Cloud Networks
Deploy secure virtual networks in minutes. No hardware. No complexity. Just connectivity.
Networking Made Simple
Connect Everything. Configure Nothing.
Traditional networking is hard. VPNs are frustrating. Firewall rules are confusing. Cloud Networks changes all of that.
With Cloud Networks, you can create a secure virtual network that spans your entire infrastructure in just a few clicks. Connect your cloud VMs, on-premise servers, remote offices, and even mobile devices - all without touching a single firewall rule or configuring complex routing tables.
It just works. Your devices find each other automatically, traffic is encrypted end-to-end, and you get a simple, flat network that behaves like everything is on the same LAN - even when it's spread across the globe.
-
Deploy a network in under 60 seconds
-
No networking expertise required
-
Works through NAT and firewalls automatically

What Can You Do With Cloud Networks?
From simple remote access to complex multi-site architectures, Cloud Networks adapts to your needs.
Remote Access
Give your team secure access to internal resources from anywhere. No VPN client headaches, no split tunneling issues. Just install the agent and connect.
Development & Testing
Create isolated networks for development, staging and production environments. Spin up test networks in seconds, tear them down when done.
Hybrid Cloud
Seamlessly connect your on-premise infrastructure with your Cloudasys VMs. Create a unified network that spans your datacenter and the cloud.
Multi-Site SD-WAN
Connect multiple office locations with software-defined networking. No expensive MPLS circuits or dedicated hardware required.
IoT & Edge Devices
Connect IoT devices, edge computing nodes, and remote sensors to your network securely - even behind carrier-grade NAT.
Partner Networks
Securely connect with clients, vendors, or partners. Grant granular access to specific resources without exposing your entire network.
How Cloud Networks Works
Enterprise-grade technology, simplified for everyone.

Peer-to-Peer Architecture
Unlike traditional VPNs that route all traffic through a central server, Cloud Networks uses peer-to-peer connectivity. Your devices communicate directly with each other, taking the shortest path possible.
This means:
-
Lower latency - Traffic doesn't bounce through a central hub
-
Higher throughput - No bottleneck at a VPN concentrator
-
Better reliability - No single point of failure
-
Reduced costs - Less bandwidth consumed at your datacenter
NAT Traversal That Actually Works
Cloud Networks uses advanced NAT traversal techniques including UDP hole punching and relay fallback. It works through virtually any network configuration - home routers, corporate firewalls, mobile carriers, even double NAT scenarios.
If there's any path between two devices, Cloud Networks will find it.
Security Built Into Every Layer
Zero-trust networking with enterprise-grade encryption. Your traffic is protected from endpoint to endpoint.
End-to-End Encryption
All traffic is encrypted using Curve25519, Poly1305, and Salsa20 - the same cryptographic primitives used by modern secure messaging apps. Not even Cloudasys can see your traffic.
Granular Access Control
Define flow rules to control exactly which devices can communicate with which. Segment your network, restrict access to sensitive resources, and enforce least-privilege principles.
Native Integration
Integrated with Cloud Command
Cloud Networks is built directly into the Cloud Command control panel. Create networks, manage members, configure routes - all from the same interface you use to manage your VMs.
-
One-click network agent installation on your VMs
-
Automatic network discovery and device naming
-
Centralized member management and authorization
-
Real-time connection status and diagnostics
-
Flow rules and access control configuration
-
Network activity logging and monitoring
Zero-Trust Model
Every device must be explicitly authorized to join a network. Devices authenticate cryptographically - there's no way to spoof or hijack a connection.
No Attack Surface
No open ports. No public IP addresses. No VPN concentrators to target. Cloud Networks creates an invisible network that attackers can't see or probe.
1. Create a Network
Click "Create Network" in Cloud Command. Give it a name and you're done.
2. Add Devices
Install the lightweight agent on any device. One command on Linux, one installer on Windows.
3. Authorize & Connect
Approve the device in Cloud Command. It gets an IP and can immediately communicate with other members.
4. That's It
No firewall rules. No port forwarding. No routing configuration. Just connectivity.

