Private NLB would be as a front-end to network virtual appliance cluster (Like Palo Alto Firewalls).
With a private load balancer, we can enable the firewall instance hosted behind the network load balancer in Hub and Spoke VCNs design. In this method, the firewall appliance will inspect the original client packet and apply security policies before forwarding it to the backend servers in the spoke VCNs.
As you see above, the Hub VCN connects to the Spoke VCNs through LPGs.
All spoke traffic uses route table rules to route traffic through the LPGs to the hub using Private NLB for inspection by the Palo Alto VM series Firewall cluster.
Please check the link below if you need more information.
Secure-App-Palo Alto-Firewall-NLB
참고: https://blogs.oracle.com/post/oci-private-network-load-balancer
OCI Private Network Load Balancer
To isolate your network load balancer from the internet and simplify your security posture, create a private network load balancer.
orasites-prodapp.cec.ocp.oraclecloud.com
'OCI Infrastructure' 카테고리의 다른 글
Differences Between Layer 4 and Layer 7 Load Balancing (0) | 2023.02.14 |
---|---|
Public Load Balancer Use Cases and Best Practices (0) | 2023.02.14 |
Load balancer와 Network Load Balancer의 차이 (0) | 2023.02.14 |
Network Load Balancer - Load Balancing Policy (0) | 2023.02.14 |
Private DB 서버 접속을 위한 Network Load balancer 구성 (0) | 2023.02.13 |