3.3 Add Ingress Rules to the Default Security List
For establishing communication with the instance, you need to ensure that the underlying Security List that is associated with the VCN has all the IP protocols enabled.
The following table lists the ingress rules you need to set to access your Data Transforms instance.
Table 3-1 Ingress Rules Table
Stateless | Source | IP Protocol | Source Port Range | Destination Port Range | Type and Code | Allows |
---|---|---|---|---|---|---|
No |
0.0.0.0/0 |
TCP |
All |
22 |
Nil |
TCP traffic for ports: 22 SSH Remote Login Protocol |
No |
10.0.0.0/24 |
TCP |
All |
80 |
Nil |
TCP traffic for ports : 80 |
No |
0.0.0.0/0 |
All protocols |
Nil |
Nil |
Nil |
All traffic for all ports |
No |
0.0.0.0/0 |
ICMP |
Nil |
Nil |
3, 4 |
ICMP traffic for: 3, 4 Destination Unreachable: Fragmentation Needed and Don't Fragment was Set |
Parent topic: Deploy