[AWS Networking - Network ACLs & Security Groups]

Security Groups: Instance-Level Firewalls

Definition and Purpose of Security Groups

  • Security groups act as virtual firewalls at the instance level.

  • They control both inbound and outbound traffic for resources like EC2 instances, load balancers, and RDS databases.

  • By default, all inbound traffic is denied, and all outbound traffic is allowed.

Stateful Nature of Security Groups

  • Security groups are stateful, meaning return traffic for allowed inbound requests is automatically permitted.

  • For example, if HTTP traffic is allowed inbound on Port 80, the corresponding outbound responses are automatically allowed.

  • This simplifies management by eliminating the need for matching outbound rules for every inbound rule.

Configuring Security Group Rules

  • Inbound rules specify the type of traffic allowed and its source.

  • Outbound rules define the type of traffic allowed to leave the instance.

  • Rules can reference other security groups, enabling security group chaining.

Example: Security Group for an Application Load Balancer

  • Create a security group named “ALBsg” for the load balancer.

  • Add inbound rules for HTTP (Port 80) and HTTPS (Port 443) traffic from the Internet (0.0.0.0/0).

  • Associate the security group with the load balancer to allow Internet traffic.

Network Access Control Lists (Network ACLs)

Definition and Purpose of Network ACLs

  • Network ACLs provide an additional layer of security at the subnet level.

  • They control inbound and outbound traffic for subnets.

  • Unlike security groups, network ACLs are stateless, requiring explicit rules for both directions.

Default Behavior of Network ACLs

  • By default, network ACLs allow all inbound and outbound traffic.

  • This behavior can be modified to meet specific security requirements.

  • Network ACLs are useful for implementing granular security policies.

Stateless Nature of Network ACLs

  • Stateless means that return traffic must be explicitly allowed by outbound rules.

  • Both inbound and outbound rules must be defined for bidirectional communication.

  • This provides more control but requires careful configuration.

Use Cases for Network ACLs

  • Network ACLs are ideal for securing subnets with specific traffic requirements.

  • They can be used to troubleshoot network issues by temporarily modifying rules.

  • In simple use cases, default settings may suffice, but advanced scenarios may require customization.

Troubleshooting Network Connectivity Issues

Key Areas to Verify

  • Ensure the VPC has an Internet Gateway properly attached.

  • Check route tables for appropriate rules to direct traffic.

  • Verify route table associations with subnets are correctly configured.

Security Group Checks

  • Confirm security groups have the necessary inbound and outbound rules.

  • Ensure resources are associated with the correct security groups.

  • Review security group chaining to verify dependencies between resources.

Network ACL Checks

  • Review network ACL rules to ensure they allow required traffic.

  • Verify both inbound and outbound rules are correctly configured.

  • Adjust rules temporarily for troubleshooting purposes if needed.

Instance Configuration Checks

  • Confirm instances are associated with the correct subnets and security groups.

  • Verify instance-level settings, such as private IP addresses and public IP assignments.

  • Check for any misconfigurations that could impact connectivity.

Summary of Networking Concepts

VPCs and Subnets

  • VPCs provide isolated network environments, while subnets organize resources.

  • Route tables determine whether subnets are public or private.

  • Proper configuration of Internet Gateways and NAT Gateways is essential for connectivity.

Security Groups

  • Security groups act as stateful firewalls at the instance level.

  • They simplify management by automatically allowing return traffic for inbound rules.

  • Rules can reference other security groups, enabling flexible configurations.

Network ACLs

  • Network ACLs provide stateless security at the subnet level.

  • They require explicit rules for both inbound and outbound traffic.

  • Useful for granular control and troubleshooting network issues.

Troubleshooting Steps

  • Verify VPC and subnet configurations, including route tables and gateways.

  • Check security group and network ACL rules for necessary permissions.

  • Ensure instances are correctly associated with subnets and security groups.

Practical Application: Troubleshooting Database Connectivity

Scenario Overview

  • The application load balancer sends Internet traffic to EC2 instances.

  • EC2 instances connect to RDS database instances for queries.

  • Connectivity issues may arise due to misconfigured networking rules.

Steps to Troubleshoot

  • Verify the RDS database instance is in the correct subnet.

  • Check the security group for the database allows TCP traffic on Port 3306.

  • Ensure the EC2 instance security group is referenced in the database security group.

  • Review network ACLs for rules allowing database traffic.

Common Issues and Resolutions

  • Missing or incorrect security group rules for database traffic.

  • Misconfigured route tables preventing traffic flow.

  • Network ACLs blocking required inbound or outbound traffic.

Importance of Troubleshooting Skills

  • Network connectivity issues are common in AWS environments.

  • Understanding VPCs, subnets, security groups, and network ACLs is essential.

  • Troubleshooting skills enable efficient resolution of connectivity problems.