Create a rule in a security group
Through the control panel, you can create a rule with TCP, UDP, ICMP, or Any (all protocols). You can create a rule with any protocol through the OpenStack CLI.
Create a rule for incoming traffic
Control panel
OpenStack CLI
-
In the dashboard, on the top menu, click Products and select Cloud Servers.
-
Go to the Security Groups section.
-
Open the security group page.
-
Open the Incoming Traffic tab.
-
Click Create Rule.
-
If one of the rule templates for incoming traffic is suitable for you, select a template from the list. The Protocol, Source, Source Ports, Traffic Destination, and Destination Port fields are filled in automatically.
-
If the templates don't fit, specify your rule parameters:
7.1. Select a protocol or click All Protocols.
7.2 Specify the traffic source (Source):
- for traffic from an IP address or subnet — select CIDR and enter the IP address or subnet, or click All Sources;
- for traffic from a security group — select Security Group and select the group. Security groups in the same pool are available. If you need to accept traffic from another pool, specify the source CIDR.
7.3 Enter the port on which traffic is allowed to be received (Dst. port) — a single port or a range of ports, or click All Ports.
7.4 Optional: enter a comment for the rule.
-
Click Create.
-
Create a rule in the group:
openstack security group rule create \
--ingress \
[--remote-ip <remote_ip> | --remote-group <remote_group>] \
[--protocol <protocol>] \
[--dst-port <port_range>] \
<security_group>Specify:
-
optional: traffic source, you can specify one or both parameters. If you do not specify a source, the default subnet is
0.0.0.0.0/0
:--remote-ip <remote_ip>
— to receive traffic from an IP address. Parameter<remote_ip>
— IP address or subnet in CIDR format;--remote-group <remote_group>
— to accept traffic from another security group. The parameter<remote_group>
— ID or group name, can be viewed with the commandopenstack security group list
. To allow traffic within a group, specify its name. You can only specify a group in the same pool, for traffic from another pool use--remote-ip <remote_ip>
;
-
optional:
--protocol <protocol>
— protocol. The parameter<protocol>
is the name of the protocol from the list below. If you do not specify the parameter, any protocols will be allowed:icmp
— ICMP;tcp
— TCP;udp
— UDP;ah
— AH;dccp
— DCCP;egp
— EGP;esp
— ESP;gre
— GRE;igmp
— IGMP;ipv6-encap
— IPv6-ENCAP;ipv6-frag
— IPv6-Frag;ipv6-icmp
— IPv6-ICMP;ipv6-nonxt
— IPv6-NoNxt;ipv6-opts
— IPv6-Opts;ipv6-route
— IPv6-Route;ospf
— OSPF;pgm
— PGM;rsvp
— RSVP;sctp
— SCTP;udplite
— UDP Lite;vrrp
— VRRP;ipip
— IP-in-IP;any
— any protocol;
-
optional:
--dst-port <port_range>
— server ports on which it is allowed to receive traffic. Parameter<port_range>
— port number or port range, for example137:139
. Specify if<protocol>
istcp
,udp
, orany
.Traffic to any TCP/UDP port blocked in Selectel by default will be denied even if you specify that port in the rule;
-
<security_group>
— The ID or name of the security group can be viewed with the commandopenstack security group list
.
-
-
Optional: check the list of rules in the security group:
openstack security group rule list <security_group>
Specify
<security_group>
— The ID or name of the security group to which you added the rule in step 2 can be viewed using theopenstack security group list
command.