Virtual Private Cloud

JD Cloud VPC supports building a logically isolated network environment on JD Cloud. Similar to traditional data centers, you can plan your own network deployment, including network scope, subnet segment, routing policy, etc., and implement multi-level security protection through Security Group and network ACLs.

Try Now

Benefits

Autonomous Planning
Users may customize the scope of Virtual Private Cloud (VPC), autonomously divide subnet segments and edit the remote table according to the requirements. The network environment before users log on to the cloud is completely restored and the network environment self-management is completely realized.
High Availability
The Virtual Private Cloud (VPC) adopts a high availability route to ensure high availability of the network.
Security and Reliability
The primary protection of security group is realized in the instance level, the secondary protection of network ACL is achieved in the subnet level, and 100% security isolation of network is realized between VPCs so that the IAM without dead space can be reached for the resources in the whole network.
Good Scalability
It benefits the convenient VPC interconnection within/across regions to realize interconnections between different business scenarios or cross-region disaster recovery. Connect customer IDC with JD Cloud VPC to realize multicloud solutions.

Features

Customized Network

Customized Virtual Private Cloud Ranges and Subnet Segments

The users can customize the network segment of a VPC, and then further divide the Virtual Private Cloud into multiple subnets, and deploy applications and services on the corresponding network to meet various application scenarios.

Customized Routing

Editable Routing Feature

The users can configure the next hop type, next hop and destination of the routing rule in the Route Table according to the service requirements. After the Route Table is associated with a subnet, the management of the network traffic forwarding path can be achieved.

Comprehensive Security Control

Realize multi-level Security Protection Through Security Groups and Network ACLs

Network ACL: When operating at the subnet level, it supports the allowing rule and the denying rule.. Data flow return must be explicitly allowed by the rules. Security group: When operating at the instance level, it only supports the allowing rule. Data flow return is automatically allowed, not affected by any rule.

Flexible Access to EIP

Elastic IP and Self-built NAT Gateway for Public Network Access

If the resources in VPC have requirement to visit the Internet, EIP access can be realized by associating the elastic IP or self-building the NAT gateway and configuring corresponding routing policy.

Scenarios

High-speed Interconnection of Multicloud Data

To deploy some resources (e.g. application and database) on the cloud and some resources in the enterprise IDC, the user can connect the Intranet of JD Cloud and enterprise IDC Intranet through VPN tunnel or Direct Connection.

Product using:
VPCRDSVirtual Machines

Internet Access with Public IP Shared by Multiple Virtual Machines

If the user has several machines necessary for public access, the feature of self-build SNAT can be used to share the IP bandwidth.

Product using:
Virtual MachinesEIPVPCSubnet

Mass Flow Business Demand

To cope with mass traffic and burst traffic business demands (such as portal website, e-commercial website and massive online game), Load Balancer can be used for traffic distribution. Dynamic adjustment can be made to the quantity of backend Virtual Machines. High-availability service solutions can be provided through redundant deployment of devices in the multiple availability zones.

Product using:
Load BalancerEIPVirtual Machines

Business Security IAM

WEB service can make response to the customer requests by using Virtual Private Cloud (e.g. website and blog) of Intranet deployment and configuring Security Group, network ACL and other virtual firewalls. However, WEB service is prevented to visit internet, guaranteeing the security of WEB service.

Product using:
VPCSubnetACLSecurity GroupLoad BalancerVirtual MachinesEIP

Real Customer Source Analysis

Support unvarnished transmission of the real IP address of the client through Load Balancer under HTTP monitoring protocol, making it convenient to analyze the source of customer and make statistics on the operation and maintenance data

Product using:
Load BalancerEIPVirtual Machines

Basic Business to Cloud

You can create different subnets within Virtual Private Cloud. The whole Web layer is placed on one subnet. The logical layer is placed on a separate subnet by configuring elastic IP/NAT Gateway for communication with the Internet. The data layer is placed on another subnet. The flow between subnets is controlled by network ACL. Such secure and flexible deployment can not only satisfy your demands for Internet application and access but also guarantee the security of the database server. More connection demands can be realized through peering, connection, VPN and other products.

Product using:
VPCSubnetVirtual MachinesRDSJCS for RedisEIP