Overview
Xloud Networking enforces several layers of security at the virtual port level — MAC and IP anti-spoofing, stateful security groups, and port security policies. This guide covers administrator-level hardening steps to strengthen these controls for production deployments.Prerequisites
- Admin credentials sourced from
admin-openrc.sh - Familiarity with security groups and provider networks
Port Security and Anti-Spoofing
Port security enforces MAC and IP anti-spoofing rules on every virtual port. It is enabled by default on all networks. Disabling it is a security exception that should be documented and reviewed.- CLI
Verify port security is enabled
Check port security on network
"port_security_enabled": true.Disable port security for network appliances (exceptional)
In rare cases, network appliances that use multiple source IPs (virtual firewalls,
load balancers, NAT devices) require port security to be disabled on their specific port:
Disable port security on a single port
Disabling port security removes all anti-spoofing enforcement on that port.
Apply this only to ports owned by trusted, administratively controlled devices.
Document the exception and review it quarterly.
Allowed Address Pairs
Allowed address pairs permit a port to send and receive traffic using additional IP or MAC addresses beyond its primary assignment. Required for virtual IP scenarios such as keepalived, VRRP, and CARP.Add allowed address pair to port
Add IP-only allowed address pair (any MAC)
List current allowed address pairs
Default Security Group Hardening
The default security group Xloud Networking creates for each project allows all egress traffic and all inbound traffic from members of the same group. For production environments, harden this group by removing the permissive inbound rule.- CLI
Network-Level Security Checklist
Port security enabled on all networks
Port security enabled on all networks
Audit port security across all networks
"port_security_enabled": false should be reviewed.No wildcard SSH rules in production
No wildcard SSH rules in production
Find security group rules allowing SSH from any IP
Unused floating IPs released
Unused floating IPs released
List DOWN (unassociated) floating IPs
Router external gateways reviewed
Router external gateways reviewed
List all routers with external gateways
Next Steps
Network Security Groups
User guide for creating and managing per-port firewall rules
Network Quotas
Limit resource consumption to reduce attack surface
Provider Networks
Control physical network access at the provider layer
Admin Troubleshooting
Diagnose port security and anti-spoofing configuration issues