I have a simple basic AWS architecture which I have not been able to make work.
VPC1
- CIDR
192.168.0.0/16
- 3 subnets:
- 192.168.0.0/26
- 192.168.80.0/26
- 192.168.160.0/26
- All are public subnets with Internet Gateway attached
- Security Group: SG1
- One EC2 instance running here, private IP: 192.168.0.54
VPC2
- CIDR:
192.170.0.0/16
- 3 subnets:
- 192.170.0.0/26
- 192.170.80.0/26
- 192.170.160.0/26
- All are private subnets and without any NAT Gateway
- Security Group inbound rules:
- SSH Port 22 Source 192.168.0.0/16, so that I can ssh from the instance in VPC1
- One EC2 instance running here, private IP: 192.170.0.49
- Also tried adding Network ACLs in these subnets as:
- SSH Port 22 Source 192.168.0.0/16 Allow
However I am unable to reach (ssh) from the first instance (in VPC1) to the second (in VPC2). Even tried adding ICMP inbound rule but ping also doesn't work.
Am I missing anything obvious here? Will these routing rules alone not be able to route traffic between instances in different subnet and VPC?