Detailed explanation of Alibaba Cloud security rule configuration

Detailed explanation of Alibaba Cloud security rule configuration

Two days ago, I took advantage of the Double 11 shopping festival and bought an ECS (server) on Alibaba Cloud. I just configured an nginx and tried to access it as shown below, but found that it could not be accessed.

It turns out that Alibaba Cloud Server needs to configure security rules for security reasons. If you do not set security rules for the port, the browser cannot access it.

So how exactly are security rules configured? See below for details:

(1) Log in to Alibaba Cloud, find [Cloud Server ECS], and click;

(2) Click the number behind the cloud server;

(3) Click [Security Group], find [Configuration Rules] for the corresponding server instance, and click;

(4) Click [Add security group rule]

(5) We take port 80 as an example to configure so that all IP addresses can access port 80;

(6) Then after a while of configuration, one more rule can be added.

(7) At this point, our nginx can be accessed.

The above is the full content of this article. I hope it will be helpful for everyone’s study. I also hope that everyone will support 123WORDPRESS.COM.

You may also be interested in:
  • Alibaba Cloud Linux Server Security Settings (Firewall Policy, etc.)
  • Alibaba Cloud Windows Server Security Settings (Firewall Policy)
  • How to use iptables to set security policies on Alibaba Cloud Linux servers
  • How to use Alibaba Cloud Shield Web Security Defense (WAF) (picture and text)

<<:  MySQL 5.7.23 decompression version installation tutorial with pictures and text

>>:  Complete example of Vue encapsulating the global toast component

Recommend

Basic usage and pitfalls of JavaScript array sort() method

Preface In daily code development, there are many...

Detailed explanation of the process of using docker to build minio and java sdk

Table of contents 1minio is simple 2 Docker build...

MySQL Series 7 MySQL Storage Engine

1. MyISAM storage engine shortcoming: No support ...

Detailed explanation of Vue development website SEO optimization method

Because the data binding mechanism of Vue and oth...

VUE implements token login verification

This article example shares the specific code of ...

Implementation of Docker deployment of Django+Mysql+Redis+Gunicorn+Nginx

I. Introduction Docker technology is very popular...

Some notes on mysql self-join deduplication

Let me briefly explain the functional scenario: T...

How to change the mysql password on the Xampp server (with pictures)

Today, I found out while working on PHP that if w...

How to lock a virtual console session on Linux

When you are working on a shared system, you prob...

Analysis of the process of implementing Nginx+Tomcat cluster under Windwos

Introduction: Nginx (pronounced the same as engin...

MySQL data duplicate checking and deduplication implementation statements

There is a table user, and the fields are id, nic...

An article to understand Linux disks and disk partitions

Preface All hardware devices in the Linux system ...