Help Center> Data Replication Service> Preparations> From Huawei Cloud to Huawei Cloud> Accessing Huawei Cloud Through a VPN (Different Regions)
Updated on 2022-09-21 GMT+08:00

Accessing Huawei Cloud Through a VPN (Different Regions)

Figure 1 shows how to use DRS to migrate data across databases in different regions in a VPN network on Huawei Cloud.

Figure 1 Network diagram

If you use DRS to access a cross-region RDS database through a VPN, purchase the VPN service on Huawei Cloud in Region-B and configure the VPC and subnet where DRS resides. In addition, purchase the VPN service in Region-A, configure the VPN peer device, and add inbound rules for the network ACL and security group associated with the source database in Region-A to allow traffic from the private IP address of the replication instance. Then, configure outbound rules for the network ACL and security group associated with the replication instance in Region-B to allow outbound traffic. Figure 2 shows the process.

Figure 2 Flowchart

Network Configurations

  1. Create a DRS instance and obtain the subnet and private IP address of the DRS instance.

    By default, the DRS instance is in the same subnet as the destination database.

    Figure 3 Replication instance information

    After the DRS replication instance is created, the private IP address of the replication instance is displayed.

    Figure 4 Private IP address of the DRS instance

  2. Query the name of the VPC to which the DRS instance belongs.

    By default, the DRS replication instance and the destination RDS database are created in the same VPC. You can log in to the destination RDS instance to view information about the VPC where the replication instance is located.

    Figure 5 Destination database information

  3. Purchase a VPN in the target region and configure the VPN gateway and connection.

    For details, see Getting Started with Virtual Private Network.

    When you create a VPN gateway, configure the VPC by referring to the VPC information obtained in 2. When you create a VPN connection, configure the subnet associated with the replication instance by referring to the subnet information obtained in 1.

  4. Purchase a VPN in the source region and configure the VPN peer device.

    For details, see "Configuring the Remote Device" in Getting Started with Virtual Private Network.

  5. Configure the network ACL associated with the security group and subnet of the source database.

    Security group: Add an inbound rule to allow traffic from the private IP address of the DRS replication instance to the database listening port.

    Network ACL: By default, a VPC does not have a network ACL. If you have a network ACL, add an inbound rule to allow traffic from the private IP address and random port of the DRS replication instance to the IP address and listening port of the source database.

  6. Configure the network ACL associated with the security group and subnet of the DRS replication instance.

    By default, a VPC does not have a network ACL, and the default security group rules allow all outbound traffic. The replication instance and destination RDS database in the same security group can communicate with each other by default, so you do not need to configure a network ACL.

    If you have configured a network ACL or security group, log in to the VPC management console and check the settings:

    Security group: Ensure that the outbound traffic from the security group associated with the replication instance to the IP address and listening port of the source database is allowed.

    Network ACL: Ensure that the outbound traffic from the VPC where the replication instance resides and the DRS random port to the IP address and listening port of the source database is allowed.

  7. Test the connection.

    Log in to the DRS console, locate the created DRS task, and click Edit in the Operation column. On the Configure Source and Destination Databases page, enter the IP address, port, username, and password of the source database and then click Test Connection to check whether the connection is successful.