CodexBloom - Programming Q&A Platform

OCI Bastion Host Configuration scenarios to Allow SSH Connections from Specific IP Range

👀 Views: 24 đŸ’Ŧ Answers: 1 📅 Created: 2025-06-10
oracle-cloud-infrastructure ssh networking bash

I recently switched to I'm working on a personal project and Quick question that's been bugging me - I'm working with an scenario with my OCI Bastion Host setup where I'm unable to establish SSH connections from a specific IP range. I've configured the bastion host security lists to allow inbound traffic on port 22 for my office's public IP range (e.g., `203.0.113.0/24`), but when I attempt to SSH in, I get the behavior: `ssh: connect to host <Bastion_IP> port 22: Connection timed out`. I have verified that the bastion host is running and the public IP is correct. Here's the relevant part of the security list configuration: ```json { "ingressRules": [ { "protocol": "6", "source": "203.0.113.0/24", "destPortRange": "22", "description": "Allow SSH from office IP range" } ] } ``` I also checked the Network Security Group (NSG) associated with my subnet, which seems to have the same settings but still no luck. In addition, I can SSH into other instances within the same VCN without any issues. I've also tried temporarily allowing all inbound traffic on port 22 to rule out any routing issues, and that works, but reapplying the restrictions to the specific IP range leads to the same connection timeout. Has anyone experienced similar issues with bastion host configurations in OCI, or does anyone have suggestions on what else I might check? This is part of a larger API I'm building. Any help would be greatly appreciated! My development environment is Ubuntu. What's the best practice here? This is part of a larger web app I'm building. I recently upgraded to Bash 3.9. Cheers for any assistance!