SlideShare a Scribd company logo
How To Configure Amazon EC2 Security Groups
Table of Contents
Overview.......................................................................................................................................................2
Applies To......................................................................................................................................................2
Security Groups.............................................................................................................................................2
Add Inbound Rules....................................................................................................................................2
Inbound Rules – Add Rule.....................................................................................................................2
Inbound Rules – Edit Rule.....................................................................................................................3
Inbound Rules – SSH Rule .....................................................................................................................3
Inbound Rules – HTTP Rule...................................................................................................................3
Inbound Rules – All Traffic Rule ............................................................................................................3
Inbound Rules – Custom TCP Rule........................................................................................................4
Inbound Rules – List..................................................................................................................................4
Outbound Rules – List...............................................................................................................................5
Access – Linux Instance.................................................................................................................................5
How To Configure Amazon EC2 Security Groups
Overview
The purpose of this document is to configure inbound and outbound firewall rules on Amazon EC2
Instance in the Amazon Console.
Applies To
Amazon EC2 Linux Instance; with IP address 52.0.154.97.
Security Groups
A security group acts as a virtual firewall that controls the traffic for one or more instances. When you
launch an instance, you associate one or more security groups with the instance. You add rules to each
security group that allow traffic to or from its associated instances.
Add Inbound Rules
To access the inbound rules for a instance have to added.
Inbound Rules – Add Rule
To add a new rule, click on “Add Rule” button.
How To Configure Amazon EC2 Security Groups
Inbound Rules – Edit Rule
New rule added to configure the rule, from the “Type” chose the type of
Inbound Rules – SSH Rule
To add and enable SSH communication for the server, choose the type as “SSH”. Optionally you can
choose the source IP, IP Range, My IP (auto-populated) upon choosing.
Inbound Rules – HTTP Rule
To add and enable HTTP communication for the server, choose the type as “HTTP”. Optionally you can
choose the source IP, IP Range, My IP (will auto-populated) upon choosing.
Note: To know the IP of you network, search for what is my IP on web search engine.
Inbound Rules – All Traffic Rule
To add and enable “All Traffic” communication for the server, choose the type as “All Traffic”.
Optionally you can choose the source IP, IP Range, My IP (auto-populated) upon choosing.
How To Configure Amazon EC2 Security Groups
Most of the times “Custom IP” and Security group should be selected, because the traffic is restricted to
internal network.
Inbound Rules – Custom TCP Rule
To add and enable “Custom TCP Rule” communication for the server, choose the type as “Custom TCP
Rule”. Optionally you can choose the source IP, IP Range, My IP (auto-populated) upon choosing.
After adding all the rules, click on “Save” button. To apply the rules.
In this case we are opening TCP Port “2265” and source is set to “Anywhere”.
Inbound Rules – List
To list the inbound rules list, click on “Inbound” of the security group “sg-236c347”.
How To Configure Amazon EC2 Security Groups
Outbound Rules – List
To list the inbound rules list, click on “outbound” of the security group “sg-236c347”.
In this case, “All traffic” is open to all destination.
Access – Linux Instance
In the document we are trying to access IP address “52.0.154.97” via putty SSH protocol.

More Related Content

PDF
How To Create EBS Snapshot and Restore EBS Snapshot – Linux Instance
PDF
How To Connect Amazon AWS EC2 with Key Pair – Linux
PDF
How To Install and Configure Apache SSL on CentOS 7
PDF
How To Install and Configure AWS CLI for Windows
PDF
How To Configure FirewallD on RHEL 7 or CentOS 7
PDF
How To Install and Configure AWS CLI on RHEL 7
PDF
How To Create RDS Database for WordPress in AWS on RHEL 7 or CentOS 7
PDF
How To Install and Configure VSFTPD on RHEL 7 or CentOS 7
How To Create EBS Snapshot and Restore EBS Snapshot – Linux Instance
How To Connect Amazon AWS EC2 with Key Pair – Linux
How To Install and Configure Apache SSL on CentOS 7
How To Install and Configure AWS CLI for Windows
How To Configure FirewallD on RHEL 7 or CentOS 7
How To Install and Configure AWS CLI on RHEL 7
How To Create RDS Database for WordPress in AWS on RHEL 7 or CentOS 7
How To Install and Configure VSFTPD on RHEL 7 or CentOS 7

What's hot (20)

PDF
Installation CentOS 6.3
PDF
How To Configure Apache VirtualHost on RHEL 7 on AWS
PDF
How to Change Hostname in CentOS 7 or RHEL 7
DOCX
How to Configure Amazon AWS EC2 Elastic IP Address
PDF
How to Install and Configure Cacti on Linux
PDF
Install and Configure WordPress in AWS on RHEL 7 or CentOS 7
PDF
How To Install and Configure SNMP on RHEL 7 or CentOS 7
PDF
Connect Amazon EC2 Linux Instance
PDF
How to Install MariaDB Server or MySQL Server on CentOS 7
PDF
How To List Nginx Modules Installed / Complied on CentOS 7
PDF
How to Upgrade Openfire on CentOS 7
PDF
Install VMWare Tools CentOS 7
PDF
How to install and configure firewall on ubuntu os
PDF
Nginx bind() to 0.0.0.0:9080 failed
PDF
Batch script for nslookup range of ip address
PDF
How To Configure Amazon EC2 Load Balancer
PDF
How To Install OpenFire in CentOS 7
PDF
How To Check IE Enhanced Security Is Enabled Windows PowerShell
PDF
How To Configure SNMP Logging on RHEL 7
PDF
How To Install and Configure Open SSH Server on Ubuntu
Installation CentOS 6.3
How To Configure Apache VirtualHost on RHEL 7 on AWS
How to Change Hostname in CentOS 7 or RHEL 7
How to Configure Amazon AWS EC2 Elastic IP Address
How to Install and Configure Cacti on Linux
Install and Configure WordPress in AWS on RHEL 7 or CentOS 7
How To Install and Configure SNMP on RHEL 7 or CentOS 7
Connect Amazon EC2 Linux Instance
How to Install MariaDB Server or MySQL Server on CentOS 7
How To List Nginx Modules Installed / Complied on CentOS 7
How to Upgrade Openfire on CentOS 7
Install VMWare Tools CentOS 7
How to install and configure firewall on ubuntu os
Nginx bind() to 0.0.0.0:9080 failed
Batch script for nslookup range of ip address
How To Configure Amazon EC2 Load Balancer
How To Install OpenFire in CentOS 7
How To Check IE Enhanced Security Is Enabled Windows PowerShell
How To Configure SNMP Logging on RHEL 7
How To Install and Configure Open SSH Server on Ubuntu
Ad

Viewers also liked (12)

PDF
How to Install Configure and Use sysstat utils on RHEL 7
PDF
How To Audit Server Login and Shutdown or Reboot Activity
PDF
TFTP Installation Configuration Guide
PDF
DNF Failed To Open Cache
PDF
How To Add DVD ISO to YUM Repository in CentOS 6
PDF
How To Configure VNC Server on CentOS 7
PDF
Bash Script Disk Space Utilization Report and EMail
PDF
How to Install and Configure AWS CLI on RHEL 7
PDF
File Space Usage Information and EMail Report - Shell Script
PDF
How To Manage Yum Packages Interactive Shell
PDF
Linux Basic Administration Commands Guide
PDF
Shell Script to Extract IP Address, MAC Address Information
How to Install Configure and Use sysstat utils on RHEL 7
How To Audit Server Login and Shutdown or Reboot Activity
TFTP Installation Configuration Guide
DNF Failed To Open Cache
How To Add DVD ISO to YUM Repository in CentOS 6
How To Configure VNC Server on CentOS 7
Bash Script Disk Space Utilization Report and EMail
How to Install and Configure AWS CLI on RHEL 7
File Space Usage Information and EMail Report - Shell Script
How To Manage Yum Packages Interactive Shell
Linux Basic Administration Commands Guide
Shell Script to Extract IP Address, MAC Address Information
Ad

Similar to How To Configure Amazon EC2 Security Groups (20)

PPTX
AWS Instance Preparation
DOCX
25 most frequently used linux ip tables rules examples
DOCX
25 most frequently used linux ip tables rules examples
PPT
sfdx continuous Integration with Jenkins on aws (Part I)
PPTX
Amazon Network Security
PDF
Configuration Firewalld On CentOS 8
PPTX
Basic Cisco ASA 5506-x Configuration (Firepower)
PPTX
Securing AWS environments by Ankit Giri
PPTX
How to convert your Linux box into Security Gateway - Part 1
PDF
25 most frequently used linux ip tables rules examples
PDF
Aws amazon ec2
PPTX
AWS_EC2_Instance_Bharathiyaruniversity.pptx
PDF
AWS essentials EC2
PPTX
CCNA R&S-09-Configuring Ethernet Switching
DOCX
INFA 620Lab 4 Firewall.docx
PPT
How to begin with Amazon EC2?
TXT
Linuxserver harden
PPT
Justmeans power point
PPT
Justmeans power point
PPTX
CON410 - Deep Dive into Container Networking (re:Invent 2018)
AWS Instance Preparation
25 most frequently used linux ip tables rules examples
25 most frequently used linux ip tables rules examples
sfdx continuous Integration with Jenkins on aws (Part I)
Amazon Network Security
Configuration Firewalld On CentOS 8
Basic Cisco ASA 5506-x Configuration (Firepower)
Securing AWS environments by Ankit Giri
How to convert your Linux box into Security Gateway - Part 1
25 most frequently used linux ip tables rules examples
Aws amazon ec2
AWS_EC2_Instance_Bharathiyaruniversity.pptx
AWS essentials EC2
CCNA R&S-09-Configuring Ethernet Switching
INFA 620Lab 4 Firewall.docx
How to begin with Amazon EC2?
Linuxserver harden
Justmeans power point
Justmeans power point
CON410 - Deep Dive into Container Networking (re:Invent 2018)

More from VCP Muthukrishna (20)

PDF
How to Fix Duplicate Packages in YUM on CentOS 7
PDF
How To Install and Configure GNome on CentOS 7
PDF
How To Connect to Active Directory User Validation
PDF
How To Connect To Active Directory PowerShell
PDF
How To List Files on Remote Server - PowerShell
PDF
How To List Files and Display In HTML Format
PDF
How To Check and Delete a File via PowerShell
PDF
Zimbra Troubleshooting - Mails not being Delivered or Deferred or Connection ...
PDF
How To Setup SSH Keys on CentOS 7
PDF
Windows PowerShell Basics - How To List PSDrive Info
PDF
Windows PowerShell Basics – How To Create powershell for loop
PDF
How To Construct IF and Else Conditional Statements
PDF
How To Create PowerShell Function Mandatory Parameter and Optional Parameter
PDF
How To Create Power Shell Function Mandatory Parameter Value
PDF
How To Create PowerShell Function
PDF
How To Disable IE Enhanced Security Windows PowerShell
PDF
How To Configure Nginx Load Balancer on CentOS 7
PDF
How To Install and Configure Screen on CentOS 7
PDF
How To Install and Configure Salt Master on Ubuntu
PDF
How To Protect SSH Access with Fail2Ban on RHEL 7
How to Fix Duplicate Packages in YUM on CentOS 7
How To Install and Configure GNome on CentOS 7
How To Connect to Active Directory User Validation
How To Connect To Active Directory PowerShell
How To List Files on Remote Server - PowerShell
How To List Files and Display In HTML Format
How To Check and Delete a File via PowerShell
Zimbra Troubleshooting - Mails not being Delivered or Deferred or Connection ...
How To Setup SSH Keys on CentOS 7
Windows PowerShell Basics - How To List PSDrive Info
Windows PowerShell Basics – How To Create powershell for loop
How To Construct IF and Else Conditional Statements
How To Create PowerShell Function Mandatory Parameter and Optional Parameter
How To Create Power Shell Function Mandatory Parameter Value
How To Create PowerShell Function
How To Disable IE Enhanced Security Windows PowerShell
How To Configure Nginx Load Balancer on CentOS 7
How To Install and Configure Screen on CentOS 7
How To Install and Configure Salt Master on Ubuntu
How To Protect SSH Access with Fail2Ban on RHEL 7

Recently uploaded (20)

PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Machine learning based COVID-19 study performance prediction
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Encapsulation theory and applications.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Programs and apps: productivity, graphics, security and other tools
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Approach and Philosophy of On baking technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
NewMind AI Weekly Chronicles - August'25 Week I
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Diabetes mellitus diagnosis method based random forest with bat algorithm
MYSQL Presentation for SQL database connectivity
20250228 LYD VKU AI Blended-Learning.pptx
Machine learning based COVID-19 study performance prediction
The AUB Centre for AI in Media Proposal.docx
Advanced methodologies resolving dimensionality complications for autism neur...
Encapsulation theory and applications.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Understanding_Digital_Forensics_Presentation.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

How To Configure Amazon EC2 Security Groups

  • 1. How To Configure Amazon EC2 Security Groups Table of Contents Overview.......................................................................................................................................................2 Applies To......................................................................................................................................................2 Security Groups.............................................................................................................................................2 Add Inbound Rules....................................................................................................................................2 Inbound Rules – Add Rule.....................................................................................................................2 Inbound Rules – Edit Rule.....................................................................................................................3 Inbound Rules – SSH Rule .....................................................................................................................3 Inbound Rules – HTTP Rule...................................................................................................................3 Inbound Rules – All Traffic Rule ............................................................................................................3 Inbound Rules – Custom TCP Rule........................................................................................................4 Inbound Rules – List..................................................................................................................................4 Outbound Rules – List...............................................................................................................................5 Access – Linux Instance.................................................................................................................................5
  • 2. How To Configure Amazon EC2 Security Groups Overview The purpose of this document is to configure inbound and outbound firewall rules on Amazon EC2 Instance in the Amazon Console. Applies To Amazon EC2 Linux Instance; with IP address 52.0.154.97. Security Groups A security group acts as a virtual firewall that controls the traffic for one or more instances. When you launch an instance, you associate one or more security groups with the instance. You add rules to each security group that allow traffic to or from its associated instances. Add Inbound Rules To access the inbound rules for a instance have to added. Inbound Rules – Add Rule To add a new rule, click on “Add Rule” button.
  • 3. How To Configure Amazon EC2 Security Groups Inbound Rules – Edit Rule New rule added to configure the rule, from the “Type” chose the type of Inbound Rules – SSH Rule To add and enable SSH communication for the server, choose the type as “SSH”. Optionally you can choose the source IP, IP Range, My IP (auto-populated) upon choosing. Inbound Rules – HTTP Rule To add and enable HTTP communication for the server, choose the type as “HTTP”. Optionally you can choose the source IP, IP Range, My IP (will auto-populated) upon choosing. Note: To know the IP of you network, search for what is my IP on web search engine. Inbound Rules – All Traffic Rule To add and enable “All Traffic” communication for the server, choose the type as “All Traffic”. Optionally you can choose the source IP, IP Range, My IP (auto-populated) upon choosing.
  • 4. How To Configure Amazon EC2 Security Groups Most of the times “Custom IP” and Security group should be selected, because the traffic is restricted to internal network. Inbound Rules – Custom TCP Rule To add and enable “Custom TCP Rule” communication for the server, choose the type as “Custom TCP Rule”. Optionally you can choose the source IP, IP Range, My IP (auto-populated) upon choosing. After adding all the rules, click on “Save” button. To apply the rules. In this case we are opening TCP Port “2265” and source is set to “Anywhere”. Inbound Rules – List To list the inbound rules list, click on “Inbound” of the security group “sg-236c347”.
  • 5. How To Configure Amazon EC2 Security Groups Outbound Rules – List To list the inbound rules list, click on “outbound” of the security group “sg-236c347”. In this case, “All traffic” is open to all destination. Access – Linux Instance In the document we are trying to access IP address “52.0.154.97” via putty SSH protocol.