Network ACLs & Security Groups¶
Network ACLs¶
- [[NACL]] are like a [[firewall]] which control traffic from and to subnet
- [[Default NACL]] allows everything outbound and everything inbound
- One NACL per Subnet, new Subnets are assigned to the Default NACL
- Define NACL rules
- Rules have a number(1-32766) and higher precedence with a lower number
- If you define #100 ALLOW
and #200 DENY , [[IP]] will be allowed - Last rule is an asterisk (*) and denies a request in case of no rule match
- AWS recommends adding rules by increment of 100
- Newly created NACL will deny everything
- NACL are a great way of blocking a specific IP at the subnet level
https://docs.aws.amazon.com/vpc/latest/userguide/vpc-network-acls.html
Incoming Request¶
Outgoing Request¶
If we look at our DemoVPC NACL, we can see that all the inbound traffic is allowed, as well as all [[outbound network]].
Network ACLs vs Security Groups¶
https://docs.aws.amazon.com/vpc/latest/userguide/VPC_Security.html#VPC_Security_Comparison