Leading on from the previous example -
Here I login via ssh to my vm.
I start the http server -
I can access the test page -
Now I create a Security List -
Now I add my instance to this security list -
I try and access the http server -
Now, I will create a security rule to enable access -
Now, I think the above is self-explanatory, but just in case...
Security Application - protocol I want to use, in my case, http.
Source - where I am coming from, in my case the public internet. I am trying access
the http server from my laptop.
Destination - where I want to get to - NCVM. My vm is attached to the specified security list.
I now retry in my browser -
Simple yet effective...
Here I login via ssh to my vm.
I start the http server -
I can access the test page -
Now I create a Security List -
Now I add my instance to this security list -
I try and access the http server -
Now, I will create a security rule to enable access -
Now, I think the above is self-explanatory, but just in case...
Security Application - protocol I want to use, in my case, http.
Source - where I am coming from, in my case the public internet. I am trying access
the http server from my laptop.
Destination - where I want to get to - NCVM. My vm is attached to the specified security list.
I now retry in my browser -
Simple yet effective...
No comments:
Post a Comment