Security group rules
This section describes the additional security features related to your cloud provider.
Feature | Description |
---|---|
Security Groups |
While access to hosts on your local network is typically controlled by a firewall, access to your cloud hosts is controlled using security groups. A security group specifies which protocols are allowed and which ports are open for incoming and outgoing traffic to a cloud host. For incoming traffic, you can restrict access to one or more IP addresses. Example: You need to connect to your cloud hosts via Remote Desktop. Therefore, you configure your security group to allow incoming traffic over TCP port 3389 (RDP). However, you only allow access for your company's IP addresses to prevent unauthorized access from the outside. Security groups are configured on the website of your cloud provider, and must be created separately for each region. You can create as many security groups as you need, up to the limit imposed by your cloud provider. You select a security group when you create a cloud host template, and that security group applies until the hosts are terminated. |
Key Pairs |
Key pairs are necessary if you intend to connect remotely to a cloud host. A key pair consists of a public key and a private key. The public key is saved to the cloud host and the private key is saved locally on your computer or network. Caution: When creating a new key pair, you are prompted to save the private key. Make sure to save it in a secure location. Without the private key, you cannot log into your hosts! The private key is used differently for Windows and Linux hosts:
Key pairs are created on the website of your cloud provider, and must be created separately for each region. You can create as many key pairs as you need for your different testing teams, up to the limit imposed by your cloud provider. You select a key pair when you create a cloud host template, and that key pair applies until the hosts are terminated. |
Elastic IP Addresses |
Enables you to define static IP addresses for your provisioned hosts. You can use elastic IP addresses for opening firewall settings to provision host machines without having the need to use different IP addresses each time. To do so, you can build and use a static pool of IP addresses for granting firewall access that are reserved only for your account. This pool of IP addresses remains associated with your cloud account until you choose to explicitly release it. |
For details on security groups, key pairs, elastic IP addresses, and certificate files, see the documentation provided by your cloud provider.
For task details on how to initially set up communication, see Initial cloud settings.
See also: