An SSL server defines the networks and resources that clients can access. Before you use the SSL-VPN feature, you must create an SSL server.
Prerequisites
You have created a VPN Gateway instance and enabled the SSL-VPN feature for the instance. For more information, see Create and manage a VPN Gateway instance.
If you did not enable the SSL-VPN feature when you created the VPN Gateway instance, you can enable it at any time. For more information, see Enable the SSL-VPN feature.
Create an SSL server
Log on to the VPN Gateway console.
In the left-side navigation pane, choose Network Interconnection > VPN > SSL Servers.
In the top navigation bar, select the region where you want to create the SSL server.
The SSL server must be in the same region as the associated VPN Gateway instance.
On the SSL Servers page, click Create SSL Server.
In the Create SSL Server panel, configure the parameters and click OK.
Parameter
Description
Name
Enter a name for the SSL server.
Resource Group
Select the resource group to which the VPN Gateway instance belongs.
The system automatically adds the SSL server to the same resource group as the VPN Gateway instance.
VPN Gateway
Select the VPN Gateway instance to associate with the SSL server.
Make sure that the SSL-VPN feature is enabled for the selected VPN Gateway instance.
Local Network
The destination CIDR blocks that clients can access through the SSL-VPN connection.
The local network can be the CIDR block of a Virtual Private Cloud (VPC), a vSwitch, a data center connected to the VPC over an Express Connect circuit, or a cloud service such as Object Storage Service (OSS) or ApsaraDB RDS.
Click Add Local CIDR Block to add multiple CIDR blocks. You can add up to five local networks. The following IP address ranges cannot be used for a local network:
127.0.0.0 to 127.255.255.255
169.254.0.0 to 169.254.255.255
224.0.0.0 to 239.255.255.255
255.0.0.0 to 255.255.255.255
NoteThe prefix length of the local network must be 8 to 32 bits.
Client CIDR Block
The IP address pool from which the VPN Gateway instance assigns IP addresses to client virtual network interfaces. This pool is separate from the client's private network. When a client connects, the VPN Gateway instance assigns it an IP address from this pool for accessing cloud resources.
Ensure that the client CIDR block provides at least four times the number of IP addresses as the maximum number of concurrent SSL connections supported by the VPN Gateway instance.
ImportantThe prefix length of the client CIDR block must be 16 to 29 bits.
Ensure that the client CIDR block does not overlap with the Local Network, the VPC CIDR block, or any route CIDR blocks associated with the client.
Use private CIDR blocks such as
10.0.0.0/8,172.16.0.0/12,192.168.0.0/16, or their subnets. If you must use a public IP address range, you must configure it as a user-defined CIDR block for the VPC to ensure proper routing. For more information, see VPC FAQ and VPC FAQ.After you create the SSL server, the system automatically adds a route for the client CIDR block to the VPC's route table. Do not manually add this route, as it can cause disruptions to SSL-VPN traffic.
Advanced Configuration
Protocol
The protocol for the SSL-VPN connection. Valid values:
UDP
TCP (Default)
Port
The port used by the SSL server. The value must be an integer from 1 to 65535. The default value is 1194.
NoteThe following ports are not supported: 22, 2222, 22222, 9000, 9001, 9002, 7505, 80, 443, 53, 68, 123, 4510, 4560, 500, and 4500.
Encryption Algorithm
The encryption algorithm for the SSL-VPN connection.
If the client uses Tunnelblick or an OpenVPN client of version 2.4.0 or later, the encryption algorithm is dynamically negotiated. The negotiation prioritizes the most secure algorithm supported by both the server and client. The algorithm specified for the SSL server does not take effect.
If the client uses an OpenVPN client earlier than version 2.4.0, the client uses the algorithm specified for the SSL server. Supported algorithms include:
AES-128-CBC (Default)
AES-192-CBC
AES-256-CBC
none
This option disables encryption.
Compressed
Enable or disable data compression for the SSL-VPN connection. Valid values:
Yes
No (Default)
Two-factor Authentication
Enable or disable two-factor authentication. This feature is disabled by default.
Two-factor authentication adds a second layer of security to SSL-VPN connections. It requires clients to pass two separate authentication checks: the default SSL client certificate authentication and a username/password authentication against an IDaaS EIAM instance. A client gains access only after it successfully passes both checks. This dual-authentication mechanism enhances security by protecting against identity theft and unauthorized connections, which safeguards sensitive data within your VPC. For a tutorial, see SSL-VPN two-factor authentication.
After you enable this feature, you must select an IDaaS EIAM instance and an IDaaS application ID for authentication.
NoteWhen using the two-factor authentication feature for the first time, you must first grant the required permissions. For more information, see Authorization.
When you create an SSL server in the UAE (Dubai) region, bind it to an IDaaS EIAM 2.0 instance in the Singapore region to reduce cross-region latency.
IDaaS EIAM 1.0 instances are no longer available for purchase. If your Alibaba Cloud account has an IDaaS EIAM 1.0 instance, you can still bind it after you enable two-factor authentication.
If your Alibaba Cloud account does not have an IDaaS EIAM 1.0 instance, you can bind only IDaaS EIAM 2.0 instances.
When you bind an IDaaS EIAM 2.0 instance, you may be required to upgrade your VPN Gateway instance. For more information, see [Notice] IDaaS EIAM 2.0 is now supported for SSL-VPN two-factor authentication.
What to do next
After you create the SSL server, you must create and download an SSL client certificate. You then install this certificate on the client device to authenticate the client and encrypt data. For more information, see Create and manage an SSL client certificate.
Modify an SSL server
You can modify the configuration of an SSL server after its creation. Depending on the changes, you may need to download a new client certificate or re-establish the SSL-VPN connection.
Modifying the Protocol, Compressed, or Two-factor Authentication settings in the Advanced Configuration section invalidates all associated SSL client certificates. You must create new client certificates, install them on your clients, and reconnect.
Modifying the Local Network or Client CIDR Block terminates all active SSL-VPN connections. Clients must re-establish their connections.
Log on to the VPN Gateway console.
In the left-side navigation pane, choose Network Interconnection > VPN > SSL Servers.
In the top navigation bar, select the region of the SSL server.
On the SSL Servers page, find the SSL server that you want to modify and click Edit in the Actions column.
In the Modify SSL Server panel, change the settings as needed and click OK.
Delete an SSL server
You can delete an SSL server that you no longer need. Deleting an SSL server also deletes all associated SSL client certificates and immediately terminates any active client connections.
Log on to the VPN Gateway console.
In the left-side navigation pane, choose Network Interconnection > VPN > SSL Servers.
In the top navigation bar, select the region of the SSL server.
On the SSL Servers page, find the SSL server that you want to delete and click Delete in the Actions column.
In the confirmation dialog box, read the information and click Delete.
Manage SSL servers with APIs
You can create, query, modify, and delete SSL servers by calling API operations using tools such as Alibaba Cloud SDK (recommended), Alibaba Cloud Command Line Interface (Alibaba Cloud CLI), Terraform, and Resource Orchestration Service (ROS). For more information, see the following API documentation: