diff --git a/app/forms/firewall-rules-create.tsx b/app/forms/firewall-rules-create.tsx index a6a6499b1f..689c9f2771 100644 --- a/app/forms/firewall-rules-create.tsx +++ b/app/forms/firewall-rules-create.tsx @@ -228,6 +228,12 @@ export const CommonFields = ({ error, control }: CommonFieldsProps) => { label="Direction of traffic" column control={control} + description={ + <> + An inbound rule applies to traffic to the targets, while an outbound + rule applies to traffic from the targets. + + } items={[ { value: 'inbound', label: 'Inbound' }, { value: 'outbound', label: 'Outbound' }, @@ -247,7 +253,15 @@ export const CommonFields = ({ error, control }: CommonFieldsProps) => {

Targets

+ Targets determine the instances to which this rule applies. You can target + instances directly by name, or specify a VPC, VPC subnet, IP, or IP subnet, + which will apply the rule to traffic going to all matching instances. Targets + are additive: the rule applies to instances matching{' '} + any target. + + } /> {/* TODO: make ListboxField smarter with the values like RadioField is */} { + Filters reduce the scope of this rule. Without filters, the rule applies to all + traffic to the targets (or from the targets, if it’s an outbound rule). + With multiple filters, the rule applies to traffic matching{' '} + all filters. + + } />
@@ -349,7 +370,7 @@ export const CommonFields = ({ error, control }: CommonFieldsProps) => { Port filters - A single port (1234) or a range (1234–2345) + A single destination port (1234) or a range (1234–2345) {

Host filters

+ + Host filters match the “other end” of traffic from the + target’s perspective: for an inbound rule, they match the source of + traffic. For an outbound rule, they match the destination. + + } + />