Virtual Private Cloud User Guide Contents
Total Page:16
File Type:pdf, Size:1020Kb
Virtual Private Cloud User Guide Issue 31 Date 2021-05-20 HUAWEI TECHNOLOGIES CO., LTD. Copyright © Huawei Technologies Co., Ltd. 2021. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademarks and Permissions and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied. Issue 31 (2021-05-20) Copyright © Huawei Technologies Co., Ltd. i Virtual Private Cloud User Guide Contents Contents 1 VPC and Subnet....................................................................................................................... 1 1.1 Network Planning................................................................................................................................................................... 1 1.2 VPC............................................................................................................................................................................................... 4 1.2.1 Creating a VPC...................................................................................................................................................................... 4 1.2.2 Modifying a VPC...................................................................................................................................................................9 1.2.3 Adding a Secondary CIDR Block to a VPC................................................................................................................ 10 1.2.4 Removing a Secondary CIDR Block from a VPC..................................................................................................... 12 1.2.5 Deleting a VPC................................................................................................................................................................... 12 1.2.6 Managing VPC Tags..........................................................................................................................................................13 1.2.7 Exporting VPC Information............................................................................................................................................ 15 1.3 Subnet....................................................................................................................................................................................... 15 1.3.1 Creating a Subnet for the VPC......................................................................................................................................15 1.3.2 Modifying a Subnet.......................................................................................................................................................... 18 1.3.3 Deleting a Subnet..............................................................................................................................................................19 1.3.4 Managing Subnet Tags.................................................................................................................................................... 20 1.4 IPv4 and IPv6 Dual-Stack Network................................................................................................................................ 22 2 Security.................................................................................................................................... 25 2.1 Security Group....................................................................................................................................................................... 25 2.1.1 Security Group Overview................................................................................................................................................ 25 2.1.2 Default Security Groups and Security Group Rules............................................................................................... 28 2.1.3 Security Group Configuration Examples....................................................................................................................29 2.1.4 Creating a Security Group.............................................................................................................................................. 33 2.1.5 Adding a Security Group Rule....................................................................................................................................... 35 2.1.6 Fast-Adding Security Group Rules............................................................................................................................... 40 2.1.7 Replicating a Security Group Rule............................................................................................................................... 41 2.1.8 Modifying a Security Group Rule................................................................................................................................. 41 2.1.9 Deleting a Security Group Rule.................................................................................................................................... 42 2.1.10 Importing and Exporting Security Group Rules....................................................................................................43 2.1.11 Deleting a Security Group............................................................................................................................................43 2.1.12 Adding Instances to and Removing Them from a Security Group................................................................ 44 2.1.13 Cloning a Security Group............................................................................................................................................. 45 2.1.14 Modifying a Security Group Name........................................................................................................................... 46 2.1.15 Viewing the Security Group of an ECS.................................................................................................................... 47 Issue 31 (2021-05-20) Copyright © Huawei Technologies Co., Ltd. ii Virtual Private Cloud User Guide Contents 2.1.16 Changing the Security Group of an ECS................................................................................................................. 47 2.1.17 Common Ports Used by ECSs......................................................................................................................................48 2.2 Network ACL.......................................................................................................................................................................... 50 2.2.1 Network ACL Overview................................................................................................................................................... 50 2.2.2 Network ACL Configuration Examples.......................................................................................................................53 2.2.3 Creating a Network ACL................................................................................................................................................. 56 2.2.4 Adding a Network ACL Rule.......................................................................................................................................... 57 2.2.5 Associating Subnets with a Network ACL.................................................................................................................59 2.2.6 Disassociating a Subnet from a Network ACL........................................................................................................ 60 2.2.7 Changing the Sequence of a Network ACL Rule.................................................................................................... 61 2.2.8 Modifying a Network ACL Rule.................................................................................................................................... 62 2.2.9 Enabling or Disabling a Network ACL Rule..............................................................................................................64 2.2.10 Deleting a Network ACL Rule.....................................................................................................................................64 2.2.11 Exporting and Importing Network ACL Rules....................................................................................................... 65 2.2.12 Viewing a Network ACL................................................................................................................................................66