- Neueste
- Die meisten Stimmen
- Die meisten Kommentare
Hi!
I've tested your configuration and it works for me, I can ping between both instances that are located in public subnets.
- Make sure that the route tables you mention above are associated with the subnets.
- Which IPs are you using to do the ping? From your SG configuration, if the ICMP packets come from the public IP, the connection is going to be blocked.
Did you allow ICMP in the Security Group of the instances? It is not allowed by default, even if you select ALL TRAFFIC in the SG. What do the rules in your SG look like and what does your route table look like would be the most helpful info here.
Hi Rob_H, Thanks for your response. My route table and SG look like below for scenario 1 where I have 2 VPCs with 1 public subnet each and the Peering connection is active.
Route table-VPC A 10.1.0.0/16 local Active No 10.2.0.0/16 pcx-015122633fa67e3ed Active No 0.0.0.0/0 igw-0038ed6b1eb6d3147 Active No
Route Table - VPC B 10.1.0.0/16 pcx-015122633fa67e3ed Active No 10.2.0.0/16 local Active No 0.0.0.0/0 igw-003f895ba0c3a7e99 Active No
Security Group - EC2 in VPC A sgr-022181b29d6b1f157 IPv4 RDP TCP 3389 MyIP sgr-05c87bcdea0a3f5c7 IPv4 All ICMP - IPv4 ICMP All 10.2.0.0/16
Security Group – EC2 in VPC B sgr-0dbb629719cf3fd9f IPv4 RDP TCP 3389 MyIP sgr-0f8941aad43b7c19f IPv4 All ICMP - IPv4 ICMP All 10.1.0.0/16
Also, make sure the NACLs on the subnets are allowing this traffic.
Relevanter Inhalt
- AWS OFFICIALAktualisiert vor einem Jahr
- AWS OFFICIALAktualisiert vor 2 Jahren
- AWS OFFICIALAktualisiert vor einem Jahr
I'm connecting to my EC2 instance in VPC A via RDP (from my IP) and from this EC2 instance trying to ping the private IP address of the EC2 instance in VPC B. The request gets timed out.