Enter your firewall / security group rules to detect conflicts, shadowed rules, redundancies, and dangerous configurations before deploying.