How Do I Troubleshoot a Network Failure After a Private NAT Gateway Is Configured?
Checking Security Group Rules
If the traffic to and from the ECS port is denied in the security group, add rules to the security group to allow the port traffic.
- Log in to the management console.
- Click in the upper left corner and select the desired region and project.
- Under Compute, select Elastic Cloud Server.
- In the ECS list, click the name of the ECS for which you will check the security group rules.
- Click the Security Groups tab and view security group rules.
- Check whether you have configured inbound and outbound rules to allow traffic to and from the ECS port.
- If yes, go to Checking Whether Default Route Pointing to the Private NAT Gateway Is Configured in the Route Table.
- If no, go to 7.
- Click Manage Rule. On the displayed page, click Inbound Rules or Outbound Rules to add an inbound rule and outbound rule that allow traffic to and from the ECS port.
Checking Whether Default Route Pointing to the Private NAT Gateway Is Configured in the Route Table
- Log in to the management console.
- Click in the upper left corner and select the desired region and project.
- Under Networking, click Virtual Private Cloud.
- In the navigation pane on the left, choose Route Tables.
- In the route table list, click the name of the route table associated with the VPC to which the private NAT gateway belongs.
- Check whether the route pointing to the private NAT gateway is configured in the route list.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.