System structure diagram

This section explains the system structures that can be created.

When releasing a virtual server on the Internet

This section describes the basic procedure in the K5 IaaS for configuring a system that will be released on the Internet.



Perform the following tasks in the K5 IaaS to create the system structure.

  1. Creating a network
  2. Creating a subnet
  3. Creating a virtual router
  4. Changing the information of a virtual router (attaching to an external network)
  5. Changing the information of a virtual router (attaching to a subnet)
  6. Creating a security group
  7. Creating a security group rule
  8. Create firewall rules
  9. Creating a firewall policy
  10. Creating a firewall
  11. Creating a key pair
  12. Creating a port(when creating a virtual server by specifying a port)
  13. Create a virtual server
  14. Retrieving a global IP address and assigning it to a virtual server

When using the SSL-VPN connection function

This section describes the basic procedure to perform in the K5 IaaS to configure a system that can be connected to over SSL-VPN.

  • V2 service method

    A method in which SSL-VPN connections are established using virtual instances. For details regarding functionality, refer to the "Features Handbook".

    There are two user authentication methods that can be used with the V2 service SSL-VPN connection function, "using a K5 client certificate" and "using a self-signed certificate". This document explains the configuration procedure for each user authentication method.

Note: A "K5 client certificate" refers to a client certificate that is issued by the K5 Portal and used for client authentication when the relevant user accesses the SSL-VPN service.

Perform the following tasks in the K5 IaaS to configure the system structure.

  1. Creating a network
  2. Creating a subnet
  3. Creating a virtual router
  4. Changing the information of a virtual router (attaching to an external network)
  5. Changing the information of a virtual router (attaching to a subnet)
  6. Creating a security group
  7. Creating a security group rule
  8. Create firewall rules
  9. Creating a firewall policy
  10. Creating a firewall
  11. SSL-VPN connection
  12. Creating a key pair
  13. Creating a port(if creating a virtual server on which ports are specified)
  14. Create a virtual server