User guide

5. In the Add Connection Type dialog, do one of the following:
a. Add an ingress rule based on CIDR/IP.
In the Connection Type box, click CIDR/IP.
In the CIDR/IP to Authorize box, specify the range.
Click Authorize.
b. Add an ingress rule based on an EC2 Security Group.
Under Connection Type, select EC2 Security Group.
Select the AWS account to use. By default, the account currently logged into the console is
used. If you select Another account, you must specify the AWS account ID.
Click the name of the EC2 security group you want in the EC2 Security Group Name box.
Click Authorize.
API Version 2012-12-01
48
Amazon Redshift Management Guide
Managing Ingress Rules for a Cluster Security Group