You can create user-defined security groups.

Prerequisites

If you want to use security tags with security groups, Create and Assign Security Tags.

Procedure

  1. From the main menu (Menu), select Cloud Resources.
  2. In the left panel, click Organization VDCs.
  3. Click the radio button next to the target organization virtual data center, and click Manage Firewall.
  4. Click the Grouping Objects > Security Groups tab.
  5. Click the Create (create button) button.
  6. Enter a name and, optionally, a description for the security group.
    The description displays in the list of security groups, so adding a meaningful description can make it easy to identify the security group at a glance.
  7. (Optional) Add a dynamic member set.
    1. Click the Add (create button) button under Dynamic Member Sets.
    2. Select whether to match Any or All of the criteria in your statement.
    3. Enter the first object to match.
      The options are Security Tag, VM Guest OS Name, VM Name, and VM Guest Host Name.
    4. Select an operator, such as Contains, Starts with, or Ends with.
    5. Enter a value.
    6. (Optional) To add another statement, use a Boolean operator And or Or.
  8. (Optional) Include Members.
    1. From the Browse objects of type drop-down menu, select the type of objects, such as Virtual Machines, Org VDC networks, IP sets, MAC sets, or Security tags.
    2. To include an object in the Include Members list, select the object from the left panel, and move it to the right panel by clicking the right arrow.
  9. (Optional) Exclude members.
    1. From the Browse objects of type drop-down menu, select the type of objects, such as Virtual Machines, Org VDC networks, IP sets, MAC sets, or Security tags.
    2. To include an object in the Exclude Members list, select the object from the left panel, and move it to the right panel by clicking the right arrow.
  10. Click Keep to preserve your changes.
    The operation can take a minute to complete.

Results

The security group can now be used in rules, such as firewall rules.