Robeeta Cloud VM - Help Document

Robeeta Cloud VM - Help Document

Edit Security Group

Security Group - Edit

The Edit Security Group menu allows you to modify an existing security group, including its Group Name, Info, and Inbound/Outbound rules.

Security Group Items

Inbound & Outbound Rules

Each rule includes:

  • IP: Source IP (supports CIDR)
  • Protocol: TCP, UDP, HTTP, HTTPS, SSH, RDP, DNS-TCP, DNS-UDP, MSSQL-TCP, MSSQL-UDP, MySQL, POP3, IMAP, SMTP, Telnet, All Traffic
  • Port: Associated port number
  • Info: Notes about the rule
  • Delete: Remove the rule if needed
  • Risk Level: Displayed with an icon () and hover remarks

Note: When allowing a custom port on the firewall, always use TCP or UDP as the protocol.

Risk Level Icons

  • None: No significant risk
  • Low: Minor potential risk (non-standard ports)
  • Medium: Review recommended (default ports, wide subnets, or all traffic)
  • High: Immediate action advised (open IP ranges, invalid IP, or unsafe protocols)

VMs Attached to This Security Group

This tab displays all Virtual Machines (VMs) currently associated with the selected security group. You can view the details of each VM, including the date it was attached, the VM code, and the VM name.

VMs Attached to Security Group

Best Practices

  • Do not leave IP empty or invalid; always specify proper IP addresses or subnets.
  • Avoid using 0.0.0.0 or 0.0.0.0/0 as it allows unrestricted access.
  • Limit the use of subnets for wide ranges; prefer individual IPs where possible.
  • Use standard ports for known protocols to reduce risks.
  • Allowing All Traffic should be avoided; if required, monitor closely.
  • When using custom ports, specify protocol as TCP or UDP only.
  • Regularly review and update rules to reduce exposure to threats.
  • Use the risk icons to quickly identify rules with potential security risks.
  • Protocols supported: TCP, UDP, HTTP, HTTPS, DNS-TCP, DNS-UDP, MSSQL-TCP, MSSQL-UDP, MySQL, POP3, IMAP, SMTP, Telnet, SSH, RDP-TCP, RDP-UDP, All Traffic.