Virtual Private Cloud (VPC) scenario
    • PDF

    Virtual Private Cloud (VPC) scenario

    • PDF

    Article Summary

    Available in VPC

    You can build Virtual Private Cloud (VPC) on NAVER Cloud Platform in a variety of ways, depending on your network environment. Major usage scenarios are as follows.

    Creation of single public subnet

    The creation of a single public subnet scenario is recommended if you'd like to run public web applications on a single tier, such as blogs or simple websites. The configuration is as follows.

    vpc-procedure-vpc_scene1_vpc

    The following is the procedure to implement this scenario.

    1. Create VPC
    2. Create public subnet
    3. Set network ACL
    4. Set route table
    5. Create server

    1. Create VPC

    First of all, create a VPC on the NAVER Cloud Platform console. You can create it on the console's Services > Networking > VPC menu. The IPv4 CIDR block size of a VPC is /16 (e.g., 10.0.0.0/16), and 65,536 IPs can be used.
    You can refer to the following guide:

    2. Create public subnet

    Once you've created the VPC, build a subnet within the VPC so the network can actually be used. You can set up a public subnet for internet communication. Up to 256 IPs can be used (/24), and each server placed in this space can have one public IP connected. (1:1 NAT)
    You can refer to the following guide:

    3. Set network ACL

    Once you've created the subnet, set network Access Control List (ACL) for security, which controls inbound and outbound traffic for the subnet.
    You can refer to the following guide:

    In this scenario, the following settings are recommended for network ACL.

    • Inbound
    PriorityProtocolAccess sourcePortAllow/DenyDescription
    1TCP0.0.0.0/080AllowInbound HTTP traffic allowed
    2TCP0.0.0.0/0443AllowInbound HTTPS traffic allowed
    3TCPConnector IP22AllowInbound SSH traffic via internet gateway from connector IP allowed
    4TCPConnector IP3389AllowInbound RDP traffic via internet gateway from connector IP allowed
    5TCP0.0.0.0/032768-65535AllowInbound return traffic against requests from subnets allowed (the input value is an example.)
    197TCP0.0.0.0/01-65535DenyDeny all traffic except for the rules above
    198UDP0.0.0.0/01-65535DenyDeny all traffic except for the rules above
    199ICMP0.0.0.0/0-DenyDeny all traffic except for the rules above
    • Outbound
    PriorityProtocolAccess sourcePortAllow/DenyDescription
    1TCP0.0.0.0/080AllowOutbound HTTP traffic allowed
    2TCP0.0.0.0/0443AllowOutbound HTTPS traffic allowed
    3TCP0.0.0.0/032768-65535AllowOutbound response to client on internet allowed (the input value is an example.)
    197TCP0.0.0.0/01-65535DenyDeny all traffic except for the rules above
    198UDP0.0.0.0/01-65535DenyDeny all traffic except for the rules above
    199ICMP0.0.0.0/0-DenyDeny all traffic except for the rules above
    Note

    It's recommended to apply the same settings to the Access Control Group (ACG) which controls inbound/outbound server traffic as the network ACL. ACG can be configured in the console's Services > Compute > Server > ACG. For more details, refer to ACG settings guide.

    4. Set route table

    Once you've completed configuring the network ACL, configure a route table which sets the network path. In this scenario, the route table is automatically configured as follows, so the server can communicate with other instances in the VPC or the internet.

    DestinationTarget typeTarget name
    0.0.0.0/0IGWINTERNET GATEWAY
    10.0.0.0/16LOCALLOCAL

    You can refer to the following guide:

    5. Create server

    Once you've completed setting the route table, create a server to place in the VPC created. Select the VPC and subnet previously created when creating the server, and then enter the ACG mentioned above. Once the server has been created, connect to the server, and create a web server. Check if the HTTP communication works.
    You can refer to the following guide:

    Creation of public subnet and private subnet

    The creation of public subnet and private subnet scenario is recommended if you'd like to run public web applications while blocking public access to private servers (e.g., DB). The configuration is as follows.

    vpc-procedure-vpc_scene2_vpc

    The following is the procedure to implement this scenario.

    1. Create VPC
    2. Create public subnet and private subnet
    3. Set network ACL
    4. Set public subnet route table
    5. Create NAT Gateway
    6. Set private subnet route table
    7. Create servers

    1. Create VPC

    First of all, create a VPC on the NAVER Cloud Platform console. You can create it on the console's Services > Networking > VPC menu. The IPv4 CIDR block size of a VPC is /16 (e.g., 10.0.0.0/16), and up to 65,535 IPs can be used.
    You can refer to the following guide:

    2. Creation of public subnet and private subnet

    Once you've created the VPC, build a subnet within the VPC so the network can actually be used. Subnet can be divided into two main categories, public subnet and private subnet.

    • Public subnet: Up to 256 IPs can be used by setting the subnet's CIDR to 10.0.0/24. Each server placed in this space can have one public IP connected. (1:1 NAT)
    • Private subnet: Up to 256 IPs can be used by setting the subnet's CIDR to 10.0.0/24. Servers placed in this space don't receive traffic from the internet. If you add a NAT Gateway to it, then sending and receiving traffic via the internet become available.

    You can refer to the following guide:

    3. Set network ACL

    Once you've created the subnet, set network Access Control List (ACL) for security, which controls inbound and outbound traffic for the subnet.
    You can refer to the following guide:

    In this scenario, the following settings are recommended for network ACL.

    • Public Subnet: Inbound
    PriorityProtocolAccess sourcePortAllow/DenyDescription
    1TCP0.0.0.0/080AllowInbound HTTP traffic allowed
    2TCP0.0.0.0/0443AllowInbound HTTPS traffic allowed
    3TCPConnector IP22AllowInbound SSH traffic via internet gateway from connector IP allowed
    4TCPConnector IP3389AllowInbound RDP traffic via internet gateway from connector IP allowed
    5TCP0.0.0.0/032768-65535AllowInbound return traffic against requests from subnets allowed (the input value is an example.)
    197TCP0.0.0.0/01-65535DenyDeny all traffic except for the rules above
    198UDP0.0.0.0/01-65535DenyDeny all traffic except for the rules above
    199ICMP0.0.0.0/0-DenyDeny all traffic except for the rules above
    • Public Subnet: Outbound
    PriorityProtocolAccess sourcePortAllow/DenyDescription
    1TCP0.0.0.0/080AllowOutbound HTTP traffic allowed
    2TCP0.0.0.0/0443AllowOutbound HTTPS traffic allowed
    3TCP0.0.0.0/032768-65535AllowOutbound response to client on internet allowed (the input value is an example.)
    4TCPPrivate server's private IPPrivate server port
    (e.g., DB)
    AllowTraffic to communicate with private server allowed
    197TCP0.0.0.0/01-65535DenyDeny all traffic except for the rules above
    198UDP0.0.0.0/01-65535DenyDeny all traffic except for the rules above
    199ICMP0.0.0.0/0-DenyDeny all traffic except for the rules above
    • Private Subnet: Inbound
    PriorityProtocolAccess sourcePortAllow/DenyDescription
    1TCPPublic subnet server's private IPPrivate server port
    (e.g., DB)
    AllowTraffic to communicate with public server allowed
    2TCP0.0.0.0/032768-65535AllowInbound return traffic against requests sent via the internet (the input value is an example.)
    197TCP0.0.0.0/01-65535DenyDeny all traffic except for the rules above
    198UDP0.0.0.0/01-65535DenyDeny all traffic except for the rules above
    199ICMP0.0.0.0/0-DenyDeny all traffic except for the rules above
    • Private Subnet: Outbound
    PriorityProtocolAccess sourcePortAllow/DenyDescription
    1TCPPublic subnet server's private IP32768-65535AllowOutbound response from public server to private server allowed (the input value is an example.)
    197TCP0.0.0.0/01-65535DenyDeny all traffic except for the rules above
    198UDP0.0.0.0/01-65535DenyDeny all traffic except for the rules above
    199ICMP0.0.0.0/0-DenyDeny all traffic except for the rules above
    Note

    It's recommended to apply the same settings to the Access Control Group (ACG) which controls inbound/outbound server traffic as the network ACL. ACG can be configured in the console's Services > Compute > Server > ACG. For more details, refer to ACG settings guide.

    4. Set public subnet route table

    Once you've completed configuring the network ACL, configure a route table which sets the network path. In this scenario, the public subnet route table is automatically configured as follows, so the server can communicate with other instances in the VPC or the internet.

    DestinationTarget typeTarget name
    0.0.0.0/0IGWINTERNET GATEWAY
    10.0.0.0/16LOCALLOCAL

    You can refer to the following guide:

    5. Create NAT Gateway

    Create a NAT Gateway to connect servers in a private subnet to the internet.
    You can refer to the following guide:

    6. Set private subnet route table

    Only local items are automatically configured for the private subnet route table, so you have to set the NAT Gateway's network path separately. If communication with the entire internet site is required, then you can enter 0.0.0.0/0 as the destination and configure as follows.

    DestinationTarget typeTarget name
    0.0.0.0/0NATGWThe NAT Gateway name set
    10.0.0.0/16LOCALLOCAL

    You can refer to the following guide:

    7. Create server

    Once you've completed setting the route table, create a server to place in the VPC created. Select the VPC and subnet previously created when creating the server, and then enter the ACG mentioned above. Once the server has been created, connect to the server, and create a web server. Check if the HTTP communication works.
    You can refer to the following guide:

    Creation of public subnet and private subnet for on-premise connection

    The creation of public subnet and private subnet for on-premise connection scenario is recommended if you'd like to run public web applications while communicating with the customer's business place. The configuration is as follows.

    vpc-procedure-vpc_scene3_vpc

    The following is the procedure to implement this scenario.

    1. Create VPC
    2. Create public subnet and private subnet
    3. Set network ACL
    4. Set public subnet route table
    5. Create Virtual Private Gateway
    6. Create IPsec VPN
    7. Set private subnet route table
    8. Create server

    1. Create VPC

    First of all, create a VPC on the NAVER Cloud Platform console. You can create it on the console's Services > Networking > VPC menu. The IPv4 CIDR block size of a VPC is /16 (e.g., 10.0.0.0/16), and 65,536 IPs can be used.
    You can refer to the following guide:

    2. Creation of public subnet and private subnet

    Once you've created the VPC, build a subnet within the VPC so the network can actually be used. Subnet can be divided into two main categories, public subnet and private subnet.

    • Public subnet: Up to 256 IPs can be used by setting the subnet's CIDR to 10.0.0/24. Each server placed in this space can have one public IP connected. (1:1 NAT)
    • Private subnet: Up to 256 IPs can be used by setting the subnet's CIDR to 10.0.0/24. Servers placed in this space don't receive traffic from the internet. If you add a NAT Gateway to it, then sending and receiving traffic via the internet become available.

    You can refer to the following guide:

    3. Set network ACL

    Once you've created the subnet, set network Access Control List (ACL) for security, which controls inbound and outbound traffic for the subnet.
    You can refer to the following guide:

    In this scenario, the following settings are recommended for network ACL.

    • Public Subnet: Inbound
    PriorityProtocolAccess sourcePortAllow/DenyDescription
    1TCP0.0.0.0/080AllowInbound HTTP traffic allowed
    2TCP0.0.0.0/0443AllowInbound HTTPS traffic allowed
    3TCPConnector IP22AllowInbound SSH traffic via internet gateway from connector IP allowed
    4TCPConnector IP3389AllowInbound RDP traffic via internet gateway from connector IP allowed
    5TCP0.0.0.0/032768-65535AllowInbound return traffic against requests from subnets allowed (the input value is an example.)
    197TCP0.0.0.0/01-65535DenyDeny all traffic except for the rules above
    198UDP0.0.0.0/01-65535DenyDeny all traffic except for the rules above
    199ICMP0.0.0.0/0-DenyDeny all traffic except for the rules above
    • Public Subnet: Outbound
    PriorityProtocolAccess sourcePortAllow/DenyDescription
    1TCP0.0.0.0/080AllowOutbound HTTP traffic allowed
    2TCP0.0.0.0/0443AllowOutbound HTTPS traffic allowed
    3TCP0.0.0.0/032768-65535AllowOutbound response to client on internet allowed (the input value is an example.)
    4TCPPrivate server's private IPPrivate server port
    (e.g., DB)
    AllowTraffic to communicate with private server allowed
    197TCP0.0.0.0/01-65535DenyDeny all traffic except for the rules above
    198UDP0.0.0.0/01-65535DenyDeny all traffic except for the rules above
    199ICMP0.0.0.0/0-DenyDeny all traffic except for the rules above
    • Private Subnet: Inbound
    PriorityProtocolAccess sourcePortAllow/DenyDescription
    1TCPPublic subnet server's private IPPrivate server port
    (e.g., DB)
    AllowTraffic to communicate with public server allowed
    2TCPCustomer server's private IPCustomer server portAllowTraffic to communicate with customer's on-premise server allowed
    197TCP0.0.0.0/01-65535DenyDeny all traffic except for the rules above
    198UDP0.0.0.0/01-65535DenyDeny all traffic except for the rules above
    199ICMP0.0.0.0/0-DenyDeny all traffic except for the rules above
    • Private Subnet: Outbound
    PriorityProtocolAccess sourcePortAllow/DenyDescription
    1TCPPublic subnet server's private IP32768-65535AllowOutbound response from public server to private server allowed (the input value is an example.)
    2TCPCustomer server's private IPCustomer server portAllowTraffic to communicate with customer's on-premise server allowed
    197TCP0.0.0.0/01-65535DenyDeny all traffic except for the rules above
    198UDP0.0.0.0/01-65535DenyDeny all traffic except for the rules above
    199ICMP0.0.0.0/0-DenyDeny all traffic except for the rules above
    Note

    It's recommended to apply the same settings to the Access Control Group (ACG) which controls inbound/outbound server traffic as the network ACL. ACG can be configured in the console's Services > Compute > Server > ACG. For more details, refer to ACG settings guide.

    4. Set public subnet route table

    Once you've completed configuring the network ACL, configure a route table which sets the network path. In this scenario, the public subnet route table is automatically configured as follows, so the server can communicate with other instances in the VPC or the internet.

    DestinationTarget typeTarget name
    0.0.0.0/0IGWINTERNET GATEWAY
    10.0.0.0/16LOCALLOCAL

    You can refer to the following guide:

    5. Create Virtual Private Gateway

    Create a Virtual Private Gateway to connect servers in a private subnet to customer's on-premise server.
    You can refer to the following guide:

    6. Create IPsec VPN

    To create a managed IPsec VPN, fill in a subscription request form and submit it via the sales representative in charge or customer inquiry. (the process planned to be automated later)
    The subscription request form can be downloaded from the portal's Support > Library.
    Proceed with the following steps once you receive the confirmation the subscription has started.
    (Currently, the subscription is started manually after receiving the form. We plan to launch the automated product soon.)

    7. Set private subnet route table

    Only local items are automatically configured for the private subnet route table, so you have to set the Virtual Private Gateway's network path separately. You can use the customer's on-premise server as the destination and configure as follows.

    DestinationTarget typeTarget name
    Customer server's private IPVGWThe Virtual Private Gateway name set
    10.0.0.0/16LOCALLOCAL

    You can refer to the following guide:

    8. Create server

    Once you've completed setting the route table, create a server to place in the VPC created. Select the VPC and subnet previously created when creating the server, and then enter the ACG mentioned above. Once the server has been created, connect to the server, and create a web server. Check if the HTTP communication works.
    You can refer to the following guide:

    Inter-VPC private network (peering) configuration

    This is recommended if you would like to set up a private communication channel between two different VPCs. Essentially, communication is possible via public IPs. However a private network is built for security and stability.
    This scenario is based on a situation where a connection is to be set up between VPC A with Subnets A and B, and VPC B with Subnets C and D. The configuration is as follows.
    vpc-procedure-vpc_scene4_vpc

    The following is the procedure to implement this scenario.

    1. Create VPC
    2. Create subnet
    3. Set network ACL
    4. Create VPC peering
    5. Set route table
    6. Create server

    Caution

    When configuring network ACL and route table, the configuration method may slightly vary including how you enter the IP range information for the VPC on the other side.

    1. Create VPC

    First of all, create two VPCs on the NAVER Cloud Platform console. You can create it on the console's Services > Networking > VPC menu. The IPv4 CIDR block size of each VPC is /16 (e.g., 10.0.0.0/16), and 65,536 IPs can be used.
    You can refer to the following guide:

    2. Create subnet

    Once you've created the VPC, build a subnet within the VPC so the network can actually be used. Subnet can be divided into two main categories, public subnet and private subnet.

    • Public subnet: Up to 256 IPs can be used by setting the subnet's CIDR to 10.0.0/24. Each server placed in this space can have one public IP connected. (1:1 NAT)

    • Private subnet: Up to 256 IPs can be used by setting the subnet's CIDR to 10.0.0/24. Servers placed in this space don't receive traffic from the internet. If you add a NAT Gateway to it, then sending and receiving traffic via the internet become available.

    • Subnet creation guide

    3. Set network ACL

    Set network Access Control List (ACL) to control inbound and outbound traffic for the subnet. The subnet in the VPC that will request peering needs to set network ACL to allow traffic to the VPC on the other side.
    You can refer to the following guide:

    In this scenario, the following settings are recommended for network ACL.

    • Inbound
    PriorityProtocolAccess sourcePortAllow/DenyDescription
    1TCP172.16.0.0/161-65535AllowInbound communication for the peering VPC's IP range allowed (the input value is an example.)
    2TCP0.0.0.0/032768-65535AllowInbound return traffic against requests from subnets allowed (the input value is an example.)
    197TCP0.0.0.0/01-65535DenyDeny all traffic except for the rules above
    198UDP0.0.0.0/01-65535DenyDeny all traffic except for the rules above
    199ICMP0.0.0.0/0-DenyDeny all traffic except for the rules above
    • Outbound
    PriorityProtocolAccess sourcePortAllow/DenyDescription
    1TCP172.16.0.0/161-65535AllowOutbound communication for the peering VPC's IP range allowed (the input value is an example.)
    2TCP0.0.0.0/032768-65535AllowOutbound response to client on internet allowed (the input value is an example.)
    197TCP0.0.0.0/01-65535DenyDeny all traffic except for the rules above
    198UDP0.0.0.0/01-65535DenyDeny all traffic except for the rules above
    199ICMP0.0.0.0/0-DenyDeny all traffic except for the rules above
    Note

    It's recommended to apply the same settings to the Access Control Group (ACG) which controls inbound/outbound server traffic as the network ACL. ACG can be configured in the console's Services > Compute > Server > ACG. For more details, refer to ACG settings guide.

    4. Create VPC peering

    Once you've set up the network ACL, request inter-VPC communication through the VPC peering menu. It's an one-way communication, so the requesting VPC and accepting VPC need to be specified. The accepting VPC can be another VPC in your account, or a VPC in another account. If you'd like the communication to be two-way, then create two networks by specifying the requesting VPC and accepting VPC in reverse.
    You can refer to the following guide:

    5. Set route table

    After creating the VPC peering, configure a route table which sets the network path. The subnet in the VPC that requested peering needs to set routing to the VPC on the other side. If Subnet A (public subnet) in VPC A requested peering to VPC B's Subnet C, then the route table can be configured as follows.

    DestinationTarget typeTarget name
    VPC B's IP rangeVPCPEERINGThe name of VPC peering set
    0.0.0.0/0IGWINTERNET GATEWAY
    10.0.0.0/16LOCALLOCAL

    You can refer to the following guide:

    6. Create server

    Once you've completed setting the route table, create a server in each of the two VPCs created. Select the VPC and subnet previously created when creating the server, and then enter the ACG mentioned above. Once the server has been created, connect to the server, and create a web server. Check if the HTTP communication works.
    You can refer to the following guide:


    Was this article helpful?

    Changing your password will log you out immediately. Use the new password to log back in.
    First name must have atleast 2 characters. Numbers and special characters are not allowed.
    Last name must have atleast 1 characters. Numbers and special characters are not allowed.
    Enter a valid email
    Enter a valid password
    Your profile has been successfully updated.