Skip to main content

IPsec Configuration

IPsec (Internet Protocol Security)is a set of security protocols and rules used to protect data communications over a network, including in cloud environments. To create an IPsec configuration you need the IP address network used by the VPN on the target project.

Create IPsec

To create IPsec you have to fill in several columns on the IPsec page including:

Create IPsec


Column Description
Phase 1 - Remote VPN VPN IP address on the destination project.
Phase 1 - Pre Shared Key Keywords must be the same as the goal project.
Phase 2 - Remote Subnet IP address of the subnet on the destination project

Here are the steps to create IPsec:

  • On the Network page, select the VPN tab, and select Configuration in the More column.


Create IPsec


  • Select the IPsec tab and click the Create IPsec button.


Create IPsec


  • In the Remote VPN section, fill in the IP address of the destination VPN project.


Create IPsec


  • Press the Generate Pre-Shared Key button if you don’t have a key yet, whereas if you already have the key from the target project, paste it into the Pre-Shared Key column.


Create IPsec


  • Fill in Remote Subnet with the subnet IP address and prefix used in the destination project.


Create IPsec


  • A notification appears “IPsec configuration [vpn-name] has been successfully created”.


Create IPsec


Connect IPsec

Here are the steps to create IPsec:

  • On the Network page, select the VPN tab, select Configuration in the More column.


Connect IPsec


  • In the IPsec Tunnels section on the IPsec page, click the More button, and select Connect.


Connect IPsec


  • The notification “IPsec connection established successfully” appears and the Phase 1 and Phase 2 tables appear.


Connect IPsec



Connect IPsec


The following is an explanation of the tables in Phase 1 and Phase 2 in IPsec

Connect IPsec - Phase 1


Column Information
Local - ID The sending VPN’s floating IP address.
Local - Host The sending VPN’s floating IP address and the port used.
Remote - ID The recipient’s VPN floating IP address.
Remote - Host The recipient’s VPN floating IP address and port used.
Roles The protocol is used to regulate the establishment of a VPN connection and exchange encryption keys in it.

Connect IPsec - Phase 2


Column Information
Local The sender’s IPsec subnet address.
Remote The IPsec network device the recipient is using
Stats - Bytes-in To measure the total number of bytes of data received.
Stats - Packets-in To measure the total number of data packets received.
Stats - Bytes-out To measure the total number of bytes of data that comes out.
Stats - Packets-out To measure the total number of outgoing data packets.

View Pre Shared Key

Here are the steps to view the shared keys a project uses on IPsec in the Cloudeka portal service:

  • On the Network page, select the VPN tab then select Configuration in the More column.


View Pre Shared Key


  • Select the IPsec tab, in the IPsec Tunnels section in the Pre Shared Key column press the eye icon.


View Pre Shared Key


  • Press the Copy button to copy the key


View Pre Shared Key


Disconnect IPsec

Here are the steps to disable IPsec:

  • On the Network page, select the VPN tab then select Configuration in the More column.


Disconnect IPsec


  • Select the IPsec tab, in the IPsec Tunnels section, make sure the Connection Status is still Connected. Click the More button, select Disconnect.


Disconnect IPsec


  • The notification “IPsec disconnected successfully” appears.


Disconnect IPsec


Delete IPsec

Here are the steps to delete the IPsec configuration:

  • On the VPN page, in the More column, select Configuration.


Delete IPsec


  • Select the IPsec tab. Make sure the Connection Status is disconnected and click More then click the Delete button.


Delete IPsec


]
  • Press the Confirm button to continue the process of deleting the IPsec configuration.


Delete IPsec


  • Wait until the process is complete.


Delete IPsec


  • A notification appears “IPsec configuration [IPsec-name] has been successfully deleted”.


Delete IPsec


×