At Clouding you have both access to the public network -the internet- as well as being able to use a private network, to which only your servers have access to exchange information between them.
Public network
All cloud servers include a network interface connected to the public Clouding network.
- Public IP: this interface has a fixed and exclusive public IP configured for your cloud server, which will always be assigned to you as long as the server exists.
- Measured traffic: the traffic that you send or receive through this interface will be considered public traffic and, such your monthly traffic volume can be discounted.
- Unsecured traffic: the internet is an unsecured network and, therefore, the traffic you receive on the public network cannot be considered secure.
- Non-isolated traffic: we use various advanced techniques to prevent your traffic from being seen by other Cloud Servers hosted in Clouding, but in some situations - for example due to configuration errors - this traffic can be seen by other equipment.
Private network
If your Clouding account has two or more servers, you can use them at an additional cost of €1 for each unique Private Network.
- Private IP: this interface has a private IP configured by default, which you can change if you wish and use any private IP range.
- Unmeasured traffic: traffic on this network is never counted, it is totally unlimited and your monthly traffic volume is not discounted.
- Secure traffic: Only your cloud servers hosted on Clouding have access to this private network, therefore it is ideal for exchanging sensitive or confidential traffic between your servers.
- Isolated traffic: each private network is totally isolated from the rest of the networks hosted in Clouding, therefore it's not necessary for you to use encrypted protocols when sharing data between your servers through this network.
How does it work?
When an Ethernet packet leaves your Cloud Server, we assign an 802.3ac ethernet tag, which is done immediately after the packet leaves your server.
Using that tag to identify it while it is in the source hypervisor, it goes to a VXLAN tunnel based on the destination hypervisor. When it reaches the VXLAN, the 802.3ac tag is changed to the VNID assigned to your customer account and the package is sent to the destination hypervisor. There, an 802.3ac tag is used again to isolate it from the rest of the traffic until it is delivered to your other cloud server, now as as a normal package.
How do I activate it?
You must click on the name of the server and in the Network section, you will have the option of Enable Private Network (VPCs):
If you press "Send" it will create a predefined network, that is, a network within 10.20.10.0/24:
If you want a custom IP range, you can click on "Advanced", go to No Select VPC (depending on whether you have one created or you will not get the name of the one created or "There are no VPCs available), you can click there and choose Create a new VPC or use one already created.
It will also give you the option to use a specific IP within the range you choose.
Finally, it will give you the option to choose a specific firewall profile.
VPC management
You can also manage your private networks (VPCs) directly in My VPCs:
Within the profile you will be able to see and modify name, description, configured Gateway and DNS.
It will also indicate the selected range, free addresses.
Finally, in "Server Attachments" it tells you the servers that have the VPC profile configured as well as the IP it uses.