1 Answer
- Newest
- Most votes
- Most comments
0
Verify the inbound rules for the security group that is applied to your instance, looking for TCP port 22 (if it's Linux) or TCP port 3389 (if it's Windows). Is the security group allowing inbound connections from anywhere (0.0.0.0/0) or only a specific IP range.
If it's a specific IP range (or only an individual IP address) then is your iPhone's IP within this range of allowed address(es) - see https://www.whatismyip.com/
When you use somebody else's WiFi is their IP address in the allowed range?
Relevant content
- asked 2 years ago
- asked a year ago
- asked 2 years ago
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 6 months ago
I added TCP and UDP of the inbound rules for the iphone's public ip address but it seems still not work.
Do you have VPC Flowlogs created? This was you can see if traffic from your IP address even gets as far as the VPC, before it has a chance to start worrying about the security groups.
This is what to look for https://docs.aws.amazon.com/vpc/latest/userguide/flow-logs-records-examples.html#flow-log-example-accepted-rejected
How to setup a flowlog https://docs.aws.amazon.com/vpc/latest/userguide/flow-logs.html#flow-logs-basics