Understanding Firewall Rules Best Practices | Scribe

    Understanding Firewall Rules Best Practices

    • Hafeez Baig |
    • 20 steps |
    • 2 minutes
    1
    Sign in into the **Google Cloud Console**
    2
    Type "**VM instance**" in the search bar and click on the **VM instance** option
    information ordinal icon
    **What is VM instance?**\ \ A **VM instance** (Virtual Machine instance) is a virtualized computing resource that functions like a physical computer but operates on virtual hardware within a cloud environment. In services like Google Cloud Compute Engine, VM instances allow you to run applications, host websites, and perform computations without the need for physical servers. They are scalable, allowing you to adjust resources such as CPU, memory, and storage as needed, and isolated, ensuring that different workloads run independently. VM instances offer flexibility and configurability, enabling you to select various operating systems and machine types to meet specific requirements.
    3
    **VM instances** wizard will open, click on the **CREATE INSTANCE** button
    4
    **CREATE INSTANCE** wizard will open, give the Name as -"**instance-2**"
    5
    Scroll to the **Firewall** section, here you can configure to Allow the HTTP and HTTPS traffic
    information ordinal icon
    **What is Firewall?**\ \ A **firewall** is a security system that controls network traffic based on rules to protect internal networks from unauthorized access and threats. It filters incoming and outgoing traffic, blocking or allowing data based on criteria like IP addresses and ports, and provides monitoring and logging to detect potential security issues.
    6
    Scroll to the **Advanced options** section and click on the dropdown button
    information ordinal icon
    **What are Advanced options?**\ \ In the VM instances wizard, **Advanced options** provide additional settings and configurations beyond the basic setup of a virtual machine. These options allow users to customize the VM instance further, including network settings, disk configurations, security settings, and more. Examples of advanced options might include specifying custom startup scripts, configuring firewall rules, setting up IAM roles, or selecting advanced machine types and storage options. These settings enable more precise control over the VM instance to meet specific requirements or optimize performance.
    7
    Scroll to the **Networking** section and click on the dropdown button
    8
    Scroll to the **Network tags**, give the tag as - "**disable-http"**
    information ordinal icon
    **What are Network tags?**\ \ **Network tags** are labels assigned to VM instances or other resources to help manage network traffic and apply specific policies. They allow you to group resources and apply firewall rules or configurations based on these tags, making it easier to organize and control network settings effectively.
    9
    Scroll to the **Hostname** text input field, here you can give the Hostname
    information ordinal icon
    **What is Hostname?**\ \ A **hostname** is a label assigned to a device or server on a network that uniquely identifies it within that network. It serves as a human-readable name, making it easier to access and manage devices compared to using IP addresses. In a network, a hostname can be used to resolve the device’s IP address and facilitate communication between devices, servers, and applications.
    10
    Scroll to the **Network interfaces** section, here you can configure the Network Interfaces
    information ordinal icon
    **What is Network interfaces?** \ \ **Network interfaces** are components that connect a virtual machine (VM) or server to a network, enabling communication with other devices and services. Each network interface includes unique IP addresses for identification, along with configuration settings for routing, security, and connectivity. They define how the VM interacts with different network segments, such as public or private networks, and manage traffic flow, security rules, and overall network performance.
    11
    Scroll the page and click on the **CREATE** button
    12
    Type "**Firewall**" in the search bar and click on the **Firewall** option
    information ordinal icon
    **What is Firewall?**\ \ A **firewall** is a security system designed to monitor and control network traffic based on predefined rules. It acts as a barrier between a trusted internal network and untrusted external networks, such as the internet. Firewalls can be hardware-based, software-based, or a combination of both, and they filter incoming and outgoing traffic to prevent unauthorized access and protect against threats. By enforcing rules related to IP addresses, ports, and protocols, firewalls help safeguard systems and data from cyberattacks and malicious activities.
    13
    **Firewall policies** wizard will open, click on the **CREATE FIREWALL RULE** button