Skip to content

Create Security Groups

Overview

Security groups are sets of firewall rules which can be bound to networking ports. Each project has a default security group which allows egress (outgoing) traffic to any destination and ingress (incoming) traffic from ports which have the default security group assigned.

Create Security Group via GUI

For accessing instances via SSH, a security group rule needs to be created for TCP port 22 first. Although this rule can be added to the default security group, it is recommended to create a separate group for this purpose.

Prerequisites

  • You need to have the login data for the firstcolo Cloud API (user name and passphrase).

Create Security Group

  • Go to "Network" --> "Security Groups".
  • Click the button "Create Security Group"
  • Write a name for this group into the field "Name"
  • Click "Create Security Group"

create-security-group

  • In the rules list click on "Add Rule"
  • Select "SSH" in the first dropdown menu click on "Add"

add-security-group-rule

  • The rule list should now include the newly created SSH rule

ssh-security-group

Create Security Group via CLI

Prerequisites

  • You need to have the login data for the firstcolo Cloud API (user name and passphrase).
  • The OpenStack CLI-Tools are installed in an up-to-date version.
  • Environment variables are set, like shown in the API-Access-Tutorial.

Create Security Group

Using the username and password (API credentials) that were provided by firstcolo we source the 'openrc' file and enable the CLI client to talk to the firstcolo Cloud.

Then we create a new security group as follows:

openstack security group create ssh --description "SSH Access"

Next, add a SSH rule to the newly created security group:

openstack security group rule create ssh \
    --protocol tcp --dst-port 22:22 --remote-ip 0.0.0.0/0