Anchor | ||||
---|---|---|---|---|
|
Include Page | ||||
---|---|---|---|---|
|
...
A security list acts as a virtual firewall for an instance. It has ingress and egress rules that specify the types of traffic allowed in and out. Security lists are defined at the subnet level. Therefore, all VNICs in a given subnet are subject to the same set of security lists.
...
Please see the relevant Oracle documentation for more information and configuration detail.
Traffic is allowed if any rule in any of the relevant lists and groups allows the traffic. Traffic is also allowed if it is the response traffic of a permitted tracked connection.
...
The file permissions of the private key file must be set such that the file is only readable by the user.
There are several ways to connect to your Charon-SSP cloud instance using this basic SSH protocol access. Some of them are described in the following sections below:
...