Key Components
Symbol | Description |
---|---|
![VDC] | Virtual Datacenter Boundary |
![VM] | Virtual Machine (or VM group) |
![Cloud Network] | Virtual Switch (Created in Cloud Director) |
![Edge] | Edge Gateway (Router/Firewall/NAT) |
Addressing Standards:
-
Private: 192.168.0.0/16 (RFC1918)
-
Public: 192.0.2.0/24, 198.51.100.0/24 (RFC5737)
Option 1: Basic NAT Configuration
Topology:
Characteristics:
-
1 public IP on Edge Gateway
-
VMs use private IPs
-
Outbound internet via Source NAT
-
Inbound access via Destination NAT rules
Use Case: Default test environment configuration
Option 2: Multi-IP Edge Gateway
Topology:
Advantages:
-
Multiple public IPs for different NAT services
-
Improved service isolation
-
Flexible port forwarding rules
Option 3: Multi-Network Segmentation
Topology:
Security Benefits:
-
Isolated network segments
-
Granular firewall policies
-
Separate NAT rules per network
Option 4: Multi-Edge Gateway Deployment
Topology:
Enterprise Features:
-
Separate security domains
-
Avoids hairpin NAT scenarios
-
Cross-network routing via dedicated links
Option 5: Public IP Assignment
Topology:
Implementation Notes:
-
Available subnet sizes: /30 to /28
-
Typical /30 allocation:
-
.0: Network address
-
.1: Edge GW (internal)
-
.2: Assignable to VM
-
.3: Broadcast
-
-
Request via support ticket
Critical Reminder: Network addressing cannot be modified after creation.
Option 6: Virtual Router Overlay
Topology:
Considerations:
-
Deploy third-party routers (Cisco/Juniper/Mikrotik)
-
NAT still handled at Edge level
-
Maintains private addressing internally
Planning Recommendations
-
Address Space: Allocate 25% more IPs than currently needed
-
Growth: Prefer larger subnets for future expansion
-
Migration: Create new networks during maintenance windows
-
Documentation: Maintain IPAM records for all allocations