This section explains how to secure a group, securing the connections between members of a group, or by establishing a security perimeter using an IP address allowlist.