All Products
Search
Document Center

Secure Access Service Edge:Use other Alibaba Cloud network instances

Last Updated:Mar 31, 2026

If your enterprise uses Virtual Border Router (VBR) leased lines, Cloud Connect Network (CCN) instances, or VPN gateways to connect on-premises networks to Alibaba Cloud, you can extend that connectivity through Secure Access Service Edge (SASE) to reach business resources outside Alibaba Cloud. Once enabled, users access those resources over an internal network through the SASE client — no extra infrastructure required.

How it works

SASE automatically discovers VBR, CCN, and VPN gateway instances in your account and presents them as connectors in the console. Each connector maps to a network channel:

Connector typeNetwork channel
VBR Leased LineLeased Line
CCNSAG
VPN GatewayIPsecVPN

To activate connectivity, you synchronize the connector, configure a back-to-origin virtual private cloud (VPC), and turn on Network Connection. SASE then routes user traffic through the connector's network channel to your on-premises network, and from there to your off-cloud business resources.

Manage connectors across multiple Alibaba Cloud accounts

By default, the Private Access > Network Settings > Services Outside Alibaba Cloud page shows only the VBRs, IPsec-VPN connections, and Smart Access Gateway (SAG) instances in your management account. To include resources from member accounts in your resource directory, add those members first. For details, see Use the multi-account management feature.

Network connection diagram

image

Turn on network connection

Prerequisites

Before you begin, ensure that you have:

  • A VBR leased line, CCN instance, or VPN gateway configured in your Alibaba Cloud account

  • Access to the SASE console with permission to manage Private Access > Network Settings

Step 1: Synchronize Alibaba Cloud network instances

SASE automatically synchronizes your Alibaba Cloud network instances. After synchronization, each instance appears as a connector on the Cloud Network Instance tab with the following details:

ParameterDescription
Connector typeThe connector type: VBR Leased Line, CCN, or VPN Gateway.
Instance ID/NameThe ID of the VBR, CCN instance, or VPN gateway that generated the connector.
Owner accountThe account that owns the connector: the management account or a member.
Network channelThe underlying channel: Leased Line, SAG, or IPsecVPN — determined by the connector type.
Internal CIDR blockThe CIDR block of your on-premises network or the vSwitch CIDR block in your VPC.

Internal CIDR block behavior differs by network channel:

  • SAG or IPsecVPN: SASE retrieves the CIDR block automatically. No action needed.

  • Leased Line: SASE cannot retrieve the CIDR block automatically. Enter the value manually. Separate multiple CIDR blocks with commas (,). For example: 192.168.1.0/24,10.0.0.0/16.

Step 2: Configure a back-to-origin VPC

SASE accesses your on-premises network through a VPC connected to it. This VPC is the back-to-origin VPC. The configuration steps differ by connector type:

  • VPN Gateway: The back-to-origin VPC is fixed. Only one VPC can connect to the on-premises network, so there is nothing to configure.

  • VBR Leased Line: Enter a back-to-origin address in the Back-to-origin VPC column.

  • CCN: Click Select Back-to-origin VPC in the Actions column to choose one or more back-to-origin VPCs.

Note

For CCN connectors, all VPCs attached to the CCN instance are theoretically connected to the on-premises network. If you have configured routing or security policies that restrict access, select only the VPCs from which on-premises access is permitted.

Step 3: Turn on network connection

On the Cloud Network Instance tab, find the connector and turn on the switch in the Network Connection column. Users can now access off-cloud business resources through the SASE client.

Turn off network connection

To disconnect a network channel, turn off Network Connection for the corresponding connector.

Important

After you turn off Network Connection, users can no longer access office applications through the SASE client. Proceed with caution.

What's next

After you enable network connections, you must configure applications to allow users to access the applications. Configure applications and zero trust policies to enforce access controls:

References