Why Does My ECS Fail to Communicate with Other After It Has Firewall Installed?
Symptom
An ECS has a single NIC and failed to communicate with others after the ECS has a firewall installed. An example scenario is as follows:
In a VPC, there are three ECSs. Services are deployed on ECS 1 and ECS 2, and a third-party firewall is installed on ECS X. Traffic from ECS 1 and ECS 2 needs to be filtered by the firewall of ECS X.
Fault Locating
The issues here are described in order of how likely they are to occur.
Troubleshoot the issue by ruling out the causes described here, one by one.
Possible Cause |
Solution |
---|---|
Security group rules |
|
Source/destination check |
|
VPC custom routes |
Whether Security Group Rules Are Configured
Subnets in the same VPC can communicate with each other. If your service ECS cannot communicate with the ECS that has firewall installed, check whether they are in the same security group.
If the ECSs are in different security groups, you need to add rules to the security groups to allow access from each other.
Whether Source/Destination Check Is Disabled
Check whether the source/destination check function is disabled on the NIC of the ECS with firewall installed. If the function is not disabled, perform the following operations to disable it:
- Log in to the management console.
- Click in the upper left corner and select the desired region and project.
- Click Service List and choose Compute > Elastic Cloud Server.
- In the ECS list, click the target ECS name.
- Click the NICs tab, click to expand information about the primary NIC, and check whether Source/Destination Check is disabled.
If it is not disabled, disable it.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot