How to Create a Security Group
  • 04 Mar 2021
  • Dark
    Light

How to Create a Security Group

  • Dark
    Light

Article summary

If you want to use security tags with security groups, the tags should be created before creating the security group.

1. Open the Security Services. 

  1. Navigate to Networking > Security.
  2. Select the organization VDC for which you want to apply security settings, and click Configure Services.

The tenant portal opens Security Services.

2. Navigate to Grouping Objects > Security Groups

  1. The Security Groups page opens.

3. Click the Create button.

4. Enter a name and, optionally, a description for the security group.

The description displays in the list of security groups, so adding a meaningful description can make it easy to identify the security group at a glance.

5. (Optional) Add a dynamic member set.

  1. Click the Add button under Dynamic Member Sets.
  2. Select whether to match Any or All of the criteria in your statement.
  3. Enter the first object to match.
  4. The options are Security TagVM Guest OS NameVM Name, and VM Guest Host Name.
  5. Select an operator, such as Contains, Starts with, or Ends with.
  6. Enter a value.
  7. (Optional) To add another statement, use a Boolean operator And or Or.

6. (Optional) Include Members. 

  1. From the Browse objects of type drop-down menu, select the type of objects, such as Virtual Machines, Org VDC networks, IP sets, MAC sets, or Security tags.
  2. To include an object in the Include Members list, select the object from the left panel, and move it to the right panel by clicking the right arrow.

7. (Optional) Exclude members. 

  1. From the Browse objects of type drop-down menu, select the type of objects, such as Virtual MachinesOrg VDC networksIP setsMAC sets, or Security tags.
  2. To include an object in the Exclude Members list, select the object from the left panel, and move it to the right panel by clicking the right arrow.

8. Click Keep to preserve your changes.

The operation can take a minute to complete.

Results

The security group can now be used in rules, such as firewall rules.


Was this article helpful?