How to block all the outbound traffic while allowing SSH connections?
Last updated
Last updated
Learn how to block all the outbound traffic while allowing SSH connections from the portal step-by-step.
Step 1: Login to your account
Step 2: Navigate to Services and then click on My Services.
Step 3: Click on your project.
Step 4: From the left-hand side menu select Networks and click Security Group.
Step 5: Choose the security group in which you want to change rules and click on Select and choose Manage Rules from the drop-down.
Step 6: Click on Add Rules to set a rule in an instance.
Step 7: Enter the following details according to your requirements and security needs:
Field | Description |
---|---|
Rule | Specify the desired rule template or use custom rules such as Custom TCP Rule, Custom UDP Rule, or Custom ICMP Rule. |
Description | Add a brief description of the rule. |
Direction | Select the desired filter out of the two available filters i.e., ingress and egress. The ingress and egress rules are used to control traffic within and across the network boundary. Let’s know them individually: Ingress: It refers to a set of rules which are used to block outbound traffic coming toward the server. Egress: It refers to a set of rules which are used to allow traffic to pass from your server to the outer world.
|
Open Port/Port Range | For TCP and UDP rules you may choose to open either a single port or a range of ports.
|
Remote | Specify the source of the traffic to be allowed via this rule. You may do so either in the form of an IP address block (CDR) or via a source group (Security Group). |
Then, click the Add Rule button.
Therefore, if you want to allow SSH connections while blocking all the outbound traffic with a cloud firewall, you need to select the Egress filter rule in the Direction category.