O'Reilly logo

OpenStack Networking Cookbook by Chandan Dutta Chowdhury, Sriram Subramanian

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Configuring the security group rules using Horizon

Once a security group has been created, access to all the ports associated with the security group is denied. Security rules are then added to the group in order to allow only certain type of traffic, thereby securing the Network. The rules are defined using Network traffic attributes such as protocol (TCP, UDP, or ICMP), the direction of traffic flow, for example, entering the port (ingress) or exiting the port (egress), and the application port, that is, the UDP or TCP socket ports.

Getting ready

For this recipe, you will need the following information:

  • The name of the security group to which the rules will be added
  • The type of protocol to be allowed
  • The direction of the traffic, that is, originating ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required