NetworkAclEntry - AWS Firewall Manager

NetworkAclEntry

Describes a rule in a network ACL.

Each network ACL has a set of numbered ingress rules and a separate set of numbered egress rules. When determining whether a packet should be allowed in or out of a subnet associated with the network ACL, AWS processes the entries in the network ACL according to the rule numbers, in ascending order.

When you manage an individual network ACL, you explicitly specify the rule numbers. When you specify the network ACL rules in a Firewall Manager policy, you provide the rules to run first, in the order that you want them to run, and the rules to run last, in the order that you want them to run. Firewall Manager assigns the rule numbers for you when you save the network ACL policy specification.

Contents

Egress

Indicates whether the rule is an egress, or outbound, rule (applied to traffic leaving the subnet). If it's not an egress rule, then it's an ingress, or inbound, rule.

Type: Boolean

Required: Yes

Protocol

The protocol number. A value of "-1" means all protocols.

Type: String

Length Constraints: Minimum length of 0. Maximum length of 1024.

Required: Yes

RuleAction

Indicates whether to allow or deny the traffic that matches the rule.

Type: String

Valid Values: allow | deny

Required: Yes

CidrBlock

The IPv4 network range to allow or deny, in CIDR notation.

Type: String

Length Constraints: Minimum length of 1. Maximum length of 1024.

Required: No

IcmpTypeCode

ICMP protocol: The ICMP type and code.

Type: NetworkAclIcmpTypeCode object

Required: No

Ipv6CidrBlock

The IPv6 network range to allow or deny, in CIDR notation.

Type: String

Length Constraints: Minimum length of 1. Maximum length of 1024.

Required: No

PortRange

TCP or UDP protocols: The range of ports the rule applies to.

Type: NetworkAclPortRange object

Required: No

See Also

For more information about using this API in one of the language-specific AWS SDKs, see the following: