security-groups.tf 1.8 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061
  1. resource "aws_security_group" "interconnects_sg" {
  2. name = "interconnects_sg"
  3. description = "Security Rules Specific to XDR interconnects"
  4. vpc_id = var.security_vpc
  5. tags = merge(var.standard_tags, var.tags)
  6. }
  7. resource "aws_security_group_rule" "trusted_ssh" {
  8. type = "ingress"
  9. from_port = 22
  10. to_port = 22
  11. protocol = "tcp"
  12. cidr_blocks = var.trusted_ips
  13. security_group_id = aws_security_group.interconnects_sg.id
  14. }
  15. resource "aws_security_group_rule" "bgp_ingress" {
  16. type = "ingress"
  17. from_port = 179
  18. to_port = 179
  19. protocol = "tcp"
  20. cidr_blocks = [ var.security_vpc_cidr ]
  21. security_group_id = aws_security_group.interconnects_sg.id
  22. }
  23. resource "aws_security_group_rule" "ipsec_l2tp_ingress" {
  24. type = "ingress"
  25. from_port = 1701
  26. to_port = 1701
  27. protocol = "udp"
  28. cidr_blocks = [ "0.0.0.0/0" ]
  29. security_group_id = aws_security_group.interconnects_sg.id
  30. }
  31. resource "aws_security_group_rule" "ipsec_ike_ingress" {
  32. type = "ingress"
  33. from_port = 500
  34. to_port = 500
  35. protocol = "udp"
  36. cidr_blocks = [ "0.0.0.0/0" ]
  37. security_group_id = aws_security_group.interconnects_sg.id
  38. }
  39. resource "aws_security_group_rule" "ipsec_ike_nat_t_ingress" {
  40. type = "ingress"
  41. from_port = 4500
  42. to_port = 4500
  43. protocol = "udp"
  44. cidr_blocks = [ "0.0.0.0/0" ]
  45. security_group_id = aws_security_group.interconnects_sg.id
  46. }
  47. resource "aws_security_group_rule" "ipsec_egress" {
  48. type = "egress"
  49. from_port = 0 # all ports
  50. to_port = 0 # all ports
  51. protocol = "all"
  52. cidr_blocks = [ "0.0.0.0/0" ]
  53. security_group_id = aws_security_group.interconnects_sg.id
  54. }