# Edit Security Firewall Rule

This guide explains how to edit an existing Security Firewall Rule.

* On the **Security** page, locate the security configuration that you want to modify. In the **Action** column, click **More**, then select **Edit**.

<figure><img src="https://2882153758-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fi9YWb69HFXLHYlXffReU%2Fuploads%2FcPQ6D74MsvpwirLnCKCi%2Fimage.png?alt=media&#x26;token=a4b66b34-bdbb-4a9e-937d-1faef00dabf9" alt=""><figcaption></figcaption></figure>

* Update the required information in the available fields, such as **Name**, **Description**, **Inbound Rule**, or **Outbound Rule**, according to your needs.

<table><thead><tr><th width="214">Column</th><th>Description</th></tr></thead><tbody><tr><td><strong>Name</strong></td><td>The name of firewall rules</td></tr><tr><td><strong>Description</strong></td><td>Description of the security configuration.</td></tr><tr><td><strong>Inbound Rule</strong></td><td>Define the traffic allowed to the instance on which ports and from which sources</td></tr><tr><td><strong>Outbound Rule</strong></td><td>Define the traffic allowed to leave the instance on which ports and to which destionations</td></tr><tr><td><strong>Protocol type</strong></td><td>Supported protocols are:<br>- SSH<br>- HTTP<br>- HTTPS<br>- Custom TCP Rule, you can customize tcp rules and define specific ports according to your needs<br>- Custom UDP Rule, you can cuztomize udp rules and define spesific ports according to your needs<br>- All ICMP Rule</td></tr><tr><td><strong>Ether type</strong></td><td>Types of IP address, choose IPv4 or IPv6</td></tr><tr><td><strong>Port Range</strong></td><td>For the custom tcp and udp protocols rule, you can specify:<br>- A <strong>single port</strong><br>- A <strong>range of ports</strong> by entering the starting and ending ports, eg. 3000-4000<br>- <strong>All ports</strong> by leaving the field blank</td></tr><tr><td><strong>Source</strong></td><td>For inbound rules, which lets you restrict the source of incoming connections by entering the individual IP address or entering a CIDR. for example, enter the CIDR 182.23.45.0/24 to a rule that allows incoming traffic from any IP address between 182.23.45.0 and 182.23.45.255. or leave the field blank if you want to allow it from any source.</td></tr><tr><td><strong>Destination</strong></td><td>For outbound rules, which lets you restrict the destionation of outgoing connections by entering individual IP address or entering CIDR or leave the field blank if you want to allow it to any destination</td></tr><tr><td><strong>Applied to Instances</strong></td><td>Choose a specific instance to that you want to apply the rule.</td></tr></tbody></table>

* Click the **Save** button to apply the changes, or click the **Cancel** button if you do not want to continue the process.

<figure><img src="https://2882153758-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fi9YWb69HFXLHYlXffReU%2Fuploads%2F99mTbJlA9vvlS5tRoJ3D%2Fimage%20(1).png?alt=media&#x26;token=15b6072b-512c-45bd-88bb-ebc81c16a080" alt=""><figcaption></figcaption></figure>

* A notification will appear displaying the message "**Security has successfully updated**".

<figure><img src="https://2882153758-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fi9YWb69HFXLHYlXffReU%2Fuploads%2F2V6Shjf5OgGC9kp1xigM%2Fimage%20(2).png?alt=media&#x26;token=3e5efccb-a4d0-4341-b772-51198daef70d" alt=""><figcaption></figcaption></figure>
