps

+

VPN connection

+

1 minute

+

recv_rate

+

Traffic Receive Rate

+

Average volume of traffic received per second.

+

0~1Gbit/s

+

VPN connection

+

1 minute

+

send_rate

+

Traffic Send Rate

+

Average volume of traffic sent per second.

+

0~1Gbit/s

+

VPN connection

+

1 minute

+
+
+
+

Dimensions

+
+ + + + + + + + + + +

key

+

Value

+

evpn_connection_id

+

Enterprise Edition VPN connection

+

evpn_gateway_id

+

Enterprise Edition VPN gateway

+
+
+
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_04_0703.html b/docs/vpn/umn/vpn_04_0703.html new file mode 100644 index 00000000..392762c3 --- /dev/null +++ b/docs/vpn/umn/vpn_04_0703.html @@ -0,0 +1,18 @@ + + +

Creating Alarm Rules

+

Scenarios

You can configure alarm rules on the Cloud Eye console to keep track of your VPN status at any time.

+
+

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Click in the upper left corner of the management console, and choose Management & Deployment > Cloud Eye.
  4. Choose Cloud Service Monitoring > Virtual Private Network, click Create Alarm Rule, and configure alarm rules for different types of alarms as required.
    • Alarms related to Enterprise Edition VPN gateways: Choose S2C VPN Gateway from the right drop-down list box, click the Resources tab, and choose More > Create Alarm Rule in the Operation column of a VPN gateway.
    • Alarms related to Enterprise Edition VPN connections: Choose S2C VPN Connection from the right drop-down list box, click the Resources tab, and choose More > Create Alarm Rule in the Operation column of a VPN connection.
    • Alarms related to Classic VPN connections: Choose VPN Connections from the right drop-down list box, click the Resources tab, and choose More > Create Alarm Rule in the Operation column of a VPN connection.
    +
  5. Click Create.

    After the alarm rule is created, if you have enabled Alarm Notification and configured required parameters, you will receive notifications once an alarm is triggered.

    +

    For more information about VPN alarm rules, see the Cloud Eye User Guide.

    +
    +
+
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_04_0704.html b/docs/vpn/umn/vpn_04_0704.html new file mode 100644 index 00000000..3c0662a5 --- /dev/null +++ b/docs/vpn/umn/vpn_04_0704.html @@ -0,0 +1,27 @@ + + +

Viewing Metrics

+

Scenarios

View the VPN connection status and usages of bandwidth and EIP. You can view data of the last 1, 3, 12, or 24 hours, or last 7 days.

+
+

Viewing VPN Gateway Metrics

  • Viewing metrics on the Cloud Eye console
    1. Log in to the management console.
    2. Click in the upper left corner and select the desired region and project.
    3. Click Service List and choose Management & Deployment > Cloud Eye.
    4. Choose Cloud Service Monitoring > Virtual Private Network.
    5. On the Enterprise – VPN Gateways page, locate the target VPN gateway, and click View Metric in the Operation column.

      You can view data of the last 1, 3, 12, or 24 hours, or last 7 days.

      +
    +
+
+

Viewing VPN Connection Metrics

  • Viewing metrics on the VPN console
    1. Log in to the management console.
    2. Click in the upper left corner and select the desired region and project.
    3. Click in the upper left corner of the management console, and choose Networking > Virtual Private Network.
    4. View metrics.
      • Choose Virtual Private Network > Enterprise – VPN Connections, and click View Metric under the name of a VPN connection.

        The metrics include the following:

        +
        • VPN Connection Status
        • Average Link RTT, Maximum Link RTT, Link Packet Loss Rate

          These metrics are displayed only after the health check function is enabled. To enable this function, click the name of a VPN connection and add health check items on the Summary tab page.

          +
        • Average Tunnel RTT, Maximum Tunnel RTT, Tunnel Packet Loss Rate

          These metrics are displayed only when VPN Type is set to Static routing and the NQA function is enabled.

          +
        +
      +
    +
  • Viewing metrics on the Cloud Eye console
    1. Log in to the management console.
    2. Click in the upper left corner and select the desired region and project.
    3. Click Service List and choose Management & Deployment > Cloud Eye.
    4. Choose Cloud Service Monitoring > Virtual Private Network.
    5. View metrics. The operations vary according to the VPN type.
      • Enterprise Edition VPN: On the Enterprise – VPN Gateways page, locate the target VPN connection, and click View Metric in the Operation column to view the VPN connection status.
      • Classic VPN: Click the VPN Connections tab, locate the target VPN connection, and click View Metric in the Operation column to view the VPN connection status.

        You can view data of the last 1, 3, 12, or 24 hours, or last 7 days.

        +
      +
    +
+
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_04_0705.html b/docs/vpn/umn/vpn_04_0705.html new file mode 100644 index 00000000..61a67da7 --- /dev/null +++ b/docs/vpn/umn/vpn_04_0705.html @@ -0,0 +1,168 @@ + + +

Metrics (Classic VPN)

+

Description

This section describes monitored metrics reported by VPN to Cloud Eye as well as their namespaces and dimensions. You can use the Cloud Eye management console to query the metrics of the monitored objects and alarms generated for VPN.

+
+

Namespace

SYS.VPC

+
+

Metrics

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Table 1 Metrics supported for Classic VPN bandwidth

Metric ID

+

Metric Name

+

Description

+

Value Range

+

Monitored Object

+

Monitoring Interval (Raw Data)

+

upstream_bandwidth

+

Outbound Bandwidth

+

Network rate of outbound traffic (previously called "Upstream Bandwidth").

+

Unit: bit/s

+

≥ 0 bit/s

+

Bandwidth or EIP

+

1 minute

+

downstream_bandwidth

+

Inbound Bandwidth

+

Network rate of inbound traffic (previously called "Downstream Bandwidth").

+

Unit: bit/s

+

≥ 0 bit/s

+

Bandwidth or EIP

+

1 minute

+

upstream_bandwidth_usage

+

Outbound Bandwidth Usage

+

Usage of outbound bandwidth, in percentage.

+

Outbound bandwidth usage = Outbound bandwidth/Purchased bandwidth

+

0-100%

+

Bandwidth or EIP

+

1 minute

+

downstream_bandwidth_usage

+

Inbound Bandwidth Usage

+

Usage of inbound bandwidth, in percentage.

+

Inbound bandwidth usage = Inbound bandwidth/Purchased bandwidth

+
NOTE:
  • Up to 10 Mbit/s inbound bandwidth is provided for some sites that purchase an inbound bandwidth of less than 10 Mbit/s. As such, the inbound bandwidth usage may be greater than 100%.
  • If you change the bandwidth of an EIP in use, there is a delay of 5–10 minutes for the metrics to update for the new bandwidth.
+
+

0-100%

+

Bandwidth or EIP

+

1 minute

+

up_stream

+

Outbound Traffic

+

Outbound network traffic (previously called "Upstream Traffic")

+

Unit: byte

+

≥ 0 bytes

+

Bandwidth or EIP

+

1 minute

+

down_stream

+

Inbound Traffic

+

Inbound network traffic (previously called "Downstream Traffic")

+

Unit: byte

+

≥ 0 bytes

+

Bandwidth or EIP

+

1 minute

+
+
+ +
+ + + + + + + + + + + + + + + +
Table 2 Metrics supported for Classic VPN connections

Metric ID

+

Metric Name

+

Description

+

Value Range

+

Monitored Object

+

Monitoring Interval (Raw Data)

+

connection_status

+

VPN Connection Status

+

Status of a VPN connection:

+

0: not connected

+

1: connected

+

0 or 1

+

VPN connection

+

5 minutes

+
+
+
+

Dimensions

+
+ + + + + + + +

key

+

Value

+

vpn_connection_id

+

VPN Connections

+
+
+
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_04_0807.html b/docs/vpn/umn/vpn_04_0807.html new file mode 100644 index 00000000..ff008f5e --- /dev/null +++ b/docs/vpn/umn/vpn_04_0807.html @@ -0,0 +1,26 @@ + + +

Unbinding an EIP from a VPN Gateway

+

Scenario

After a VPN gateway is created, you can unbind an EIP from it.

+
+

Notes and Constraints

An EIP that is in use by a VPN connection cannot be unbound from a VPN gateway.

+
+

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Click in the upper left corner of the page, and choose Network > Virtual Private Network.
  4. In the navigation pane on the left, choose Virtual Private Network > Enterprise – VPN Gateways.
  5. Locate the row that contains the target VPN gateway, and click Unbind EIP or choose More > Unbind EIP in the Operation column.
    • If the VPN gateway uses the active-active mode, the active EIP and active EIP 2 can be unbound from the VPN gateway.
    • If the VPN gateway uses the active/standby mode, the active EIP and standby EIP can be unbound from the VPN gateway.
    +
    Figure 1 Unbinding an EIP from the VPN gateway
    +
  6. In the displayed dialog box, click Yes.
    +
+
+
+ + + + \ No newline at end of file diff --git a/docs/vpn/umn/vpn_04_1003.html b/docs/vpn/umn/vpn_04_1003.html new file mode 100644 index 00000000..57e45fec --- /dev/null +++ b/docs/vpn/umn/vpn_04_1003.html @@ -0,0 +1,21 @@ + + +

Deleting a VPN Connection

+

Scenario

If a VPN connection is no longer required, you can delete it to release network resources.

+
+

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Click in the upper left corner of the page, and choose Network > Virtual Private Network.
  4. In the navigation pane on the left, choose Virtual Private Network > Enterprise – VPN Connections.
  5. On the VPN Connections page, locate the row that contains the target VPN connection, and click Delete.
  6. In the displayed dialog box, click Yes.
+
+
+ + + + \ No newline at end of file diff --git a/docs/vpn/umn/vpn_04_1200.html b/docs/vpn/umn/vpn_04_1200.html new file mode 100644 index 00000000..d012951f --- /dev/null +++ b/docs/vpn/umn/vpn_04_1200.html @@ -0,0 +1,17 @@ + + +

Permissions Management

+
+ + diff --git a/docs/vpn/umn/vpn_04_1201.html b/docs/vpn/umn/vpn_04_1201.html new file mode 100644 index 00000000..cf1217ca --- /dev/null +++ b/docs/vpn/umn/vpn_04_1201.html @@ -0,0 +1,32 @@ + + +

Creating a User and Granting VPN Permissions

+

Use the Identity and Access Management (IAM) service to implement fine-grained permissions control over your VPN resources. With IAM, you can:

+
  • Create IAM users for employees based on your enterprise's organizational structure. Each IAM user will have their own security credentials for accessing VPN resources.
  • Grant users only the permissions required to perform a given task based on their job responsibilities.
  • Grant the permission to perform professional and efficient O&M on your VPN resources to other accounts or cloud services.
+

If your account meets your permissions requirements, you can skip this section.

+

This section describes the procedure for granting permissions (see Figure 1).

+

Prerequisites

You have learned about the permissions supported by VPN, and determined the permissions to be granted to a user group. Before granting permissions of other services, learn about all permissions supported by IAM.

+
+

Process Flow

Figure 1 Process of granting VPN permissions
+
  1. Create a user group and assign permissions to it.

    Create a user group on the IAM console and attach the VPN Administrator policy to the group.

    +
  2. Create a user and add it to the user group.

    Create a user on the IAM console and add the user to the group created in 1.

    +
  3. Log in and verify permissions.

    Log in to the management console as the created user. Switch to the authorized region and verify the permissions.

    +
    • Click Service List and choose Networking > Virtual Private Network. On the Enterprise – VPN Gateways page, click Create VPN Gateway in the upper right corner. If the VPN gateway is successfully created, the VPN Administrator policy has already taken effect.
    • Choose any other service in Service List. If a message appears indicating that you have insufficient permissions to access the service, the VPN Administrator policy has already taken effect.
    +

    Classic VPN: For details about how to create a user and grant VPC permissions to the user, see Creating a User and Granting VPC Permissions.

    +
    +
+
+
+
+ +
+ + + \ No newline at end of file diff --git a/docs/vpn/umn/vpn_04_1202.html b/docs/vpn/umn/vpn_04_1202.html new file mode 100644 index 00000000..516b86f6 --- /dev/null +++ b/docs/vpn/umn/vpn_04_1202.html @@ -0,0 +1,69 @@ + + +

VPN Custom Policies

+

Custom policies can be created to supplement the system-defined policies of VPN.

+

You can create custom policies in either of the following ways:

+
  • Visual editor: Select cloud services, actions, resources, and request conditions. This does not require knowledge of policy syntax.
  • JSON: Edit JSON policies from scratch or based on an existing policy.
+

For details, see Creating a Custom Policy. The following section contains examples of common VPN custom policies.

+

Example VPN custom policy

  • Example 1: Grant permission to delete VPN gateways.
    {
    +    "Version": "1.1",
    +    "Statement": [
    +        {
    +            "Effect": "Allow",
    +            "Action": [
    +                "vpn:vpnGateways:delete"
    +            ]
    +        }
    +    ]
    +}
    +
  • Example 2: Deny VPN connection deletion.

    A policy with only "Deny" permissions must be used together with other policies. If the permissions granted to an IAM user contain both "Allow" and "Deny", the "Deny" permissions take precedence over the "Allow" permissions.

    +

    The following method can be used if you need to assign permissions of the VPN FullAccess policy to a user but also forbid the user from deleting VPN connections. Create a custom policy for denying VPN connection deletion, and assign both policies to the group the user belongs to. Then the user can perform all operations on VPN except deleting VPN connections. The following is an example of a deny policy:

    +
    {
    +    "Version": "1.1",
    +    "Statement": [
    +        {
    +            "Effect": "Deny",
    +            "Action": [
    +                "vpn:vpnGateways:delete"
    +            ]
    +        }
    +    ]
    +}
    +
  • Example 3: defining multiple actions in a policy

    A custom policy can contain the actions of one or multiple services that are of the same type (global or project-level). The following is an example policy containing multiple actions.

    +
    {
    +    "Version": "1.1",
    +    "Statement": [
    +        {
    +            "Effect": "Allow",
    +            "Action": [
    +                "vpn:vpnGateways:create",
    +                "vpn:vpnConnections:create",
    +                "vpn:customerGateways:create"
    +            ]
    +        },
    +        {
    +            "Effect": "Deny",
    +            "Action": [
    +                "vpn:vpnGateways:delete",
    +                "vpn:vpnConnections:delete",
    +                "vpn:customerGateways:create"
    +            ]
    +        },
    +        {
    +            "Effect": "Allow",
    +            "Action": [
    +                "vpc:vpcs:list",
    +                "vpc:subnets:get"
    +            ]
    +        }
    +    ]
    +}
    +
+
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_08_0000.html b/docs/vpn/umn/vpn_08_0000.html new file mode 100644 index 00000000..2ad0a34b --- /dev/null +++ b/docs/vpn/umn/vpn_08_0000.html @@ -0,0 +1,13 @@ + + +

FAQs

+
+ + diff --git a/docs/vpn/umn/vpn_08_0232.html b/docs/vpn/umn/vpn_08_0232.html new file mode 100644 index 00000000..4345cdc8 --- /dev/null +++ b/docs/vpn/umn/vpn_08_0232.html @@ -0,0 +1,11 @@ + + +

Where Can I Add Routes on the VPN Console to Reach the Remote Subnets?

+

When a VPN connection is created, routes are automatically delivered to reach the remote subnets.

+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_08_0233.html b/docs/vpn/umn/vpn_08_0233.html new file mode 100644 index 00000000..387dc90f --- /dev/null +++ b/docs/vpn/umn/vpn_08_0233.html @@ -0,0 +1,12 @@ + + +

Will I Be Notified If a VPN Connection Is Interrupted?

+

The VPN connection status can be monitored. After a VPN connection is created, the VPN service reports the connection status information to Cloud Eye, but does not automatically send alarm notifications to you. To receive notifications, create alarm rules and enable Alarm Notification on the Cloud Eye console.

+

After a VPN connection is created, you can locate the row that contains the VPN connection and choose Operation > View Metric to view the VPN connection status.

+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_08_0305.html b/docs/vpn/umn/vpn_08_0305.html new file mode 100644 index 00000000..ee955214 --- /dev/null +++ b/docs/vpn/umn/vpn_08_0305.html @@ -0,0 +1,26 @@ + + +

What Are the Differences Between the Application Scenarios and Connection Modes of IPsec and SSL VPNs?

+

Scenarios

IPsec VPN connects two LANs, such as a branch and its headquarters (or a VPC), or an on-premises data center and a VPC.

+

SSL VPN connects a client to a LAN. For example, the portable computer of an employee on a business trip accesses the internal network of the company.

+
+

Connection Modes

IPsec VPN requires fixed gateways, such as firewalls or routers, at both ends. The administrator needs to configure gateways at both ends to complete IPsec VPN negotiation.

+

SSL VPN needs to install a specified client software on the server, then the server connects to the SSL device through the username and password.

+

+

Currently, only IPsec VPN is supported; SSL VPN is not supported.

+
+
+
+
+ +
+ + + \ No newline at end of file diff --git a/docs/vpn/umn/vpn_08_0312.html b/docs/vpn/umn/vpn_08_0312.html new file mode 100644 index 00000000..e7c39c97 --- /dev/null +++ b/docs/vpn/umn/vpn_08_0312.html @@ -0,0 +1,14 @@ + + +

How Do I Replace a Direct Connect Connection with a VPN?

+
  1. Ensure that the on-premises gateway supports IPsec VPN.
  2. Create a VPN gateway and a VPN connection on the cloud. Select the VPC to which the Direct Connect connection uses for the VPN gateway.

    When creating a VPN connection, configure its remote subnet as follows to avoid routing conflicts.

    +
    • Delete the virtual interface of the Direct Connect connection first and then configure the VPN connection.
    • Divide the remote subnet into two subnets and configure the VPN connection. After the Direct Connect connection is deleted, configure the VPN connection again.
    +
    +
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_08_0318.html b/docs/vpn/umn/vpn_08_0318.html new file mode 100644 index 00000000..781f3ffd --- /dev/null +++ b/docs/vpn/umn/vpn_08_0318.html @@ -0,0 +1,13 @@ + + +

How Do I Access ECSs at Home When My Enterprise Network Has Been Connected to the Cloud Through a VPN?

+

A VPN connects a VPC on the cloud and an on-premises local area network (LAN).

+

The home network is not a part of the LAN of your enterprise and cannot be directly connected to the VPC on the cloud.

+

If your host at home needs to access VPC resources on the cloud, your host can directly access the EIP of the cloud service or connect to the LAN of your enterprise through SSL VPN (if your enterprise supports SSL access) and then access VPC resources on the cloud through the LAN.

+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_08_0323.html b/docs/vpn/umn/vpn_08_0323.html new file mode 100644 index 00000000..c50b8748 --- /dev/null +++ b/docs/vpn/umn/vpn_08_0323.html @@ -0,0 +1,12 @@ + + +

How Many VPN Connections Do I Need to Connect to Multiple On-premises Servers?

+

VPN uses the IPsec technology to connect your on-premises data center to a VPC on the cloud. As such, the number of VPN connections is related to the number of data centers where the servers to be connected to the cloud are located, but not to the number of servers.

+

In most cases, one on-premises data center has one public gateway. All servers connect to the Internet through this gateway. Therefore, you only need to configure one VPN connection to allow communications between the VPC and your on-premises data center.

+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_08_0325.html b/docs/vpn/umn/vpn_08_0325.html new file mode 100644 index 00000000..cf295f1b --- /dev/null +++ b/docs/vpn/umn/vpn_08_0325.html @@ -0,0 +1,14 @@ + + +

What Are the Impacts of a VPN on an On-premises Network? What Are the Changes to the Route for Accessing an ECS?

+

When you configure a VPN, perform the following operations on the on-premises gateway:

+
  1. Configure IKE and IPsec policies.
  2. Specify the to-be-protected traffic (firewall).
  3. Check the route configuration on the gateway to ensure that traffic destined for a VPC can be routed to the correct outbound interface (interface having an IPsec policy bound).
+

After the VPN configuration is complete, only the traffic matching the ACL rules enters the VPN tunnel.

+

For example, before a VPN is created, on-premises users access the ECS through the EIP bound to the ECS. After a VPN is created, data flows matching the firewall rules access the private IP address of the ECS through the VPN tunnel.

+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_08_0614.html b/docs/vpn/umn/vpn_08_0614.html new file mode 100644 index 00000000..79d9dcce --- /dev/null +++ b/docs/vpn/umn/vpn_08_0614.html @@ -0,0 +1,14 @@ + + +

How Do I Configure DPD for Interconnection with the Cloud?

+

By default, DPD is enabled on the cloud side and cannot be disabled.

+

Configure DPD as follows:

+
  • DPD-type: on-demand
  • DPD idle-time: 30s
  • DPD retransmit-interval: 15s
  • DPD retry-limit: 3
  • DPD msg: seq-hash-notify
+

The DPD msg format at both ends of the VPN connection must be the same, but the DPD type, idle time, retransmission interval, and retry limit can be different.

+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_08_0713.html b/docs/vpn/umn/vpn_08_0713.html new file mode 100644 index 00000000..8705867c --- /dev/null +++ b/docs/vpn/umn/vpn_08_0713.html @@ -0,0 +1,13 @@ + + +

Why Is Not Connected Displayed as the Status for a Successfully Created VPN Connection?

+

After a VPN connection is created, its status changes to Normal only after servers at both ends of the VPN connection communicate with each other.

+
  • IKE v1:

    If no traffic goes through the VPN connection for a period of time, the VPN connection needs to be renegotiated. The negotiation time depends on the value of Lifetime (s) in the IPsec policy. Generally, Lifetime (s) is set to 3600 (1 hour), indicating that the negotiation will be initiated in the fifty-fourth minute. If the negotiation succeeds, the connection remains to the next round of negotiation. If the negotiation fails, the VPN connection status changes to Not Connected within one hour. The connection can be restored only after the two ends of the VPN connection communicate with each other. The disconnection can be avoided by using a network monitoring tool, such as IP SLA, to generate packets.

    +
  • IKE v2: If no traffic goes through the VPN connection for a period of time, the VPN connection remains in the connected status.
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_08_1501.html b/docs/vpn/umn/vpn_08_1501.html new file mode 100644 index 00000000..0303a477 --- /dev/null +++ b/docs/vpn/umn/vpn_08_1501.html @@ -0,0 +1,17 @@ + + +

What Is the VPN Quota?

+

What Is a Quota?

Quotas can limit the number or amount of resources available to users, such as the maximum number of ECSs or EVS disks that can be created.

+

If the existing resource quota cannot meet your service requirements, you can apply for a higher quota.

+
+

How Do I View My Quota?

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Click (the My Quotas icon) in the upper right corner.

    The Service Quota page is displayed.

    +
  4. View the used and total quota of each type of resources on the displayed page.

    If a quota cannot meet service requirements, apply for a higher quota.

    +
+
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_08_1503.html b/docs/vpn/umn/vpn_08_1503.html new file mode 100644 index 00000000..1678d2f2 --- /dev/null +++ b/docs/vpn/umn/vpn_08_1503.html @@ -0,0 +1,21 @@ + + +

Security

+
+ + diff --git a/docs/vpn/umn/vpn_08_1504.html b/docs/vpn/umn/vpn_08_1504.html new file mode 100644 index 00000000..1b1b8edc --- /dev/null +++ b/docs/vpn/umn/vpn_08_1504.html @@ -0,0 +1,11 @@ + + +

SSL VPN

+

SSL VPN is a virtual private network technology using the SSL protocol. It allows remote users to securely access enterprise intranet resources.

+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_08_1505.html b/docs/vpn/umn/vpn_08_1505.html new file mode 100644 index 00000000..91a263ac --- /dev/null +++ b/docs/vpn/umn/vpn_08_1505.html @@ -0,0 +1,27 @@ + + +

Enterprise Edition VPN

+
+ + diff --git a/docs/vpn/umn/vpn_08_1507.html b/docs/vpn/umn/vpn_08_1507.html new file mode 100644 index 00000000..3929f646 --- /dev/null +++ b/docs/vpn/umn/vpn_08_1507.html @@ -0,0 +1,15 @@ + + +

Classic VPN

+
+
+ + + +
+ diff --git a/docs/vpn/umn/vpn_08_1509.html b/docs/vpn/umn/vpn_08_1509.html new file mode 100644 index 00000000..18204570 --- /dev/null +++ b/docs/vpn/umn/vpn_08_1509.html @@ -0,0 +1,19 @@ + + +

Enterprise Edition VPN

+
+ + diff --git a/docs/vpn/umn/vpn_08_1511.html b/docs/vpn/umn/vpn_08_1511.html new file mode 100644 index 00000000..74666bc5 --- /dev/null +++ b/docs/vpn/umn/vpn_08_1511.html @@ -0,0 +1,15 @@ + + +

Classic VPN

+
+
+ + + +
+ diff --git a/docs/vpn/umn/vpn_08_1513.html b/docs/vpn/umn/vpn_08_1513.html new file mode 100644 index 00000000..5a95765a --- /dev/null +++ b/docs/vpn/umn/vpn_08_1513.html @@ -0,0 +1,19 @@ + + +

Tag Management

+
+ + diff --git a/docs/vpn/umn/vpn_08_1514.html b/docs/vpn/umn/vpn_08_1514.html new file mode 100644 index 00000000..572bdfa4 --- /dev/null +++ b/docs/vpn/umn/vpn_08_1514.html @@ -0,0 +1,38 @@ + + +

Scenario

+

VPN tags are used to identify VPN resources, facilitating VPN resource identification and management. You can add tags for a VPN resource when you create the VPN resource. Alternatively, you add tags for an existing VPN resource on the resource details page. A maximum of 20 tags can be added for each VPN resource.

+

A tag consists of a key and a value. Table 1 describes the requirements on the keys and values of VPN tags.

+ +
+ + + + + + + + + + + + + +
Table 1 Requirements on the keys and values of VPN tags

Parameter

+

Requirement

+

Example Value

+

Key

+
  • Cannot be left blank.
  • Must be unique for the same VPN.
  • Can contain a maximum of 128 characters.
+

vpn_key1

+

Value

+
  • Can contain a maximum of 255 characters.
+

vpn-01

+
+
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_08_1515.html b/docs/vpn/umn/vpn_08_1515.html new file mode 100644 index 00000000..604260c9 --- /dev/null +++ b/docs/vpn/umn/vpn_08_1515.html @@ -0,0 +1,35 @@ + + +

Searching for Resources by Tag

+

Context

You can search for VPN gateways, customer gateways, and VPN connections based on the tag keys and values that have been added for these VPN resources.

+
+

Procedure

Searching for Enterprise Edition VPN gateways by tag

+
  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Click in the upper left corner of the page, and choose Network > Virtual Private Network.
  4. In the navigation pane on the left, choose Virtual Private Network > Enterprise – VPN Gateways.
  5. Click in the text box for selecting a property or entering a keyword, choose a tag key under Resource Tag, and select a tag value.
    The system displays the VPN gateways that match the selected tag key and value.
    • You can only select existing keys and values from the drop-down list.
    • You can select a maximum of 20 tags to search for VPN resources. If you select multiple tags, the relationship between them is AND.
    • You can use tags together with other types of filter criteria. The relationship between them is AND.
    +
    +
+

Searching for customer gateways of Enterprise Edition VPN by tag

+
  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Click in the upper left corner of the page, and choose Network > Virtual Private Network.
  4. In the navigation pane on the left, choose Virtual Private Network > Enterprise – Customer Gateways.
  5. Click in the text box for selecting a property or entering a keyword, choose a tag key under Resource Tag, and select a tag value.
    The system displays the customer gateways that match the selected tag key and value.
    • You can only select existing keys and values from the drop-down list.
    • You can select a maximum of 20 tags to search for VPN resources. If you select multiple tags, the relationship between them is AND.
    • You can use tags together with other types of filter criteria. The relationship between them is AND.
    +
    +
+

Searching for Enterprise Edition VPN connections by tag

+
  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Click in the upper left corner of the page, and choose Network > Virtual Private Network.
  4. In the navigation pane on the left, choose Virtual Private Network > Enterprise – VPN Connections.
  5. Click in the text box for selecting a property or entering a keyword, choose a tag key under Resource Tag, and select a tag value.
    The system displays the VPN connections that match the selected tag key and value.
    • You can only select existing keys and values from the drop-down list.
    • You can select a maximum of 20 tags to search for VPN resources. If you select multiple tags, the relationship between them is AND.
    • You can use tags together with other types of filter criteria. The relationship between them is AND.
    +
    +
+

Searching for Classic VPN gateways by tag

+
  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Click Service List and choose Network > Virtual Private Network.
  4. In the navigation pane on the left, choose Virtual Private Network > Classic.
  5. Click Search by Tag in the upper right corner, select the desired tag key and value, and click Search.
    • You can only select existing keys and values from the drop-down list.
    • You can select a maximum of 20 tags to search for VPN resources.
    +
+
+
+
+ +
+ + + \ No newline at end of file diff --git a/docs/vpn/umn/vpn_08_1516.html b/docs/vpn/umn/vpn_08_1516.html new file mode 100644 index 00000000..28c82f1f --- /dev/null +++ b/docs/vpn/umn/vpn_08_1516.html @@ -0,0 +1,34 @@ + + +

Managing Tags

+

Context

You can add, delete, modify, and view tags of VPN gateways.

+
+

Procedure

Managing tags of Enterprise Edition VPN gateways
  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Click in the upper left corner of the page, and choose Network > Virtual Private Network.
  4. In the navigation pane on the left, choose Virtual Private Network > Enterprise – VPN Gateways.
  5. Click the name of the target VPN gateway. The VPN gateway details page is displayed.
  6. Click the Tags tab, and add, delete, modify, or view tags of the VPN gateway.
    • Add a tag.

      Click Add Tag. In the Add Tag dialog box, enter the key and value of a tag to be added, and click OK.

      +
    • Modify a tag.

      Click Edit in the Operation column of the target tag. In the Edit Tag dialog box, change the tag value and click OK.

      +
    • Delete a tag.

      Click Delete in the Operation column of the target tag. In the Delete Tag dialog box, click OK.

      +
    • View tags.

      On the Tags page, view tag details, including the number of new tags that can be created and the key and value of each existing tag.

      +
    +
+
+

Managing tags of Classic VPN gateways

+
  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Click Service List and choose Network > Virtual Private Network.
  4. In the navigation pane on the left, choose Virtual Private Network > Classic.
  5. On the Classic page, click the name of the target VPN gateway. The VPN gateway details page is displayed.
  6. Click the Tags tab, and add, delete, modify, or view tags of the VPN gateway.
    • Add a tag.

      Click Add Tag. In the Add Tag dialog box, enter the key and value of a tag to be added, and click OK.

      +
    • Modify a tag.

      Click Edit in the Operation column of the target tag. In the Edit Tag dialog box, change the tag value and click OK.

      +
    • Delete a tag.

      Click Delete in the Operation column of the target tag. In the Delete Tag dialog box, click OK.

      +
    • View tags.

      On the Tags page, view tag details, including the number of new tags that can be created and the key and value of each existing tag.

      +
    +
+
+
+
+ +
+ + + \ No newline at end of file diff --git a/docs/vpn/umn/vpn_08_1517.html b/docs/vpn/umn/vpn_08_1517.html new file mode 100644 index 00000000..945d4ad9 --- /dev/null +++ b/docs/vpn/umn/vpn_08_1517.html @@ -0,0 +1,33 @@ + + +

Enterprise Edition VPN

+
+ + diff --git a/docs/vpn/umn/vpn_08_1518.html b/docs/vpn/umn/vpn_08_1518.html new file mode 100644 index 00000000..f0bf4500 --- /dev/null +++ b/docs/vpn/umn/vpn_08_1518.html @@ -0,0 +1,33 @@ + + +

Classic VPN

+
+
+ + + +
+ diff --git a/docs/vpn/umn/vpn_08_1519.html b/docs/vpn/umn/vpn_08_1519.html new file mode 100644 index 00000000..5c559177 --- /dev/null +++ b/docs/vpn/umn/vpn_08_1519.html @@ -0,0 +1,121 @@ + + +

Change History

+
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Released On

+

Description

+

2024-08-23

+

This release incorporates the following changes:

+ +

2024-03-15

+

This release incorporates the following changes:

+ +

2020-11-01

+

This release incorporates the following changes:

+
  • Updated the value range of the pre-shared key in Table 1.
  • Adjusted the column width of the table in Creating a VPN.
+

2019-02-22

+

This release incorporates the following changes:

+

Updated the region description in Table 1.

+

2019-02-18

+

Accepted in OTC-4.0/Agile-02.2019

+

2019-02-11

+

This release incorporates the following changes:

+
  • Deleted content about the firewall version from section Creating a VPN.
  • Added Table 1.
  • Adjusted the column width of a table.
+

2019-02-02

+

This release incorporates the following changes:

+ +

2019-01-30

+

This release incorporates the following changes:

+
  • Sorted the DH algorithms to display in Table 2.
  • Sorted the PFS algorithms to display in Table 3
  • Added description to show how to query the firewall version in step 5.
+

2019-01-23

+

This release incorporates the following changes:

+ +

2019-01-02

+

This release incorporates the following changes:

+

Added description about the PFS function to the section for configuring the IPsec policy of a VPN.

+

2018-04-30

+

This issue is the eighth official release, which incorporates the following change:

+

Added support for tags configured during VPN creation.

+

2017-08-30

+

This issue is the seventh official release, which incorporates the following change:

+

Added description about VPC and subnet tags.

+

2017-07-30

+

This issue is the sixth official release, which incorporates the following change:

+
  • Added the best practice.
  • Added support for the multi-project feature.
+

2017-04-28

+

This issue is the fifth official release, which incorporates the following change:

+
  • Changed the maximum number obtained by multiplying the number of local subnets and that of remote subnets of a VPN to 2500.
+

2017-03-30

+

This issue is the fourth official release, which incorporates the following change:

+

Added an example illustrating how to configure the remote device of a VPN.

+

2017-01-20

+

This issue is the third official release, which incorporates the following change:

+
  • Added description about the IPsec VPN created between multiple local gateways in different VPCs and the same remote gateway.
+

2016-12-30

+

This issue is the second official release, which incorporates the following change:

+

Added FAQs.

+

2016-10-19

+

This issue is the first official release.

+
+
+
+ diff --git a/docs/vpn/umn/vpn_09_0000.html b/docs/vpn/umn/vpn_09_0000.html new file mode 100644 index 00000000..c00f5a50 --- /dev/null +++ b/docs/vpn/umn/vpn_09_0000.html @@ -0,0 +1,11 @@ + + +

Administrator Guide

+
+ + diff --git a/docs/vpn/umn/vpn_admin_0016.html b/docs/vpn/umn/vpn_admin_0016.html new file mode 100644 index 00000000..4205f9b3 --- /dev/null +++ b/docs/vpn/umn/vpn_admin_0016.html @@ -0,0 +1,125 @@ + + +

Configuring VPN When Fortinet FortiGate Firewall Is Used

+

Scenarios

This section describes how to create a VPN gateway and VPN connections to connect your on-premises network to a VPC subnet if your local data center uses FortiGate firewalls as Internet egresses.

+
+

Topology Connection

As shown in Figure 1, the local data center has multiple Internet egresses. The egress 11.11.11.11 is specified to establish a VPN connection with a VPC. The subnet of the local data center is 10.10.0.0/16, and the VPC subnet is 172.16.0.0/24. The IP address of the VPN gateway you created is 22.22.22.22. Create a VPN connection to connect your on-premises network to the VPC subnet.

+
Figure 1 Multi-egress on-premises network connecting to a VPC through a VPN
+

+

Configure the VPN connection policies based on Figure 2.

+
Figure 2 Policy details
+
+

Configuration Procedure

This example describes how to configure a VPN if a FortiGate firewall is used in your local data center.

+
  1. Configure IPsec VPN.

    1. Create a tunnel.
    2. Configure the basic information for the tunnel.
    3. Configure IKE phase 1 parameters.
    4. Configure IPsec phase 2 parameters.
    5. Configure the IPsec tunnel.
    +

  2. Configure routes.

    1. Add a static route.

      Add a route to the cloud VPC subnet 172.16.0.0/24, with the outbound interface being the VPN tunnel interface.

      +
    2. Configure policy-based routes for multiple egresses.

      Set the source address to the subnet of the local data center and the destination address to the subnet of the VPC. Adjust the configuration sequence of the policy-based routes to ensure that the policy-based routes will be preferentially used.

      +
    +

  3. Configure policies and NAT.

    1. Configure a policy for access to the cloud from the local data center.
    2. Configure a policy for access to the local data center from the cloud.
    +

+
+

Configuration Verification

  1. Check whether the on-premises VPN status is normal.
  1. Check whether the cloud-based VPN status is normal.
+
+

Configuration Using the CLI

  1. Configure the physical interface.
    config system interface
    +   edit "port1"
    +        set vdom "root"
    +        set ip 11.11.11.11 255.255.255.0
    +        set type physical
    +next
    +    edit "IPsec"                                  //Tunnel interface configuration
    +        set vdom "root"
    +        set type tunnel
    +        set interface "port1"               //Physical interface bound to the tunnel
    +               next                    
    +         end
    +
  2. Configure interface zones.
    config system zone
    +    edit "trust"
    +        set intrazone allow
    +        set interface "A1"
    +    next
    +    edit "untrust"
    +        set intrazone allow
    +        set interface "port1 "
    +    next
    +end
    +
  3. Configure subnets.
    config firewall address
    +         edit "hw-172.16.0.0/24"
    +        set uuid f612b4bc-5487-51e9-e755-08456712a7a0
    +        set subnet 172.16.0.0 255.255.255.0              //Subnet on the cloud
    +         next
    +    edit "local-10.10.0.0/16"
    +        set uuid 9f268868-5489-45e9-d409-5abc9a946c0c
    +        set subnet 10.10.0.0 255.255.0.0                     //Subnet of the local data center
    +    next
    +
  4. Configure IPsec.
    config vpn IPsec phase1-interface                                        //Phase 1 configuration
    +    edit "IPsec"
    +        set interface "port1"
    +        set nattraversal disable
    +        set proposal aes128-sha1
    +        set comments "IPsec"
    +        set dhgrp 5
    +        set remote-gw 22.22.22.22
    +        set psksecret ENC dmFyLzF4tRrIjV3T+lSzhQeU2nGEoYKC31NaYRWFJl8krlwNmZX5SfwUi5W5RLJqFu82VYKYsXp5+HZJ13VYY8O2Sn/vruzdLxqu84zbHEIQkTlf5n/63KEru1rRoNiHDTWfh3A3ep3fKJmxf43pQ7OD64t151ol06FMjUBLHgJ1ep9d32Q0F3f3oUxfDQs21Bi9RA==
    +    next
    +end
    +config vpn IPsec phase2-interface                                        //Phase 2 configuration
    +    edit "IP-TEST"
    +        set phase1name "IPsec "
    +        set proposal aes128-sha1
    +        set dhgrp 5
    +        set keylifeseconds 3600
    +        set src-subnet 10.10.0.0 255.255.0.0
    +        set dst-subnet 172.16.0.0 255.255.255.0
    +    next
    +end
    +
  5. Configure access policies.
    config firewall policy 
    + edit 15                                                  //Policy 15 is used to access the on-premises data center from the cloud. NAT is disabled.
    +        set uuid 4f452870-ddb2-51e5-35c9-38a987ebdb6c
    +        set srcintf "IPsec"
    +        set dstintf "trust"
    +        set srcaddr "hw-172.16.0.0/24"
    +        set dstaddr "local-10.10.0.0/16"
    +        set action accept
    +        set schedule "always"
    +        set service "ALL"
    +        set logtraffic all
    +    next
    +    edit 29                                           //Policy 29 is used to access the cloud from the on-premises data center. NAT is disabled.
    +        set uuid c2d0ec77-5254-51e9-80dc-2813ccf51463
    +        set srcintf "trust"
    +        set dstintf "IPsec"
    +        set srcaddr "local-10.10.0.0/16"
    +        set dstaddr "hw-172.16.0.0/24"
    +        set action accept
    +        set schedule "always"
    +        set service "ALL"
    +        set logtraffic all
    +    next 
    +
  6. Configure routes.
    config router static
    +    edit 24                                 //Route 24 is a static route that is used to access on the cloud.
    +        set dst 172.16.0.0 255.255.255.0
    +        set gateway 11.11.11.1
    +        set distance 10
    +        set device "port1"
    +config router policy
    +edit 2                         //Policy-based route 2 is used to access the cloud from the on-premises data center.
    +        set input-device "A1"
    +        set src "10.10.00/255.255.0.0"
    +        set dst "172.16.0.0/255.255.255.0"
    +        set gateway 11.11.11.1
    +        set output-device "port1"
    +
+
+
+
+ +
+ + + \ No newline at end of file diff --git a/docs/vpn/umn/vpn_faq_00031.html b/docs/vpn/umn/vpn_faq_00031.html new file mode 100644 index 00000000..a602a072 --- /dev/null +++ b/docs/vpn/umn/vpn_faq_00031.html @@ -0,0 +1,14 @@ + + +

What Are the Typical Scenarios of IPsec VPN?

+

A VPN is a point-to-point connection that implements private network access between two points.

+
  • Applicable scenarios:
    • A VPN is created between different regions to enable cross-region VPC communications.
    • A VPN hub is used together with VPC peering connections and Cloud Connect connections to enable communications between an on-premises data center and multiple VPCs on the cloud.
    • A VPN is used together with source NAT to enable access to specific IP addresses across clouds.
    +
  • Not applicable scenarios:
    • A VPN cannot be used to connect VPCs in the same region. It is recommended that you use VPC peering connections to enable communications between VPCs in the same region.
    • A VPN cannot be used between the cloud and your home network that uses PPPoE dial-up.
    • A VPN cannot be used between the cloud and 4G/5G routers.
    • A VPN cannot be used between the cloud and your personal terminals.
    +
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_faq_00032.html b/docs/vpn/umn/vpn_faq_00032.html new file mode 100644 index 00000000..b3b33616 --- /dev/null +++ b/docs/vpn/umn/vpn_faq_00032.html @@ -0,0 +1,15 @@ + + +

What Are a VPC, a VPN Gateway, and a VPN Connection?

+

VPC enables you to create private, isolated virtual networks. You can use VPN to securely access ECSs in VPCs.

+

A VPN gateway is an egress gateway for a VPC. With a VPN gateway, you can create a secure, reliable, and encrypted connection between a VPC and an on-premises data center or between two VPCs in different regions.

+

A VPN connection is a secure and reliable IPsec encrypted communications tunnel established between a VPN gateway and the customer gateway in an on-premises data center.

+

To create a VPN on the cloud, perform the following operations:

+
  1. Create a VPN gateway. You need to specify the VPC to be connected, as well as the bandwidth and EIPs of the VPN gateway.
  2. Create a VPN connection. You need to specify the gateway EIP used to connect to the customer gateway, subnets, and negotiation policies.
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_faq_00036.html b/docs/vpn/umn/vpn_faq_00036.html new file mode 100644 index 00000000..62c580a1 --- /dev/null +++ b/docs/vpn/umn/vpn_faq_00036.html @@ -0,0 +1,11 @@ + + +

How Do I Plan CIDR Blocks for Access to a VPC Through a VPN Connection?

+
  • The CIDR blocks of a VPC cannot conflict with on-premises CIDR blocks.
  • To avoid conflicts with cloud service addresses, do not use 127.0.0.0/8, 169.254.0.0/16, 224.0.0.0/3, or 100.64.0.0/10 for your on-premises network.
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_faq_00037.html b/docs/vpn/umn/vpn_faq_00037.html new file mode 100644 index 00000000..78b152fc --- /dev/null +++ b/docs/vpn/umn/vpn_faq_00037.html @@ -0,0 +1,11 @@ + + +

Is an IPsec VPN Connection Automatically Established?

+

Yes. An IPsec VPN connection is automatically established.

+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_faq_00040.html b/docs/vpn/umn/vpn_faq_00040.html new file mode 100644 index 00000000..38c89e0a --- /dev/null +++ b/docs/vpn/umn/vpn_faq_00040.html @@ -0,0 +1,102 @@ + + +

What Are VPN Negotiation Parameters? What Are Their Default Values?

+
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Table 1 VPN negotiation parameters

Protocol

+

Parameter

+

Value

+

IKE

+

Version

+
  • v1 (v1 has low security. If the device supports v2, v2 is recommended.)
  • v2 (default value)
+

Negotiation Mode

+
  • Main (default value)
  • Aggressive
+

Authentication Algorithm

+
  • MD5 (This algorithm is insecure. Exercise caution when using this algorithm.)
  • SHA1 (This algorithm is insecure. Exercise caution when using this algorithm.)
  • SHA2-256 (default value)
  • SHA2-384
  • SHA2-512
+

Encryption Algorithm

+
  • 3DES (This algorithm is insecure. Exercise caution when using this algorithm.)
  • AES-128 (default value)
  • AES-192 (This algorithm is insecure. Exercise caution when using this algorithm.)
  • AES-256 (This algorithm is insecure. Exercise caution when using this algorithm.)
  • AES-256-GCM-16
+

DH Algorithm

+
  • Group 1 (This algorithm is insecure. Exercise caution when using this algorithm.)
  • Group 2 (This algorithm is insecure. Exercise caution when using this algorithm.)
  • Group 5 (This algorithm is insecure. Exercise caution when using this algorithm.)
  • Group 14 (default value)
  • Group 15
  • Group 16
  • Group 19
  • Group 20
  • Group 21
+

Lifetime (s)

+

86400 (default value)

+

Unit: second

+

Value range: 60 to 604800

+

Local ID

+
  • IP Address

    The local IP address is automatically displayed as the EIP of the VPN gateway, removing the need to manually configure it.

    +
  • FQDN
+

By default, the local ID type is IP address and the local ID value is the EIP of the VPN gateway.

+

Customer ID

+
  • IP Address
  • FQDN
+

By default, the customer ID type is IP address and the customer ID value is the public IP address of the customer gateway.

+

IPsec

+

Authentication Algorithm

+
  • SHA1 (This algorithm is insecure. Exercise caution when using this algorithm.)
  • MD5 (This algorithm is insecure. Exercise caution when using this algorithm.)
  • SHA2-256 (default value)
  • SHA2-384
  • SHA2-512
+

Encryption Algorithm

+
  • AES-128 (default value)
  • AES-192 (This algorithm is insecure. Exercise caution when using this algorithm.)
  • AES-256 (This algorithm is insecure. Exercise caution when using this algorithm.)
  • 3DES (This algorithm is insecure. Exercise caution when using this algorithm.)
  • AES-128-GCM-16
  • AES-256-GCM-16
+

PFS

+
  • DH group 1 (This algorithm is insecure. Exercise caution when using this algorithm.)
  • DH group 2 (This algorithm is insecure. Exercise caution when using this algorithm.)
  • DH group 5 (This algorithm is insecure. Exercise caution when using this algorithm.)

    +
  • DH group 14 (default value)
  • DH group 15
  • DH group 16
  • DH group 19
  • DH group 20
  • DH group 21
  • Disable (not recommended due to security risks)
+

Transfer Protocol

+
  • ESP (default value)
+

Lifetime (s)

+

3600 (default value)

+

Unit: second

+

Value range: 30 to 604800

+
+
+
  • Perfect Forward Secrecy (PFS) is a security feature.

    IKE negotiation has two phases, phase one and phase two. The key of phase two (IPsec SA) is derived from the key generated in phase one. Once the key in phase one is disclosed, the security of the IPsec VPN may be adversely affected. To improve the key security, IKE provides PFS. When PFS is enabled, an additional DH exchange will be performed during IPsec SA negotiation to generate a new IPsec SA key, improving IPsec SA security.

    +
  • For security purposes, PFS is enabled on the cloud side by default. Ensure that PFS is also enabled on the gateway device in your on-premises data center and the PFS settings on both ends are the same. Otherwise, the negotiation will fail.
  • The default traffic-based lifetime of an IPsec SA is 1,843,200 KB on the cloud side and cannot be changed for the VPN. This parameter is not involved in negotiation and has no impact on the establishment of an IPsec SA.
+
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_faq_00041.html b/docs/vpn/umn/vpn_faq_00041.html new file mode 100644 index 00000000..8eb2d5ec --- /dev/null +++ b/docs/vpn/umn/vpn_faq_00041.html @@ -0,0 +1,14 @@ + + +

Are a Username and Password Required for Creating an IPsec VPN Connection?

+

No. IPsec VPN uses a pre-shared key (PSK) for authentication. The PSK is configured on a VPN gateway, and a connection will be established after VPN negotiation is complete. Therefore, no username or password is required for creating an IPsec VPN connection. Generally, SSL, PPTP, and L2TP VPNs use usernames and passwords for authentication.

+

IPsec XAUTH provides extended authentication for IPsec VPN. It requires users to enter their usernames and passwords during VPN negotiation.

+

Currently, VPN does not support IPsec XAUTH.

+
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_faq_00043.html b/docs/vpn/umn/vpn_faq_00043.html new file mode 100644 index 00000000..83f63e7a --- /dev/null +++ b/docs/vpn/umn/vpn_faq_00043.html @@ -0,0 +1,15 @@ + + +

What VPN Resources Can Be Monitored?

+

VPN gateway

+

The following bandwidth information of a VPN gateway IP address can be monitored: inbound traffic, inbound bandwidth, outbound traffic, outbound bandwidth, and outbound bandwidth usage.

+

VPN connection

+

The following information about a VPN connection can be monitored: VPN connection status, average link round-trip time (RTT), maximum link RTT, link packet loss rate, average tunnel RTT, maximum tunnel RTT, and tunnel packet loss rate.

+

To monitor average link RTT, maximum link RTT, link packet loss rate, average tunnel RTT, maximum tunnel RTT, and tunnel packet loss rate, click the VPN connection name and click Add in the Health Check area on the Summary tab page to add health check items.

+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_faq_00044.html b/docs/vpn/umn/vpn_faq_00044.html new file mode 100644 index 00000000..17c2606c --- /dev/null +++ b/docs/vpn/umn/vpn_faq_00044.html @@ -0,0 +1,12 @@ + + +

Can EIPs Be Used as VPN Gateway IP Addresses?

+

Yes.

+

When creating a VPN gateway, you can bind EIPs as the gateway IP addresses.

+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_faq_00051.html b/docs/vpn/umn/vpn_faq_00051.html new file mode 100644 index 00000000..24099efa --- /dev/null +++ b/docs/vpn/umn/vpn_faq_00051.html @@ -0,0 +1,28 @@ + + +

Which IKE Version Should I Select When I Create a VPN Connection?

+

IKEv2 is recommended because IKEv1 is not secure. In addition, IKEv2 outperforms IKEv1 in connection negotiation and establishment, authentication methods, dead peer detection (DPD) timeout processing, and security association (SA) timeout processing.

+

IKEv2 will be widely used, and IKEv1 will gradually phase out.

+

Introduction to IKEv1 and IKEv2

  • As a hybrid protocol, IKEv1 brings some security and performance defects due to its complexity. As such, it has become a bottleneck in the IPsec system.
  • IKEv2 addresses the issues of IKEv1 while retaining basic functions of IKEv1. IKEv2 is more simplified, efficient, secure, and robust than IKEv1. Additionally, IKEv2 is defined by RFC 4306 in a single document, whereas IKEv1 are defined in multiple documents. By minimizing core functions and default password algorithms, IKEv2 greatly improves interoperability between different IPsec VPNs.
+
+

Security Risks of IKEv1

  • The cryptographic algorithms supported by IKEv1 have not been updated for more than 10 years. In addition, IKEv1 does not support strong cryptographic algorithms such as AES-GCM and ChaCha20-Poly1305. For IKEv1, the E (Encryption) bit in the ISALMP header specifies that the payloads following the ISALMP header are encrypted, but any data integrity verification of those payloads is handled by a separate hash payload. This separation of encryption from data integrity protection prevents the use of authenticated encryption (AES-GCM) with IKEv1.
  • IKEv1 is vulnerable to DoS amplification attacks and half-open connection attacks. After responding to spoofed packets, the responder maintains initiator-responder relationships, consuming a large number of system resources.

    This defect is inherent to IKEv1 and is addressed in IKEv2.

    +
  • The aggressive mode of IKEv1 is not secure. In this mode, information packets are not encrypted, posing risks of information leakage. There are also brute-force attacks targeting at the aggressive mode, such as man-in-the-middle attacks.
+
+

Differences Between IKEv1 and IKEv2

  • Negotiation process
    • IKEv1 is complex and consumes a large amount of bandwidth. IKEv1 SA negotiation consists of two phases. In IKEv1 phase 1, an IKE SA is established in either main mode or aggressive mode. Main mode requires three exchanges between peers totaling six ISAKMP messages, whereas aggressive mode requires two exchanges totaling three ISAKMP messages. Aggressive mode is faster, but does not provide identity protection for peers as key exchange and identity authentication are performed simultaneously. In IKEv1 phase 2, IPsec SAs are established through three ISAKMP messages in quick mode.
    • Compared with IKEv1, IKEv2 simplifies the SA negotiation process. IKEv2 requires only two exchanges, totaling four messages, to establish an IKE SA and a pair of IPsec SAs. To create multiple pairs of IPsec SAs, only one additional exchange is needed for each additional pair of SAs.

      For IKEv1 negotiation, its main mode involves nine (6+3) messages, and its aggressive mode involves six (3+3) messages. In contrast, IKEv2 negotiation requires only four (2+2) messages.

      +
      +
    +
  • Authentication methods
    • Only IKEv1 (requiring an encryption card) supports digital envelope authentication (HSS-DE).
    • IKEv2 supports Extensible Authentication Protocol (EAP) authentication. IKEv2 can use an AAA server to remotely authenticate mobile and PC users and assign private IP addresses to these users. IKEv1 does not provide this function and must use L2TP to assign private IP addresses.
    • Only IKEv2 supports IKE SA integrity algorithms.
    +
  • DPD timeout processing
    • Only IKEv1 supports the retry-interval parameter. If a device sends a DPD packet but receives no reply within the specified retry-interval, the device records a DPD failure event. When the number of DPD failure events reaches 5, both the IKE SA and IPsec SAs are deleted. IKE SA negotiation will start again only when there is traffic to be transmitted over the IPsec tunnel.
    • In IKEv2, the retransmission interval increases from 1, 2, 4, 8, 16, 32 to 64, in seconds. If no reply is received within eight consecutive transmissions, the peer end is considered dead, and the IKE SA and IPsec SAs are deleted.
    +
  • IKE SA timeout processing and IPsec SA timeout processing

    In IKEv2, the IKE SA soft lifetime is 9/10 of the IKE SA hard lifetime plus or minus a random number. This reduces the likelihood that two ends initiate renegotiation simultaneously. Therefore, you do not manually set the soft lifetime in IKEv2.

    +
+
+

Advantages of IKEv2 over IKEv1

  • Simplifies the SA negotiation process, improving efficiency.
  • Fixes many cryptographic security vulnerabilities, improving security.
  • Supports EAP authentication, improving authentication flexibility and scalability.

    EAP is an authentication protocol that supports multiple authentication methods. The biggest advantage of EAP is its scalability. That is, new authentication methods can be added without changing the original authentication system. EAP authentication has been widely used in dial-up access networks.

    +
  • Employs an Encrypted Payload on basis of ESP. This payload contains both an encryption algorithm and a data integrity algorithm. AES-GCM ensures confidentiality, integrity, and authentication, and works well with IKEv2.
+
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_faq_00144.html b/docs/vpn/umn/vpn_faq_00144.html new file mode 100644 index 00000000..88bd82d2 --- /dev/null +++ b/docs/vpn/umn/vpn_faq_00144.html @@ -0,0 +1,17 @@ + + +

What Do I Do If a VPN Connection Fails to Be Established?

+
  1. Log in to the management console and choose Virtual Private Network > Enterprise – VPN Connections.
  2. In the VPN connection list, locate the target VPN connection, and choose More > Modify Policy Settings on the right to view IKE and IPsec policies of the VPN connection.
  3. Check the IKE and IPsec policies to see whether the negotiation modes and encryption algorithms at both ends of the VPN connection are the same.

    If the IKE SA has been set up in phase 1 but no IPsec SA has been established in phase 2, the IPsec policies at both ends of the VPN connection may be inconsistent.

    +
  1. Check whether the firewall configurations are correct.

    If the subnets of your on-premises data center are 192.168.3.0/24 and 192.168.4.0/24, and the VPC subnets are 192.168.1.0/24 and 192.168.2.0/24, configure the firewall function for each on-premises subnet to allow communication with the VPC subnets. The following provides an example of firewall configurations:

    +
    rule 1 permit ip source 192.168.3.0 0.0.0.255 destination 192.168.1.0 0.0.0.255
    +rule 2 permit ip source 192.168.3.0 0.0.0.255 destination 192.168.2.0 0.0.0.255
    +rule 3 permit ip source 192.168.4.0 0.0.0.255 destination 192.168.1.0 0.0.0.255
    +rule 4 permit ip source 192.168.4.0 0.0.0.255 destination 192.168.2.0 0.0.0.255
    +
  2. Ping the two ends of the VPN connection from each other to check whether the VPN connection is normal.
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_faq_0021.html b/docs/vpn/umn/vpn_faq_0021.html deleted file mode 100644 index 7267b048..00000000 --- a/docs/vpn/umn/vpn_faq_0021.html +++ /dev/null @@ -1,11 +0,0 @@ - - -

How Many IPsec VPNs Can I Have?

-

By default, a user can have a maximum of five IPsec VPNs. If your quota cannot fulfill your service requirements, submit a service ticket to increase the quota.

-
-
- -
- diff --git a/docs/vpn/umn/vpn_faq_0055.html b/docs/vpn/umn/vpn_faq_0055.html deleted file mode 100644 index f988bacc..00000000 --- a/docs/vpn/umn/vpn_faq_0055.html +++ /dev/null @@ -1,18 +0,0 @@ - - -

What Do I Do If VPN Setup Fails?

-
  1. Log in to the management console and click Virtual Private Network.
  2. In the VPN list, locate the target VPN and click View Policy in the Operation

    column to view IKE and IPsec policy details about the VPN.

    -
  3. Check the IKE and IPsec policies to see whether the negotiation modes and encryption algorithms between the local and remote sides of the VPN are the same.
    1. If the IKE policy has been set up during phase one and the IPsec policy has not been enabled in phase two, the IPsec policies between the local and remote sides of the VPN may be inconsistent.
    2. If the Cisco physical device is used at the customer side, it is recommended that you use MD5. Then, you need to set Authentication Mode to MD5 in the IPsec policy for the VPN created on the cloud.
    -
  4. Check whether the ACL configurations are correct.

    If the subnets of your data center are 192.168.3.0/24 and 192.168.4.0/24, and the VPC subnets are 192.168.1.0/24 and 192.168.2.0/24, configure the ACL rules for each data center subnet to permit the communication with the VPC subnets. The following provides an example of ACL configurations:

    -
    rule 1 permit ip source 192.168.3.0 0.0.0.255 destination 192.168.1.0 0.0.0.255
    -rule 2 permit ip source 192.168.3.0 0.0.0.255 destination 192.168.2.0 0.0.0.255
    -rule 3 permit ip source 192.168.4.0 0.0.0.255 destination 192.168.1.0 0.0.0.255
    -rule 4 permit ip source 192.168.4.0 0.0.0.255 destination 192.168.2.0 0.0.0.255
    -
  5. After the configuration is complete, ping the local and the remote side from each other to check whether the VPN connection is normal.
-
-
- -
- diff --git a/docs/vpn/umn/vpn_faq_0056.html b/docs/vpn/umn/vpn_faq_0056.html deleted file mode 100644 index f2f21a3c..00000000 --- a/docs/vpn/umn/vpn_faq_0056.html +++ /dev/null @@ -1,11 +0,0 @@ - - -

How Can I Handle the Failure in Accessing the ECSs from My Data Center or LAN Even If the VPN Has Been Set Up?

-

The security group denies the access from all sources by default. If you want to access your ECSs, modify the security group configuration and allow the access from the remote subnets.

-
-
- -
- diff --git a/docs/vpn/umn/vpn_faq_0057.html b/docs/vpn/umn/vpn_faq_0057.html deleted file mode 100644 index 1fde869a..00000000 --- a/docs/vpn/umn/vpn_faq_0057.html +++ /dev/null @@ -1,11 +0,0 @@ - - -

What Do I Do If I Cannot Access My Data Center or LAN from the ECSs After a VPN Connection Has Been Set Up?

-

Check whether you have properly configured the firewall policies for the access from the public IP address of the cloud VPN to the public IP address of your data center or LAN. No policies are configured to limit the access by default.

-
-
- -
- diff --git a/docs/vpn/umn/vpn_faq_0058.html b/docs/vpn/umn/vpn_faq_0058.html deleted file mode 100644 index 8d893dad..00000000 --- a/docs/vpn/umn/vpn_faq_0058.html +++ /dev/null @@ -1,12 +0,0 @@ - - -

Does a VPN Allow for Communication Between Two VPCs?

-

If the two VPCs are in the same region, you can use a VPC peering connection to enable communication between them.

-

If the two VPCs are in different regions, you can use a VPN to enable communication between the VPCs. The CIDR blocks of the two VPCs are the local and remote subnets, respectively.

-
-
- -
- diff --git a/docs/vpn/umn/vpn_qs_00003.html b/docs/vpn/umn/vpn_qs_00003.html new file mode 100644 index 00000000..e6064f71 --- /dev/null +++ b/docs/vpn/umn/vpn_qs_00003.html @@ -0,0 +1,161 @@ + + +

Overview

+

The supported regions are subject to those available on the console.

+
+

Scenario

To meet business development requirements, enterprise A needs to implement communication between its on-premises data center and its VPC. In this case, enterprise A can use the VPN service to create connections between the on-premises data center and the VPC.

+
  • If the on-premises data center has only one customer gateway and this gateway can be configured with only one IP address, it is recommended that the VPN gateway uses the active-active mode. Figure 1 shows the networking.
    In active-active mode, if connection 1 fails, traffic is automatically switched to connection 2, without affecting enterprise services. After connection 1 recovers, VPN still uses connection 2 for data transmission.
    Figure 1 Active-active mode
    +
    +
  • If the on-premises data center has two customer gateways or has only one customer gateway that can be configured with two IP addresses, it is recommended that the VPN gateway use the active/standby mode. Figure 2 shows the networking.
    In active/standby mode, connection 1 is the active link and connection 2 is the standby link. By default, traffic is transmitted only through the active link. If the active link fails, traffic is automatically switched to the standby link, without affecting enterprise services. After the active link recovers, traffic is switched back to the active link.
    Figure 2 Active/Standby mode
    +
    +
+
+

Limitations and Constraints

  • The customer gateway device must support standard IKE and IPsec protocols.
  • The interconnection subnets of the on-premises data center neither overlap with those of the VPC nor contain 100.64.0.0/10 or 214.0.0.0/8.

    If the VPC uses Direct Cloud or Cloud Connect connections to communicate with other VPCs, the on-premises data center subnets cannot overlap with those of these VPCs.

    +
+
+

Data Plan

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Table 1 Data plan

Category

+

Item

+

Data

+

VPC

+

Subnet that needs to access the on-premises data center

+

192.168.0.0/16

+

VPN gateway

+

Interconnection subnet

+

This subnet is used for communication between the VPN gateway and VPC. Ensure that the selected interconnection subnet has four or more assignable IP addresses.

+

192.168.2.0/24

+

VPN gateway

+

HA mode

+

Active-active

+

VPN gateway

+

EIP

+

EIPs are automatically generated when you buy them. By default, a VPN gateway uses two EIPs. In this example, the EIPs are as follows:

+
  • Active EIP: 11.xx.xx.11
  • Active EIP 2: 11.xx.xx.12
+

VPN connection

+

Tunnel interface address

+

This address is used by a VPN gateway to establish an IPsec tunnel with a customer gateway. At the two ends of the IPsec tunnel, the configured local and remote tunnel interface addresses must be reversed.

+
  • VPN connection 1: 169.254.70.1/30
  • VPN connection 2: 169.254.71.1/30
+

On-premises data center

+

Subnet that needs to access the VPC

+

172.16.0.0/16

+

Customer gateway

+

Gateway IP address

+

The gateway IP address is assigned by a carrier. In this example, the gateway IP address is:

+

22.xx.xx.22

+

Customer gateway

+

Tunnel interface address

+
  • VPN connection 1: 169.254.70.2/30
  • VPN connection 2: 169.254.71.2/30
+
+
+
+

Operation Process

Figure 3 shows the process of using the VPN service to enable communication between an on-premises data center and a VPC.

+
Figure 3 Operation process
+ +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Table 2 Operation process description

No.

+

Step

+

Description

+

1

+

Step 1: Creating a VPN Gateway

+

Bind two EIPs to the VPN gateway.

+

If you have purchased EIPs, you can directly bind them to the VPN gateway.

+

2

+

Step 2: Creating a Customer Gateway

+

Configure the VPN device in the on-premises data center as the customer gateway.

+

3

+

Step 3: Creating VPN Connection 1

+

Create a VPN connection between the active EIP of the VPN gateway and the customer gateway.

+

4

+

Step 4: Creating VPN Connection 2

+

Create a VPN connection between active EIP 2 of the VPN gateway and the customer gateway.

+

It is recommended that the routing mode, PSK, IKE policy, and IPsec policy settings of the two VPN connections be the same.

+

5

+

Step 5: Configuring the Customer Gateway Device

+
  • The local and remote tunnel interface addresses configured on the customer gateway device must be the same as the customer and local tunnel interface addresses of the VPN connection, respectively.
  • The routing mode, PSK, IKE policy, and IPsec policy settings on the customer gateway device must be same as those of the VPN connection.
+

6

+

Step 6: Verifying Network Connectivity

+

Log in to an ECS and run the ping command to verify the network connectivity.

+
+
+
+
+
+ +
+ + + \ No newline at end of file diff --git a/docs/vpn/umn/vpn_qs_00007.html b/docs/vpn/umn/vpn_qs_00007.html new file mode 100644 index 00000000..8321bef2 --- /dev/null +++ b/docs/vpn/umn/vpn_qs_00007.html @@ -0,0 +1,65 @@ + + +

Step 2: Creating a Customer Gateway

+

Procedure

  1. In the navigation pane on the left, choose Virtual Private Network > Enterprise – Customer Gateways.
  2. On the Customer Gateways page, click Create Customer Gateway.
  3. Set parameters as prompted and click OK.

    The following describes only key parameters.

    + +
    + + + + + + + + + + + + + + + + + + + + + + + + + +
    Table 1 Customer gateway parameters

    Parameter

    +

    Description

    +

    Example Value

    +

    Name

    +

    Name a customer gateway.

    +

    cgw-001

    +

    Routing Mode

    +

    Set the routing mode of the customer gateway.

    +

    The options include Dynamic (BGP) and Static.

    +

    Static

    +

    Gateway IP Address

    +

    Enter the IP address of the customer gateway.

    +

    IP Address, 22.xx.xx.22

    +

    BGP ASN

    +

    The BGP ASN needs to be specified only when Routing Mode is set to Dynamic (BGP).

    +

    Enter the ASN of your on-premises data center or private network.

    +

    The BGP ASN of the customer gateway must be different from that of the VPN gateway.

    +

    65000

    +

    Advanced Settings > Tags

    +

    Configure Tags in Advanced Settings.

    +

    -

    +
    +
    +

+
+

Verification

Check the created customer gateway on the Customer Gateways page.

+
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_qs_00008.html b/docs/vpn/umn/vpn_qs_00008.html new file mode 100644 index 00000000..4bfc5323 --- /dev/null +++ b/docs/vpn/umn/vpn_qs_00008.html @@ -0,0 +1,119 @@ + + +

Step 3: Creating VPN Connection 1

+

Procedure

  1. In the navigation pane on the left, choose Virtual Private Network > Enterprise – VPN Connections.
  2. On the VPN Connections page, click Create VPN Connection.
  3. Set parameters for VPN connection 1 as prompted and click Submit.

    The following describes only key parameters.

    + +
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Table 1 Parameter settings for VPN connection 1

    Parameter

    +

    Description

    +

    Example Value

    +

    Name

    +

    Enter the name of VPN connection 1.

    +

    vpn-001

    +

    VPN Gateway

    +

    Select the VPN gateway created in Step 1: Creating a VPN Gateway.

    +

    vpngw-001

    +

    Gateway IP Address

    +

    Select the active EIP of the VPN gateway.

    +

    11.xx.xx.11

    +

    Customer Gateway

    +

    Select the customer gateway created in Step 2: Creating a Customer Gateway.

    +

    cgw-001

    +

    VPN Type

    +

    Select Static routing.

    +

    Static routing

    +

    Customer Subnet

    +

    Enter the subnet of the on-premises data center that needs to access the VPC.

    +
    NOTE:
    • The customer subnet can overlap with the local subnet but cannot be the same as the local subnet.
    • A customer subnet cannot be included in the existing subnets of the VPC associated with the VPN gateway. It also cannot be the destination address in the route table of the VPC associated with the VPN gateway.
    • Customer subnets cannot be the reserved CIDR blocks of VPCs, for example, 100.64.0.0/10 or 214.0.0.0/8.
    • If the interconnection subnet is associated with an ACL rule, ensure that the ACL rule permits the TCP port for traffic between all local and customer subnets.
    • Address groups cannot be used to configure the source and destination subnets in a policy on customer gateway devices.
    +
    +

    172.16.0.0/16

    +

    Interface IP Address Assignment

    +

    The options include Manually specify and Automatically assign.

    +

    Manually specify

    +

    Local Tunnel Interface Address

    +

    Specify the tunnel interface address configured on the VPN gateway.

    +
    NOTE:

    The local and remote interface addresses configured on the customer gateway device must be the same as the values of Customer Tunnel Interface IP Address and Local Tunnel Interface IP Address, respectively.

    +
    +

    169.254.70.2/30

    +

    Customer Tunnel Interface Address

    +

    Specify the tunnel interface address configured on the customer gateway device.

    +

    169.254.70.1/30

    +

    Link Detection

    +

    This function is used for route reliability detection in multi-link scenarios.

    +
    NOTE:

    When enabling this function, ensure that the customer gateway supports ICMP and is correctly configured with the customer interface IP address of the VPN connection. Otherwise, VPN traffic will fail to be forwarded.

    +
    +

    NQA enabled

    +

    PSK, Confirm PSK

    +

    Specify the negotiation key of the VPN connection.

    +

    The PSKs configured on the VPN console and the customer gateway device must be the same.

    +

    Test@123

    +

    Policy Settings

    +

    Configure the IKE and IPsec policies, which define the encryption algorithms used by the VPN tunnel.

    +

    The policy settings on the VPN console and the customer gateway device must be the same.

    +

    Default

    +
    +
    +

+
+

Verification

Check the created VPN connection on the VPN Connections page. The initial state of the VPN connection is Creating. As the customer gateway device has not been configured, no VPN connection can be established. After about 2 minutes, the VPN connection state changes to Not connected.

+
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_ug_00001.html b/docs/vpn/umn/vpn_ug_00001.html new file mode 100644 index 00000000..bf5e550b --- /dev/null +++ b/docs/vpn/umn/vpn_ug_00001.html @@ -0,0 +1,25 @@ + + +

Enterprise Edition VPN Gateway Management

+
+ + diff --git a/docs/vpn/umn/vpn_ug_00002.html b/docs/vpn/umn/vpn_ug_00002.html new file mode 100644 index 00000000..0f19358c --- /dev/null +++ b/docs/vpn/umn/vpn_ug_00002.html @@ -0,0 +1,26 @@ + + +

Viewing a VPN Gateway

+

Scenario

After creating a VPN gateway, you can view its details.

+
+

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Click in the upper left corner of the page, and choose Network > Virtual Private Network.
  4. In the navigation pane on the left, choose Virtual Private Network > Enterprise – VPN Gateways.
  5. On the VPN Gateways tab page, view the VPN gateway list.
  6. Click the name of a VPN gateway to view its details.
    • For a VPN gateway of the public network type, you can view the basic information and EIPs.
    • For VPN gateways of the private network type, you can view the basic information and advanced settings.
    +
    Figure 1 Viewing a VPN gateway
    +
    Figure 2 Viewing details about a VPN gateway
    +
+

In the VPN gateway list, you can click a public IP address in the Gateway IP Address column of a VPN gateway to go to the EIP page, where you can check EIP metrics by clicking .

+
+
+
+ + + + \ No newline at end of file diff --git a/docs/vpn/umn/vpn_ug_00003.html b/docs/vpn/umn/vpn_ug_00003.html new file mode 100644 index 00000000..42654e76 --- /dev/null +++ b/docs/vpn/umn/vpn_ug_00003.html @@ -0,0 +1,102 @@ + + +

Modifying a VPN Gateway

+

Scenario

You can modify basic information about a VPN gateway, including the name and local subnet.

+
+

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Click in the upper left corner of the page, and choose Network > Virtual Private Network.
  4. In the navigation pane on the left, choose Virtual Private Network > Enterprise – VPN Gateways.
  5. Locate the row that contains the target VPN gateway, and click Modify Basic Information in the Operation column.

    To modify only the name of a VPN gateway, you can also click on the right of the VPN gateway name.

    +
  6. Modify the name and local subnet of the VPN gateway as prompted.
  7. Click OK.
+
Figure 1 Modifying a VPN gateway
+

Table 1 describes the parameters for modifying the VPN gateway.

+ +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Table 1 Parameters for modifying the VPN gateway

Parameter

+

Description

+

Modifiable or Not

+

Name

+

Name of a VPN connection. The value can contain only letters, digits, underscores (_), hyphens (-), and periods (.).

+

Y

+

Local Subnet

+

VPC subnets with which your on-premises data center needs to communicate through the customer gateway.

+

Y

+

Region

+

For low network latency and fast resource access, select the region nearest to your target users.

+

Resources cannot be shared across regions.

+

N

+

Associate With

+

Select VPC.

+

N

+

VPC

+

VPC that the on-premises data center needs to access.

+

N

+

Interconnection Subnet

+

This subnet is used for communication between the VPN gateway and VPC. Ensure that the selected interconnection subnet has four or more assignable IP addresses.

+

N

+

BGP ASN

+

BGP AS number.

+

N

+

Specification

+

Three options are available: Basic, Professional 1 and Professional 2.

+

N

+

AZ

+

An AZ is a geographic location with independent power supply and network facilities in a region. AZs in the same VPC are interconnected through private networks and are physically isolated.

+
  • If two or more AZs are available, select two AZs.

    The VPN gateway deployed in two AZs has higher availability. You are advised to select the AZs where resources in the VPC are located.

    +
  • If only one AZ is available, select this AZ.
+

N

+
+
+
+
+ + + + \ No newline at end of file diff --git a/docs/vpn/umn/vpn_ug_00004.html b/docs/vpn/umn/vpn_ug_00004.html new file mode 100644 index 00000000..222898db --- /dev/null +++ b/docs/vpn/umn/vpn_ug_00004.html @@ -0,0 +1,26 @@ + + +

Binding an EIP to a VPN Gateway

+

Scenario

You can bind EIPs to a VPN gateway that has been created.

+
+

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Click in the upper left corner of the page, and choose Network > Virtual Private Network.
  4. In the navigation pane on the left, choose Virtual Private Network > Enterprise – VPN Gateways.
  5. Locate the row that contains the target VPN gateway, and click Bind EIP in the Operation column.
    • If the VPN gateway uses the active-active mode, the VPN gateway can have an active EIP and active EIP 2 bound.
    • If the VPN gateway uses the active/standby mode, the VPN gateway can have an active EIP and a standby EIP bound.
    +
  6. Select the desired EIP and click OK.
+
Figure 1 Binding the active EIP in active-active mode
+
Figure 2 Binding active EIP 2 in active-active mode
+
Figure 3 Binding the active EIP in active/standby mode
+
Figure 4 Binding the standby EIP in active/standby mode
+
+
+ + + + \ No newline at end of file diff --git a/docs/vpn/umn/vpn_ug_00007.html b/docs/vpn/umn/vpn_ug_00007.html new file mode 100644 index 00000000..117c99f0 --- /dev/null +++ b/docs/vpn/umn/vpn_ug_00007.html @@ -0,0 +1,25 @@ + + +

Deleting a VPN Gateway

+

Scenario

You can delete a VPN gateway that is no longer required.

+
+

Notes and Constraints

  • The delete operation is not supported for a VPN gateway that is being created, updated, or deleted.
  • If a VPN gateway has VPN connections configured, you need to delete all the VPN connections before deleting the VPN gateway.

    For details about how to delete a VPN connection, see Deleting a VPN Connection.

    +
+
+

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Click in the upper left corner of the page, and choose Network > Virtual Private Network.
  4. In the navigation pane on the left, choose Virtual Private Network > Enterprise – VPN Gateways.
  5. If the number of bound EIPs is less than or equal to 1, choose More > Delete in the Operation column of the target VPN gateway.

    If the number of bound EIPs is greater than 1, click Delete in the Operation column of the target VPN gateway.

    +
  6. In the displayed dialog box, click Yes.
+
+
+ + + + \ No newline at end of file diff --git a/docs/vpn/umn/vpn_ug_00008.html b/docs/vpn/umn/vpn_ug_00008.html new file mode 100644 index 00000000..cc845709 --- /dev/null +++ b/docs/vpn/umn/vpn_ug_00008.html @@ -0,0 +1,21 @@ + + +

Customer Gateway Management of Enterprise Edition VPN

+
+ + diff --git a/docs/vpn/umn/vpn_ug_00009.html b/docs/vpn/umn/vpn_ug_00009.html new file mode 100644 index 00000000..1536f2b1 --- /dev/null +++ b/docs/vpn/umn/vpn_ug_00009.html @@ -0,0 +1,24 @@ + + +

Viewing a Customer Gateway

+

Scenario

After creating a customer gateway, you can view its details.

+
+

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Click in the upper left corner of the page, and choose Network > Virtual Private Network.
  4. In the navigation pane on the left, choose Virtual Private Network > Enterprise – Customer Gateways.
  5. On the Customer Gateways page, view the customer gateway list.
  6. Click the name of a customer gateway to view its details.
    • In the Basic Information area, you can view the Name, ID, Routing Mode, BGP ASN, Gateway IP Address, and VPN Connection of the customer gateway.
    +
    Figure 1 Viewing a customer gateway
    +

    +
+
+
+ + + + \ No newline at end of file diff --git a/docs/vpn/umn/vpn_ug_00010.html b/docs/vpn/umn/vpn_ug_00010.html new file mode 100644 index 00000000..2d7d8fd2 --- /dev/null +++ b/docs/vpn/umn/vpn_ug_00010.html @@ -0,0 +1,55 @@ + + +

Modifying a Customer Gateway

+

Scenario

After creating a customer gateway, you can modify its name.

+
+

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Click in the upper left corner of the page, and choose Network > Virtual Private Network.
  4. In the navigation pane on the left, choose Virtual Private Network > Enterprise – Customer Gateways.
  5. On the Customer Gateways page, click next to the name of a customer gateway.
  6. Enter a new name for the customer gateway and click OK.
    Table 1 describes the parameters related to customer gateway modification. +
    + + + + + + + + + + + + + + + + + +
    Table 1 Parameters related to customer gateway modification

    Parameter

    +

    Description

    +

    Modifiable or Not

    +

    Name

    +

    Name of a VPN connection. The value can contain only letters, digits, underscores (_), hyphens (-), and periods (.).

    +

    Y

    +

    BGP ASN

    +
    The BGP ASN needs to be specified only when Routing Mode is set to Dynamic (BGP).

    N

    +

    Gateway IP Address

    +

    IP address used by the customer gateway to communicate with the VPN gateway. The value must be a static address.

    +

    Ensure that UDP port 4500 is permitted in a firewall rule on the customer gateway in your on-premises data center or private network.

    +

    N

    +
    +
    +
    +
+
+
+ + + + \ No newline at end of file diff --git a/docs/vpn/umn/vpn_ug_00011.html b/docs/vpn/umn/vpn_ug_00011.html new file mode 100644 index 00000000..ba968ce9 --- /dev/null +++ b/docs/vpn/umn/vpn_ug_00011.html @@ -0,0 +1,23 @@ + + +

Deleting a Customer Gateway

+

Scenario

You can delete a customer gateway that you have created.

+
+

Notes and Constraints

Before deleting a customer gateway associated with a VPN connection, remove the customer gateway from the VPN connection.

+
+

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Click in the upper left corner of the page, and choose Network > Virtual Private Network.
  4. In the navigation pane on the left, choose Virtual Private Network > Enterprise – Customer Gateways.
  5. On the Customer Gateways page, locate the customer gateway to delete, and click Delete in the Operation column.
  6. Click Yes.
+
+
+ + + + \ No newline at end of file diff --git a/docs/vpn/umn/vpn_ug_00012.html b/docs/vpn/umn/vpn_ug_00012.html new file mode 100644 index 00000000..b964cf0f --- /dev/null +++ b/docs/vpn/umn/vpn_ug_00012.html @@ -0,0 +1,23 @@ + + +

Enterprise Edition VPN Connection Management

+
+ + diff --git a/docs/vpn/umn/vpn_ug_00013.html b/docs/vpn/umn/vpn_ug_00013.html new file mode 100644 index 00000000..275e0f4b --- /dev/null +++ b/docs/vpn/umn/vpn_ug_00013.html @@ -0,0 +1,25 @@ + + +

Viewing a VPN Connection

+

Scenario

After creating a VPN connection, you can view its details.

+
+

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Click in the upper left corner of the page, and choose Network > Virtual Private Network.
  4. In the navigation pane on the left, choose Virtual Private Network > Enterprise – VPN Connections.
  5. On the VPN Connections page, view the VPN connection list.
  6. Click the name of a VPN connection to view its basic information and policy configuration.
+
Figure 1 Viewing a VPN connection
+

+
  • In the VPN connection list, locate the target VPN connection, and choose More > Modify Policy Settings on the right to view IKE and IPsec policies of the VPN connection.
+
+
+
+ + + + \ No newline at end of file diff --git a/docs/vpn/umn/vpn_ug_00014.html b/docs/vpn/umn/vpn_ug_00014.html new file mode 100644 index 00000000..618f2804 --- /dev/null +++ b/docs/vpn/umn/vpn_ug_00014.html @@ -0,0 +1,198 @@ + + +

Modifying a VPN Connection

+

Scenario

A VPN connection is an encrypted communications channel established between a VPN gateway in a VPC and a customer gateway in your on-premises data center. You can modify a VPN connection when required.

+
+

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Click in the upper left corner of the page, and choose Network > Virtual Private Network.
  4. In the navigation pane on the left, choose Virtual Private Network > Enterprise – VPN Connections.
  5. On the VPN Connections page, locate the VPN connection to modify, and click Modify VPN Connection or Modify Policy Settings.
  6. Modify VPN connection parameters as prompted.
  7. Click OK.
+
Figure 1 Modifying a VPN connection
+

If you change the PSK or modify the IKE or IPsec policy of a VPN connection, ensure that the new configurations are consistent with those on the customer gateway. Otherwise, the VPN connection will be interrupted.

+
+

Only some of the parameters take effect immediately after being modified, as described in Table 1.

+ +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Table 1 Time when new parameter settings take effect

Item

+

Parameter

+

When New Settings Take Effect

+

How to Modify

+

-

+

PSK

+
  • When IKEv1 is used, the new setting takes effect in the next negotiation period.
  • When IKEv2 is used, the new setting takes effect after the VPN connection is re-established.
+
  • When IKEv1 is used:

    Locate the VPN connection to modify, choose More > Reset PSK in the Operation column, and change the PSK as prompted.

    +
  • When IKEv2 is used:
    1. Delete the current VPN connection.
    2. Create a new VPN connection.
    +
+

IKEv1 policy

+
  • Encryption Algorithm
  • Authentication Algorithm
  • DH Algorithm
  • Negotiation Mode
  • Local ID
  • Customer ID
  • Lifetime (s)
+

The new settings take effect in the next negotiation period.

+

Locate the VPN connection to delete, and choose More > Modify Policy Settings in the Operation column.

+

IKEv1 policy

+

Version

+

The new setting takes effect immediately.

+

Locate the VPN connection to delete, and choose More > Modify Policy Settings in the Operation column.

+

IKEv2 policy

+
  • Encryption Algorithm
  • Authentication Algorithm
  • DH Algorithm
  • Lifetime (s)
+

The new settings take effect in the next negotiation period.

+

+

Locate the VPN connection to delete, and choose More > Modify Policy Settings in the Operation column.

+

IKEv2 policy

+

Version

+

The new setting takes effect immediately.

+

Locate the VPN connection to delete, and choose More > Modify Policy Settings in the Operation column.

+

IKEv2 policy

+
  • Local ID
  • Customer ID
+

The new settings take effect after the VPN connection is re-established.

+
  1. Delete the current VPN connection.
  2. Create a new VPN connection.
+

IPsec policy

+
  • Encryption Algorithm
  • Authentication Algorithm
  • PFS
  • Lifetime (s)
+

The new settings take effect in the next negotiation period.

+

Locate the VPN connection to delete, and choose More > Modify Policy Settings in the Operation column.

+

IPsec policy

+

Transfer Protocol

+

This parameter cannot be modified on the management console.

+

Locate the VPN connection to delete, and choose More > Modify Policy Settings in the Operation column.

+
+
+

Table 2 describes the parameters related to VPN connection modification.

+ +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Table 2 Parameters related to VPN connection modification

Parameter

+

Description

+

Modifiable or Not

+

Name

+

Name of a VPN connection. The value can contain only letters, digits, underscores (_), hyphens (-), and periods (.).

+

Y

+

Customer Gateway

+

Gateway used for communicating with a VPC through VPN.

+

Y

+

Customer Subnet

+

Subnet in the on-premises data center that needs to access the VPC.

+

Y

+

Policy Settings

+

There are IKE and IPsec policies.

+

Y

+

PSK

+

The PSKs configured for the VPN gateway and customer gateway must be the same.

+

Y

+

VPN Gateway

+

VPN gateway that has been created.

+

N

+

Gateway IP Address

+

IP address used by the customer gateway to communicate with the VPN gateway. The value must be a static address.

+

Ensure that UDP port 4500 is permitted in a firewall rule on the customer gateway in your on-premises data center or private network.

+

N

+

Interface IP Address Assignment

+

Mode in which IP addresses of the local and customer interfaces are assigned. The options include Manually specify and Automatically assign.

+

N

+

Local Tunnel Interface Address

+

Tunnel interface IP address configured on the VPN gateway.

+

N

+

Customer Tunnel Interface Address

+

Tunnel interface IP address configured on the customer gateway device.

+

N

+
+
+
+
+ + + + \ No newline at end of file diff --git a/docs/vpn/umn/vpn_ug_00016.html b/docs/vpn/umn/vpn_ug_00016.html new file mode 100644 index 00000000..db689b3e --- /dev/null +++ b/docs/vpn/umn/vpn_ug_00016.html @@ -0,0 +1,17 @@ + + +

Audit

+
+ + diff --git a/docs/vpn/umn/vpn_ug_00017.html b/docs/vpn/umn/vpn_ug_00017.html new file mode 100644 index 00000000..c07c83d8 --- /dev/null +++ b/docs/vpn/umn/vpn_ug_00017.html @@ -0,0 +1,106 @@ + + +

VPN Operations That Can Be Recorded by CTS

+
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Table 1 Enterprise Edition VPN-related operations that can be recorded by CTS

Operation

+

Resource Type

+

Trace Name

+

Creating a customer gateway

+

customer-gateway

+

createCgw

+

Updating a customer gateway

+

customer-gateway

+

updateCgw

+

Deleting a customer gateway

+

customer-gateway

+

deleteCgw

+

Creating a VPN gateway

+

vpn-gateway

+

createVgw

+

Updating a VPN gateway

+

vpn-gateway

+

updateVgw

+

Deleting a VPN gateway

+

vpn-gateway

+

deleteVgw

+

Updating the VPN gateway status

+

vpn-gateway

+

UpdateResourceState

+

Creating a VPN connection

+

vpn-connection

+

createVpnConnection

+

Updating a VPN connection

+

vpn-connection

+

updateVpnConnection

+

Deleting a VPN connection

+

vpn-connection

+

deleteVpnConnection

+

Creating a resource tag

+

instance

+

createResourceTag

+

Deleting a resource tag

+

instance

+

deleteResourceTag

+
+
+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_ug_00018.html b/docs/vpn/umn/vpn_ug_00018.html new file mode 100644 index 00000000..9b00b7f4 --- /dev/null +++ b/docs/vpn/umn/vpn_ug_00018.html @@ -0,0 +1,12 @@ + + +

Querying CTS Traces

+

After you enable CTS and the management tracker is created, CTS starts recording operations performed on VPN resources. You can view the operation records in the last seven days on the CTS console.

+

For details about how to view audit logs, see the Cloud Trace Service User Guide.

+
+
+ +
+ diff --git a/docs/vpn/umn/vpn_ug_00023.html b/docs/vpn/umn/vpn_ug_00023.html new file mode 100644 index 00000000..972b917c --- /dev/null +++ b/docs/vpn/umn/vpn_ug_00023.html @@ -0,0 +1,21 @@ + + +

Configuring Health Check

+

Scenario

After VPN connections are created, you can configure health check to enable the VPN gateway to send probe packets to the customer gateway to collect statistics about the round-trip time and packet loss rate of physical links. The statistics help you learn about the VPN connection quality. The Cloud Eye service monitors the round-trip time and packet loss rate of VPN links. For details, see Metrics (Enterprise Edition VPN).

+
+

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Click in the upper left corner of the page, and choose Network > Virtual Private Network.
  4. In the navigation pane on the left, choose Virtual Private Network > Enterprise – VPN Connections.
  5. On the VPN Connections page, click the name of the target VPN connection. On the Summary tab page, click Add in the Health Check area.
  6. In the Add Health Check dialog box, click OK.
+
+
+ + + + \ No newline at end of file