Create a Security Group

Eucalyptus enables you to control access to your cloud using security groups. A security group contains a group of rules that control inbound traffic to instances in the group for the specified protocols and ports.

Create a Security Group with the Console

  1. Enter a name for your security group in the Name text box.
  2. Enter a description for your security group in the Description text box.
  3. You can optionally create one or more rules for the security group. A rule grants a specified range of IP addresses inbound access to your instances for a protocol or custom port range. Rules for many of the most popular protocols are pre-defined and available for selection in the drop-down list box, or you can define your own rule.
    Important: You should specify at least one rule for your security group.
    1. Select a protocol for the rule from the Protocol drop-down list box, or select a custom protocol.
    2. If you've selected a custom protocol, enter a port range for the rule in the Port range text box.
    3. Select the type of inbound traffic for the rule using the radio buttons:

      To grant access to an IP address or range of IP addresses, select the IP Address radio button and enter a CIDR range in the text box.

      Note: For more information on CIDR notation, please see the CIDR notation Wikipedia article.

      To grant access to another security group, select the Other security group radio button and enter the name of the security group in the text box.

      Note: To specify a security group in another account, use the format "userid/groupname".
    4. Click the Add another rule button.
  4. Click the Create group button.