- Service Overview
- Getting Started
-
User Guide
- Granting Permissions to Use FlexusL Instances Through IAM
- Purchasing a FlexusL Instance
- Remotely Logging In to a FlexusL Instance
- Managing FlexusL Instances
- Managing Images
- Managing EVS Disks
- Managing Server Security
- Managing Backups
- Managing Domain Names
- Monitoring
-
Best Practices
- Best Practices for FlexusL
-
Setting Up a Website
- Managing Servers Using the BT Panel
- Building a WordPress Website
- Using Matomo to Build a Website Traffic Statistics System
- Using Odoo to Build an ERP System
- Using Moodle to Build an Online Learning System
- Using Joomla to Build a Content Management System
- Using Ghost to Build a Personal Blog
- Using EspoCRM to Build a Content Management System
- Setting Up the Development Environment
- Setting Up an Application
- Server Migration
- API Reference
-
FAQs
-
Product Consulting
- What Are the Differences Among FlexusL, FlexusX, and ECS?
- How Do I Find My Purchased FlexusL Instances on the Management Console?
- Where Can I View the FlexusL Instance ID and Cloud Server ID Packaged in the FlexusL Instance?
- Can I Migrate Cloud Servers to FlexusL?
- What Should I Do If I Do Not Have Permissions to Purchase FlexusL?
- What Regions Does FlexusL Support?
- What Is the Relationship Among FlexusL Instances, the Dashboard, and the O&M Page?
- Billing
- Creation and Unsubscription
- Specification Changes
-
OS and Image
- Do FlexusL OS Images Provide Visualized Dashboards?
- What Should I Do If a Private Image Cannot Be Used to Create a FlexusL Instance or Change the OS of a FlexusL Instance Because the Password Reset Plug-in Is Not Installed on the Image or the Image's onekey_resetpasswd Tag Is Missing?
- How Do I Check that an Application Image Has Been Up and Running?
- How Do I View the Applications That Are Installed in the FlexusL Application Images by Default?
- Why Can't I Open the Dashboard of the Application Pre-installed in the Application Image?
- How Do I Upgrade the BT Panel?
- Why Can't I Access the Dashboard of the Application Pre-installed in the Application Image After Entering the Initial Username and Password?
- What Do I Do If HSS Is Not Started After I Use a Private Image to Create a FlexusL Instance or Change the OS of an Instance?
- Remote Login
-
Password
- What Are the Username and Password for Remotely Logging In to a FlexusL Instance Server?
- What Can I Do If I Forget the Login Password of a FlexusL Instance?
- What Should I Do If the Password Cannot Be Reset After I Use a Private Linux Image to Create a FlexusL Instance or Change the OS of an Existing FlexusL Instance and I Forgot the Initial Password of the Private Image?
- What Should I Do If the Password Cannot Be Reset After I Use a Private Linux Image to Create a FlexusL Instance or Change the OS of an Existing FlexusL Instance and I Know the Initial Password of the Private Image?
-
Network
- Does a FlexusL Instance Have an EIP?
- Can I Change the Public and Private IP Addresses of a FlexusL Instance?
- How Do I Use Data Packages in FlexusL Instances?
- How Do I View the Traffic Usage of My FlexusL Instance?
- Can I Add a Data Package to a FlexusL Instance?
- What Do I Do If My FlexusL Instance Freezes?
- How Does FlexusL Instances Communicate with Each Other and with Other Cloud Resources Over a Private Network?
-
EVS Disks
- How Do I Detach or Unsubscribe from a System or Data Disk of a FlexusL Instance?
- Can I Use EVS Disk Snapshots to Back Up FlexusL Instance Data?
- Can EVS Disks of FlexusL Instances Be Expanded?
- Can I Change the EVS Disk Type for a FlexusL Instance?
- Can I Attach Existing Data Disks to My FlexusL Instances?
-
Product Consulting
- General Reference
Copied.
Configuring Security Group Rules for a FlexusL Instance
Scenarios
A security group consists of inbound and outbound rules. You can add security group rules to allow or deny the traffic to reach and leave the FlexusL instances in the security group.
Security group rules allow or deny network traffic from specific sources over specific protocols or specific ports.
- For details about configuration examples, see Security Group Examples.
- For details about how to configure security group rules for FlexusL application images, see Configuring Security Groups for FlexusL Application Images.
Precautions
- Before configuring security group rules, you need to plan rules for communications among instances in the security group.
- Define simple security group rules. For details about the constraints on the number of rules in a security group, see Notes and Constraints.
- After allowing traffic over a port in a security group rule, ensure that the port is opened in the instance. For details, see Verifying Security Group Rules.
- Generally, all FlexusL instances created by the same account in the same region are in the same security group and they can communicate with each other by default.
Procedure
- Log in to the FlexusL console and click a resource card to go to the instance details page.
- In the navigation pane on the left, choose Cloud Servers and then click the server name.
- Select Inbound rules from the Security Group drop-down list and click Add Rule on the Security Groups tab.
You can click + to add more inbound rules. For details about the parameters, see Adding a Security Group Rule.
Figure 1 Adding an inbound rule - Select Outbound rules from the Security Group drop-down list and click Add Rule on the Security Groups tab.
You can click + to add more outbound rules. For details about the parameters, see Adding a Security Group Rule.
- Click OK.
Related Operations
On the Inbound Rules and Outbound Rules tab pages, you can also modify, replicate, or delete existing rules.
Deleting security group rules will disable some functions.
- If you delete a rule with Protocol & Port specified as TCP: 20-21, you will not be able to upload files to or download them from servers using FTP.
- If you delete a rule with Protocol & Port specified as ICMP: All, you will not be able to ping the servers.
- If you delete a rule with Protocol & Port specified as TCP: 443, you will not be able to connect to websites on the servers using HTTPS.
- If you delete a rule with Protocol & Port specified as TCP: 80, you will not be able to connect to websites on servers using HTTP.
- If you delete a rule with Protocol & Port specified as TCP: 22, you will not be able to remotely connect to Linux server using SSH.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot