mirror of
https://github.com/apache/cloudstack.git
synced 2025-10-26 08:42:29 +01:00
83 lines
4.0 KiB
XML
83 lines
4.0 KiB
XML
<?xml version='1.0' encoding='utf-8' ?>
|
|
<!DOCTYPE section PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN" "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
|
|
<!ENTITY % BOOK_ENTITIES SYSTEM "cloudstack.ent">
|
|
%BOOK_ENTITIES;
|
|
]>
|
|
<!-- Licensed to the Apache Software Foundation (ASF) under one
|
|
or more contributor license agreements. See the NOTICE file
|
|
distributed with this work for additional information
|
|
regarding copyright ownership. The ASF licenses this file
|
|
to you under the Apache License, Version 2.0 (the
|
|
"License"); you may not use this file except in compliance
|
|
with the License. You may obtain a copy of the License at
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
Unless required by applicable law or agreed to in writing,
|
|
software distributed under the License is distributed on an
|
|
"AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
|
KIND, either express or implied. See the License for the
|
|
specific language governing permissions and limitations
|
|
under the License.
|
|
-->
|
|
<section id="firewall-rules">
|
|
<title>Firewall Rules</title>
|
|
<para>By default, all incoming traffic to the public IP address is rejected by the firewall. To
|
|
allow external traffic, you can open firewall ports by specifying firewall rules. You can
|
|
optionally specify one or more CIDRs to filter the source IPs. This is useful when you want to
|
|
allow only incoming requests from certain IP addresses.</para>
|
|
<para>You cannot use firewall rules to open ports for an elastic IP address. When elastic IP is
|
|
used, outside access is instead controlled through the use of security groups. See <xref
|
|
linkend="add-security-group"/>.</para>
|
|
<para>In an advanced zone, you can also create egress firewall rules by using the virtual router.
|
|
For more information, see <xref linkend="egress-firewall-rule"/>.</para>
|
|
<para>Firewall rules can be created using the Firewall tab in the Management Server UI. This tab
|
|
is not displayed by default when &PRODUCT; is installed. To display the Firewall tab, the
|
|
&PRODUCT; administrator must set the global configuration parameter firewall.rule.ui.enabled to
|
|
"true."</para>
|
|
<para>To create a firewall rule:</para>
|
|
<orderedlist>
|
|
<listitem>
|
|
<para>Log in to the &PRODUCT; UI as an administrator or end user. </para>
|
|
</listitem>
|
|
<listitem>
|
|
<para>In the left navigation, choose Network.</para>
|
|
</listitem>
|
|
<listitem>
|
|
<para>Click the name of the network where you want to work with.</para>
|
|
</listitem>
|
|
<listitem>
|
|
<para>Click View IP Addresses.</para>
|
|
</listitem>
|
|
<listitem>
|
|
<para>Click the IP address you want to work with.</para>
|
|
</listitem>
|
|
<listitem>
|
|
<para>Click the Configuration tab and fill in the following values.</para>
|
|
<itemizedlist>
|
|
<listitem>
|
|
<para><emphasis role="bold">Source CIDR</emphasis>. (Optional) To accept only traffic from
|
|
IP addresses within a particular address block, enter a CIDR or a comma-separated list
|
|
of CIDRs. Example: 192.168.0.0/22. Leave empty to allow all CIDRs.</para>
|
|
</listitem>
|
|
<listitem>
|
|
<para><emphasis role="bold">Protocol</emphasis>. The communication protocol in use on the
|
|
opened port(s).</para>
|
|
</listitem>
|
|
<listitem>
|
|
<para><emphasis role="bold">Start Port and End Port</emphasis>. The port(s) you want to
|
|
open on the firewall. If you are opening a single port, use the same number in both
|
|
fields</para>
|
|
</listitem>
|
|
<listitem>
|
|
<para><emphasis role="bold">ICMP Type and ICMP Code</emphasis>. Used only if Protocol is
|
|
set to ICMP. Provide the type and code required by the ICMP protocol to fill out the
|
|
ICMP header. Refer to ICMP documentation for more details if you are not sure what to
|
|
enter</para>
|
|
</listitem>
|
|
</itemizedlist>
|
|
</listitem>
|
|
<listitem>
|
|
<para>Click Add.</para>
|
|
</listitem>
|
|
</orderedlist>
|
|
</section>
|