Chapter 16. Managing Networks and Traffic
202
9. Click Add guest network.
The Add guest network window is displayed.
10. Specify the following:
Name: The name of the network. This will be visible to the user.
Description: The short description of the network that can be displayed to users.
VLAN ID: The unique ID of the VLAN.
Secondary Isolated VLAN ID: The unique ID of the Secondary Isolated VLAN.
For the description on Secondary Isolated VLAN, see Section 16.25.1, “About Private VLAN”.
Scope: The available scopes are Domain, Account, Project, and All.
Domain: Selecting Domain limits the scope of this guest network to the domain you specify.
The network will not be available for other domains. If you select Subdomain Access, the
guest network is available to all the sub domains within the selected domain.
Account: The account for which the guest network is being created for. You must specify the
domain the account belongs to.
Project: The project for which the guest network is being created for. You must specify the
domain the project belongs to.
All: The guest network is available for all the domains, account, projects within the selected
zone.
Network Offering: If the administrator has configured multiple network offerings, select the one
you want to use for this network.
Gateway: The gateway that the guests should use.
Netmask: The netmask in use on the subnet the guests will use.
IP Range: A range of IP addresses that are accessible from the Internet and are assigned to the
guest VMs.
Network Domain: A custom DNS suffix at the level of a network. If you want to assign a special
domain name to the guest VM network, specify a DNS suffix.
11. Click OK to confirm.
16.26. About Inter-VLAN Routing
Inter-VLAN Routing is the capability to route network traffic between VLANs. This feature enables
you to build Virtual Private Clouds (VPC), an isolated segment of your cloud, that can hold multi-tier
applications. These tiers are deployed on different VLANs that can communicate with each other.
You provision VLANs to the tiers your create, and VMs can be deployed on different tiers. The VLANs
are connected to a virtual router, which facilitates communication between the VMs. In effect, you
can segment VMs by means of VLANs into different networks that can host multi-tier applications,
such as Web, Application, or Database. Such segmentation by means of VLANs logically separate
application VMs for higher security and lower broadcasts, while remaining physically connected to the
same device.