知識庫

How to Create a Virtual Private Network in Public Cloud/Dedicated Cloud.

  • how to create a virtual private network, how to create a vpn, how to create vpn in public cloud, how to create vpn, vpn, how to create virtual private network, virtual private network, virtual private network in cloud
  • 0

How to Create a Virtual Private Network in Public Cloud/Dedicated Cloud.

  1. Log in to your Sharktech Client Area and click on "My Services".





  2. Select Public Cloud Hosting.





  3. At the top of your page, click the button "Panel Login." Click on it.





  4. A new window or tab will be opened, asking for your Username and Password.





  5. Enter your Username and password from the "Access Information" section of the Client Area.





  6. In the left pane, you will see the "Compute" option. Click on it.





  7. On the left pane, there are all the service options, click on "VPN" and on right click "Add VPN".





  8. On the Configure IKE step, specify parameters for the IKE policy that will be used to establish a VPN connection. You can choose to use an existing IKE policy or create a new one. For the new IKE policy, do the following:

    1. Specify a custom name for the IKE policy.
    2. Specify the key lifetime, in seconds, that will define the rekeying interval. The IKE key lifetime must be greater than that of the IPsec key.
    3. Select the authentication algorithm that will be used to verify the data integrity and authenticity.
    4. Select the encryption algorithm that will be used to ensure that data is not viewable while in transit.
    5. Select the IKE version 1 or 2. Version 1 has limitations, for example, it does not support multiple subnets.
    6. Select the Diffie-Hellman (DH) group that will be used to build the encryption key for the key exchange process. Higher group numbers are more secure but require additional time for the key to compute.
    7. Click Next.





  9. On the Configure IPsec step, specify parameters for the IPsec policy that will be used to encrypt the VPN traffic. You can choose to use an existing IPsec policy or create a new one. For the new IPsec policy, do the following:

    1. Specify a custom name for the IPsec policy.
    2. Specify the key lifetime, in seconds, that will define the rekeying interval. The IPsec key lifetime must not be greater than that of the IKE key.
    3. Select the authentication algorithm that will be used to verify the data integrity and authenticity.
    4. Select the encryption algorithm that will be used to ensure that data is not viewable while in transit.
    5. Select the Diffie-Hellman (DH) group that will be used to build the encryption key for the key exchange process. Higher group numbers are more secure but require additional time for the key to compute.
    6. Click Next.



     

  10. On the Create endpoint groups step, select a virtual router and specify local and remote subnets that will be connected by the VPN tunnel. You can choose to use existing local and remote endpoints, or create new ones. For the new endpoints, do the following:

    1. Specify a custom name for the local endpoint, and then select local subnets.
    2. Specify a custom name for the remote endpoint, and then add remote subnets in the CIDR format.
    3. Click Next.

     



  11. On the Configure VPN step, specify parameters to establish the VPN connection with a remote gateway:

    1. Specify a custom name for the VPN connection.
    2. Specify the public IPv4 address of the remote gateway, that is, peer IP address.
    3. Generate the pre-shared key that will be used for the peer authentication.
    4. If necessary, you can also configure additional settings by selecting Advanced settings and specifying the following parameters:

      • The peer ID for authentication and the mode for establishing a connection.
      • The Dead Peer Detection (DPD) policy, interval, and timeout, in seconds.
    5. Click Next.





  12. On the Summary step, review the configuration, and then click Create.





  13. When the VPN connection is created, its status will change from "Pending creation" to "Down". The connection will become active once the VPN tunnel is configured by the other VPN party and the IKE authorization is successful.





  14. You're Done.

IMPORTANT NOTE: The IKE and IPsec configuration must match for both communicating parties. Otherwise, the VPN connection between them will not be established.

If you still need any help, please feel free to Submit Ticket to our Cloud Hosting Section.

 


這篇文章有幫助嗎?