
Explanation:
VPC Flow Logs allow you to capture information about the IP traffic going to and from network interfaces in your VPC. Analyzing the VPC flow logs attached to the EC2 instance's ENI will help identify if the traffic from the on-premises network is reaching the instance and if it's being accepted or rejected due to Security Group or Network ACL rules.
Ultimate access to all questions.
Question 31 A company has an AWS Site-to-Site VPN connection between on-premises resources and resources that are hosted in a VPC. A SysOps administrator launches an Amazon EC2 instance that has only a private IP address into a private subnet in the VPC. The EC2 instance runs Microsoft Windows Server. A security group for the EC2 instance has rules that allow inbound traffic from the on-premises network over the VPN connection. The on-premises environment contains a third-party network firewall. Rules in the third-party network firewall allow Remote Desktop Protocol (RDP) traffic to flow between the on-premises users over the VPN connection. The on-premises users are unable to connect to the EC2 instance and receive a timeout error. What should the SysOps administrator do to troubleshoot this issue?
A
Create Amazon CloudWatch logs for the EC2 instance to check for blocked traffic.
B
Create Amazon CloudWatch logs for the Site-to-Site VPN connection to check for blocked traffic.
C
Create VPC flow logs for the EC2 instance's elastic network interface to check for rejected traffic.
D
Instruct users to use EC2 Instance Connect as a connection method.
No comments yet.