检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Configuring TLS Security Policies for Encrypted Communication HTTPS encryption is commonly used for applications that require secure data transmission, such as banks and finance. ELB allows you to use common TLS security policies to secure data transmission. When you add HTTPS and
Encrypt your sensitive data if necessary. What Is ELB Access Logging? ELB receives and distributes client access requests. It logs the details of Layer 7 requests. With LTS, you can quickly analyze service requests and locate faults.
Redirected to another listener Specifies the HTTPS listener to which HTTP requests are redirected to encrypt the communication and improve service security.
Redirected to another listener Specifies the HTTPS listener to which HTTP requests are redirected to encrypt the communication and improve service security.
Encrypt your sensitive data if necessary. Billing After ELB is interconnected with LTS, LTS charges you based on the log read/write traffic, log storage volume, and log transfer traffic. For details, see LTS Billing Items.
That is to say, you cannot encrypt your certificates. You can use self-signed certificates. However, note that self-signed certificates pose security risks. It is recommended that you use certificates issued by third parties. ELB only supports certificates in PEM format.
That is to say, you cannot encrypt your certificates. You can use self-signed certificates. However, note that self-signed certificates pose security risks. It is recommended that you use certificates issued by third parties. ELB only supports certificates in PEM format.