What's New

Updated on 2024/10/15 GMT+08:00

The tables below describe the functions released in each Virtual Private Cloud version and corresponding documentation updates. New features will be successively launched in each region.

October 2024

No.

Feature

Description

Phase

Document

1

Traffic Mirroring example scenarios

Example scenarios:

  • Mirroring inbound TCP traffic to a single network interface
  • Mirroring inbound TCP and UDP traffic to multiple network interfaces

Commercial use

Mirroring Inbound TCP Traffic to a Single Network Interface

Mirroring Inbound TCP and UDP Traffic to Multiple Network Interfaces

September 2024

No.

Feature

Description

Phase

Document

1

Optimized console for managing resource tags

You can manage tags of a resource more flexibly.

Commercial use

Managing VPC Tags

Managing Subnet Tags

Managing Security Group Tags

Managing Network ACL Tags

2

Optimized console for creating VPCs and subnets

You can create VPCs and subnets on the console in an easier and more interactive way.

Commercial use

Creating a VPC and Subnet

3

Optimized navigation bar of the network console

Service features are reorganized and rearranged in the navigation bar of the network console. The main changes of VPC include: IP Address Groups is put under Access Control, and Flow Logs and Traffic Mirroring are put under Network Monitoring.

Commercial use

Creating an IP Address Group

Creating a VPC Flow Log

Creating a Mirror Session

August 2024

No.

Feature

Description

Phase

Document

1

Optimized documentation related to virtual IP addresses

  • Differences between virtual IP addresses, private IP Addresses, and EIPs
  • Application scenarios and quotas of virtual IP addresses
  • Using a virtual IP address and Keepalived to set up a high-availability web cluster

Commercial use

Virtual IP Address Overview

Using a Virtual IP Address and Keepalived to Set Up a High-Availability Web Cluster

2

VPC network connection solutions

This section describes how you can set up private networks, public networks, and hybrid cloud networks based on the network architecture.

Commercial use

Overview

Connecting VPCs

Connecting VPCs to the Public Network

Connecting VPCs to On-Premises Data Centers

3

VPC and subnet planning

This section provides network architecture figures to show you how to plan your VPCs and subnets in different networks.

Commercial use

VPC and Subnet Planning

July 2024

No.

Feature

Description

Phase

Document

1

Rules adjustable

When you create a security group, you can modify the rules on the creation page.

Commercial use

Creating a Security Group

2

Optimized quick start

The configuration guide for the following two scenarios is provided:

  • Setting Up an IPv4 Network in a VPC
  • Quickly Setting Up an IPv4/IPv6 Dual-Stack Network In a VPC

Commercial use

Setting Up an IPv4 Network in a VPC

Quickly Setting Up an IPv4/IPv6 Dual-Stack Network In a VPC

June 2024

No.

Feature

Description

Phase

Document

1

A more user-friendly page for creating a VPC peering connection

Some configuration examples for configuring VPC peering connections are provided for you to follow.

Commercial use

Creating a VPC Peering Connection with Another VPC in Your Account

Creating a VPC Peering Connection with a VPC in Another Account

VPC Peering Connection Usage Examples

2

Optimized user guide

Added the following content:

  • The VPC CIDR block range
  • The guidance for querying security group rule changes
  • The descriptions about cloud services that support VPC sharing

Commercial use

VPC and Subnet Planning Suggestions

Querying Security Group Rule Changes

VPC Sharing

April 2024

No.

Feature

Description

Phase

Document

1

More user-friendly security group documentation

  • Added sequence on how traffic matches security group and network ACL rules.
  • Added the security group architecture, sequence on how traffic matches security group rules, and security group application examples.
  • Added the content on how to use IP address groups to simplify security group rule management.

Commercial use

What Is Access Control?

Security Groups and Security Group Rules

Security Group Configuration Examples

Using IP Address Groups to Reduce the Number of Security Group Rules

2

Network ACL tags

You can use tags to identity and search for network ACLs.

Commercial use

Creating a Network ACL

Managing Network ACL Tags

3

Security group tags

You can use tags to identity and search for security groups.

Commercial use

Creating a Security Group

Managing Security Group Tags

4

Easier VPC and subnet deletion

When you delete a VPC or subnet that is used by other resources, you can view the associated resource list on the console and delete them more easily.

Commercial use

Deleting a VPC

Deleting a Subnet

5

New console style

The style of the VPC console is upgraded.

Commercial use

Creating a VPC

March 2024

No.

Feature

Description

Phase

Document

1

VPC sharing

With Resource Access Manager (RAM), you can share subnets in a VPC with one or more accounts so you can centrally manage resources in multiple accounts, which improves resource management efficiency and reduces O&M costs.

Commercial use

VPC Sharing Overview

December 2023

No.

Feature

Description

Phase

Document

1

More operations on an IP address group

The following operations are allowed:

  • Add descriptions to IP addresses.
  • Export IP address group details.
  • Import IP addresses to an IP address group in batches.

Commercial use

Creating an IP Address Group

Adding IP Addresses to an IP Address Group

Exporting IP Address Group Details

Importing IP Addresses to an IP Address Group in Batches

2

Associating a subnet with a network ACL on the Subnets page

The following operations on the Subnets page are allowed:

  • Associate a subnet with a network ACL.
  • Go to the details page of a network ACL.

Commercial use

Associating Subnets with a Network ACL

Disassociating Subnets from a Network ACL

October 2023

No.

Feature

Description

Phase

Document

1

Optimized the function of adding routes for a VPC peering connection.

If you want to add routes for a VPC peering connection, you do not need to switch to the VPC route table. You can directly add, view, or delete routes on the VPC peering connection details page.

Commercial use

Creating a VPC Peering Connection with Another VPC in Your Account

Creating a VPC Peering Connection with a VPC in Another Account

Viewing Routes Configured for a VPC Peering Connection

Deleting Routes Configured for a VPC Peering Connection

2

Added the Allow Common Ports function.

When adding a security group rule, you can use Allow Common Ports to allow common ports with a few clicks. This function is suitable for the following scenarios:
  • Remotely log in to ECSs.
  • Use the ping command to test ECS connectivity.
  • ECSs functioning as web servers provide website access services.

Commercial use

Allowing Common Ports with A Few Clicks

3

Optimized resource deletion function.

  • Deleting an IP address group can also delete the network resources associated with the IP address group.
  • Optimized the message displayed in the dialog boxes for deleting elastic network interfaces and supplementary network interfaces.

Commercial use

Deleting an IP Address Group

Deleting a Network Interface

Deleting a Supplementary Network Interface

August 2023

No.

Feature

Description

Phase

Document

1

Elastic network interfaces and supplementary network interfaces

  • An elastic network interface is a virtual network card. You can create network interfaces and attach them to your cloud instances to obtain flexible and highly available network configurations.
  • Supplementary network interfaces are a supplement to elastic network interfaces. If the number of elastic network interfaces that can be attached to your cloud instance cannot meet your requirements, you can use supplementary network interfaces.

Commercial use

Network Interface Overview

Supplementary Network Interface Overview

July 2023

No.

Feature

Description

Phase

Document

1

Multiple IP addresses can be specified when you add a security group rule.

If you select IP address for Source or Destination when you add a security group rule, you can enter multiple IP addresses in the same IP address box. Each IP address represents a different security group rule.

Commercial use

Adding a Security Group Rule

2

The Fast-add rule template is available.

If you select the Fast-add rule template when you create a security group, you can select common protocols and ports on the page to quickly add security group rules.

Commercial use

Creating a Security Group

June 2023

No.

Feature

Description

Phase

Document

1

Network ACLs support enterprise projects.

When creating a network ACL, you can add the network ACL to an enabled enterprise project.

Commercial use

Creating a Network ACL

2

Optimized IP address group functions

An IP address group is a collection of IP addresses. It can be associated with security groups and network ACLs to simplify IP address configuration and management in networking. The following are optimized:

  • Optimized the page for creating an IP address group.
  • Added the IP address group details page.
  • Supported adding IP addresses to or delete them from an IP address group.

Commercial use

IP Address Group Overview

3

Optimized information on the VPC peering connection console

A VPC peering connection is a network connection between two VPCs in one region. The following are optimized:

  • Optimized the page for creating a VPC peering connection.
  • Optimized the dialog box for adding routes for a VPC peering connection.

Commercial use

Creating a VPC Peering Connection with Another VPC in Your Account

Creating a VPC Peering Connection with a VPC in Another Account

December 2022

No.

Feature

Description

Phase

Document

1

New VPC console

A new VPC console is available and you can click Virtual Private Cloud in the navigation pane on the left and visit My VPCs, Subnets, Route Tables, Network Interfaces, and VPC Peering Connections.

Commercial use

Creating a VPC

October 2021

No.

Feature

Description

Phase

Document

1

Fine-grained VPC permission management

If you need to assign different permissions to employees in your enterprise to access your VPC resources, IAM is a good choice for fine-grained permissions management.

Commercial use

Permissions Management

March 2021

No.

Feature

Description

Phase

Document

1

Secondary CIDR block

You can add a secondary IPv4 CIDR block to your VPC.

Commercial use

Adding a Secondary CIDR Block to a VPC

July 2020

No.

Feature

Description

Phase

Document

1

IP address group

An IP address group is a collection of IP addresses that use the same security group rules. You can use an IP address group to manage IP addresses that have the same security requirements or whose security requirements change frequently. An IP address group frees you from repeatedly modifying security group rules and simplifies security group rule management.

Commercial use

IP Address Group Overview

June 2020

No.

Feature

Description

Phase

Document

1

IPv4 and IPv6 dual stack

IPv4 and IPv6 dual stack allows your resources, such as ECSs, to use both the IPv4 and IPv6 addresses for private and public network communication.

Open beta testing

IPv4 and IPv6 Dual-Stack Network

December 2019

No.

Feature

Description

Phase

Document

1

Custom route tables are now available and can be associated with subnets.

After a subnet is created for the VPC, the subnet is automatically associated with the default route table created for the VPC because each subnet must be associated with a route table. If you do not want to use the default route table, you can now create a custom route table and associate it with the subnet.

A route table can be associated with multiple subnets. However, each subnet can only be associated with one route table.

Commercial use

Route Table Overview

October 2019

No.

Feature

Description

Phase

Document

1

VPC flow log

A VPC flow log records information about traffic going to and from your VPC. VPC flow logs help you monitor network traffic, analyze network attacks, and determine whether security group and network ACL rules require modification. Apply for Open Beta Test

VPC flow logs must be used together with the Log Tank Service (LTS). You need to create a log group and a log topic in LTS, and then create a VPC flow log.

Open beta testing

VPC Flow Log Overview

2

Security group cloning

You can clone a security group from one region to another and quickly apply the security group rules to ECSs in another region.

Commercial use

Cloning a Security Group

September 2019

No.

Feature

Description

Phase

Document

1

A security group can be created using a specific template.

You can quickly create a security group using a specific template that contains security group rules.

Commercial use

Creating a Security Group

July 2018

No.

Feature

Description

Phase

Document

1

Batch import and export of security group rules

You can import and export security group rules in batches.

Commercial use

Importing and Exporting Security Group Rules

2

Security group rule replication

You can easily replicate an existing security group rule from one security group to another.

Commercial use

Replicating a Security Group Rule

July 2017

No.

Feature

Description

Phase

Document

1

Custom routes

A custom route is a user-defined routing rule added to a VPC. The route enables ECSs in a VPC that do not have EIPs bound to access the Internet.

Commercial use

Route Table Overview

2

Network ACL

A network access control list (ACL) acts as a firewall for controlling network traffic in and out of a subnet, adding an additional layer of security to your subnets. You can create network ACLs, add inbound and outbound rules, and associate subnets to protect resources in your subnets.

Commercial use

Differences Between Security Groups and Network ACLs

Network ACL Overview

3

VPC peering connections

A VPC peering connection allows two VPCs communicate with each other using private IP addresses as if they were in the same VPC. You can create a VPC peering connection between your own VPCs, or between your VPC and a VPC of another account within the same region.

A VPC peering connection between VPCs in different regions will not take effect.

Commercial use

VPC Peering Connection Overview

March 2016

No.

Feature

Description

Phase

Document

1

VPC

A Virtual Private Cloud (VPC) is a private and isolated virtual network created on HUAWEI CLOUD. The VPC gives you complete control over your virtual network, allowing you to select your own IP address range, create subnets, configure security groups, and even assign EIPs and allocate bandwidth in your network, enabling secure and easy access to your business system.

Application Scenarios:

  • Universal web applications
  • Security-demanding services
  • Extending your corporate network into the cloud

Commercial use

What Is Virtual Private Cloud?