舉例來說,OpenVPN Access Server 是 VPN 閘道的市集解決方案。啟用設備後,您會為閘道部署主機 VM,允許傳輸至 VMware Engine 網路。
如要在 OpenVPN Access Server 管理員面板中存取加密網域設定,請依序前往「Configuration」>「VPN Settings」>「Routing」。接著,在標示為「Specify the private subnets to which all clients should be given access」(指定應授予所有用戶端存取權的私人子網路) 的欄位中,輸入子網路 IP 位址範圍清單。
[[["容易理解","easyToUnderstand","thumb-up"],["確實解決了我的問題","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["難以理解","hardToUnderstand","thumb-down"],["資訊或程式碼範例有誤","incorrectInformationOrSampleCode","thumb-down"],["缺少我需要的資訊/範例","missingTheInformationSamplesINeed","thumb-down"],["翻譯問題","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["上次更新時間:2025-09-04 (世界標準時間)。"],[],[],null,["# VPN gateways\n============\n\nVPN gateways provide secure connectivity between multiple sites, such as\non-premises data centers, Google Cloud Virtual Private Cloud (VPC) networks,\nand Google Cloud VMware Engine private clouds. Traffic is encrypted because the VPN\nconnections traverse the internet. Each VPN gateway can support multiple\nconnections. When you create multiple connections to the same VPN gateway, all\nVPN tunnels share the available gateway bandwidth.\n\nVMware Engine supports VPN connectivity by using the following types\nof gateways:\n\n- **Point-to-site VPN gateways:** for point-to-site connections, like connecting from your computer to your private cloud\n- **[Cloud VPN](/network-connectivity/docs/vpn) or [Cloud Interconnect](/network-connectivity/docs/interconnect):** for site-to-site connections, like establishing a connection between your on-premises network and your private cloud\n\nFor more details about Cloud VPN and Cloud Interconnect, see\n[Choosing a Network Connectivity product](/network-connectivity/docs/how-to/choose-product).\n\nPoint-to-site VPN gateways\n--------------------------\n\nA point-to-site VPN gateway sends encrypted traffic between a\nVMware Engine network and a client computer. You can use a VPN\ngateway to access your private cloud network, including your private cloud\nvCenter and workload VMs. To connect to your private cloud after you set up your\nVPN gateway, see [Connecting using VPN](/vmware-engine/docs/networking/howto-vpn-connect).\n\nTo set up a point-to-site VPN gateway, first choose a marketplace vendor\nsolution. You can deploy marketplace VPN gateway solutions as VMs on a\nVPC network connected to your private cloud. Alternatively, you\ncan deploy VPN gateway VMs in VMware Engine, then expose and secure\nthem using the VMware Engine public IP service and external firewall\nrules.\n\nAfter you set up the VPN gateway, extend the encryption domain to include both\nthe management and NSX subnets in your private cloud. If preferred, you can\nsummarize or group subnets when setting up your encryption domain.\n\nTo get a list of the subnets to add to your encryption domain, do the following:\n\n1. [Access the Google Cloud console](https://console.cloud.google.com/vmwareengine).\n2. From the main menu, go to **Subnets**.\n3. From the **Subnet** column, copy the IP address ranges that you want to get access to remotely.\n\n### Example: OpenVPN Access Server\n\nFor example, [OpenVPN Access Server](https://openvpn.net/vpn-server-resources/google-cloud-platform-byol-instance-quick-launch-guide/) is a\nmarketplace solution for a VPN gateway. After you activate the appliance, you\ndeploy a host VM for the gateway that allows transit to VMware Engine\nnetworks.\n\nTo access the encryption domain settings in the OpenVPN Access Server administrator\npanel, go to **Configuration \\\u003e VPN Settings \\\u003e Routing**.\nThen, enter a list of your subnet IP address ranges in the field labeled\n\"Specify the private subnets to which all clients should be given access\"."]]