Provide Security Rules for the Private Subnet
You must provide security rules to allow access to the remote data gateway (RDG), Oracle GoldenGate, and Autonomous Data Warehouse in the private subnet.
The remote data gateway (RDG) and Oracle GoldenGate use rules assigned to a security list. Autonomous Data Warehouse uses rules assigned to a network security group (NSG).
- Security lists: Defines a set of security rules that applies to all the VNICs in an entire subnet. To use a given security list with a particular subnet, you associate the security list with the subnet either during subnet creation or later. Any VNICs that are created in that subnet are subject to the security lists associated with the subnet.
- Network security groups (NSGs): Defines a set of security rules that applies to a group of VNICs (resources, such as Autonomous Data Warehouse) of your choice. To use a given NSG, you add the VNICs of interest to the group or assign the NSG when provisioning the service. Not all services support NSGs. Any VNICs added to that group are subject to that group's security rules.
Create a Security List
Security lists act as virtual firewalls using a set of ingress and egress security rules that apply to all the virtual network interface cards (VNICs) in any subnet that is associated with the security list.
Add Ingress Rules for the Remote Data Gateway
A security rule allows a particular type of traffic in or out of a virtual network interface card (NVIC).
The remote data gateway (RDG) requires port 22 for secure shell access (SSH) to Linux and port 8080 for HTTP access.
To add ingress rules to a security list to allow access to the remote data gateway:
- Open the navigation menu. Under Core Infrastructure, go to Networking and click Virtual Cloud Networks.
- Click the VCN you're interested in.
- Under Resources, click Security Lists.
- Click the security list you are interested in.
- To add a rule that allows public access using secure shell (SSH), for example to migrate on-premises data sources to a database in the cloud:
- Click Add Ingress Rule.
- Specify 0.0.0.0/0 as the source CIDR (0.0.0.0/0 indicates all IP addresses).
- Select SSH as the IP protocol.
- Specify 22 as the destination port range.
- To add a rule that allows TCP access from servers or applications in a different VCN:
- Click Add Ingress Rule.
- Specify the VCN CIDR block as the source CIDR.
- Select TCP as the IP protocol.
- Specify 8080 as the destination port range.
Add an Ingress Rule for Oracle GoldenGate
A security rule allows a particular type of traffic in or out of a virtual network interface card (NVIC).
Oracle GoldenGate requires port 443 for TCP access.
- Open the navigation menu. Under Core Infrastructure, go to Networking and click Virtual Cloud Networks.
- Click the VCN you're interested in.
- Under Resources, click Security Lists.
- Click the security list you are interested in.
- To add a rule that allows TCP access to Oracle GoldenGate from servers or applications in a different VCN:
- Click Add Ingress Rule.
- Specify the VCN CIDR block as the source CIDR.
- Select TCP as the IP protocol.
- Specify 443 as the destination port range.
Add a Security List to a Private Subnet
You can add security lists to or remove security lists from an existing virtual cloud network (VCN) subnet.
Create a Network Security Group (NSG) for Private Endpoint Access
Network security groups (NSGs) let you define a set of security rules that apply to a group of VNICs (or resources) of your choice.
When you provision the resource, such as Oracle Autonomous Data Warehouse, you can assign the network security group. Not all services support NSGs.