Security groups and their rules are essential for securing virtual machines in the Nectar research cloud. In this tutorial you have learnt how to inspect, create and adjust a security group and rules. Securing virtual machines is important and deserves its own tutorial and documentation.
If you haven’t already done so, you should create a key pair for use in Nectar and then learn to Launch Virtual Machines from the Nectar Dashboard
Well done. You’ve completed one of the two prerequisite steps launch and connect to a VM in the Nectar Cloud.
Continue with the Cloud Starter Series