Skip to content

Security Group Management in Horizon

Security groups can be thought of like firewalls. They ultimately control inbound and outbound traffic to your virtual machines. Under the CLI and Horizon, access defaults to all outbound allowed and NO inbound allowed.

To allow access to your VM for things like SSH, you will need to create a security group and add rules to it.

Naming and reusing security groups

You can reuse a security group many times, so a best practice is to create groups by related services. For instance, you might create a basic group for ssh and icmp (which is what we will show as an example) and then a separate security group for http and https access if you’re running a web service on your instance.

Creating Security Groups and Rules

This will walk you through creating a basic security group in Horizon and adding a couple of simple access rules.


  1. Login to the Horizon dashboard and make sure you’ve selected the correct allocation. Select the Network tab on the sidebar and click Security Groups.

Screenshot with a red arrow pointing to the "Network" collapse toggle


  1. Once you’re on the security group page, you’ll need to click the Create Security Group button (noted with a red arrow on the screenshot).

Screenshot with a red arrow pointing to the "+ Create Security Group" button


  1. In the popup box that comes up, you’ll give your new security group a name (we suggest something like my-username-ssh-and-icmp) and optional description. We recommend giving a meaningful name and noting in the description what your intended purpose is.

Screenshot of the "Create Security Group" modal. The "Name" field is populated with "jlf-test-sec-group" and the "Description" field is populated with "This is a test for creating documentation."


  1. When the creation is successful, it will bring you back to the security group page and note the success in the corner with a green status message. You’ll see your new group name at the top where it says Manage Security Group Rules: your-rule-name.

    You’ll then want to click Add Rule (noted with a red arrow on the screenshot).

Screenshot with a red arrow pointing to the "+ Add Rule" button


  1. This will bring up a new dialog box where you can select the parameters for your security group rule.

Screenshot showing the default state of the "Add Rule" modal


  1. If you click the Rule dropdown at the top, you’ll see a list of common rule types as well as the option for custom rules. For this example, we’ll select SSH to allow inbound port 22/SSH access.

Screenshot of the "Add Rule" modal with the "Rule" dropdown opened


  1. We’ll fill in the other details needed. We do recommend putting in a description with what the rule does so it’s easy to see at a glance. We’ll also select CIDR as the remote type and then set 0.0.0.0/0 as the CIDR. This allows all traffic to the SSH port.

    You can make that be a single IP or a specific CIDR block.

    In general, limiting access to specific CIDR blocks or IPs is best.

Example

You could specify 129.114.36.0/22 to limit connections to only Jetstream2 VMs at the TACC regional location.

Screenshot of the "Add Rule" modal. The "Rule" dropdown has "SSH" selected, the "Description" field is populated with "Allow all inbound ssh access," the "Remote" dropdown has "CIDR" selected, and the "CIDR" field is populated with "0.0.0.0/0"


  1. When the creation is successful, it will bring you back to the security group page and note the success in the corner with a green status message. You’ll see your new rule now on the page.

Screenshot showing the newly created security group rule and a green "Success" message in the top-right corner


  1. You’ll need to click the Add Rule button a second time and we’ll create a second rule for All ICMP. This will allow things like incoming ping to check the status of your virtual machine. You’ll select Ingress, CIDR, and set the CIDR to 0.0.0.0/0 to allow all hosts to ping your virtual machine.

Screenshot of the "Add Rule" modal. The "Rule" dropdown has "All ICMP" selected, the "Description" field is populated with "Allow all inbound ICMP," the "Direction" dropdown has "Ingress" selected, the "Remote" dropdown has "CIDR" selected, and the "CIDR" field is populated with "0.0.0.0/0"


  1. As before, when the creation is successful, it will bring you back to the security group page and note the success in the corner with a green status message. You’ll see your new rule now on the page.

Screenshot showing the newly created security group rule and a green "Success" message in the top-right corner


You can then add additional rules or additional security groups. This will allow the most basic of access to your VMs.

We do recommend limiting access as much as possible for best security practices.