The following procedure shows you how to add rules to the default security group. 下面的步骤将引导你如何添加规则到默认安全组。To add rules to the default security group 添加规则到默认安全组 Log in to the OpenStack dashboard. 第一步:登录OpenStack控制面板 If you are a member of multiple projects, select a project from the drop-down list at the top of the Project tab. 第二步:如果你是多个项目组的成员,请在项目tab页的顶部的下拉菜单列表中选择一个项目。 Click the Access & Security category. 第三步:点击“访问与安全”栏目。 The dashboard shows the security groups that are available for this project. OpenStack控制面板上将显示这个项目的所有可用的安全组。
Select the default security group and click Edit Rules. 第四步:选择默认安全组,点击“编辑规则”链接。 The Security Group Rules page appears:控制面
Add a TCP rule 第五步:添加一个TCP规则 Click Add Rule. 点击“添加规则” The Add Rule window appears. 添加规则的窗口显示如下: In the IP Protocol list, select TCP . (在IP协议列表中,选择TCP。) In the Open list, select Port .(在“开放”列表中,选择Port) In the Port box, enter 22 . (在端口输入框,输入22) In the Source list, select CIDR . (在Source列表中,选择CIDR) In the CIDR box, enter 0.0.0.0/0 .(在“无类域内路由”输入框中,输入0.0.0.0/0) Click Add. (点击“添加”) Port 22 is now open for requests from any IP address. 现在,端口22就为所有IP地址的请求开放了。 If you want to accept requests from a particular range of IP addresses, specify the IP address block in theCIDR box. 如果你想只接爱指定范围的IP地址的请求,则需要在CIDR输入框中指定IP地址。
Add an ICMP rule 第六步:添加ICMP规则 Click Add Rule. 点击“添加规则” The Add Rule window appears. 添加规则的窗口显示如下: In the IP Protocol list, select ICMP . (在IP协议列表中,选择ICMP) In the Type box, enter -1 . (在“类型”输入框中,输入-1) In the Code box, enter -1 . (在“代码”输入框中,输入-1) In the Source list, select CIDR . (在“Source”列表中,选择CIDR) In the CIDR box, enter 0.0.0.0/0 . (在CIDR输入框中,输入0.0.0.0/0) Click Add. (点击“添加”)
|