Knowledge Base
Network
Network
  • How to create a Router?
  • How to Manage IKE Policy
  • How to Manage IPsec Policies?
  • How to Manage a Virtual Private Cloud (VPC)?
  • How to create an application load balancer?
  • How to create a network load balancer?
  • How to Manage a load balancer?
  • How to associate a floating IP to the load balancer?
  • How to create a pool?
  • How to create a listener?
  • How to edit a pool?
  • How to edit a listener?
  • How to delete a load balancer?
  • How to delete a listener?
  • How to delete a pool?
  • How to dissociate a floating IP from the load balancer?
  • How do I troubleshoot internal (to external targets) brute force attack?
  • How to block all the outbound traffic while allowing SSH connections?
  • How to edit a security group?
  • How to release floating IP?
  • How to create security groups?
  • How to edit and delete a private network?
  • Troubleshoot Connecting to your Ace Compute Instance
  • How to add a subnet to a existing Private network?
  • Managing Security Group
  • How to Manage VPN Services?
  • How to Manage Endpoint Groups?
  • How to Manage Ipsec Site Connections?
Powered by GitBook
On this page

Was this helpful?

Troubleshoot Connecting to your Ace Compute Instance

PreviousHow to edit and delete a private network?NextHow to add a subnet to a existing Private network?

Last updated 9 months ago

Was this helpful?

Learn about troubleshooting options for Ace compute instance.

a. Check if your instance's security group enables access to port 22 (Linux) or port 3389 (Windows).

Step 1: Log into your Step 2: Navigate to Network and then Security Groups from the left panel.

Step 3: Click on the Manage Rules for the security group you want to check the port for.

Step 4: Check if the port range is set to 22 (if Linux) or 3389 (if Windows). If not, then follow step 5.

Step 5: Click on Add Rule.

Step 6: Select Port from the drop-down of the Open Port category.

Step 7: Write 22 (if Linux) or 3389 (if Windows) in the dialog Box for Port.

Step 8: Click on Add.

b. Check if, for security group rules, the TCP connection is accurately set to Ingress/Egress, as required.

To verify, follow these steps:

Step 3: Click on the Manage Rules for the security group you want to check the connection for.

Step 4: Verify if the direction (egress/ingress) for the rules is set correctly.

c. Verify the Network Address for the subnets of your networks.

Step 3: Click on the network for which you want to check the network address.

Step 4: Check if the network address is correct. If the network address is found to be incorrect, you can add your own network address or subnet.

Step 1: Log into your Step 2: Navigate to Network and then Security Groups from the left panel.

To check, follow these steps below: Step 1: Log in to your Step 2: Navigate to Network and select Networks from the left panel.

OpenStack Account.
OpenStack account.
OpenStack Account.