Sonali, Correct, there is no isolated network in Adv zone with SG. No nat, no firewall, no load balancer. What you get from a network perspective is 1 NIC (IP via DHCP) and security groups, that's it.
HTH Lucian -- Sent from the Delta quadrant using Borg technology! Nux! www.nux.ro ----- Original Message ----- > From: "Sonali Jadhav" <son...@servercentralen.se> > To: users@cloudstack.apache.org > Sent: Friday, 6 February, 2015 11:13:55 > Subject: RE: Networking in Advance zone with security groups enabled > Ok I get it. > > But again, does that mean there would be no "shared guest" network and > "isolated > guest" network offerings in "Advance zone with security groups"? > > Coz, I understood that, in case of "isolated guest" network, VR is responsible > for NAT, firewall and load balancing functions, which doesn’t happen in case > of > "shared guest" network. So I want to know if this exist in case of ""Advance > zone with security groups" as well. > > > /Sonali > > -----Original Message----- > From: Nux! [mailto:n...@li.nux.ro] > Sent: Friday, February 6, 2015 4:10 PM > To: users@cloudstack.apache.org > Subject: Re: Networking in Advance zone with security groups enabled > > Hello Sonali, > > In an advanced zone with security groups the guest and public network are > combined in one. It's very similar to the Basic zone. > So you will end up with a network and all your VMs will be connected to it. > You > will want to use "public" IPs and there will be no NAT involved. > > Although you can add more than one network, a VM cannot be connected to more > than 1 at a time. > > You will have a VR which is there to provide DHCP, user data, passwords; it > will > not route traffic. > You will not be able to use the "firewall" feature though obviously you will > be > able to use Security Groups. There is no load balancer or VPN feature > available, as well. > > The main advantage is that the traffic of your VMs bypasses the VR and goes > out > through the host directly, the security groups (iptables rules) are also > applied on the host; this gives it significantly more performance than an > Advanced zone. > > So look at what your needs are and choose the appropriate type of zone. > > > HTH > Lucian > > -- > Sent from the Delta quadrant using Borg technology! > > Nux! > www.nux.ro > > ----- Original Message ----- >> From: "Sonali Jadhav" <son...@servercentralen.se> >> To: users@cloudstack.apache.org >> Sent: Friday, 6 February, 2015 09:26:15 >> Subject: RE: Networking in Advance zone with security groups enabled > >> So basically in "Advance zone with security groups" on guest network >> we'll be creating both logical networks? i.e. Shared network and Isolated >> networks? >> >> So, if we use only Advance zone, then there will be guest and public >> networks, and we can create isolated network on Public traffic >> interface and shared network on Guest traffic interface. >> >> Where as in case of Advance zone with Security groups, there will be >> only Guest interface, and we can create both types of logical networks >> on same guest traffic interface. >> >> So I want to understand that, why there is this difference, what >> advantage we get in it? >> >> (actually I am planning production ready CloudStack deployment > > architecture, so want to understand what's better)