Skip to main content

Configure Networking

Octos Cloud provides a full software-defined networking stack. Create isolated private networks, control traffic with security groups, and assign floating IPs — all with zero egress fees.

Networking concepts

ConceptDescription
Public NetworkInternet-facing network with a public IP address
Private NetworkIsolated L2/L3 network within your project
Security GroupStateful firewall rules for inbound/outbound traffic
Floating IPPortable public IP that can be reassigned between VMs
Virtual RouterRoutes traffic between private and public networks

Create a private network

  1. Navigate to Networking → Networks in your project
  2. Click Create Network
  3. Configure the subnet:
    • Network Address — e.g., 10.0.0.0
    • Network Mask — e.g., 255.255.255.0
    • Gateway — e.g., 10.0.0.1
    • DNS Nameservers — e.g., 8.8.8.8, 8.8.4.4
  4. Click Create

Attach a VM to a private network

  1. Go to your VM's Networking tab
  2. Click Attach Interface
  3. Select the private network and optional subnet
  4. The VM will receive a private IP automatically (or specify one manually)

Configure security groups

Security groups act as virtual firewalls. Each rule defines allowed traffic by protocol, port range, and source.

Create a security group

  1. Navigate to Networking → Security Groups
  2. Click Create New Security Group
  3. Add inbound and outbound rules:
Direction: Inbound
Protocol: TCP
Port: 22
Remote: 0.0.0.0/0 (or restrict to your IP)
Direction: Inbound
Protocol: TCP
Port: 80, 443
Remote: 0.0.0.0/0
  1. Attach the security group to your VM
caution

By default, all inbound traffic is blocked. You must explicitly open ports for SSH (22), HTTP (80), and HTTPS (443).

Zero egress billing

Unlike traditional hyperscalers, Octos Cloud charges zero fees for:

  • Outbound data transfer (egress)
  • Bandwidth usage
  • API requests

Your networking costs are predictable and transparent.

Next steps