On 6/8/24 08:05, George at Clug wrote:
Is it possible to be aware of all the ports required by systems/services
  like "AWS / Cloudflare / etc", such that it is possible to ensure any
firewalls that are put in place do not inhibit the features of these
systems?

In AWS you have a Virtual Private Cloud (VPC)


Inside the VPC you have one of more virtual private LANs. Within those you can allocat a non-routable CIDR - minimum class c (/24).
You can allocate a non-routabble IPv6 CIDR,

You may allocate a public IPv4 Address that is connected by AWS to your LAN via NAT.

Within the VPC you manage security policies that control the flow of data between the various

Assuming your private IP range is 192.168.100.0/24

192.168.100.1 is the router
192.168.100.2 is the DNS server
192.168.100.3 - reserved

Firewalling is provided by policies managed by you for connections between your different virtual private LANs and various AWS services and your public IPs

You can add additional firewalls on your virtual hosts independent of the AWS policies. You can also add security software like SELinux for hosts that provide public services such as a web server.

By default AWS policies are blocking, so you need to enable any traffic in the AWS policies as well as on your hosts.

If you want to access an AWS service such as S3 you need to add policy VPC rules to allow that.

Reply via email to