检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn

不再显示此消息

  • Intl-English
    International
    • English
    • Bahasa Indonesia
    • Español
    • Português
    • Türkçe
    • عربي
    • ไทย
    • 简体中文
    • 日本語
    中国站
    • 简体中文
    Europe
    • English
    • Deutsch
    • Español
    • Français
    • Nederlands
  • Huawei Cloud
    • Activities
    • Products
    • Solutions
    • Pricing
    • KooGallery
    • Partners
    • Developers
    • Support
    • About Us
    Hot
    • Free Packages
    • Elastic Cloud Server (ECS)
    • Object Storage Service (OBS)
    • ModelArts
    • Cloud Container Engine (CCE)
      Show more results for “”
      • Contact Us
      • Documentation
      • Console
        • My Account
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Sign In Sign Up
      • Sign In
      • Sign Up
        • My Account Complete Sign Up
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Log Out
      Cancel
      Hot
      • Free Packages
      • Elastic Cloud Server (ECS)
      • Object Storage Service (OBS)
      • ModelArts
      • Cloud Container Engine (CCE)
        • All
        • Products
        • Solutions
        • Documentation
        • KooGallery
        • Developer
        • Learn
        • Others
        899 results found.
        • Configuring HA on SAP HANA Nodes - SAP Cloud

          Configuring HA on SAP HANA Nodes - SAP Cloud

          Use PuTTY to log in to the NAT server with an elastic IP address bound. Ensure that user root and the key file (.ppk file) are used for authentication. Then, use SSH to switch to the SAP HANA node that works as the active node.

          Help > SAP Cloud > SAP HANA User Guide (Single Node) > Deployment > Installing SAP HANA (Single-Node Deployment with HA Required)
        • Identity and Permissions Design - Cloud Adoption Framework

          Identity and Permissions Design - Cloud Adoption Framework

          Tenant Administrator permission for the logging account Tenant Guest for all other accounts Network management group Centrally deploy and manage enterprise network connection resources, such as Enterprise Router, Virtual Private Network (VPN), Direct Connect (DC), and NAT Gateway.

          Help > Cloud Adoption Framework > Cloud Adoption Framework and Practices > Top-Level Planning > Landing Zone Design > Landing Zone Reference Architecture
        • Application Association Survey - Cloud Adoption Framework

          Application Association Survey - Cloud Adoption Framework

          This may include configurations of DNS, ELB, NAT, and Nginx.conf. Parse configuration files: For each configuration file, you need to compile scripts or use existing tools to parse the content.

          Help > Cloud Adoption Framework > Cloud Adoption Framework and Practices > Surveys > Application System Survey
        • Installing and Configuring cloudeye-exporter - Cloud Eye

          Installing and Configuring cloudeye-exporter - Cloud Eye

          or ECS EVS SYS.EVS √ Config or EVS DCS SYS.DCS √ Config Direct Connect SYS.DCAAS √ Config Virtual Private Cloud SYS.VPC √ Config CSS SYS.ES √ Config RDS SYS.RDS √ Config ELB SYS.ELB √ ELB TaurusDB SYS.GAUSSDB √ Config GaussDB(for openGauss) SYS.GAUSSDBV5 √ GaussDB(for openGauss) NAT

          Help > Cloud Eye > User Guide > Access Center > Connecting to Prometheus or Grafana
        • Organization-level Reference Architecture - Well-Architected Framework

          Organization-level Reference Architecture - Well-Architected Framework

          Network management team Enterprise Router, Domain Name Service (DNS), NAT Gateway, Elastic IP (EIP), Virtual Private Cloud (VPC), Direct Connect, Cloud Connect, Virtual Private Network (VPN), Cloud Firewall (CFW), Web Application Firewall (WAF), and Anti-DDoS Service (AAD) SecMaster

          Help > Well-Architected Framework > Well-Architected Framework and Practices > Security Pillar > Reference Architecture
        • New Product Features

          New Product Features

          Cloud Backup and Recovery Storage Disaster Recovery Service Scalable File Service Volume Backup Service Cloud Server Backup Service Data Express Service Dedicated Distributed Storage Service Dedicated Enterprise Storage Service Virtual Private Cloud Elastic IP Elastic Load Balance NAT

          Others
        • What Can I Do If an On-Premises Cluster Fails to Be Connected? - Ubiquitous Cloud Native Service

          What Can I Do If an On-Premises Cluster Fails to Be Connected? - Ubiquitous Cloud Native Service

          Check Item 2: Network Connection Between the Cluster and UCS Public network access Check whether a public IP is bound to the cluster or a public NAT gateway is configured. Check whether the outbound traffic of the cluster security group is allowed.

          Help > Ubiquitous Cloud Native Service > FAQs > On-Premises Clusters
        • Creating an SAP HANA ECS - SAP Cloud

          Creating an SAP HANA ECS - SAP Cloud

          Ensure that the HANA ECSs/ECSs where SAP HANA, SAP HANA Studio, and NAT servers are to be deployed use the same key. Otherwise, SAP HANA installation will fail.

          Help > SAP Cloud > SAP HANA User Guide (Single Node) > Deployment > Creating ECSs
        • Data Collected - Migration Center

          Data Collected - Migration Center

          recommendations eipNum Number of EIPs Used for target recommendations elbNum Number of load balancers Used for target recommendations vpcNum Number of VPCs Used for target recommendations securityGroupNum Number of security groups Used for target recommendations natNum Number of NAT

          Help > Migration Center > Service Overview > Collection Security
        • Functions - Web Application Firewall

          Functions - Web Application Firewall

          NAT64 is an IPv6 conversion mechanism that enables communication between the IPv6 and IPv4 hosts using network address translation (NAT). WAF can convert an IPv4 source site to an IPv6 website and converts external IPv6 access traffic to internal IPv4 traffic.

          Help > Web Application Firewall > Service Overview
        • NodePort - Cloud Container Engine

          NodePort - Cloud Container Engine

          If the cluster forwarding mode is iptables, run the iptables -t nat -L command to view the port. If the cluster forwarding mode is IPVS, run the ipvsadm -Ln command to view the port.

          Help > Cloud Container Engine > User Guide > Networking > Services
        • Modifying Node Kernel Parameters - Cloud Container Engine

          Modifying Node Kernel Parameters - Cloud Container Engine

          In containers, enabling this parameter can prevent the bandwidth of TCP connections that have been translated using NAT from being limited.

          Help > Cloud Container Engine > User Guide > Nodes > Node O&M > Optimizing Node System Parameters
        • Connecting Cloud Services to AOM - Application Operations Management

          Connecting Cloud Services to AOM - Application Operations Management

          Kafka, Data Replication Service (DRS), Data Warehouse Service (DWS), Elastic Load Balance (ELB), Enterprise Router, Elastic Volume Service (EVS), FunctionGraph, GaussDB(for MySQL), GeminiDB, IoT Device Access (IoTDA), Intelligent EdgeFabric (IEF), ModelArts, MapReduce Service (MRS), NAT

          Help > Application Operations Management > User Guide > (New) Connecting to AOM
        • Adding a Subscription - Simple Message Notification

          Adding a Subscription - Simple Message Notification

          If not, the IP address may be unreachable due to firewall, NAT Gateway, or DNS configurations. For an HTTPS protocol, the endpoint must start with https:// and be a public IPv4 address, IPv6 address, or domain name.

          Help > Simple Message Notification > API Reference > APIs > Subscriptions
        • Configuring Protection Rules to Block or Allow Internet Border Traffic - Cloud Firewall

          Configuring Protection Rules to Block or Allow Internet Border Traffic - Cloud Firewall

          If NAT 64 protection is enabled and IPv6 access is used, allow traffic from the 198.19.0.0/16 CIDR block to pass through. NAT64 will translate source IP addresses into the CIDR block 198.19.0.0/16 for ACL access control.

          Help > Cloud Firewall > User Guide > Access Control > Configuring an Access Control Policy
        • Assigning an EIP (Pay-per-Use) - Elastic IP

          Assigning an EIP (Pay-per-Use) - Elastic IP

          EIPs can be bound to or unbound from ECSs, BMSs, virtual IP addresses, NAT gateways, or load balancers. Various billing modes are provided to meet diversified service requirements. URI POST /v1/{project_id}/publicips Table 1 describes the parameters.

          Help > Elastic IP > API Reference > APIs > EIP
        • Suggestions on CCE Cluster Selection - Cloud Container Engine

          Suggestions on CCE Cluster Selection - Cloud Container Engine

          High performance requirements: Cloud Native Network 2.0 uses VPC networks to construct container networks, eliminating the need for tunnel encapsulation or NAT when containers communicate.

          Help > Cloud Container Engine > Best Practices > Cluster
        • Kubernetes 1.25 Release Notes - Cloud Container Engine

          Kubernetes 1.25 Release Notes - Cloud Container Engine

          versions later than Kubernetes 1.25, Kubelet uses IPTablesCleanup to migrate the Kubernetes-generated iptables chains used by the components outside of Kubernetes in phases so that iptables chains such as KUBE-MARK-DROP, KUBE-MARK-MASQ, and KUBE-POSTROUTING will not be created in the NAT

          Help > Cloud Container Engine > Product Bulletin > Product Release Notes > Cluster Versions > Kubernetes Version Release Notes
        • Kubernetes 1.25 Release Notes - Cloud Container Engine

          Kubernetes 1.25 Release Notes - Cloud Container Engine

          versions later than Kubernetes 1.25, Kubelet uses IPTablesCleanup to migrate the Kubernetes-generated iptables chains used by the components outside of Kubernetes in phases so that iptables chains such as KUBE-MARK-DROP, KUBE-MARK-MASQ, and KUBE-POSTROUTING will not be created in the NAT

          Help > Cloud Container Engine > User Guide > Clusters > Cluster Version Release Notes > Kubernetes Version Release Notes
        • Features - Data Security Center

          Features - Data Security Center

          Egress visualization Data egresses: All data egresses on the cloud and on-premises are identified, including EIP, NAT, API Gateway, and ROMA.

          Help > Data Security Center > Service Overview
        Total results: 899
        • Previous
        • 1
        • ...
        • 40
        • 41
        • 42
        • ...
        • 45
        • Next
        • Go
        Load More
        Was this helpful?
        Feedbacks
        /200
        Submit Feedback Cancel
        Contact Sales After-Sales Self Service
        • Site Terms
        • Privacy Statement

        Explore Huawei Cloud

        Why Us Customer Stories Trust Center Legal Press Releases

        Featured Services

        Elastic Cloud Server (ECS) Elastic IP (EIP) RDS for MySQL Elastic Volume Service (EVS) MapReduce Service (MRS)

        Service and Support

        Documentation Contact Us Public Notices Support Plans Service Health Dashboard

        Account and Payment

        Top Up Invoices Billing Center My Account Payment Method

        Quick Links

        Huawei Corporate Huawei Enterprise Huawei Consumer Business Huawei Developers

        © 2025, Huawei Cloud Computing Technologies Co., Ltd. and/or its affiliates. All rights reserved.

        • Site Terms
        • Privacy Statement