1.11. Network Access Control Lists (NACLs)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/41

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

42 Terms

1
New cards

What is a Network Access Control List (NACL) in AWS?

A subnet-level stateless firewall that filters traffic entering and exiting a subnet.

2
New cards

Are NACLs stateful or stateless?

Stateless.

3
New cards

What does stateless mean for NACLs?

They do not track connections. You must define rules for both the request and the response.

4
New cards

What traffic does a NACL filter?

Only traffic crossing the subnet boundary. Intra-subnet traffic is unaffected.

5
New cards

What two sets of rules does a NACL have?

Inbound rules (for traffic entering the subnet) and outbound rules (for traffic leaving the subnet).

6
New cards

Do NACLs allow explicit deny rules?

Yes, NACLs support both explicit allow and deny rules.

7
New cards

How are NACL rules evaluated?

In order of ascending rule number. First match wins, then evaluation stops.

8
New cards

What happens if no rule matches in a NACL?

An implicit deny is applied.

9
New cards

What is the default behavior of a newly created custom NACL?

All traffic is denied by default.

10
New cards

What is the default NACL behavior when a VPC is created?

Allows all traffic in and out by default.

11
New cards

Can a NACL be associated with multiple subnets?

Yes. One NACL can be associated with many subnets.

12
New cards

Can a subnet be associated with multiple NACLs?

No. One subnet can only have one NACL at a time.

13
New cards

Do NACLs understand AWS logical resources like instances or security groups?

No, NACLs only use IPs, CIDRs, ports, and protocols.

14
New cards

Why are NACLs used alongside security groups?

To explicitly deny traffic from known bad IPs or ranges, something SGs cannot do.

15
New cards

What makes configuring NACLs complex in multi-tier architectures?

You need separate inbound and outbound rules on both communicating subnets for both requests and responses.

16
New cards

Why do stateless firewalls often require wide port allowances?

Because ephemeral ports used for responses vary and can't be predicted.

17
New cards

What does an ephemeral port range typically include?

TCP ports 1024–65535 (OS-dependent).

18
New cards

What does associating a NACL with a subnet do?

It applies the NACL’s rules to all traffic entering or leaving that subnet.

19
New cards

Can you explicitly block a bad IP using a NACL?

Yes, using a deny rule with the bad actor’s IP.

20
New cards

What is a Security Group in AWS?

A stateful virtual firewall attached to an elastic network interface (ENI), controlling inbound and outbound traffic.

21
New cards

Are security groups stateful or stateless?

Stateful.

22
New cards

What does stateful mean for security groups?

If a request is allowed, the corresponding response is automatically allowed.

23
New cards

Can security groups have explicit deny rules?

No. They only allow implicit deny — if not allowed, it’s denied.

24
New cards

What happens if you don’t define a rule in a security group?

The traffic is implicitly denied.

25
New cards

What level do security groups apply to?

They are attached to ENIs (Elastic Network Interfaces), not subnets or instances directly.

26
New cards

Can a security group be attached to multiple ENIs?

Yes.

27
New cards

Can you reference another security group in a rule?

Yes. This is called logical referencing.

28
New cards

What is the benefit of referencing a security group in another?

It allows dynamic and scalable permissioning across tiers without managing IPs.

29
New cards

Can a security group reference itself?

Yes, enabling intra-group traffic like cluster coordination or replication.

30
New cards

What traffic direction do security groups evaluate?

Both inbound and outbound. But responses to allowed traffic are auto-allowed.

31
New cards

Can security groups simplify ephemeral port management?

Yes. You don’t need to manage ephemeral port rules — it’s handled automatically.

32
New cards

Do security groups support CIDR-based rules?

Yes, and they also support referencing logical AWS resources.

33
New cards

What’s an example use case for security group self-referencing?

High-availability systems like clustered databases, allowing communication between nodes.

34
New cards

Can you block a specific IP with a security group?

No, you need to use a NACL to explicitly block IPs or CIDR ranges.

35
New cards

Should you use SGs or NACLs to allow traffic?

Use SGs to allow, and NACLs to explicitly deny/block where necessary.

36
New cards

What is a key difference in how NACLs and SGs process rules?

NACLs are processed by rule order (numbered), SGs process all rules and apply the most permissive match.

37
New cards

Which offers finer control over blocking traffic?

NACLs, due to explicit deny support.

38
New cards

Which is more flexible and scalable in dynamic architectures?

Security Groups, especially with logical resource referencing.

39
New cards

What is the default behavior of a security group?

Deny all traffic unless explicitly allowed.

40
New cards

What happens to a new EC2 instance if no SGs are attached?

It will have no access until at least one SG allows traffic.

41
New cards

Can security groups be changed after instance creation?

Yes, they can be added or removed at any time.

42
New cards

What happens if you reference SG-A inside SG-B?

All resources associated with SG-A can access resources associated with SG-B, per the defined rules.