From the course: Cloud Computing: Understanding Networking
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Configuring VPNs for secure inter-cloud communication
From the course: Cloud Computing: Understanding Networking
Configuring VPNs for secure inter-cloud communication
- [Narrator] So you want to make two cloud brands communicate with one another using a VPN. What are the steps to take? We've already covered the steps in setting up a VPN from an on-premise system to a single public cloud provider. Here, we are doing just the same thing, but between two different cloud providers. So we'll mostly focus on the added steps and what they mean. First is that you need to pick a VPN protocol or the way that the VPN will communicate across itself. Obviously, both sender and receiver must agree on the protocol or protocols that they're going to use. Examples include IPSec, Internet Protocol Security, SSL, TLS, our secured sockets layer and transport layer security and L2TP, meaning layer two tunneling protocol. It does not make much sense to go in depth here, but each protocol has its own strengths and use cases. Second, we need to implement authentication. This means agreeing on which digital certificate is going to be used. Also, pre-shared keys or…