Skip to main content

VPN Customer Gateway

A VPN Customer Gateway represents the remote endpoint in a Site-to-Site VPN connection between your Virtual Private Cloud (VPC) and an external network such as an on-premises data center or another cloud provider.

This gateway is a critical component that defines how your cloud-based VPC communicates securely with your remote network by specifying public IP, authentication methods, encryption policies, and remote subnets.

This guide provides step-by-step instructions to create and manage a VPN Customer Gateway using the Cloud Management Portal.


Use Case

You should configure a VPN Customer Gateway when:

  • You need to establish a Site-to-Site VPN from a cloud VPC to an on-premises environment.

  • You are connecting to a third-party network or service provider via a secure tunnel.

  • You require encrypted, reliable, and scalable connectivity between your cloud environment and an external private network.


Prerequisites

Before creating a Customer Gateway, ensure you have the following information from your network/security team or the third-party VPN device provider:

  • Public IP address of the remote VPN device (gateway)

  • Remote private subnets in CIDR format

  • IKE and ESP configuration parameters (encryption, hashing, DH group)

  • Pre-shared key (PSK) for authentication

  • Lifetime values for IKE and ESP (in seconds)

  • Optional: Advanced security options (DPD, UDP encapsulation, etc.)


1. Accessing the VPC Gateway Section :

  • Log in to your Cloud Management Portal using your authorized credentials.

  • From the left navigation pane, go to:

    NetworkVPC Gateway

  • You will see a list of existing Customer Gateways already configured in your account.

2. Add a New VPN Customer Gateway :

  • Click on the Add VPN button located at the top-right of the screen.
  • A new form will appear in a popup window prompting you to enter configuration parameters.

3. Enter VPN Gateway Configuration Details :

Fill in the following fields as per your network requirement:

S. NoFieldDescription
1NameEnter a unique name to identify this VPN Customer Gateway.
2GatewayThe public IP address of the remote VPN device (e.g., 203.0.113.45).
3CIDR ListA comma-separated list of remote private networks in CIDR notation (e.g., 192.168.0.0/24, 10.10.0.0/16).
4IPSec Pre-shared KeyA shared secret used for VPN tunnel authentication.
5IKE EncryptionSelect the encryption algorithm used for IKE (e.g., AES-128, AES-256).
6IKE HashChoose the hash algorithm for IKE (e.g., SHA-1, SHA-256).
7IKE VersionSelect either IKEv1 or IKEv2 based on the remote VPN configuration.
8IKE DH GroupChoose the Diffie-Hellman group (e.g., Group 2, Group 14).
9ESP EncryptionSelect the encryption method for ESP (e.g., AES-128, AES-256).
10ESP HashSelect the hash method for ESP (e.g., SHA-1).
11Perfect Forward SecrecyOptional: Select a DH group if PFS is required.
12IKE LifetimeDuration (in seconds) before renegotiating the IKE tunnel (e.g., 86400).
13ESP LifetimeDuration (in seconds) before renegotiating the ESP tunnel (e.g., 3600).

4. Advanced VPN Options :

Review and enable the following options based on your security policy:

S. NoOptionDescription
1Dead Peer Detection (DPD)Enable to automatically detect if the peer is unreachable and drop the tunnel.
2Split ConnectionsAllow individual subnets to establish separate tunnels. Useful for failover or traffic isolation.
3Force UDP Encapsulation of ESP PacketsEnable this if the remote device is behind NAT or firewall and requires UDP encapsulation of ESP packets.

Note: These settings are typically determined by the capabilities and configurations of the remote VPN device.

5. Review and Submit :

  • Double-check all the entered values.

  • Click the Add button to save and create the VPN Customer Gateway.

  • After a few seconds, the new gateway will appear in your VPN Gateway list.


Using the VPN Customer Gateway in a Site-to-Site VPN

After creating the Customer Gateway, you can establish a Site-to-Site VPN Connection by:

  • Navigating to Network > VPC > [Your VPC] > Configure.
  • Selecting Site-to-Site VPN Lists under router section.
  • Creating a new VPN Connection and selecting the Customer Gateway you just created.

Note: The VPN Connection uses the information stored in the Customer Gateway to establish a secure IPsec tunnel.