Overview
Last updated
Last updated
A VPN Gateway is a critical component in network infrastructure that facilitates secure, encrypted connections between different networks over the internet. It provides robust security features, including strong encryption, to protect data in transit. You can use it to connect on-premises networks to cloud networks or to connect different cloud networks. Organizations can use a VPN Gateway to ensure their sensitive data is transmitted securely over the internet, thus meeting compliance and regulatory requirements.
IONOS VPN Gateway supports IPSec and WireGuard VPN protocols, ensuring secure and reliable communication across geographically dispersed networks via IPSec tunnels or WireGuard peers, respectively. Based on the chosen VPN protocol, it supports multiple VPN tunnels or peers, allowing for scalable and flexible network architectures.
Note: You can set up a maximum of three VPN gateways in each region. To increase the quota for your contract, please contact IONOS Cloud Support.
When a user or a device initiates a connection to a network through a VPN Gateway, the gateway establishes a secure, encrypted tunnel/peer between the user and the target network. This process involves:
Authentication: The user or device is authenticated using certificates or pre-shared keys to ensure only authorized users can access the network.
Encryption: VPN Gateway encrypts data packets using protocols like IPsec or WireGuard to ensure secure transmission over the internet.
Tunneling/Peering: The encrypted data packets are encapsulated within another packet, creating a secure tunnel/peer through which the data travels. This tunnel/peer protects the data from being intercepted or tampered with during transmission.
Routing: VPN Gateway routes the encrypted data packets to the appropriate destination within the target network. Once the data reaches its destination, it is decrypted and delivered to the intended recipient.
Maintaining Connectivity: VPN Gateway continuously monitors the connection to ensure stability and performance. It implements failover mechanisms to switch to backup connections if the primary connection is disrupted, ensuring continuous connectivity.