Help Center> Virtual Private Cloud> Getting Started> Setting Up an IPv4 Network in a VPC
Updated on 2024-07-08 GMT+08:00

Setting Up an IPv4 Network in a VPC

This topic describes how to create a VPC with an IPv4 CIDR block and bind an EIP to an ECS in the VPC to allow the ECS to access the Internet.

Figure 1 shows the architecture of an IPv4 network. In this network, security group sg-A protects ecs-A01 in it. You can configure security group rules to control access to and from ecs-A01.
Figure 1 The architecture of an IPv4 network (VPC/ECS/EIP)
  1. To allow users to remotely log in to ecs-A01 from the local PC (IP address: 10.1.0.7) and perform operations on this ECS, you need to configure the following inbound rules:
    • Rule A01: allows ping traffic to ecs-A01 in vpc-A over all ICMP ports to verify network connectivity.
    • Rule A02: allows the local PC to remotely log in to Linux ecs-A01 over TCP port 22.
    • Rule A03: allows the local PC to remotely log in to Windows ecs-A01 over TCP port 3389.
    • Rule A04: allows ECSs in sg-A to communicate with other.
  2. To allow ecs-A01 to access the Internet, you need to EIP eip-A to it and add outbound rule A05.

Precautions

The network planning in this topic is only for your reference. Once a VPC and subnet are created, the CIDR blocks cannot be changed. Before creating VPCs, determine how many VPCs, the number of subnets, and what CIDR blocks or connectivity options you will need.

For details, see VPC and Subnet Planning Suggestions.

Procedure

Procedure

What to Do

Preparations

Before using cloud services, sign up for a HUAWEI ID, enable Huawei Cloud services, complete real-name authentication, and top up your account.

Step 1: Create a VPC and Subnet

Create a VPC, specify an IPv4 CIDR block (for example, 192.168.0.0/16), and create a subnet with the CIDR block of 192.168.0.0/24 in the VPC.

Step 2: Buy an ECS

Buy an ECS in the subnet you have created and configure security group rules for the ECS.

Step 3: Buy an EIP and Bind It to ecs-A01

Buy an EIP and bind it to the ECS so that the ECS can access the Internet.

Step 4: Verify Network Connectivity

To test ECS connectivity, you can:
  • Log in to the ECS from the local PC.
  • Access the Internet from the ECS using an EIP.

Preparations

Before creating resources such as VPCs and ECSs, you need to sign up for a HUAWEI ID, enable Huawei Cloud services, complete real-name authentication, and top up your account. Ensure that your account has sufficient balance.

  1. You have created a HUAWEI ID, enabled Huawei Cloud services, and completed real-name authentication.
    If you already have a HUAWEI ID, skip this part. If you do not have a HUAWEI ID, perform the following operations to create one:
    1. Sign up for a HUAWEI ID and enable Huawei Cloud services.
    2. Complete real-name authentication.
  2. You need to ensure that your account has sufficient balance. Top up your account if your account has insufficient balance.

Step 1: Create a VPC and Subnet

  1. Go to the Create VPC page.
  2. On the Create VPC page, set parameters as needed.

    In this example, you need to create a VPC and a subnet.

    Figure 2 Creating a VPC
    Figure 3 Creating a subnet
    Table 1 VPC parameter descriptions

    Parameter

    Example Value

    Description

    Region

    CN-Hong Kong

    The region where vpc-A belongs. Select the region nearest to you to ensure the lowest possible latency. The VPC, ECS, and EIP used in this example must be in the same region.

    The region cannot be changed after vpc-A is created.

    Name

    vpc-A

    The VPC name. Set it to vpc-A.

    The name can be modified after vpc-A is created.

    IPv4 CIDR Block

    192.168.0.0/16

    The IPv4 CIDR block of vpc-A. You are advised to select from the following CIDR blocks:
    • 10.0.0.0/8-24: The IP address ranges from 10.0.0.0 to 10.255.255.255, and the netmask ranges from 8 to 24.
    • 172.16.0.0/12-24: The IP address ranges from 172.16.0.0 to 172.31.255.255, and the netmask ranges from 12 to 24.
    • 192.168.0.0/16-24: The IP address ranges from 192.168.0.0 to 192.168.255.255, and the netmask ranges from 16 to 24.

    The IPv4 CIDR block cannot be changed after the vpc-A is created.

    Enterprise Project

    default

    The enterprise project by which VPCs are centrally managed. Select an existing enterprise project for vpc-A.

    The enterprise project cannot be changed after the vpc-A is created.

    Advanced Settings (Optional) > Tag

    Tag key: test

    Tag value: 01

    The tag that is used to classify and identify resources. Add tags to vpc-A as required.

    After vpc-A is created, you can add additional tags to vpc-A or delete existing tags from it.

    Advanced Settings (Optional) > Description

    -

    Supplementary information about vpc-A. Enter the description as required.

    The description can be modified after vpc-A is created.

    Table 2 Subnet parameter descriptions

    Parameter

    Example Value

    Description

    AZ

    AZ4

    An AZ is a geographic location with independent power supply and network facilities in a region. Each region contains multiple AZs. AZs are physically isolated but connected through an internal network. Subnets of a VPC can be located in different AZs without affecting communications. You can select any AZ in a region.

    The ECS and VPC can be in different AZs. For example, you can select AZ1 for the ECS and AZ3 for the VPC subnet.

    The AZ cannot be changed after subnet-A01 is created.

    You can select an AZ for a subnet only in certain regions. See the available regions on the management console.

    Subnet Name

    subnet-A01

    The subnet name. Set it to subnet-A01.

    The name can be modified after subnet-A01 is created.

    IPv4 CIDR Block

    192.168.0.0/24

    The IPv4 CIDR block of subnet-A01, which is a unique CIDR block with a range of IP addresses in vpc-A.

    The CIDR block cannot be changed after subnet-A01 is created.

    IPv6 CIDR Block (Optional)

    Disabled

    Whether to assign IPv6 addresses.

    You can enable or disable this option after subnet-A01 is created.

    Associated Route Table

    Default

    The default route table that subnet-A01 is associated with. Each VPC comes with a default route table. Subnets in the VPC are then automatically associated with the default route table.

    The default route table has a preset system route that allows subnets in a VPC to communicate with each other.

    After subnet-A01 is created, you can create a custom route table and associate subnet-A01 with it.

    Advanced Settings (Optional) > Gateway

    192.168.0.1

    The gateway address of subnet-A01. You are advised to retain the default address.

    The gateway address cannot be changed after subnet-A01 is created.

    Advanced Settings (Optional)
    • DNS Server Address
    • Domain Name
    • NTP Server Address
    • IPv4 DHCP Lease Time

    Not required

    The parameters are configured for the ecs-A01 in vpc-A. In this example, retain the default values or leave them empty.

    You can change the values after subnet-A01 is created.

    Advanced Settings (Optional) > Tag

    Tag key: test

    Tag value: 01

    The tag that is used to classify and identify resources. Add tags to subnet-A01 as required.

    After subnet-A01 is created, you can add additional tags to subnet-A01 or delete existing tags from it.

    Advanced Settings (Optional) > Description

    -

    Supplementary information about subnet-A01. Enter the description as required.

    The description can be modified after subnet-A01 is created.

  3. Click Create Now.

    Return to the VPC list to view vpc-A you have created.

Step 2: Buy an ECS

  1. Go to the Buy ECS page.
  2. On the Buy ECS page, set parameters as required.
    In this example, set the ECS name to ecs-A01 and configure other parameters as follows:
    • Network: Select vpc-A and subnet-A01 you have created.
      Figure 4 Network settings
    • Security Group: Create security group sg-A and add inbound and outbound rules to it. Each security group comes with system rules. You need to check and modify the rules as required to ensure that all rules in Table 3 are added.
      Figure 5 Inbound rules of sg-A
      Figure 6 The outbound rule of sg-A
      Table 3 sg-A rules

      Direction

      Action

      Type

      Protocol & Port

      Source/Destination

      Description

      Inbound

      Allow

      IPv4

      TCP: 22

      Source: 10.1.0.7/32

      Allows the local PC (10.1.0.7/32) to remotely log in to Linux ecs-A01 over SSH port 22.

      Inbound

      Allow

      IPv4

      TCP: 3389

      Source: 10.1.0.7/32

      Allows the local PC (10.1.0.7/32) to remotely log in to Windows ecs-A01 over RDP port 3389.

      Inbound

      Allow

      IPv4

      ICMP: All

      Source: 0.0.0.0/0

      Allows ping traffic to ecs-A01 in vpc-A over all ICMP ports to verify network connectivity.

      Inbound

      Allow

      IPv4

      All

      Source: current security group (sg-A)

      Allows the ECSs in sg-A to communicate with each other.

      Outbound

      Allow

      IPv4

      All

      Destination: 0.0.0.0/0

      Allows ecs-A01 in sg-A to access the Internet.

    • EIP: Select Not required.
      Figure 7 Selecting Not required

    You can configure other ECS parameters as required. For details, see Buying an ECS.

  3. Click Submit.

    Return to the ECS list to view ecs-A01 you have bought.

Step 3: Buy an EIP and Bind It to ecs-A01

  1. Go to the Buy EIP page.
  2. On the Buy EIP page, set the EIP name to eip-A.

    You can configure other EIP parameters as required. For details, see Buying an EIP.

  3. Click Next.

    Return to the EIP list to view eip-A you have bought.

  4. In the EIP list, locate eip-A and click Bind in the Operation column.

    The Bind EIP dialog box is displayed.

    Figure 8 Binding eip-A to ecs-A01
  5. In the displayed dialog box, select ecs-A01 and click OK.

    Return to the EIP list. You can see that ecs-A01 is displayed in the Associated Instance column in the EIP list.

    Figure 9 eip-A bound to ecs-A01

Step 4: Verify Network Connectivity

  1. Use the local PC to remotely log in to ecs-A01.

    Multiple methods are available for logging in to an ECS. For details, see Logging In to an ECS.

  2. Run the following command to verify the network connectivity between ecs-A01 and Internet:

    ping IPv4 EIP or Domain name

    Example command:

    ping support.huaweicloud.com

    If information similar to the following is displayed, ecs-A01 can communicate with the Internet.
    [root@ecs-a01 ~]# ping support.huaweicloud.com
    PING hcdnw.cbg-notzj.c.cdnhwc2.com (203.193.226.103) 56(84) bytes of data.
    64 bytes from 203.193.226.103 (203.193.226.103): icmp_seq=1 ttl=51 time=2.17 ms
    64 bytes from 203.193.226.103 (203.193.226.103): icmp_seq=2 ttl=51 time=2.13 ms
    64 bytes from 203.193.226.103 (203.193.226.103): icmp_seq=3 ttl=51 time=2.10 ms
    64 bytes from 203.193.226.103 (203.193.226.103): icmp_seq=4 ttl=51 time=2.09 ms
    ...
    --- hcdnw.cbg-notzj.c.cdnhwc2.com ping statistics ---
    4 packets transmitted, 4 received, 0% packet loss, time 3004ms
    rtt min/avg/max/mdev = 2.092/2.119/2.165/0.063 ms