Security groups in AWS Launch Wizard for SAP
This section describes the security groups that Launch Wizard for SAP creates and assigns to the database and application instances. It also describes how the entries in the outbound and inbound communication rules for database and application security groups are updated.
Security groups
A security group acts as a virtual firewall that controls the traffic for one or more instances. When you allow Launch Wizard to create security groups, it creates a set of security groups and assigns them to the SAP database and application instances to allow for inbound traffic. Security groups use the following naming conventions:
-
<Infrastructure_Configuration_Name>_App_SecurityGroup
-
<Infrastructure_Configuration_Name>_DB_SecurityGroup
-
WD_Security_Group
-
WD_LB_Security_Group
<Infrastructure_Configuration_Name>_App_SecurityGroup
<Infrastructure_Configuration_Name>_App_SecurityGroup
is
configured as follows to allow inbound access to the database servers.
Source | Protocol | Port Range |
---|---|---|
All instances attached to this security group | all | |
All instances attached to the DB security group |
TCP |
1-65535 |
This configuration allows:
-
inbound communication on all TCP ports from all of the SAP application servers deployed using the same configuration name
-
inbound communication on all TCP ports from all of the database servers deployed using the same configuration name.
<Infrastructure_Configuration_Name >_DB_SecurityGroup
<Infrastructure_Configuration_Name>_DB_SecurityGroup
is configured
as follows to allow inbound access to the database servers.
Source | Protocol | Port Range |
---|---|---|
All instances attached to this security group | all | |
All instances attached to the App security group |
TCP |
1-65535 |
All instances attached to the App security group | UDP | 111 |
All instances attached to the App security group | UDP | 2049 |
All instances attached to the App security group | UDP | 4000-4002 |
This configuration allows:
-
inbound communication on all TCP ports from all of the SAP database servers deployed using the same configuration name.
-
inbound communication on all TCP ports from all of the SAP application servers deployed using the same configuration name.
-
inbound communication on UDP 111,2049 and 4000 to 4002 from all the SAP application servers deployed using the same configuration name.
WD_Security_Group
WD_Security_Group
is configured as follows to allow inbound access to
SAP Web Dispatcher servers.
Deployment type | Source | Protocol | Port range |
---|---|---|---|
All | ID of the WD_Security_Group | all | 1-65535 |
All | Input | TCP | 1-65535 |
Distributed instances deployment | ID of the security group for the SAP transport directory | TCP | 2049 |
High availability (HA) deployment | ID of the security group for the SAP transport directory in Availability Zone 1 | TCP | 2049 |
High availability (HA) deployment | ID of the security group for the SAP transport directory in Availability Zone 2 | TCP | 2049 |
WD_Security_Group
is configured as follows to allow the following
outbound access from SAP Web Dispatcher servers.
Deployment type | Destination | Protocol | Port range |
---|---|---|---|
All | ID of the security group for the SAP application server | TCP | 8000-8197 |
WD_LB_Security_Group
WD_LB_Security_Group
is configured as follows to allow the following
inbound access to the load balancer for SAP Web Dispatcher servers.
Deployment type | Source | Protocol | Port range |
---|---|---|---|
All | Input | TCP | 1-65535 |
WD_LB_Security_Group
is configured as follows to allow the following
outbound access from the load balancer for SAP Web Dispatcher servers.
Deployment type | Destination | Protocol | Port range |
---|---|---|---|
All | ID of the WD_Security_Group | all | 8000-8097 |
All | ID of the WD_LB_Security_Group | all | 1-65535 |
Connectivity to external systems and users
CIDR/IP address and security group entries are entered in the infrastructure configuration. This allows access to SAP systems by front end users and upstream/downstream systems that are running in that CIDR block, or by end users (IP address) or systems assigned to those security groups. Port ranges are included in the rule definition that allow inbound access so that you can reuse the infrastructure configuration and deploy SAP systems with an instance number 00 to 99. Each entry in the outbound and inbound communication rules for a database security group, created either by the service or provided by the user, are updated as follows.
Source | Protocol | Port Range |
---|---|---|
Input |
TCP |
22 |
Input |
TCP |
1128 - 1129 |
Input |
TCP |
4300 - 4399 |
Input |
TCP |
8000 - 8099 |
Input |
TCP |
8443 |
Input |
TCP |
30013 - 39913 |
Input |
TCP |
30015 - 39915 |
Input |
TCP |
30017 - 39917 |
Input |
TCP |
30041 - 39941 |
Input |
TCP |
30044 - 39944 |
Input |
TCP |
50013 - 59914 |
Each entry in the outbound and inbound communication rules for the application security group, created either by the service or by the user, are updated as follows.
Source | Protocol | Port Range |
---|---|---|
Input |
TCP |
22 |
Input |
TCP |
3200 - 3399 |
Input |
TCP |
8080 |
Input |
TCP |
8443 |
Input |
TCP |
3600-3699 |
Input | TCP | 4237 |
Note
-
When the deployment is complete, you can update the security group information by adjusting the port range and source information.
-
Launch Wizard considers a security group that it created as a shared resource. It does not delete the security group if you delete a deployment or if a deployment is rolled back.