Virtual Private
Cloud (VPC)

Virtual Private Cloud allows you to isolate online resources with virtual private networks.
VPC enables your cloud resources to securely communicate with each other, the internet,
and on-premises networks.

Contact Us

Product Advantages

This allows different ECSs to be grouped together under the same network giving access to faster communication in a secure and convenient manner.

Easy Connectivity

Add ECSs from different availability zones to the same VPC, and control communication within and between VPCs.

High-Speed Bandwidth

Choose dynamic BGP or static BGP bandwidth as needed.

Secure and Reliable

Get an isolated network for your resources on the cloud. Control traffic between instances and subnets.

Seamless Scaling

Extend your on-premises data center to Huawei Cloud.

Why VPC?

A VPC provides a secure and isolated network environment. Different VPCs are isolated from each other.

Gain Flexibility in Controlling VPC Communication

  • You can define custom routes and VPC peering connections to control communication within a VPC and between VPCs.
  • Define routes in custom route tables to determine the destination of traffic.
  • Create a VPC peering connection using private IP addresses to route traffic between any two VPCs in the same region.

Enhance Security and Isolation 

  • Run workloads in VPCs completely isolated by VXLAN.
  • Define subnets, IP address ranges, and DHCP to control access.

Choose the Right Bandwidth Type 

  • Dynamic BGP: Over 21 dynamic BGP sessions are established to multiple carriers. Dynamic BGP provides real-time failover based on the preset routing protocols, ensuring high network stability, and low latency.
  • Static BGP: Static BGP ensures high-speed connectivity and cost-effective bandwidth.

Extend Your Data Center to the Cloud

  • Securely connect your on-premises data center to a VPC over VPN or Direct Connect to extend your on-premises environment to the cloud. 

Define and Control Traffic Flows

  • Security Group: Define security groups to strictly control access to instances by checking protocols (TCP, UDP, and ICMP) and ports.
  • Network ACL: Define network ACLs to control traffic in and out of associated subnets.

Application Scenarios

Run virtually any business-critical applications or compute tasks on FWS

Build Dedicated Networks

Host Secure Web Services

Deploy Hybrid Clouds