Creating a Security List
On Compute Cloud@Customer, you can create a security list for a VCN.
Before you create a security list, view the security rules that are already defined in the default security list and any other security list for this VCN. See Viewing Security Lists.
A security list must have at least one rule. A security list isn't required to have both ingress and egress rules.
Avoid entering confidential information in names and tags.
-
In the Compute Cloud@Customer Console navigation menu, click Networking, then click Virtual Cloud Networks.
- At the top of the page, select the compartment that contains the VCN in which you want to create a subnet.
-
Click the name of the VCN for which you want to create a security list.
The VCN details page is displayed.
-
Under Resources, click Security Lists.
-
Click Create Security List.
-
In the Create Security List dialog box, enter the following information:
-
Name: Provide a descriptive name for the security list. The name doesn't have to be unique. Avoid entering confidential information. (The name can't be changed later in the Console but can changed with the CLI).
-
Create in Compartment: Select the compartment where you want to create the security list.
-
-
Add at least one rule.
To add one or more ingress rules, click +New Rule in the Allow Rules for Ingress box. Enter the following information:
-
Stateless: If you want the new rule to be stateless, check this box. By default, security list rules are stateful and apply to both a request and its coordinated response.
-
CIDR: The CIDR block for the ingress or egress traffic.
-
IP Protocol: The rule can apply to all IP protocols, or choices such as ICMP, TCP, or UDP. Select the protocol from the drop-down list.
-
Port Range: For some protocols, such as TCP or UDP, you can supply a source port range and destination port range.
-
Parameter Type and Code: For ICMP, you can select a parameter type and corresponding parameter code.
-
-
Description: An optional description of the rule.
-
-
Tagging: (Optional) Add one or more tags to this resource. Tags can also be applied later. For more information about tagging resources, see Resource Tags.
-
Click Create Security List.
The details page of the new security list is displayed. You can specify this security list when creating or updating a subnet.
-
Use the oci network security-list create command and required parameters to create a new security list for the specified VCN.
oci network security-list create --compartment-id <compartment_OCID> --vcn-id <vcn_OCID> --ingress-security-rules <ingress_rules> --egress-security-rules <egress_rules> [OPTIONS]
For a complete list of CLI commands, flags, and options, see the Command Line Reference.
Procedure
-
Gather the information you need to run the command:
-
The OCID of the compartment where you want to create this security list (
oci iam compartment list
) -
The OCID of the VCN for this security list (
oci network vcn list --compartment-id compartment_OCID
)
-
-
Construct arguments for the
--ingress-security-rules
and--egress-security-rules
options.Security rules are in JSON format. To see how to format a rule, use the following command:
oci network security-list create --generate-param-json-input ingress-security-rules > ingress.json
Use the same command with
egress-security-rules
.Ingress and egress security rules are the same except that ingress rules have
source
andsourceType
properties while egress rules havedestination
anddestinationType
properties.The value of the
protocol
property isall
or one of the following numbers: 1 for ICMP, 6 for TCP, or 17 for UDP.Or, you can
list
orget
the default security list or another security list and copy the values of theegress-security-rules
andingress-security-rules
properties.Put the information for rules for this new security list in the appropriate places in the format, or replace the information in the rules that you copied.
The value of both rules options is either a string between single quotation marks or a file specified as
file://path_to_file.json
.Egress and ingress rules must be in a list. If the list of egress rules or the list of ingress rules has only one item, that single rule must be enclosed in square brackets just as multiple rules would be. See the command in the next step for an example showing only one ingress rule.
Both egress rules and ingress rules must be specified. See the command in the next step for an example showing no egress rules.
-
Run the security list create command.
Syntax:
Example:
$ oci network security-list create --compartment-id ocid1.compartment.unique_ID \ --vcn-id ocid1.vcn.unique_ID --display-name "Limited Port Range" \ --egress-security-rules [] \ --ingress-security-rules '[{"source": "10.0.2.0/24", "protocol": "6", "isStateless": true, \ "tcpOptions": {"destinationPortRange": {"max": 1521, "min": 1521}, \ "sourcePortRange": {"max": 1521, "min": 1521}}}]' { "data": { "compartment-id": "ocid1.compartment.unique_ID", "defined-tags": {}, "display-name": "Limited Port Range", "egress-security-rules": [], "freeform-tags": {}, "id": "ocid1.securitylist.unique_ID", "ingress-security-rules": [ { "description": null, "icmp-options": null, "is-stateless": true, "protocol": "6", "source": "10.0.2.0/24", "source-type": "CIDR_BLOCK", "tcp-options": { "destination-port-range": { "max": 1521, "min": 1521 }, "source-port-range": { "max": 1521, "min": 1521 } }, "udp-options": null } ], "lifecycle-state": "PROVISIONING", "time-created": "unique_ID", "vcn-id": "ocid1.vcn.unique_ID" }, "etag": "unique_ID" }
-
Use the CreateSecurityList operation to create a new security list for the specified VCN.
For information about using the API and signing requests, see REST APIs and Security Credentials. For information about SDKs, see Software Development Kits and Command Line Interface.