NEED A PERFECT PAPER? PLACE YOUR FIRST ORDER AND SAVE 15% USING COUPON:

4.8/5

GMU Inbound Traffic Make Sure that it Is Going via 80HTTP & 444HTTPs Response

GMU Inbound Traffic Make Sure that it Is Going via 80HTTP & 444HTTPs Response.

As you are probably aware by now, Security Groups are AWS’s built-in firewalls for cloud resources. By default, all outbound traffic is allowed, but no inbound traffic is permitted; you must specify all ingress traffic based on IP addresses, IP ranges, or other Security Groups, and ports for specific services, to allow that traffic to reach a resource within the target Security Group.

For this discussion, assume you have the following resources deployed in AWS:

  1. Three (3) EC2 instances, each running Red Hat Enterprise Linux with an Apache web server, hosting web interfaces for the Virginia DMV’s online vehicle registration portal, all part of a Security Group entitled “web-server-security-group.”
  2. Three (3) EC2 instances, each running Red Hat Enterprise Linux with several Java Virtual Machines, which host the application servers to process the aforementioned vehicle registrations. These instances all fall under a Security Group entitled “app-server-security-group.”
  3. Two (2) Elastic Load Balancers (ELBs) sit in their own VPC above these six (6) instances:
    1. The ELB for the app servers is called “app-server-load-balancer” with its own Security Group “app-server-load-balancer-security-group;”
    2. The ELB for the web servers is called “web-server-load-balancer” with its own Security Group “web-server-load-balancer-security-group.”

For the purposes of the discussion, we won’t expand the architecture include any database servers.

Also assume the following requirements:

  1. Website traffic from end users renewing their vehicle registrations will enter the architecture on ports 80 (HTTP) and 443 (HTTPS).
  2. App server traffic will be received exclusively from the internal web servers on a range of ports between 25500-25700.
  3. The app servers must be able to send responses back to the web servers, and the web servers must be able to respond to the end users.

Okay, that was a lot of background information! The question for discussion is: How do you configure the Security Groups to ensure that the entire application flow works per the requirements? Which Security Groups do you edit, and what rules do you create within them? Be specific!

Here is the book incase you needed it https://livebook.manning.com/book/securing-devops/chapter-6/1

(Then I’ll give you two responses to respond to please)

GMU Inbound Traffic Make Sure that it Is Going via 80HTTP & 444HTTPs Response

Solution:

Why US?

100% Confidentiality

Information about customers is confidential and never disclosed to third parties.

Timely Delivery

No missed deadlines – 97% of assignments are completed in time.

Original Writing

We complete all papers from scratch. You can get a plagiarism report.

Money Back

If you are convinced that our writer has not followed your requirements, feel free to ask for a refund.

WhatsApp us for help!
%d bloggers like this: