Configure Security Rules for the Network

If your instance communicates with other resources in Oracle Cloud or on the Internet, create or update the security lists for your target Oracle Cloud Infrastructure network.

A security list is assigned to subnets within your virtual cloud network (VCN). It includes ingress and egress rules that specify the types of traffic allowed in and out of the instances within the subnet. You can update an existing security list, or create a new one and assign it to a subnet.

You might need to create security rules if your Oracle WebLogic Server for OCI instance communicates with external resources, including these Oracle WebLogic Server resources:
  • JavaMail Session
  • Foreign Java Naming and Directory Interface (JNDI) Provider
  • Foreign Java Message Service (JMS) Server
  • Messaging Bridge
  • Store-and-Forward
  • WebLogic Diagnostic Framework (WLDF) REST Action
See Security Lists in the Oracle Cloud Infrastructure documentation.

Oracle recommends that you create a private subnet for Oracle WebLogic Server for OCI in the VCN used by Oracle Java Cloud Service.

Set up a private subnet that can be used for creating your Oracle WebLogic Server for OCI instance in the same VCN as the Oracle Java Cloud Service instance. This allows you to quickly set up a connection to the same database that Oracle Java Cloud Service uses and allow ssh connectivity between the Oracle WebLogic Server for OCI instance VMs and the Oracle Java Cloud Service VMs, so files can be transferred between them.

Recommended simplified network configurations

The following configurations show a Oracle Java Cloud Service set up with a public subnet since this is the most common configuration.

Note:

Public subnets are allowed for Oracle WebLogic Server for OCI instances, but not recommended.

Oracle Java Cloud Service with OTD

There is no Oracle Traffic Director (OTD) option in Oracle WebLogic Server for OCI. Instead, the OCI load balancer must be used to route traffic to the WebLogic managed servers.

The following diagram illustrates a Oracle Java Cloud Service instance using OTD and the Oracle WebLogic Server for OCI instance recommended to replace it. This illustration represents the state of both instances during the migration process, prior to deleting the Oracle Java Cloud Service instance.

Figure 2-1 Oracle Java Cloud Service with OTD

Oracle Java Cloud Service with OTD

The private subnet for the OCI database and the public subnet for JCS must already exist. The Oracle WebLogic Server for OCI private subnet, OCI load balancer public subnet, and bastion host public subnet must be created.

Use the following tables to configure the security lists for the these three subnets:

Table 2-1 Oracle WebLogic Server for OCI Private Subnet

Rule Type Source CIDR and Protocol Default Destination Port Description

Stateful Ingress

Bastion public subnet, TCP

22

SSH access

Stateful Ingress

Bastion public subnet, TCP

7002

Administration server SSL port

Stateful Ingress

OCI load balancer public subnet, TCP

8001

Managed server port

Stateful Ingress

Oracle Java Cloud Service public subnet, TCP

22

SSH access, so domain and binaries can be copied over

Stateful Ingress

Oracle WebLogic Server for OCI private subnet (self), TCP

22

SSH access between the compute instances of Oracle WebLogic Server for OCI

Stateful Ingress

Oracle WebLogic Server for OCI private subnet (self), TCP

9071

Used for provisioning and scaling

Stateful Ingress

Oracle WebLogic Server for OCI private subnet (self), TCP

9073

Used for WebLogic health check

Stateful Ingress

Oracle WebLogic Server for OCI private subnet (self), TCP

5556

Used for accessing node manager

Table 2-2 OCI Load Balancer Public Subnet

Rule Type Source CIDR and Protocol Default Destination Port Description

Stateful Ingress

Internet (0.0.0.0/0), TCP

443

SSL access

Table 2-3 Bastion Public Subnet

Rule Type Source CIDR and Protocol Default Destination Port Description

Stateful Ingress

Hosts with access to bastion, TCP

22

SSH access, port forwarding

Use the following table to add access for the Oracle WebLogic Server for OCI private subnet to the OCI database public subnet:

Table 2-4 Access to OCI Database Public Subnet

Rule Type Source CIDR and Protocol Default Destination Port Description

Stateful Ingress

WLS for OCI private subnet, TCP

1521

DB access

Oracle Java Cloud Service with IDCS

The following diagram illustrates a Oracle Java Cloud Service instance using IDCS and the Oracle WebLogic Server for OCI instance recommended to replace it. This illustration represents the state of both instances during the migration process, prior to deleting the Oracle Java Cloud Service instance.

Figure 2-2 Oracle Java Cloud Service with IDCS

Oracle Java Cloud Service with IDCS

The private subnet for the OCI database, the public subnet for the OCI load balancer, and the public subnet for JCS must already exist. The Oracle WebLogic Server for OCI private subnet and bastion host public subnet must be created.

Use the following tables to configure the security lists for the these three subnets:

Table 2-5 Oracle WebLogic Server for OCI Private Subnet

Rule Type Source CIDR and Protocol Default Destination Port Description

Stateful Ingress

Bastion public subnet, TCP

22

SSH access

Stateful Ingress

Bastion public subnet, TCP

7002

Administration server SSL port

Stateful Ingress

OCI load balancer public subnet, TCP

9999

IDCS app gateway port

Stateful Ingress

Oracle Java Cloud Service public subnet, TCP

22

SSH access, so domain and binaries can be copied over

Stateful Ingress

Oracle WebLogic Server for OCI private subnet (self), TCP

22

SSH access between the compute instances of Oracle WebLogic Server for OCI

Stateful Ingress

Oracle WebLogic Server for OCI private subnet (self), TCP

9071

Used for provisioning and scaling

Stateful Ingress

Oracle WebLogic Server for OCI private subnet (self), TCP

9073

IDCS app gateway for accessing the managed server

Stateful Ingress

Oracle WebLogic Server for OCI private subnet (self), TCP

5556

Used for accessing node manager

Table 2-6 Bastion Public Subnet

Rule Type Source CIDR and Protocol Default Destination Port Description

Stateful Ingress

Hosts with access to bastion, TCP

22

SSH access, port forwarding

Use the following table to add access for the Oracle WebLogic Server for OCI private subnet to the OCI database public subnet:

Table 2-7 Access to OCI Database Public Subnet

Rule Type Source CIDR and Protocol Default Destination Port Description

Stateful Ingress

WLS for OCI private subnet, TCP

1521

DB access