Articles in this section

Networking and connectivity for Celigo Private Cloud

Celigo Private Cloud supports various secure connection methods, including Virtual Private Network (VPN) and IP whitelisting. This section provides guidelines for setting up and managing connectivity to your private instance.

Set up a virtual private network (VPN)

VPN connectivity allows you to establish a secure, encrypted channel between your network and your Celigo Private Cloud dedicated instance. A VPN ensures secure transmission of sensitive data, limits access to your instance to authorized users and systems, and simplifies compliance with security and regulatory requirements.

  1. Provide your VPN configuration details to Celigo during the onboarding process. Celigo will generate and share connection credentials and settings, including IP ranges and encryption parameters.

  2. Test the VPN connection to ensure reliable access to your dedicated environment.

Set up IP whitelisting

IP whitelisting restricts access to your dedicated instance by defining a list of trusted IP addresses. Always use static IP addresses for systems that connect to your dedicated instance, and limit the number of IP addresses on the whitelist to reduce exposure.

  1. Provide a list of authorized IP addresses or ranges to Celigo Support. Celigo will configure access controls for your instance to allow only traffic from these addresses.

  2. Regularly review and update your IP whitelist to maintain security.

Connect to other systems

Celigo Private Cloud supports seamless connections to cloud-hosted platforms such as Salesforce, NetSuite, or AWS-based services. Use API keys or OAuth for authentication when connecting to other systems, and verify that IP whitelisting or VPN access includes the required endpoints.

For on-premises systems that are hosted on your local network, Celigo Private Cloud can establish secure connectivity with VPN or other supported methods

  1. Configure your on-premises network to allow traffic through the VPN or other secure tunnels.

  2. Use Celigo connectors to interact with on-premises databases, file servers, or ERP systems.

  3. Test workflows to ensure successful data transfer between the on-premises systems and your dedicated instance.

Monitor and manage connectivity

Use Celigo’s built-in monitoring tools to track connectivity status and ensure uptime. You can set up alerts for connection failures, review access logs to monitor who is connecting to your dedicated instance (and when), and detect suspicious activity to ensure compliance with security policies. You should also periodically update VPN configurations, API tokens, and other credentials to maintain security.

  • Use Layered Security: Combine VPN, IP whitelisting, and single sign-on (SSO) for maximum security.

  • Plan for Redundancy: Implement backup connectivity options to ensure continuous access during outages or network disruptions.

  • Test Connections Regularly: Conduct routine tests to verify that all connectivity methods are functioning as expected.

For further assistance or troubleshooting, contact Celigo support.

Was this article helpful?
0 out of 0 found this helpful

Comments

0 comments

Article is closed for comments.