Skip to main content

Create an IPsec-VPN connection

Overview

This topic describes how to create an IPsec-VPN connection. After you create a VPN gateway and a customer gateway, you can create an IPsec-VPN connection between the two gateways to encrypt data transmission.

Prerequisites

The IPsec-VPN feature is enabled when you create a VPN gateway. For more information, see Create a VPN Gateway.

Procedure

  1. On the VPN Gateways page, click the IPsec Connections tab. fg-dc-vpn-3.3.1-1
  2. On the IPsec Connections page, click the Create an IPsec Connection button. fg-dc-vpn-3.3.1-2
  3. On the Create IPsec Connection page, configure the IPsec connection based on the following information.
ParameterDescription
OrganizationSelect the organization to which the IPsec-VPN connection belongs.
Resource SetSelect the resource set to which the IPsec-VPN connection belongs.
RegionSelect the region to which the IPsec-VPN connection belongs.
Note Make sure that the IPsec-VPN connection and the VPN gateway to be connected are deployed in the same region.
ZoneSelect the zone to which the IPsec-VPN connection belongs.
NameEnter a name for the IPsec-VPN connection.
The name must be 2 to 100 characters in length, and can contain digits, underscores (_), and hyphens (-). It must start with a letter.
VPN GatewaySelect the VPN gateway to be connected through the IPsec-VPN connection.
Customer GatewaySelect the customer gateway to be connected through the IPsec-VPN connection.
Local CIDR BlockEnter the CIDR block on the virtual private cloud (VPC) side. The CIDR block is used in Phase 2 negotiations.
If you use IKEv2, you can specify multiple local CIDR blocks . Separate CIDR blocks with commas (,).
Peer CIDR BlockEnter the CIDR block on the data center side. This CIDR block is used in Phase 2 negotiations.
If you use IKEv2, you can specify multiple peer CIDR blocks . Separate CIDR blocks with commas (,).
Effective ImmediatelySpecify whether to immediately start negotiations for the connection.
● Yes : starts negotiations after the configuration is complete.
● No (default): starts negotiations when inbound traffic is detected.
Advanced SettingsSelect the type of advanced settings.
Default : Use the default advanced settings.
Configure : Use custom settings.
Pre-shared KeyEnter the pre-shared key used for authentication between the VPN gateway and the customer gateway. You can specify a key, or use the key that is randomly generated by the system.
By default, the system generates a 16-character string. To establish an IPsec- VPN connection, you must use the same key for the local side and the peer's side.
VersionSelect an IKE version.
● ikev1 (default)
● ikev2
IKEv1 and IKEv2 are supported. Compared with IKEv1, IKEv2 simplifies the security association (SA) negotiation process and provides better support for scenarios in which multiple CIDR blocks are used. We recommend that you select IKEv2.
Negotiation ModeSelect a negotiation mode.
main (default): This mode offers higher security during negotiations
. Aggressive : This mode is faster and has a higher success rate.
Connections negotiated in both modes ensure the same security level of data transmission.
Encryption AlgorithmSelect the encryption algorithm that is used in Phase 1 negotiations . Supported algorithms are aes (default), aes192 , aes256 , des , and 3des.
Authentication AlgorithmSelect the authentication algorithm that is used in Phase 1 negotiations. Valid values: sha1 and md5 (default).
DH GroupSelect the DH key exchange algorithm that is used in Phase 1 negotiations.
● group1 : DH group 1
● group2 : DH group 2 (default)
● group5 : DH group 5
● group14 : DH group 14
SA Life Cycle(Seconds)Specify the SA lifecycle after Phase 1 negotiations succeed. Valid values: 0 to 86400. Unit : seconds . Default value: 86400.
LocalIdSpecify the identifier of the VPN gateway. The identifier is used in Phase 1 negotiations. The default value is the public IP address of the VPN gateway. If you set LocalId to a value in the fully qualified domain name (FQDN) format, we recommend that you set Negotiation Mode to aggressive.
RemoteIdSpecify the identifier of the customer gateway. The identifier is used in Phase 1 negotiations. The default value is the public IP address of the customer gateway. If you set RemoteId to a value in the FQDN format, we recommend that you set Negotiation Mode to aggressive.
Encryption AlgorithmSelect the encryption algorithm that is used in Phase 2 negotiations. Supported algorithms are aes (default), aes192 , aes256 , des , and 3des.
Authentication AlgorithmSelect the authentication algorithm that is used in Phase 2 negotiations. Valid values: sha1 and md5 (default).
DH GroupSelect the DH key exchange algorithm that is used in Phase 2 negotiations . disabled : does not use a DH key exchange algorithm.
For clients that do not support perfect forward secrecy (PFS), select disabled.
If you select a value other than disabled , the PFS feature is enabled by default, which requires a key update for every renegotiation. Therefore, you must also enable PFS for the client.
● group1 : DH group 1
● group2 : DH group 2 (default)
● group5 : DH group 5
● group14 : DH group 14
SA Life Cycle(Seconds)Specify the SA lifecycle after Phase 2 negotiations succeed. Valid values: 0 to 86400. Unit : seconds . Default value: 86400.
  1. On the Create IPsec Connection page, click the Submit button. fg-dc-vpn-3.3.1-3
    fg-dc-vpn-3.3.1-4
  2. Once the IPsec Connection is successfully created, its IPsec Connection has been updated as shown. fg-dc-vpn-3.3.1-5