Working with security groups in the dashboard

Within the Horizon dashboard, security groups are managed within the Access & Security section under the Compute tab:

Working with security groups in the dashboard

Figure 6.13

Creating a security group

To create a security group, perform the following steps.

Click on the Create Security Group button in the upper right-hand corner of the screen. A window will appear that will allow you to create a security group, which is similar to the following screenshot:

Creating a security group

Figure 6.14

The Name field is required. When you are ready to proceed, click on the blue Create Security Group button to create the security group.

Managing security group rules

Once created, you will be returned to the Access & Security section, where you can add rules to the security group by clicking on the Manage Rules button of the corresponding group:

Managing security group rules

Figure 6.15

To delete a rule, click on the red Delete Rule button next to the corresponding security group rule. To add a rule, click on the Add Rule button in the upper right-hand corner:

Managing security group rules

Figure 6.16

A window will appear that allows you to create rules. Within the rule list, you can choose from a predefined list of protocols or create a custom rule, as follows:

Managing security group rules

Figure 6.17

To complete the rule creation, click on the blue Add button.

Applying security groups to instances

To apply a security group to an instance, return to the Instances section of the Compute tab. Click on the arrow under the Actions menu next to the instance and select Edit Security Groups:

Applying security groups to instances

Figure 6.18

A window will appear that allows you to apply or remove security groups from an instance.

Hit the blue plus sign next to the group to apply it to an instance:

Applying security groups to instances

Figure 6.19

Once clicked, the group will move to the Instance Security Groups column. Click on the blue Save button to apply the changes:

Applying security groups to instances

Figure 6.20

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset