Contrail Networking and Security User Guide
Use this guide to understand how you can create and orchestrate highly secure virtual networks using Contrail Networking and Security. Contrail Networking provides dynamic end-to-end networking policy and control for any cloud, any workload, and any deployment, from a single user interface. And unlike the conventional firewall configuration of IP addresses and port ranges, Contrail Security implements intent-based policy framework that uses policy constructs such as tags, labels, application policy set, address groups, and service groups.
Contrail Networking product documentation is organized into multiple guides as shown in Table 1, according to the task you want to perform or the deployment scenario.
Table 1: Contrail Networking Guides
Provides step-by-step instructions to install and bring up Contrail and its various components.
Provides information about installing and using Contrail Networking in containerized environments using Kubernetes orchestration.
Provides information about Contrail underlay management and data center automation.
Provides information about creating and orchestrating highly secure virtual networks.
Provides information about the features that are used by service providers.
Provides information about Contrail Insights and Contrail analytics.