<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>OpenText Analytics Database 26.2.x – Configure your network</title>
    <link>/en/setup/set-up-on-cloud/on-aws/manually-deploy-on-aws/configure-your-network/</link>
    <description>Recent content in Configure your network on OpenText Analytics Database 26.2.x</description>
    <generator>Hugo -- gohugo.io</generator>
    
	  <atom:link href="/en/setup/set-up-on-cloud/on-aws/manually-deploy-on-aws/configure-your-network/index.xml" rel="self" type="application/rss+xml" />
    
    
      
        
      
    
    
    <item>
      <title>Setup: Create a placement group, key pair, and VPC</title>
      <link>/en/setup/set-up-on-cloud/on-aws/manually-deploy-on-aws/configure-your-network/create-placement-group-key-pair-and-vpc/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/setup/set-up-on-cloud/on-aws/manually-deploy-on-aws/configure-your-network/create-placement-group-key-pair-and-vpc/</guid>
      <description>
        
        
        &lt;p&gt;Part of configuring your network for AWS is to create the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;#top&#34;&gt;Placement Group&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;#Create&#34;&gt;Key Pair&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;#Create2&#34;&gt;Virtual Private Cloud (VPC)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;create-a-placement-group&#34;&gt;Create a placement group&lt;/h2&gt;
&lt;p&gt;A placement group is a logical grouping of instances in a single &lt;a href=&#34;https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-regions-availability-zones.html&#34;&gt;Availability Zone&lt;/a&gt;. Placement Groups are required for clusters and all database nodes must be in the same Placement Group.&lt;/p&gt;
&lt;p&gt;OpenText recommends placement groups for applications that benefit from low network latency, high network throughput, or both. To provide the lowest latency, and the highest packet-per-second network performance for your Placement Group, choose an &lt;a href=&#34;../../../../../../en/setup/set-up-on-cloud/on-aws/supported-aws-instance-types/&#34;&gt;instance type&lt;/a&gt; that supports enhanced networking.&lt;/p&gt;
&lt;p&gt;For information on creating placement groups, see &lt;a href=&#34;http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/placement-groups.html&#34;&gt;Placement Groups&lt;/a&gt; in the AWS documentation.&lt;/p&gt;
&lt;p&gt;&lt;a name=&#34;Create&#34;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;create-a-key-pair&#34;&gt;Create a key pair&lt;/h2&gt;
&lt;p&gt;You need a key pair to access your instances using SSH. Create the key pair using the AWS interface and store a copy of your key (*.pem) file on your local machine. When you access an instance, you need to know the local path of your key.&lt;/p&gt;
&lt;p&gt;Use a key pair to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Authenticate your connection as dbadmin to your instances from outside your cluster.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Install and configure the database on your AWS instances.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;for information on creating a key pair, see &lt;a href=&#34;http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-key-pairs.html&#34;&gt;Amazon EC2 Key Pairs&lt;/a&gt; in the AWS documentation.&lt;/p&gt;
&lt;p&gt;&lt;a name=&#34;Create2&#34;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;create-a-virtual-private-cloud-vpc&#34;&gt;Create a virtual private cloud (VPC)&lt;/h2&gt;
&lt;p&gt;You create a Virtual Private Cloud (VPC) on Amazon so that you can create a network of your EC2 instances. Your instances in the VPC all share the same network and security settings.&lt;/p&gt;
&lt;p&gt;A database cluster on AWS must be logically located in the same network. Create a VPC to ensure the nodes in you cluster can communicate with each other in AWS.&lt;/p&gt;
&lt;p&gt;Create a single public subnet VPC with the following configurations:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Assign a Network Access Control List (ACL) that is appropriate to your situation.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Enable DNS resolution and enable DNS hostname support for instances launched in this VPC.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Add the required &lt;a href=&#34;../../../../../../en/setup/set-up-on-cloud/on-aws/manually-deploy-on-aws/configure-your-network/network-acl-settings/&#34;&gt;network inbound and outbound rules to the Network ACL associated to the VPC.&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

A database cluster must be operated in a single availability zone.

&lt;/div&gt;
&lt;p&gt;For information on creating a VPC, see &lt;a href=&#34;https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/get-set-up-for-amazon-ec2.html#create-a-vpc&#34;&gt;Create a Virtual Private Cloud (VPC)&lt;/a&gt; in the AWS documentation.&lt;/p&gt;

      </description>
    </item>
    
    <item>
      <title>Setup: Network ACL settings</title>
      <link>/en/setup/set-up-on-cloud/on-aws/manually-deploy-on-aws/configure-your-network/network-acl-settings/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/setup/set-up-on-cloud/on-aws/manually-deploy-on-aws/configure-your-network/network-acl-settings/</guid>
      <description>
        
        
        &lt;p&gt;OpenText™ Analytics Database requires the following basic network access control list (ACL) settings on an AWS instance running the OpenText™ Analytics Database AMI. OpenText recommends that you secure your network with additional ACL settings that are appropriate to your situation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Inbound Rules&lt;/strong&gt;

&lt;table class=&#34;table table-bordered&#34; &gt;



&lt;tr&gt; 

&lt;th &gt;
Type&lt;/th&gt; 

&lt;th &gt;
Protocol&lt;/th&gt; 

&lt;th &gt;
Port Range&lt;/th&gt; 

&lt;th &gt;
Use&lt;/th&gt; 

&lt;th &gt;
Source&lt;/th&gt; 

&lt;th &gt;
Allow/Deny&lt;/th&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
SSH&lt;/td&gt; 

&lt;td &gt;
TCP (6)&lt;/td&gt; 

&lt;td &gt;
22&lt;/td&gt; 

&lt;td &gt;
SSH (Optional—for access to your cluster from outside your VPC)&lt;/td&gt; 

&lt;td &gt;
User Specific&lt;/td&gt; 

&lt;td &gt;
Allow&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
Custom TCP Rule&lt;/td&gt; 

&lt;td &gt;
TCP (6)&lt;/td&gt; 

&lt;td &gt;
5450&lt;/td&gt; 

&lt;td &gt;
MC (Optional—for MC running outside of your VPC)&lt;/td&gt; 

&lt;td &gt;
User Specific&lt;/td&gt; 

&lt;td &gt;
Allow&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
Custom TCP Rule&lt;/td&gt; 

&lt;td &gt;
TCP (6)&lt;/td&gt; 

&lt;td &gt;
5433&lt;/td&gt; 

&lt;td &gt;
SQL Clients (Optional—for access to your cluster from SQL clients)&lt;/td&gt; 

&lt;td &gt;
User Specific&lt;/td&gt; 

&lt;td &gt;
Allow&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
Custom TCP Rule&lt;/td&gt; 

&lt;td &gt;
TCP (6)&lt;/td&gt; 

&lt;td &gt;
50000&lt;/td&gt; 

&lt;td &gt;
Rsync (Optional—for backup outside of your VPC)&lt;/td&gt; 

&lt;td &gt;
User Specific&lt;/td&gt; 

&lt;td &gt;
Allow&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
Custom TCP Rule&lt;/td&gt; 

&lt;td &gt;
TCP (6)&lt;/td&gt; 

&lt;td &gt;
1024-65535&lt;/td&gt; 

&lt;td &gt;
Ephemeral Ports (Needed if you use any of the above)&lt;/td&gt; 

&lt;td &gt;
User Specific&lt;/td&gt; 

&lt;td &gt;
Allow&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
ALL Traffic&lt;/td&gt; 

&lt;td &gt;
ALL&lt;/td&gt; 

&lt;td &gt;
ALL&lt;/td&gt; 

&lt;td &gt;
N/A&lt;/td&gt; 

&lt;td &gt;
0.0.0.0/0&lt;/td&gt; 

&lt;td &gt;
Deny&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Outbound Rules&lt;/strong&gt;

&lt;table class=&#34;table table-bordered&#34; &gt;



&lt;tr&gt; 

&lt;th &gt;
Type&lt;/th&gt; 

&lt;th &gt;
Protocol&lt;/th&gt; 

&lt;th &gt;
Port Range&lt;/th&gt; 

&lt;th &gt;
Use&lt;/th&gt; 

&lt;th &gt;
Source&lt;/th&gt; 

&lt;th &gt;
Allow/Deny&lt;/th&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
Custom TCP Rule&lt;/td&gt; 

&lt;td &gt;
TCP (6)&lt;/td&gt; 

&lt;td &gt;
0–65535&lt;/td&gt; 

&lt;td &gt;
Ephemeral Ports&lt;/td&gt; 

&lt;td &gt;
0.0.0.0/0&lt;/td&gt; 

&lt;td &gt;
Allow&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
&lt;/p&gt;
&lt;p&gt;You can use the entire port range specified in the previous table, or find your specific ephemeral ports by entering the following command:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;$ cat /proc/sys/net/ipv4/ip_local_port_range
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;more-information&#34;&gt;More information&lt;/h2&gt;
&lt;p&gt;For detailed information on network ACLs within AWS, refer to &lt;a href=&#34;http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_ACLs.html&#34;&gt;Network ACLs&lt;/a&gt; in the Amazon documentation.&lt;/p&gt;
&lt;p&gt;For detailed information on ephemeral ports within AWS, refer to &lt;a href=&#34;http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_ACLs.html#VPC_ACLs_Ephemeral_Ports&#34;&gt;Ephemeral Ports&lt;/a&gt; in the Amazon documentation.&lt;/p&gt;

      </description>
    </item>
    
    <item>
      <title>Setup: Configure TCP keepalive with AWS network load balancer</title>
      <link>/en/setup/set-up-on-cloud/on-aws/manually-deploy-on-aws/configure-your-network/configure-tcp-keepalive-with-aws-network-load-balancer/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/setup/set-up-on-cloud/on-aws/manually-deploy-on-aws/configure-your-network/configure-tcp-keepalive-with-aws-network-load-balancer/</guid>
      <description>
        
        
        &lt;p&gt;AWS supports three types of elastic load balancers (ELBs):&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://docs.aws.amazon.com/elasticloadbalancing/latest/classic/index.html&#34;&gt;Classic Load Balancers&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://docs.aws.amazon.com/elasticloadbalancing/latest/application/index.html&#34;&gt;Application Load Balancers&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;https://docs.aws.amazon.com/elasticloadbalancing/latest/network/index.html&#34;&gt;Network Load Balancers&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;OpenText strongly recommends the AWS Network Load Balancer (NLB), which provides the best performance with your database. The Network Load Balancer acts as a proxy between clients (such as JDBC) and database servers. The Classic and Application Load Balancers do not work with the database, in Enterprise Mode or Eon Mode.&lt;/p&gt;
&lt;p&gt;To avoid timeouts and hangs when connecting to the database through the NLB, it is important to understand how AWS NLB handles idle timeouts for connections. For the NLB, AWS sets the idle timeout value to 350 seconds and you cannot change this value. The timeout applies to both connection points.&lt;/p&gt;
&lt;p&gt;For a long-running query, if either the client or the server fails to send a timely keepalive, that side of the connection is terminated. This can lead to situations where a JDBC client hangs waiting for results that would never be returned because the server fails to send a keepalive within 350 seconds.&lt;/p&gt;
&lt;p&gt;To identify an idle timeout/keepalive issue, run a query like this via a client such as JDBC:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;=&amp;gt; SELECT SLEEP(355);
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;If there’s a problem, one of the following situations occurs:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;The client connection terminates before 355 seconds. In this case, lower the JDBC keepalive setting so that keepalives are sent less than 350 seconds apart.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The client connection doesn’t return a result after 355 seconds. In this case, you need to adjust the server keepalive settings (tcp_keepalive_time and tcp_keepalive_intvl) so that keepalives are sent less than 350 seconds apart.&lt;/p&gt;
&lt;p&gt;You can adjust the keepalive settings on the server, or you can &lt;a href=&#34;#&#34;&gt;adjust them in the database&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For detailed information about AWS Network Load Balancers, see the &lt;a href=&#34;https://docs.aws.amazon.com/elasticloadbalancing/latest/network/introduction.html&#34;&gt;AWS documentation&lt;/a&gt;.&lt;/p&gt;

      </description>
    </item>
    
    <item>
      <title>Setup: Create and assign an internet gateway</title>
      <link>/en/setup/set-up-on-cloud/on-aws/manually-deploy-on-aws/configure-your-network/create-and-assign-an-internet-gateway/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/setup/set-up-on-cloud/on-aws/manually-deploy-on-aws/configure-your-network/create-and-assign-an-internet-gateway/</guid>
      <description>
        
        
        &lt;p&gt;When you create a VPC, an Internet gateway is automatically assigned to it. You can use that gateway, or you can assign your own. If you are using the default Internet gateway, continue with the procedure described in &lt;a href=&#34;../../../../../../en/setup/set-up-on-cloud/on-aws/manually-deploy-on-aws/configure-your-network/create-security-group/#&#34;&gt;Create a security group&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Otherwise, create an Internet gateway specific to your needs. Associate that internet gateway with your VPC and subnet.&lt;/p&gt;
&lt;p&gt;For information about how to create an Internet Gateway, see &lt;a href=&#34;http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_Internet_Gateway.html&#34;&gt;Internet Gateways&lt;/a&gt; in the AWS documentation.&lt;/p&gt;

      </description>
    </item>
    
    <item>
      <title>Setup: Assign an elastic IP address</title>
      <link>/en/setup/set-up-on-cloud/on-aws/manually-deploy-on-aws/configure-your-network/assign-an-elastic-ip-address/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/setup/set-up-on-cloud/on-aws/manually-deploy-on-aws/configure-your-network/assign-an-elastic-ip-address/</guid>
      <description>
        
        
        &lt;p&gt;An elastic IP address is an unchanging IP address that you can use to connect to your cluster externally. OpenText recommends you assign a single elastic IP to a node in your cluster. You can then connect to other nodes in your cluster from your primary node using their internal IP addresses dictated by your VPC settings.&lt;/p&gt;
&lt;p&gt;Create an elastic IP address. For information, see &lt;a href=&#34;http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/elastic-ip-addresses-eip.html&#34;&gt;Elastic IP Addresses&lt;/a&gt; in the AWS documentation.&lt;/p&gt;

      </description>
    </item>
    
    <item>
      <title>Setup: Create a security group</title>
      <link>/en/setup/set-up-on-cloud/on-aws/manually-deploy-on-aws/configure-your-network/create-security-group/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>/en/setup/set-up-on-cloud/on-aws/manually-deploy-on-aws/configure-your-network/create-security-group/</guid>
      <description>
        
        
        &lt;p&gt;The OpenText™ Analytics Database AMI has specific security group requirements. When you create a Virtual Private Cloud (VPC), AWS automatically creates a default security group and assigns it to the VPC. You can use the default security group, or you can name and assign your own.&lt;/p&gt;
&lt;p&gt;Create and name your own security group using the following basic security group settings. You may make additional modifications based on your specific needs.&lt;/p&gt;
&lt;h2 id=&#34;inbound&#34;&gt;Inbound&lt;/h2&gt;
&lt;p&gt;
&lt;table class=&#34;table table-bordered&#34; &gt;



&lt;tr&gt; 

&lt;th &gt;
Type&lt;/th&gt; 

&lt;th &gt;
Use&lt;/th&gt; 

&lt;th &gt;
Protocol&lt;/th&gt; 

&lt;th &gt;
Port Range&lt;/th&gt; 

&lt;th &gt;
IP&lt;/th&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
SSH&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt; 

&lt;td &gt;
TCP&lt;/td&gt; 

&lt;td &gt;
22&lt;/td&gt; 

&lt;td &gt;


The CIDR address range of administrative systems that require SSH access to the database nodes. Make this range as restrictive as possible. You can add multiple rules for separate network ranges, if necessary.&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
DNS (UDP)&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt; 

&lt;td &gt;
UDP&lt;/td&gt; 

&lt;td &gt;
53&lt;/td&gt; 

&lt;td &gt;
Your private subnet address range (for example, 10.0.0.0/24).&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
Custom UDP&lt;/td&gt; 

&lt;td &gt;
Spread&lt;/td&gt; 

&lt;td &gt;
UDP&lt;/td&gt; 

&lt;td &gt;
4803 and 4804&lt;/td&gt; 

&lt;td &gt;
Your private subnet address range (for example, 10.0.0.0/24).&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
Custom TCP&lt;/td&gt; 

&lt;td &gt;
Spread&lt;/td&gt; 

&lt;td &gt;
TCP&lt;/td&gt; 

&lt;td &gt;
4803&lt;/td&gt; 

&lt;td &gt;
Your private subnet address range (for example, 10.0.0.0/24).&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
Custom TCP&lt;/td&gt; 

&lt;td &gt;
VSQL/SQL&lt;/td&gt; 

&lt;td &gt;
TCP&lt;/td&gt; 

&lt;td &gt;
5433&lt;/td&gt; 

&lt;td &gt;
The CIDR address range of client systems that require access to the database nodes. This range should be as restrictive as possible. You can add multiple rules for separate network ranges, if necessary.&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
Custom TCP&lt;/td&gt; 

&lt;td &gt;
Inter-node Communication&lt;/td&gt; 

&lt;td &gt;
TCP&lt;/td&gt; 

&lt;td &gt;
5434&lt;/td&gt; 

&lt;td &gt;
Your private subnet address range (for example, 10.0.0.0/24).&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
Custom TCP&lt;/td&gt; 

&lt;td &gt;
&lt;/td&gt; 

&lt;td &gt;
TCP&lt;/td&gt; 

&lt;td &gt;
5444&lt;/td&gt; 

&lt;td &gt;
Your private subnet address range (for example, 10.0.0.0/24).&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
Custom TCP&lt;/td&gt; 

&lt;td &gt;
MC&lt;/td&gt; 

&lt;td &gt;
TCP&lt;/td&gt; 

&lt;td &gt;
5450&lt;/td&gt; 

&lt;td &gt;
The CIDR address of client systems that require access to the management console. This range should be as restrictive as possible. You can add multiple rules for separate network ranges, if necessary.&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
Custom TCP&lt;/td&gt; 

&lt;td &gt;
Rsync&lt;/td&gt; 

&lt;td &gt;
TCP&lt;/td&gt; 

&lt;td &gt;
50000&lt;/td&gt; 

&lt;td &gt;


Your private subnet address range (for example, 10.0.0.0/24).&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
ICMP&lt;/td&gt; 

&lt;td &gt;
Installer&lt;/td&gt; 

&lt;td &gt;
Echo Reply&lt;/td&gt; 

&lt;td &gt;
N/A&lt;/td&gt; 

&lt;td &gt;
Your private subnet address range (for example, 10.0.0.0/24).&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
ICMP&lt;/td&gt; 

&lt;td &gt;
Installer&lt;/td&gt; 

&lt;td &gt;
Traceroute&lt;/td&gt; 

&lt;td &gt;
N/A&lt;/td&gt; 

&lt;td &gt;
Your private subnet address range (for example, 10.0.0.0/24).&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;


&lt;div class=&#34;alert admonition note&#34; role=&#34;alert&#34;&gt;
&lt;h4 class=&#34;admonition-head&#34;&gt;Note&lt;/h4&gt;

In Management Console (MC), the Java IANA discovery process uses port 7 once to detect if an IP address is reachable before the database import operation. The database tries port 7 first. If port 7 is blocked, the database switches to port 22.

&lt;/div&gt;&lt;/p&gt;
&lt;h2 id=&#34;outbound&#34;&gt;Outbound&lt;/h2&gt;

&lt;table class=&#34;table table-bordered&#34; &gt;



&lt;tr&gt; 

&lt;th &gt;
Type&lt;/th&gt; 

&lt;th &gt;
Protocol&lt;/th&gt; 

&lt;th &gt;
Port Range&lt;/th&gt; 

&lt;th &gt;
Destination&lt;/th&gt; 

&lt;th &gt;
IP&lt;/th&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
All TCP&lt;/td&gt; 

&lt;td &gt;
TCP&lt;/td&gt; 

&lt;td &gt;
0-65535&lt;/td&gt; 

&lt;td &gt;
Anywhere&lt;/td&gt; 

&lt;td &gt;
0.0.0.0/0&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
All ICMP&lt;/td&gt; 

&lt;td &gt;
ICMP&lt;/td&gt; 

&lt;td &gt;
0-65535&lt;/td&gt; 

&lt;td &gt;
Anywhere&lt;/td&gt; 

&lt;td &gt;


0.0.0.0/0&lt;/td&gt;&lt;/tr&gt;

&lt;tr&gt; 

&lt;td &gt;
All UDP&lt;/td&gt; 

&lt;td &gt;
UDP&lt;/td&gt; 

&lt;td &gt;
0-65535&lt;/td&gt; 

&lt;td &gt;
Anywhere&lt;/td&gt; 

&lt;td &gt;
0.0.0.0/0&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;

&lt;p&gt;For information about what a security group is, as well as how to create one, see &lt;a href=&#34;http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network-security.html#vpc-security-groups&#34;&gt;Amazon EC2 Security Groups for Linux Instances&lt;/a&gt; in the AWS documentation.&lt;/p&gt;

      </description>
    </item>
    
  </channel>
</rss>
