Skip to content

Commit 1c268c6

Browse files
committed
more
1 parent 695079b commit 1c268c6

File tree

4 files changed

+6
-11
lines changed

4 files changed

+6
-11
lines changed

deploy-manage/remote-clusters/ec-enable-ccs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -60,12 +60,12 @@ The steps, information, and authentication method required to configure CCS and
6060

6161
API key authentication for remote clusters cannot be used in combination with network security.
6262

63-
For remote clusters configured using TLS certificate authentication, [network security](../security/traffic-filtering.md) can be enabled to restrict access to deployments that are used as a local or remote cluster without any impact to cross-cluster search or cross-cluster replication.
63+
For remote clusters configured using TLS certificate authentication, [network security policies](../security/traffic-filtering.md) can be applies to restrict access to deployments that are used as a local or remote cluster without any impact to cross-cluster search or cross-cluster replication.
6464

6565
Network security for remote clusters supports 2 methods:
6666

6767
* [Filtering by IP addresses and Classless Inter-Domain Routing (CIDR) masks](../security/ip-traffic-filtering.md)
68-
* Filtering by Organization or {{es}} cluster ID with a Remote cluster private connection policy. You can configure this type of policy from the **Access and security** > **Network security** page of your organization or using the [{{ecloud}} RESTful API](https://www.elastic.co/docs/api/doc/cloud) and apply it from each deployment’s **Security** page.
68+
* Filtering by Organization or {{es}} cluster ID with a **Remote cluster** private connection policy. You can configure this type of policy from the **Access and security** > **Network security** page of your organization or using the [{{ecloud}} RESTful API](https://www.elastic.co/docs/api/doc/cloud) and apply it from each deployment’s **Security** page.
6969

7070
::::{note}
7171
When setting up network security for a remote connection to an {{ece}} environment, you also need to upload the region’s TLS certificate of the local cluster to the {{ece}} environment’s proxy. You can find that region’s TLS certificate in the **Security** page of any deployment of the environment initiating the remote connection.

deploy-manage/remote-clusters/ec-remote-cluster-other-ess.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ products:
1414
This section explains how to configure a deployment to connect remotely to clusters belonging to a different {{ecloud}} organization.
1515

1616
::::{note}
17-
If traffic filtering is enabled on the remote cluster, the remote cluster administrator must configure a traffic filter of type remote cluster, using either the organization ID or the Elasticsearch cluster ID as the filtering criteria. For detailed instructions, refer to [Remote clusters and traffic filtering](/deploy-manage/remote-clusters/ec-enable-ccs.md#ec-ccs-ccr-traffic-filtering).
17+
If network security policies are applied to the remote cluster, the remote cluster administrator must configure a network security private connection policy of type remote cluster, using either the organization ID or the Elasticsearch cluster ID as the filtering criteria. For detailed instructions, refer to [Remote clusters and traffic filtering](/deploy-manage/remote-clusters/ec-enable-ccs.md#ec-ccs-ccr-traffic-filtering).
1818
::::
1919

2020
## Allow the remote connection [ec_allow_the_remote_connection_2]
Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1 @@
1-
If you need to remove a rule set, you must first remove any associations with deployments.
2-
3-
To delete a rule set with all its rules:
4-
5-
1. [Remove any deployment associations](/deploy-manage/security/gcp-private-service-connect-traffic-filters.md#remove-filter-deployment).
6-
2. From the **Account** menu, select **Traffic filters**.
7-
3. Find the rule set you want to edit.
8-
4. Select the **Remove** icon. The icon is inactive if there are deployments assigned to the rule set.
1+
% no longer used

deploy-manage/security/traffic-filtering.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,8 @@ products:
2424
Network security allows you to control how your deployments and clusters can be accessed. Add another layer of security to your installation and deployments by restricting inbound traffic to only the sources that you trust.
2525

2626
:::{note}
27+
The network security feature was formerly referred to as traffic filtering.
28+
2729
Network security policies were formerly referred to as traffic filtering rules.
2830
:::
2931

0 commit comments

Comments
 (0)