Required Network Setup

Review the security rules to use with your ExaDB-D Infrastructure. Security rules control the types of traffic allowed for the client network and backup network of the Exadata's compute nodes.

Security Rules for Oracle Exadata Database Service on Dedicated Infrastructure (ExaDB-D)

Client Network

Client ingress rule 1: Allows TCP traffic from within the subnet ExaDB-D resides or Allows TCP traffic from within the ExaDB-D client subnet.

Stateless: No (all rules must be stateful)
Source Type: CIDR
Source CIDR: Client subnet's CIDR
IP Protocol: TCP
Source Port Range: All
Destination Port Range: 7085
Description: Optionally, add a meaningful description of the rule. For example, Allow access to Exadata Fleet Update private endpoint within the subnet.

General egress rule 1: Allows all egress traffic.

Stateless: No (all rules must be stateful)
Destination Type: CIDR
Destination CIDR: 0.0.0.0/0
IP Protocol: All