Skip to content

Latest commit

 

History

History
53 lines (35 loc) · 1.74 KB

344_exposing-tcp-services-internally-using-endpoints.md

File metadata and controls

53 lines (35 loc) · 1.74 KB
title intro weight versions layout permissions showMiniToc miniTocMaxHeadingLevel allowTitleToDifferFromFilename mapTopic hidden redirect_from gettingStartedLinks popularLinks guideLinks introLinks tags
Exposing TCP Services Internally
rapyuta.io is a platform that enables robotics solution development by providing the necessary software infrastructure and facilitating the interaction between multiple stakeholders who contribute to the solution development.
343
free-pro-team enterprise-server
*
*
false
rapyuta.io
true
4
false
false
false
How to

Exposing Endpoints Internally

You can restrict access to a network endpoint by ensuring that the Exposed externally option is not selected.

The only protocol available is the TCP for which the value of the Port field is set to 443 by default. However, you can change the port's value.

internal endpoint

You can also use port range for an endpoint by selecting Port Range toggle. A Port Range on an endpoint will allow you to open multiple ports on a single DNS hostname.

{{% notice note %}}

By default, the Target Port is the same as the Port. A maximum of 50 ports is allowed for an endpoint.

{{%/notice%}}

The allowed format is for Port Range

  • Single Port. Example: 5000
  • Range of Port mentioning FROM port and TO port separated by a hyphen (-). Example: 443-445
  • Comma-separated combination of the above two formats. Example: 3446-3449,3500,3510-3530

internal endpoint port range