Functions
- Manage attachments, custom route tables, associations, propagations, and routes.
- Manage permissions, tags, and quota to improve service security.
Function |
Description |
Reference |
---|---|---|
Enterprise routers |
An enterprise router is a high-performance centralized router that supports route learning. When creating an enterprise router, you can set parameters such as its region, AZ, and name. After an enterprise router is created, you can still change its parameters based on service requirements. |
|
Attachments |
You can attach network instances to the enterprise router.
Network instances are attached to the enterprise router in different ways.
|
|
Route tables |
Route tables are used by enterprise routers to forward packets. Route tables contain associations, propagations, and routes. An enterprise router can have multiple route tables. You can associate attachments with different route tables to enable communication or isolation between network instances. |
|
Associations |
Associations are created manually or automatically to associate attachments with enterprise router route tables.
|
|
Propagations |
A propagation is created manually or automatically to enable an enterprise router to learn the routes to an associated attachment.
|
|
Routes |
A route consists of information such as the destination address, next hop, and route type. There are two types of routes:
|
|
Sharing |
You are the owner of the enterprise router, and other accounts are the users of your enterprise router. After you share your enterprise router with other accounts, these other users can attach their network instances to your enterprise router, so that their network instances can access your enterprise router. This allows VPCs in the same region but different accounts to be attached to the same enterprise router. |
|
Flow logs |
A flow log records traffic of attachments on enterprise routers in real time. The logs allow you to monitor the network traffic of attachments and analyze network attacks, improving the O&M efficiency.
Flow logs can capture traffic of the following types of attachments:
|
|
Monitoring |
You can use Cloud Eye to monitor the network status of enterprise routers and their attachments. |
|
Auditing |
You can use Cloud Trace Service (CTS) to record operations associated with your enterprise routers for future query, audit, and backtracking. |
|
Permissions |
You can use Identity and Access Management (IAM) to set different permissions for employees in your enterprise to control their access to enterprise routers. |
|
Tags |
Tags are used to identify cloud resources. You can add tags to enterprise routers, route tables, and other resoruces. |
|
Quotas |
Quotas can limit the number or amount of resources available to users, for example, how many enterprise routers can be created, how many attachments can be created for each enterprise router, and how many routes can be added to each route table. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.