TheKoguryo's Tech Blog

 Version 2024.08.29

5. Using Security Lists to Configure Firewalls

Compute Instance will configure incoming and outgoing firewall policies through Security Lists. Security Lists are properties connected to the subnet to which the Compute Instance belongs. If you change the Security Lists, it will be applied to all instances in the subnet. You can also assign more than one security list to a subnet by changing the security list on the subnet or defining a firewall policy in a separate security list.

Each Compute Instance’s firewall uses the OS’s own firewall capabilities.

  • Step #1: Install target application
  • Step #2: Set Exception Port on OS Firewall
  • Step #3: Register on OCI Security List


As an individual, this article was written with my personal time. There may be errors in the content of the article, and the opinions in the article are personal opinions.

Last updated on 7 Jan 2019