Search: "security control"
Use security groups to control ECS instances' access to public cloud for a VPC - Virtual Private Cloud Documentation
A security group is a virtual firewall that is used to control the ECS outbound and inbound traffic. Within the same VPC, ECS instances in the same security group can communicate with one another over the intranet. For more information, see Security ...
Access control - Virtual Private Cloud Documentation
control capabilities of each cloud product. For example, ECS instances use security groups to achieve access control, while SLB and RDS use whitelists to achieve access control. ECS security group A security group is a virtual firewall that ...
Create an IP access control (CreateIpControl) - API Gateway Documentation
DescriptionAdd an IP access control policy in a region to reject (or permit) API calls from specified IP addresses. This function is intended for API providers.An IP address access control policy is not effective until it is bound to an API. However, it ...
Add an IP access control policy (AddIpControlPolicyItem) - API Gateway Documentation
DescriptionAdd a policy to an existing IP access control. This function is intended for API providers.Once you add a policy, it is immediately effective for all the APIs bound to it.Each IP access control can have a maximum of 100 policies. Request ...
Modify an IP access control policy (ModifyIpControlPolicyItem) - API Gateway Documentation
DescriptionModify a policy under an IP access control. This function is intended for API providers.Once you add a policy, it IpControlId String Yes IP access control ID, which identifies a unique IP ...
Configure an access control list - Server Load Balancer Documentation
Server Load Balancer (SLB) provides you with the access control function. You can configure different access control rules (access whitelist or blacklist) for different listeners. Before configuring access control for listeners, you must ...
Access control - ApsaraDB for MongoDB Documentation
whitelistApsaraDB for MongoDB provides the IP whitelist to implement network security access control. Each MongoDB instance has MongoDB instance. Users can use the Data Security Module of the console or an API to add IP addresses. Updating the IP whitelist ...
Configuring Network Access Control List (NACL) on Alibaba Cloud - Alibaba Cloud Community Site
Security,Computing,Networking,Access Control List,Network ACL,Security Groups In this article, we will explore the similarities and differences of network access control lists (NACL) and security groups, as well as discuss how to set up network ACL on ECS instances. ...
Configure access control - Server Load Balancer Documentation
Server Load Balancer allows you to configure access control for listeners. You can configure different whitelists or blacklists for different listeners. You can configure access control when you create a listener or change access ...
Manage access control - Server Load Balancer Documentation
SLB provides you with the access control function. You can configure different whitelists or blacklists for different listeners. You can configure access control when addling listeners. For more information, see Configure a Layer-7 ...