Configuring Security Group

Last updated: 2020-07-08 17:44:58

    Operation Scenarios

    A security group is a stateful virtual firewall capable of filtering. As an important means for network security isolation provided by Tencent Cloud, it can be used to set network access controls for one or more TencentDB instances. Instances with the same network security isolation demands in one region can be put into the same security group, which is a logical group. TencentDB and CVM share the security group list.

    • TencentDB for SQL Server security group currently only supports network access control for VPCs and public network but not the basic network.
    • Security groups that currently support public network access are available only in Guangzhou, Shanghai, Beijing, and Chengdu.
    • As no outbound traffic is generated for TencentDB instances, outbound rules do not take effect for TencentDB.
    • TencentDB for SQL Server security group supports master and read-only instances.

    Configuring Security Group for TencentDB

    Step 1. Create a security group

    1. Log in to the CVM Console.
    2. Select Security Group on the left sidebar, select a region, and click Create.
    3. In the pop-up dialog box, configure the following items and click OK.
      • Template: select an appropriate template based on the service to be deployed on the TencentDB instance in the security group, which simplifies the security group rule configuration, as shown below:
        TemplateDescriptionRemarks
        Open all portsAll ports are opened to the public and private networks. This may present security issues.-
        Open ports 22, 80, 443, and 3389 and the ICMP protocolPorts 22, 80, 443, and 3389 and the ICMP protocol are opened to the internet. All ports are opened to the private network.This template does not take effect for TencentDB.
        CustomYou can create a security group and then add custom rules. For detailed directions, please see "Adding Security Group Rules" below.-
      • Name: custom name of the security group.
      • Project: the default project is selected by default. You can also select another one for easier management.
      • Remarks: a short description of the security group for easier management.

    Step 2. Add a security group rule

    1. On the Security Group page, click Modify Rule in the "Operation" column on the row of the security group for which to configure a rule.
    2. On the security group rule page, click Inbound Rules > Add Rule.
    3. In the pop-up dialog box, set the rule.
      • Type: "Custom" is selected by default. You can also choose another system rule template. SQL Server(1433) is recommended.
      • Source: traffic source (inbound rule) or destination (outbound rule). You need to specify one of the following options:
        Source/DestinationDescription
        IPv4 address or IPv4 address rangeIn CIDR format (such as 203.0.113.0, 203.0.113.0/24, or 0.0.0.0/0, where 0.0.0.0/0 indicates all IPv4 addresses).
        IPv6 address or IPv6 address rangeIn CIDR format (such as FF05::B5, FF05:B5::/60, ::/0, or 0::0/0, where ::/0 or 0::0/0 indicate all IPv6 addresses).
        ID of referenced security group. You can reference the ID of:
        • Current security group
        • Another security group
        • Current security group: CVM instance associated with the current security group.
        • Another security group: ID of another security group in the same region under the same project.
        Reference IP address object or IP address group object in a parameter template.-
      • Protocol port: enter the protocol type and port range or reference an IP address object or IP address group object in a parameter template.

        To connect to TencentDB for SQL Server, port 1433 must be opened.

      • Policy: "Allow" is selected by default.
        • Allow: traffic to this port is allowed.
        • Reject: data packets will be discarded without any response.
      • Remarks: a short description of the rule for easier management.
    4. Click Complete to finish adding the inbound rule.

    Use cases

    Scenario: you have created a TencentDB for SQL Server instance and want to access it from a CVM instance.
    Solution: when adding security group rules, select SQL Server(1433) in "Type" to open port 1433.
    You can also allow all IPs or specified IPs (IP ranges) based on your actual needs so as to configure IP sources that can access TencentDB for SQL Server through CVM.

    Direction Type Source Port Policy
    Inbound SQL Server(1433) All IP: 0.0.0.0/0
    Specified IP: enter the specified IPs or IP ranges
    TCP:1433 Allow

    Step 3. Configure a security group

    A security group is an instance-level firewall provided by Tencent Cloud for controlling inbound traffic of TencentDB. You can associate a security group with an instance when purchasing it or later in the console.

    Currently, security groups can be configured only for TencentDB for SQL Server instances in VPC.

    1. Log in to the TencentDB for SQL Server Console. In the instance list, select the instance for which to configure a security group and click Manage in the "Operation" column to enter the instance management page.
    2. On the Security Group tab, click Configure Security Group.
    3. In the pop-up dialog box, select the security group to be bound and click OK.

    Importing Security Group Rules

    1. On the Security Group page, click the ID/name of the target security group.
    2. On the inbound rules or outbound rules tab, click Import Rule.
    3. In the pop-up dialog box, select an edited inbound/outbound rule template file and click Start Import.
      • If there are existing rules in the security group, export them before importing new rules. Existing rules are overwritten after importing.
      • If there are no existing rules in the security group, download a template and edit it before importing it.

    Cloning Security Group

    1. On the Security Group page, select a security group and click More > Clone in the "Operation" column.
    2. In the pop-up dialog box, select the target region and target project and click OK. If the new security group needs to be associated with a CVM instance, do so by managing the CVM instances in the security group.

    Deleting Security Group

    1. On the security group page, select the security group to be deleted and click More > Delete in the "Operation" column.
    2. Click OK in the pop-up dialog box. If the current security group is associated with a CVM instance, it must be disassociated before it can be deleted.

    Was this page helpful?

    Was this page helpful?

    • Not at all
    • Not very helpful
    • Somewhat helpful
    • Very helpful
    • Extremely helpful
    Send Feedback
    Help