Overview
Security groups are stateful virtual firewalls attached to instance network interfaces. Each group contains a set of rules that permit specific traffic by protocol, port range, and source or destination. Rules apply symmetrically — return traffic for permitted connections is automatically allowed without an explicit egress rule.Prerequisites
- An active Xloud project with
memberoradminrole - At least one running or planned instance to attach the group to
- CLI users: Xloud CLI configured and credentials sourced
Default Behavior
Every project includes adefault security group applied automatically to new instances
unless another group is specified.
| Direction | Default Rule | Effect |
|---|---|---|
| Egress | Allow all (any protocol, any destination) | Instance can reach any external address |
| Ingress | Deny all (no explicit permit rules) | No inbound traffic is permitted unless rules are added |
| Intra-group | Allow from same group members | Instances sharing the default group can communicate |
Common Rules Reference
| Service | Protocol | Port / Type | Direction | Recommended Source |
|---|---|---|---|---|
| SSH | TCP | 22 | Ingress | Management CIDR |
| HTTP | TCP | 80 | Ingress | 0.0.0.0/0 |
| HTTPS | TCP | 443 | Ingress | 0.0.0.0/0 |
| ICMP Ping | ICMP | — | Ingress | 0.0.0.0/0 or management CIDR |
| RDP | TCP | 3389 | Ingress | Management CIDR |
| MySQL / MariaDB | TCP | 3306 | Ingress | Application security group |
| PostgreSQL | TCP | 5432 | Ingress | Application security group |
| Custom TCP range | TCP | e.g. 8000-8080 | Ingress | Specific CIDR |
Create a Security Group
- Dashboard
- CLI
Navigate to Security Groups
Log in to the Xloud Dashboard (
https://connect.<your-domain>) and navigate to
Project → Network → Security Groups.Create the group
Click Create Security Group. Fill in the fields:
Click Create Security Group. The group is created with default egress-allow rules.
| Field | Description |
|---|---|
| Name | Descriptive name, e.g. web-tier, db-access |
| Description | Purpose of the group — shown in the list view |
Add inbound rules
In the security group list, click Manage Rules next to the new group, then
click Add Rule:
| Field | Description |
|---|---|
| Rule | Preset (SSH, HTTP, HTTPS) or Custom TCP/UDP/ICMP |
| Direction | Ingress for inbound, Egress for outbound |
| Port Range | Single port or range (e.g. 443 or 8000:8080) |
| Remote | CIDR block or another security group |
The new rule appears in the group’s rule list immediately.
Apply a Security Group to an Instance
- Dashboard
- CLI
Open instance actions
Navigate to Project → Compute → Instances. In the instance row, open the
Actions dropdown and select Edit Security Groups.
Add the group
In the Edit Instance dialog, locate the security group in the All Security Groups
list and click the + button to move it to Instance Security Groups.
Validation
- Dashboard
- CLI
Navigate to Project → Compute → Instances, click the instance name, and scroll to
the Security Groups section. Confirm the target group is listed.
The security group and its rules are visible in the instance detail view.
Next Steps
Launch an Instance
Attach security groups at instance creation time
Manage IP Addresses
Allocate floating IPs and configure external access
Xloud Networking
Create networks, subnets, and routers for your project
Compute User Guide
Overview of all compute operations and instance lifecycle management