A customer has a web server deployed using IP Network. They want to open a secure connection to it using the HTTPS protocol by opening a firewall rule to allow traffic.
What sequence of steps would create this firewall rule?
A. Create a Security Protocol for port 443, create an ACL, create a security rule, and associate the ACL to the instance vNIC.
B. Create a Security Protocol for port 443, create a security rule, create an ACL, and associate the ACL to the instance vNIC.
C. Associate the ACL to the instance vNIC, create a Security Protocol for port 443, and create a security rule.
D. Create a Security Protocol for port 443, create an ACL, create a security rule adding the security protocol and ACL created before, and finally associate the ACL to the instance vNIC.