mirror of
https://github.com/apache/cloudstack.git
synced 2025-11-02 20:02:29 +01:00
132 lines
7.0 KiB
XML
132 lines
7.0 KiB
XML
<?xml version='1.0' encoding='utf-8' ?>
|
|
<!DOCTYPE section PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN" "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
|
|
<!ENTITY % BOOK_ENTITIES SYSTEM "cloudstack.ent">
|
|
%BOOK_ENTITIES;
|
|
]>
|
|
<!-- Licensed to the Apache Software Foundation (ASF) under one
|
|
or more contributor license agreements. See the NOTICE file
|
|
distributed with this work for additional information
|
|
regarding copyright ownership. The ASF licenses this file
|
|
to you under the Apache License, Version 2.0 (the
|
|
"License"); you may not use this file except in compliance
|
|
with the License. You may obtain a copy of the License at
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
Unless required by applicable law or agreed to in writing,
|
|
software distributed under the License is distributed on an
|
|
"AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
|
KIND, either express or implied. See the License for the
|
|
specific language governing permissions and limitations
|
|
under the License.
|
|
-->
|
|
<section id="add-ingress-egress-rules">
|
|
<title>Adding Ingress and Egress Rules to a Security Group</title>
|
|
<orderedlist>
|
|
<listitem>
|
|
<para>Log in to the &PRODUCT; UI as an administrator or end user. </para>
|
|
</listitem>
|
|
<listitem>
|
|
<para>In the left navigation, choose Network</para>
|
|
</listitem>
|
|
<listitem>
|
|
<para>In Select view, choose Security Groups, then click the security group you want .</para>
|
|
</listitem>
|
|
<listitem>
|
|
<para>To add an ingress rule, click the Ingress Rules tab and fill out the following fields to
|
|
specify what network traffic is allowed into VM instances in this security group. If no
|
|
ingress rules are specified, then no traffic will be allowed in, except for responses to any
|
|
traffic that has been allowed out through an egress rule.</para>
|
|
<itemizedlist>
|
|
<listitem>
|
|
<para><emphasis role="bold">Add by CIDR/Account</emphasis>. Indicate whether the source of
|
|
the traffic will be defined by IP address (CIDR) or an existing security group in a
|
|
&PRODUCT; account (Account). Choose Account if you want to allow incoming traffic from
|
|
all VMs in another security group</para>
|
|
</listitem>
|
|
<listitem>
|
|
<para><emphasis role="bold">Protocol</emphasis>. The networking protocol that sources will
|
|
use to send traffic to the security group. TCP and UDP are typically used for data
|
|
exchange and end-user communications. ICMP is typically used to send error messages or
|
|
network monitoring data.</para>
|
|
</listitem>
|
|
<listitem>
|
|
<para><emphasis role="bold">Start Port, End Port</emphasis>. (TCP, UDP only) A range of
|
|
listening ports that are the destination for the incoming traffic. If you are opening a
|
|
single port, use the same number in both fields.</para>
|
|
</listitem>
|
|
<listitem>
|
|
<para><emphasis role="bold">ICMP Type, ICMP Code</emphasis>. (ICMP only) The type of
|
|
message and error code that will be accepted.</para>
|
|
</listitem>
|
|
<listitem>
|
|
<para><emphasis role="bold">CIDR</emphasis>. (Add by CIDR only) To accept only traffic
|
|
from IP addresses within a particular address block, enter a CIDR or a comma-separated
|
|
list of CIDRs. The CIDR is the base IP address of the incoming traffic. For example,
|
|
192.168.0.0/22. To allow all CIDRs, set to 0.0.0.0/0.</para>
|
|
</listitem>
|
|
<listitem>
|
|
<para><emphasis role="bold">Account, Security Group</emphasis>. (Add by Account only) To
|
|
accept only traffic from another security group, enter the &PRODUCT; account and name of
|
|
a security group that has already been defined in that account. To allow traffic between
|
|
VMs within the security group you are editing now, enter the same name you used in step
|
|
7.</para>
|
|
</listitem>
|
|
</itemizedlist>
|
|
<para>The following example allows inbound HTTP access from anywhere:</para>
|
|
<mediaobject>
|
|
<imageobject>
|
|
<imagedata fileref="./images/http-access.png"/>
|
|
</imageobject>
|
|
<textobject>
|
|
<phrase>httpaccess.png: allows inbound HTTP access from anywhere</phrase>
|
|
</textobject>
|
|
</mediaobject>
|
|
</listitem>
|
|
<listitem>
|
|
<para>To add an egress rule, click the Egress Rules tab and fill out the following fields to
|
|
specify what type of traffic is allowed to be sent out of VM instances in this security
|
|
group. If no egress rules are specified, then all traffic will be allowed out. Once egress
|
|
rules are specified, the following types of traffic are allowed out: traffic specified in
|
|
egress rules; queries to DNS and DHCP servers; and responses to any traffic that has been
|
|
allowed in through an ingress rule</para>
|
|
<itemizedlist>
|
|
<listitem>
|
|
<para><emphasis role="bold">Add by CIDR/Account</emphasis>. Indicate whether the
|
|
destination of the traffic will be defined by IP address (CIDR) or an existing security
|
|
group in a &PRODUCT; account (Account). Choose Account if you want to allow outgoing
|
|
traffic to all VMs in another security group.</para>
|
|
</listitem>
|
|
<listitem>
|
|
<para><emphasis role="bold">Protocol</emphasis>. The networking protocol that VMs will use
|
|
to send outgoing traffic. TCP and UDP are typically used for data exchange and end-user
|
|
communications. ICMP is typically used to send error messages or network monitoring
|
|
data.</para>
|
|
</listitem>
|
|
<listitem>
|
|
<para><emphasis role="bold">Start Port, End Port</emphasis>. (TCP, UDP only) A range of
|
|
listening ports that are the destination for the outgoing traffic. If you are opening a
|
|
single port, use the same number in both fields.</para>
|
|
</listitem>
|
|
<listitem>
|
|
<para><emphasis role="bold">ICMP Type, ICMP Code</emphasis>. (ICMP only) The type of
|
|
message and error code that will be sent</para>
|
|
</listitem>
|
|
<listitem>
|
|
<para><emphasis role="bold">CIDR</emphasis>. (Add by CIDR only) To send traffic only to IP
|
|
addresses within a particular address block, enter a CIDR or a comma-separated list of
|
|
CIDRs. The CIDR is the base IP address of the destination. For example, 192.168.0.0/22.
|
|
To allow all CIDRs, set to 0.0.0.0/0.</para>
|
|
</listitem>
|
|
<listitem>
|
|
<para><emphasis role="bold">Account, Security Group</emphasis>. (Add by Account only) To
|
|
allow traffic to be sent to another security group, enter the &PRODUCT; account and name
|
|
of a security group that has already been defined in that account. To allow traffic
|
|
between VMs within the security group you are editing now, enter its name.</para>
|
|
</listitem>
|
|
</itemizedlist>
|
|
</listitem>
|
|
<listitem>
|
|
<para>Click Add.</para>
|
|
</listitem>
|
|
</orderedlist>
|
|
</section>
|