This chapter shows example security group rule settings for controller nodes and compute nodes. Change the configuration according to your system configuration and security policy.