tencent cloud

NAT Gateway

Release Notes and Announcements
Release Notes
Announcements
Product Introduction
Overview
Features
Use Cases
Product Specifications
Relevant Products
Purchase Guide
Public NAT Gateway Billing Overview
Private NAT Gateway Operation Guide
Purchasing in the Console
Overdue Payment and Service Expiration Policies
Getting Started
Public NAT Gateway Operation Guide
Modifying NAT Gateway Configuration
Managing EIPs of NAT Gateway
Routing to NAT Gateway
Managing SNAT Rules
Managing Port Forwarding Rules
Public NAT Usage Limits
NAT Gateway Flow Logs
Binding with Anti-DDoS Pro
Monitoring and Alarms
Deleting NAT Gateway
Adjusting the Priorities of NAT Gateways and EIPs
Private NAT Gateway Operation Guide
Creating and Managing a NAT Gateway
Configuring a Route to Private NAT Gateway
Managing SNAT Rules
Managing DNAT Rules
Cloud Access Management
Practical Tutorial
Enabling Cross-VPC Access to Public Network via Standard NAT Gateway
Enabling Mutual Access between a Specified VPC Subnet and Public Network Resources via Private NAT Gateway
Enabling Secure Mutual Access with Public Network via Public CLB and NAT Gateway
Adjusting the Priorities of NAT Gateways and EIPs
API Documentation
FAQ
Billing
Concepts
Features
Service Level Agreement
Contact Us
Glossary

Features

PDF
Focus Mode
Font Size
Last updated: 2024-01-04 21:49:21

How do I use the NAT Gateway and EIP?

The NAT Gateway can translate the private IP address in a VPC to a public IP address. It is an ingress or egress for public network traffic in a VPC. For more information about how to use Tencent Cloud’s NAT Gateway service, see NAT Gateway.
The NAT Gateway and EIP are two ways for CVMs to access the Internet. You can use either or both of them to design your public network access architecture.

How can I learn more information about security?

Tencent Cloud provides various network and security services such as security groups, encrypted login, and EIPs to back up your instances on the provision of secure and efficient services. For more information about CVM security, see Network and Security Overview.

How do I prevent others from querying my system?

You have full control over the visibility of your system, and the CVM allows you to place running instances into any security group of choice. In the Security Group Console, you can specify inter-group communication and IP subnets on the network that can communicate with the CVM.

How do I troubleshoot security issues?

If you perceive any security event or adverse event, see Cloud Workload Protection for troubleshooting. 

Help and Support

Was this page helpful?

Help us improve! Rate your documentation experience in 5 mins.

Feedback