{"id":18207,"date":"2022-09-29T15:27:36","date_gmt":"2022-09-29T09:57:36","guid":{"rendered":"http:\/\/onlineappsdba.com\/?p=18207"},"modified":"2022-09-29T15:37:09","modified_gmt":"2022-09-29T10:07:09","slug":"networking-encryption-and-peering-in-oci","status":"publish","type":"post","link":"https:\/\/onlineappsdba.com\/index.php\/2022\/09\/29\/networking-encryption-and-peering-in-oci\/","title":{"rendered":"Networking, Encryption, Peering in OCI"},"content":{"rendered":"<p>\ud83d\udccdOracle Cloud Infrastructure customers can manage and scale their networks with (OCI) networking and connectivity products and services. Customers can connect securely to a configurable, isolated virtual cloud network (VCN) and benefit from low data egress fees.<\/p>\n<p>\u2705A VCN (Virtual Cloud Network) is a private network that can be customized in Oracle Cloud Infrastructure. A VCN, like a traditional data center network, gives you total control over your network environment.<\/p>\n<p>\u2705VCN peering is the process of connecting multiple virtual cloud networks (VCNs). In general, user\u00a0can control access and traffic between two peer VCNs by implementing IAM policies, route tables and security lists\u00a0in each VCN.<\/p>\n<p>\u2708\ufe0fSecurity and Encryption<\/p>\n<p>\u26a1End-to-end encryption (E2EE) is a secure communication method that restricts unauthorized third parties from accessing data transferred from one endpoint to another.<\/p>\n<p>\u26a1TLS (Transport Layer Security), is a widely used security protocol that enhances privacy and data security for Internet communications.<\/p>\n<p>\ud83d\udcda Read the Blog: <a href=\"https:\/\/k21academy.com\/oci91\/?utm_source=onlineappsdba&amp;utm_medium=referral&amp;utm_campaign=oci02_sept2022\">https:\/\/k21academy.com\/oci91<\/a><\/p>\n<p>\ud83c\udf96\ufe0f For a FREE Live Class on OCI Architect, Register here\ud83d\udc49 <a href=\"https:\/\/k21academy.com\/1z01072-oci-architect-associate-free-masterclass\/?utm_source=onlineappsdba&amp;utm_medium=referral&amp;utm_campaign=oci02_aug2022\">https:\/\/k21academy.com\/oci02<\/a><\/p>\n<p><a href=\"https:\/\/k21academy.com\/1z01072-oci-architect-associate-free-masterclass\/?utm_source=onlineappsdba&amp;utm_medium=referral&amp;utm_campaign=oci02_sept2022\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/k21academy.com\/wp-content\/uploads\/2021\/09\/1072_CU.gif\" alt=\"orcale cloud Infra Architect\" width=\"1162\" height=\"173\" \/><\/a><\/p>\n<p><strong>Join us Live!!!<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ud83d\udccdOracle Cloud Infrastructure customers can manage and scale their networks with (OCI) networking and connectivity products and services. Customers can [&hellip;]<\/p>\n","protected":false},"author":115,"featured_media":18208,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[549],"tags":[],"class_list":["post-18207","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-1z0-1072"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Networking, Encryption, Peering in OCI -<\/title>\n<meta name=\"description\" content=\"Learn about the networking, encryption and peering capabilities for your data in Oracle Cloud Infrastructure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/onlineappsdba.com\/index.php\/2022\/09\/29\/networking-encryption-and-peering-in-oci\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Networking, Encryption, Peering in OCI -\" \/>\n<meta property=\"og:description\" content=\"Learn about the networking, encryption and peering capabilities for your data in Oracle Cloud Infrastructure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/onlineappsdba.com\/index.php\/2022\/09\/29\/networking-encryption-and-peering-in-oci\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-29T09:57:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-29T10:07:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/09\/is-Data-Encrypted-within-OCI-Tenancy-Regions.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Masroof Ahmad\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Masroof Ahmad\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2022\/09\/29\/networking-encryption-and-peering-in-oci\/\",\"url\":\"https:\/\/onlineappsdba.com\/index.php\/2022\/09\/29\/networking-encryption-and-peering-in-oci\/\",\"name\":\"Networking, Encryption, Peering in OCI -\",\"isPartOf\":{\"@id\":\"https:\/\/onlineappsdba.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2022\/09\/29\/networking-encryption-and-peering-in-oci\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2022\/09\/29\/networking-encryption-and-peering-in-oci\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/09\/is-Data-Encrypted-within-OCI-Tenancy-Regions.jpeg\",\"datePublished\":\"2022-09-29T09:57:36+00:00\",\"dateModified\":\"2022-09-29T10:07:09+00:00\",\"author\":{\"@id\":\"https:\/\/onlineappsdba.com\/#\/schema\/person\/909a876ed58d400faf82caf81d61bfdb\"},\"description\":\"Learn about the networking, encryption and peering capabilities for your data in Oracle Cloud Infrastructure.\",\"breadcrumb\":{\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2022\/09\/29\/networking-encryption-and-peering-in-oci\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/onlineappsdba.com\/index.php\/2022\/09\/29\/networking-encryption-and-peering-in-oci\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2022\/09\/29\/networking-encryption-and-peering-in-oci\/#primaryimage\",\"url\":\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/09\/is-Data-Encrypted-within-OCI-Tenancy-Regions.jpeg\",\"contentUrl\":\"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/09\/is-Data-Encrypted-within-OCI-Tenancy-Regions.jpeg\",\"width\":1280,\"height\":720,\"caption\":\"is Data Encrypted within OCI Tenancy Regions\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/onlineappsdba.com\/index.php\/2022\/09\/29\/networking-encryption-and-peering-in-oci\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/onlineappsdba.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Networking, Encryption, Peering in OCI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/onlineappsdba.com\/#website\",\"url\":\"https:\/\/onlineappsdba.com\/\",\"name\":\"\",\"description\":\"Oracle Implementation &amp; Training Experts\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/onlineappsdba.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/onlineappsdba.com\/#\/schema\/person\/909a876ed58d400faf82caf81d61bfdb\",\"name\":\"Masroof Ahmad\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/onlineappsdba.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/10f9db7bdbbd7f9ccfbe9b2d208e5978fc28315e9c704383e639a926ea0fce5f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/10f9db7bdbbd7f9ccfbe9b2d208e5978fc28315e9c704383e639a926ea0fce5f?s=96&d=mm&r=g\",\"caption\":\"Masroof Ahmad\"},\"url\":\"https:\/\/onlineappsdba.com\/index.php\/author\/masroof\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Networking, Encryption, Peering in OCI -","description":"Learn about the networking, encryption and peering capabilities for your data in Oracle Cloud Infrastructure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/onlineappsdba.com\/index.php\/2022\/09\/29\/networking-encryption-and-peering-in-oci\/","og_locale":"en_US","og_type":"article","og_title":"Networking, Encryption, Peering in OCI -","og_description":"Learn about the networking, encryption and peering capabilities for your data in Oracle Cloud Infrastructure.","og_url":"https:\/\/onlineappsdba.com\/index.php\/2022\/09\/29\/networking-encryption-and-peering-in-oci\/","article_published_time":"2022-09-29T09:57:36+00:00","article_modified_time":"2022-09-29T10:07:09+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/09\/is-Data-Encrypted-within-OCI-Tenancy-Regions.jpeg","type":"image\/jpeg"}],"author":"Masroof Ahmad","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Masroof Ahmad","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/onlineappsdba.com\/index.php\/2022\/09\/29\/networking-encryption-and-peering-in-oci\/","url":"https:\/\/onlineappsdba.com\/index.php\/2022\/09\/29\/networking-encryption-and-peering-in-oci\/","name":"Networking, Encryption, Peering in OCI -","isPartOf":{"@id":"https:\/\/onlineappsdba.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/onlineappsdba.com\/index.php\/2022\/09\/29\/networking-encryption-and-peering-in-oci\/#primaryimage"},"image":{"@id":"https:\/\/onlineappsdba.com\/index.php\/2022\/09\/29\/networking-encryption-and-peering-in-oci\/#primaryimage"},"thumbnailUrl":"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/09\/is-Data-Encrypted-within-OCI-Tenancy-Regions.jpeg","datePublished":"2022-09-29T09:57:36+00:00","dateModified":"2022-09-29T10:07:09+00:00","author":{"@id":"https:\/\/onlineappsdba.com\/#\/schema\/person\/909a876ed58d400faf82caf81d61bfdb"},"description":"Learn about the networking, encryption and peering capabilities for your data in Oracle Cloud Infrastructure.","breadcrumb":{"@id":"https:\/\/onlineappsdba.com\/index.php\/2022\/09\/29\/networking-encryption-and-peering-in-oci\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/onlineappsdba.com\/index.php\/2022\/09\/29\/networking-encryption-and-peering-in-oci\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/onlineappsdba.com\/index.php\/2022\/09\/29\/networking-encryption-and-peering-in-oci\/#primaryimage","url":"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/09\/is-Data-Encrypted-within-OCI-Tenancy-Regions.jpeg","contentUrl":"https:\/\/onlineappsdba.com\/wp-content\/uploads\/2022\/09\/is-Data-Encrypted-within-OCI-Tenancy-Regions.jpeg","width":1280,"height":720,"caption":"is Data Encrypted within OCI Tenancy Regions"},{"@type":"BreadcrumbList","@id":"https:\/\/onlineappsdba.com\/index.php\/2022\/09\/29\/networking-encryption-and-peering-in-oci\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/onlineappsdba.com\/"},{"@type":"ListItem","position":2,"name":"Networking, Encryption, Peering in OCI"}]},{"@type":"WebSite","@id":"https:\/\/onlineappsdba.com\/#website","url":"https:\/\/onlineappsdba.com\/","name":"","description":"Oracle Implementation &amp; Training Experts","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/onlineappsdba.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/onlineappsdba.com\/#\/schema\/person\/909a876ed58d400faf82caf81d61bfdb","name":"Masroof Ahmad","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/onlineappsdba.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/10f9db7bdbbd7f9ccfbe9b2d208e5978fc28315e9c704383e639a926ea0fce5f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/10f9db7bdbbd7f9ccfbe9b2d208e5978fc28315e9c704383e639a926ea0fce5f?s=96&d=mm&r=g","caption":"Masroof Ahmad"},"url":"https:\/\/onlineappsdba.com\/index.php\/author\/masroof\/"}]}},"_links":{"self":[{"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/posts\/18207","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/users\/115"}],"replies":[{"embeddable":true,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/comments?post=18207"}],"version-history":[{"count":0,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/posts\/18207\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/media\/18208"}],"wp:attachment":[{"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/media?parent=18207"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/categories?post=18207"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/onlineappsdba.com\/index.php\/wp-json\/wp\/v2\/tags?post=18207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}