Help Center/ SAP Cloud/ SAP Business One User Guide/ Preparing for Resources/ Applying for a Subnet and Configuring a Security Group
Updated on 2022-12-08 GMT+08:00

Applying for a Subnet and Configuring a Security Group

Scenarios

To ensure proper communication between the servers in an SAP Business One system, apply for a subnet for the ECSs and configure a proper security group.

Procedure

  1. Apply for a subnet.

    1. Log in to the management console.
    2. In the navigation pane on the left, click and choose Virtual Private Cloud under Network.
    3. Choose Subnets in the left navigation pane.
    4. In the upper right corner of the displayed page, click Create Subnet.
    5. In the displayed Create Subnet dialog box, configure parameters as prompted.
      • VPC: Select the VPC created in Creating a VPC.
      • AZ: Select an AZ.
      • Name: Configure the subnet name that is easy to identify, for example, service_subnet.
      • CIDR Block: Configure this parameter according to the deployment plan described in section Network Planning.
      • Advanced Settings: Set it to Default.
    6. Click OK.
    7. Repeat 1.d to 1.f to create all required subnets according to the requirements specified in section Network Planning.

  2. Set security groups.

    Create a security group for all nodes in the SAP Business One system.
    1. In the navigation pane on the left, choose Access Control > Security Group and then click Create Security Group on the right side of the page. The Create Security Group dialog is displayed.
    2. Enter the security group name and click OK to complete the security group configuration.

      Name the security group that is easy to identify, for example, studio_security_group.

    3. Repeat 2.a to 2.b to create other security groups.
    4. In the security group list on the right of the page, click the security group name for which a rule is to be added.
    5. Click Add Rule on the Inbound Rules or Outbound Rules tab as planned.
    6. On the displayed page, add the rule according to the requirements specified in section Network Planning.

      The default security group rules cannot be deleted.

    7. Repeat 2.d to 2.f to configure all security groups.