Updated on 2024-04-11 GMT+08:00

Modifying a Security Group Rule

Scenarios

You can modify the port, protocol, and IP address of your security group rules as required to ensure the security of your instances.

Notes and Constraints

Note that modifying a security group rule may interrupt your services or cause network security risks.

Security group rules are like a whitelist. If there are no rules that allow or deny some traffic, the security group denies all traffic to or from the instances in the security group

Procedure

  1. Log in to the management console.
  2. Click in the upper left corner and choose Network > Virtual Private Cloud.

    The Virtual Private Cloud page is displayed.

  3. In the navigation pane on the left, choose Access Control > Security Groups.

    The security group list is displayed.

  4. In the security group list, click the name of the security group.

    The security group details page is displayed.

  5. Click the Inbound Rules or Outbound Rules tab as required.

    The security group rule list is displayed.

  6. Locate the row that contains the rule and click Modify in the Operation column.
  7. Modify the security group rule information as prompted and click Confirm.