Q: 14
Application A runs on Amazon EC2 instances behind a Network Load Balancer (NLB). The EC2
instances are in an Auto Scaling group and are in the same subnet that is associated with the NLB.
Other applications from an on-premises environment cannot communicate with Application A on
port 8080.
To troubleshoot the issue, a CloudOps engineer analyzes the flow logs. The flow logs include the
following records:
ACCEPT from 192.168.0.13:59003 → 172.31.16.139:8080
REJECT from 172.31.16.139:8080 → 192.168.0.13:59003
What is the reason for the rejected traffic?
Options
Discussion
Option D not B. Trap is thinking security groups block it, but it's the stateless NACL blocking outbound ephemeral.
encountered exactly similar question in my exam. in practice exams, it's D
Pretty sure it's D. The flow log shows the outbound (response) traffic to the client's ephemeral port gets rejected, which is classic when the subnet's NACL doesn't allow that outbound range. Security groups are stateful so wouldn't block the reply like this. Let me know if I'm missing something.
Maybe D. Saw almost the same setup in a practice test, and it was an outbound NACL rule missing for ephemeral ports.
Looks like D, since NACLs are stateless and you need explicit outbound rules for return traffic to those ephemeral ports. Security groups would allow the response back automatically so pretty sure it’s not B. Anyone disagree?
Option B Had something like this in a mock and picked B because I thought the NLB security group might be blocking on-prem traffic, not realizing it's stateless. Not totally sure though, feel free to correct me.
Its B, not D. I think the NLB’s security group is a common trap in these questions.
C/D? Nothing in the flow log suggests security group issues, so pretty sure it's D.
A is wrong, D. Security groups allow response traffic automatically since they're stateful, but NACLs need explicit outbound rules for those return ephemeral ports. I think D fits best but open to other views.
Call it D. Security groups are stateful so return traffic is automatically allowed, but NACLs need explicit outbound rules for those ephemeral ports.
Be respectful. No spam.