Risk Level: Displayed with an icon () and hover remarks
Note: When allowing a custom port on the firewall, always use TCP or UDP as the protocol.
Risk Level Icons
None: No significant risk
Low: Minor potential risk (non-standard ports)
Medium: Review recommended (default ports, wide subnets, or all traffic)
High: Immediate action advised (open IP ranges, invalid IP, or unsafe protocols)
VMs Attached to This Security Group
This tab displays all Virtual Machines (VMs) currently associated with the selected security group. You can view the details of each VM, including the date it was attached, the VM code, and the VM name.
Best Practices
Do not leave IP empty or invalid; always specify proper IP addresses or subnets.
Avoid using 0.0.0.0 or 0.0.0.0/0 as it allows unrestricted access.
Limit the use of subnets for wide ranges; prefer individual IPs where possible.
Use standard ports for known protocols to reduce risks.
Allowing All Traffic should be avoided; if required, monitor closely.
When using custom ports, specify protocol as TCP or UDP only.
Regularly review and update rules to reduce exposure to threats.
Use the risk icons to quickly identify rules with potential security risks.