IPsec Configuration
IPsec (Internet Protocol Security)is a set of security protocols and rules used to protect data communications over a network, including in cloud environments. To create an IPsec configuration you need the IP address network used by the VPN on the target project.
Create IPsec
To create IPsec you have to fill in several columns on the IPsec page including:
Create IPsec
Column | Description |
---|---|
Phase 1 - Remote VPN | VPN IP address on the destination project. |
Phase 1 - Pre Shared Key | Keywords must be the same as the goal project. |
Phase 2 - Remote Subnet | IP address of the subnet on the destination project |
Here are the steps to create IPsec:
- On the Network page, select the VPN tab, and select Configuration in the More column.
Create IPsec
- Select the IPsec tab and click the Create IPsec button.
Create IPsec
- In the Remote VPN section, fill in the IP address of the destination VPN project.
Create IPsec
- Press the Generate Pre-Shared Key button if you don’t have a key yet, whereas if you already have the key from the target project, paste it into the Pre-Shared Key column.
Create IPsec
- Fill in Remote Subnet with the subnet IP address and prefix used in the destination project.
Create IPsec
- A notification appears “IPsec configuration [vpn-name] has been successfully created”.
Create IPsec
Connect IPsec
Here are the steps to create IPsec:
- On the Network page, select the VPN tab, select Configuration in the More column.
Connect IPsec
- In the IPsec Tunnels section on the IPsec page, click the More button, and select Connect.
Connect IPsec
- The notification “IPsec connection established successfully” appears and the Phase 1 and Phase 2 tables appear.
Connect IPsec
Connect IPsec
The following is an explanation of the tables in Phase 1 and Phase 2 in IPsec
Connect IPsec - Phase 1
Column | Information |
---|---|
Local - ID | The sending VPN’s floating IP address. |
Local - Host | The sending VPN’s floating IP address and the port used. |
Remote - ID | The recipient’s VPN floating IP address. |
Remote - Host | The recipient’s VPN floating IP address and port used. |
Roles | The protocol is used to regulate the establishment of a VPN connection and exchange encryption keys in it. |
Connect IPsec - Phase 2
Column | Information |
---|---|
Local | The sender’s IPsec subnet address. |
Remote | The IPsec network device the recipient is using |
Stats - Bytes-in | To measure the total number of bytes of data received. |
Stats - Packets-in | To measure the total number of data packets received. |
Stats - Bytes-out | To measure the total number of bytes of data that comes out. |
Stats - Packets-out | To measure the total number of outgoing data packets. |
View Pre Shared Key
Here are the steps to view the shared keys a project uses on IPsec in the Cloudeka portal service:
- On the Network page, select the VPN tab then select Configuration in the More column.
View Pre Shared Key
- Select the IPsec tab, in the IPsec Tunnels section in the Pre Shared Key column press the eye icon.
View Pre Shared Key
- Press the Copy button to copy the key
View Pre Shared Key
Disconnect IPsec
Here are the steps to disable IPsec:
- On the Network page, select the VPN tab then select Configuration in the More column.
Disconnect IPsec
- Select the IPsec tab, in the IPsec Tunnels section, make sure the Connection Status is still Connected. Click the More button, select Disconnect.
Disconnect IPsec
- The notification “IPsec disconnected successfully” appears.
Disconnect IPsec
Delete IPsec
Here are the steps to delete the IPsec configuration:
- On the VPN page, in the More column, select Configuration.
Delete IPsec
- Select the IPsec tab. Make sure the Connection Status is disconnected and click More then click the Delete button.
Delete IPsec
]
- Press the Confirm button to continue the process of deleting the IPsec configuration.
Delete IPsec
- Wait until the process is complete.
Delete IPsec
- A notification appears “IPsec configuration [IPsec-name] has been successfully deleted”.
Delete IPsec