Horizon Web Console: Security Groups
Note
Red Cloud 2 is currently in beta testing and not available to all users. If you are not a Red Cloud 2 beta tester, use the production Red Cloud instead. This Red Cloud 2 documentation is still under development.
Beta testers: Report all problems to CAC Help. Please specify Red Cloud 2 when reporting problems. Thank you!
Under the Project
and Network
tabs, use the Security Groups
screen to manage the security groups in your project.
List Security Groups
The Security Groups
screen lists all the security groups in your project.
Create a Security Group
-
Click on the
Create Security Group
button to create a new security group -
Name the new security group and click on the
Create Security Goup
button.
By default, a new security group allows outbound network connections only. All inbound connections are blocked. All allowed access must be explictly granted by a security group rule. You should add new security group rules to the new security group.
Delete a Security Group
On the Security Groups
screen, select the security group(s) you want to delete and click on the Delete Security Groups
button.
Note
A security group can only be deleted if no server is assigned to it.
Manage Your Security Group
-
On the
Security Groups
screen under theProject
andNetwork
tabs, click on theManage Rules
button next to the security group you want to change its rules. -
On the
Manage Security Group Rules
screen, you can now add new rules or delete an existing rule using theAdd Rule
andDelete Rule
buttons.
Add a Security Group Rule
-
To add a new rule, click on the
Add Rule
button on theManage Security Group Rules
screen. -
In the
Add Rule
screen, use the pull down menu underRule
to create a new rule to allow many common services such as ssh, https, etc. You can also choose to create custom TCP, UDP, ICMP or protocol rules. See the descriptions on the right for information on the appropriate values to use.- For accessing Linux instances, select
SSH
fromRule
. - For accessing Windows instances, select
RDP
fromRule
. - In
CIDR
, leave it blank to access the instance from the entire internet, or IP Addresses to restrict access to Cornell networks only.
- For accessing Linux instances, select
-
Click on the
Add
button to create the new rule. You will now see the new rule listed on theManage Security Rules
screen.
Delete a Security Group Rule
To delete a security group rule, click on the Delete Rule
button next to the rule to be deleted. To delete multiple security group rules, click the rules to be deleted and click on the Delete Rules
button in the upper right corner.