diff --git a/docs/en-US/site-to-site-vpn.xml b/docs/en-US/site-to-site-vpn.xml index 034fb42fdd8..a102ebe1bb4 100644 --- a/docs/en-US/site-to-site-vpn.xml +++ b/docs/en-US/site-to-site-vpn.xml @@ -3,43 +3,60 @@ %BOOK_ENTITIES; ]> - -
- Site-to-Site VPN - - To add a Virtual Private Cloud (VPC): - - Log in to the &PRODUCT; UI as an administrator or end user. - In the left navigation, choose Network - In the Select view, select site-to-site VPN. - Click Add site-to-site VPN. Provide the following information: - - IP Address:. - Gateway: The IP address of the remote gateway. - CIDR list: The guest CIDR list of the remote subnets. Enter a CIDR or a comma-separated list of CIDRs. - IPsec Preshared Key: The preshared key of the remote gateway. - IKE Policy: Internet Key Exchange (IKE) policy for phase 1. Specify it as a combination of the encryption algorithm(aes,3des,des) and hash algorithm(sha1,md5). For example: aes-sha1, 3des-sha1. - ESP Policy: Encapsulating Security Payload (ESP) policy for phase 2. Specify it as a combination of the encryption algorithm(aes,3des,des) and hash algorithm(sha1,md5). For example: aes-sha1, 3des-sha1. - Lifetime (seconds): Lifetime of SA in seconds. Default is 86400 seconds(1day). - - Click OK. - -
+ Setting Up a Site-to-Site VPN Connection + A Site-to-Site VPN connection helps you establish a secure connection from an enterprise + datacenter to the cloud infrastructure. This allows users to access the guest VMs by + establishing a VPN connection to the virtual router of the account from a device in the + datacenter of the enterprise. Having this facility eliminates the need to establish VPN + connections to individual VMs. + The supported endpoints on the remote datacenters are: + + + Cisco ISR with IOS 12.4 or later + + + Juniper J-Series routers with JunOS 9.5 or later + + + + In addition to the specific Cisco and Juniper devices listed above, the expectation is + that any Cisco or Juniper device running on the supported operating systems are able to + establish VPN connections. + + To set up a Site-to-Site VPN connection, perform the following: + + + Create a Virtual Private Cloud (VPC). + See . + + + Create a VPN Customer Gateway. + + + Create a VPN gateway for the VPC that you created. + + + Create VPN connection from the VPC VPN gateway to the customer VPN gateway. + + + + + + + \ No newline at end of file diff --git a/docs/en-US/vpc.xml b/docs/en-US/vpc.xml index 389910007da..cfa5fe1dd02 100644 --- a/docs/en-US/vpc.xml +++ b/docs/en-US/vpc.xml @@ -3,40 +3,181 @@ %BOOK_ENTITIES; ]> - -
- Virtual Private Cloud - - To add a Virtual Private Cloud (VPC): - - Log in to the &PRODUCT; UI as an administrator or end user. - In the left navigation, choose Network - In the Select view, select VPC. - Click Add VPC. Provide the following information: - - Name: A short name for the VPC that you are creating. - Description: A brief description of the VPC. - Zone: Choose the zone where you want the VPC to be available. - CIDR: To accept the traffic only from the IP addresses within a particular address block, enter a CIDR or a comma-separated list of CIDRs. The CIDR is the base IP address of the incoming traffic. For example, 192.168.0.0/22. To allow all CIDRs, set to 0.0.0.0/0. - Network Domain: If you want to assign a special domain name to this network, specify the DNS suffix. - - -
+ About Virtual Private Clouds + &PRODUCT; Virtual Private Cloud is a private, isolated part of &PRODUCT;. A VPC can have its + own virtual network topology that resembles a traditional physical network. You can launch VMs + in the virtual network that can have private addresses in the range of your choice, for example: + 10.0.0.0/16. You can define network tiers within your VPC network range, which in turn enables + you to group similar kinds of instances based on IP address range. + For example, if a VPC has the private range 10.0.0.0/16, its guest networks can have the + network ranges 10.0.1.0/24, 10.0.2.0/24, 10.0.3.0/24, and so on. + + Major Components of a VPC: + A VPC is comprised of the following network components: + + + + VPC: A VPC acts as a container for multiple isolated + networks that can communicate with each other via its virtual router. + + + Network Tiers: Each tier acts as an isolated network + with its own VLANs and CIDR list, where you can place groups of resources, such as VMs. The + tiers are segmented by means of VLANs. The NIC of each tier acts as its gateway. + + + Virtual Router: A virtual router is automatically + created and started when you create a VPC. The virtual router connect the tiers and direct + traffic among the public gateway, the VPN gateways, and the NAT instances. For each tier, a + corresponding NIC and IP exist in the virtual router. The virtual router provides DNS and + DHCP services through its IP. + + + Public Gateway: The traffic to and from the Internet + routed to the VPC through the public gateway. In a VPC, the public gateway is not exposed to + the end user; therefore, static routes are not support for the public gateway. + + + Private Gateway: All the traffic to and from a private + network routed to the VPC through the private gateway. For more information, see . + + + VPN Gateway: The VPC side of a VPN connection. + + + Site-to-Site VPN Connection: A hardware-based VPN + connection between your VPC and your datacenter, home network, or co-location facility. For + more information, see . + + + Customer Gateway: The customer side of a VPN + Connection. For more information, see . + + + NAT Instance: An instance that provides Port Address + Translation for instances to access the Internet via the public gateway. For more + information, see . + + + + Network Architecture in a VPC + In a VPC, the following four basic options of network architectures are present: + + + + VPC with a public gateway only + + + VPC with public and private gateways + + + VPC with public and private gateways and site-to-site VPN access + + + VPC with a private gateway only and site-to-site VPN access + + + + Connectivity Options for a VPC + You can connect your VPC to: + + + + The Internet through the public gateway. + + + The corporate datacenter by using a site-to-site VPN connection through the VPN + gateway. + + + Both the Internet and your corporate datacenter by using both the public gateway and a + VPN gateway. + + + + VPC Network Considerations + Consider the following before you create a VPC: + + + + A VPC, by default, is created in the enabled state. + + + A VPC can be created in Advance zone only, and can't belong to more than one zone at a + time. + + + The default number of VPCs an account can create is 20. However, you can change it by + using the max.account.vpcs global parameter, which controls the maximum number of VPCs an + account is allowed to create. + + + The default number of tiers an account can create within a VPC is 3. You can configure + this number by using the vpc.max.networks parameter. + + + Each tier should have an unique CIDR in the VPC. Ensure that the tier's CIDR should be + within the VPC CIDR range. + + + A tier belongs to only one VPC. + + + All network tiers inside the VPC should belong to the same account. + + + When a VPC is created, by default, a SourceNAT IP is allocated to it. The Source NAT IP + is released only when the VPC is removed. + + + A public IP can be used for only one purpose at a time. If the IP is a sourceNAT, it + cannot be used for StaticNAT or port forwarding. + + + The instances only have a private IP address that you provision. To communicate with the + Internet, enable NAT to an instance that you launch in your VPC. + + + Only new networks can be added to a VPC. The maximum number of networks per VPC is + limited by the value you specify in the vpc.max.networks parameter. The default value is + three. + + + The load balancing service can be supported by only one tier inside the VPC. + + + If an IP address is assigned to a tier: + + + That IP can't be used by more than one tier at a time in the VPC. For example, if + you have tiers A and B, and a public IP1, you can create a port forwarding rule by using + the IP either for A or B, but not for both. + + + That IP can't be used for StaticNAT, load balancing, or port forwarding rules for + another guest network inside the VPC. + + + + + Remote access VPN is not supported in VPC networks. + + + \ No newline at end of file