Security Groups
DuploCloud Tenants and Security Groups
In DuploCloud, each Tenant is associated with its own Security Group, which allows unrestricted communication between all resources within that Tenant. This setup ensures that any computing resource in that Tenant can easily reach the services within that same Tenant.
Adding Security Rules for a Tenant
You can configure security rules for a Tenant to control which traffic is allowed to reach resources within it. This includes both IPv4 and IPv6 addresses, VPN clients, or traffic from other Tenants.
Navigate to Administrator -> Tenants.
Select the Tenant from the NAME column.
Select the Security tab.
Click Add. The Add Tenant Security pane displays.

Add Tenant Security pane Complete the following fields:
Source Type
Select Tenant to allow access from another DuploCloud Tenant, or IP Address to allow traffic from a specific IP or VPN range.
Tenant
If Source Type = Tenant, select the Tenant you want to allow access from.
IP CIDR
If Source Type = IP Address, select Custom to manually enter an IP or CIDR (IPv4 or IPv6), or VpnIp to allow access from VPN clients.
Protocol
Choose the protocol for the rule: TCP, UDP, or ICMP.
Port Range
If the protocol is TCP or UDP, specify the port range (for example, 1-65535).
Description
Optionally, add a note describing the purpose of the rule.
Click Add to save the Security rule.
Allowing Inter-Tenant Access
To enable traffic between two DuploCloud Tenants, you create a Tenant security group rule:
Follow the steps in Adding Security Group Rules for a Tenant to open the Add Tenant Security pane.
In Source Type, select Tenant.
In Tenant, select the Tenant you want to allow access from.
Configure Protocol and Port Range as needed.
Optionally, enter a Description for the rule.
Click Add. This rule allows all resources in the selected source Tenant to communicate with resources in the current Tenant according to the ports and protocol you specified.
Configuring Azure VNet Security
In Azure, security is implemented at the Virtual Network (VNet) level. All traffic within the VNet is allowed by default. However, Administrators can override this behavior by setting up security rules to control traffic between different VNets or from a VNet to external resources.
From the DuploCloud Portal, navigate to Administrator -> Infrastructure.
Select the Infrastructure you want to manage access for from the NAME column.
Select the Security Group Rules tab.
Click Add. The Add Infrastructure Security pane displays.

The Add Infrastructure Security pane Complete the fields:
Name
A unique name for the rule.
Subnet
The subnet this rule will apply to (e.g., custom-default).
Direction
Whether the rule applies to Inbound or Outbound traffic.
Source Type
The source of the traffic: IP Address, Service Tag, or Application Security Group.
Source Value
IP/CIDR (e.g., 10.0.0.0/8), service tag (e.g., Internet), or ASG name.
Source Port Range
Port or port range from the source (e.g., *, 443, 1000-2000).
Destination Type
The destination: IP Address, Service Tag, or Application Security Group.
Destination Value
IP/CIDR, Service tag, or ASG name for the destination.
Destination Port Range
Port or port range to allow/deny at the destination.
Priority
Rule priority. Lower values are higher priority (e.g., 100, 200).
Protocol
Choose TCP, UDP, or Both.
Action
Select Allow or Deny to permit or block the traffic.
Click Add. The Security Group Rule is configured.
Last updated
Was this helpful?

