diff --git a/docs/en-US/acquire-new-ip-for-vpc.xml b/docs/en-US/acquire-new-ip-for-vpc.xml
index 785e80bb874..c0cb876d483 100644
--- a/docs/en-US/acquire-new-ip-for-vpc.xml
+++ b/docs/en-US/acquire-new-ip-for-vpc.xml
@@ -39,28 +39,43 @@
Click the Configure button of the VPC to which you want to deploy the VMs.
The VPC page is displayed where all the tiers you created are listed in a
diagram.
-
-
- Click the Settings icon.
The following options are displayed.
- IP Addresses
+ Internal LB
- Gateways
+ Public LB IP
- Site-to-Site VPN
+ Static NAT
- Network ACLs
+ Virtual Machines
+
+
+ CIDR
+
+
+ The following router information is displayed:
+
+
+ Private Gateways
+
+
+ Public IP Addresses
+
+
+ Site-to-Site VPNs
+
+
+ Network ACL Lists
Select IP Addresses.
- The IP Addresses page is displayed.
+ The Public IP Addresses page is displayed.
Click Acquire New IP, and click Yes in the confirmation dialog.
@@ -70,4 +85,4 @@
rules.
-
\ No newline at end of file
+
diff --git a/docs/en-US/add-gateway-vpc.xml b/docs/en-US/add-gateway-vpc.xml
index 616794a51d1..a081faf7768 100644
--- a/docs/en-US/add-gateway-vpc.xml
+++ b/docs/en-US/add-gateway-vpc.xml
@@ -21,8 +21,8 @@
Adding a Private Gateway to a VPC
A private gateway can be added by the root admin only. The VPC private network has 1:1
- relationship with the NIC of the physical network. No gateways with duplicated VLAN and IP are
- allowed in the same data center.
+ relationship with the NIC of the physical network. You can configure multiple private gateways
+ to a single VPC. No gateways with duplicated VLAN and IP are allowed in the same data center.
Log in to the &PRODUCT; UI as an administrator or end user.
@@ -45,16 +45,34 @@
The following options are displayed.
- IP Addresses
+ Internal LB
+
+ Public LB IP
+
+
+ Static NAT
+
+
+ Virtual Machines
+
+
+ CIDR
+
+
+ The following router information is displayed:
+
Private Gateways
- Site-to-Site VPN
+ Public IP Addresses
- Network ACLs
+ Site-to-Site VPNs
+
+
+ Network ACL Lists
@@ -96,9 +114,38 @@
VLAN: The VLAN associated with the VPC
gateway.
+
+ Source NAT: Select this option to enable the source
+ NAT service on the VPC private gateway.
+ See .
+
+
+ ACL: Controls both ingress and egress traffic on a
+ VPC private gateway. By default, all the traffic is blocked.
+ See .
+
The new gateway appears in the list. You can repeat these steps to add more gateway for
this VPC.
+
+ Source NAT on Private Gateway
+ You might want to deploy multiple VPCs with the same super CIDR and guest tier CIDR.
+ Therefore, multiple guest VMs from different VPCs can have the same IPs to reach a enterprise
+ data center through the private gateway. In such cases, a NAT service need to be configured on
+ the private gateway. If Source NAT is enabled, the guest VMs in VPC reaches the enterprise
+ network via private gateway IP address by using the NAT service.
+ The Source NAT service on a private gateway can be enabled while adding the private
+ gateway. On deletion of a private gateway, source NAT rules specific to the private gateway
+ are deleted.
+
+
+ ACL on Private Gateway
+ The traffic on the VPC private gateway is controlled by creating both ingress and egress
+ network ACL rules. The ACLs contains both allow and deny rules. As per the rule, all the
+ ingress traffic to the private gateway interface and all the egress traffic out from the
+ private gateway interface are blocked. You can change this default behaviour while creating a
+ private gateway.
+
diff --git a/docs/en-US/add-portforward-rule-vpc.xml b/docs/en-US/add-portforward-rule-vpc.xml
index c3dbc39bb19..5b1bb49a0a3 100644
--- a/docs/en-US/add-portforward-rule-vpc.xml
+++ b/docs/en-US/add-portforward-rule-vpc.xml
@@ -35,28 +35,42 @@
Click the Configure button of the VPC to which you want to deploy the VMs.
The VPC page is displayed where all the tiers you created are listed in a
diagram.
-
-
- Click the Settings icon.
- The following options are displayed.
+ For each tier, the following options are displayed:
- IP Addresses
+ Internal LB
- Gateways
+ Public LB IP
- Site-to-Site VPN
+ Static NAT
- Network ACLs
+ Virtual Machines
+
+
+ CIDR
+
+
+ The following router information is displayed:
+
+
+ Private Gateways
+
+
+ Public IP Addresses
+
+
+ Site-to-Site VPNs
+
+
+ Network ACL Lists
- Choose an existing IP address or acquire a new IP address. Click the name of the IP
- address in the list.
+ In the Router node, select Public IP Addresses.
The IP Addresses page is displayed.
@@ -95,7 +109,7 @@
Add VM: Click Add VM. Select the name of the
instance to which this rule applies, and click Apply.
- You can test the rule by opening an ssh session to the instance.
+ You can test the rule by opening an SSH session to the instance.
diff --git a/docs/en-US/add-tier.xml b/docs/en-US/add-tier.xml
index 6beaab2a151..e5334d39ca6 100644
--- a/docs/en-US/add-tier.xml
+++ b/docs/en-US/add-tier.xml
@@ -41,6 +41,9 @@
Click the Configure button of the VPC for which you want to set up tiers.
+
+
+ Click Create network.
The Add new tier dialog is displayed, as follows:
@@ -62,7 +65,7 @@
Network Offering: The following default network
- offerings are listed: DefaultIsolatedNetworkOfferingForVpcNetworksNoLB,
+ offerings are listed: Internal LB, DefaultIsolatedNetworkOfferingForVpcNetworksNoLB,
DefaultIsolatedNetworkOfferingForVpcNetworks
In a VPC, only one tier can be created by using LB-enabled network offering.
diff --git a/docs/en-US/add-vm-to-tier.xml b/docs/en-US/add-vm-to-tier.xml
index e401eed2656..c7d769d9d11 100644
--- a/docs/en-US/add-vm-to-tier.xml
+++ b/docs/en-US/add-vm-to-tier.xml
@@ -33,13 +33,21 @@
Click the Configure button of the VPC to which you want to deploy the VMs.
- The VPC page is displayed where all the tiers you created are listed.
+ The VPC page is displayed where all the tiers you have created are listed.
- Click the Add VM button of the tier for which you want to add a VM.
+ Click Virtual Machines tab of the tier to which you want to add a VM.
+
+
+
+
+
+ add-vm-vpc.png: adding a VM to a vpc.
+
+
The Add Instance page is displayed.
Follow the on-screen instruction to add an instance. For information on adding an
- instance, see Adding Instances section in the Installation Guide.
+ instance, see the Installation Guide.
diff --git a/docs/en-US/enable-disable-static-nat-vpc.xml b/docs/en-US/enable-disable-static-nat-vpc.xml
index 17f0c10540f..467a304915d 100644
--- a/docs/en-US/enable-disable-static-nat-vpc.xml
+++ b/docs/en-US/enable-disable-static-nat-vpc.xml
@@ -42,27 +42,42 @@
Click the Configure button of the VPC to which you want to deploy the VMs.
The VPC page is displayed where all the tiers you created are listed in a
diagram.
-
-
- Click the Settings icon.
- The following options are displayed.
+ For each tier, the following options are displayed.
- IP Addresses
+ Internal LB
- Gateways
+ Public LB IP
- Site-to-Site VPN
+ Static NAT
- Network ACLs
+ Virtual Machines
+
+
+ CIDR
+
+
+ The following router information is displayed:
+
+
+ Private Gateways
+
+
+ Public IP Addresses
+
+
+ Site-to-Site VPNs
+
+
+ Network ACL Lists
- Select IP Addresses.
+ In the Router node, select Public IP Addresses.
The IP Addresses page is displayed.
@@ -74,7 +89,7 @@
- enable-disable.png: button to enable Statid NAT.
+ enable-disable.png: button to enable Static NAT.
The button toggles between Enable and Disable, depending on whether
static NAT is currently enabled for the IP address.
diff --git a/docs/en-US/images/add-new-gateway-vpc.png b/docs/en-US/images/add-new-gateway-vpc.png
index f15b778e0f2..5145622a2f4 100644
Binary files a/docs/en-US/images/add-new-gateway-vpc.png and b/docs/en-US/images/add-new-gateway-vpc.png differ
diff --git a/docs/en-US/images/add-vm-vpc.png b/docs/en-US/images/add-vm-vpc.png
new file mode 100644
index 00000000000..b2821a69156
Binary files /dev/null and b/docs/en-US/images/add-vm-vpc.png differ
diff --git a/docs/en-US/images/del-tier.png b/docs/en-US/images/del-tier.png
new file mode 100644
index 00000000000..aa9846cfd9b
Binary files /dev/null and b/docs/en-US/images/del-tier.png differ
diff --git a/docs/en-US/release-ip-for-vpc.xml b/docs/en-US/release-ip-for-vpc.xml
index 466ec663a17..f827b671c03 100644
--- a/docs/en-US/release-ip-for-vpc.xml
+++ b/docs/en-US/release-ip-for-vpc.xml
@@ -40,27 +40,42 @@
Click the Configure button of the VPC whose IP you want to release.
The VPC page is displayed where all the tiers you created are listed in a
diagram.
-
-
- Click the Settings icon.
The following options are displayed.
- IP Addresses
+ Internal LB
- Gateways
+ Public LB IP
- Site-to-Site VPN
+ Static NAT
- Network ACLs
+ Virtual Machines
+
+
+ CIDR
+
+
+ The following router information is displayed:
+
+
+ Private Gateways
+
+
+ Public IP Addresses
+
+
+ Site-to-Site VPNs
+
+
+ Network ACL Lists
- Select IP Addresses.
+ Select Public IP Addresses.
The IP Addresses page is displayed.
diff --git a/docs/en-US/remove-tier.xml b/docs/en-US/remove-tier.xml
index b5996eb2de3..701645cc4ed 100644
--- a/docs/en-US/remove-tier.xml
+++ b/docs/en-US/remove-tier.xml
@@ -40,16 +40,18 @@
The Configure VPC page is displayed. Locate the tier you want to work with.
- Click the Remove VPC button:
-
-
-
-
-
- remove-tier.png: removing a tier from a vpc.
-
-
- Wait for some time for the tier to be removed.
+ Select the tier you want to remove.
+
+
+ In the Network Details tab, click the Delete Network button.
+
+
+
+
+ del-tier.png: button to remove a tier
+
+
+ Click Yes to confirm. Wait for some time for the tier to be removed.
diff --git a/docs/en-US/remove-vpc.xml b/docs/en-US/remove-vpc.xml
index c5eff850fd3..b373f1a52c3 100644
--- a/docs/en-US/remove-vpc.xml
+++ b/docs/en-US/remove-vpc.xml
@@ -38,14 +38,15 @@
Select the VPC you want to work with.
- To remove, click the Remove VPC button
+ In the Details tab, click the Remove VPC button
remove-vpc.png: button to remove a VPC
-
+
+ You can remove the VPC by also using the remove button in the Quick View.
You can edit the name and description of a VPC. To do that, select the VPC, then click
the Edit button.
diff --git a/docs/en-US/vpc.xml b/docs/en-US/vpc.xml
index 0665d372b4e..7c94f0d6dd1 100644
--- a/docs/en-US/vpc.xml
+++ b/docs/en-US/vpc.xml
@@ -151,8 +151,8 @@
cannot be used for StaticNAT or port forwarding.
- The instances only have a private IP address that you provision. To communicate with the
- Internet, enable NAT to an instance that you launch in your VPC.
+ The instances can only have a private IP address that you provision. To communicate with
+ the Internet, enable NAT to an instance that you launch in your VPC.
Only new networks can be added to a VPC. The maximum number of networks per VPC is