Detailed explanation of Alibaba Cloud security rule configuration

Detailed explanation of Alibaba Cloud security rule configuration

Two days ago, I took advantage of the Double 11 shopping festival and bought an ECS (server) on Alibaba Cloud. I just configured an nginx and tried to access it as shown below, but found that it could not be accessed.

It turns out that Alibaba Cloud Server needs to configure security rules for security reasons. If you do not set security rules for the port, the browser cannot access it.

So how exactly are security rules configured? See below for details:

(1) Log in to Alibaba Cloud, find [Cloud Server ECS], and click;

(2) Click the number behind the cloud server;

(3) Click [Security Group], find [Configuration Rules] for the corresponding server instance, and click;

(4) Click [Add security group rule]

(5) We take port 80 as an example to configure so that all IP addresses can access port 80;

(6) Then after a while of configuration, one more rule can be added.

(7) At this point, our nginx can be accessed.

The above is the full content of this article. I hope it will be helpful for everyone’s study. I also hope that everyone will support 123WORDPRESS.COM.

You may also be interested in:
  • Alibaba Cloud Linux Server Security Settings (Firewall Policy, etc.)
  • Alibaba Cloud Windows Server Security Settings (Firewall Policy)
  • How to use iptables to set security policies on Alibaba Cloud Linux servers
  • How to use Alibaba Cloud Shield Web Security Defense (WAF) (picture and text)

<<:  MySQL 5.7.23 decompression version installation tutorial with pictures and text

>>:  Complete example of Vue encapsulating the global toast component

Recommend

VUE+Canvas implements the game of God of Wealth receiving ingots

Welcome to the previous canvas game series: 《VUE ...

Windows 10 is too difficult to use. How to customize your Ubuntu?

Author | Editor Awen | Produced by Tu Min | CSDN ...

HTML form and the use of form internal tags

Copy code The code is as follows: <html> &l...

Docker image import and export code examples

Import and export of Docker images This article i...

MySQL uses find_in_set() function to implement where in() order sorting

This article introduces a tutorial about how to u...

How to add a certificate to docker

1. Upgrade process: sudo apt-get update Problems ...

Linux implements the source code of the number guessing game

A simple Linux guessing game source code Game rul...

Solution to 1290 error when importing file data in mysql

Error scenario Use the mysql command in cmd to ad...

Management of xinetd-based services installed with RPM packages in Linux

Table of contents Preface 1. Startup management b...

Summary of Mysql-connector-java driver version issues

Mysql-connector-java driver version problem Since...

Docker5 full-featured harbor warehouse construction process

Harbor is an enterprise-level registry server for...

How to use DPlayer.js video playback plug-in

DPlayer.js video player plug-in is easy to use Ma...

Solutions to MySQL batch insert and unique index problems

MySQL batch insert problem When developing a proj...