Product Introduction
Introduction to Private Network
Private Network VPC (Virtual Private Cloud) is a logically isolated network environment that belongs to users. In the private network, you can create a VPC with a designated network segment, create subnets in the VPC, and independently manage cloud resources. At the same time, it provides secure protection through network ACL. Private network VPC provides the following capabilities for users:
- Custom network segment: three types of network segments can be freely combined, and the VPC network segment can be increased or decreased at any time.
- Comprehensive network management: Gateway NAT, custom routing table, network ACL, internal virtual IP, and virtual network card. Users can freely choose to configure, and set rules according to needs.
- Subnet across availability zones: The subnet can cover any available zone within the region to achieve disaster recovery across availability zones.
- High scalability: VPCs across different regions can be connected through a high-speed channel (UDPN) to achieve stable internal network transmission; combined with dedicated line access, a hybrid cloud architecture with single point access and global interconnection can be realized.
If the business might involve multiple networks, it is recommended to plan the network in advance. [VPC Planning Suggestions](/docs/vpc/configurationguide/vpcguide#VPC Rules Suggestions)
Private Network Components
The private network includes components such as VPC, subnet, NAT gateway, and network ACL:
VPC: VPC is a logically isolated network environment that belongs to users. In the private network, you can create a VPC with a designated network segment, create a subnet in the VPC, and independently manage cloud resources.
Subnet: To scientifically and effectively divide the address space within the VPC, it is divided into smaller network segments. These independent network segments are called subnets.
NAT Gateway: The NAT gateway is an enterprise-level VPC public network gateway. It allows cloud resources in subnets that are not bound to Elastic IPs to access the external network. Additionally, port forwarding rules can be configured to enable these cloud resources to provide services to the outside world.
Network ACL: It is a subnet-level security policy used to control the data flow into and out of the subnet. Users can accurately control the traffic into and out of the subnet by setting outbound and inbound rules.
Routing Table: The routing table is a product at the VPC level that can control the network traffic path of cloud resources. A routing table consists of multiple routing rules, which take effect for all resources in the subnet by binding with the subnet.