Security Groups for Teradata Database

When configuring a security group for the Teradata Database, set up the port ranges listed below for each Teradata Database instance so the Teradata Database can be locked down to the local host. Port 1025 is blocked in the local instance until the dbc password is changed.

If you are using NTP, ensure the VPC ACL setting is not blocking UDP port 123 for both inbound and outbound traffic.

When launching a Teradata Database MPP instance using CloudFormation, add the private IP addresses of Teradata software instances to the public security group of the Teradata Database instance for any TCP port ranges you are using from 0 - 65535. For CloudFormation, you accomplish this by adding the private IP addresses of the following software instances to the Remote Access From parameter of the Teradata Database instance. For a Manual Launch, add the private IP addresses of the software instances when you configure the security group.
  • Teradata Data Mover
  • Teradata Data Stream Controller
  • Teradata Ecosystem Manager
  • Teradata REST
  • Teradata Viewpoint
Software Direction Protocol Port Range Description
Teradata Database Inbound
  • TCP
  • TCP
  • 22
  • 1025
  • SSH
  • Teradata Database Service to AWS
Teradata Database Outbound TCP
  • 123
  • NTP

results matching ""

    No results matching ""