Elastic Desktop Service (EDS) Enterprise provides secure and controlled network access for cloud computers. It offers public bandwidth to ensure reliable connectivity while employing advanced security measures to protect against both external and internal threats. Additionally, EDS Enterprise enforces granular access control through security group policies and domain name restrictions, enabling precise management of user network permissions to meet enterprise office security requirements.
01 Network access
1.1 Security group policies
EDS Enterprise provides administrators with security group policies to control network access permissions for organizational cloud computers. These policies comprise custom rules that mirror Elastic Compute Service security group rules, allowing configuration of traffic direction (inbound or outbound), authorization actions (allow or deny), priority levels, protocol types, port ranges, authorized objects (IPs or CIDR blocks), and rule description. By strategically combining rules with different scopes and priorities, administrators can implement precise whitelist controls to restrict network access as needed.
You can configure security group rules to control inbound and outbound traffic for cloud computers based on your business requirements. The following scenarios provide sample configurations for security group rules:
Scenario 1
By default, cloud computers allow all outbound access. You can configure outbound access rules to restrict connections to specific IP addresses.
Rule 1: Deny all outbound access. Sample configurations:
Direction
Authorization
Priority
Protocol type
Port range
Authorization object
Outbound
Deny
2
All
-1/-1
0.0.0.0/0
Rule 2: Allow access to specific IP addresses based on Rule 1. This rule must have a higher priority than Rule 1. Sample configurations:
Direction
Authorization
Priority
Protocol type
Port range
Authorization object
Outbound
Allow
1
Select a protocol type.
Specify a port range.
The CIDR block that cloud computers can access. Example: 192.168.1.1/32.
Scenario 2
In enterprise private network environments such as virtual private clouds (VPCs), you can configure inbound rules to allow access to cloud computers from specific IP addresses. Sample configurations:
Direction | Authorization | Priority | Protocol type | Port range | Authorization object |
Inbound | Allow | 1 | Select a protocol type. | Specify a port range. | The CIDR block from which cloud computers can be accessed. Example: 192.168.1.1/32. |
Scenario 3
Cloud Computers A and B are associated with Policies 1 and 2, respectively. By default, cloud computers in VPC environments deny all inbound access, preventing communication between Cloud Computers A and B. To enable access between them, you can add the following inbound rules to Policies 1 and 2.
Add the following inbound rule to Policy 1 to allow access from Cloud Computer B: Sample configurations:
Direction
Authorization
Priority
Protocol type
Port range
Authorization object
Inbound
Allow
1
Select a protocol type.
Specify a port range.
The IP address of Cloud Computer B.
Add the following inbound rule to Policy 2 to allow access from Cloud Computer B. Sample configurations:
Direction
Authorization
Priority
Protocol type
Port range
Authorization object
Inbound
Allow
1
Select a protocol type.
Specify a port range.
The IP address of Cloud Computer A.
|
1.2 Domain name control
EDS Enterprise offers domain name control policies, enabling administrators to manage network access for organizational cloud computers through DNS rules. Unlike security group policies, these controls operate at the domain level, requiring only simple configuration of domain names (including wildcard *) and authorization actions (allow or deny). This approach significantly simplifies website and service access management while maintaining precise control.
For implementation, administrators can configure the DNS rules with specific domain names (as shown in the following table) to achieve granular control.
Domain name | Example | Access policy | Description |
Second-level domain name |
| Allow | Cloud computers can access |
Third-level domain name |
| Deny | When cloud computers attempt to access |
| Allow | Cloud computers can access | |
Fourth-level domain name |
| Deny | When cloud computers attempt to access |
| Allow | Cloud computers can access | |
| Allow |
|
02 Network boundaries
2.1 Cloud computer interoperability within office networks
Cloud computers operate within an automatically provisioned security group tied to their office networks (formerly workspaces). These resources have no visible IP addresses or open ports, with the security group to block all external traffic except Adaptive Streaming Protocol (ASP)-based connections from the streaming gateway. This is a fundamental, immutable security layer provided by EDS Enterprise.
By default, the security group prevents inter-cloud-computer communication, eliminating risks of cross-infection or internal attacks between compromised systems. Administrators can enable controlled access between specific cloud computers within their office networks, while implementing supplemental network policies to maintain security.
|