Cloud version: 12.0-CROC1¶
- API changes
- Migration to new Security Groups behaviour
- Interfaces IP addressing different from subnet CIDR
- Access to instances through VPN server
- Access to instances through router-VM
- Access to instances through External Networks from CROC Datacenter colocation
- Access to instances through External Networks from Internet via some ISP and CROC DC Colocation
- Access between instances with elastic IP addresses
The following features were added to CROC Cloud:
- Security Groups (like at AWS);
- Network Access Control List (Network ACL).
The Security Groups regulate a traffic on the interfaces of instances connected to the subnet. The traffic on the interfaces which were connected to the Virtual Switches is not regulated by Security Groups.
Security Groups API was linked to compliance with AWS.
For more information, see Security Groups.
Network Access Control Lists (Network ACLs)
Network ACL entity works as a firewall at the network level with similar to the old Security Groups behavior, but it’s stateless, while Security Groups are StatefulFirewall.
For more information, see new Network ACL.
Due to introducing major changes in Security Groups, Virtual Switches management was moved from the Security Groups API into new separate Virtual Switches API.