Refer to the following guide to learn how to use IAM in the cloud\ <https://scribehow.com/shared/Creating_an_IAM_User_and_User_Group_in_AWS_Management_Console__hWNiiXlcRJKFqYZZEJD-cg> Refer to this guide to learn how to create a Classic Load Balancer<https://scribehow.com/shared/AWS_Elastic_Load_Balancing__Getting_started_with_Classic_Load_Balance__edZk6AUORPir-vDtdkVHtg> Refer to this guide to learn how to create an Application Load Balancer<https://scribehow.com/shared/AWS_Elastic_Load_Balancing__Getting_started_with_ALB__EwQ9heoPR7SOessSgfviWA>
Sign in to **AWS Management Console** as an **IAM User** **Pre-requisite** - Ensure you have selected the AWS region closest to your location\ For this guide, we will be using us-east-2 (Ohio) as a preferred choice
Type **EC2** in the search bar and click on **EC2** to view the EC2 Dashboard
On the EC2 dashboard click on **Load Balancers** from the left bar to view the Load Balancers
Select and checkbox the "**my-application-load-balancer**" Load balancer to view its details
Scroll to the overview section to view all the details of the selected Load balancer
Click on the **Listeners and rules** tab to view the Listeners and rules set for the load balancer
In the **Listeners and rules** section, click the **Add listener** button on the right side to add a new listener
Scroll to the **Listener configuration** section, select the Protocol as **HTTP** and Port as **8080**
Scroll to the **Routing actions** section - Select "**Return fixed response**" as Routing actions - Give the Response code as **200** - Choose "**text/plain**" as the Content type
Give the **Response body** as [[<html><body>Hello</body></html>]]
Click on **Add** button
Listener successfully created. Now, click on "**Load balancers**"
Click on the **Security** tab to view the Security groups associated with the selected load balancer
Click on the **Security Group ID** link to view it
On the right side of the Security group section, click on **Edit inbound rules** button
Click on **Add rule** button to add a new rule
For the new rule give the Port range as "**8080**" and select "**Anywhere-IPv4**" as the Source
Click on **Save rules** button
Inbound security group rules successfully modified