I'm evaluating the UTM9 as an EC2 instance at Amazon. I can launch the instance into my VPC (say the ip address is 10.10.0.10) and then attach an EIP to that instance/ip ... say 1.1.1.1
even with basically a wide-open Amazon security group associated with the UTM9 instance, I'm unable to browse to https://1.1.1.1:4444 from my corporate network.
I can however do something like: ssh -L4444:10.10.0.10:4444 another.server.net
where "another server.net" is another Linux EC2 instance on the same AWS subnet. and then access the UTM9 webUI at https://localhost:4444 via port forwarding.
Am I missing something obvious that's preventing me from just connecting directly to port 4444 on the UTM9 instance?
I have verified that from my network, I can hit the EIP of the UTM9 instance on port 22 (ssh) so I'm pretty sure it's not a question of an AWS security group blocking my connection.
[:S] thanks!
This thread was automatically locked due to age.