Skip to main content

Create VPN connection

To create a VPN Connection, follow the steps below.

Step 1: In the menu, select Network, then select the VPN Site-to-Site tab. This page manages VPN Connections. Select Create VPN connection.

Step 2: Initialize the VPN Gateway and select Next.

Step 3: Enter the configuration details to create the VPN Connection. The VPN Connection parameters consist of three main sections:

  • General Information (general connection details)
  • Remote VPN Information (encryption settings and customer-side information)
  • Dead Peer Detection (number of automatic retries when a connectivity issue occurs)

Section 1: General information

FieldDescription
VPN nameName of the VPN Connection.
DescriptionDescription of the VPN Connection.
Pre-shared keyThe shared security key between the two devices. You can generate a new key by selecting Refresh Key and copy it by selecting Copy.
Local IP publicPublic IP assigned by the FPT Cloud system.
Local private networksNetwork range of resources on FPT Cloud.

Section 2: Remote VPN Information

Customer gateway

FieldDescription
Customer gateway
Customer gatewayThe configuration at the other end of the connection. Select the correct Customer Gateway you want to connect to in this step. If you do not have a Customer Gateway yet, click here/ for the setup guide.
ProvidersList of VPN connection providers to FCI.
IKE Policy
Authorization algorithmAlgorithm used to authenticate data during VPN connection establishment. Values: sha1, sha256, sha384, sha512, aes-xcbc. Use sha256 for a good balance of security and performance.
Encryption algorithmEncrypts the key negotiation process. Values: aes-128, aes-192, aes-256, aes-128-gcm-8, aes-128-gcm-12, aes-128-gcm-16, aes-192-gcm-8, aes-192-gcm-12, aes-192-gcm-16, aes-256-gcm-8, aes-256-gcm-12, aes-256-gcm-16. FCI recommends aes-256 for the best balance of security and performance. If you use ikev1, do not select gcm algorithms as they will cause issues with the VPN connection.
IKE versionSupported IKE versions. Values: ikev1, ikev2. FCI recommends ikev2 for most firewall devices. If you use older Cisco devices that only support ikev1, select ikev1.
Lifetime unitsUnit of measurement for the IKE connection lifetime. Default: second.
Lifetime valueSpecific lifetime value for Phase 1.
DH GroupDiffie-Hellman algorithm group used to generate the initial key exchange. Values: group_1, group_2, group_5, group_14, group_15, group_16, group_17, group_18, group_19, group_20, group_21.
Phase 1 negotiation modeHow the two devices establish a secure connection in Phase 1 of IKE. Values: main, aggressive (default: main).
IPSec Policy
Authorization algorithmAlgorithm used to authenticate data during VPN connection establishment. Values: sha1, sha256, sha384, sha512, aes-xcbc. Use sha256 for a good balance of security and performance.
Encapsulation modeMode in which data is encrypted and encapsulated before transmission. Default: tunnel.
Encryption algorithmEncrypts the actual data transmitted over the VPN. Values: aes-128, aes-192, aes-256. Use aes-256 for the best balance of security and performance.
Lifetime unitsDefault: second.
Lifetime valueThe duration an IPSec session is allowed to remain active before it must be re-established.
Perfect forward secrecyOption to ensure session key security (PFS — typically paired with a DH Group). Values: off, group_1, group_2, group_5, group_14, group_15, group_16, group_17, group_18, group_19, group_20, group_21. Use group_14 for a good balance of security.
Transform protocolProtocol used to define how encryption and authentication work in IPSec. Values: esp, ah.

About Providers

  • FCI currently supports pre-configured settings for the following providers: AWS, Fortigate, Palo Alto. FCI recommends using these settings for the best connection results.
  • For providers not in the list above, manually enter the Providers name, IKE, and IPSec information.

Pre-configured parameters for supported providers:

Configuration parameterAWSFortigatePalo Alto
IKE Info
IKE versionikev2ikev2ikev2
Encryption algorithmaes-256aes-256aes-256
Authorization algorithmsha256sha256sha256
DH Groupgroup14group 19group 20
Lifetime value28800s28800s28800s
Phase 1 negotiation modemainmainmain
IPSec Info
Encryption algorithmaes-256aes-256aes-256
Authorization algorithmsha256sha256sha256
Perfect forward secrecygroup14group14 (or group19)group 19
Lifetime value3600s3600s3600s
Encapsulation modetunneltunneltunnel
Transform protocolespespesp

Section 3: Dead Peer Detection

FieldDescription
Delay(s)Time (in seconds) between each DPD probe sent to check the connection. Default: 30s.
Max failuresMaximum number of failed checks before the peer is considered dead and the connection is reset. Default: 10.

After filling in all the information, select Create VPN Connection.