diff --git a/docs/en-US/configure-acl.xml b/docs/en-US/configure-acl.xml index e4d5dad6616..c89210b3c50 100644 --- a/docs/en-US/configure-acl.xml +++ b/docs/en-US/configure-acl.xml @@ -19,7 +19,7 @@ under the License. -->
- Configuring Access Control List + Configuring Network Access Control List Define Network Access Control List (ACL) on the VPC virtual router to control incoming (ingress) and outgoing (egress) traffic between the VPC tiers, and the tiers and Internet. By default, all incoming and outgoing traffic to the guest networks is blocked. To open the ports, diff --git a/docs/en-US/inter-vlan-routing.xml b/docs/en-US/inter-vlan-routing.xml index c39d567f781..59115deb581 100644 --- a/docs/en-US/inter-vlan-routing.xml +++ b/docs/en-US/inter-vlan-routing.xml @@ -19,16 +19,16 @@ under the License. -->
- About Inter-VLAN Routing - Inter-VLAN Routing is the capability to route network traffic between VLANs. This feature - enables you to build Virtual Private Clouds (VPC), an isolated segment of your cloud, that can - hold multi-tier applications. These tiers are deployed on different VLANs that can communicate - with each other. You provision VLANs to the tiers your create, and VMs can be deployed on - different tiers. The VLANs are connected to a virtual router, which facilitates communication - between the VMs. In effect, you can segment VMs by means of VLANs into different networks that - can host multi-tier applications, such as Web, Application, or Database. Such segmentation by - means of VLANs logically separate application VMs for higher security and lower broadcasts, - while remaining physically connected to the same device. + About Inter-VLAN Routing (nTier Apps) + Inter-VLAN Routing (nTier Apps) is the capability to route network traffic between VLANs. + This feature enables you to build Virtual Private Clouds (VPC), an isolated segment of your + cloud, that can hold multi-tier applications. These tiers are deployed on different VLANs that + can communicate with each other. You provision VLANs to the tiers your create, and VMs can be + deployed on different tiers. The VLANs are connected to a virtual router, which facilitates + communication between the VMs. In effect, you can segment VMs by means of VLANs into different + networks that can host multi-tier applications, such as Web, Application, or Database. Such + segmentation by means of VLANs logically separate application VMs for higher security and lower + broadcasts, while remaining physically connected to the same device. This feature is supported on XenServer, KVM, and VMware hypervisors. The major advantages are: @@ -88,10 +88,10 @@ - The administrator can define Access Control List (ACL) on the virtual router to filter - the traffic among the VLANs or between the Internet and a VLAN. You can define ACL based on - CIDR, port range, protocol, type code (if ICMP protocol is selected) and Ingress/Egress - type. + The administrator can define Network Access Control List (ACL) on the virtual router to + filter the traffic among the VLANs or between the Internet and a VLAN. You can define ACL + based on CIDR, port range, protocol, type code (if ICMP protocol is selected) and + Ingress/Egress type. The following figure shows the possible deployment scenarios of a Inter-VLAN setup: diff --git a/docs/en-US/vpc.xml b/docs/en-US/vpc.xml index 7c94f0d6dd1..d1f0c52861a 100644 --- a/docs/en-US/vpc.xml +++ b/docs/en-US/vpc.xml @@ -75,6 +75,12 @@ Translation for instances to access the Internet via the public gateway. For more information, see . + + Network ACL: Network ACL is a group of Network ACL + items. Network ACL items are nothing but numbered rules that are evaluated in order, + starting with the lowest numbered rule. These rules determine whether traffic is allowed in + or out of any tier associated with the network ACL. For more information, see . + Network Architecture in a VPC