Question: Create two VPCs (or subnets) with access to the Internet on your preferred cloud platform. Step 1 : Create two VPCs with one subnet each.

Create two VPCs (or subnets) with access to the Internet on your preferred cloud platform. Step 1: Create two VPCs with one subnet each.

- Make sure each subnet has a route table with an Internet route created and an Internet gateway associated.

The company will have one VM as a web server and a second VM in a different VPC or VNet as a database server. The web server should be accessible from the open Internet, but the database server should only allow communication with the web server.

Before opening ports for web traffic and database traffic, you want to ensure you have your security rules set appropriately. You decide to start with pings, which use ICMP and are easy to test. You'll need a source VM (your web server instance) and a target VM (your database server instance) in two separate VPCs or VNets. You need to prove that you can ping your target VM from your source VM but not from your local computer. While there are more secure ways to do this, in this scenario, you will place the target VM in a public subnet so that you can determine how to use security rules to control traffic to the target VM.

The second step is to create a virtual machine instance in each subnet. In the first subnet, create a VM instance that will act as your web server.

- In the second subnet, create a second VM instance that will act as your database server.

- Give both VM instances public IP addresses.

Step 3: Configure security rules for ICMP traffic to the target VM - Add an inbound rule that permits ICMP traffic (ping) from any source IP address to the network security group or firewall rules for the second subnet (database server subnet).

- You may use this rule to verify if the target VM can respond to pings.

Step 4: Configure security rules for SSH or RDP to the source VM - Add an inbound rule that permits SSH (if you're using Linux) or RDP (if you're using Windows) traffic from any source IP address to the network security group or firewall rules for the first subnet (web server subnet).

- You may access the source VM remotely thanks to this rule.

Set up security rules to limit ICMP traffic from source VM to target VM in step 5.

- Include an inbound rule that permits ICMP traffic (ping) particularly from the source VM's IP address in the network security group or firewall rules for the second subnet, which is the subnet for the database server.

- - Discontinue the earlier restriction that permitted ICMP traffic from any source. By blocking other sources, this rule will make sure that only the source VM may start ICMP traffic to the destination VM.

Step 6: Test the destination VM's ping from the source VM.

- Use SSH or RDP to connect to the source VM remotely.

- Open a terminal or command prompt in the source VM and issue the ping command using the IP address of the target VM as the target.

- Make that the ping is successful and that the destination VM responds.

- For documentation, take a snapshot of the ping output.

Step 7: Ping the target VM from a local PC.

- Open a terminal or command prompt on your local computer.

- Use the ping command to target the target VM's public IP address.

- Make sure the ping is unsuccessful and that the target VM doesn't respond.

- For documentation, take a snapshot of the ping output.

****** HAVE ALREADY CREATED VPC, SUBNET, AND INSTANCE*****

show how to do more precisly and guide step by step for each steps, please? Thank you :)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!