Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: adding gcp info

Anchor
TOC
TOC
Include Page
KBCOMMON:KB-CSSstyle
KBCOMMON:KB-CSSstyle

...

Please see the relevant Oracle documentation for more information and configuration detail.

Please note: Traffic is allowed if any rule in any of the relevant lists and groups allows the traffic. Traffic is also allowed if it  is the response traffic of a permitted tracked connection. In addition to allowing SSH access, at least TCP port 8083 must be allowed to enable a license client to access a VE license server. If the web interface is to be used, TCP port 8084 must also be allowed.

...

In addition to allowing SSH access, the different firewall levels must be configured to permit at least TCP port 8083 to enable a license client to access a VE license server. If the web interface is to be used, TCP port 8084 must also be allowed.

Google Cloud Firewall Rules

In addition to firewall rules created by the customer, there are other rules that can affect incoming or outgoing traffic:

  • Certain IP protocols, such as GRE, are not allowed within a VPC network. For more information, see always blocked traffic.

  • Communication between a VM instance and its corresponding metadata server (169.254.169.254). Is always allowed.

  • Every network has two implied firewall rules that permit outgoing connections and block incoming connections. Firewall rules that you create can override these implied rules.

  • The default network is pre-populated with firewall rules that can be deleted or modified.

VPC firewall rule characteristics:

  • Each rule is either for incoming or outgoing traffic. It can allow or deny traffic.
  • Only IPv4 traffic is supported.
  • Firewall rules are stateful (return traffic for an established connection is allowed).
  • If TCP traffic is fragmented, a rule is only applied to the first fragment of a packet.


Include Page
KBCOMMON:DOC-GoToToc
KBCOMMON:DOC-GoToToc