Tuesday, April 19, 2016

#491 IaaS - Configuring Network access

Leading on from the previous example -

Here I login via ssh to my vm.

I start the http server -

I can access the test page -

Now I create a Security List -

Now I add my instance to this security list -


I try and access the http server -

Now, I will create a security rule to enable access -

Now, I think the above is self-explanatory, but just in case...

Security Application - protocol I want to use, in my case, http.

Source - where I am coming from, in my case the public internet. I am trying access
the http server from my laptop.

Destination - where I want to get to - NCVM. My vm is attached to the specified security list.

I now retry in my browser -

Simple yet effective...

No comments: