Components of the Oracle Cloud Infrastructure Network
by Rackspace Technology Staff
Introduction
This post gives an overview of the components that are part of the Oracle® Cloud Infrastructure (OCI) network.
An OCI network comprises the following components:
- Virtual Cloud Network
- Subnet
- Virtual network interface card
- Security Lists
- Route tables
- Route rules
Virtual Cloud Network
You need to create a Virtual Cloud Network (VCN) before you launch an instance to work in an OCI network. The VCN is like the traditional data center network and includes subnets, route tables, and gateways.
The VCN resides within a single region but can cross multiple availability domains (AD) that cover a single, contiguous IPv4 Classless Inter-Domain Routing (CIDR) block. When you delete a VCN, you should remove the attached gateways and
make sure the subnets are empty.
VCNs automatically come with the following default components that you cannot delete:
- Route table, with no rules
- Security list, with default rules
- Dynamic Host Configuration Protocol (DHCP) options, with default values.
Each subnet you create has the following components associated with it:
- One route table
- One or more security lists
- One set of DHCP options
If you do not specify the preceding components, the subnet automatically uses the default VCN components.
Subnet
A subnet is a subdivision of the VCN and can be either a specific or regional AD. Oracle recommends using regional subnets because they are more flexible.
You can have multiple subnets in an AD that use the same route table, security lists, and DHCP options. Subnets contain virtual network interface cards, which are attached to the instances. Each subnet has a contiguous range of IPs, and the IP ranges cannot overlap.
You can designate subnets as either of the following choices:
- Private: Instances contain private IP addresses assigned to the VNICs.
- Public: Instances have both private and public IP addresses assigned to the VNICs.
In the following diagram, the ADs each have one or more data centers located within a region (local geographical area). The region is composed of three availability domains.
Virtual network interface card
A virtual network interface card (VNIC) enables an instance to connect to a VCN and determines how the instance connects with endpoints inside and outside of a VCN.
The primary VNIC is attached to each instance during launch, and you cannot remove it. You can attach secondary VNICs and remove them from an existing instance that is in the same availability domain as the primary VNIC.
Security lists
Security lists are virtual firewall rules for the VCN and provide information about the following types of traffic:
- Ingress: Incoming traffic
- Egress: Outgoing traffic
There are two types of rules:
- Stateful: Uses connection tracking for any traffic that matches that rule
- Stateless: Does not use connection tracking for any traffic that matches that rule
The security rules are enforced at an instance level, even though they are
associated at the subnet level.
Route tables
Use route tables to send traffic out of the VCN, which consists of route rules with the following elements:
- Destination CIDR Routing
- Targets for the traffic that matches that CIDR
Route rules
You don't need route rules to enable traffic within the VCN itself. Permissible target types for route rules include the following ones:
Dynamic routing gateway
A dynamic routing gateway routes private network traffic between your VCN and on-premises network by using either an IPSec VPN, FastConnect, or a peered VCN in another region.
Internet gateway
Use an Internet gateway for public subnets that access the Internet directly. The public subnet must have a route table and use a security list to control the traffic in and out of the resources. Internet gateways support connections initiated within VCN and from the Internet, such as from web servers.
Network Address Translation gateway
Use a Network Address Translation (NAT) gateway for resources that have the following qualities:
- Do not have public IP addresses
- Need outbound access to the Internet
- Cannot receive inbound connections initiated from the Internet
The public IP is automatically assigned to the NAT gateway, and you cannot choose or use the reserved public IP addresses. A database system that needs to download patches from the Internet might use a NAT gateway.
Service gateway
Use a service gateway for subnets that need private access to Oracle services, such as an autonomous database.
Local Peering gateway
The subnets that need private access to a peered VCN in the same region communicate by using private IP addresses. The two VCNs in the peering network cannot have overlapping CIDRs.
Conclusion
Set up your OCI network by creating the VCN, subnets, internet gateway, NAT gateway, and service gateway with basic security list rules. In just a couple of guided steps in the Virtual Networking QuickStart wizard console, you can quickly create the VCN and other components described in this post.
Recent Posts
Cómo aprovecha Rackspace AWS Systems Manager
Octubre 9th, 2024
Windows Server impide la sincronización horaria con Rackspace NTP
Octubre 3rd, 2024