2.7. Network¶
2.7.1. Internet Connectivity¶
2.7.1.1. Overview¶
Menu | Japan | North America | Europe | ||||||
---|---|---|---|---|---|---|---|---|---|
JP | US | UK | FR | ES | |||||
Yokohama No.1 Data Center | Kansai1 No.1 Data Center | Saitama No.1 Data Center | San Jose Lundy Data Center | Hemel Hempstead2 Data Center | Paris2 Data Center |
Madrid2 Data Center |
|||
Internet Connectivity | Best Effort | 10Mbps | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
100Mbps | Yes | Yes | Yes | Yes | Yes | Yes | Yes | ||
1Gbps | Yes | Yes | Yes | Yes | Yes | N/A | N/A | ||
Guaranteed | 1Mbps~100Mbps | Yes | Yes | Yes | Only 10Mbps/ 100Mbps | Only 10Mbps/ 100Mbps | Only 10Mbps/ 100Mbps | Only 10Mbps/ 100Mbps | |
200Mbps~1Gbps | Yes | Yes | Yes | Yes | Yes | N/A | N/A | ||
Global IP Address | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Menu | APAC | |||||
---|---|---|---|---|---|---|
SG | HK | MY | TH | |||
Serangoon Data Center |
Tai Po Data Center |
Cyberjaya3 Data Center |
Bangna Data Center |
|||
Internet Connectivity | Best Effort | 10Mbps | Yes | Yes | Yes | Yes |
100Mbps | Yes | Yes | Yes | Yes | ||
1Gbps | Yes | N/A | N/A | N/A | ||
Guaranteed | 1Mbps~100Mbps | Only 10Mbps/ 100Mbps | Only 10Mbps/ 100Mbps | Only 10Mbps/ 100Mbps | Only 10Mbps/ 100Mbps | |
200Mbps~1Gbps | Yes | N/A | N/A | N/A | ||
Global IP Address | Yes | Yes | Yes | Yes |
2.7.1.2. Features¶
2.7.1.2.1.Best Effort¶
2.7.1.2.2.Guaranteed¶
2.7.1.2.3.Global IP Address¶
- Global IP Address cannot be assigned by the customer nor can be changed.
- Global IP Address will be assigned according to NTTCom’s Global IP Address Block.
- If the Customer is using vFirewall, Global IP would be provided as follows. The distributed Global IP Address can be set as the IP address for NAT/NAPT rule in the vFirewall.
Minimum | Maximum | Increment | |
Global IP Address | 4 | 64 | 4 |
- If the Customer is using the Integrated Network Appliance, Global IP can be purchased according to the following subnet units. The Global IPs will be assigned to the Internet Transit and will be used for transmission between each devices connected to the Internet Transit. Also, Global IPs can be utilized for the NAT, Load Balancing, and IP sec termination rules.
Subnet | Available number of rules set for NAT/NAPT,LoadBalancing, and IPsec termination | |
---|---|---|
Global IP Address | /29 | 3 |
/28 | 11 | |
/27 | 27 |
- A single subnet contract can be made for a single Internet Connectivity contract.
- Customer can assign either one of the subnet when making a contract. The Global IP subnet cannot be changed after the Internet Connectivity installation.
2.7.2. VPN Connectivity¶
2.7.2.1. Overview¶
Menu | Japan | North America | Europe | ||||||
---|---|---|---|---|---|---|---|---|---|
JP | US | UK | FR | ES | |||||
Yokohama No.1 Data Center | Kansai1 No.1 Data Center | Saitama No.1 Data Center | San Jose Lundy Data Center | Hemel Hempstead2 Data Center | Paris2 Data Center |
Madrid2 Data Center |
|||
VPN Connectivity | Best Effort | 100Mbps | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Guaranteed | 100Gbps | Yes | Yes | Yes | Yes | Yes | N/A | N/A | |
200Mbps | Yes | Yes | Yes | Yes | Yes | N/A | N/A | ||
1Gbps | Yes | Yes | Yes | N/A | N/A | N/A | N/A |
Menu | APAC | |||||
---|---|---|---|---|---|---|
SG | HK | MY | TH | |||
Serangoon Data Center |
Tai Po Data Center |
Cyberjaya3 Data Center |
Bangna Data Center |
|||
VPN Connectivity | Best Effort | 100Mbps | Yes | Yes | Yes | Yes |
Guaranteed | 100Gbps | Yes | Yes | Yes | Yes | |
200Mbps | Yes | Yes | Yes | Yes | ||
1Gbps | N/A | N/A | N/A | N/A |
2.7.2.2. Features¶
2.7.2.2.1.Best Effort:¶
2.7.2.2.2.Guaranteed¶
2.7.2.3. Restrictions¶
2.7.3. Server Segment¶
2.7.3.1. Overview¶
Menu | Japan | North America | Europe | ||||
---|---|---|---|---|---|---|---|
JP | US | UK | FR | ES | |||
Yokohama No.1 Data Center | Kansai1 No.1 Data Center | Saitama No.1 Data Center | San Jose Lundy Data Center | Hemel Hempstead2 Data Center | Paris2 Data Center |
Madrid2 Data Center |
|
Server Segment | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Menu | APAC | |||
---|---|---|---|---|
SG | HK | MY | TH | |
Serangoon Data Center |
Tai Po Data Center |
Cyberjaya3 Data Center |
Bangna Data Center |
|
Server Segment | Yes | Yes | Yes | Yes |
2.7.3.2. Feature¶
Server Segment | Minimum | Maximum | Increment |
When using vFirewall | 1 | 24 | 1 |
When using Integrated Network Appliance | 1 | 24* | 1 |
2.7.3.3. Restrictions¶
vFirewall | Integrated Network Appliance | |
---|---|---|
IP Address for DNS Server(Primary/Secondary) | IP address specified by Customer or NTT Comunications. | |
IP Address for Default Gatway | Customer can assign the IP Address when creating Server Segment (Cannot be changed after use.)If it was not specified, vFirewall Active IP address is assigned. | NTTCom will assignthe IP Address. When the segment is connected to INA, Active IP address is assigned. It cannot be changed. When the segment is not connected to INA, Customer can specify the IP Address. It cannot be changed. When the IP Address is not specified, NTT Communacitions will assign. |
DNS Suffix | IP address specified by Customer or no value. |
- Please apply via Service Order Form when adding Server Segment with Customer’s carried-in Global IP Address.
- The direct Internet transmission is not possible via vFirewall nor Integrated Network Appliance when using the Customer carried-in Global IP Address. NAT setting is necessary for the Global IP Address provided by NTT Communications.
- If the registered name for IP Address under NIC organization and the representative contractor name of Enterprise Cloud Service does not match, the carried-in IP address would be considered as illegal Global IP Address and it cannot be supported. Also, we cannot guarantee the sustainability.
2.7.4. Service Interconnectivity¶
2.7.4.1. Overview¶
Menu | Japan | North America | Europe | ||||
---|---|---|---|---|---|---|---|
JP | US | UK | FR | ES | |||
Yokohama No.1 Data Center | Kansai1 No.1 Data Center | Saitama No.1 Data Center | San Jose Lundy Data Center | Hemel Hempstead2 Data Center | Paris2 Data Center |
Madrid2 Data Center |
|
Service Interconnectivity | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Menu | APAC | |||
---|---|---|---|---|
SG | HK | MY | TH | |
Serangoon Data Center |
Tai Po Data Center |
Cyberjaya3 Data Center |
Bangna Data Center |
|
Service Interconnectivity | Yes | Yes | Yes | Yes |
2.7.5. Colocation Interconnectivity (CIC)¶
2.7.5.1. Overview¶
Menu | Japan | North America | Europe | ||||
---|---|---|---|---|---|---|---|
JP | US | UK | FR | ES | |||
Yokohama No.1 Data Center | Kansai1 No.1 Data Center | Saitama No.1 Data Center | San Jose Lundy Data Center | Hemel Hempstead2 Data Center | Paris2 Data Center |
Madrid2 Data Center |
|
Colocation Interconnectivity | Yes | Yes | Yes | N/A | Yes | N/A | Yes |
Menu | APAC | |||
---|---|---|---|---|
SG | HK | MY | TH | |
Serangoon Data Center |
Tai Po Data Center |
Cyberjaya3 Data Center |
Bangna Data Center |
|
Colocation Interconnectivity | Yes | Yes | N/A | Yes |
2.7.5.2. Features¶
Feature | Overview |
Layer 2 (L2) Connection | A feature that connects the Server Segment NTT Communications provides and your system environment inside our colocation using the same Server Segment. |
2.7.5.3. Layer 2 (L2) Connection¶
|
Enterprise Cloud Service Data Center | Destination Colocation Data Center |
Yokohama No.1 | Yokohama No.1, Tokyo No.2 and Tokyo No.3,Tokyo No.4, Tokyo No.5, Tokyo No.6, Tokyo No.7 and Saitama No.1 |
Kansai 1 | Kansai 1 Data Center, Osaka (Dojima), Kyoto No.2 |
Saitama No.1 | Yokohama No.1, Tokyo No.2, Tokyo No.3, Tokyo No.5, Tokyo No.6 and Saitama No.1 |
Hemel Hempstead 2 | Hemel Hempstead 2 |
Thailand Bangna | Thailand Bangna |
Singapore Serangoon | Singapore Serangoon |
Hong Kong Tai Po | Hong Kong Tai Po |
Spain Madrid2 | Spain Madrid2 |
Malaysia Cyberjaya3 | Malaysia Cyberjaya3 |
|
2.7.5.4. Restrictions¶
- Please set active and standby redundant configuration in Customer L2 switch interface.
- Communication cutting by operation of a Customer’s redundant control becomes the outside of SLA.
- If a failure occurs on the communication path is automatically switched to another route and communications are restored in approximately 30 seconds.
- Within the Customer system environment that is connected by colocation interconnectivity, one MAC address can be used for 1 IP Address.
- Multiple Links (two or more contracts) can be increased connection bandwidth between Enterprise Cloud and Colocation. But one Server Segment can be connected to one link.
- Two or more Enterprise Cloud connection via Colocation Interconnectivity is not supported. There is a possibility that MAC address assigned to Virtual Machine is overlapped and communication trouble might happen.
2.7.6. On-Premises Interconnectivity (OPIC)¶
2.7.6.1. Overview¶
Menu | Japan | North America | Europe | ||||
---|---|---|---|---|---|---|---|
JP | US | UK | FR | ES | |||
Yokohama No.1 Data Center | Kansai1 No.1 Data Center | Saitama No.1 Data Center | San Jose Lundy Data Center | Hemel Hempstead2 Data Center | Paris2 Data Center |
Madrid2 Data Center |
|
On-Premises Interconnectivity | Yes | N/A | N/A | N/A | N/A | N/A | N/A |
Menu | APAC | |||
---|---|---|---|---|
SG | HK | MY | TH | |
Serangoon Data Center |
Tai Po Data Center |
Cyberjaya3 Data Center |
Bangna Data Center |
|
On-Premises Interconnectivity | N/A | N/A | N/A | N/A |
2.7.7. vFirewall (Hardware Type)¶
2.7.7.1. Overview¶
Menu | Japan | North America | Europe | ||||
---|---|---|---|---|---|---|---|
JP | US | UK | FR | ES | |||
Yokohama No.1 Data Center | Kansai1 No.1 Data Center | Saitama No.1 Data Center | San Jose Lundy Data Center | Hemel Hempstead2 Data Center | Paris2 Data Center |
Madrid2 Data Center |
|
vFirewall Availability | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Menu | APAC | |||
---|---|---|---|---|
SG | HK | MY | TH | |
Serangoon Data Center |
Tai Po Data Center |
Cyberjaya3 Data Center |
Bangna Data Center |
|
vFirewall Availability | Yes | Yes | Yes | Yes |
2.7.7.2. Features¶
- The portal is provided at Saitama No.1 data center.
1 vFirewall is available per Virtual Room;
Minimum value: Resource Level 1 per vFirewall;
- Maximum value: Resource Level 50 per vFirewall;* You can change the number of vFWs from Customer Portal up to 10. If the number of vFW that customer requires is above 11, please contact NTTCom separately.
In increments of 1 Resource Level;
2.7.7.2.1.Internet Transit Connection¶
2.7.7.2.2.VPN Transit Connection¶
2.7.7.2.3.Packet Filtering Settings¶
- The network interface for vFirewall on which packet filtering is performed can be selected from Internet Transit, VPN Transit and Server Segment
- The IP address or IP address group can be configured for the source IP address
- The type of service group of TCP/ UDP ports and ICMP can be configured for the source service.
- The IP address or IP address group can be specified for the destination IP address.
- Type or service group of TCP/ UDP ports and ICMP can be configured for the destination service.
- A permission or rejection can be specified for action.
2.7.7.2.4.NAT/NAPT settings¶
- For the Internet Transit, a Global IPv4 Address used in the Internet Connectivity can be configured.
- For the VPN Transit, an IPv4 address allocated to VPN Transit can be configured in the VPN Connectivity.
- For the Server Segment, any IP address can be configured.
2.7.7.2.5.Other Settings¶
- Routing:
- Address group setting:
- Service group setting:
2.7.7.2.6.Adding additional resources¶
2.7.7.2.7.Fetures that the log dedicated portal provides¶
Feature | Item |
Displaying the log | Filtering log of vFirewall is displayed on the log dedicated portal. The latest log can be displayed by updating the browser. The log for a maximum of 500 lines appears. |
Saving the log file | One uncompressed log file including the log displayed on the screen is saved. If the size of this file reaches 5MB, the file is automatically compressed and saved in zip format as another file. A maximum of 60 log files are saved. |
Downloading the log file | The saved log file can be downloaded on customer environment from the portal. |
Changing the password | It is possible to change the account password for the log dedicated portal. |
2.7.8. vLoad Balancer (Hardware Type)¶
2.7.8.1. Overview¶
Menu | Japan | North America | Europe | ||||
---|---|---|---|---|---|---|---|
JP | US | UK | FR | ES | |||
Yokohama No.1 Data Center | Kansai1 No.1 Data Center | Saitama No.1 Data Center | San Jose Lundy Data Center | Hemel Hempstead2 Data Center | Paris2 Data Center |
Madrid2 Data Center |
|
vLoad Balancer Availability | Yes | Yes | Yes | Yes | Yes | N/A | N/A |
Menu | APAC | |||
---|---|---|---|---|
SG | HK | MY | TH | |
Serangoon Data Center |
Tai Po Data Center |
Cyberjaya3 Data Center |
Bangna Data Center |
|
vLoad Balancer Availability | Yes | Yes | Yes | Yes |
2.7.8.2. Features¶
- 1 vLoad Balancer is available per Server Segment;
- Minimum value: Resource Level 1 per vLoad Balancer;
- Maximum value: Resource Level 10 per vLoad Balancer;
- In increments of 1 Resource Level;
2.7.8.3. Restrictions¶
2.7.9. Integrated Network Appliance¶
2.7.9.1. Overview¶
- Firewall
- NAT
- Static Routing
- Load Balancing
- IPsec termination
Menu | Japan | North America | Europe | |||||
---|---|---|---|---|---|---|---|---|
JP | US | UK | FR | ES | ||||
Yokohama No.1 Data Center | Kansai1 No.1 Data Center | Saitama No.1 Data Center | San Jose Lundy Data Center | Hemel Hempstead2 Data Center | Paris2 Data Center |
Madrid2 Data Center |
||
Integrated Network Appliance | Compact | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Compact(Redundant) | Yes | Yes | Yes | Yes | Yes | Yes | Yes | |
Large | Yes | Yes | Yes | Yes | Yes | Yes | Yes | |
Large(Redundant) | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Menu | APAC | ||||
---|---|---|---|---|---|
SG | HK | MY | TH | ||
Serangoon Data Center |
Tai Po Data Center |
Cyberjaya3 Data Center |
Bangna Data Center |
||
Integrated Network Appliance | Compact | Yes | Yes | Yes | Yes |
Compact(Redundant) | Yes | Yes | Yes | Yes | |
Large | Yes | Yes | Yes | Yes | |
Large(Redundant) | Yes | Yes | Yes | Yes |
2.7.9.2. Features¶
2.7.9.2.1.Firewall¶
- The Firewall rule function of this service can permit or deny the specific communication via this service to control the traffic for/from the customer’s environment in Enterprise Cloud.
- Firewall function of INA deny all of the traffic (excluding the management tragic) as a default settings. Customer has to configure the “permit” rules for INA to communicate via INA.
- Firewall function is always enabled, and cannot be disabled.
2.7.9.2.2.NAT¶
- NAT modifies the source/destination IP addresses of packets arriving to and leaving from this service. The below two NAT are provided on this service.
- SNAT Rule: A source NAT rule changes the source IP address of outbound packets
- DNAT Rule: A destination NAT rule changes the destination IP address
- Customer can utilize the NAPT, by setting IP range as a translated IP.
- It is also available to set the NAT rule from IP range to IP range. But, on the other hand, even if range to range NAT is set, the mapping between IP addresses is random. Static mapping is not available.
2.7.9.2.3.Static Routing¶
Parameters | Description |
Name | Name for this rule |
Network | The destination network address |
Next Hop IP | The next hop IP address |
Target Network | The transit which the traffic will be forwarded to |
2.7.9.2.4.Load Balancing¶
- When the load balancing rule is applied to the traffic, the traffic also be applied to the SNAT. It means, the source IP of the traffic which reach to the “members” of the rule is the IP which is assigned to the server segment side interface of INA.
- For the http traffic, the x-forwarded-for function is always enabled.
2.7.9.2.5.IPsec Termination¶
- This function is just a termination of IPsec. The settings of IPsec are under the customer responsibility, which means NTT do not guarantee/ support the connectivity from customer site to EC site.
- IPsec tunnel should be connected only via internet connectivity or VPN connectivity and it cannot be connected via server segment side. (ex. SIG/OPIC/CIC)
※Important
The specification has been changed to strengthen security.
Specification Change
・The default value of DH(Diffie-Hellman) group, which is the IPsec configuration parameter, is changed from “2” to “14” if client performs the following operations in the client portal. If the DH value was changed, client will be disconnected from the peer device using IPsec.
[Operations(*1)]
Edit or save a configuration of Integrated Network Appliance(including saving without editing value)
(hereafter Operation 1)
Add or delete monitoring for vApp or virtual server (Install Monitoring / Uninstall Monitoring)
(hereafter Operation 2)
Caution
・Once the DH group is changed from “2” to “14” by client’ operation(*1), client cannot change the DH group by client operation.
・If the client does not perform the operations(*1), the DH group 2 will be used continuously. Client can utilize ECL1.0 service with existing configuration.
Request
Please confirm that DH group14 is supported on the device on the external VLAN side that faces the Integrated network appliance for IPsec communication.
If DH Group 14 is not supported for the the device on the external VLAN side, please do not perform the operations(*1) until DH Group is supported. Please consider replacing the device on the external VLAN side to DH value “14” supportive as soon as possible. From the viewpoint of enhancing security, it is highly recommended to switch to DH Group14.
If DH Group 14 is supported for the the device on the external VLAN side, please take it into account to switch DH group value to “14” as soon as possible.
Until switching DH value from “2” to “14” in sync with INA and external VLAN device, please use existing DH Group temporarily and please do not perform the operations(*1).
When client chane DH value from “2” to “14”, please perform the operations(*1) and configure the device on the external VLAN side to DH group 14.
2.7.9.3. Restrictions¶
Customer must select either vFirewall or Integrated Network Appliance for each Data Center. Once the contract is set, customer cannot change the plan from vFirewall to Integrated Network Appliance or vice versa.
Customer will select the service plan when applying for the Integrated Network Appliance. After the installation, Customer cannot change the service plan from Compact to Large or Large to Compact. (However, customer may change from single to redundant topology or vice versa.)
Once the IP Address is assigned to each interface of Integrated Network Appliance, it cannot be changed.
- Global RuleTo provide some service or features of Enterprise Cloud, provider sets some NAT rules as default.1. Customer can view these rules, however some of the questions focused on the details of the global rules may not be answered.2. These rules cannot be added by the customer.3. Global rules will be highly prioritised than rules set by the customer.4. Global rules may be changed/added/deleted without notification beforehand.
Features | Maximum number of rules |
Firewall Rule | Approx. 100 Rules |
SNAT Rule
DNAT Rule
|
Approx. 100 Rules (including both SNAT and DNAT rules) |
Static Routing | Approx. 64 Rules |
Load Balancing Rule | Approx. 3 Rules |
IPsec Termination Rule | Approx. 50 Rules |
- Performance data is not available on customer portal for Integrated Network Appliance.