nav-img
Advanced

Modifying a Security Group Rule

Scenarios

You can modify the port, protocol, and IP address of your security group rules as required to ensure the security of your instances.

Note that modifying a security group rule may interrupt your services or cause network security risks.

Notes and Constraints

Security group rules are like a whitelist. If there are no rules that allow or deny specific traffic, the security group denies all traffic to or from the instances in it.

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and choose Network > Virtual Private Cloud.

    The Virtual Private Cloud page is displayed.

  3. In the navigation pane on the left, choose Access Control > Security Groups.

    The security group list is displayed.

  4. In the security group list, click the name of the security group.

    The security group details page is displayed.

  5. Click the Inbound Rules or Outbound Rules tab as required.

    The security group rule list is displayed.

  6. Locate the target rule and click Modify in the Operation column.
  7. Modify the security group rule information as prompted and click Confirm.