This section explains how to secure a group, securing the connections between members of a group, or by establishing a security perimeter using IP address allowlisting.