Skip to content

Latest commit

 

History

History
46 lines (27 loc) · 2.29 KB

File metadata and controls

46 lines (27 loc) · 2.29 KB
copyright
years
2017
lastupdated 2017-04-27

{:shortdesc: .shortdesc} {:new_window: target="_blank"}

Creating security groups and rules (Beta)

{: #creating-security-groups}

You can create a security group and its associated rules and then assign it to the interfaces of one or more virtual server instances to enable a virtual firewall. {:shortdesc}

Creating a security group

To create a security group, complete the following steps: {:shortdesc}

  1. In the Customer Portal External link icon navigation, select Security -> Network Security -> Security Groups.
  2. On the Security Groups page, click Create Group.
  3. Enter a name and description for the security group and click Create Group again.

Note: "Create group with a default rule to allow all outbound traffic." is selected by default. You can clear this field to create the security group with no rules. A security group with no rules blocks all traffic (both inbound and outbound).

Creating security group rules

To create a security group rule, complete the following steps: {:shortdesc}

  1. In the Customer Portal External link icon navigation, select Security -> Network Security -> Security Groups.
  2. On the Security Groups page, click a security group name to open the Details page.
  3. On the Security Group details page, enter all appropriate actions (such as direction, IP type, protocol, and source/destination information). When finished, click Create Rule.

Note: For the source and destination fields, you can specify either Classless Inter-Domain Routing (CIDR) block or security group.

A CIDR block facilitates routing of a block of IP addresses. If you select CIDR as the type, then you must specify an IP address range.

If you select security groups as the type, then you must select from a list of existing security groups. This selection allows any IP address from a device that is attached to the selected security group. If a virtual server is configured to have multiple IP addresses, only the primary IPv4 and IPv6 addresses are used by these remote security group rules.