Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

It is strongly recommended to limit traffic to your SoftNAS instances to known IP addresses, to ensure security, especially if leveraging a public IP address.   As it is strongly recommended to use the internal IP address when configuring SnapReplicate™ and SNAP HA, and as because you will not yet have the internal IP addresses of your instances when creating the initial instance in an HA pair, it may be more expedient to configure the security group after instance creation.  If you have restricted HTTPS traffic to your local IP address, you may need to later alter the Security Group if your local IP address changes, as this restriction may prevent access to your instance. Also, additional rules will also have to be configured if Platinum features will be leveraged. More information on configuring your security group for individual Platinum features can be found in the link below: 

...

In Edit Inbound Rules, you will configure the IP addresses from which traffic will flow, or from which you will connect to the instance – typically this means the internal IP address of the target instance for the source instance, and the internal IP of the source instance for the target instance. It is also prudent to limit traffic to your own IP address or a range of IP addresses if multiple people are to work with the SoftNAS instance.


Image RemovedImage Added


To view the internal IP address of each node, from the EC2 console, select Instances, then select the instance - the Private IPs entry shows the instance's private IP address used for SnapReplicate.

Image RemovedImage Added