Create a rule in a security group
You can:
- create rules one at a time - create a rule for inbound traffic or outbound traffic through the Control Panel or OpenStack CLI;
- bulk add rules from a file - prepare a file in the format
.jsonfile with the description of the necessary rules and upload it to the control panel.
Through the Control Panel and Add File, you can create a rule with TCP, UDP, ICMP, or Any (all protocols).Through the OpenStack CLI, you can create a rule with any protocol.
You can also copy rules from one security group to another, to do this, copy the security group.
Create a rule for incoming traffic
Control Panel
OpenStack CLI
-
In the dashboard, on the top menu, click Products and select Cloud Servers.
-
Go to the Security Groups section.
-
Open the security group page.
-
Open the Incoming Traffic tab.
-
Click Create Rule.
-
If one of the rule templates for incoming traffic is suitable for you, select a template from the list. The Protocol, Source, Source Ports, Traffic Destination, and Destination Port fields are filled in automatically.
-
If the templates don't fit, specify your rule parameters:
7.1. Select a protocol or click All Protocols.
7.2 Specify the traffic source (Source):
- for traffic from an IP address or subnet - select CIDR and enter the IP address or subnet, or click All Sources;
- for traffic from a security group - select Security Group and select the group. Security groups in the same pool are available. If you need to accept traffic from another pool, specify the source CIDR.
7.3 Enter the port on which traffic is allowed to be received (Dst. port) - a single port or a range of ports, or click All Ports.
7.4 Optional: enter a comment for the rule.
-
Click Create.
Create a rule for outgoing traffic
Control Panel
OpenStack CLI
-
In the Dashboard, on the top menu, click Products and select Cloud Servers.
-
Go to the Security Groups section.
-
Open the security group page.
-
Open the Outgoing Traffic tab.
-
Click Create Rule.
-
If one of the rule templates for outgoing traffic is suitable for you, select a template from the list. The Protocol, Source, Source Ports, Traffic Destination, and Destination Port fields are filled in automatically.
-
If the templates don't fit, specify your rule parameters:
7.1. Select a protocol or click All Protocols.
7.2 Specify the destination of the traffic (Destination):
- for traffic from an IP address or subnet - select CIDR and enter the IP address or subnet or click All Sources;
- for traffic from a security group - select Security Group and select the group. Security groups in the same pool are available. If you need to send traffic to another pool, specify the source CIDR.
7.3 Enter the source port (Src. port) - a single port or a range of ports or click All Ports.
7.4 Optional: enter a comment for the rule.
-
Click Create.
Add rules from a file en masse
1. Prepare a file describing the rules
-
In the Dashboard, on the top menu, click Products and select Cloud Servers.
-
Go to the Security Groups section.
-
Download the file for editing:
- To download a file describing rules that you previously created for another security group, from the menu of the desired security group, select Download JSON with rules;
- to download a file with rule templates, from the menu of any security group, select Add Rules from JSON and click the link in the text.
-
Open the downloaded file in any text editor.
-
Edit the content of the file - delete or add the required number of blocks with rules, specify parameters for each rule:
-
direction- traffic direction:ingressfor incoming traffic,egressfor outgoing traffic; -
ethertype- IP type: onlyIPv4; -
port_range_max- last port in the allowed port range: a number from 1 to 65,535.If the protocol of the rule isicmpinstead of the port number, specify the ICMP type.To allow all ports or ICMP types, specifynull; -
port_range_min- the first port in the allowed port range: a number from 1 to 65,535.If the protocol of the rule isicmpinstead of the port number, specify the ICMP type.To allow all ports or ICMP types, specifynull; -
protocol- protocol name:icmp- ICMP;tcp- TCP;udp- UDP;anyornull- any protocol;
-
traffic source or destination - specify one of the parameters, specify
nullfor the other:remote_group_id- Security group ID, can be viewed in control panel: in the top menu, click Products → Cloud Servers → Security Groups → in the group card, click .You can only specify a group in the same pool, for traffic from another pool useremote_ip_prefix.To allow traffic from all security groups, specifynull;remote_ip_prefix- IP address or subnet in CIDR format.To allow traffic from all IP addresses, specifynull.
If you specify
nullfor both parameters, all traffic matching the other rule parameters will be allowed.
-
-
Save the modified file.
2. Upload the file to the control panel
-
In the dashboard, on the top menu, click Products and select Cloud Servers.
-
Go to the Security Groups section.
-
From the menu of the security group, select Add Rules from JSON.
-
Choose which method to use to add rules from the file:
- add new rules to the old ones;
- or delete old rules and add new ones.
-
Upload the file you prepared earlier - drag and drop it into the upload box or click on the upload box and select the file.
-
Click Add or Delete and add.