What should the SysOps administrator do to troubleshoot this issue?
Create Amazon CloudWatch logs for the EC2 instance to check for blocked traffic.
Create Amazon CloudWatch logs for the Site-to-Site VPN connection to check for blocked traffic.
Create VPC flow logs for the EC2 instance’s elastic network interface to check for rejected traffic.
Instruct users to use EC2 Instance Connect as a connection method.
Explanations:
Amazon CloudWatch logs do not capture packet-level details or traffic flow information directly related to network access or connection attempts on an EC2 instance.
CloudWatch logs for the VPN connection do not provide detailed flow information for specific EC2 traffic; VPC flow logs are needed for packet-level analysis.
VPC flow logs provide information on accepted and rejected traffic, which helps diagnose network access issues and verify if the traffic is being blocked or allowed.
EC2 Instance Connect does not support RDP connections and would not be helpful for troubleshooting this VPN connection issue.