Network Cloud Services - Virtual Private Cloud
Network Cloud Services - Virtual Private Cloud
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
1. VPC Overview
2. VPC Concepts
3 Huawei Confidential
VPC Concepts
A Virtual Private Cloud (VPC) is a logically isolated virtual network. Within your own
VPC, you can create subnets, configure route tables, assign elastic IP addresses (EIPs)
and bandwidths, and implement access control through security groups and network
ACLs.
4 Huawei Confidential
VPC and Classic Network
Classic network: All users on the public cloud share one network resource pool, and their
networks are not logically isolated. Private IP addresses are allocated by the system in a unified
manner. Each private IP address can only be allocated to one user.
VPC: A VPC is a logically isolated virtual network on the public cloud. Within your own VPC, you
can assign more than one private IP address, define subnets and routes, and implement access
control through security groups and network ACLs.
Connection VPN Direct
NAT Custom O&M
between Connect
gateway gateway gateway gateway VPN
VPCs
Route table
User A
Subnet A Subnet B
User B
5 Huawei Confidential
VPC Product Architecture
You can configure security
groups, VPNs, subnets, and
bandwidth in VPCs. With VPC,
you can easily manage and
configure private networks and
change network configurations
flexibly and securely. You can
also customize the ECS access
rules within a security group or
between security groups to
improve ECS security.
6 Huawei Confidential
VPC Product Advantages
7 Huawei Confidential
Contents
1. VPC Overview
2. VPC Concepts
8 Huawei Confidential
VPC Concepts - Subnet
A subnet is a network plane for managing cloud resources in a VPC. All cloud resources
must be deployed in subnets. By default, ECSs in all subnets of the same VPC can
communicate with one another, whereas ECSs in the subnets of different VPCs cannot
communicate with each other.
9 Huawei Confidential
VPC Concepts - Route Table
A route table contains routes that determine where traffic is directed.
When you create a VPC, the system automatically creates a default route table. The
route table ensures that all subnets in the VPC can communicate with each other. You
can also add custom routes to control where traffic is directed.
10 Huawei Confidential
VPC Concepts - Virtual IP Address
A virtual IP address can be shared among multiple ECSs. An ECS can have both private
and virtual IP addresses. You can access the ECS through either IP address. A virtual IP
address has the same network access capability as a private IP address. Virtual IP
addresses are used for high availability because they facilitate active/standby ECS
switchover.
11 Huawei Confidential
VPC Concepts - Security Group
A security group is a collection of access control rules for ECSs that have the same
security protection requirements and are mutually trusted in a VPC. After you create a
security group, you can create different access rules for the security group to protect the
ECSs that it contains.
12 Huawei Confidential
VPC Concepts - Network ACL
A network ACL is an optional layer of
security for your subnets. After you
associate one or more subnets with a
network ACL, the network ACL can help
you control traffic in and out of the
subnets.
13 Huawei Confidential
VPC Concepts - EIP
The Elastic IP (EIP) service enables you to use static public IP addresses and scalable
bandwidths to connect your cloud resources to the Internet. You can easily bind or
unbound EIPs to or from cloud resources to keep up with changes in demand.
14 Huawei Confidential
VPC Concepts - Shared Bandwidth
Shared bandwidth allows multiple EIPs to share the same bandwidth. The ECSs, BMSs,
and load balancers that are bound with EIPs in the same region can use the same
shared bandwidth.
Bandwidth Bandwidth
75 Mbit/s
50 50 Mbit/s 50
40 Mbit/s
40 40
30 Mbit/s
30 30
00:00 08:00 16:00 24:00 Time 00:00 08:00 16:00 24:00 Time
Three EIPs use a total Three EIPs use the same shared
bandwidth of 120 Mbit/s. bandwidth of 75 Mbit/s.
15 Huawei Confidential
VPC Concepts - Shared Data Package
A shared data package provides a quota for data usage. Such packages are cost-effective and
easy to use. Shared data packages take effect immediately after you purchase them. If you have
subscribed to pay-per-use EIPs billed by traffic in a region and buy a shared data package in the
same region, all your EIPs in that region will use the shared data package. After the package
quota is used up or the package expires, the EIPs will continue to be billed on a pay-per-use basis.
… use quota of
Bandwidth
Yearly/monthly
bandwidth increases to
100 Mbit/s temporarily
100
Yearly/monthly
bandwidth of 30 Mbit/s 30 Mbit/s
30
Add a 70 Mbit/s
bandwidth add-on
package
17 Huawei Confidential
VPC Concepts - VPC Peering
A VPC peering connection is a network connection between two VPCs in the same region. A VPC
peering connection allows two VPCs to communicate with each other using private IP addresses if
they are in the same region. You can create a VPC peering connection between your own VPCs, or
between your VPC and a VPC of another account within the same region. A VPC peering
connection cannot be created between VPCs in different regions.
Router Router
VPC: VPC:
10.10.0.0/16 10.20.0.0/16
Subnet Subnet VPC peering Subnet Subnet
gateway gateway connection gateway gateway
18 Huawei Confidential
Contents
1. VPC Overview
2. VPC Concepts
19 Huawei Confidential
Dedicated Networks on Cloud
Each VPC represents a private network and is logically isolated from other VPCs. By deploying
your application system in a VPC, you have given it a private network environment on the cloud.
If you have multiple service systems, for example, a production system and a test system, you can
deploy them in two different VPCs to isolate them. If you want to establish communication
between these two VPCs, you can create a VPC peering connection between them.
20 Huawei Confidential
Web Application or Website Hosting
You can host web applications and websites in a VPC and use the VPC as a regular network. With
EIPs or NAT gateways, you can connect ECSs running web applications to the Internet. With the
load balancers provided by the ELB service, you can evenly distribute access traffic across these
ECSs.
21 Huawei Confidential
Web Application Access Control
You can create a VPC and security groups to host multi-tier web applications in different security
zones. You can associate web servers and database servers with different security groups and
configure different access control rules for security groups. You can launch web servers in a
publicly accessible subnet, but run database servers in subnets that are not publicly accessible.
This arrangement ensures high security.
22 Huawei Confidential
VPC Connectivity Options
You can use VPC Peering, Cloud Connect, or VPN to allow different VPCs to
communicate with each other.
23 Huawei Confidential
Hybrid Cloud Deployment
If you have an on-premises data center and you do not want to migrate all of your
business to the cloud, you can build a hybrid cloud, so that you can retain core data in
your data center.
24 Huawei Confidential
Contents
1. VPC Overview
2. VPC Concepts
25 Huawei Confidential
VPC Configuration Procedure (1)
If any of your ECSs, for example, ECSs that function as the database or server nodes for
website deployment, do not need to be accessible from the Internet, you can configure
a VPC for the ECSs by performing the following procedure.
26 Huawei Confidential
VPC Configuration Procedure (2)
Optional or
Task Description
Mandatory
If you need another subnet in addition to the default one, you can create a
02 Create another
subnet in the VPC. Optional
subnet for the VPC.
The new subnet will be used to assign IP addresses to NICs added to the ECS.
03 Create a security You can create a security group and add ECSs in the VPC to the security group
Mandatory
group. to enhance security for the ECSs.
After a security group is created, it has a default rule, which allows all outgoing
04 Add a security data packets. ECSs in a security group can access each other by default. If the
Optional
group rule. default rule meets your service requirements, you do not need to add rules to
the security group.
27 Huawei Confidential
VPC and Default Subnet Configuration Parameters
Parameter Description Example Value
Specifies the desired region. Regions are geographic areas that are physically isolated from each other. The
Region networks inside different regions are not connected to each other, so resources cannot be shared across CN North-Beijng4
different regions. For lower network latency and faster access to your resources, select the nearest region.
Specifies the CIDR block of the VPC. The CIDR block of a subnet can be the same as the CIDR block for the VPC
CIDR Block (for a single subnet in the VPC) or a subset of the CIDR block for the VPC (for multiple subnets in the VPC). 192.168.0.0/16
Supported CIDR blocks: 10.0.0.0 – 10.255.255.255, 172.16.0.0 – 172.31.255.255, 192.168.0.0 – 192.168.255.255.
Enterprise
Specifies the enterprise project to which the VPC belongs. By default, the VPC belongs to the Default project. Default
Project
•Key: vpc_key1
Tag Specifies the VPC tag, which consists of a key and value. You can add a maximum of ten tags to each VPC.
•Value: vpc-01
CIDR Block Specifies the CIDR block for the subnet. This value must be within the VPC CIDR block. 192.168.0.0/24
DNS Server External DNS server addresses are used by default. If you change the DNS server address, ensure that the DNS
192.168.1.0
Address server addresses you specify are available.
Specifies the subnet tag, which consists of a key and value pair. You can add a maximum of ten tags to each •Key: subnet_key1
Tag
subnet. •Value: subnet-01
28 Huawei Confidential
Subnet Configuration Parameters
Specifies the subnet tag, which consists of a key and value pair. •Key: subnet_key1
Tag
You can add a maximum of ten tags to each subnet. •Value: subnet-01
29 Huawei Confidential
Security Group Rules
Scenarios
Security groups have default rules configured for them. You can add new inbound and outbound rules to the
security group.
Inbound rules control incoming traffic to ECSs associated with the security group.
Outbound rules control outgoing traffic from ECSs associated with the security group.
Default security group rules
30 Huawei Confidential
Security Group Rule Configuration Parameters
Parameter Description Example Value
Protocol Specifies the network protocol. TCP
Port: specifies the port or port range for which the security group rule takes effect. The
22 or 22-30
value ranges from 1 to 65535.
Port & Source: specifies the source of the security group rule. The value can be a security group or
Source an IP address. For example: 0.0.0.0/0
(Inbound) xxx.xxx.xxx.xxx/32 (IPv4 address) or
xxx.xxx.xxx.0/24 (subnet) default
0.0.0.0/0 (any IP address)
Port: specifies the port or port range for which the security group rule takes effect. The
22 or 22-30
value ranges from 1 to 65535.
Port & Destination: specifies the destination of the security group rule. The value can be a security
Destination group or an IP address. For example: 0.0.0.0/0
(Outbound) xxx.xxx.xxx.xxx/32 (IPv4 address) or
xxx.xxx.xxx.0/24 (subnet) default
0.0.0.0/0 (any IP address)
Provides supplementary information about the security group. This parameter is optional.
Description The description can contain a maximum of 255 characters and cannot contain angle -
brackets (< or >).
31 Huawei Confidential
VPC Billing
The VPC service is free of charge. However, EIPs and bandwidths you use with a VPC
will be billed based on standard pricing.
EIPs can be billed on a yearly/monthly or pay-per-use basis.
Yearly/Monthly Bandwidth - √ -
32 Huawei Confidential
Quiz
33 Huawei Confidential
More Information
34 Huawei Confidential
Summary
35 Huawei Confidential
Recommendations
36 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
39 Huawei Confidential
Foreword
40 Huawei Confidential
Objectives
41 Huawei Confidential
Contents
1. ELB Overview
2. Application Scenarios
3. ELB Management
4. Related Services
42 Huawei Confidential
Product Concepts
Elastic Load Balance (ELB) automatically distributes incoming traffic across multiple
backend servers based on the rules you configure. ELB expands service capabilities of
applications and eliminates single points of failure (SPOFs), improving application
availability.
43 Huawei Confidential
Product Architecture
44 Huawei Confidential
Load Balancer Types (1)
ELB provides two types of load balancers:
Classic load balancers: ideal for web services with low traffic and simple applications
Shared load balancers: ideal for web services with high access traffic. Requests are forwarded
based on domain names or URLs, making request routing more flexible. (Shared load
balancers were previously called enhanced load balancers.)
45 Huawei Confidential
Load Balancer Types (2)
Load balancing at Layer 4 (TCP/UDP) and at Layer 7 (HTTP/HTTPS)
Load balancing at Layer 4: supports TCP and UDP. After a load balancer receives requests
from clients, it directly routes the requests to backend servers. Load balancing at Layer 4
features high routing efficiency and fast data transmission.
Load balancing at Layer 7: supports HTTP and HTTPS. After a load balancer receives a request
from a client, it identifies the fields in the HTTP/HTTPS packet header and routes the request
based on these fields. Though the routing efficiency is lower than that at Layer 4, load
balancing at Layer 7 provides some advanced functions such as encrypted transmission and
cookie-based sticky sessions.
46 Huawei Confidential
Load Balancing Algorithms
What load balancing algorithms does ELB use to distribute traffic?
Algorithm Weight Description
Requests are distributed across backend servers in sequence based on their
weights. The weight indicates the processing performance of the server.
Round robin Supported
Servers with the same weights process an equal number of connections. This
algorithm is often used for short connections, such as HTTP connections.
The least connections algorithm routes requests based on the number of
active connections processed by each backend server. In addition to the
Least number of connections, each server is assigned a weight based on its
Supported
connections processing capability. Requests are routed to the server that has the lowest
connections-to-weight ratio. This algorithm is often used for persistent
connections, such as connections to a database.
The source IP address of each client is calculated using the consistent hashing
algorithm to obtain a unique hash key, and all backend servers are numbered.
Source IP The generated key allocates the client to a particular server. This enables
N/A
hash requests from different clients to be routed and ensures that a client is
allocated to the same server it was allocated to before. This algorithm applies
to TCP connections without cookies.
47 Huawei Confidential
Product Advantages
48 Huawei Confidential
Contents
1. ELB Overview
2. Application Scenarios
3. ELB Management
4. Related Services
49 Huawei Confidential
Application Scenarios - High Traffic Business
For businesses with high volume of traffic,
such as large portals and mobile app
stores, ELB evenly distributes incoming
traffic to multiple backend servers.
Sticky sessions ensure that requests from
a client are forwarded to the same
backend server, improving access
efficiency.
50 Huawei Confidential
Application Scenario - Businesses with Significant
Traffic Peaks
For businesses that have significant
traffic peaks, integration with AS
allows backend servers to be added or
removed to meet changing
requirements, improving resource
utilization.
51 Huawei Confidential
Application Scenario - SPOF Elimination
ELB routinely performs health checks on
backend servers to monitor their healthy
state. If a backend server is detected
unhealthy, ELB will not route requests
to the unhealthy server till it becomes
healthy to ensure service continuity.
52 Huawei Confidential
Application Scenario - Cross-AZ Load Balancing
ELB can distribute traffic across AZs. When an AZ becomes faulty, ELB
distributes traffic to backend servers in other AZs.
53 Huawei Confidential
Contents
1. ELB Overview
2. Application Scenarios
3. ELB Management
4. Related Services
54 Huawei Confidential
ELB Management
Adding a listener
Creating a load balancer Modifying a listener
Deleting a load balancer Deleting a listener
ELB
Adding a certificate
Adding a backend server group Modifying a certificate
Deleting backend server group Deleting a certificate
55 Huawei Confidential
Load Balancer Management
Disabling a load balancer
56 Huawei Confidential
Creating a Load Balancer - Parameter Settings (1)
Parameter Description Example Value
Name Specifies the load balancer name. elb_01
Specifies the network type of a load balancer. There are two options:
Network Type • Public network: The load balancer can receive requests over the Internet. Private network
• Private network: The load balancer receives and routes requests in a VPC.
VPC Specifies the VPC where the load balancer works. VPC_01
Subnet Specifies the subnet of the VPC where the load balancer works. subnet01
Private IP Specifies the private IP address that will be bound to the load balancer. You can Manually-specified
Address select Automatically-assigned IP address or Manually-specified IP address. IP address
Specifies the public IP address that will be bound to the load balancer when you
select Public network for Network Type. The following options are available:
EIP Use existing
• New EIP: The system will assign an EIP.
• Use existing: Select an existing EIP.
57 Huawei Confidential
Creating a Load Balancer - Parameter Settings (2)
Parameter Description Example Value
Billed By Specifies how the new EIP is billed. Select Bandwidth or Traffic. Bandwidth
Identifies load balancers so that they can be easily categorized and quickly searched.
-
Tag A tag consists of a tag key and a tag value. The tag key marks a tag, and the tag
value specifies specific tag content.
58 Huawei Confidential
Listener Management
Adding a Listener
Modifying a Listener
Deleting a Listener
59 Huawei Confidential
Adding a Listener - Parameter Settings
Item Parameter Description Example Value
Name Specifies the listener name. Listener01
Specifies the protocol and port used by the load balancer to
receive requests. The following protocols are available:
Frontend TCP/22
TCP: load balancing at Layer 4
Protocol/Port HTTP/80
UDP: load balancing at Layer 4
HTTP/HTTPS: load balancing at Layer 7
Specifies whether to enable mutual authentication between the
Mutual server and client. To enable mutual authentication, both a server
-
Authentication certificate and CA certificate are required. This feature can be
enabled when the frontend protocol is HTTPS.
Listener
Specifies the certificate the server uses to authenticate the
CA Certificate client. This parameter is mandatory when the frontend protocol -
is HTTPS and mutual authentication is enabled.
Specifies the certificate that the HTTPS load balancer uses. This certmiij/9125267e
Server
parameter is available only when the frontend protocol is 1b1a4526b346cdf
Certificate
HTTPS. b9b9f856a
60 Huawei Confidential
Backend Server Group Management
Adding a Backend Server Group
Deleting a Backend Server Group
61 Huawei Confidential
Adding a Backend Server Group - Parameter Settings (1)
62 Huawei Confidential
Adding a Backend Server Group - Parameter Settings (2)
Item Parameter Description Example Value
Enable Health Check Specifies whether to enable the health check function.
N/A
Specifies the protocol the load balancer uses to perform health checks on backend servers.
You can use either TCP or HTTP. The protocol you select cannot be modified after the
Protocol TCP
listener is added to the load balancer. If the frontend protocol is UDP, the health check
protocol is UDP by default.
Specifies the domain name in the health check request. The domain name can contain
Domain Name digits, letters, hyphens (-), and periods (.), and must start with a digit or letter. The field is www.elb.com
left blank by default and is available only when the health check protocol is HTTP.
Health Specifies the port the load balancer uses to perform health checks on backend servers.
Port 80
check The port numbers range from 1 to 65535.
Specifies the maximum time between health checks in the unit of seconds.
Interval (s) 5
The value ranges from 1 to 50.
Specifies the maximum time required for waiting for a response from the health check in
Timeout Duration (s) 10
the unit of seconds. The value ranges from 1 to 50.
Specifies the health check URL, which is the destination on backend servers for health
Check Path checks. This parameter is available only when the health check protocol is set to HTTP. /test.html
The value can contain 1 to 80 characters.
Maximum Retries Specifies the maximum number of health check retries. The value ranges from 1 to 10. 3
63 Huawei Confidential
Contents
1. ELB Overview
2. Application Scenarios
3. ELB Management
4. Related Services
64 Huawei Confidential
ELB Relationships with Other Services
65 Huawei Confidential
ELB Relationships with Other Services
66 Huawei Confidential
ELB Relationships with Other Services
Cloud Trace Service (CTS) Records the operations performed on ELB resources. Viewing Traces
67 Huawei Confidential
Quiz
68 Huawei Confidential
Summary
69 Huawei Confidential
Recommendations
70 Huawei Confidential
Thank you.
71 Huawei Confidential
Network Cloud Services -
Virtual Private Network
73 Huawei Confidential
Foreword
74 Huawei Confidential
Objectives
75 Huawei Confidential
Contents
1. Overview
2. Getting Started
4. FAQs
76 Huawei Confidential
Concepts
VPN establishes a secure and encrypted communication tunnel between your
data center and VPC. With VPN, you can connect to a VPC and access the
resources deployed there.
77 Huawei Confidential
VPN Types
There are three basic types of VPNs, each designed for different uses:
An Access VPN allows offsite workers to easily and securely connect with their
company's network while working remotely.
78 Huawei Confidential
IPsec VPN
An Internet Protocol Security VPN (IPsec VPN) is a VPN that uses IPsec for
secure remote access. Defined by Internet Engineering Task Force (IETF), IPsec
is a framework of open standards for ensuring secure, private, and encrypted
communications over the Internet.
79 Huawei Confidential
IPsec VPN Topology
Firewall 2
Firewall 1 200.2.2.2/24
100.1.1.1/24
Internet
Private network 1 Private network 2
192.168.1.0/24 IPsec tunnel 192.168.2.0/24
80 Huawei Confidential
HUAWEI CLOUD VPN Components
A VPN consists of a VPN gateway and one or more VPN connections. A VPN gateway
provides an Internet egress for a VPC and works together with the remote gateway in
an on-premises data center. A VPN connection uses an encrypted connection to link the
VPN gateway to a remote gateway to enable communication between a data center
and a VPC. The VPN connection allows you to quickly build a secure hybrid cloud
environment.
81 Huawei Confidential
VPN Gateway
A VPN gateway is an egress gateway of a VPC.
With a VPN gateway, you can create a secure,
reliable, and encrypted connection between a VPC
and your data center or between two VPCs in
different regions.
A VPN gateway works together with the gateway
in an on-premises data center. Each data center
must have a gateway, and each VPC must have a
VPN gateway. The VPN service allows you to set
up site-to-site and hub-and-spoke VPN
connections. A VPN gateway can connect to one
or more remote gateways.
82 Huawei Confidential
VPN Connection
A VPN connection uses IPsec encryption to establish a secure and reliable
communications tunnel between a VPN gateway and the gateway in an on-premises
data center. Currently, only IPsec encryption is supported.
VPN connections use IKE and IPsec to cost-effectively and securely encrypt data
transmitted over the Internet.
83 Huawei Confidential
Application Scenarios: Site-to-Site VPN Connection
You use a VPN to establish a hybrid cloud by connecting an on-premises data
center to a VPC.
84 Huawei Confidential
Application Scenarios: Hub-and-Spoke VPN Connection
You can also establish a hybrid cloud by using a VPN to connect multiple data
centers to a VPC.
85 Huawei Confidential
Product Advantages
86 Huawei Confidential
Billing
Pay-per-use
If billing by bandwidth is selected, the billing cycle is one hour. The generated fee depends on the bandwidth size. The
total price includes the VPN gateway bandwidth price and the price of the VPN connection created together with the
gateway. If you create another connection for the gateway, you will be charged for the additional connection.
87 Huawei Confidential
Contents
1. Overview
2. Getting Started
4. FAQs
88 Huawei Confidential
Getting Started
Procedure
Buying a VPN Gateway
Buying a VPN Connection
89 Huawei Confidential
Buying a VPN Gateway (1/4)
Procedure
Register an account and log in to the management console.
On the console homepage, under Network, click Virtual Private Network.
In the navigation pane on the left, choose Virtual Private Network > VPN Gateways.
On the VPN Gateways page, click Buy VPN Gateway.
Set the parameters as prompted and click Buy Now.
Review the VPN gateway details and click Submit.
90 Huawei Confidential
Buying a VPN Gateway (2/4)
91 Huawei Confidential
Buying a VPN Gateway (3/4)
Parameter descriptions
Example
Parameter Description
Value
Specifies the billing mode for your VPN gateway. VPN gateways are
billed on a pay-per-use basis.
Billing Mode The price of a pay-per-use VPN gateway consists of the gateway price Pay-per-use
and bandwidth price.
CN East-
Region Specifies the region where your VPN gateway is located. Shanghai2
VPC Specifies the name of the VPC to which the VPN accesses. vpc-001
Name Specifies the VPN gateway name. vpngw-001
Type Specifies the VPN type. IPsec is selected by default. IPsec
92 Huawei Confidential
Buying a VPN Gateway (4/4)
Parameter descriptions
93 Huawei Confidential
Buying a VPN Connection (1)
Procedure
Log in to the management console.
On the console homepage, under Network, click Virtual Private Network.
In the navigation pane on the left, choose Virtual Private Network > VPN
Connections.
On the VPN Connections page, click Buy VPN Connection.
Set the parameters as prompted and click Buy Now.
Confirm the VPN connection information and click Submit.
Due to the symmetry of the tunnel, you also need to configure the IPsec VPN tunnel
on your router or firewall of your data center.
94 Huawei Confidential
Buying a VPN Connection (2)
95 Huawei Confidential
VPN Connection Parameters (1)
Parameter descriptions
Parameter Description Example Value
Specifies the billing mode of a VPN connection. VPN connections are
Billing Mode Pay-per-use
billed on a pay-per-use basis.
Specifies the region where the VPN connection is located. Each region CN East-
Region
comprises one or more AZs and is isolated from other regions. Shanghai2
Name Specifies the VPN connection name. vpn-001
VPN Gateway Specifies the VPN gateway used by the VPN connection. vpcgw-001
Specifies the VPC subnets that need to communicate with your data
center or private network. You can set the local subnet using either of
192.168.1.0/24,
Local Subnet the following methods:
192.168.2.0/24
• Select subnet
• Specify CIDR block
Specifies the public IP address of the gateway in your data center or
Remote
on the private network. This IP address is used for communication -
Gateway
with the VPN gateway of a VPC.
96 Huawei Confidential
VPN Connection Parameters (2)
Parameter descriptions
Parameter Description Example Value
Specifies the subnets of your data center or private network for
communication with a VPC. The remote and local subnets cannot
Remote 192.168.3.0/24,
have overlapping or matching CIDR blocks. The remote subnet
Subnet 192.168.4.0/24
CIDR block cannot overlap with CIDR blocks involved in existing
VPC peering connections created for the local VPC.
Specifies the pre-shared key. The value is a string of 6 to 128
PSK characters. This parameter value must be the same for the VPN Test@123
connection at both ends.
Confirm PSK Enter the pre-shared key again. Test@123
Advanced • Default
Custom
Settings • Custom: including IKE and IPsec policies.
97 Huawei Confidential
VPN Connection Parameters (3)
IKE policy
Parameter Description Example Value
Specifies the hash algorithm used for authentication. The value can be
Authentication
SHA1, SHA2-256, SHA2-384, SHA2-512, or MD5. SHA1
Algorithm
The default value is SHA1.
Specifies the encryption algorithm. The value can be AES-128, AES-192,
Encryption AES-256, or 3DES. The 3DES algorithm is not recommended because it
AES-128
Algorithm is not strong enough to protect data.
The default value is AES-128.
Specifies the Diffie-Hellman key exchange algorithm. The value can be
Group 2, Group 5, or Group 14.
DH Algorithm The default value is Group 5. Group 5
The DH algorithms used at both ends of a VPN connection must be the
same. Otherwise, the negotiation will fail.
Specifies the version of the IKE protocol. The value can be v1 or v2.
Version v1
The default value is v1.
98 Huawei Confidential
VPN Connection Parameters (4)
IKE policy
99 Huawei Confidential
VPN Connection Parameters (5)
IPsec policy
1. Overview
2. Getting Started
4. FAQs
1. Overview
2. Getting Started
4. FAQs
Abbreviations
B. Seamless scale-out
C. Low-cost connection
D. Ease-of-use
1. Overview
2. Management
3. FAQs
• VPN establishes an Internet connection between • Direct Connect allows you to establish a dedicated
your on-premises data center and the public network connection from your on-premises data center
cloud, and the network quality of this connection to the public cloud. Direct Connect enables you to take
is not as good as that of a Direct Connect full advantages of the public cloud while retaining legacy
lower than Direct Connect. • Direct Connect features low latency and stable network
• VPN can be used immediately after you enable quality, but is more expensive.
the service and complete the configuration. • A longer time is required to deploy the leased line.
3. FAQs
2. Create a connection to reserve a port for the connection and work with the carrier and HUAWEI CLOUD to connect your on-
premises network to the public cloud. The entire process involves the customer, carrier, and HUAWEI CLOUD. The Direct
Connect console details the instructions for each phase of the process.
3. Create a virtual gateway and a virtual interface to connect your on-premises network to HUAWEI CLOUD.
6. Click OK. Ensure that the status of the virtual gateway is Normal.
7. Switch back to the left navigation pane and choose Virtual Interfaces.
8. Click Create Virtual Interface.
10. Click Create Now. Ensure that the status of the virtual gateway is Normal.
11. Ping the IP address of a server in the VPC from your on-premises data center to test network connectivity. If the test is
successful, your on-premises data center can connect to the cloud and access the desired VPC.
VPC Specifies the VPC to be associated with the virtual gateway. VPC-001
Virtual Gateway Specifies the virtual gateway to which the virtual interface connects. vgw-123
Specifies the ID of the VLAN in which the virtual interface works.
VLAN 30
The system automatically allocates a VLAN ID.
Local Gateway Specifies the IP address for connecting to the cloud. 10.0.0.1/24
Specifies the IP address for connecting to your network.
Remote Gateway The remote gateway must be in the same IP address range as the local 10.0.0.2/24
gateway. It is recommended that both IP addresses use a 30-bit mask.
3. FAQs
Which of the following are characteristics of Direct Connect when compared with
VPN? ( )
A. Out-of-the-box
1. Overview
2. Getting Started
4. FAQs
Router Router
VPC: VPC:
10.10.0.0/16 10.20.0.0/16
Subnet Subnet Subnet Subnet
VPC peering
gateway gateway gateway gateway
connection
VPC Router
VPC
Subnet
0.0.0.0-127.255.255.255
192.0.0.0-223.255.255.255
11000000.10101000.00000001 .00000000
Subnet mask
255.255.255 .0
11111111.11111111.11111111 .00000000
VPC 10.0.0.0/16
AZ1 10.0.0.0/18
Subnet A 10.0.0.0/19
Subnet B 10.0.32.0/20
Subnet C 10.0.48.0/21
AZ2 10.0.64.0/18
Subnet X 10.0.64.0/19
Subnet Y 10.0.96.0/20
Subnet Z 10.0.112.0/21
1. Overview
2. Getting Started
4. FAQs
Determine
the VPC
Creat
CIDR Creat Create a VPC Test the
Confirm the Configure a ea
block and ea peering connectivit
network plan. subnet. route
subnet VPC. connection. y.
table.
CIDR
block.
VPC 1 VPC 2
Subnet-B Subnet-Y
192.168.2.0/24 10.0.2.0/24
VPC 1 VPC 2
VPC Peering Route Table VPC Peering Route Table
Destination Next Hop Destination Next Hop
10.0.0.0/16 vpc-peering 192.168.0.0/16 vpc-peering
Local VPC CIDR Block Specifies the CIDR block for the local VPC. 192.168.0.0/16
1. Overview
2. Getting Started
4. FAQs
1. Overview
2. Getting Started
4. FAQs
2. Why do I need to configure route tables after creating a VPC peering connection?
This chapter describes the basic concepts and application scenarios of VPC
peering connections, as well as the procedure and restrictions for
configuring VPC peering connections, to help you better use the
connections.