All Products
Search
Document Center

Cloud Enterprise Network:Multiple cloud enterprise networks using shared services

Last Updated:Apr 01, 2026

Cloud Enterprise Network (CEN) instances are isolated from each other by default. Connecting a single virtual private cloud (VPC) to multiple CEN instances breaks that isolation selectively — the shared VPC can communicate with each CEN, while the CENs remain invisible to each other.

This setup is a good fit for workloads that:

  • Run in separate CEN instances that must stay isolated from each other

  • All need access to a common internal service — such as DNS, Network Time Protocol (NTP), or a security scanner — hosted in a dedicated VPC

  • Must not communicate directly between CENs

Scenario

image

This tutorial uses VPC3 as the shared services VPC. VPC3 connects to both transit routers (TR1 in CEN1 and TR2 in CEN2). VPC1 and VPC2 each connect only to their own transit router.

After configuration:

  • VPC1 can reach VPC3, and VPC3 can reach VPC1

  • VPC2 can reach VPC3, and VPC3 can reach VPC2

  • VPC1 and VPC2 cannot reach each other

The isolation holds at the routing layer. VPC1's route table only contains a route to VPC3's CIDR block — there is no entry pointing to VPC2. When VPC1 sends traffic toward VPC2, the transit router drops the packets because no matching route exists in its route table.

Prerequisites

Before you begin, make sure that you have:

  • Two CEN instances named CEN1 and CEN2, each with one transit router in the China (Hangzhou) region — TR1 in CEN1 and TR2 in CEN2

  • Three VPCs in China (Hangzhou), not yet connected to any transit router, with the following configuration:

  • Three ECS instances, each deployed under a different VPC, named ECS1, ECS2, and ECS3

ParameterVPC1VPC2VPC3
IPv4 CIDR block10.0.0.0/8172.16.0.0/12192.168.0.0/16
vSwitch 1Zone J, 10.0.0.0/24Zone J, 172.16.0.0/24Zone J, 192.168.0.0/24
vSwitch 2Zone K, 10.0.1.0/24Zone K, 172.16.1.0/24Zone K, 192.168.1.0/24
ECS instance (in vSwitch 1)ECS1: 10.0.0.1ECS2: 172.16.0.1ECS3: 192.168.0.1
CIDR blocks across the three VPCs must not overlap. In regions where Enterprise Edition transit routers support multiple zones, create vSwitches in at least two zones for disaster recovery.

For instructions on creating each resource, see Create a CEN instance, Create a transit router, Create a VPC and a vSwitch, and Create an ECS instance.

Step 1: Connect VPCs to transit routers

Create four VPC connections in total. Each connection links one VPC to one transit router. The general steps are the same for all four connections — only the parameters differ.

To create a VPC connection:

  1. Log on to the CEN console. On the Instances page, click the CEN instance ID.

  2. On the Basic Information > Transit Router tab, find the transit router and click Actions in the Create Connection column.

  3. On the Connection with Peer Network Instance page, configure the parameters from the table below, then click OK.

Use the following parameters for each of the four connections:

ParameterVPC1 → TR1VPC2 → TR2VPC3 → TR1VPC3 → TR2
CENCEN1CEN2CEN1CEN2
Transit routerTR1TR2TR1TR2
Instance typeVPCVPCVPCVPC
RegionChina (Hangzhou)China (Hangzhou)China (Hangzhou)China (Hangzhou)
Resource owner IDSame AccountSame AccountSame AccountSame Account
Billing methodPay-as-you-goPay-as-you-goPay-as-you-goPay-as-you-go
Attachment nameAttach1Attach2Attach3-1Attach3-2
Network instanceVPC1VPC2VPC3VPC3
vSwitchZone J: vSwitch 1; Zone K: vSwitch 2Zone J: vSwitch 1; Zone K: vSwitch 2Zone J: vSwitch 1; Zone K: vSwitch 2Zone J: vSwitch 1; Zone K: vSwitch 2

For Advanced Settings, select the first two options and leave the third unchecked:

  • Associate with Default Route Table of Transit Router — the VPC connection is automatically associated with the default route table of the transit router, which the transit router uses to forward traffic

  • Propagate System Routes to Default Route Table of Transit Router — the system routes of the VPC are advertised to the transit router's default route table, enabling communication with other connected network instances

  • Automatically Creates Route That Points to Transit Router and Adds to All Route Tables of Current VPC — leave this unchecked; you will configure the VPC route tables manually in Step 2

If you enable the third option, the system automatically adds routes for 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16 to all route tables of the VPC, with next hops pointing to the VPC connection. If any of those destination CIDR blocks already exist in the VPC route table, the automatic update fails — click Initiate Route Check to verify, then add the routes manually. For IPv6 traffic, after creating the VPC connection, enable route synchronization or manually add IPv6 route entries pointing to the VPC connection.

Step 2: Configure route tables

Add custom route entries to the route tables of all three VPCs so that traffic is directed to the transit router.

  1. Log on to the VPC console.

  2. In the left-side navigation pane, click Route Tables.

  3. In the top menu bar, select the China (Hangzhou) region.

  4. Click the ID of the route table for VPC1.

  5. On the details page, click the Route Entry List tab, then the Custom Route Entry tab.

  6. Click Add Route Entry. In the panel that appears, set the destination CIDR block to 192.168.0.0/16, set Next Hop Type to Transit Router, select Attach1, and click OK.

image
  1. Repeat steps 4–6 for VPC2 and VPC3, using the parameters in the table below.

VPCDestination CIDR blockNext hopRoute type
VPC1192.168.0.0/16Attach1Custom
VPC2192.168.0.0/16Attach2Custom
VPC310.0.0.0/8Attach3-1Custom
VPC3172.16.0.0/12Attach3-2Custom

After this step, each VPC has exactly the routes it needs. VPC1 and VPC2 have a route to VPC3's CIDR block, but no route to each other — this is what keeps them isolated while both can reach VPC3.

Verify the configuration

Before running the ping tests, make sure the security group rules for all three ECS instances allow ICMP traffic. See Query security group rules and Add security group rules.
image

Log on to ECS1 and ping ECS3:

ping 192.168.0.1
image

A successful ping confirms that VPC1 and VPC3 are connected.

Run the following checks to verify both connectivity and isolation:

TestFromToExpected resultWhat it confirms
ping 192.168.0.1ECS1ECS3SuccessVPC1 and VPC3 are connected
ping 192.168.0.1ECS2ECS3SuccessVPC2 and VPC3 are connected
ping 172.16.0.1ECS1ECS2FailureVPC1 and VPC2 are isolated

FAQ

How many CEN instances can I create in one Alibaba Cloud account?

The default limit is five. To request a higher limit, see Quota.

How many transit routers can a VPC connect to?

The default limit is five. To request a higher limit, see Quota.

What do I do if connectivity tests fail?

Check the route tables of the relevant VPCs and the transit router to make sure round-trip route entries exist for both directions. Also check the security group rules and the OS-level firewall settings on the ECS instances. For a step-by-step troubleshooting guide, see FAQs.