You can use the Edge Services portal to manage your Amazon Web Services (AWS) internet gateways. An internet gateway enables you to connect to an Elastic Compute Cloud (EC2) instance in AWS using your local computer.
You can store key pairs in Edge Services portal to access instances (e.g., bare metal servers) using SSH—simplifying administration and access across both private and public clouds. Edge Services portal only accepts key pairs in PEM format (for example, a private key beginning with -----BEGIN RSA PRIVATE KEY-----). If you have a key in another format, such as OpenSSH, convert the key before adding it.
You can use the Edge Services portal to configure the networks used when provisioning virtual machines. Networks can be configured for DHCP or Static IP assignment, assigned IP pools, and configured for visibility and account assignment. You manage virtual machines on the Provisioning tab.
You use security groups to enable ingress and egress communications between your virtual machines and the internet as well as check the connection of the virtual machine.
FTP (file transfer protocol)
FTP is used to transfer files or other data from one location to another. For example, moving files from a server to a device.
FTPS (file transfer protocol secure)
FTPS is used to securely transfer files or other data from one location to another. For example, securely transferring funds or legal documents.
HTTP (hypertext transfer protocol)
HTTP is used to transfer information, such as websites, from a server to a web browser. For example, viewing a website.
HTTPS (hypertext transfer protocol secure)
HTTPS is used to securely transfer information, such as websites, from a server to a web browser.
Ping is used to check the connection of a network. For example, checking the connection of a PC or virtual machine to the internet.
RDP (remote desktop protocol)
RDP is used to inspect and troubleshoot issues in a virtual machine. RDP enables you to remotely access virtual machines to diagnose problems. For example, remotely connecting to a virtual machine to investigate incorrect file transfer.
SSH (secure shell)
SSH is used for remote access into virtual machines and consoles. For example, remotely logging in to a virtual machine or accessing a command-line prompt for a virtual machine.