October 2015
Intermediate to advanced
282 pages
5h 40m
English
Once a security group has been created, access to all the ports associated with the security group is denied. Security rules are then added to the group in order to allow only certain type of traffic, thereby securing the Network. The rules are defined using Network traffic attributes such as protocol (TCP, UDP, or ICMP), the direction of traffic flow, for example, entering the port (ingress) or exiting the port (egress), and the application port, that is, the UDP or TCP socket ports.
For this recipe, you will need the following information:
Read now
Unlock full access