You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Current »

In this section:

Create security groups to support Management (MGT0), High Availability (HA0), PKT0 and PKT1 subnets for the SBC.

Before creating the security groups, review the recommended security group rule settings in the following section.

Security Group Rules Overview

Inbound Security Group Rules

Ribbon recommends opening the following ports using Inbound/Ingress rules in the security groups associated with management, HA and packet subnets.

Management Security Group

 

Configuring Security Group for Management Subnet

Type
Protocol
Port Range
Source
Notes/Purpose
SSHTCP220.0.0.0/0SSH to CLI
Custom UDP ruleUDP1230.0.0.0/0NTP
Custom UDP ruleUDP1610.0.0.0/0SNMP Polling
Custom UDP ruleUDP1620.0.0.0/0SNMP traps
Custom TCP ruleTCP20220.0.0.0/0NetConf over ssh
Custom TCP ruleTCP20240.0.0.0/0SSH to Linux
HTTPTCP800.0.0.0/0EMA
HTTPSTCP4430.0.0.0/0REST to ConfD DB
Custom UDP ruleUDP30570.0.0.0/0Used for load balancing service
Custom UDP ruleUDP30540.0.0.0/0Call processing requests
Custom UDP ruleUDP30550.0.0.0/0Keep Alives and Registration
Custom TCP ruleTCP40190.0.0.0/0Applicable to D-SBC only
Custom UDP ruleUDP50930.0.0.0/0SLS (license server) traffic
Custom TCP ruleTCP4440.0.0.0/0Communicating with EMS, AWS EC2-API server, and Platform Manager


HA Security Group 

 

Configuring Security Group for HA Subnet

Type
Protocol
Port Range
Source
Notes/Purpose
All TrafficAllAllx.x.x.x/yx.x.x.x/y is the HA subnet CIDR.
 

Packet Security Group

 

Configuring Security Group for Packet Ports PKT0 and PKT1

Type
Protocol
Port Range
Source
Custom UDP ruleUDP5060x.x.x.x/y
Custom TCP ruleTCP5061x.x.x.x/y
Custom UDP ruleUDP1024-65535x.x.x.x/y

Caution

The source ranges for the packet security group may be external IP address ranges, or they may be the HFE private subnet CIDR if a High-availability Forwarding Engine is present in the configuration.


HA Forwarding Node Security Groups

Configuring a Security Group for the Public-facing/Management Port (eth0)

Type
Protocol
Port Range
Source
Custom UDP ruleUDP5060x.x.x.x/y
Custom TCP ruleTCP5061x.x.x.x/y
Custom UDP ruleUDP1024-65535x.x.x.x/y

Configuring a Security Group for the Private-facing Port (eth2)

Type
Protocol
Port Range
Source
Custom UDP ruleUDP5060x.x.x.x/y is the PKT0 or PKT1 subnet CIDR which is to have external connectivity
Custom TCP ruleTCP5061x.x.x.x/y is the PKT0 or PKT1 subnet CIDR which is to have external connectivity
Custom UDP ruleUDP1024-65535x.x.x.x/y is the PKT0 or PKT1 subnet CIDR which is to have external connectivity

Caution

The source ranges for the HFE Private-facing Port security group may be the private subnet CIDR of the SBC PKT0 or PKT1 subnets.

 

 

Outbound Security Group Rules 

Ribbon recommends opening all ports using Outbound/Egress rules in the security groups associated with management, HA and packet interfaces.   

 

Outbound Security Group Rules

Type 
Protocol
Port Range
Destination
All TrafficAllAll0.0.0.0/0

Caution

 If you open specific ports in outbound security group rules, the remaining ports are blocked.

Note

Refer to the Management Security Group, HA Security Group, and Packet Security Group tables for the minimum required security group rules for the SBC to function.

 

 

Note

 Considering that the SIP signaling port in SBC configuration is set to the default port (5060), the port numbers for UDP/TCP are set to 5060 and 5061.


Create Security Groups

  1. Navigate to EC2 Management Console.

  2. From the left pane, click Security Groups.

    Security Groups Tab

  3. Click Create Security Group. The Create Security Group page displays.
  4. Enter a Security group name for the MGT0 security group and Description.

  5. Select an appropriate VPC from the list.

  6. Click Add Rule to create security group rules as suggested above. 

    Note

     By default, the Inbound rules tab displays on the screen.

    Creating a Security Group for MGT

  7. Click Create.
  8. Repeat steps 3 through 7 to create the new security group for HA, PKT0, and PKT1 subnets.

  9. If deploying with a High-availability Forwarding Engine option, repeat steps 3 through 7 to create a new security group for the HFE public and private-facing subnets.

 

 For more information, refer to Security Groups for Your VPC

  • No labels