Yes, your understanding is correct.
Point number 3, in the source port section, mostly ANY is given, but if you have a use case where your Application uses a range of Source port, you can apply ACL using the range as source port.
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
I understand that-
1.In Azure, we apply NSG(Network Security Groups) at subnet or individual NIC level(VM) whereas in AWS these can only be applied at individual VM level.
NACL is applied at subnet level in AWS.
2.In Azure, we have a column for source and destination IP address(for each of inbound and outbound categories).
I infer that due to Security Groups being applied at VM level in AWS, we define only destination IP for outbound rules(src being the VM) and source IP for inbound rules(dst being the VM).
Further,even for NACL in AWS, for inbound rule,only src IP can be defined .For outbound rule,only dst IP can be defined.
3.(AWS)Irrespective of inbound/outbound rules segregation, 'port' always refers to 'destination' side which listens on a specific port for traffic.
{This is usually the case with clients using a random port to connect to a server on a specific port like 80}
And unlike Azure, we cannot define both 'to' and 'from' ports while configuring inbound/outbound rules?
(in particular, we cannot define 'source' ports under either inbound/outbound section).
4.AWS defines only Allow rules whereas Azure has options for both allow and deny(security group).
Further,AWS has NACL which can contain both allow and deny statements.
5.Both AWS and Azure have 'stateful' concept, meaning an explicit rule for 'return' traffic response is not needed(define rules for only who gets to initiate the communication)—for security groups.
In AWS,we have NACL concept which is stateless,ie rules needed in both direction for communication to be successful.
Please correct me if I am missing something in my understanding.
Regards,
Aditya
Yes, your understanding is correct.
Point number 3, in the source port section, mostly ANY is given, but if you have a use case where your Application uses a range of Source port, you can apply ACL using the range as source port.
Hello!
Thanks for the response. Are you referring to Access Control Lists in AWS?
I only see NACL(Network ACL) which does not allow specifying port for the source of traffic(be it inbound or outbound rule).
Kind regards,
Aditya
Hi @msrini-MSFT
Do you have the answer for @gargaditya-0330 's question?