Skip to main content

Site-to-Site VPNs

In eCloud VPC you have the ability to set up Site-to-Site IPsec VPNs (Virtual Private Networks). These can be used to enable connectivity from external networking devices or between different eCloud VPC Routers.

VPNs can be set up between eCloud VPC Routers which are in the same or different AZ/Region.

How to setup a VPN

Select the region you want to create the VPN in using the dropdown on the left hand menu and navigate to the VPNs section also on the left hand menu.

vpn view

VPNs in eCloud VPC consist of three different parts, a VPN Service, Endpoint and Session. These are explained in more detail in the below sections.

Services

A VPN Service has a one-to-one mapping with a Router in eCloud VPC. This means if you want to have a VPN to two different eCloud VPC Routers, you will need to create a separate VPN Service for each of them.

To create, select “Create Service”, choose a name, select the relevant VPN and Router, then select “Create Service”.

vpn service

Endpoints

A VPN Endpoint is where the IPsec VPN will terminate at the eCloud VPC side. A VPN Endpoint has a One-to-One mapping with a VPN Service, but you can have multiple Endpoints mapped to the same Service.

A VPN Endpoint is also where the FIP (external IP) is assigned.

To create, select “Create Endpoint”, choose a name and select the VPN Service you would like this Endpoint to be mapped to. You then have the option to choose either an existing Floating IP (external IP) or request a new one. Finally, select “Create Endpoint” to create the VPN Endpoint (this could take a few minutes to complete).

vpn endpoint

Sessions

A VPN Session has to map to a specific VPN Endpoint and the associated Service. This is the object which will contain all of the configuration required to set up the VPN tunnel on the eCloud VPC side.

To create, select “Create Session”, choose a name and then select the VPN Service and Endpoint you would like this Session to use.

The Profile Group defines what encryption settings are applied, such as the Ciphers. It is critical that the profile used in eCloud VPC matches the configuration of the remote device or the tunnel will not establish. We have a range of generic profiles which are detailed here.

The Local IP (external) will automatically be selected, as it is defined in the Endpoint you will have already created.

The “Remote IP” will be the external IP of the device you are setting up a VPN connection to. This will either be an external device or the external IP of a different eCloud VPC Endpoint.

The “Local Networks” are the local eCloud VPC internal IPs and/or Subnets, which you would like to be part of this VPN Tunnel. These can only include IPs or Subnets, which are defined on networks associated with the Router the Service is linked to. It is critical that these match the configuration on the remote device.

The “Remote Networks” are the internal IPs and/or Subnets from the remote site, which you would like to be part of this VPN Tunnel. It is critical that these match the configuration on the remote device.

A “Pre-Shared Key (PSK)” needs to be defined, which will need to match the PSK on the remote device.

vpn session

Profile Groups

There have been a range of VPN Profiles created, which have various levels of encryption settings. Details of these can be seen in the following table. If you need any advise on which VPN profiles to use, please get in touch with our support team.

Phase One Settings

Profile NameIKE VersionPhase 1 - EncryptionPhase 1 - IntegrityPhase 1 - DH GroupPhase 1 - PRFPhase 1 - SA Lifetime
IKEv1 WeakIKEv1AES-128SHA-12N/A86400
IKEv1 MediumIKEv1AES-256SHA-2565N/A28800
IKEv2 MediumIKEv2AES-256SHA-25614SHA-25686400
IKEv2 StrongIKEv2AES-256SHA-25619SHA-25628800
IKEv2 StrongestIKEv2AES-256-GCMN/A21SHA-51228800
Cisco - ASAIKEv2AES-256SHA-51221SHA-51286400
Cisco - ASA (Legacy)IKEv1AES-256SHA-15SHA-186400
Netgate - pfSenseIKEv2AES-256SHA-25614SHA-25628800

Phase Two Settings

Profile NamePhase 2 - EncryptionPhase 2 - IntegrityPhase 2 - SA LifetimePhase 2 - PFS
IKEv1 WeakAES-128SHA-128800No
IKEv1 MediumAES-256SHA-136005
IKEv2 MediumAES-256SHA-2562880014
IKEv2 StrongAES-256SHA-256360019
IKEv2 StrongestAES-256-GCMN/A360021
Cisco - ASAAES-256SHA-5122880021
Cisco - ASA (Legacy)AES-256SHA-1288005
Netgate - pfSenseAES-128, AES-128-GCMSHA-256360014