Work with the Eucalyptus Management Console / Work with Security Groups |
Eucalyptus enables you to control access to your cloud using security groups. A security group contains a group of rules that control inbound and outbound traffic to instances in the group for the specified protocols and ports.
You can optionally create one or more rules for the security group. A rule grants a specified range of IP addresses access (inbound to or outbound from) your instances for a protocol or custom port range. Rules for many of the most popular protocols are pre-defined and available for selection in the drop-down list box, or you can define your own rule.
To help you manage your cloud's instances, images, and other Eucalyptus resources, you can optionally assign your own metadata to resources in the form of tags. You can use tags to create user-friendly names, make resource searching easier, and improve coordination between multiple users. You can optionally add tags by performing the following steps: