Management of database security groups

From EN Ikoula wiki
Revision as of 16:08, 22 September 2015 by Ikbot (talk | contribs) (Created page with "This article has been created by an automatic translation software. You can view the article source here.<br /> <!-- Début...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
⧼vector-jumptonavigation⧽ ⧼vector-jumptosearch⧽

This article has been created by an automatic translation software. You can view the article source here.



Introduction

You will find here information on simplified management of openings in ports in the area of basic routing with CloudInstance

Place

By default, no security rule allows traffic inbound to your instance at a basic zone creation (Area 3) in CloudStack.
In order to communicate with your instance, it is necessary to open the corresponding ports to your use.

Some common examples of opening port (We will use the CIDR 0.0.0.0/0 to allow all IP ranges to suit your security needs ) :

Allow the "Ping " (More info on http://www.nthelp.com/icmp.html)
Protocol ICMP Type 8Code 0CIDR 0.0.0.0/0
SSH
Protocol TCP, start port 22end port 22CIDR 0.0.0.0/0
RDP (Remote desktop )
Protocol TCP, start port 3389end port 3389CIDR 0.0.0.0/0
Web service (IIS, Apache, nginx... )
Protocol TCP, start port 80end port 80CIDR 0.0.0.0/0
Web service SSL (IIS, Apache, nginx... )
Protocol TCP, start port 443end port 443CIDR 0.0.0.0/0
MySQL
Protocol TCP, start port 3306end port 3306CIDR 0.0.0.0/0
SQLServer
Protocol TCP, start port 1433end port 1433CIDR 0.0.0.0/0
DNS service
Protocol UDP, start port 53end port 53CIDR 0.0.0.0/0



This article seemed you to be useful ?

0



You are not allowed to post comments.