To ensure the security and stability of Lindorm, the system prevents devices from accessing Lindorm instances by default. Before you use a Lindorm instance, configure a whitelist for the instance to allow external devices to access the instance. The security of Lindorm instances can be enhanced if you properly configure whitelists. We recommend that you maintain your whitelists on a regular basis.
Before you begin
Before you configure an IP whitelist for a Lindorm instance, obtain the IP addresses
of the clients from which you want to allow access to the instance based on the installation
locations.
Client installation location | Network type | How to obtain the IP address of a client |
---|---|---|
(Recommended) Elastic Compute Service (ECS) instance | Virtual private cloud (VPC) | Check the IP address of the ECS instance. For more information, see How do I query the IP addresses of ECS instances? Note Make sure that the ECS instance and the Lindorm instance reside in the same VPC.
|
On-premises device | Internet | Select one of the following methods based on the operating system of the on-premises
device:
|