다음 공급업체별 가이드라인은 Cloud VPN에서 작동하도록 서드 파티 VPN 기기를 구성하는 데 도움이 됩니다.
Check Point
Check Point VPN은 트래픽 선택기당 2개 이상의 CIDR을 지정할 때 여러 하위 보안 연결(SA)을 만들어 IKEv2를 구현합니다. 이 구현은 로컬 트래픽 선택기의 모든 CIDR과 원격 트래픽 선택기의 모든 CIDR이 단일 하위 SA에 있어야 하는 Cloud VPN과는 호환되지 않습니다. 호환 가능한 구성을 만드는 방법은 트래픽 선택기 전략을 참조하세요.
Cisco
VPN 게이트웨이가 Cisco IOS XE를 실행하는 경우 실행 중인 버전이 16.6.3(Everest) 이상인지 확인합니다. 이전 버전은 2단계 키 갱신 이벤트에 알려진 문제가 있습니다. 이로 인해 몇 시간 간격으로 몇 분 동안 터널이 작동 중지됩니다.
Cisco ASA는 IOS 버전 9.7(x) 이상에서 가상 터널 인터페이스(VTI)가 있는 경로 기반 VPN을 지원합니다. 자세한 내용은 다음을 참조하세요.
Cloud VPN 터널에서 Cisco ASA 장치를 사용할 때는 각 로컬 및 원격 트래픽 선택기에 대해 2개 이상의 IP 주소 범위(CIDR 블록)를 구성할 수 없습니다. Cisco ASA 기기는 트래픽 선택기에서 각 IP 주소 범위에 대해 고유한 SA를 사용하지만, Cloud VPN은 트래픽 선택기의 모든 IP 범위에 대해 단일 SA를 사용합니다. 자세한 내용은 정책 기반 터널 및 트래픽 선택기를 참조하세요.
[[["이해하기 쉬움","easyToUnderstand","thumb-up"],["문제가 해결됨","solvedMyProblem","thumb-up"],["기타","otherUp","thumb-up"]],[["이해하기 어려움","hardToUnderstand","thumb-down"],["잘못된 정보 또는 샘플 코드","incorrectInformationOrSampleCode","thumb-down"],["필요한 정보/샘플이 없음","missingTheInformationSamplesINeed","thumb-down"],["번역 문제","translationIssue","thumb-down"],["기타","otherDown","thumb-down"]],["최종 업데이트: 2025-09-05(UTC)"],[],[],null,["# Use third-party VPNs\n\nThis page provides Google-tested interoperability guides and vendor-specific\nnotes for peer third-party VPN devices or services that you can use to connect\nto Cloud VPN.\n\nEach Interop guide offers specific instructions for connecting the third-party\nVPN solution to Cloud VPN. If the third-party solution supports\ndynamic (BGP) routing, the guide includes configuration instructions for\n[Cloud Router](/network-connectivity/docs/router/concepts/overview).\n\nMost peer VPN devices should be compatible with Cloud VPN. For general\ninformation about configuring peer VPN devices, see\n[Configure the peer VPN gateway](/network-connectivity/docs/vpn/how-to/configuring-peer-gateway).\n\nAny third-party device or service that supports IPsec and IKE versions 1 or\n2 should be compatible with Cloud VPN. For a list of IKE ciphers and\nother configuration parameters used by Cloud VPN, see\n[Supported IKE ciphers](/network-connectivity/docs/vpn/concepts/supported-ike-ciphers).\n\nSome third-party device configuration templates are available for download from\nthe Google Cloud console. For more information,\nsee [Download a peer VPN configuration template](/network-connectivity/docs/vpn/how-to/download-config).\n\nIPv6 is supported only in HA VPN configurations.\nIPv6 is not supported by Classic VPN.\n\nFor more information about Cloud VPN, see the\n[Cloud VPN overview](/network-connectivity/docs/vpn/concepts/overview).\n\nFor definitions of terms used on this page, see\n[Key terms](/network-connectivity/docs/vpn/concepts/key-terms).\n| **Note:** Guides on this page may refer to the Classic VPN configuration instead of HA VPN.\n| **Warning:** Certain Classic VPN dynamic routing functionality is deprecated. For more information, see [Classic VPN dynamic routing partial deprecation](/network-connectivity/docs/vpn/deprecations/classic-vpn-deprecation).\n\nInterop guides by vendor\n------------------------\n\nThis section lists interoperability guides by vendor. Each\nguide covers how to use that vendor's VPN gateway solution with\nCloud VPN.\n\nFor detailed notes covering the vendors listed in this section, see the\n[vendor-specific notes section](#vendor-specific-notes).\n\n### A-L\n\n### M-Z\n\nVendor-specific notes\n---------------------\n\nThe following vendor-specific guidelines help you configure your third-party VPN\ndevices to work with Cloud VPN.\n\n### Check Point\n\nCheck Point VPN implements IKEv2 by creating multiple Child Security Associations\n(SAs) when you specify more than one CIDR per traffic selector. This\nimplementation is incompatible with Cloud VPN, which requires all\nCIDRs for the local traffic selector and all CIDRs for the remote traffic selector\nto be located in a single Child SA. For suggestions about how to create a\ncompatible configuration, see [Traffic selector\nstrategies](/network-connectivity/docs/vpn/concepts/choosing-networks-routing#route-alignment).\n\n### Cisco\n\nIf your VPN gateway runs Cisco IOS XE, make sure that you're running version\n16.6.3 (Everest) or later. Earlier versions have known problems with Phase 2\nrekey events, which result in tunnels going down for a few minutes every few\nhours.\n\nCisco ASA supports route-based VPN with Virtual Tunnel Interface (VTI) in IOS\nversion 9.7(x) and later. For more information, see the following:\n\n- [Release Notes for the Cisco ASA Series, 9.7(x)](https://www.cisco.com/c/en/us/td/docs/security/asa/asa97/release/notes/asarn97.html)\n- [Virtual Tunnel Interface sections in the Cisco ASA Series VPN CLI Configuration Guide, 9.7](https://www.cisco.com/c/en/us/td/docs/security/asa/asa97/configuration/vpn/asa-97-vpn-config/vpn-vti.pdf)\n\n | **Note:** IOS version 9.7 is not supported with ASA hardware version 5505, which has reached [end-of-life status](https://www.cisco.com/c/en/us/products/collateral/security/asa-5505-adaptive-security-appliance/eos-eol-notice-c51-738642.html). For more information, see the [ASA compatibility matrix](https://www.cisco.com/c/en/us/td/docs/security/asa/compatibility/asamatrx.html).\n\nWhen using Cisco ASA devices with a Cloud VPN tunnel, you cannot\nconfigure more than one IP address range (CIDR block) for each of the local and\nremote traffic selectors. The reason is that Cisco ASA devices use a unique\nSA for each IP address range in a traffic selector, while Cloud VPN\nuses a single SA for all IP ranges in a traffic selector. For more information,\nsee [Policy-based tunnels and traffic selectors](/network-connectivity/docs/vpn/concepts/choosing-networks-routing#static-routing-networks).\n\nWhat's next\n-----------\n\n- To configure your third-party VPN for dual-stack (IPv4 and IPv6) or IPv6-only traffic, see [Set up third-party VPNs for IPv4 and IPv6 traffic](/network-connectivity/docs/vpn/how-to/interop-guides-ipv6).\n- To configure firewall rules for your peer network, see [Configure firewall rules](/network-connectivity/docs/vpn/how-to/configuring-firewall-rules).\n- To use high-availability and high-throughput scenarios or multiple subnet scenarios, see [Advanced configurations](/network-connectivity/docs/vpn/concepts/advanced).\n- To help you solve common issues that you might encounter when using Cloud VPN, see [Troubleshooting](/network-connectivity/docs/vpn/support/troubleshooting)."]]