Cette page n'est pas encore disponible dans votre langue. Nous nous efforçons d'ajouter d'autres langues. Nous vous remercions de votre compréhension.
- What's New
- Function Overview
- Service Overview
-
Getting Started
- Allowing a Private Network to Access the Internet Using SNAT
- Allowing Internet Users to Access a Service in a Private Network Using DNAT
- Allowing On-Premises Servers to Communicate with the Internet
- Using Private NAT Gateways to Enable Communications Between Cloud and On-premises Networks
- Using Multiple Public NAT Gateways Together in Performance-Demanding Scenarios
- Change History
-
User Guide
- Public NAT Gateways
- Private NAT Gateways
- Managing NAT Gateway Tags
- Monitoring
- Auditing
- Change History
- Best Practices
-
API Reference
- Before You Start
- API Overview
- Calling APIs
- V2 APIs of Public NAT Gateways
- API v2.0
- Private Nat API
- Permissions Policies and Supported Actions
- Common Parameters
- Change History
-
FAQs
-
Public NAT Gateways
- What Is the Relationship Between a VPC, Public NAT Gateway, EIP Bandwidth, and ECS?
- How Does a Public NAT Gateway Offer High Availability?
- Which Ports Cannot Be Accessed?
- What Are the Differences Between Using a Public NAT Gateway and Using an EIP for an ECS?
- What Should I Do If I Fail to Access the Internet Through a Public NAT Gateway?
- Can I Change the VPC for a Public NAT Gateway?
- Does Public NAT Gateway Support IPv6 Addresses?
- What Security Policies Can I Configure to Implement Access Control If I Use a Public NAT Gateway?
- What Can I Do If Connection Between My Servers and the Internet Fails After I Add SNAT and DNAT Rules?
-
Private NAT Gateways
- How Do I Troubleshoot a Network Failure After a Private NAT Gateway Is Configured?
- How Many Private NAT Gateways Can I Create in a VPC?
- Can I Increase the Numbers of SNAT and DNAT Rules Supported by a Private NAT Gateway?
- Can an SNAT and DNAT Rule of a Private NAT Gateway Share the Same Transit IP Address?
- Can Private NAT Gateways Translate On-premises IP Addresses Connected to the Cloud Through Direct Connect?
- What Are the Differences Between Private NAT Gateways and Public NAT Gateways?
- How Is Private NAT Gateway Billed?
- Can a Private NAT Gateway Be Used Across Accounts?
-
SNAT Rules
- Why Do I Need SNAT?
- What Are SNAT Connections?
- What Is the Bandwidth of a Public NAT Gateway Used by a Server to Access the Internet? How Do I Configure the Bandwidth?
- How Do I Resolve Packet Loss or Connection Failure Issues When Using a NAT Gateway?
- What Should I Do If My ECS Fails to Access a Server on the Public Network Through a Public NAT Gateway?
- What Are the Relationships and Differences Between the CIDR Blocks in a NAT Gateway and in an SNAT Rule?
- DNAT Rules
-
Public NAT Gateways
- SDK Reference
Using a Public NAT Gateway and Direct Connect to Accelerate Internet Access
Scenarios
You need to connect your on-premises data center to Huawei Cloud using Direct Connect and then add SNAT rules to enable your on-premises servers to access the Internet through a public NAT gateway in a secure, reliable, and high-speed way, or add DNAT rules to enable your on-premises servers to provide services accessible from the Internet. This practice can be used in similar scenarios like Internet, games, e-commerce, and finance.
Solution Advantages
With Direct Connect, you can access a VPC on a cloud platform over high-performance, low-latency, and secure networks. A Direct Connect connection supports a maximum of 10 Gbit/s bandwidth, meeting various bandwidth requirements.
With SNAT and DNAT of the public NAT gateway, your servers can share an EIP for Internet access, saving costs on EIPs. You can change the public NAT gateway types and EIPs bound to it at any time. The configuration is simple and will take effect immediately.
Typical Topology
The network of your on-premises data center is 172.18.0.0/24.
The subnet of the VPC your on-premises data center will access is 172.16.0.0/24.
Implementation methods:
- A Direct Connect connection is used to connect your on-premises data center to the VPC.
- A public NAT gateway is created in the VPC, enabling Internet connectivity for your on-premises servers.
Figure 1 Network topology
Prerequisites
- The default route of your on-premises data center is available for configuring Direct Connect.
- The CIDR block of your on-premises data center does not overlap with the subnet CIDR block of the VPC. Otherwise, the communications between your on-premises data center and the VPC will fail.
Procedure
- Create a VPC.
For detailed operations, see Creating a VPC.
- Configure a Direct Connect connection.
Create a direct connection between your on-premises data center and the transit VPC (in the specified region). For details, see Overview.
NOTE:
After the Direct Connect connection is created, configure routes in your on-premises data center as follows:- Static: Add the default route with 0.0.0.0/0 as the destination and set the next hop to the connection.
- BGP: The on-premises network can learn the default route using BGP.
- Assign an EIP and configure a public NAT gateway.
- Buy an EIP in the specified region. For details, see Assigning an EIP.
- Create a public NAT gateway. For details, see Creating a Public NAT Gateway.
- Add an SNAT rule by setting the CIDR block to that of the Direct Connect connection. For more details, see Adding an SNAT Rule.
Set CIDR Block to 172.18.0.0/24 and select the EIP assigned in 1.
- Add a DNAT rule. For details, see Adding a DNAT Rule.
Configure the protocol and port type. Set Private IP Address to 172.18.0.100 and select an EIP.
NOTE:
SNAT and DNAT are used for different services. If an SNAT rule and a DNAT rule use the same EIP, there may be service conflicts. An SNAT rule cannot share an EIP with a DNAT rule with Port Type set to All ports.
Verification
After the configuration is complete, test the network connectivity.
Ping an external IP address, for example, 114.114.114.114, from a server in your on-premises data center.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.