You are using access rules to control network traffic among your DBaaS instances.
Which statement is true about access rules?
They are used only for configuring external server access to DBaaS and do not impact
how network groups communicate.
They define a specific communication path, which consists of a source, destination, and
protocol-port combination overwhich communication is allowed.
They are used to map an external user to a database user to allow the user to
communicate with and access the database.
They are used to encrypt communication between DBaaS instances.
On the Access Rule youcan define the following: