Modifying a Security Group Rule
Scenarios
You can modify the port, protocol, and IP address of your security group rules as required to ensure the security of your instances.
Note that modifying a security group rule may interrupt your services or cause network security risks.
Notes and Constraints
Security group rules are like a whitelist. If there are no rules that allow or deny specific traffic, the security group denies all traffic to or from the instances in it.
Procedure
- Log in to the management console.
- Click
in the upper left corner and choose Network > Virtual Private Cloud.
The Virtual Private Cloud page is displayed.
- In the navigation pane on the left, choose Access Control > Security Groups.
The security group list is displayed.
- In the security group list, click the name of the security group.
The security group details page is displayed.
- Click the Inbound Rules or Outbound Rules tab as required.
The security group rule list is displayed.
- Locate the target rule and click Modify in the Operation column.
- Modify the security group rule information as prompted and click Confirm.
Parent topic: Managing Security Group Rules
- Scenarios
- Notes and Constraints
- Procedure