Gateway
The gateway is the network edge for your VPC. It handles all traffic in and out of the VPC and provides bastion access, floating IP management, and IP reservation visibility.
Navigate to Gateway within your VPC to access these settings. The gateway page has three tabs: Bastion, Floating IPs, and IP Reservations.
Bastion
The SSH bastion provides a jump host for accessing VMs inside the VPC without exposing them directly to the internet.
Status and Configuration
- Bastion status — enabled or disabled (disabled by default)
- Port — the SSH port for the bastion (configurable)
- IPv4 address and IPv6 address of the bastion
To enable the bastion, toggle the bastion status to enabled and specify a port.
Bastion Connectivity
When the bastion is enabled, the portal displays a quick-reference SSH command showing how to connect as a jump user through the bastion to a VM inside the VPC:
ssh -J jump@<bastion-ip>:<port> user@<internal-vm-ip>
SSH Keys
Below the bastion configuration, the portal lists your account-level SSH keys. Each key has a Bastion enabled toggle — you must enable this toggle for any key that should be authorized to connect through the bastion.
You can also edit, delete, and manage your global SSH keys from this page.
Floating IPs
The Floating IPs tab shows the IPv4 and IPv6 floating IP addresses assigned to your VPC.
- By default, the VPC's management IPv4 and management IPv6 addresses are available for use in firewall, NAT, and load balancing rules.
- Click + Add to request additional floating IPs.
Floating IPs serve as the public-facing addresses for your VPC services. Use them as the public IP in:
- Firewall rules — control what traffic reaches the VPC
- NAT rules — map public IPs/ports to internal VMs
- Load balancers — front-end addresses for load-balanced services
IP Reservations
The IP Reservations tab shows the internal IP address reservations for VMs and resources deployed within your VPC. This is a read-only view of which internal addresses are assigned to which resources.
Next Steps
- Firewall — configure inbound traffic rules
- NAT Rules — map public IPs to internal VMs
- Load Balancing — distribute traffic across backends
Need Help?
Contact support@netactuate.com or open a support ticket from the portal.