[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-04。"],[],[],null,["# VPN gateways\n============\n\nVPN gateways provide secure connectivity between multiple sites, such as\non-premises data centers, Google Cloud Virtual Private Cloud (VPC) networks,\nand Google Cloud VMware Engine private clouds. Traffic is encrypted because the VPN\nconnections traverse the internet. Each VPN gateway can support multiple\nconnections. When you create multiple connections to the same VPN gateway, all\nVPN tunnels share the available gateway bandwidth.\n\nVMware Engine supports VPN connectivity by using the following types\nof gateways:\n\n- **Point-to-site VPN gateways:** for point-to-site connections, like connecting from your computer to your private cloud\n- **[Cloud VPN](/network-connectivity/docs/vpn) or [Cloud Interconnect](/network-connectivity/docs/interconnect):** for site-to-site connections, like establishing a connection between your on-premises network and your private cloud\n\nFor more details about Cloud VPN and Cloud Interconnect, see\n[Choosing a Network Connectivity product](/network-connectivity/docs/how-to/choose-product).\n\nPoint-to-site VPN gateways\n--------------------------\n\nA point-to-site VPN gateway sends encrypted traffic between a\nVMware Engine network and a client computer. You can use a VPN\ngateway to access your private cloud network, including your private cloud\nvCenter and workload VMs. To connect to your private cloud after you set up your\nVPN gateway, see [Connecting using VPN](/vmware-engine/docs/networking/howto-vpn-connect).\n\nTo set up a point-to-site VPN gateway, first choose a marketplace vendor\nsolution. You can deploy marketplace VPN gateway solutions as VMs on a\nVPC network connected to your private cloud. Alternatively, you\ncan deploy VPN gateway VMs in VMware Engine, then expose and secure\nthem using the VMware Engine public IP service and external firewall\nrules.\n\nAfter you set up the VPN gateway, extend the encryption domain to include both\nthe management and NSX subnets in your private cloud. If preferred, you can\nsummarize or group subnets when setting up your encryption domain.\n\nTo get a list of the subnets to add to your encryption domain, do the following:\n\n1. [Access the Google Cloud console](https://console.cloud.google.com/vmwareengine).\n2. From the main menu, go to **Subnets**.\n3. From the **Subnet** column, copy the IP address ranges that you want to get access to remotely.\n\n### Example: OpenVPN Access Server\n\nFor example, [OpenVPN Access Server](https://openvpn.net/vpn-server-resources/google-cloud-platform-byol-instance-quick-launch-guide/) is a\nmarketplace solution for a VPN gateway. After you activate the appliance, you\ndeploy a host VM for the gateway that allows transit to VMware Engine\nnetworks.\n\nTo access the encryption domain settings in the OpenVPN Access Server administrator\npanel, go to **Configuration \\\u003e VPN Settings \\\u003e Routing**.\nThen, enter a list of your subnet IP address ranges in the field labeled\n\"Specify the private subnets to which all clients should be given access\"."]]