Select your cookie preferences

We use essential cookies and similar tools that are necessary to provide our site and services. We use performance cookies to collect anonymous statistics, so we can understand how customers use our site and make improvements. Essential cookies cannot be deactivated, but you can choose “Customize” or “Decline” to decline performance cookies.

If you agree, AWS and approved third parties will also use cookies to provide useful site features, remember your preferences, and display relevant content, including relevant advertising. To accept or decline all non-essential cookies, choose “Accept” or “Decline.” To make more detailed choices, choose “Customize.”

Control traffic to VPC Lattice using network ACLs

Focus mode
Control traffic to VPC Lattice using network ACLs - Amazon VPC Lattice

A network access control list (ACL) allows or denies specific inbound or outbound traffic at the subnet level. The default network ACL allows all inbound and outbound traffic. You can create custom network ACLs for your subnets to provide an additional layer of security. For more information, see Network ACLs in the Amazon VPC User Guide.

Network ACLs for your client subnets

The network ACLs for client subnets must allow traffic between clients and VPC Lattice. You can get the IP address ranges to allow from the managed prefix list for VPC Lattice.

The following is an example inbound rule.

Source Protocol Port range Comment
vpc_lattice_cidr_block TCP 1025-65535 Allow traffic from VPC Lattice to clients

The following is an example outbound rule.

Destination Protocol Port range Comment
vpc_lattice_cidr_block listener listener Allow traffic from clients to VPC Lattice

Network ACLs for your target subnets

The network ACLs for target subnets must allow traffic between targets and VPC Lattice on both the target port and the health check port. You can get the IP address ranges to allow from the managed prefix list for VPC Lattice.

The following is an example inbound rule.

Source Protocol Port range Comment
vpc_lattice_cidr_block target target Allow traffic from VPC Lattice to targets
vpc_lattice_cidr_block health check health check Allow health check traffic from VPC Lattice to targets

The following is an example outbound rule.

Destination Protocol Port range Comment
vpc_lattice_cidr_block target 1024-65535 Allow traffic from targets to VPC Lattice
vpc_lattice_cidr_block health check 1024-65535 Allow health check traffic from targets to VPC Lattice
PrivacySite termsCookie preferences
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.