The following procedure shows you how to add rules to the default security group.
To add rules to the default security group
添加规则到默认安全组
Log in to the OpenStack dashboard.
第一步:登录OpenStack控制面板
If you are a member of multiple projects, select a project from the drop-down list at the top of the Project tab.
第二步:如果你是多个项目组的成员,请在项目tab页的顶部的下拉菜单列表中选择一个项目。
Click the Access & Security category.
第三步:点击“访问与安全”栏目。
The dashboard shows the security groups that are available for this project.
OpenStack控制面板上将显示这个项目的所有可用的安全组。
Select the default security group and click .
第四步:选择默认安全组,点击“编辑规则”链接。
The Security Group Rules page appears:控制面
Add a TCP rule
第五步:添加一个TCP规则
Click .
点击“添加规则”
The Add Rule window appears.
添加规则的窗口显示如下:
In the IP Protocol list, select TCP
. (在IP协议列表中,选择TCP。)
In the Open list, select Port
.(在“开放”列表中,选择Port)
In the Port box, enter 22
. (在端口输入框,输入22)
In the Source list, select CIDR
. (在Source列表中,选择CIDR)
In the CIDR box, enter 0.0.0.0/0
.(在“无类域内路由”输入框中,输入0.0.0.0/0)
Click . (点击“添加”)
Port 22 is now open for requests from any IP address.
现在,端口22就为所有IP地址的请求开放了。
If you want to accept requests from a particular range of IP addresses, specify the IP address block in theCIDR box.
如果你想只接爱指定范围的IP地址的请求,则需要在CIDR输入框中指定IP地址。
Add an ICMP rule
第六步:添加ICMP规则
Click .
点击“添加规则”
The Add Rule window appears.
添加规则的窗口显示如下:
In the IP Protocol list, select ICMP
. (在IP协议列表中,选择ICMP)
In the Type box, enter -1
. (在“类型”输入框中,输入-1)
In the Code box, enter -1
. (在“代码”输入框中,输入-1)
In the Source list, select CIDR
. (在“Source”列表中,选择CIDR)
In the CIDR box, enter 0.0.0.0/0
. (在CIDR输入框中,输入0.0.0.0/0)
Click . (点击“添加”)
联系客服