Network policies in Kubernetes act like security guards checking if one pod can talk to another. When a pod tries to send data to a pod selected by a network policy, Kubernetes looks at the network policy rules. If the source pod's labels match the allowed 'from' selectors, the traffic is allowed. Otherwise (if policy selects dest but no rule match), it is blocked. For example, a policy allowing pods labeled 'role: frontend' to reach pods labeled 'app: nginx' will block traffic from other pods to nginx, but does not affect traffic to other destinations like redis (allowed by default). If no policy selects a pod, all traffic is allowed by default. This helps keep your cluster secure by controlling pod communication.