Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Typical application example of security group rule SSH,RDP,ping,FTP

2025-01-17 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/02 Report--

This article shares with you the content of a typical application example of the security group rule SSH,RDP,ping,FTP. The editor thought it was very practical, so I shared it with you as a reference. Let's follow the editor and have a look.

Typical Application of Security Group rules

This paper introduces the typical application of security group rules. The document applies to both classic network and VPC network instances. For more information on how to add security group rules, please refer to the document: add security group rules.

Typical applications listed in this article include:

SSH remote connection to Linux instance

RDP remote connection to Windows instance

Public network ping ECS instance

ECS instance acts as Web server

Upload or download files using FTP

SSH remote connection to Linux instance

After the Linux ECS instance is created, you need to add the following security group rules in order for SSH to remotely connect to the ECS instance:

RDP remote connection to Windows instance

After the Windows ECS instance is created, you need to add the following security group rules in order for RDP to remotely connect to the ECS instance:

Public network ping ECS instance

After creating ECS instances, in order to test the communication between ECS instances using ping program, you need to add the following security group rules:

ECS instance acts as Web server

If the instance you create is used as a Web server, you need to install the Web server program on the instance and add the following security group rules.

Description

You need to start the Web server program before checking whether port 80 is working properly. For specific operation, please refer to the document: check whether TCP port 80 is working properly.

If your instance cannot be accessed through the http:// public network IP address, please refer to check whether TCP port 80 is working properly.

Upload or download files using FTP

If you need to upload or download files to the ECS instance using FTP software, you need to add the following security group rules:

Description

You need to install the FTP server program on the instance first, and then check to see if port 20 Universe 21 is working properly. To install the FTP server program, you can refer to the documentation: installation, configuration and use of FTP services under CVM ECS.

Thank you for reading! This is the end of the typical application examples of security group rules SSH,RDP,ping,FTP. I hope the above content can be helpful to you, so that you can learn more knowledge. If you think the article is good, you can share it and let more people see it.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report