• Elastic Cloud Server

ecs
  1. Help Center
  2. Elastic Cloud Server
  3. User Guide
  4. Security Groups
  5. Security Group Configuration Examples
  6. Enabling ECSs in Different Security Groups to Communicate with Each Other Through an Internal Network

Enabling ECSs in Different Security Groups to Communicate with Each Other Through an Internal Network

  • Example scenario:

    In this scenario, resources on an ECS associated with a security group need to be copied to another ECS associated with another security group. The two ECSs are in the same VPC. We recommend that you enable internal network communication between the ECSs and then copy resources.

  • Security group configuration:

    In the same VPC, ECSs associated with the same security group can communicate with one another by default, and no additional configuration is required. However, ECSs in different security groups cannot communicate with each other by default. You must add security group rules to enable the ECSs to communicate with one another through an internal network.

    You can add an inbound rule to each security group associated with the ECSs to allow access from ECSs associated with the other security group. The security group rule is as follows.

    Protocol

    Direction

    Port/Range

    Source

    Protocol to be used for internal network communication. Supported values are TCP, UDP, ICMP, All, and GRE.

    Inbound

    Port or port range

    IPv4 address, IPv4 CIDR block, or ID of another security group