Skip to main content

Network Settings

Configure virtual networks, IP addressing, load balancers, and security.

Overview

The Networking service provides software-defined networking for cloud resources. Create isolated networks, manage IP addressing, secure traffic via firewalls, and connect compute and load-balancing resources.


Prerequisites

  • Cloud dashboard access with network permissions
  • Compute resources (VMs, bare-metal, containers) to attach
  • IP address and subnet plan
  • (Optional) Network security policy

Step 1: Create Virtual Network

  1. Navigate to Networking > Networks
  2. Click Create Network
  3. Configure:
SettingDescription
Network namee.g., app-internal-net
TypePublic (internet-facing) or Private (internal only)
CIDR blocke.g., 10.0.0.0/24
  1. Save network

Step 2: Create Subnets and Interfaces

  • Add subnets to segment traffic (e.g., app-subnet, db-subnet)
  • Assign network interfaces to resources:
    • At resource creation, or
    • Attach later via network-interface configuration
IP AssignmentDescription
Dynamic/DHCPAutomatic IP assignment
StaticManually assigned IP

Step 3: Configure Public IPs

  1. Go to IP Addresses in Networking
  2. Allocate public or floating IP
  3. Attach to resource (VM, load balancer)
  4. Floating IPs can move between resources without DNS changes

Step 4: Set Up Routers

  • Create Router and associate with networks
  • Configure routing rules and Internet Gateway
  • Set default route (0.0.0.0/0) for outbound access
  • (Optional) Configure VPN for hybrid connectivity

Step 5: Deploy Load Balancers

  1. Navigate to Load Balancers
  2. Click Create Load Balancer
  3. Configure:
SettingDescription
Listener protocolsHTTP, HTTPS, TCP
Backend poolVMs or bare-metal servers
Health checke.g., /health, interval 10s, threshold 3
  1. Attach public IP and create DNS record
  2. Traffic distributes to backend pool when active

Step 6: Configure Firewalls

  1. Open Firewall / Security Groups
  2. Create rules:
Rule ComponentDescription
SourceCIDR or IP range
DestinationResource or network
Ports/Protocolse.g., TCP 80/443, ICMP
ActionAllow or Deny
  1. Attach security group to resources
  2. Segment internal and external traffic properly

Step 7: Monitor Network Health

  • View traffic volumes, connection counts, error rates
  • Enable load balancer monitoring and logs
  • Review subnet utilization and IP usage
  • Audit periodically:
    • Unused IP allocations
    • Idle subnets or routers
    • Over-permissive firewall rules

Troubleshooting

ProblemCauseSolution
No internet accessMissing gatewayAttach router, set default route
Internal comms failMisconfigured subnetCheck interfaces and routing
Load balancer 502Backend health failingVerify health check and backend
Public IP unresponsiveDNS or IP not attachedConfirm IP assignment and DNS
Unexpected trafficFirewall too openRestrict to necessary ports