LogoLogo
Web HomeTutorialsPortal
  • Bamboozle Wiki and Documents
  • Products
    • Cloud
      • Compute
        • Managing Virtual Machines
          • Supported guest operating systems
          • Creating virtual machines
          • Connecting to virtual machines
          • Managing virtual machine power state
          • Attaching ISO images to virtual machines
          • Reconfiguring virtual machines
            • Changing virtual machine resources
            • Configuring network interfaces of virtual machines
            • Configuring virtual machine volumes
          • Monitoring virtual machines
          • Shelving virtual machines
          • Rescuing virtual machines
          • Managing guest tools
            • Installing guest tools
            • Uninstalling guest tools
          • Troubleshooting virtual machines
          • Deleting virtual machines
          • Managing SSH keys
        • Managing security groups
          • Creating and deleting security groups
          • Managing security group rules
          • Changing security group assignment
        • Managing images
          • Uploading images
          • Creating volumes from images
          • Preparing templates
            • Preparing Linux templates
            • Preparing Windows templates
            • Enabling logging for virtual machines
        • Managing volumes
          • Creating and deleting volumes
          • Attaching and detaching volumes
          • Resizing volumes
          • Creating images from volumes
          • Cloning volumes
          • Managing volume snapshots
        • Managing virtual networks
        • Managing VPN connections
          • Creating VPN connections
          • Editing VPN connections
          • Restarting and deleting VPN connections
        • Managing virtual routers
          • Managing router interfaces
          • Managing static routes
      • Managed Kubernetes
        • Creating and deleting Kubernetes clusters
      • Object Storage
        • Instances
        • How-to
          • Access Storage with S3 SDKs
          • Access Object Storage with Cyberduck
          • Access Storage with Mountainduck
        • Addtional Ressources
          • Supported Amazon S3 features
    • Servers
      • Cloud Servers
      • Dedicated Servers
    • Cyber Protect
      • Welcome to Cyber Protect
      • Supported features by OS
      • Activating the account
        • Password requirements
        • Two-factor authentication
      • Accessing the Cyber Protect service
      • The Cyber Protect console
      • Installing the software
        • Which agent do I need?
        • System requirements for agents
        • Preparation
        • Linux packages
        • Proxy server settings
        • Installing the Protection Agents
          • Downloading protection agents
          • Installing protection agents in Windows
          • Installing protection agents in Linux
          • Installing protection agents in macOS
          • Granting the required system permissions to the Connect Agent
          • Changing the logon account on Windows machines
          • Dynamic installation and uninstallation of components
    • Business Email
      • Getting started
        • DNS Records
        • Setting up a Mail Client with IMAP
        • Setting up your Mailbox with macOS, iOS, ipadOS and Android Devices
        • Configure Microsoft Outlook for Business Email
        • Zimbra Connector for Microsoft Outlook User Guide
      • Web Mail Client
        • Webmail Login
        • Mail
          • Left Sidebar
          • Email Pane
          • Reading Pane
          • Keyboard Shortcuts
      • Zimbra Modern Desktop
    • Web Hosting
      • Linux Web Hosting
        • cPanel Overview
          • Getting Started in cPanel
          • Server Information for cPanel
        • Preferences
          • Account Preferences
          • Audit Log
          • Change Language
          • Contact Information
      • Windows Web Hosting
    • SSL Certificates
      • SSL Intermediate and ROOT CA Bundles
        • RapidSSL CA Bundle
  • Tutorials
    • Rocky Linux
      • Rocky Linux 9
        • Basic Server Setup with Rocky Linux 9
  • Billing
    • Payment Methods
    • Credit Card Refunds
  • Legal
    • Legal Documents
      • Terms & Conditions
      • Master Agreement for Datacenter IP Services
      • Privacy
      • Service Level Agreement (SLA)
        • Public & Private Cloud
        • IP Transit Service Level Agreement
      • GDPR
        • FAQ
        • Data Processing Agreement
          • Schedule 1: Description of the Processing and Subprocessors
          • Schedule 2: Controller-to-Controller Information for International Data Transfers
      • Supplier Code of Conduct
  • Security
    • Platform Security
    • Infrastructure Security
    • Certification Reports
  • Pricing
    • Overview
    • Cloud
      • Compute
      • Volumes & Snapshots
      • Load Balancers
      • VPN
      • Elastic IPs
      • Traffic
    • Billing Q&A
      • Colocation - 95th percentile billing
  • Other Technical Information
    • Peering
Powered by GitBook
LogoLogo

Copyright © 2024 Bamboozle Web Services, Inc. All Rights Reserved.

On this page

Was this helpful?

Export as PDF
  1. Products
  2. Cloud
  3. Compute

Managing VPN connections

PreviousManaging virtual networksNextCreating VPN connections

Last updated 3 months ago

Was this helpful?

With Virtual Private Network (VPN) as a service, users can extend virtual networks across public networks, such as the Internet. To connect two or more remote endpoints, VPNs use virtual connections tunneled through physical networks. To secure VPN communication, the traffic that flows between remote endpoints is encrypted. The VPN implementation uses the Internet Key Exchange (IKE) and IP Security (IPsec) protocols to establish secure VPN connections and is based on the strongSwan IPsec solution.

VPN as a service can be used to establish a Site-to-Site VPN connection between a virtual network configured in Bamboozle Cloud and any other network with a VPN gateway that uses the IPsec and IKE protocols. With VPN as a service, you can connect the following workloads:

  • On-premises workloads with workloads hosted in Bamboozle Cloud

  • Workloads hosted in other clouds with workloads hosted in Bamboozle Cloud

  • Workloads hosted in different Bamboozle Cloud Locations

To better understand how a VPN works, consider the following example:

  • In the cluster 1, the virtual machine VM1 is connected to the virtual network privnet1 (192.168.10.0/24) via the network interface with IP address 192.168.10.10. The network privnet1 is exposed to public networks via the router router1 with the external port 10.10.10.5.

  • In the cluster 2, the virtual machine VM2 is connected to the virtual network privnet2 (192.168.20.0/24) via the network interface with IP address 192.168.20.20. The network privnet2 is exposed to public networks via the router router2 with the external port 10.10.10.4.

  • The VPN tunnel is created between the routers router1 and router2 that serve as VPN gateways, thus allowing mutual connectivity between the networks privnet1 and privnet2.

  • The virtual machines VM1 and VM2 are visible to each other at their private IP addresses. That is, VM1 can access VM2 at 192.168.20.20, and VM2 can access VM1 at 192.168.10.10.

For key exchange between communicating parties, two IKE versions are available: IKE version 1 (IKEv1) and IKE version 2 (IKEv2). IKEv2 is the latest version of the IKE protocol and it supports connecting multiple remote subnets.

In the example above:

  • VPN1 uses the IKEv1 and connects the network network1 with the network3.

  • VPN2 uses the IKEv2 and connects the network network2 with the two networks network4 and network5.

Limitations

  • Currently, we support only Site-to-Site VPN connections. Point-to-Site VPN connections are not supported.