How : Open Port in Security Group

How : Open Port in Security Group

Open the Amazon EC2 console at https://console.aws.amazon.com/ec2/.
  1. In the navigation pane, choose Security Groups and select the security group.

  2. On the Inbound tab, choose Edit.

  3. In the dialog, choose Add Rule and do the following:

    • For Type, select the protocol.

    • If you select a custom TCP or UDP protocol, specify the port range in Port Range.

    • If you select a custom ICMP protocol, choose the ICMP type name from Protocol, and, if applicable, the code name from Port Range.

    • For Source, choose one of the following:

      • Custom: in the provided field, you must specify an IP address in CIDR notation, a CIDR block, or another security group.

      • Anywhere: automatically adds the 0.0.0.0/0 IPv4 CIDR block. This option enables all traffic of the specified type to reach your instance. This is acceptable for a short time in a test environment, but it's unsafe for production environments. In production, authorize only a specific IP address or range of addresses to access your instance.

        Note

        If your security group is in a VPC that's enabled for IPv6, the Anywhere option creates two rules—one for IPv4 traffic (0.0.0.0/0) and one for IPv6 traffic (::/0).

      • My IP: automatically adds the public IPv4 address of your local computer.

    • For Description, you can optionally specify a description for the rule.

    For more information about the types of rules that you can add, see Security Group Rules Reference.

  4. Choose Save.

  5. You can also specify outbound rules. On the Outbound tab, choose Edit, Add Rule, and do the following:

    • For Type, select the protocol.

    • If you select a custom TCP or UDP protocol, specify the port range in Port Range.

    • If you select a custom ICMP protocol, choose the ICMP type name from Protocol, and, if applicable, the code name from Port Range.

    • For Destination, choose one of the following:

      • Custom: in the provided field, you must specify an IP address in CIDR notation, a CIDR block, or another security group.

      • Anywhere: automatically adds the 0.0.0.0/0 IPv4 CIDR block. This option enables outbound traffic to all IP addresses.

        Note

        If your security group is in a VPC that's enabled for IPv6, the Anywhere option creates two rules—one for IPv4 traffic (0.0.0.0/0) and one for IPv6 traffic (::/0).

      • My IP: automatically adds the IP address of your local computer.

    • For Description, you can optionally specify a description for the rule.

  6. Choose Save.


    • Related Articles

    • PostgreSQL basic commnad

      How to connect AWS-RDS of PostgreSQL using terminal or CMD & basic of PostgreSQL - syntax format psql -h HOSTNAME --port=5432 -U USERNAME DATABASENAME -W -h = host or RDS Endpoint -p 5432 pre define port for postgresql -u user name for database ...
    • FTP Server on Wndows

      Server Side - Install Filezilla Server : https://filezilla-project.org/download.php?type=server - Edit -> Settings -> Passive Settings -> Port range 50000-51000 / Add Public IP Address - Open ports 21,990,50000-51000 Client Side - Install Winscp ...
    • Registering to OpenXcell SSO

      Overview: Openxcell SSO, is an enterprise grade Identity Provider supporting Single-Sign-On Using various authentication protocols such as OIDC and SAML. To ensure single point of authentication and security across all the organization owned and ...
    • Connecting to development database

      Overview: Database Admin UI URL PHPMyAdmin https://pma.openxcell.dev Adminer https://adminer.openxcell.dev MySQL Databases: For all the application using mysql database https://pma.openxcell.dev serves the PHPMyAdmin Frontend. To access the ...
    • AWS Free Tier

      Some Common Frequently asked questions! 1. What is the capacity of free tier? How many users it can hold. - that entirely upon your application. We can test load balancing on that server after your application gets developed. Before that, it's ...