![]() Servers->ad server->give a name, others keep defaultsĭownload user key and add to the client (udp port 13342 (this port shows when creating a server above) must allowed to server instance ) ![]() ![]() VPN SERVER ON PUBLIC SUBNET (will need elastic ip)Ībove all can connect when vpn server is up as bellow USE SEC GROUP ALLOW 22 and necessary ports > use this for all instances ROUTE2 (Associate PVT SUBNET) + ADD NAT(will need ElasticIP) GW for 0.0.0.0/0 traffic ROUTE1 (Associate PUBLIC) + Add IGW for 0.0.0.0/0 traffic I need all control (adding A records, etc ) to give my aws account.Ġ1)create Hosted Zone with "" then aws will show name servers (4) for that hosted zone.Ġ2)copy that aws name server 1 by 1, paste that original dns provider's(ex: go daddy) site as name servers as follows. then add target subnet with related target pcx******Ġ2)click destination server's inbound rules by clicking target server and security group rulesĠ1)paste crt block and private block given by provider. ******create 2 iptables, for both vpc id's. Systemctl start VPC connectivity problems.Ġ1)VPC-Peearing connections->create VPC Peering Connection(just like router in middle of both vpc's) ->select both VPC's->Then create routing table with required destination and target is created pcx (just like static route) Systemctl enable /etc/openvpn/nf (create this file and add private ip and all things got by the server) Install client ur ansible server like this To allow traffic inbound and outbound for source (ex 0.0.0.0/0) ![]() හතර වන පාඩම (File server, Printer server).තුන්වන පාඩම (Basic Router Configurations). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |