Managing virtual private clouds (VPCs) in protected networks using VPN helps you manage and monitor your virtual machines across different clouds by giving you total visibility and control of your hybrid infrastructure. Up until now barriers existed in terms of connectivity under scenarios that required the SaaS platform to access VMs sitting in Virtual Private Clouds (VPCs) or bare metal machines and docker containers set up in private networks. With the introduction of support for Virtual Private Networks (VPNs), can now access private networks or networks with restricted access from the public Internet, thus enabling users to manage and monitor their machines over a secure connection.'s VPN functionality is based on the OpenVPN protocol, which implements a Virtual Private Network (VPN) in order to create secure point-to-point connections to remote access areas. OpenVPN is capable of accessing private networks by traversing network address translators (NATs) and firewalls, while utilizing the exchange of keys in order to secure its VPN connections (or tunnels).

Setting up the VPN

To set up a new VPN, visit the Tunnels section from your dashboard menu and click on the Add your tunnels button. (VPN support is implemented in's upcoming UI. To access it, click on the user thumbnail on the top right, and choose Beta UI). Type in a name for your tunnel, and optionally a description. Then, on the CIDRs field,  add the private IP range that the cloud that you want to manage resides in. will choose two random IPv4 addresses for the endpoints of the VPN tunnel. If you want to exclude some of the addresses of the network to avoid IP conflicts, you can fill them in on the excluded CIDRs field.


Once you're done, click on the Add button. will create the tunnel. Click on it, and will provide you with a bash script that you'll need to run on your VPN client - usually one of the machines or the router of your private network.


When deploying your VPN client, make sure that there are no firewall rules blocking incoming or forwarded Internet traffic. Your VPN client needs to allow incoming data and outgoing data to The UDP port that is used can be seen in the script above. Additionally, make sure that the machine where the VPN client resides can forward packets to your local VMs. Please, ensure your firewall and IPtables rules (if any) have been properly configured.

As soon as you have established your VPN tunnels, you can go ahead and add your infrastructure in Your private network IPs will be accessible for you by the service as if they were public. Just go ahead and add your private clouds and perform actions on private VMs like you would normally do!