Unable to connect to AWS ec2 instance public ip via browserAllow traffic on one port from one IP address with...

Re-submission of rejected manuscript without informing co-authors

Can I find out the caloric content of bread by dehydrating it?

What happens when a metallic dragon and a chromatic dragon mate?

Manga about a female worker who got dragged into another world together with this high school girl and she was just told she's not needed anymore

Doomsday-clock for my fantasy planet

How would photo IDs work for shapeshifters?

Is there a familial term for apples and pears?

LWC and complex parameters

Patience, young "Padovan"

Are objects structures and/or vice versa?

Email Account under attack (really) - anything I can do?

Why do UK politicians seemingly ignore opinion polls on Brexit?

What are the advantages and disadvantages of running one shots compared to campaigns?

Is domain driven design an anti-SQL pattern?

Unbreakable Formation vs. Cry of the Carnarium

Why do we use polarized capacitors?

Is there a way to make member function NOT callable from constructor?

Is it wise to hold on to stock that has plummeted and then stabilized?

How do I create uniquely male characters?

When blogging recipes, how can I support both readers who want the narrative/journey and ones who want the printer-friendly recipe?

What do you call something that goes against the spirit of the law, but is legal when interpreting the law to the letter?

A poker game description that does not feel gimmicky

Why is the design of haulage companies so “special”?

Prime joint compound before latex paint?



Unable to connect to AWS ec2 instance public ip via browser


Allow traffic on one port from one IP address with iptablesfailing to achive tunneling to fresh ubuntu 10.04 serverCentOS open port 7000 [RESOLVED]nf_conntrack complaints in dmesgApache2 not listening on any port other than 80Why isn't my server responding on port 443?nginx upstream an ufwUnable to access Amazon EC2 Centos 6 web server with Elastic IPCan't access docker bind port from public IPHow can I allow an EC2 instance to send outbound udp?






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty{ height:90px;width:728px;box-sizing:border-box;
}







0















I've newly installed Openresty as the web server on an ec2 instance and its currently running but I can't even view the welcome page when I try to navigate to it via my public ip address at the browser. Anyone can tell whats the issue I'm having?



So far I've tried these :





  1. telnet mypublicip and it gets stuck on


Trying mypublicip...
telnet: Unable to connect to remote host: Connection timed out




  1. Firewall is open but it should be okay I think, here is the output of sudo uwf status


Output:



Status: active

To Action From
-- ------ ----
80 ALLOW Anywhere
22 ALLOW Anywhere
443 ALLOW Anywhere
80 (v6) ALLOW Anywhere (v6)
22 (v6) ALLOW Anywhere (v6)
443 (v6) ALLOW Anywhere (v6)



  1. Here is the output of sudo iptables -L:


Output:



Chain ufw-track-input (1 references)
target prot opt source destination

Chain ufw-track-output (1 references)
target prot opt source destination
ACCEPT tcp -- anywhere anywhere ctstate NEW
ACCEPT udp -- anywhere anywhere ctstate NEW

Chain ufw-user-forward (1 references)
target prot opt source destination

Chain ufw-user-input (1 references)
target prot opt source destination
ACCEPT tcp -- anywhere anywhere tcp dpt:http
ACCEPT udp -- anywhere anywhere udp dpt:http
ACCEPT tcp -- anywhere anywhere tcp dpt:ssh
ACCEPT udp -- anywhere anywhere udp dpt:ssh
ACCEPT tcp -- anywhere anywhere tcp dpt:https
ACCEPT udp -- anywhere anywhere udp dpt:https

Chain ufw-user-limit (0 references)
target prot opt source destination
LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning prefix "[UFW LIMIT BLOCK] "
REJECT all -- anywhere anywhere reject-with icmp-port-unreachable

Chain ufw-user-limit-accept (0 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere

Chain ufw-user-logging-forward (0 references)
target prot opt source destination

Chain ufw-user-logging-input (0 references)
target prot opt source destination

Chain ufw-user-logging-output (0 references)
target prot opt source destination

Chain ufw-user-output (1 references)
target prot opt source destination
ubuntu@ip-10-110-100-100:/usr/local/openresty$ clear
ubuntu@ip-10-110-100-100:/usr/local/openresty$ sudo iptables -L
Chain INPUT (policy ACCEPT)
target prot opt source destination
ACCEPT all -- anywhere anywhere
ufw-before-logging-input all -- anywhere anywhere
ufw-before-input all -- anywhere anywhere
ufw-after-input all -- anywhere anywhere
ufw-after-logging-input all -- anywhere anywhere
ufw-reject-input all -- anywhere anywhere
ufw-track-input all -- anywhere anywhere

Chain FORWARD (policy DROP)
target prot opt source destination
ufw-before-logging-forward all -- anywhere anywhere
ufw-before-forward all -- anywhere anywhere
ufw-after-forward all -- anywhere anywhere
ufw-after-logging-forward all -- anywhere anywhere
ufw-reject-forward all -- anywhere anywhere
ufw-track-forward all -- anywhere anywhere

Chain OUTPUT (policy ACCEPT)
target prot opt source destination
ufw-before-logging-output all -- anywhere anywhere
ufw-before-output all -- anywhere anywhere
ufw-after-output all -- anywhere anywhere
ufw-after-logging-output all -- anywhere anywhere
ufw-reject-output all -- anywhere anywhere
ufw-track-output all -- anywhere anywhere

Chain ufw-after-forward (1 references)
target prot opt source destination

Chain ufw-after-input (1 references)
target prot opt source destination
ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:netbios-ns
ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:netbios-dgm
ufw-skip-to-policy-input tcp -- anywhere anywhere tcp dpt:netbios-ssn
ufw-skip-to-policy-input tcp -- anywhere anywhere tcp dpt:microsoft-ds
ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:bootps
ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:bootpc
ufw-skip-to-policy-input all -- anywhere anywhere ADDRTYPE match dst-type BROADCAST

Chain ufw-after-logging-forward (1 references)
target prot opt source destination
LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] "

Chain ufw-after-logging-input (1 references)
target prot opt source destination
LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] "

Chain ufw-after-logging-output (1 references)
target prot opt source destination

Chain ufw-after-output (1 references)
target prot opt source destination

Chain ufw-before-forward (1 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED
ACCEPT icmp -- anywhere anywhere icmp destination-unreachable
ACCEPT icmp -- anywhere anywhere icmp source-quench
ACCEPT icmp -- anywhere anywhere icmp time-exceeded
ACCEPT icmp -- anywhere anywhere icmp parameter-problem
ACCEPT icmp -- anywhere anywhere icmp echo-request
ufw-user-forward all -- anywhere anywhere

Chain ufw-before-input (1 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere
ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED
ufw-logging-deny all -- anywhere anywhere ctstate INVALID
DROP all -- anywhere anywhere ctstate INVALID
ACCEPT icmp -- anywhere anywhere icmp destination-unreachable
ACCEPT icmp -- anywhere anywhere icmp source-quench
ACCEPT icmp -- anywhere anywhere icmp time-exceeded
ACCEPT icmp -- anywhere anywhere icmp parameter-problem
ACCEPT icmp -- anywhere anywhere icmp echo-request
ACCEPT udp -- anywhere anywhere udp spt:bootps dpt:bootpc
ufw-not-local all -- anywhere anywhere
ACCEPT udp -- anywhere 224.0.0.251 udp dpt:mdns
ACCEPT udp -- anywhere 239.255.255.250 udp dpt:1900
ufw-user-input all -- anywhere anywhere

Chain ufw-before-logging-forward (1 references)
target prot opt source destination

Chain ufw-before-logging-input (1 references)
target prot opt source destination

Chain ufw-before-logging-output (1 references)
target prot opt source destination

Chain ufw-before-output (1 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere
ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED
ufw-user-output all -- anywhere anywhere

Chain ufw-logging-allow (0 references)
target prot opt source destination
LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW ALLOW] "

Chain ufw-logging-deny (2 references)
target prot opt source destination
RETURN all -- anywhere anywhere ctstate INVALID limit: avg 3/min burst 10
LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] "

Chain ufw-not-local (1 references)
target prot opt source destination
RETURN all -- anywhere anywhere ADDRTYPE match dst-type LOCAL
RETURN all -- anywhere anywhere ADDRTYPE match dst-type MULTICAST
RETURN all -- anywhere anywhere ADDRTYPE match dst-type BROADCAST
ufw-logging-deny all -- anywhere anywhere limit: avg 3/min burst 10
DROP all -- anywhere anywhere

Chain ufw-reject-forward (1 references)
target prot opt source destination

Chain ufw-reject-input (1 references)
target prot opt source destination

Chain ufw-reject-output (1 references)
target prot opt source destination

Chain ufw-skip-to-policy-forward (0 references)
target prot opt source destination
DROP all -- anywhere anywhere

Chain ufw-skip-to-policy-input (7 references)
target prot opt source destination
DROP all -- anywhere anywhere

Chain ufw-skip-to-policy-output (0 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere

Chain ufw-track-forward (1 references)
target prot opt source destination

Chain ufw-track-input (1 references)
target prot opt source destination

Chain ufw-track-output (1 references)
target prot opt source destination
ACCEPT tcp -- anywhere anywhere ctstate NEW
ACCEPT udp -- anywhere anywhere ctstate NEW

Chain ufw-user-forward (1 references)
target prot opt source destination

Chain ufw-user-input (1 references)
target prot opt source destination
ACCEPT tcp -- anywhere anywhere tcp dpt:http
ACCEPT udp -- anywhere anywhere udp dpt:http
ACCEPT tcp -- anywhere anywhere tcp dpt:ssh
ACCEPT udp -- anywhere anywhere udp dpt:ssh
ACCEPT tcp -- anywhere anywhere tcp dpt:https
ACCEPT udp -- anywhere anywhere udp dpt:https

Chain ufw-user-limit (0 references)
target prot opt source destination
LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning prefix "[UFW LIMIT BLOCK] "
REJECT all -- anywhere anywhere reject-with icmp-port-unreachable

Chain ufw-user-limit-accept (0 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere

Chain ufw-user-logging-forward (0 references)
target prot opt source destination

Chain ufw-user-logging-input (0 references)
target prot opt source destination

Chain ufw-user-logging-output (0 references)
target prot opt source destination

Chain ufw-user-output (1 references)
target prot opt source destination


Any help would be greatly appreciated. Thanks









share







New contributor




Joshua is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.



























    0















    I've newly installed Openresty as the web server on an ec2 instance and its currently running but I can't even view the welcome page when I try to navigate to it via my public ip address at the browser. Anyone can tell whats the issue I'm having?



    So far I've tried these :





    1. telnet mypublicip and it gets stuck on


    Trying mypublicip...
    telnet: Unable to connect to remote host: Connection timed out




    1. Firewall is open but it should be okay I think, here is the output of sudo uwf status


    Output:



    Status: active

    To Action From
    -- ------ ----
    80 ALLOW Anywhere
    22 ALLOW Anywhere
    443 ALLOW Anywhere
    80 (v6) ALLOW Anywhere (v6)
    22 (v6) ALLOW Anywhere (v6)
    443 (v6) ALLOW Anywhere (v6)



    1. Here is the output of sudo iptables -L:


    Output:



    Chain ufw-track-input (1 references)
    target prot opt source destination

    Chain ufw-track-output (1 references)
    target prot opt source destination
    ACCEPT tcp -- anywhere anywhere ctstate NEW
    ACCEPT udp -- anywhere anywhere ctstate NEW

    Chain ufw-user-forward (1 references)
    target prot opt source destination

    Chain ufw-user-input (1 references)
    target prot opt source destination
    ACCEPT tcp -- anywhere anywhere tcp dpt:http
    ACCEPT udp -- anywhere anywhere udp dpt:http
    ACCEPT tcp -- anywhere anywhere tcp dpt:ssh
    ACCEPT udp -- anywhere anywhere udp dpt:ssh
    ACCEPT tcp -- anywhere anywhere tcp dpt:https
    ACCEPT udp -- anywhere anywhere udp dpt:https

    Chain ufw-user-limit (0 references)
    target prot opt source destination
    LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning prefix "[UFW LIMIT BLOCK] "
    REJECT all -- anywhere anywhere reject-with icmp-port-unreachable

    Chain ufw-user-limit-accept (0 references)
    target prot opt source destination
    ACCEPT all -- anywhere anywhere

    Chain ufw-user-logging-forward (0 references)
    target prot opt source destination

    Chain ufw-user-logging-input (0 references)
    target prot opt source destination

    Chain ufw-user-logging-output (0 references)
    target prot opt source destination

    Chain ufw-user-output (1 references)
    target prot opt source destination
    ubuntu@ip-10-110-100-100:/usr/local/openresty$ clear
    ubuntu@ip-10-110-100-100:/usr/local/openresty$ sudo iptables -L
    Chain INPUT (policy ACCEPT)
    target prot opt source destination
    ACCEPT all -- anywhere anywhere
    ufw-before-logging-input all -- anywhere anywhere
    ufw-before-input all -- anywhere anywhere
    ufw-after-input all -- anywhere anywhere
    ufw-after-logging-input all -- anywhere anywhere
    ufw-reject-input all -- anywhere anywhere
    ufw-track-input all -- anywhere anywhere

    Chain FORWARD (policy DROP)
    target prot opt source destination
    ufw-before-logging-forward all -- anywhere anywhere
    ufw-before-forward all -- anywhere anywhere
    ufw-after-forward all -- anywhere anywhere
    ufw-after-logging-forward all -- anywhere anywhere
    ufw-reject-forward all -- anywhere anywhere
    ufw-track-forward all -- anywhere anywhere

    Chain OUTPUT (policy ACCEPT)
    target prot opt source destination
    ufw-before-logging-output all -- anywhere anywhere
    ufw-before-output all -- anywhere anywhere
    ufw-after-output all -- anywhere anywhere
    ufw-after-logging-output all -- anywhere anywhere
    ufw-reject-output all -- anywhere anywhere
    ufw-track-output all -- anywhere anywhere

    Chain ufw-after-forward (1 references)
    target prot opt source destination

    Chain ufw-after-input (1 references)
    target prot opt source destination
    ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:netbios-ns
    ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:netbios-dgm
    ufw-skip-to-policy-input tcp -- anywhere anywhere tcp dpt:netbios-ssn
    ufw-skip-to-policy-input tcp -- anywhere anywhere tcp dpt:microsoft-ds
    ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:bootps
    ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:bootpc
    ufw-skip-to-policy-input all -- anywhere anywhere ADDRTYPE match dst-type BROADCAST

    Chain ufw-after-logging-forward (1 references)
    target prot opt source destination
    LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] "

    Chain ufw-after-logging-input (1 references)
    target prot opt source destination
    LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] "

    Chain ufw-after-logging-output (1 references)
    target prot opt source destination

    Chain ufw-after-output (1 references)
    target prot opt source destination

    Chain ufw-before-forward (1 references)
    target prot opt source destination
    ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED
    ACCEPT icmp -- anywhere anywhere icmp destination-unreachable
    ACCEPT icmp -- anywhere anywhere icmp source-quench
    ACCEPT icmp -- anywhere anywhere icmp time-exceeded
    ACCEPT icmp -- anywhere anywhere icmp parameter-problem
    ACCEPT icmp -- anywhere anywhere icmp echo-request
    ufw-user-forward all -- anywhere anywhere

    Chain ufw-before-input (1 references)
    target prot opt source destination
    ACCEPT all -- anywhere anywhere
    ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED
    ufw-logging-deny all -- anywhere anywhere ctstate INVALID
    DROP all -- anywhere anywhere ctstate INVALID
    ACCEPT icmp -- anywhere anywhere icmp destination-unreachable
    ACCEPT icmp -- anywhere anywhere icmp source-quench
    ACCEPT icmp -- anywhere anywhere icmp time-exceeded
    ACCEPT icmp -- anywhere anywhere icmp parameter-problem
    ACCEPT icmp -- anywhere anywhere icmp echo-request
    ACCEPT udp -- anywhere anywhere udp spt:bootps dpt:bootpc
    ufw-not-local all -- anywhere anywhere
    ACCEPT udp -- anywhere 224.0.0.251 udp dpt:mdns
    ACCEPT udp -- anywhere 239.255.255.250 udp dpt:1900
    ufw-user-input all -- anywhere anywhere

    Chain ufw-before-logging-forward (1 references)
    target prot opt source destination

    Chain ufw-before-logging-input (1 references)
    target prot opt source destination

    Chain ufw-before-logging-output (1 references)
    target prot opt source destination

    Chain ufw-before-output (1 references)
    target prot opt source destination
    ACCEPT all -- anywhere anywhere
    ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED
    ufw-user-output all -- anywhere anywhere

    Chain ufw-logging-allow (0 references)
    target prot opt source destination
    LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW ALLOW] "

    Chain ufw-logging-deny (2 references)
    target prot opt source destination
    RETURN all -- anywhere anywhere ctstate INVALID limit: avg 3/min burst 10
    LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] "

    Chain ufw-not-local (1 references)
    target prot opt source destination
    RETURN all -- anywhere anywhere ADDRTYPE match dst-type LOCAL
    RETURN all -- anywhere anywhere ADDRTYPE match dst-type MULTICAST
    RETURN all -- anywhere anywhere ADDRTYPE match dst-type BROADCAST
    ufw-logging-deny all -- anywhere anywhere limit: avg 3/min burst 10
    DROP all -- anywhere anywhere

    Chain ufw-reject-forward (1 references)
    target prot opt source destination

    Chain ufw-reject-input (1 references)
    target prot opt source destination

    Chain ufw-reject-output (1 references)
    target prot opt source destination

    Chain ufw-skip-to-policy-forward (0 references)
    target prot opt source destination
    DROP all -- anywhere anywhere

    Chain ufw-skip-to-policy-input (7 references)
    target prot opt source destination
    DROP all -- anywhere anywhere

    Chain ufw-skip-to-policy-output (0 references)
    target prot opt source destination
    ACCEPT all -- anywhere anywhere

    Chain ufw-track-forward (1 references)
    target prot opt source destination

    Chain ufw-track-input (1 references)
    target prot opt source destination

    Chain ufw-track-output (1 references)
    target prot opt source destination
    ACCEPT tcp -- anywhere anywhere ctstate NEW
    ACCEPT udp -- anywhere anywhere ctstate NEW

    Chain ufw-user-forward (1 references)
    target prot opt source destination

    Chain ufw-user-input (1 references)
    target prot opt source destination
    ACCEPT tcp -- anywhere anywhere tcp dpt:http
    ACCEPT udp -- anywhere anywhere udp dpt:http
    ACCEPT tcp -- anywhere anywhere tcp dpt:ssh
    ACCEPT udp -- anywhere anywhere udp dpt:ssh
    ACCEPT tcp -- anywhere anywhere tcp dpt:https
    ACCEPT udp -- anywhere anywhere udp dpt:https

    Chain ufw-user-limit (0 references)
    target prot opt source destination
    LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning prefix "[UFW LIMIT BLOCK] "
    REJECT all -- anywhere anywhere reject-with icmp-port-unreachable

    Chain ufw-user-limit-accept (0 references)
    target prot opt source destination
    ACCEPT all -- anywhere anywhere

    Chain ufw-user-logging-forward (0 references)
    target prot opt source destination

    Chain ufw-user-logging-input (0 references)
    target prot opt source destination

    Chain ufw-user-logging-output (0 references)
    target prot opt source destination

    Chain ufw-user-output (1 references)
    target prot opt source destination


    Any help would be greatly appreciated. Thanks









    share







    New contributor




    Joshua is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
    Check out our Code of Conduct.























      0












      0








      0








      I've newly installed Openresty as the web server on an ec2 instance and its currently running but I can't even view the welcome page when I try to navigate to it via my public ip address at the browser. Anyone can tell whats the issue I'm having?



      So far I've tried these :





      1. telnet mypublicip and it gets stuck on


      Trying mypublicip...
      telnet: Unable to connect to remote host: Connection timed out




      1. Firewall is open but it should be okay I think, here is the output of sudo uwf status


      Output:



      Status: active

      To Action From
      -- ------ ----
      80 ALLOW Anywhere
      22 ALLOW Anywhere
      443 ALLOW Anywhere
      80 (v6) ALLOW Anywhere (v6)
      22 (v6) ALLOW Anywhere (v6)
      443 (v6) ALLOW Anywhere (v6)



      1. Here is the output of sudo iptables -L:


      Output:



      Chain ufw-track-input (1 references)
      target prot opt source destination

      Chain ufw-track-output (1 references)
      target prot opt source destination
      ACCEPT tcp -- anywhere anywhere ctstate NEW
      ACCEPT udp -- anywhere anywhere ctstate NEW

      Chain ufw-user-forward (1 references)
      target prot opt source destination

      Chain ufw-user-input (1 references)
      target prot opt source destination
      ACCEPT tcp -- anywhere anywhere tcp dpt:http
      ACCEPT udp -- anywhere anywhere udp dpt:http
      ACCEPT tcp -- anywhere anywhere tcp dpt:ssh
      ACCEPT udp -- anywhere anywhere udp dpt:ssh
      ACCEPT tcp -- anywhere anywhere tcp dpt:https
      ACCEPT udp -- anywhere anywhere udp dpt:https

      Chain ufw-user-limit (0 references)
      target prot opt source destination
      LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning prefix "[UFW LIMIT BLOCK] "
      REJECT all -- anywhere anywhere reject-with icmp-port-unreachable

      Chain ufw-user-limit-accept (0 references)
      target prot opt source destination
      ACCEPT all -- anywhere anywhere

      Chain ufw-user-logging-forward (0 references)
      target prot opt source destination

      Chain ufw-user-logging-input (0 references)
      target prot opt source destination

      Chain ufw-user-logging-output (0 references)
      target prot opt source destination

      Chain ufw-user-output (1 references)
      target prot opt source destination
      ubuntu@ip-10-110-100-100:/usr/local/openresty$ clear
      ubuntu@ip-10-110-100-100:/usr/local/openresty$ sudo iptables -L
      Chain INPUT (policy ACCEPT)
      target prot opt source destination
      ACCEPT all -- anywhere anywhere
      ufw-before-logging-input all -- anywhere anywhere
      ufw-before-input all -- anywhere anywhere
      ufw-after-input all -- anywhere anywhere
      ufw-after-logging-input all -- anywhere anywhere
      ufw-reject-input all -- anywhere anywhere
      ufw-track-input all -- anywhere anywhere

      Chain FORWARD (policy DROP)
      target prot opt source destination
      ufw-before-logging-forward all -- anywhere anywhere
      ufw-before-forward all -- anywhere anywhere
      ufw-after-forward all -- anywhere anywhere
      ufw-after-logging-forward all -- anywhere anywhere
      ufw-reject-forward all -- anywhere anywhere
      ufw-track-forward all -- anywhere anywhere

      Chain OUTPUT (policy ACCEPT)
      target prot opt source destination
      ufw-before-logging-output all -- anywhere anywhere
      ufw-before-output all -- anywhere anywhere
      ufw-after-output all -- anywhere anywhere
      ufw-after-logging-output all -- anywhere anywhere
      ufw-reject-output all -- anywhere anywhere
      ufw-track-output all -- anywhere anywhere

      Chain ufw-after-forward (1 references)
      target prot opt source destination

      Chain ufw-after-input (1 references)
      target prot opt source destination
      ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:netbios-ns
      ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:netbios-dgm
      ufw-skip-to-policy-input tcp -- anywhere anywhere tcp dpt:netbios-ssn
      ufw-skip-to-policy-input tcp -- anywhere anywhere tcp dpt:microsoft-ds
      ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:bootps
      ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:bootpc
      ufw-skip-to-policy-input all -- anywhere anywhere ADDRTYPE match dst-type BROADCAST

      Chain ufw-after-logging-forward (1 references)
      target prot opt source destination
      LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] "

      Chain ufw-after-logging-input (1 references)
      target prot opt source destination
      LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] "

      Chain ufw-after-logging-output (1 references)
      target prot opt source destination

      Chain ufw-after-output (1 references)
      target prot opt source destination

      Chain ufw-before-forward (1 references)
      target prot opt source destination
      ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED
      ACCEPT icmp -- anywhere anywhere icmp destination-unreachable
      ACCEPT icmp -- anywhere anywhere icmp source-quench
      ACCEPT icmp -- anywhere anywhere icmp time-exceeded
      ACCEPT icmp -- anywhere anywhere icmp parameter-problem
      ACCEPT icmp -- anywhere anywhere icmp echo-request
      ufw-user-forward all -- anywhere anywhere

      Chain ufw-before-input (1 references)
      target prot opt source destination
      ACCEPT all -- anywhere anywhere
      ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED
      ufw-logging-deny all -- anywhere anywhere ctstate INVALID
      DROP all -- anywhere anywhere ctstate INVALID
      ACCEPT icmp -- anywhere anywhere icmp destination-unreachable
      ACCEPT icmp -- anywhere anywhere icmp source-quench
      ACCEPT icmp -- anywhere anywhere icmp time-exceeded
      ACCEPT icmp -- anywhere anywhere icmp parameter-problem
      ACCEPT icmp -- anywhere anywhere icmp echo-request
      ACCEPT udp -- anywhere anywhere udp spt:bootps dpt:bootpc
      ufw-not-local all -- anywhere anywhere
      ACCEPT udp -- anywhere 224.0.0.251 udp dpt:mdns
      ACCEPT udp -- anywhere 239.255.255.250 udp dpt:1900
      ufw-user-input all -- anywhere anywhere

      Chain ufw-before-logging-forward (1 references)
      target prot opt source destination

      Chain ufw-before-logging-input (1 references)
      target prot opt source destination

      Chain ufw-before-logging-output (1 references)
      target prot opt source destination

      Chain ufw-before-output (1 references)
      target prot opt source destination
      ACCEPT all -- anywhere anywhere
      ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED
      ufw-user-output all -- anywhere anywhere

      Chain ufw-logging-allow (0 references)
      target prot opt source destination
      LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW ALLOW] "

      Chain ufw-logging-deny (2 references)
      target prot opt source destination
      RETURN all -- anywhere anywhere ctstate INVALID limit: avg 3/min burst 10
      LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] "

      Chain ufw-not-local (1 references)
      target prot opt source destination
      RETURN all -- anywhere anywhere ADDRTYPE match dst-type LOCAL
      RETURN all -- anywhere anywhere ADDRTYPE match dst-type MULTICAST
      RETURN all -- anywhere anywhere ADDRTYPE match dst-type BROADCAST
      ufw-logging-deny all -- anywhere anywhere limit: avg 3/min burst 10
      DROP all -- anywhere anywhere

      Chain ufw-reject-forward (1 references)
      target prot opt source destination

      Chain ufw-reject-input (1 references)
      target prot opt source destination

      Chain ufw-reject-output (1 references)
      target prot opt source destination

      Chain ufw-skip-to-policy-forward (0 references)
      target prot opt source destination
      DROP all -- anywhere anywhere

      Chain ufw-skip-to-policy-input (7 references)
      target prot opt source destination
      DROP all -- anywhere anywhere

      Chain ufw-skip-to-policy-output (0 references)
      target prot opt source destination
      ACCEPT all -- anywhere anywhere

      Chain ufw-track-forward (1 references)
      target prot opt source destination

      Chain ufw-track-input (1 references)
      target prot opt source destination

      Chain ufw-track-output (1 references)
      target prot opt source destination
      ACCEPT tcp -- anywhere anywhere ctstate NEW
      ACCEPT udp -- anywhere anywhere ctstate NEW

      Chain ufw-user-forward (1 references)
      target prot opt source destination

      Chain ufw-user-input (1 references)
      target prot opt source destination
      ACCEPT tcp -- anywhere anywhere tcp dpt:http
      ACCEPT udp -- anywhere anywhere udp dpt:http
      ACCEPT tcp -- anywhere anywhere tcp dpt:ssh
      ACCEPT udp -- anywhere anywhere udp dpt:ssh
      ACCEPT tcp -- anywhere anywhere tcp dpt:https
      ACCEPT udp -- anywhere anywhere udp dpt:https

      Chain ufw-user-limit (0 references)
      target prot opt source destination
      LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning prefix "[UFW LIMIT BLOCK] "
      REJECT all -- anywhere anywhere reject-with icmp-port-unreachable

      Chain ufw-user-limit-accept (0 references)
      target prot opt source destination
      ACCEPT all -- anywhere anywhere

      Chain ufw-user-logging-forward (0 references)
      target prot opt source destination

      Chain ufw-user-logging-input (0 references)
      target prot opt source destination

      Chain ufw-user-logging-output (0 references)
      target prot opt source destination

      Chain ufw-user-output (1 references)
      target prot opt source destination


      Any help would be greatly appreciated. Thanks









      share







      New contributor




      Joshua is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.












      I've newly installed Openresty as the web server on an ec2 instance and its currently running but I can't even view the welcome page when I try to navigate to it via my public ip address at the browser. Anyone can tell whats the issue I'm having?



      So far I've tried these :





      1. telnet mypublicip and it gets stuck on


      Trying mypublicip...
      telnet: Unable to connect to remote host: Connection timed out




      1. Firewall is open but it should be okay I think, here is the output of sudo uwf status


      Output:



      Status: active

      To Action From
      -- ------ ----
      80 ALLOW Anywhere
      22 ALLOW Anywhere
      443 ALLOW Anywhere
      80 (v6) ALLOW Anywhere (v6)
      22 (v6) ALLOW Anywhere (v6)
      443 (v6) ALLOW Anywhere (v6)



      1. Here is the output of sudo iptables -L:


      Output:



      Chain ufw-track-input (1 references)
      target prot opt source destination

      Chain ufw-track-output (1 references)
      target prot opt source destination
      ACCEPT tcp -- anywhere anywhere ctstate NEW
      ACCEPT udp -- anywhere anywhere ctstate NEW

      Chain ufw-user-forward (1 references)
      target prot opt source destination

      Chain ufw-user-input (1 references)
      target prot opt source destination
      ACCEPT tcp -- anywhere anywhere tcp dpt:http
      ACCEPT udp -- anywhere anywhere udp dpt:http
      ACCEPT tcp -- anywhere anywhere tcp dpt:ssh
      ACCEPT udp -- anywhere anywhere udp dpt:ssh
      ACCEPT tcp -- anywhere anywhere tcp dpt:https
      ACCEPT udp -- anywhere anywhere udp dpt:https

      Chain ufw-user-limit (0 references)
      target prot opt source destination
      LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning prefix "[UFW LIMIT BLOCK] "
      REJECT all -- anywhere anywhere reject-with icmp-port-unreachable

      Chain ufw-user-limit-accept (0 references)
      target prot opt source destination
      ACCEPT all -- anywhere anywhere

      Chain ufw-user-logging-forward (0 references)
      target prot opt source destination

      Chain ufw-user-logging-input (0 references)
      target prot opt source destination

      Chain ufw-user-logging-output (0 references)
      target prot opt source destination

      Chain ufw-user-output (1 references)
      target prot opt source destination
      ubuntu@ip-10-110-100-100:/usr/local/openresty$ clear
      ubuntu@ip-10-110-100-100:/usr/local/openresty$ sudo iptables -L
      Chain INPUT (policy ACCEPT)
      target prot opt source destination
      ACCEPT all -- anywhere anywhere
      ufw-before-logging-input all -- anywhere anywhere
      ufw-before-input all -- anywhere anywhere
      ufw-after-input all -- anywhere anywhere
      ufw-after-logging-input all -- anywhere anywhere
      ufw-reject-input all -- anywhere anywhere
      ufw-track-input all -- anywhere anywhere

      Chain FORWARD (policy DROP)
      target prot opt source destination
      ufw-before-logging-forward all -- anywhere anywhere
      ufw-before-forward all -- anywhere anywhere
      ufw-after-forward all -- anywhere anywhere
      ufw-after-logging-forward all -- anywhere anywhere
      ufw-reject-forward all -- anywhere anywhere
      ufw-track-forward all -- anywhere anywhere

      Chain OUTPUT (policy ACCEPT)
      target prot opt source destination
      ufw-before-logging-output all -- anywhere anywhere
      ufw-before-output all -- anywhere anywhere
      ufw-after-output all -- anywhere anywhere
      ufw-after-logging-output all -- anywhere anywhere
      ufw-reject-output all -- anywhere anywhere
      ufw-track-output all -- anywhere anywhere

      Chain ufw-after-forward (1 references)
      target prot opt source destination

      Chain ufw-after-input (1 references)
      target prot opt source destination
      ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:netbios-ns
      ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:netbios-dgm
      ufw-skip-to-policy-input tcp -- anywhere anywhere tcp dpt:netbios-ssn
      ufw-skip-to-policy-input tcp -- anywhere anywhere tcp dpt:microsoft-ds
      ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:bootps
      ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:bootpc
      ufw-skip-to-policy-input all -- anywhere anywhere ADDRTYPE match dst-type BROADCAST

      Chain ufw-after-logging-forward (1 references)
      target prot opt source destination
      LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] "

      Chain ufw-after-logging-input (1 references)
      target prot opt source destination
      LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] "

      Chain ufw-after-logging-output (1 references)
      target prot opt source destination

      Chain ufw-after-output (1 references)
      target prot opt source destination

      Chain ufw-before-forward (1 references)
      target prot opt source destination
      ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED
      ACCEPT icmp -- anywhere anywhere icmp destination-unreachable
      ACCEPT icmp -- anywhere anywhere icmp source-quench
      ACCEPT icmp -- anywhere anywhere icmp time-exceeded
      ACCEPT icmp -- anywhere anywhere icmp parameter-problem
      ACCEPT icmp -- anywhere anywhere icmp echo-request
      ufw-user-forward all -- anywhere anywhere

      Chain ufw-before-input (1 references)
      target prot opt source destination
      ACCEPT all -- anywhere anywhere
      ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED
      ufw-logging-deny all -- anywhere anywhere ctstate INVALID
      DROP all -- anywhere anywhere ctstate INVALID
      ACCEPT icmp -- anywhere anywhere icmp destination-unreachable
      ACCEPT icmp -- anywhere anywhere icmp source-quench
      ACCEPT icmp -- anywhere anywhere icmp time-exceeded
      ACCEPT icmp -- anywhere anywhere icmp parameter-problem
      ACCEPT icmp -- anywhere anywhere icmp echo-request
      ACCEPT udp -- anywhere anywhere udp spt:bootps dpt:bootpc
      ufw-not-local all -- anywhere anywhere
      ACCEPT udp -- anywhere 224.0.0.251 udp dpt:mdns
      ACCEPT udp -- anywhere 239.255.255.250 udp dpt:1900
      ufw-user-input all -- anywhere anywhere

      Chain ufw-before-logging-forward (1 references)
      target prot opt source destination

      Chain ufw-before-logging-input (1 references)
      target prot opt source destination

      Chain ufw-before-logging-output (1 references)
      target prot opt source destination

      Chain ufw-before-output (1 references)
      target prot opt source destination
      ACCEPT all -- anywhere anywhere
      ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED
      ufw-user-output all -- anywhere anywhere

      Chain ufw-logging-allow (0 references)
      target prot opt source destination
      LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW ALLOW] "

      Chain ufw-logging-deny (2 references)
      target prot opt source destination
      RETURN all -- anywhere anywhere ctstate INVALID limit: avg 3/min burst 10
      LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] "

      Chain ufw-not-local (1 references)
      target prot opt source destination
      RETURN all -- anywhere anywhere ADDRTYPE match dst-type LOCAL
      RETURN all -- anywhere anywhere ADDRTYPE match dst-type MULTICAST
      RETURN all -- anywhere anywhere ADDRTYPE match dst-type BROADCAST
      ufw-logging-deny all -- anywhere anywhere limit: avg 3/min burst 10
      DROP all -- anywhere anywhere

      Chain ufw-reject-forward (1 references)
      target prot opt source destination

      Chain ufw-reject-input (1 references)
      target prot opt source destination

      Chain ufw-reject-output (1 references)
      target prot opt source destination

      Chain ufw-skip-to-policy-forward (0 references)
      target prot opt source destination
      DROP all -- anywhere anywhere

      Chain ufw-skip-to-policy-input (7 references)
      target prot opt source destination
      DROP all -- anywhere anywhere

      Chain ufw-skip-to-policy-output (0 references)
      target prot opt source destination
      ACCEPT all -- anywhere anywhere

      Chain ufw-track-forward (1 references)
      target prot opt source destination

      Chain ufw-track-input (1 references)
      target prot opt source destination

      Chain ufw-track-output (1 references)
      target prot opt source destination
      ACCEPT tcp -- anywhere anywhere ctstate NEW
      ACCEPT udp -- anywhere anywhere ctstate NEW

      Chain ufw-user-forward (1 references)
      target prot opt source destination

      Chain ufw-user-input (1 references)
      target prot opt source destination
      ACCEPT tcp -- anywhere anywhere tcp dpt:http
      ACCEPT udp -- anywhere anywhere udp dpt:http
      ACCEPT tcp -- anywhere anywhere tcp dpt:ssh
      ACCEPT udp -- anywhere anywhere udp dpt:ssh
      ACCEPT tcp -- anywhere anywhere tcp dpt:https
      ACCEPT udp -- anywhere anywhere udp dpt:https

      Chain ufw-user-limit (0 references)
      target prot opt source destination
      LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning prefix "[UFW LIMIT BLOCK] "
      REJECT all -- anywhere anywhere reject-with icmp-port-unreachable

      Chain ufw-user-limit-accept (0 references)
      target prot opt source destination
      ACCEPT all -- anywhere anywhere

      Chain ufw-user-logging-forward (0 references)
      target prot opt source destination

      Chain ufw-user-logging-input (0 references)
      target prot opt source destination

      Chain ufw-user-logging-output (0 references)
      target prot opt source destination

      Chain ufw-user-output (1 references)
      target prot opt source destination


      Any help would be greatly appreciated. Thanks







      ubuntu amazon-ec2 telnet ufw openresty





      share







      New contributor




      Joshua is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.










      share







      New contributor




      Joshua is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.








      share



      share






      New contributor




      Joshua is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.









      asked 4 mins ago









      JoshuaJoshua

      1




      1




      New contributor




      Joshua is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.





      New contributor





      Joshua is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.






      Joshua is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.






















          0






          active

          oldest

          votes












          Your Answer








          StackExchange.ready(function() {
          var channelOptions = {
          tags: "".split(" "),
          id: "2"
          };
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function() {
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled) {
          StackExchange.using("snippets", function() {
          createEditor();
          });
          }
          else {
          createEditor();
          }
          });

          function createEditor() {
          StackExchange.prepareEditor({
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: true,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: 10,
          bindNavPrevention: true,
          postfix: "",
          imageUploader: {
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          },
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          });


          }
          });






          Joshua is a new contributor. Be nice, and check out our Code of Conduct.










          draft saved

          draft discarded


















          StackExchange.ready(
          function () {
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f962137%2funable-to-connect-to-aws-ec2-instance-public-ip-via-browser%23new-answer', 'question_page');
          }
          );

          Post as a guest















          Required, but never shown

























          0






          active

          oldest

          votes








          0






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes








          Joshua is a new contributor. Be nice, and check out our Code of Conduct.










          draft saved

          draft discarded


















          Joshua is a new contributor. Be nice, and check out our Code of Conduct.













          Joshua is a new contributor. Be nice, and check out our Code of Conduct.












          Joshua is a new contributor. Be nice, and check out our Code of Conduct.
















          Thanks for contributing an answer to Server Fault!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid



          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.


          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function () {
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f962137%2funable-to-connect-to-aws-ec2-instance-public-ip-via-browser%23new-answer', 'question_page');
          }
          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          As a Security Precaution, the user account has been locked The Next CEO of Stack OverflowMS...

          Список ссавців Італії Природоохоронні статуси | Список |...

          Українські прізвища Зміст Історичні відомості |...