The platform enables you to create site-to-site VPNs between virtual datacenters and other virtual datacenters or other entities.
This feature is available in datacenters using VMware with NSX-NAT or NSX-gateway.
To manage VPNs, go to Virtual datacenters → select a virtual datacenter → Network → VPN
Initial support for VPNs is per VDC, which means you need to create a separate VPN site for each connected virtual datacenter. Both sites of a VPN must have the same encryption and authentication settings, and inverse local and remote network configurations.
The following table describes VPN functionality in the providers.
AWS | VMware NSX | Azure | |
---|---|---|---|
Encryption | AES | AES, AES256, Triple DES, AES-GCM | AES128_SHA1, AES128_SHA256, AES256_SHA1, |
Perfect forward secrecy enabled | always enabled | optional | always disabled |
DH group | DH2 | DH2, DH5, DH14 | DH2, DH14 |
Authentication | PSK (mandatory) | PSK (mandatory) | PSK (mandatory) |
To connect private cloud with public cloud, define the VPN site in private cloud first.
Tip |
---|
|
To create the VPN site for site1:
Go to Virtual datacenters → select a virtual datacenter → Network → VPN
Click the + add button and enter the VPN details
The platform will create the VPN site.
Expand | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||||||||
|
To create the VPN site for site2 in another VDC:
Select the Virtual datacenter
Add another VPN site using the same encryption and authentication settings, and the remote network configuration of the first VPN site as the local values.
After you have created both VPN sites, on the VPNs tab, to check the connection in the network virtualization system, click the Check link in the VPN Status column, or when you edit a VPN site.