1 Answer
- Newest
- Most votes
- Most comments
0
Instead of your own public IP address, you'll need to allow SSH traffic from the managed prefix list com.amazonaws.REGION.ec2-instance-connect
(with "REGION" replaced with the region code). If you're configuring the security group rule via the console, simply add a new inbound rule with TCP as the protocol, 22 as the port, and the name of the prefix list as the source. This is explained in the document you linked to, under the "Allow inbound SSH traffic" heading: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-connect-prerequisites.html#ec2-instance-connect-setup-security-group
The rule that allows SSH access from your own /32 IP address you should delete.
Relevant content
- asked 2 months ago
- AWS OFFICIALUpdated 7 months ago
- AWS OFFICIALUpdated 8 months ago
- AWS OFFICIALUpdated 6 months ago