Overview
Security groups are stateful, per-port firewall rulesets enforced at the hypervisor level. Every instance begins with a default security group that blocks all inbound traffic. Add rules to permit the specific protocols your workload requires — changes take effect immediately without a restart or interface bounce.Prerequisites
- An active Xloud project with at least one running instance
- Dashboard access or CLI configured with valid credentials
Create a Security Group
- Dashboard
- CLI
Navigate to Security Groups
Log in to the Xloud Dashboard (
https://connect.<your-domain>) and navigate to
Project → Network → Security Groups. Click Create Security Group.Name the group
| Field | Description |
|---|---|
| Name | Short, descriptive name, e.g., web-sg |
| Description | Optional — e.g., “HTTP/HTTPS for web tier” |
Each new security group automatically includes two egress rules that allow all
outbound IPv4 and IPv6 traffic. Add ingress rules for the specific ports your
workload exposes.
Add ingress rules
Open the new group and click Add Rule. Repeat for each required rule.
| Direction | Protocol | Port Range | Remote | Purpose |
|---|---|---|---|---|
| Ingress | TCP | 80 | 0.0.0.0/0 | HTTP |
| Ingress | TCP | 443 | 0.0.0.0/0 | HTTPS |
| Ingress | TCP | 22 | <your-office-CIDR> | SSH management |
| Ingress | ICMP | Any | 0.0.0.0/0 | Ping and diagnostics |
Common Rules Reference
| Use Case | Direction | Protocol | Port | Remote |
|---|---|---|---|---|
| HTTP web traffic | Ingress | TCP | 80 | 0.0.0.0/0 |
| HTTPS web traffic | Ingress | TCP | 443 | 0.0.0.0/0 |
| SSH access | Ingress | TCP | 22 | Management CIDR |
| ICMP ping | Ingress | ICMP | Any | 0.0.0.0/0 |
| MySQL / MariaDB | Ingress | TCP | 3306 | App tier CIDR |
| PostgreSQL | Ingress | TCP | 5432 | App tier CIDR |
| Redis | Ingress | TCP | 6379 | App tier CIDR |
| Custom UDP service | Ingress | UDP | 1194 | 0.0.0.0/0 |
| All outbound | Egress | Any | Any | 0.0.0.0/0 |
Source Security Group Rules
Rules can reference another security group as the remote source instead of a CIDR. This allows traffic from any instance assigned the referenced group, regardless of IP.Allow traffic from app tier security group
Manage Rules and Groups
Remove a Rule
List rules in a group
Delete a specific rule
Remove a Security Group from an Instance
Remove security group from instance
Delete a Security Group
Delete security group
Next Steps
Floating IP Addresses
Associate public IPs with instances — ensure your security group allows inbound traffic first
Security Hardening
Administrator guide for port security, anti-spoofing, and default group hardening
Network Troubleshooting
Diagnose security group and connectivity issues
Create a Network
Set up the network your secured instances attach to