NetworkAclEntry
Describes a rule in a network ACL.
Each network ACL has a set of numbered ingress rules and a separate set of numbered egress rules. When determining whether a packet should be allowed in or out of a subnet associated with the network ACL, AWS processes the entries in the network ACL according to the rule numbers, in ascending order.
When you manage an individual network ACL, you explicitly specify the rule numbers. When you specify the network ACL rules in a Firewall Manager policy, you provide the rules to run first, in the order that you want them to run, and the rules to run last, in the order that you want them to run. Firewall Manager assigns the rule numbers for you when you save the network ACL policy specification.
Contents
- Egress
-
Indicates whether the rule is an egress, or outbound, rule (applied to traffic leaving the subnet). If it's not an egress rule, then it's an ingress, or inbound, rule.
Type: Boolean
Required: Yes
- Protocol
-
The protocol number. A value of "-1" means all protocols.
Type: String
Length Constraints: Minimum length of 0. Maximum length of 1024.
Required: Yes
- RuleAction
-
Indicates whether to allow or deny the traffic that matches the rule.
Type: String
Valid Values:
allow | deny
Required: Yes
- CidrBlock
-
The IPv4 network range to allow or deny, in CIDR notation.
Type: String
Length Constraints: Minimum length of 1. Maximum length of 1024.
Required: No
- IcmpTypeCode
-
ICMP protocol: The ICMP type and code.
Type: NetworkAclIcmpTypeCode object
Required: No
- Ipv6CidrBlock
-
The IPv6 network range to allow or deny, in CIDR notation.
Type: String
Length Constraints: Minimum length of 1. Maximum length of 1024.
Required: No
- PortRange
-
TCP or UDP protocols: The range of ports the rule applies to.
Type: NetworkAclPortRange object
Required: No
See Also
For more information about using this API in one of the language-specific AWS SDKs, see the following: