Configure Networking
Octos Cloud provides a full software-defined networking stack. Create isolated private networks, control traffic with security groups, and assign floating IPs — all with zero egress fees.
Networking concepts
| Concept | Description |
|---|---|
| Public Network | Internet-facing network with a public IP address |
| Private Network | Isolated L2/L3 network within your project |
| Security Group | Stateful firewall rules for inbound/outbound traffic |
| Floating IP | Portable public IP that can be reassigned between VMs |
| Virtual Router | Routes traffic between private and public networks |
Create a private network
- Navigate to Networking → Networks in your project
- Click Create Network
- Configure the subnet:
- Network Address — e.g.,
10.0.0.0 - Network Mask — e.g.,
255.255.255.0 - Gateway — e.g.,
10.0.0.1 - DNS Nameservers — e.g.,
8.8.8.8, 8.8.4.4
- Network Address — e.g.,
- Click Create
Attach a VM to a private network
- Go to your VM's Networking tab
- Click Attach Interface
- Select the private network and optional subnet
- The VM will receive a private IP automatically (or specify one manually)
Configure security groups
Security groups act as virtual firewalls. Each rule defines allowed traffic by protocol, port range, and source.
Create a security group
- Navigate to Networking → Security Groups
- Click Create New Security Group
- Add inbound and outbound rules:
Direction: Inbound
Protocol: TCP
Port: 22
Remote: 0.0.0.0/0 (or restrict to your IP)
Direction: Inbound
Protocol: TCP
Port: 80, 443
Remote: 0.0.0.0/0
- Attach the security group to your VM
caution
By default, all inbound traffic is blocked. You must explicitly open ports for SSH (22), HTTP (80), and HTTPS (443).
Zero egress billing
Unlike traditional hyperscalers, Octos Cloud charges zero fees for:
- Outbound data transfer (egress)
- Bandwidth usage
- API requests
Your networking costs are predictable and transparent.