You can create user-defined security groups.

Prerequisites

If you want to use security tags with security groups, Create and Assign Security Tags.

Procedure

  1. Open the Security Services.
    1. Navigate to Networking > Security.
    2. Select the organization VDC for which you want to apply security settings, and click Configure Services.
      The tenant portal opens Security Services.
  2. Navigate to Grouping Objects > Security Groups
    The Security Groups page opens.
  3. Click the Create (create button) button.
  4. Enter a name and, optionally, a description for the security group.
    The description displays in the list of security groups, so adding a meaningful description can make it easy to identify the security group at a glance.
  5. (Optional) Add a dynamic member set.
    1. Click the Add (create button) button under Dynamic Member Sets.
    2. Select whether to match Any or All of the criteria in your statement.
    3. Enter the first object to match.
      The options are Security Tag, VM Guest OS Name, VM Name, and VM Guest Host Name.
    4. Select an operator, such as Contains, Starts with, or Ends with.
    5. Enter a value.
    6. (Optional) To add another statement, use a Boolean operator And or Or.
  6. (Optional) Include Members.
    1. From the Browse objects of type drop-down menu, select the type of objects, such as Virtual Machines, Org VDC networks, IP sets, MAC sets, or Security tags.
    2. To include an object in the Include Members list, select the object from the left panel, and move it to the right panel by clicking the right arrow.
  7. (Optional) Exclude members.
    1. From the Browse objects of type drop-down menu, select the type of objects, such as Virtual Machines, Org VDC networks, IP sets, MAC sets, or Security tags.
    2. To include an object in the Exclude Members list, select the object from the left panel, and move it to the right panel by clicking the right arrow.
  8. To preserve your changes, click Keep.

Results

The security group can now be used in rules, such as firewall rules.