Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 14 Next »

The platform enables you to create VPNs between virtual datacenter networks, and other entities. These VPNs use the IPsec framework.

To work with VPNs, go to Virtual datacenters → select a Virtual datacenter → Network → VPN

Initial support for VPNs requires you to create a VPN entity for each side of a VPN that connects to virtual datacenter network. Both sides of a VPN must have the same encryption and authentication settings, and inverse local and remote network configurations.

The following table describes VPN functionality in the providers.


AWSVMware NSX
EncryptionAESAES, AES256, Triple DES, AES-GCM
Perfect forward secrecy enabledmandatoryoptional
DH groupDH2DH2, DH5, DH14
AuthenticationPSK (mandatory)PSK (mandatory)

It may be helpful to complete this table to record your network values before you create your VPN:

VDC nameVDC1 ________________VDC2 ________________
VPN entity name

NAT IP



Private networks



For example:

VDC nameVDC1 ________________VDC2 ________________
VPN entity nameaxsdTOaxsd2axsd2TOaxsd

NAT IP

10.200.100.810.200.100.23
Private networks
  • 192.168.0.0/24
  • 192.168.200.0/24


To work with VPNs from private cloud to public cloud, define the VPN entity in private cloud first. 

To create the first VPN entity:

  1. Go to Virtual datacenters → select a Virtual datacenter → Network → VPN
  2. Click the + Add button and enter the VPN details

The platform will create the VPN entity.

Unable to render {include} The included page could not be found.

To create the other side of the VPN in another VDC:

  1. Select the Virtual datacenter
  2. Add another VPN entity using the remote network configuration of the first VPN as the local values. 

So in this example, the local network endpoint for the second VPN entity would be 10.200.100.23 and the local network would be 192.168.200.0/24. The remote endpoint would be 10.200.100.8 and the remote network would be 192.168.0.0/24. 

 Click here to expand...

After you have created both sides of the VPN, on the VPNs tab, to check the connection in the network virtualization system, click the Check link in the VPN Status column, or when you edit the VPN.

  • No labels