Preparing Required Resources
Overview
Before creating a ROMA Connect instance, you need to ensure availability of resources, including a virtual private cloud (VPC), subnet, and security group. Each ROMA Connect instance is deployed in a VPC and bound to specific subnets and security groups. In this way, ROMA Connect provides an isolated virtual network environment and security protection policies that can be easily configured and managed by users.
Required Resources
The following table lists the resources required by a ROMA Connect instance.
Resource |
Requirement |
Operations |
---|---|---|
VPC and subnet |
Different ROMA Connect instances can use the same or different VPCs and subnets based on site requirements. Note the following when creating a VPC and subnet:
|
For details about how to create a VPC and subnet, see Creating a VPC. If you need to create and use a new subnet in an existing VPC, see Creating a Subnet for the VPC. |
Security group |
Different ROMA Connect instances can use the same security group or different security groups. Note the following when creating a security group:
|
For details about how to create a security group, see Creating a Security Group. For details about how to add rules to a security group, see Adding a Security Group Rule. |
(Optional) EIP |
If you want to access ROMA Connect through a public network, apply for an EIP. An instance needs to be bound to only one EIP. |
For details about how to assign an EIP, see Assigning an EIP. |
Direction |
Protocol |
Port |
Source IP Address |
Description |
---|---|---|---|---|
Inbound |
TCP |
80 |
0.0.0.0/0 |
Access APIC through a public network (without SSL encryption). |
Inbound |
TCP |
443 |
0.0.0.0/0 |
Access APIC through a public network (with SSL encryption). |
Inbound |
TCP |
1883 |
0.0.0.0/0 |
Access LINK through a public network (without SSL encryption). |
Inbound |
TCP |
7443 |
0.0.0.0/0 |
Access LINK through a public network (using RESTful APIs). |
Inbound |
TCP |
8443 |
0.0.0.0/0 |
Access LINK through a public network (with SSL encryption). |
Inbound |
TCP |
9092 |
0.0.0.0/0 |
Access MQS through a private network (without SASL authentication). |
Inbound |
TCP |
9093 |
0.0.0.0/0 |
Access MQS through a private network (with SASL authentication). |
Inbound |
TCP |
9094 |
0.0.0.0/0 |
Access MQS through a public network (without SASL authentication). |
Inbound |
TCP |
9095 |
0.0.0.0/0 |
Access MQS through a public network (with or without SASL authentication). |
Inbound |
TCP |
9096 |
0.0.0.0/0 |
Access MQS through a public network (with or without SASL authentication). |
Inbound |
TCP |
9097 |
0.0.0.0/0 |
Access MQS through a public network (with SASL authentication). |
Inbound |
TCP |
9292 |
0.0.0.0/0 |
Access MQS through a public network (using RESTful APIs). |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot