File tree 1 file changed +41
-0
lines changed
1 file changed +41
-0
lines changed Original file line number Diff line number Diff line change
1
+ Cloud Foundry preconfigures two ASGs: `public_networks` and `dns`.
2
+
3
+ Unless you modify these before your initial deployment, these ASGs are applied by default to all containers in your deployment.
4
+
5
+ - `public_networks`: This group allows access to public networks, and blocks access to private networks and link-local addresses.
6
+ Cloud Foundry blocks outgoing traffic to the following IP address ranges by specifically allowing traffic to all other addresses.
7
+
8
+ - 10.0.0.0 - 10.255.255.255
9
+ - 169.254.0.0 - 169.254.255.255
10
+ - 172.16.0.0 - 172.31.255.255
11
+ - 192.168.0.0 - 192.168.255.255
12
+
13
+ - `dns`: This group allows access to DNS on port 53 for any IP address.
14
+
15
+ The default ASGs are defined in the [cf.yml](https://github.com/cloudfoundry/cf-release/blob/master/templates/cf.yml) file as follows:
16
+
17
+ < pre >
18
+ default_security_group_definitions:
19
+ - name: public_networks
20
+ rules:
21
+ - protocol: all
22
+ destination: 0.0.0.0-9.255.255.255
23
+ - protocol: all
24
+ destination: 11.0.0.0-169.253.255.255
25
+ - protocol: all
26
+ destination: 169.255.0.0-172.15.255.255
27
+ - protocol: all
28
+ destination: 172.32.0.0-192.167.255.255
29
+ - protocol: all
30
+ destination: 192.169.0.0-255.255.255.255
31
+ - name: dns
32
+ rules:
33
+ - protocol: tcp
34
+ destination: 0.0.0.0/0
35
+ ports: '53'
36
+ - protocol: udp
37
+ destination: 0.0.0.0/0
38
+ ports: '53'
39
+ </ pre >
40
+
41
+ You should modify the default ASGs to block outbound traffic as necessary for your installation.
You can’t perform that action at this time.
0 commit comments