Tuesday, April 19, 2016

#491 IaaS - Configuring Network access

Leading on from the previous example -

Here I login via ssh to my vm.











I start the http server -












I can access the test page -















Now I create a Security List -




Now I add my instance to this security list -

























 










I try and access the http server -








Now, I will create a security rule to enable access -





































Now, I think the above is self-explanatory, but just in case...

Security Application - protocol I want to use, in my case, http.

Source - where I am coming from, in my case the public internet. I am trying access
the http server from my laptop.

Destination - where I want to get to - NCVM. My vm is attached to the specified security list.





I now retry in my browser -
















Simple yet effective...

No comments:

Post a Comment