Assign Subnet Security
You must provide security rules to allow access to the remote data gateway (RDG), and the private subnets housing the Oracle Function service and Autonomous JSON Database.
The remote data gateway (RDG) and the Oracle Function service private subnet use rules assigned to a security list. Autonomous JSON Database uses rules assigned to a network security group (NSG).
-
Security list: Defines a set of security rules that applies to all the VNICs in an entire subnet. To use a given security list with a particular subnet, you associate the security list with the subnet either during subnet creation or later. Any VNICs that are created in that subnet are subject to the security lists associated with the subnet.
You can add rules to existing security lists and you can create and assign multiple security lists to a subnet.
-
Network security group (NSG): Defines a set of security rules that applies to a group of VNICs (resources, such as Autonomous JSON Database) of your choice. To use a given NSG, you add the VNICs of interest to the group or assign the NSG when provisioning the service. Not all services support NSGs. Any VNICs added to that group are subject to that group's security rules.
Create a Security List
Security lists act as virtual firewalls using a set of ingress and egress security rules that apply to all the virtual network interface cards (VNICs) in any subnet that is associated with the security list.
Add Ingress Rules for Oracle Functions
A security rule allows a particular type of traffic in or out of a virtual network interface card (NVIC).
Oracle Functions requires TCP access for a number of ports and internet control message protocol (ICMP) from all ports
- Open the navigation menu. Under Core Infrastructure, go to Networking and click Virtual Cloud Networks.
- Click the VCN you're interested in.
- Under Resources, click Security Lists.
- Click the security list you are interested in.
- To add a rule that allows ICMP traffic from all ports:
- Click Add Ingress Rule.
- Specify the 0.0.0.0/0 as the source CIDR.
- Select ICMP as the IP protocol.
- Leave the destination port range blank to specify all ports.
- To add a rule that allows TCP access to Oracle Functions from servers or applications in a different VCN using port range 443:
- Click Add Ingress Rule.
- Specify the VCN CIDR block as the source CIDR.
- Select TCP as the IP protocol.
- Specify 443 as the destination port range.
- To add a rule that allows TCP access to Oracle Functions from servers or applications in a different VCN using port range 1521:
- Click Add Ingress Rule.
- Specify the VCN CIDR block as the source CIDR.
- Select TCP as the IP protocol.
- Specify 1521 as the destination port range.
- To add a rule that allows TCP access to Oracle Functions from servers or applications in a different VCN using port range 6200:
- Click Add Ingress Rule.
- Specify the VCN CIDR block as the source CIDR.
- Select TCP as the IP protocol.
- Specify 6200 as the destination port range.
- To add a rule that allows TCP access to Oracle Functions from servers or applications in a different VCN using port range 2484:
- Click Add Ingress Rule.
- Specify the VCN CIDR block as the source CIDR.
- Select TCP as the IP protocol.
- Specify 2484 as the destination port range.
Add a Security List to a Private Subnet
You can add security lists to or remove security lists from an existing virtual cloud network (VCN) subnet.
Create a Network Security Group (NSG) for Private Endpoint Access
Network security groups (NSGs) let you define a set of security rules that apply to a group of VNICs (or resources) of your choice.
When you provision the resource, such as Oracle Autonomous Data Warehouse, you can assign the network security group. Not all services support NSGs.