Hero background

Your Own Private Network in the Cloud

Define your IP space, segment your infrastructure into isolated tiers, and control every traffic rule — a fully private network built exactly the way you need it.

Key Features

A fully isolated private network you define from the ground up. Control your IP space, segment your tiers, and enforce traffic rules across every layer of your infrastructure.

Isolated Network Environment

Provision a logically isolated section of the cloud with your own private IP space, completely separated from other tenants. Your VPC is invisible to the outside world by default — nothing enters or leaves without explicit configuration.

Custom Subnet Design

Divide your VPC into public and private subnets across availability zones. Place internet-facing resources in public subnets and keep databases, internal services, and backend workloads in private subnets with no direct internet exposure.

Flexible Routing Control

Define custom route tables to control exactly how traffic flows between subnets, gateways, and external networks. Direct traffic through firewalls, NAT gateways, or VPN tunnels — with full visibility and control over every network path.

Internet & NAT Gateway

Attach an internet gateway to expose public-facing resources, or use a NAT gateway to let private instances initiate outbound connections without being reachable from the internet — keeping internal workloads protected by default.

VPC Peering & Interconnect

Connect multiple VPCs privately without traffic traversing the public internet. Peer VPCs within the same region or across regions to enable secure, low-latency communication between isolated environments, accounts, or teams.

Security Group Integration

Apply stateful security groups at the instance level to control inbound and outbound traffic with fine-grained rules. Layer security groups with subnet-level ACLs for defense-in-depth across every resource inside your VPC.

Use Cases

VPCs give teams the network isolation and control they need to build secure, scalable architectures. Here's how organizations use them across different workload types.

Isolated Production Environments

Run production workloads inside a fully private network with no exposure to other tenants or the public internet by default. Control every ingress and egress point — keeping your infrastructure boundary explicit and auditable.

Hybrid Cloud Connectivity

Extend your on-premise data center into the cloud by connecting your VPC via VPN or dedicated private link. Run workloads across both environments on a unified private network — without routing sensitive traffic over the public internet.

Multi-Tier Application Architecture

Architect web, application, and database tiers across public and private subnets within a single VPC. Expose only your load balancer to the internet while keeping application servers and databases fully isolated in private subnets.

Multi-Team & Multi-Environment Separation

Provision separate VPCs for development, staging, and production — or for individual teams and business units. Enforce strict network boundaries between environments while enabling controlled peering where cross-environment access is needed.

Built-In Network Management

Every VPC comes with a managed Virtual Router that handles inter-tier routing, Source NAT, DHCP, and DNS automatically — with Network ACLs available to control traffic between tiers and external networks.

Virtual Router
The Virtual Router is the networking engine inside your VPC. It handles routing between tiers, manages DHCP and DNS, provides NAT and VPN services, and works alongside Network ACLs for per-tier traffic control. It runs as a managed system VM — you don't manage it directly, but you configure everything through it.

Key points

Handles routing, NAT, DHCP, and DNS — works alongside Network ACLs for per-tier traffic control
Deployed on separate hosts for high availability
Configurable via network offerings (conserve mode, egress policy)
Supports static and dynamic routing (BGP)
Acts as the VPN gateway for remote access and site-to-site VPN
Can be replaced with external hardware (Juniper SRX, NetScaler) for enterprise use

Get Started with GCX KCloud

Join us today to explore more product details, unlock hidden features, and play along with GCX KCloud to see what it can do for you!

Get Started