I'm confident firewall rules are correct as I can ssh to 192.168.1.1 (OpnSense on custom cloud) from an AWS EC2 server. I can also proxy to 192.168.1.100 (web server) via 192.168.1.1 from said server.
To be sure, I disabled firewall on OpnSense and tested with the same outcome - SSH and ping directly to 192.168.1.100 fails from EC2 server.
It feels like routing related and I don't have any static routes defined under System > Routes > Configuration. I'm not quite sure what to select for Network Address (192.168.1.100?) and Gateway (WAN?).
NAT is set to Automatic and I can see the AWS WAN interfaces are listed.
AmazonIKEvpn03139b9b80 networks, AmazonIKEvpn03139b9b81 networks, LAN networks, Loopback networks, 127.0.0.0/8
To be sure, I disabled firewall on OpnSense and tested with the same outcome - SSH and ping directly to 192.168.1.100 fails from EC2 server.
It feels like routing related and I don't have any static routes defined under System > Routes > Configuration. I'm not quite sure what to select for Network Address (192.168.1.100?) and Gateway (WAN?).
NAT is set to Automatic and I can see the AWS WAN interfaces are listed.
AmazonIKEvpn03139b9b80 networks, AmazonIKEvpn03139b9b81 networks, LAN networks, Loopback networks, 127.0.0.0/8