This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Sophos UTM9 in AWS VPC - initial setup and management

I'm evaluating the UTM9 as an EC2 instance at Amazon.  I can launch the instance into my VPC (say the ip address is 10.10.0.10) and then attach an EIP to that instance/ip ... say 1.1.1.1

even with basically a wide-open Amazon security group associated with the UTM9 instance, I'm unable to browse to https://1.1.1.1:4444 from my corporate network.

I can however do something like:   ssh -L4444:10.10.0.10:4444 another.server.net
where "another server.net" is another Linux EC2 instance on the same AWS subnet. and then access the UTM9 webUI at https://localhost:4444 via port forwarding.

Am I missing something obvious that's preventing me from just connecting directly to port 4444 on the UTM9 instance?

I have verified that from my network, I can hit the EIP of the UTM9 instance on port 22 (ssh) so I'm pretty sure it's not a question of an AWS security group blocking my connection.

[:S]  thanks!


This thread was automatically locked due to age.
Parents
  • Hi, lprikockis, and welcome to the User BB!

    I'm evaluating the UTM9 as an EC2 instance at Amazon. I can launch the instance into my VPC (say the ip address is 10.10.0.10) and then attach an EIP to that instance/ip ... say 1.1.1.1

    I'm a little confused - is this instance in a VPC, or in EC2?

    Cheers - Bob
     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • Turn off Source/Destination Address checking for the public-facing ENI.  This is documented in AWS documentation --- any firewall, etc. that's in AWS needs this turned off on the ENI.

    CTO, Convergent Information Security Solutions, LLC

    https://www.convergesecurity.com

    Advice given as posted on this forum does not construe a support relationship or other relationship with Convergent Information Security Solutions, LLC or its subsidiaries.  Use the advice given at your own risk.

Reply
  • Turn off Source/Destination Address checking for the public-facing ENI.  This is documented in AWS documentation --- any firewall, etc. that's in AWS needs this turned off on the ENI.

    CTO, Convergent Information Security Solutions, LLC

    https://www.convergesecurity.com

    Advice given as posted on this forum does not construe a support relationship or other relationship with Convergent Information Security Solutions, LLC or its subsidiaries.  Use the advice given at your own risk.

Children
No Data