Updated on 2025-08-06 GMT+08:00
Security Group Usage Guidelines
Security Groups and Security Group Rules
- What Is a Security Group?
- What Are Security Group Rules?
- Default Security Groups
- How Security Groups Work
- How Traffic Matches Security Group Rules
- Constraints on Using Security Groups
Common Ports Used by Security Groups
Learn common ports to determine whether to enable the ports based on site requirements.
Here are some common security group configuration examples for different scenarios, including remote login to ECSs, website access, network connectivity test, and internal communications between instances in different security groups.
- Allowing Traffic from Given IP Addresses or Security Groups
- Allowing Traffic from a Virtual IP Address
- Allowing Communications Between Instances in Two VPCs Connected by a VPC Peering Connection
- Remotely Logging In to an ECS from a Local Server
- Remotely Connecting to an ECS from a Local Server to Upload or Download Files over FTP
- Setting Up a Website on an ECS to Provide Internet-Accessible Services
- Using ping Command to Verify Network Connectivity
- Enabling Communications Between Instances in Different Security Groups
- ECS Providing Database Access Service
- What Are the Differences Between Security Groups and Network ACLs?
- How Can I Change the Security Group of an ECS?
- Why Is Outbound Access on TCP Port 25 Blocked?
- How Do I Know the Instances Associated with a Security Group?
- Why Can't I Delete a Security Group?
- Why Do My Security Group Rules Not Take Effect?
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
The system is busy. Please try again later.
For any further questions, feel free to contact us through the chatbot.
Chatbot