Chapter 11. Security Groups
You can group instances using security groups to restrict port or IP address accessibility. Security groups are to be created from the cloud provider side and can be assigned to instances using Red Hat CloudForms instance provisioning.
Cloud providers that currently support this function include: Amazon EC2, OpenStack, and Red Hat Enterprise Virtualization.
11.1. Viewing Security Groups
This procedure describes how to view security groups.
- Navigate to → .
Click the desired security groups for viewing the details.
- In Properties, you can view the basic information of the security group.
- In Relationships, you can view the cloud provider and the instances associated with the security group.
In Firewall Rules, you can view a list of ports and IP ranges that are accessible.
NoteThis box is not available if you have not set any rules for your security group.
11.2. Tagging Security Groups
Apply tags to security groups to categorize them.
- Navigate to → .
- Select the security group to tag.
-
Click
(Policy), and then
(Edit Tags).
- Select a customer tag to assign from the dropdown menu.
- Select a value to assign.
- Click Save.

Where did the comment section go?
Red Hat's documentation publication system recently went through an upgrade to enable speedier, more mobile-friendly content. We decided to re-evaluate our commenting platform to ensure that it meets your expectations and serves as an optimal feedback mechanism. During this redesign, we invite your input on providing feedback on Red Hat documentation via the discussion platform.