Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 3 Next »

Currently we are using a set of security groups:

Security GroupDescriptionPortsNotesTemp rule notes
CHF-Access-WebCHF internal web access80, 443IT has the list of addresses, may need to be updated for California offices?

Management-Access

worldwide ssh access22All machines MUST have this group to allow ssh access. Currently allows worldwide ssh access

Public-Access-Web

Public web access80, 443Open worldwide, to be applied to public web facing servers

Temp-Development

short term dev firewall rules??Please use this for short term access, rules in here may be cleared off

Temp-Production

short term production firewall rules??Please use this for short term access, rules in here may be cleared offWill be adding Cat and Sarah to Hydra for off-site access in case of Septa strike.
Roger Turner has his address (75.75.165.67) added for offsite access to Hydra.

Temp-Staging

short term staging firewall rules??Please use this for short term access, rules in here may be cleared off
internal-networkingAccess between machines80, 443, 8080, 8983All Samvera machines must be members of this group so they can share REST data.
EFSAccess to Elastic File System??Not in use yet, will allow access to EFS connections


When a machine has multiple security groups, as long as any one of the groups allows access the connection will work through the firewall. Anything not covered will be rejected however.

  • No labels