1
0
forked from docs/doc-exports

VPC UMN 20231207 version

Reviewed-by: Sarda, Priya <prsarda@noreply.gitea.eco.tsi-dev.otc-service.com>
Co-authored-by: Qin Ying, Fan <fanqinying@huawei.com>
Co-committed-by: Qin Ying, Fan <fanqinying@huawei.com>
This commit is contained in:
Qin Ying, Fan 2023-12-20 11:27:38 +00:00 committed by zuul
parent 66976d8fa2
commit 19f0993a37
67 changed files with 1202 additions and 781 deletions

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -1,10 +1,10 @@
<a name="FlowLog_0002"></a><a name="FlowLog_0002"></a>
<h1 class="topictitle1">VPC Flow Log Overview</h1>
<div id="body1547961960823"><p id="FlowLog_0002__p8060118">A VPC flow log records information about the traffic going to and from a VPC. VPC flow logs help you monitor network traffic, analyze network attacks, and determine whether security group and <span id="FlowLog_0002__text11248715171311">firewall</span><span id="FlowLog_0002__text45551720134"></span> rules require modification.</p>
<div id="body1547961960823"><div class="section" id="FlowLog_0002__section1937236135914"><h4 class="sectiontitle">What Is a VPC Flow Log?</h4><p id="FlowLog_0002__p8060118">A VPC flow log records information about the traffic going to and from a VPC. VPC flow logs help you monitor network traffic, analyze network attacks, and determine whether security group and <span id="FlowLog_0002__text11248715171311">firewall</span><span id="FlowLog_0002__text45551720134"></span> rules require modification.</p>
<p id="FlowLog_0002__p38692616421">VPC flow logs must be used together with the Log Tank Service (LTS). Before you create a VPC flow log, you need to create a log group and a log topic in LTS. <a href="#FlowLog_0002__fig1535115691415">Figure 1</a> shows the process for configuring VPC flow logs.</p>
<div class="fignone" id="FlowLog_0002__fig1535115691415"><a name="FlowLog_0002__fig1535115691415"></a><a name="fig1535115691415"></a><span class="figcap"><b>Figure 1 </b>Configuring VPC flow logs</span><br><span><img class="vsd" id="FlowLog_0002__image9661037927" src="en-us_image_0162336264.png"></span></div>
<p id="FlowLog_0002__p1137789316"></p>
</div>
<div class="section" id="FlowLog_0002__section1095231112517"><h4 class="sectiontitle">Notes and Constraints</h4><ul id="FlowLog_0002__ul18195045135317"><li id="FlowLog_0002__li13405622115110">Currently, C3, M3, and S2 ECSs support VPC flow logs.</li><li id="FlowLog_0002__li21719253511">Each account can have up to 10 VPC flow logs in a region.</li><li id="FlowLog_0002__li11560111014356">By default, a maximum of 400,000 flow log records are supported.</li></ul>
</div>
</div>

View File

@ -53,7 +53,7 @@
</td>
<td class="cellrowborder" valign="top" width="55.7%" headers="mcps1.3.3.6.2.3.1.2.4.1.2 "><p id="FlowLog_0003__p16347111715218">The log group created in LTS.</p>
</td>
<td class="cellrowborder" valign="top" width="25.06%" headers="mcps1.3.3.6.2.3.1.2.4.1.3 "><p id="FlowLog_0003__FlowLog_0003_p634714176216">lts-group-wule</p>
<td class="cellrowborder" valign="top" width="25.06%" headers="mcps1.3.3.6.2.3.1.2.4.1.3 "><p id="FlowLog_0003__FlowLog_0003_p634714176216">lts-group-abc</p>
</td>
</tr>
<tr id="FlowLog_0003__row63479171326"><td class="cellrowborder" valign="top" width="19.24%" headers="mcps1.3.3.6.2.3.1.2.4.1.1 "><p id="FlowLog_0003__p133476171224">Log Topic</p>

File diff suppressed because it is too large Load Diff

View File

@ -1,7 +1,9 @@
<a name="FlowLog_0006"></a><a name="FlowLog_0006"></a>
<h1 class="topictitle1">Enabling or Disabling VPC Flow Log</h1>
<div id="body1553326015158"><div class="section" id="FlowLog_0006__section15598193716333"><h4 class="sectiontitle">Scenarios</h4><p id="FlowLog_0006__p8118659113310">After a VPC flow log is created, the VPC flow log is automatically enabled. If you do not need to record traffic data, you can disable the corresponding VPC flow log. The disabled VPC flow log can be enabled again.</p>
<div id="body1553326015158"><div class="section" id="FlowLog_0006__section15598193716333"><h4 class="sectiontitle">Scenarios</h4><p id="FlowLog_0006__p8118659113310">After a VPC flow log is created, the VPC flow log is automatically enabled. If you do not need to record flow log data, you can disable the corresponding VPC flow log. A disabled VPC flow log can be enabled again.</p>
</div>
<div class="section" id="FlowLog_0006__section5107937172118"><h4 class="sectiontitle">Notes and Constraints</h4><ul id="FlowLog_0006__ul9238346192115"><li id="FlowLog_0006__li4238146122111">After a VPC flow log is enabled, the system starts to collect flow logs in the next log collection period.</li><li id="FlowLog_0006__li141151714234">After a VPC flow log is disabled, the system stops collecting flow logs in the next log collection period. Generated flow logs will still be reported.</li></ul>
</div>
<div class="section" id="FlowLog_0006__section7359352124511"><h4 class="sectiontitle">Procedure</h4><ol id="FlowLog_0006__ol1599100493"><li id="FlowLog_0006__li16376160184113">Log in to the management console.</li></ol><ol start="2" id="FlowLog_0006__ol433412616258"><li id="FlowLog_0006__li1261701516256">Click <span><img id="FlowLog_0006__en-us_topic_0013748726_image338921514480" src="en-us_image_0141273034.png"></span> in the upper left corner and select the desired region and project.</li></ol><ol start="3" id="FlowLog_0006__ol113341928344"><li id="FlowLog_0006__li65321958215">Click <span><img id="FlowLog_0006__en-us_topic_0013748738_image8750174734412" src="en-us_image_0000001627056686.png"></span> in the upper left corner and choose <strong id="FlowLog_0006__b1390013296375"><span id="FlowLog_0006__text13900229193718">Network</span><span id="FlowLog_0006__text1900829173716"></span></strong> &gt; <strong id="FlowLog_0006__b159001629173711">Virtual Private Cloud</strong>.<p id="FlowLog_0006__p1182103318256">The <strong id="FlowLog_0006__b917763412373">Virtual Private Cloud</strong> page is displayed.</p>
</li></ol><ol start="4" id="FlowLog_0006__ol86651458101716"><li id="FlowLog_0006__li15362774171923">In the navigation pane on the left, choose <strong id="FlowLog_0006__b14531953153514">VPC Flow Logs</strong>.</li><li id="FlowLog_0006__li11786153123011">Locate the VPC flow log to be enabled or disabled, and choose <strong id="FlowLog_0006__b1417519538118">More</strong> &gt; <strong id="FlowLog_0006__b18341923141120">Enable</strong> or <strong id="FlowLog_0006__b10997182191214">More</strong> &gt; <strong id="FlowLog_0006__b8834623191119">Disable</strong> in the <strong id="FlowLog_0006__b1583417239116">Operation</strong> column.</li><li id="FlowLog_0006__li488372733118">Click <strong id="FlowLog_0006__b84235270615469">Yes</strong>.</li></ol>

View File

@ -1,7 +1,7 @@
<a name="SecurityGroup_0003"></a><a name="SecurityGroup_0003"></a>
<h1 class="topictitle1">Default Security Group and Its Rules</h1>
<div id="body1529924412907"><div class="p" id="SecurityGroup_0003__p38211617154214">If you have not created any security group, the system automatically creates a default security group for you and associates it with the instance (such as an ECS) when you create it. A default security group has the following rules:<ul id="SecurityGroup_0003__ul13643173351019"><li id="SecurityGroup_0003__li164313371013">Inbound rules control incoming traffic to instances in a security group. Only instances in the same security group can communicate with each other, and all inbound requests are denied.</li><li id="SecurityGroup_0003__li176437339108">Outbound rules allow all outbound traffic and response traffic to the outbound requests.</li></ul>
<div id="body1529924412907"><div class="p" id="SecurityGroup_0003__p38211617154214">If you have not created any security groups yet, the system automatically creates a default security group for you and associates it with the instance (such as an ECS) when you create it. A default security group has the following rules:<ul id="SecurityGroup_0003__ul13643173351019"><li id="SecurityGroup_0003__li164313371013">Inbound rules control incoming traffic to instances in a security group. Only instances in the same security group can communicate with each other, and all inbound requests are denied.</li><li id="SecurityGroup_0003__li176437339108">Outbound rules allow all outbound traffic and response traffic to the outbound requests.</li></ul>
</div>
<div class="fignone" id="SecurityGroup_0003__fig997718156161"><span class="figcap"><b>Figure 1 </b>Default security group</span><br><span><img class="eddx" id="SecurityGroup_0003__image22171236172514" src="en-us_image_0000001230120807.png"></span></div>
<div class="note" id="SecurityGroup_0003__note154069174516"><img src="public_sys-resources/note_3.0-en-us.png"><span class="notetitle"> </span><div class="notebody"><ul id="SecurityGroup_0003__ul13707733161311"><li id="SecurityGroup_0003__li04874352138">You cannot delete the default security group, but you can modify existing rules or add rules to the group.</li><li id="SecurityGroup_0003__li131365102713">The default security group is automatically created to simplify the process of creating an instance for the first time. The default security group denies all external requests. To log in to an instance, add a security group rule by referring to <a href="en-us_topic_0081124350.html#en-us_topic_0081124350__section14933617154810">Remotely Logging In to an ECS from a Local Server</a>.</li></ul>

View File

@ -35,7 +35,7 @@
</tr>
<tr id="SecurityGroup_0004__row511615528561"><td class="cellrowborder" valign="top" width="12.7%" headers="mcps1.3.2.3.6.1.2.2.4.1.1 "><p id="SecurityGroup_0004__p86899991813">Source</p>
</td>
<td class="cellrowborder" valign="top" width="69.3%" headers="mcps1.3.2.3.6.1.2.2.4.1.2 "><div class="p" id="SecurityGroup_0004__p18116175212564">Source of the security group rule. The value can be an IP address or a security group to allow access from IP addresses or instances in the security group. You can specify:<ul id="SecurityGroup_0004__ul12116352195619"><li id="SecurityGroup_0004__li18391357452">xxx.xxx.xxx.xxx/32 (IPv4 address)</li><li id="SecurityGroup_0004__li6529544124510">xxx.xxx.xxx.0/24 (IPv4 address range)</li><li id="SecurityGroup_0004__li06004484454">0.0.0.0/0 (all IPv4 addresses)</li><li id="SecurityGroup_0004__li1611612527567">sg-abc (security group)</li></ul>
<td class="cellrowborder" valign="top" width="69.3%" headers="mcps1.3.2.3.6.1.2.2.4.1.2 "><div class="p" id="SecurityGroup_0004__p18116175212564">Source of the security group rule. The value can be an IP address, an IP address group, or a security group to allow access from IP addresses or instances in the security group. You can specify:<ul id="SecurityGroup_0004__ul12116352195619"><li id="SecurityGroup_0004__li18391357452">xxx.xxx.xxx.xxx/32 (IPv4 address)</li><li id="SecurityGroup_0004__li6529544124510">xxx.xxx.xxx.0/24 (IPv4 address range)</li><li id="SecurityGroup_0004__li06004484454">0.0.0.0/0 (all IPv4 addresses)</li><li id="SecurityGroup_0004__li1611612527567">sg-abc (security group)</li><li id="SecurityGroup_0004__li17725509441">IP address group: ipGroup-test</li></ul>
</div>
<p id="SecurityGroup_0004__p1252129194014">If the source is a security group, this rule will apply to all instances associated with the selected security group.</p>
</td>
@ -84,7 +84,7 @@
</tr>
<tr id="SecurityGroup_0004__row2617112315232"><td class="cellrowborder" valign="top" width="12.34%" headers="mcps1.3.2.3.9.1.2.2.4.1.1 "><p id="SecurityGroup_0004__p15617623172315">Destination</p>
</td>
<td class="cellrowborder" valign="top" width="69.66%" headers="mcps1.3.2.3.9.1.2.2.4.1.2 "><div class="p" id="SecurityGroup_0004__p196171823152315">Destination of the security group rule. The value can be an IP address or a security group to allow access to IP addresses or instances in the security group. You can specify:<ul id="SecurityGroup_0004__ul16177237233"><li id="SecurityGroup_0004__li8617323202310">xxx.xxx.xxx.xxx/32 (IPv4 address)</li><li id="SecurityGroup_0004__li10617152312231">xxx.xxx.xxx.0/24 (IPv4 address range)</li><li id="SecurityGroup_0004__li206171823182318">0.0.0.0/0 (all IPv4 addresses)</li><li id="SecurityGroup_0004__li6930529354">sg-abc (security group)</li></ul>
<td class="cellrowborder" valign="top" width="69.66%" headers="mcps1.3.2.3.9.1.2.2.4.1.2 "><div class="p" id="SecurityGroup_0004__p196171823152315">Destination of the security group rule. The value can be an IP address, an IP address group, or a security group to allow access to IP addresses or instances in the security group. You can specify:<ul id="SecurityGroup_0004__ul16177237233"><li id="SecurityGroup_0004__li8617323202310">xxx.xxx.xxx.xxx/32 (IPv4 address)</li><li id="SecurityGroup_0004__li10617152312231">xxx.xxx.xxx.0/24 (IPv4 address range)</li><li id="SecurityGroup_0004__li206171823182318">0.0.0.0/0 (all IPv4 addresses)</li><li id="SecurityGroup_0004__li6930529354">sg-abc (security group)</li><li id="SecurityGroup_0004__li3905104821218">IP address group: ipGroup-test</li></ul>
</div>
</td>
<td class="cellrowborder" valign="top" width="18%" headers="mcps1.3.2.3.9.1.2.2.4.1.3 "><p id="SecurityGroup_0004__p4617102352310">0.0.0.0/0</p>

View File

@ -0,0 +1,90 @@
<a name="SecurityGroup_0005"></a><a name="SecurityGroup_0005"></a>
<h1 class="topictitle1">Allowing Common Ports with A Few Clicks</h1>
<div id="body0000001646960360"><div class="section" id="SecurityGroup_0005__section111711223183718"><h4 class="sectiontitle">Scenarios</h4><div class="p" id="SecurityGroup_0005__p57971737163513">You can configure a security group to allow common ports with a few clicks. This function is suitable for the following scenarios:<ul id="SecurityGroup_0005__ul5362904812"><li id="SecurityGroup_0005__en-us_topic_0013748715_li123617917487">Remotely log in to ECSs.</li><li id="SecurityGroup_0005__en-us_topic_0013748715_li792741712487">Use the ping command to test ECS connectivity.</li><li id="SecurityGroup_0005__en-us_topic_0013748715_li64071030164815">ECSs functioning as web servers provide website access services.</li></ul>
</div>
<p id="SecurityGroup_0005__p192717293514"><a href="#SecurityGroup_0005__table117828131111">Table 1</a> describes the common ports that can be opened with a few clicks.</p>
<div class="tablenoborder"><a name="SecurityGroup_0005__table117828131111"></a><a name="table117828131111"></a><table cellpadding="4" cellspacing="0" summary="" id="SecurityGroup_0005__table117828131111" frame="border" border="1" rules="all"><caption><b>Table 1 </b>Common ports</caption><thead align="left"><tr id="SecurityGroup_0005__row51752851112"><th align="left" class="cellrowborder" valign="top" width="15.618438156184384%" id="mcps1.3.1.4.2.5.1.1"><p id="SecurityGroup_0005__p1417182819110">Direction</p>
</th>
<th align="left" class="cellrowborder" valign="top" width="24.177582241775823%" id="mcps1.3.1.4.2.5.1.2"><p id="SecurityGroup_0005__p14239310125">Protocol &amp; Port &amp; Type</p>
</th>
<th align="left" class="cellrowborder" valign="top" width="18.97810218978102%" id="mcps1.3.1.4.2.5.1.3"><p id="SecurityGroup_0005__p2017192813116">Source/Destination</p>
</th>
<th align="left" class="cellrowborder" valign="top" width="41.225877412258775%" id="mcps1.3.1.4.2.5.1.4"><p id="SecurityGroup_0005__p18171528121111">Description</p>
</th>
</tr>
</thead>
<tbody><tr id="SecurityGroup_0005__row14179283118"><td class="cellrowborder" rowspan="6" valign="top" width="15.618438156184384%" headers="mcps1.3.1.4.2.5.1.1 "><p id="SecurityGroup_0005__p517928111110">Inbound</p>
</td>
<td class="cellrowborder" valign="top" width="24.177582241775823%" headers="mcps1.3.1.4.2.5.1.2 "><p id="SecurityGroup_0005__p19261786910">TCP: 22 (IPv4)</p>
</td>
<td class="cellrowborder" valign="top" width="18.97810218978102%" headers="mcps1.3.1.4.2.5.1.3 "><p id="SecurityGroup_0005__p95914491420">0.0.0.0/0</p>
</td>
<td class="cellrowborder" valign="top" width="41.225877412258775%" headers="mcps1.3.1.4.2.5.1.4 "><p id="SecurityGroup_0005__p145914411142">Allows all IPv4 addresses to access ECSs in the security group over port 22 (SSH) for remotely logging in to Linux ECSs.</p>
</td>
</tr>
<tr id="SecurityGroup_0005__row81712286114"><td class="cellrowborder" valign="top" headers="mcps1.3.1.4.2.5.1.1 "><p id="SecurityGroup_0005__p2129124012146">TCP: 3389 (IPv4)</p>
</td>
<td class="cellrowborder" valign="top" headers="mcps1.3.1.4.2.5.1.2 "><p id="SecurityGroup_0005__p1312918404145">0.0.0.0/0</p>
</td>
<td class="cellrowborder" valign="top" headers="mcps1.3.1.4.2.5.1.3 "><p id="SecurityGroup_0005__p712914018142">Allows all IPv4 addresses to access ECSs in the security group over port 3389 (RDP) for remotely logging in to Windows ECSs.</p>
</td>
</tr>
<tr id="SecurityGroup_0005__row855217571135"><td class="cellrowborder" valign="top" headers="mcps1.3.1.4.2.5.1.1 "><p id="SecurityGroup_0005__p195531457171316">TCP: 80 (IPv4)</p>
</td>
<td class="cellrowborder" valign="top" headers="mcps1.3.1.4.2.5.1.2 "><p id="SecurityGroup_0005__p1021112616177">0.0.0.0/0</p>
</td>
<td class="cellrowborder" valign="top" headers="mcps1.3.1.4.2.5.1.3 "><p id="SecurityGroup_0005__p35531857101319">Allows all IPv4 addresses to access ECSs in the security group over port 80 (HTTP) for visiting websites.</p>
</td>
</tr>
<tr id="SecurityGroup_0005__row155531157121313"><td class="cellrowborder" valign="top" headers="mcps1.3.1.4.2.5.1.1 "><p id="SecurityGroup_0005__p19553195718131">TCP: 443 (IPv4)</p>
</td>
<td class="cellrowborder" valign="top" headers="mcps1.3.1.4.2.5.1.2 "><p id="SecurityGroup_0005__p8211112617178">0.0.0.0/0</p>
</td>
<td class="cellrowborder" valign="top" headers="mcps1.3.1.4.2.5.1.3 "><p id="SecurityGroup_0005__p25539570131">Allows all IPv4 addresses to access ECSs in the security group over port 443 (HTTPS) for visiting websites.</p>
</td>
</tr>
<tr id="SecurityGroup_0005__row1087218311379"><td class="cellrowborder" valign="top" headers="mcps1.3.1.4.2.5.1.1 "><p id="SecurityGroup_0005__p5498162873817">TCP: 20-21 (IPv4)</p>
</td>
<td class="cellrowborder" valign="top" headers="mcps1.3.1.4.2.5.1.2 "><p id="SecurityGroup_0005__p254384017387">0.0.0.0/0</p>
</td>
<td class="cellrowborder" valign="top" headers="mcps1.3.1.4.2.5.1.3 "><p id="SecurityGroup_0005__p1787253114370">Allows all IPv4 addresses to access ECSs in the security group over ports 20 and 21 (FTP) for uploading or downloading files.</p>
</td>
</tr>
<tr id="SecurityGroup_0005__row6188115311135"><td class="cellrowborder" valign="top" headers="mcps1.3.1.4.2.5.1.1 "><p id="SecurityGroup_0005__p5188353201315">ICMP: All (IPv4)</p>
</td>
<td class="cellrowborder" valign="top" headers="mcps1.3.1.4.2.5.1.2 "><p id="SecurityGroup_0005__p17188653121313">0.0.0.0/0</p>
</td>
<td class="cellrowborder" valign="top" headers="mcps1.3.1.4.2.5.1.3 "><p id="SecurityGroup_0005__p6188053181311">Allows all IPv4 addresses to access ECSs in the security group over any port for using the ping command to test ECS connectivity.</p>
</td>
</tr>
<tr id="SecurityGroup_0005__row11482558181713"><td class="cellrowborder" valign="top" width="15.618438156184384%" headers="mcps1.3.1.4.2.5.1.1 "><p id="SecurityGroup_0005__p2048355871719">Outbound</p>
</td>
<td class="cellrowborder" valign="top" width="24.177582241775823%" headers="mcps1.3.1.4.2.5.1.2 "><p id="SecurityGroup_0005__p321741193111">All (IPv4)</p>
<p id="SecurityGroup_0005__p6217217317">All (IPv6)</p>
</td>
<td class="cellrowborder" valign="top" width="18.97810218978102%" headers="mcps1.3.1.4.2.5.1.3 "><p id="SecurityGroup_0005__p19483858111718">0.0.0.0/0</p>
<p id="SecurityGroup_0005__p9373131013114">::/0</p>
</td>
<td class="cellrowborder" valign="top" width="41.225877412258775%" headers="mcps1.3.1.4.2.5.1.4 "><p id="SecurityGroup_0005__p748375814179">Allows access from ECSs in the security group to any IP address over any port.</p>
</td>
</tr>
</tbody>
</table>
</div>
</div>
<div class="section" id="SecurityGroup_0005__section423982018414"><h4 class="sectiontitle">Procedure</h4><ol id="SecurityGroup_0005__ol15905193312412"><li id="SecurityGroup_0005__li2849879021595">Log in to the management console.</li><li id="SecurityGroup_0005__li840318282158">Click <span><img id="SecurityGroup_0005__en-us_topic_0013748726_image338921514480" src="en-us_image_0141273034.png"></span> in the upper left corner and select the desired region and project.</li><li id="SecurityGroup_0005__li65321958215">Click <span><img id="SecurityGroup_0005__en-us_topic_0013748738_image8750174734412" src="en-us_image_0000001646961692.png"></span> in the upper left corner and choose <strong id="SecurityGroup_0005__b284311813542"><span id="SecurityGroup_0005__en-us_topic_0013748738_text47511547154412">Network</span><span id="SecurityGroup_0005__en-us_topic_0013748738_text1275116474447"></span></strong> &gt; <strong id="SecurityGroup_0005__b2844131819543">Virtual Private Cloud</strong>.<p id="SecurityGroup_0005__p1182103318256">The <strong id="SecurityGroup_0005__b168701256435">Virtual Private Cloud</strong> page is displayed.</p>
</li><li id="SecurityGroup_0005__li2907103354114">In the navigation pane on the left, choose <strong id="SecurityGroup_0005__b1135517222317">Access Control</strong> &gt; <strong id="SecurityGroup_0005__b935511219239">Security Groups</strong>.<p id="SecurityGroup_0005__p78331733204216">The security group list is displayed.</p>
</li><li id="SecurityGroup_0005__li10508153994513">In the security group list, click the name of the security group.<p id="SecurityGroup_0005__p100911194312"><a name="SecurityGroup_0005__li10508153994513"></a><a name="li10508153994513"></a>The security group details page is displayed.</p>
</li><li id="SecurityGroup_0005__li1431513481421">Click the <strong id="SecurityGroup_0005__b950016236251">Inbound Rules</strong> or <strong id="SecurityGroup_0005__b584482513257">Outbound Rules</strong> tab, and then click <strong id="SecurityGroup_0005__b12854174602517">Allow Common Ports</strong>.<p id="SecurityGroup_0005__p025894789">The <strong id="SecurityGroup_0005__b78045152611">Allow Common Ports</strong> page is displayed.</p>
</li><li id="SecurityGroup_0005__li138463701712">Click <strong id="SecurityGroup_0005__b597614322611">OK</strong>.<p id="SecurityGroup_0005__p3696191411116">After the operation is complete, you can view the added rules in the security group rule list.</p>
</li></ol>
</div>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="vpc_SecurityGroup_0001.html">Security Group</a></div>
</div>
</div>

View File

@ -73,7 +73,7 @@
<div class="fignone" id="acl_0001__fig1643183218163"><a name="acl_0001__fig1643183218163"></a><a name="fig1643183218163"></a><span class="figcap"><b>Figure 2 </b><span id="acl_0001__text668616281164">firewall</span><span id="acl_0001__text06861728121612"></span> configuration procedure</span><br><span><img class="vsd" id="acl_0001__image49772046165815" src="en-us_image_0162335382.png"></span></div>
<ol id="acl_0001__ol64961250174814"><li id="acl_0001__li1849614505486">Create a <span id="acl_0001__text71827337167">firewall</span><span id="acl_0001__text7183173318168"></span> by following the steps described in <a href="en-us_topic_0051746698.html">Creating a Firewall</a>.</li><li id="acl_0001__li1518417537486">Add <span id="acl_0001__text593833511166">firewall</span><span id="acl_0001__text9938635141617"></span> rules by following the steps described in <a href="en-us_topic_0051746702.html">Adding a Firewall Rule</a>.</li><li id="acl_0001__li2758155517484">Associate subnets with the <span id="acl_0001__text4742139191618">firewall</span><span id="acl_0001__text4742173951610"></span> by following the steps described in <a href="en-us_topic_0051746700.html">Associating Subnets with a Firewall</a>. After subnets are associated with the <span id="acl_0001__text64553435162">firewall</span><span id="acl_0001__text045594311612"></span>, the subnets will be protected by the configured <span id="acl_0001__text13398324163514">firewall</span><span id="acl_0001__text20400182493515"></span> rules.</li></ol>
</div>
<div class="section" id="acl_0001__section28487131277"><h4 class="sectiontitle">Notes and Constraints</h4><ul id="acl_0001__ul4835849194111"><li id="acl_0001__li9945175894218">By default, each account can have up to 200 <span id="acl_0001__text1128221665812">firewall</span><span id="acl_0001__text02838165587"></span>s in a region.</li><li id="acl_0001__li11694143225713">A <span id="acl_0001__text916455718482">firewall</span><span id="acl_0001__text8164195714480"></span> can contain no more than 20 rules in one direction, or performance will deteriorate.</li></ul>
<div class="section" id="acl_0001__section28487131277"><h4 class="sectiontitle">Notes and Constraints</h4><ul id="acl_0001__ul4835849194111"><li id="acl_0001__li9945175894218">By default, each account can have up to 200 <span id="acl_0001__text1128221665812">firewall</span><span id="acl_0001__text02838165587"></span>s in a region.</li><li id="acl_0001__li20790333175612">A <span id="acl_0001__text9494437195619">firewall</span><span id="acl_0001__text164943373568"></span> can contain no more than 20 rules in one direction, or performance will deteriorate.</li></ul>
</div>
</div>
<div>

Binary file not shown.

After

Width:  |  Height:  |  Size: 128 B

Binary file not shown.

After

Width:  |  Height:  |  Size: 23 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 10 KiB

View File

@ -12,52 +12,51 @@
</li><li id="en-us_topic_0013748715__li15281162517570">In the navigation pane on the left, choose <strong id="en-us_topic_0013748715__b121019132119">Access Control</strong> &gt; <strong id="en-us_topic_0013748715__b811121122119">Security Groups</strong>.<p id="en-us_topic_0013748715__p40747164518">The security group list is displayed.</p>
</li><li id="en-us_topic_0013748715__la3543eccbafd40ab868644784c80f90c">In the upper right corner, click <strong id="en-us_topic_0013748715__b9769242231">Create Security Group</strong>.<p id="en-us_topic_0013748715__p16346717174">The <strong id="en-us_topic_0013748715__b1221171614238">Create Security Group</strong> page is displayed.</p>
</li><li id="en-us_topic_0013748715__lf5675c587b844e47a4d8ee3cde436a11">Configure the parameters as prompted.<div class="fignone" id="en-us_topic_0013748715__fig10594164462512"><span class="figcap"><b>Figure 1 </b>Create Security Group</span><br><span><img id="en-us_topic_0013748715__image241911540575" src="en-us_image_0000001197426329.png"></span></div>
<p id="en-us_topic_0013748715__p18664124413511"></p>
<div class="tablenoborder"><table cellpadding="4" cellspacing="0" summary="" id="en-us_topic_0013748715__table65377617111335" frame="border" border="1" rules="all"><caption><b>Table 1 </b>Parameter description</caption><thead align="left"><tr id="en-us_topic_0013748715__row63201700111335"><th align="left" class="cellrowborder" valign="top" width="18.42%" id="mcps1.3.3.2.6.3.2.4.1.1"><p id="en-us_topic_0013748715__p24582101111429"><strong id="en-us_topic_0013748715__b842352706114331">Parameter</strong></p>
<div class="tablenoborder"><table cellpadding="4" cellspacing="0" summary="" id="en-us_topic_0013748715__table65377617111335" frame="border" border="1" rules="all"><caption><b>Table 1 </b>Parameter description</caption><thead align="left"><tr id="en-us_topic_0013748715__row63201700111335"><th align="left" class="cellrowborder" valign="top" width="18.42%" id="mcps1.3.3.2.6.2.2.4.1.1"><p id="en-us_topic_0013748715__p24582101111429"><strong id="en-us_topic_0013748715__b842352706114331">Parameter</strong></p>
</th>
<th align="left" class="cellrowborder" valign="top" width="61.24000000000001%" id="mcps1.3.3.2.6.3.2.4.1.2"><p id="en-us_topic_0013748715__p44993128111429"><strong id="en-us_topic_0013748715__b84235270691113">Description</strong></p>
<th align="left" class="cellrowborder" valign="top" width="61.24000000000001%" id="mcps1.3.3.2.6.2.2.4.1.2"><p id="en-us_topic_0013748715__p44993128111429"><strong id="en-us_topic_0013748715__b84235270691113">Description</strong></p>
</th>
<th align="left" class="cellrowborder" valign="top" width="20.34%" id="mcps1.3.3.2.6.3.2.4.1.3"><p id="en-us_topic_0013748715__p20564789111429"><strong id="en-us_topic_0013748715__b8423527069420">Example Value</strong></p>
<th align="left" class="cellrowborder" valign="top" width="20.34%" id="mcps1.3.3.2.6.2.2.4.1.3"><p id="en-us_topic_0013748715__p20564789111429"><strong id="en-us_topic_0013748715__b8423527069420">Example Value</strong></p>
</th>
</tr>
</thead>
<tbody><tr id="en-us_topic_0013748715__row27615987111335"><td class="cellrowborder" valign="top" width="18.42%" headers="mcps1.3.3.2.6.3.2.4.1.1 "><p id="en-us_topic_0013748715__p36766359111429">Name</p>
<tbody><tr id="en-us_topic_0013748715__row27615987111335"><td class="cellrowborder" valign="top" width="18.42%" headers="mcps1.3.3.2.6.2.2.4.1.1 "><p id="en-us_topic_0013748715__p36766359111429">Name</p>
</td>
<td class="cellrowborder" valign="top" width="61.24000000000001%" headers="mcps1.3.3.2.6.3.2.4.1.2 "><p id="en-us_topic_0013748715__p1762722181317">Mandatory</p>
<td class="cellrowborder" valign="top" width="61.24000000000001%" headers="mcps1.3.3.2.6.2.2.4.1.2 "><p id="en-us_topic_0013748715__p1762722181317">Mandatory</p>
<p id="en-us_topic_0013748715__p25285117111429">Enter the security group name.</p>
<p id="en-us_topic_0013748715__p26239466111429">The security group name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces.</p>
<div class="note" id="en-us_topic_0013748715__note26071625172323"><span class="notetitle"> NOTE: </span><div class="notebody"><p id="en-us_topic_0013748715__p33318039172323">You can change the security group name after a security group is created. It is recommended that you give each security group a different name.</p>
</div></div>
</td>
<td class="cellrowborder" valign="top" width="20.34%" headers="mcps1.3.3.2.6.3.2.4.1.3 "><p id="en-us_topic_0013748715__p2544634111429">sg-AB</p>
<td class="cellrowborder" valign="top" width="20.34%" headers="mcps1.3.3.2.6.2.2.4.1.3 "><p id="en-us_topic_0013748715__p2544634111429">sg-AB</p>
</td>
</tr>
<tr id="en-us_topic_0013748715__row9162654102214"><td class="cellrowborder" valign="top" width="18.42%" headers="mcps1.3.3.2.6.3.2.4.1.1 "><p id="en-us_topic_0013748715__p128872057193916">Enterprise Project</p>
<tr id="en-us_topic_0013748715__row9162654102214"><td class="cellrowborder" valign="top" width="18.42%" headers="mcps1.3.3.2.6.2.2.4.1.1 "><p id="en-us_topic_0013748715__p128872057193916">Enterprise Project</p>
</td>
<td class="cellrowborder" valign="top" width="61.24000000000001%" headers="mcps1.3.3.2.6.3.2.4.1.2 "><p id="en-us_topic_0013748715__p8636410141310">Mandatory</p>
<td class="cellrowborder" valign="top" width="61.24000000000001%" headers="mcps1.3.3.2.6.2.2.4.1.2 "><p id="en-us_topic_0013748715__p8636410141310">Mandatory</p>
<p id="en-us_topic_0013748715__p260812488536">When creating a security group, you can add the security group to an enabled enterprise project.</p>
<p id="en-us_topic_0013748715__p5242161295416">An enterprise project facilitates project-level management and grouping of cloud resources and users. The name of the default project is <strong id="en-us_topic_0013748715__b1792205513159">default</strong>.</p>
</td>
<td class="cellrowborder" valign="top" width="20.34%" headers="mcps1.3.3.2.6.3.2.4.1.3 "><p id="en-us_topic_0013748715__p688765711391">default</p>
<td class="cellrowborder" valign="top" width="20.34%" headers="mcps1.3.3.2.6.2.2.4.1.3 "><p id="en-us_topic_0013748715__p688765711391">default</p>
</td>
</tr>
<tr id="en-us_topic_0013748715__row19913143415116"><td class="cellrowborder" valign="top" width="18.42%" headers="mcps1.3.3.2.6.3.2.4.1.1 "><p id="en-us_topic_0013748715__p17945838526">Template</p>
<tr id="en-us_topic_0013748715__row19913143415116"><td class="cellrowborder" valign="top" width="18.42%" headers="mcps1.3.3.2.6.2.2.4.1.1 "><p id="en-us_topic_0013748715__p17945838526">Template</p>
</td>
<td class="cellrowborder" valign="top" width="61.24000000000001%" headers="mcps1.3.3.2.6.3.2.4.1.2 "><p id="en-us_topic_0013748715__p1926712114137">Mandatory</p>
<td class="cellrowborder" valign="top" width="61.24000000000001%" headers="mcps1.3.3.2.6.2.2.4.1.2 "><p id="en-us_topic_0013748715__p1926712114137">Mandatory</p>
<p id="en-us_topic_0013748715__p1294512315215">A template comes with default security group rules, helping you quickly create security groups. The following templates are provided:</p>
<ul id="en-us_topic_0013748715__ul6945113195213"><li id="en-us_topic_0013748715__en-us_topic_0013748715_li19575224195610"><strong id="en-us_topic_0013748715__b842352706192917">Custom</strong>: This template allows you to create security groups with custom security group rules.</li><li id="en-us_topic_0013748715__en-us_topic_0013748715_li1241318316548"><strong id="en-us_topic_0013748715__b76671291633">General-purpose web server</strong> (default value): The security group that you create using this template is for general-purpose web servers and includes default rules that allow all inbound ICMP traffic and allow inbound traffic on ports 22, 80, 443, and 3389.</li><li id="en-us_topic_0013748715__en-us_topic_0013748715_li1441323135412"><strong id="en-us_topic_0013748715__b174412321337">All ports open</strong>: The security group that you create using this template includes default rules that allow inbound traffic on any port. Note that allowing inbound traffic on any port poses security risks.</li></ul>
</td>
<td class="cellrowborder" valign="top" width="20.34%" headers="mcps1.3.3.2.6.3.2.4.1.3 "><p id="en-us_topic_0013748715__p1394514365213">General-purpose web server</p>
<td class="cellrowborder" valign="top" width="20.34%" headers="mcps1.3.3.2.6.2.2.4.1.3 "><p id="en-us_topic_0013748715__p1394514365213">General-purpose web server</p>
</td>
</tr>
<tr id="en-us_topic_0013748715__row62170006111335"><td class="cellrowborder" valign="top" width="18.42%" headers="mcps1.3.3.2.6.3.2.4.1.1 "><p id="en-us_topic_0013748715__p43099508111429">Description</p>
<tr id="en-us_topic_0013748715__row62170006111335"><td class="cellrowborder" valign="top" width="18.42%" headers="mcps1.3.3.2.6.2.2.4.1.1 "><p id="en-us_topic_0013748715__p43099508111429">Description</p>
</td>
<td class="cellrowborder" valign="top" width="61.24000000000001%" headers="mcps1.3.3.2.6.3.2.4.1.2 "><p id="en-us_topic_0013748715__p430680151419">Optional</p>
<td class="cellrowborder" valign="top" width="61.24000000000001%" headers="mcps1.3.3.2.6.2.2.4.1.2 "><p id="en-us_topic_0013748715__p430680151419">Optional</p>
<p id="en-us_topic_0013748715__p1399275111429">Supplementary information about the security group. This parameter is optional.</p>
<p id="en-us_topic_0013748715__p12593482111429">The security group description can contain a maximum of 255 characters and cannot contain angle brackets (&lt; or &gt;).</p>
</td>
<td class="cellrowborder" valign="top" width="20.34%" headers="mcps1.3.3.2.6.3.2.4.1.3 "><p id="en-us_topic_0013748715__p13439131111429">N/A</p>
<td class="cellrowborder" valign="top" width="20.34%" headers="mcps1.3.3.2.6.2.2.4.1.3 "><p id="en-us_topic_0013748715__p13439131111429">N/A</p>
</td>
</tr>
</tbody>

View File

@ -32,11 +32,20 @@
<td class="cellrowborder" valign="top" width="25.06%" headers="mcps1.3.2.3.5.3.2.4.1.3 "><p id="en-us_topic_0013748726__p7209192718395">Subnet</p>
</td>
</tr>
<tr id="en-us_topic_0013748726__row9413847103714"><td class="cellrowborder" valign="top" width="19.24%" headers="mcps1.3.2.3.5.3.2.4.1.1 "><p id="en-us_topic_0013748726__p38701448203715">CIDR Block</p>
<tr id="en-us_topic_0013748726__row753520422"><td class="cellrowborder" valign="top" width="19.24%" headers="mcps1.3.2.3.5.3.2.4.1.1 "><p id="en-us_topic_0013748726__p13884132916542">IPv4 CIDR Block</p>
</td>
<td class="cellrowborder" valign="top" width="55.7%" headers="mcps1.3.2.3.5.3.2.4.1.2 "><p id="en-us_topic_0013748726__p168701848193711">The CIDR block for the subnet. This value must be within the VPC CIDR block.</p>
<td class="cellrowborder" valign="top" width="55.7%" headers="mcps1.3.2.3.5.3.2.4.1.2 "><p id="en-us_topic_0013748726__p35345435357">The CIDR block for the subnet. This value must be within the VPC CIDR block.</p>
</td>
<td class="cellrowborder" valign="top" width="25.06%" headers="mcps1.3.2.3.5.3.2.4.1.3 "><p id="en-us_topic_0013748726__p2870648183714">192.168.0.0/24</p>
<td class="cellrowborder" valign="top" width="25.06%" headers="mcps1.3.2.3.5.3.2.4.1.3 "><p id="en-us_topic_0013748726__p488472935412">192.168.0.0/24</p>
</td>
</tr>
<tr id="en-us_topic_0013748726__row361815212312"><td class="cellrowborder" valign="top" width="19.24%" headers="mcps1.3.2.3.5.3.2.4.1.1 "><p id="en-us_topic_0013748726__p20407153155411">IPv6 CIDR Block</p>
</td>
<td class="cellrowborder" valign="top" width="55.7%" headers="mcps1.3.2.3.5.3.2.4.1.2 "><p id="en-us_topic_0013748726__p1922354314551">Specifies whether to set <strong id="en-us_topic_0013748726__b63649561617">IPv6 CIDR Block</strong> to <strong id="en-us_topic_0013748726__b736413571619">Enable</strong>.</p>
<p id="en-us_topic_0013748726__p8377341105219"></p>
<p id="en-us_topic_0013748726__p5438158103717">If you select this option, the system automatically assigns an IPv6 CIDR block to the created subnet. Currently, the IPv6 CIDR block cannot be customized. IPv6 cannot be disabled after the subnet is created.</p>
</td>
<td class="cellrowborder" valign="top" width="25.06%" headers="mcps1.3.2.3.5.3.2.4.1.3 "><p id="en-us_topic_0013748726__p8408173165419">-</p>
</td>
</tr>
<tr id="en-us_topic_0013748726__row19979719657"><td class="cellrowborder" valign="top" width="19.24%" headers="mcps1.3.2.3.5.3.2.4.1.1 "><p id="en-us_topic_0013748726__p1799112619215">Associated Route Table</p>

View File

@ -26,7 +26,7 @@
</tr>
<tr id="en-us_topic_0013748738__row7953434152510"><td class="cellrowborder" valign="top" width="31.65%" headers="mcps1.3.2.2.5.2.2.4.1.1 "><p id="en-us_topic_0013748738__p1595313348255">EIP Type</p>
</td>
<td class="cellrowborder" valign="top" width="43.29%" headers="mcps1.3.2.2.5.2.2.4.1.2 "><ul id="en-us_topic_0013748738__ul0953434102516"><li id="en-us_topic_0013748738__li395303482519"><strong id="en-us_topic_0013748738__b3178186111618">Dynamic BGP</strong>: Dynamic BGP provides automatic failover and chooses the optimal path when a network connection fails.</li><li id="en-us_topic_0013748738__li109531734172511"><strong id="en-us_topic_0013748738__b436090604">Mail BGP</strong>: EIPs with port 25, 465, or 587 enabled are used for email services.</li></ul>
<td class="cellrowborder" valign="top" width="43.29%" headers="mcps1.3.2.2.5.2.2.4.1.2 "><ul id="en-us_topic_0013748738__ul0953434102516"><li id="en-us_topic_0013748738__li395303482519"><strong id="en-us_topic_0013748738__b3178186111618">Dynamic BGP</strong>: Dynamic BGP provides automatic failover and chooses the optimal path when a network connection fails.</li><li id="en-us_topic_0013748738__li109531734172511"><strong id="en-us_topic_0013748738__b1548559956">Mail BGP</strong>: EIPs with port 25, 465, or 587 enabled are used for email services.</li></ul>
<p id="en-us_topic_0013748738__p1095343462514">The selected EIP type cannot be changed after the EIP is assigned.</p>
</td>
<td class="cellrowborder" valign="top" width="25.06%" headers="mcps1.3.2.2.5.2.2.4.1.3 "><p id="en-us_topic_0013748738__p59531534172517">Dynamic BGP</p>
@ -35,7 +35,7 @@
<tr id="en-us_topic_0013748738__row109551634102510"><td class="cellrowborder" valign="top" width="31.65%" headers="mcps1.3.2.2.5.2.2.4.1.1 "><p id="en-us_topic_0013748738__p1495513410251">Billed By</p>
</td>
<td class="cellrowborder" valign="top" width="43.29%" headers="mcps1.3.2.2.5.2.2.4.1.2 "><p id="en-us_topic_0013748738__p16955183410253">Two options are available:</p>
<ul id="en-us_topic_0013748738__ul99551434112514"><li id="en-us_topic_0013748738__li1295619341256"><strong id="en-us_topic_0013748738__b539001875">Dedicated</strong>: The bandwidth can be used by only one EIP.</li><li id="en-us_topic_0013748738__li2095619348256"><strong id="en-us_topic_0013748738__b958508811">Shared</strong>: The bandwidth can be shared by multiple EIPs.</li></ul>
<ul id="en-us_topic_0013748738__ul99551434112514"><li id="en-us_topic_0013748738__li1295619341256"><strong id="en-us_topic_0013748738__b1741184781">Dedicated</strong>: The bandwidth can be used by only one EIP.</li><li id="en-us_topic_0013748738__li2095619348256"><strong id="en-us_topic_0013748738__b440225898">Shared</strong>: The bandwidth can be shared by multiple EIPs.</li></ul>
</td>
<td class="cellrowborder" valign="top" width="25.06%" headers="mcps1.3.2.2.5.2.2.4.1.3 "><p id="en-us_topic_0013748738__p18956134122515">Dedicated</p>
</td>
@ -57,7 +57,7 @@
<tr id="en-us_topic_0013748738__row6836314173012"><td class="cellrowborder" valign="top" width="31.65%" headers="mcps1.3.2.2.5.2.2.4.1.1 "><p id="en-us_topic_0013748738__p64412166301">Enterprise Project</p>
</td>
<td class="cellrowborder" valign="top" width="43.29%" headers="mcps1.3.2.2.5.2.2.4.1.2 "><p id="en-us_topic_0013748738__p34411693020">The enterprise project that the EIP belongs to.</p>
<p id="en-us_topic_0013748738__p1744101614303">An enterprise project facilitates project-level management and grouping of cloud resources and users. The name of the default project is <strong id="en-us_topic_0013748738__b1256576398">default</strong>.</p>
<p id="en-us_topic_0013748738__p1744101614303">An enterprise project facilitates project-level management and grouping of cloud resources and users. The name of the default project is <strong id="en-us_topic_0013748738__b207476934">default</strong>.</p>
</td>
<td class="cellrowborder" valign="top" width="25.06%" headers="mcps1.3.2.2.5.2.2.4.1.3 "><p id="en-us_topic_0013748738__p114421693014">default</p>
</td>

View File

@ -9,11 +9,11 @@
<div class="tablenoborder"><table cellpadding="4" cellspacing="0" summary="" id="en-us_topic_0013935842__table1168883712472" frame="border" border="1" rules="all"><caption><b>Table 1 </b>VPC parameter descriptions</caption><thead align="left"><tr id="en-us_topic_0013935842__row17700537104713"><th align="left" class="cellrowborder" valign="top" width="16.16161616161616%" id="mcps1.3.2.2.5.3.2.5.1.1"><p id="en-us_topic_0013935842__p3444547103715">Category</p>
</th>
<th align="left" class="cellrowborder" valign="top" width="18.18181818181818%" id="mcps1.3.2.2.5.3.2.5.1.2"><p id="en-us_topic_0013935842__p17713173714472"><strong id="en-us_topic_0013935842__b1083232062">Parameter</strong></p>
<th align="left" class="cellrowborder" valign="top" width="18.18181818181818%" id="mcps1.3.2.2.5.3.2.5.1.2"><p id="en-us_topic_0013935842__p17713173714472"><strong id="en-us_topic_0013935842__b1917934254">Parameter</strong></p>
</th>
<th align="left" class="cellrowborder" valign="top" width="46.464646464646464%" id="mcps1.3.2.2.5.3.2.5.1.3"><p id="en-us_topic_0013935842__p157202037194711"><strong id="en-us_topic_0013935842__b740174389">Description</strong></p>
<th align="left" class="cellrowborder" valign="top" width="46.464646464646464%" id="mcps1.3.2.2.5.3.2.5.1.3"><p id="en-us_topic_0013935842__p157202037194711"><strong id="en-us_topic_0013935842__b200895067">Description</strong></p>
</th>
<th align="left" class="cellrowborder" valign="top" width="19.19191919191919%" id="mcps1.3.2.2.5.3.2.5.1.4"><p id="en-us_topic_0013935842__p97241237164712"><strong id="en-us_topic_0013935842__b2093972158">Example Value</strong></p>
<th align="left" class="cellrowborder" valign="top" width="19.19191919191919%" id="mcps1.3.2.2.5.3.2.5.1.4"><p id="en-us_topic_0013935842__p97241237164712"><strong id="en-us_topic_0013935842__b859463269">Example Value</strong></p>
</th>
</tr>
</thead>
@ -89,20 +89,30 @@
<td class="cellrowborder" valign="top" width="19.19191919191919%" headers="mcps1.3.2.2.5.3.2.5.1.4 "><p id="en-us_topic_0013935842__p178351137184711">Subnet</p>
</td>
</tr>
<tr id="en-us_topic_0013935842__row8837123719474"><td class="cellrowborder" valign="top" width="16.16161616161616%" headers="mcps1.3.2.2.5.3.2.5.1.1 "><p id="en-us_topic_0013935842__p1544410476376">Default Subnet</p>
<tr id="en-us_topic_0013935842__row057111320513"><td class="cellrowborder" valign="top" width="16.16161616161616%" headers="mcps1.3.2.2.5.3.2.5.1.1 "><p id="en-us_topic_0013935842__p10348111012514">Default Subnet</p>
</td>
<td class="cellrowborder" valign="top" width="18.18181818181818%" headers="mcps1.3.2.2.5.3.2.5.1.2 "><p id="en-us_topic_0013935842__p1284223764717">CIDR Block</p>
<td class="cellrowborder" valign="top" width="18.18181818181818%" headers="mcps1.3.2.2.5.3.2.5.1.2 "><p id="en-us_topic_0013935842__p103481410058">IPv4 CIDR Block</p>
</td>
<td class="cellrowborder" valign="top" width="46.464646464646464%" headers="mcps1.3.2.2.5.3.2.5.1.3 "><p id="en-us_topic_0013935842__p15845173713472">The CIDR block for the subnet. This value must be within the VPC CIDR block.</p>
<td class="cellrowborder" valign="top" width="46.464646464646464%" headers="mcps1.3.2.2.5.3.2.5.1.3 "><p id="en-us_topic_0013935842__p1034821019520">The CIDR block for the subnet. This value must be within the VPC CIDR block.</p>
</td>
<td class="cellrowborder" valign="top" width="19.19191919191919%" headers="mcps1.3.2.2.5.3.2.5.1.4 "><p id="en-us_topic_0013935842__p184773774715">192.168.0.0/24</p>
<td class="cellrowborder" valign="top" width="19.19191919191919%" headers="mcps1.3.2.2.5.3.2.5.1.4 "><p id="en-us_topic_0013935842__p5348111017517">192.168.0.0/24</p>
</td>
</tr>
<tr id="en-us_topic_0013935842__row464842547"><td class="cellrowborder" valign="top" width="16.16161616161616%" headers="mcps1.3.2.2.5.3.2.5.1.1 "><p id="en-us_topic_0013935842__p53481410558">Default Subnet</p>
</td>
<td class="cellrowborder" valign="top" width="18.18181818181818%" headers="mcps1.3.2.2.5.3.2.5.1.2 "><p id="en-us_topic_0013935842__p1934831019517">IPv6 CIDR Block</p>
</td>
<td class="cellrowborder" valign="top" width="46.464646464646464%" headers="mcps1.3.2.2.5.3.2.5.1.3 "><p id="en-us_topic_0013935842__p1348181015512">Specifies whether to set <strong id="en-us_topic_0013935842__b2125489059">IPv6 CIDR Block</strong> to <strong id="en-us_topic_0013935842__b1925586104">Enable</strong>.</p>
<p id="en-us_topic_0013935842__p13485104514">After the IPv6 function is enabled, the system automatically assigns an IPv6 CIDR block to the created subnet. Currently, the IPv6 CIDR block cannot be customized. IPv6 cannot be disabled after the subnet is created.</p>
</td>
<td class="cellrowborder" valign="top" width="19.19191919191919%" headers="mcps1.3.2.2.5.3.2.5.1.4 "><p id="en-us_topic_0013935842__p23481710359">-</p>
</td>
</tr>
<tr id="en-us_topic_0013935842__row622752612598"><td class="cellrowborder" valign="top" width="16.16161616161616%" headers="mcps1.3.2.2.5.3.2.5.1.1 "><p id="en-us_topic_0013935842__p4175836125911">Default Subnet</p>
</td>
<td class="cellrowborder" valign="top" width="18.18181818181818%" headers="mcps1.3.2.2.5.3.2.5.1.2 "><p id="en-us_topic_0013935842__p19175203614592">Associated Route Table</p>
</td>
<td class="cellrowborder" valign="top" width="46.464646464646464%" headers="mcps1.3.2.2.5.3.2.5.1.3 "><p id="en-us_topic_0013935842__p1217513368597">The default route table to which the subnet will be associated. You can change the route table to a custom route table on the <strong id="en-us_topic_0013935842__b685518463">Subnets</strong> page.</p>
<td class="cellrowborder" valign="top" width="46.464646464646464%" headers="mcps1.3.2.2.5.3.2.5.1.3 "><p id="en-us_topic_0013935842__p1217513368597">The default route table to which the subnet will be associated. You can change the route table to a custom route table on the <strong id="en-us_topic_0013935842__b2044497856">Subnets</strong> page.</p>
</td>
<td class="cellrowborder" valign="top" width="19.19191919191919%" headers="mcps1.3.2.2.5.3.2.5.1.4 "><p id="en-us_topic_0013935842__p317512367592">Default</p>
</td>

View File

@ -6,11 +6,11 @@
<div class="tablenoborder"><table cellpadding="4" cellspacing="0" summary="" id="en-us_topic_0017816228__en-us_topic_0013935842_table1168883712472" frame="border" border="1" rules="all"><caption><b>Table 1 </b>VPC parameter descriptions</caption><thead align="left"><tr id="en-us_topic_0017816228__en-us_topic_0013935842_row17700537104713"><th align="left" class="cellrowborder" valign="top" width="16.16161616161616%" id="mcps1.3.1.1.5.3.2.5.1.1"><p id="en-us_topic_0017816228__en-us_topic_0013935842_p3444547103715">Category</p>
</th>
<th align="left" class="cellrowborder" valign="top" width="18.18181818181818%" id="mcps1.3.1.1.5.3.2.5.1.2"><p id="en-us_topic_0017816228__en-us_topic_0013935842_p17713173714472"><strong id="en-us_topic_0017816228__en-us_topic_0013935842_b1083232062">Parameter</strong></p>
<th align="left" class="cellrowborder" valign="top" width="18.18181818181818%" id="mcps1.3.1.1.5.3.2.5.1.2"><p id="en-us_topic_0017816228__en-us_topic_0013935842_p17713173714472"><strong id="en-us_topic_0017816228__en-us_topic_0013935842_b1917934254">Parameter</strong></p>
</th>
<th align="left" class="cellrowborder" valign="top" width="46.464646464646464%" id="mcps1.3.1.1.5.3.2.5.1.3"><p id="en-us_topic_0017816228__en-us_topic_0013935842_p157202037194711"><strong id="en-us_topic_0017816228__en-us_topic_0013935842_b740174389">Description</strong></p>
<th align="left" class="cellrowborder" valign="top" width="46.464646464646464%" id="mcps1.3.1.1.5.3.2.5.1.3"><p id="en-us_topic_0017816228__en-us_topic_0013935842_p157202037194711"><strong id="en-us_topic_0017816228__en-us_topic_0013935842_b200895067">Description</strong></p>
</th>
<th align="left" class="cellrowborder" valign="top" width="19.19191919191919%" id="mcps1.3.1.1.5.3.2.5.1.4"><p id="en-us_topic_0017816228__en-us_topic_0013935842_p97241237164712"><strong id="en-us_topic_0017816228__en-us_topic_0013935842_b2093972158">Example Value</strong></p>
<th align="left" class="cellrowborder" valign="top" width="19.19191919191919%" id="mcps1.3.1.1.5.3.2.5.1.4"><p id="en-us_topic_0017816228__en-us_topic_0013935842_p97241237164712"><strong id="en-us_topic_0017816228__en-us_topic_0013935842_b859463269">Example Value</strong></p>
</th>
</tr>
</thead>
@ -86,20 +86,30 @@
<td class="cellrowborder" valign="top" width="19.19191919191919%" headers="mcps1.3.1.1.5.3.2.5.1.4 "><p id="en-us_topic_0017816228__en-us_topic_0013935842_p178351137184711">Subnet</p>
</td>
</tr>
<tr id="en-us_topic_0017816228__en-us_topic_0013935842_row8837123719474"><td class="cellrowborder" valign="top" width="16.16161616161616%" headers="mcps1.3.1.1.5.3.2.5.1.1 "><p id="en-us_topic_0017816228__en-us_topic_0013935842_p1544410476376">Default Subnet</p>
<tr id="en-us_topic_0017816228__en-us_topic_0013935842_row057111320513"><td class="cellrowborder" valign="top" width="16.16161616161616%" headers="mcps1.3.1.1.5.3.2.5.1.1 "><p id="en-us_topic_0017816228__en-us_topic_0013935842_p10348111012514">Default Subnet</p>
</td>
<td class="cellrowborder" valign="top" width="18.18181818181818%" headers="mcps1.3.1.1.5.3.2.5.1.2 "><p id="en-us_topic_0017816228__en-us_topic_0013935842_p1284223764717">CIDR Block</p>
<td class="cellrowborder" valign="top" width="18.18181818181818%" headers="mcps1.3.1.1.5.3.2.5.1.2 "><p id="en-us_topic_0017816228__en-us_topic_0013935842_p103481410058">IPv4 CIDR Block</p>
</td>
<td class="cellrowborder" valign="top" width="46.464646464646464%" headers="mcps1.3.1.1.5.3.2.5.1.3 "><p id="en-us_topic_0017816228__en-us_topic_0013935842_p15845173713472">The CIDR block for the subnet. This value must be within the VPC CIDR block.</p>
<td class="cellrowborder" valign="top" width="46.464646464646464%" headers="mcps1.3.1.1.5.3.2.5.1.3 "><p id="en-us_topic_0017816228__en-us_topic_0013935842_p1034821019520">The CIDR block for the subnet. This value must be within the VPC CIDR block.</p>
</td>
<td class="cellrowborder" valign="top" width="19.19191919191919%" headers="mcps1.3.1.1.5.3.2.5.1.4 "><p id="en-us_topic_0017816228__en-us_topic_0013935842_p184773774715">192.168.0.0/24</p>
<td class="cellrowborder" valign="top" width="19.19191919191919%" headers="mcps1.3.1.1.5.3.2.5.1.4 "><p id="en-us_topic_0017816228__en-us_topic_0013935842_p5348111017517">192.168.0.0/24</p>
</td>
</tr>
<tr id="en-us_topic_0017816228__en-us_topic_0013935842_row464842547"><td class="cellrowborder" valign="top" width="16.16161616161616%" headers="mcps1.3.1.1.5.3.2.5.1.1 "><p id="en-us_topic_0017816228__en-us_topic_0013935842_p53481410558">Default Subnet</p>
</td>
<td class="cellrowborder" valign="top" width="18.18181818181818%" headers="mcps1.3.1.1.5.3.2.5.1.2 "><p id="en-us_topic_0017816228__en-us_topic_0013935842_p1934831019517">IPv6 CIDR Block</p>
</td>
<td class="cellrowborder" valign="top" width="46.464646464646464%" headers="mcps1.3.1.1.5.3.2.5.1.3 "><p id="en-us_topic_0017816228__en-us_topic_0013935842_p1348181015512">Specifies whether to set <strong id="en-us_topic_0017816228__en-us_topic_0013935842_b2125489059">IPv6 CIDR Block</strong> to <strong id="en-us_topic_0017816228__en-us_topic_0013935842_b1925586104">Enable</strong>.</p>
<p id="en-us_topic_0017816228__en-us_topic_0013935842_p13485104514">After the IPv6 function is enabled, the system automatically assigns an IPv6 CIDR block to the created subnet. Currently, the IPv6 CIDR block cannot be customized. IPv6 cannot be disabled after the subnet is created.</p>
</td>
<td class="cellrowborder" valign="top" width="19.19191919191919%" headers="mcps1.3.1.1.5.3.2.5.1.4 "><p id="en-us_topic_0017816228__en-us_topic_0013935842_p23481710359">-</p>
</td>
</tr>
<tr id="en-us_topic_0017816228__en-us_topic_0013935842_row622752612598"><td class="cellrowborder" valign="top" width="16.16161616161616%" headers="mcps1.3.1.1.5.3.2.5.1.1 "><p id="en-us_topic_0017816228__en-us_topic_0013935842_p4175836125911">Default Subnet</p>
</td>
<td class="cellrowborder" valign="top" width="18.18181818181818%" headers="mcps1.3.1.1.5.3.2.5.1.2 "><p id="en-us_topic_0017816228__en-us_topic_0013935842_p19175203614592">Associated Route Table</p>
</td>
<td class="cellrowborder" valign="top" width="46.464646464646464%" headers="mcps1.3.1.1.5.3.2.5.1.3 "><p id="en-us_topic_0017816228__en-us_topic_0013935842_p1217513368597">The default route table to which the subnet will be associated. You can change the route table to a custom route table on the <strong id="en-us_topic_0017816228__en-us_topic_0013935842_b685518463">Subnets</strong> page.</p>
<td class="cellrowborder" valign="top" width="46.464646464646464%" headers="mcps1.3.1.1.5.3.2.5.1.3 "><p id="en-us_topic_0017816228__en-us_topic_0013935842_p1217513368597">The default route table to which the subnet will be associated. You can change the route table to a custom route table on the <strong id="en-us_topic_0017816228__en-us_topic_0013935842_b2044497856">Subnets</strong> page.</p>
</td>
<td class="cellrowborder" valign="top" width="19.19191919191919%" headers="mcps1.3.1.1.5.3.2.5.1.4 "><p id="en-us_topic_0017816228__en-us_topic_0013935842_p317512367592">Default</p>
</td>

View File

@ -8,6 +8,8 @@
</li>
<li class="ulchildlink"><strong><a href="vpc_0004.html">Subnet</a></strong><br>
</li>
<li class="ulchildlink"><strong><a href="vpc_0002.html">IPv4 and IPv6 Dual-Stack Network</a></strong><br>
</li>
</ul>
</div>

File diff suppressed because it is too large Load Diff

View File

@ -4,12 +4,14 @@
<div id="body1474510934429"><div class="section" id="en-us_topic_0038263963__section29931443171216"><h4 class="sectiontitle">Route Tables</h4><p id="en-us_topic_0038263963__vpc_route01_0001_p660151521218">A route table contains a set of routes that are used to determine where network traffic from your subnets in a VPC is directed. Each subnet must be associated with a route table. A subnet can only be associated with one route table, but you can associate multiple subnets with the same route table.</p>
<div class="fignone" id="en-us_topic_0038263963__vpc_route01_0001_route_0001_fig918111722015"><span class="figcap"><b>Figure 1 </b>Route tables</span><br><span><img class="eddx" id="en-us_topic_0038263963__vpc_route01_0001_image072023214234" src="en-us_image_0000001650535960.png"></span></div>
<ul id="en-us_topic_0038263963__vpc_route01_0001_ul15420106131217"><li id="en-us_topic_0038263963__vpc_route01_0001_li4420146151218">Default route table: When you create a VPC, the system automatically generates a default route table for the VPC. If you create a subnet in the VPC, the subnet automatically associates with the default route table. The default route table ensures that subnets in a VPC can communicate with each other.<ul id="en-us_topic_0038263963__vpc_route01_0001_ul86755311411"><li id="en-us_topic_0038263963__vpc_route01_0001_li17919571046">You can add routes to, delete routes from, and modify routes in the default route table, but cannot delete the table.</li><li id="en-us_topic_0038263963__vpc_route01_0001_li1723032173914">When you create a VPC endpoint, VPN or Direct Connect connection, the default route table automatically delivers a route that cannot be deleted or modified. </li></ul>
</li><li id="en-us_topic_0038263963__vpc_route01_0001_li109317810121">Custom route table: If you do not want to use the default route table, you can create a custom route table and associate it with the subnet. Custom route tables can be deleted if they are no longer required.<p id="en-us_topic_0038263963__vpc_route01_0001_p1911417375125"><a name="en-us_topic_0038263963__vpc_route01_0001_li109317810121"></a><a name="vpc_route01_0001_li109317810121"></a>The custom route table associated with a subnet affects only the outbound traffic. The default route table controls the inbound traffic.</p>
</li><li id="en-us_topic_0038263963__vpc_route01_0001_li109317810121">Custom route table: If you do not want to use the default route table, you can create a custom route table and associate it with the subnet. Custom route tables can be deleted if they are no longer required.<p id="en-us_topic_0038263963__vpc_route01_0001_p1911417375125"><a name="en-us_topic_0038263963__vpc_route01_0001_li109317810121"></a><a name="vpc_route01_0001_li109317810121"></a>The custom route table associated with a subnet affects only the outbound traffic. The default route table of a subnet controls the inbound traffic.</p>
</li></ul>
<div class="note" id="en-us_topic_0038263963__vpc_route01_0001_en-us_topic_0212076956_note161315214453"><img src="public_sys-resources/note_3.0-en-us.png"><span class="notetitle"> </span><div class="notebody"></div></div>
</div>
<div class="section" id="en-us_topic_0038263963__section16240184933120"><h4 class="sectiontitle">Route</h4><p id="en-us_topic_0038263963__route_0001_p287375417338">You can add routes to default and custom route tables and configure the destination, next hop type, and next hop in the routes to determine where network traffic is directed. Routes are classified into system routes and custom routes.</p>
<ul id="en-us_topic_0038263963__route_0001_ul531194011410"><li id="en-us_topic_0038263963__route_0001_li6954288422">System routes: These routes are automatically added by the system and cannot be modified or deleted.<div class="p" id="en-us_topic_0038263963__route_0001_p885914127422"><a name="en-us_topic_0038263963__route_0001_li6954288422"></a><a name="route_0001_li6954288422"></a>After a route table is created, the system automatically adds the following system routes to the route table, so that instances in a VPC can communicate with each other.<ul id="en-us_topic_0038263963__route_0001_ul02558592405"><li id="en-us_topic_0038263963__route_0001_li12255155994011">Routes whose destination is 100.64.0.0/10 or 198.19.128.0/20.</li><li id="en-us_topic_0038263963__li7614543164612">Routes whose destination is a subnet CIDR block.<div class="note" id="en-us_topic_0038263963__note1902217425"><img src="public_sys-resources/note_3.0-en-us.png"><span class="notetitle"> </span><div class="notebody"><p id="en-us_topic_0038263963__p110152118426">In addition to the preceding system routes, the system automatically adds a route whose destination is 127.0.0.0/8. This is the local loopback address.</p>
<ul id="en-us_topic_0038263963__route_0001_ul531194011410"><li id="en-us_topic_0038263963__route_0001_li6954288422">System routes: These routes are automatically added by the system and cannot be modified or deleted.<div class="p" id="en-us_topic_0038263963__route_0001_p885914127422"><a name="en-us_topic_0038263963__route_0001_li6954288422"></a><a name="route_0001_li6954288422"></a>After a route table is created, the system automatically adds the following system routes to the route table, so that instances in a VPC can communicate with each other.<ul id="en-us_topic_0038263963__route_0001_ul02558592405"><li id="en-us_topic_0038263963__route_0001_li12255155994011">Routes whose destination is 100.64.0.0/10 or 198.19.128.0/20.</li><li id="en-us_topic_0038263963__li7614543164612">Routes whose destination is a subnet CIDR block.<div class="p" id="en-us_topic_0038263963__p888211447468"><a name="en-us_topic_0038263963__li7614543164612"></a><a name="li7614543164612"></a>If you enable IPv6 when creating a subnet, the system automatically assigns an IPv6 CIDR block to the subnet. Then, you can view IPv6 routes in its route table. Example destinations of subnet CIDR blocks are as follows:<ul id="en-us_topic_0038263963__ul1895945620463"><li id="en-us_topic_0038263963__li1483719559461">IPv4: 192.168.2.0/24</li><li id="en-us_topic_0038263963__li148370557469">IPv6: 2407:c080:802:be7::/64</li></ul>
</div>
<div class="note" id="en-us_topic_0038263963__note1902217425"><img src="public_sys-resources/note_3.0-en-us.png"><span class="notetitle"> </span><div class="notebody"><p id="en-us_topic_0038263963__p110152118426">In addition to the preceding system routes, the system automatically adds a route whose destination is 127.0.0.0/8. This is the local loopback address.</p>
</div></div>
</li></ul>
</div>

View File

@ -1,7 +1,7 @@
<a name="en-us_topic_0046655036"></a><a name="en-us_topic_0046655036"></a>
<h1 class="topictitle1">VPC Peering Connection Overview</h1>
<div id="body8662426"><div class="section" id="en-us_topic_0046655036__section19972750155312"><h4 class="sectiontitle">What Is a VPC Peering Connection?</h4><div class="p" id="en-us_topic_0046655036__p2213191045412">A VPC peering connection is a networking connection between two VPCs and enables them to communicate using private IP addresses. The VPCs to be peered can be in the same account or different accounts, but must be in the same region.<ul id="en-us_topic_0046655036__ul15713812713"><li id="en-us_topic_0046655036__li3550310112410">You can use VPC peering connections to build networks in different scenarios. For details, see <a href="en-us_topic_0046809840.html">VPC Peering Connection Usage Examples</a>.</li></ul>
<div id="body8662426"><div class="section" id="en-us_topic_0046655036__section19972750155312"><h4 class="sectiontitle">What Is a VPC Peering Connection?</h4><div class="p" id="en-us_topic_0046655036__p2213191045412">A VPC peering connection is a networking connection that connects two VPCs for them to communicate using private IP addresses. The VPCs to be peered can be in the same account or different accounts, but must be in the same region.<ul id="en-us_topic_0046655036__ul15713812713"><li id="en-us_topic_0046655036__li3550310112410">You can use VPC peering connections to build networks in different scenarios. For details, see <a href="en-us_topic_0046809840.html">VPC Peering Connection Usage Examples</a>.</li></ul>
</div>
<div class="p" id="en-us_topic_0046655036__p8474163413531"><a href="#en-us_topic_0046655036__fig4721642193711">Figure 1</a> shows an application scenario of VPC peering connections.<ul id="en-us_topic_0046655036__ul1824941916549"><li id="en-us_topic_0046655036__li1882572210543">There are two VPCs (VPC-A and VPC-B) in region A that are not connected.</li><li id="en-us_topic_0046655036__li1763553818548">Service servers (ECS-A01 and ECS-A02) are in VPC-A, and database servers (RDS-B01 and RDS-B02) are in VPC-B. The service servers and database servers cannot communicate with each other.</li></ul>
<ul id="en-us_topic_0046655036__ul16678181275512"><li id="en-us_topic_0046655036__li86781412125511">You need to create a VPC peering connection (peering-AB) between VPC-A and VPC-B so the service servers and database servers can communicate with each other.</li></ul>

View File

@ -3,8 +3,10 @@
<h1 class="topictitle1">Creating a VPC Peering Connection with Another VPC in Your Account</h1>
<div id="body8662426"><div class="section" id="en-us_topic_0046655037__s15a6c19babf0488eba98096754d78b91"><h4 class="sectiontitle">Scenarios</h4><p id="en-us_topic_0046655037__p1716814573318">If two VPCs from the same region cannot communicate with each other, you can use a VPC peering connection. This section describes how to create a VPC peering connection between two VPCs in the same account.</p>
<p id="en-us_topic_0046655037__p0545814910">This following describes how to create a VPC peering connection between VPC-A and VPC-B in account A to enable communications between ECS-A01 and RDS-B01.</p>
<div class="p" id="en-us_topic_0046655037__p39193361753">Procedure:<ol id="en-us_topic_0046655037__ol185891841797"><li id="en-us_topic_0046655037__li1558964195"><a href="#en-us_topic_0046655037__section143383585438">Step 1: Create a VPC Peering Connection</a></li><li id="en-us_topic_0046655037__li145891541999"><a href="#en-us_topic_0046655037__section19655123018712">Step 2: Add Routes for the VPC Peering Connection</a></li><li id="en-us_topic_0046655037__li65891141899"><a href="#en-us_topic_0046655037__section026312306414">Step 3: Verify Network Connectivity</a></li></ol>
</div>
<p id="en-us_topic_0046655037__p39193361753">Procedure:</p>
<p id="en-us_topic_0046655037__p927911922913"><a href="#en-us_topic_0046655037__section143383585438">Step 1: Create a VPC Peering Connection</a></p>
<p id="en-us_topic_0046655037__p201742102919"><a href="#en-us_topic_0046655037__section19655123018712">Step 2: Add Routes for the VPC Peering Connection</a></p>
<p id="en-us_topic_0046655037__p751723322913"><a href="#en-us_topic_0046655037__section026312306414">Step 3: Verify Network Connectivity</a></p>
<div class="fignone" id="en-us_topic_0046655037__fig4721642193711"><span class="figcap"><b>Figure 1 </b>Networking diagram of a VPC peering connection between VPCs in the same account</span><br><span><img class="eddx" id="en-us_topic_0046655037__image107218428372" src="en-us_image_0000001512876289.png"></span></div>
</div>
<div class="section" id="en-us_topic_0046655037__section644715161310"><h4 class="sectiontitle">Notes and Constraints</h4><ul id="en-us_topic_0046655037__ul124054425465"><li id="en-us_topic_0046655037__li993113814114">Only one VPC peering connection can be created between two VPCs at the same time.</li><li id="en-us_topic_0046655037__li88877152469">A VPC peering connection can only connect VPCs in the same region.
@ -165,7 +167,7 @@
</tr>
<tr id="en-us_topic_0046655037__row7697173915399"><td class="cellrowborder" valign="top" width="19.24%" headers="mcps1.3.5.4.1.1.2.3.2.4.1.1 "><p id="en-us_topic_0046655037__p13697193918396">Next Hop Type</p>
</td>
<td class="cellrowborder" valign="top" width="55.7%" headers="mcps1.3.5.4.1.1.2.3.2.4.1.2 "><p id="en-us_topic_0046655037__p4697103910393">The next hop type. Select <strong id="en-us_topic_0046655037__b866845558">VPC peering connection</strong>.</p>
<td class="cellrowborder" valign="top" width="55.7%" headers="mcps1.3.5.4.1.1.2.3.2.4.1.2 "><p id="en-us_topic_0046655037__p4697103910393">The next hop type. Select <strong id="en-us_topic_0046655037__b2021183672">VPC peering connection</strong>.</p>
</td>
<td class="cellrowborder" valign="top" width="25.06%" headers="mcps1.3.5.4.1.1.2.3.2.4.1.3 "><p id="en-us_topic_0046655037__p0697739173916">VPC peering connection</p>
</td>

View File

@ -3,8 +3,11 @@
<h1 class="topictitle1">Creating a VPC Peering Connection with a VPC in Another Account</h1>
<div id="body8662426"><div class="section" id="en-us_topic_0046655038__s15a6c19babf0488eba98096754d78b91"><h4 class="sectiontitle">Scenarios</h4><p id="en-us_topic_0046655038__p1716814573318">If two VPCs from the same region cannot communicate with each other, you can use a VPC peering connection. This section describes how to create a VPC peering connection between two VPCs in different accounts.</p>
<p id="en-us_topic_0046655038__p39193361753">This following describes how to create a VPC peering connection between VPC-A in account A and VPC-B in account B to enable communications between ECS-A01 and RDS-B01.</p>
<div class="p" id="en-us_topic_0046655038__p82151338919">Procedure:<ol id="en-us_topic_0046655038__ol890412429916"><li id="en-us_topic_0046655038__li6904114218918"><a href="#en-us_topic_0046655038__section14616192294815">Step 1: Create a VPC Peering Connection</a></li><li id="en-us_topic_0046655038__li154581491194"><a href="#en-us_topic_0046655038__section497322311429">Step 2: Peer Account Accepts the VPC Peering Connection Request</a></li><li id="en-us_topic_0046655038__li1279312551891"><a href="#en-us_topic_0046655038__section519111175712">Step 3: Add Routes for the VPC Peering Connection</a></li><li id="en-us_topic_0046655038__li128297119107"><a href="#en-us_topic_0046655038__section920942154519">Step 4: Verify Network Connectivity</a></li></ol>
</div>
<p id="en-us_topic_0046655038__p82151338919">Procedure:</p>
<p id="en-us_topic_0046655038__p251910918304"><a href="#en-us_topic_0046655038__section14616192294815">Step 1: Create a VPC Peering Connection</a></p>
<p id="en-us_topic_0046655038__p98731377308"><a href="#en-us_topic_0046655038__section497322311429">Step 2: Peer Account Accepts the VPC Peering Connection Request</a></p>
<p id="en-us_topic_0046655038__p223813617303"><a href="#en-us_topic_0046655038__section519111175712">Step 3: Add Routes for the VPC Peering Connection</a></p>
<p id="en-us_topic_0046655038__p14539154103014"><a href="#en-us_topic_0046655038__section920942154519">Step 4: Verify Network Connectivity</a></p>
<div class="fignone" id="en-us_topic_0046655038__fig4721642193711"><span class="figcap"><b>Figure 1 </b>Networking diagram of a VPC peering connection between VPCs in different accounts</span><br><span><img class="eddx" id="en-us_topic_0046655038__image107218428372" src="en-us_image_0000001464757610.png"></span></div>
</div>
<div class="section" id="en-us_topic_0046655038__section2324532142210"><h4 class="sectiontitle">Notes and Constraints</h4><ul id="en-us_topic_0046655038__en-us_topic_0046655037_ul124054425465"><li id="en-us_topic_0046655038__en-us_topic_0046655037_li993113814114">Only one VPC peering connection can be created between two VPCs at the same time.</li><li id="en-us_topic_0046655038__li88877152469">A VPC peering connection can only connect VPCs in the same region.
@ -97,7 +100,7 @@
</div>
<div class="section" id="en-us_topic_0046655038__section497322311429"><a name="en-us_topic_0046655038__section497322311429"></a><a name="section497322311429"></a><h4 class="sectiontitle">Step 2: Peer Account Accepts the VPC Peering Connection Request</h4><p id="en-us_topic_0046655038__a68f96ca81c6c435090a1d17222de1316">After you create a VPC peering connection with a VPC in another account, you need to contact the peer account to accept the VPC peering connection request. In this example, account A notifies account B to accept the request. Account B needs to:</p>
<ol id="en-us_topic_0046655038__o7c0d49b80ff64adb8c0c926a321d27a4"><li id="en-us_topic_0046655038__l3b8df7953c4c482bb8d54254504d5477">Log in to the management console.</li><li id="en-us_topic_0046655038__li164031746327">Click <span><img id="en-us_topic_0046655038__image34031461922" src="en-us_image_0000001626736198.png"></span> in the upper left corner and choose <strong id="en-us_topic_0046655038__b175789346397"><span id="en-us_topic_0046655038__text13578634183919">Network</span><span id="en-us_topic_0046655038__text12578173419396"></span></strong> &gt; <strong id="en-us_topic_0046655038__b557916343390">Virtual Private Cloud</strong>.<p id="en-us_topic_0046655038__p134031465213">The <strong id="en-us_topic_0046655038__b1485813135407">Virtual Private Cloud</strong> page is displayed.</p>
</li><li id="en-us_topic_0046655038__li19378654131714">In the navigation pane on the left, choose <strong id="en-us_topic_0046655038__b1267141282">Virtual Private Cloud</strong> &gt; <strong id="en-us_topic_0046655038__b1462421336">VPC Peering Connections</strong>.<p id="en-us_topic_0046655038__p191641754143317">The VPC peering connection list is displayed.</p>
</li><li id="en-us_topic_0046655038__li1173672113529">In the navigation pane on the left, choose <strong id="en-us_topic_0046655038__b21321057131613">Virtual Private Cloud</strong> &gt; <strong id="en-us_topic_0046655038__b9132257171614">VPC Peering Connections</strong>.<p id="en-us_topic_0046655038__p17113949173212">The VPC peering connection list is displayed.</p>
</li><li id="en-us_topic_0046655038__li1539310239483">In the VPC peering connection list, locate the VPC peering connection request to be accepted.<div class="fignone" id="en-us_topic_0046655038__fig16224165117555"><span class="figcap"><b>Figure 3 </b>VPC peering connection list</span><br><span><img id="en-us_topic_0046655038__image12209153514559" src="en-us_image_0162391155.png"></span></div>
</li><li id="en-us_topic_0046655038__li1212919520306">Locate the row that contains the target VPC peering connection and click <strong id="en-us_topic_0046655038__b197671579548">Accept Request</strong> in the <strong id="en-us_topic_0046655038__b972129175419">Operation</strong> column.<p id="en-us_topic_0046655038__p12618165334920">After the status of the VPC peering connection changes to <strong id="en-us_topic_0046655038__b1576491621114">Accepted</strong>, the VPC peering connection is created.</p>
</li><li id="en-us_topic_0046655038__li1883216559498">Go to <a href="#en-us_topic_0046655038__section519111175712">Step 3: Add Routes for the VPC Peering Connection</a>.</li></ol>
@ -171,7 +174,7 @@
</tr>
<tr id="en-us_topic_0046655038__en-us_topic_0046655037_row7697173915399"><td class="cellrowborder" valign="top" width="19.24%" headers="mcps1.3.6.4.2.1.3.3.2.4.1.1 "><p id="en-us_topic_0046655038__en-us_topic_0046655037_p13697193918396">Next Hop Type</p>
</td>
<td class="cellrowborder" valign="top" width="55.7%" headers="mcps1.3.6.4.2.1.3.3.2.4.1.2 "><p id="en-us_topic_0046655038__en-us_topic_0046655037_p4697103910393">The next hop type. Select <strong id="en-us_topic_0046655038__en-us_topic_0046655037_b866845558">VPC peering connection</strong>.</p>
<td class="cellrowborder" valign="top" width="55.7%" headers="mcps1.3.6.4.2.1.3.3.2.4.1.2 "><p id="en-us_topic_0046655038__en-us_topic_0046655037_p4697103910393">The next hop type. Select <strong id="en-us_topic_0046655038__en-us_topic_0046655037_b2021183672">VPC peering connection</strong>.</p>
</td>
<td class="cellrowborder" valign="top" width="25.06%" headers="mcps1.3.6.4.2.1.3.3.2.4.1.3 "><p id="en-us_topic_0046655038__en-us_topic_0046655037_p0697739173916">VPC peering connection</p>
</td>

View File

@ -1,13 +1,13 @@
<a name="en-us_topic_0051746700"></a><a name="en-us_topic_0051746700"></a>
<h1 class="topictitle1">Associating Subnets with a <span id="text1947818320715">Firewall</span><span id="text2032818441287"></span></h1>
<div id="body1489126634611"><div class="section" id="en-us_topic_0051746700__section2661009154525"><h4 class="sectiontitle">Scenarios</h4><p id="en-us_topic_0051746700__p27214355154529">You can associate a <span id="en-us_topic_0051746700__text11248715171311">firewall</span><span id="en-us_topic_0051746700__text45551720134"></span> with a subnet to protect resources in the subnet. After a <span id="en-us_topic_0051746700__text1438574314412">firewall</span><span id="en-us_topic_0051746700__text43863430418"></span> is associated with a subnet, the <span id="en-us_topic_0051746700__text995618461141">firewall</span><span id="en-us_topic_0051746700__text695711469418"></span> denies all traffic to and from the subnet until you add rules to allow traffic.</p>
<div id="body1489126634611"><div class="section" id="en-us_topic_0051746700__section2661009154525"><h4 class="sectiontitle">Scenarios</h4><p id="en-us_topic_0051746700__p27214355154529">You can associate a <span id="en-us_topic_0051746700__text11248715171311">firewall</span><span id="en-us_topic_0051746700__text45551720134"></span> with a subnet to protect resources in the subnet.</p>
</div>
<div class="section" id="en-us_topic_0051746700__section20971203516265"><h4 class="sectiontitle">Notes and Constraints</h4><p id="en-us_topic_0051746700__p186365192715">You can associate a <span id="en-us_topic_0051746700__text6814154711358">firewall</span><span id="en-us_topic_0051746700__text1281410475358"></span> with multiple subnets. However, a subnet can only be associated with one <span id="en-us_topic_0051746700__text12814154718358">firewall</span><span id="en-us_topic_0051746700__text12814194793517"></span> at a time.</p>
<div class="section" id="en-us_topic_0051746700__section20971203516265"><h4 class="sectiontitle">Notes and Constraints</h4><ul id="en-us_topic_0051746700__ul1299422815536"><li id="en-us_topic_0051746700__li129944281537">You can associate a <span id="en-us_topic_0051746700__text178810328272">firewall</span><span id="en-us_topic_0051746700__text1888113216278"></span> with multiple subnets. However, a subnet can only be associated with one <span id="en-us_topic_0051746700__text1088932192711">firewall</span><span id="en-us_topic_0051746700__text17881325277"></span> at a time.</li><li id="en-us_topic_0051746700__li6723331175419">After a <span id="en-us_topic_0051746700__text8281218541">firewall</span><span id="en-us_topic_0051746700__text17281719542"></span> is associated with a subnet, the default <span id="en-us_topic_0051746700__text85261835204020">firewall</span><span id="en-us_topic_0051746700__text1652611351401"></span> rules deny all traffic to and from the subnet until you add custom rules to allow traffic. For details, see <a href="en-us_topic_0051746702.html">Adding a Firewall Rule</a>.</li></ul>
</div>
<div class="section" id="en-us_topic_0051746700__section23848003154739"><h4 class="sectiontitle">Procedure</h4><ol id="en-us_topic_0051746700__ol1599100493"><li id="en-us_topic_0051746700__li7832135783714">Log in to the management console.</li></ol><ol start="2" id="en-us_topic_0051746700__ol59104566154757"><li id="en-us_topic_0051746700__li840318282158">Click <span><img id="en-us_topic_0051746700__en-us_topic_0013748726_image338921514480" src="en-us_image_0141273034.png"></span> in the upper left corner and select the desired region and project.</li><li id="en-us_topic_0051746700__li65321958215">Click <span><img id="en-us_topic_0051746700__en-us_topic_0013748738_image8750174734412" src="en-us_image_0000001626734158.png"></span> in the upper left corner and choose <strong id="en-us_topic_0051746700__b9513123202816"><span id="en-us_topic_0051746700__text1851363102817">Network</span><span id="en-us_topic_0051746700__text135131239289"></span></strong> &gt; <strong id="en-us_topic_0051746700__b10513143172819">Virtual Private Cloud</strong>.<p id="en-us_topic_0051746700__p1182103318256">The <strong id="en-us_topic_0051746700__b8658192717339">Virtual Private Cloud</strong> page is displayed.</p>
</li><li id="en-us_topic_0051746700__li44451696145820">In the navigation pane on the left, choose <strong id="en-us_topic_0051746700__b12292491440">Access Control</strong> &gt; <strong id="en-us_topic_0051746700__b92317491941"><span id="en-us_topic_0051746700__text16135849063">Firewall</span><span id="en-us_topic_0051746700__text11415131412287"></span>s</strong>.</li><li id="en-us_topic_0051746700__li30045754154757">Locate the target <span id="en-us_topic_0051746700__text12144278215">firewall</span><span id="en-us_topic_0051746700__text20141627142113"></span> and click its name to switch to the page showing details of that particular <span id="en-us_topic_0051746700__text8883143142618">firewall</span><span id="en-us_topic_0051746700__text288493111266"></span>.</li><li id="en-us_topic_0051746700__li515334316858">On the displayed page, click the <strong id="en-us_topic_0051746700__b751999970104822">Associated Subnets</strong> tab.</li><li id="en-us_topic_0051746700__li1976338154757">On the <strong id="en-us_topic_0051746700__b1725028782104830">Associated Subnets</strong> page, click <strong id="en-us_topic_0051746700__b1790527750104830">Associate</strong>.</li><li id="en-us_topic_0051746700__li14177803105225">On the displayed page, select the subnets to be associated with the <span id="en-us_topic_0051746700__text1363020230516">firewall</span><span id="en-us_topic_0051746700__text2063118231951"></span>, and click <strong id="en-us_topic_0051746700__b7682349105225">OK</strong>.</li></ol>
<div class="note" id="en-us_topic_0051746700__note61820758154757"><img src="public_sys-resources/note_3.0-en-us.png"><span class="notetitle"> </span><div class="notebody"><p class="text" id="en-us_topic_0051746700__p19515914154757">Subnets with <span id="en-us_topic_0051746700__text197663301159">firewall</span><span id="en-us_topic_0051746700__text1576711307513"></span>s associated will not be displayed on the page for you to select. If you want to associate such a subnet with another <span id="en-us_topic_0051746700__text123574391951">firewall</span><span id="en-us_topic_0051746700__text2035883916519"></span>, you must first disassociate the subnet from the original <span id="en-us_topic_0051746700__text2805241859">firewall</span><span id="en-us_topic_0051746700__text880764119516"></span>. One-click subnet association and disassociation are not supported currently. A subnet can only be associated with one <span id="en-us_topic_0051746700__text2067212353514">firewall</span><span id="en-us_topic_0051746700__text1567315358517"></span>.</p>
</li><li id="en-us_topic_0051746700__li44451696145820">In the navigation pane on the left, choose <strong id="en-us_topic_0051746700__b12292491440">Access Control</strong> &gt; <strong id="en-us_topic_0051746700__b92317491941"><span id="en-us_topic_0051746700__text16135849063">Firewall</span><span id="en-us_topic_0051746700__text11415131412287"></span>s</strong>.</li><li id="en-us_topic_0051746700__li30045754154757">Locate the target <span id="en-us_topic_0051746700__text12144278215">firewall</span><span id="en-us_topic_0051746700__text20141627142113"></span> and click its name to switch to the page showing details of that particular <span id="en-us_topic_0051746700__text8883143142618">firewall</span><span id="en-us_topic_0051746700__text288493111266"></span>.</li><li id="en-us_topic_0051746700__li515334316858">On the displayed page, click the <strong id="en-us_topic_0051746700__b751999970104822">Associated Subnets</strong> tab.</li><li id="en-us_topic_0051746700__li1976338154757">On the <strong id="en-us_topic_0051746700__b1725028782104830">Associated Subnets</strong> tab, click <strong id="en-us_topic_0051746700__b1790527750104830">Associate</strong>.</li><li id="en-us_topic_0051746700__li14177803105225">On the displayed page, select the subnets to be associated with the <span id="en-us_topic_0051746700__text1363020230516">firewall</span><span id="en-us_topic_0051746700__text2063118231951"></span>, and click <strong id="en-us_topic_0051746700__b7682349105225">OK</strong>.</li></ol>
<div class="note" id="en-us_topic_0051746700__note61820758154757"><img src="public_sys-resources/note_3.0-en-us.png"><span class="notetitle"> </span><div class="notebody"><p class="text" id="en-us_topic_0051746700__p19515914154757">A subnet with a <span id="en-us_topic_0051746700__text197663301159">firewall</span><span id="en-us_topic_0051746700__text1576711307513"></span> associated will not be displayed on the page for you to select. If you want to associate such a subnet with another <span id="en-us_topic_0051746700__text123574391951">firewall</span><span id="en-us_topic_0051746700__text2035883916519"></span>, you must first disassociate the subnet from the original <span id="en-us_topic_0051746700__text2805241859">firewall</span><span id="en-us_topic_0051746700__text880764119516"></span>. One-click subnet association and disassociation are not supported currently. A subnet can only be associated with one <span id="en-us_topic_0051746700__text2067212353514">firewall</span><span id="en-us_topic_0051746700__text1567315358517"></span>.</p>
</div></div>
</div>
</div>

View File

@ -43,7 +43,7 @@
</td>
<td class="cellrowborder" valign="top" width="57.769999999999996%" headers="mcps1.3.3.3.5.6.1.2.4.1.2 "><p id="en-us_topic_0051746702__p4779142112416">The source from which the traffic is allowed. The source can be an IP address or IP address range.</p>
<ul id="en-us_topic_0051746702__ul2087319185119"><li id="en-us_topic_0051746702__en-us_topic_0030969470_li0541721414">IP address:<ul id="en-us_topic_0051746702__en-us_topic_0030969470_ul554172946"><li id="en-us_topic_0051746702__en-us_topic_0030969470_li19301951584">Single IP address: 192.168.10.10/32</li><li id="en-us_topic_0051746702__en-us_topic_0030969470_li530357816">All IP addresses: 0.0.0.0/0</li><li id="en-us_topic_0051746702__en-us_topic_0030969470_li330351881">IP address range: 192.168.1.0/24</li></ul>
</li><li id="en-us_topic_0051746702__en-us_topic_0030969470_li164031044185514">Security group: sg-A</li></ul>
</li><li id="en-us_topic_0051746702__en-us_topic_0030969470_li16893123362913">IP address group: The source is an IP address group. An IP address group is a collection of one or more IP addresses. You can select an available IP address group from the drop-down list. An IP address group can help you manage IP address ranges and IP addresses with same security requirements in a more simple way.</li></ul>
</td>
<td class="cellrowborder" valign="top" width="22.34%" headers="mcps1.3.3.3.5.6.1.2.4.1.3 "><p id="en-us_topic_0051746702__p12466164823419">0.0.0.0/0</p>
</td>
@ -59,8 +59,8 @@
<tr id="en-us_topic_0051746702__row346764883414"><td class="cellrowborder" valign="top" width="19.89%" headers="mcps1.3.3.3.5.6.1.2.4.1.1 "><p id="en-us_topic_0051746702__p046719484349">Destination</p>
</td>
<td class="cellrowborder" valign="top" width="57.769999999999996%" headers="mcps1.3.3.3.5.6.1.2.4.1.2 "><p id="en-us_topic_0051746702__p1686812495242">The destination to which the traffic is allowed. The destination can be an IP address or IP address range.</p>
<ul id="en-us_topic_0051746702__ul158681649202410"><li id="en-us_topic_0051746702__en-us_topic_0030969470_li0541721414_1">IP address:<ul id="en-us_topic_0051746702__en-us_topic_0030969470_ul554172946_1"><li id="en-us_topic_0051746702__en-us_topic_0030969470_li19301951584_1">Single IP address: 192.168.10.10/32</li><li id="en-us_topic_0051746702__en-us_topic_0030969470_li530357816_1">All IP addresses: 0.0.0.0/0</li><li id="en-us_topic_0051746702__en-us_topic_0030969470_li330351881_1">IP address range: 192.168.1.0/24</li></ul>
</li><li id="en-us_topic_0051746702__en-us_topic_0030969470_li164031044185514_1">Security group: sg-A</li></ul>
<ul id="en-us_topic_0051746702__ul158681649202410"><li id="en-us_topic_0051746702__li1384412054013">IP address:<ul id="en-us_topic_0051746702__ul1884492024010"><li id="en-us_topic_0051746702__li7844152010405">Single IP address: 192.168.10.10/32</li><li id="en-us_topic_0051746702__li684412014402">All IP addresses: 0.0.0.0/0</li><li id="en-us_topic_0051746702__li5844220124012">IP address range: 192.168.1.0/24</li></ul>
</li><li id="en-us_topic_0051746702__li1285816203407">IP address group: The source is an IP address group. An IP address group is a collection of one or more IP addresses. You can select an available IP address group from the drop-down list. An IP address group can help you manage IP address ranges and IP addresses with same security requirements in a more simple way.</li></ul>
</td>
<td class="cellrowborder" valign="top" width="22.34%" headers="mcps1.3.3.3.5.6.1.2.4.1.3 "><p id="en-us_topic_0051746702__p104679481342">0.0.0.0/0</p>
</td>

File diff suppressed because it is too large Load Diff

View File

@ -32,7 +32,7 @@
</tbody>
</table>
</div>
<div class="section" id="en-us_topic_0068145818__section4374728222113"><h4 class="sectiontitle">Procedure</h4><div class="p" id="en-us_topic_0068145818__p2472612422143"><strong id="en-us_topic_0068145818__b6546430123319">Searching for EIPs by tag key and value on the page showing the EIP list</strong><ol id="en-us_topic_0068145818__ob68403ad2ad349f7adf6e819a1cb2b2b"><li id="en-us_topic_0068145818__lf9add2a2c9424e18b40746538415cf72">Log in to the management console.</li><li id="en-us_topic_0068145818__li840318282158">Click <span><img id="en-us_topic_0068145818__en-us_topic_0013748726_image338921514480" src="en-us_image_0141273034.png"></span> in the upper left corner and select the desired region and project.</li><li id="en-us_topic_0068145818__li182421220595">Click <span><img id="en-us_topic_0068145818__en-us_topic_0013748738_image8750174734412" src="en-us_image_0000001454059512.png"></span> in the upper left corner and choose <strong id="en-us_topic_0068145818__en-us_topic_0013748738_b29211533144914"><span id="en-us_topic_0068145818__en-us_topic_0013748738_text47511547154412">Network</span><span id="en-us_topic_0068145818__en-us_topic_0013748738_text1275116474447"></span></strong> &gt; <strong id="en-us_topic_0068145818__en-us_topic_0013748738_b15921153318493">Elastic IP</strong>.</li><li id="en-us_topic_0068145818__l29192424789445dfa99446a0284e9f83">Click the search box and then click <strong id="en-us_topic_0068145818__b555152013401">Tag</strong> in the drop-down list.</li><li id="en-us_topic_0068145818__lef5238f0a9574d44a620d73e4be0bbb6">Select the tag key and value of the EIP.<p id="en-us_topic_0068145818__afc42d7dd05f341e18f092e39d00999af"><a name="en-us_topic_0068145818__lef5238f0a9574d44a620d73e4be0bbb6"></a><a name="lef5238f0a9574d44a620d73e4be0bbb6"></a>You can add multiple tag keys and values to refine your search results. If you add more than one tag to search for EIPs, the system will display only the EIPs that contain all of the tags you specified.</p>
<div class="section" id="en-us_topic_0068145818__section4374728222113"><h4 class="sectiontitle">Procedure</h4><div class="p" id="en-us_topic_0068145818__p2472612422143"><strong id="en-us_topic_0068145818__b6546430123319">Searching for EIPs by tag key and value on the page showing the EIP list</strong><ol id="en-us_topic_0068145818__ob68403ad2ad349f7adf6e819a1cb2b2b"><li id="en-us_topic_0068145818__lf9add2a2c9424e18b40746538415cf72">Log in to the management console.</li><li id="en-us_topic_0068145818__li840318282158">Click <span><img id="en-us_topic_0068145818__en-us_topic_0013748726_image338921514480" src="en-us_image_0141273034.png"></span> in the upper left corner and select the desired region and project.</li><li id="en-us_topic_0068145818__li182421220595">Click <span><img id="en-us_topic_0068145818__en-us_topic_0013748738_image8750174734412" src="en-us_image_0000001454059512.png"></span> in the upper left corner and choose <strong id="en-us_topic_0068145818__en-us_topic_0013748738_b29211533144914"><span id="en-us_topic_0068145818__en-us_topic_0013748738_text47511547154412">Network</span><span id="en-us_topic_0068145818__en-us_topic_0013748738_text1275116474447"></span></strong> &gt; <strong id="en-us_topic_0068145818__en-us_topic_0013748738_b15921153318493">Elastic IP</strong>.</li><li id="en-us_topic_0068145818__l29192424789445dfa99446a0284e9f83">Click the search box above the EIP list.</li><li id="en-us_topic_0068145818__lef5238f0a9574d44a620d73e4be0bbb6">Select the tag key and value of the EIP.<p id="en-us_topic_0068145818__afc42d7dd05f341e18f092e39d00999af"><a name="en-us_topic_0068145818__lef5238f0a9574d44a620d73e4be0bbb6"></a><a name="lef5238f0a9574d44a620d73e4be0bbb6"></a>You can add multiple tag keys and values to refine your search results. If you add more than one tag to search for EIPs, the system will display only the EIPs that contain all of the tags you specified.</p>
</li><li id="en-us_topic_0068145818__l042b3fc4598b46dc84c76092ba55e619">Click <strong id="en-us_topic_0068145818__b1886611427527">OK</strong>.<p id="en-us_topic_0068145818__a06f452c17f8c41ab88c73ab68fa21655">The system displays the EIPs you are looking for based on the entered tag keys and values.</p>
</li></ol>
</div>

View File

@ -1,8 +1,8 @@
<a name="en-us_topic_0073379079"></a><a name="en-us_topic_0073379079"></a>
<h1 class="topictitle1">Security Groups and Security Group Rules</h1>
<div id="body1529924412668"><div class="section" id="en-us_topic_0073379079__section14990143614615"><h4 class="sectiontitle">Security Groups</h4><p id="en-us_topic_0073379079__p19810418122812">A security group is a collection of access control rules for cloud resources, such as cloud servers, containers, and databases, that have the same security protection requirements and that are mutually trusted. After a security group is created, you can create various access rules for the security group, these rules will apply to all cloud resources added to this security group.</p>
<p id="en-us_topic_0073379079__p88199142160">If you have not created any security group yet, the system automatically creates a default security group for you and associates it with the instance (such as an ECS) when you create it. For details about the default security group, see <a href="SecurityGroup_0003.html">Default Security Group and Its Rules</a>.</p>
<div id="body1529924412668"><div class="section" id="en-us_topic_0073379079__section14990143614615"><h4 class="sectiontitle">Security Groups</h4><p id="en-us_topic_0073379079__p19810418122812">A security group is a collection of access control rules for cloud resources, such as cloud servers, containers, and databases, that have the same security protection requirements and that are mutually trusted. After a security group is created, you can create various access rules for the security group and these rules will apply to all cloud resources added to this security group.</p>
<p id="en-us_topic_0073379079__p88199142160">If you have not created any security groups yet, the system automatically creates a default security group for you and associates it with the instance (such as an ECS) when you create it. For details about the default security group, see <a href="SecurityGroup_0003.html">Default Security Group and Its Rules</a>.</p>
<p id="en-us_topic_0073379079__p043810409541">Security groups are stateful. If you send a request from your instance and the outbound traffic is allowed, the response traffic for that request is allowed to flow in regardless of inbound security group rules. Similarly, if inbound traffic is allowed, responses to allowed inbound traffic are allowed to flow out, regardless of outbound rules.</p>
<p id="en-us_topic_0073379079__p683459318">Security groups use connection tracking to track traffic to and from instances that they contain and security group rules are applied based on the connection status of the traffic to determine whether to allow or deny traffic.</p>
<ul id="en-us_topic_0073379079__ul736610371261"><li id="en-us_topic_0073379079__li23661737465">If you add, modify, or delete a security group rule, or add or remove an instance to or from a security group, the inbound connection tracking of all instances in the security group will be automatically cleared. The inbound or outbound traffic of the instance will be considered as new connections, which need to match the inbound or outbound security group rules to ensure that the rules take effect immediately and the security of incoming traffic.</li></ul>
@ -30,7 +30,7 @@
</td>
<td class="cellrowborder" valign="top" width="81.25%" headers="mcps1.3.2.2.2.2.3.1.2 "><div class="p" id="en-us_topic_0073379079__p4546455121118">The source in an inbound rule is used to match the IP address or address range of an external request. The source can be:<ul id="en-us_topic_0073379079__ul14767152702818"><li id="en-us_topic_0073379079__li07672279289">IP address:<ul id="en-us_topic_0073379079__ul9709161982115"><li id="en-us_topic_0073379079__li1559891872116">Example IPv4 address: 192.168.10.10/32</li><li id="en-us_topic_0073379079__li859801842111">Example IPv6 address: 2002:50::44/128</li><li id="en-us_topic_0073379079__li12599151814214">Example IPv4 address range: 192.168.52.0/24 All IPv4 addresses: 0.0.0.0/0</li><li id="en-us_topic_0073379079__li659910182212">Example IPv6 address range: 2407:c080:802:469::/64 All IPv6 addresses: ::/0</li></ul>
</li><li id="en-us_topic_0073379079__li3789165513228">Security group: You can select another security group in the same region under the current account as the source.<p id="en-us_topic_0073379079__p7528188172317"><a name="en-us_topic_0073379079__li3789165513228"></a><a name="li3789165513228"></a>For example, instance A is in security group A and instance B is in security group B. If security group A has a rule with <strong id="en-us_topic_0073379079__b64641826173812">Source</strong> set to security group B, access from instance B is allowed to instance A.</p>
</li></ul>
</li><li id="en-us_topic_0073379079__li15491164302818">IP address group: If you have multiple IP address ranges and IP addresses with same security requirements, add them to an IP address group and select the group as the source to help you manage them in a more simple way.</li></ul>
</div>
</td>
</tr>
@ -40,7 +40,7 @@
<ul id="en-us_topic_0073379079__ul145851618122615"><li id="en-us_topic_0073379079__li1158541815269">IP address:<ul id="en-us_topic_0073379079__ul1658591816265"><li id="en-us_topic_0073379079__li14585218162615">Example IPv4 address: 192.168.10.10/32</li><li id="en-us_topic_0073379079__li105851018122615">Example IPv6 address: 2002:50::44/128</li><li id="en-us_topic_0073379079__li6585718152616">Example IPv4 address range: 192.168.52.0/24 All IPv4 addresses: 0.0.0.0/0</li><li id="en-us_topic_0073379079__li135851187263">Example IPv6 address range: 2407:c080:802:469::/64 All IPv6 addresses: ::/0</li></ul>
</li></ul>
<ul id="en-us_topic_0073379079__ul16898144344515"><li id="en-us_topic_0073379079__li236717109250">Security group: You can select another security group in the same region under the current account as the destination.<p id="en-us_topic_0073379079__p87912422254"><a name="en-us_topic_0073379079__li236717109250"></a><a name="li236717109250"></a>For example, instance A is in security group A and instance B is in security group B. If security group A has a rule with <strong id="en-us_topic_0073379079__b2478175816489">Destination</strong> set to security group B, access from instance A is allowed to instance B.</p>
</li></ul>
</li><li id="en-us_topic_0073379079__li18898543134513">IP address group: If you have multiple IP address ranges and IP addresses with same security requirements, add them to an IP address group and select the group as the destination to help you manage them in a more simple way.</li></ul>
</td>
</tr>
</tbody>

View File

@ -4,7 +4,7 @@
<div id="body1558602290736"><p id="permission_0004__p624113263018">Custom policies can be created to supplement the system-defined policies of VPC. For the actions supported for custom policies, see <a href="https://docs.otc.t-systems.com/virtual-private-cloud/api-ref/permissions_policies_and_supported_actions/index.html" target="_blank" rel="noopener noreferrer">Permissions Policies and Supported Actions</a>.</p>
<p id="permission_0004__p1391019913815">You can create custom policies in either of the following ways:</p>
<ul id="permission_0004__ul1146431393818"><li id="permission_0004__li5764181518386">Visual editor: Select cloud services, actions, resources, and request conditions. This does not require knowledge of policy syntax.</li><li id="permission_0004__li546410135389">JSON: Edit JSON policies from scratch or based on an existing policy.</li></ul>
<p id="permission_0004__p14439125933520">For operation details, see <a href="https://docs.otc.t-systems.com/usermanual/iam/en-us_topic_0274187246.html" target="_blank" rel="noopener noreferrer">Creating a Custom Policy</a>. The following section contains examples of common VPC custom policies.</p>
<p id="permission_0004__p14439125933520">For operation details, see <a href="https://docs.otc.t-systems.com/identity-access-management/umn/user_guide/permissions/creating_a_custom_policy.html" target="_blank" rel="noopener noreferrer">Creating a Custom Policy</a>. The following section contains examples of common VPC custom policies.</p>
<div class="section" id="permission_0004__section51981826152017"><h4 class="sectiontitle">Example Custom Policies</h4><ul id="permission_0004__ul783572752011"><li id="permission_0004__li14835327172017">Example 1: Allowing users to create and view VPCs<pre class="screen" id="permission_0004__screen1464193292417">{
"Version": "1.1",
"Statement": [

View File

@ -38,7 +38,7 @@
<tr id="vpc010005__row1757617496582"><td class="cellrowborder" valign="top" width="19.24%" headers="mcps1.3.2.2.5.4.1.2.4.1.1 "><p id="vpc010005__p597145013588">Enterprise Project</p>
</td>
<td class="cellrowborder" valign="top" width="55.7%" headers="mcps1.3.2.2.5.4.1.2.4.1.2 "><p id="vpc010005__p2971175055819">The enterprise project that the EIP belongs to.</p>
<p id="vpc010005__p10971125075817">An enterprise project facilitates project-level management and grouping of cloud resources and users. The name of the default project is <strong id="vpc010005__b289415828">default</strong>.</p>
<p id="vpc010005__p10971125075817">An enterprise project facilitates project-level management and grouping of cloud resources and users. The name of the default project is <strong id="vpc010005__b1045040993">default</strong>.</p>
</td>
<td class="cellrowborder" valign="top" width="25.06%" headers="mcps1.3.2.2.5.4.1.2.4.1.3 "><p id="vpc010005__p497217504586">default</p>
</td>

View File

@ -5,7 +5,7 @@
</div>
<div class="section" id="vpc010006__section02581011712"><h4 class="sectiontitle">Notes and Constraints</h4><ul id="vpc010006__ul10433324101711"><li id="vpc010006__li4956114183317">The type of EIPs must be the same as that of the shared bandwidth the EIPs to be added to.</li><li id="vpc010006__li18866164215565">Do not add EIPs of the dedicated load balancer type (<strong id="vpc010006__en-us_topic_0013748738_b354915453512">5_gray</strong>) and other types to the same shared bandwidth. Otherwise, the bandwidth limit policy will not take effect.</li></ul>
</div>
<div class="section" id="vpc010006__section67201052194510"><h4 class="sectiontitle">Procedure</h4><ol id="vpc010006__ol547185563613"><li id="vpc010006__li1531483113269">Log in to the management console.</li></ol><ol start="2" id="vpc010006__ol1110143961116"><li id="vpc010006__li1414882818213">Click <span><img id="vpc010006__en-us_topic_0013748726_image338921514480" src="en-us_image_0141273034.png"></span> in the upper left corner and select the desired region and project.</li><li id="vpc010006__li540658334">Click <span><img id="vpc010006__en-us_topic_0013748738_image8750174734412" src="en-us_image_0000001454059512.png"></span> in the upper left corner and choose <strong id="vpc010006__en-us_topic_0013748738_b29211533144914"><span id="vpc010006__en-us_topic_0013748738_text47511547154412">Network</span><span id="vpc010006__en-us_topic_0013748738_text1275116474447"></span></strong> &gt; <strong id="vpc010006__en-us_topic_0013748738_b15921153318493">Elastic IP</strong>.</li><li id="vpc010006__li15362774171923">In the navigation pane on the left, choose <strong id="vpc010006__vpc010005_b17432191635012">Elastic IP and Bandwidth</strong> &gt; <strong id="vpc010006__vpc010005_b17537172011502">Shared Bandwidths</strong>.</li><li id="vpc010006__li18967172225311">In the shared bandwidth list, locate the row that contains the shared bandwidth that you want to add EIPs to. In the <strong id="vpc010006__b135334539392">Operation</strong> column, choose <strong id="vpc010006__b1215220332267">Add EIP</strong>, and select the EIPs to be added.<div class="note" id="vpc010006__note1660761317414"><img src="public_sys-resources/note_3.0-en-us.png"><span class="notetitle"> </span><div class="notebody"><ul id="vpc010006__ul8542059103117"><li id="vpc010006__li175429598315">After an <span id="vpc010006__text139695083118"></span><span id="vpc010006__text143961150163117">EIP</span> is added to a shared bandwidth, the dedicated bandwidth used by the EIP will become invalid and the EIP will start to use the shared bandwidth. The EIP's dedicated bandwidth will be deleted and will no longer be billed.</li></ul>
<div class="section" id="vpc010006__section67201052194510"><h4 class="sectiontitle">Procedure</h4><ol id="vpc010006__ol547185563613"><li id="vpc010006__li1531483113269">Log in to the management console.</li></ol><ol start="2" id="vpc010006__ol1110143961116"><li id="vpc010006__li1414882818213">Click <span><img id="vpc010006__en-us_topic_0013748726_image338921514480" src="en-us_image_0141273034.png"></span> in the upper left corner and select the desired region and project.</li><li id="vpc010006__li540658334">Click <span><img id="vpc010006__en-us_topic_0013748738_image8750174734412" src="en-us_image_0000001454059512.png"></span> in the upper left corner and choose <strong id="vpc010006__en-us_topic_0013748738_b29211533144914"><span id="vpc010006__en-us_topic_0013748738_text47511547154412">Network</span><span id="vpc010006__en-us_topic_0013748738_text1275116474447"></span></strong> &gt; <strong id="vpc010006__en-us_topic_0013748738_b15921153318493">Elastic IP</strong>.</li><li id="vpc010006__li15362774171923">In the navigation pane on the left, choose <strong id="vpc010006__vpc010005_b17432191635012">Elastic IP and Bandwidth</strong> &gt; <strong id="vpc010006__vpc010005_b17537172011502">Shared Bandwidths</strong>.</li><li id="vpc010006__li18967172225311">In the shared bandwidth list, locate the row that contains the shared bandwidth that you want to add EIPs to. In the <strong id="vpc010006__b135334539392">Operation</strong> column, choose <strong id="vpc010006__b1550461914473">Add EIP</strong>, and select the EIPs to be added.<div class="note" id="vpc010006__note1660761317414"><img src="public_sys-resources/note_3.0-en-us.png"><span class="notetitle"> </span><div class="notebody"><ul id="vpc010006__ul8542059103117"><li id="vpc010006__li175429598315">After an <span id="vpc010006__text139695083118"></span><span id="vpc010006__text143961150163117">EIP</span> is added to a shared bandwidth, the dedicated bandwidth used by the EIP will become invalid and the EIP will start to use the shared bandwidth. The EIP's dedicated bandwidth will be deleted and will no longer be billed.</li></ul>
</div></div>
<div class="fignone" id="vpc010006__fig91601550174919"><span class="figcap"><b>Figure 1 </b>Add EIP</span><br><span><img id="vpc010006__image27015238308" src="en-us_image_0000001211006359.png"></span></div>
</li><li id="vpc010006__li12383113016251">Click <strong id="vpc010006__b13777947151818">OK</strong>.</li></ol>

View File

@ -3,7 +3,7 @@
<h1 class="topictitle1">Removing EIPs from a Shared Bandwidth</h1>
<div id="body1524196825057"><div class="section" id="vpc010007__section15598193716333"><h4 class="sectiontitle">Scenarios</h4><p id="vpc010007__p215711374172">Remove EIPs that are no longer required from a shared bandwidth if needed.</p>
</div>
<div class="section" id="vpc010007__section67201052194510"><h4 class="sectiontitle">Procedure</h4><ol id="vpc010007__ol547185563613"><li id="vpc010007__li1531483113269">Log in to the management console.</li></ol><ol start="2" id="vpc010007__ol1110143961116"><li id="vpc010007__li619618421322">Click <span><img id="vpc010007__en-us_topic_0013748726_image338921514480" src="en-us_image_0141273034.png"></span> in the upper left corner and select the desired region and project.</li><li id="vpc010007__li540658334">Click <span><img id="vpc010007__en-us_topic_0013748738_image8750174734412" src="en-us_image_0000001454059512.png"></span> in the upper left corner and choose <strong id="vpc010007__en-us_topic_0013748738_b29211533144914"><span id="vpc010007__en-us_topic_0013748738_text47511547154412">Network</span><span id="vpc010007__en-us_topic_0013748738_text1275116474447"></span></strong> &gt; <strong id="vpc010007__en-us_topic_0013748738_b15921153318493">Elastic IP</strong>.</li><li id="vpc010007__li15362774171923">In the navigation pane on the left, choose <strong id="vpc010007__vpc010005_b17432191635012">Elastic IP and Bandwidth</strong> &gt; <strong id="vpc010007__vpc010005_b17537172011502">Shared Bandwidths</strong>.</li><li id="vpc010007__li18967172225311">In the shared bandwidth list, locate the row that contains the bandwidth from which EIPs are to be removed, choose <strong id="vpc010007__b1720010151446">More</strong> &gt; <strong id="vpc010007__b19200101514416">Remove EIP</strong> in the <strong id="vpc010007__b1353112165920">Operation</strong> column, and select the EIPs to be removed in the displayed dialog box.<div class="fignone" id="vpc010007__fig97454605013"><span class="figcap"><b>Figure 1 </b>Remove EIP</span><br><span><img id="vpc010007__image3533164012334" src="en-us_image_0000001211445065.png"></span></div>
<div class="section" id="vpc010007__section67201052194510"><h4 class="sectiontitle">Procedure</h4><ol id="vpc010007__ol547185563613"><li id="vpc010007__li1531483113269">Log in to the management console.</li></ol><ol start="2" id="vpc010007__ol1110143961116"><li id="vpc010007__li619618421322">Click <span><img id="vpc010007__en-us_topic_0013748726_image338921514480" src="en-us_image_0141273034.png"></span> in the upper left corner and select the desired region and project.</li><li id="vpc010007__li540658334">Click <span><img id="vpc010007__en-us_topic_0013748738_image8750174734412" src="en-us_image_0000001454059512.png"></span> in the upper left corner and choose <strong id="vpc010007__en-us_topic_0013748738_b29211533144914"><span id="vpc010007__en-us_topic_0013748738_text47511547154412">Network</span><span id="vpc010007__en-us_topic_0013748738_text1275116474447"></span></strong> &gt; <strong id="vpc010007__en-us_topic_0013748738_b15921153318493">Elastic IP</strong>.</li><li id="vpc010007__li15362774171923">In the navigation pane on the left, choose <strong id="vpc010007__vpc010005_b17432191635012">Elastic IP and Bandwidth</strong> &gt; <strong id="vpc010007__vpc010005_b17537172011502">Shared Bandwidths</strong>.</li><li id="vpc010007__li18967172225311">In the shared bandwidth list, locate the row that contains the bandwidth from which EIPs are to be removed, choose <strong id="vpc010007__b863555154816">More</strong> &gt; <strong id="vpc010007__b13635195194814">Remove EIP</strong> in the <strong id="vpc010007__b1353112165920">Operation</strong> column, and select the EIPs to be removed in the displayed dialog box.<div class="fignone" id="vpc010007__fig97454605013"><span class="figcap"><b>Figure 1 </b>Remove EIP</span><br><span><img id="vpc010007__image3533164012334" src="en-us_image_0000001211445065.png"></span></div>
</li><li id="vpc010007__li1640820620266">Click <strong id="vpc010007__b9515165714219">OK</strong>.</li></ol>
</div>
</div>

View File

@ -6,7 +6,7 @@
</div>
<div class="section" id="vpc010013__section3557225151718"><h4 class="sectiontitle">Procedure (<strong id="vpc010013__b1928316693011">Elastic IP and Bandwidth</strong> Console)</h4><ol id="vpc010013__ol795432016266"><li id="vpc010013__li31172473263">Log in to the management console.</li><li id="vpc010013__li5499192952613">Click <span><img id="vpc010013__en-us_topic_0013748726_image338921514480" src="en-us_image_0141273034.png"></span> in the upper left corner and select the desired region and project.</li><li id="vpc010013__li209541820202614">Click <span><img id="vpc010013__en-us_topic_0013748738_image8750174734412" src="en-us_image_0000001572300492.png"></span> in the upper left corner and choose <strong id="vpc010013__b722894308"><span id="vpc010013__en-us_topic_0013748738_text47511547154412">Network</span><span id="vpc010013__en-us_topic_0013748738_text1275116474447"></span></strong> &gt; <strong id="vpc010013__b142220943015">Elastic IP</strong>.</li><li id="vpc010013__li9954320102616">On the <strong id="vpc010013__b10129350104012">EIPs</strong> page, search for the EIP, click <strong id="vpc010013__b12121456164013">More</strong> in the <strong id="vpc010013__b1945016184113">Operation</strong> column, and click <strong id="vpc010013__b115491116413">View Metric</strong> to view the monitoring metric details.</li><li id="vpc010013__li1954202012267">In the navigation pane on the left, choose <strong id="vpc010013__b168461614154111">Elastic IP and Bandwidth</strong> &gt; <strong id="vpc010013__b1384661444111">Shared Bandwidths</strong>.</li><li id="vpc010013__li7954102052611">On the <strong id="vpc010013__b11111335184120">Shared Bandwidths</strong> page, locate the shared bandwidth, click <strong id="vpc010013__b1266935744111">More</strong> in the <strong id="vpc010013__b196694575415">Operation</strong> column, and click <strong id="vpc010013__b1166965717418">View Metric</strong> to view the monitoring metric details.</li></ol>
</div>
<div class="section" id="vpc010013__section4462183911113"><h4 class="sectiontitle">Procedure (<strong id="vpc010013__b49631827194220">Cloud Eye</strong> Console)</h4><ol id="vpc010013__ol19895183712816"><li id="vpc010013__li668611144313">Log in to the management console.</li></ol><ol start="2" id="vpc010013__ol1691835981213"><li id="vpc010013__li840318282158">Click <span><img id="vpc010013__en-us_topic_0013748726_image338921514480_1" src="en-us_image_0141273034.png"></span> in the upper left corner and select the desired region and project.</li><li id="vpc010013__li2524174019523">In the upper left corner of the page, click <span><img id="vpc010013__image182331133171415" src="en-us_image_0000001675418673.png"></span> to open the service list and choose <strong id="vpc010013__b1195532420420">Management &amp; Deployment</strong> &gt; <strong id="vpc010013__b181501157236">Cloud Eye</strong>.</li><li id="vpc010013__li8839354101513">Click <strong id="vpc010013__b16924938104810">Cloud Service Monitoring</strong> on the left of the page, and choose <strong id="vpc010013__b5946135511148">Elastic IP and Bandwidth</strong>.</li><li id="vpc010013__li144940413176">Locate the row that contains the target bandwidth or EIP and click <strong id="vpc010013__b1796613458116">View Metric</strong> in the <strong id="vpc010013__b842352706125827">Operation</strong> column to check the bandwidth or EIP monitoring information.</li></ol>
<div class="section" id="vpc010013__section4462183911113"><h4 class="sectiontitle">Procedure (<strong id="vpc010013__b49631827194220">Cloud Eye</strong> Console)</h4><ol id="vpc010013__ol19895183712816"><li id="vpc010013__li668611144313">Log in to the management console.</li></ol><ol start="2" id="vpc010013__ol1691835981213"><li id="vpc010013__li840318282158">Click <span><img id="vpc010013__en-us_topic_0013748726_image338921514480_1" src="en-us_image_0141273034.png"></span> in the upper left corner and select the desired region and project.</li><li id="vpc010013__li2524174019523">In the upper left corner of the page, click <span><img id="vpc010013__image182331133171415" src="en-us_image_0000001675418673.png"></span> to open the service list and choose <strong id="vpc010013__b1195532420420">Management &amp; Deployment</strong> &gt; <strong id="vpc010013__b181501157236">Cloud Eye</strong>.</li><li id="vpc010013__li8839354101513">Click <strong id="vpc010013__b16924938104810">Cloud Service Monitoring</strong> on the left of the page, and choose <strong id="vpc010013__b29081605266">Elastic IP and Bandwidth</strong>.</li><li id="vpc010013__li144940413176">Locate the row that contains the target bandwidth or EIP and click <strong id="vpc010013__b1796613458116">View Metric</strong> in the <strong id="vpc010013__b842352706125827">Operation</strong> column to check the bandwidth or EIP monitoring information.</li></ol>
</div>
</div>
<div>

View File

@ -0,0 +1,83 @@
<a name="vpc_0002"></a><a name="vpc_0002"></a>
<h1 class="topictitle1">IPv4 and IPv6 Dual-Stack Network</h1>
<div id="body1538130477913"><div class="section" id="vpc_0002__section31519520369"><h4 class="sectiontitle">What Is an IPv4/IPv6 Dual-Stack Network?</h4><div class="p" id="vpc_0002__p727834220556">IPv4 and IPv6 dual-stack allows your resources, such as ECSs, to use both IPv4 and IPv6 addresses for private and public network communications. For example, if ECSs use the IPv4/IPv6 dual-stack network:<ul id="vpc_0002__ul20994144512206"><li id="vpc_0002__li99944459209">ECSs can communicate with each other using private IPv4 addresses.</li><li id="vpc_0002__li18994194511202">ECSs can communicate with the Internet after they are bound with EIPs.</li><li id="vpc_0002__li699474512019">ECSs can communicate with each other using IPv6 addresses.</li><li id="vpc_0002__li18994184516208">ECSs can communicate with the Internet after their IPv6 addresses are added to shared bandwidths.</li></ul>
<div class="note" id="vpc_0002__note1267194417322"><img src="public_sys-resources/note_3.0-en-us.png"><span class="notetitle"> </span><div class="notebody"><p id="vpc_0002__p17490315124913">If you select <strong id="vpc_0002__b2708722112015">Enable</strong> for <strong id="vpc_0002__b3708162202020">IPv6 CIDR Block</strong> when creating a subnet, an IPv6 CIDR block will be automatically assigned to the subnet.</p>
<p id="vpc_0002__p161271040209">Basic operations on IPv4 and IPv6 dual-stack networks are the same as those on IPv4 networks, except some parameters. Check the console pages for details.</p>
</div></div>
</div>
</div>
<div class="section" id="vpc_0002__section20733103220"><h4 class="sectiontitle">Notes and Constraints</h4><ul id="vpc_0002__ul15746358822"><li id="vpc_0002__li197162032588">Only certain ECS specifications support IPv6 networks and can use IPv4/IPv6 dual-stack networks. You need to select such ECSs in supported regions.<div class="p" id="vpc_0002__p16316203410810"><a name="vpc_0002__li197162032588"></a><a name="li197162032588"></a>To check which ECSs support IPv6:<ul id="vpc_0002__ul1450161051913"><li id="vpc_0002__li194354333225">On the ECS console, click <strong id="vpc_0002__b45364100586">Buy ECS</strong>. On the displayed page, view the ECS specifications.<p id="vpc_0002__p7924183416221">If there is the <strong id="vpc_0002__b1228805519382">IPv6</strong> parameter with the value of <strong id="vpc_0002__b132881655123817">Yes</strong>, the ECS specifications support IPv6.</p>
</li></ul>
</div>
</li></ul>
</div>
<div class="section" id="vpc_0002__section182413208373"><h4 class="sectiontitle">IPv6 Application Scenarios</h4><div class="p" id="vpc_0002__p26851119667">If your ECS supports IPv6, you can use the IPv4/IPv6 dual-stack network. <a href="#vpc_0002__table20563744105916">Table 1</a> shows the example application scenarios.
<div class="tablenoborder"><a name="vpc_0002__table20563744105916"></a><a name="table20563744105916"></a><table cellpadding="4" cellspacing="0" summary="" id="vpc_0002__table20563744105916" frame="border" border="1" rules="all"><caption><b>Table 1 </b>Application scenarios of IPv4/IPv6 dual stack</caption><thead align="left"><tr id="vpc_0002__row10563044205914"><th align="left" class="cellrowborder" valign="top" width="12.198780121987799%" id="mcps1.3.3.2.2.2.5.1.1"><p id="vpc_0002__p1756315441597">Application Scenario</p>
</th>
<th align="left" class="cellrowborder" valign="top" width="38.54614538546144%" id="mcps1.3.3.2.2.2.5.1.2"><p id="vpc_0002__p1456364475911">Description</p>
</th>
<th align="left" class="cellrowborder" valign="top" width="14.47855214478552%" id="mcps1.3.3.2.2.2.5.1.3"><p id="vpc_0002__p856374416599">Subnet</p>
</th>
<th align="left" class="cellrowborder" valign="top" width="34.776522347765216%" id="mcps1.3.3.2.2.2.5.1.4"><p id="vpc_0002__p71425413219">ECS</p>
</th>
</tr>
</thead>
<tbody><tr id="vpc_0002__row15631044115911"><td class="cellrowborder" valign="top" width="12.198780121987799%" headers="mcps1.3.3.2.2.2.5.1.1 "><p id="vpc_0002__p1756334419595">Private communication using IPv6 addresses</p>
</td>
<td class="cellrowborder" valign="top" width="38.54614538546144%" headers="mcps1.3.3.2.2.2.5.1.2 "><p id="vpc_0002__p956314455918">Your applications deployed on ECSs need to communicate with other systems (such as databases) through private networks using IPv6 addresses.</p>
</td>
<td class="cellrowborder" valign="top" width="14.47855214478552%" headers="mcps1.3.3.2.2.2.5.1.3 "><ul id="vpc_0002__ul18873230631"><li id="vpc_0002__li168731630236">IPv4 CIDR block</li><li id="vpc_0002__li1387314307316">IPv6 CIDR block</li></ul>
</td>
<td class="cellrowborder" valign="top" width="34.776522347765216%" headers="mcps1.3.3.2.2.2.5.1.4 "><ul id="vpc_0002__ul166835410310"><li id="vpc_0002__li12684174118315">Private IPv4 address: used for private communication</li><li id="vpc_0002__li196846415314">IPv6 address: used for private communication.</li></ul>
</td>
</tr>
<tr id="vpc_0002__row1956304410594"><td class="cellrowborder" rowspan="2" valign="top" width="12.198780121987799%" headers="mcps1.3.3.2.2.2.5.1.1 "><p id="vpc_0002__p55632448596">Public communication using IPv6 addresses</p>
</td>
<td class="cellrowborder" valign="top" width="38.54614538546144%" headers="mcps1.3.3.2.2.2.5.1.2 "><p id="vpc_0002__p1856324445919">Your applications deployed on ECSs need to provide services accessible from the Internet using IPv6 addresses.</p>
</td>
<td class="cellrowborder" rowspan="2" valign="top" width="14.47855214478552%" headers="mcps1.3.3.2.2.2.5.1.3 "><ul id="vpc_0002__ul173501936738"><li id="vpc_0002__li1535033614317">IPv4 CIDR block</li><li id="vpc_0002__li23509361932">IPv6 CIDR block</li></ul>
</td>
<td class="cellrowborder" rowspan="2" valign="top" width="34.776522347765216%" headers="mcps1.3.3.2.2.2.5.1.4 "><ul id="vpc_0002__ul16386838842"><li id="vpc_0002__li103861938642">Private IPv4 address + IPv4 EIP: used for public network communication</li><li id="vpc_0002__li193198141654">IPv6 address + shared bandwidth: used for public network communication</li></ul>
</td>
</tr>
<tr id="vpc_0002__row18563174414591"><td class="cellrowborder" valign="top" headers="mcps1.3.3.2.2.2.5.1.1 "><p id="vpc_0002__p17563644145912">Your applications deployed on ECSs need to both provide services accessible from the Internet and analyze the access request data using IPv6 addresses.</p>
</td>
</tr>
</tbody>
</table>
</div>
</div>
<p id="vpc_0002__p6666112821016"></p>
</div>
<div class="section" id="vpc_0002__section194330165219"><h4 class="sectiontitle">Basic Operations</h4><p id="vpc_0002__p1314632195216"><strong id="vpc_0002__b18279656132910">Creating an IPv6 Subnet</strong></p>
<p id="vpc_0002__p0142184411538">Create an IPv6 subnet by following the instructions in <a href="en-us_topic_0013748726.html">Creating a Subnet for the VPC</a>. Select <strong id="vpc_0002__b842352706153813">Enable</strong> for <strong id="vpc_0002__b842352706153825">IPv6 CIDR Block</strong>. An IPv6 CIDR block will be automatically assigned to the subnet. IPv6 cannot be disabled after the subnet is created. Currently, customizing IPv6 CIDR block is not supported.</p>
<p id="vpc_0002__p1293420363217"><strong id="vpc_0002__b842352706155531">Viewing In-Use IPv6 Addresses</strong></p>
<p id="vpc_0002__p9614134220014">In the subnet list, click the subnet name. On the displayed page, view in-use IPv4 and IPv6 addresses on the <strong id="vpc_0002__b1740132102614">IP Addresses</strong> tab.</p>
<p id="vpc_0002__p5835144405312"><strong id="vpc_0002__b84235270617359">Adding a Security Group Rule (IPv6)</strong></p>
<p id="vpc_0002__p114834092411">Add a security group rule with <strong id="vpc_0002__b842352706172018">Type</strong> set to <strong id="vpc_0002__b842352706172023">IPv6</strong> and <strong id="vpc_0002__b842352706172151">Source</strong> or <strong id="vpc_0002__b842352706172157">Destination</strong> set to an IPv6 address or IPv6 CIDR block.</p>
<p id="vpc_0002__p764018434557"><strong id="vpc_0002__b842352706172351">Adding a Network ACL Rule (IPv6)</strong></p>
<p id="vpc_0002__p1143011413412">Add a network ACL rule with <strong id="vpc_0002__b442966534">Type</strong> set to <strong id="vpc_0002__b1135619805">IPv6</strong> and <strong id="vpc_0002__b1733186881">Source</strong> or <strong id="vpc_0002__b1724152929">Destination</strong> set to an IPv6 address or IPv6 CIDR block.</p>
<p id="vpc_0002__p19430173719565"><strong id="vpc_0002__b842352706174137">Adding a Route (IPv6)</strong></p>
<p id="vpc_0002__p11501735125016">Add a route with <strong id="vpc_0002__b1085625481810">Destination</strong> and <strong id="vpc_0002__b886245451815">Next Hop</strong> set to an IPv4 or IPv6 CIDR block. For details about how to add a route, see <a href="vpc_route01_0006.html">Adding a Custom Route</a>. If the destination is an IPv6 CIDR block, the next hop can only be an IP address in the same VPC as the IPv6 CIDR block.</p>
<div class="note" id="vpc_0002__note42931297538"><img src="public_sys-resources/note_3.0-en-us.png"><span class="notetitle"> </span><div class="notebody"><p id="vpc_0002__p929319185319">If the destination is an IPv6 CIDR block, the next hop type can only be an ECS, extension NIC, or virtual IP address. The next hop must also have IPv6 addresses.</p>
</div></div>
<p id="vpc_0002__p134585432552"><strong id="vpc_0002__b198931405614">Assigning an IPv6 Virtual IP Address</strong></p>
<p id="vpc_0002__p12556729125614">Assign a virtual IPv4 or IPv6 address by referring to <a href="vpc_vip_0002.html">Assigning a Virtual IP Address</a>.</p>
<div class="note" id="vpc_0002__note1486314419416"><img src="public_sys-resources/note_3.0-en-us.png"><span class="notetitle"> </span><div class="notebody"><p id="vpc_0002__p1536116201145">Each virtual IPv6 address can only be bound to one dual-stack NIC.</p>
</div></div>
<p id="vpc_0002__p2099153243714"><strong id="vpc_0002__b9958115211495">Dynamically Assigning IPv6 Addresses</strong></p>
<p id="vpc_0002__p17894160193713">After an ECS is created successfully, you can view the assigned IPv6 address on the ECS details page. You can also log in to the ECS and run the <strong id="vpc_0002__b37891312261">ifconfig</strong> command to view the assigned IPv6 address.</p>
<p id="vpc_0002__p14978155912376">If an IPv6 address fails to be automatically assigned or the selected image does not support the function of automatic IPv6 address assignment, manually obtain the IPv6 address by referring to "Dynamically Assigning IPv6 Addresses" in <em id="vpc_0002__i179389853316">Elastic Cloud Server User Guide</em>.</p>
<div class="note" id="vpc_0002__note2408202718161"><img src="public_sys-resources/note_3.0-en-us.png"><span class="notetitle"> </span><div class="notebody"><p id="vpc_0002__p18408142712165">If an ECS is created from a public image:</p>
<p id="vpc_0002__p1123152523818">Before enabling dynamic IPv6 address assignment for a Linux public image, check whether IPv6 is supported and then check whether dynamic IPv6 address assignment has been enabled. Currently, all Linux public images support IPv6, and dynamic IPv6 address assignment is enabled for Ubuntu 16 by default. You do not need to configure dynamic IPv6 address assignment for the Ubuntu 16 OS. For other Linux public images, you need to enable this function.</p>
</div></div>
</div>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="en-us_topic_0030969460.html">VPC and Subnet</a></div>
</div>
</div>

View File

@ -1,7 +1,7 @@
<a name="vpc_Concepts_0005"></a><a name="vpc_Concepts_0005"></a>
<h1 class="topictitle1">Security Group</h1>
<div id="body8662426"><p id="vpc_Concepts_0005__p554165143114">A security group is a collection of access control rules for cloud resources, such as cloud servers, containers, and databases, that have the same security protection requirements and that are mutually trusted. After a security group is created, you can create various access rules for the security group, these rules will apply to all cloud resources added to this security group.</p>
<div id="body8662426"><p id="vpc_Concepts_0005__p554165143114">A security group is a collection of access control rules for cloud resources, such as cloud servers, containers, and databases, that have the same security protection requirements and that are mutually trusted. After a security group is created, you can create various access rules for the security group and these rules will apply to all cloud resources added to this security group.</p>
<div class="p" id="vpc_Concepts_0005__p235918127418">Like whitelists, security group rules work as follows:<ul id="vpc_Concepts_0005__en-us_topic_0073379079_ul17321794815"><li id="vpc_Concepts_0005__en-us_topic_0073379079_li21951340102811">Inbound rules control incoming traffic to instances in the security group.<p id="vpc_Concepts_0005__en-us_topic_0073379079_p8845145232816"><a name="vpc_Concepts_0005__en-us_topic_0073379079_li21951340102811"></a><a name="en-us_topic_0073379079_li21951340102811"></a>If an inbound request matches the source in an inbound security group rule, the request is allowed and other requests are denied.</p>
<p id="vpc_Concepts_0005__en-us_topic_0073379079_p3381768598">By default, you do not need to configure deny rules in the inbound direction because requests that do not match allow rules will be denied.</p>
</li><li id="vpc_Concepts_0005__en-us_topic_0073379079_li3132125172918">Outbound rules control outgoing traffic from instances in the security group.<p id="vpc_Concepts_0005__en-us_topic_0073379079_p12465163742911"><a name="vpc_Concepts_0005__en-us_topic_0073379079_li3132125172918"></a><a name="en-us_topic_0073379079_li3132125172918"></a>If the destination of an outbound security group rule is 0.0.0.0/0, all outbound requests are allowed.</p>

View File

@ -1,7 +1,7 @@
<a name="vpc_Concepts_0011"></a><a name="vpc_Concepts_0011"></a>
<h1 class="topictitle1">VPC Peering Connection</h1>
<div id="body8662426"><div class="p" id="vpc_Concepts_0011__p1740224574516">A VPC peering connection is a networking connection between two VPCs and enables them to communicate using private IP addresses. The VPCs to be peered can be in the same account or different accounts, but must be in the same region.<ul id="vpc_Concepts_0011__en-us_topic_0046655036_ul15713812713"><li id="vpc_Concepts_0011__en-us_topic_0046655036_li3550310112410">You can use VPC peering connections to build networks in different scenarios. For details, see <a href="en-us_topic_0046809840.html">VPC Peering Connection Usage Examples</a>.</li></ul>
<div id="body8662426"><div class="p" id="vpc_Concepts_0011__p1740224574516">A VPC peering connection is a networking connection that connects two VPCs for them to communicate using private IP addresses. The VPCs to be peered can be in the same account or different accounts, but must be in the same region.<ul id="vpc_Concepts_0011__en-us_topic_0046655036_ul15713812713"><li id="vpc_Concepts_0011__en-us_topic_0046655036_li3550310112410">You can use VPC peering connections to build networks in different scenarios. For details, see <a href="en-us_topic_0046809840.html">VPC Peering Connection Usage Examples</a>.</li></ul>
</div>
<div class="p" id="vpc_Concepts_0011__en-us_topic_0045181581_p545088271643"><a href="#vpc_Concepts_0011__en-us_topic_0046655036_fig4721642193711">Figure 1</a> shows an application scenario of VPC peering connections.<ul id="vpc_Concepts_0011__en-us_topic_0046655036_ul1824941916549"><li id="vpc_Concepts_0011__en-us_topic_0046655036_li1882572210543">There are two VPCs (VPC-A and VPC-B) in region A that are not connected.</li><li id="vpc_Concepts_0011__en-us_topic_0046655036_li1763553818548">Service servers (ECS-A01 and ECS-A02) are in VPC-A, and database servers (RDS-B01 and RDS-B02) are in VPC-B. The service servers and database servers cannot communicate with each other.</li></ul>
<ul id="vpc_Concepts_0011__en-us_topic_0046655036_ul16678181275512"><li id="vpc_Concepts_0011__en-us_topic_0046655036_li86781412125511">You need to create a VPC peering connection (peering-AB) between VPC-A and VPC-B so the service servers and database servers can communicate with each other.</li></ul>

View File

@ -22,6 +22,8 @@
</li>
<li class="ulchildlink"><strong><a href="SecurityGroup_0004.html">Fast-Adding Security Group Rules</a></strong><br>
</li>
<li class="ulchildlink"><strong><a href="SecurityGroup_0005.html">Allowing Common Ports with A Few Clicks</a></strong><br>
</li>
<li class="ulchildlink"><strong><a href="vpc_SecurityGroup_0005.html">Modifying a Security Group Rule</a></strong><br>
</li>
<li class="ulchildlink"><strong><a href="vpc_SecurityGroup_0004.html">Replicating a Security Group Rule</a></strong><br>

View File

@ -39,10 +39,18 @@
<td class="cellrowborder" valign="top" headers="mcps1.3.3.2.6.1.2.2.2.2.4.1.2 "><p id="vpc_SecurityGroup_0007__p1551023251511">22, or 22-30</p>
</td>
</tr>
<tr id="vpc_SecurityGroup_0007__row1726912412166"><td class="cellrowborder" valign="top" width="12.7%" headers="mcps1.3.3.2.6.1.2.2.2.2.4.1.1 "><p id="vpc_SecurityGroup_0007__p1826920421620">Type</p>
</td>
<td class="cellrowborder" valign="top" width="69.3%" headers="mcps1.3.3.2.6.1.2.2.2.2.4.1.2 "><div class="p" id="vpc_SecurityGroup_0007__p1426910441613">Source IP address version. You can select:<ul id="vpc_SecurityGroup_0007__en-us_topic_0030969470_ul15119151171711"><li id="vpc_SecurityGroup_0007__en-us_topic_0030969470_li1211911171719">IPv4</li><li id="vpc_SecurityGroup_0007__en-us_topic_0030969470_li4415118173">IPv6</li></ul>
</div>
</td>
<td class="cellrowborder" valign="top" width="18%" headers="mcps1.3.3.2.6.1.2.2.2.2.4.1.3 "><p id="vpc_SecurityGroup_0007__p848952751718">IPv4</p>
</td>
</tr>
<tr id="vpc_SecurityGroup_0007__row511615528561"><td class="cellrowborder" valign="top" width="12.7%" headers="mcps1.3.3.2.6.1.2.2.2.2.4.1.1 "><p id="vpc_SecurityGroup_0007__p86899991813">Source</p>
</td>
<td class="cellrowborder" valign="top" width="69.3%" headers="mcps1.3.3.2.6.1.2.2.2.2.4.1.2 "><div class="p" id="vpc_SecurityGroup_0007__p18116175212564">Source of the security group rule. The value can be an IP address or a security group to allow access from IP addresses or instances in the security group. For example: <ul id="vpc_SecurityGroup_0007__en-us_topic_0030969470_ul12116352195619"><li id="vpc_SecurityGroup_0007__en-us_topic_0030969470_li0541721414">IP address:<ul id="vpc_SecurityGroup_0007__en-us_topic_0030969470_ul554172946"><li id="vpc_SecurityGroup_0007__en-us_topic_0030969470_li19301951584">Single IP address: 192.168.10.10/32</li><li id="vpc_SecurityGroup_0007__en-us_topic_0030969470_li530357816">All IP addresses: 0.0.0.0/0</li><li id="vpc_SecurityGroup_0007__en-us_topic_0030969470_li330351881">IP address range: 192.168.1.0/24</li></ul>
</li><li id="vpc_SecurityGroup_0007__en-us_topic_0030969470_li164031044185514">Security group: sg-A</li></ul>
<td class="cellrowborder" valign="top" width="69.3%" headers="mcps1.3.3.2.6.1.2.2.2.2.4.1.2 "><div class="p" id="vpc_SecurityGroup_0007__p18116175212564">Source of the security group rule. The value can be an IP address, a security group, or an IP address group to allow access from IP addresses or instances in the security group. For example: <ul id="vpc_SecurityGroup_0007__en-us_topic_0030969470_ul12116352195619"><li id="vpc_SecurityGroup_0007__en-us_topic_0030969470_li0541721414">IP address:<ul id="vpc_SecurityGroup_0007__en-us_topic_0030969470_ul554172946"><li id="vpc_SecurityGroup_0007__en-us_topic_0030969470_li19301951584">Single IP address: 192.168.10.10/32</li><li id="vpc_SecurityGroup_0007__en-us_topic_0030969470_li530357816">All IP addresses: 0.0.0.0/0</li><li id="vpc_SecurityGroup_0007__en-us_topic_0030969470_li330351881">IP address range: 192.168.1.0/24</li></ul>
</li><li id="vpc_SecurityGroup_0007__en-us_topic_0030969470_li1593411297324"><strong id="vpc_SecurityGroup_0007__en-us_topic_0030969470_b15854880338">Security group</strong>: The source is from another security group. You can select a security group in the same region under the current account from the drop-down list. Instance A is in security group A and instance B is in security group B. If security group A has an inbound rule with <strong id="vpc_SecurityGroup_0007__en-us_topic_0030969470_b1027312851412">Action</strong> set to <strong id="vpc_SecurityGroup_0007__en-us_topic_0030969470_b1647094018148">Allow</strong> and <strong id="vpc_SecurityGroup_0007__en-us_topic_0030969470_b358611517159">Source</strong> set to security group B, access from instance B is allowed to instance A.</li><li id="vpc_SecurityGroup_0007__en-us_topic_0030969470_li16893123362913"><strong id="vpc_SecurityGroup_0007__en-us_topic_0030969470_b346841917012">IP address group</strong>: An IP address group is a collection of one or more IP addresses. You can select an available IP address group from the drop-down list. An IP address group can help you manage IP address ranges and IP addresses with same security requirements in a more simple way.</li></ul>
</div>
</td>
<td class="cellrowborder" valign="top" width="18%" headers="mcps1.3.3.2.6.1.2.2.2.2.4.1.3 "><p id="vpc_SecurityGroup_0007__p611613524569">sg-test[96a8a93f-XXX-d7872990c314]</p>

View File

@ -3,9 +3,7 @@
<h1 class="topictitle1">Cloning a Security Group</h1>
<div id="body1545449998372"><div class="section" id="vpc_SecurityGroup_0009__s3e580453202e40bf842d4254f7841130"><h4 class="sectiontitle">Scenarios</h4><p id="vpc_SecurityGroup_0009__aa24c510ff173460094a3c5ea08bf801f">You can clone a security group from one region to another to quickly apply the security group rules to ECSs in another region.</p>
<p id="vpc_SecurityGroup_0009__p205321332155320">You can clone a security group in the following scenarios:</p>
<ul id="vpc_SecurityGroup_0009__ul334510162346"><li id="vpc_SecurityGroup_0009__li176906161358">For example, you have security group <strong id="vpc_SecurityGroup_0009__b45931091027">sg-A</strong> in region A. If ECSs in region B require the same security group rules as those configured for security group <strong id="vpc_SecurityGroup_0009__b55941891529">sg-A</strong>, you can clone security group <strong id="vpc_SecurityGroup_0009__b3594899211">sg-A</strong> to region B, freeing you from creating a new security group in region B.</li><li id="vpc_SecurityGroup_0009__li93451816183411">If you need new security group rules, you can clone the original security group as a backup.</li><li id="vpc_SecurityGroup_0009__li1070343417166">Before you modify security group rules used by a service, you can clone the security group and modify the security group rules in the test environment to ensure that the modified rules work.<div class="note" id="vpc_SecurityGroup_0009__note186367516715"><img src="public_sys-resources/note_3.0-en-us.png"><span class="notetitle"> </span><div class="notebody"><p id="vpc_SecurityGroup_0009__p15637451475">Security group cloning is not supported now.</p>
</div></div>
</li></ul>
<ul id="vpc_SecurityGroup_0009__ul334510162346"><li id="vpc_SecurityGroup_0009__li176906161358">For example, you have security group <strong id="vpc_SecurityGroup_0009__b45931091027">sg-A</strong> in region A. If ECSs in region B require the same security group rules as those configured for security group <strong id="vpc_SecurityGroup_0009__b55941891529">sg-A</strong>, you can clone security group <strong id="vpc_SecurityGroup_0009__b3594899211">sg-A</strong> to region B, freeing you from creating a new security group in region B.</li><li id="vpc_SecurityGroup_0009__li93451816183411">If you need new security group rules, you can clone the original security group as a backup.</li><li id="vpc_SecurityGroup_0009__li1070343417166">Before you modify security group rules used by a service, you can clone the security group and modify the security group rules in the test environment to ensure that the modified rules work.</li></ul>
</div>
<div class="section" id="vpc_SecurityGroup_0009__section728573417911"><h4 class="sectiontitle">Notes and Constraints</h4><ul id="vpc_SecurityGroup_0009__ul28411535124812"><li id="vpc_SecurityGroup_0009__li46713018010">You can clone a security group from the same or a different region.<ul id="vpc_SecurityGroup_0009__ul1626019121214"><li id="vpc_SecurityGroup_0009__li33901567018">If you want to clone a security group from the same region, you can clone all rules in the security group.</li><li id="vpc_SecurityGroup_0009__li156166210598">If you want to clone a security group from a different region, the system will clone only rules whose source and destination are IP addresses and rules whose source and destination is the current security group.</li></ul>
</li><li id="vpc_SecurityGroup_0009__li39713151903">Cloning a security group clones its security group rules, but not the instances associated with the security group.</li></ul>

View File

@ -14,7 +14,7 @@
</li>
<li class="ulchildlink"><strong><a href="en-us_topic_0051746700.html">Associating Subnets with a Firewall</a></strong><br>
</li>
<li class="ulchildlink"><strong><a href="vpc_acl_0003.html">Disassociating a Subnet from a Firewall</a></strong><br>
<li class="ulchildlink"><strong><a href="vpc_acl_0003.html">Disassociating Subnets from a Firewall</a></strong><br>
</li>
<li class="ulchildlink"><strong><a href="vpc_acl_0004.html">Changing the Sequence of a Firewall Rule</a></strong><br>
</li>

View File

@ -1,12 +1,12 @@
<a name="vpc_acl_0003"></a><a name="vpc_acl_0003"></a>
<h1 class="topictitle1">Disassociating a Subnet from a <span id="text17707413666">Firewall</span><span id="text13707141316611"></span></h1>
<div id="body1489141469988"><div class="section" id="vpc_acl_0003__section66699152161428"><h4 class="sectiontitle">Scenarios</h4><p id="vpc_acl_0003__p30804817161432">Disassociate a subnet from a <span id="vpc_acl_0003__text11248715171311">firewall</span><span id="vpc_acl_0003__text45551720134"></span> when necessary.</p>
<h1 class="topictitle1">Disassociating Subnets from a <span id="text13701622155720">Firewall</span><span id="text270182218572"></span></h1>
<div id="body1489141469988"><div class="section" id="vpc_acl_0003__section66699152161428"><h4 class="sectiontitle">Scenarios</h4><p id="vpc_acl_0003__p30804817161432">You can disassociate a subnet from its <span id="vpc_acl_0003__text11248715171311">firewall</span><span id="vpc_acl_0003__text45551720134"></span> based on your network requirements.</p>
</div>
<div class="section" id="vpc_acl_0003__section25103352161542"><h4 class="sectiontitle">Procedure</h4><ol id="vpc_acl_0003__ol1599100493"><li id="vpc_acl_0003__li16608161233812">Log in to the management console.</li></ol><ol start="2" id="vpc_acl_0003__ol35690385161557"><li id="vpc_acl_0003__li840318282158">Click <span><img id="vpc_acl_0003__en-us_topic_0013748726_image338921514480" src="en-us_image_0141273034.png"></span> in the upper left corner and select the desired region and project.</li><li id="vpc_acl_0003__li65321958215">Click <span><img id="vpc_acl_0003__en-us_topic_0013748738_image8750174734412" src="en-us_image_0000001675413845.png"></span> in the upper left corner and choose <strong id="vpc_acl_0003__b6641448143413"><span id="vpc_acl_0003__text964034863415">Network</span><span id="vpc_acl_0003__text116404481340"></span></strong> &gt; <strong id="vpc_acl_0003__b146411448103411">Virtual Private Cloud</strong>.<p id="vpc_acl_0003__p1182103318256">The <strong id="vpc_acl_0003__b15677154153415">Virtual Private Cloud</strong> page is displayed.</p>
</li><li id="vpc_acl_0003__li6322925220523">In the navigation pane on the left, choose <strong id="vpc_acl_0003__b10807630162">Access Control</strong> &gt; <strong id="vpc_acl_0003__b48097301565"><span id="vpc_acl_0003__text16135849063">Firewall</span><span id="vpc_acl_0003__text11415131412287"></span>s</strong>.</li><li id="vpc_acl_0003__li30045754154757">Locate the target <span id="vpc_acl_0003__text1331923012227">firewall</span><span id="vpc_acl_0003__text1031933013227"></span> and click its name to switch to the page showing details of that particular <span id="vpc_acl_0003__text01888617297">firewall</span><span id="vpc_acl_0003__text5189186142911"></span>.</li><li id="vpc_acl_0003__li515334316858">On the displayed page, click the <strong id="vpc_acl_0003__b842352706195851">Associated Subnets</strong> tab.</li><li id="vpc_acl_0003__li1976338154757">On the <strong id="vpc_acl_0003__b842352706232749">Associated Subnets</strong> page, locate the row that contains the target subnet and click <strong id="vpc_acl_0003__b842352706232835">Disassociate</strong> in the <strong id="vpc_acl_0003__b842352706232854">Operation</strong> column.</li><li id="vpc_acl_0003__li43817633145820">Click <strong id="vpc_acl_0003__b15462151914524">Yes</strong> in the displayed dialog box.</li></ol>
<p id="vpc_acl_0003__p13242193814303"><strong id="vpc_acl_0003__b398123001213">Disassociating subnets from a <span id="vpc_acl_0003__text104389509615">firewall</span><span id="vpc_acl_0003__text124387509615"></span></strong></p>
<p id="vpc_acl_0003__p20411114216304">Select multiple subnets and click <strong id="vpc_acl_0003__b1454741410131">Disassociate</strong> above the subnet list to disassociate the subnets from a <span id="vpc_acl_0003__text196896018711">firewall</span><span id="vpc_acl_0003__text17689209716"></span> at a time.</p>
<p id="vpc_acl_0003__p20411114216304">Select multiple subnets and click <strong id="vpc_acl_0003__b1454741410131">Disassociate</strong> above the subnet list to disassociate the subnets from the <span id="vpc_acl_0003__text196896018711">firewall</span><span id="vpc_acl_0003__text17689209716"></span> at a time.</p>
</div>
</div>
<div>

View File

@ -40,7 +40,7 @@
</td>
<td class="cellrowborder" valign="top" width="57.769999999999996%" headers="mcps1.3.2.3.5.7.2.4.1.2 "><p id="vpc_acl_0005__en-us_topic_0051746702_p4779142112416">The source from which the traffic is allowed. The source can be an IP address or IP address range.</p>
<ul id="vpc_acl_0005__en-us_topic_0051746702_ul2087319185119"><li id="vpc_acl_0005__en-us_topic_0051746702_en-us_topic_0030969470_li0541721414">IP address:<ul id="vpc_acl_0005__en-us_topic_0051746702_en-us_topic_0030969470_ul554172946"><li id="vpc_acl_0005__en-us_topic_0051746702_en-us_topic_0030969470_li19301951584">Single IP address: 192.168.10.10/32</li><li id="vpc_acl_0005__en-us_topic_0051746702_en-us_topic_0030969470_li530357816">All IP addresses: 0.0.0.0/0</li><li id="vpc_acl_0005__en-us_topic_0051746702_en-us_topic_0030969470_li330351881">IP address range: 192.168.1.0/24</li></ul>
</li><li id="vpc_acl_0005__en-us_topic_0051746702_en-us_topic_0030969470_li164031044185514">Security group: sg-A</li></ul>
</li><li id="vpc_acl_0005__en-us_topic_0051746702_en-us_topic_0030969470_li16893123362913">IP address group: The source is an IP address group. An IP address group is a collection of one or more IP addresses. You can select an available IP address group from the drop-down list. An IP address group can help you manage IP address ranges and IP addresses with same security requirements in a more simple way.</li></ul>
</td>
<td class="cellrowborder" valign="top" width="22.34%" headers="mcps1.3.2.3.5.7.2.4.1.3 "><p id="vpc_acl_0005__en-us_topic_0051746702_p12466164823419">0.0.0.0/0</p>
</td>
@ -56,8 +56,8 @@
<tr id="vpc_acl_0005__en-us_topic_0051746702_row346764883414"><td class="cellrowborder" valign="top" width="19.89%" headers="mcps1.3.2.3.5.7.2.4.1.1 "><p id="vpc_acl_0005__en-us_topic_0051746702_p046719484349">Destination</p>
</td>
<td class="cellrowborder" valign="top" width="57.769999999999996%" headers="mcps1.3.2.3.5.7.2.4.1.2 "><p id="vpc_acl_0005__en-us_topic_0051746702_p1686812495242">The destination to which the traffic is allowed. The destination can be an IP address or IP address range.</p>
<ul id="vpc_acl_0005__en-us_topic_0051746702_ul158681649202410"><li id="vpc_acl_0005__en-us_topic_0051746702_en-us_topic_0030969470_li0541721414_1">IP address:<ul id="vpc_acl_0005__en-us_topic_0051746702_en-us_topic_0030969470_ul554172946_1"><li id="vpc_acl_0005__en-us_topic_0051746702_en-us_topic_0030969470_li19301951584_1">Single IP address: 192.168.10.10/32</li><li id="vpc_acl_0005__en-us_topic_0051746702_en-us_topic_0030969470_li530357816_1">All IP addresses: 0.0.0.0/0</li><li id="vpc_acl_0005__en-us_topic_0051746702_en-us_topic_0030969470_li330351881_1">IP address range: 192.168.1.0/24</li></ul>
</li><li id="vpc_acl_0005__en-us_topic_0051746702_en-us_topic_0030969470_li164031044185514_1">Security group: sg-A</li></ul>
<ul id="vpc_acl_0005__en-us_topic_0051746702_ul158681649202410"><li id="vpc_acl_0005__en-us_topic_0051746702_li1384412054013">IP address:<ul id="vpc_acl_0005__en-us_topic_0051746702_ul1884492024010"><li id="vpc_acl_0005__en-us_topic_0051746702_li7844152010405">Single IP address: 192.168.10.10/32</li><li id="vpc_acl_0005__en-us_topic_0051746702_li684412014402">All IP addresses: 0.0.0.0/0</li><li id="vpc_acl_0005__en-us_topic_0051746702_li5844220124012">IP address range: 192.168.1.0/24</li></ul>
</li><li id="vpc_acl_0005__en-us_topic_0051746702_li1285816203407">IP address group: The source is an IP address group. An IP address group is a collection of one or more IP addresses. You can select an available IP address group from the drop-down list. An IP address group can help you manage IP address ranges and IP addresses with same security requirements in a more simple way.</li></ul>
</td>
<td class="cellrowborder" valign="top" width="22.34%" headers="mcps1.3.2.3.5.7.2.4.1.3 "><p id="vpc_acl_0005__en-us_topic_0051746702_p104679481342">0.0.0.0/0</p>
</td>

View File

@ -5,7 +5,7 @@
</div>
<div class="section" id="vpc_faq_0059__section2676663510242"><h4 class="sectiontitle">Security Group Configuration</h4><p id="vpc_faq_0059__p369655541038">You can configure port 69 and configure data channel ports used by TFTP for the security group. In RFC1350, the TFTP protocol specifies that ports available to data channels range from 0 to 65535. However, not all these ports are used by the TFTP daemon processes of different applications. You can configure a smaller range of ports for the TFTP daemon.</p>
<p id="vpc_faq_0059__p642545331038">The following figure provides an example of the security group rule configuration if the ports used by data channels range from 60001 to 60100.</p>
<div class="fignone" id="vpc_faq_0059__fig16813131110520"><span class="figcap"><b>Figure 1 </b>Security group rules</span><br><span><img id="vpc_faq_0059__image7597217337" src="en-us_image_0129473334.png"></span></div>
<div class="fignone" id="vpc_faq_0059__fig4845318468"><span class="figcap"><b>Figure 1 </b>Security group rules</span><br><span><img id="vpc_faq_0059__image138450181762" src="en-us_image_0000001796404809.png"></span></div>
</div>
</div>
<div>

View File

@ -130,6 +130,13 @@
<td class="cellrowborder" valign="top" width="57.49217056131053%" headers="mcps1.3.3.3.2.4.1.3 "><p id="vpc_faq_0075__p6203182113610">On the Direct Connect console, locate the virtual gateway and delete it.</p>
</td>
</tr>
<tr id="vpc_faq_0075__row198221117777"><td class="cellrowborder" valign="top" width="16.47795711876656%" headers="mcps1.3.3.3.2.4.1.1 "><p id="vpc_faq_0075__p16822121719713">Delete the VPN gateway that is using the VPC and then delete the VPC.</p>
</td>
<td class="cellrowborder" valign="top" width="26.02987231992291%" headers="mcps1.3.3.3.2.4.1.2 "><p id="vpc_faq_0075__p38234176717">The VPC is being used by a VPN gateway.</p>
</td>
<td class="cellrowborder" valign="top" width="57.49217056131053%" headers="mcps1.3.3.3.2.4.1.3 "><p id="vpc_faq_0075__p2940539482">On the VPN console, locate the VPN gateway and delete it.</p>
</td>
</tr>
<tr id="vpc_faq_0075__row51514712496"><td class="cellrowborder" valign="top" width="16.47795711876656%" headers="mcps1.3.3.3.2.4.1.1 "><p id="vpc_faq_0075__p516871495">Delete all custom security groups in this region and then delete this last VPC.</p>
</td>
<td class="cellrowborder" valign="top" width="26.02987231992291%" headers="mcps1.3.3.3.2.4.1.2 "><p id="vpc_faq_0075__p111687184917">In the current region, this is the last VPC and there are custom security groups.</p>

View File

@ -2,13 +2,45 @@
<h1 class="topictitle1">Change History</h1>
<div id="body1476947484496">
<div class="tablenoborder"><table cellpadding="4" cellspacing="0" summary="" id="vpc_faq_0103__table15997164317205" frame="border" border="1" rules="all"><thead align="left"><tr id="vpc_faq_0103__en-us_topic_0226222485_row2942532716410"><th align="left" class="cellrowborder" valign="top" width="19.09%" id="mcps1.3.1.1.3.1.1"><p id="vpc_faq_0103__en-us_topic_0226222485_p5627845516410"><strong id="vpc_faq_0103__b1862885411318">Released On</strong></p>
<div class="tablenoborder"><table cellpadding="4" cellspacing="0" summary="" id="vpc_faq_0103__table15997164317205" frame="border" border="1" rules="all"><thead align="left"><tr id="vpc_faq_0103__en-us_topic_0226222485_row2942532716410"><th align="left" class="cellrowborder" valign="top" width="19.09%" id="mcps1.3.1.1.3.1.1"><p id="vpc_faq_0103__en-us_topic_0226222485_p5627845516410"><strong id="vpc_faq_0103__b732183418">Released On</strong></p>
</th>
<th align="left" class="cellrowborder" valign="top" width="80.91000000000001%" id="mcps1.3.1.1.3.1.2"><p id="vpc_faq_0103__en-us_topic_0226222485_p2382284816410"><strong id="vpc_faq_0103__b089975073119">Description</strong></p>
</th>
</tr>
</thead>
<tbody><tr id="vpc_faq_0103__row61022511257"><td class="cellrowborder" valign="top" width="19.09%" headers="mcps1.3.1.1.3.1.1 "><p id="vpc_faq_0103__p1110385172517">2023-10-10</p>
<tbody><tr id="vpc_faq_0103__row63501955122519"><td class="cellrowborder" valign="top" width="19.09%" headers="mcps1.3.1.1.3.1.1 "><p id="vpc_faq_0103__p43501655192519">2023-12-19</p>
</td>
<td class="cellrowborder" valign="top" width="80.91000000000001%" headers="mcps1.3.1.1.3.1.2 "><p id="vpc_faq_0103__p571574172613">This release incorporates the following changes:</p>
<p id="vpc_faq_0103__p72630662619">Added screenshots in <a href="vpc_faq_0059.html">How Do I Configure a Security Group for Multi-Channel Protocols?</a>.</p>
<p id="vpc_faq_0103__p1447011410261">Modified the table in <a href="vpc_faq_0075.html">Why Can't I Delete My VPCs and Subnets?</a>.</p>
</td>
</tr>
<tr id="vpc_faq_0103__row1118888559"><td class="cellrowborder" valign="top" width="19.09%" headers="mcps1.3.1.1.3.1.1 "><p id="vpc_faq_0103__p918198175516">2023-12-18</p>
</td>
<td class="cellrowborder" valign="top" width="80.91000000000001%" headers="mcps1.3.1.1.3.1.2 "><p id="vpc_faq_0103__p1933062215514">This release incorporates the following changes:</p>
<p id="vpc_faq_0103__p15330142275517">Added IPv6-related content.</p>
</td>
</tr>
<tr id="vpc_faq_0103__row35108271944"><td class="cellrowborder" valign="top" width="19.09%" headers="mcps1.3.1.1.3.1.1 "><p id="vpc_faq_0103__p051116271144">2023-12-12</p>
</td>
<td class="cellrowborder" valign="top" width="80.91000000000001%" headers="mcps1.3.1.1.3.1.2 "><p id="vpc_faq_0103__p1875674310412">This release incorporates the following changes:</p>
<p id="vpc_faq_0103__p984713478412">Added descriptions about security group and IP address group as source or destination in <a href="en-us_topic_0030969470.html">Adding a Security Group Rule</a>.</p>
</td>
</tr>
<tr id="vpc_faq_0103__row1711112513116"><td class="cellrowborder" valign="top" width="19.09%" headers="mcps1.3.1.1.3.1.1 "><p id="vpc_faq_0103__p511217553110">2023-11-30</p>
</td>
<td class="cellrowborder" valign="top" width="80.91000000000001%" headers="mcps1.3.1.1.3.1.2 "><p id="vpc_faq_0103__p1254472443117">This release incorporates the following changes:</p>
<p id="vpc_faq_0103__p752215462045">Added descriptions about IP address groups as source and destination in <a href="en-us_topic_0051746702.html">Adding a Firewall Rule</a>.</p>
</td>
</tr>
<tr id="vpc_faq_0103__row10350194681811"><td class="cellrowborder" valign="top" width="19.09%" headers="mcps1.3.1.1.3.1.1 "><p id="vpc_faq_0103__p9350204691815">2023-11-14</p>
</td>
<td class="cellrowborder" valign="top" width="80.91000000000001%" headers="mcps1.3.1.1.3.1.2 "><p id="vpc_faq_0103__p113800691919">This release incorporates the following changes:</p>
<p id="vpc_faq_0103__p153800619192">Added the following content:</p>
<p id="vpc_faq_0103__p0380263192">Added description about allowing common ports with a few clicks in <a href="SecurityGroup_0005.html">Allowing Common Ports with A Few Clicks</a>.</p>
</td>
</tr>
<tr id="vpc_faq_0103__row61022511257"><td class="cellrowborder" valign="top" width="19.09%" headers="mcps1.3.1.1.3.1.1 "><p id="vpc_faq_0103__p1110385172517">2023-10-10</p>
</td>
<td class="cellrowborder" valign="top" width="80.91000000000001%" headers="mcps1.3.1.1.3.1.2 "><p id="vpc_faq_0103__p962616582610">This release incorporates the following changes:</p>
<ul id="vpc_faq_0103__ul1099152210265"><li id="vpc_faq_0103__li161118466019">Added the figure for configuring route tables in <a href="en-us_topic_0038263963.html">Route Table</a>.</li><li id="vpc_faq_0103__li19345844184913">Modified <a href="vpc_qs_0008.html">Step 4: Add a Security Group Rule</a>.<ul id="vpc_faq_0103__ul2345244144915"><li id="vpc_faq_0103__li434514417493">Changed the location of parameter <strong id="vpc_faq_0103__b792816403453">Type</strong>.</li><li id="vpc_faq_0103__li10236153614014">Added protocol <strong id="vpc_faq_0103__b1217114572456">GRE</strong>.</li></ul>

View File

@ -13,7 +13,7 @@
</div>
<div class="section" id="vpc_peering_0004__section92403501475"><a name="vpc_peering_0004__section92403501475"></a><a name="section92403501475"></a><h4 class="sectiontitle">Viewing Routes of a VPC Peering Connection Between VPCs in Different Accounts</h4><p id="vpc_peering_0004__p691410169811">Only the account owner of a VPC in a VPC peering connection can view the routes added for the connection.</p>
<ol id="vpc_peering_0004__ol27867394498"><li id="vpc_peering_0004__li4105938135810"><a name="vpc_peering_0004__li4105938135810"></a><a name="li4105938135810"></a>Log in to the management console using the account of the local VPC and view the route of the local VPC:<ol type="a" id="vpc_peering_0004__ol10907145175917"><li id="vpc_peering_0004__li1578623954916">Click <span><img id="vpc_peering_0004__en-us_topic_0013748726_image338921514480_1" src="en-us_image_0141273034.png"></span> in the upper left corner and select the desired region and project.</li><li id="vpc_peering_0004__li189497818514">Click <span><img id="vpc_peering_0004__image4949681356" src="en-us_image_0000001675256529.png"></span> in the upper left corner and choose <strong id="vpc_peering_0004__b15952216462"><span id="vpc_peering_0004__text1094172144611">Network</span><span id="vpc_peering_0004__text79410211460"></span></strong> &gt; <strong id="vpc_peering_0004__b49513274617">Virtual Private Cloud</strong>.<p id="vpc_peering_0004__p10949281355">The <strong id="vpc_peering_0004__b14899877460">Virtual Private Cloud</strong> page is displayed.</p>
</li><li id="vpc_peering_0004__li1712242142814">In the navigation pane on the left, choose <strong id="vpc_peering_0004__b803660319">Virtual Private Cloud</strong> &gt; <strong id="vpc_peering_0004__b1238427825">VPC Peering Connections</strong>.<p id="vpc_peering_0004__p181221021102811">The VPC peering connection list is displayed.</p>
</li><li id="vpc_peering_0004__li1712242142814">In the navigation pane on the left, choose <strong id="vpc_peering_0004__b603910567">Virtual Private Cloud</strong> &gt; <strong id="vpc_peering_0004__b1595938517">VPC Peering Connections</strong>.<p id="vpc_peering_0004__p181221021102811">The VPC peering connection list is displayed.</p>
</li><li id="vpc_peering_0004__li15786173934918">In the VPC peering connection list, click the name of the target VPC peering connection.<p id="vpc_peering_0004__p8786143910497"><a name="vpc_peering_0004__li15786173934918"></a><a name="li15786173934918"></a>The page showing the VPC peering connection details is displayed.</p>
</li><li id="vpc_peering_0004__li478643914919">Click the <strong id="vpc_peering_0004__b105883222539">Local Routes</strong> tab to view the local route added for the VPC peering connection.</li></ol>
</li><li id="vpc_peering_0004__li1180813273158">Log in to the management console using the account of the peer VPC and view the route of the peer VPC by referring to <a href="#vpc_peering_0004__li4105938135810">1</a>.</li></ol>

View File

@ -5,7 +5,7 @@
</div>
</div>
<div class="section" id="vpc_peering_0006__section26541722111813"><a name="vpc_peering_0006__section26541722111813"></a><a name="section26541722111813"></a><h4 class="sectiontitle">Deleting Routes of a VPC Peering Connection Between VPCs in the Same Account</h4><ol id="vpc_peering_0006__ol1065413226184"><li id="vpc_peering_0006__li126541722181819">Log in to the management console.</li><li id="vpc_peering_0006__li16541122181817">Click <span><img id="vpc_peering_0006__en-us_topic_0013748726_image338921514480" src="en-us_image_0141273034.png"></span> in the upper left corner and select the desired region and project.</li><li id="vpc_peering_0006__li65321958215">Click <span><img id="vpc_peering_0006__en-us_topic_0013748738_image8750174734412" src="en-us_image_0000001626896590.png"></span> in the upper left corner and choose <strong id="vpc_peering_0006__b9996181154716"><span id="vpc_peering_0006__text169961411204718">Network</span><span id="vpc_peering_0006__text11996151184716"></span></strong> &gt; <strong id="vpc_peering_0006__b12996201116478">Virtual Private Cloud</strong>.<p id="vpc_peering_0006__p1182103318256">The <strong id="vpc_peering_0006__b18944121614471">Virtual Private Cloud</strong> page is displayed.</p>
</li><li id="vpc_peering_0006__li179761757517">In the navigation pane on the left, choose <strong id="vpc_peering_0006__b15892111015170">Virtual Private Cloud</strong> &gt; <strong id="vpc_peering_0006__b7893121041711">VPC Peering Connections</strong>.<p id="vpc_peering_0006__p17113949173212">The VPC peering connection list is displayed.</p>
</li><li id="vpc_peering_0006__li1712242142814">In the navigation pane on the left, choose <strong id="vpc_peering_0006__b15892111015170">Virtual Private Cloud</strong> &gt; <strong id="vpc_peering_0006__b7893121041711">VPC Peering Connections</strong>.<p id="vpc_peering_0006__p181221021102811">The VPC peering connection list is displayed.</p>
</li><li id="vpc_peering_0006__li72011314173815">In the VPC peering connection list, click the name of the target VPC peering connection.<p id="vpc_peering_0006__p26161056144611"><a name="vpc_peering_0006__li72011314173815"></a><a name="li72011314173815"></a>The page showing the VPC peering connection details is displayed.</p>
</li><li id="vpc_peering_0006__li7363528165916">Delete the route added to the route table of the local VPC:<ol type="a" id="vpc_peering_0006__ol15241714601"><li id="vpc_peering_0006__li116961639193915">Click the <strong id="vpc_peering_0006__b1144013277192">Local Routes</strong> tab and then click the <strong id="vpc_peering_0006__b44411427191913">Route Tables</strong> hyperlink.<p id="vpc_peering_0006__p26961539133913">The <strong id="vpc_peering_0006__b148154431917">Summary</strong> tab of the default route table for the local VPC is displayed.</p>
</li><li id="vpc_peering_0006__li1478919819114">Locate the row that contains the route to be deleted and click <strong id="vpc_peering_0006__b9797105851918">Delete</strong> in the <strong id="vpc_peering_0006__b979725819191">Operation</strong> column.<p id="vpc_peering_0006__p1940318274477">A confirmation dialog box is displayed.</p>
@ -17,9 +17,9 @@
</div>
<div class="section" id="vpc_peering_0006__section47866392497"><a name="vpc_peering_0006__section47866392497"></a><a name="section47866392497"></a><h4 class="sectiontitle">Deleting Routes of a VPC Peering Connection Between VPCs in Different Accounts</h4><p id="vpc_peering_0006__p3210936175714">Only the account owner of a VPC in a VPC peering connection can delete the routes added for the connection.</p>
<ol id="vpc_peering_0006__ol27867394498"><li id="vpc_peering_0006__li4105938135810"><a name="vpc_peering_0006__li4105938135810"></a><a name="li4105938135810"></a>Log in to the management console using the account of the local VPC and delete the route of the local VPC:<ol type="a" id="vpc_peering_0006__ol10907145175917"><li id="vpc_peering_0006__li1578623954916">Click <span><img id="vpc_peering_0006__en-us_topic_0013748726_image338921514480_1" src="en-us_image_0141273034.png"></span> in the upper left corner and select the desired region and project.</li><li id="vpc_peering_0006__li072215299515">Click <span><img id="vpc_peering_0006__image1072211291153" src="en-us_image_0000001675616433.png"></span> in the upper left corner and choose <strong id="vpc_peering_0006__b1790061824710"><span id="vpc_peering_0006__text7900318124717">Network</span><span id="vpc_peering_0006__text9900191817477"></span></strong> &gt; <strong id="vpc_peering_0006__b69011918154713">Virtual Private Cloud</strong>.<p id="vpc_peering_0006__p2072212294520">The <strong id="vpc_peering_0006__b839132354710">Virtual Private Cloud</strong> page is displayed.</p>
</li><li id="vpc_peering_0006__li4204344112818">In the navigation pane on the left, choose <strong id="vpc_peering_0006__b1348476197">Virtual Private Cloud</strong> &gt; <strong id="vpc_peering_0006__b1159562857">VPC Peering Connections</strong>.<p id="vpc_peering_0006__p1420404442819">The VPC peering connection list is displayed.</p>
</li><li id="vpc_peering_0006__li127681868557">In the navigation pane on the left, choose <strong id="vpc_peering_0006__b832310470">Virtual Private Cloud</strong> &gt; <strong id="vpc_peering_0006__b1626005176">VPC Peering Connections</strong>.<p id="vpc_peering_0006__p1276826155517">The VPC peering connection list is displayed.</p>
</li><li id="vpc_peering_0006__li15786173934918">In the VPC peering connection list, click the name of the target VPC peering connection.<p id="vpc_peering_0006__p8786143910497"><a name="vpc_peering_0006__li15786173934918"></a><a name="li15786173934918"></a>The page showing the VPC peering connection details is displayed.</p>
</li><li id="vpc_peering_0006__li478643914919">Delete the route added to the route table of the local VPC:<ol class="substepthirdol" id="vpc_peering_0006__ol1578613912498"><li id="vpc_peering_0006__li1278618398497">Click the <strong id="vpc_peering_0006__b2134542266">Local Routes</strong> tab and then click the <strong id="vpc_peering_0006__b1154711217">Route Tables</strong> hyperlink.<p id="vpc_peering_0006__p1678693964919">The <strong id="vpc_peering_0006__b3603759182217">Summary</strong> tab of the default route table for the local VPC is displayed.</p>
</li><li id="vpc_peering_0006__li478643914919">Delete the route added to the route table of the local VPC:<ol class="substepthirdol" id="vpc_peering_0006__ol1578613912498"><li id="vpc_peering_0006__li1278618398497">Click the <strong id="vpc_peering_0006__b355376029">Local Routes</strong> tab and then click the <strong id="vpc_peering_0006__b1261977816">Route Tables</strong> hyperlink.<p id="vpc_peering_0006__p1678693964919">The <strong id="vpc_peering_0006__b3603759182217">Summary</strong> tab of the default route table for the local VPC is displayed.</p>
</li><li id="vpc_peering_0006__li07861039144911">Locate the row that contains the route to be deleted and click <strong id="vpc_peering_0006__b1572315210239">Delete</strong> in the <strong id="vpc_peering_0006__b372452102316">Operation</strong> column.<p id="vpc_peering_0006__p1878683954918">A confirmation dialog box is displayed.</p>
</li><li id="vpc_peering_0006__li13786193914917">Click <strong id="vpc_peering_0006__b915218762318">Yes</strong>.</li></ol>
</li></ol>

View File

@ -18,7 +18,7 @@
</div>
<div class="section" id="vpc_peering_0007__section47866392497"><a name="vpc_peering_0007__section47866392497"></a><a name="section47866392497"></a><h4 class="sectiontitle">Modifying Routes of a VPC Peering Connection Between VPCs in Different Accounts</h4><p id="vpc_peering_0007__p3210936175714">Only the account owner of a VPC can modify the routes added for the connection.</p>
<ol id="vpc_peering_0007__ol27867394498"><li id="vpc_peering_0007__li4105938135810"><a name="vpc_peering_0007__li4105938135810"></a><a name="li4105938135810"></a>Log in to the management console using the account of the local VPC and modify the route of the local VPC:<ol type="a" id="vpc_peering_0007__ol10907145175917"><li id="vpc_peering_0007__li1578623954916">Click <span><img id="vpc_peering_0007__en-us_topic_0013748726_image338921514480_1" src="en-us_image_0141273034.png"></span> in the upper left corner and select the desired region and project.</li><li id="vpc_peering_0007__li730565415415">Click <span><img id="vpc_peering_0007__image9305154843" src="en-us_image_0000001626736678.png"></span> in the upper left corner and choose <strong id="vpc_peering_0007__b15610194234514"><span id="vpc_peering_0007__text3609144216454">Network</span><span id="vpc_peering_0007__text6610164274510"></span></strong> &gt; <strong id="vpc_peering_0007__b86101042104513">Virtual Private Cloud</strong>.<p id="vpc_peering_0007__p173054543416">The <strong id="vpc_peering_0007__b10325114818452">Virtual Private Cloud</strong> page is displayed.</p>
</li><li id="vpc_peering_0007__li142797105281">In the navigation pane on the left, choose <strong id="vpc_peering_0007__b1252911895">Virtual Private Cloud</strong> &gt; <strong id="vpc_peering_0007__b1901100357">VPC Peering Connections</strong>.<p id="vpc_peering_0007__p027931010283">The VPC peering connection list is displayed.</p>
</li><li id="vpc_peering_0007__li1412624545312">In the navigation pane on the left, choose <strong id="vpc_peering_0007__b994960651">Virtual Private Cloud</strong> &gt; <strong id="vpc_peering_0007__b2035928968">VPC Peering Connections</strong>.<p id="vpc_peering_0007__p101261445145310">The VPC peering connection list is displayed.</p>
</li><li id="vpc_peering_0007__li15786173934918">In the VPC peering connection list, click the name of the target VPC peering connection.<p id="vpc_peering_0007__p8786143910497"><a name="vpc_peering_0007__li15786173934918"></a><a name="li15786173934918"></a>The page showing the VPC peering connection details is displayed.</p>
</li><li id="vpc_peering_0007__li478643914919">Modify the route added to the route table of the local VPC:<ol class="substepthirdol" id="vpc_peering_0007__ol1578613912498"><li id="vpc_peering_0007__li1278618398497">Click the <strong id="vpc_peering_0007__b1772710483353">Local Routes</strong> tab and then click the <strong id="vpc_peering_0007__b1272754816354">Route Tables</strong> hyperlink.<p id="vpc_peering_0007__p1678693964919">The <strong id="vpc_peering_0007__b19494105119352">Summary</strong> tab of the default route table for the local VPC is displayed.</p>
</li><li id="vpc_peering_0007__li07861039144911">Locate the row that contains the route to be modified and click <strong id="vpc_peering_0007__b98673544359">Modify</strong> in the <strong id="vpc_peering_0007__b14867205453517">Operation</strong> column.<p id="vpc_peering_0007__p1878683954918">The <strong id="vpc_peering_0007__b93731359183510">Modify Route</strong> dialog box is displayed.</p>

View File

@ -9,11 +9,11 @@
<div class="tablenoborder"><table cellpadding="4" cellspacing="0" summary="" id="vpc_qs_0005__en-us_topic_0013935842_table1168883712472" frame="border" border="1" rules="all"><caption><b>Table 1 </b>VPC parameter descriptions</caption><thead align="left"><tr id="vpc_qs_0005__en-us_topic_0013935842_row17700537104713"><th align="left" class="cellrowborder" valign="top" width="16.16161616161616%" id="mcps1.3.2.2.5.3.2.5.1.1"><p id="vpc_qs_0005__en-us_topic_0013935842_p3444547103715">Category</p>
</th>
<th align="left" class="cellrowborder" valign="top" width="18.18181818181818%" id="mcps1.3.2.2.5.3.2.5.1.2"><p id="vpc_qs_0005__en-us_topic_0013935842_p17713173714472"><strong id="vpc_qs_0005__en-us_topic_0013935842_b1083232062">Parameter</strong></p>
<th align="left" class="cellrowborder" valign="top" width="18.18181818181818%" id="mcps1.3.2.2.5.3.2.5.1.2"><p id="vpc_qs_0005__en-us_topic_0013935842_p17713173714472"><strong id="vpc_qs_0005__en-us_topic_0013935842_b1917934254">Parameter</strong></p>
</th>
<th align="left" class="cellrowborder" valign="top" width="46.464646464646464%" id="mcps1.3.2.2.5.3.2.5.1.3"><p id="vpc_qs_0005__en-us_topic_0013935842_p157202037194711"><strong id="vpc_qs_0005__en-us_topic_0013935842_b740174389">Description</strong></p>
<th align="left" class="cellrowborder" valign="top" width="46.464646464646464%" id="mcps1.3.2.2.5.3.2.5.1.3"><p id="vpc_qs_0005__en-us_topic_0013935842_p157202037194711"><strong id="vpc_qs_0005__en-us_topic_0013935842_b200895067">Description</strong></p>
</th>
<th align="left" class="cellrowborder" valign="top" width="19.19191919191919%" id="mcps1.3.2.2.5.3.2.5.1.4"><p id="vpc_qs_0005__en-us_topic_0013935842_p97241237164712"><strong id="vpc_qs_0005__en-us_topic_0013935842_b2093972158">Example Value</strong></p>
<th align="left" class="cellrowborder" valign="top" width="19.19191919191919%" id="mcps1.3.2.2.5.3.2.5.1.4"><p id="vpc_qs_0005__en-us_topic_0013935842_p97241237164712"><strong id="vpc_qs_0005__en-us_topic_0013935842_b859463269">Example Value</strong></p>
</th>
</tr>
</thead>
@ -89,20 +89,30 @@
<td class="cellrowborder" valign="top" width="19.19191919191919%" headers="mcps1.3.2.2.5.3.2.5.1.4 "><p id="vpc_qs_0005__en-us_topic_0013935842_p178351137184711">Subnet</p>
</td>
</tr>
<tr id="vpc_qs_0005__en-us_topic_0013935842_row8837123719474"><td class="cellrowborder" valign="top" width="16.16161616161616%" headers="mcps1.3.2.2.5.3.2.5.1.1 "><p id="vpc_qs_0005__en-us_topic_0013935842_p1544410476376">Default Subnet</p>
<tr id="vpc_qs_0005__en-us_topic_0013935842_row057111320513"><td class="cellrowborder" valign="top" width="16.16161616161616%" headers="mcps1.3.2.2.5.3.2.5.1.1 "><p id="vpc_qs_0005__en-us_topic_0013935842_p10348111012514">Default Subnet</p>
</td>
<td class="cellrowborder" valign="top" width="18.18181818181818%" headers="mcps1.3.2.2.5.3.2.5.1.2 "><p id="vpc_qs_0005__en-us_topic_0013935842_p1284223764717">CIDR Block</p>
<td class="cellrowborder" valign="top" width="18.18181818181818%" headers="mcps1.3.2.2.5.3.2.5.1.2 "><p id="vpc_qs_0005__en-us_topic_0013935842_p103481410058">IPv4 CIDR Block</p>
</td>
<td class="cellrowborder" valign="top" width="46.464646464646464%" headers="mcps1.3.2.2.5.3.2.5.1.3 "><p id="vpc_qs_0005__en-us_topic_0013935842_p15845173713472">The CIDR block for the subnet. This value must be within the VPC CIDR block.</p>
<td class="cellrowborder" valign="top" width="46.464646464646464%" headers="mcps1.3.2.2.5.3.2.5.1.3 "><p id="vpc_qs_0005__en-us_topic_0013935842_p1034821019520">The CIDR block for the subnet. This value must be within the VPC CIDR block.</p>
</td>
<td class="cellrowborder" valign="top" width="19.19191919191919%" headers="mcps1.3.2.2.5.3.2.5.1.4 "><p id="vpc_qs_0005__en-us_topic_0013935842_p184773774715">192.168.0.0/24</p>
<td class="cellrowborder" valign="top" width="19.19191919191919%" headers="mcps1.3.2.2.5.3.2.5.1.4 "><p id="vpc_qs_0005__en-us_topic_0013935842_p5348111017517">192.168.0.0/24</p>
</td>
</tr>
<tr id="vpc_qs_0005__en-us_topic_0013935842_row464842547"><td class="cellrowborder" valign="top" width="16.16161616161616%" headers="mcps1.3.2.2.5.3.2.5.1.1 "><p id="vpc_qs_0005__en-us_topic_0013935842_p53481410558">Default Subnet</p>
</td>
<td class="cellrowborder" valign="top" width="18.18181818181818%" headers="mcps1.3.2.2.5.3.2.5.1.2 "><p id="vpc_qs_0005__en-us_topic_0013935842_p1934831019517">IPv6 CIDR Block</p>
</td>
<td class="cellrowborder" valign="top" width="46.464646464646464%" headers="mcps1.3.2.2.5.3.2.5.1.3 "><p id="vpc_qs_0005__en-us_topic_0013935842_p1348181015512">Specifies whether to set <strong id="vpc_qs_0005__en-us_topic_0013935842_b2125489059">IPv6 CIDR Block</strong> to <strong id="vpc_qs_0005__en-us_topic_0013935842_b1925586104">Enable</strong>.</p>
<p id="vpc_qs_0005__en-us_topic_0013935842_p13485104514">After the IPv6 function is enabled, the system automatically assigns an IPv6 CIDR block to the created subnet. Currently, the IPv6 CIDR block cannot be customized. IPv6 cannot be disabled after the subnet is created.</p>
</td>
<td class="cellrowborder" valign="top" width="19.19191919191919%" headers="mcps1.3.2.2.5.3.2.5.1.4 "><p id="vpc_qs_0005__en-us_topic_0013935842_p23481710359">-</p>
</td>
</tr>
<tr id="vpc_qs_0005__en-us_topic_0013935842_row622752612598"><td class="cellrowborder" valign="top" width="16.16161616161616%" headers="mcps1.3.2.2.5.3.2.5.1.1 "><p id="vpc_qs_0005__en-us_topic_0013935842_p4175836125911">Default Subnet</p>
</td>
<td class="cellrowborder" valign="top" width="18.18181818181818%" headers="mcps1.3.2.2.5.3.2.5.1.2 "><p id="vpc_qs_0005__en-us_topic_0013935842_p19175203614592">Associated Route Table</p>
</td>
<td class="cellrowborder" valign="top" width="46.464646464646464%" headers="mcps1.3.2.2.5.3.2.5.1.3 "><p id="vpc_qs_0005__en-us_topic_0013935842_p1217513368597">The default route table to which the subnet will be associated. You can change the route table to a custom route table on the <strong id="vpc_qs_0005__en-us_topic_0013935842_b685518463">Subnets</strong> page.</p>
<td class="cellrowborder" valign="top" width="46.464646464646464%" headers="mcps1.3.2.2.5.3.2.5.1.3 "><p id="vpc_qs_0005__en-us_topic_0013935842_p1217513368597">The default route table to which the subnet will be associated. You can change the route table to a custom route table on the <strong id="vpc_qs_0005__en-us_topic_0013935842_b2044497856">Subnets</strong> page.</p>
</td>
<td class="cellrowborder" valign="top" width="19.19191919191919%" headers="mcps1.3.2.2.5.3.2.5.1.4 "><p id="vpc_qs_0005__en-us_topic_0013935842_p317512367592">Default</p>
</td>

Some files were not shown because too many files have changed in this diff Show More