Create your own private network to secure your servers.
Virtual Private Cloud (VPC) is a technology that allows you to create your own virtual network within BinaryLane, that isolates your cloud servers on their own private network.
You may define the IP address range and routing table to use for your VPC. These facilities allow the deployment of a wide range of network topologies, determining if (and how) each cloud server has internet access and providing optional VPN connectivity to your corporate network.
This diagram shows the difference between servers in our public cloud, and those deployed into a VPC. The servers in the public cloud are assigned a public IP address and communicate with the internet directly; while the servers in a VPC are on an isolated network, allowing secure communication between each server.
Identify the use case that most closely matches your requirements and provision your VPC to match.
Single-tiered Multi-tiered Multi-tiered + VPN Private-tiered + VPN
In this use case all cloud servers are deployed into the VPC with their own external IP address, with the router providing access to the internet. We recommend this configuration if you want to run a simple, public-facing web application on a small number of servers.
This scenario consists of:
Where multiple servers are deployed in the VPC, the internal IP is used for secure communication between servers.
In this use case the application is divided into two or more tiers: an internet-accessible public tier (for example: web servers), and a private tier that is only accessible from within the VPC (for example: database servers). We recommend this configuration for public web applications where you wish to provide additional protection to your backend datastore.
This scenario consists of:
The web server is configured to provide NAT for the database server, or in a larger deployment a dedicated NAT server may be used.
This use case extends multi-tiered application by adding a VPN connection to your company network. The backend tier is directly accessible from your own network, and may optionally connect to your inhouse servers. We recommend this configuration for migrating your existing web applications into the cloud.
This scenario consists of:
The web server is configured to provide NAT for the database server, or in a larger deployment a dedicated NAT server may be used.
This use case provides a private network only accessible via a VPN connection to your company network. The servers are not internet accessible and outgoing internet access is provided by your company network. We recommend this configuration for migrating your in-house applications into the cloud.
This scenario consists of:
The private server has no outgoing internet access other than via your company network. This allows you to provide internet access using the security controls already in place for your existing in-house deployment.