Help Center> Cloud Container Engine> FAQs> Networking> Security Hardening> How Do I Prevent Cluster Nodes from Being Exposed to Public Networks?
Updated on 2022-08-15 GMT+08:00
How Do I Prevent Cluster Nodes from Being Exposed to Public Networks?
- If access to port 22 of a cluster node is not required, you can define a security group rule that disables access to port 22.
- Do not bind an EIP to a cluster node unless necessary.
If remote login to a cluster node is required, you are advised to use Cloud Bastion Host (CBH) as the transit node to connect to the cluster node.
Security Hardening FAQs
Was this page helpful?Provide feedback
Thank you very much for your feedback. We will continue working to improve the documentation.
The system is busy. Please try again later.
For any further questions, feel free to contact us through the chatbot.Chatbot