High-Level Architecture with Load Balancer and Jump Server in a VPC Setup
Introduction
In this use case, we demonstrate how NeevCloud enables secure cloud networking by implementing a Virtual Private Cloud (VPC) with a Load Balancer (LB) for traffic distribution and a Jump Server for enhanced administrative access. This setup ensures security, scalability, and efficient traffic management for hosting web applications.

Architecture Details
VPC Configuration
CIDR:
10.0.5.0/24– A private subnet used for internal communication.The VPC serves as the foundation of the private network, isolating traffic and enabling secure internal connectivity.
Components
Load Balancer (LB):
Private IP:
10.0.5.5Role: Routes incoming traffic from the public network to the backend web servers.
Security: Acts as an additional layer, preventing direct public access to web servers.
Web Servers:
WS1: IP
10.0.5.10WS2: IP
10.0.5.11WS3: IP
10.0.5.12Role: Hosts the application and serves client requests.
Deployment: Configured within the private network.
Jump Server (Admin Gateway):
Private IP:
10.0.5.200Floating IP: Assigned for secure external access.
Role: Used exclusively for administrative access to the private network.
Security: Provides a single entry point for accessing the internal network.
3. Public Access via Floating IPs
Floating IP-1: Routes client traffic to the Load Balancer.
Floating IP-2: Assigned to the Jump Server for administrative tasks, avoiding direct access to the web servers.
Step-by-Step Implementation
Step 1: Create a Private Network
Navigate to:
Networking > Networkin the NeevCloud portal.Action:
Provide a name for the network (e.g.,
WebVPC).Set CIDR to
10.0.5.0/24.Leave other options at default and create the network.
Step 2: Deploy a Router
Navigate to:
Networking > Routers.Action:
Create a router and name it (e.g.,
WebRouter).Set the external gateway to the Public Network.
Add the private network (
10.0.5.0/24) as an interface.
Step 3: Launch Virtual Machines
Navigate to:
Instances > Launch Instance.Web Servers:
Launch three VMs (WS1, WS2, WS3) with private IPs assigned.
Assign them to the private VPC.
Avoid attaching the public network.
Jump Server:
Launch one VM and assign it to the private network.
Avoid attaching the public network to maintain restricted access.
Assign a floating IP for external access.
Step 4: Set Up a Load Balancer
Navigate to:
Networking > Load Balancers.Action:
Create a Load Balancer and assign it the private IP
10.0.5.5.Add a backend pool with WS1, WS2, and WS3.
Configure listeners:
HTTP Listener: Port 80
HTTPS Listener: Port 443 (recommended for secure communication).
Step 5: Allocate and Associate Floating IPs
Navigate to:
Networking > Floating IPs.Action:
Allocate two floating IPs from the public IP pool.
Associate:
Floating IP-1: Linked to the Load Balancer for routing public traffic to web servers.
Floating IP-2: Linked to the Jump Server for secure external access.
Last updated