Network ACLs in AWS control traffic at which level?
Think about where Network ACLs are applied in the network structure.
Network ACLs are stateless filters applied at the subnet level to control inbound and outbound traffic.
If a Network ACL rule explicitly denies traffic, what is the result?
Consider how deny rules affect network traffic flow.
Network ACL deny rules block traffic regardless of other permissions.
Which Network ACL rule correctly allows inbound HTTP traffic on port 80?
Rule Number: 100 Protocol: TCP Port Range: 80 Rule Action: Allow Egress: No
HTTP uses TCP on port 80 and the rule must allow inbound traffic.
Inbound HTTP traffic uses TCP port 80 and must be allowed by the rule with Egress set to No.
What is the security reason for explicitly defining both allow and deny rules in Network ACLs?
Think about controlling access tightly for security.
Explicit allow and deny rules help control traffic precisely, improving security by blocking unwanted traffic.
Network ACLs are stateless. What does this mean for return traffic after an inbound request?
Consider how stateless filters treat inbound and outbound packets separately.
Because Network ACLs are stateless, return traffic is treated as new traffic and must be allowed by outbound rules.