Search: "udp"
[Vulnerability notice] Memcached UDP port reflection attack vulnerability - Security Advisories Documentation
initiate malicious attacks on the Internet. If customers enable UDP by default without configuring access control, this ...
Add a UDP listener - Server Load Balancer Documentation
real-time financial quotations. You can add a UDP listener to forward requests from the UDP protocol. Limits ...
Interfaces for UDP - IoT Platform Documentation
You can build an access service which uses UDP transmission protocol and bridge it to Alibaba Cloud IoT Platform ...
Troubleshoot the health check exception of a Layer-4 listener (TCP/UDP) - Server Load Balancer Documentation
check configurations. This topic describes how to troubleshoot a health check exception of a Layer-7 (TCP/UDP) listener ...
Getting to Know Dockerfile Instructions: Part 2 blog
EXPOSE instruction declares the ports the container listens on. You can state whether the port listens on the TCP or UDP ...
Harden NFS service - Security Advisories Documentation
INPUT -i eth0 -p UDP -s 192.168.0.0/24 --dport 111 -j ACCEPTiptables -A INPUT -i eth0 -p TCP -s 140.0.0.0/8 --dport 111 -j ...
Configure Layer-4 SLB listeners - Server Load Balancer Documentation
, remote logon, and web applications without special requirements. UDP protocol A non-connection-oriented protocol. Before ...
Health check overview - Server Load Balancer Documentation
connection errors caused by access of the SLB IP address. Health check of UDP listeners ...
Building Robust IoT Networks with AliOS Things blog
, OCF, Google Weave, and HomeKit. However, we will not discuss this topic at length at this time. ## UDP Network There are two ...