Merge "Editing Neutron Concepts"
This commit is contained in:
commit
2cb4e31e36
@ -4,54 +4,57 @@
|
|||||||
xmlns:xi="http://www.w3.org/2001/XInclude"
|
xmlns:xi="http://www.w3.org/2001/XInclude"
|
||||||
xmlns:xlink="http://www.w3.org/1999/xlink" version="5.0">
|
xmlns:xlink="http://www.w3.org/1999/xlink" version="5.0">
|
||||||
<title>Networking concepts</title>
|
<title>Networking concepts</title>
|
||||||
<para>OpenStack Networking (neutron) manages all of the networking facets for
|
<para>OpenStack Networking (neutron) manages all of the networking
|
||||||
the Virtual Networking Infrastructure (VNI) and the access layer aspects
|
facets for the Virtual Networking Infrastructure (VNI) in your
|
||||||
of the Physical Networking Infrastructure (PNI) in your OpenStack
|
OpenStack environment. OpenStack Networking also manages the access
|
||||||
environment. OpenStack Networking allows tenants to create advanced virtual
|
layer aspects of the Physical Networking Infrastructure (PNI).
|
||||||
network topologies including services such as
|
Tenants can create advanced virtual network topologies using
|
||||||
|
OpenStack Networking. These topologies include services such as
|
||||||
<glossterm baseform="firewall">firewalls</glossterm>,
|
<glossterm baseform="firewall">firewalls</glossterm>,
|
||||||
<glossterm baseform="load balancer">load balancers</glossterm>, and
|
<glossterm baseform="load balancer">load balancers</glossterm>, and
|
||||||
<glossterm baseform="virtual private network (VPN)">
|
<glossterm baseform="virtual private network (VPN)">
|
||||||
virtual private networks (VPNs)</glossterm>.</para>
|
virtual private networks (VPNs)</glossterm>.</para>
|
||||||
<para>Networking provides the following object abstractions: networks,
|
<para>Networking provides the following object abstractions: networks,
|
||||||
subnets, and routers. Each has functionality that mimics its
|
routers, and subnets. Each has a functionality that mimics its
|
||||||
physical counterpart: networks contain subnets, and routers route
|
physical counterpart: networks contain subnets, and routers route
|
||||||
traffic between different subnet and networks.</para>
|
traffic between different subnet and networks.</para>
|
||||||
|
<para>Each router has one gateway that connects to a network, and many
|
||||||
|
interfaces connected to subnets. Subnets can access machines on
|
||||||
|
other subnets connected to the same router.</para>
|
||||||
<para>Any given Networking set up has at least one external network.
|
<para>Any given Networking set up has at least one external network.
|
||||||
This network, unlike the other networks, is not merely a virtually
|
This external network, unlike the other networks, is not solely a
|
||||||
defined network. Instead, it represents the view into a slice of
|
virtually defined network. It instead provides a view into a slice
|
||||||
the external network that is accessible outside the OpenStack
|
of the network accessible outside the OpenStack installation, which
|
||||||
installation. IP addresses on the Networking external network are
|
is the outside network. IP addresses on the external network are
|
||||||
accessible by anybody physically on the outside network. Because
|
accessible by anybody physically on the outside network. DHCP is
|
||||||
this network merely represents a slice of the outside network,
|
disabled on this network.</para>
|
||||||
DHCP is disabled on this network.</para>
|
<para>Machines can access the outside network through the gateway
|
||||||
|
for the router. For the outside network to access VMs, and for VM's
|
||||||
|
to access the outside network, routers between the networks are
|
||||||
|
needed.</para>
|
||||||
<para>In addition to external networks, any Networking set up has one
|
<para>In addition to external networks, any Networking set up has one
|
||||||
or more internal networks. These software-defined networks connect
|
or more internal networks. These software-defined networks connect
|
||||||
directly to the VMs. Only the VMs on any given internal network,
|
directly to the VMs. Only the VMs on any given internal network,
|
||||||
or those on subnets connected through interfaces to a similar
|
or those on subnets connected through interfaces to a similar
|
||||||
router, can access VMs connected to that network directly.</para>
|
router, can access VMs connected to that network directly.</para>
|
||||||
<para>For the outside network to access VMs, and vice versa, routers
|
|
||||||
between the networks are needed. Each router has one gateway that
|
|
||||||
is connected to a network and many interfaces that are connected
|
|
||||||
to subnets. Like a physical router, subnets can access machines on
|
|
||||||
other subnets that are connected to the same router, and machines
|
|
||||||
can access the outside network through the gateway for the
|
|
||||||
router.</para>
|
|
||||||
<para>Additionally, you can allocate IP addresses on external
|
<para>Additionally, you can allocate IP addresses on external
|
||||||
networks to ports on the internal network. Whenever something is
|
networks to ports on the internal network. Whenever something is
|
||||||
connected to a subnet, that connection is called a port.You can
|
connected to a subnet, that connection is called a port.You can
|
||||||
associate external network IP addresses with ports to VMs. This
|
associate external network IP addresses with ports to VMs.
|
||||||
way, entities on the outside network can access VMs.</para>
|
This way, entities on the outside network can access VMs.</para>
|
||||||
<para>Networking also supports <emphasis role="italic">security
|
<para>Networking also supports <emphasis role="italic">security
|
||||||
groups</emphasis>. Security groups enable administrators to
|
groups</emphasis>, which enable administrators to define
|
||||||
define firewall rules in groups. A VM can belong to one or more
|
firewall rules in groups. A VM can belong to one or more
|
||||||
security groups, and Networking applies the rules in those security
|
security groups. Networking applies the rules in those security
|
||||||
groups to block or unblock ports, port ranges, or traffic types
|
groups to block or unblock ports, port ranges, or traffic types
|
||||||
for that VM.</para>
|
for that VM.</para>
|
||||||
<para>Each plug-in that Networking uses has its own concepts. While not
|
<simplesect><title>Networking plug-ins</title>
|
||||||
vital to operating Networking, understanding these concepts can help
|
<para>Each plug-in that Networking uses has its own concepts. These
|
||||||
you set up Networking. All Networking installations use a core plug-in
|
plug-in concepts are not vital to operating Networking.
|
||||||
and a security group plug-in (or just the No-Op security group
|
Understanding these concepts can help you set up the Openstack
|
||||||
plug-in). Additionally, Firewall-as-a-service (FWaaS) and
|
Networking service, however. All Networking installations use a core
|
||||||
|
plug-in and a security group plug-in (or just the No-Op security
|
||||||
|
group plug-in). Additionally, Firewall-as-a-service (FWaaS) and
|
||||||
Load-balancing-as-a-service (LBaaS) plug-ins are available.</para>
|
Load-balancing-as-a-service (LBaaS) plug-ins are available.</para>
|
||||||
|
</simplesect>
|
||||||
</section>
|
</section>
|
||||||
|
Loading…
Reference in New Issue
Block a user