diff --git a/docs/vpc/umn/.placeholder b/docs/vpc/umn/.placeholder deleted file mode 100644 index e69de29b..00000000 diff --git a/docs/vpc/umn/ALL_META.TXT.json b/docs/vpc/umn/ALL_META.TXT.json index 8a9764ad..38394ce2 100644 --- a/docs/vpc/umn/ALL_META.TXT.json +++ b/docs/vpc/umn/ALL_META.TXT.json @@ -13,16 +13,26 @@ "uri":"en-us_topic_0013748729.html", "product_code":"vpc", "code":"2", - "des":"The Virtual Private Cloud (VPC) service enables you to provision logically isolated, configurable, and manageable virtual networks for Elastic Cloud Servers (ECSs), impro", + "des":"The Virtual Private Cloud (VPC) service enables you to provision logically isolated virtual networks for Elastic Cloud Servers (ECSs), improving cloud resource security a", "doc_type":"usermanual", "kw":"What Is Virtual Private Cloud?,Service Overview,User Guide", "title":"What Is Virtual Private Cloud?", "githuburl":"" }, { - "uri":"overview_0002.html", + "uri":"overview_0004.html", "product_code":"vpc", "code":"3", + "des":"You can create VPCs, add subnets, specify IP address ranges, and configure DHCP and route tables. You can configure the same VPC for ECSs that are in different availabili", + "doc_type":"usermanual", + "kw":"Product Advantages,Service Overview,User Guide", + "title":"Product Advantages", + "githuburl":"" + }, + { + "uri":"overview_0002.html", + "product_code":"vpc", + "code":"4", "des":"Hosting web applicationsYou can host web applications and websites in a VPC and use the VPC as a regular network. With EIPs, you can connect ECSs running your web applica", "doc_type":"usermanual", "kw":"Application Scenarios,Service Overview,User Guide", @@ -32,17 +42,27 @@ { "uri":"overview_0001.html", "product_code":"vpc", - "code":"4", + "code":"5", "des":"You can use EIPs, load balancers, NAT gateways, VPN connections, and Direct Connect connections to access the Internet if required.Use EIPs to Enable a Small Number of EC", "doc_type":"usermanual", "kw":"VPC Connectivity,Service Overview,User Guide", "title":"VPC Connectivity", "githuburl":"" }, + { + "uri":"overview_0003.html", + "product_code":"vpc", + "code":"6", + "des":"By default, you can create a maximum of 100 security groups in your cloud account.By default, you can add up to 50 security group rules to a security group.When creating ", + "doc_type":"usermanual", + "kw":"Notes and Constraints,Service Overview,User Guide", + "title":"Notes and Constraints", + "githuburl":"" + }, { "uri":"vpc_relationship_0001.html", "product_code":"vpc", - "code":"5", + "code":"7", "des":"ECSThe VPC service provides an isolated virtual network for ECSs. You can configure and manage the network as required. There are multiple connectivity options for ECSs t", "doc_type":"usermanual", "kw":"VPC and Other Services,Service Overview,User Guide", @@ -50,19 +70,19 @@ "githuburl":"" }, { - "uri":"vpc_permissions_0001.html", + "uri":"overview_permission.html", "product_code":"vpc", - "code":"6", - "des":"The cloud system provides two types of user permissions by default: user management and resource management. User management refers to the management of users, user group", + "code":"8", + "des":"If you need to assign different permissions to personnel in your enterprise to access your VPCs, IAM is a good choice for fine-grained permissions management. IAM provide", "doc_type":"usermanual", - "kw":"User Permissions,Service Overview,User Guide", - "title":"User Permissions", + "kw":"Permissions,Service Overview,User Guide", + "title":"Permissions", "githuburl":"" }, { "uri":"vpc_Concepts_0001.html", "product_code":"vpc", - "code":"7", + "code":"9", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Basic Concepts", @@ -72,7 +92,7 @@ { "uri":"en-us_topic_0030969424.html", "product_code":"vpc", - "code":"8", + "code":"10", "des":"A subnet is a unique CIDR block with a range of IP addresses in a VPC. All resources in a VPC must be deployed on subnets.By default, ECSs in all subnets of the same VPC ", "doc_type":"usermanual", "kw":"Subnet,Basic Concepts,User Guide", @@ -82,7 +102,7 @@ { "uri":"vpc_Concepts_0003.html", "product_code":"vpc", - "code":"9", + "code":"11", "des":"The Elastic IP (EIP) service enables your cloud resources to communicate with the Internet using static public IP addresses and scalable bandwidths. EIPs can be bound to ", "doc_type":"usermanual", "kw":"Elastic IP,Basic Concepts,User Guide", @@ -92,8 +112,8 @@ { "uri":"en-us_topic_0038263963.html", "product_code":"vpc", - "code":"10", - "des":"VPC has old and new console editions. You can click in the lower right corner of the console to switch between the old and new consoles.On the new console, the route tab", + "code":"12", + "des":"A route table contains a set of routes that are used to determine where network traffic from your subnets in a VPC is directed. Each subnet must be associated with a rout", "doc_type":"usermanual", "kw":"Route Table,Basic Concepts,User Guide", "title":"Route Table", @@ -102,7 +122,7 @@ { "uri":"vpc_Concepts_0004.html", "product_code":"vpc", - "code":"11", + "code":"13", "des":"In addition to services provided by the system, some ECSs need to access the Internet to obtain information or download software. You can bind EIPs to virtual NICs (ports", "doc_type":"usermanual", "kw":"SNAT,Basic Concepts,User Guide", @@ -112,7 +132,7 @@ { "uri":"vpc_Concepts_0005.html", "product_code":"vpc", - "code":"12", + "code":"14", "des":"A security group is a collection of access control rules for cloud resources, such as cloud servers, containers, and databases, that have the same security protection req", "doc_type":"usermanual", "kw":"Security Group,Basic Concepts,User Guide", @@ -122,7 +142,7 @@ { "uri":"vpc_Concepts_0010.html", "product_code":"vpc", - "code":"13", + "code":"15", "des":"The VPC service provides free SNAT function, which allows ECSs to use a limited number of public IP addresses to gain one-way access to the Internet for operations, such ", "doc_type":"usermanual", "kw":"Shared SNAT,Basic Concepts,User Guide", @@ -132,8 +152,8 @@ { "uri":"vpc_Concepts_0011.html", "product_code":"vpc", - "code":"14", - "des":"A VPC peering connection is a network connection between two VPCs in one region that enables you to route traffic between them using private IP addresses. ECSs in either ", + "code":"16", + "des":"A VPC peering connection is a networking connection between two VPCs and enables them to communicate using private IP addresses. The VPCs to be peered can be in the same ", "doc_type":"usermanual", "kw":"VPC Peering Connection,Basic Concepts,User Guide", "title":"VPC Peering Connection", @@ -142,7 +162,7 @@ { "uri":"en-us_topic_0051746676.html", "product_code":"vpc", - "code":"15", + "code":"17", "des":"A firewall is an optional layer of security for your subnets. After you associate one or more subnets with a firewall, you can control traffic in and out of the subnets.", "doc_type":"usermanual", "kw":"Firewall,Basic Concepts,User Guide", @@ -152,7 +172,7 @@ { "uri":"vpc_Concepts_0012.html", "product_code":"vpc", - "code":"16", + "code":"18", "des":"A virtual IP address can be shared among multiple ECSs. An ECS can have both private and virtual IP addresses, and you can access the ECS through either IP address. A vir", "doc_type":"usermanual", "kw":"Virtual IP Address,Basic Concepts,User Guide", @@ -162,7 +182,7 @@ { "uri":"overview_region.html", "product_code":"vpc", - "code":"17", + "code":"19", "des":"A region and availability zone (AZ) identify the location of a data center. You can create resources in a specific region and AZ.A region is a physical data center, which", "doc_type":"usermanual", "kw":"Region and AZ,Basic Concepts,User Guide", @@ -172,7 +192,7 @@ { "uri":"vpc_use_0001.html", "product_code":"vpc", - "code":"18", + "code":"20", "des":"Instructions for using this document are as follows:To facilitate your operations, the management console may provide more than one way for you to perform a task or an op", "doc_type":"usermanual", "kw":"Document Usage Instructions,Service Overview,User Guide", @@ -182,7 +202,7 @@ { "uri":"vpc_qs_0000.html", "product_code":"vpc", - "code":"19", + "code":"21", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Getting Started", @@ -192,8 +212,8 @@ { "uri":"vpc_qs_0002.html", "product_code":"vpc", - "code":"20", - "des":"A VPC provides an isolated virtual network for ECSs. You can configure and manage the network as required.If your ECSs, for example, ECSs that function as databases, do n", + "code":"22", + "des":"A VPC provides an isolated virtual network for ECSs. You can configure and manage the network as required.If any of your ECSs, for example, ECSs that function as the data", "doc_type":"usermanual", "kw":"Typical Application Scenarios,Getting Started,User Guide", "title":"Typical Application Scenarios", @@ -202,7 +222,7 @@ { "uri":"vpc_qs_0003.html", "product_code":"vpc", - "code":"21", + "code":"23", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Configuring a VPC for ECSs That Do Not Require Internet Access", @@ -212,7 +232,7 @@ { "uri":"vpc_qs_0004.html", "product_code":"vpc", - "code":"22", + "code":"24", "des":"If your ECSs do not require Internet access or need to access the Internet using IP addresses on the default network (100.64.0.0/11) with limited bandwidth (for example, ", "doc_type":"usermanual", "kw":"Overview,Configuring a VPC for ECSs That Do Not Require Internet Access,User Guide", @@ -222,7 +242,7 @@ { "uri":"vpc_qs_0005.html", "product_code":"vpc", - "code":"23", + "code":"25", "des":"A VPC provides an isolated virtual network for ECSs. You can configure and manage the network as required.You can create a VPC by following the procedure provided in this", "doc_type":"usermanual", "kw":"Step 1: Create a VPC,Configuring a VPC for ECSs That Do Not Require Internet Access,User Guide", @@ -232,8 +252,8 @@ { "uri":"vpc_qs_0006.html", "product_code":"vpc", - "code":"24", - "des":"A VPC comes with a default subnet. If the default subnet cannot meet your requirements, you can create one.The subnet is configured with DHCP by default. When an ECS in t", + "code":"26", + "des":"A VPC comes with a default subnet. If the default subnet cannot meet your requirements, you can create one.A subnet is configured with DHCP by default. When an ECS in thi", "doc_type":"usermanual", "kw":"Step 2: Create a Subnet for the VPC,Configuring a VPC for ECSs That Do Not Require Internet Access,U", "title":"Step 2: Create a Subnet for the VPC", @@ -242,8 +262,8 @@ { "uri":"vpc_qs_0007.html", "product_code":"vpc", - "code":"25", - "des":"To improve ECS access security, you can create security groups, define security group rules, and add ECSs in a VPC to different security groups. We recommend that you all", + "code":"27", + "des":"You can create security groups and add ECSs in a VPC to different security groups to improve ECS access security. We recommend that you allocate ECSs that have different ", "doc_type":"usermanual", "kw":"Step 3: Create a Security Group,Configuring a VPC for ECSs That Do Not Require Internet Access,User ", "title":"Step 3: Create a Security Group", @@ -252,7 +272,7 @@ { "uri":"vpc_qs_0008.html", "product_code":"vpc", - "code":"26", + "code":"28", "des":"A security group is a collection of access control rules for cloud resources, such as cloud servers, containers, and databases, to control inbound and outbound traffic. C", "doc_type":"usermanual", "kw":"Step 4: Add a Security Group Rule,Configuring a VPC for ECSs That Do Not Require Internet Access,Use", @@ -262,7 +282,7 @@ { "uri":"en-us_topic_0017816228.html", "product_code":"vpc", - "code":"27", + "code":"29", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Configuring a VPC for ECSs That Access the Internet Using EIPs", @@ -272,7 +292,7 @@ { "uri":"vpc_qs_0022.html", "product_code":"vpc", - "code":"28", + "code":"30", "des":"If your ECSs need to access the Internet (for example, the ECSs functioning as the service nodes for deploying a website), you can follow the procedure shown in Figure 1 ", "doc_type":"usermanual", "kw":"Overview,Configuring a VPC for ECSs That Access the Internet Using EIPs,User Guide", @@ -282,7 +302,7 @@ { "uri":"vpc_qs_0009.html", "product_code":"vpc", - "code":"29", + "code":"31", "des":"A VPC provides an isolated virtual network for ECSs. You can configure and manage the network as required.You can create a VPC by following the procedure provided in this", "doc_type":"usermanual", "kw":"Step 1: Create a VPC,Configuring a VPC for ECSs That Access the Internet Using EIPs,User Guide", @@ -292,8 +312,8 @@ { "uri":"vpc_qs_0010.html", "product_code":"vpc", - "code":"30", - "des":"A VPC comes with a default subnet. If the default subnet cannot meet your requirements, you can create one.The subnet is configured with DHCP by default. When an ECS in t", + "code":"32", + "des":"A VPC comes with a default subnet. If the default subnet cannot meet your requirements, you can create one.A subnet is configured with DHCP by default. When an ECS in thi", "doc_type":"usermanual", "kw":"Step 2: Create a Subnet for the VPC,Configuring a VPC for ECSs That Access the Internet Using EIPs,U", "title":"Step 2: Create a Subnet for the VPC", @@ -302,8 +322,8 @@ { "uri":"vpc_qs_0011.html", "product_code":"vpc", - "code":"31", - "des":"You can assign an EIP and bind it to an ECS so that the ECS can access the Internet.EIPs for dedicated load balancers:In the eu-de region, if you choose to assign an EIP ", + "code":"33", + "des":"You can assign an EIP and bind it to an ECS so that the ECS can access the Internet.Note the following when you use EIPs of the Dedicated Load Balancer (5_gray) type:In e", "doc_type":"usermanual", "kw":"Step 3: Assign an EIP and Bind It to an ECS,Configuring a VPC for ECSs That Access the Internet Usin", "title":"Step 3: Assign an EIP and Bind It to an ECS", @@ -312,8 +332,8 @@ { "uri":"vpc_qs_0012.html", "product_code":"vpc", - "code":"32", - "des":"To improve ECS access security, you can create security groups, define security group rules, and add ECSs in a VPC to different security groups. We recommend that you all", + "code":"34", + "des":"You can create security groups and add ECSs in a VPC to different security groups to improve ECS access security. We recommend that you allocate ECSs that have different ", "doc_type":"usermanual", "kw":"Step 4: Create a Security Group,Configuring a VPC for ECSs That Access the Internet Using EIPs,User ", "title":"Step 4: Create a Security Group", @@ -322,137 +342,207 @@ { "uri":"vpc_qs_0013.html", "product_code":"vpc", - "code":"33", + "code":"35", "des":"A security group is a collection of access control rules for cloud resources, such as cloud servers, containers, and databases, to control inbound and outbound traffic. C", "doc_type":"usermanual", "kw":"Step 5: Add a Security Group Rule,Configuring a VPC for ECSs That Access the Internet Using EIPs,Use", "title":"Step 5: Add a Security Group Rule", "githuburl":"" }, - { - "uri":"vpc_newui_0000.html", - "product_code":"vpc", - "code":"34", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"usermanual", - "kw":"Operation Guide (New Console Edition)", - "title":"Operation Guide (New Console Edition)", - "githuburl":"" - }, { "uri":"en-us_topic_0030969460.html", "product_code":"vpc", - "code":"35", + "code":"36", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"VPC and Subnet", "title":"VPC and Subnet", "githuburl":"" }, + { + "uri":"vpc_0003.html", + "product_code":"vpc", + "code":"37", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"VPC", + "title":"VPC", + "githuburl":"" + }, { "uri":"en-us_topic_0013935842.html", "product_code":"vpc", - "code":"36", + "code":"38", "des":"A VPC provides an isolated virtual network for ECSs. You can configure and manage the network as required.You can create a VPC by following the procedure provided in this", "doc_type":"usermanual", - "kw":"Creating a VPC,VPC and Subnet,User Guide", + "kw":"Creating a VPC,VPC,User Guide", "title":"Creating a VPC", "githuburl":"" }, { "uri":"en-us_topic_0030969462.html", "product_code":"vpc", - "code":"37", + "code":"39", "des":"Change the VPC name and CIDR block.If the VPC CIDR block conflicts with the CIDR block of a VPN created in the VPC, you can modify its CIDR block.When modifying the VPC C", "doc_type":"usermanual", - "kw":"Modifying a VPC,VPC and Subnet,User Guide", + "kw":"Modifying a VPC,VPC,User Guide", "title":"Modifying a VPC", "githuburl":"" }, - { - "uri":"en-us_topic_0013748726.html", - "product_code":"vpc", - "code":"38", - "des":"A VPC comes with a default subnet. If the default subnet cannot meet your requirements, you can create one.The subnet is configured with DHCP by default. When an ECS in t", - "doc_type":"usermanual", - "kw":"Creating a Subnet for the VPC,VPC and Subnet,User Guide", - "title":"Creating a Subnet for the VPC", - "githuburl":"" - }, - { - "uri":"vpc_vpc_0001.html", - "product_code":"vpc", - "code":"39", - "des":"Modify the subnet name, NTP server address, and DNS server address.Log in to the management console.Click in the upper left corner and select the desired region and proj", - "doc_type":"usermanual", - "kw":"Modifying a Subnet,VPC and Subnet,User Guide", - "title":"Modifying a Subnet", - "githuburl":"" - }, - { - "uri":"vpc_vpc_0002.html", - "product_code":"vpc", - "code":"40", - "des":"You can delete a subnet to release network resources if the subnet is no longer required.You can delete a subnet only if there are no resources in the subnet. If there ar", - "doc_type":"usermanual", - "kw":"Deleting a Subnet,VPC and Subnet,User Guide", - "title":"Deleting a Subnet", - "githuburl":"" - }, { "uri":"vpc_vpc_0003.html", "product_code":"vpc", - "code":"41", - "des":"You can delete a VPC if the VPC is no longer required.You can delete a VPC only if there are no resources in the VPC. If there are resources in the VPC, you must delete t", + "code":"40", + "des":"This section describes how to delete a VPC.If you want to delete a VPC that has subnets, custom routes, or other resources, you need to delete these resources as prompted", "doc_type":"usermanual", - "kw":"Deleting a VPC,VPC and Subnet,User Guide", + "kw":"Deleting a VPC,VPC,User Guide", "title":"Deleting a VPC", "githuburl":"" }, { "uri":"vpc_vpc_0004.html", "product_code":"vpc", - "code":"42", + "code":"41", "des":"A VPC tag identifies a VPC. Tags can be added to VPCs to facilitate VPC identification and management. You can add a tag to a VPC when creating the VPC, or you can add a ", "doc_type":"usermanual", - "kw":"Managing VPC Tags,VPC and Subnet,User Guide", + "kw":"Managing VPC Tags,VPC,User Guide", "title":"Managing VPC Tags", "githuburl":"" }, - { - "uri":"vpc_vpc_0005.html", - "product_code":"vpc", - "code":"43", - "des":"A subnet tag identifies a subnet. Tags can be added to subnets to facilitate subnet identification and administration. You can add a tag to a subnet when creating the sub", - "doc_type":"usermanual", - "kw":"Managing Subnet Tags,VPC and Subnet,User Guide", - "title":"Managing Subnet Tags", - "githuburl":"" - }, { "uri":"vpc_vpc_0006.html", "product_code":"vpc", - "code":"44", + "code":"42", "des":"Information about all VPCs under your account can be exported as an Excel file to a local directory. This file records the names, ID, status, IP address ranges of VPCs, a", "doc_type":"usermanual", - "kw":"Exporting VPC List,VPC and Subnet,User Guide", + "kw":"Exporting VPC List,VPC,User Guide", "title":"Exporting VPC List", "githuburl":"" }, + { + "uri":"vpc_vpc_0013.html", + "product_code":"vpc", + "code":"43", + "des":"This section describes how to view and obtain a VPC ID.If you want to obtain the ID of the peer VPC when you create a VPC peering connection between two VPCs from differe", + "doc_type":"usermanual", + "kw":"Obtaining a VPC ID,VPC,User Guide", + "title":"Obtaining a VPC ID", + "githuburl":"" + }, + { + "uri":"vpc_vpc_0009.html", + "product_code":"vpc", + "code":"44", + "des":"This section describes how to view the topology of a VPC. The topology displays the subnets in a VPC and the ECSs in the subnets.Log in to the management console.Click i", + "doc_type":"usermanual", + "kw":"Viewing a VPC Topology,VPC,User Guide", + "title":"Viewing a VPC Topology", + "githuburl":"" + }, + { + "uri":"vpc_0004.html", + "product_code":"vpc", + "code":"45", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Subnet", + "title":"Subnet", + "githuburl":"" + }, + { + "uri":"en-us_topic_0013748726.html", + "product_code":"vpc", + "code":"46", + "des":"A VPC comes with a default subnet. If the default subnet cannot meet your requirements, you can create one.A subnet is configured with DHCP by default. When an ECS in thi", + "doc_type":"usermanual", + "kw":"Creating a Subnet for the VPC,Subnet,User Guide", + "title":"Creating a Subnet for the VPC", + "githuburl":"" + }, + { + "uri":"vpc_vpc_0001.html", + "product_code":"vpc", + "code":"47", + "des":"Modify the subnet name, NTP server address, and DNS server address.Log in to the management console.Click in the upper left corner and select the desired region and proj", + "doc_type":"usermanual", + "kw":"Modifying a Subnet,Subnet,User Guide", + "title":"Modifying a Subnet", + "githuburl":"" + }, + { + "uri":"vpc_vpc_0005.html", + "product_code":"vpc", + "code":"48", + "des":"A subnet tag identifies a subnet. Tags can be added to subnets to facilitate subnet identification and administration. You can add a tag to a subnet when creating the sub", + "doc_type":"usermanual", + "kw":"Managing Subnet Tags,Subnet,User Guide", + "title":"Managing Subnet Tags", + "githuburl":"" + }, + { + "uri":"vpc_vpc_0010.html", + "product_code":"vpc", + "code":"49", + "des":"Information about all subnets under your account can be exported as an Excel file to a local directory. This file records the name, ID, VPC, CIDR block, and associated ro", + "doc_type":"usermanual", + "kw":"Exporting Subnet List,Subnet,User Guide", + "title":"Exporting Subnet List", + "githuburl":"" + }, + { + "uri":"vpc_vpc_0011.html", + "product_code":"vpc", + "code":"50", + "des":"VPC subnets have private IP addresses used by cloud resources. This section describes how to view resources that are using private IP addresses of subnets. If these resou", + "doc_type":"usermanual", + "kw":"Viewing and Deleting Resources in a Subnet,Subnet,User Guide", + "title":"Viewing and Deleting Resources in a Subnet", + "githuburl":"" + }, + { + "uri":"vpc_vpc_0012.html", + "product_code":"vpc", + "code":"51", + "des":"A subnet is an IP address range in a VPC. This section describes how to view the used IP addresses in a subnet.Virtual IP addressesPrivate IP addressesUsed by the subnet ", + "doc_type":"usermanual", + "kw":"Viewing IP Addresses in a Subnet,Subnet,User Guide", + "title":"Viewing IP Addresses in a Subnet", + "githuburl":"" + }, + { + "uri":"vpc_vpc_0002.html", + "product_code":"vpc", + "code":"52", + "des":"This section describes how to delete a subnet.If you want to delete a subnet that has custom routes, virtual IP addresses, or other resources, you need to delete these re", + "doc_type":"usermanual", + "kw":"Deleting a Subnet,Subnet,User Guide", + "title":"Deleting a Subnet", + "githuburl":"" + }, { "uri":"vpc_SecurityGroup_0000.html", "product_code":"vpc", - "code":"45", + "code":"53", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Security", "title":"Security", "githuburl":"" }, + { + "uri":"en-us_topic_0052003963.html", + "product_code":"vpc", + "code":"54", + "des":"You can configure security groups and firewall to increase the security of ECSs in your VPC.Security groups operate at the ECS level.firewalls protect associated subnets ", + "doc_type":"usermanual", + "kw":"Differences Between Security Groups and Firewalls,Security,User Guide", + "title":"Differences Between Security Groups and Firewalls", + "githuburl":"" + }, { "uri":"vpc_SecurityGroup_0001.html", "product_code":"vpc", - "code":"46", + "code":"55", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Security Group", @@ -462,7 +552,7 @@ { "uri":"en-us_topic_0073379079.html", "product_code":"vpc", - "code":"47", + "code":"56", "des":"A security group is a collection of access control rules for cloud resources, such as cloud servers, containers, and databases, that have the same security protection req", "doc_type":"usermanual", "kw":"Security Group Overview,Security Group,User Guide", @@ -472,8 +562,8 @@ { "uri":"SecurityGroup_0003.html", "product_code":"vpc", - "code":"48", - "des":"Your account automatically comes with a default security group. The default security group allows all outbound traffic, denies all inbound traffic, and allows all traffic", + "code":"57", + "des":"The system creates a default security group for each account. By default, the default security group rules:Allow all outbound packets: Instances in the default security g", "doc_type":"usermanual", "kw":"Default Security Groups and Security Group Rules,Security Group,User Guide", "title":"Default Security Groups and Security Group Rules", @@ -482,7 +572,7 @@ { "uri":"en-us_topic_0081124350.html", "product_code":"vpc", - "code":"49", + "code":"58", "des":"Common security group configurations are presented here. The examples in this section allow all outgoing data packets by default. This section will only describe how to c", "doc_type":"usermanual", "kw":"Security Group Configuration Examples,Security Group,User Guide", @@ -492,8 +582,8 @@ { "uri":"en-us_topic_0013748715.html", "product_code":"vpc", - "code":"50", - "des":"To improve ECS access security, you can create security groups, define security group rules, and add ECSs in a VPC to different security groups. We recommend that you all", + "code":"59", + "des":"You can create security groups and add ECSs in a VPC to different security groups to improve ECS access security. We recommend that you allocate ECSs that have different ", "doc_type":"usermanual", "kw":"Creating a Security Group,Security Group,User Guide", "title":"Creating a Security Group", @@ -502,7 +592,7 @@ { "uri":"en-us_topic_0030969470.html", "product_code":"vpc", - "code":"51", + "code":"60", "des":"A security group is a collection of access control rules for cloud resources, such as cloud servers, containers, and databases, to control inbound and outbound traffic. C", "doc_type":"usermanual", "kw":"Adding a Security Group Rule,Security Group,User Guide", @@ -512,7 +602,7 @@ { "uri":"SecurityGroup_0004.html", "product_code":"vpc", - "code":"52", + "code":"61", "des":"You can add multiple security group rules with different protocols and ports at the same time.Log in to the management console.Click in the upper left corner and select ", "doc_type":"usermanual", "kw":"Fast-Adding Security Group Rules,Security Group,User Guide", @@ -522,7 +612,7 @@ { "uri":"vpc_SecurityGroup_0004.html", "product_code":"vpc", - "code":"53", + "code":"62", "des":"Replicate an existing security group rule to generate a new rule. When replicating a security group rule, you can make changes so that it is not a perfect copy.Log in to ", "doc_type":"usermanual", "kw":"Replicating a Security Group Rule,Security Group,User Guide", @@ -532,8 +622,8 @@ { "uri":"vpc_SecurityGroup_0005.html", "product_code":"vpc", - "code":"54", - "des":"You can modify the port, protocol, and IP address of a security group rule to meet your specific requirements.Log in to the management console.Click in the upper left co", + "code":"63", + "des":"You can modify the port, protocol, and IP address of your security group rules as required to ensure the security of your instances.Log in to the management console.Click", "doc_type":"usermanual", "kw":"Modifying a Security Group Rule,Security Group,User Guide", "title":"Modifying a Security Group Rule", @@ -542,7 +632,7 @@ { "uri":"vpc_SecurityGroup_0006.html", "product_code":"vpc", - "code":"55", + "code":"64", "des":"If the source of an inbound security group rule or destination of an outbound security group rule needs to be changed, you need to first delete the security group rule an", "doc_type":"usermanual", "kw":"Deleting a Security Group Rule,Security Group,User Guide", @@ -552,8 +642,8 @@ { "uri":"vpc_SecurityGroup_0007.html", "product_code":"vpc", - "code":"56", - "des":"If you want to quickly apply the rules of one security group to another, or if you want to modify multiple rules of the current security group at once, you can import or ", + "code":"65", + "des":"If you want to quickly create or restore security group rules, you can import existing rules to the security group.If you want to back up security group rules locally, yo", "doc_type":"usermanual", "kw":"Importing and Exporting Security Group Rules,Security Group,User Guide", "title":"Importing and Exporting Security Group Rules", @@ -562,8 +652,8 @@ { "uri":"vpc_SecurityGroup_0008.html", "product_code":"vpc", - "code":"57", - "des":"This section describes how to delete security groups that you are no longer required.The default security group cannot be deleted.If a security group is associated with r", + "code":"66", + "des":"This section describes how to delete security groups.The default security group is named default and cannot be deleted.A security group cannot be deleted if it is being u", "doc_type":"usermanual", "kw":"Deleting a Security Group,Security Group,User Guide", "title":"Deleting a Security Group", @@ -572,17 +662,27 @@ { "uri":"SecurityGroup_0017.html", "product_code":"vpc", - "code":"58", + "code":"67", "des":"After a security group is created, you can add instances to the security group to protect the instances. You can also remove them from the security group as required.You ", "doc_type":"usermanual", "kw":"Adding Instances to and Removing Them from a Security Group,Security Group,User Guide", "title":"Adding Instances to and Removing Them from a Security Group", "githuburl":"" }, + { + "uri":"vpc_SecurityGroup_0009.html", + "product_code":"vpc", + "code":"68", + "des":"You can clone a security group from one region to another to quickly apply the security group rules to ECSs in another region.You can clone a security group in the follow", + "doc_type":"usermanual", + "kw":"Cloning a Security Group,Security Group,User Guide", + "title":"Cloning a Security Group", + "githuburl":"" + }, { "uri":"vpc_SecurityGroup_0010.html", "product_code":"vpc", - "code":"59", + "code":"69", "des":"Modify the name and description of a created security group.Method 1Log in to the management console.Click in the upper left corner and select the desired region and pro", "doc_type":"usermanual", "kw":"Modifying a Security Group,Security Group,User Guide", @@ -592,7 +692,7 @@ { "uri":"vpc_SecurityGroup_0011.html", "product_code":"vpc", - "code":"60", + "code":"70", "des":"View inbound and outbound rules of a security group used by an ECS.Log in to the management console.Click in the upper left corner and select the desired region and proj", "doc_type":"usermanual", "kw":"Viewing the Security Group of an ECS,Security Group,User Guide", @@ -602,7 +702,7 @@ { "uri":"SecurityGroup_0006.html", "product_code":"vpc", - "code":"61", + "code":"71", "des":"Change the security group associated with an ECS NIC.Log in to the management console.Click in the upper left corner and select your region and project.Under Computing, ", "doc_type":"usermanual", "kw":"Changing the Security Group of an ECS,Security Group,User Guide", @@ -612,7 +712,7 @@ { "uri":"vpc_acl_0000.html", "product_code":"vpc", - "code":"62", + "code":"72", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Firewall", @@ -622,7 +722,7 @@ { "uri":"acl_0001.html", "product_code":"vpc", - "code":"63", + "code":"73", "des":"A firewall is an optional layer of security for your subnets. After you associate one or more subnets with a firewall, you can control traffic in and out of the subnets.F", "doc_type":"usermanual", "kw":"Firewall Overview,Firewall,User Guide", @@ -632,7 +732,7 @@ { "uri":"acl_0002.html", "product_code":"vpc", - "code":"64", + "code":"74", "des":"This section provides examples for configuring firewalls.Denying Access from a Specific PortAllowing Access from Specific Ports and ProtocolsYou might want to block TCP 4", "doc_type":"usermanual", "kw":"Firewall Configuration Examples,Firewall,User Guide", @@ -642,8 +742,8 @@ { "uri":"en-us_topic_0051746698.html", "product_code":"vpc", - "code":"65", - "des":"You can create a custom firewall, but any newly created firewall will be disabled by default. It will not have any inbound or outbound rules, or have any subnets associat", + "code":"75", + "des":"You can create a custom firewall. By default, a newly created firewall is disabled and has no inbound or outbound rules, or any subnets associated. Each user can create u", "doc_type":"usermanual", "kw":"Creating a Firewall,Firewall,User Guide", "title":"Creating a Firewall", @@ -652,7 +752,7 @@ { "uri":"en-us_topic_0051746702.html", "product_code":"vpc", - "code":"66", + "code":"76", "des":"Add an inbound or outbound rule based on your network security requirements.Log in to the management console.Click in the upper left corner and select the desired region", "doc_type":"usermanual", "kw":"Adding a Firewall Rule,Firewall,User Guide", @@ -662,8 +762,8 @@ { "uri":"en-us_topic_0051746700.html", "product_code":"vpc", - "code":"67", - "des":"On the page showing firewall details, associate desired subnets with a firewall. After a firewall is associated with a subnet, the firewall denies all traffic to and from", + "code":"77", + "des":"On the page showing firewall details, you can associate desired subnets with a firewall. After a firewall is associated with a subnet, the firewall denies all traffic to ", "doc_type":"usermanual", "kw":"Associating Subnets with a Firewall,Firewall,User Guide", "title":"Associating Subnets with a Firewall", @@ -672,8 +772,8 @@ { "uri":"vpc_acl_0003.html", "product_code":"vpc", - "code":"68", - "des":"Disassociate a subnet from a firewall when necessary.Log in to the management console.Click in the upper left corner and select the desired region and project.On the con", + "code":"78", + "des":"Disassociate a subnet from a firewall when necessary.Log in to the management console.Click in the upper left corner and select the desired region and project.Click in ", "doc_type":"usermanual", "kw":"Disassociating a Subnet from a Firewall,Firewall,User Guide", "title":"Disassociating a Subnet from a Firewall", @@ -682,7 +782,7 @@ { "uri":"vpc_acl_0004.html", "product_code":"vpc", - "code":"69", + "code":"79", "des":"If you need a rule to take effect before or after a specific rule, you can insert that rule before or after the specific rule.If multiple firewall rules conflict, only th", "doc_type":"usermanual", "kw":"Changing the Sequence of a Firewall Rule,Firewall,User Guide", @@ -692,7 +792,7 @@ { "uri":"vpc_acl_0005.html", "product_code":"vpc", - "code":"70", + "code":"80", "des":"Modify an inbound or outbound firewall rule based on your network security requirements.Log in to the management console.Click in the upper left corner and select the de", "doc_type":"usermanual", "kw":"Modifying a Firewall Rule,Firewall,User Guide", @@ -702,7 +802,7 @@ { "uri":"vpc_acl_0006.html", "product_code":"vpc", - "code":"71", + "code":"81", "des":"Enable or disable an inbound or outbound rule based on your network security requirements.Log in to the management console.Click in the upper left corner and select the ", "doc_type":"usermanual", "kw":"Enabling or Disabling a Firewall Rule,Firewall,User Guide", @@ -712,7 +812,7 @@ { "uri":"vpc_acl_0007.html", "product_code":"vpc", - "code":"72", + "code":"82", "des":"Delete an inbound or outbound rule based on your network security requirements.Log in to the management console.Click in the upper left corner and select the desired reg", "doc_type":"usermanual", "kw":"Deleting a Firewall Rule,Firewall,User Guide", @@ -722,8 +822,8 @@ { "uri":"vpc_acl_0009.html", "product_code":"vpc", - "code":"73", - "des":"View details about a firewall.Log in to the management console.Click in the upper left corner and select the desired region and project.On the console homepage, under Ne", + "code":"83", + "des":"View details about a firewall.Log in to the management console.Click in the upper left corner and select the desired region and project.Click in the upper left corner a", "doc_type":"usermanual", "kw":"Viewing a Firewall,Firewall,User Guide", "title":"Viewing a Firewall", @@ -732,8 +832,8 @@ { "uri":"vpc_acl_0010.html", "product_code":"vpc", - "code":"74", - "des":"Modify the name and description of a firewall.Log in to the management console.Click in the upper left corner and select the desired region and project.On the console ho", + "code":"84", + "des":"Modify the name and description of a firewall.Log in to the management console.Click in the upper left corner and select the desired region and project.Click in the upp", "doc_type":"usermanual", "kw":"Modifying a Firewall,Firewall,User Guide", "title":"Modifying a Firewall", @@ -742,7 +842,7 @@ { "uri":"vpc_acl_0011.html", "product_code":"vpc", - "code":"75", + "code":"85", "des":"After a firewall is created, you may need to enable it based on network security requirements. You can also disable an enabled firewall if need. Before enabling a firewal", "doc_type":"usermanual", "kw":"Enabling or Disabling a Firewall,Firewall,User Guide", @@ -752,77 +852,77 @@ { "uri":"vpc_acl_0012.html", "product_code":"vpc", - "code":"76", - "des":"Delete a firewall when it is no longer required.Log in to the management console.Click in the upper left corner and select the desired region and project.On the console ", + "code":"86", + "des":"Delete a firewall when it is no longer required.Log in to the management console.Click in the upper left corner and select the desired region and project.Click in the u", "doc_type":"usermanual", "kw":"Deleting a Firewall,Firewall,User Guide", "title":"Deleting a Firewall", "githuburl":"" }, - { - "uri":"en-us_topic_0052003963.html", - "product_code":"vpc", - "code":"77", - "des":"You can configure security groups and firewall to increase the security of ECSs in your VPC.Security groups operate at the ECS level.Firewalls operate at the subnet level", - "doc_type":"usermanual", - "kw":"Differences Between Security Groups and Firewalls,Security,User Guide", - "title":"Differences Between Security Groups and Firewalls", - "githuburl":"" - }, { "uri":"vpc_eip_0000.html", "product_code":"vpc", - "code":"78", + "code":"87", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", - "kw":"EIP", - "title":"EIP", + "kw":"Elastic IP", + "title":"Elastic IP", "githuburl":"" }, { "uri":"en-us_topic_0013748738.html", "product_code":"vpc", - "code":"79", - "des":"You can assign an EIP and bind it to an ECS so that the ECS can access the Internet.EIPs for dedicated load balancers:In the eu-de region, if you choose to assign an EIP ", + "code":"88", + "des":"You can assign an EIP and bind it to an ECS so that the ECS can access the Internet.Note the following when you use EIPs of the Dedicated Load Balancer (5_gray) type:In e", "doc_type":"usermanual", - "kw":"Assigning an EIP and Binding It to an ECS,EIP,User Guide", + "kw":"Assigning an EIP and Binding It to an ECS,Elastic IP,User Guide", "title":"Assigning an EIP and Binding It to an ECS", "githuburl":"" }, { "uri":"vpc_eip_0001.html", "product_code":"vpc", - "code":"80", - "des":"If you no longer need an EIP, unbind it from the ECS and release the EIP to avoid wasting network resources.EIP assigned together with your load balancers will also be di", + "code":"89", + "des":"If you no longer need an EIP, unbind it from the ECS and release the EIP to avoid wasting network resources.In eu-de, EIPs of the Dedicated Load Balancer (5_gray) type ca", "doc_type":"usermanual", - "kw":"Unbinding an EIP from an ECS and Releasing the EIP,EIP,User Guide", + "kw":"Unbinding an EIP from an ECS and Releasing the EIP,Elastic IP,User Guide", "title":"Unbinding an EIP from an ECS and Releasing the EIP", "githuburl":"" }, - { - "uri":"en-us_topic_0068145818.html", - "product_code":"vpc", - "code":"81", - "des":"Tags can be added to EIPs to facilitate EIP identification and administration. You can add a tag to an EIP when assigning the EIP. Alternatively, you can add a tag to an ", - "doc_type":"usermanual", - "kw":"Managing EIP Tags,EIP,User Guide", - "title":"Managing EIP Tags", - "githuburl":"" - }, { "uri":"en-us_topic_0013748743.html", "product_code":"vpc", - "code":"82", + "code":"90", "des":"Modify the EIP bandwidth name or size.This section describes how to modify the dedicated bandwidth or shared bandwidth of an EIP. For details about how to modify a shared", "doc_type":"usermanual", - "kw":"Modifying an EIP Bandwidth,EIP,User Guide", + "kw":"Modifying an EIP Bandwidth,Elastic IP,User Guide", "title":"Modifying an EIP Bandwidth", "githuburl":"" }, + { + "uri":"eip_0003.html", + "product_code":"vpc", + "code":"91", + "des":"The information of all EIPs under your account can be exported in an Excel file to a local directory. The file records the ID, status, type, bandwidth name, and bandwidth", + "doc_type":"usermanual", + "kw":"Exporting EIP Information,Elastic IP,User Guide", + "title":"Exporting EIP Information", + "githuburl":"" + }, + { + "uri":"en-us_topic_0068145818.html", + "product_code":"vpc", + "code":"92", + "des":"Tags can be added to EIPs to facilitate EIP identification and administration. You can add a tag to an EIP when assigning the EIP. Alternatively, you can add a tag to an ", + "doc_type":"usermanual", + "kw":"Managing EIP Tags,Elastic IP,User Guide", + "title":"Managing EIP Tags", + "githuburl":"" + }, { "uri":"vpc010003.html", "product_code":"vpc", - "code":"83", + "code":"93", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Shared Bandwidth", @@ -832,8 +932,8 @@ { "uri":"vpc010004.html", "product_code":"vpc", - "code":"84", - "des":"Shared bandwidth allows multiple EIPs to share the same bandwidth. All ECSs, BMSs, and load balancers that have EIPs bound in the same region can share a bandwidth.When y", + "code":"94", + "des":"A shared bandwidth can be shared by multiple EIPs and controls the data transfer rate on these EIPs in a centralized manner. All ECSs, BMSs, and load balancers that have ", "doc_type":"usermanual", "kw":"Shared Bandwidth Overview,Shared Bandwidth,User Guide", "title":"Shared Bandwidth Overview", @@ -842,8 +942,8 @@ { "uri":"vpc010005.html", "product_code":"vpc", - "code":"85", - "des":"Assign a shared bandwidth for use with EIPs.Log in to the management console.Click in the upper left corner and select the desired region and project.On the console home", + "code":"95", + "des":"Assign a shared bandwidth for use with EIPs.Log in to the management console.Click in the upper left corner and select the desired region and project.Click in the upper", "doc_type":"usermanual", "kw":"Assigning a Shared Bandwidth,Shared Bandwidth,User Guide", "title":"Assigning a Shared Bandwidth", @@ -852,7 +952,7 @@ { "uri":"vpc010006.html", "product_code":"vpc", - "code":"86", + "code":"96", "des":"Add EIPs to a shared bandwidth and the EIPs can then share that bandwidth. You can add multiple EIPs to a shared bandwidth at the same time.After an EIP is added to a sha", "doc_type":"usermanual", "kw":"Adding EIPs to a Shared Bandwidth,Shared Bandwidth,User Guide", @@ -862,7 +962,7 @@ { "uri":"vpc010007.html", "product_code":"vpc", - "code":"87", + "code":"97", "des":"Remove EIPs that are no longer required from a shared bandwidth if needed.Log in to the management console.Click in the upper left corner and select the desired region a", "doc_type":"usermanual", "kw":"Removing EIPs from a Shared Bandwidth,Shared Bandwidth,User Guide", @@ -872,7 +972,7 @@ { "uri":"vpc010008.html", "product_code":"vpc", - "code":"88", + "code":"98", "des":"You can modify the name and size of a shared bandwidth as required.Log in to the management console.Click in the upper left corner and select the desired region and proj", "doc_type":"usermanual", "kw":"Modifying a Shared Bandwidth,Shared Bandwidth,User Guide", @@ -882,7 +982,7 @@ { "uri":"vpc010009.html", "product_code":"vpc", - "code":"89", + "code":"99", "des":"Delete a shared bandwidth when it is no longer required.Before deleting a shared bandwidth, remove all the EIPs associated with it. For details, see Removing EIPs from a ", "doc_type":"usermanual", "kw":"Deleting a Shared Bandwidth,Shared Bandwidth,User Guide", @@ -890,139 +990,149 @@ "githuburl":"" }, { - "uri":"vpc_route_0000.html", + "uri":"vpc_route01_0000.html", "product_code":"vpc", - "code":"90", + "code":"100", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", - "kw":"Route Table", - "title":"Route Table", + "kw":"Route Tables", + "title":"Route Tables", "githuburl":"" }, { - "uri":"route_0001.html", + "uri":"vpc_route01_0001.html", "product_code":"vpc", - "code":"91", - "des":"A custom route is a user-defined routing rule added to a VPC.A route table contains a set of routes that are used to determine where network traffic from your subnets in ", + "code":"101", + "des":"A route table contains a set of routes that are used to determine where network traffic from your subnets in a VPC is directed. Each subnet must be associated with a rout", "doc_type":"usermanual", - "kw":"Route Table Overview,Route Table,User Guide", + "kw":"Route Table Overview,Route Tables,User Guide", "title":"Route Table Overview", "githuburl":"" }, + { + "uri":"vpc_route01_0005.html", + "product_code":"vpc", + "code":"102", + "des":"If your default route table cannot meet your service requirements, you can create a custom route table by following the instructions provided in this section.Each VPC can", + "doc_type":"usermanual", + "kw":"Creating a Custom Route Table,Route Tables,User Guide", + "title":"Creating a Custom Route Table", + "githuburl":"" + }, + { + "uri":"vpc_route01_0007.html", + "product_code":"vpc", + "code":"103", + "des":"After a route table is associated with a subnet, its routes control the routing for the subnet and apply to all cloud resources in the subnet.A subnet can only be associa", + "doc_type":"usermanual", + "kw":"Associating a Route Table with a Subnet,Route Tables,User Guide", + "title":"Associating a Route Table with a Subnet", + "githuburl":"" + }, + { + "uri":"vpc_route01_0008.html", + "product_code":"vpc", + "code":"104", + "des":"You can change the route table for a subnet. If the route table for a subnet is changed, routes in the new route table will apply to all cloud resources in the subnet.Log", + "doc_type":"usermanual", + "kw":"Changing the Route Table Associated with a Subnet,Route Tables,User Guide", + "title":"Changing the Route Table Associated with a Subnet", + "githuburl":"" + }, + { + "uri":"vpc_route01_0015.html", + "product_code":"vpc", + "code":"105", + "des":"This section describes how to view the route table associated with a subnet.Log in to the management console.Click in the upper left corner and select the desired region", + "doc_type":"usermanual", + "kw":"Viewing the Route Table Associated with a Subnet,Route Tables,User Guide", + "title":"Viewing the Route Table Associated with a Subnet", + "githuburl":"" + }, + { + "uri":"vpc_route01_0009.html", + "product_code":"vpc", + "code":"106", + "des":"This section describes how to view detailed information about a route table, including:Basic information, such as name, type (default or custom), and ID of the route tabl", + "doc_type":"usermanual", + "kw":"Viewing Route Table Information,Route Tables,User Guide", + "title":"Viewing Route Table Information", + "githuburl":"" + }, + { + "uri":"vpc_route01_0014.html", + "product_code":"vpc", + "code":"107", + "des":"Information about all route tables under your account can be exported as an Excel file to a local directory. This file records the name, ID, VPC, type, and number of asso", + "doc_type":"usermanual", + "kw":"Exporting Route Table Information,Route Tables,User Guide", + "title":"Exporting Route Table Information", + "githuburl":"" + }, + { + "uri":"vpc_route01_0010.html", + "product_code":"vpc", + "code":"108", + "des":"This section describes how to delete a custom route table.The default route table cannot be deleted.A custom route table with a subnet associated cannot be deleted direct", + "doc_type":"usermanual", + "kw":"Deleting a Route Table,Route Tables,User Guide", + "title":"Deleting a Route Table", + "githuburl":"" + }, + { + "uri":"vpc_route01_0006.html", + "product_code":"vpc", + "code":"109", + "des":"Each route table contains a default system route, which indicates that ECSs in a VPC can communicate with each other. You can also add custom routes as required to forwar", + "doc_type":"usermanual", + "kw":"Adding a Custom Route,Route Tables,User Guide", + "title":"Adding a Custom Route", + "githuburl":"" + }, + { + "uri":"vpc_route01_0011.html", + "product_code":"vpc", + "code":"110", + "des":"This section describes how to modify a custom route in a route table.System routes cannot be modified.When you create a VPC endpoint, VPN or Direct Connect connection, th", + "doc_type":"usermanual", + "kw":"Modifying a Route,Route Tables,User Guide", + "title":"Modifying a Route", + "githuburl":"" + }, + { + "uri":"vpc_route01_0013.html", + "product_code":"vpc", + "code":"111", + "des":"This section describes how to replicate routes among all route tables of a VPC. VPC route tables include the default and custom route tables.Table 1 shows whether routes ", + "doc_type":"usermanual", + "kw":"Replicating a Route,Route Tables,User Guide", + "title":"Replicating a Route", + "githuburl":"" + }, + { + "uri":"vpc_route01_0012.html", + "product_code":"vpc", + "code":"112", + "des":"This section describes how to delete a custom route from a route table.System routes cannot be deleted.The routes automatically delivered by VPN or Direct Connect to the ", + "doc_type":"usermanual", + "kw":"Deleting a Route,Route Tables,User Guide", + "title":"Deleting a Route", + "githuburl":"" + }, { "uri":"vpc_route_0004.html", "product_code":"vpc", - "code":"92", - "des":"To use the route table function provided by the VPC service, you need to configure SNAT on an ECS to enable other ECSs that do not have EIPs bound in a VPC to access the ", + "code":"113", + "des":"Together with VPC route tables, you can configure SNAT on an ECS to enable other ECSs that have no EIPs bound in the same VPC to access the Internet through this ECS.The ", "doc_type":"usermanual", - "kw":"Configuring an SNAT Server,Route Table,User Guide", + "kw":"Configuring an SNAT Server,Route Tables,User Guide", "title":"Configuring an SNAT Server", "githuburl":"" }, - { - "uri":"vpc_route_0005.html", - "product_code":"vpc", - "code":"93", - "des":"You can create a custom route table if you do not want to use the default one.Log in to the management console.Click in the upper left corner and select the desired regi", - "doc_type":"usermanual", - "kw":"Creating a Custom Route Table,Route Table,User Guide", - "title":"Creating a Custom Route Table", - "githuburl":"" - }, - { - "uri":"vpc_route_0006.html", - "product_code":"vpc", - "code":"94", - "des":"Each route table contains a default system route, which indicates that ECSs in a VPC can communicate with each other. You can add custom routes as required to forward the", - "doc_type":"usermanual", - "kw":"Adding a Custom Route,Route Table,User Guide", - "title":"Adding a Custom Route", - "githuburl":"" - }, - { - "uri":"vpc_route_0007.html", - "product_code":"vpc", - "code":"95", - "des":"After a route table is associated with a subnet, the routes in the route table control the routing for the subnet and apply to all cloud resources in the subnet. Determin", - "doc_type":"usermanual", - "kw":"Associating a Subnet with a Route Table,Route Table,User Guide", - "title":"Associating a Subnet with a Route Table", - "githuburl":"" - }, - { - "uri":"vpc_route_0008.html", - "product_code":"vpc", - "code":"96", - "des":"You can change the route table associated with the subnet to another one in the VPC. If the route table for a subnet is changed, routes in the new route table will apply ", - "doc_type":"usermanual", - "kw":"Changing the Route Table Associated with a Subnet,Route Table,User Guide", - "title":"Changing the Route Table Associated with a Subnet", - "githuburl":"" - }, - { - "uri":"vpc_route_0009.html", - "product_code":"vpc", - "code":"97", - "des":"You can view details about a route table.Log in to the management console.Click in the upper left corner and select the desired region and project.On the console homepag", - "doc_type":"usermanual", - "kw":"Viewing a Route Table,Route Table,User Guide", - "title":"Viewing a Route Table", - "githuburl":"" - }, - { - "uri":"vpc_route_0010.html", - "product_code":"vpc", - "code":"98", - "des":"You can delete custom route tables but cannot delete the default route table.Before deleting a route table, ensure that no subnet has been associated with the custom rout", - "doc_type":"usermanual", - "kw":"Deleting a Route Table,Route Table,User Guide", - "title":"Deleting a Route Table", - "githuburl":"" - }, - { - "uri":"vpc_route_0011.html", - "product_code":"vpc", - "code":"99", - "des":"Modify a route.The system route cannot be modified.The routes delivered by the VPN, Direct Connect services to the default route table cannot be modified.Log in to the ma", - "doc_type":"usermanual", - "kw":"Modifying a Route,Route Table,User Guide", - "title":"Modifying a Route", - "githuburl":"" - }, - { - "uri":"vpc_route_0012.html", - "product_code":"vpc", - "code":"100", - "des":"Delete a route if it is no longer required.Log in to the management console.Click in the upper left corner and select the desired region and project.On the console homep", - "doc_type":"usermanual", - "kw":"Deleting a Route,Route Table,User Guide", - "title":"Deleting a Route", - "githuburl":"" - }, - { - "uri":"vpc_route_0013.html", - "product_code":"vpc", - "code":"101", - "des":"You can replicate a created route as required.The routes delivered by the VPN service to the default route table cannot be replicated.The routes delivered to the default ", - "doc_type":"usermanual", - "kw":"Replicating a Route,Route Table,User Guide", - "title":"Replicating a Route", - "githuburl":"" - }, - { - "uri":"vpc_route_0014.html", - "product_code":"vpc", - "code":"102", - "des":"Information about all route tables under your account can be exported as an Excel file to a local directory. This file records the name, ID, VPC, type, and number of asso", - "doc_type":"usermanual", - "kw":"Exporting Route Table Information,Route Table,User Guide", - "title":"Exporting Route Table Information", - "githuburl":"" - }, { "uri":"vpc_peering_0000.html", "product_code":"vpc", - "code":"103", + "code":"114", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"VPC Peering Connection", @@ -1032,28 +1142,28 @@ { "uri":"en-us_topic_0046655036.html", "product_code":"vpc", - "code":"104", - "des":"A VPC peering connection is a network connection between two VPCs in one region that enables you to route traffic between them using private IP addresses. ECSs in either ", + "code":"115", + "des":"A VPC peering connection is a networking connection between two VPCs and enables them to communicate using private IP addresses. The VPCs to be peered can be in the same ", "doc_type":"usermanual", - "kw":"VPC Peering Connection Creation Procedure,VPC Peering Connection,User Guide", - "title":"VPC Peering Connection Creation Procedure", + "kw":"VPC Peering Connection Overview,VPC Peering Connection,User Guide", + "title":"VPC Peering Connection Overview", "githuburl":"" }, { "uri":"en-us_topic_0046809840.html", "product_code":"vpc", - "code":"105", - "des":"To enable two VPCs in the same region to communicate with each other, you can create a VPC peering connection between them. The VPC and subnet CIDR blocks must meet the r", + "code":"116", + "des":"A VPC peering connection is a networking connection between two VPCs and enables them to communicate. Table 1 lists different scenarios of using VPC peering connections.T", "doc_type":"usermanual", - "kw":"VPC Peering Connection Configuration Plans,VPC Peering Connection,User Guide", - "title":"VPC Peering Connection Configuration Plans", + "kw":"VPC Peering Connection Usage Examples,VPC Peering Connection,User Guide", + "title":"VPC Peering Connection Usage Examples", "githuburl":"" }, { "uri":"en-us_topic_0046655037.html", "product_code":"vpc", - "code":"106", - "des":"To create a VPC peering connection, first create a request to peer with another VPC. You can request a VPC peering connection with another VPC in your account, but the tw", + "code":"117", + "des":"If two VPCs from the same region cannot communicate with each other, you can use a VPC peering connection. This section describes how to create a VPC peering connection b", "doc_type":"usermanual", "kw":"Creating a VPC Peering Connection with Another VPC in Your Account,VPC Peering Connection,User Guide", "title":"Creating a VPC Peering Connection with Another VPC in Your Account", @@ -1062,48 +1172,68 @@ { "uri":"en-us_topic_0046655038.html", "product_code":"vpc", - "code":"107", - "des":"The VPC service also allows you to create a VPC peering connection with a VPC in another account. The two VPCs must be in the same region. If you request a VPC peering co", + "code":"118", + "des":"If two VPCs from the same region cannot communicate with each other, you can use a VPC peering connection. This section describes how to create a VPC peering connection b", "doc_type":"usermanual", "kw":"Creating a VPC Peering Connection with a VPC in Another Account,VPC Peering Connection,User Guide", "title":"Creating a VPC Peering Connection with a VPC in Another Account", "githuburl":"" }, { - "uri":"vpc_peering_0001.html", + "uri":"vpc_peering_0005.html", "product_code":"vpc", - "code":"108", - "des":"The owners of both the local and peer accounts can view information about the created VPC peering connections and those that are still waiting to be accepted.Log in to th", + "code":"119", + "des":"If you create a VPC peering connection between two VPCs in different accounts, you can refer to this section to obtain the project ID of the region that the peer VPC resi", "doc_type":"usermanual", - "kw":"Viewing VPC Peering Connections,VPC Peering Connection,User Guide", - "title":"Viewing VPC Peering Connections", + "kw":"Obtaining the Peer Project ID of a VPC Peering Connection,VPC Peering Connection,User Guide", + "title":"Obtaining the Peer Project ID of a VPC Peering Connection", "githuburl":"" }, { "uri":"vpc_peering_0002.html", "product_code":"vpc", - "code":"109", - "des":"The owners of both the local and peer accounts can modify a VPC peering connection in any state. The VPC peering connection name can be changed.Log in to the management c", + "code":"120", + "des":"This section describes how to modify the name of a VPC peering connection.Either owner of a VPC in a peering connection can modify the VPC peering connection in any state", "doc_type":"usermanual", "kw":"Modifying a VPC Peering Connection,VPC Peering Connection,User Guide", "title":"Modifying a VPC Peering Connection", "githuburl":"" }, + { + "uri":"vpc_peering_0001.html", + "product_code":"vpc", + "code":"121", + "des":"This section describes how to view basic information about a VPC peering connection, including the connection name, status, and information about the local and peer VPCs.", + "doc_type":"usermanual", + "kw":"Viewing VPC Peering Connections,VPC Peering Connection,User Guide", + "title":"Viewing VPC Peering Connections", + "githuburl":"" + }, { "uri":"vpc_peering_0003.html", "product_code":"vpc", - "code":"110", - "des":"The owners of both the local and peer accounts can delete a VPC peering connection in any state. After a VPC peering connection is deleted, routes configured for the conn", + "code":"122", + "des":"This section describes how to delete a VPC peering connection.Either owner of a VPC in a peering connection can delete the VPC peering connection in any state.The owner o", "doc_type":"usermanual", "kw":"Deleting a VPC Peering Connection,VPC Peering Connection,User Guide", "title":"Deleting a VPC Peering Connection", "githuburl":"" }, + { + "uri":"vpc_peering_0007.html", + "product_code":"vpc", + "code":"123", + "des":"This section describes how to modify the routes added for a VPC peering connection in the route tables of the local and peer VPCs.Modifying Routes of a VPC Peering Connec", + "doc_type":"usermanual", + "kw":"Modifying Routes Configured for a VPC Peering Connection,VPC Peering Connection,User Guide", + "title":"Modifying Routes Configured for a VPC Peering Connection", + "githuburl":"" + }, { "uri":"vpc_peering_0004.html", "product_code":"vpc", - "code":"111", - "des":"After routes are added for a VPC peering connection, the owners of both the local and peer accounts can view information about the routes on the page showing details abou", + "code":"124", + "des":"This section describes how to view the routes added to the route tables of local and peer VPCs of a VPC peering connection.Viewing Routes of a VPC Peering Connection Betw", "doc_type":"usermanual", "kw":"Viewing Routes Configured for a VPC Peering Connection,VPC Peering Connection,User Guide", "title":"Viewing Routes Configured for a VPC Peering Connection", @@ -1112,17 +1242,17 @@ { "uri":"vpc_peering_0006.html", "product_code":"vpc", - "code":"112", - "des":"After routes are added for a VPC peering connection, the owners of both the local and peer accounts can delete the routes on the Route Tables page.Log in to the managemen", + "code":"125", + "des":"This section describes how to delete routes from the route tables of the local and peer VPCs connected by a VPC peering connection.Deleting Routes of a VPC Peering Connec", "doc_type":"usermanual", - "kw":"Deleting a VPC Peering Route,VPC Peering Connection,User Guide", - "title":"Deleting a VPC Peering Route", + "kw":"Deleting Routes Configured for a VPC Peering Connection,VPC Peering Connection,User Guide", + "title":"Deleting Routes Configured for a VPC Peering Connection", "githuburl":"" }, { "uri":"FlowLog_0001.html", "product_code":"vpc", - "code":"113", + "code":"126", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"VPC Flow Log", @@ -1132,7 +1262,7 @@ { "uri":"FlowLog_0002.html", "product_code":"vpc", - "code":"114", + "code":"127", "des":"A VPC flow log records information about the traffic going to and from a VPC. VPC flow logs help you monitor network traffic, analyze network attacks, and determine wheth", "doc_type":"usermanual", "kw":"VPC Flow Log Overview,VPC Flow Log,User Guide", @@ -1142,7 +1272,7 @@ { "uri":"FlowLog_0003.html", "product_code":"vpc", - "code":"115", + "code":"128", "des":"A VPC flow log records information about the traffic going to and from a VPC.Ensure that the following operations have been performed on the LTS console:Create a log grou", "doc_type":"usermanual", "kw":"Creating a VPC Flow Log,VPC Flow Log,User Guide", @@ -1152,7 +1282,7 @@ { "uri":"FlowLog_0004.html", "product_code":"vpc", - "code":"116", + "code":"129", "des":"View information about your flow log record.The capture window is approximately 10 minutes, which indicates that a flow log record will be generated every 10 minutes. Aft", "doc_type":"usermanual", "kw":"Viewing a VPC Flow Log,VPC Flow Log,User Guide", @@ -1162,7 +1292,7 @@ { "uri":"FlowLog_0006.html", "product_code":"vpc", - "code":"117", + "code":"130", "des":"After a VPC flow log is created, the VPC flow log is automatically enabled. If you do not need to record traffic data, you can disable the corresponding VPC flow log. The", "doc_type":"usermanual", "kw":"Enabling or Disabling VPC Flow Log,VPC Flow Log,User Guide", @@ -1172,7 +1302,7 @@ { "uri":"FlowLog_0005.html", "product_code":"vpc", - "code":"118", + "code":"131", "des":"Delete a VPC flow log that is not required. Deleting a VPC flow log will not delete the existing flow log records in LTS.If a NIC that uses a VPC flow log is deleted, the", "doc_type":"usermanual", "kw":"Deleting a VPC Flow Log,VPC Flow Log,User Guide", @@ -1182,17 +1312,17 @@ { "uri":"vpc_dc_0000.html", "product_code":"vpc", - "code":"119", + "code":"132", "des":"Direct Connect allows you to establish a dedicated network connection between your data center and the cloud platform. With Direct Connect, you can establish a private co", "doc_type":"usermanual", - "kw":"Direct Connect,Operation Guide (New Console Edition),User Guide", + "kw":"Direct Connect,User Guide", "title":"Direct Connect", "githuburl":"" }, { "uri":"vpc_vip_0000.html", "product_code":"vpc", - "code":"120", + "code":"133", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Virtual IP Address", @@ -1202,7 +1332,7 @@ { "uri":"vpc_vip_0001.html", "product_code":"vpc", - "code":"121", + "code":"134", "des":"A virtual IP address can be shared among multiple ECSs. An ECS can have both private and virtual IP addresses, and you can access the ECS through either IP address. A vir", "doc_type":"usermanual", "kw":"Virtual IP Address Overview,Virtual IP Address,User Guide", @@ -1212,7 +1342,7 @@ { "uri":"vpc_vip_0002.html", "product_code":"vpc", - "code":"122", + "code":"135", "des":"If an ECS requires a virtual IP address or if a virtual IP address needs to be reserved, you can assign a virtual IP address from the subnet.Log in to the management cons", "doc_type":"usermanual", "kw":"Assigning a Virtual IP Address,Virtual IP Address,User Guide", @@ -1222,7 +1352,7 @@ { "uri":"en-us_topic_0067802474.html", "product_code":"vpc", - "code":"123", + "code":"136", "des":"You can bind a virtual IP address to an EIP so that you can access the ECSs bound with the same virtual IP address from the Internet. These ECSs can work in the active/st", "doc_type":"usermanual", "kw":"Binding a Virtual IP Address to an EIP or ECS,Virtual IP Address,User Guide", @@ -1232,7 +1362,7 @@ { "uri":"vpc_vip_0003.html", "product_code":"vpc", - "code":"124", + "code":"137", "des":"This section describes how to bind a virtual IP address to an EIP.You have assigned an EIP.Log in to the management console.Click in the upper left corner and select the", "doc_type":"usermanual", "kw":"Binding a Virtual IP Address to an EIP,Virtual IP Address,User Guide", @@ -1242,7 +1372,7 @@ { "uri":"vpc_vip_0004.html", "product_code":"vpc", - "code":"125", + "code":"138", "des":"Configure the ECS networking based on Networking.Create a VPN.The VPN can be used to access the virtual IP address of the ECS.", "doc_type":"usermanual", "kw":"Using a VPN to Access a Virtual IP Address,Virtual IP Address,User Guide", @@ -1252,7 +1382,7 @@ { "uri":"vpc_vip_0005.html", "product_code":"vpc", - "code":"126", + "code":"139", "des":"Configure the ECS networking based on Networking.Create a Direct Connect connection.The created Direct Connect connection can be used to access the virtual IP address of ", "doc_type":"usermanual", "kw":"Using a Direct Connect Connection to Access the Virtual IP Address,Virtual IP Address,User Guide", @@ -1262,7 +1392,7 @@ { "uri":"vpc_vip_0006.html", "product_code":"vpc", - "code":"127", + "code":"140", "des":"Configure the ECS networking based on Networking.Create a VPC peering connection.You can access the virtual IP address of the ECS through the VPC peering connection.", "doc_type":"usermanual", "kw":"Using a VPC Peering Connection to Access the Virtual IP Address,Virtual IP Address,User Guide", @@ -1272,18 +1402,38 @@ { "uri":"vpc_vip_0008.html", "product_code":"vpc", - "code":"128", - "des":"Log in to the management console.Click in the upper left corner and select the desired region and project.Under Compute, click Elastic Cloud Server.In the ECS list, clic", + "code":"141", + "des":"Log in to the management console.Click in the upper left corner and select the desired region and project.Under Computing, click Elastic Cloud Server.In the ECS list, cl", "doc_type":"usermanual", "kw":"Disabling Source and Destination Check (HA Load Balancing Cluster Scenario),Virtual IP Address,User ", "title":"Disabling Source and Destination Check (HA Load Balancing Cluster Scenario)", "githuburl":"" }, + { + "uri":"vpc_vip_0010.html", + "product_code":"vpc", + "code":"142", + "des":"This section describes how to unbind a virtual IP address from an ECS.Log in to the management console.Click in the upper left corner and select the desired region and p", + "doc_type":"usermanual", + "kw":"Unbinding a Virtual IP Address from an Instance,Virtual IP Address,User Guide", + "title":"Unbinding a Virtual IP Address from an Instance", + "githuburl":"" + }, + { + "uri":"vpc_vip_0011.html", + "product_code":"vpc", + "code":"143", + "des":"This section describes how to unbind a virtual IP address from an EIP.Log in to the management console.Click in the upper left corner and select the desired region and p", + "doc_type":"usermanual", + "kw":"Unbinding a Virtual IP Address from an EIP,Virtual IP Address,User Guide", + "title":"Unbinding a Virtual IP Address from an EIP", + "githuburl":"" + }, { "uri":"vpc_vip_0009.html", "product_code":"vpc", - "code":"129", - "des":"If you no longer need a virtual IP address or a reserved virtual IP address, you can release it to avoid wasting resources.Before deleting a virtual IP address, ensure th", + "code":"144", + "des":"If you no longer need a virtual IP address or a reserved virtual IP address, you can release it to avoid wasting resources.If you want to release a virtual IP address tha", "doc_type":"usermanual", "kw":"Releasing a Virtual IP Address,Virtual IP Address,User Guide", "title":"Releasing a Virtual IP Address", @@ -1292,7 +1442,7 @@ { "uri":"vpc010011.html", "product_code":"vpc", - "code":"130", + "code":"145", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Monitoring", @@ -1302,7 +1452,7 @@ { "uri":"vpc010012.html", "product_code":"vpc", - "code":"131", + "code":"146", "des":"This section describes the namespace, list, and measurement dimensions of EIP and bandwidth metrics that you can check on Cloud Eye. You can use APIs or the Cloud Eye con", "doc_type":"usermanual", "kw":"Supported Metrics,Monitoring,User Guide", @@ -1312,8 +1462,8 @@ { "uri":"vpc010013.html", "product_code":"vpc", - "code":"132", - "des":"View related metrics to see bandwidth and EIP usage information.Log in to the management console.Click in the upper left corner and select the desired region and project", + "code":"147", + "des":"View related metrics to see bandwidth and EIP usage information.You can view the inbound bandwidth, outbound bandwidth, inbound bandwidth usage, outbound bandwidth usage,", "doc_type":"usermanual", "kw":"Viewing Metrics,Monitoring,User Guide", "title":"Viewing Metrics", @@ -1322,7 +1472,7 @@ { "uri":"vpc010014.html", "product_code":"vpc", - "code":"133", + "code":"148", "des":"You can configure alarm rules to customize the monitored objects and notification policies. You can learn your resource statuses at any time.Log in to the management cons", "doc_type":"usermanual", "kw":"Creating an Alarm Rule,Monitoring,User Guide", @@ -1330,1109 +1480,269 @@ "githuburl":"" }, { - "uri":"vpc_oldui_0000.html", - "product_code":"vpc", - "code":"134", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"usermanual", - "kw":"Operation Guide (Old Console Edition)", - "title":"Operation Guide (Old Console Edition)", - "githuburl":"" - }, - { - "uri":"vpc_vpc02_0000.html", - "product_code":"vpc", - "code":"135", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"usermanual", - "kw":"VPC and Subnet", - "title":"VPC and Subnet", - "githuburl":"" - }, - { - "uri":"vpc_vpc02_0002.html", - "product_code":"vpc", - "code":"136", - "des":"A VPC provides an isolated virtual network for ECSs. You can configure and manage the network as required.You can create a VPC by following the procedure provided in this", - "doc_type":"usermanual", - "kw":"Creating a VPC,VPC and Subnet,User Guide", - "title":"Creating a VPC", - "githuburl":"" - }, - { - "uri":"vpc_vpc02_0003.html", - "product_code":"vpc", - "code":"137", - "des":"Change the VPC name and CIDR block.If the VPC CIDR block conflicts with the CIDR block of a VPN created in the VPC, you can modify its CIDR block.When modifying the VPC C", - "doc_type":"usermanual", - "kw":"Modifying a VPC,VPC and Subnet,User Guide", - "title":"Modifying a VPC", - "githuburl":"" - }, - { - "uri":"vpc_vpc02_0004.html", - "product_code":"vpc", - "code":"138", - "des":"A VPC comes with a default subnet. If the default subnet cannot meet your requirements, you can create one.The subnet is configured with DHCP by default. When an ECS in t", - "doc_type":"usermanual", - "kw":"Creating a Subnet for the VPC,VPC and Subnet,User Guide", - "title":"Creating a Subnet for the VPC", - "githuburl":"" - }, - { - "uri":"vpc_vpc02_0005.html", - "product_code":"vpc", - "code":"139", - "des":"Modify the subnet name, NTP server address, and DNS server address.Log in to the management console.Click in the upper left corner and select the desired region and proj", - "doc_type":"usermanual", - "kw":"Modifying a Subnet,VPC and Subnet,User Guide", - "title":"Modifying a Subnet", - "githuburl":"" - }, - { - "uri":"vpc_vpc02_0006.html", - "product_code":"vpc", - "code":"140", - "des":"You can delete a subnet to release network resources if the subnet is no longer required.You can delete a subnet only if there are no resources in the subnet. If there ar", - "doc_type":"usermanual", - "kw":"Deleting a Subnet,VPC and Subnet,User Guide", - "title":"Deleting a Subnet", - "githuburl":"" - }, - { - "uri":"vpc_vpc02_0007.html", - "product_code":"vpc", - "code":"141", - "des":"You can delete a VPC if the VPC is no longer required.You can delete a VPC only if there are no resources in the VPC. If there are resources in the VPC, you must delete t", - "doc_type":"usermanual", - "kw":"Deleting a VPC,VPC and Subnet,User Guide", - "title":"Deleting a VPC", - "githuburl":"" - }, - { - "uri":"vpc_vpc02_0008.html", - "product_code":"vpc", - "code":"142", - "des":"A VPC tag identifies a VPC. Tags can be added to VPCs to facilitate VPC identification and management. You can add a tag to a VPC when creating the VPC, or you can add a ", - "doc_type":"usermanual", - "kw":"Managing VPC Tags,VPC and Subnet,User Guide", - "title":"Managing VPC Tags", - "githuburl":"" - }, - { - "uri":"vpc_vpc02_0009.html", - "product_code":"vpc", - "code":"143", - "des":"A subnet tag identifies a subnet. Tags can be added to subnets to facilitate subnet identification and administration. You can add a tag to a subnet when creating the sub", - "doc_type":"usermanual", - "kw":"Managing Subnet Tags,VPC and Subnet,User Guide", - "title":"Managing Subnet Tags", - "githuburl":"" - }, - { - "uri":"vpc_vpc02_0010.html", - "product_code":"vpc", - "code":"144", - "des":"Information about all VPCs under your account can be exported as an Excel file to a local directory. This file records the names, ID, status, IP address ranges of VPCs, a", - "doc_type":"usermanual", - "kw":"Exporting VPC List,VPC and Subnet,User Guide", - "title":"Exporting VPC List", - "githuburl":"" - }, - { - "uri":"vpc_security02_0000.html", - "product_code":"vpc", - "code":"145", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"usermanual", - "kw":"Security", - "title":"Security", - "githuburl":"" - }, - { - "uri":"vpc_SecurityGroup02_0000.html", - "product_code":"vpc", - "code":"146", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"usermanual", - "kw":"Security Group", - "title":"Security Group", - "githuburl":"" - }, - { - "uri":"vpc_SecurityGroup02_0001.html", - "product_code":"vpc", - "code":"147", - "des":"A security group is a collection of access control rules for cloud resources, such as cloud servers, containers, and databases, that have the same security protection req", - "doc_type":"usermanual", - "kw":"Security Group Overview,Security Group,User Guide", - "title":"Security Group Overview", - "githuburl":"" - }, - { - "uri":"vpc_SecurityGroup02_0002.html", - "product_code":"vpc", - "code":"148", - "des":"Your account automatically comes with a default security group. The default security group allows all outbound traffic, denies all inbound traffic, and allows all traffic", - "doc_type":"usermanual", - "kw":"Default Security Groups and Security Group Rules,Security Group,User Guide", - "title":"Default Security Groups and Security Group Rules", - "githuburl":"" - }, - { - "uri":"vpc_SecurityGroup02_0003.html", + "uri":"permission_0001.html", "product_code":"vpc", "code":"149", - "des":"Common security group configurations are presented here. The examples in this section allow all outgoing data packets by default. This section will only describe how to c", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", - "kw":"Security Group Configuration Examples,Security Group,User Guide", - "title":"Security Group Configuration Examples", + "kw":"Permissions Management", + "title":"Permissions Management", "githuburl":"" }, { - "uri":"vpc_SecurityGroup02_0004.html", + "uri":"permission_0003.html", "product_code":"vpc", "code":"150", - "des":"To improve ECS access security, you can create security groups, define security group rules, and add ECSs in a VPC to different security groups. We recommend that you all", + "des":"This section describes how to use IAM to implement fine-grained permissions control for your VPC resources. With IAM, you can:Create IAM users for employees based on your", "doc_type":"usermanual", - "kw":"Creating a Security Group,Security Group,User Guide", - "title":"Creating a Security Group", + "kw":"Creating a User and Granting VPC Permissions,Permissions Management,User Guide", + "title":"Creating a User and Granting VPC Permissions", "githuburl":"" }, { - "uri":"vpc_SecurityGroup02_0005.html", + "uri":"permission_0004.html", "product_code":"vpc", "code":"151", - "des":"A security group is a collection of access control rules for cloud resources, such as cloud servers, containers, and databases, to control inbound and outbound traffic. C", + "des":"Custom policies can be created to supplement the system-defined policies of VPC. For the actions supported for custom policies, see Permissions Policies and Supported Act", "doc_type":"usermanual", - "kw":"Adding a Security Group Rule,Security Group,User Guide", - "title":"Adding a Security Group Rule", - "githuburl":"" - }, - { - "uri":"vpc_SecurityGroup02_0006.html", - "product_code":"vpc", - "code":"152", - "des":"You can add multiple security group rules with different protocols and ports at the same time.Log in to the management console.Click in the upper left corner and select ", - "doc_type":"usermanual", - "kw":"Fast-Adding Security Group Rules,Security Group,User Guide", - "title":"Fast-Adding Security Group Rules", - "githuburl":"" - }, - { - "uri":"vpc_SecurityGroup02_0007.html", - "product_code":"vpc", - "code":"153", - "des":"Replicate an existing security group rule to generate a new rule. When replicating a security group rule, you can make changes so that it is not a perfect copy.Log in to ", - "doc_type":"usermanual", - "kw":"Replicating a Security Group Rule,Security Group,User Guide", - "title":"Replicating a Security Group Rule", - "githuburl":"" - }, - { - "uri":"vpc_SecurityGroup02_0008.html", - "product_code":"vpc", - "code":"154", - "des":"You can modify the port, protocol, and IP address of a security group rule to meet your specific requirements.Log in to the management console.Click in the upper left co", - "doc_type":"usermanual", - "kw":"Modifying a Security Group Rule,Security Group,User Guide", - "title":"Modifying a Security Group Rule", - "githuburl":"" - }, - { - "uri":"vpc_SecurityGroup02_0009.html", - "product_code":"vpc", - "code":"155", - "des":"If the source of an inbound security group rule or destination of an outbound security group rule needs to be changed, you need to first delete the security group rule an", - "doc_type":"usermanual", - "kw":"Deleting a Security Group Rule,Security Group,User Guide", - "title":"Deleting a Security Group Rule", - "githuburl":"" - }, - { - "uri":"vpc_SecurityGroup02_0010.html", - "product_code":"vpc", - "code":"156", - "des":"If you want to quickly apply the rules of one security group to another, or if you want to modify multiple rules of the current security group at once, you can import or ", - "doc_type":"usermanual", - "kw":"Importing and Exporting Security Group Rules,Security Group,User Guide", - "title":"Importing and Exporting Security Group Rules", - "githuburl":"" - }, - { - "uri":"vpc_SecurityGroup02_0011.html", - "product_code":"vpc", - "code":"157", - "des":"This section describes how to delete security groups that you are no longer required.The default security group cannot be deleted.If a security group is associated with r", - "doc_type":"usermanual", - "kw":"Deleting a Security Group,Security Group,User Guide", - "title":"Deleting a Security Group", - "githuburl":"" - }, - { - "uri":"vpc_SecurityGroup02_0012.html", - "product_code":"vpc", - "code":"158", - "des":"After a security group is created, you can add instances to the security group to protect the instances. You can also remove them from the security group as required.You ", - "doc_type":"usermanual", - "kw":"Adding Instances to and Removing Them from a Security Group,Security Group,User Guide", - "title":"Adding Instances to and Removing Them from a Security Group", - "githuburl":"" - }, - { - "uri":"vpc_SecurityGroup02_0013.html", - "product_code":"vpc", - "code":"159", - "des":"Modify the name and description of a created security group.Method 1Log in to the management console.Click in the upper left corner and select the desired region and pro", - "doc_type":"usermanual", - "kw":"Modifying a Security Group,Security Group,User Guide", - "title":"Modifying a Security Group", - "githuburl":"" - }, - { - "uri":"vpc_SecurityGroup02_0014.html", - "product_code":"vpc", - "code":"160", - "des":"View inbound and outbound rules of a security group used by an ECS.Log in to the management console.Click in the upper left corner and select the desired region and proj", - "doc_type":"usermanual", - "kw":"Viewing the Security Group of an ECS,Security Group,User Guide", - "title":"Viewing the Security Group of an ECS", - "githuburl":"" - }, - { - "uri":"vpc_SecurityGroup02_0015.html", - "product_code":"vpc", - "code":"161", - "des":"Change the security group associated with an ECS NIC.Log in to the management console.Click in the upper left corner and select your region and project.Under Computing, ", - "doc_type":"usermanual", - "kw":"Changing the Security Group of an ECS,Security Group,User Guide", - "title":"Changing the Security Group of an ECS", - "githuburl":"" - }, - { - "uri":"vpc_acl02_0000.html", - "product_code":"vpc", - "code":"162", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"usermanual", - "kw":"Firewall", - "title":"Firewall", - "githuburl":"" - }, - { - "uri":"vpc_acl02_0001.html", - "product_code":"vpc", - "code":"163", - "des":"A firewall is an optional layer of security for your subnets. After you associate one or more subnets with a firewall, you can control traffic in and out of the subnets.F", - "doc_type":"usermanual", - "kw":"Firewall Overview,Firewall,User Guide", - "title":"Firewall Overview", - "githuburl":"" - }, - { - "uri":"vpc_acl02_0002.html", - "product_code":"vpc", - "code":"164", - "des":"This section provides examples for configuring firewalls.Denying Access from a Specific PortAllowing Access from Specific Ports and ProtocolsYou might want to block TCP 4", - "doc_type":"usermanual", - "kw":"Firewall Configuration Examples,Firewall,User Guide", - "title":"Firewall Configuration Examples", - "githuburl":"" - }, - { - "uri":"vpc_acl02_0003.html", - "product_code":"vpc", - "code":"165", - "des":"You can create a custom firewall, but any newly created firewall will be disabled by default. It will not have any inbound or outbound rules, or have any subnets associat", - "doc_type":"usermanual", - "kw":"Creating a Firewall,Firewall,User Guide", - "title":"Creating a Firewall", - "githuburl":"" - }, - { - "uri":"vpc_acl02_0004.html", - "product_code":"vpc", - "code":"166", - "des":"Add an inbound or outbound rule based on your network security requirements.Log in to the management console.Click in the upper left corner and select the desired region", - "doc_type":"usermanual", - "kw":"Adding a Firewall Rule,Firewall,User Guide", - "title":"Adding a Firewall Rule", - "githuburl":"" - }, - { - "uri":"vpc_acl02_0005.html", - "product_code":"vpc", - "code":"167", - "des":"On the page showing firewall details, associate desired subnets with a firewall. After a firewall is associated with a subnet, the firewall denies all traffic to and from", - "doc_type":"usermanual", - "kw":"Associating Subnets with a Firewall,Firewall,User Guide", - "title":"Associating Subnets with a Firewall", - "githuburl":"" - }, - { - "uri":"vpc_acl02_0006.html", - "product_code":"vpc", - "code":"168", - "des":"Disassociate a subnet from a firewall when necessary.Log in to the management console.Click in the upper left corner and select the desired region and project.On the con", - "doc_type":"usermanual", - "kw":"Disassociating a Subnet from a Firewall,Firewall,User Guide", - "title":"Disassociating a Subnet from a Firewall", - "githuburl":"" - }, - { - "uri":"vpc_acl02_0007.html", - "product_code":"vpc", - "code":"169", - "des":"If you need a rule to take effect before or after a specific rule, you can insert that rule before or after the specific rule.If multiple firewall rules conflict, only th", - "doc_type":"usermanual", - "kw":"Changing the Sequence of a Firewall Rule,Firewall,User Guide", - "title":"Changing the Sequence of a Firewall Rule", - "githuburl":"" - }, - { - "uri":"vpc_acl02_0008.html", - "product_code":"vpc", - "code":"170", - "des":"Modify an inbound or outbound firewall rule based on your network security requirements.Log in to the management console.Click in the upper left corner and select the de", - "doc_type":"usermanual", - "kw":"Modifying a Firewall Rule,Firewall,User Guide", - "title":"Modifying a Firewall Rule", - "githuburl":"" - }, - { - "uri":"vpc_acl02_0009.html", - "product_code":"vpc", - "code":"171", - "des":"Enable or disable an inbound or outbound rule based on your network security requirements.Log in to the management console.Click in the upper left corner and select the ", - "doc_type":"usermanual", - "kw":"Enabling or Disabling a Firewall Rule,Firewall,User Guide", - "title":"Enabling or Disabling a Firewall Rule", - "githuburl":"" - }, - { - "uri":"vpc_acl02_0010.html", - "product_code":"vpc", - "code":"172", - "des":"Delete an inbound or outbound rule based on your network security requirements.Log in to the management console.Click in the upper left corner and select the desired reg", - "doc_type":"usermanual", - "kw":"Deleting a Firewall Rule,Firewall,User Guide", - "title":"Deleting a Firewall Rule", - "githuburl":"" - }, - { - "uri":"vpc_acl02_0011.html", - "product_code":"vpc", - "code":"173", - "des":"View details about a firewall.Log in to the management console.Click in the upper left corner and select the desired region and project.On the console homepage, under Ne", - "doc_type":"usermanual", - "kw":"Viewing a Firewall,Firewall,User Guide", - "title":"Viewing a Firewall", - "githuburl":"" - }, - { - "uri":"vpc_acl02_0012.html", - "product_code":"vpc", - "code":"174", - "des":"Modify the name and description of a firewall.Log in to the management console.Click in the upper left corner and select the desired region and project.On the console ho", - "doc_type":"usermanual", - "kw":"Modifying a Firewall,Firewall,User Guide", - "title":"Modifying a Firewall", - "githuburl":"" - }, - { - "uri":"vpc_acl02_0013.html", - "product_code":"vpc", - "code":"175", - "des":"After a firewall is created, you may need to enable it based on network security requirements. You can also disable an enabled firewall if need. Before enabling a firewal", - "doc_type":"usermanual", - "kw":"Enabling or Disabling a Firewall,Firewall,User Guide", - "title":"Enabling or Disabling a Firewall", - "githuburl":"" - }, - { - "uri":"vpc_acl02_0014.html", - "product_code":"vpc", - "code":"176", - "des":"Delete a firewall when it is no longer required.Log in to the management console.Click in the upper left corner and select the desired region and project.On the console ", - "doc_type":"usermanual", - "kw":"Deleting a Firewall,Firewall,User Guide", - "title":"Deleting a Firewall", - "githuburl":"" - }, - { - "uri":"vpc_acl02_0015.html", - "product_code":"vpc", - "code":"177", - "des":"You can configure security groups and firewall to increase the security of ECSs in your VPC.Security groups operate at the ECS level.Firewalls operate at the subnet level", - "doc_type":"usermanual", - "kw":"Differences Between Security Groups and Firewalls,Security,User Guide", - "title":"Differences Between Security Groups and Firewalls", - "githuburl":"" - }, - { - "uri":"vpc_eip02_0000.html", - "product_code":"vpc", - "code":"178", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"usermanual", - "kw":"EIP", - "title":"EIP", - "githuburl":"" - }, - { - "uri":"vpc_eip02_0001.html", - "product_code":"vpc", - "code":"179", - "des":"You can assign an EIP and bind it to an ECS so that the ECS can access the Internet.EIPs for dedicated load balancers:In the eu-de region, if you choose to assign an EIP ", - "doc_type":"usermanual", - "kw":"Assigning an EIP and Binding It to an ECS,EIP,User Guide", - "title":"Assigning an EIP and Binding It to an ECS", - "githuburl":"" - }, - { - "uri":"vpc_eip02_0002.html", - "product_code":"vpc", - "code":"180", - "des":"If you no longer need an EIP, unbind it from the ECS and release the EIP to avoid wasting network resources.EIP assigned together with your load balancers will also be di", - "doc_type":"usermanual", - "kw":"Unbinding an EIP from an ECS and Releasing the EIP,EIP,User Guide", - "title":"Unbinding an EIP from an ECS and Releasing the EIP", - "githuburl":"" - }, - { - "uri":"vpc_eip02_0003.html", - "product_code":"vpc", - "code":"181", - "des":"Tags can be added to EIPs to facilitate EIP identification and administration. You can add a tag to an EIP when assigning the EIP. Alternatively, you can add a tag to an ", - "doc_type":"usermanual", - "kw":"Managing EIP Tags,EIP,User Guide", - "title":"Managing EIP Tags", - "githuburl":"" - }, - { - "uri":"vpc_eip02_0004.html", - "product_code":"vpc", - "code":"182", - "des":"Modify the EIP bandwidth name or size.This section describes how to modify the dedicated bandwidth or shared bandwidth of an EIP. For details about how to modify a shared", - "doc_type":"usermanual", - "kw":"Modifying an EIP Bandwidth,EIP,User Guide", - "title":"Modifying an EIP Bandwidth", - "githuburl":"" - }, - { - "uri":"vpc_bandwidth02_0000.html", - "product_code":"vpc", - "code":"183", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"usermanual", - "kw":"Shared Bandwidth", - "title":"Shared Bandwidth", - "githuburl":"" - }, - { - "uri":"vpc_bandwidth02_0001.html", - "product_code":"vpc", - "code":"184", - "des":"Shared bandwidth allows multiple EIPs to share the same bandwidth. All ECSs, BMSs, and load balancers that have EIPs bound in the same region can share a bandwidth.When y", - "doc_type":"usermanual", - "kw":"Shared Bandwidth Overview,Shared Bandwidth,User Guide", - "title":"Shared Bandwidth Overview", - "githuburl":"" - }, - { - "uri":"vpc_bandwidth02_0002.html", - "product_code":"vpc", - "code":"185", - "des":"Assign a shared bandwidth for use with EIPs.Log in to the management console.Click in the upper left corner and select the desired region and project.On the console home", - "doc_type":"usermanual", - "kw":"Assigning a Shared Bandwidth,Shared Bandwidth,User Guide", - "title":"Assigning a Shared Bandwidth", - "githuburl":"" - }, - { - "uri":"vpc_bandwidth02_0003.html", - "product_code":"vpc", - "code":"186", - "des":"Add EIPs to a shared bandwidth and the EIPs can then share that bandwidth. You can add multiple EIPs to a shared bandwidth at the same time.After an EIP is added to a sha", - "doc_type":"usermanual", - "kw":"Adding EIPs to a Shared Bandwidth,Shared Bandwidth,User Guide", - "title":"Adding EIPs to a Shared Bandwidth", - "githuburl":"" - }, - { - "uri":"vpc_bandwidth02_0004.html", - "product_code":"vpc", - "code":"187", - "des":"Remove EIPs that are no longer required from a shared bandwidth if needed.Log in to the management console.Click in the upper left corner and select the desired region a", - "doc_type":"usermanual", - "kw":"Removing EIPs from a Shared Bandwidth,Shared Bandwidth,User Guide", - "title":"Removing EIPs from a Shared Bandwidth", - "githuburl":"" - }, - { - "uri":"vpc_bandwidth02_0005.html", - "product_code":"vpc", - "code":"188", - "des":"You can modify the name and size of a shared bandwidth as required.Log in to the management console.Click in the upper left corner and select the desired region and proj", - "doc_type":"usermanual", - "kw":"Modifying a Shared Bandwidth,Shared Bandwidth,User Guide", - "title":"Modifying a Shared Bandwidth", - "githuburl":"" - }, - { - "uri":"vpc_bandwidth02_0006.html", - "product_code":"vpc", - "code":"189", - "des":"Delete a shared bandwidth when it is no longer required.Before deleting a shared bandwidth, remove all the EIPs associated with it. For details, see Removing EIPs from a ", - "doc_type":"usermanual", - "kw":"Deleting a Shared Bandwidth,Shared Bandwidth,User Guide", - "title":"Deleting a Shared Bandwidth", - "githuburl":"" - }, - { - "uri":"vpc_route02_0000.html", - "product_code":"vpc", - "code":"190", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"usermanual", - "kw":"Route Table", - "title":"Route Table", - "githuburl":"" - }, - { - "uri":"vpc_route02_0001.html", - "product_code":"vpc", - "code":"191", - "des":"A custom route is a user-defined routing rule added to a VPC.", - "doc_type":"usermanual", - "kw":"Route Table Overview,Route Table,User Guide", - "title":"Route Table Overview", - "githuburl":"" - }, - { - "uri":"vpc_route02_0002.html", - "product_code":"vpc", - "code":"192", - "des":"To use the route table function provided by the VPC service, you need to configure SNAT on an ECS to enable other ECSs that do not have EIPs bound in a VPC to access the ", - "doc_type":"usermanual", - "kw":"Configuring an SNAT Server,Route Table,User Guide", - "title":"Configuring an SNAT Server", - "githuburl":"" - }, - { - "uri":"vpc_route02_0003.html", - "product_code":"vpc", - "code":"193", - "des":"If ECSs in a VPC need to access the Internet, add a custom route to enable the ECSs to access the Internet through an ECS that has an EIP bound.Log in to the management c", - "doc_type":"usermanual", - "kw":"Adding a Custom Route,Route Table,User Guide", - "title":"Adding a Custom Route", - "githuburl":"" - }, - { - "uri":"vpc_route02_0004.html", - "product_code":"vpc", - "code":"194", - "des":"You can query information about a route table or all route tables.Log in to the management console.Click in the upper left corner and select the desired region and proje", - "doc_type":"usermanual", - "kw":"Querying a Route Table,Route Table,User Guide", - "title":"Querying a Route Table", - "githuburl":"" - }, - { - "uri":"vpc_route02_0005.html", - "product_code":"vpc", - "code":"195", - "des":"Change the destination and next hop of the route.Log in to the management console.Click in the upper left corner and select the desired region and project.On the console", - "doc_type":"usermanual", - "kw":"Modifying a Route,Route Table,User Guide", - "title":"Modifying a Route", - "githuburl":"" - }, - { - "uri":"vpc_route02_0006.html", - "product_code":"vpc", - "code":"196", - "des":"Delete a route if it is no longer required.Log in to the management console.Click in the upper left corner and select the desired region and project.On the console homep", - "doc_type":"usermanual", - "kw":"Deleting a Route,Route Table,User Guide", - "title":"Deleting a Route", - "githuburl":"" - }, - { - "uri":"vpc_peering02_0000.html", - "product_code":"vpc", - "code":"197", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"usermanual", - "kw":"VPC Peering Connection", - "title":"VPC Peering Connection", - "githuburl":"" - }, - { - "uri":"vpc_peering02_0001.html", - "product_code":"vpc", - "code":"198", - "des":"A VPC peering connection is a network connection between two VPCs in one region that enables you to route traffic between them using private IP addresses. ECSs in either ", - "doc_type":"usermanual", - "kw":"VPC Peering Connection Creation Procedure,VPC Peering Connection,User Guide", - "title":"VPC Peering Connection Creation Procedure", - "githuburl":"" - }, - { - "uri":"vpc_peering02_0002.html", - "product_code":"vpc", - "code":"199", - "des":"To enable two VPCs in the same region to communicate with each other, you can create a VPC peering connection between them. The VPC and subnet CIDR blocks must meet the r", - "doc_type":"usermanual", - "kw":"VPC Peering Connection Configuration Plans,VPC Peering Connection,User Guide", - "title":"VPC Peering Connection Configuration Plans", - "githuburl":"" - }, - { - "uri":"vpc_peering02_0003.html", - "product_code":"vpc", - "code":"200", - "des":"To create a VPC peering connection, first create a request to peer with another VPC. You can request a VPC peering connection with another VPC in your account, but the tw", - "doc_type":"usermanual", - "kw":"Creating a VPC Peering Connection with Another VPC in Your Account,VPC Peering Connection,User Guide", - "title":"Creating a VPC Peering Connection with Another VPC in Your Account", - "githuburl":"" - }, - { - "uri":"vpc_peering02_0004.html", - "product_code":"vpc", - "code":"201", - "des":"The VPC service also allows you to create a VPC peering connection with a VPC in another account. The two VPCs must be in the same region. If you request a VPC peering co", - "doc_type":"usermanual", - "kw":"Creating a VPC Peering Connection with a VPC in Another Account,VPC Peering Connection,User Guide", - "title":"Creating a VPC Peering Connection with a VPC in Another Account", - "githuburl":"" - }, - { - "uri":"vpc_peering02_0005.html", - "product_code":"vpc", - "code":"202", - "des":"The owners of both the local and peer accounts can view information about the created VPC peering connections and those that are still waiting to be accepted.Log in to th", - "doc_type":"usermanual", - "kw":"Viewing VPC Peering Connections,VPC Peering Connection,User Guide", - "title":"Viewing VPC Peering Connections", - "githuburl":"" - }, - { - "uri":"vpc_peering02_0006.html", - "product_code":"vpc", - "code":"203", - "des":"The owners of both the local and peer accounts can modify a VPC peering connection in any state. The VPC peering connection name can be changed.Log in to the management c", - "doc_type":"usermanual", - "kw":"Modifying a VPC Peering Connection,VPC Peering Connection,User Guide", - "title":"Modifying a VPC Peering Connection", - "githuburl":"" - }, - { - "uri":"vpc_peering02_0007.html", - "product_code":"vpc", - "code":"204", - "des":"The owners of both the local and peer accounts can delete a VPC peering connection in any state. After a VPC peering connection is deleted, routes configured for the conn", - "doc_type":"usermanual", - "kw":"Deleting a VPC Peering Connection,VPC Peering Connection,User Guide", - "title":"Deleting a VPC Peering Connection", - "githuburl":"" - }, - { - "uri":"vpc_peering02_0008.html", - "product_code":"vpc", - "code":"205", - "des":"After routes are added for a VPC peering connection, the owners of both the local and peer accounts can view information about the routes on the page showing details abou", - "doc_type":"usermanual", - "kw":"Viewing Routes Configured for a VPC Peering Connection,VPC Peering Connection,User Guide", - "title":"Viewing Routes Configured for a VPC Peering Connection", - "githuburl":"" - }, - { - "uri":"vpc_peering02_0010.html", - "product_code":"vpc", - "code":"206", - "des":"After routes are added for a VPC peering connection, the owners of both the local and peer accounts can delete the routes on the page showing details about the peering co", - "doc_type":"usermanual", - "kw":"Deleting a VPC Peering Route,VPC Peering Connection,User Guide", - "title":"Deleting a VPC Peering Route", - "githuburl":"" - }, - { - "uri":"vpc_FlowLog02_0000.html", - "product_code":"vpc", - "code":"207", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"usermanual", - "kw":"VPC Flow Log", - "title":"VPC Flow Log", - "githuburl":"" - }, - { - "uri":"vpc_FlowLog02_0001.html", - "product_code":"vpc", - "code":"208", - "des":"A VPC flow log records information about the traffic going to and from a VPC. VPC flow logs help you monitor network traffic, analyze network attacks, and determine wheth", - "doc_type":"usermanual", - "kw":"VPC Flow Log Overview,VPC Flow Log,User Guide", - "title":"VPC Flow Log Overview", - "githuburl":"" - }, - { - "uri":"vpc_FlowLog02_0002.html", - "product_code":"vpc", - "code":"209", - "des":"A VPC flow log records information about the traffic going to and from a VPC.Ensure that the following operations have been performed on the LTS console:Create a log grou", - "doc_type":"usermanual", - "kw":"Creating a VPC Flow Log,VPC Flow Log,User Guide", - "title":"Creating a VPC Flow Log", - "githuburl":"" - }, - { - "uri":"vpc_FlowLog02_0003.html", - "product_code":"vpc", - "code":"210", - "des":"View information about your flow log record.The capture window is approximately 10 minutes, which indicates that a flow log record will be generated every 10 minutes. Aft", - "doc_type":"usermanual", - "kw":"Viewing a VPC Flow Log,VPC Flow Log,User Guide", - "title":"Viewing a VPC Flow Log", - "githuburl":"" - }, - { - "uri":"vpc_FlowLog02_0004.html", - "product_code":"vpc", - "code":"211", - "des":"After a VPC flow log is created, the VPC flow log is automatically enabled. If you do not need to record traffic data, you can disable the corresponding VPC flow log. The", - "doc_type":"usermanual", - "kw":"Enabling or Disabling VPC Flow Log,VPC Flow Log,User Guide", - "title":"Enabling or Disabling VPC Flow Log", - "githuburl":"" - }, - { - "uri":"vpc_FlowLog02_0005.html", - "product_code":"vpc", - "code":"212", - "des":"Delete a VPC flow log that is not required. Deleting a VPC flow log will not delete the existing flow log records in LTS.If a NIC that uses a VPC flow log is deleted, the", - "doc_type":"usermanual", - "kw":"Deleting a VPC Flow Log,VPC Flow Log,User Guide", - "title":"Deleting a VPC Flow Log", - "githuburl":"" - }, - { - "uri":"vpc_dc02_0001.html", - "product_code":"vpc", - "code":"213", - "des":"Direct Connect allows you to establish a dedicated network connection between your data center and the cloud platform. With Direct Connect, you can establish a private co", - "doc_type":"usermanual", - "kw":"Direct Connect,Operation Guide (Old Console Edition),User Guide", - "title":"Direct Connect", - "githuburl":"" - }, - { - "uri":"vpc_vip02_0000.html", - "product_code":"vpc", - "code":"214", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"usermanual", - "kw":"Virtual IP Address", - "title":"Virtual IP Address", - "githuburl":"" - }, - { - "uri":"vpc_vip02_0001.html", - "product_code":"vpc", - "code":"215", - "des":"A virtual IP address can be shared among multiple ECSs. An ECS can have both private and virtual IP addresses, and you can access the ECS through either IP address. A vir", - "doc_type":"usermanual", - "kw":"Virtual IP Address Overview,Virtual IP Address,User Guide", - "title":"Virtual IP Address Overview", - "githuburl":"" - }, - { - "uri":"vpc_vip02_0002.html", - "product_code":"vpc", - "code":"216", - "des":"If an ECS requires a virtual IP address or if a virtual IP address needs to be reserved, you can assign a virtual IP address from the subnet.Log in to the management cons", - "doc_type":"usermanual", - "kw":"Assigning a Virtual IP Address,Virtual IP Address,User Guide", - "title":"Assigning a Virtual IP Address", - "githuburl":"" - }, - { - "uri":"vpc_vip02_0003.html", - "product_code":"vpc", - "code":"217", - "des":"You can bind a virtual IP address to an EIP so that you can access the ECSs bound with the same virtual IP address from the Internet. These ECSs can work in the active/st", - "doc_type":"usermanual", - "kw":"Binding a Virtual IP Address to an EIP or ECS,Virtual IP Address,User Guide", - "title":"Binding a Virtual IP Address to an EIP or ECS", - "githuburl":"" - }, - { - "uri":"vpc_vip02_0004.html", - "product_code":"vpc", - "code":"218", - "des":"This section describes how to bind a virtual IP address to an EIP.You have assigned an EIP.Log in to the management console.Click in the upper left corner and select the", - "doc_type":"usermanual", - "kw":"Binding a Virtual IP Address to an EIP,Virtual IP Address,User Guide", - "title":"Binding a Virtual IP Address to an EIP", - "githuburl":"" - }, - { - "uri":"vpc_vip02_0005.html", - "product_code":"vpc", - "code":"219", - "des":"Configure the ECS networking based on Networking.Create a VPN.The VPN can be used to access the virtual IP address of the ECS.", - "doc_type":"usermanual", - "kw":"Using a VPN to Access a Virtual IP Address,Virtual IP Address,User Guide", - "title":"Using a VPN to Access a Virtual IP Address", - "githuburl":"" - }, - { - "uri":"vpc_vip02_0006.html", - "product_code":"vpc", - "code":"220", - "des":"Configure the ECS networking based on Networking.Create a Direct Connect connection.The created Direct Connect connection can be used to access the virtual IP address of ", - "doc_type":"usermanual", - "kw":"Using a Direct Connect Connection to Access the Virtual IP Address,Virtual IP Address,User Guide", - "title":"Using a Direct Connect Connection to Access the Virtual IP Address", - "githuburl":"" - }, - { - "uri":"vpc_vip02_0007.html", - "product_code":"vpc", - "code":"221", - "des":"Configure the ECS networking based on Networking.Create a VPC peering connection.You can access the virtual IP address of the ECS through the VPC peering connection.", - "doc_type":"usermanual", - "kw":"Using a VPC Peering Connection to Access the Virtual IP Address,Virtual IP Address,User Guide", - "title":"Using a VPC Peering Connection to Access the Virtual IP Address", - "githuburl":"" - }, - { - "uri":"vpc_vip02_0009.html", - "product_code":"vpc", - "code":"222", - "des":"Log in to the management console.Click in the upper left corner and select the desired region and project.Under Compute, click Elastic Cloud Server.In the ECS list, clic", - "doc_type":"usermanual", - "kw":"Disabling Source and Destination Check (HA Load Balancing Cluster Scenario),Virtual IP Address,User ", - "title":"Disabling Source and Destination Check (HA Load Balancing Cluster Scenario)", - "githuburl":"" - }, - { - "uri":"vpc_vip02_0010.html", - "product_code":"vpc", - "code":"223", - "des":"If you no longer need a virtual IP address or a reserved virtual IP address, you can release it to avoid wasting resources.Before deleting a virtual IP address, ensure th", - "doc_type":"usermanual", - "kw":"Releasing a Virtual IP Address,Virtual IP Address,User Guide", - "title":"Releasing a Virtual IP Address", - "githuburl":"" - }, - { - "uri":"vpc_monitor02_0000.html", - "product_code":"vpc", - "code":"224", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"usermanual", - "kw":"Monitoring", - "title":"Monitoring", - "githuburl":"" - }, - { - "uri":"vpc_monitor02_0001.html", - "product_code":"vpc", - "code":"225", - "des":"This section describes the namespace, list, and measurement dimensions of EIP and bandwidth metrics that you can check on Cloud Eye. You can use APIs or the Cloud Eye con", - "doc_type":"usermanual", - "kw":"Supported Metrics,Monitoring,User Guide", - "title":"Supported Metrics", - "githuburl":"" - }, - { - "uri":"vpc_monitor02_0002.html", - "product_code":"vpc", - "code":"226", - "des":"View related metrics to see bandwidth and EIP usage information.Log in to the management console.Click in the upper left corner and select the desired region and project", - "doc_type":"usermanual", - "kw":"Viewing Metrics,Monitoring,User Guide", - "title":"Viewing Metrics", - "githuburl":"" - }, - { - "uri":"vpc_monitor02_0003.html", - "product_code":"vpc", - "code":"227", - "des":"You can configure alarm rules to customize the monitored objects and notification policies. You can learn your resource statuses at any time.Log in to the management cons", - "doc_type":"usermanual", - "kw":"Creating an Alarm Rule,Monitoring,User Guide", - "title":"Creating an Alarm Rule", + "kw":"VPC Custom Policies,Permissions Management,User Guide", + "title":"VPC Custom Policies", "githuburl":"" }, { "uri":"vpc_faq_0000.html", "product_code":"vpc", - "code":"228", + "code":"152", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", - "kw":"FAQs", - "title":"FAQs", + "kw":"FAQ", + "title":"FAQ", "githuburl":"" }, { "uri":"faq_common.html", "product_code":"vpc", - "code":"229", + "code":"153", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", - "kw":"General", - "title":"General", + "kw":"General Questions", + "title":"General Questions", "githuburl":"" }, { "uri":"vpc_faq_0051.html", "product_code":"vpc", - "code":"230", + "code":"154", "des":"A quota limits the quantity of a resource available to users, thereby preventing spikes in the usage of the resource. For example, a VPC quota limits the number of VPCs t", "doc_type":"usermanual", - "kw":"What Is a Quota?,General,User Guide", + "kw":"What Is a Quota?,General Questions,User Guide", "title":"What Is a Quota?", "githuburl":"" }, { "uri":"faq_vpc.html", "product_code":"vpc", - "code":"231", + "code":"155", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", - "kw":"VPC and Subnet", - "title":"VPC and Subnet", + "kw":"VPCs and Subnets", + "title":"VPCs and Subnets", "githuburl":"" }, { "uri":"vpc_faq_0001.html", "product_code":"vpc", - "code":"232", - "des":"The Virtual Private Cloud (VPC) service enables you to provision logically isolated, configurable, and manageable virtual networks for Elastic Cloud Servers (ECSs), impro", + "code":"156", + "des":"The Virtual Private Cloud (VPC) service enables you to provision logically isolated virtual networks for Elastic Cloud Servers (ECSs), improving cloud resource security a", "doc_type":"usermanual", - "kw":"What Is Virtual Private Cloud?,VPC and Subnet,User Guide", + "kw":"What Is Virtual Private Cloud?,VPCs and Subnets,User Guide", "title":"What Is Virtual Private Cloud?", "githuburl":"" }, { "uri":"vpc_faq_0004.html", "product_code":"vpc", - "code":"233", + "code":"157", "des":"The following table lists the private CIDR blocks that you can specify when creating a VPC. Consider the following when selecting a VPC CIDR block:Number of IP addresses:", "doc_type":"usermanual", - "kw":"Which CIDR Blocks Are Available for the VPC Service?,VPC and Subnet,User Guide", + "kw":"Which CIDR Blocks Are Available for the VPC Service?,VPCs and Subnets,User Guide", "title":"Which CIDR Blocks Are Available for the VPC Service?", "githuburl":"" }, { "uri":"vpc_faq_0005.html", "product_code":"vpc", - "code":"234", + "code":"158", "des":"Subnets in the same VPC can communicate with each other, but subnets in different VPCs cannot communicate with each other by default. However, you can create VPC peering ", "doc_type":"usermanual", - "kw":"Can Subnets Communicate with Each Other?,VPC and Subnet,User Guide", + "kw":"Can Subnets Communicate with Each Other?,VPCs and Subnets,User Guide", "title":"Can Subnets Communicate with Each Other?", "githuburl":"" }, { "uri":"vpc_faq_0006.html", "product_code":"vpc", - "code":"235", + "code":"159", "des":"A subnet CIDR block must be included in its VPC CIDR block. Supported VPC CIDR blocks are 10.0.0.0/8–24, 172.16.0.0/12–24, and 192.168.0.0/16–24. The allowed block size o", "doc_type":"usermanual", - "kw":"What Subnet CIDR Blocks Are Available?,VPC and Subnet,User Guide", + "kw":"What Subnet CIDR Blocks Are Available?,VPCs and Subnets,User Guide", "title":"What Subnet CIDR Blocks Are Available?", "githuburl":"" }, { "uri":"vpc_faq_0009.html", "product_code":"vpc", - "code":"236", + "code":"160", "des":"Each account can have a maximum of 100 subnets. If the number of subnets cannot meet your service requirements, request a quota increase. For details, see What Is a Quota", "doc_type":"usermanual", - "kw":"How Many Subnets Can I Create?,VPC and Subnet,User Guide", + "kw":"How Many Subnets Can I Create?,VPCs and Subnets,User Guide", "title":"How Many Subnets Can I Create?", "githuburl":"" }, - { - "uri":"vpc_faq_0075.html", - "product_code":"vpc", - "code":"237", - "des":"The VPC service allows you to create private, isolated virtual networks. In a VPC, you can manage private IP address ranges, subnets, route tables, and gateways. ECSs, BM", - "doc_type":"usermanual", - "kw":"How Can I Delete a Subnet That Is Being Used by Other Resources?,VPC and Subnet,User Guide", - "title":"How Can I Delete a Subnet That Is Being Used by Other Resources?", - "githuburl":"" - }, { "uri":"vpc_faq_0094.html", "product_code":"vpc", - "code":"238", + "code":"161", "des":"The network ID of the subnet is the neutron_network_id in the subnet fields in Subnet > Creating a Subnet in the Virtual Private Cloud API Reference.Parameter neutron_net", "doc_type":"usermanual", - "kw":"What Are the Differences Between the Network ID and Subnet ID of a Subnet?,VPC and Subnet,User Guide", + "kw":"What Are the Differences Between the Network ID and Subnet ID of a Subnet?,VPCs and Subnets,User Gui", "title":"What Are the Differences Between the Network ID and Subnet ID of a Subnet?", "githuburl":"" }, + { + "uri":"vpc_faq_0075.html", + "product_code":"vpc", + "code":"162", + "des":"If VPCs and subnets are being used by other resources, you need to delete these resources first based on the prompts on the console before deleting the VPCs and subnets. ", + "doc_type":"usermanual", + "kw":"Why Can't I Delete My VPCs and Subnets?,VPCs and Subnets,User Guide", + "title":"Why Can't I Delete My VPCs and Subnets?", + "githuburl":"" + }, { "uri":"faq_eip.html", "product_code":"vpc", - "code":"239", + "code":"163", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", - "kw":"EIP", - "title":"EIP", + "kw":"EIPs", + "title":"EIPs", "githuburl":"" }, { "uri":"vpc_faq_0013.html", "product_code":"vpc", - "code":"240", + "code":"164", "des":"The Elastic IP (EIP) service enables your cloud resources to communicate with the Internet using static public IP addresses and scalable bandwidths. EIPs can be bound to ", "doc_type":"usermanual", - "kw":"What Are EIPs?,EIP,User Guide", - "title":"What Are EIPs?", + "kw":"What Is an EIP?,EIPs,User Guide", + "title":"What Is an EIP?", "githuburl":"" }, { "uri":"vpc_faq_0019.html", "product_code":"vpc", - "code":"241", - "des":"Each EIP can be bound to only one ECS at a time.", + "code":"165", + "des":"Each EIP can be bound to only one ECS at a time.Multiple ECSs cannot share the same EIP. An ECS and its bound EIP must be in the same region. If you want multiple ECSs in", "doc_type":"usermanual", - "kw":"Can I Bind an EIP to Multiple ECSs?,EIP,User Guide", + "kw":"Can I Bind an EIP to Multiple ECSs?,EIPs,User Guide", "title":"Can I Bind an EIP to Multiple ECSs?", "githuburl":"" }, { "uri":"vpc_faq_0020.html", "product_code":"vpc", - "code":"242", + "code":"166", "des":"Each ECS is automatically added to a security group after being created to ensure its security. The security group denies access traffic from the Internet by default. To ", "doc_type":"usermanual", - "kw":"How Do I Access an ECS with an EIP Bound from the Internet?,EIP,User Guide", + "kw":"How Do I Access an ECS with an EIP Bound from the Internet?,EIPs,User Guide", "title":"How Do I Access an ECS with an EIP Bound from the Internet?", "githuburl":"" }, + { + "uri":"faq_eip_0012.html", + "product_code":"vpc", + "code":"167", + "des":"No. EIPs and their associated cloud resources must be in the same region.", + "doc_type":"usermanual", + "kw":"Can I Bind an EIP to a Cloud Resource in Another Region?,EIPs,User Guide", + "title":"Can I Bind an EIP to a Cloud Resource in Another Region?", + "githuburl":"" + }, + { + "uri":"faq_eip_0014.html", + "product_code":"vpc", + "code":"168", + "des":"The region of an EIP cannot be changed.If you assigned an EIP in region A but need an EIP in region B, you cannot directly change the region of the assigned EIP from A to", + "doc_type":"usermanual", + "kw":"Can I Change the Region of My EIP?,EIPs,User Guide", + "title":"Can I Change the Region of My EIP?", + "githuburl":"" + }, + { + "uri":"faq_peer_0000.html", + "product_code":"vpc", + "code":"169", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"VPC Peering Connections", + "title":"VPC Peering Connections", + "githuburl":"" + }, + { + "uri":"vpc_faq_0070.html", + "product_code":"vpc", + "code":"170", + "des":"Each account can have a maximum of 50 VPC peering connections in each region by default.Number of VPC peering connections that you can create in each region between VPCs ", + "doc_type":"usermanual", + "kw":"How Many VPC Peering Connections Can I Create in an Account?,VPC Peering Connections,User Guide", + "title":"How Many VPC Peering Connections Can I Create in an Account?", + "githuburl":"" + }, + { + "uri":"faq_connection_0001.html", + "product_code":"vpc", + "code":"171", + "des":"A VPC peering connection only can connect VPCs in the same region.Figure 1 shows an application scenario of VPC peering connections.There are two VPCs (VPC-A and VPC-B) i", + "doc_type":"usermanual", + "kw":"Can a VPC Peering Connection Connect VPCs in Different Regions?,VPC Peering Connections,User Guide", + "title":"Can a VPC Peering Connection Connect VPCs in Different Regions?", + "githuburl":"" + }, + { + "uri":"vpc_faq_0069.html", + "product_code":"vpc", + "code":"172", + "des":"After a VPC peering connection is created, the local and peer VPCs cannot communicate with each other.The issues here are described in order of how likely they are to occ", + "doc_type":"usermanual", + "kw":"Why Did Communication Fail Between VPCs That Were Connected by a VPC Peering Connection?,VPC Peering", + "title":"Why Did Communication Fail Between VPCs That Were Connected by a VPC Peering Connection?", + "githuburl":"" + }, { "uri":"faq_bandwidth.html", "product_code":"vpc", - "code":"243", + "code":"173", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Bandwidth", "title":"Bandwidth", "githuburl":"" }, + { + "uri":"vpc_faq_0011.html", + "product_code":"vpc", + "code":"174", + "des":"The bandwidth range is from 5 Mbit/s to 1000 Mbit/s.", + "doc_type":"usermanual", + "kw":"What Is the Bandwidth Size Range?,Bandwidth,User Guide", + "title":"What Is the Bandwidth Size Range?", + "githuburl":"" + }, { "uri":"vpc_faq_0012.html", "product_code":"vpc", - "code":"244", + "code":"175", "des":"There are dedicated bandwidth and shared bandwidth. A dedicated bandwidth can only be used by one EIP, but a shared bandwidth can be used by multiple EIPs.", "doc_type":"usermanual", "kw":"What Bandwidth Types Are Available?,Bandwidth,User Guide", @@ -2442,27 +1752,27 @@ { "uri":"faq_bandwidth_0003.html", "product_code":"vpc", - "code":"245", - "des":"Dedicated bandwidth: The bandwidth can only be used by one EIP and the EIP can only be used by one cloud resource, such as an ECS, a NAT gateway, or a load balancer.Share", + "code":"176", + "des":"A dedicated bandwidth can only be used by one EIP. An EIP can only be used by one cloud resource, such as an ECS, a NAT gateway, or a load balancer.A shared bandwidth can", "doc_type":"usermanual", "kw":"What Are the Differences Between a Dedicated Bandwidth and a Shared Bandwidth? Can a Dedicated Bandw", "title":"What Are the Differences Between a Dedicated Bandwidth and a Shared Bandwidth? Can a Dedicated Bandwidth Be Changed to a Shared Bandwidth or the Other Way Around?", "githuburl":"" }, { - "uri":"vpc_faq_0011.html", + "uri":"vpc_faq_0035.html", "product_code":"vpc", - "code":"246", - "des":"The bandwidth range is from 1 Mbit/s to 1,000 Mbit/s.", + "code":"177", + "des":"Log in to the management console.Click in the upper left corner and select the desired region and project.Click in the upper left corner and choose Network > Elastic IP", "doc_type":"usermanual", - "kw":"What Is the Bandwidth Size Range?,Bandwidth,User Guide", - "title":"What Is the Bandwidth Size Range?", + "kw":"How Do I Buy a Shared Bandwidth?,Bandwidth,User Guide", + "title":"How Do I Buy a Shared Bandwidth?", "githuburl":"" }, { "uri":"faq_connection.html", "product_code":"vpc", - "code":"247", + "code":"178", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Connectivity", @@ -2472,7 +1782,7 @@ { "uri":"vpc_faq_0058.html", "product_code":"vpc", - "code":"248", + "code":"179", "des":"If the two VPCs are in the same region, you can use a VPC peering connection to enable communication between them.If the two VPCs are in different regions, you can use a ", "doc_type":"usermanual", "kw":"Does a VPN Allow Communication Between Two VPCs?,Connectivity,User Guide", @@ -2482,47 +1792,17 @@ { "uri":"vpc_faq_0060.html", "product_code":"vpc", - "code":"249", + "code":"180", "des":"When an ECS has more than one NIC, if different DNS server addresses are configured for the subnets used by the NICs, the ECS cannot access the Internet or domain names i", "doc_type":"usermanual", "kw":"Why Are Internet or Internal Domain Names in the Cloud Inaccessible Through Domain Names When My ECS", "title":"Why Are Internet or Internal Domain Names in the Cloud Inaccessible Through Domain Names When My ECS Has Multiple NICs?", "githuburl":"" }, - { - "uri":"vpc_faq_0068.html", - "product_code":"vpc", - "code":"250", - "des":"If two VPCs connected by a VPC peering connection overlap with each other, there will be route conflicts and the VPC peering connection may not be usable.After a VPC peer", - "doc_type":"usermanual", - "kw":"Are There Any Constraints on Using VPC Peering Connections?,Connectivity,User Guide", - "title":"Are There Any Constraints on Using VPC Peering Connections?", - "githuburl":"" - }, - { - "uri":"vpc_faq_0069.html", - "product_code":"vpc", - "code":"251", - "des":"Check whether the VPC IDs are correctly configured for the VPC peering connection.Check whether the VPCs have routes that point to the CIDR block of the other VPC.Check w", - "doc_type":"usermanual", - "kw":"Why Did Communication Fail Between VPCs That Were Connected by a VPC Peering Connection?,Connectivit", - "title":"Why Did Communication Fail Between VPCs That Were Connected by a VPC Peering Connection?", - "githuburl":"" - }, - { - "uri":"vpc_faq_0070.html", - "product_code":"vpc", - "code":"252", - "des":"Each account can have a maximum of 50 VPC peering connections in each region by default.VPC peering connections between VPCs in one account: Each account can create a max", - "doc_type":"usermanual", - "kw":"How Many VPC Peering Connections Can I Create?,Connectivity,User Guide", - "title":"How Many VPC Peering Connections Can I Create?", - "githuburl":"" - }, { "uri":"vpc_faq_0073.html", "product_code":"vpc", - "code":"253", + "code":"181", "des":"The priority of an EIP is higher than that of a custom route in a VPC route table. For example:The VPC route table of an ECS has a custom route with 0.0.0.0/0 as the dest", "doc_type":"usermanual", "kw":"What Are the Priorities of the Custom Route and EIP If Both Are Configured for an ECS to Enable the ", @@ -2532,7 +1812,7 @@ { "uri":"vpc_faq_00002.html", "product_code":"vpc", - "code":"254", + "code":"182", "des":"The priority of a custom route is higher than that of shared SNAT.", "doc_type":"usermanual", "kw":"What Are the Priorities of the Shared SNAT and Custom Route If Both Are Configured for an ECS to Ena", @@ -2542,7 +1822,7 @@ { "uri":"vpc_faq_0076.html", "product_code":"vpc", - "code":"255", + "code":"183", "des":"Users with IPv6 clients can call APIs to assign IPv6 EIPs and bind the EIPs to ECSs. Then, the users can use the EIP to access the ECSs in the VPC over the Internet.For d", "doc_type":"usermanual", "kw":"How Does an IPv6 Client on the Internet Access the ECS That Has an EIP Bound in a VPC?,Connectivity,", @@ -2552,27 +1832,17 @@ { "uri":"faq_route.html", "product_code":"vpc", - "code":"256", + "code":"184", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Routing", "title":"Routing", "githuburl":"" }, - { - "uri":"vpc_faq_0062.html", - "product_code":"vpc", - "code":"257", - "des":"A route table cannot span multiple VPCs.A route table contains a set of routes that are used to determine where network traffic from your subnets in a VPC is directed. A ", - "doc_type":"usermanual", - "kw":"Can a Route Table Span Multiple VPCs?,Routing,User Guide", - "title":"Can a Route Table Span Multiple VPCs?", - "githuburl":"" - }, { "uri":"vpc_faq_0063.html", "product_code":"vpc", - "code":"258", + "code":"185", "des":"Currently, a route table can contain 100 routes.", "doc_type":"usermanual", "kw":"How Many Routes Can a Route Table Contain?,Routing,User Guide", @@ -2582,27 +1852,17 @@ { "uri":"vpc_faq_0064.html", "product_code":"vpc", - "code":"259", + "code":"186", "des":"An ECS providing SNAT must have Unbind IP from MAC enabled.The destination of each route in a route table must be unique. The next hop must be a private IP address or a v", "doc_type":"usermanual", "kw":"Are There Any Restrictions on Using a Route Table?,Routing,User Guide", "title":"Are There Any Restrictions on Using a Route Table?", "githuburl":"" }, - { - "uri":"vpc_faq_0065.html", - "product_code":"vpc", - "code":"260", - "des":"The route table function itself is free, but you are charged for the ECSs and bandwidth that you use together with the route table function.", - "doc_type":"usermanual", - "kw":"Will a Route Table Be Billed?,Routing,User Guide", - "title":"Will a Route Table Be Billed?", - "githuburl":"" - }, { "uri":"vpc_faq_0066.html", "product_code":"vpc", - "code":"261", + "code":"187", "des":"No. Direct Connect connections and custom routes are used in different scenarios, so the routing priorities are different.", "doc_type":"usermanual", "kw":"Do the Same Routing Priorities Apply to Direct Connect Connections and Custom Routes in the Same VPC", @@ -2612,27 +1872,17 @@ { "uri":"vpc_faq_00001.html", "product_code":"vpc", - "code":"262", + "code":"188", "des":"No. The routing priority of custom routes and that of VPNs are the same.", "doc_type":"usermanual", "kw":"Are There Different Routing Priorities of the VPN and Custom Routes in the Same VPC?,Routing,User Gu", "title":"Are There Different Routing Priorities of the VPN and Custom Routes in the Same VPC?", "githuburl":"" }, - { - "uri":"vpc_faq_0071.html", - "product_code":"vpc", - "code":"263", - "des":"By default, a maximum of 100 routes can be added for a VPC. The routes include custom routes and those added for Direct Connect and VPC peering connections.", - "doc_type":"usermanual", - "kw":"How Many Routes Can Be Added in a VPC?,Routing,User Guide", - "title":"How Many Routes Can Be Added in a VPC?", - "githuburl":"" - }, { "uri":"faq_security.html", "product_code":"vpc", - "code":"264", + "code":"189", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Security", @@ -2642,7 +1892,7 @@ { "uri":"vpc_faq_0039.html", "product_code":"vpc", - "code":"265", + "code":"190", "des":"Yes. Log in to the ECS console, switch to the page showing ECS details, and change the security group of the ECS.", "doc_type":"usermanual", "kw":"Can I Change the Security Group of an ECS?,Security,User Guide", @@ -2652,7 +1902,7 @@ { "uri":"vpc_faq_0040.html", "product_code":"vpc", - "code":"266", + "code":"191", "des":"Each account can have up to 100 security groups and 5000 security group rules.When you create an ECS, you can select multiple security groups, but it is recommended that ", "doc_type":"usermanual", "kw":"How Many Security Groups Can I Create?,Security,User Guide", @@ -2662,7 +1912,7 @@ { "uri":"vpc_faq_0059.html", "product_code":"vpc", - "code":"267", + "code":"192", "des":"The TFTP daemon determines whether a configuration file specifies the port range. If you use a TFTP configuration file that allows the data channel ports to be configurab", "doc_type":"usermanual", "kw":"How Do I Configure a Security Group for Multi-Channel Protocols?,Security,User Guide", @@ -2672,7 +1922,7 @@ { "uri":"vpc_faq_0072.html", "product_code":"vpc", - "code":"268", + "code":"193", "des":"You can create up to 200 firewalls. It is recommended that you configure no more than 20 inbound or outbound rules for each firewall. If you configure more than 20 inboun", "doc_type":"usermanual", "kw":"How Many Firewalls Can I Create?,Security,User Guide", @@ -2682,7 +1932,7 @@ { "uri":"vpc_faq_0074.html", "product_code":"vpc", - "code":"269", + "code":"194", "des":"Security groups are stateful. Responses to outbound traffic are allowed to go in to the instance regardless of inbound security group rules, and vice versa. Security grou", "doc_type":"usermanual", "kw":"Does a Security Group Rule or a Firewall Rule Immediately Take Effect for Existing Connections After", @@ -2692,7 +1942,7 @@ { "uri":"vpc_faq_0077.html", "product_code":"vpc", - "code":"270", + "code":"195", "des":"Security group rules use the whitelist mechanism. If multiple security group rules conflict, the rules are aggregated to take effect.", "doc_type":"usermanual", "kw":"Which Security Group Rule Has Priority When Multiple Security Group Rules Conflict?,Security,User Gu", @@ -2702,7 +1952,7 @@ { "uri":"vpc_faq_0103.html", "product_code":"vpc", - "code":"271", + "code":"196", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"usermanual", "kw":"Change History,User Guide", @@ -2712,7 +1962,7 @@ { "uri":"vpc_faq_0106.html", "product_code":"vpc", - "code":"272", + "code":"197", "des":"For details about the terms involved in this document, see Glossary.", "doc_type":"usermanual", "kw":"Glossary,User Guide", diff --git a/docs/vpc/umn/CLASS.TXT.json b/docs/vpc/umn/CLASS.TXT.json index 07aacd9f..ab918b5f 100644 --- a/docs/vpc/umn/CLASS.TXT.json +++ b/docs/vpc/umn/CLASS.TXT.json @@ -9,7 +9,7 @@ "code":"1" }, { - "desc":"The Virtual Private Cloud (VPC) service enables you to provision logically isolated, configurable, and manageable virtual networks for Elastic Cloud Servers (ECSs), impro", + "desc":"The Virtual Private Cloud (VPC) service enables you to provision logically isolated virtual networks for Elastic Cloud Servers (ECSs), improving cloud resource security a", "product_code":"vpc", "title":"What Is Virtual Private Cloud?", "uri":"en-us_topic_0013748729.html", @@ -17,6 +17,15 @@ "p_code":"1", "code":"2" }, + { + "desc":"You can create VPCs, add subnets, specify IP address ranges, and configure DHCP and route tables. You can configure the same VPC for ECSs that are in different availabili", + "product_code":"vpc", + "title":"Product Advantages", + "uri":"overview_0004.html", + "doc_type":"usermanual", + "p_code":"1", + "code":"3" + }, { "desc":"Hosting web applicationsYou can host web applications and websites in a VPC and use the VPC as a regular network. With EIPs, you can connect ECSs running your web applica", "product_code":"vpc", @@ -24,7 +33,7 @@ "uri":"overview_0002.html", "doc_type":"usermanual", "p_code":"1", - "code":"3" + "code":"4" }, { "desc":"You can use EIPs, load balancers, NAT gateways, VPN connections, and Direct Connect connections to access the Internet if required.Use EIPs to Enable a Small Number of EC", @@ -33,7 +42,16 @@ "uri":"overview_0001.html", "doc_type":"usermanual", "p_code":"1", - "code":"4" + "code":"5" + }, + { + "desc":"By default, you can create a maximum of 100 security groups in your cloud account.By default, you can add up to 50 security group rules to a security group.When creating ", + "product_code":"vpc", + "title":"Notes and Constraints", + "uri":"overview_0003.html", + "doc_type":"usermanual", + "p_code":"1", + "code":"6" }, { "desc":"ECSThe VPC service provides an isolated virtual network for ECSs. You can configure and manage the network as required. There are multiple connectivity options for ECSs t", @@ -42,16 +60,16 @@ "uri":"vpc_relationship_0001.html", "doc_type":"usermanual", "p_code":"1", - "code":"5" + "code":"7" }, { - "desc":"The cloud system provides two types of user permissions by default: user management and resource management. User management refers to the management of users, user group", + "desc":"If you need to assign different permissions to personnel in your enterprise to access your VPCs, IAM is a good choice for fine-grained permissions management. IAM provide", "product_code":"vpc", - "title":"User Permissions", - "uri":"vpc_permissions_0001.html", + "title":"Permissions", + "uri":"overview_permission.html", "doc_type":"usermanual", "p_code":"1", - "code":"6" + "code":"8" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -60,7 +78,7 @@ "uri":"vpc_Concepts_0001.html", "doc_type":"usermanual", "p_code":"1", - "code":"7" + "code":"9" }, { "desc":"A subnet is a unique CIDR block with a range of IP addresses in a VPC. All resources in a VPC must be deployed on subnets.By default, ECSs in all subnets of the same VPC ", @@ -68,8 +86,8 @@ "title":"Subnet", "uri":"en-us_topic_0030969424.html", "doc_type":"usermanual", - "p_code":"7", - "code":"8" + "p_code":"9", + "code":"10" }, { "desc":"The Elastic IP (EIP) service enables your cloud resources to communicate with the Internet using static public IP addresses and scalable bandwidths. EIPs can be bound to ", @@ -77,17 +95,17 @@ "title":"Elastic IP", "uri":"vpc_Concepts_0003.html", "doc_type":"usermanual", - "p_code":"7", - "code":"9" + "p_code":"9", + "code":"11" }, { - "desc":"VPC has old and new console editions. You can click in the lower right corner of the console to switch between the old and new consoles.On the new console, the route tab", + "desc":"A route table contains a set of routes that are used to determine where network traffic from your subnets in a VPC is directed. Each subnet must be associated with a rout", "product_code":"vpc", "title":"Route Table", "uri":"en-us_topic_0038263963.html", "doc_type":"usermanual", - "p_code":"7", - "code":"10" + "p_code":"9", + "code":"12" }, { "desc":"In addition to services provided by the system, some ECSs need to access the Internet to obtain information or download software. You can bind EIPs to virtual NICs (ports", @@ -95,8 +113,8 @@ "title":"SNAT", "uri":"vpc_Concepts_0004.html", "doc_type":"usermanual", - "p_code":"7", - "code":"11" + "p_code":"9", + "code":"13" }, { "desc":"A security group is a collection of access control rules for cloud resources, such as cloud servers, containers, and databases, that have the same security protection req", @@ -104,8 +122,8 @@ "title":"Security Group", "uri":"vpc_Concepts_0005.html", "doc_type":"usermanual", - "p_code":"7", - "code":"12" + "p_code":"9", + "code":"14" }, { "desc":"The VPC service provides free SNAT function, which allows ECSs to use a limited number of public IP addresses to gain one-way access to the Internet for operations, such ", @@ -113,17 +131,17 @@ "title":"Shared SNAT", "uri":"vpc_Concepts_0010.html", "doc_type":"usermanual", - "p_code":"7", - "code":"13" + "p_code":"9", + "code":"15" }, { - "desc":"A VPC peering connection is a network connection between two VPCs in one region that enables you to route traffic between them using private IP addresses. ECSs in either ", + "desc":"A VPC peering connection is a networking connection between two VPCs and enables them to communicate using private IP addresses. The VPCs to be peered can be in the same ", "product_code":"vpc", "title":"VPC Peering Connection", "uri":"vpc_Concepts_0011.html", "doc_type":"usermanual", - "p_code":"7", - "code":"14" + "p_code":"9", + "code":"16" }, { "desc":"A firewall is an optional layer of security for your subnets. After you associate one or more subnets with a firewall, you can control traffic in and out of the subnets.", @@ -131,8 +149,8 @@ "title":"Firewall", "uri":"en-us_topic_0051746676.html", "doc_type":"usermanual", - "p_code":"7", - "code":"15" + "p_code":"9", + "code":"17" }, { "desc":"A virtual IP address can be shared among multiple ECSs. An ECS can have both private and virtual IP addresses, and you can access the ECS through either IP address. A vir", @@ -140,8 +158,8 @@ "title":"Virtual IP Address", "uri":"vpc_Concepts_0012.html", "doc_type":"usermanual", - "p_code":"7", - "code":"16" + "p_code":"9", + "code":"18" }, { "desc":"A region and availability zone (AZ) identify the location of a data center. You can create resources in a specific region and AZ.A region is a physical data center, which", @@ -149,8 +167,8 @@ "title":"Region and AZ", "uri":"overview_region.html", "doc_type":"usermanual", - "p_code":"7", - "code":"17" + "p_code":"9", + "code":"19" }, { "desc":"Instructions for using this document are as follows:To facilitate your operations, the management console may provide more than one way for you to perform a task or an op", @@ -159,7 +177,7 @@ "uri":"vpc_use_0001.html", "doc_type":"usermanual", "p_code":"1", - "code":"18" + "code":"20" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -168,16 +186,16 @@ "uri":"vpc_qs_0000.html", "doc_type":"usermanual", "p_code":"", - "code":"19" + "code":"21" }, { - "desc":"A VPC provides an isolated virtual network for ECSs. You can configure and manage the network as required.If your ECSs, for example, ECSs that function as databases, do n", + "desc":"A VPC provides an isolated virtual network for ECSs. You can configure and manage the network as required.If any of your ECSs, for example, ECSs that function as the data", "product_code":"vpc", "title":"Typical Application Scenarios", "uri":"vpc_qs_0002.html", "doc_type":"usermanual", - "p_code":"19", - "code":"20" + "p_code":"21", + "code":"22" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -185,8 +203,8 @@ "title":"Configuring a VPC for ECSs That Do Not Require Internet Access", "uri":"vpc_qs_0003.html", "doc_type":"usermanual", - "p_code":"19", - "code":"21" + "p_code":"21", + "code":"23" }, { "desc":"If your ECSs do not require Internet access or need to access the Internet using IP addresses on the default network (100.64.0.0/11) with limited bandwidth (for example, ", @@ -194,8 +212,8 @@ "title":"Overview", "uri":"vpc_qs_0004.html", "doc_type":"usermanual", - "p_code":"21", - "code":"22" + "p_code":"23", + "code":"24" }, { "desc":"A VPC provides an isolated virtual network for ECSs. You can configure and manage the network as required.You can create a VPC by following the procedure provided in this", @@ -203,26 +221,26 @@ "title":"Step 1: Create a VPC", "uri":"vpc_qs_0005.html", "doc_type":"usermanual", - "p_code":"21", - "code":"23" + "p_code":"23", + "code":"25" }, { - "desc":"A VPC comes with a default subnet. If the default subnet cannot meet your requirements, you can create one.The subnet is configured with DHCP by default. When an ECS in t", + "desc":"A VPC comes with a default subnet. If the default subnet cannot meet your requirements, you can create one.A subnet is configured with DHCP by default. When an ECS in thi", "product_code":"vpc", "title":"Step 2: Create a Subnet for the VPC", "uri":"vpc_qs_0006.html", "doc_type":"usermanual", - "p_code":"21", - "code":"24" + "p_code":"23", + "code":"26" }, { - "desc":"To improve ECS access security, you can create security groups, define security group rules, and add ECSs in a VPC to different security groups. We recommend that you all", + "desc":"You can create security groups and add ECSs in a VPC to different security groups to improve ECS access security. We recommend that you allocate ECSs that have different ", "product_code":"vpc", "title":"Step 3: Create a Security Group", "uri":"vpc_qs_0007.html", "doc_type":"usermanual", - "p_code":"21", - "code":"25" + "p_code":"23", + "code":"27" }, { "desc":"A security group is a collection of access control rules for cloud resources, such as cloud servers, containers, and databases, to control inbound and outbound traffic. C", @@ -230,8 +248,8 @@ "title":"Step 4: Add a Security Group Rule", "uri":"vpc_qs_0008.html", "doc_type":"usermanual", - "p_code":"21", - "code":"26" + "p_code":"23", + "code":"28" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -239,8 +257,8 @@ "title":"Configuring a VPC for ECSs That Access the Internet Using EIPs", "uri":"en-us_topic_0017816228.html", "doc_type":"usermanual", - "p_code":"19", - "code":"27" + "p_code":"21", + "code":"29" }, { "desc":"If your ECSs need to access the Internet (for example, the ECSs functioning as the service nodes for deploying a website), you can follow the procedure shown in Figure 1 ", @@ -248,8 +266,8 @@ "title":"Overview", "uri":"vpc_qs_0022.html", "doc_type":"usermanual", - "p_code":"27", - "code":"28" + "p_code":"29", + "code":"30" }, { "desc":"A VPC provides an isolated virtual network for ECSs. You can configure and manage the network as required.You can create a VPC by following the procedure provided in this", @@ -257,35 +275,35 @@ "title":"Step 1: Create a VPC", "uri":"vpc_qs_0009.html", "doc_type":"usermanual", - "p_code":"27", - "code":"29" + "p_code":"29", + "code":"31" }, { - "desc":"A VPC comes with a default subnet. If the default subnet cannot meet your requirements, you can create one.The subnet is configured with DHCP by default. When an ECS in t", + "desc":"A VPC comes with a default subnet. If the default subnet cannot meet your requirements, you can create one.A subnet is configured with DHCP by default. When an ECS in thi", "product_code":"vpc", "title":"Step 2: Create a Subnet for the VPC", "uri":"vpc_qs_0010.html", "doc_type":"usermanual", - "p_code":"27", - "code":"30" + "p_code":"29", + "code":"32" }, { - "desc":"You can assign an EIP and bind it to an ECS so that the ECS can access the Internet.EIPs for dedicated load balancers:In the eu-de region, if you choose to assign an EIP ", + "desc":"You can assign an EIP and bind it to an ECS so that the ECS can access the Internet.Note the following when you use EIPs of the Dedicated Load Balancer (5_gray) type:In e", "product_code":"vpc", "title":"Step 3: Assign an EIP and Bind It to an ECS", "uri":"vpc_qs_0011.html", "doc_type":"usermanual", - "p_code":"27", - "code":"31" + "p_code":"29", + "code":"33" }, { - "desc":"To improve ECS access security, you can create security groups, define security group rules, and add ECSs in a VPC to different security groups. We recommend that you all", + "desc":"You can create security groups and add ECSs in a VPC to different security groups to improve ECS access security. We recommend that you allocate ECSs that have different ", "product_code":"vpc", "title":"Step 4: Create a Security Group", "uri":"vpc_qs_0012.html", "doc_type":"usermanual", - "p_code":"27", - "code":"32" + "p_code":"29", + "code":"34" }, { "desc":"A security group is a collection of access control rules for cloud resources, such as cloud servers, containers, and databases, to control inbound and outbound traffic. C", @@ -293,17 +311,8 @@ "title":"Step 5: Add a Security Group Rule", "uri":"vpc_qs_0013.html", "doc_type":"usermanual", - "p_code":"27", - "code":"33" - }, - { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"vpc", - "title":"Operation Guide (New Console Edition)", - "uri":"vpc_newui_0000.html", - "doc_type":"usermanual", - "p_code":"", - "code":"34" + "p_code":"29", + "code":"35" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -311,8 +320,17 @@ "title":"VPC and Subnet", "uri":"en-us_topic_0030969460.html", "doc_type":"usermanual", - "p_code":"34", - "code":"35" + "p_code":"", + "code":"36" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpc", + "title":"VPC", + "uri":"vpc_0003.html", + "doc_type":"usermanual", + "p_code":"36", + "code":"37" }, { "desc":"A VPC provides an isolated virtual network for ECSs. You can configure and manage the network as required.You can create a VPC by following the procedure provided in this", @@ -320,8 +338,8 @@ "title":"Creating a VPC", "uri":"en-us_topic_0013935842.html", "doc_type":"usermanual", - "p_code":"35", - "code":"36" + "p_code":"37", + "code":"38" }, { "desc":"Change the VPC name and CIDR block.If the VPC CIDR block conflicts with the CIDR block of a VPN created in the VPC, you can modify its CIDR block.When modifying the VPC C", @@ -329,44 +347,17 @@ "title":"Modifying a VPC", "uri":"en-us_topic_0030969462.html", "doc_type":"usermanual", - "p_code":"35", - "code":"37" - }, - { - "desc":"A VPC comes with a default subnet. If the default subnet cannot meet your requirements, you can create one.The subnet is configured with DHCP by default. When an ECS in t", - "product_code":"vpc", - "title":"Creating a Subnet for the VPC", - "uri":"en-us_topic_0013748726.html", - "doc_type":"usermanual", - "p_code":"35", - "code":"38" - }, - { - "desc":"Modify the subnet name, NTP server address, and DNS server address.Log in to the management console.Click in the upper left corner and select the desired region and proj", - "product_code":"vpc", - "title":"Modifying a Subnet", - "uri":"vpc_vpc_0001.html", - "doc_type":"usermanual", - "p_code":"35", + "p_code":"37", "code":"39" }, { - "desc":"You can delete a subnet to release network resources if the subnet is no longer required.You can delete a subnet only if there are no resources in the subnet. If there ar", - "product_code":"vpc", - "title":"Deleting a Subnet", - "uri":"vpc_vpc_0002.html", - "doc_type":"usermanual", - "p_code":"35", - "code":"40" - }, - { - "desc":"You can delete a VPC if the VPC is no longer required.You can delete a VPC only if there are no resources in the VPC. If there are resources in the VPC, you must delete t", + "desc":"This section describes how to delete a VPC.If you want to delete a VPC that has subnets, custom routes, or other resources, you need to delete these resources as prompted", "product_code":"vpc", "title":"Deleting a VPC", "uri":"vpc_vpc_0003.html", "doc_type":"usermanual", - "p_code":"35", - "code":"41" + "p_code":"37", + "code":"40" }, { "desc":"A VPC tag identifies a VPC. Tags can be added to VPCs to facilitate VPC identification and management. You can add a tag to a VPC when creating the VPC, or you can add a ", @@ -374,17 +365,8 @@ "title":"Managing VPC Tags", "uri":"vpc_vpc_0004.html", "doc_type":"usermanual", - "p_code":"35", - "code":"42" - }, - { - "desc":"A subnet tag identifies a subnet. Tags can be added to subnets to facilitate subnet identification and administration. You can add a tag to a subnet when creating the sub", - "product_code":"vpc", - "title":"Managing Subnet Tags", - "uri":"vpc_vpc_0005.html", - "doc_type":"usermanual", - "p_code":"35", - "code":"43" + "p_code":"37", + "code":"41" }, { "desc":"Information about all VPCs under your account can be exported as an Excel file to a local directory. This file records the names, ID, status, IP address ranges of VPCs, a", @@ -392,17 +374,116 @@ "title":"Exporting VPC List", "uri":"vpc_vpc_0006.html", "doc_type":"usermanual", - "p_code":"35", + "p_code":"37", + "code":"42" + }, + { + "desc":"This section describes how to view and obtain a VPC ID.If you want to obtain the ID of the peer VPC when you create a VPC peering connection between two VPCs from differe", + "product_code":"vpc", + "title":"Obtaining a VPC ID", + "uri":"vpc_vpc_0013.html", + "doc_type":"usermanual", + "p_code":"37", + "code":"43" + }, + { + "desc":"This section describes how to view the topology of a VPC. The topology displays the subnets in a VPC and the ECSs in the subnets.Log in to the management console.Click i", + "product_code":"vpc", + "title":"Viewing a VPC Topology", + "uri":"vpc_vpc_0009.html", + "doc_type":"usermanual", + "p_code":"37", "code":"44" }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpc", + "title":"Subnet", + "uri":"vpc_0004.html", + "doc_type":"usermanual", + "p_code":"36", + "code":"45" + }, + { + "desc":"A VPC comes with a default subnet. If the default subnet cannot meet your requirements, you can create one.A subnet is configured with DHCP by default. When an ECS in thi", + "product_code":"vpc", + "title":"Creating a Subnet for the VPC", + "uri":"en-us_topic_0013748726.html", + "doc_type":"usermanual", + "p_code":"45", + "code":"46" + }, + { + "desc":"Modify the subnet name, NTP server address, and DNS server address.Log in to the management console.Click in the upper left corner and select the desired region and proj", + "product_code":"vpc", + "title":"Modifying a Subnet", + "uri":"vpc_vpc_0001.html", + "doc_type":"usermanual", + "p_code":"45", + "code":"47" + }, + { + "desc":"A subnet tag identifies a subnet. Tags can be added to subnets to facilitate subnet identification and administration. You can add a tag to a subnet when creating the sub", + "product_code":"vpc", + "title":"Managing Subnet Tags", + "uri":"vpc_vpc_0005.html", + "doc_type":"usermanual", + "p_code":"45", + "code":"48" + }, + { + "desc":"Information about all subnets under your account can be exported as an Excel file to a local directory. This file records the name, ID, VPC, CIDR block, and associated ro", + "product_code":"vpc", + "title":"Exporting Subnet List", + "uri":"vpc_vpc_0010.html", + "doc_type":"usermanual", + "p_code":"45", + "code":"49" + }, + { + "desc":"VPC subnets have private IP addresses used by cloud resources. This section describes how to view resources that are using private IP addresses of subnets. If these resou", + "product_code":"vpc", + "title":"Viewing and Deleting Resources in a Subnet", + "uri":"vpc_vpc_0011.html", + "doc_type":"usermanual", + "p_code":"45", + "code":"50" + }, + { + "desc":"A subnet is an IP address range in a VPC. This section describes how to view the used IP addresses in a subnet.Virtual IP addressesPrivate IP addressesUsed by the subnet ", + "product_code":"vpc", + "title":"Viewing IP Addresses in a Subnet", + "uri":"vpc_vpc_0012.html", + "doc_type":"usermanual", + "p_code":"45", + "code":"51" + }, + { + "desc":"This section describes how to delete a subnet.If you want to delete a subnet that has custom routes, virtual IP addresses, or other resources, you need to delete these re", + "product_code":"vpc", + "title":"Deleting a Subnet", + "uri":"vpc_vpc_0002.html", + "doc_type":"usermanual", + "p_code":"45", + "code":"52" + }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"vpc", "title":"Security", "uri":"vpc_SecurityGroup_0000.html", "doc_type":"usermanual", - "p_code":"34", - "code":"45" + "p_code":"", + "code":"53" + }, + { + "desc":"You can configure security groups and firewall to increase the security of ECSs in your VPC.Security groups operate at the ECS level.firewalls protect associated subnets ", + "product_code":"vpc", + "title":"Differences Between Security Groups and Firewalls", + "uri":"en-us_topic_0052003963.html", + "doc_type":"usermanual", + "p_code":"53", + "code":"54" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -410,8 +491,8 @@ "title":"Security Group", "uri":"vpc_SecurityGroup_0001.html", "doc_type":"usermanual", - "p_code":"45", - "code":"46" + "p_code":"53", + "code":"55" }, { "desc":"A security group is a collection of access control rules for cloud resources, such as cloud servers, containers, and databases, that have the same security protection req", @@ -419,17 +500,17 @@ "title":"Security Group Overview", "uri":"en-us_topic_0073379079.html", "doc_type":"usermanual", - "p_code":"46", - "code":"47" + "p_code":"55", + "code":"56" }, { - "desc":"Your account automatically comes with a default security group. The default security group allows all outbound traffic, denies all inbound traffic, and allows all traffic", + "desc":"The system creates a default security group for each account. By default, the default security group rules:Allow all outbound packets: Instances in the default security g", "product_code":"vpc", "title":"Default Security Groups and Security Group Rules", "uri":"SecurityGroup_0003.html", "doc_type":"usermanual", - "p_code":"46", - "code":"48" + "p_code":"55", + "code":"57" }, { "desc":"Common security group configurations are presented here. The examples in this section allow all outgoing data packets by default. This section will only describe how to c", @@ -437,17 +518,17 @@ "title":"Security Group Configuration Examples", "uri":"en-us_topic_0081124350.html", "doc_type":"usermanual", - "p_code":"46", - "code":"49" + "p_code":"55", + "code":"58" }, { - "desc":"To improve ECS access security, you can create security groups, define security group rules, and add ECSs in a VPC to different security groups. We recommend that you all", + "desc":"You can create security groups and add ECSs in a VPC to different security groups to improve ECS access security. We recommend that you allocate ECSs that have different ", "product_code":"vpc", "title":"Creating a Security Group", "uri":"en-us_topic_0013748715.html", "doc_type":"usermanual", - "p_code":"46", - "code":"50" + "p_code":"55", + "code":"59" }, { "desc":"A security group is a collection of access control rules for cloud resources, such as cloud servers, containers, and databases, to control inbound and outbound traffic. C", @@ -455,8 +536,8 @@ "title":"Adding a Security Group Rule", "uri":"en-us_topic_0030969470.html", "doc_type":"usermanual", - "p_code":"46", - "code":"51" + "p_code":"55", + "code":"60" }, { "desc":"You can add multiple security group rules with different protocols and ports at the same time.Log in to the management console.Click in the upper left corner and select ", @@ -464,8 +545,8 @@ "title":"Fast-Adding Security Group Rules", "uri":"SecurityGroup_0004.html", "doc_type":"usermanual", - "p_code":"46", - "code":"52" + "p_code":"55", + "code":"61" }, { "desc":"Replicate an existing security group rule to generate a new rule. When replicating a security group rule, you can make changes so that it is not a perfect copy.Log in to ", @@ -473,17 +554,17 @@ "title":"Replicating a Security Group Rule", "uri":"vpc_SecurityGroup_0004.html", "doc_type":"usermanual", - "p_code":"46", - "code":"53" + "p_code":"55", + "code":"62" }, { - "desc":"You can modify the port, protocol, and IP address of a security group rule to meet your specific requirements.Log in to the management console.Click in the upper left co", + "desc":"You can modify the port, protocol, and IP address of your security group rules as required to ensure the security of your instances.Log in to the management console.Click", "product_code":"vpc", "title":"Modifying a Security Group Rule", "uri":"vpc_SecurityGroup_0005.html", "doc_type":"usermanual", - "p_code":"46", - "code":"54" + "p_code":"55", + "code":"63" }, { "desc":"If the source of an inbound security group rule or destination of an outbound security group rule needs to be changed, you need to first delete the security group rule an", @@ -491,26 +572,26 @@ "title":"Deleting a Security Group Rule", "uri":"vpc_SecurityGroup_0006.html", "doc_type":"usermanual", - "p_code":"46", - "code":"55" + "p_code":"55", + "code":"64" }, { - "desc":"If you want to quickly apply the rules of one security group to another, or if you want to modify multiple rules of the current security group at once, you can import or ", + "desc":"If you want to quickly create or restore security group rules, you can import existing rules to the security group.If you want to back up security group rules locally, yo", "product_code":"vpc", "title":"Importing and Exporting Security Group Rules", "uri":"vpc_SecurityGroup_0007.html", "doc_type":"usermanual", - "p_code":"46", - "code":"56" + "p_code":"55", + "code":"65" }, { - "desc":"This section describes how to delete security groups that you are no longer required.The default security group cannot be deleted.If a security group is associated with r", + "desc":"This section describes how to delete security groups.The default security group is named default and cannot be deleted.A security group cannot be deleted if it is being u", "product_code":"vpc", "title":"Deleting a Security Group", "uri":"vpc_SecurityGroup_0008.html", "doc_type":"usermanual", - "p_code":"46", - "code":"57" + "p_code":"55", + "code":"66" }, { "desc":"After a security group is created, you can add instances to the security group to protect the instances. You can also remove them from the security group as required.You ", @@ -518,8 +599,17 @@ "title":"Adding Instances to and Removing Them from a Security Group", "uri":"SecurityGroup_0017.html", "doc_type":"usermanual", - "p_code":"46", - "code":"58" + "p_code":"55", + "code":"67" + }, + { + "desc":"You can clone a security group from one region to another to quickly apply the security group rules to ECSs in another region.You can clone a security group in the follow", + "product_code":"vpc", + "title":"Cloning a Security Group", + "uri":"vpc_SecurityGroup_0009.html", + "doc_type":"usermanual", + "p_code":"55", + "code":"68" }, { "desc":"Modify the name and description of a created security group.Method 1Log in to the management console.Click in the upper left corner and select the desired region and pro", @@ -527,8 +617,8 @@ "title":"Modifying a Security Group", "uri":"vpc_SecurityGroup_0010.html", "doc_type":"usermanual", - "p_code":"46", - "code":"59" + "p_code":"55", + "code":"69" }, { "desc":"View inbound and outbound rules of a security group used by an ECS.Log in to the management console.Click in the upper left corner and select the desired region and proj", @@ -536,8 +626,8 @@ "title":"Viewing the Security Group of an ECS", "uri":"vpc_SecurityGroup_0011.html", "doc_type":"usermanual", - "p_code":"46", - "code":"60" + "p_code":"55", + "code":"70" }, { "desc":"Change the security group associated with an ECS NIC.Log in to the management console.Click in the upper left corner and select your region and project.Under Computing, ", @@ -545,8 +635,8 @@ "title":"Changing the Security Group of an ECS", "uri":"SecurityGroup_0006.html", "doc_type":"usermanual", - "p_code":"46", - "code":"61" + "p_code":"55", + "code":"71" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -554,8 +644,8 @@ "title":"Firewall", "uri":"vpc_acl_0000.html", "doc_type":"usermanual", - "p_code":"45", - "code":"62" + "p_code":"53", + "code":"72" }, { "desc":"A firewall is an optional layer of security for your subnets. After you associate one or more subnets with a firewall, you can control traffic in and out of the subnets.F", @@ -563,8 +653,8 @@ "title":"Firewall Overview", "uri":"acl_0001.html", "doc_type":"usermanual", - "p_code":"62", - "code":"63" + "p_code":"72", + "code":"73" }, { "desc":"This section provides examples for configuring firewalls.Denying Access from a Specific PortAllowing Access from Specific Ports and ProtocolsYou might want to block TCP 4", @@ -572,17 +662,17 @@ "title":"Firewall Configuration Examples", "uri":"acl_0002.html", "doc_type":"usermanual", - "p_code":"62", - "code":"64" + "p_code":"72", + "code":"74" }, { - "desc":"You can create a custom firewall, but any newly created firewall will be disabled by default. It will not have any inbound or outbound rules, or have any subnets associat", + "desc":"You can create a custom firewall. By default, a newly created firewall is disabled and has no inbound or outbound rules, or any subnets associated. Each user can create u", "product_code":"vpc", "title":"Creating a Firewall", "uri":"en-us_topic_0051746698.html", "doc_type":"usermanual", - "p_code":"62", - "code":"65" + "p_code":"72", + "code":"75" }, { "desc":"Add an inbound or outbound rule based on your network security requirements.Log in to the management console.Click in the upper left corner and select the desired region", @@ -590,26 +680,26 @@ "title":"Adding a Firewall Rule", "uri":"en-us_topic_0051746702.html", "doc_type":"usermanual", - "p_code":"62", - "code":"66" + "p_code":"72", + "code":"76" }, { - "desc":"On the page showing firewall details, associate desired subnets with a firewall. After a firewall is associated with a subnet, the firewall denies all traffic to and from", + "desc":"On the page showing firewall details, you can associate desired subnets with a firewall. After a firewall is associated with a subnet, the firewall denies all traffic to ", "product_code":"vpc", "title":"Associating Subnets with a Firewall", "uri":"en-us_topic_0051746700.html", "doc_type":"usermanual", - "p_code":"62", - "code":"67" + "p_code":"72", + "code":"77" }, { - "desc":"Disassociate a subnet from a firewall when necessary.Log in to the management console.Click in the upper left corner and select the desired region and project.On the con", + "desc":"Disassociate a subnet from a firewall when necessary.Log in to the management console.Click in the upper left corner and select the desired region and project.Click in ", "product_code":"vpc", "title":"Disassociating a Subnet from a Firewall", "uri":"vpc_acl_0003.html", "doc_type":"usermanual", - "p_code":"62", - "code":"68" + "p_code":"72", + "code":"78" }, { "desc":"If you need a rule to take effect before or after a specific rule, you can insert that rule before or after the specific rule.If multiple firewall rules conflict, only th", @@ -617,8 +707,8 @@ "title":"Changing the Sequence of a Firewall Rule", "uri":"vpc_acl_0004.html", "doc_type":"usermanual", - "p_code":"62", - "code":"69" + "p_code":"72", + "code":"79" }, { "desc":"Modify an inbound or outbound firewall rule based on your network security requirements.Log in to the management console.Click in the upper left corner and select the de", @@ -626,8 +716,8 @@ "title":"Modifying a Firewall Rule", "uri":"vpc_acl_0005.html", "doc_type":"usermanual", - "p_code":"62", - "code":"70" + "p_code":"72", + "code":"80" }, { "desc":"Enable or disable an inbound or outbound rule based on your network security requirements.Log in to the management console.Click in the upper left corner and select the ", @@ -635,8 +725,8 @@ "title":"Enabling or Disabling a Firewall Rule", "uri":"vpc_acl_0006.html", "doc_type":"usermanual", - "p_code":"62", - "code":"71" + "p_code":"72", + "code":"81" }, { "desc":"Delete an inbound or outbound rule based on your network security requirements.Log in to the management console.Click in the upper left corner and select the desired reg", @@ -644,26 +734,26 @@ "title":"Deleting a Firewall Rule", "uri":"vpc_acl_0007.html", "doc_type":"usermanual", - "p_code":"62", - "code":"72" + "p_code":"72", + "code":"82" }, { - "desc":"View details about a firewall.Log in to the management console.Click in the upper left corner and select the desired region and project.On the console homepage, under Ne", + "desc":"View details about a firewall.Log in to the management console.Click in the upper left corner and select the desired region and project.Click in the upper left corner a", "product_code":"vpc", "title":"Viewing a Firewall", "uri":"vpc_acl_0009.html", "doc_type":"usermanual", - "p_code":"62", - "code":"73" + "p_code":"72", + "code":"83" }, { - "desc":"Modify the name and description of a firewall.Log in to the management console.Click in the upper left corner and select the desired region and project.On the console ho", + "desc":"Modify the name and description of a firewall.Log in to the management console.Click in the upper left corner and select the desired region and project.Click in the upp", "product_code":"vpc", "title":"Modifying a Firewall", "uri":"vpc_acl_0010.html", "doc_type":"usermanual", - "p_code":"62", - "code":"74" + "p_code":"72", + "code":"84" }, { "desc":"After a firewall is created, you may need to enable it based on network security requirements. You can also disable an enabled firewall if need. Before enabling a firewal", @@ -671,62 +761,44 @@ "title":"Enabling or Disabling a Firewall", "uri":"vpc_acl_0011.html", "doc_type":"usermanual", - "p_code":"62", - "code":"75" + "p_code":"72", + "code":"85" }, { - "desc":"Delete a firewall when it is no longer required.Log in to the management console.Click in the upper left corner and select the desired region and project.On the console ", + "desc":"Delete a firewall when it is no longer required.Log in to the management console.Click in the upper left corner and select the desired region and project.Click in the u", "product_code":"vpc", "title":"Deleting a Firewall", "uri":"vpc_acl_0012.html", "doc_type":"usermanual", - "p_code":"62", - "code":"76" - }, - { - "desc":"You can configure security groups and firewall to increase the security of ECSs in your VPC.Security groups operate at the ECS level.Firewalls operate at the subnet level", - "product_code":"vpc", - "title":"Differences Between Security Groups and Firewalls", - "uri":"en-us_topic_0052003963.html", - "doc_type":"usermanual", - "p_code":"45", - "code":"77" + "p_code":"72", + "code":"86" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"vpc", - "title":"EIP", + "title":"Elastic IP", "uri":"vpc_eip_0000.html", "doc_type":"usermanual", - "p_code":"34", - "code":"78" + "p_code":"", + "code":"87" }, { - "desc":"You can assign an EIP and bind it to an ECS so that the ECS can access the Internet.EIPs for dedicated load balancers:In the eu-de region, if you choose to assign an EIP ", + "desc":"You can assign an EIP and bind it to an ECS so that the ECS can access the Internet.Note the following when you use EIPs of the Dedicated Load Balancer (5_gray) type:In e", "product_code":"vpc", "title":"Assigning an EIP and Binding It to an ECS", "uri":"en-us_topic_0013748738.html", "doc_type":"usermanual", - "p_code":"78", - "code":"79" + "p_code":"87", + "code":"88" }, { - "desc":"If you no longer need an EIP, unbind it from the ECS and release the EIP to avoid wasting network resources.EIP assigned together with your load balancers will also be di", + "desc":"If you no longer need an EIP, unbind it from the ECS and release the EIP to avoid wasting network resources.In eu-de, EIPs of the Dedicated Load Balancer (5_gray) type ca", "product_code":"vpc", "title":"Unbinding an EIP from an ECS and Releasing the EIP", "uri":"vpc_eip_0001.html", "doc_type":"usermanual", - "p_code":"78", - "code":"80" - }, - { - "desc":"Tags can be added to EIPs to facilitate EIP identification and administration. You can add a tag to an EIP when assigning the EIP. Alternatively, you can add a tag to an ", - "product_code":"vpc", - "title":"Managing EIP Tags", - "uri":"en-us_topic_0068145818.html", - "doc_type":"usermanual", - "p_code":"78", - "code":"81" + "p_code":"87", + "code":"89" }, { "desc":"Modify the EIP bandwidth name or size.This section describes how to modify the dedicated bandwidth or shared bandwidth of an EIP. For details about how to modify a shared", @@ -734,8 +806,26 @@ "title":"Modifying an EIP Bandwidth", "uri":"en-us_topic_0013748743.html", "doc_type":"usermanual", - "p_code":"78", - "code":"82" + "p_code":"87", + "code":"90" + }, + { + "desc":"The information of all EIPs under your account can be exported in an Excel file to a local directory. The file records the ID, status, type, bandwidth name, and bandwidth", + "product_code":"vpc", + "title":"Exporting EIP Information", + "uri":"eip_0003.html", + "doc_type":"usermanual", + "p_code":"87", + "code":"91" + }, + { + "desc":"Tags can be added to EIPs to facilitate EIP identification and administration. You can add a tag to an EIP when assigning the EIP. Alternatively, you can add a tag to an ", + "product_code":"vpc", + "title":"Managing EIP Tags", + "uri":"en-us_topic_0068145818.html", + "doc_type":"usermanual", + "p_code":"87", + "code":"92" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -743,26 +833,26 @@ "title":"Shared Bandwidth", "uri":"vpc010003.html", "doc_type":"usermanual", - "p_code":"34", - "code":"83" + "p_code":"", + "code":"93" }, { - "desc":"Shared bandwidth allows multiple EIPs to share the same bandwidth. All ECSs, BMSs, and load balancers that have EIPs bound in the same region can share a bandwidth.When y", + "desc":"A shared bandwidth can be shared by multiple EIPs and controls the data transfer rate on these EIPs in a centralized manner. All ECSs, BMSs, and load balancers that have ", "product_code":"vpc", "title":"Shared Bandwidth Overview", "uri":"vpc010004.html", "doc_type":"usermanual", - "p_code":"83", - "code":"84" + "p_code":"93", + "code":"94" }, { - "desc":"Assign a shared bandwidth for use with EIPs.Log in to the management console.Click in the upper left corner and select the desired region and project.On the console home", + "desc":"Assign a shared bandwidth for use with EIPs.Log in to the management console.Click in the upper left corner and select the desired region and project.Click in the upper", "product_code":"vpc", "title":"Assigning a Shared Bandwidth", "uri":"vpc010005.html", "doc_type":"usermanual", - "p_code":"83", - "code":"85" + "p_code":"93", + "code":"95" }, { "desc":"Add EIPs to a shared bandwidth and the EIPs can then share that bandwidth. You can add multiple EIPs to a shared bandwidth at the same time.After an EIP is added to a sha", @@ -770,8 +860,8 @@ "title":"Adding EIPs to a Shared Bandwidth", "uri":"vpc010006.html", "doc_type":"usermanual", - "p_code":"83", - "code":"86" + "p_code":"93", + "code":"96" }, { "desc":"Remove EIPs that are no longer required from a shared bandwidth if needed.Log in to the management console.Click in the upper left corner and select the desired region a", @@ -779,8 +869,8 @@ "title":"Removing EIPs from a Shared Bandwidth", "uri":"vpc010007.html", "doc_type":"usermanual", - "p_code":"83", - "code":"87" + "p_code":"93", + "code":"97" }, { "desc":"You can modify the name and size of a shared bandwidth as required.Log in to the management console.Click in the upper left corner and select the desired region and proj", @@ -788,8 +878,8 @@ "title":"Modifying a Shared Bandwidth", "uri":"vpc010008.html", "doc_type":"usermanual", - "p_code":"83", - "code":"88" + "p_code":"93", + "code":"98" }, { "desc":"Delete a shared bandwidth when it is no longer required.Before deleting a shared bandwidth, remove all the EIPs associated with it. For details, see Removing EIPs from a ", @@ -797,125 +887,134 @@ "title":"Deleting a Shared Bandwidth", "uri":"vpc010009.html", "doc_type":"usermanual", - "p_code":"83", - "code":"89" + "p_code":"93", + "code":"99" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"vpc", - "title":"Route Table", - "uri":"vpc_route_0000.html", + "title":"Route Tables", + "uri":"vpc_route01_0000.html", "doc_type":"usermanual", - "p_code":"34", - "code":"90" - }, - { - "desc":"A custom route is a user-defined routing rule added to a VPC.A route table contains a set of routes that are used to determine where network traffic from your subnets in ", - "product_code":"vpc", - "title":"Route Table Overview", - "uri":"route_0001.html", - "doc_type":"usermanual", - "p_code":"90", - "code":"91" - }, - { - "desc":"To use the route table function provided by the VPC service, you need to configure SNAT on an ECS to enable other ECSs that do not have EIPs bound in a VPC to access the ", - "product_code":"vpc", - "title":"Configuring an SNAT Server", - "uri":"vpc_route_0004.html", - "doc_type":"usermanual", - "p_code":"90", - "code":"92" - }, - { - "desc":"You can create a custom route table if you do not want to use the default one.Log in to the management console.Click in the upper left corner and select the desired regi", - "product_code":"vpc", - "title":"Creating a Custom Route Table", - "uri":"vpc_route_0005.html", - "doc_type":"usermanual", - "p_code":"90", - "code":"93" - }, - { - "desc":"Each route table contains a default system route, which indicates that ECSs in a VPC can communicate with each other. You can add custom routes as required to forward the", - "product_code":"vpc", - "title":"Adding a Custom Route", - "uri":"vpc_route_0006.html", - "doc_type":"usermanual", - "p_code":"90", - "code":"94" - }, - { - "desc":"After a route table is associated with a subnet, the routes in the route table control the routing for the subnet and apply to all cloud resources in the subnet. Determin", - "product_code":"vpc", - "title":"Associating a Subnet with a Route Table", - "uri":"vpc_route_0007.html", - "doc_type":"usermanual", - "p_code":"90", - "code":"95" - }, - { - "desc":"You can change the route table associated with the subnet to another one in the VPC. If the route table for a subnet is changed, routes in the new route table will apply ", - "product_code":"vpc", - "title":"Changing the Route Table Associated with a Subnet", - "uri":"vpc_route_0008.html", - "doc_type":"usermanual", - "p_code":"90", - "code":"96" - }, - { - "desc":"You can view details about a route table.Log in to the management console.Click in the upper left corner and select the desired region and project.On the console homepag", - "product_code":"vpc", - "title":"Viewing a Route Table", - "uri":"vpc_route_0009.html", - "doc_type":"usermanual", - "p_code":"90", - "code":"97" - }, - { - "desc":"You can delete custom route tables but cannot delete the default route table.Before deleting a route table, ensure that no subnet has been associated with the custom rout", - "product_code":"vpc", - "title":"Deleting a Route Table", - "uri":"vpc_route_0010.html", - "doc_type":"usermanual", - "p_code":"90", - "code":"98" - }, - { - "desc":"Modify a route.The system route cannot be modified.The routes delivered by the VPN, Direct Connect services to the default route table cannot be modified.Log in to the ma", - "product_code":"vpc", - "title":"Modifying a Route", - "uri":"vpc_route_0011.html", - "doc_type":"usermanual", - "p_code":"90", - "code":"99" - }, - { - "desc":"Delete a route if it is no longer required.Log in to the management console.Click in the upper left corner and select the desired region and project.On the console homep", - "product_code":"vpc", - "title":"Deleting a Route", - "uri":"vpc_route_0012.html", - "doc_type":"usermanual", - "p_code":"90", + "p_code":"", "code":"100" }, { - "desc":"You can replicate a created route as required.The routes delivered by the VPN service to the default route table cannot be replicated.The routes delivered to the default ", + "desc":"A route table contains a set of routes that are used to determine where network traffic from your subnets in a VPC is directed. Each subnet must be associated with a rout", "product_code":"vpc", - "title":"Replicating a Route", - "uri":"vpc_route_0013.html", + "title":"Route Table Overview", + "uri":"vpc_route01_0001.html", "doc_type":"usermanual", - "p_code":"90", + "p_code":"100", "code":"101" }, + { + "desc":"If your default route table cannot meet your service requirements, you can create a custom route table by following the instructions provided in this section.Each VPC can", + "product_code":"vpc", + "title":"Creating a Custom Route Table", + "uri":"vpc_route01_0005.html", + "doc_type":"usermanual", + "p_code":"100", + "code":"102" + }, + { + "desc":"After a route table is associated with a subnet, its routes control the routing for the subnet and apply to all cloud resources in the subnet.A subnet can only be associa", + "product_code":"vpc", + "title":"Associating a Route Table with a Subnet", + "uri":"vpc_route01_0007.html", + "doc_type":"usermanual", + "p_code":"100", + "code":"103" + }, + { + "desc":"You can change the route table for a subnet. If the route table for a subnet is changed, routes in the new route table will apply to all cloud resources in the subnet.Log", + "product_code":"vpc", + "title":"Changing the Route Table Associated with a Subnet", + "uri":"vpc_route01_0008.html", + "doc_type":"usermanual", + "p_code":"100", + "code":"104" + }, + { + "desc":"This section describes how to view the route table associated with a subnet.Log in to the management console.Click in the upper left corner and select the desired region", + "product_code":"vpc", + "title":"Viewing the Route Table Associated with a Subnet", + "uri":"vpc_route01_0015.html", + "doc_type":"usermanual", + "p_code":"100", + "code":"105" + }, + { + "desc":"This section describes how to view detailed information about a route table, including:Basic information, such as name, type (default or custom), and ID of the route tabl", + "product_code":"vpc", + "title":"Viewing Route Table Information", + "uri":"vpc_route01_0009.html", + "doc_type":"usermanual", + "p_code":"100", + "code":"106" + }, { "desc":"Information about all route tables under your account can be exported as an Excel file to a local directory. This file records the name, ID, VPC, type, and number of asso", "product_code":"vpc", "title":"Exporting Route Table Information", - "uri":"vpc_route_0014.html", + "uri":"vpc_route01_0014.html", "doc_type":"usermanual", - "p_code":"90", - "code":"102" + "p_code":"100", + "code":"107" + }, + { + "desc":"This section describes how to delete a custom route table.The default route table cannot be deleted.A custom route table with a subnet associated cannot be deleted direct", + "product_code":"vpc", + "title":"Deleting a Route Table", + "uri":"vpc_route01_0010.html", + "doc_type":"usermanual", + "p_code":"100", + "code":"108" + }, + { + "desc":"Each route table contains a default system route, which indicates that ECSs in a VPC can communicate with each other. You can also add custom routes as required to forwar", + "product_code":"vpc", + "title":"Adding a Custom Route", + "uri":"vpc_route01_0006.html", + "doc_type":"usermanual", + "p_code":"100", + "code":"109" + }, + { + "desc":"This section describes how to modify a custom route in a route table.System routes cannot be modified.When you create a VPC endpoint, VPN or Direct Connect connection, th", + "product_code":"vpc", + "title":"Modifying a Route", + "uri":"vpc_route01_0011.html", + "doc_type":"usermanual", + "p_code":"100", + "code":"110" + }, + { + "desc":"This section describes how to replicate routes among all route tables of a VPC. VPC route tables include the default and custom route tables.Table 1 shows whether routes ", + "product_code":"vpc", + "title":"Replicating a Route", + "uri":"vpc_route01_0013.html", + "doc_type":"usermanual", + "p_code":"100", + "code":"111" + }, + { + "desc":"This section describes how to delete a custom route from a route table.System routes cannot be deleted.The routes automatically delivered by VPN or Direct Connect to the ", + "product_code":"vpc", + "title":"Deleting a Route", + "uri":"vpc_route01_0012.html", + "doc_type":"usermanual", + "p_code":"100", + "code":"112" + }, + { + "desc":"Together with VPC route tables, you can configure SNAT on an ECS to enable other ECSs that have no EIPs bound in the same VPC to access the Internet through this ECS.The ", + "product_code":"vpc", + "title":"Configuring an SNAT Server", + "uri":"vpc_route_0004.html", + "doc_type":"usermanual", + "p_code":"100", + "code":"113" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -923,89 +1022,107 @@ "title":"VPC Peering Connection", "uri":"vpc_peering_0000.html", "doc_type":"usermanual", - "p_code":"34", - "code":"103" + "p_code":"", + "code":"114" }, { - "desc":"A VPC peering connection is a network connection between two VPCs in one region that enables you to route traffic between them using private IP addresses. ECSs in either ", + "desc":"A VPC peering connection is a networking connection between two VPCs and enables them to communicate using private IP addresses. The VPCs to be peered can be in the same ", "product_code":"vpc", - "title":"VPC Peering Connection Creation Procedure", + "title":"VPC Peering Connection Overview", "uri":"en-us_topic_0046655036.html", "doc_type":"usermanual", - "p_code":"103", - "code":"104" + "p_code":"114", + "code":"115" }, { - "desc":"To enable two VPCs in the same region to communicate with each other, you can create a VPC peering connection between them. The VPC and subnet CIDR blocks must meet the r", + "desc":"A VPC peering connection is a networking connection between two VPCs and enables them to communicate. Table 1 lists different scenarios of using VPC peering connections.T", "product_code":"vpc", - "title":"VPC Peering Connection Configuration Plans", + "title":"VPC Peering Connection Usage Examples", "uri":"en-us_topic_0046809840.html", "doc_type":"usermanual", - "p_code":"103", - "code":"105" + "p_code":"114", + "code":"116" }, { - "desc":"To create a VPC peering connection, first create a request to peer with another VPC. You can request a VPC peering connection with another VPC in your account, but the tw", + "desc":"If two VPCs from the same region cannot communicate with each other, you can use a VPC peering connection. This section describes how to create a VPC peering connection b", "product_code":"vpc", "title":"Creating a VPC Peering Connection with Another VPC in Your Account", "uri":"en-us_topic_0046655037.html", "doc_type":"usermanual", - "p_code":"103", - "code":"106" + "p_code":"114", + "code":"117" }, { - "desc":"The VPC service also allows you to create a VPC peering connection with a VPC in another account. The two VPCs must be in the same region. If you request a VPC peering co", + "desc":"If two VPCs from the same region cannot communicate with each other, you can use a VPC peering connection. This section describes how to create a VPC peering connection b", "product_code":"vpc", "title":"Creating a VPC Peering Connection with a VPC in Another Account", "uri":"en-us_topic_0046655038.html", "doc_type":"usermanual", - "p_code":"103", - "code":"107" + "p_code":"114", + "code":"118" }, { - "desc":"The owners of both the local and peer accounts can view information about the created VPC peering connections and those that are still waiting to be accepted.Log in to th", + "desc":"If you create a VPC peering connection between two VPCs in different accounts, you can refer to this section to obtain the project ID of the region that the peer VPC resi", "product_code":"vpc", - "title":"Viewing VPC Peering Connections", - "uri":"vpc_peering_0001.html", + "title":"Obtaining the Peer Project ID of a VPC Peering Connection", + "uri":"vpc_peering_0005.html", "doc_type":"usermanual", - "p_code":"103", - "code":"108" + "p_code":"114", + "code":"119" }, { - "desc":"The owners of both the local and peer accounts can modify a VPC peering connection in any state. The VPC peering connection name can be changed.Log in to the management c", + "desc":"This section describes how to modify the name of a VPC peering connection.Either owner of a VPC in a peering connection can modify the VPC peering connection in any state", "product_code":"vpc", "title":"Modifying a VPC Peering Connection", "uri":"vpc_peering_0002.html", "doc_type":"usermanual", - "p_code":"103", - "code":"109" + "p_code":"114", + "code":"120" }, { - "desc":"The owners of both the local and peer accounts can delete a VPC peering connection in any state. After a VPC peering connection is deleted, routes configured for the conn", + "desc":"This section describes how to view basic information about a VPC peering connection, including the connection name, status, and information about the local and peer VPCs.", + "product_code":"vpc", + "title":"Viewing VPC Peering Connections", + "uri":"vpc_peering_0001.html", + "doc_type":"usermanual", + "p_code":"114", + "code":"121" + }, + { + "desc":"This section describes how to delete a VPC peering connection.Either owner of a VPC in a peering connection can delete the VPC peering connection in any state.The owner o", "product_code":"vpc", "title":"Deleting a VPC Peering Connection", "uri":"vpc_peering_0003.html", "doc_type":"usermanual", - "p_code":"103", - "code":"110" + "p_code":"114", + "code":"122" }, { - "desc":"After routes are added for a VPC peering connection, the owners of both the local and peer accounts can view information about the routes on the page showing details abou", + "desc":"This section describes how to modify the routes added for a VPC peering connection in the route tables of the local and peer VPCs.Modifying Routes of a VPC Peering Connec", + "product_code":"vpc", + "title":"Modifying Routes Configured for a VPC Peering Connection", + "uri":"vpc_peering_0007.html", + "doc_type":"usermanual", + "p_code":"114", + "code":"123" + }, + { + "desc":"This section describes how to view the routes added to the route tables of local and peer VPCs of a VPC peering connection.Viewing Routes of a VPC Peering Connection Betw", "product_code":"vpc", "title":"Viewing Routes Configured for a VPC Peering Connection", "uri":"vpc_peering_0004.html", "doc_type":"usermanual", - "p_code":"103", - "code":"111" + "p_code":"114", + "code":"124" }, { - "desc":"After routes are added for a VPC peering connection, the owners of both the local and peer accounts can delete the routes on the Route Tables page.Log in to the managemen", + "desc":"This section describes how to delete routes from the route tables of the local and peer VPCs connected by a VPC peering connection.Deleting Routes of a VPC Peering Connec", "product_code":"vpc", - "title":"Deleting a VPC Peering Route", + "title":"Deleting Routes Configured for a VPC Peering Connection", "uri":"vpc_peering_0006.html", "doc_type":"usermanual", - "p_code":"103", - "code":"112" + "p_code":"114", + "code":"125" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -1013,8 +1130,8 @@ "title":"VPC Flow Log", "uri":"FlowLog_0001.html", "doc_type":"usermanual", - "p_code":"34", - "code":"113" + "p_code":"", + "code":"126" }, { "desc":"A VPC flow log records information about the traffic going to and from a VPC. VPC flow logs help you monitor network traffic, analyze network attacks, and determine wheth", @@ -1022,8 +1139,8 @@ "title":"VPC Flow Log Overview", "uri":"FlowLog_0002.html", "doc_type":"usermanual", - "p_code":"113", - "code":"114" + "p_code":"126", + "code":"127" }, { "desc":"A VPC flow log records information about the traffic going to and from a VPC.Ensure that the following operations have been performed on the LTS console:Create a log grou", @@ -1031,8 +1148,8 @@ "title":"Creating a VPC Flow Log", "uri":"FlowLog_0003.html", "doc_type":"usermanual", - "p_code":"113", - "code":"115" + "p_code":"126", + "code":"128" }, { "desc":"View information about your flow log record.The capture window is approximately 10 minutes, which indicates that a flow log record will be generated every 10 minutes. Aft", @@ -1040,8 +1157,8 @@ "title":"Viewing a VPC Flow Log", "uri":"FlowLog_0004.html", "doc_type":"usermanual", - "p_code":"113", - "code":"116" + "p_code":"126", + "code":"129" }, { "desc":"After a VPC flow log is created, the VPC flow log is automatically enabled. If you do not need to record traffic data, you can disable the corresponding VPC flow log. The", @@ -1049,8 +1166,8 @@ "title":"Enabling or Disabling VPC Flow Log", "uri":"FlowLog_0006.html", "doc_type":"usermanual", - "p_code":"113", - "code":"117" + "p_code":"126", + "code":"130" }, { "desc":"Delete a VPC flow log that is not required. Deleting a VPC flow log will not delete the existing flow log records in LTS.If a NIC that uses a VPC flow log is deleted, the", @@ -1058,8 +1175,8 @@ "title":"Deleting a VPC Flow Log", "uri":"FlowLog_0005.html", "doc_type":"usermanual", - "p_code":"113", - "code":"118" + "p_code":"126", + "code":"131" }, { "desc":"Direct Connect allows you to establish a dedicated network connection between your data center and the cloud platform. With Direct Connect, you can establish a private co", @@ -1067,8 +1184,8 @@ "title":"Direct Connect", "uri":"vpc_dc_0000.html", "doc_type":"usermanual", - "p_code":"34", - "code":"119" + "p_code":"", + "code":"132" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -1076,8 +1193,8 @@ "title":"Virtual IP Address", "uri":"vpc_vip_0000.html", "doc_type":"usermanual", - "p_code":"34", - "code":"120" + "p_code":"", + "code":"133" }, { "desc":"A virtual IP address can be shared among multiple ECSs. An ECS can have both private and virtual IP addresses, and you can access the ECS through either IP address. A vir", @@ -1085,8 +1202,8 @@ "title":"Virtual IP Address Overview", "uri":"vpc_vip_0001.html", "doc_type":"usermanual", - "p_code":"120", - "code":"121" + "p_code":"133", + "code":"134" }, { "desc":"If an ECS requires a virtual IP address or if a virtual IP address needs to be reserved, you can assign a virtual IP address from the subnet.Log in to the management cons", @@ -1094,8 +1211,8 @@ "title":"Assigning a Virtual IP Address", "uri":"vpc_vip_0002.html", "doc_type":"usermanual", - "p_code":"120", - "code":"122" + "p_code":"133", + "code":"135" }, { "desc":"You can bind a virtual IP address to an EIP so that you can access the ECSs bound with the same virtual IP address from the Internet. These ECSs can work in the active/st", @@ -1103,8 +1220,8 @@ "title":"Binding a Virtual IP Address to an EIP or ECS", "uri":"en-us_topic_0067802474.html", "doc_type":"usermanual", - "p_code":"120", - "code":"123" + "p_code":"133", + "code":"136" }, { "desc":"This section describes how to bind a virtual IP address to an EIP.You have assigned an EIP.Log in to the management console.Click in the upper left corner and select the", @@ -1112,8 +1229,8 @@ "title":"Binding a Virtual IP Address to an EIP", "uri":"vpc_vip_0003.html", "doc_type":"usermanual", - "p_code":"120", - "code":"124" + "p_code":"133", + "code":"137" }, { "desc":"Configure the ECS networking based on Networking.Create a VPN.The VPN can be used to access the virtual IP address of the ECS.", @@ -1121,8 +1238,8 @@ "title":"Using a VPN to Access a Virtual IP Address", "uri":"vpc_vip_0004.html", "doc_type":"usermanual", - "p_code":"120", - "code":"125" + "p_code":"133", + "code":"138" }, { "desc":"Configure the ECS networking based on Networking.Create a Direct Connect connection.The created Direct Connect connection can be used to access the virtual IP address of ", @@ -1130,8 +1247,8 @@ "title":"Using a Direct Connect Connection to Access the Virtual IP Address", "uri":"vpc_vip_0005.html", "doc_type":"usermanual", - "p_code":"120", - "code":"126" + "p_code":"133", + "code":"139" }, { "desc":"Configure the ECS networking based on Networking.Create a VPC peering connection.You can access the virtual IP address of the ECS through the VPC peering connection.", @@ -1139,26 +1256,44 @@ "title":"Using a VPC Peering Connection to Access the Virtual IP Address", "uri":"vpc_vip_0006.html", "doc_type":"usermanual", - "p_code":"120", - "code":"127" + "p_code":"133", + "code":"140" }, { - "desc":"Log in to the management console.Click in the upper left corner and select the desired region and project.Under Compute, click Elastic Cloud Server.In the ECS list, clic", + "desc":"Log in to the management console.Click in the upper left corner and select the desired region and project.Under Computing, click Elastic Cloud Server.In the ECS list, cl", "product_code":"vpc", "title":"Disabling Source and Destination Check (HA Load Balancing Cluster Scenario)", "uri":"vpc_vip_0008.html", "doc_type":"usermanual", - "p_code":"120", - "code":"128" + "p_code":"133", + "code":"141" }, { - "desc":"If you no longer need a virtual IP address or a reserved virtual IP address, you can release it to avoid wasting resources.Before deleting a virtual IP address, ensure th", + "desc":"This section describes how to unbind a virtual IP address from an ECS.Log in to the management console.Click in the upper left corner and select the desired region and p", + "product_code":"vpc", + "title":"Unbinding a Virtual IP Address from an Instance", + "uri":"vpc_vip_0010.html", + "doc_type":"usermanual", + "p_code":"133", + "code":"142" + }, + { + "desc":"This section describes how to unbind a virtual IP address from an EIP.Log in to the management console.Click in the upper left corner and select the desired region and p", + "product_code":"vpc", + "title":"Unbinding a Virtual IP Address from an EIP", + "uri":"vpc_vip_0011.html", + "doc_type":"usermanual", + "p_code":"133", + "code":"143" + }, + { + "desc":"If you no longer need a virtual IP address or a reserved virtual IP address, you can release it to avoid wasting resources.If you want to release a virtual IP address tha", "product_code":"vpc", "title":"Releasing a Virtual IP Address", "uri":"vpc_vip_0009.html", "doc_type":"usermanual", - "p_code":"120", - "code":"129" + "p_code":"133", + "code":"144" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -1166,8 +1301,8 @@ "title":"Monitoring", "uri":"vpc010011.html", "doc_type":"usermanual", - "p_code":"34", - "code":"130" + "p_code":"", + "code":"145" }, { "desc":"This section describes the namespace, list, and measurement dimensions of EIP and bandwidth metrics that you can check on Cloud Eye. You can use APIs or the Cloud Eye con", @@ -1175,17 +1310,17 @@ "title":"Supported Metrics", "uri":"vpc010012.html", "doc_type":"usermanual", - "p_code":"130", - "code":"131" + "p_code":"145", + "code":"146" }, { - "desc":"View related metrics to see bandwidth and EIP usage information.Log in to the management console.Click in the upper left corner and select the desired region and project", + "desc":"View related metrics to see bandwidth and EIP usage information.You can view the inbound bandwidth, outbound bandwidth, inbound bandwidth usage, outbound bandwidth usage,", "product_code":"vpc", "title":"Viewing Metrics", "uri":"vpc010013.html", "doc_type":"usermanual", - "p_code":"130", - "code":"132" + "p_code":"145", + "code":"147" }, { "desc":"You can configure alarm rules to customize the monitored objects and notification policies. You can learn your resource statuses at any time.Log in to the management cons", @@ -1193,872 +1328,53 @@ "title":"Creating an Alarm Rule", "uri":"vpc010014.html", "doc_type":"usermanual", - "p_code":"130", - "code":"133" - }, - { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"vpc", - "title":"Operation Guide (Old Console Edition)", - "uri":"vpc_oldui_0000.html", - "doc_type":"usermanual", - "p_code":"", - "code":"134" - }, - { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"vpc", - "title":"VPC and Subnet", - "uri":"vpc_vpc02_0000.html", - "doc_type":"usermanual", - "p_code":"134", - "code":"135" - }, - { - "desc":"A VPC provides an isolated virtual network for ECSs. You can configure and manage the network as required.You can create a VPC by following the procedure provided in this", - "product_code":"vpc", - "title":"Creating a VPC", - "uri":"vpc_vpc02_0002.html", - "doc_type":"usermanual", - "p_code":"135", - "code":"136" - }, - { - "desc":"Change the VPC name and CIDR block.If the VPC CIDR block conflicts with the CIDR block of a VPN created in the VPC, you can modify its CIDR block.When modifying the VPC C", - "product_code":"vpc", - "title":"Modifying a VPC", - "uri":"vpc_vpc02_0003.html", - "doc_type":"usermanual", - "p_code":"135", - "code":"137" - }, - { - "desc":"A VPC comes with a default subnet. If the default subnet cannot meet your requirements, you can create one.The subnet is configured with DHCP by default. When an ECS in t", - "product_code":"vpc", - "title":"Creating a Subnet for the VPC", - "uri":"vpc_vpc02_0004.html", - "doc_type":"usermanual", - "p_code":"135", - "code":"138" - }, - { - "desc":"Modify the subnet name, NTP server address, and DNS server address.Log in to the management console.Click in the upper left corner and select the desired region and proj", - "product_code":"vpc", - "title":"Modifying a Subnet", - "uri":"vpc_vpc02_0005.html", - "doc_type":"usermanual", - "p_code":"135", - "code":"139" - }, - { - "desc":"You can delete a subnet to release network resources if the subnet is no longer required.You can delete a subnet only if there are no resources in the subnet. If there ar", - "product_code":"vpc", - "title":"Deleting a Subnet", - "uri":"vpc_vpc02_0006.html", - "doc_type":"usermanual", - "p_code":"135", - "code":"140" - }, - { - "desc":"You can delete a VPC if the VPC is no longer required.You can delete a VPC only if there are no resources in the VPC. If there are resources in the VPC, you must delete t", - "product_code":"vpc", - "title":"Deleting a VPC", - "uri":"vpc_vpc02_0007.html", - "doc_type":"usermanual", - "p_code":"135", - "code":"141" - }, - { - "desc":"A VPC tag identifies a VPC. Tags can be added to VPCs to facilitate VPC identification and management. You can add a tag to a VPC when creating the VPC, or you can add a ", - "product_code":"vpc", - "title":"Managing VPC Tags", - "uri":"vpc_vpc02_0008.html", - "doc_type":"usermanual", - "p_code":"135", - "code":"142" - }, - { - "desc":"A subnet tag identifies a subnet. Tags can be added to subnets to facilitate subnet identification and administration. You can add a tag to a subnet when creating the sub", - "product_code":"vpc", - "title":"Managing Subnet Tags", - "uri":"vpc_vpc02_0009.html", - "doc_type":"usermanual", - "p_code":"135", - "code":"143" - }, - { - "desc":"Information about all VPCs under your account can be exported as an Excel file to a local directory. This file records the names, ID, status, IP address ranges of VPCs, a", - "product_code":"vpc", - "title":"Exporting VPC List", - "uri":"vpc_vpc02_0010.html", - "doc_type":"usermanual", - "p_code":"135", - "code":"144" - }, - { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"vpc", - "title":"Security", - "uri":"vpc_security02_0000.html", - "doc_type":"usermanual", - "p_code":"134", - "code":"145" - }, - { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"vpc", - "title":"Security Group", - "uri":"vpc_SecurityGroup02_0000.html", - "doc_type":"usermanual", "p_code":"145", - "code":"146" - }, - { - "desc":"A security group is a collection of access control rules for cloud resources, such as cloud servers, containers, and databases, that have the same security protection req", - "product_code":"vpc", - "title":"Security Group Overview", - "uri":"vpc_SecurityGroup02_0001.html", - "doc_type":"usermanual", - "p_code":"146", - "code":"147" - }, - { - "desc":"Your account automatically comes with a default security group. The default security group allows all outbound traffic, denies all inbound traffic, and allows all traffic", - "product_code":"vpc", - "title":"Default Security Groups and Security Group Rules", - "uri":"vpc_SecurityGroup02_0002.html", - "doc_type":"usermanual", - "p_code":"146", "code":"148" }, { - "desc":"Common security group configurations are presented here. The examples in this section allow all outgoing data packets by default. This section will only describe how to c", + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"vpc", - "title":"Security Group Configuration Examples", - "uri":"vpc_SecurityGroup02_0003.html", + "title":"Permissions Management", + "uri":"permission_0001.html", "doc_type":"usermanual", - "p_code":"146", + "p_code":"", "code":"149" }, { - "desc":"To improve ECS access security, you can create security groups, define security group rules, and add ECSs in a VPC to different security groups. We recommend that you all", + "desc":"This section describes how to use IAM to implement fine-grained permissions control for your VPC resources. With IAM, you can:Create IAM users for employees based on your", "product_code":"vpc", - "title":"Creating a Security Group", - "uri":"vpc_SecurityGroup02_0004.html", + "title":"Creating a User and Granting VPC Permissions", + "uri":"permission_0003.html", "doc_type":"usermanual", - "p_code":"146", + "p_code":"149", "code":"150" }, { - "desc":"A security group is a collection of access control rules for cloud resources, such as cloud servers, containers, and databases, to control inbound and outbound traffic. C", + "desc":"Custom policies can be created to supplement the system-defined policies of VPC. For the actions supported for custom policies, see Permissions Policies and Supported Act", "product_code":"vpc", - "title":"Adding a Security Group Rule", - "uri":"vpc_SecurityGroup02_0005.html", + "title":"VPC Custom Policies", + "uri":"permission_0004.html", "doc_type":"usermanual", - "p_code":"146", + "p_code":"149", "code":"151" }, - { - "desc":"You can add multiple security group rules with different protocols and ports at the same time.Log in to the management console.Click in the upper left corner and select ", - "product_code":"vpc", - "title":"Fast-Adding Security Group Rules", - "uri":"vpc_SecurityGroup02_0006.html", - "doc_type":"usermanual", - "p_code":"146", - "code":"152" - }, - { - "desc":"Replicate an existing security group rule to generate a new rule. When replicating a security group rule, you can make changes so that it is not a perfect copy.Log in to ", - "product_code":"vpc", - "title":"Replicating a Security Group Rule", - "uri":"vpc_SecurityGroup02_0007.html", - "doc_type":"usermanual", - "p_code":"146", - "code":"153" - }, - { - "desc":"You can modify the port, protocol, and IP address of a security group rule to meet your specific requirements.Log in to the management console.Click in the upper left co", - "product_code":"vpc", - "title":"Modifying a Security Group Rule", - "uri":"vpc_SecurityGroup02_0008.html", - "doc_type":"usermanual", - "p_code":"146", - "code":"154" - }, - { - "desc":"If the source of an inbound security group rule or destination of an outbound security group rule needs to be changed, you need to first delete the security group rule an", - "product_code":"vpc", - "title":"Deleting a Security Group Rule", - "uri":"vpc_SecurityGroup02_0009.html", - "doc_type":"usermanual", - "p_code":"146", - "code":"155" - }, - { - "desc":"If you want to quickly apply the rules of one security group to another, or if you want to modify multiple rules of the current security group at once, you can import or ", - "product_code":"vpc", - "title":"Importing and Exporting Security Group Rules", - "uri":"vpc_SecurityGroup02_0010.html", - "doc_type":"usermanual", - "p_code":"146", - "code":"156" - }, - { - "desc":"This section describes how to delete security groups that you are no longer required.The default security group cannot be deleted.If a security group is associated with r", - "product_code":"vpc", - "title":"Deleting a Security Group", - "uri":"vpc_SecurityGroup02_0011.html", - "doc_type":"usermanual", - "p_code":"146", - "code":"157" - }, - { - "desc":"After a security group is created, you can add instances to the security group to protect the instances. You can also remove them from the security group as required.You ", - "product_code":"vpc", - "title":"Adding Instances to and Removing Them from a Security Group", - "uri":"vpc_SecurityGroup02_0012.html", - "doc_type":"usermanual", - "p_code":"146", - "code":"158" - }, - { - "desc":"Modify the name and description of a created security group.Method 1Log in to the management console.Click in the upper left corner and select the desired region and pro", - "product_code":"vpc", - "title":"Modifying a Security Group", - "uri":"vpc_SecurityGroup02_0013.html", - "doc_type":"usermanual", - "p_code":"146", - "code":"159" - }, - { - "desc":"View inbound and outbound rules of a security group used by an ECS.Log in to the management console.Click in the upper left corner and select the desired region and proj", - "product_code":"vpc", - "title":"Viewing the Security Group of an ECS", - "uri":"vpc_SecurityGroup02_0014.html", - "doc_type":"usermanual", - "p_code":"146", - "code":"160" - }, - { - "desc":"Change the security group associated with an ECS NIC.Log in to the management console.Click in the upper left corner and select your region and project.Under Computing, ", - "product_code":"vpc", - "title":"Changing the Security Group of an ECS", - "uri":"vpc_SecurityGroup02_0015.html", - "doc_type":"usermanual", - "p_code":"146", - "code":"161" - }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"vpc", - "title":"Firewall", - "uri":"vpc_acl02_0000.html", - "doc_type":"usermanual", - "p_code":"145", - "code":"162" - }, - { - "desc":"A firewall is an optional layer of security for your subnets. After you associate one or more subnets with a firewall, you can control traffic in and out of the subnets.F", - "product_code":"vpc", - "title":"Firewall Overview", - "uri":"vpc_acl02_0001.html", - "doc_type":"usermanual", - "p_code":"162", - "code":"163" - }, - { - "desc":"This section provides examples for configuring firewalls.Denying Access from a Specific PortAllowing Access from Specific Ports and ProtocolsYou might want to block TCP 4", - "product_code":"vpc", - "title":"Firewall Configuration Examples", - "uri":"vpc_acl02_0002.html", - "doc_type":"usermanual", - "p_code":"162", - "code":"164" - }, - { - "desc":"You can create a custom firewall, but any newly created firewall will be disabled by default. It will not have any inbound or outbound rules, or have any subnets associat", - "product_code":"vpc", - "title":"Creating a Firewall", - "uri":"vpc_acl02_0003.html", - "doc_type":"usermanual", - "p_code":"162", - "code":"165" - }, - { - "desc":"Add an inbound or outbound rule based on your network security requirements.Log in to the management console.Click in the upper left corner and select the desired region", - "product_code":"vpc", - "title":"Adding a Firewall Rule", - "uri":"vpc_acl02_0004.html", - "doc_type":"usermanual", - "p_code":"162", - "code":"166" - }, - { - "desc":"On the page showing firewall details, associate desired subnets with a firewall. After a firewall is associated with a subnet, the firewall denies all traffic to and from", - "product_code":"vpc", - "title":"Associating Subnets with a Firewall", - "uri":"vpc_acl02_0005.html", - "doc_type":"usermanual", - "p_code":"162", - "code":"167" - }, - { - "desc":"Disassociate a subnet from a firewall when necessary.Log in to the management console.Click in the upper left corner and select the desired region and project.On the con", - "product_code":"vpc", - "title":"Disassociating a Subnet from a Firewall", - "uri":"vpc_acl02_0006.html", - "doc_type":"usermanual", - "p_code":"162", - "code":"168" - }, - { - "desc":"If you need a rule to take effect before or after a specific rule, you can insert that rule before or after the specific rule.If multiple firewall rules conflict, only th", - "product_code":"vpc", - "title":"Changing the Sequence of a Firewall Rule", - "uri":"vpc_acl02_0007.html", - "doc_type":"usermanual", - "p_code":"162", - "code":"169" - }, - { - "desc":"Modify an inbound or outbound firewall rule based on your network security requirements.Log in to the management console.Click in the upper left corner and select the de", - "product_code":"vpc", - "title":"Modifying a Firewall Rule", - "uri":"vpc_acl02_0008.html", - "doc_type":"usermanual", - "p_code":"162", - "code":"170" - }, - { - "desc":"Enable or disable an inbound or outbound rule based on your network security requirements.Log in to the management console.Click in the upper left corner and select the ", - "product_code":"vpc", - "title":"Enabling or Disabling a Firewall Rule", - "uri":"vpc_acl02_0009.html", - "doc_type":"usermanual", - "p_code":"162", - "code":"171" - }, - { - "desc":"Delete an inbound or outbound rule based on your network security requirements.Log in to the management console.Click in the upper left corner and select the desired reg", - "product_code":"vpc", - "title":"Deleting a Firewall Rule", - "uri":"vpc_acl02_0010.html", - "doc_type":"usermanual", - "p_code":"162", - "code":"172" - }, - { - "desc":"View details about a firewall.Log in to the management console.Click in the upper left corner and select the desired region and project.On the console homepage, under Ne", - "product_code":"vpc", - "title":"Viewing a Firewall", - "uri":"vpc_acl02_0011.html", - "doc_type":"usermanual", - "p_code":"162", - "code":"173" - }, - { - "desc":"Modify the name and description of a firewall.Log in to the management console.Click in the upper left corner and select the desired region and project.On the console ho", - "product_code":"vpc", - "title":"Modifying a Firewall", - "uri":"vpc_acl02_0012.html", - "doc_type":"usermanual", - "p_code":"162", - "code":"174" - }, - { - "desc":"After a firewall is created, you may need to enable it based on network security requirements. You can also disable an enabled firewall if need. Before enabling a firewal", - "product_code":"vpc", - "title":"Enabling or Disabling a Firewall", - "uri":"vpc_acl02_0013.html", - "doc_type":"usermanual", - "p_code":"162", - "code":"175" - }, - { - "desc":"Delete a firewall when it is no longer required.Log in to the management console.Click in the upper left corner and select the desired region and project.On the console ", - "product_code":"vpc", - "title":"Deleting a Firewall", - "uri":"vpc_acl02_0014.html", - "doc_type":"usermanual", - "p_code":"162", - "code":"176" - }, - { - "desc":"You can configure security groups and firewall to increase the security of ECSs in your VPC.Security groups operate at the ECS level.Firewalls operate at the subnet level", - "product_code":"vpc", - "title":"Differences Between Security Groups and Firewalls", - "uri":"vpc_acl02_0015.html", - "doc_type":"usermanual", - "p_code":"145", - "code":"177" - }, - { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"vpc", - "title":"EIP", - "uri":"vpc_eip02_0000.html", - "doc_type":"usermanual", - "p_code":"134", - "code":"178" - }, - { - "desc":"You can assign an EIP and bind it to an ECS so that the ECS can access the Internet.EIPs for dedicated load balancers:In the eu-de region, if you choose to assign an EIP ", - "product_code":"vpc", - "title":"Assigning an EIP and Binding It to an ECS", - "uri":"vpc_eip02_0001.html", - "doc_type":"usermanual", - "p_code":"178", - "code":"179" - }, - { - "desc":"If you no longer need an EIP, unbind it from the ECS and release the EIP to avoid wasting network resources.EIP assigned together with your load balancers will also be di", - "product_code":"vpc", - "title":"Unbinding an EIP from an ECS and Releasing the EIP", - "uri":"vpc_eip02_0002.html", - "doc_type":"usermanual", - "p_code":"178", - "code":"180" - }, - { - "desc":"Tags can be added to EIPs to facilitate EIP identification and administration. You can add a tag to an EIP when assigning the EIP. Alternatively, you can add a tag to an ", - "product_code":"vpc", - "title":"Managing EIP Tags", - "uri":"vpc_eip02_0003.html", - "doc_type":"usermanual", - "p_code":"178", - "code":"181" - }, - { - "desc":"Modify the EIP bandwidth name or size.This section describes how to modify the dedicated bandwidth or shared bandwidth of an EIP. For details about how to modify a shared", - "product_code":"vpc", - "title":"Modifying an EIP Bandwidth", - "uri":"vpc_eip02_0004.html", - "doc_type":"usermanual", - "p_code":"178", - "code":"182" - }, - { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"vpc", - "title":"Shared Bandwidth", - "uri":"vpc_bandwidth02_0000.html", - "doc_type":"usermanual", - "p_code":"134", - "code":"183" - }, - { - "desc":"Shared bandwidth allows multiple EIPs to share the same bandwidth. All ECSs, BMSs, and load balancers that have EIPs bound in the same region can share a bandwidth.When y", - "product_code":"vpc", - "title":"Shared Bandwidth Overview", - "uri":"vpc_bandwidth02_0001.html", - "doc_type":"usermanual", - "p_code":"183", - "code":"184" - }, - { - "desc":"Assign a shared bandwidth for use with EIPs.Log in to the management console.Click in the upper left corner and select the desired region and project.On the console home", - "product_code":"vpc", - "title":"Assigning a Shared Bandwidth", - "uri":"vpc_bandwidth02_0002.html", - "doc_type":"usermanual", - "p_code":"183", - "code":"185" - }, - { - "desc":"Add EIPs to a shared bandwidth and the EIPs can then share that bandwidth. You can add multiple EIPs to a shared bandwidth at the same time.After an EIP is added to a sha", - "product_code":"vpc", - "title":"Adding EIPs to a Shared Bandwidth", - "uri":"vpc_bandwidth02_0003.html", - "doc_type":"usermanual", - "p_code":"183", - "code":"186" - }, - { - "desc":"Remove EIPs that are no longer required from a shared bandwidth if needed.Log in to the management console.Click in the upper left corner and select the desired region a", - "product_code":"vpc", - "title":"Removing EIPs from a Shared Bandwidth", - "uri":"vpc_bandwidth02_0004.html", - "doc_type":"usermanual", - "p_code":"183", - "code":"187" - }, - { - "desc":"You can modify the name and size of a shared bandwidth as required.Log in to the management console.Click in the upper left corner and select the desired region and proj", - "product_code":"vpc", - "title":"Modifying a Shared Bandwidth", - "uri":"vpc_bandwidth02_0005.html", - "doc_type":"usermanual", - "p_code":"183", - "code":"188" - }, - { - "desc":"Delete a shared bandwidth when it is no longer required.Before deleting a shared bandwidth, remove all the EIPs associated with it. For details, see Removing EIPs from a ", - "product_code":"vpc", - "title":"Deleting a Shared Bandwidth", - "uri":"vpc_bandwidth02_0006.html", - "doc_type":"usermanual", - "p_code":"183", - "code":"189" - }, - { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"vpc", - "title":"Route Table", - "uri":"vpc_route02_0000.html", - "doc_type":"usermanual", - "p_code":"134", - "code":"190" - }, - { - "desc":"A custom route is a user-defined routing rule added to a VPC.", - "product_code":"vpc", - "title":"Route Table Overview", - "uri":"vpc_route02_0001.html", - "doc_type":"usermanual", - "p_code":"190", - "code":"191" - }, - { - "desc":"To use the route table function provided by the VPC service, you need to configure SNAT on an ECS to enable other ECSs that do not have EIPs bound in a VPC to access the ", - "product_code":"vpc", - "title":"Configuring an SNAT Server", - "uri":"vpc_route02_0002.html", - "doc_type":"usermanual", - "p_code":"190", - "code":"192" - }, - { - "desc":"If ECSs in a VPC need to access the Internet, add a custom route to enable the ECSs to access the Internet through an ECS that has an EIP bound.Log in to the management c", - "product_code":"vpc", - "title":"Adding a Custom Route", - "uri":"vpc_route02_0003.html", - "doc_type":"usermanual", - "p_code":"190", - "code":"193" - }, - { - "desc":"You can query information about a route table or all route tables.Log in to the management console.Click in the upper left corner and select the desired region and proje", - "product_code":"vpc", - "title":"Querying a Route Table", - "uri":"vpc_route02_0004.html", - "doc_type":"usermanual", - "p_code":"190", - "code":"194" - }, - { - "desc":"Change the destination and next hop of the route.Log in to the management console.Click in the upper left corner and select the desired region and project.On the console", - "product_code":"vpc", - "title":"Modifying a Route", - "uri":"vpc_route02_0005.html", - "doc_type":"usermanual", - "p_code":"190", - "code":"195" - }, - { - "desc":"Delete a route if it is no longer required.Log in to the management console.Click in the upper left corner and select the desired region and project.On the console homep", - "product_code":"vpc", - "title":"Deleting a Route", - "uri":"vpc_route02_0006.html", - "doc_type":"usermanual", - "p_code":"190", - "code":"196" - }, - { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"vpc", - "title":"VPC Peering Connection", - "uri":"vpc_peering02_0000.html", - "doc_type":"usermanual", - "p_code":"134", - "code":"197" - }, - { - "desc":"A VPC peering connection is a network connection between two VPCs in one region that enables you to route traffic between them using private IP addresses. ECSs in either ", - "product_code":"vpc", - "title":"VPC Peering Connection Creation Procedure", - "uri":"vpc_peering02_0001.html", - "doc_type":"usermanual", - "p_code":"197", - "code":"198" - }, - { - "desc":"To enable two VPCs in the same region to communicate with each other, you can create a VPC peering connection between them. The VPC and subnet CIDR blocks must meet the r", - "product_code":"vpc", - "title":"VPC Peering Connection Configuration Plans", - "uri":"vpc_peering02_0002.html", - "doc_type":"usermanual", - "p_code":"197", - "code":"199" - }, - { - "desc":"To create a VPC peering connection, first create a request to peer with another VPC. You can request a VPC peering connection with another VPC in your account, but the tw", - "product_code":"vpc", - "title":"Creating a VPC Peering Connection with Another VPC in Your Account", - "uri":"vpc_peering02_0003.html", - "doc_type":"usermanual", - "p_code":"197", - "code":"200" - }, - { - "desc":"The VPC service also allows you to create a VPC peering connection with a VPC in another account. The two VPCs must be in the same region. If you request a VPC peering co", - "product_code":"vpc", - "title":"Creating a VPC Peering Connection with a VPC in Another Account", - "uri":"vpc_peering02_0004.html", - "doc_type":"usermanual", - "p_code":"197", - "code":"201" - }, - { - "desc":"The owners of both the local and peer accounts can view information about the created VPC peering connections and those that are still waiting to be accepted.Log in to th", - "product_code":"vpc", - "title":"Viewing VPC Peering Connections", - "uri":"vpc_peering02_0005.html", - "doc_type":"usermanual", - "p_code":"197", - "code":"202" - }, - { - "desc":"The owners of both the local and peer accounts can modify a VPC peering connection in any state. The VPC peering connection name can be changed.Log in to the management c", - "product_code":"vpc", - "title":"Modifying a VPC Peering Connection", - "uri":"vpc_peering02_0006.html", - "doc_type":"usermanual", - "p_code":"197", - "code":"203" - }, - { - "desc":"The owners of both the local and peer accounts can delete a VPC peering connection in any state. After a VPC peering connection is deleted, routes configured for the conn", - "product_code":"vpc", - "title":"Deleting a VPC Peering Connection", - "uri":"vpc_peering02_0007.html", - "doc_type":"usermanual", - "p_code":"197", - "code":"204" - }, - { - "desc":"After routes are added for a VPC peering connection, the owners of both the local and peer accounts can view information about the routes on the page showing details abou", - "product_code":"vpc", - "title":"Viewing Routes Configured for a VPC Peering Connection", - "uri":"vpc_peering02_0008.html", - "doc_type":"usermanual", - "p_code":"197", - "code":"205" - }, - { - "desc":"After routes are added for a VPC peering connection, the owners of both the local and peer accounts can delete the routes on the page showing details about the peering co", - "product_code":"vpc", - "title":"Deleting a VPC Peering Route", - "uri":"vpc_peering02_0010.html", - "doc_type":"usermanual", - "p_code":"197", - "code":"206" - }, - { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"vpc", - "title":"VPC Flow Log", - "uri":"vpc_FlowLog02_0000.html", - "doc_type":"usermanual", - "p_code":"134", - "code":"207" - }, - { - "desc":"A VPC flow log records information about the traffic going to and from a VPC. VPC flow logs help you monitor network traffic, analyze network attacks, and determine wheth", - "product_code":"vpc", - "title":"VPC Flow Log Overview", - "uri":"vpc_FlowLog02_0001.html", - "doc_type":"usermanual", - "p_code":"207", - "code":"208" - }, - { - "desc":"A VPC flow log records information about the traffic going to and from a VPC.Ensure that the following operations have been performed on the LTS console:Create a log grou", - "product_code":"vpc", - "title":"Creating a VPC Flow Log", - "uri":"vpc_FlowLog02_0002.html", - "doc_type":"usermanual", - "p_code":"207", - "code":"209" - }, - { - "desc":"View information about your flow log record.The capture window is approximately 10 minutes, which indicates that a flow log record will be generated every 10 minutes. Aft", - "product_code":"vpc", - "title":"Viewing a VPC Flow Log", - "uri":"vpc_FlowLog02_0003.html", - "doc_type":"usermanual", - "p_code":"207", - "code":"210" - }, - { - "desc":"After a VPC flow log is created, the VPC flow log is automatically enabled. If you do not need to record traffic data, you can disable the corresponding VPC flow log. The", - "product_code":"vpc", - "title":"Enabling or Disabling VPC Flow Log", - "uri":"vpc_FlowLog02_0004.html", - "doc_type":"usermanual", - "p_code":"207", - "code":"211" - }, - { - "desc":"Delete a VPC flow log that is not required. Deleting a VPC flow log will not delete the existing flow log records in LTS.If a NIC that uses a VPC flow log is deleted, the", - "product_code":"vpc", - "title":"Deleting a VPC Flow Log", - "uri":"vpc_FlowLog02_0005.html", - "doc_type":"usermanual", - "p_code":"207", - "code":"212" - }, - { - "desc":"Direct Connect allows you to establish a dedicated network connection between your data center and the cloud platform. With Direct Connect, you can establish a private co", - "product_code":"vpc", - "title":"Direct Connect", - "uri":"vpc_dc02_0001.html", - "doc_type":"usermanual", - "p_code":"134", - "code":"213" - }, - { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"vpc", - "title":"Virtual IP Address", - "uri":"vpc_vip02_0000.html", - "doc_type":"usermanual", - "p_code":"134", - "code":"214" - }, - { - "desc":"A virtual IP address can be shared among multiple ECSs. An ECS can have both private and virtual IP addresses, and you can access the ECS through either IP address. A vir", - "product_code":"vpc", - "title":"Virtual IP Address Overview", - "uri":"vpc_vip02_0001.html", - "doc_type":"usermanual", - "p_code":"214", - "code":"215" - }, - { - "desc":"If an ECS requires a virtual IP address or if a virtual IP address needs to be reserved, you can assign a virtual IP address from the subnet.Log in to the management cons", - "product_code":"vpc", - "title":"Assigning a Virtual IP Address", - "uri":"vpc_vip02_0002.html", - "doc_type":"usermanual", - "p_code":"214", - "code":"216" - }, - { - "desc":"You can bind a virtual IP address to an EIP so that you can access the ECSs bound with the same virtual IP address from the Internet. These ECSs can work in the active/st", - "product_code":"vpc", - "title":"Binding a Virtual IP Address to an EIP or ECS", - "uri":"vpc_vip02_0003.html", - "doc_type":"usermanual", - "p_code":"214", - "code":"217" - }, - { - "desc":"This section describes how to bind a virtual IP address to an EIP.You have assigned an EIP.Log in to the management console.Click in the upper left corner and select the", - "product_code":"vpc", - "title":"Binding a Virtual IP Address to an EIP", - "uri":"vpc_vip02_0004.html", - "doc_type":"usermanual", - "p_code":"214", - "code":"218" - }, - { - "desc":"Configure the ECS networking based on Networking.Create a VPN.The VPN can be used to access the virtual IP address of the ECS.", - "product_code":"vpc", - "title":"Using a VPN to Access a Virtual IP Address", - "uri":"vpc_vip02_0005.html", - "doc_type":"usermanual", - "p_code":"214", - "code":"219" - }, - { - "desc":"Configure the ECS networking based on Networking.Create a Direct Connect connection.The created Direct Connect connection can be used to access the virtual IP address of ", - "product_code":"vpc", - "title":"Using a Direct Connect Connection to Access the Virtual IP Address", - "uri":"vpc_vip02_0006.html", - "doc_type":"usermanual", - "p_code":"214", - "code":"220" - }, - { - "desc":"Configure the ECS networking based on Networking.Create a VPC peering connection.You can access the virtual IP address of the ECS through the VPC peering connection.", - "product_code":"vpc", - "title":"Using a VPC Peering Connection to Access the Virtual IP Address", - "uri":"vpc_vip02_0007.html", - "doc_type":"usermanual", - "p_code":"214", - "code":"221" - }, - { - "desc":"Log in to the management console.Click in the upper left corner and select the desired region and project.Under Compute, click Elastic Cloud Server.In the ECS list, clic", - "product_code":"vpc", - "title":"Disabling Source and Destination Check (HA Load Balancing Cluster Scenario)", - "uri":"vpc_vip02_0009.html", - "doc_type":"usermanual", - "p_code":"214", - "code":"222" - }, - { - "desc":"If you no longer need a virtual IP address or a reserved virtual IP address, you can release it to avoid wasting resources.Before deleting a virtual IP address, ensure th", - "product_code":"vpc", - "title":"Releasing a Virtual IP Address", - "uri":"vpc_vip02_0010.html", - "doc_type":"usermanual", - "p_code":"214", - "code":"223" - }, - { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"vpc", - "title":"Monitoring", - "uri":"vpc_monitor02_0000.html", - "doc_type":"usermanual", - "p_code":"134", - "code":"224" - }, - { - "desc":"This section describes the namespace, list, and measurement dimensions of EIP and bandwidth metrics that you can check on Cloud Eye. You can use APIs or the Cloud Eye con", - "product_code":"vpc", - "title":"Supported Metrics", - "uri":"vpc_monitor02_0001.html", - "doc_type":"usermanual", - "p_code":"224", - "code":"225" - }, - { - "desc":"View related metrics to see bandwidth and EIP usage information.Log in to the management console.Click in the upper left corner and select the desired region and project", - "product_code":"vpc", - "title":"Viewing Metrics", - "uri":"vpc_monitor02_0002.html", - "doc_type":"usermanual", - "p_code":"224", - "code":"226" - }, - { - "desc":"You can configure alarm rules to customize the monitored objects and notification policies. You can learn your resource statuses at any time.Log in to the management cons", - "product_code":"vpc", - "title":"Creating an Alarm Rule", - "uri":"vpc_monitor02_0003.html", - "doc_type":"usermanual", - "p_code":"224", - "code":"227" - }, - { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"vpc", - "title":"FAQs", + "title":"FAQ", "uri":"vpc_faq_0000.html", "doc_type":"usermanual", "p_code":"", - "code":"228" + "code":"152" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"vpc", - "title":"General", + "title":"General Questions", "uri":"faq_common.html", "doc_type":"usermanual", - "p_code":"228", - "code":"229" + "p_code":"152", + "code":"153" }, { "desc":"A quota limits the quantity of a resource available to users, thereby preventing spikes in the usage of the resource. For example, a VPC quota limits the number of VPCs t", @@ -2066,26 +1382,26 @@ "title":"What Is a Quota?", "uri":"vpc_faq_0051.html", "doc_type":"usermanual", - "p_code":"229", - "code":"230" + "p_code":"153", + "code":"154" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"vpc", - "title":"VPC and Subnet", + "title":"VPCs and Subnets", "uri":"faq_vpc.html", "doc_type":"usermanual", - "p_code":"228", - "code":"231" + "p_code":"152", + "code":"155" }, { - "desc":"The Virtual Private Cloud (VPC) service enables you to provision logically isolated, configurable, and manageable virtual networks for Elastic Cloud Servers (ECSs), impro", + "desc":"The Virtual Private Cloud (VPC) service enables you to provision logically isolated virtual networks for Elastic Cloud Servers (ECSs), improving cloud resource security a", "product_code":"vpc", "title":"What Is Virtual Private Cloud?", "uri":"vpc_faq_0001.html", "doc_type":"usermanual", - "p_code":"231", - "code":"232" + "p_code":"155", + "code":"156" }, { "desc":"The following table lists the private CIDR blocks that you can specify when creating a VPC. Consider the following when selecting a VPC CIDR block:Number of IP addresses:", @@ -2093,8 +1409,8 @@ "title":"Which CIDR Blocks Are Available for the VPC Service?", "uri":"vpc_faq_0004.html", "doc_type":"usermanual", - "p_code":"231", - "code":"233" + "p_code":"155", + "code":"157" }, { "desc":"Subnets in the same VPC can communicate with each other, but subnets in different VPCs cannot communicate with each other by default. However, you can create VPC peering ", @@ -2102,8 +1418,8 @@ "title":"Can Subnets Communicate with Each Other?", "uri":"vpc_faq_0005.html", "doc_type":"usermanual", - "p_code":"231", - "code":"234" + "p_code":"155", + "code":"158" }, { "desc":"A subnet CIDR block must be included in its VPC CIDR block. Supported VPC CIDR blocks are 10.0.0.0/8–24, 172.16.0.0/12–24, and 192.168.0.0/16–24. The allowed block size o", @@ -2111,8 +1427,8 @@ "title":"What Subnet CIDR Blocks Are Available?", "uri":"vpc_faq_0006.html", "doc_type":"usermanual", - "p_code":"231", - "code":"235" + "p_code":"155", + "code":"159" }, { "desc":"Each account can have a maximum of 100 subnets. If the number of subnets cannot meet your service requirements, request a quota increase. For details, see What Is a Quota", @@ -2120,17 +1436,8 @@ "title":"How Many Subnets Can I Create?", "uri":"vpc_faq_0009.html", "doc_type":"usermanual", - "p_code":"231", - "code":"236" - }, - { - "desc":"The VPC service allows you to create private, isolated virtual networks. In a VPC, you can manage private IP address ranges, subnets, route tables, and gateways. ECSs, BM", - "product_code":"vpc", - "title":"How Can I Delete a Subnet That Is Being Used by Other Resources?", - "uri":"vpc_faq_0075.html", - "doc_type":"usermanual", - "p_code":"231", - "code":"237" + "p_code":"155", + "code":"160" }, { "desc":"The network ID of the subnet is the neutron_network_id in the subnet fields in Subnet > Creating a Subnet in the Virtual Private Cloud API Reference.Parameter neutron_net", @@ -2138,35 +1445,44 @@ "title":"What Are the Differences Between the Network ID and Subnet ID of a Subnet?", "uri":"vpc_faq_0094.html", "doc_type":"usermanual", - "p_code":"231", - "code":"238" + "p_code":"155", + "code":"161" + }, + { + "desc":"If VPCs and subnets are being used by other resources, you need to delete these resources first based on the prompts on the console before deleting the VPCs and subnets. ", + "product_code":"vpc", + "title":"Why Can't I Delete My VPCs and Subnets?", + "uri":"vpc_faq_0075.html", + "doc_type":"usermanual", + "p_code":"155", + "code":"162" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"vpc", - "title":"EIP", + "title":"EIPs", "uri":"faq_eip.html", "doc_type":"usermanual", - "p_code":"228", - "code":"239" + "p_code":"152", + "code":"163" }, { "desc":"The Elastic IP (EIP) service enables your cloud resources to communicate with the Internet using static public IP addresses and scalable bandwidths. EIPs can be bound to ", "product_code":"vpc", - "title":"What Are EIPs?", + "title":"What Is an EIP?", "uri":"vpc_faq_0013.html", "doc_type":"usermanual", - "p_code":"239", - "code":"240" + "p_code":"163", + "code":"164" }, { - "desc":"Each EIP can be bound to only one ECS at a time.", + "desc":"Each EIP can be bound to only one ECS at a time.Multiple ECSs cannot share the same EIP. An ECS and its bound EIP must be in the same region. If you want multiple ECSs in", "product_code":"vpc", "title":"Can I Bind an EIP to Multiple ECSs?", "uri":"vpc_faq_0019.html", "doc_type":"usermanual", - "p_code":"239", - "code":"241" + "p_code":"163", + "code":"165" }, { "desc":"Each ECS is automatically added to a security group after being created to ensure its security. The security group denies access traffic from the Internet by default. To ", @@ -2174,8 +1490,62 @@ "title":"How Do I Access an ECS with an EIP Bound from the Internet?", "uri":"vpc_faq_0020.html", "doc_type":"usermanual", - "p_code":"239", - "code":"242" + "p_code":"163", + "code":"166" + }, + { + "desc":"No. EIPs and their associated cloud resources must be in the same region.", + "product_code":"vpc", + "title":"Can I Bind an EIP to a Cloud Resource in Another Region?", + "uri":"faq_eip_0012.html", + "doc_type":"usermanual", + "p_code":"163", + "code":"167" + }, + { + "desc":"The region of an EIP cannot be changed.If you assigned an EIP in region A but need an EIP in region B, you cannot directly change the region of the assigned EIP from A to", + "product_code":"vpc", + "title":"Can I Change the Region of My EIP?", + "uri":"faq_eip_0014.html", + "doc_type":"usermanual", + "p_code":"163", + "code":"168" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"vpc", + "title":"VPC Peering Connections", + "uri":"faq_peer_0000.html", + "doc_type":"usermanual", + "p_code":"152", + "code":"169" + }, + { + "desc":"Each account can have a maximum of 50 VPC peering connections in each region by default.Number of VPC peering connections that you can create in each region between VPCs ", + "product_code":"vpc", + "title":"How Many VPC Peering Connections Can I Create in an Account?", + "uri":"vpc_faq_0070.html", + "doc_type":"usermanual", + "p_code":"169", + "code":"170" + }, + { + "desc":"A VPC peering connection only can connect VPCs in the same region.Figure 1 shows an application scenario of VPC peering connections.There are two VPCs (VPC-A and VPC-B) i", + "product_code":"vpc", + "title":"Can a VPC Peering Connection Connect VPCs in Different Regions?", + "uri":"faq_connection_0001.html", + "doc_type":"usermanual", + "p_code":"169", + "code":"171" + }, + { + "desc":"After a VPC peering connection is created, the local and peer VPCs cannot communicate with each other.The issues here are described in order of how likely they are to occ", + "product_code":"vpc", + "title":"Why Did Communication Fail Between VPCs That Were Connected by a VPC Peering Connection?", + "uri":"vpc_faq_0069.html", + "doc_type":"usermanual", + "p_code":"169", + "code":"172" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -2183,8 +1553,17 @@ "title":"Bandwidth", "uri":"faq_bandwidth.html", "doc_type":"usermanual", - "p_code":"228", - "code":"243" + "p_code":"152", + "code":"173" + }, + { + "desc":"The bandwidth range is from 5 Mbit/s to 1000 Mbit/s.", + "product_code":"vpc", + "title":"What Is the Bandwidth Size Range?", + "uri":"vpc_faq_0011.html", + "doc_type":"usermanual", + "p_code":"173", + "code":"174" }, { "desc":"There are dedicated bandwidth and shared bandwidth. A dedicated bandwidth can only be used by one EIP, but a shared bandwidth can be used by multiple EIPs.", @@ -2192,26 +1571,26 @@ "title":"What Bandwidth Types Are Available?", "uri":"vpc_faq_0012.html", "doc_type":"usermanual", - "p_code":"243", - "code":"244" + "p_code":"173", + "code":"175" }, { - "desc":"Dedicated bandwidth: The bandwidth can only be used by one EIP and the EIP can only be used by one cloud resource, such as an ECS, a NAT gateway, or a load balancer.Share", + "desc":"A dedicated bandwidth can only be used by one EIP. An EIP can only be used by one cloud resource, such as an ECS, a NAT gateway, or a load balancer.A shared bandwidth can", "product_code":"vpc", "title":"What Are the Differences Between a Dedicated Bandwidth and a Shared Bandwidth? Can a Dedicated Bandwidth Be Changed to a Shared Bandwidth or the Other Way Around?", "uri":"faq_bandwidth_0003.html", "doc_type":"usermanual", - "p_code":"243", - "code":"245" + "p_code":"173", + "code":"176" }, { - "desc":"The bandwidth range is from 1 Mbit/s to 1,000 Mbit/s.", + "desc":"Log in to the management console.Click in the upper left corner and select the desired region and project.Click in the upper left corner and choose Network > Elastic IP", "product_code":"vpc", - "title":"What Is the Bandwidth Size Range?", - "uri":"vpc_faq_0011.html", + "title":"How Do I Buy a Shared Bandwidth?", + "uri":"vpc_faq_0035.html", "doc_type":"usermanual", - "p_code":"243", - "code":"246" + "p_code":"173", + "code":"177" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -2219,8 +1598,8 @@ "title":"Connectivity", "uri":"faq_connection.html", "doc_type":"usermanual", - "p_code":"228", - "code":"247" + "p_code":"152", + "code":"178" }, { "desc":"If the two VPCs are in the same region, you can use a VPC peering connection to enable communication between them.If the two VPCs are in different regions, you can use a ", @@ -2228,8 +1607,8 @@ "title":"Does a VPN Allow Communication Between Two VPCs?", "uri":"vpc_faq_0058.html", "doc_type":"usermanual", - "p_code":"247", - "code":"248" + "p_code":"178", + "code":"179" }, { "desc":"When an ECS has more than one NIC, if different DNS server addresses are configured for the subnets used by the NICs, the ECS cannot access the Internet or domain names i", @@ -2237,35 +1616,8 @@ "title":"Why Are Internet or Internal Domain Names in the Cloud Inaccessible Through Domain Names When My ECS Has Multiple NICs?", "uri":"vpc_faq_0060.html", "doc_type":"usermanual", - "p_code":"247", - "code":"249" - }, - { - "desc":"If two VPCs connected by a VPC peering connection overlap with each other, there will be route conflicts and the VPC peering connection may not be usable.After a VPC peer", - "product_code":"vpc", - "title":"Are There Any Constraints on Using VPC Peering Connections?", - "uri":"vpc_faq_0068.html", - "doc_type":"usermanual", - "p_code":"247", - "code":"250" - }, - { - "desc":"Check whether the VPC IDs are correctly configured for the VPC peering connection.Check whether the VPCs have routes that point to the CIDR block of the other VPC.Check w", - "product_code":"vpc", - "title":"Why Did Communication Fail Between VPCs That Were Connected by a VPC Peering Connection?", - "uri":"vpc_faq_0069.html", - "doc_type":"usermanual", - "p_code":"247", - "code":"251" - }, - { - "desc":"Each account can have a maximum of 50 VPC peering connections in each region by default.VPC peering connections between VPCs in one account: Each account can create a max", - "product_code":"vpc", - "title":"How Many VPC Peering Connections Can I Create?", - "uri":"vpc_faq_0070.html", - "doc_type":"usermanual", - "p_code":"247", - "code":"252" + "p_code":"178", + "code":"180" }, { "desc":"The priority of an EIP is higher than that of a custom route in a VPC route table. For example:The VPC route table of an ECS has a custom route with 0.0.0.0/0 as the dest", @@ -2273,8 +1625,8 @@ "title":"What Are the Priorities of the Custom Route and EIP If Both Are Configured for an ECS to Enable the ECS to Access the Internet?", "uri":"vpc_faq_0073.html", "doc_type":"usermanual", - "p_code":"247", - "code":"253" + "p_code":"178", + "code":"181" }, { "desc":"The priority of a custom route is higher than that of shared SNAT.", @@ -2282,8 +1634,8 @@ "title":"What Are the Priorities of the Shared SNAT and Custom Route If Both Are Configured for an ECS to Enable the ECS to Access the Internet?", "uri":"vpc_faq_00002.html", "doc_type":"usermanual", - "p_code":"247", - "code":"254" + "p_code":"178", + "code":"182" }, { "desc":"Users with IPv6 clients can call APIs to assign IPv6 EIPs and bind the EIPs to ECSs. Then, the users can use the EIP to access the ECSs in the VPC over the Internet.For d", @@ -2291,8 +1643,8 @@ "title":"How Does an IPv6 Client on the Internet Access the ECS That Has an EIP Bound in a VPC?", "uri":"vpc_faq_0076.html", "doc_type":"usermanual", - "p_code":"247", - "code":"255" + "p_code":"178", + "code":"183" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -2300,17 +1652,8 @@ "title":"Routing", "uri":"faq_route.html", "doc_type":"usermanual", - "p_code":"228", - "code":"256" - }, - { - "desc":"A route table cannot span multiple VPCs.A route table contains a set of routes that are used to determine where network traffic from your subnets in a VPC is directed. A ", - "product_code":"vpc", - "title":"Can a Route Table Span Multiple VPCs?", - "uri":"vpc_faq_0062.html", - "doc_type":"usermanual", - "p_code":"256", - "code":"257" + "p_code":"152", + "code":"184" }, { "desc":"Currently, a route table can contain 100 routes.", @@ -2318,8 +1661,8 @@ "title":"How Many Routes Can a Route Table Contain?", "uri":"vpc_faq_0063.html", "doc_type":"usermanual", - "p_code":"256", - "code":"258" + "p_code":"184", + "code":"185" }, { "desc":"An ECS providing SNAT must have Unbind IP from MAC enabled.The destination of each route in a route table must be unique. The next hop must be a private IP address or a v", @@ -2327,17 +1670,8 @@ "title":"Are There Any Restrictions on Using a Route Table?", "uri":"vpc_faq_0064.html", "doc_type":"usermanual", - "p_code":"256", - "code":"259" - }, - { - "desc":"The route table function itself is free, but you are charged for the ECSs and bandwidth that you use together with the route table function.", - "product_code":"vpc", - "title":"Will a Route Table Be Billed?", - "uri":"vpc_faq_0065.html", - "doc_type":"usermanual", - "p_code":"256", - "code":"260" + "p_code":"184", + "code":"186" }, { "desc":"No. Direct Connect connections and custom routes are used in different scenarios, so the routing priorities are different.", @@ -2345,8 +1679,8 @@ "title":"Do the Same Routing Priorities Apply to Direct Connect Connections and Custom Routes in the Same VPC?", "uri":"vpc_faq_0066.html", "doc_type":"usermanual", - "p_code":"256", - "code":"261" + "p_code":"184", + "code":"187" }, { "desc":"No. The routing priority of custom routes and that of VPNs are the same.", @@ -2354,17 +1688,8 @@ "title":"Are There Different Routing Priorities of the VPN and Custom Routes in the Same VPC?", "uri":"vpc_faq_00001.html", "doc_type":"usermanual", - "p_code":"256", - "code":"262" - }, - { - "desc":"By default, a maximum of 100 routes can be added for a VPC. The routes include custom routes and those added for Direct Connect and VPC peering connections.", - "product_code":"vpc", - "title":"How Many Routes Can Be Added in a VPC?", - "uri":"vpc_faq_0071.html", - "doc_type":"usermanual", - "p_code":"256", - "code":"263" + "p_code":"184", + "code":"188" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -2372,8 +1697,8 @@ "title":"Security", "uri":"faq_security.html", "doc_type":"usermanual", - "p_code":"228", - "code":"264" + "p_code":"152", + "code":"189" }, { "desc":"Yes. Log in to the ECS console, switch to the page showing ECS details, and change the security group of the ECS.", @@ -2381,8 +1706,8 @@ "title":"Can I Change the Security Group of an ECS?", "uri":"vpc_faq_0039.html", "doc_type":"usermanual", - "p_code":"264", - "code":"265" + "p_code":"189", + "code":"190" }, { "desc":"Each account can have up to 100 security groups and 5000 security group rules.When you create an ECS, you can select multiple security groups, but it is recommended that ", @@ -2390,8 +1715,8 @@ "title":"How Many Security Groups Can I Create?", "uri":"vpc_faq_0040.html", "doc_type":"usermanual", - "p_code":"264", - "code":"266" + "p_code":"189", + "code":"191" }, { "desc":"The TFTP daemon determines whether a configuration file specifies the port range. If you use a TFTP configuration file that allows the data channel ports to be configurab", @@ -2399,8 +1724,8 @@ "title":"How Do I Configure a Security Group for Multi-Channel Protocols?", "uri":"vpc_faq_0059.html", "doc_type":"usermanual", - "p_code":"264", - "code":"267" + "p_code":"189", + "code":"192" }, { "desc":"You can create up to 200 firewalls. It is recommended that you configure no more than 20 inbound or outbound rules for each firewall. If you configure more than 20 inboun", @@ -2408,8 +1733,8 @@ "title":"How Many Firewalls Can I Create?", "uri":"vpc_faq_0072.html", "doc_type":"usermanual", - "p_code":"264", - "code":"268" + "p_code":"189", + "code":"193" }, { "desc":"Security groups are stateful. Responses to outbound traffic are allowed to go in to the instance regardless of inbound security group rules, and vice versa. Security grou", @@ -2417,8 +1742,8 @@ "title":"Does a Security Group Rule or a Firewall Rule Immediately Take Effect for Existing Connections After It Is Modified?", "uri":"vpc_faq_0074.html", "doc_type":"usermanual", - "p_code":"264", - "code":"269" + "p_code":"189", + "code":"194" }, { "desc":"Security group rules use the whitelist mechanism. If multiple security group rules conflict, the rules are aggregated to take effect.", @@ -2426,8 +1751,8 @@ "title":"Which Security Group Rule Has Priority When Multiple Security Group Rules Conflict?", "uri":"vpc_faq_0077.html", "doc_type":"usermanual", - "p_code":"264", - "code":"270" + "p_code":"189", + "code":"195" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", @@ -2436,7 +1761,7 @@ "uri":"vpc_faq_0103.html", "doc_type":"usermanual", "p_code":"", - "code":"271" + "code":"196" }, { "desc":"For details about the terms involved in this document, see Glossary.", @@ -2445,6 +1770,6 @@ "uri":"vpc_faq_0106.html", "doc_type":"usermanual", "p_code":"", - "code":"272" + "code":"197" } ] \ No newline at end of file diff --git a/docs/vpc/umn/FlowLog_0001.html b/docs/vpc/umn/FlowLog_0001.html index fdd607eb..4bef919a 100644 --- a/docs/vpc/umn/FlowLog_0001.html +++ b/docs/vpc/umn/FlowLog_0001.html @@ -1,7 +1,7 @@ -

VPC Flow Log

-
+

VPC Flow Log

+
- -
diff --git a/docs/vpc/umn/FlowLog_0002.html b/docs/vpc/umn/FlowLog_0002.html index f663cf02..4a8f2554 100644 --- a/docs/vpc/umn/FlowLog_0002.html +++ b/docs/vpc/umn/FlowLog_0002.html @@ -1,11 +1,11 @@

VPC Flow Log Overview

-

A VPC flow log records information about the traffic going to and from a VPC. VPC flow logs help you monitor network traffic, analyze network attacks, and determine whether security group and firewall rules require modification.

-

VPC flow logs must be used together with the Log Tank Service (LTS). Before you create a VPC flow log, you need to create a log group and a log topic in LTS. Figure 1 shows the process for configuring the VPC flow log function.

-
Figure 1 Configuring the VPC flow log function
-

-

Notes and Constraints

+

A VPC flow log records information about the traffic going to and from a VPC. VPC flow logs help you monitor network traffic, analyze network attacks, and determine whether security group and firewall rules require modification.

+

VPC flow logs must be used together with the Log Tank Service (LTS). Before you create a VPC flow log, you need to create a log group and a log topic in LTS. Figure 1 shows the process for configuring VPC flow logs.

+
Figure 1 Configuring VPC flow logs
+

+

Notes and Constraints

  • Currently, only C3, M3, and S2 ECSs support VPC flow logs.
  • By default, you can create a maximum of 10 VPC flow logs.
  • By default, a maximum of 400,000 flow log records are supported.
diff --git a/docs/vpc/umn/FlowLog_0003.html b/docs/vpc/umn/FlowLog_0003.html index 908c29ef..61604010 100644 --- a/docs/vpc/umn/FlowLog_0003.html +++ b/docs/vpc/umn/FlowLog_0003.html @@ -1,82 +1,82 @@

Creating a VPC Flow Log

-

Scenarios

A VPC flow log records information about the traffic going to and from a VPC.

+

Scenarios

A VPC flow log records information about the traffic going to and from a VPC.

-

Prerequisites

Ensure that the following operations have been performed on the LTS console:

-
  • Create a log group.
  • Create a log topic.
-

For more information about the LTS service, see the Log Tank Service User Guide.

+

Prerequisites

Ensure that the following operations have been performed on the LTS console:

+
  • Create a log group.
  • Create a log topic.
+

For more information about the LTS service, see the Log Tank Service User Guide.

-

Procedure

  1. Log in to the management console.
  1. Click in the upper left corner and select the desired region and project.
  1. On the console homepage, under Network, click Virtual Private Cloud.
  2. In the navigation pane on the left, choose VPC Flow Logs.
  3. In the upper right corner, click Create VPC Flow Log. On the displayed page, configure parameters as prompted.
    Figure 1 Create VPC Flow Log
    -
    -
    Table 1 Parameter descriptions

    Parameter

    +

    Procedure

    1. Log in to the management console.
    1. Click in the upper left corner and select the desired region and project.
    1. Click in the upper left corner and choose Network > Virtual Private Cloud.
    1. In the navigation pane on the left, choose VPC Flow Logs.
    2. In the upper right corner, click Create VPC Flow Log. On the displayed page, configure parameters as prompted.
      Figure 1 Create VPC Flow Log
      +
      +
      - - - - - - - - - - - - - - - - - - - - - - -
      Table 1 Parameter descriptions

      Parameter

      Description

      +

      Description

      Example Value

      +

      Example Value

      Name

      +

      Name

      The VPC flow log name.

      -

      The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces.

      +

      The VPC flow log name.

      +

      The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces.

      flowlog-495d

      +

      flowlog-495d

      Resource Type

      +

      Resource Type

      The type of resources whose traffic is to be logged. You can select NIC, Subnet, or VPC.

      +

      The type of resources whose traffic is to be logged. You can select NIC, Subnet, or VPC.

      NIC

      +

      NIC

      Resource

      +

      Resource

      The specific NIC whose traffic is to be logged.

      -
      NOTE:

      We recommend that you select an ECS that is in the running state. If an ECS in the stopped state is selected, restart the ECS after creating the VPC flow log for accurately recording the information about the traffic going to and from the ECS NIC.

      +

      The specific NIC whose traffic is to be logged.

      +
      NOTE:

      We recommend that you select an ECS that is in the running state. If an ECS in the stopped state is selected, restart the ECS after creating the VPC flow log for accurately recording the information about the traffic going to and from the ECS NIC.

      N/A

      +

      N/A

      Filter

      +

      Filter

      • All traffic: specifies that both accepted and rejected traffic of the specified resource will be logged.
      • Accepted traffic: specifies that only accepted traffic of the specified resource will be logged. Accepted traffic refers to the traffic permitted by the security group or firewall.
      • Rejected traffic: specifies that only rejected traffic of the specified resource will be logged. Rejected traffic refers to the traffic denied by the firewall.
      +
      • All traffic: specifies that both accepted and rejected traffic of the specified resource will be logged.
      • Accepted traffic: specifies that only accepted traffic of the specified resource will be logged. Accepted traffic refers to the traffic permitted by the security group or firewall.
      • Rejected traffic: specifies that only rejected traffic of the specified resource will be logged. Rejected traffic refers to the traffic denied by the firewall.

      All

      +

      All

      Log Group

      +

      Log Group

      The log group created in LTS.

      +

      The log group created in LTS.

      lts-group-wule

      +

      lts-group-wule

      Log Topic

      +

      Log Topic

      The log topic created in LTS.

      +

      The log topic created in LTS.

      LogTopic1

      +

      LogTopic1

      Description

      +

      Description

      Supplementary information about the VPC flow log. This parameter is optional.

      -

      The VPC flow log description can contain a maximum of 255 characters and cannot contain angle brackets (< or >).

      +

      Supplementary information about the VPC flow log. This parameter is optional.

      +

      The VPC flow log description can contain a maximum of 255 characters and cannot contain angle brackets (< or >).

      N/A

      +

      N/A

      -

      Only two flow logs, each with a different filter, can be created for a single resource under the same log group and log topic. Each VPC flow log must be unique.

      +

      Only two flow logs, each with a different filter, can be created for a single resource under the same log group and log topic. Each VPC flow log must be unique.

      -
    3. Click OK.
    +
  4. Click OK.
  5. diff --git a/docs/vpc/umn/FlowLog_0004.html b/docs/vpc/umn/FlowLog_0004.html index e0df3bd2..b6f25c2f 100644 --- a/docs/vpc/umn/FlowLog_0004.html +++ b/docs/vpc/umn/FlowLog_0004.html @@ -1,139 +1,139 @@

    Viewing a VPC Flow Log

    -

    Scenarios

    View information about your flow log record.

    -

    The capture window is approximately 10 minutes, which indicates that a flow log record will be generated every 10 minutes. After creating a VPC flow log, you need to wait about 10 minutes before you can view the flow log record.

    -

    If an ECS is in the stopped state, its flow log records will not be displayed.

    +

    Scenarios

    View information about your flow log record.

    +

    The capture window is approximately 10 minutes, which indicates that a flow log record will be generated every 10 minutes. After creating a VPC flow log, you need to wait about 10 minutes before you can view the flow log record.

    +

    If an ECS is in the stopped state, its flow log records will not be displayed.

    -

    Procedure

    1. Log in to the management console.
    1. Click in the upper left corner and select the desired region and project.
    1. On the console homepage, under Network, click Virtual Private Cloud.
    2. In the navigation pane on the left, choose VPC Flow Logs.
    3. Locate the target VPC flow log and click View Log Record in the Operation column to view information about the flow log record in LTS.
      Figure 1 Viewing a log record
      -
      Figure 2 Flow log record
      -

      The flow log record is in the following format:

      -
      <version> <project-id> <interface-id> <srcaddr> <dstaddr> <srcport> <dstport> <protocol> <packets> <bytes> <start> <end> <action> <log-status>
      -

      Example 1: The following is an example of a flow log record in which data was recorded during the capture window:

      -
      1 5f67944957444bd6bb4fe3b367de8f3d 1d515d18-1b36-47dc-a983-bd6512aed4bd 192.168.0.154 192.168.3.25 38929 53 17 1 96 1548752136 1548752736 ACCEPT OK
      -

      Value 1 indicates the VPC flow log version. Traffic with a size of 96 bytes to NIC 1d515d18-1b36-47dc-a983-bd6512aed4bd during the past 10 minutes (from 16:55:36 to 17:05:36 on January 29, 2019) was allowed. A data packet was transmitted over the UDP protocol from source IP address 192.168.0.154 and port 38929 to destination IP address 192.168.3.25 and port 53.

      -

      Example 2: The following is an example of a flow log record in which no data was recorded during the capture window:

      -
      1 5f67944957444bd6bb4fe3b367de8f3d 1d515d18-1b36-47dc-a983-bd6512aed4bd - - - - - - - 1431280876 1431280934 - NODATA
      -

      Example 3: The following is an example of a flow log record in which data was skipped during the capture window:

      -
      1 5f67944957444bd6bb4fe3b367de8f3d 1d515d18-1b36-47dc-a983-bd6512aed4bd - - - - - - - 1431280876 1431280934 - SKIPDATA
      -

      Table 1 describes the fields of a flow log record.

      +

      Procedure

      1. Log in to the management console.
      1. Click in the upper left corner and select the desired region and project.
      1. Click in the upper left corner and choose Network > Virtual Private Cloud.
      1. In the navigation pane on the left, choose VPC Flow Logs.
      2. Locate the target VPC flow log and click View Log Record in the Operation column to view information about the flow log record in LTS.
        Figure 1 Viewing a log record
        +
        Figure 2 Flow log record
        +

        The flow log record is in the following format:

        +
        <version> <project-id> <interface-id> <srcaddr> <dstaddr> <srcport> <dstport> <protocol> <packets> <bytes> <start> <end> <action> <log-status>
        +

        Example 1: The following is an example of a flow log record in which data was recorded during the capture window:

        +
        1 5f67944957444bd6bb4fe3b367de8f3d 1d515d18-1b36-47dc-a983-bd6512aed4bd 192.168.0.154 192.168.3.25 38929 53 17 1 96 1548752136 1548752736 ACCEPT OK
        +

        Value 1 indicates the VPC flow log version. Traffic with a size of 96 bytes to NIC 1d515d18-1b36-47dc-a983-bd6512aed4bd during the past 10 minutes (from 16:55:36 to 17:05:36 on January 29, 2019) was allowed. A data packet was transmitted over the UDP protocol from source IP address 192.168.0.154 and port 38929 to destination IP address 192.168.3.25 and port 53.

        +

        Example 2: The following is an example of a flow log record in which no data was recorded during the capture window:

        +
        1 5f67944957444bd6bb4fe3b367de8f3d 1d515d18-1b36-47dc-a983-bd6512aed4bd - - - - - - - 1431280876 1431280934 - NODATA
        +

        Example 3: The following is an example of a flow log record in which data was skipped during the capture window:

        +
        1 5f67944957444bd6bb4fe3b367de8f3d 1d515d18-1b36-47dc-a983-bd6512aed4bd - - - - - - - 1431280876 1431280934 - SKIPDATA
        +

        Table 1 describes the fields of a flow log record.

        -
        Table 1 Log field description

        Field

        +
        - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
        Table 1 Log field description

        Field

        Description

        +

        Description

        Example Value

        +

        Example Value

        version

        +

        version

        The VPC flow log version.

        +

        The VPC flow log version.

        1

        +

        1

        project-id

        +

        project-id

        The project ID.

        +

        The project ID.

        5f67944957444bd6bb4fe3b367de8f3d

        +

        5f67944957444bd6bb4fe3b367de8f3d

        interface-id

        +

        interface-id

        The ID of the NIC for which the traffic is recorded.

        +

        The ID of the NIC for which the traffic is recorded.

        1d515d18-1b36-47dc-a983-bd6512aed4bd

        +

        1d515d18-1b36-47dc-a983-bd6512aed4bd

        srcaddr

        +

        srcaddr

        The source IP address.

        +

        The source IP address.

        192.168.0.154

        +

        192.168.0.154

        dstaddr

        +

        dstaddr

        The destination IP address.

        +

        The destination IP address.

        192.168.3.25

        +

        192.168.3.25

        srcport

        +

        srcport

        The source port.

        +

        The source port.

        38929

        +

        38929

        dstport

        +

        dstport

        The destination port.

        +

        The destination port.

        53

        +

        53

        protocol

        +

        protocol

        The Internet Assigned Numbers Authority (IANA) protocol number of the traffic. For details, see Assigned Internet Protocol Numbers.

        +

        The Internet Assigned Numbers Authority (IANA) protocol number of the traffic. For details, see Assigned Internet Protocol Numbers.

        17

        +

        17

        packets

        +

        packets

        The number of packets transferred during the capture window.

        +

        The number of packets transferred during the capture window.

        1

        +

        1

        bytes

        +

        bytes

        The number of bytes transferred during the capture window.

        +

        The number of bytes transferred during the capture window.

        96

        +

        96

        start

        +

        start

        The time, in Unix seconds, of the start of the capture window.

        +

        The time, in Unix seconds, of the start of the capture window.

        1548752136

        +

        1548752136

        end

        +

        end

        The time, in Unix seconds, of the end of the capture window.

        +

        The time, in Unix seconds, of the end of the capture window.

        1548752736

        +

        1548752736

        action

        +

        action

        The action associated with the traffic:

        -
        • ACCEPT: The recorded traffic was allowed by the security groups or firewalls.
        • REJECT: The recorded traffic was denied by the firewalls.
        +

        The action associated with the traffic:

        +
        • ACCEPT: The recorded traffic was allowed by the security groups or firewalls.
        • REJECT: The recorded traffic was denied by the security groups or firewalls.

        ACCEPT

        +

        ACCEPT

        log-status

        +

        log-status

        The logging status of the VPC flow log:

        -
        • OK: Data is logging normally to the chosen destinations.
        • NODATA: There was no traffic of the Filter setting to or from the NIC during the capture window.
        • SKIPDATA: Some flow log records were skipped during the capture window. This may be caused by an internal capacity constraint or an internal error.
        -

        Example:

        -

        When Filter is set to Accepted traffic, if there is accepted traffic, the value of log-status is OK. If there is no accepted traffic, the value of log-status is NODATA regardless of whether there is rejected traffic. If some accepted traffic is abnormally skipped, the value of log-status is SKIPDATA.

        +

        The logging status of the VPC flow log:

        +
        • OK: Data is logging normally to the chosen destinations.
        • NODATA: There was no traffic of the Filter setting to or from the NIC during the capture window.
        • SKIPDATA: Some flow log records were skipped during the capture window. This may be caused by an internal capacity constraint or an internal error.
        +

        Example:

        +

        When Filter is set to Accepted traffic, if there is accepted traffic, the value of log-status is OK. If there is no accepted traffic, the value of log-status is NODATA regardless of whether there is rejected traffic. If some accepted traffic is abnormally skipped, the value of log-status is SKIPDATA.

        OK

        +

        OK

        -

        You can enter a keyword on the log topic details page on the LTS console to search for flow log records.

        +

        You can enter a keyword on the log topic details page on the LTS console to search for flow log records.

        diff --git a/docs/vpc/umn/FlowLog_0005.html b/docs/vpc/umn/FlowLog_0005.html index daa80f02..1b1fed65 100644 --- a/docs/vpc/umn/FlowLog_0005.html +++ b/docs/vpc/umn/FlowLog_0005.html @@ -1,12 +1,12 @@

        Deleting a VPC Flow Log

        -

        Scenarios

        Delete a VPC flow log that is not required. Deleting a VPC flow log will not delete the existing flow log records in LTS.

        -

        If a NIC that uses a VPC flow log is deleted, the flow log will be automatically deleted. However, the flow log records are not deleted.

        +

        Scenarios

        Delete a VPC flow log that is not required. Deleting a VPC flow log will not delete the existing flow log records in LTS.

        +

        If a NIC that uses a VPC flow log is deleted, the flow log will be automatically deleted. However, the flow log records are not deleted.

        -

        Procedure

        1. Log in to the management console.
        1. Click in the upper left corner and select the desired region and project.
        1. On the console homepage, under Network, click Virtual Private Cloud.
        2. In the navigation pane on the left, choose VPC Flow Logs.
        3. Locate the row that contains the VPC flow log to be deleted and click Delete in the Operation column.
          Figure 1 Deleting a VPC flow log
          -
        4. Click Yes in the displayed dialog box.
        +

        Procedure

        1. Log in to the management console.
        1. Click in the upper left corner and select the desired region and project.
        1. Click in the upper left corner and choose Network > Virtual Private Cloud.
        1. In the navigation pane on the left, choose VPC Flow Logs.
        2. Locate the row that contains the VPC flow log to be deleted and click Delete in the Operation column.
          Figure 1 Deleting a VPC flow log
          +
        3. Click Yes in the displayed dialog box.
        diff --git a/docs/vpc/umn/FlowLog_0006.html b/docs/vpc/umn/FlowLog_0006.html index 08df5536..c61b7ada 100644 --- a/docs/vpc/umn/FlowLog_0006.html +++ b/docs/vpc/umn/FlowLog_0006.html @@ -1,9 +1,9 @@

        Enabling or Disabling VPC Flow Log

        -

        Scenarios

        After a VPC flow log is created, the VPC flow log is automatically enabled. If you do not need to record traffic data, you can disable the corresponding VPC flow log. The disabled VPC flow log can be enabled again.

        +

        Scenarios

        After a VPC flow log is created, the VPC flow log is automatically enabled. If you do not need to record traffic data, you can disable the corresponding VPC flow log. The disabled VPC flow log can be enabled again.

        -

        Procedure

        1. Log in to the management console.
        1. Click in the upper left corner and select the desired region and project.
        1. On the console homepage, under Network, click Virtual Private Cloud.
        2. In the navigation pane on the left, choose VPC Flow Logs.
        3. Locate the VPC flow log to be enabled or disabled, and click Enable or Disable in the Operation column.
        4. Click Yes.
        +

        Procedure

        1. Log in to the management console.
        1. Click in the upper left corner and select the desired region and project.
        1. Click in the upper left corner and choose Network > Virtual Private Cloud.
        1. In the navigation pane on the left, choose VPC Flow Logs.
        2. Locate the VPC flow log to be enabled or disabled, and choose More > Enable or More > Disable in the Operation column.
        3. Click Yes.
        diff --git a/docs/vpc/umn/SecurityGroup_0003.html b/docs/vpc/umn/SecurityGroup_0003.html index c271560a..71a26ec1 100644 --- a/docs/vpc/umn/SecurityGroup_0003.html +++ b/docs/vpc/umn/SecurityGroup_0003.html @@ -1,43 +1,45 @@

        Default Security Groups and Security Group Rules

        -

        Your account automatically comes with a default security group. The default security group allows all outbound traffic, denies all inbound traffic, and allows all traffic between cloud resources in the group. Your cloud resources in this security group can communicate with each other already without adding additional rules.

        -

        Figure 1 shows the default security group rules. The following uses access between ECSs as an example.

        -
        Figure 1 Default security group
        -

        Table 1 describes the default rules for the default security group.

        +
        The system creates a default security group for each account. By default, the default security group rules:
        • Allow all outbound packets: Instances in the default security group can send requests to and receive responses from instances in other security groups.
        • Deny all inbound packets: Requests from instances in other security groups will be denied by the default security group.
        +
        +
        Figure 1 Default security group
        +
        • You cannot delete the default security group, but you can modify the rules for the default security group.
        • If two ECSs are in the same security group but in different VPCs, the ECSs cannot communicate with each other. To enable communications between the ECSs, use a VPC peering connection to connect the two VPCs.
        +
        +

        Table 1 describes the default rules for the default security group.

        -
        Table 1 Default security group rules

        Direction

        +
        - - - - - - - - - - - - - - diff --git a/docs/vpc/umn/SecurityGroup_0004.html b/docs/vpc/umn/SecurityGroup_0004.html index 9dc82acd..cf00a9e2 100644 --- a/docs/vpc/umn/SecurityGroup_0004.html +++ b/docs/vpc/umn/SecurityGroup_0004.html @@ -1,14 +1,84 @@

        Fast-Adding Security Group Rules

        -

        Scenarios

        You can add multiple security group rules with different protocols and ports at the same time.

        +

        Scenarios

        You can add multiple security group rules with different protocols and ports at the same time.

        -

        Procedure

        1. Log in to the management console.
        1. Click in the upper left corner and select the desired region and project.
        2. On the console homepage, under Network, click Virtual Private Cloud.
        3. In the navigation pane on the left, choose Access Control > Security Groups.
        4. On the Security Groups page, locate the target security group and click Manage Rule in the Operation column to switch to the page for managing inbound and outbound rules.
        5. On the Inbound Rules tab, click Fast-Add Rule. In the displayed dialog box, select the protocols and ports you wish to add all at once.
          Figure 1 Fast-Add Inbound Rule
          -

          -
        6. On the Outbound Rules tab, click Fast-Add Rule. In the displayed dialog box, select required protocols and ports to add multiple rules at a time.

          -
          Figure 2 Fast-Add Outbound Rule
          -

          -
        7. Click OK.
        +

        Procedure

        1. Log in to the management console.
        1. Click in the upper left corner and select the desired region and project.
        2. Click in the upper left corner and choose Network > Virtual Private Cloud.
        3. In the navigation pane on the left, choose Access Control > Security Groups.
        4. On the Security Groups page, locate the target security group and click Manage Rule in the Operation column to switch to the page for managing inbound and outbound rules.
        5. On the Inbound Rules tab, click Fast-Add Rule. In the displayed dialog box, select the protocols and ports you wish to add all at once.
          Figure 1 Fast-Add Inbound Rule
          + +
        Table 1 Default security group rules

        Direction

        Protocol

        +

        Protocol

        Port/Range

        +

        Port/Range

        Source/Destination

        +

        Source/Destination

        Description

        +

        Description

        Outbound

        +

        Outbound

        All

        +

        All

        All

        +

        All

        Destination: 0.0.0.0/0

        +

        Destination: 0.0.0.0/0

        Allows all outbound traffic.

        +

        Allows all outbound traffic.

        Inbound

        +

        Inbound

        All

        +

        All

        All

        +

        All

        Source: the current security group (for example, sg-xxxxx)

        +

        Source: the current security group (for example, sg-xxxxx)

        Allows communications among ECSs within the security group and denies all inbound traffic (incoming data packets).

        +

        Allows communications among ECSs within the security group and denies all inbound traffic (incoming data packets).

        + + + + + + + + + + + + + + + + + +
        Table 1 Inbound rule parameter description

        Parameter

        +

        Description

        +

        Example Value

        +

        Protocols and Ports

        +

        Common protocols and ports are provided for:

        +
        • Remote login and ping
        • Web services
        • Databases
        +

        SSH (22)

        +

        Source

        +
        Source of the security group rule. The value can be an IP address or a security group to allow access from IP addresses or instances in the security group. For example:
        • xxx.xxx.xxx.xxx/32 (IPv4 address)
        • xxx.xxx.xxx.0/24 (IPv4 address range)
        • 0.0.0.0/0 (all IPv4 addresses)
        • sg-abc (security group)
        +
        +

        If the source is a security group, this rule will apply to all instances associated with the selected security group.

        +

        0.0.0.0/0

        +

        Description

        +

        (Optional) Supplementary information about the security group rule.

        +

        The description can contain a maximum of 255 characters and cannot contain angle brackets (< or >).

        +

        -

        +
        +
        +
      3. On the Outbound Rules tab, click Fast-Add Rule. In the displayed dialog box, select required protocols and ports to add multiple rules at a time.
        Figure 2 Fast-Add Outbound Rule
        + +
        + + + + + + + + + + + + + + + + + +
        Table 2 Outbound rule parameter description

        Parameter

        +

        Description

        +

        Example Value

        +

        Protocols and Ports

        +

        Common protocols and ports are provided for:

        +
        • Remote login and ping
        • Web services
        • Databases
        +

        SSH (22)

        +

        Destination

        +
        Destination of the security group rule. The value can be an IP address or a security group to allow access to IP addresses or instances in the security group. For example:
        • xxx.xxx.xxx.xxx/32 (IPv4 address)
        • xxx.xxx.xxx.0/24 (IPv4 address range)
        • 0.0.0.0/0 (all IPv4 addresses)
        • sg-abc (security group)
        +
        +

        0.0.0.0/0

        +

        Description

        +

        (Optional) Supplementary information about the security group rule.

        +

        The description can contain a maximum of 255 characters and cannot contain angle brackets (< or >).

        +

        -

        +
        +
        +
      4. Click OK.
      5. diff --git a/docs/vpc/umn/SecurityGroup_0006.html b/docs/vpc/umn/SecurityGroup_0006.html index 551767a6..66e3f308 100644 --- a/docs/vpc/umn/SecurityGroup_0006.html +++ b/docs/vpc/umn/SecurityGroup_0006.html @@ -1,15 +1,15 @@

        Changing the Security Group of an ECS

        -

        Scenarios

        Change the security group associated with an ECS NIC.

        +

        Scenarios

        Change the security group associated with an ECS NIC.

        -

        Procedure

        1. Log in to the management console.
        2. Click in the upper left corner and select your region and project.
        3. Under Computing, click Elastic Cloud Server.
        4. In the ECS list, locate the row that contains the target ECS. Click More in the Operation column and select Manage Network > Change Security Group.

          The Change Security Group dialog box is displayed.

          -
          Figure 1 Change Security Group
          -
        5. Select the target NIC and security groups as prompted.

          You can select multiple security groups. In such a case, the rules of all the selected security groups will be aggregated to apply on the ECS.

          -

          To create a security group, click Create Security Group.

          -

          Using multiple security groups may deteriorate ECS network performance. You are suggested to select no more than five security groups.

          +

          Procedure

          1. Log in to the management console.
          2. Click in the upper left corner and select your region and project.
          3. Under Computing, click Elastic Cloud Server.
          4. In the ECS list, locate the row that contains the target ECS. Click More in the Operation column and select Manage Network > Change Security Group.

            The Change Security Group dialog box is displayed.

            +
            Figure 1 Change Security Group
            +
          5. Select the target NIC and security groups as prompted.

            You can select multiple security groups. In such a case, the rules of all the selected security groups will be aggregated to apply on the ECS.

            +

            To create a security group, click Create Security Group.

            +

            Using multiple security groups may deteriorate ECS network performance. You are suggested to select no more than five security groups.

            -
          6. Click OK.
          +
        6. Click OK.
        diff --git a/docs/vpc/umn/SecurityGroup_0017.html b/docs/vpc/umn/SecurityGroup_0017.html index 714bbb85..77042e6f 100644 --- a/docs/vpc/umn/SecurityGroup_0017.html +++ b/docs/vpc/umn/SecurityGroup_0017.html @@ -1,15 +1,16 @@

        Adding Instances to and Removing Them from a Security Group

        -

        Scenarios

        After a security group is created, you can add instances to the security group to protect the instances. You can also remove them from the security group as required.

        -

        You can add multiple instances to or remove them from a security group.

        +

        Scenarios

        After a security group is created, you can add instances to the security group to protect the instances. You can also remove them from the security group as required.

        +

        You can add multiple instances to or remove them from a security group.

        -

        Adding Instances to a Security Group

        1. Log in to the management console.
        1. Click in the upper left corner and select the desired region and project.
        2. On the console homepage, under Network, click Virtual Private Cloud.
        3. In the navigation pane on the left, choose Access Control > Security Groups.
        4. On the Security Groups page, click Manage Instance in the Operation column.
        5. On the Servers tab, click Add and add one or more servers to the current security group.
        6. On the Extension NICs tab, click Add and add one or more extension NICs to the current security group.
        7. Click OK.
        +

        Adding Instances to a Security Group

        1. Log in to the management console.
        2. Click in the upper left corner and select the desired region and project.
        3. Click in the upper left corner and choose Network > Virtual Private Cloud.
        4. In the navigation pane on the left, choose Access Control > Security Groups.
        5. On the Security Groups page, click Manage Instance in the Operation column.
        6. On the Servers tab, click Add and add one or more servers to the current security group.
        7. On the Extension NICs tab, click Add and add one or more extension NICs to the current security group.
        8. Click OK.
        -

        Removing Instances from a Security Group

        1. Log in to the management console.
        1. Click in the upper left corner and select the desired region and project.
        2. On the console homepage, under Network, click Virtual Private Cloud.
        3. In the navigation pane on the left, choose Access Control > Security Groups.
        4. On the Security Groups page, click Manage Instance in the Operation column.
        5. On the Servers tab, locate the target server and click Remove in the Operation column to remove the server from current security group.
        6. On the Extension NICs tab, locate the target extension NIC and click Remove in the Operation column to remove the NIC from the current security group.
        7. Click Yes.
        -

        Removing multiple instances from a security group

        -

        Select multiple servers and click Remove above the server list to remove the selected servers from the current security group all at once.

        -

        Select multiple extension NICs and click Remove above the extension NIC list to remove the selected extension NICs from the current security group all at once.

        +

        Removing Instances from a Security Group

        1. Log in to the management console.
        2. Click in the upper left corner and select the desired region and project.
        3. Click in the upper left corner and choose Network > Virtual Private Cloud.
        4. In the navigation pane on the left, choose Access Control > Security Groups.
        5. On the Security Groups page, click Manage Instance in the Operation column.
        6. On the Servers tab, locate the target server and click Remove in the Operation column to remove the server from current security group.
        7. On the Extension NICs tab, locate the target extension NIC and click Remove in the Operation column to remove the NIC from the current security group.
        8. Click Yes.
        +

        Removing multiple instances from a security group

        +
        • Select multiple servers and click Remove above the server list to remove the selected servers from the current security group all at once.
        • Select multiple extension NICs and click Remove above the extension NIC list to remove the selected extension NICs from the current security group all at once.
        +
        +

        Follow-Up Operations

        You can delete the security groups that you no longer need. Deleting a security group will also delete all security group rules in the security group. For details, see Deleting a Security Group.

        diff --git a/docs/vpc/umn/acl_0001.html b/docs/vpc/umn/acl_0001.html index b036a112..7e2a8c39 100644 --- a/docs/vpc/umn/acl_0001.html +++ b/docs/vpc/umn/acl_0001.html @@ -1,59 +1,59 @@ -

        Firewall Overview

        -

        A firewall is an optional layer of security for your subnets. After you associate one or more subnets with a firewall, you can control traffic in and out of the subnets.

        -

        Figure 1 shows how a firewall works.

        -
        Figure 1 Security groups and firewalls
        -

        Similar to security groups, firewalls control access to subnets and add an additional layer of defense to your subnets. Security groups only have the "allow" rules, but firewalls have both "allow" and "deny" rules. You can use firewalls together with security groups to implement comprehensive and fine-grained access control.

        -

        Differences Between Security Groups and Firewalls summarizes the basic differences between security groups and firewalls.

        -

        Firewall Basics

        • Your VPC does not come with a firewall, but you can create a firewall and associate it with a VPC subnet if required. By default, each firewall denies all inbound traffic to and outbound traffic from the associated subnet until you add rules.
        • You can associate a firewall with multiple subnets. However, a subnet can only be associated with one firewall at a time.
        • Each newly created firewall is in the Inactive state until you associate subnets with it.
        +

        Firewall Overview

        +

        A firewall is an optional layer of security for your subnets. After you associate one or more subnets with a firewall, you can control traffic in and out of the subnets.

        +

        Figure 1 shows how a firewall works.

        +
        Figure 1 Security groups and firewalls
        +

        Similar to security groups, firewalls control access to subnets and add an additional layer of defense to your subnets. Security groups only have the "allow" rules, but firewalls have both "allow" and "deny" rules. You can use firewalls together with security groups to implement comprehensive and fine-grained access control.

        +

        Differences Between Security Groups and Firewalls summarizes the basic differences between security groups and firewalls.

        +

        Firewall Basics

        • Your VPC does not come with a firewall, but you can create a firewall and associate it with a VPC subnet if required. By default, each firewall denies all inbound traffic to and outbound traffic from the associated subnet until you add rules.
        • You can associate a firewall with multiple subnets. However, a subnet can only be associated with one firewall at a time.
        • Each newly created firewall is in the Inactive state until you associate subnets with it.
        -

        Default Firewall Rules

        By default, each firewall has preset rules that allow the following packets:

        -
        • Packets whose source and destination are in the same subnet
        • Broadcast packets with the destination 255.255.255.255/32, which is used to configure host startup information.
        • Multicast packets with the destination 224.0.0.0/24, which is used by routing protocols.
        • Metadata packets with the destination 169.254.169.254/32 and TCP port number 80, which is used to obtain metadata.
        • Packets from CIDR blocks that are reserved for public services (for example, packets with the destination 100.125.0.0/16)
        • A firewall denies all traffic in and out of a subnet excepting the preceding ones. Table 1 shows the default firewall rules. You cannot modify or delete the default rules. -
          Table 1 Default firewall rules

          Direction

          +

          Default Firewall Rules

          By default, each firewall has preset rules that allow the following packets:

          +
          • Packets whose source and destination are in the same subnet.
          • Broadcast packets with the destination 255.255.255.255/32, which is used to configure host startup information.
          • Multicast packets with the destination 224.0.0.0/24, which is used by routing protocols.
          • Metadata packets with the destination 169.254.169.254/32 and TCP port number 80, which is used to obtain metadata.
          • Packets from CIDR blocks that are reserved for public services (for example, packets with the destination 100.125.0.0/16)
          • A firewall denies all traffic in and out of a subnet excepting the preceding packets. Table 1 shows the default rules. You cannot modify or delete the default rules. +
            - - - - - - - - - - - - - - - - - - - - @@ -61,17 +61,19 @@ -

            Rule Priorities

            • Each firewall rule has a priority value where a smaller value corresponds to a higher priority. Any time two rules conflict, the rule with the higher priority is the one that gets applied. The rule whose priority value is an asterisk (*) has the lowest priority.
            • If multiple firewall rules conflict, only the rule with the highest priority takes effect. If you need a rule to take effect before or after a specific rule, you can insert that rule before or after the specific rule.
            +

            Rule Priorities

            • Each firewall rule has a priority value where a smaller value corresponds to a higher priority. Any time two rules conflict, the rule with the higher priority is the one that gets applied. The rule whose priority value is an asterisk (*) has the lowest priority.
            • If multiple firewall rules conflict, only the rule with the highest priority takes effect. If you need a rule to take effect before or after a specific rule, you can insert that rule before or after the specific rule.
            -

            Application Scenarios

            • If the application layer needs to provide services for users, traffic must be allowed to reach the application layer from all IP addresses. However, you also need to prevent illegal access from malicious users.

              Solution: You can add firewall rules to deny access from suspect IP addresses.

              -
            • How can I isolate ports with identified vulnerabilities? For example, how do I isolate port 445 that can be exploited by WannaCry worm?

              Solution: You can add firewall rules to deny access traffic from a specific port and protocol, for example, TCP port 445.

              -
            • No defense is required for the east-west traffic between subnets, but access control is required for north-south traffic.

              Solution: You can add firewall rules to protect north-south traffic.

              -
            • For frequently accessed applications, a security rule sequence may need to be adjusted to improve performance.

              Solution: A firewall allows you to adjust the rule sequence so that frequently used rules are applied before other rules.

              +

              Application Scenarios

              • If the application layer needs to provide services for users, traffic must be allowed to reach the application layer from all IP addresses. However, you also need to prevent illegal access from malicious users.

                Solution: You can add firewall rules to deny access from suspect IP addresses.

                +
              • How can I isolate ports with identified vulnerabilities? For example, how do I isolate port 445 that can be exploited by WannaCry worm?

                Solution: You can add firewall rules to deny access traffic from a specific port and protocol, for example, TCP port 445.

                +
              • No defense is required for the east-west traffic between subnets, but access control is required for north-south traffic.

                Solution: You can add firewall rules to protect north-south traffic.

                +
              • For frequently accessed applications, a security rule sequence may need to be adjusted to improve performance.

                Solution: A firewall allows you to adjust the rule sequence so that frequently used rules are applied before other rules.

              -

              Configuration Procedure

              Figure 2 shows the procedure for configuring a firewall.

              -
              Figure 2 firewall configuration procedure
              -
              1. Create a firewall by following the steps described in Creating a Firewall.
              2. Add firewall rules by following the steps described in Adding a Firewall Rule.
              3. Associate subnets with the firewall by following the steps described in Associating Subnets with a Firewall. After subnets are associated with the firewall, the subnets will be protected by the configured firewall rules.
              +

              Configuration Procedure

              Figure 2 shows the procedure for configuring a firewall.

              +
              Figure 2 firewall configuration procedure
              +
              1. Create a firewall by following the steps described in Creating a Firewall.
              2. Add firewall rules by following the steps described in Adding a Firewall Rule.
              3. Associate subnets with the firewall by following the steps described in Associating Subnets with a Firewall. After subnets are associated with the firewall, the subnets will be protected by the configured firewall rules.
              +
              +

              Notes and Constraints

              • By default, you can create a maximum of 200 firewalls in your cloud account.
              • You can associate a firewall with multiple subnets. However, a subnet can only be associated with one firewall at a time.
              • A firewall can contain no more than 20 rules in one direction, or performance will deteriorate.
              • For optimal performance, import no more than 40 firewall rules at a time. Existing rules will still be available after new rules are imported. Each rule can be imported only once.
              diff --git a/docs/vpc/umn/acl_0002.html b/docs/vpc/umn/acl_0002.html index 24919f0f..b4ffe3f4 100644 --- a/docs/vpc/umn/acl_0002.html +++ b/docs/vpc/umn/acl_0002.html @@ -1,198 +1,198 @@ -

              Firewall Configuration Examples

              -

              This section provides examples for configuring firewalls.

              - -

              Denying Access from a Specific Port

              You might want to block TCP 445 to protect against the WannaCry ransomware attacks. You can add a firewall rule to deny all incoming traffic from TCP port 445.

              +

              Firewall Configuration Examples

              +

              This section provides examples for configuring firewalls.

              + +

              Denying Access from a Specific Port

              You might want to block TCP 445 to protect against the WannaCry ransomware attacks. You can add a firewall rule to deny all incoming traffic from TCP port 445.

              -

              Firewall Configuration

              -
              Table 1 lists the inbound rule required. -
            Table 1 Default firewall rules

            Direction

            Priority

            +

            Priority

            Action

            +

            Action

            Protocol

            +

            Protocol

            Source

            +

            Source

            Destination

            +

            Destination

            Description

            +

            Description

            Inbound

            +

            Inbound

            *

            +

            *

            Deny

            +

            Deny

            All

            +

            All

            0.0.0.0/0

            +

            0.0.0.0/0

            0.0.0.0/0

            +

            0.0.0.0/0

            Denies all inbound traffic.

            +

            Denies all inbound traffic.

            Outbound

            +

            Outbound

            *

            +

            *

            Deny

            +

            Deny

            All

            +

            All

            0.0.0.0/0

            +

            0.0.0.0/0

            0.0.0.0/0

            +

            0.0.0.0/0

            Denies all outbound traffic.

            +

            Denies all outbound traffic.

            Table 1 firewall rules

            Direction

            +

            Firewall Configuration

            +
            Table 1 lists the inbound rule required. +
            - - - - - - - - - - - - - - - - - - - - - - -
            Table 1 firewall rules

            Direction

            Action

            +

            Action

            Protocol

            +

            Protocol

            Source

            +

            Source

            Source Port Range

            +

            Source Port Range

            Destination

            +

            Destination

            Destination Port Range

            +

            Destination Port Range

            Description

            +

            Description

            Inbound

            +

            Inbound

            Deny

            +

            Deny

            TCP

            +

            TCP

            0.0.0.0/0

            +

            0.0.0.0/0

            1-65535

            +

            1-65535

            0.0.0.0/0

            +

            0.0.0.0/0

            445

            +

            445

            Denies inbound traffic from any IP address through TCP port 445.

            +

            Denies inbound traffic from any IP address through TCP port 445.

            Inbound

            +

            Inbound

            Allow

            +

            Allow

            All

            +

            All

            0.0.0.0/0

            +

            0.0.0.0/0

            1-65535

            +

            1-65535

            0.0.0.0/0

            +

            0.0.0.0/0

            All

            +

            All

            Allows all inbound traffic.

            +

            Allows all inbound traffic.

            -
            • By default, a firewall denies all inbound traffic. You need to allow all inbound traffic if necessary.
            • If you want a deny rule to be matched first, insert the deny rule above the allow rule. For details, see Changing the Sequence of a Firewall Rule.
            +
            • By default, a firewall denies all inbound traffic. You need to allow all inbound traffic if necessary.
            • If you want a deny rule to be matched first, insert the deny rule above the allow rule. For details, see Changing the Sequence of a Firewall Rule.
            -

            Allowing Access from Specific Ports and Protocols

            In this example, an ECS in a subnet is used as the web server, and you need to allow inbound traffic from HTTP port 80 and HTTPS port 443 and allow all outbound traffic regardless of the port. You need to configure both the firewall rules and security group rules to allow the traffic.

            -

            Firewall Configuration

            -

            Table 2 lists the inbound rule required.

            +

            Allowing Access from Specific Ports and Protocols

            In this example, an ECS in a subnet is used as the web server, and you need to allow inbound traffic from HTTP port 80 and HTTPS port 443 and allow all outbound traffic. You need to configure both the firewall rules and security group rules to allow the traffic.

            +

            Firewall Configuration

            +

            Table 2 lists the inbound rule required.

            -
            Table 2 firewall rules

            Direction

            +
            - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
            Table 2 firewall rules

            Direction

            Action

            +

            Action

            Protocol

            +

            Protocol

            Source

            +

            Source

            Source Port Range

            +

            Source Port Range

            Destination

            +

            Destination

            Destination Port Range

            +

            Destination Port Range

            Description

            +

            Description

            Inbound

            +

            Inbound

            Allow

            +

            Allow

            TCP

            +

            TCP

            0.0.0.0/0

            +

            0.0.0.0/0

            1-65535

            +

            1-65535

            0.0.0.0/0

            +

            0.0.0.0/0

            80

            +

            80

            Allows inbound HTTP traffic from any IP address to ECSs in the subnet through port 80.

            +

            Allows inbound HTTP traffic from any IP address to ECSs in the subnet through port 80.

            Inbound

            +

            Inbound

            Allow

            +

            Allow

            TCP

            +

            TCP

            0.0.0.0/0

            +

            0.0.0.0/0

            1-65535

            +

            1-65535

            0.0.0.0/0

            +

            0.0.0.0/0

            443

            +

            443

            Allows inbound HTTPS traffic from any IP address to ECSs in the subnet through port 443.

            +

            Allows inbound HTTPS traffic from any IP address to ECSs in the subnet through port 443.

            Outbound

            +

            Outbound

            Allow

            +

            Allow

            All

            +

            All

            0.0.0.0/0

            +

            0.0.0.0/0

            All

            +

            All

            0.0.0.0/0

            +

            0.0.0.0/0

            All

            +

            All

            Allows all outbound traffic from the subnet.

            +

            Allows all outbound traffic from the subnet.

            -

            Security group configuration

            -

            Table 3 lists the inbound and outbound security group rules required.

            +

            Security group configuration

            +

            Table 3 lists the inbound and outbound security group rules required.

            -
            Table 3 Security group rules

            Direction

            +
            - - - - - - - - - - - - - - - - - - -
            Table 3 Security group rules

            Direction

            Protocol/Application

            +

            Protocol/Application

            Port

            +

            Port

            Source/Destination

            +

            Source/Destination

            Description

            +

            Description

            Inbound

            +

            Inbound

            TCP

            +

            TCP

            80

            +

            80

            Source: 0.0.0.0/0

            +

            Source: 0.0.0.0/0

            Allows inbound HTTP traffic from any IP address to ECSs associated with the security group through port 80.

            +

            Allows inbound HTTP traffic from any IP address to ECSs associated with the security group through port 80.

            Inbound

            +

            Inbound

            TCP

            +

            TCP

            443

            +

            443

            Source: 0.0.0.0/0

            +

            Source: 0.0.0.0/0

            Allows inbound HTTPS traffic from any IP address to ECSs associated with the security group through port 443.

            +

            Allows inbound HTTPS traffic from any IP address to ECSs associated with the security group through port 443.

            Outbound

            +

            Outbound

            All

            +

            All

            All

            +

            All

            Destination: 0.0.0.0/0

            +

            Destination: 0.0.0.0/0

            Allows all outbound traffic from the security group.

            +

            Allows all outbound traffic from the security group.

            -

            A firewall adds an additional layer of security. Even if the security group rules allow more traffic than that actually required, the firewall rules allow only access from HTTP port 80 and HTTPS port 443 and deny other inbound traffic.

            +

            A firewall adds an additional layer of security. Even if the security group rules allow more traffic than that actually required, the firewall rules allow only access from HTTP port 80 and HTTPS port 443 and deny other inbound traffic.

            diff --git a/docs/vpc/umn/eip_0003.html b/docs/vpc/umn/eip_0003.html new file mode 100644 index 00000000..0ffc2de4 --- /dev/null +++ b/docs/vpc/umn/eip_0003.html @@ -0,0 +1,15 @@ + + +

            Exporting EIP Information

            +

            Scenarios

            The information of all EIPs under your account can be exported in an Excel file to a local directory. The file records the ID, status, type, bandwidth name, and bandwidth size of EIPs.

            +
            +

            Procedure

            1. Log in to the management console.
            2. Click in the upper left corner and select the desired region and project.
            3. Click in the upper left corner and choose Network > Elastic IP.
            4. On the displayed page, click in the upper right corner of the EIP list.

              The system will automatically export all EIPs in the current region of your account to an Excel file and download the file to a local directory.

              +
            +
            +
            +
            + +
            + diff --git a/docs/vpc/umn/en-us_image_0000001117669274.png b/docs/vpc/umn/en-us_image_0000001117669274.png index 76633c84..135693af 100644 Binary files a/docs/vpc/umn/en-us_image_0000001117669274.png and b/docs/vpc/umn/en-us_image_0000001117669274.png differ diff --git a/docs/vpc/umn/en-us_image_0000001117669524.png b/docs/vpc/umn/en-us_image_0000001117669524.png index 7a8a4aeb..d6b756a9 100644 Binary files a/docs/vpc/umn/en-us_image_0000001117669524.png and b/docs/vpc/umn/en-us_image_0000001117669524.png differ diff --git a/docs/vpc/umn/en-us_image_0000001163949251.png b/docs/vpc/umn/en-us_image_0000001163949251.png index c3db78d8..fea06056 100644 Binary files a/docs/vpc/umn/en-us_image_0000001163949251.png and b/docs/vpc/umn/en-us_image_0000001163949251.png differ diff --git a/docs/vpc/umn/en-us_image_0000001197426329.png b/docs/vpc/umn/en-us_image_0000001197426329.png index eacf1814..98634416 100644 Binary files a/docs/vpc/umn/en-us_image_0000001197426329.png and b/docs/vpc/umn/en-us_image_0000001197426329.png differ diff --git a/docs/vpc/umn/en-us_image_0000001206933138.png b/docs/vpc/umn/en-us_image_0000001206933138.png deleted file mode 100644 index 452d4e68..00000000 Binary files a/docs/vpc/umn/en-us_image_0000001206933138.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0000001207093220.png b/docs/vpc/umn/en-us_image_0000001207093220.png deleted file mode 100644 index a26a279b..00000000 Binary files a/docs/vpc/umn/en-us_image_0000001207093220.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0000001207253746.png b/docs/vpc/umn/en-us_image_0000001207253746.png deleted file mode 100644 index a26a279b..00000000 Binary files a/docs/vpc/umn/en-us_image_0000001207253746.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0000001207699446.png b/docs/vpc/umn/en-us_image_0000001207699446.png new file mode 100644 index 00000000..330e1426 Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001207699446.png differ diff --git a/docs/vpc/umn/en-us_image_0000001207827554.png b/docs/vpc/umn/en-us_image_0000001207827554.png new file mode 100644 index 00000000..b6dac48f Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001207827554.png differ diff --git a/docs/vpc/umn/en-us_image_0000001208260576.png b/docs/vpc/umn/en-us_image_0000001208260576.png new file mode 100644 index 00000000..a4067973 Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001208260576.png differ diff --git a/docs/vpc/umn/en-us_image_0000001209321492.png b/docs/vpc/umn/en-us_image_0000001209321492.png new file mode 100644 index 00000000..76b34198 Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001209321492.png differ diff --git a/docs/vpc/umn/en-us_image_0000001209442636.png b/docs/vpc/umn/en-us_image_0000001209442636.png new file mode 100644 index 00000000..80dea80e Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001209442636.png differ diff --git a/docs/vpc/umn/en-us_image_0000001209777270.png b/docs/vpc/umn/en-us_image_0000001209777270.png new file mode 100644 index 00000000..e6e9c709 Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001209777270.png differ diff --git a/docs/vpc/umn/en-us_image_0000001211006359.png b/docs/vpc/umn/en-us_image_0000001211006359.png index ff5a995a..66686f7e 100644 Binary files a/docs/vpc/umn/en-us_image_0000001211006359.png and b/docs/vpc/umn/en-us_image_0000001211006359.png differ diff --git a/docs/vpc/umn/en-us_image_0000001211445065.png b/docs/vpc/umn/en-us_image_0000001211445065.png index 9d7396e2..a86f5c5d 100644 Binary files a/docs/vpc/umn/en-us_image_0000001211445065.png and b/docs/vpc/umn/en-us_image_0000001211445065.png differ diff --git a/docs/vpc/umn/en-us_image_0000001338933333.png b/docs/vpc/umn/en-us_image_0000001221790501.png similarity index 100% rename from docs/vpc/umn/en-us_image_0000001338933333.png rename to docs/vpc/umn/en-us_image_0000001221790501.png diff --git a/docs/vpc/umn/en-us_image_0185346582.png b/docs/vpc/umn/en-us_image_0000001221842468.png similarity index 100% rename from docs/vpc/umn/en-us_image_0185346582.png rename to docs/vpc/umn/en-us_image_0000001221842468.png diff --git a/docs/vpc/umn/en-us_image_0000001222749226.png b/docs/vpc/umn/en-us_image_0000001222749226.png deleted file mode 100644 index 806c94cd..00000000 Binary files a/docs/vpc/umn/en-us_image_0000001222749226.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0000001222749910.png b/docs/vpc/umn/en-us_image_0000001222749910.png deleted file mode 100644 index 806c94cd..00000000 Binary files a/docs/vpc/umn/en-us_image_0000001222749910.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0000001251773147.png b/docs/vpc/umn/en-us_image_0000001251773147.png deleted file mode 100644 index ef869a01..00000000 Binary files a/docs/vpc/umn/en-us_image_0000001251773147.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0000001254335981.png b/docs/vpc/umn/en-us_image_0000001254335981.png new file mode 100644 index 00000000..06af5104 Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001254335981.png differ diff --git a/docs/vpc/umn/en-us_image_0000001286573614.png b/docs/vpc/umn/en-us_image_0000001286573614.png deleted file mode 100644 index eb1ae9b4..00000000 Binary files a/docs/vpc/umn/en-us_image_0000001286573614.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0000001337710801.png b/docs/vpc/umn/en-us_image_0000001337710801.png new file mode 100644 index 00000000..c5bd875e Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001337710801.png differ diff --git a/docs/vpc/umn/en-us_image_0000001454059512.png b/docs/vpc/umn/en-us_image_0000001454059512.png new file mode 100644 index 00000000..d8f9804a Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001454059512.png differ diff --git a/docs/vpc/umn/en-us_image_0000001461263993.png b/docs/vpc/umn/en-us_image_0000001461263993.png new file mode 100644 index 00000000..6fe7324b Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001461263993.png differ diff --git a/docs/vpc/umn/en-us_image_0000001462622484.png b/docs/vpc/umn/en-us_image_0000001462622484.png new file mode 100644 index 00000000..abe732df Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001462622484.png differ diff --git a/docs/vpc/umn/en-us_image_0000001464757610.png b/docs/vpc/umn/en-us_image_0000001464757610.png new file mode 100644 index 00000000..b87d186d Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001464757610.png differ diff --git a/docs/vpc/umn/en-us_image_0000001465124712.png b/docs/vpc/umn/en-us_image_0000001465124712.png new file mode 100644 index 00000000..f7e88ddf Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001465124712.png differ diff --git a/docs/vpc/umn/en-us_image_0000001490118666.png b/docs/vpc/umn/en-us_image_0000001490118666.png new file mode 100644 index 00000000..d8f9804a Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001490118666.png differ diff --git a/docs/vpc/umn/en-us_image_0000001500905066.png b/docs/vpc/umn/en-us_image_0000001500905066.png new file mode 100644 index 00000000..d8f9804a Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001500905066.png differ diff --git a/docs/vpc/umn/en-us_image_0000001503011070.png b/docs/vpc/umn/en-us_image_0000001503011070.png new file mode 100644 index 00000000..d8f9804a Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001503011070.png differ diff --git a/docs/vpc/umn/en-us_image_0000001503011074.png b/docs/vpc/umn/en-us_image_0000001503011074.png new file mode 100644 index 00000000..d8f9804a Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001503011074.png differ diff --git a/docs/vpc/umn/en-us_image_0000001503159042.png b/docs/vpc/umn/en-us_image_0000001503159042.png new file mode 100644 index 00000000..d8f9804a Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001503159042.png differ diff --git a/docs/vpc/umn/en-us_image_0000001503170970.png b/docs/vpc/umn/en-us_image_0000001503170970.png new file mode 100644 index 00000000..d8f9804a Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001503170970.png differ diff --git a/docs/vpc/umn/en-us_image_0000001503170974.png b/docs/vpc/umn/en-us_image_0000001503170974.png new file mode 100644 index 00000000..d8f9804a Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001503170974.png differ diff --git a/docs/vpc/umn/en-us_image_0000001503318922.png b/docs/vpc/umn/en-us_image_0000001503318922.png new file mode 100644 index 00000000..d8f9804a Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001503318922.png differ diff --git a/docs/vpc/umn/en-us_image_0000001503330854.png b/docs/vpc/umn/en-us_image_0000001503330854.png new file mode 100644 index 00000000..d8f9804a Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001503330854.png differ diff --git a/docs/vpc/umn/en-us_image_0000001503330858.png b/docs/vpc/umn/en-us_image_0000001503330858.png new file mode 100644 index 00000000..d8f9804a Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001503330858.png differ diff --git a/docs/vpc/umn/en-us_image_0000001503478818.png b/docs/vpc/umn/en-us_image_0000001503478818.png new file mode 100644 index 00000000..d8f9804a Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001503478818.png differ diff --git a/docs/vpc/umn/en-us_image_0000001503490746.png b/docs/vpc/umn/en-us_image_0000001503490746.png new file mode 100644 index 00000000..d8f9804a Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001503490746.png differ diff --git a/docs/vpc/umn/en-us_image_0000001503490750.png b/docs/vpc/umn/en-us_image_0000001503490750.png new file mode 100644 index 00000000..d8f9804a Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001503490750.png differ diff --git a/docs/vpc/umn/en-us_image_0000001512591549.png b/docs/vpc/umn/en-us_image_0000001512591549.png new file mode 100644 index 00000000..d053a788 Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001512591549.png differ diff --git a/docs/vpc/umn/en-us_image_0000001512701025.png b/docs/vpc/umn/en-us_image_0000001512701025.png new file mode 100644 index 00000000..d7660b68 Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001512701025.png differ diff --git a/docs/vpc/umn/en-us_image_0000001512876289.png b/docs/vpc/umn/en-us_image_0000001512876289.png new file mode 100644 index 00000000..4fd56502 Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001512876289.png differ diff --git a/docs/vpc/umn/en-us_image_0226223279.png b/docs/vpc/umn/en-us_image_0000001515644737.png similarity index 100% rename from docs/vpc/umn/en-us_image_0226223279.png rename to docs/vpc/umn/en-us_image_0000001515644737.png diff --git a/docs/vpc/umn/en-us_image_0000001520717193.png b/docs/vpc/umn/en-us_image_0000001520717193.png new file mode 100644 index 00000000..d8f9804a Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001520717193.png differ diff --git a/docs/vpc/umn/en-us_image_0000001521533677.png b/docs/vpc/umn/en-us_image_0000001521533677.png new file mode 100644 index 00000000..dc1fd245 Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001521533677.png differ diff --git a/docs/vpc/umn/en-us_image_0000001540725521.png b/docs/vpc/umn/en-us_image_0000001540725521.png new file mode 100644 index 00000000..2f6a7cfb Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001540725521.png differ diff --git a/docs/vpc/umn/en-us_image_0000001540846821.png b/docs/vpc/umn/en-us_image_0000001540846821.png new file mode 100644 index 00000000..5912989f Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001540846821.png differ diff --git a/docs/vpc/umn/en-us_image_0000001553650753.png b/docs/vpc/umn/en-us_image_0000001553650753.png new file mode 100644 index 00000000..d8f9804a Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001553650753.png differ diff --git a/docs/vpc/umn/en-us_image_0000001553650757.png b/docs/vpc/umn/en-us_image_0000001553650757.png new file mode 100644 index 00000000..d8f9804a Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001553650757.png differ diff --git a/docs/vpc/umn/en-us_image_0000001553770733.png b/docs/vpc/umn/en-us_image_0000001553770733.png new file mode 100644 index 00000000..d8f9804a Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001553770733.png differ diff --git a/docs/vpc/umn/en-us_image_0000001553770737.png b/docs/vpc/umn/en-us_image_0000001553770737.png new file mode 100644 index 00000000..d8f9804a Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001553770737.png differ diff --git a/docs/vpc/umn/en-us_image_0000001553930581.png b/docs/vpc/umn/en-us_image_0000001553930581.png new file mode 100644 index 00000000..d8f9804a Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001553930581.png differ diff --git a/docs/vpc/umn/en-us_image_0000001554010645.png b/docs/vpc/umn/en-us_image_0000001554010645.png new file mode 100644 index 00000000..d8f9804a Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001554010645.png differ diff --git a/docs/vpc/umn/en-us_image_0000001554010649.png b/docs/vpc/umn/en-us_image_0000001554010649.png new file mode 100644 index 00000000..d8f9804a Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001554010649.png differ diff --git a/docs/vpc/umn/en-us_image_0000001570070841.png b/docs/vpc/umn/en-us_image_0000001570070841.png new file mode 100644 index 00000000..6fe740f8 Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001570070841.png differ diff --git a/docs/vpc/umn/en-us_image_0000001602035305.png b/docs/vpc/umn/en-us_image_0000001602035305.png new file mode 100644 index 00000000..a235a332 Binary files /dev/null and b/docs/vpc/umn/en-us_image_0000001602035305.png differ diff --git a/docs/vpc/umn/en-us_image_0118498947.png b/docs/vpc/umn/en-us_image_0118498947.png deleted file mode 100644 index 863c101f..00000000 Binary files a/docs/vpc/umn/en-us_image_0118498947.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0152238989.png b/docs/vpc/umn/en-us_image_0152238989.png deleted file mode 100644 index 1efaac32..00000000 Binary files a/docs/vpc/umn/en-us_image_0152238989.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0157880395.png b/docs/vpc/umn/en-us_image_0157880395.png new file mode 100644 index 00000000..32461aa1 Binary files /dev/null and b/docs/vpc/umn/en-us_image_0157880395.png differ diff --git a/docs/vpc/umn/en-us_image_0162335561.png b/docs/vpc/umn/en-us_image_0162335561.png deleted file mode 100644 index fb279128..00000000 Binary files a/docs/vpc/umn/en-us_image_0162335561.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0162335565.png b/docs/vpc/umn/en-us_image_0162335565.png deleted file mode 100644 index fc5a60bc..00000000 Binary files a/docs/vpc/umn/en-us_image_0162335565.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0162391187.png b/docs/vpc/umn/en-us_image_0162391187.png deleted file mode 100644 index 7a75567f..00000000 Binary files a/docs/vpc/umn/en-us_image_0162391187.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0167573711.png b/docs/vpc/umn/en-us_image_0167573711.png deleted file mode 100644 index 113f966c..00000000 Binary files a/docs/vpc/umn/en-us_image_0167573711.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0171311823.png b/docs/vpc/umn/en-us_image_0171311823.png new file mode 100644 index 00000000..aa2b2875 Binary files /dev/null and b/docs/vpc/umn/en-us_image_0171311823.png differ diff --git a/docs/vpc/umn/en-us_image_0173155793.png b/docs/vpc/umn/en-us_image_0173155793.png deleted file mode 100644 index 20a33eca..00000000 Binary files a/docs/vpc/umn/en-us_image_0173155793.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0173155804.png b/docs/vpc/umn/en-us_image_0173155804.png deleted file mode 100644 index 64883ba9..00000000 Binary files a/docs/vpc/umn/en-us_image_0173155804.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0173155870.png b/docs/vpc/umn/en-us_image_0173155870.png deleted file mode 100644 index 52100817..00000000 Binary files a/docs/vpc/umn/en-us_image_0173155870.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0191577030.png b/docs/vpc/umn/en-us_image_0191577030.png index 0b7d9f0f..be53b29e 100644 Binary files a/docs/vpc/umn/en-us_image_0191577030.png and b/docs/vpc/umn/en-us_image_0191577030.png differ diff --git a/docs/vpc/umn/en-us_image_0191594527.png b/docs/vpc/umn/en-us_image_0191594527.png index 5ed929ec..b1af5d2d 100644 Binary files a/docs/vpc/umn/en-us_image_0191594527.png and b/docs/vpc/umn/en-us_image_0191594527.png differ diff --git a/docs/vpc/umn/en-us_image_0194358487.png b/docs/vpc/umn/en-us_image_0194358487.png deleted file mode 100644 index 381bf7e0..00000000 Binary files a/docs/vpc/umn/en-us_image_0194358487.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0194358495.png b/docs/vpc/umn/en-us_image_0194358495.png deleted file mode 100644 index 0fbd7a23..00000000 Binary files a/docs/vpc/umn/en-us_image_0194358495.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0194358504.png b/docs/vpc/umn/en-us_image_0194358504.png deleted file mode 100644 index db13c4f3..00000000 Binary files a/docs/vpc/umn/en-us_image_0194358504.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0209273220.png b/docs/vpc/umn/en-us_image_0209273220.png deleted file mode 100644 index 5442e659..00000000 Binary files a/docs/vpc/umn/en-us_image_0209273220.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0209577986.png b/docs/vpc/umn/en-us_image_0209577986.png new file mode 100644 index 00000000..1a3ab09b Binary files /dev/null and b/docs/vpc/umn/en-us_image_0209577986.png differ diff --git a/docs/vpc/umn/en-us_image_0211552164.png b/docs/vpc/umn/en-us_image_0211552164.png index 64d89e27..14fd3fc0 100644 Binary files a/docs/vpc/umn/en-us_image_0211552164.png and b/docs/vpc/umn/en-us_image_0211552164.png differ diff --git a/docs/vpc/umn/en-us_image_0211560998.png b/docs/vpc/umn/en-us_image_0211560998.png index 59323158..413c588c 100644 Binary files a/docs/vpc/umn/en-us_image_0211560998.png and b/docs/vpc/umn/en-us_image_0211560998.png differ diff --git a/docs/vpc/umn/en-us_image_0214585306.png b/docs/vpc/umn/en-us_image_0214585306.png new file mode 100644 index 00000000..e0684dea Binary files /dev/null and b/docs/vpc/umn/en-us_image_0214585306.png differ diff --git a/docs/vpc/umn/en-us_image_0214585307.png b/docs/vpc/umn/en-us_image_0214585307.png new file mode 100644 index 00000000..f5a39cdd Binary files /dev/null and b/docs/vpc/umn/en-us_image_0214585307.png differ diff --git a/docs/vpc/umn/en-us_image_0118498992.png b/docs/vpc/umn/en-us_image_0214585308.png similarity index 100% rename from docs/vpc/umn/en-us_image_0118498992.png rename to docs/vpc/umn/en-us_image_0214585308.png diff --git a/docs/vpc/umn/en-us_image_0118499109.png b/docs/vpc/umn/en-us_image_0214585309.png similarity index 100% rename from docs/vpc/umn/en-us_image_0118499109.png rename to docs/vpc/umn/en-us_image_0214585309.png diff --git a/docs/vpc/umn/en-us_image_0163203842.png b/docs/vpc/umn/en-us_image_0214585341.png similarity index 100% rename from docs/vpc/umn/en-us_image_0163203842.png rename to docs/vpc/umn/en-us_image_0214585341.png diff --git a/docs/vpc/umn/en-us_image_0226222517.png b/docs/vpc/umn/en-us_image_0226222517.png deleted file mode 100644 index 3322328b..00000000 Binary files a/docs/vpc/umn/en-us_image_0226222517.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0226788663.png b/docs/vpc/umn/en-us_image_0226788663.png deleted file mode 100644 index a26a279b..00000000 Binary files a/docs/vpc/umn/en-us_image_0226788663.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0226820247.png b/docs/vpc/umn/en-us_image_0226820247.png deleted file mode 100644 index 1909444d..00000000 Binary files a/docs/vpc/umn/en-us_image_0226820247.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0226820250.png b/docs/vpc/umn/en-us_image_0226820250.png deleted file mode 100644 index 1909444d..00000000 Binary files a/docs/vpc/umn/en-us_image_0226820250.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0226820252.png b/docs/vpc/umn/en-us_image_0226820252.png deleted file mode 100644 index 1909444d..00000000 Binary files a/docs/vpc/umn/en-us_image_0226820252.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0226820452.png b/docs/vpc/umn/en-us_image_0226820452.png deleted file mode 100644 index 7a75567f..00000000 Binary files a/docs/vpc/umn/en-us_image_0226820452.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0226820455.png b/docs/vpc/umn/en-us_image_0226820455.png deleted file mode 100644 index 504d7614..00000000 Binary files a/docs/vpc/umn/en-us_image_0226820455.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0226820459.png b/docs/vpc/umn/en-us_image_0226820459.png deleted file mode 100644 index 504d7614..00000000 Binary files a/docs/vpc/umn/en-us_image_0226820459.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0226820796.png b/docs/vpc/umn/en-us_image_0226820796.png deleted file mode 100644 index 1909444d..00000000 Binary files a/docs/vpc/umn/en-us_image_0226820796.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0226829583.png b/docs/vpc/umn/en-us_image_0226829583.png deleted file mode 100644 index 1909444d..00000000 Binary files a/docs/vpc/umn/en-us_image_0226829583.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0226829586.png b/docs/vpc/umn/en-us_image_0226829586.png deleted file mode 100644 index 34aac26a..00000000 Binary files a/docs/vpc/umn/en-us_image_0226829586.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0226829587.png b/docs/vpc/umn/en-us_image_0226829587.png deleted file mode 100644 index 1909444d..00000000 Binary files a/docs/vpc/umn/en-us_image_0226829587.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0226829589.png b/docs/vpc/umn/en-us_image_0226829589.png deleted file mode 100644 index 1909444d..00000000 Binary files a/docs/vpc/umn/en-us_image_0226829589.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0226829591.png b/docs/vpc/umn/en-us_image_0226829591.png deleted file mode 100644 index 1909444d..00000000 Binary files a/docs/vpc/umn/en-us_image_0226829591.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0226829595.png b/docs/vpc/umn/en-us_image_0226829595.png deleted file mode 100644 index 6120e8e9..00000000 Binary files a/docs/vpc/umn/en-us_image_0226829595.png and /dev/null differ diff --git a/docs/vpc/umn/en-us_image_0233469196.png b/docs/vpc/umn/en-us_image_0233469196.png new file mode 100644 index 00000000..a844ced3 Binary files /dev/null and b/docs/vpc/umn/en-us_image_0233469196.png differ diff --git a/docs/vpc/umn/en-us_image_0274115599.png b/docs/vpc/umn/en-us_image_0274115599.png new file mode 100644 index 00000000..2d2d02ff Binary files /dev/null and b/docs/vpc/umn/en-us_image_0274115599.png differ diff --git a/docs/vpc/umn/en-us_image_0284920908.png b/docs/vpc/umn/en-us_image_0284920908.png index 6ada97c4..d46c18d8 100644 Binary files a/docs/vpc/umn/en-us_image_0284920908.png and b/docs/vpc/umn/en-us_image_0284920908.png differ diff --git a/docs/vpc/umn/en-us_image_0284993717.png b/docs/vpc/umn/en-us_image_0284993717.png index f4b88a28..58647558 100644 Binary files a/docs/vpc/umn/en-us_image_0284993717.png and b/docs/vpc/umn/en-us_image_0284993717.png differ diff --git a/docs/vpc/umn/en-us_image_0285048674.png b/docs/vpc/umn/en-us_image_0285048674.png index 2d9597b8..63e5249b 100644 Binary files a/docs/vpc/umn/en-us_image_0285048674.png and b/docs/vpc/umn/en-us_image_0285048674.png differ diff --git a/docs/vpc/umn/en-us_topic_0013748715.html b/docs/vpc/umn/en-us_topic_0013748715.html index 8ef33b03..fd7c6042 100644 --- a/docs/vpc/umn/en-us_topic_0013748715.html +++ b/docs/vpc/umn/en-us_topic_0013748715.html @@ -1,41 +1,59 @@

            Creating a Security Group

            -

            Scenarios

            To improve ECS access security, you can create security groups, define security group rules, and add ECSs in a VPC to different security groups. We recommend that you allocate ECSs that have different Internet access policies to different security groups.

            +

            Scenarios

            You can create security groups and add ECSs in a VPC to different security groups to improve ECS access security. We recommend that you allocate ECSs that have different Internet access requirements to different security groups.

            +

            Each ECS must be associated with at least one security group. If you have no security group when creating an ECS, the system provides a default security group.

            +

            You have an option to create a new security group for the ECS. This section describes how to create a security group on the management console.

            -

            Procedure

            1. Log in to the management console.
            1. Click in the upper left corner and select the desired region and project.
            2. On the console homepage, under Network, click Virtual Private Cloud.
            3. In the navigation pane on the left, choose Access Control > Security Groups.
            4. On the Security Groups page, click Create Security Group.
            5. In the Create Security Group area, set the parameters as prompted. Table 1 lists the parameters to be configured.
              Figure 1 Create Security Group
              -

              +

              Procedure

              1. Log in to the management console.
              2. Click in the upper left corner and select the desired region and project.
              3. Click in the upper left corner and choose Network > Virtual Private Cloud.
              4. In the navigation pane on the left, choose Access Control > Security Groups.
              5. On the Security Groups page, click Create Security Group.
              6. In the Create Security Group area, set the parameters as prompted. Table 1 lists the parameters to be configured.
                Figure 1 Create Security Group
                -
                Table 1 Parameter description

                Parameter

                +
                - - - - - - - - + + + + + + + +
                Table 1 Parameter description

                Parameter

                Description

                +

                Description

                Example Value

                +

                Example Value

                Name

                +

                Name

                The security group name. This parameter is mandatory.

                -

                The security group name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces.

                -
                NOTE:

                You can change the security group name after a security group is created. It is recommended that you give each security group a different name.

                +

                The security group name. This parameter is mandatory.

                +

                The security group name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces.

                +
                NOTE:

                You can change the security group name after a security group is created. It is recommended that you give each security group a different name.

                sg-318b

                +

                sg-318b

                Description

                +

                Enterprise Project

                Supplementary information about the security group. This parameter is optional.

                -

                The security group description can contain a maximum of 255 characters and cannot contain angle brackets (< or >).

                +

                When creating a security group, you can add the security group to an enabled enterprise project.

                +

                An enterprise project facilitates project-level management and grouping of cloud resources and users. The name of the default project is default.

                +

                For details about creating and managing enterprise projects, see the Enterprise Management User Guide.

                N/A

                +

                default

                +

                Template

                +

                A template comes with default security group rules, helping you quickly create security groups. The following templates are provided:

                +
                • Custom: This template allows you to create security groups with custom security group rules.
                • General-purpose web server: The security group that you create using this template is for general-purpose web servers and includes default rules that allow all inbound ICMP traffic and allow inbound traffic on ports 22, 80, 443, and 3389.
                • All ports open: The security group that you create using this template includes default rules that allow inbound traffic on any port. Note that allowing inbound traffic on any port poses security risks.
                +

                General-purpose web server

                +

                Description

                +

                Supplementary information about the security group. This parameter is optional.

                +

                The security group description can contain a maximum of 255 characters and cannot contain angle brackets (< or >).

                +

                N/A

                -
              7. Click OK.
              8. +
              9. Click OK.
              10. diff --git a/docs/vpc/umn/en-us_topic_0013748726.html b/docs/vpc/umn/en-us_topic_0013748726.html index b52950bf..99392182 100644 --- a/docs/vpc/umn/en-us_topic_0013748726.html +++ b/docs/vpc/umn/en-us_topic_0013748726.html @@ -1,130 +1,123 @@

                Creating a Subnet for the VPC

                -

                Scenarios

                A VPC comes with a default subnet. If the default subnet cannot meet your requirements, you can create one.

                -

                The subnet is configured with DHCP by default. When an ECS in this subnet starts, the ECS automatically obtains an IP address using DHCP.

                +

                Scenarios

                A VPC comes with a default subnet. If the default subnet cannot meet your requirements, you can create one.

                +

                A subnet is configured with DHCP by default. When an ECS in this subnet starts, the ECS automatically obtains an IP address using DHCP.

                -

                Procedure

                1. Log in to the management console.
                1. Click in the upper left corner and select the desired region and project.
                2. On the console homepage, under Network, click Virtual Private Cloud.
                3. In the navigation pane on the left, click Subnets.
                4. Click Create Subnet.

                  The Create Subnet page is displayed.

                  -
                5. Set the parameters as prompted.
                  Figure 1 Create Subnet
                  -

                  +

                  Procedure

                  1. Log in to the management console.
                  1. Click in the upper left corner and select the desired region and project.
                  2. Click in the upper left corner and choose Network > Virtual Private Cloud.
                  3. In the navigation pane on the left, choose Virtual Private Cloud > Subnets.
                  4. Click Create Subnet.

                    The Create Subnet page is displayed.

                    +
                  5. Set the parameters as prompted.
                    Figure 1 Create Subnet
                    +

                    -
                    Table 1 Parameter descriptions

                    Parameter

                    +
                    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                    Table 1 Parameter descriptions

                    Parameter

                    Description

                    +

                    Description

                    Example Value

                    +

                    Example Value

                    VPC

                    +

                    VPC

                    The VPC for which you want to create a subnet.

                    +

                    The VPC for which you want to create a subnet.

                    -

                    +

                    -

                    Name

                    +

                    Name

                    The subnet name.

                    -

                    The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces.

                    +

                    The subnet name.

                    +

                    The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces.

                    Subnet

                    +

                    Subnet

                    CIDR Block

                    +

                    CIDR Block

                    The CIDR block for the subnet. This value must be within the VPC CIDR block.

                    +

                    The CIDR block for the subnet. This value must be within the VPC CIDR block.

                    192.168.0.0/24

                    +

                    192.168.0.0/24

                    Associated Route Table

                    +

                    Associated Route Table

                    The default route table to which the subnet will be associated. You can change the route table to a custom route table on the Subnets page.

                    +

                    The default route table to which the subnet will be associated. You can change the route table to a custom route table on the Subnets page.

                    Default

                    +

                    Default

                    Advanced Settings

                    +

                    Gateway

                    +

                    Two options are available, Default and Custom. You can set Advanced Settings to Custom to configure advanced subnet parameters.

                    +

                    The gateway address of the subnet.

                    -

                    +

                    192.168.0.1

                    Gateway

                    -

                    +

                    DNS Server Address

                    The gateway address of the subnet.

                    +

                    By default, two DNS server addresses are configured. You can change them if necessary. A maximum of five DNS server addresses can be configured. Multiple IP addresses must be separated using commas (,).

                    192.168.0.1

                    +

                    100.125.x.x

                    DNS Server Address

                    +

                    NTP Server Address

                    By default, two DNS server addresses are configured. You can change them if necessary. A maximum of five DNS server addresses can be configured. Multiple IP addresses must be separated using commas (,).

                    +

                    The IP address of the NTP server. This parameter is optional.

                    +

                    You can configure the NTP server IP addresses to be added to the subnet as required. The IP addresses are added in addition to the default NTP server addresses. If this parameter is left empty, no IP address of the NTP server is added.

                    +

                    A maximum of four IP addresses can be configured. Multiple IP addresses must be separated using commas (,).

                    100.125.x.x

                    +

                    192.168.2.1

                    NTP Server Address

                    +

                    Tag

                    The IP address of the NTP server. This parameter is optional.

                    -

                    You can configure the NTP server IP addresses to be added to the subnet as required. The IP addresses are added in addition to the default NTP server addresses. If this parameter is left empty, no IP address of the NTP server is added.

                    -

                    A maximum of four IP addresses can be configured. Multiple IP addresses must be separated using commas (,).

                    +

                    The subnet tag, which consists of a key and value pair. You can add a maximum of 20 tags to each subnet.

                    +

                    The tag key and value must meet the requirements listed in Table 2.

                    192.168.2.1

                    -

                    Tag

                    -

                    The subnet tag, which consists of a key and value pair. You can add a maximum of 20 tags to each subnet.

                    -

                    The tag key and value must meet the requirements listed in Table 2.

                    -
                    • Key: subnet_key1
                    • Value: subnet-01
                    +
                    • Key: subnet_key1
                    • Value: subnet-01
                    -
                    Table 2 Subnet tag key and value requirements

                    Parameter

                    +
                    - - - - - - - -
                    Table 2 Subnet tag key and value requirements

                    Parameter

                    Requirements

                    +

                    Requirements

                    Example Value

                    +

                    Example Value

                    Key

                    +

                    Key

                    • Cannot be left blank.
                    • Must be unique for each subnet.
                    • Can contain a maximum of 36 characters.
                    • Can contain only the following character types:
                      • Uppercase letters
                      • Lowercase letters
                      • Digits
                      • Special characters, including hyphens (-) and underscores (_)
                      +
                    • Cannot be left blank.
                    • Must be unique for each subnet.
                    • Can contain a maximum of 36 characters.
                    • Can contain only the following character types:
                      • Uppercase letters
                      • Lowercase letters
                      • Digits
                      • Special characters, including hyphens (-) and underscores (_)

                    subnet_key1

                    +

                    subnet_key1

                    Value

                    +

                    Value

                    • Can contain a maximum of 43 characters.
                    • Can contain only the following character types:
                      • Uppercase letters
                      • Lowercase letters
                      • Digits
                      • Special characters, including hyphens (-) and underscores (_)
                      +
                    • Can contain a maximum of 43 characters.
                    • Can contain only the following character types:
                      • Uppercase letters
                      • Lowercase letters
                      • Digits
                      • Special characters, including hyphens (-) and underscores (_)

                    subnet-01

                    +

                    subnet-01

                    -
                  6. Click OK.
                  7. +
                  8. Click OK.
                  9. -

                    Precautions

                    When a subnet is created, there are five reserved IP addresses, which cannot be used. For example, in a subnet with CIDR block 192.168.0.0/24, the following IP addresses are reserved:

                    -
                    • 192.168.0.0: Network ID. This address is the beginning of the private IP address range and will not be assigned to any instance.
                    • 192.168.0.1: Gateway address.
                    • 192.168.0.253: Reserved for the system interface. This IP address is used by the VPC for external communication.
                    • 192.168.0.254: DHCP service address.
                    • 192.168.0.255: Network broadcast address.
                    -

                    If you configured the default settings under Advanced Settings during subnet creation, the reserved IP addresses may be different from the default ones, but there will still be five of them. The specific addresses depend on your subnet settings.

                    +

                    Precautions

                    When a subnet is created, there are five reserved IP addresses, which cannot be used. For example, in a subnet with CIDR block 192.168.0.0/24, the following IP addresses are reserved:

                    +
                    • 192.168.0.0: Network ID. This address is the beginning of the private IP address range and will not be assigned to any instance.
                    • 192.168.0.1: Gateway address.
                    • 192.168.0.253: Reserved for the system interface. This IP address is used by the VPC for external communication.
                    • 192.168.0.254: DHCP service address.
                    • 192.168.0.255: Network broadcast address.
                    +

                    If you configured the default settings under Advanced Settings during subnet creation, the reserved IP addresses may be different from the default ones, but there will still be five of them. The specific addresses depend on your subnet settings.

                    diff --git a/docs/vpc/umn/en-us_topic_0013748729.html b/docs/vpc/umn/en-us_topic_0013748729.html index 83437321..dbcaf4cd 100644 --- a/docs/vpc/umn/en-us_topic_0013748729.html +++ b/docs/vpc/umn/en-us_topic_0013748729.html @@ -1,21 +1,12 @@

                    What Is Virtual Private Cloud?

                    -

                    Overview

                    The Virtual Private Cloud (VPC) service enables you to provision logically isolated, configurable, and manageable virtual networks for Elastic Cloud Servers (ECSs), improving cloud resource security and simplifying network deployment.

                    -

                    Within your own VPC, you can create security groups and VPNs, configure IP address ranges, specify bandwidth sizes, manage the networks in the VPC, and make changes to these networks as needed, quickly and securely. You can also define rules for communication between ECSs in the same security group or in different security groups.

                    +

                    Overview

                    The Virtual Private Cloud (VPC) service enables you to provision logically isolated virtual networks for Elastic Cloud Servers (ECSs), improving cloud resource security and simplifying network deployment. You can configure and manage the virtual networks as required.

                    +

                    Within your own VPC, you can create security groups and VPNs, configure IP address ranges, specify bandwidth sizes, manage the networks in the VPC, and make changes to these networks as needed, quickly and securely. You can also define rules to control communications between ECSs in the same security group or in different security groups.

                    -

                    -
                    Figure 1 VPC components
                    -

                    Advantages

                    • Flexible configuration

                      You can create VPCs, add subnets, specify IP address ranges, and configure route tables. You can configure the same VPC for ECSs that are in different availability zones (AZs).

                      -
                    • Secure and reliable

                      Each VPC is completely logically isolated from other VPCs using the tunneling technology. By default, different VPCs cannot communicate with each other. You can use firewalls to protect subnets and use security groups to protect instances, such as cloud servers, containers, and databases. The firewalls and security groups add additional layers of security to your VPCs, making your network secure.

                      -
                    • Interconnectivity

                      By default, instances in a VPC cannot access the Internet. You can leverage Elastic IP (EIP), Elastic Load Balancing (ELB), NAT Gateways, Virtual Private Network (VPN), and Direct Connect to enable access to or from the Internet.

                      -

                      By default, instances in two VPCs cannot communicate with each other. You can create a VPC peering connection to enable the instances in the two VPCs in the same region to communicate with each other using private IP addresses.

                      -

                      Multiple connectivity options are provided to meet diverse service requirements for the cloud, enabling you to deploy enterprise applications with ease and lower enterprise IT operation and maintenance (O&M) costs.

                      -
                    • High-speed access

                      Dynamic Border Gateway Protocol (BGP) is used to provide access to various carrier networks. For example, up to 21 dynamic BGP connections are established to multiple carriers. The dynamic BGP connections enable real-time failover based on preset routing protocols, ensuring high network stability, low network latency, and smooth access to services on the cloud.

                      -
                    -
                    -

                    Accessing the VPC Service

                    You can access the VPC service through the management console or using HTTPS-based APIs.
                    • Management console

                      You can use the console to directly perform operations on VPC resources. To access the VPC service, log in to the management console and select Virtual Private Cloud from the console homepage.

                      -
                    • API

                      If you need to integrate the VPC service provided by the cloud system into a third-party system for secondary development, you can use APIs to access the VPC service. For details, see the Virtual Private Cloud API Reference.

                      +
                      Figure 1 VPC components
                      +

                      Accessing the VPC Service

                      You can access the VPC service through the management console or using HTTPS-based APIs.
                      • Management console

                        You can use the console to directly perform operations on VPC resources. To access the VPC service, log in to the management console and select Virtual Private Cloud from the console homepage.

                        +
                      • API

                        If you need to integrate a VPC into a third-party system for secondary development, you can use APIs to access the VPC service. For details, see the Virtual Private Cloud API Reference.

                      diff --git a/docs/vpc/umn/en-us_topic_0013748738.html b/docs/vpc/umn/en-us_topic_0013748738.html index dfc46288..4dc774d8 100644 --- a/docs/vpc/umn/en-us_topic_0013748738.html +++ b/docs/vpc/umn/en-us_topic_0013748738.html @@ -1,110 +1,135 @@

                      Assigning an EIP and Binding It to an ECS

                      -

                      Scenarios

                      You can assign an EIP and bind it to an ECS so that the ECS can access the Internet.

                      -
                      EIPs for dedicated load balancers:
                      • In the eu-de region, if you choose to assign an EIP when you create a dedicated load balancer on the management console or using APIs, EIPs for dedicated load balancers (5_gray) will be assigned.
                      • Do not bind EIPs of this type to non-dedicated load balancers.
                      • Do not add EIPs of the dedicated load balancer type and other types to the same shared bandwidth. Otherwise, the bandwidth limit policy will not take effect.
                      +

                      Scenarios

                      You can assign an EIP and bind it to an ECS so that the ECS can access the Internet.

                      +
                      Note the following when you use EIPs of the Dedicated Load Balancer (5_gray) type:
                      • In eu-de, EIPs of the Dedicated Load Balancer (5_gray) type cannot be assigned anymore. You can assign EIPs of the BGP (5_bgp) type.
                      • Existing EIPs of the Dedicated Load Balancer (5_gray) type can be bound to dedicated or shared load balancers.
                        • The EIP console cannot be used to bind EIPs to or unbind them from dedicated load balancers.
                        • You can use APIs to bind EIPs to or unbind them from dedicated load balancers. For details, see Binding an EIP and Unbinding an EIP.
                        • EIPs of this type can be bound to or unbound from shared load balancers using the EIP console or APIs.
                        • You are advised to bind BGP EIPs to or unbind them from dedicated load balancers.
                        +
                      • Do not add EIPs of the dedicated load balancer type (5_gray) and other types to the same shared bandwidth. Otherwise, the bandwidth limit policy will not take effect.
                      -

                      Assigning an EIP

                      1. Log in to the management console.
                      2. Click in the upper left corner and select the desired region and project.
                      3. On the console homepage, under Network, click Elastic IP.
                      4. On the displayed page, click Assign EIP.
                      5. Set the parameters as prompted.
                        Figure 1 Assign EIP
                        +

                        Assigning an EIP

                        1. Log in to the management console.
                        2. Click in the upper left corner and select the desired region and project.
                        3. Click in the upper left corner and choose Network > Elastic IP.
                        4. On the displayed page, click Assign EIP.
                        5. Set the parameters as prompted.
                          Figure 1 Assign EIP
                          -
                          Table 1 Parameter descriptions

                          Parameter

                          +
                          - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + +
                          Table 1 Parameter descriptions

                          Parameter

                          Description

                          +

                          Description

                          Example Value

                          +

                          Example Value

                          Region

                          +

                          Region

                          Regions are geographic areas that are physically isolated from each other. The networks inside different regions are not connected to each other, so resources cannot be shared across different regions. For lower network latency and faster access to your resources, select the region nearest you.

                          +

                          Regions are geographic areas that are physically isolated from each other. The networks inside different regions are not connected to each other, so resources cannot be shared across different regions. For lower network latency and faster access to your resources, select the region nearest you. The region selected for the EIP is its geographical location.

                          eu-de

                          +

                          eu-de

                          EIP Type

                          +

                          EIP Type

                          • Dynamic BGP: Dynamic BGP provides automatic failover and chooses the optimal path when a network connection fails.
                          • Mail BGP: EIPs with port 25, 465, or 587 enabled are used.
                          -

                          The selected EIP type cannot be changed after the EIP is assigned.

                          +
                          • Dynamic BGP: Dynamic BGP provides automatic failover and chooses the optimal path when a network connection fails.
                          • Mail BGP: EIPs with port 25, 465, or 587 enabled are used for email services.
                          +

                          The selected EIP type cannot be changed after the EIP is assigned.

                          Dynamic BGP

                          +

                          Dynamic BGP

                          Bandwidth

                          +

                          Billed By

                          The bandwidth size in Mbit/s.

                          +

                          Two options are available:

                          +
                          • Dedicated: The bandwidth can be used by only one EIP.
                          • Shared: The bandwidth can be shared by multiple EIPs.

                          100

                          +

                          Dedicated

                          Bandwidth Name

                          +

                          Bandwidth

                          The name of the bandwidth.

                          +

                          The bandwidth size in Mbit/s.

                          bandwidth

                          +

                          100

                          Tag

                          +

                          EIP Name

                          The EIP tags. Each tag contains a key and value pair.

                          -

                          The tag key and value must meet the requirements listed in Table 2.

                          +

                          The EIP name.

                          • Key: Ipv4_key1
                          • Value: 192.168.12.10
                          +

                          eip-test

                          Quantity

                          +

                          Enterprise Project

                          The number of EIPs you want to purchase.

                          +

                          The enterprise project that the EIP belongs to.

                          +

                          An enterprise project facilitates project-level management and grouping of cloud resources and users. The name of the default project is default.

                          +

                          For details about creating and managing enterprise projects, see the Enterprise Management User Guide.

                          1

                          +

                          default

                          +

                          Bandwidth Name

                          +

                          The name of the bandwidth.

                          +

                          bandwidth

                          +

                          Tag

                          +

                          The EIP tags. Each tag contains a key and value pair.

                          +

                          The tag key and value must meet the requirements listed in Table 2.

                          +
                          • Key: Ipv4_key1
                          • Value: 3005eip
                          +

                          Quantity

                          +

                          The number of EIPs you want to assign.

                          +

                          1

                          -
                          Table 2 EIP tag requirements

                          Parameter

                          +
                          - - - - - - - -
                          Table 2 EIP tag requirements

                          Parameter

                          Requirement

                          +

                          Requirement

                          Example Value

                          +

                          Example Value

                          Key

                          +

                          Key

                          • Cannot be left blank.
                          • Must be unique for each EIP.
                          • Can contain a maximum of 36 characters.
                          • Can contain only the following character types:
                            • Uppercase letters
                            • Lowercase letters
                            • Digits
                            • Special characters, including hyphens (-) and underscores (_)
                            +
                          • Cannot be left blank.
                          • Must be unique for each EIP.
                          • Can contain a maximum of 36 characters.
                          • Can contain only the following character types:
                            • Uppercase letters
                            • Lowercase letters
                            • Digits
                            • Special characters, including hyphens (-) and underscores (_)

                          Ipv4_key1

                          +

                          Ipv4_key1

                          Value

                          +

                          Value

                          • Can contain a maximum of 43 characters.
                          • Can contain only the following character types:
                            • Uppercase letters
                            • Lowercase letters
                            • Digits
                            • Special characters, including hyphens (-) and underscores (_)
                            +
                          • Can contain a maximum of 43 characters.
                          • Can contain only the following character types:
                            • Uppercase letters
                            • Lowercase letters
                            • Digits
                            • Special characters, including hyphens (-) and underscores (_)

                          192.168.12.10

                          +

                          3005eip

                          -
                        6. Click Create Now.
                        7. Click Submit.
                        8. +
                        9. Click Create Now.
                        10. Click Submit.
                        11. -

                          Binding an EIP

                          1. On the EIPs page, locate the row that contains the target EIP, and click Bind.
                          2. Select the instance to which you want to bind the EIP.
                            Figure 2 Bind EIP
                            -
                          3. Click OK.
                          -

                          An IPv6 client on the Internet can access the ECS that has an EIP bound in a VPC. For details about the implementation and constraints, see How Does an IPv6 Client on the Internet Access the ECS That Has an EIP Bound in a VPC?

                          +

                          Binding an EIP

                          1. On the EIPs page, locate the row that contains the target EIP, and click Bind.
                          2. Select the instance that you want to bind the EIP to.
                            Figure 2 Bind EIP
                            +
                          3. Click OK.
                          +

                          An IPv6 client on the Internet can access the ECS that has an EIP bound in a VPC. For details, see How Does an IPv6 Client on the Internet Access the ECS That Has an EIP Bound in a VPC?

                          -

                          Follow-Up Procedure

                          After an ECS with an EIP bound is created, the system generates a domain name in the format of ecs-xx-xx-xx-xx.compute.xxx.com for the EIP by default. xx-xx-xx-xx indicates the EIP, and xxx indicates the domain name of the cloud service provider. You can use the domain name to access the ECS.

                          -
                          You can use any of the following commands to obtain the domain name of an EIP:
                          • ping -a EIP
                          • nslookup [-qt=ptr] EIP
                          • dig -x EIP
                          +

                          Follow-Up Procedure

                          After an ECS with an EIP bound is created, the system generates a domain name in the format of ecs-xx-xx-xx-xx.compute.xxx.com for the EIP by default. xx-xx-xx-xx indicates the EIP, and xxx indicates the domain name of the cloud service provider. You can use the domain name to access the ECS.

                          +
                          You can use any of the following commands to obtain the domain name of an EIP:
                          • ping -a EIP
                          • nslookup [-qt=ptr] EIP
                          • dig -x EIP
                          diff --git a/docs/vpc/umn/en-us_topic_0013748743.html b/docs/vpc/umn/en-us_topic_0013748743.html index 5b7eb89c..c31e7e26 100644 --- a/docs/vpc/umn/en-us_topic_0013748743.html +++ b/docs/vpc/umn/en-us_topic_0013748743.html @@ -1,17 +1,17 @@

                          Modifying an EIP Bandwidth

                          -

                          Scenarios

                          Modify the EIP bandwidth name or size.

                          -

                          This section describes how to modify the dedicated bandwidth or shared bandwidth of an EIP. For details about how to modify a shared bandwidth, see Modifying a Shared Bandwidth.

                          +

                          Scenarios

                          Modify the EIP bandwidth name or size.

                          +

                          This section describes how to modify the dedicated bandwidth or shared bandwidth of an EIP. For details about how to modify a shared bandwidth, see Modifying a Shared Bandwidth.

                          -

                          Procedure

                          1. Log in to the management console.
                          2. Click in the upper left corner and select the desired region and project.
                          3. On the console homepage, under Network, click Elastic IP.
                          4. Locate the row that contains the target EIP in the EIP list, click More in the Operation column, and select Modify Bandwidth.
                          5. Modify the bandwidth parameters as prompted.

                            -
                          6. Click Next.
                          7. Click Submit.
                          +

                          Procedure

                          1. Log in to the management console.
                          2. Click in the upper left corner and select the desired region and project.
                          3. Click in the upper left corner and choose Network > Elastic IP.
                          4. Locate the row that contains the target EIP in the EIP list, click More in the Operation column, and select Modify Bandwidth.
                          5. Modify the bandwidth parameters as prompted.

                            +
                          6. Click Next.
                          7. Click Submit.
                          diff --git a/docs/vpc/umn/en-us_topic_0013935842.html b/docs/vpc/umn/en-us_topic_0013935842.html index 2395296f..bccec02f 100644 --- a/docs/vpc/umn/en-us_topic_0013935842.html +++ b/docs/vpc/umn/en-us_topic_0013935842.html @@ -1,195 +1,226 @@

                          Creating a VPC

                          -

                          Scenarios

                          A VPC provides an isolated virtual network for ECSs. You can configure and manage the network as required.

                          -

                          You can create a VPC by following the procedure provided in this section. Then, create subnets, security groups, and assign EIPs by following the procedure provided in subsequent sections based on your actual network requirements.

                          +

                          Scenarios

                          A VPC provides an isolated virtual network for ECSs. You can configure and manage the network as required.

                          +

                          You can create a VPC by following the procedure provided in this section. Then, create subnets, security groups, and assign EIPs by following the procedure provided in subsequent sections based on your actual network requirements.

                          -

                          Procedure

                          1. Log in to the management console.
                          2. Click in the upper left corner and select the desired region and project.
                          3. On the console homepage, under Network, click Virtual Private Cloud.
                          4. Click Create VPC.
                          5. On the Create VPC page, set parameters as prompted.

                            A default subnet will be created together with a VPC and you can also click Add Subnet to create more subnets for the VPC.

                            +

                            Procedure

                            1. Log in to the management console.
                            2. Click in the upper left corner and select the desired region and project.
                            3. Click in the upper left corner and choose Network > Virtual Private Cloud.
                            4. Click Create VPC.
                            5. On the Create VPC page, set parameters as prompted.

                              A default subnet will be created together with a VPC and you can also click Add Subnet to create more subnets for the VPC.

                              -
                              Table 1 VPC parameter descriptions

                              Category

                              +
                              - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + +
                              Table 1 VPC parameter descriptions

                              Category

                              Parameter

                              +

                              Parameter

                              Description

                              +

                              Description

                              Example Value

                              +

                              Example Value

                              Basic Information

                              +

                              Basic Information

                              Region

                              +

                              Region

                              Regions are geographic areas that are physically isolated from each other. The networks inside different regions are not connected to each other, so resources cannot be shared across different regions. For lower network latency and faster access to your resources, select the region nearest you.

                              +

                              Regions are geographic areas that are physically isolated from each other. The networks inside different regions are not connected to each other, so resources cannot be shared across different regions. For lower network latency and faster access to your resources, select the region nearest you.

                              eu-de

                              +

                              eu-de

                              Basic Information

                              +

                              Basic Information

                              Name

                              +

                              Name

                              The VPC name.

                              -

                              The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces.

                              +

                              The VPC name.

                              +

                              The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces.

                              VPC-001

                              +

                              VPC-001

                              Basic Information

                              +

                              Basic Information

                              CIDR Block

                              +

                              CIDR Block

                              The CIDR block of the VPC. The CIDR block of a subnet can be the same as the CIDR block for the VPC (for a single subnet in the VPC) or a subset of the CIDR block for the VPC (for multiple subnets in the VPC).

                              -

                              The following CIDR blocks are supported:

                              -

                              10.0.0.0/8-24

                              -

                              172.16.0.0/12-24

                              -

                              192.168.0.0/16-24

                              +

                              The CIDR block of the VPC. The CIDR block of a subnet can be the same as the CIDR block for the VPC (for a single subnet in the VPC) or a subset of the CIDR block for the VPC (for multiple subnets in the VPC).

                              +

                              The following CIDR blocks are supported:

                              +

                              10.0.0.0/8-24

                              +

                              172.16.0.0/12-24

                              +

                              192.168.0.0/16-24

                              192.168.0.0/16

                              +

                              192.168.0.0/16

                              Default Subnet

                              +

                              Basic Information

                              Name

                              +

                              Enterprise Project

                              The subnet name.

                              -

                              The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces.

                              +

                              The enterprise project to which the VPC belongs.

                              +

                              An enterprise project facilitates project-level management and grouping of cloud resources and users. The name of the default project is default.

                              +

                              For details about creating and managing enterprise projects, see the Enterprise Management User Guide.

                              Subnet

                              +

                              default

                              Default Subnet

                              +

                              Basic Information/Advanced Settings

                              CIDR Block

                              +

                              Tag

                              The CIDR block for the subnet. This value must be within the VPC CIDR block.

                              +

                              The VPC tag, which consists of a key and value pair. You can add a maximum of 20 tags to each VPC.

                              +

                              The tag key and value must meet the requirements listed in Table 2.

                              192.168.0.0/24

                              +
                              • Key: vpc_key1
                              • Value: vpc-01

                              Default Subnet

                              +

                              Basic Information/Advanced Settings

                              Associated Route Table

                              +

                              Description

                              The default route table to which the subnet will be associated. You can change the route table to a custom route table on the Subnets page.

                              +

                              Supplementary information about the VPC. This parameter is optional.

                              +

                              The VPC description can contain a maximum of 255 characters and cannot contain angle brackets (< or >).

                              Default

                              +

                              N/A

                              Default Subnet/Advanced Settings

                              +

                              Default Subnet

                              Gateway

                              +

                              Name

                              The gateway address of the subnet.

                              +

                              The subnet name.

                              +

                              The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces.

                              192.168.0.1

                              +

                              Subnet

                              Default Subnet/Advanced Settings

                              +

                              Default Subnet

                              DNS Server Address

                              +

                              CIDR Block

                              By default, two DNS server addresses are configured. You can change them as required. A maximum of five DNS server addresses can be configured. Multiple IP addresses must be separated using commas (,).

                              +

                              The CIDR block for the subnet. This value must be within the VPC CIDR block.

                              100.125.x.x

                              +

                              192.168.0.0/24

                              Default Subnet/Advanced Settings

                              +

                              Default Subnet

                              NTP Server Address

                              +

                              Associated Route Table

                              The IP address of the NTP server. This parameter is optional.

                              -

                              You can configure the NTP server IP addresses to be added to the subnet as required. The IP addresses are added in addition to the default NTP server addresses. If this parameter is left empty, no IP address of the NTP server is added.

                              -

                              A maximum of four IP addresses can be configured. Multiple IP addresses must be separated using commas (,).

                              +

                              The default route table to which the subnet will be associated. You can change the route table to a custom route table on the Subnets page.

                              192.168.2.1

                              +

                              Default

                              Default Subnet/Advanced Settings

                              +

                              Default Subnet/Advanced Settings

                              Tag

                              +

                              Gateway

                              The subnet tag, which consists of a key and value pair. You can add a maximum of 20 tags to each subnet.

                              -

                              The tag key and value must meet the requirements listed in Table 3.

                              +

                              The gateway address of the subnet.

                              • Key: subnet_key1
                              • Value: subnet-01
                              +

                              192.168.0.1

                              Default Subnet/Advanced Settings

                              +

                              Default Subnet/Advanced Settings

                              Description

                              +

                              DNS Server Address

                              Supplementary information about the subnet. This parameter is optional.

                              -

                              The subnet description can contain a maximum of 255 characters and cannot contain angle brackets (< or >).

                              +

                              By default, two DNS server addresses are configured. You can change them as required. A maximum of five DNS server addresses can be configured. Multiple IP addresses must be separated using commas (,).

                              N/A

                              +

                              100.125.x.x

                              +

                              Default Subnet/Advanced Settings

                              +

                              NTP Server Address

                              +

                              The IP address of the NTP server. This parameter is optional.

                              +

                              You can configure the NTP server IP addresses to be added to the subnet as required. The IP addresses are added in addition to the default NTP server addresses. If this parameter is left empty, no IP address of the NTP server is added.

                              +

                              A maximum of four IP addresses can be configured. Multiple IP addresses must be separated using commas (,).

                              +

                              192.168.2.1

                              +

                              Default Subnet/Advanced Settings

                              +

                              Tag

                              +

                              The subnet tag, which consists of a key and value pair. You can add a maximum of 20 tags to each subnet.

                              +

                              The tag key and value must meet the requirements listed in Table 3.

                              +
                              • Key: subnet_key1
                              • Value: subnet-01
                              +

                              Default Subnet/Advanced Settings

                              +

                              Description

                              +

                              Supplementary information about the subnet. This parameter is optional.

                              +

                              The subnet description can contain a maximum of 255 characters and cannot contain angle brackets (< or >).

                              +

                              N/A

                              -
                              Table 2 VPC tag key and value requirements

                              Parameter

                              +
                              - - - - - - - -
                              Table 2 VPC tag key and value requirements

                              Parameter

                              Requirements

                              +

                              Requirements

                              Example Value

                              +

                              Example Value

                              Key

                              +

                              Key

                              • Cannot be left blank.
                              • Must be unique for the same VPC and can be the same for different VPCs.
                              • Can contain a maximum of 36 characters.
                              • Can contain only the following character types:
                                • Uppercase letters
                                • Lowercase letters
                                • Digits
                                • Special characters, including hyphens (-) and underscores (_)
                                +
                              • Cannot be left blank.
                              • Must be unique for the same VPC and can be the same for different VPCs.
                              • Can contain a maximum of 36 characters.
                              • Can contain only the following character types:
                                • Uppercase letters
                                • Lowercase letters
                                • Digits
                                • Special characters, including hyphens (-) and underscores (_)

                              vpc_key1

                              +

                              vpc_key1

                              Value

                              +

                              Value

                              • Can contain a maximum of 43 characters.
                              • Can contain only the following character types:
                                • Uppercase letters
                                • Lowercase letters
                                • Digits
                                • Special characters, including hyphens (-) and underscores (_)
                                +
                              • Can contain a maximum of 43 characters.
                              • Can contain only the following character types:
                                • Uppercase letters
                                • Lowercase letters
                                • Digits
                                • Special characters, including hyphens (-) and underscores (_)

                              vpc-01

                              +

                              vpc-01

                              -
                              Table 3 Subnet tag key and value requirements

                              Parameter

                              +
                              - - - - - - - -
                              Table 3 Subnet tag key and value requirements

                              Parameter

                              Requirements

                              +

                              Requirements

                              Example Value

                              +

                              Example Value

                              Key

                              +

                              Key

                              • Cannot be left blank.
                              • Must be unique for each subnet.
                              • Can contain a maximum of 36 characters.
                              • Can contain only the following character types:
                                • Uppercase letters
                                • Lowercase letters
                                • Digits
                                • Special characters, including hyphens (-) and underscores (_)
                                +
                              • Cannot be left blank.
                              • Must be unique for each subnet.
                              • Can contain a maximum of 36 characters.
                              • Can contain only the following character types:
                                • Uppercase letters
                                • Lowercase letters
                                • Digits
                                • Special characters, including hyphens (-) and underscores (_)

                              subnet_key1

                              +

                              subnet_key1

                              Value

                              +

                              Value

                              • Can contain a maximum of 43 characters.
                              • Can contain only the following character types:
                                • Uppercase letters
                                • Lowercase letters
                                • Digits
                                • Special characters, including hyphens (-) and underscores (_)
                                +
                              • Can contain a maximum of 43 characters.
                              • Can contain only the following character types:
                                • Uppercase letters
                                • Lowercase letters
                                • Digits
                                • Special characters, including hyphens (-) and underscores (_)

                              subnet-01

                              +

                              subnet-01

                              -
                            6. Click Create Now.
                            7. +
                            8. Click Create Now.
                            9. diff --git a/docs/vpc/umn/en-us_topic_0017816228.html b/docs/vpc/umn/en-us_topic_0017816228.html index a2538b09..5bdc5a64 100644 --- a/docs/vpc/umn/en-us_topic_0017816228.html +++ b/docs/vpc/umn/en-us_topic_0017816228.html @@ -1,7 +1,220 @@

                              Configuring a VPC for ECSs That Access the Internet Using EIPs

                              -
                              +
                              1. Log in to the management console.
                              2. Click in the upper left corner and select the desired region and project.
                              3. Click in the upper left corner and choose Network > Virtual Private Cloud.
                              4. Click Create VPC.
                              5. On the Create VPC page, set parameters as prompted.

                                A default subnet will be created together with a VPC and you can also click Add Subnet to create more subnets for the VPC.

                                + +
                                + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
                                Table 1 VPC parameter descriptions

                                Category

                                +

                                Parameter

                                +

                                Description

                                +

                                Example Value

                                +

                                Basic Information

                                +

                                Region

                                +

                                Regions are geographic areas that are physically isolated from each other. The networks inside different regions are not connected to each other, so resources cannot be shared across different regions. For lower network latency and faster access to your resources, select the region nearest you.

                                +

                                eu-de

                                +

                                Basic Information

                                +

                                Name

                                +

                                The VPC name.

                                +

                                The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces.

                                +

                                VPC-001

                                +

                                Basic Information

                                +

                                CIDR Block

                                +

                                The CIDR block of the VPC. The CIDR block of a subnet can be the same as the CIDR block for the VPC (for a single subnet in the VPC) or a subset of the CIDR block for the VPC (for multiple subnets in the VPC).

                                +

                                The following CIDR blocks are supported:

                                +

                                10.0.0.0/8-24

                                +

                                172.16.0.0/12-24

                                +

                                192.168.0.0/16-24

                                +

                                192.168.0.0/16

                                +

                                Basic Information

                                +

                                Enterprise Project

                                +

                                The enterprise project to which the VPC belongs.

                                +

                                An enterprise project facilitates project-level management and grouping of cloud resources and users. The name of the default project is default.

                                +

                                For details about creating and managing enterprise projects, see the Enterprise Management User Guide.

                                +

                                default

                                +

                                Basic Information/Advanced Settings

                                +

                                Tag

                                +

                                The VPC tag, which consists of a key and value pair. You can add a maximum of 20 tags to each VPC.

                                +

                                The tag key and value must meet the requirements listed in Table 2.

                                +
                                • Key: vpc_key1
                                • Value: vpc-01
                                +

                                Basic Information/Advanced Settings

                                +

                                Description

                                +

                                Supplementary information about the VPC. This parameter is optional.

                                +

                                The VPC description can contain a maximum of 255 characters and cannot contain angle brackets (< or >).

                                +

                                N/A

                                +

                                Default Subnet

                                +

                                Name

                                +

                                The subnet name.

                                +

                                The name can contain a maximum of 64 characters, which may consist of letters, digits, underscores (_), hyphens (-), and periods (.). The name cannot contain spaces.

                                +

                                Subnet

                                +

                                Default Subnet

                                +

                                CIDR Block

                                +

                                The CIDR block for the subnet. This value must be within the VPC CIDR block.

                                +

                                192.168.0.0/24

                                +

                                Default Subnet

                                +

                                Associated Route Table

                                +

                                The default route table to which the subnet will be associated. You can change the route table to a custom route table on the Subnets page.

                                +

                                Default

                                +

                                Default Subnet/Advanced Settings

                                +

                                Gateway

                                +

                                The gateway address of the subnet.

                                +

                                192.168.0.1

                                +

                                Default Subnet/Advanced Settings

                                +

                                DNS Server Address

                                +

                                By default, two DNS server addresses are configured. You can change them as required. A maximum of five DNS server addresses can be configured. Multiple IP addresses must be separated using commas (,).

                                +

                                100.125.x.x

                                +

                                Default Subnet/Advanced Settings

                                +

                                NTP Server Address

                                +

                                The IP address of the NTP server. This parameter is optional.

                                +

                                You can configure the NTP server IP addresses to be added to the subnet as required. The IP addresses are added in addition to the default NTP server addresses. If this parameter is left empty, no IP address of the NTP server is added.

                                +

                                A maximum of four IP addresses can be configured. Multiple IP addresses must be separated using commas (,).

                                +

                                192.168.2.1

                                +

                                Default Subnet/Advanced Settings

                                +

                                Tag

                                +

                                The subnet tag, which consists of a key and value pair. You can add a maximum of 20 tags to each subnet.

                                +

                                The tag key and value must meet the requirements listed in Table 3.

                                +
                                • Key: subnet_key1
                                • Value: subnet-01
                                +

                                Default Subnet/Advanced Settings

                                +

                                Description

                                +

                                Supplementary information about the subnet. This parameter is optional.

                                +

                                The subnet description can contain a maximum of 255 characters and cannot contain angle brackets (< or >).

                                +

                                N/A

                                +
                                +
                                + +
                                + + + + + + + + + + + + + +
                                Table 2 VPC tag key and value requirements

                                Parameter

                                +

                                Requirements

                                +

                                Example Value

                                +

                                Key

                                +
                                • Cannot be left blank.
                                • Must be unique for the same VPC and can be the same for different VPCs.
                                • Can contain a maximum of 36 characters.
                                • Can contain only the following character types:
                                  • Uppercase letters
                                  • Lowercase letters
                                  • Digits
                                  • Special characters, including hyphens (-) and underscores (_)
                                  +
                                +

                                vpc_key1

                                +

                                Value

                                +
                                • Can contain a maximum of 43 characters.
                                • Can contain only the following character types:
                                  • Uppercase letters
                                  • Lowercase letters
                                  • Digits
                                  • Special characters, including hyphens (-) and underscores (_)
                                  +
                                +

                                vpc-01

                                +
                                +
                                + +
                                + + + + + + + + + + + + + +
                                Table 3 Subnet tag key and value requirements

                                Parameter

                                +

                                Requirements

                                +

                                Example Value

                                +

                                Key

                                +
                                • Cannot be left blank.
                                • Must be unique for each subnet.
                                • Can contain a maximum of 36 characters.
                                • Can contain only the following character types:
                                  • Uppercase letters
                                  • Lowercase letters
                                  • Digits
                                  • Special characters, including hyphens (-) and underscores (_)
                                  +
                                +

                                subnet_key1

                                +

                                Value

                                +
                                • Can contain a maximum of 43 characters.
                                • Can contain only the following character types:
                                  • Uppercase letters
                                  • Lowercase letters
                                  • Digits
                                  • Special characters, including hyphens (-) and underscores (_)
                                  +
                                +

                                subnet-01

                                +
                                +
                                +
                              6. Click Create Now.
                              +
                              +