Skip to main content

Overview

Xloud Networking’s SDN fabric supports a wide range of topology patterns — from a single flat network for development environments to fully isolated multi-tier architectures for production workloads. This page describes common reference topologies, their component requirements, and how security groups enforce trust boundaries between tiers.
Prerequisites

Standard Three-Tier Topology

The recommended topology for most production applications. Each application tier is isolated on its own subnet, all tiers route through a shared router, and only the web tier exposes floating IPs to the internet.

Component Checklist

ResourcePurpose
web-network / web-subnet (192.168.10.0/24)Hosts web-tier instances with floating IPs
app-network / app-subnet (192.168.20.0/24)Internal app tier — no floating IPs
db-network / db-subnet (192.168.30.0/24)Database tier — no floating IPs, restricted access
main-routerRoutes all subnets, external gateway for NAT
web-sgAllows TCP 80, 443 from internet; TCP 22 from management CIDR
app-sgAllows traffic from web-sg only
db-sgAllows database port from app-sg only
Security groups enforce the trust boundary between tiers. Apply a strict group to the DB subnet that only allows connections from the App subnet’s security group — not from 0.0.0.0/0.

Isolated Development Topology

A minimal topology for development and testing environments. All instances share a single network and subnet. One floating IP provides external access for the developer. This topology is appropriate for individual developer sandboxes, CI/CD test environments, and proof-of-concept workloads. It minimizes resource consumption while providing full internet egress via NAT.

Shared Services Topology

A multi-project topology where shared infrastructure services (monitoring, logging, secrets) run on a dedicated network accessible to all application projects via router peering.

High Availability Topology

A topology designed for production availability requirements. Redundant instances in each tier are distributed across the router’s subnet interfaces, with HA floating IPs that can be reassigned during failover events.
Enable HA routers (--ha flag) for production deployments to protect against L3 agent failures. See the L3 Router Configuration guide for HA and DVR setup.

MTU Considerations

Different network types require different MTU settings to avoid packet fragmentation.
Network TypeRecommended MTUReason
VXLAN tenant networks145050-byte VXLAN encapsulation overhead
VLAN provider networks1500No encapsulation overhead
Jumbo-frame VLANUp to 9000Requires switch support end-to-end
Set network MTU for VXLAN
openstack network set app-network --mtu 1450

Next Steps

Create a Network

Provision the networks required for your chosen topology

Routers and Gateways

Connect your subnets and configure the external gateway

Network Security Groups

Define trust boundaries between tiers with stateful firewall rules

L3 Router Configuration

Enable HA routers and distributed virtual routing for production deployments