Skip to content

Commit d19e710

Browse files
author
Tobias Fuhrimann
committed
Temporarily add opsguide
1 parent 38de088 commit d19e710

File tree

1 file changed

+41
-0
lines changed

1 file changed

+41
-0
lines changed

opsguide/_default_asg.html.md.erb

+41
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
Cloud Foundry preconfigures two ASGs: `public_networks` and `dns`.
2+
3+
Unless you modify these before your initial deployment, these ASGs are applied by default to all containers in your deployment.
4+
5+
- `public_networks`: This group allows access to public networks, and blocks access to private networks and link-local addresses.
6+
Cloud Foundry blocks outgoing traffic to the following IP address ranges by specifically allowing traffic to all other addresses.
7+
8+
- 10.0.0.0 - 10.255.255.255
9+
- 169.254.0.0 - 169.254.255.255
10+
- 172.16.0.0 - 172.31.255.255
11+
- 192.168.0.0 - 192.168.255.255
12+
13+
- `dns`: This group allows access to DNS on port 53 for any IP address.
14+
15+
The default ASGs are defined in the [cf.yml](https://github.com/cloudfoundry/cf-release/blob/master/templates/cf.yml) file as follows:
16+
17+
<pre>
18+
default_security_group_definitions:
19+
- name: public_networks
20+
rules:
21+
- protocol: all
22+
destination: 0.0.0.0-9.255.255.255
23+
- protocol: all
24+
destination: 11.0.0.0-169.253.255.255
25+
- protocol: all
26+
destination: 169.255.0.0-172.15.255.255
27+
- protocol: all
28+
destination: 172.32.0.0-192.167.255.255
29+
- protocol: all
30+
destination: 192.169.0.0-255.255.255.255
31+
- name: dns
32+
rules:
33+
- protocol: tcp
34+
destination: 0.0.0.0/0
35+
ports: '53'
36+
- protocol: udp
37+
destination: 0.0.0.0/0
38+
ports: '53'
39+
</pre>
40+
41+
You should modify the default ASGs to block outbound traffic as necessary for your installation.

0 commit comments

Comments
 (0)