Search: "udp"
[Vulnerability notice] Memcached UDP port reflection attack vulnerability - Security Advisories Documentation
initiate malicious attacks on the Internet. If customers enable UDP by default without configuring access control, this ...
Add a UDP listener - Server Load Balancer Documentation
real-time financial quotations. You can add a UDP listener to forward requests from the UDP protocol. Limits ...
Interfaces for UDP - IoT Platform Documentation
You can build an access service which uses UDP transmission protocol and bridge it to Alibaba Cloud IoT Platform ...
Getting to Know Dockerfile Instructions: Part 2 blog
EXPOSE instruction declares the ports the container listens on. You can state whether the port listens on the TCP or UDP ...
Harden NFS service - Security Advisories Documentation
INPUT -i eth0 -p UDP -s 192.168.0.0/24 --dport 111 -j ACCEPTiptables -A INPUT -i eth0 -p TCP -s 140.0.0.0/8 --dport 111 -j ...
Configure Layer-4 SLB listeners - Server Load Balancer Documentation
, remote logon, and web applications without special requirements. UDP protocol A non-connection-oriented protocol. Before ...
Building Robust IoT Networks with AliOS Things blog
, OCF, Google Weave, and HomeKit. However, we will not discuss this topic at length at this time. ## UDP Network There are two ...
Configuration Instructions Forums
(TCP and UDP) and Layer-7 (HTTP and HTTPS) protocols. Ports: In a Server Load Balancer instance offering external or internal ...
Link testing tool for ping packet loss or ping failure - Elastic Compute Service Documentation
packets to a target IP address using Internet Protocol (IP). Traceroute firstly sends UDP testing packets whose maximum Time To Live ...