3.3 Add Ingress Rules to the Default Security List

For establishing communication with the instance, you need to ensure that the underlying Security List that is associated with the VCN has all the IP protocols enabled.

The following table lists the ingress rules you need to set to access your Data Transforms instance.

Table 3-1 Ingress Rules Table

Stateless Source IP Protocol Source Port Range Destination Port Range Type and Code Allows

No

0.0.0.0/0

TCP

All

22

Nil

TCP traffic for ports: 22 SSH Remote Login Protocol

No

10.0.0.0/24

TCP

All

80

Nil

TCP traffic for ports : 80

No

0.0.0.0/0

All protocols

Nil

Nil

Nil

All traffic for all ports

No

0.0.0.0/0

ICMP

Nil

Nil

3, 4

ICMP traffic for: 3, 4 Destination Unreachable: Fragmentation Needed and Don't Fragment was Set