[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-08-12。"],[],[],null,["# Use third-party VPNs\n\nThis page provides Google-tested interoperability guides and vendor-specific\nnotes for peer third-party VPN devices or services that you can use to connect\nto Cloud VPN.\n\nEach Interop guide offers specific instructions for connecting the third-party\nVPN solution to Cloud VPN. If the third-party solution supports\ndynamic (BGP) routing, the guide includes configuration instructions for\n[Cloud Router](/network-connectivity/docs/router/concepts/overview).\n\nMost peer VPN devices should be compatible with Cloud VPN. For general\ninformation about configuring peer VPN devices, see\n[Configure the peer VPN gateway](/network-connectivity/docs/vpn/how-to/configuring-peer-gateway).\n\nAny third-party device or service that supports IPsec and IKE versions 1 or\n2 should be compatible with Cloud VPN. For a list of IKE ciphers and\nother configuration parameters used by Cloud VPN, see\n[Supported IKE ciphers](/network-connectivity/docs/vpn/concepts/supported-ike-ciphers).\n\nSome third-party device configuration templates are available for download from\nthe Google Cloud console. For more information,\nsee [Download a peer VPN configuration template](/network-connectivity/docs/vpn/how-to/download-config).\n\nIPv6 is supported only in HA VPN configurations.\nIPv6 is not supported by Classic VPN.\n\nFor more information about Cloud VPN, see the\n[Cloud VPN overview](/network-connectivity/docs/vpn/concepts/overview).\n\nFor definitions of terms used on this page, see\n[Key terms](/network-connectivity/docs/vpn/concepts/key-terms).\n| **Note:** Guides on this page may refer to the Classic VPN configuration instead of HA VPN.\n| **Warning:** Certain Classic VPN dynamic routing functionality is deprecated. For more information, see [Classic VPN dynamic routing partial deprecation](/network-connectivity/docs/vpn/deprecations/classic-vpn-deprecation).\n\nInterop guides by vendor\n------------------------\n\nThis section lists interoperability guides by vendor. Each\nguide covers how to use that vendor's VPN gateway solution with\nCloud VPN.\n\nFor detailed notes covering the vendors listed in this section, see the\n[vendor-specific notes section](#vendor-specific-notes).\n\n### A-L\n\n### M-Z\n\nVendor-specific notes\n---------------------\n\nThe following vendor-specific guidelines help you configure your third-party VPN\ndevices to work with Cloud VPN.\n\n### Check Point\n\nCheck Point VPN implements IKEv2 by creating multiple Child Security Associations\n(SAs) when you specify more than one CIDR per traffic selector. This\nimplementation is incompatible with Cloud VPN, which requires all\nCIDRs for the local traffic selector and all CIDRs for the remote traffic selector\nto be located in a single Child SA. For suggestions about how to create a\ncompatible configuration, see [Traffic selector\nstrategies](/network-connectivity/docs/vpn/concepts/choosing-networks-routing#route-alignment).\n\n### Cisco\n\nIf your VPN gateway runs Cisco IOS XE, make sure that you're running version\n16.6.3 (Everest) or later. Earlier versions have known problems with Phase 2\nrekey events, which result in tunnels going down for a few minutes every few\nhours.\n\nCisco ASA supports route-based VPN with Virtual Tunnel Interface (VTI) in IOS\nversion 9.7(x) and later. For more information, see the following:\n\n- [Release Notes for the Cisco ASA Series, 9.7(x)](https://www.cisco.com/c/en/us/td/docs/security/asa/asa97/release/notes/asarn97.html)\n- [Virtual Tunnel Interface sections in the Cisco ASA Series VPN CLI Configuration Guide, 9.7](https://www.cisco.com/c/en/us/td/docs/security/asa/asa97/configuration/vpn/asa-97-vpn-config/vpn-vti.pdf)\n\n | **Note:** IOS version 9.7 is not supported with ASA hardware version 5505, which has reached [end-of-life status](https://www.cisco.com/c/en/us/products/collateral/security/asa-5505-adaptive-security-appliance/eos-eol-notice-c51-738642.html). For more information, see the [ASA compatibility matrix](https://www.cisco.com/c/en/us/td/docs/security/asa/compatibility/asamatrx.html).\n\nWhen using Cisco ASA devices with a Cloud VPN tunnel, you cannot\nconfigure more than one IP address range (CIDR block) for each of the local and\nremote traffic selectors. The reason is that Cisco ASA devices use a unique\nSA for each IP address range in a traffic selector, while Cloud VPN\nuses a single SA for all IP ranges in a traffic selector. For more information,\nsee [Policy-based tunnels and traffic selectors](/network-connectivity/docs/vpn/concepts/choosing-networks-routing#static-routing-networks).\n\nWhat's next\n-----------\n\n- To configure your third-party VPN for dual-stack (IPv4 and IPv6) or IPv6-only traffic, see [Set up third-party VPNs for IPv4 and IPv6 traffic](/network-connectivity/docs/vpn/how-to/interop-guides-ipv6).\n- To configure firewall rules for your peer network, see [Configure firewall rules](/network-connectivity/docs/vpn/how-to/configuring-firewall-rules).\n- To use high-availability and high-throughput scenarios or multiple subnet scenarios, see [Advanced configurations](/network-connectivity/docs/vpn/concepts/advanced).\n- To help you solve common issues that you might encounter when using Cloud VPN, see [Troubleshooting](/network-connectivity/docs/vpn/support/troubleshooting)."]]