All Products
Search
Document Center

VPN Gateway:FAQ about VPN gateways

Last Updated:Mar 04, 2026

This topic describes frequently asked questions about VPN gateways.

Quick Links to FAQs

Product Inquiries

IPsec-VPN Features

SSL-VPN Features

What are non-cross-border connections and cross-border connections?

Alibaba Cloud VPN Gateway provides services in compliance with policies and regulations in the Chinese mainland. You can only use VPN Gateway to establish non-cross-border connections. For more information about accessing cross-border resources using a VPN connection, see How do I use VPN connections to access cross-border resources?.

Non-cross-border Connections

  • When you establish an IPsec-VPN connection, it is considered non-cross-border if the regions of the data center and the peer resource meet either of the following conditions:

    • The data center is in a region in the Chinese mainland, and the peer resource is in an Alibaba Cloud region in the Chinese mainland.

    • The data center is outside the Chinese mainland, and the peer resource is in an Alibaba Cloud region outside the Chinese mainland.

  • When you establish an SSL-VPN connection, it is considered non-cross-border if the regions of the client and the peer resource meet either of the following conditions:

    • The client is in the Chinese mainland, and the peer resource is in an Alibaba Cloud region in the Chinese mainland.

    • The client is outside the Chinese mainland, and the peer resource is in an Alibaba Cloud region outside the Chinese mainland.

Example 1

Example 2

imageimage

Cross-border Connections

  • When you establish an IPsec-VPN connection, it is considered cross-border if the regions of the data center and the peer resource meet either of the following conditions:

    • The data center is in the Chinese mainland, and the peer resource is in an Alibaba Cloud region outside the Chinese mainland.

    • The data center is outside the Chinese mainland, and the peer resource is in an Alibaba Cloud region in the Chinese mainland.

  • When you establish an SSL-VPN connection, it is considered cross-border if the regions of the client and the peer resource meet either of the following conditions:

    • The client is in the Chinese mainland, and the peer resource is in an Alibaba Cloud region outside the Chinese mainland.

    • The client is outside the Chinese mainland, and the peer resource is in an Alibaba Cloud region in the Chinese mainland.

Example 1

Example 2

imageimage

Regions in the Chinese mainland and regions outside the Chinese mainland

Region classification

Included regions

The Chinese mainland

China (Qingdao), China (Beijing), China (Zhangjiakou), China (Hohhot), China (Ulanqab), China (Shenzhen), China (Heyuan), China (Guangzhou), China (Hangzhou), China (Shanghai), China (Nanjing - Local Region), China (Chengdu)

Outside the Chinese mainland

China (Hong Kong), Singapore, Malaysia (Kuala Lumpur), Japan (Tokyo), Indonesia (Jakarta), Philippines (Manila), South Korea (Seoul), Thailand (Bangkok), Germany (Frankfurt), UK (London), UAE (Dubai), US (Silicon Valley), US (Virginia), SAU (Riyadh - Partner Region)), Mexico

How do I use VPN connections to access cross-border resources?

To access cross-border resources using a VPN connection, use the transit router product. Transit routers provide low-latency, high-speed network transmission, enabling private network communication channels between resources across regions, including cross-border connections, and facilitating arbitrary interconnection between resources in different regions.

Network topology example:

IPsec-VPN

SSL-VPN

imageimage

Can I use VPN gateways to access the Internet?

No.

VPN gateways only provide private network access to VPCs, but not Internet access.

What are the prerequisites for a data center to connect to a VPC via IPsec-VPN?

  • The gateway device at the local site must support the IKEv1 and IKEv2 protocols.

    IPsec-VPN supports the IKEv1 and IKEv2 protocols. Any gateway device that supports either the IKEv1 or IKEv2 protocol can connect to Alibaba Cloud VPN gateways. For more information, see How do I choose the IKE version when I configure an IPsec-VPN connection?.

  • The gateway device at the local site must have a static public IP address.

  • The CIDR blocks of the data center and the VPC must not overlap.

For more information about how to connect a data center to a VPC using an IPsec-VPN connection, see Connect a VPC to a data center in dual-tunnel mode.

Which on-premises gateway devices can connect to Alibaba Cloud VPN gateways?

Alibaba Cloud VPN gateways support the standard IKEv1 and IKEv2 protocols. Any gateway device that supports either the IKEv1 or IKEv2 protocol can connect to Alibaba Cloud VPN gateways. For example, gateway devices from H3C, Hillstone, Sangfor, Cisco ASA, Juniper, SonicWall, Nokia, IBM, and Ixia can connect to Alibaba Cloud VPN gateways. For more information, see Configure local gateways.

Can VPCs across regions communicate through VPN gateways?

Yes.

For more information, see Enable communication between two VPCs using an IPsec-VPN connection in dual-tunnel mode.

Note

If you create an IPsec-VPN connection between VPCs in different regions, Internet quality affects the connection quality. We recommend using Cloud Enterprise Network (CEN) to connect VPCs in different regions. For more information, see Connect VPCs across accounts.

Does traffic between VPCs flow through the Internet?

When using VPN gateways to enable communication between VPCs:

  • If two VPCs are in the same region, traffic flows only through the Alibaba Cloud network, and not the Internet.

  • If two VPCs are in different regions, traffic flows through the Internet.

What are the differences between an IPsec server and an SSL server?

Item

IPsec server

SSL server

Use scenario

Provides end-to-site connections.

Provides end-to-site connections.

Client mode

Allows mobile clients that run iOS to establish IPsec-VPN connections to Alibaba Cloud.

Allows mobile clients that run Android and computers to establish SSL-VPN connections to Alibaba Cloud.

Connection mode

Allows mobile clients that run iOS to establish IPsec-VPN connections to Alibaba Cloud by using the built-in VPN feature.

Allows mobile clients that run Android and computers to establish SSL-VPN connections to Alibaba Cloud by using OpenVPN.

Encryption methods

IPsec

SSL certificates

Can I configure multiple peer CIDR blocks in one IPsec connection?

Supported.

Before you configure multiple peer CIDR blocks, we recommend that you review the proposals for configuring multiple CIDR blocks. For more information, see Configuration suggestions and FAQ about enabling communication among CIDR blocks.

How many IPsec connections can each VPN gateway establish?

Each VPN gateway supports up to 10 IPsec-VPN connections by default. You can adjust this quota in the Alibaba Cloud Management Console. For more information, see Manage IPsec-VPN quotas.

How do I configure network ACL rules for a VPN gateway?

VPN Gateway Type

Configuration Rules

IPsec-VPN

Configure rules in the outbound and inbound directions of the network ACL to allow the following CIDR blocks and IP addresses. This ensures the VPN gateway can establish IPsec-VPN connections:

  • 100.64.0.0/10

    Note

    Alibaba Cloud uses the 100.64.0.0/10 CIDR block for internal services. Allow this CIDR block for the VPN gateway to function properly.

  • Customer gateway IP address

  • VPN gateway IP address

SSL-VPN

Configure rules in the outbound and inbound directions of the network ACL to allow the following CIDR blocks and IP addresses, and open the SSL-VPN port. This ensures the VPN gateway can establish SSL-VPN connections:

  • 100.64.0.0/10

    Note

    Alibaba Cloud uses the 100.64.0.0/10 CIDR block for internal services. Allow this CIDR block for the VPN gateway to function properly.

  • Client public IP address

  • VPN gateway IP address

  • Open the port used by SSL-VPN

    For example, port 1194

Can I upgrade or downgrade a VPN gateway's configuration?

Yes.

Does VPN Gateway support viewing client connection information for SSL-VPN connections?

This is supported.

For specific operations, see View the information about an SSL client's connection.

Note
  • If your VPN gateway was created after December 10, 2022, you can view the connection information about SSL clients by default.

  • If your VPN gateway associated with an SSL server was created before December 10, 2022, you cannot view the connection information about SSL clients by default. To view the information, you must upgrade the VPN gateway.

Can VPN gateway instances purchased before the SSL-VPN release use the SSL-VPN feature?

No.

To use this feature, you can upgrade the VPN Gateway to the latest version. For detailed instructions, see Upgrade a VPN Gateway.

How do I select an IKE version when configuring an IPsec-VPN connection?

When configuring an IPsec-VPN connection, select the IKE version based on the peer gateway device's support and whether multi-CIDR block communication is required.

Note

Communication among multiple CIDR blocks is established if you specify multiple Local Network or Remote Network CIDR blocks when you configure an IPsec-VPN connection.

IKE Version Support for IPsec Connection Peer Gateway Devices

Is Multi-CIDR Block Communication Required?

Configuration Solution Description

IKEv1 only

Yes

No

Both the IPsec connection and the peer gateway device use IKEv1.

IKEv2 only

Yes

  • Both the IPsec connection and the peer gateway device use IKEv2.

  • IPsec connections using IKEv2 support multi-CIDR block communication.

No

Both the IPsec connection and the peer gateway device use IKEv2.

Supports both IKEv1 and IKEv2

Yes

  • Both the IPsec connection and the peer gateway device use IKEv2.

  • IPsec connections using IKEv2 support multi-CIDR block communication.

No

Both the IPsec connection and the peer gateway device should use IKEv2.

Compared to IKEv1, IKEv2 simplifies the SA negotiation process and offers better support for multi-CIDR block scenarios. Therefore, we recommend using IKEv2.

After a data center's IP address is translated by NAT, how does it establish an IPsec-VPN connection with an Alibaba Cloud VPN gateway?

For example, if a data center plans to use 42.XX.XX.1 to establish an IPsec-VPN connection with an Alibaba Cloud VPN gateway, but the data center uses SNAT, traffic from 42.XX.XX.1 will be translated to 47.XX.XX.21. In this case, when you create a customer gateway instance in the Alibaba Cloud VPN Gateway Management Console, enter 47.XX.XX.21 as the customer gateway instance's IP address. This allows the Alibaba Cloud VPN gateway to establish an IPsec-VPN connection with the data center.

We recommend that the data center use the default IPsec protocol ports (500 and 4500) to establish IPsec-VPN connections with the VPN gateway. Do not convert port numbers.

On the Alibaba Cloud side, if a public VPN gateway is associated with a VPC instance that also has NAT Gateway enabled, the public VPN gateway instance's IP address remains unchanged and is not translated by NAT Gateway.

How do I increase the bandwidth of an IPsec-VPN connection?

When an IPsec connection is bound to a VPN gateway instance, the maximum bandwidth of the VPN gateway instance is 1,000 Mbps (the maximum bandwidth is 500 Mbps in some regions). To increase the IPsec-VPN connection's bandwidth, we recommend that you bind the IPsec connection to a transit router instance to connect your data center to Alibaba Cloud. The transit router enables network communication between your data center and the VPC.

After an IPsec connection is associated with a transit router, the maximum bandwidth of the IPsec-VPN connection is 1,000 Mbit/s. To increase the maximum bandwidth, you can establish multiple IPsec-VPN connections between the transit router and your data center. This way, network traffic is transmitted between your data center and Alibaba Cloud over multiple IPsec-VPN connections, as shown in the following figure. For more information, see Create multiple IPsec-VPN connections over the Internet for load balancing and Create multiple private IPsec-VPN connections to implement load balancing.

  • Scenario where the IPsec connection's network type is public:

    IPsec连接绑定TR最佳实践-公网-场景图

  • Scenario where the IPsec connection's network type is private:

    IPsec连接绑定TR最佳实践-私网-场景图

Can ECS instances in other zones of a VPC forward traffic through a VPN gateway instance?

Yes.

When you create a VPN gateway instance, specify a vSwitch. The system deploys the VPN gateway in the zone where the specified vSwitch resides. After creation, the VPN gateway instance can forward traffic for ECS instances in all zones of the VPC instance.

You may need to add routing configurations as needed to enable the VPN gateway instance to forward ECS instance traffic. For example, if a vSwitch in a zone is associated with the VPC instance's custom route table, you must add a custom route pointing to the VPN gateway instance in that custom route table.

What do I do if the system reports a route overlap error when adding a route to a VPN gateway instance?

When you add a route to a VPN gateway instance, system errors typically occur for two reasons:

  • The destination CIDR block of the route you add is the same as a route in the VPC instance. Check the routing configuration in the VPC instance's route table to resolve the route conflict.

  • The route you add conflicts with a route in the VPN gateway instance. Check the routing configurations in the VPN gateway instance's policy-based route table and destination-based route table to resolve the route conflict.

    • If you add a destination-based route whose destination CIDR block and next hop are the same as an existing destination-based route in the VPN gateway instance, a route conflict occurs.

    • If you add a policy-based route whose source CIDR block, destination CIDR block, and next hop are the same as an existing policy-based route in the VPN gateway instance, a route conflict occurs.

Why does a VPN connection's bandwidth not meet the purchased bandwidth specifications?

After you purchase a VPN gateway, it provides the purchased bandwidth capacity. However, the following factors can affect your bandwidth experience during traffic transmission:

  • The functions of the device associated with the customer gateway instance, connection capacity, average packet size, and protocols used (TCP and UDP).

  • Network latency between the customer gateway instance's associated device and the VPN gateway.

    Note

    If you purchase a public network type VPN gateway instance or use a public network type IPsec connection, public bandwidth capacity and public network latency may affect your bandwidth experience.

If you want to test the bandwidth of your VPN gateway, we recommend using iPerf3. The rate of transferring files by running commands, such as scp, ftp, and cp commands, cannot reflect the actual bandwidth due to the impact of disk read and write speeds. For more information about how to use iPerf3, see Use iPerf3 to test the bandwidth of an Express Connect circuit.

If you require higher transmission quality, we recommend using the CEN product.

Can traffic between a VPC and a public IP address be encrypted by a VPN gateway?

Yes.

If your client or data center is connected to a VPC using a VPN gateway and needs to access resources in the VPC using a public IP address, you must perform the following operations:

  1. Add the public IP address's CIDR block to the VPN Gateway:

    • If you use an IPsec-VPN connection, add the public CIDR block to the Remote Network of the IPsec-VPN connection.

    • If you use an SSL-VPN connection, add the public CIDR block to the Client CIDR Block of the SSL server.

  2. You must set the public CIDR block as a user CIDR block for the virtual private cloud (VPC). This ensures that the VPC can access the public CIDR block. For more information about user CIDR blocks, see VPC FAQ and VPC FAQ.

What do I do if the number of routes exceeds the limit?

If the number of routes exceeds the limit when using policy-based routes, destination-based routes, or BGP dynamic routing, preventing you from adding new routes or preventing IPsec connections from learning BGP routes, you can resolve the issue using these two methods:

  • Increase the route quota.

    You can increase the quota of policy-based routes, destination-based routes, or BGP routes. For more information, see IPsec-VPN quotas.

  • Configure an aggregated route.

    Aggregate multiple configured routes into a single route without affecting your business.

    For example, if you configured three destination-based routes with destination CIDR blocks 10.10.1.0/24, 10.10.2.0/24, and 10.10.3.0/24, all pointing to the same IPsec connection (e.g., IPsec connection 1), you can add a new destination-based route with destination CIDR block 10.10.0.0/22 and a next hop pointing to IPsec connection 1. Then, delete the original three destination-based routes to save destination route quota.

If VPN bandwidth is full or utilization is high, how do I find the top source and destination IP addresses?

You can enable VPC flow logs to collect and analyze VPN Elastic Network Interface (ENI) traffic. For details, see Query and analyze traffic transmitted by VPN gateway instances using ENI flow logs.

What type of public IP address does a VPN gateway use?

A VPN gateway's public IP address type is Multi-line BGP . This type connects to multiple ISP lines and automatically selects the optimal path, providing users with a fast and stable access experience.