Cloud Networking in Cleura Cloud

Build secure, software-defined networks for your workloads in Cleura Cloud.

Our cloud networking lets you design isolated and flexible network environments for your projects. Each network operates in full isolation, with support for IPv4 and IPv6 subnets, routers for external connectivity, and floating IPs for public access.

All features are available through the Cleura Cloud Management Panel, OpenStack API, and CLI giving you the freedom to automate, connect, and scale according to your needs.

Explore Cleura Cloud Networking features

Virtual Private Cloud (VPC)

Create isolated networks with one or more subnets for your applications. Configure addressing, gateways, and DNS, and connect them to external networks using virtual routers.

Explore VPC

Routers & Floating IPs

Connect private networks to the internet using project-scoped routers. Assign floating IPs to make specific workloads publicly reachable while keeping internal addressing private.

Explore Routers & Floating IP

Load Balancers

Distribute traffic across instances and services with Octavia-powered Load Balancer-as-a-Service. Define listeners, pools, and health monitors for highly available TCP or HTTP workloads.

Explore Load balancers

Security Groups

Apply stateful network rules at the instance or subnet level. Define ingress and egress policies, restrict unwanted access, and simplify compliance with project-specific security groups.

Explore Security groups

Site-to-Site VPN

Connect your Cleura Cloud networks to on-premises environments or other Cleura regions using secure IPSec tunnels.

Explore Site-to-site VPN

DNS as a Service (DNSaaS)

Host and manage DNS zones directly within Cleura Cloud using API or CLI.

Explore DNSaaS

Key capabilities

  • Fully isolated virtual networks per project and region
  • IPv4 and IPv6 dual-stack support
  • Routers and NAT for external connectivity
  • Floating IPs for public exposure
  • Octavia-based Load Balancing
  • Stateful security groups and port-level control
  • Integrated DNS management
  • Automation through OpenStack API, CLI, Terraform or Ansible

Common use cases

  • Multi-tier application topologies with separated network zones
  • Secure hybrid connectivity between data centers and Cleura regions
  • Public endpoints with built-in high availability and health monitoring
  • Centralized DNS and network security management

Built for digital sovereignty

Cleura Cloud Networking is built on OpenStack Neutron and Octavia, ensuring interoperability, transparency, and independence from proprietary network stacks. It gives you full control over where your data flows, helping you meet European compliance and digital-sovereignty requirements.


What is Cleura Cloud Networking?

Cleura Cloud Networking is the foundation for connecting and securing workloads within Cleura Cloud. It provides isolated virtual networks, routers for external connectivity, floating IPs for public access, and security groups for traffic control.

How does Cleura Cloud handle public IPs?

Public connectivity is provided through floating IPs, which map external IP addresses to specific instances or load balancers via virtual routers. This design ensures internal networks remain isolated while enabling controlled public exposure.

Can I connect my on-premises network to Cleura Cloud?

Yes. Cleura supports hybrid and inter-region connectivity using OpenStack VPN-as-a-Service (VPNaaS). You can establish IPSec site-to-site tunnels directly through the Management Panel or CLI without deploying extra virtual machines.

Is IPv6 supported in Cleura Cloud Networking?

Yes. All virtual networks in Cleura Cloud can be configured with dual-stack IPv4 and IPv6 addressing, including gateways, DNS, and security group rules for both protocols.

What automation options are available?

All networking components can be managed through the OpenStack API and CLI, and are fully compatible with automation tools like Terraform and Ansible.

Does Cleura provide built-in firewalls?

No, but a separate firewall product from Clavister is available in our Marketplace. Instead, network security is managed through Security Groups. These are project-specific, stateful rule sets that control ingress and egress at the instance or subnet level.

How does Cleura Cloud networking support digital sovereignty?

All networking operations remain within Cleura’s European regions. No data or control planes leave EU jurisdictions, ensuring compliance with European digital-sovereignty and data-protection frameworks.

CONTENTS