Thanks to visit codestin.com Credit goes to dev.mysql.com
This section explains how to secure a group, securing the connections between members of a group, or by establishing a security perimeter using an IP address allowlist.