Table of Contents

Connecting to private data sources with DaaS

If you are using a DaaS system, by default you will only be able to connect to data sources that can be accessed from dataminer.services over the internet. To make sure DaaS can also access private data sources, from DataMiner 10.5.10/10.6.0 onwards, you can set up and use Site Manager. For detailed information, refer to About Site Manager.

Prior to DataMiner 10.5.10/10.6.0, or in some specific cases not supported by Site Manager, a site-to-site VPN connection will need to be set up. This will establish a secured connection between your DaaS system and your self-hosted network (which can be on-premises or hosted by the cloud provider of your choice).

About the site-to-site VPN connection

To establish this connection, after you have followed the procedure below, Skyline will enable an Azure VPN Gateway in the virtual network of your DaaS environment.

Gateway SKUs

By default, our deployments use the Generation 1 VPN Gateway SKU VpnGw1AZ:

  • At most 30 tunnels can be created.
  • Throughput benchmark of 650 Mbps.
  • Zone redundant (as indicated by the "AZ" in the SKU): Gateway instances are automatically distributed across multiple Azure Availability Zones. This increases resilience and protects against zone-level failures.

You can request a different SKU during the setup, and it is also possible to scale up to VpnGw2AZ and VpnGw3AZ (generation 1) later if necessary.

For more information, refer to the official Microsoft documentation About gateway SKUs.

VPN gateway redundancy modes

By default, the gateway runs in Active-Standby mode:

  • Two instances are deployed in the background, but only one actively processes traffic.
  • You will need to connect to one public IP address.
  • If the active instance fails, Azure automatically fails over to the standby instance. This failover is seamless, but may cause a brief reconnection.

If you require even higher availability, Active-Active mode can be enabled:

  • Both gateway instances are active simultaneously.
  • Each instance has its own public IP address, and on-premises VPN devices must establish a tunnel to each IP address.
  • Traffic is load-balanced across the two tunnels. If one instance fails, the other continues to process traffic without the need for failover.

By default, the IKEv2 protocol will be used. IKEv1 is possible but not recommended.

If a custom policy is preferred, you can request this during the setup.

Establishing the site-to-site VPN connection

Tip

If you are not familiar with any of the terminology used in this section, please refer to Azure VPN Gateway FAQ.

  1. Make sure the following prerequisites are met:

  2. Contact daas@dataminer.services to set up a site-to-site VPN connection.

    Provide the following information in your email:

    • The public IP of your VPN device.

    • A pre-shared key to use for the VPN connection.

    • The address space of the network(s) that should be reachable by your DaaS system.

    • If BGP should be enabled, the ASN and BGP peer IP address.

    • The preferred cryptographic algorithms and key strengths. We prefer to use the most secure and efficient settings that are available on your device.

      Note

      The IPSec Phase 1 or Main Mode lifetime is fixed to 28800 seconds for Azure VPN Gateways.

    • Optionally, if the VpnGw1AZ gateway SKU does not meet your requirements, the required SKU.

    • Optionally, if you want a custom policy to be used, the required policy.

    • Any other information that might be relevant for your specific setup.

Once the VPN Gateway has been enabled, Skyline will provide you with the following information:

  • The public IP of the Azure VPN Gateway.

  • The DaaS address space (by default 172.23.0.0/16, but this can be different to prevent an overlap with your address space).

  • The BGP ASN (if BGP is set).