This Tutorial will introduce how to establish private connection between enterprise IDC and public cloud VPC by virtue of JD Cloud IPsec VPN.
For core/non-suitable JD Cloud Onboarding businesses deployed to self-established IDC and core/extended businesses deployed to JD Cloud VPC by customers, it is necessary to open up the network environment between IDC and public cloud VPC so as to achieve intranet communication.
The segment in enterprise IDC cannot overlap with that in public cloud VPC. For the requirements for client device, refer to Use Restrictions.
a) Log into BGW Console;
b) Select the region using VPN, and click to create a border gateway;
c) The border gateway supports running BGP routing protocol. The BGP ASN of current JD Cloud & AI border gateway is fixed to 65000, which will be open to modify in the future;
For more contents, refer to Border Gateway Management.
a)Login VPC Interface Control Console;
b) Select the region using VPN, and click to create a VPC attachment;
c) Select the border gateway created in Step 1, select the VPC that passes the route traffic of this border gateway, and select the VPC segment to be transmitted to this border gateway. After the VPC attachment is created, the segment selected will be automatically added to the transmission route table of this border gateway, and the Next Hop will point to the VPC attachment created in this step;
For more contents, refer to VPC Attachment Management.
a) Log into CGW Console;
b) Select the region using VPN, and click to create a customer gateway;
c) The customer gateway is the logical representation of client VPN device on cloud, and the customer will create VPN connection based on border gateway and customer gateway. The customer gateway itself only represents relevant information of the client device (which is only related to public network address and BGP ASN and has no concept of specific geographic location
), and do not have a regional attribute theoretically. However, as almost all of the resources in cloud have regional attribute, the customer gateway is assigned with a regional attribute. The customer gateways with the same configuration can be repeatedly created in different regions without affecting each other.
d) If the client device supports BGP routing protocol, please designate BGP ASN of the client;
e) Configuration of multiple public network addresses is supported on client, and based on the consideration of business high availability, the option for double IP is defaulted to select and the option for client single IP and client four IP is supported. Among the options, client single IP is applicable for a majority of VPN interconnection scenarios, client four IP is applicable for establishing VPN connection with Amazon AWS. For details of configuration methods, refer to Connects To Amazon AWS;
For more contents, refer to Customer Gateway Management.
a)Login VPN Interface Control Console;
b) Select the region using VPN, and click to create a VPN connection;
c) Select the border gateway used to implement the cloud VPN gateway function;
d) Select the customer gateway representing the client VPN device;
e) Select the connection type. The inner and outer addresses of the tunnel can only be IPv4 address family at present and IPv6 address family is available in the future;
f) Select whether to enable BGP route or not. The BGP route is enabled by default in consideration of business high availability, so BGP sessions will be established based on border gateway and customer gateway;
g) After the VPN connection is created, two cloud public network addresses will be automatically allocated for setting up a VPN tunnel to client public network addresses;
For more contents, refer to VPN Connection Management.
a)Login VPN Interface Control Console;
b) Select the region using VPN, and select the VPN connection;
c) Click "Add Tunnel" in the "Resource Information" Tab. If it is the first time to create tunnel (no tunnel has been created for the VPN Connection as of now or all created tunnels have been deleted), the page will be initialized based on the configuration of high availability and at least two tunnels (each for the two client public network addresses respectively, which is applicable for the situation in which Customer Gateway has single and double IP) will be defaulted in accordance with the number of Customer Gateway’s public network addresses you have chosen. If Customer Gateway is a four-IP gateway, it is defaulted to initialize four tunnels (two tunnels for each of the two client public network addresses on cloud respectively). If it is not the first time to create tunnel, only one tunnel can be created each time;
d) All VPN tunnels under the same VPN connection use the same routing mode, which is the routing mode set in VPN connection;
e) Configure the parameters used by two-stage negotiation for each VPN tunnel, including IKE version, pre-shared key, gateway identifier at two ends of tunnel, tunnel inner IP (used for routing data package in tunnel), as well as authentication algorithm, encryption algorithm and SA statement cycle at the two stages;
In overall consideration of the security and performance, JD Cloud gives default tunnel IKE and IPsec configurations, so customers are recommended establishing VPN tunnels according to the recommended configurations through negotiation.
g) Based on the consideration of business high availability, you are suggested to create multiple tunnels at the same time by usage of different public network addresses on cloud so as to achieve switchover between redundancy and fault;
For more contents, refer to VPN Tunnel Management.
a) At present JD Cloud VPN Connection Console, downloading function for VPN Tunnel client configuration is not provided, and you shall refer to client configuration example for configuration of client devices, e.g. Cisco Client Configuration;
b) For the list of supported client routers/firewall devices tested, refer to Use Restrictions. There is little difference of VPN configuration items among various platforms and software versions provided by the same manufacturer, so you can set it according to the recommended client configuration of the same series that passed the test. If any question, please consult your device provider;
c) For device manufacturer models that are not listed in b, you can conduct standard IPsec configuration according to the configuration manual offered by the device manufacturer;
d)After the client VPN device configuration is completed, the cloud will take initiative to initiate a negotiation to establish a tunnel by default
, and then you can view whether the tunnel running status is updated to "UP" in JD Cloud Console. If it is "UP", the tunnel negotiation succeeded; if it is "DOWN", please refer to FAQ for fault handling;
a) JD Cloud & AI supports running EBGP routing protocol with VPN client device using a different BGP ASN from JD Cloud border gateway. For BGP ASN used by JD Cloud & AI, refer to Border Gateway ASN;
b) Tunnel's inner layer address is recommended as the interconnection address to be used by BGP, and for details, refer to Tunnel Inner Layer;
c) Other configurations of cloud BGP use the default configurations that can be modified on the client device;
d) “Whether or not BGP Route is configured, customer can configure static route on Border Gateway to forward data”, and under normal circumstances, static route is superior to BGP route. For exceptions, refer to Border Gateway Route Management.
a) JD Cloud & AI VPN connection supports using static route/BGP dynamic route between cloud and client, and using BGP dynamic route to automatically update route is recommended;
b) Configuration of different routes:
For more contents, refer to Border Gateway Route Configuration and VPC Route Configuration.
a) Log in JD Cloud Virtual Machines Console, in the region where VPN connection is created, create one Virtual Machines in the VPC to be interconnected to the IDC intranet segment of the enterprise, and confirm that the route properly connected to the IDC intranet segment of the enterprise exists in the route table of the Subnet of this Virtual Machines;
b) Use the Virtual Machines created in a to ping the intranet address of one instance in enterprise IDC intranet in order to verify whether the intranet communication is normal;
a) If client devices need to be maintained or cloud components need to be upgraded, certain tunnel shall be temporarily suspended/disconnected with the traffic flowing through tunnel being switched to other tunnels available. In order to ensure no impact on normal business, please “disable” the tunnel before disconnecting it. After completion of maintenance for client devices and upgrade for cloud components, you shall “restart”, renegotiate and re-establish the tunnel to carry business traffic;
b) Please “disable” the tunnel before changing its configuration, for example, IKE and IPsec configuration and pre-shared key of the tunnel need to be updated. After the tunnel is disabled, the original tunnel will be disconnected and its configuration will be disabled either. After the VPN tunnel on cloud and client is updated, you shall “restart” the tunnel and re-negotiate and re-establish the tunnel with new configuration;
c) The above a and b only listed operations for the tunnel. Please note: you shall remove routes of the tunnel from client devices before "disabling" the tunnel, and add the routes of the tunnel to client device after "enabling" the tunnel.
For more contents, refer to VPN Tunnel Management.
For details of billing method for VPN, refer toVPN Billing
我们的产品专家为您找到最合适的产品/解决⽅案
1v1线上咨询获取售前专业咨询
专业产品顾问,随时随地沟通