SECURITY GROUPS

  • A security group acts as a virtual firewall that controls the traffic for one or more instances.

  • When you launch an instance, you associate one or more security groups with the instance.

  • You add rules to each security group that allow traffic to or from its associated instances.

  • the new rules are automatically applied to all instances that are associated with the security group.

  • Max 500 sg. Max 100 rules

  • for a sg (50 inbound and 50 outbound)

For each rule, you specify the following.

  1. Type: protocol

  2. Protocol: The protocol to allow.

  3. Port range: For TCP, UDP, or a custom protocol, the range of ports to allow. You can specify a single port number (for example, 22), or range of port numbers (for example, 7000-8000).

  4. Source or destination: The source (inbound rules) or destination (outbound rules) for the traffic

Amazon EC2 Key Pairs

  • Amazon EC2 uses public–key cryptography to encrypt and decrypt login information. Public–key cryptography uses a public key to encrypt a piece of data, such as a password, then the recipient uses the private key to decrypt the data. The public and private keys are known as a key pair.

  • To log in to your instance, you must create a key pair, specify the name of the key pair when you launch the instance, and provide the private key when you connect to the instance. Linux instances have no password, and you use a key pair to log in using SSH. With Windows instances, you use a key pair to obtain the administrator password and then log in using RDP. Max 5000 keypair.

Last updated