Configure security groups
To allow data traffic to pass through a peering route, you must configure a security group for each of the networks involved in the peering: within each security group, create inbound and outbound rules that allow communication with the other network's address.
Once you assign the created security groups to the Cloud Servers, they will be able to communicate via the peering route.
- Assume the following subnets for the two VPC Networks:
- 10.0.0.0/16 for the SOURCE VPC Network
- 192.168.0.0/16 for the DESTINATION VPC Network
- Make sure the two security groups for the two VPC Networks do not overlap.
- Check that the Cloud Servers (in the two VPC Networks) are correctly attached to the security groups of their respective VPC Networks:
- In the security group of the SOURCE VPC Network (10.0.0.0/16) add:
- inbound rule: 192.168.0.0/16
- outbound rule: 192.168.0.0/16
- in the security group of the DESTINATION VPC Network (192.168.0.0/16) add:
- inbound rule: 10.0.0.0/16
- outbound rule: 10.0.0.0/16
In a production environment, it is advisable to limit protocols and ports strictly to those necessary to increase security.
If the Cloud Servers (in the VPC Networks) already have associated security groups, check that the inbound and outbound rules allow communication between the two VPC Networks.
- Check that the peering service between the two VPC Networks is working correctly.
Create a peering