SlideShare a Scribd company logo
1 of 1
Download to read offline
Step-2 (2 Marks) - Create a temporary security group to allow all traffic inbound and outbound
(make sure that you delete this security group after finishing the assignment). - Paste screenshot
of the security group inbound and outbound rules. Step-3 (2 Marks) [Use Default NACL) - Create
VM1_yourname is an AWS AMI located in subnet SN-0 (172.31.0.0/20). This is for testing
purposes associated with that temporary Security Group created in Step-2. - Test Connection with
VM1 using either SSH command or connect button available over AWS dashboard. - Once done
paste screenshot of VM1 running and Connection successful. Step-4 (4 Marks) {use Default NACL
} - Create VM2_yourname and VM3_yourname is an AWS AMI located in subnet SN-80 (
172.31.80.0/20) using following user data and temporary security group you created earlier at
step-2. It contains three Docker containers running NGINX webservers. - The user data to
bootstrap VM2 and VM3 is the following:

More Related Content

Similar to Step2 2 Marks Create a temporary security group to allo.pdf

Configuring cisco site to site ip sec vpn with dynamic ip endpoint cisco routers
Configuring cisco site to site ip sec vpn with dynamic ip endpoint cisco routersConfiguring cisco site to site ip sec vpn with dynamic ip endpoint cisco routers
Configuring cisco site to site ip sec vpn with dynamic ip endpoint cisco routers
phosika sithisane
 
Google chrome sandbox
Google chrome sandboxGoogle chrome sandbox
Google chrome sandbox
Nephi Johnson
 
Lab #2 Managing Host Based Security Purpose To develop .docx
Lab #2  Managing Host Based Security Purpose To develop .docxLab #2  Managing Host Based Security Purpose To develop .docx
Lab #2 Managing Host Based Security Purpose To develop .docx
smile790243
 
The license associated with the Belarc Advisor product allows
 The license associated with the Belarc Advisor product allows The license associated with the Belarc Advisor product allows
The license associated with the Belarc Advisor product allows
MikeEly930
 
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout SuiteCloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
OWASP Kyiv
 
AWS Summit Nordics - Getting Started With AWS
AWS Summit Nordics - Getting Started With AWSAWS Summit Nordics - Getting Started With AWS
AWS Summit Nordics - Getting Started With AWS
Amazon Web Services
 

Similar to Step2 2 Marks Create a temporary security group to allo.pdf (20)

Kl 031.30 eng_class_setup_guide_1.2
Kl 031.30 eng_class_setup_guide_1.2Kl 031.30 eng_class_setup_guide_1.2
Kl 031.30 eng_class_setup_guide_1.2
 
Three Tier Architecture Project Using AWS.pdf
Three Tier Architecture Project Using AWS.pdfThree Tier Architecture Project Using AWS.pdf
Three Tier Architecture Project Using AWS.pdf
 
Code Factory avec GitLab CI et Rancher
Code Factory avec GitLab CI et RancherCode Factory avec GitLab CI et Rancher
Code Factory avec GitLab CI et Rancher
 
Configuring cisco site to site ip sec vpn with dynamic ip endpoint cisco routers
Configuring cisco site to site ip sec vpn with dynamic ip endpoint cisco routersConfiguring cisco site to site ip sec vpn with dynamic ip endpoint cisco routers
Configuring cisco site to site ip sec vpn with dynamic ip endpoint cisco routers
 
Build, migrate and deploy apps for any environment with project Hammr , OW2co...
Build, migrate and deploy apps for any environment with project Hammr , OW2co...Build, migrate and deploy apps for any environment with project Hammr , OW2co...
Build, migrate and deploy apps for any environment with project Hammr , OW2co...
 
AWS re:Invent 2016: Workshop: Adhere to the Principle of Least Privilege by U...
AWS re:Invent 2016: Workshop: Adhere to the Principle of Least Privilege by U...AWS re:Invent 2016: Workshop: Adhere to the Principle of Least Privilege by U...
AWS re:Invent 2016: Workshop: Adhere to the Principle of Least Privilege by U...
 
Code Factory avec GitLab CI et Rancher
Code Factory avec GitLab CI et RancherCode Factory avec GitLab CI et Rancher
Code Factory avec GitLab CI et Rancher
 
Booting an image as a forensically sound vm in virtual box
Booting an image as a forensically sound vm in virtual boxBooting an image as a forensically sound vm in virtual box
Booting an image as a forensically sound vm in virtual box
 
vVMworld 2013: Deploying, Troubleshooting, and Monitoring VMware NSX Distribu...
vVMworld 2013: Deploying, Troubleshooting, and Monitoring VMware NSX Distribu...vVMworld 2013: Deploying, Troubleshooting, and Monitoring VMware NSX Distribu...
vVMworld 2013: Deploying, Troubleshooting, and Monitoring VMware NSX Distribu...
 
Google chrome sandbox
Google chrome sandboxGoogle chrome sandbox
Google chrome sandbox
 
Lab #2 Managing Host Based Security Purpose To develop .docx
Lab #2  Managing Host Based Security Purpose To develop .docxLab #2  Managing Host Based Security Purpose To develop .docx
Lab #2 Managing Host Based Security Purpose To develop .docx
 
(SDD422) Amazon VPC Deep Dive | AWS re:Invent 2014
(SDD422) Amazon VPC Deep Dive | AWS re:Invent 2014(SDD422) Amazon VPC Deep Dive | AWS re:Invent 2014
(SDD422) Amazon VPC Deep Dive | AWS re:Invent 2014
 
Cohesive Networks Support Docs: VNS3 Configuration Guide
Cohesive Networks Support Docs: VNS3 Configuration Guide Cohesive Networks Support Docs: VNS3 Configuration Guide
Cohesive Networks Support Docs: VNS3 Configuration Guide
 
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
 
Network Security VMs Project.pdf
Network Security VMs Project.pdfNetwork Security VMs Project.pdf
Network Security VMs Project.pdf
 
The license associated with the Belarc Advisor product allows
 The license associated with the Belarc Advisor product allows The license associated with the Belarc Advisor product allows
The license associated with the Belarc Advisor product allows
 
FIWARE Lab Cloud Portal
FIWARE Lab Cloud PortalFIWARE Lab Cloud Portal
FIWARE Lab Cloud Portal
 
Self service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsxSelf service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsx
 
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout SuiteCloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
 
AWS Summit Nordics - Getting Started With AWS
AWS Summit Nordics - Getting Started With AWSAWS Summit Nordics - Getting Started With AWS
AWS Summit Nordics - Getting Started With AWS
 

More from babitasingh698417

Study the following scenario and discuss and determine the a.pdf
Study the following scenario and discuss and determine the a.pdfStudy the following scenario and discuss and determine the a.pdf
Study the following scenario and discuss and determine the a.pdf
babitasingh698417
 
Student Learning Objectives 1 Identify the regions of the d.pdf
Student Learning Objectives 1 Identify the regions of the d.pdfStudent Learning Objectives 1 Identify the regions of the d.pdf
Student Learning Objectives 1 Identify the regions of the d.pdf
babitasingh698417
 

More from babitasingh698417 (20)

Sukis utility function is Where C1 is consumpt.pdf
Sukis utility function is     Where C1 is consumpt.pdfSukis utility function is     Where C1 is consumpt.pdf
Sukis utility function is Where C1 is consumpt.pdf
 
Subject Organizational Behaviour This is a long essay quest.pdf
Subject Organizational Behaviour This is a long essay quest.pdfSubject Organizational Behaviour This is a long essay quest.pdf
Subject Organizational Behaviour This is a long essay quest.pdf
 
successfully converting a 1point conversion is 10 The pro.pdf
successfully converting a 1point conversion is 10 The pro.pdfsuccessfully converting a 1point conversion is 10 The pro.pdf
successfully converting a 1point conversion is 10 The pro.pdf
 
Subtopic 3 Demonstrate awareness of own cultural bias Stude.pdf
Subtopic 3 Demonstrate awareness of own cultural bias Stude.pdfSubtopic 3 Demonstrate awareness of own cultural bias Stude.pdf
Subtopic 3 Demonstrate awareness of own cultural bias Stude.pdf
 
Subject Marketing Management Questions 1 Explain Four st.pdf
Subject Marketing Management Questions 1 Explain Four st.pdfSubject Marketing Management Questions 1 Explain Four st.pdf
Subject Marketing Management Questions 1 Explain Four st.pdf
 
Subject Data Structures and Algorithm Analysis for Python.pdf
Subject Data Structures and Algorithm Analysis for Python.pdfSubject Data Structures and Algorithm Analysis for Python.pdf
Subject Data Structures and Algorithm Analysis for Python.pdf
 
Sub Alternative research paradigm Do not copy from chatgp.pdf
Sub Alternative research paradigm  Do not copy from chatgp.pdfSub Alternative research paradigm  Do not copy from chatgp.pdf
Sub Alternative research paradigm Do not copy from chatgp.pdf
 
Study the following scenario and discuss and determine the i.pdf
Study the following scenario and discuss and determine the i.pdfStudy the following scenario and discuss and determine the i.pdf
Study the following scenario and discuss and determine the i.pdf
 
Su grupo de laboratorio debe identificar la clase de un cnid.pdf
Su grupo de laboratorio debe identificar la clase de un cnid.pdfSu grupo de laboratorio debe identificar la clase de un cnid.pdf
Su grupo de laboratorio debe identificar la clase de un cnid.pdf
 
Study figure 65 after reading the accompanying text Restat.pdf
Study figure 65 after reading the accompanying text Restat.pdfStudy figure 65 after reading the accompanying text Restat.pdf
Study figure 65 after reading the accompanying text Restat.pdf
 
Stun verilerinin satrlarda ve satr verilerinin stunlarda g.pdf
Stun verilerinin satrlarda ve satr verilerinin stunlarda g.pdfStun verilerinin satrlarda ve satr verilerinin stunlarda g.pdf
Stun verilerinin satrlarda ve satr verilerinin stunlarda g.pdf
 
Study the following scenario and discuss and determine the a.pdf
Study the following scenario and discuss and determine the a.pdfStudy the following scenario and discuss and determine the a.pdf
Study the following scenario and discuss and determine the a.pdf
 
Students from 2011 showed that about 25 of all Vancouver re.pdf
Students from 2011 showed that about 25 of all Vancouver re.pdfStudents from 2011 showed that about 25 of all Vancouver re.pdf
Students from 2011 showed that about 25 of all Vancouver re.pdf
 
Study all the materials in Chapter 2 of an introduction to p.pdf
Study all the materials in Chapter 2 of an introduction to p.pdfStudy all the materials in Chapter 2 of an introduction to p.pdf
Study all the materials in Chapter 2 of an introduction to p.pdf
 
Students at a major university in Southern California are co.pdf
Students at a major university in Southern California are co.pdfStudents at a major university in Southern California are co.pdf
Students at a major university in Southern California are co.pdf
 
Students at a local university have the option of taking fre.pdf
Students at a local university have the option of taking fre.pdfStudents at a local university have the option of taking fre.pdf
Students at a local university have the option of taking fre.pdf
 
Student Learning Objectives 1 Identify the regions of the d.pdf
Student Learning Objectives 1 Identify the regions of the d.pdfStudent Learning Objectives 1 Identify the regions of the d.pdf
Student Learning Objectives 1 Identify the regions of the d.pdf
 
Student debt Financial aid staff at a local university are .pdf
Student debt Financial aid staff at a local university are .pdfStudent debt Financial aid staff at a local university are .pdf
Student debt Financial aid staff at a local university are .pdf
 
struct S double x int ip int a12 Assuming.pdf
struct S    double x   int ip   int a12    Assuming.pdfstruct S    double x   int ip   int a12    Assuming.pdf
struct S double x int ip int a12 Assuming.pdf
 
Stripetastic grasshoppers are black with stripes A red stri.pdf
Stripetastic grasshoppers are black with stripes A red stri.pdfStripetastic grasshoppers are black with stripes A red stri.pdf
Stripetastic grasshoppers are black with stripes A red stri.pdf
 

Recently uploaded

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 

Recently uploaded (20)

Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 

Step2 2 Marks Create a temporary security group to allo.pdf

  • 1. Step-2 (2 Marks) - Create a temporary security group to allow all traffic inbound and outbound (make sure that you delete this security group after finishing the assignment). - Paste screenshot of the security group inbound and outbound rules. Step-3 (2 Marks) [Use Default NACL) - Create VM1_yourname is an AWS AMI located in subnet SN-0 (172.31.0.0/20). This is for testing purposes associated with that temporary Security Group created in Step-2. - Test Connection with VM1 using either SSH command or connect button available over AWS dashboard. - Once done paste screenshot of VM1 running and Connection successful. Step-4 (4 Marks) {use Default NACL } - Create VM2_yourname and VM3_yourname is an AWS AMI located in subnet SN-80 ( 172.31.80.0/20) using following user data and temporary security group you created earlier at step-2. It contains three Docker containers running NGINX webservers. - The user data to bootstrap VM2 and VM3 is the following: