Disclaimer

Monday, 9 June 2025

OCI Network - Interview Questions and Answers

 

OCI Network : Interview Questions and Answers 



✅ Fundamentals

  1. Q: What is a Virtual Cloud Network (VCN)?
    A: A logically isolated, customizable virtual network in OCI — consisting of subnets, route tables, gateways, and security rules.

  2. Q: Define a subnet in OCI.
    A: A partition within a VCN that segments IP address blocks, designated as public (with IGW) or private (no IGW).

  3. Q: What is an Internet Gateway (IGW)?
    A: A virtual router providing bi-directional public internet connectivity for public subnets; only one IGW per VCN 

  4. Q: What is a NAT Gateway?
    A: Provides outbound-only internet access for private subnets, enabling updates/patching without inbound exposure.

  5. Q: What is a Service Gateway (SGW)?
    A: Enables private access to OCI public services (like Object Storage) without public internet .

  6. Q: How does SGW differ from IGW/NAT?
    A: SGW enables OCI service access only, not general internet access; traffic stays on Oracle’s network.



🛂 Security & Access Control

  1. Q: Define Security Lists.
    A: Firewall rules applied at the subnet layer—control inbound/outbound traffic.

  2. Q: Define Network Security Groups (NSG).
    A: Virtual firewall assigned to individual resources, offering fine-grained ingress/egress rules 

  3. Q: IGW requires public IP. True/False?
    A: True. Only resources with a public IP can send/receive through IGW .

  4. Q: NAT gateway allows inbound Internet traffic. True/False?
    A: False. NAT only supports outbound traffic from private subnets.



🔄 Routing

  1. Q: What is a Route Table?
    A: Contains route rules to direct traffic to IGW, NAT, SGW, DRG, etc.

  2. Q: Can a subnet reference multiple NAT Gateways?
    A: No. Each private subnet can route to only one NAT Gateway at a time.

  3. Q: Why add route 0.0.0.0/0 → IGW in public subnets?
    A: To enable all external traffic to ingress/egress via IGW.

  4. Q: Why add route 0.0.0.0/0 → NAT Gateway in private subnets?
    A: To allow outbound access from private instances to external destinations.



🔐 VPN & DRG

  1. Q: What is VPN Connect?
    A: Enables IPSec VPN between on-premise or other cloud networks and OCI VCNs.

  2. Q: What is a Dynamic Routing Gateway (DRG)?
    A: A virtual router attaching a VCN to on-prem networks via VPN Connect or FastConnect.

  3. Q: What is Local Peering Gateway (LPG)?
    A: Enables VCN-to-VCN peering within the same region, private IP communication.

  4. Q: What is Remote Peering Connection (RPC)?
    A: Similar to LPG, but for cross-region VCN peering.

  5. Q: Do LPG/RPC use internet?
    A: No. Traffic remains on Oracle's private network backbone.



🚦 NSG & Security Lists Scenarios

  1. Q: IGW + NSG + Security List setup for a public web server?
    A: IGW with public IP + route table entry. NSG/Security List allow TCP 80/443 inbound & all outbound.

  2. Q: Private DB instance using NAT Gateway?
    A: DB in private subnet. Route to NAT. Security allows DB ports inbound only from app tier.

  3. Q: Restrict outbound on private instances?
    A: Use NSG to whitelist only required outbound endpoints, e.g., SGW.

  4. Q: Can you use NSG instead of Security Lists?
    A: Yes. NSGs apply to specific resources and offer more granular control.



🧠 Logical & Design Scenarios

  1. Q: Design: Web → App → DB with strict separation.
    A:

  • Web Tier: public subnet, IGW, NSG allowing HTTP/HTTPS.

  • App Tier: private subnet, NSG only allow web VCN CIDR.

  • DB Tier: private subnet, NSG restricting access from app tier only. Use NAT or SGW for updates.

  1. Q: Backup DB to Object Storage via SGW.
    A: Use SGW in DB subnet’s route table for private path to Object Storage.

  2. Q: Cross-region DR with private Oracle Autonomous DB.
    A: Use RPC for cross-region VCN peering; route VPN traffic via RPC.

  3. Q: Centralized egress firewall with NAT.
    A: Route from private to NAT → firewall instance → IGW.

  4. Q: Cost optimization: shared NAT among subnets?
    A: Yes, central NAT Services work; each subnet route to single NAT per AZ.



⚡ True/False Statements

  1. IGW can be used by peered VCNs. False. Only VCN-associated subnets.

  2. Each VCN can have multiple IGWs. False. Only one IGW permitted SGW eliminates public IP necessity. True.

  3. NAT Gateway handles inbound SSH from Internet. False.

  4. DRG supports dynamic route propagation. True.

  5. VPN Connect requires both endpoints to have public IPs. True.

  6. LPG automatically updates route tables. False. Manual route entries required.



🤔 Behavioral & Strategy Questions

  1. Q: Multiple availability zones—how design NAT?
    A: Deploy a NAT Gateway per AZ or central NAT per region.

  2. Q: How to ensure resilience for VPN?
    A: Use dual-ISP VPN, high-availability on-prem, and BGP routing failover.

  3. Q: How to segregate production vs. dev?
    A: Use separate VCNs, compartments, LPG/RPC if necessary with strict NSG/security list.

  4. Q: Ensure secure OCI service access from on-prem?
    A: On-prem → VPN → SGW → OCI services (no public Internet exposure).

  5. Q: Compliance needs with public internet exposure.
    A: Use private subnets; service/NAT/SGW; NSG + Security Zones.



🎯 Senior-Level Deep Dive

  1. Q: Multi-region network design best practices.
    A: Use RPCs, DRGs, DRG with FastConnect; ensure route propagation and failover.

  2. Q: Can NAT block outbound port usage?
    A: No; NAT only handles IP translation—filter using NSGs or firewall.

  3. Q: Compare NSG vs. Security List performance/scale.
    A: Similar perf; NSG is more resource-granular.

  4. Q: Egress-only subnet for Oracle services?
    A: Combine SGW + route table; no public internet exposure.

  5. Q: Transit Gateway vs. DRG?
    A: Transit Gateway supports hub‑and‑spoke multiple VCNs + on-prem; DRG is one-to-one VCN.

  6. Q: How route propagation works in DRG?
    A: It propagates on-prem or VCN-originated routes to VCN route tables.

  7. Q: Upgrading NSG dynamically—impact?
    A: Changes apply immediately to traffic; plan updates during low usage.

  8. Q: Troubleshooting no internet on public subnet?
    A: Check: IGW present, route table entry, public IP, security list/NSG rules.

  9. Q: Audit network changes in OCI.
    A: Use OCI Audit logs to track create/update/delete on subnets, gateways, NSGs, route tables.

  10. Q: Balancing security vs. agility in network design.
    A: Use multi-tier isolation, NSGs, minimal privileges, infrastructure-as-code (Terraform) with review pipelines.



📘 Quick Snippet Answers with Citations

  • IGW: Only one per VCN; supports bidirectional internet with public IP requirement expertoracle.comjavainuse.com.

  • SGW: Enables private access to Oracle services on OCI’s internal network .

  • NSG: Enables granular rules per resource; virtual firewall within a VCN .




No comments:

Post a Comment

Understanding SQL Plan Baselines in Oracle Database

  Understanding SQL Plan Baselines in Oracle Database SQL Plan Baseline is the feature in Oracle started from Database 11g that helps to pre...