Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
OpenStack Networking Cookbook

You're reading from   OpenStack Networking Cookbook Harness the power of OpenStack Networking for public and private clouds using 90 hands-on recipes

Arrow left icon
Product type Paperback
Published in Oct 2015
Publisher
ISBN-13 9781785286100
Length 282 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Authors (2):
Arrow left icon
Sriram Subramanian Sriram Subramanian
Author Profile Icon Sriram Subramanian
Sriram Subramanian
Chandan Dutta Chandan Dutta
Author Profile Icon Chandan Dutta
Chandan Dutta
Arrow right icon
View More author details
Toc

Table of Contents (14) Chapters Close

Preface 1. Getting Started with OpenStack Networking FREE CHAPTER 2. Using Open vSwitch for VLAN-Based Networks 3. Exploring Other Network Types in Neutron 4. Exploring Overlay Networks with Neutron 5. Managing IP Addresses in Neutron 6. Using Routing Services in Neutron 7. Using Neutron Security and Firewall Services 8. Using HAProxy for Load Balancing 9. Monitoring OpenStack Networks 10. Writing Your Own Neutron ML2 Mechanism Driver 11. Troubleshooting Tips for Neutron 12. Advanced Topics Index

Configuring the security group rules using Horizon


Once a security group has been created, access to all the ports associated with the security group is denied. Security rules are then added to the group in order to allow only certain type of traffic, thereby securing the Network. The rules are defined using Network traffic attributes such as protocol (TCP, UDP, or ICMP), the direction of traffic flow, for example, entering the port (ingress) or exiting the port (egress), and the application port, that is, the UDP or TCP socket ports.

Getting ready

For this recipe, you will need the following information:

  • The name of the security group to which the rules will be added

  • The type of protocol to be allowed

  • The direction of the traffic, that is, originating from the port (egress) or destined to the port (ingress)

  • The protocol port or port range that should be allowed

How to do it…

The following steps will show you how to create the security group rules using Horizon:

  1. Log in to Horizon with the appropriate...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime