Top
PRIMECLUSTER Installation and Administration Guide4.6 Cloud Services
FUJITSU Software

20.3.2 Security Groups Design

This section describes the security group rule settings that are required to allow communication within the cluster.

PRIMECLUSTER uses several protocols/ports for communication within the cluster. By setting the rules described in this section, allow communication of protocols/ports for communication within the cluster.

In addition to the rules described in this section, you can add rules based on the security requirements of the customer to design security groups.

20.3.2.1 Rules Applied to the Administrative LAN

Design the security rules applied to the administrative LAN.

Inbound rule

Communication source CIDR

Protocol

Port range

Description

Own group

udp

9382

Used for the shutdown facility (SF)

Own group

udp

9796

Used for the management view

Own group

tcp

9797

Used for the management view

Own group

icmp

0-65535

Used for clchkcluster

Outbound rule

Communication target CIDR

Protocol

Port range

Description

0.0.0.0/0

tcp

443

Used for forced stop and network switching

0.0.0.0/0

tcp

53

Used for forced stop and network switching

Own group

icmp

0-65535

Used for clchkcluster

Own group

udp

9382

Used for the shutdown facility (SF)

Own group

udp

9796

Used for the management view

Own group

tcp

9797

Used for the management view

20.3.2.1.1 Creating Security Groups for Web-Based Admin View

Create the security groups for the Web-Based Admin View with the following setting values.

1) When ensuring the connectivity with an instance for a client

Create the security groups for the Web-Based Admin View (cluster node side) with the following setting values.

Inbound rule

Communication source CIDR

Protocol

Port range

Description

Own group

tcp

8081

Used for the management view

Own group

tcp

9798

Used for the management view

Own group

tcp

9799

Used for the management view

Create the security groups for the Web-Based Admin View (management client side) with the following setting values.

Outbound rule

Communication target CIDR

Protocol

Port range

Description

Own group

tcp

8081

Used for the management view

Own group

tcp

9798

Used for the management view

Own group

tcp

9799

Used for the management view

Also, create an inbound rule of the security group to allow a remote desktop connection from a remote control terminal of the management view client to an instance for the management view client.

2) When ensuring the connectivity using a VPN connection

Create the security groups for the Web-Based Admin View (cluster node side) with the following setting values.

Inbound rule

Communication source CIDR

Protocol

Port range

Description

CIDR of the management view client

tcp

8081

Used for the management view

CIDR of the management view client

tcp

9798

Used for the management view

CIDR of the management view client

tcp

9799

Used for the management view

Create the security groups for the Web-Based Admin View (management client side) with the following setting values.

Outbound rule

Communication target CIDR

Protocol

Port range

Description

CIDR of an instance for the management view (cluster node)

tcp

8081

Used for the management view

CIDR of an instance for the management view (cluster node)

tcp

9798

Used for the management view

CIDR of an instance for the management view (cluster node)

tcp

9799

Used for the management view

20.3.2.1.2 Rules Applied to Instance Access in Introduction and Maintenance

Design the security rules applied to instance access in introduction and maintenance.

Inbound rule

Communication source CIDR

Protocol

Port range

Description

CIDR of the access source

tcp

22

Used for the remote access by SSH

Outbound rule

Communication target CIDR

Protocol

Port range

Description

0.0.0.0/0

tcp

80

Used for installing dependent packages

0.0.0.0/0

tcp

443

Used for installing dependent packages

20.3.2.2 Rules Applied to the Cluster Interconnect

Design the security rules applied to the cluster interconnect.

This setting is not necessary in a single-node cluster.

Inbound rule

Communication source CIDR

Protocol

Port range

Description

Own group

123

0-65535

Used for the heartbeat

Outbound rule

Communication target CIDR

Protocol

Port range

Description

Own group

123

0-65535

Used for the heartbeat

20.3.2.3 Rules Applied to the Public LAN

Design the security rules applied to the public LAN.

Add the rules that are required for application operations and the following outbound rule.

Outbound rule

Communication target CIDR

Protocol

Port range

Description

CIDR of the monitoring destination of the business network

icmp

0-65535

Used for monitoring the business network

This rule is required when using the network monitoring function.

For details, refer to "6.7.3.6 Setting Up Takeover Network Resources" in "PRIMECLUSTER Installation and Administration Guide."

When monitoring a virtual router, the monitored virtual router and the public LAN of all cluster nodes must be on the same subnet.

20.3.2.4 Rules Applied to the Network for Data Synchronization

Set the security rules applied to the network for data synchronization.

Inbound rule

Communication source CIDR

Protocol

Port range

Description

Own group

tcp

3260

Used for mirroring among servers

Outbound rule

Communication target CIDR

Protocol

Port range

Description

Own group

tcp

3260

Used for mirroring among servers