Skip to main content

Chapter VII Deka Flexi : Security

Deka Flexi: Security firewall is a cloud-native and intelligent network firewall security service that provides protection from threats.

List of Content

Content

7.1 Security Firewall Rule

Firewall rules allow you to permit or deny connections to or from a virtual machine (vm) based on the configuration you specify. When you create a firewall rule, you define a set of components that determine what the rule does. Components allow you to target specific traffic types, based on traffic protocols, destination ports, sources, and destinations.

7.1.1 Prerequisites to Create Security Firewall Rule

Before creating a Security Firewall Rule, you must first have an Instance. If you don’t have an Instance yet, you can deploy an Instance in Create VM Instance

7.1.2 Create Security Firewall Rule

Here are the steps to create a Security Firewall Rule:

  • On your Cloudeka Portal, select the Security menu then click the Create Security button.


Image 7.1 Security



  • Fill in the Create Security form:

Table 7.1 Create Security


Column Description
Name Name of your security.
Inbound Rule Define the traffic allowed to the instance on which ports and from which sources.
Outbound Rule Define the traffic allowed to leave the instance on which ports and to which destinations.


Image 7.2 Create Security Form




Image 7.3 Create Security Form



  • Click Delete button to delete the security
  • Select Apply to Instance (for the instance where Security is created), Click the Save button if you want to continue creating the firewall or Cancel if you don’t want to continue the process.


Image 7.4 Apply to Instance



  • There will be a notification if the Firewall has been successfully created “Firewall has been successfully created”.


Image 7.5 Notification



7.2 Edit Security Firewall Rule

This menu is used if there is Security Firewall Rule data that you want to change.

  • On the Security page, there are columns Name, Applied to, Rules and Action. In the action column, click Edit.


Image 7.6 Security Page - Edit



  • Fill in the data you want to change such as:

Table 7.2 Edit Security Firewall Rule


Column Description
Name The name of firewall rules
Inbound Rule Define the traffic allowed to the instance on which ports and from which sources
Outbound Rule Define the traffic allowed to leave the instance on which ports and to which destionations
Protocol type Supported protocols are:
- SSH
- HTTP
- HTTPS
- Custom TCP Rule, you can customize tcp rules and define specific ports according to your needs
- Custom UDP Rule, you can cuztomize udp rules and define spesific ports according to your needs
- All ICMP Rule
Ether type Types of IP address, choose IPv4 or IPv6
Port Range For the custom tcp and udp protocols rule, you can specify:
- A single port
- A range of ports by entering the starting and ending ports, eg. 3000-4000
- All ports by leaving the field blank
Source For inbound rules, which lets you restrict the source of incoming connections by entering the individual IP address or entering a CIDR. for example, enter the CIDR 182.23.45.0/24 to a rule that allows incoming traffic from any IP address between 182.23.45.0 and 182.23.45.255. or leave the field blank if you want to allow it from any source.
Destination For outbound rules, which lets you restrict the destionation of outgoing connections by entering individual IP address or entering CIDR or leave the field blank if you want to allow it to any destination
Apply to Instance Choose a specific instance to that you want to apply the rule.

Click the Save button if you want to continue changing the firewall data or cancel if you don’t want to continue the process.


Image 7.7 Form Edit Security



  • There will be a notification if the Firewall has been successfully changed “Firewall has been successfully updated”.


Image 7.8 Notification



7.3 Delete Security Firewall Rule

This menu is used if there is Security Firewall Rule data that you want to delete.

  • On the Security page, there is columns Name, Applied to, Rules and Action. In the Action column, click Delete.


Image 7.9 Security Page - Delete



  • Click the Destroy button if you want to continue deleting firewall data or Cancel if you don’t want to continue the process.


Image 7.10 Destroy



  • There will be a notification if the Firewall has been successfully deleted “Firewall has been successfully deleted”.


Image 7.11 Notification



×