Security for login nodes
Login nodes inherit the AllowedIPs settings AllowedIps
from the head node, unless AllowedIps is specified for the login node pool. In this manner, cluster administrators can restrict the security posture of the cluster by specifying the source CIDR or a prefix list from where SSH connections are allowed on either the head node or a pool of login nodes.
In the present implementation the access to the head node is not automatically restricted when enabling login nodes. If needed, a cluster administrator can restrict this access updating the
head nodes ssh configuration using standard Linux commands. This can be also be accomplished by specifying custom Security Groups on the head node by using the
AdditionalSecurityGroups setting in the head node section of the ParallelCluster YAML file to deny connections from unauthorized users.