What's New

The tables below describe the features released in each VPC version and corresponding documentation updates. New features will be successively launched in each region.
October 2025
|
No. |
Feature |
Description |
Phase |
Document |
|---|---|---|---|---|
|
1 |
Guidance on configuring virtual IP addresses on instances running different OSs |
Added the following OSs:
|
Commercial use |
|
|
2 |
Rich network planning suggestions |
Added suggestions on planning regions, AZs, accounts, network security, and network DR. |
Commercial use |
|
|
3 |
Network solutions for connecting VPCs to the network of a peer vendor cloud or a user client |
There are network solutions for connecting VPCs to the network of a peer vendor cloud or a user client. |
Commercial use |
|
|
4 |
Guidance on querying the number of available IP addresses in a subnet |
After a subnet is created, you can query the number of available IP addresses on the subnet details page. The number of available IP addresses in a subnet helps you allocate IP addresses and prevent service interruptions caused by IP address exhaustion. |
Commercial use |
|
|
5 |
Guidance on using security groups |
Proper security group rule configuration is vital for cloud service protection. There is a practical guidance for to help you build a secure and reliable network. |
Commercial use |
|
|
6 |
Optimized the network ACL instructions on the console |
Changed parameter Priority of a network ACL rule to Rule Number and provided detailed explanation. |
Commercial use |
|
|
7 |
Guidance for configuring policy-based routes for ECSs with multiple network interfaces |
Added operation procedure for configuring IPv4 and IPv6 policy-based routes for a Linux ECS with multiple network interfaces running Ubuntu. |
Commercial use |
June 2024
|
No. |
Feature |
Description |
Phase |
Document |
|---|---|---|---|---|
|
1 |
Optimized documentation for network ACLs |
This section describes the network ACL architecture, working principles, how traffic matches network ACL rules, and network ACL configuration examples. |
Commercial use |
|
|
2 |
Optimized quick start |
The configuration guide for the following two scenarios is provided:
|
Commercial use |
|
|
3 |
Optimized user guide |
Added the following content:
|
Commercial use |
May 2024
|
No. |
Feature |
Description |
Phase |
Document |
|---|---|---|---|---|
|
1 |
More user-friendly security group documentation |
|
Commercial use |
March 2024
|
No. |
Feature |
Description |
Phase |
Document |
|---|---|---|---|---|
|
1 |
Associating a subnet with a network ACL on the Subnets page |
The following operations on the Subnets page are allowed:
|
Commercial use |
|
|
2 |
More operations on an IP address group |
The following operations are allowed:
|
Commercial use |
|
|
3 |
Optimized the function of adding routes for a VPC peering connection. |
If you want to add routes for a VPC peering connection, you do not need to switch to the VPC route table. You can directly add, view, or delete routes on the VPC peering connection details page. |
Commercial use |
Creating a VPC Peering Connection to Connect Two VPCs in the Same Account Creating a VPC Peering Connection to Connect Two VPCs in Different Accounts |
|
4 |
Added the Allow Common Ports function. |
When adding a security group rule, you can use Allow Common Ports to allow common ports with a few clicks. This function is suitable for the following scenarios:
|
Commercial use |
|
|
5 |
Optimized resource deletion function. |
|
Commercial use |
March 2023
|
No. |
Feature |
Description |
Phase |
Document |
|---|---|---|---|---|
|
1 |
Elastic network interfaces |
An elastic network interface is a virtual network card. You can create network interfaces and attach them to your cloud instances (ECSs and BMSs) to obtain flexible and highly available network configurations. |
Commercial use |
September 2022
|
No. |
Feature |
Description |
Phase |
Document |
|---|---|---|---|---|
|
1 |
VPC |
A Virtual Private Cloud (VPC) is a private and isolated virtual network created on Huawei Cloud. The VPC gives you complete control over your virtual network, allowing you to select your own IP address range, create subnets, configure security groups, and even assign EIPs and allocate bandwidth in your network, enabling secure and easy access to your business system. Application scenarios:
|
Commercial use |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.