Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 26 Next »

IBM Cloud Security Overview

Access to an IBM cloud instance can be controlled by 

  • an external firewall,
  • the operating system firewall of the instance,
  • IBM-specific security groups, and
  • IBM-specific subnet ACLs.

In addition to allowing SSH access, the different firewall levels must be configured to permit at least access to any required license servers.

IBM Cloud Security Groups

<tbd>

IBM Cloud Subnet ACLs

<tbd>

Connecting to the Cloud Instance

During the configuration of your instance you should have created a security group allowing at the minimum SSH access to the instance. If this has been done correctly, you can, for example, use SSH from the command-line or from a tool such as PuTTY to access the command-line of the user sshuser on the Charon-SSP instance.

You will need the following:

  • Access to the private key associated with the public key you uploaded during the configuration of the instance.
  • The public IP address of the instance.

Please note: the file permissions of the private key file must be set such that the file is only readable by the user (e.g., # chmod 400 <private-key-file>).

There are several ways to connect to your Charon-SSP cloud instance using this basic SSH protocol access. Some of them are described in the following sections below.


  • No labels