Describe the issue
In the README for EC2, under the section "Security groups for interface VPC endpoints", it states:
By default, interface VPC endpoints create a new security group and traffic is not automatically allowed from the VPC CIDR.
Use the connections object to allow traffic to flow to the endpoint:
declare const myEndpoint: ec2.InterfaceVpcEndpoint;
myEndpoint.connections.allowDefaultPortFromAnyIpv4();
In contrast, the InterfaceVpcEndpoint class does have a open property that is default true which states:
Whether to automatically allow VPC traffic to the endpoint.
If enabled, all traffic to the endpoint from within the VPC will be automatically allowed. This is done based on the VPC's CIDR range.
Links
Describe the issue
In the README for EC2, under the section "Security groups for interface VPC endpoints", it states:
In contrast, the
InterfaceVpcEndpointclass does have aopenproperty that is default true which states:Links