Search: "esc protocol"
Use the same protocol as the back-to-source protocol - Dynamic Route for CDN Documentation
Introduction When this feature is used, the client protocol for origin fetch is consistent with the protocol for accessing resources. That is, if a client uses HTTPS to request a resource, when the resource is not cached on the ...
Protocol Whitelist Configuration - Game Shield Documentation
This article describes the protocol whitelist configuration. 1. Introduction of protocol whitelist In general, a connection flood protection against the TCP protocol is made by limiting the speed of a single-IP connection ...
Establish communication over the HTTP protocol - IoT Platform Documentation
Descriptions: The description of communication over the HTTP protocol is as follows: The HTTP server endpoint = https://iot-as-http.cn-shanghai.aliyuncs.com. Only the HTTPS protocol is supported. Before ...
SMB protocol limits - NAS Documentation
NAS supports the SMB protocol. However, you must pay attention to some limits. Introduction Server is an application-layer communication protocol used to access files, printers, and other shared resources on networks. The SMB ...
NFS protocol limits - NAS Documentation
currently does not support Delegation. Issues concerning UID and GID For the NFSv3 protocol, if the file displayed directly. For the NFSv4 protocol, if the version of the local Linux kernel is earlier than 3.0, the UID and ...
Alink Protocol - IoT Platform Documentation
connections from devices to IoT Platform using Alink protocol. Alink protocol is a data exchange standard for IoT development String Protocol version. Currently, the value can only be 1.0. params List ...
Back-to-origin with the Same Protocol - Alibaba Cloud CDN Documentation
Introduction When the back-to-source with the same protocol feature is enabled, back-to-source requests for resources uses the same protocol used by the client in order to request resources. If the client makes an HTTPS request ...
Glossary - General Reference Documentation
consumed write throughput exceeds the reserved read throughput. The statistical period is one second. Address Resolution Protocol MySQL protocol, including metadata information. AnalyticDB easily integrates into your business ecosystem to allow you to discover ...
SAP NetWeaver Implementation Guide - SAP Documentation
policy, the Drop rule takes priority over the Allow rule. Protocol Type and Port Range The port range setting is affected by the selected protocol type. SAP requires access to certain ports, so add firewall rules to allow access to the ports outlined by ...