Knowledge Base
Network
Network
  • How to create a Router?
  • How to Manage IKE Policy
  • How to Manage IPsec Policies?
  • How to Manage a Virtual Private Cloud (VPC)?
  • How to create an application load balancer?
  • How to create a network load balancer?
  • How to Manage a load balancer?
  • How to associate a floating IP to the load balancer?
  • How to create a pool?
  • How to create a listener?
  • How to edit a pool?
  • How to edit a listener?
  • How to delete a load balancer?
  • How to delete a listener?
  • How to delete a pool?
  • How to dissociate a floating IP from the load balancer?
  • How do I troubleshoot internal (to external targets) brute force attack?
  • How to block all the outbound traffic while allowing SSH connections?
  • How to edit a security group?
  • How to release floating IP?
  • How to create security groups?
  • How to edit and delete a private network?
  • Troubleshoot Connecting to your Ace Compute Instance
  • How to add a subnet to a existing Private network?
  • Managing Security Group
  • How to Manage VPN Services?
  • How to Manage Endpoint Groups?
  • How to Manage Ipsec Site Connections?
Powered by GitBook
On this page

Was this helpful?

How to create security groups?

PreviousHow to release floating IP?NextHow to edit and delete a private network?

Last updated 9 months ago

Was this helpful?

To create a security group, follow below steps:

Step 1: to your account.

Step 2: Navigate to Services and then click on My Services.

Step 3: Click on your project.

Step 4: From the left-hand side menu select Networks and click Security Group.

Step 5: Click on Create Security Group.

Step 6: Enter the Name and description and click on Create Security Group.

Step 7: Choose the security group in which you want to add rules and click on Select and choose Manage Rules from the drop-down.

Step 8: Click on Add Rules to set a rule in an instance.

Step 9: Enter the following details according to your requirements and security needs:

Field
Description

Rule

Specify the desired rule template or use custom rules such as Custom TCP Rule, Custom UDP Rule, or Custom ICMP Rule.

Description

Add a brief description of the rule.

Direction

Select the desired filter out of the two available filters i.e., ingress and egress. The ingress and egress rules are used to control traffic within and across the network boundary. Let’s know them individually:

Ingress: It refers to a set of rules which are used to block outbound traffic coming toward the server.

Egress: It refers to a set of rules which are used to allow traffic to pass from your server to the outer world.

Open Port/Port Range

For TCP and UDP rules you may choose to open either a single port or a range of ports.

Remote

Specify the source of the traffic to be allowed via this rule. You may do so either in the form of an IP address block (CDR) or via a source group (Security Group).

Then, click the Add Rule button.

Login