Overview
Xloud Networking enforces security at the network plane without requiring agents inside virtual machines. Stateful security groups operate at the virtual switch level, FWaaS policies apply at the virtual router, port security prevents spoofing attacks, and VLAN/VXLAN segmentation isolates tenant traffic at the data plane. This agentless model provides consistent enforcement regardless of guest OS configuration.Prerequisites
- An active Xloud project with at least one network and subnet
memberoradminrole in Xloud Identity- For FWaaS: XPCI license with
enable_neutron_fwaas: "yes"in XDeploy configuration - For VPNaaS:
enable_neutron_vpnaas: "yes"in XDeploy configuration
Network Security Architecture
| Layer | Control | Enforcement Point |
|---|---|---|
| L3 routing | Firewall as a Service | Virtual router |
| L3/L4 filtering | Security groups | Virtual switch port |
| L2 anti-spoofing | Port security | Virtual switch port |
| L2 isolation | VLAN/VXLAN segmentation | Overlay network |
| L3 remote access | VPN as a Service | Virtual router |
Security Groups
Security groups implement stateful L3/L4 packet filtering. Each rule specifies a direction (ingress/egress), protocol, port range, and a source/destination specifier (CIDR or another security group). Return traffic for allowed sessions is automatically permitted.- Dashboard
- CLI
Open Security Groups
Navigate to Project → Network → Security Groups. The
default security group allows all outbound traffic and permits inbound traffic only from other members of the same group.Create a purpose-specific group
Click Create Security Group. Give it a meaningful name such as
database-servers or load-balancer-frontend.Add rules
Click Manage Rules → Add Rule. Define each rule:
| Field | Description |
|---|---|
| Rule | Protocol preset (SSH, HTTP, HTTPS) or Custom |
| Direction | Ingress (inbound) or Egress (outbound) |
| Open Port | Port or port range |
| Remote | CIDR for IP-based restriction, or another Security Group for group-based restriction |
Firewall as a Service (FWaaS)
Enterprise FWaaS applies stateless or stateful L3 firewall policies at the virtual router. Unlike security groups (which operate per port), FWaaS policies apply to all traffic traversing a router, making them suitable for north-south perimeter control and micro-segmentation between subnets.- Dashboard
- CLI
Create firewall rules
Navigate to Project → Network → Firewalls → Rules and click Add Rule:
| Field | Example |
|---|---|
| Name | block-telnet |
| Protocol | TCP |
| Destination Port | 23 |
| Action | Deny |
| Enabled | Yes |
Create a firewall policy
Navigate to Firewall Policies → Create Policy. Add the rules in priority order (first match wins).
Create a firewall group
Navigate to Firewall Groups → Create Group. Associate the ingress and egress policies, then attach the firewall group to one or more router ports.
Test blocked traffic — packets matching deny rules are dropped at the router without reaching the destination VM’s security group layer.
Port Security and Anti-Spoofing
Port security prevents virtual machines from injecting packets with spoofed source MAC or IP addresses. This blocks ARP poisoning, DHCP starvation, and IP spoofing attacks. Port security is enabled by default on all ports. To verify:Check port security status
Allowed Address Pairs
For use cases requiring secondary IPs (virtual IPs, HAProxy floating IPs, Keepalived), add allowed address pairs:Add allowed address pair for VIP
Network Segmentation (VLAN and VXLAN)
Tenant networks are isolated at the data plane using VLAN tags (provider networks) or VXLAN encapsulation (overlay networks). Each tenant network has a unique segmentation ID that prevents cross-tenant traffic even on shared physical infrastructure.| Network Type | Segmentation | Isolation Scope |
|---|---|---|
| VLAN | 802.1Q tag (1–4094) | Hardware-enforced on physical switches |
| VXLAN | 24-bit VNI (up to 16M segments) | Software-defined, scales across hypervisors |
| GRE | Tunnel key | Point-to-point overlay |
Create an isolated tenant network
DDoS Protection
Xloud Networking provides rate limiting at the port and router levels to mitigate volumetric attacks:Apply QoS bandwidth limit to a port
VPN as a Service
Enterprise VPN as a Service extends tenant networks to remote sites over IPsec tunnels without exposing public floating IPs.Create an IPsec VPN connection
Next Steps
VM Security
Hypervisor isolation, vTPM, and anti-affinity workload placement
Infrastructure Security
TLS configuration and endpoint hardening
Networking Service
Complete networking service documentation with user and admin guides
Hardening Guide
Pre-deployment hardening checklist for compute and network nodes