Security Groups
Note
All incoming network traffic is blocked by default. In order to access you instance, you must apply a security group that allows SSH connections.
An SSH security group should already exist in your trial project. To check that it is there, click the Network
tab on the left panel, and then select Security Groups
.
You should see several items, including one named ssh
.
If you do not see this, follow the instructions below to create a new security group that allows SSH connections. Otherwise you can continue on to the next step.
Creating a new security group
Select + Create Security Group
. You will now be prompted to give your security group a name and description. Let's name it SSH
with the description Allow SSH connections
, and then click the 'create security group' button.
You'll notice that it already contains two rules. These allow outgoing (egress) network traffic i.e. they allow your instance to communicate to the internet.
We'll create a new rule which will also allow some incoming (ingress) network traffic.
Click the + Add Rule
button, then select SSH
from the dropdown menu under Rule
. You can give the rule a description, but we'll accept the defaults for the rest of the options, and then click Add
to create the new rule.
Note
Setting CIDR
(Classless Inter-Domain Routing) to 0.0.0.0/0
simply means that we allow connections from any IPv4 address.