Security groups in AWS Launch Wizard for SAP - AWS Launch Wizard

Security groups in AWS Launch Wizard for SAP

This section describes the security groups that Launch Wizard for SAP creates and assigns to the database and application instances. It also describes how the entries in the outbound and inbound communication rules for database and application security groups are updated.

Security groups

A security group acts as a virtual firewall that controls the traffic for one or more instances. When you allow Launch Wizard to create security groups, it creates a set of security groups and assigns them to the SAP database and application instances to allow for inbound traffic. Security groups use the following naming conventions:

  • <Infrastructure_Configuration_Name>_App_SecurityGroup

  • <Infrastructure_Configuration_Name>_DB_SecurityGroup

  • WD_Security_Group

  • WD_LB_Security_Group

<Infrastructure_Configuration_Name>_App_SecurityGroup

<Infrastructure_Configuration_Name>_App_SecurityGroup is configured as follows to allow inbound access to the database servers.

Source Protocol Port Range
All instances attached to this security group all
All instances attached to the DB security group

TCP

1-65535

This configuration allows:

  • inbound communication on all TCP ports from all of the SAP application servers deployed using the same configuration name

  • inbound communication on all TCP ports from all of the database servers deployed using the same configuration name.

<Infrastructure_Configuration_Name >_DB_SecurityGroup

<Infrastructure_Configuration_Name>_DB_SecurityGroup is configured as follows to allow inbound access to the database servers.

Source Protocol Port Range
All instances attached to this security group all
All instances attached to the App security group

TCP

1-65535
All instances attached to the App security group UDP 111
All instances attached to the App security group UDP 2049
All instances attached to the App security group UDP 4000-4002

This configuration allows:

  • inbound communication on all TCP ports from all of the SAP database servers deployed using the same configuration name.

  • inbound communication on all TCP ports from all of the SAP application servers deployed using the same configuration name.

  • inbound communication on UDP 111,2049 and 4000 to 4002 from all the SAP application servers deployed using the same configuration name.

WD_Security_Group

WD_Security_Group is configured as follows to allow inbound access to SAP Web Dispatcher servers.

Deployment type Source Protocol Port range
All ID of the WD_Security_Group all 1-65535
All Input TCP 1-65535
Distributed instances deployment ID of the security group for the SAP transport directory TCP 2049
High availability (HA) deployment ID of the security group for the SAP transport directory in Availability Zone 1 TCP 2049
High availability (HA) deployment ID of the security group for the SAP transport directory in Availability Zone 2 TCP 2049

WD_Security_Group is configured as follows to allow the following outbound access from SAP Web Dispatcher servers.

Deployment type Destination Protocol Port range
All ID of the security group for the SAP application server TCP 8000-8197
WD_LB_Security_Group

WD_LB_Security_Group is configured as follows to allow the following inbound access to the load balancer for SAP Web Dispatcher servers.

Deployment type Source Protocol Port range
All Input TCP 1-65535

WD_LB_Security_Group is configured as follows to allow the following outbound access from the load balancer for SAP Web Dispatcher servers.

Deployment type Destination Protocol Port range
All ID of the WD_Security_Group all 8000-8097
All ID of the WD_LB_Security_Group all 1-65535

Connectivity to external systems and users

CIDR/IP address and security group entries are entered in the infrastructure configuration. This allows access to SAP systems by front end users and upstream/downstream systems that are running in that CIDR block, or by end users (IP address) or systems assigned to those security groups. Port ranges are included in the rule definition that allow inbound access so that you can reuse the infrastructure configuration and deploy SAP systems with an instance number 00 to 99. Each entry in the outbound and inbound communication rules for a database security group, created either by the service or provided by the user, are updated as follows.

Source Protocol Port Range
Input

TCP

22
Input

TCP

1128 - 1129
Input

TCP

4300 - 4399
Input

TCP

8000 - 8099
Input

TCP

8443
Input

TCP

30013 - 39913
Input

TCP

30015 - 39915
Input

TCP

30017 - 39917
Input

TCP

30041 - 39941
Input

TCP

30044 - 39944
Input

TCP

50013 - 59914

Each entry in the outbound and inbound communication rules for the application security group, created either by the service or by the user, are updated as follows.

Source Protocol Port Range
Input

TCP

22
Input

TCP

3200 - 3399
Input

TCP

8080
Input

TCP

8443
Input

TCP

3600-3699
Input TCP 4237
Note
  • When the deployment is complete, you can update the security group information by adjusting the port range and source information.

  • Launch Wizard considers a security group that it created as a shared resource. It does not delete the security group if you delete a deployment or if a deployment is rolled back.