Stay organized with collections Save and categorize content based on your preferences.

VPN gateways

VPN gateways provide secure connectivity between multiple sites, such as on-premises data centers, Google Cloud Virtual Private Cloud (VPC) networks, and Google Cloud VMware Engine private clouds. Traffic is encrypted because the VPN connections traverse the internet. Each VPN gateway can support multiple connections. When you create multiple connections to the same VPN gateway, all VPN tunnels share the available gateway bandwidth.

VMware Engine supports VPN connectivity by using the following types of gateways:

  • Point-to-site VPN gateways: for point-to-site connections, like connecting from your computer to your private cloud
  • Cloud VPN or Cloud Interconnect: for site-to-site connections, like establishing a connection between your on-premises network and your private cloud

For more details about Cloud VPN and Cloud Interconnect, see Choosing a Network Connectivity product.

Point-to-site VPN gateways

A point-to-site VPN gateway sends encrypted traffic between a VMware Engine region network and a client computer. You can use a VPN gateway to access your private cloud network, including your private cloud vCenter and workload VMs. To connect to your private cloud after you set up your VPN gateway, see Connecting using VPN.

To set up a point-to-site VPN gateway, first choose a marketplace vendor solution. You can deploy marketplace VPN gateway solutions as VMs on a VPC network connected to your private cloud. Alternatively, you can deploy VPN gateway VMs in VMware Engine, then expose and secure them using the VMware Engine public IP service and external firewall rules.

After you set up the VPN gateway, extend the encryption domain to include both the management and NSX-T subnets in your private cloud. If preferred, you can summarize or group subnets when setting up your encryption domain.

To get a list of the subnets to add to your encryption domain, do the following:

  1. Access the VMware Engine portal.
  2. Go to Network > Subnets.
  3. From the Subnet column, copy the IP address ranges that you want to get access to remotely.

Example: OpenVPN Access Server

For example, OpenVPN Access Server is a marketplace solution for a VPN gateway. After you activate the appliance, you deploy a host VM for the gateway that allows transit to VMware Engine networks.

To access the encryption domain settings in the OpenVPN Access Server admin panel, go to Configuration > VPN Settings > Routing. Then, enter a list of your subnet IP address ranges in the field labeled "Specify the private subnets to which all clients should be given access".