Introduction
The Bridge Gateway provides intelligent network bridging through automated virtual switch provisioning. This service eliminates manual firewall management to deliver self-service network control for hybrid cloud deployments.
Unlike traditional network gateways that require operations team involvement for every configuration change, our automated Bridge Gateway ensures instant provisioning and real-time rule management while maintaining enterprise-grade security and performance.
Key Features
Network Management
- Self-Service Firewall Control: Configure and modify firewall rules directly through the Cloud Portal without tickets or delays
- Automated Provisioning: Bridge Gateways deploy instantly as VMs with pre-configured network settings
- Real-time Traffic Monitoring: View comprehensive traffic logs with filtering by IP, subnet, and time range
Infrastructure Integration
- Many-to-Many Architecture: Connect multiple bare metal servers to multiple gateways for flexible network topologies
- Hybrid Cloud Bridging: Seamlessly integrate legacy bare metal systems with Virtual Data Center (VDC) resources
- VPC Integration: Native compatibility with existing Virtual Private Cloud configurations
Security and Compliance
- Enterprise Firewall Capabilities: Granular traffic control with allow rules, port management, and protocol filtering using deny-by-default security model
- Network Isolation: Maintain strict separation between environments while enabling controlled connectivity through explicit allow rules
- Audit Trail Management: Complete logging of all configuration changes and traffic patterns
Common Use Cases
Infrastructure Modernization
- Legacy System Integration: Connect existing bare metal infrastructure to cloud services without hardware changes
- Hybrid Cloud Architecture: Bridge physical and virtual environments for unified infrastructure management
- Data Center Migration: Gradually migrate workloads while maintaining connectivity between old and new systems
- Multi-Cloud Connectivity: Enable secure communication between different cloud environments and on-premises systems
- Mission-Critical Workloads: Provide dedicated network pathways for applications requiring bare metal performance
- High-Performance Computing: Enable low-latency networking for GPU clusters and compute-intensive workloads
- Database Clustering: Connect distributed database systems across bare metal and cloud infrastructure
- Real-Time Processing: Support applications with strict latency requirements and high throughput needs
Compliance and Security
- Regulated Workloads: Maintain network isolation while enabling controlled connectivity for compliance requirements
- Financial Services: Meet strict security standards while enabling hybrid cloud operations
- Government Applications: Satisfy security clearance requirements with controlled network segmentation
- Enterprise Systems: Ensure regulatory compliance while connecting critical business systems to modern cloud platforms
Getting Started
Basic Bridge Gateway Setup for Development Environment
This example demonstrates creating your first Bridge Gateway for a development environment. You'll learn how to provision a gateway, configure basic firewall rules, and prepare for bare metal server connections while understanding the fundamental workflow.
Step 1: Prerequisites and Planning
Scenario: Your development team needs to connect a legacy application running on bare metal servers in Riyadh to cloud-based services. The application requires HTTPS access and database connectivity while maintaining security isolation from production systems.
Requirements Analysis:
- Security Requirements: Define explicit allow rules for required traffic, leveraging deny-by-default security model
- Network Requirements: HTTPS (port 443), and database access (port 3306) from development subnet
- Environment: Development environment with controlled access through explicit allow rules
- Timeline: Immediate deployment needed for upcoming sprint work
Resource Requirements:
- Active tenant account with Bridge Gateway creation privileges
- Development environment access in target region
- Planned IP address ranges for bare metal servers
- Firewall rule requirements documented
Step 2: Create Bridge Gateway
- Navigate to Bridge Gateway Section
- Log into the Cloud Portal
- Navigate to Network → Bridge Gateways
- Verify you see the Bridge Gateways listing page with Create button
- Initiate Gateway Creation
- Click the Create button in the top-right corner
- Confirm you see the Bridge Gateway creation form
- Expected interface shows Region, Environment, VPC, and Subnet fields
- Configure Basic Settings
- Region: Select “Riyadh” from the dropdown menu
- Environment: Select any development environment from the dropdown menu
- VPC: Choose SSA VPC from available options
- Subnet: Select a predefined subnet within the selected VPC from the dropdown menu
Step 3: Review Network Configuration
- Verify Automatic Assignments
- Subnet Assignment: Choose an available subnet from the selected VPC
- Private IP: Note the assigned IP address after successfully creating the bridge gateway
- Virtual IP Pool: Review the allocated virtual IP range for future bare metal connections
- Expected format: Gateway receives private IP for management, pool shows list of available private IPs within the selected subnet.
- Validate Configuration
- Confirm all settings match your requirements
- Verify subnet doesn't conflict with existing infrastructure
- Document assigned IPs for future reference
Step 4: Submit Creation Request
- Final Review and Creation
- Review configuration summary
- Click Create Bridge Gateway button
- Monitor status indicator showing provisioning progress
- Validate Successful Creation
- Confirm gateway appears in Bridge Gateways listing
- Status shows as "Active" with green indicator
- Gateway details page accessible by clicking gateway name
- Access Firewall Management
- Navigate to your newly created gateway details page
- Click Firewall Rules tab
- Verify you see empty rules list ready for configuration
- Create HTTPS Rule
- Click Add Rule button
- Direction : Incoming
- Policy Type: NET -> SSA (for public internet access)
- Sources: 0.0.0.0/0 (any source for development), or a specific Public IP range of your headquarter (recommended)
- Destinations: Your gateway subnet
- Services: HTTPS (port 443) from predefined services list
- Description: “Allow HTTPS traffic from internet to development servers”
- Create Internal Database Rule
- Direction: Incoming
- Policy Type: SSA -> SSA (internal network communication)
- Sources: Your application subnet range (e.g., 10.10.0.0/16)
- Destinations: Database server IPs
- Services: MySQL (port 3306) from predefined services list
- Description: “Allow application servers to access MySQL database”
- Configure On-Premises Connectivity
- Direction: Incoming
- Policy Type: ON-PREM -> SSA (if connecting to on-premises systems)
- Sources: On-premises network range
- Destinations: Database servers
- Services: Custom protocol/port if needed
- Description: "Allow on-premises systems to access cloud databases"
Step 7: Test and Validate Configuration
- Verify Rule Creation
- Confirm all allow rules appear in firewall rules list
- Check rule parameters match intended configuration
- Validate policy types correctly reflect network architecture
General Bridge Gateway Creation Summary
For All Use Cases:
- Planning and Prerequisites - Assess network requirements, security policies, and define necessary allow rules for deny-by-default architecture
- Gateway Provisioning - Configure basic settings and review automatic network assignments for accuracy
- Firewall Configuration - Implement explicit allow rules following least-privilege principles within deny-by-default security model
- Validation and Testing - Confirm gateway functionality, verify only authorized traffic flows are permitted through allow rules
Important Notes:
- Bridge Gateway uses deny-by-default security model - only configure allow rules for required traffic
- Firewall rule changes take effect immediately without service interruption
- Contact technical support for assistance with complex multi-gateway architectures or compliance requirements
Configuration and Setup