VPC (Virtual Private Cloud) quickstart

Prev Next

Available in VPC

You can build VPC (Virtual Private Cloud) on the NAVER Cloud Platform in various ways depending on your network environment. The main quickstarts are as follows:

Create a single public subnet

You should use the single public subnet quickstart when you want to run a single-tier public web application, such as a blog or a simple website. The configuration is as follows:

vpc-procedure-vpc_scene1_vpc

The following is the procedure to implement this quickstart:

1. Create VPC
2. Create Public Subnet
3. Configure Network ACL
4. Configure Route Table
5. Create server

1. Create VPC

As the first step, create a VPC in the NAVER Cloud Platform console. You can create a VPC in the i_menu > Services > Networking > VPC menu. You use a /16 IPv4 CIDR block (Example: 10.0.0.0/16) for a VPC, which gives you 65,536 IP addresses.
For detailed instructions, see:

2. Create Public Subnet

Once you've finished creating a VPC, build a subnet in the VPC so that you can practically use the network. You can build a public subnet for internet communication. You can use up to 256 IP addresses with a maximum /24 block, and you can associate one public IP address with each server deployed in this subnet. (1:1 NAT)
For detailed instructions, see:

3. Configure Network ACL

After you create a subnet, you configure Network ACL (Access Control List) to control inbound and outbound traffic for the subnet and enhance security.
For detailed instructions, see:

In this quickstart, you should configure Network ACL as follows:

  • Inbound
Priority Protocol Access source Port Acceptability Description
1 TCP 0.0.0.0/0 80 Acceptability Accept inbound HTTP traffic.
2 TCP 0.0.0.0/0 443 Acceptability Accept inbound HTTPS traffic.
3 TCP Client IP 22 Acceptability Accept SSH traffic from the client IP through the Internet Gateway.
4 TCP Client IP 3389 Acceptability Accept RDP traffic from the client IP through the Internet Gateway.
5 TCP 0.0.0.0/0 32768-65535 Acceptability Accept inbound return traffic for requests originating from the subnet (example values).
197 TCP 0.0.0.0/0 1-65535 Block Block all remaining traffic except the rules above.
198 UDP 0.0.0.0/0 1-65535 Block Block all remaining traffic except the rules above.
199 ICMP 0.0.0.0/0 - Block Block all remaining traffic except the rules above.
  • Outbound
Priority Protocol Access source Port Acceptability Description
1 TCP 0.0.0.0/0 80 Acceptability Accept outbound HTTP traffic.
2 TCP 0.0.0.0/0 443 Acceptability Accept outbound HTTPS traffic.
3 TCP 0.0.0.0/0 32768-65535 Acceptability Accept outbound responses from the internet to the client (example values).
197 TCP 0.0.0.0/0 1-65535 Block Block all remaining traffic except the rules above.
198 UDP 0.0.0.0/0 1-65535 Block Block all remaining traffic except the rules above.
199 ICMP 0.0.0.0/0 - Block Block all remaining traffic except the rules above.
Note

You should configure Access Control Group (ACG), which controls inbound and outbound traffic for servers, using the same rules as Network ACL. You can configure ACG in the VPC environment of the console under i_menu > Services > Compute > Server > ACG. For more information, see ACG configuration method guide.

4. Configure Route Table

After you complete Network ACL configuration, you set up a route table to define network paths. In this quickstart, the system automatically sets up the following route table so that your servers can communicate with other instances in the VPC or with the internet.

Destination point Target type Target name
0.0.0.0/0 IGW INTERNET GATEWAY
10.0.0.0/16 LOCAL LOCAL

For detailed instructions, see:

5. Create server

After you complete the route table configuration, you create a server to deploy within the VPC you created. When you create the server, select the VPC and subnet you created earlier and specify the ACG mentioned above. After you complete server creation, connect to the server, set up a web server, and verify that HTTP communication works.
For detailed instructions, see:

Create public subnet and private subnet

You should use the public and private subnet quickstart when you want to block public access to private servers (Example: Databases) and run a public web application. The configuration is as follows:

vpc-procedure-vpc_scene2_vpc

The following is the procedure to implement this quickstart:

1. Create VPC
2. Create public subnet and private subnet
3. Configure Network ACL
4. Configure Public Subnet Route Table
5. Create NAT Gateway
6. Configure Private Subnet Route Table
7. Create server

1. Create VPC

As the first step, create a VPC in the NAVER Cloud Platform console. You can create a VPC in the i_menu > Services > Networking > VPC menu. You use a /16 IPv4 CIDR block (Example: 10.0.0.0/16) for a VPC, which gives you up to 65,535 IP addresses.
For detailed instructions, see:

2. Create public subnet and private subnet

Once you've finished creating a VPC, build a subnet in the VPC so that you can practically use the network. Subnets are primarily classified into Public Subnets and Private Subnets.

  • Public Subnet: You set the subnet CIDR to 10.0.0/24 and use up to 256 IP addresses, and you can associate one public IP address with each server deployed in this subnet. (1:1 NAT)
  • Private Subnet: You set the subnet CIDR to 10.0.0/24 and use up to 256 IP addresses, and servers deployed in this subnet do not accept inbound traffic from the internet. When you add a NAT Gateway, you can send outbound traffic to the internet.

For detailed instructions, see:

3. Configure Network ACL

After you create a subnet, you configure Network ACL (Access Control List) to control inbound and outbound traffic for the subnet and enhance security.
For detailed instructions, see:

In this quickstart, you should configure Network ACL as follows:

  • Public Subnet: Inbound
Priority Protocol Access source Port Acceptability Description
1 TCP 0.0.0.0/0 80 Acceptability Accept inbound HTTP traffic.
2 TCP 0.0.0.0/0 443 Acceptability Accept inbound HTTPS traffic.
3 TCP Client IP 22 Acceptability Accept SSH traffic from the client IP through the Internet Gateway.
4 TCP Client IP 3389 Acceptability Accept RDP traffic from the client IP through the Internet Gateway.
5 TCP 0.0.0.0/0 32768-65535 Acceptability Accept inbound return traffic for requests originating from the subnet (example values).
197 TCP 0.0.0.0/0 1-65535 Block Block all remaining traffic except the rules above.
198 UDP 0.0.0.0/0 1-65535 Block Block all remaining traffic except the rules above.
199 ICMP 0.0.0.0/0 - Block Block all remaining traffic except the rules above.
  • Public Subnet: Outbound
Priority Protocol Access source Port Acceptability Description
1 TCP 0.0.0.0/0 80 Acceptability Accept outbound HTTP traffic.
2 TCP 0.0.0.0/0 443 Acceptability Accept outbound HTTPS traffic.
3 TCP 0.0.0.0/0 32768-65535 Acceptability Accept outbound responses from the internet to the client (example values).
4 TCP Private server's private IP Private server port
(Example: DB)
Acceptability Accept traffic to communicate with the private server.
197 TCP 0.0.0.0/0 1-65535 Block Block all remaining traffic except the rules above.
198 UDP 0.0.0.0/0 1-65535 Block Block all remaining traffic except the rules above.
199 ICMP 0.0.0.0/0 - Block Block all remaining traffic except the rules above.
  • Private Subnet: Inbound
Priority Protocol Access source Port Acceptability Description
1 TCP Public subnet server's private IP Private server port
(Example: DB)
Acceptability Accept traffic to communicate with the public server.
2 TCP 0.0.0.0/0 32768-65535 Acceptability Accept inbound return traffic for requests originating from the internet (example values).
197 TCP 0.0.0.0/0 1-65535 Block Block all remaining traffic except the rules above.
198 UDP 0.0.0.0/0 1-65535 Block Block all remaining traffic except the rules above.
199 ICMP 0.0.0.0/0 - Block Block all remaining traffic except the rules above.
  • Private Subnet: Outbound
Priority Protocol Access source Port Acceptability Description
1 TCP Public subnet server's private IP 32768-65535 Acceptability Accept outbound responses from the public server to the private server (example values).
197 TCP 0.0.0.0/0 1-65535 Block Block all remaining traffic except the rules above.
198 UDP 0.0.0.0/0 1-65535 Block Block all remaining traffic except the rules above.
199 ICMP 0.0.0.0/0 - Block Block all remaining traffic except the rules above.
Note

You should configure Access Control Group (ACG), which controls inbound and outbound traffic for servers, using the same rules as Network ACL. You can configure ACG in the VPC environment of the console under i_menu > Services > Compute > Server > ACG. For more information, see ACG configuration method guide.

4. Configure public subnet route table

After you complete Network ACL configuration, you set up a route table to define network paths. In this quickstart, the system automatically sets up the public subnet route table so that servers can communicate with other instances in the VPC or with the internet.

Destination point Target type Target name
0.0.0.0/0 IGW INTERNET GATEWAY
10.0.0.0/16 LOCAL LOCAL

For detailed instructions, see:

5. Create NAT Gateway

You create a NAT Gateway to connect servers in the private subnet to the internet.
For detailed instructions, see:

6. Configure private subnet route table

Because the private subnet route table includes only the local route by default, configure the NAT Gateway network route separately. If you need to communicate with all internet sites, set the destination to 0.0.0.0/0:

Destination point Target type Target name
0.0.0.0/0 NATGW The name of NAT Gateway to be configured
10.0.0.0/16 LOCAL LOCAL

For detailed instructions, see:

7. Create server

After you complete the route table configuration, you create a server to deploy within the VPC you created. When you create the server, select the VPC and subnet you created earlier and specify the ACG mentioned above. After you complete server creation, connect to the server, set up a web server, and verify that HTTP communication works.
For detailed instructions, see:

Create a public subnet and a private subnet for on-premise connectivity

Use the public subnet and on-premise–connected private subnet quickstart when you want to run a public web application and communicate with your on-premise environment. The configuration is as follows:

vpc-procedure-vpc_scene3_vpc

The following is the procedure to implement this quickstart:

1. Create VPC
2. Create public subnet and private subnet
3. Configure Network ACL
4. Configure Public Subnet Route Table
5. Create Virtual Private Gateway
6. Create IPsec VPN
7. Configure Private Subnet Route Table
8. Create server

1. Create VPC

As the first step, create a VPC in the NAVER Cloud Platform console. You can create a VPC in the i_menu > Services > Networking > VPC menu. You use a /16 IPv4 CIDR block (Example: 10.0.0.0/16) for a VPC, which gives you 65,536 IP addresses.
For detailed instructions, see:

2. Create public subnet and private subnet

Once you've finished creating a VPC, build a subnet in the VPC so that you can practically use the network. Subnets are primarily classified into Public Subnets and Private Subnets.

  • Public Subnet: You set the subnet CIDR to 10.0.0/24 and use up to 256 IP addresses, and you can associate one public IP address with each server deployed in this subnet. (1:1 NAT)
  • Private Subnet: You set the subnet CIDR to 10.0.0/24 and use up to 256 IP addresses, and servers deployed in this subnet do not accept inbound traffic from the internet. When you add a NAT Gateway, you can send outbound traffic to the internet.

For detailed instructions, see:

3. Configure Network ACL

After you create a subnet, you configure Network ACL (Access Control List) to control inbound and outbound traffic for the subnet and enhance security.
For detailed instructions, see:

In this quickstart, you should configure Network ACL as follows:

  • Public Subnet: Inbound
Priority Protocol Access source Port Acceptability Description
1 TCP 0.0.0.0/0 80 Acceptability Accept inbound HTTP traffic.
2 TCP 0.0.0.0/0 443 Acceptability Accept inbound HTTPS traffic.
3 TCP Client IP 22 Acceptability Accept SSH traffic from the client IP through the Internet Gateway.
4 TCP Client IP 3389 Acceptability Accept RDP traffic from the client IP through the Internet Gateway.
5 TCP 0.0.0.0/0 32768-65535 Acceptability Accept inbound return traffic for requests originating from the subnet (example values).
197 TCP 0.0.0.0/0 1-65535 Block Block all remaining traffic except the rules above.
198 UDP 0.0.0.0/0 1-65535 Block Block all remaining traffic except the rules above.
199 ICMP 0.0.0.0/0 - Block Block all remaining traffic except the rules above.
  • Public Subnet: Outbound
Priority Protocol Access source Port Acceptability Description
1 TCP 0.0.0.0/0 80 Acceptability Accept outbound HTTP traffic.
2 TCP 0.0.0.0/0 443 Acceptability Accept outbound HTTPS traffic.
3 TCP 0.0.0.0/0 32768-65535 Acceptability Accept outbound responses from the internet to the client (example values).
4 TCP Private server's private IP Private server port
(Example: DB)
Acceptability Accept traffic to communicate with the private server.
197 TCP 0.0.0.0/0 1-65535 Block Block all remaining traffic except the rules above.
198 UDP 0.0.0.0/0 1-65535 Block Block all remaining traffic except the rules above.
199 ICMP 0.0.0.0/0 - Block Block all remaining traffic except the rules above.
  • Private Subnet: Inbound
Priority Protocol Access source Port Acceptability Description
1 TCP Public subnet server's private IP Private server port
(Example: DB)
Acceptability Accept traffic to communicate with the public server.
2 TCP Customer server's private IP Customer server port Acceptability Accept traffic to communicate with the customer’s on-premise server.
197 TCP 0.0.0.0/0 1-65535 Block Block all remaining traffic except the rules above.
198 UDP 0.0.0.0/0 1-65535 Block Block all remaining traffic except the rules above.
199 ICMP 0.0.0.0/0 - Block Block all remaining traffic except the rules above.
  • Private Subnet: Outbound
Priority Protocol Access source Port Acceptability Description
1 TCP Public subnet server's private IP 32768-65535 Acceptability Accept outbound responses from the public server to the private server (example values).
2 TCP Customer server's private IP Customer server port Acceptability Accept traffic to communicate with the customer’s on-premise server.
197 TCP 0.0.0.0/0 1-65535 Block Block all remaining traffic except the rules above.
198 UDP 0.0.0.0/0 1-65535 Block Block all remaining traffic except the rules above.
199 ICMP 0.0.0.0/0 - Block Block all remaining traffic except the rules above.
Note

You should configure Access Control Group (ACG), which controls inbound and outbound traffic for servers, using the same rules as Network ACL. You can configure ACG in the VPC environment of the console under i_menu > Services > Compute > Server > ACG. For more information, see ACG configuration method guide.

4. Configure public subnet route table

After you complete Network ACL configuration, you set up a route table to define network paths. In this quickstart, the system automatically sets up the public subnet route table so that servers can communicate with other instances in the VPC or with the internet.

Destination point Target type Target name
0.0.0.0/0 IGW INTERNET GATEWAY
10.0.0.0/16 LOCAL LOCAL

For detailed instructions, see:

5. Create Virtual Private Gateway

Create a Virtual Private Gateway to connect servers in the private subnet to the customer’s on-premise server.
For detailed instructions, see:

6. Create IPsec VPN

To create a managed IPsec VPN, complete a service application form and submit it through your account manager or customer support. (Automation is planned.)
Download the service application form from Customer Support > Resources in the portal.
After you receive the service activation notice, proceed to the next step.
(Currently, the team performs service activation manually after you submit the application form. We plan to release an automated offering in the near future.)

7. Configure private subnet route table

Because the private subnet route table includes only the local route by default, configure the Virtual Private Gateway network route separately. To set the destination to the customer’s on-premise server:

Destination point Target type Target name
Customer server's private IP VGW Configured Virtual Private Gateway name
10.0.0.0/16 LOCAL LOCAL

For detailed instructions, see:

8. Create server

After you complete the route table configuration, you create a server to deploy within the VPC you created. When you create the server, select the VPC and subnet you created earlier and specify the ACG mentioned above. After you complete server creation, connect to the server, set up a web server, and verify that HTTP communication works.
For detailed instructions, see:

Configure a private network (peering) between VPCs

Use this quickstart when you want to set up private communication between two different VPCs. Although you can communicate using public IP addresses by default, build a private network for better security and stability.
This quickstart explains a quickstart that connects VPC A and VPC B. The configuration is as follows:
vpc-procedure-vpc_scene4_vpc

The following is the procedure to implement this quickstart:

1. Create VPC
2. Create Subnet
3. Configure Network ACL
4. Create VPC Peering
5. Configure Route Table
6. Create server

Caution

When you configure Network ACL and the route table, some settings may differ, such as how you enter the peer VPC IP address range.

1. Create VPC

First, create two VPCs in the NAVER Cloud Platform console. You can create a VPC in the i_menu > Services > Networking > VPC menu. Each VPC uses a /16 IPv4 CIDR block (Example: 10.0.0.0/16), which provides 65,536 IP addresses.
For detailed instructions, see:

2. Create Subnet

Once you've finished creating a VPC, build a subnet in the VPC so that you can practically use the network.

3. Configure Network ACL

Configure Network Access Control List (ACL) to control inbound and outbound traffic for the subnet. For the subnet of the VPC that requests peering, allow Network ACL traffic to the peer VPC.
For detailed instructions, see:

In this quickstart, you should configure Network ACL as follows:

  • Inbound
Priority Protocol Access source Port Acceptability Description
1 TCP 172.16.0.0/16 1-65535 Acceptability Accept inbound communication from the peering VPC IP range (example values).
2 TCP 0.0.0.0/0 32768-65535 Acceptability Accept inbound return traffic for requests originating from the subnet (example values).
197 TCP 0.0.0.0/0 1-65535 Block Block all remaining traffic except the rules above.
198 UDP 0.0.0.0/0 1-65535 Block Block all remaining traffic except the rules above.
199 ICMP 0.0.0.0/0 - Block Block all remaining traffic except the rules above.
  • Outbound
Priority Protocol Access source Port Acceptability Description
1 TCP 172.16.0.0/16 1-65535 Acceptability Accept outbound communication from the peering VPC IP range (example values).
2 TCP 0.0.0.0/0 32768-65535 Acceptability Accept outbound responses from the internet to the client (example values).
197 TCP 0.0.0.0/0 1-65535 Block Block all remaining traffic except the rules above.
198 UDP 0.0.0.0/0 1-65535 Block Block all remaining traffic except the rules above.
199 ICMP 0.0.0.0/0 - Block Block all remaining traffic except the rules above.
Note

You should configure Access Control Group (ACG), which controls inbound and outbound traffic for servers, using the same rules as Network ACL. You can configure ACG in the VPC environment of the console under i_menu > Services > Compute > Server > ACG. For more information, see ACG configuration method guide.

4. Create VPC Peering

After you complete Network ACL configuration, request VPC-to-VPC communication through the VPC Peering menu. Because peering provides one-way communication, specify a requesting VPC and an accepting VPC. You can set the accepting VPC to another VPC in your account or to a VPC in a different account. If you need bidirectional communication, reverse the requesting and accepting VPCs and create two peering connections.
For detailed instructions, see:

5. Configure Route Table

After you create VPC peering, configure a route table to define network paths. Configure routing from the subnet of the requesting VPC to the peer VPC. If you request peering from Subnet A in VPC A to Subnet C in VPC B, configure the route table:

Destination point Target type Target name
IP range of VPC B VPCPEERING Configured VPC peering name
0.0.0.0/0 IGW INTERNET GATEWAY
10.0.0.0/16 LOCAL LOCAL

For detailed instructions, see:

6. Create server

After you complete the route table configuration, create a server in each of the two VPCs you created. When you create the server, select the VPC and subnet you created earlier and specify the ACG mentioned above. After you complete server creation, connect to the server, set up a web server, and verify that HTTP communication works.
For detailed instructions, see: