Network and Resource Planning
- Network Planning: Plan the CIDR blocks of the VPCs and their subnets, Direct Connect connection, VPN connections, enterprise router, and routes.
- Resource Planning: Plan the quantity, names, and other parameters of cloud resources, such as VPC, Direct Connect connection, VPN connection, and enterprise router.
Network Planning
Figure 1 shows the network diagram of Direct Connect and VPN connections that work in an active/standby pair.
- Only preferred routes are displayed in the enterprise router route table. The routes of a virtual gateway attachment have a higher priority than those of a VPN gateway attachment. Therefore, the routes of the VPN gateway attachment will not be displayed in the route table.
- By default, the Direct Connect connection is used for communications between the VPCs and on-premises data center. Table 1 shows the details about the traffic flows in this example.
Path |
Description |
---|---|
Request traffic: from VPC 1 to the on-premises data center |
|
Response traffic: from the on-premises data center to VPC 1 |
|
Cloud Service/Resource |
Description |
---|---|
VPC |
A VPC is required to run your workloads. In this example, VPC 1 is used.
|
There is another VPC with a subnet used by VPN. When you create a VPN gateway, you need to specify this subnet. The CIDR block of this subnet cannot overlap with that of any existing subnet in the VPC. |
|
Direct Connect |
|
VPN |
|
Enterprise router |
After Default Route Table Association and Default Route Table Propagation are enabled and an attachment is created, Enterprise Router will automatically:
|
ECS |
An ECS is deployed in the VPC to verify communications between the cloud and the on-premises data center. If you have multiple ECSs associated with different security groups, you need to add rules to the security groups to allow network access. |
Destination |
Next Hop |
Route Type |
---|---|---|
192.168.3.0/24 |
Enterprise router |
Static route (custom) |
- If you enable Auto Add Routes when creating a VPC attachment, you do not need to manually add static routes to the VPC route table. Instead, the system automatically adds routes (with this enterprise router as the next hop and 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16 as the destinations) to all route tables of the VPC.
- If an existing route in the VPC route tables has a destination to 10.0.0.0/8, 172.16.0.0/12, or 192.168.0.0/16, the routes will fail to be added. In this case, do not enable Auto Add Routes. After the attachment is created, manually add routes.
- You need to add a route to the VPC route table with the destination set to the on-premises network CIDR block and next hop set to enterprise router.
Destination |
Next Hop |
Route Type |
---|---|---|
VPC 1 CIDR block: 172.16.0.0/16 |
VPC 1 attachment: er-attach-01 |
Propagated |
On-premises network CIDR block: 192.168.3.0/24 |
Global DC gateway attachment: dgw-demo |
Propagated |
On-premises network CIDR block: 192.168.3.0/24 |
VPN gateway attachment: vpngw-demo |
Propagated |
- Only preferred routes are displayed in the enterprise router route table. If both the Direct Connect and VPN connections are working normally, the routes of the virtual gateway attachment take priority and can be viewed in the enterprise router route table. All routes of the VPN gateway attachment cannot be viewed.
- When the Direct Connect connection becomes faulty and the active VPN connection automatically takes over, you can view the propagated routes of the VPN gateway attachment in the enterprise router route table on the management console.
Resource Planning
The following resource details are only examples. You can modify them if needed.
Resource |
Quantity |
Description |
---|---|---|
VPC |
2 |
A VPC is required to run your workloads and needs to be attached to the enterprise router.
|
A VPC is required, with a subnet for deploying the VPN gateway.
NOTICE:
When you create a VPN gateway, you need to select this VPC and set Interconnection Subnet to a subnet that is not used by any resource and whose CIDR block does not overlap with existing subnet CIDR blocks in the VPC. In this example, the CIDR block of the interconnection subnet cannot be the same as that of the default subnet subnet-01. |
||
Enterprise router |
1 |
|
Direct Connect |
1 |
One connection is required. In this example, the connection is named dc-demo. |
A global DC gateway is required for the connection.
|
||
One virtual interface is required.
|
||
VPN |
1 |
VPN gateway
|
Customer gateway
|
||
Two VPN connections that work in an active/standby pair:
|
||
ECS |
1 |
|
- The global DC gateway and the VPN gateway must use the same ASN to prevent network loops because the Direct Connect and VPN connections back up each other. In this example, 64512 is used.
- The ASN of the enterprise router cannot be the same as that of the on-premises data center. It is recommended that you set the ASN of the enterprise router to a value different from that of the global DC gateway. 64512 has been reserved for the global DC gateway. In this example, the ASN of the enterprise router is 64513.
- The ASN of the on-premises data center must be different from that used on the cloud. Set this ASN based on site requirements. In this example, 65525 is used.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot