%BOOK_ENTITIES; ]>
Adding a Private Gateway to a VPC A private gateway can be added by the root admin only. The VPC private network has 1:1 relationship with the NIC of the physical network. You can configure multiple private gateways to a single VPC. No gateways with duplicated VLAN and IP are allowed in the same data center. Log in to the &PRODUCT; UI as an administrator or end user. In the left navigation, choose Network. In the Select view, select VPC. All the VPCs that you have created for the account is listed in the page. Click the Configure button of the VPC to which you want to configure load balancing rules. The VPC page is displayed where all the tiers you created are listed in a diagram. Click the Settings icon. The following options are displayed. Internal LB Public LB IP Static NAT Virtual Machines CIDR The following router information is displayed: Private Gateways Public IP Addresses Site-to-Site VPNs Network ACL Lists Select Private Gateways. The Gateways page is displayed. Click Add new gateway: add-new-gateway-vpc.png: adding a private gateway for the VPC. Specify the following: Physical Network: The physical network you have created in the zone. IP Address: The IP address associated with the VPC gateway. Gateway: The gateway through which the traffic is routed to and from the VPC. Netmask: The netmask associated with the VPC gateway. VLAN: The VLAN associated with the VPC gateway. Source NAT: Select this option to enable the source NAT service on the VPC private gateway. See . ACL: Controls both ingress and egress traffic on a VPC private gateway. By default, all the traffic is blocked. See . The new gateway appears in the list. You can repeat these steps to add more gateway for this VPC.
Source NAT on Private Gateway You might want to deploy multiple VPCs with the same super CIDR and guest tier CIDR. Therefore, multiple guest VMs from different VPCs can have the same IPs to reach a enterprise data center through the private gateway. In such cases, a NAT service need to be configured on the private gateway. If Source NAT is enabled, the guest VMs in VPC reaches the enterprise network via private gateway IP address by using the NAT service. The Source NAT service on a private gateway can be enabled while adding the private gateway. On deletion of a private gateway, source NAT rules specific to the private gateway are deleted.
ACL on Private Gateway The traffic on the VPC private gateway is controlled by creating both ingress and egress network ACL rules. The ACLs contains both allow and deny rules. As per the rule, all the ingress traffic to the private gateway interface and all the egress traffic out from the private gateway interface are blocked. You can change this default behaviour while creating a private gateway.