Running CFDDFC with the AWS Console
- Configure a Security Group
- Create an SSH Key Pair
- Launch an Instance
- Connect to an Instance
- Using OpenFOAM on an Instance
- Data Transfer to an Instance
- Connect with the Remote Desktop (“Classic” CFDDFC)  or
Connect with the Web Browser Remote Desktop (Web CFDDFC)
- Data Storage
- Creating a Cluster of Instances
Problem with these instructions? Please send a CFDDFC Support Query.
Security Group Overview
A security group acts as a virtual firewall for EC2 instances which controls incoming and outgoing traffic. Inbound rules control the incoming traffic to an instance, and outbound rules control the outgoing traffic from an instance. Users must configure a security group with inbound rules that provide access to their instances running CFDDFC. Security groups are specific to the region selected within EC2. This page describes the configuration of one or more security groups that can be reused for the instances they launch.
Security Group Configuration
- Login to the Amazon EC2 Console.
- Select the region you wish to launch your instance (see drop-down menu, top right of the panel).
- From the left menu, select Security Groups.
- Click Create Security Group.
- Under Security Group Name, enter
CFDDFC(or something similarly relevant).
- Under Description, enter “
Access CFDDFC” (or something similarly memorable).
Inbound Rule for SSH connections
- Under Inbound Rules, click Add Rule.
- From the Type menu, select SSH which opens traffic on port 22.
- From the Source menu, the user can choose from the following two options.
- Either Anywhere IPv4 which supports connections from computers with any public IP address.
- Or My IP, which restricts connections only to the user’s current public IP address, displayed in CIDR notation as
Note: Anywhere IPv4 is not insecure since all connections still require authentication, e.g. using key-pairs.
Inbound Rule for Browser Desktop with Web CFDDFC
- With Web CFDDFC, the Browser Desktop connects via port 8443.
- To use the Browser Desktop, click Add Rule.
- Use Custom Rule and under Port Range enter
- From the Source menu, choose the IP range as in the SSH Rule above.
- With the Rules set, click Create Security Group at the bottom of the screen.
- If necessary, the Security Group can be edited at any time to modify the Rules.
See the Amazon EC2 security groups for Linux instances.