Port Protection
You can build access rules to control the port and inbound or outbound protocol to ensure host security based on your needs.
Layer Management
You can configure different subnets under the same VPC through network layer management by setting firewall rules.
Flexible Configuration
Security Group policy can give different priorities to achieve the exact matching rules. Configuration can instantly take effect to give you flexibility.
Security Group can control the network security and access control to a cloud platform site by setting the firewall rules and policies, which can effectively prevent illegal access. The cloud platform provides your every VPC independent Security Group. You can flexibly configure the Security Group rules and match inbound and outbound traffic on the subnet. Traffic that meets the access rules can be received and sent as usual. Deploy a Security Group at the existence of the internet to block illegal traffic and behavior on the internet. It serves as an active network filter, allowing access to specific ports during the deployment of a website while effectively blocking access to others.
Common Application
Security Group can control the network security and access control to a cloud platform site by setting the firewall rules and policies, which can effectively prevent illegal access. The cloud platform provides your every VPC independent Security Group. You can flexibly configure the Security Group rules and match inbound and outbound traffic on the subnet. Traffic that meets the access rules can be received and sent as usual. Deploy a Security Group at the existence of the internet to block illegal traffic and behavior on the internet. It serves as an active network filter, allowing access to specific ports during the deployment of a website while effectively blocking access to others.
High-performance Protection
The firewall using efficient NFV technology independent of the host, the goal of excellent performance, low resource consumption, and more secure protection.
Simple Operation
The Security Group integrates with our intuitive UI and its configuration takes immediate effect.