Virtual Private Cloud (VPC) is a technology that allows you to create your own virtual network within Mammoth Cloud, that isolates your cloud servers on their own private network.
You may define the IP address range and routing table to use for your VPC. These facilities allow the deployment of a wide range of network topologies, determining if (and how) each cloud server has internet access and providing optional VPN connectivity to your corporate network.
For customers requiring hands-on assistance in the design and ongoing operation of their VPC environment we have a range of server management options available, from 24/7 monitoring through to full outsourcing.
Most VPC deployments fall into one of a small number of scenarios. To get started with your own deployment, identify the use case that most closely matches your requirements and provision your VPC to match.
Single-tiered Multi-tiered Multi-tiered + VPN Private-tiered + VPN
In this use case all cloud servers are deployed into the VPC with their own external IP address, with the router providing access to the internet. We recommend this configuration if you want to run a simple, public-facing web application on a small number of servers.
This scenario consists of:
Where multiple servers are deployed in the VPC, the internal IP is used for secure communication between servers.
In this use case the application is divided into two or more tiers: an internet-accessible public tier (for example: web servers), and a private tier that is only accessible from within the VPC (for example: database servers). We recommend this configuration for public web applications where you wish to provide additional protection to your backend datastore.
This scenario consists of:
The web server is configured to provide NAT for the database server, or in a larger deployment a dedicated NAT server may be used.
This use case extends multi-tiered application by adding a VPN connection to your company network. The backend tier is directly accessible from your own network, and may optionally connect to your inhouse servers. We recommend this configuration for migrating your existing web applications into the cloud.
This scenario consists of:
The web server is configured to provide NAT for the database server, or in a larger deployment a dedicated NAT server may be used.
This use case provides a private network only accessible via a VPN connection to your company network. The servers are not internet accessible and outgoing internet access is provided by your company network. We recommend this configuration for migrating your in-house applications into the cloud.
This scenario consists of:
The private server has no outgoing internet access other than via your company network. This allows you to provide internet access using the security controls already in place for your existing in-house deployment.
Then speak to this guy, he brings his own cables to work.
Get more from your server