When you create instances, such as cloud servers, containers, and databases, in a VPC subnet, you can use the default security group or create a security group. You can add inbound and outbound rules to the default or your created security group to control traffic from and to the instances in the security group. Here are some common security group configuration examples:
Note the following before configuring security group rules:
If required, you can add inbound rules to allow specific traffic to access the instances in the security group.
If outbound rules are deleted, the instances in the security group cannot communicate with external resources. To allow outbound traffic, you need to add outbound rules by referring to Table 1.
Direction | Priority | Action | Type | Protocol & Port | Destination | Description |
|---|---|---|---|---|---|---|
Outbound | 1 | Allow | IPv4 | All | 0.0.0.0/0 | Allows the instances in the security group to access any IPv4 address over any port. |
Outbound | 1 | Allow | IPv6 | All | ::/0 | Allows the instances in the security group to access any IPv6 address over any port. |
A security group denies all external requests by default. To remotely log in to an ECS in a security group from a local server, add an inbound rule based on the OS running on the ECS.
Direction | Priority | Action | Type | Protocol & Port | Source |
|---|---|---|---|---|---|
Inbound | 1 | Allow | IPv4 | TCP: 22 | IP address: 0.0.0.0/0 |
Direction | Priority | Action | Type | Protocol & Port | Source |
|---|---|---|---|---|---|
Inbound | 1 | Allow | IPv4 | TCP: 3389 | IP address: 0.0.0.0/0 |
If the source is set to 0.0.0.0/0, all external IP addresses are allowed to remotely log in to the ECS. To ensure network security and prevent service interruptions caused by network intrusions, set the source to a trusted IP address. For details, see Table 4.
ECS Type | Direction | Priority | Action | Type | Protocol & Port | Source |
|---|---|---|---|---|---|---|
Linux ECS | Inbound | 1 | Allow | IPv4 | TCP: 22 | IP address: 192.168.0.0/24 |
Windows ECS | Inbound | 1 | Allow | IPv4 | TCP: 3389 | IP address: 10.10.0.0/24 |
By default, a security group denies all external requests. If you need to remotely connect to an ECS from a local server to upload or download files over FTP, you need to enable FTP ports 20 and 21.
Direction | Priority | Action | Type | Protocol & Port | Source |
|---|---|---|---|---|---|
Inbound | 1 | Allow | IPv4 | TCP: 20-21 | IP address: 0.0.0.0/0 |
Direction | Priority | Action | Type | Protocol & Port | Source |
|---|---|---|---|---|---|
Inbound | 1 | Allow | IPv4 | TCP: 20-21 | IP address: 192.168.0.0/24 |
A security group denies all external requests by default. If you set up a website on an ECS to allow access from the Internet, you need to add an inbound rule to the ECS security group to allow access over specific ports, such as HTTP (80) and HTTPS (443).
Direction | Priority | Action | Type | Protocol & Port | Source |
|---|---|---|---|---|---|
Inbound | 1 | Allow | IPv4 | TCP: 80 | IP address: 0.0.0.0/0 |
Inbound | 1 | Allow | IPv4 | TCP: 443 | IP address: 0.0.0.0/0 |
Ping works by sending an Internet Control Message Protocol (ICMP) Echo Request. To ping an ECS from your PC to verify the network connectivity, you need to add an inbound rule to the security group of the ECS to allow ICMP traffic.
Direction | Priority | Action | Type | Protocol & Port | Source |
|---|---|---|---|---|---|
Inbound | 1 | Allow | IPv4 | ICMP: All | IP address: 0.0.0.0/0 |
Inbound | 1 | Allow | IPv6 | ICMP: All | IP address: ::/0 |
Instances in the same VPC but in different security groups cannot communicate with each other. If you want ECSs in security group sg-A to access MySQL databases in security group sg-B, you need to add an inbound rule to security group sg-B to allow access from ECSs in security group sg-A.
Direction | Priority | Action | Type | Protocol & Port | Source |
|---|---|---|---|---|---|
Inbound | 1 | Allow | IPv4 | TCP: 3306 | Security group: sg-A |
A security group denies all external requests by default. If you have deployed a database on an ECS and want the database to be accessed from external instances on a private network, you need to add an inbound rule to the security group of the ECS to allow access over corresponding ports. Here are some common ports for databases:
In this example, the source is for reference only. Set the source based on actual requirements.
Direction | Priority | Action | Type | Protocol & Port | Source | Description |
|---|---|---|---|---|---|---|
Inbound | 1 | Allow | IPv4 | TCP: 3306 | Security group: sg-A | Allows the ECSs in security group sg-A to access the MySQL database. |
Inbound | 1 | Allow | IPv4 | TCP: 1521 | Security group: sg-B | Allows the ECSs in security group sg-B to access the Oracle database. |
Inbound | 1 | Allow | IPv4 | TCP: 1433 | IP address: 172.16.3.21/32 | Allows the ECS whose private IP address is 172.16.3.21 to access the MS SQL database. |
Inbound | 1 | Allow | IPv4 | TCP: 5432 | IP address: 192.168.0.0/24 | Allows ECSs whose private IP addresses are in the 192.168.0.0/24 network to access the PostgreSQL database. |
By default, a security group allows all outbound traffic. Table 12 lists the default outbound rules. If you want to allow ECSs to access only specific websites, configure the security group as follows:
Direction | Priority | Action | Type | Protocol & Port | Destination | Description |
|---|---|---|---|---|---|---|
Outbound | 1 | Allow | IPv4 | TCP: 80 | IP address: 132.15.XX.XX | Allows ECSs in the security group to access the external website at http://132.15.XX.XX:80. |
Outbound | 1 | Allow | IPv4 | TCP: 443 | IP address: 145.117.XX.XX | Allows ECSs in the security group to access the external website at https://145.117.XX.XX:443. |
Direction | Priority | Action | Type | Protocol & Port | Destination | Description |
|---|---|---|---|---|---|---|
Outbound | 1 | Allow | IPv4 | All | 0.0.0.0/0 | Allows the instances in the security group to access any IPv4 address over any port. |
Outbound | 1 | Allow | IPv6 | All | ::/0 | Allows the instances in the security group to access any IPv6 address over any port. |