doc-exports/docs/gaussdb_nosql/umn/nosql_02_0011.html
Wang , Deng Ke 09841dde95 nosql umn 20230210 version
Reviewed-by: Drobnak, David <david.drobnak@t-systems.com>
Co-authored-by: Wang , Deng Ke <wangdengke2@huawei.com>
Co-committed-by: Wang , Deng Ke <wangdengke2@huawei.com>
2023-09-12 08:34:38 +00:00

4.5 KiB

Configuring Security Group Rules

Scenarios

The default security group rule allows all outgoing data packets. ECSs and GaussDB(for Cassandra) instances in the same security group can access each other. After a security group is created, you can create different rules for that security group, which allows you to control access to the GaussDB(for Cassandra) instances that in it.

This section describes how to create a security group to enable specific IP addresses and ports to access GaussDB(for Cassandra) instances.

Precautions

  • By default, you can create up to 500 security group rules. However, too many rules increase network latency for initial access, so it is recommended that you add no more than 50 rules for each security group.
  • To access a GaussDB(for Cassandra) instance from resources outside the security group, you need to configure an inbound rule to allow access to the GaussDB(for Cassandra) instance.

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and select a region and a project.
  3. Click Service List. Under Network, click Virtual Private Cloud.
  4. In the navigation pane on the left, choose Access Control > Security Groups.
  5. On the Security Groups page, click the security group name.
  6. On the Inbound Rules tab, click Add Rule. In the displayed Add Inbound Rule dialog box, set required parameters to add inbound rules. On the Outbound Rules tab, click Add Rule. In the displayed Add Outbound Rule dialog box, set required parameters to add outbound rules.
  7. In the displayed dialog box, set required parameters.
  8. Click OK.