VPN gateway known limitations, issues, and restrictions
Lists known limitations, issues, and restrictions for IBM Cloud VPN for VPC.
Limitations
-
A VPN gateway for VPC accepts VPN packets with UDP Encapsulation of IPsec ESP Packets only. The Encapsulating Security Payload (ESP) is not accepted. Make sure that the NAT-T feature is enabled on your on-premises VPN device. Also, make sure that UDP ports 500 and 4500 are allowed for both IBM VPC NACL and peer networks.
-
When multiple networks, subnets, or both are associated with either an IBM Cloud VPN gateway or an on-premises device, avoid mixing policy-based and route-based VPNs. Policy-based VPNs create a tunnel for each target network range. However, route-based VPNs route everything to a peer device through a single tunnel. Therefore, when multiple network ranges are configured, only a single tunnel that is associated with a single-network range can be established. Combining contiguous subnets into a single superset CIDR is a valid workaround to this limitation.
-
Peer subnets of a VPN gateway connection cannot overlap.
-
When connecting a policy-based VPN with a route-based peer (or static, route-based VPN with a policy-based peer), use only a single network range for both sides. A policy-based VPN uses one tunnel for each associated network. However, a route-based VPN requires only a single tunnel. Therefore, a connection between different types of VPNs associated with multiple network ranges on either side might result in a connection that only works for a single-network range.
If possible, combine contiguous subnets into a single network range in a VPN configuration. For example, subnets
192.168.0.0/24
and192.168.1.0/24
can be defined as192.168.0.0/23
in a VPN or routing configuration. -
An IBM Cloud policy-based VPN gateway resides in the zone that is associated with the subnet that you select during provisioning. The VPN gateway serves only the virtual server instances in the same zone of the VPC. Therefore, instances in other zones can't use the VPN gateway to communicate with an on-premises private network. For zone fault tolerance, you must deploy one VPN gateway per zone.
-
An IBM Cloud route-based VPN gateway resides in the zone that is associated with the subnet that you select during provisioning. It is recommended that a VPN gateway serves only virtual server instances in the same zone of the VPC. Instances in other zones can use the route-based VPN gateway to communicate with an on-premises private network, but this is not recommended. For zone fault tolerance, you must deploy one VPN gateway per zone.
-
When you configure and optimize site-to-site IPsec VPN connections, you might encounter network performance issues, one of which is related to Maximum Transmission Unit (MTU) and Maximum Segment Size (MSS) clamping. For more information, see IBM site-to-site VPN Maximum Transmission Unit (MTU) clamping.
-
When the next hop of a route is a VPN gateway connection, this route must be present in an egress routing table, meaning that the route table must be associated with the VPC subnets. Additionally, when the VPN gateway forwards traffic to the VPN tunnel, it also checks if the source IP of this traffic is within the subnet attached to the routing table. If the source IP is not within the subnet attached to the routing table, the traffic will not be encrypted and forwarded through the VPN tunnel to the peer gateway. For instance, if the VPN gateway receives traffic routed through the ingress routing table, this traffic is not forwarded into the VPN tunnel because its source IP is not within the subnet attached to the routing table.
Creating a route in an ingress routing table with a next hop being a VPN gateway connection is not supported.
Known issue
Updating the peer.address
or peer.fqdn
of a VPN gateway connection - If the local.ike_identities
and peer.ike_identity
properties are not set explicitly when you created the VPN gateway connection,
when you update a VPN gateway connection and specify either peer.address
or peer.fqdn
the property value will be changed to match the updated value,
instead of being left unchanged. Conversely, if the local.ike_identities
and peer.ike_identity
properties are set explicitly when you created the VPN gateway connection, the values cannot be changed without deleting
the VPN gateway connection.
Distributing traffic restrictions
When distributing traffic, the peer gateway must be able to support Equal-Cost Multi-Path routing (ECMP). Additionally, certain peer gateways might require specific configurations to enable ECMP. For more information, see the Distributing traffic for a route-based VPN use case.