AWS::FMS::Policy NetworkAclEntry
Describes a rule in a network ACL.
Each network ACL has a set of numbered ingress rules and a separate set of numbered egress rules. When determining whether a packet should be allowed in or out of a subnet associated with the network ACL, AWS processes the entries in the network ACL according to the rule numbers, in ascending order.
When you manage an individual network ACL, you explicitly specify the rule numbers. When you specify the network ACL rules in a Firewall Manager policy, you provide the rules to run first, in the order that you want them to run, and the rules to run last, in the order that you want them to run. Firewall Manager assigns the rule numbers for you when you save the network ACL policy specification.
Syntax
To declare this entity in your AWS CloudFormation template, use the following syntax:
JSON
{ "CidrBlock" :
String
, "Egress" :Boolean
, "IcmpTypeCode" :IcmpTypeCode
, "Ipv6CidrBlock" :String
, "PortRange" :PortRange
, "Protocol" :String
, "RuleAction" :String
}
YAML
CidrBlock:
String
Egress:Boolean
IcmpTypeCode:IcmpTypeCode
Ipv6CidrBlock:String
PortRange:PortRange
Protocol:String
RuleAction:String
Properties
CidrBlock
-
The IPv4 network range to allow or deny, in CIDR notation.
Required: No
Type: String
Pattern:
^(([0-9]|[1-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[1-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])(\/([0-9]|[1-2][0-9]|3[0-2]))$
Update requires: No interruption
Egress
-
Indicates whether the rule is an egress, or outbound, rule (applied to traffic leaving the subnet). If it's not an egress rule, then it's an ingress, or inbound, rule.
Required: Yes
Type: Boolean
Update requires: No interruption
IcmpTypeCode
-
ICMP protocol: The ICMP type and code.
Required: No
Type: IcmpTypeCode
Update requires: No interruption
Ipv6CidrBlock
-
The IPv6 network range to allow or deny, in CIDR notation.
Required: No
Type: String
Pattern:
^(([0-9a-fA-F]{1,4}:){7,7}[0-9a-fA-F]{1,4}|([0-9a-fA-F]{1,4}:){1,7}:|([0-9a-fA-F]{1,4}:){1,6}:[0-9a-fA-F]{1,4}|([0-9a-fA-F]{1,4}:){1,5}(:[0-9a-fA-F]{1,4}){1,2}|([0-9a-fA-F]{1,4}:){1,4}(:[0-9a-fA-F]{1,4}){1,3}|([0-9a-fA-F]{1,4}:){1,3}(:[0-9a-fA-F]{1,4}){1,4}|([0-9a-fA-F]{1,4}:){1,2}(:[0-9a-fA-F]{1,4}){1,5}|[0-9a-fA-F]{1,4}:((:[0-9a-fA-F]{1,4}){1,6})|:((:[0-9a-fA-F]{1,4}){1,7}|:)|fe80:(:[0-9a-fA-F]{0,4}){0,4}%[0-9a-zA-Z]{1,}|::(ffff(:0{1,4}){0,1}:){0,1}((25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])\.){3,3}(25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])|([0-9a-fA-F]{1,4}:){1,4}:((25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])\.){3,3}(25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9]))(/(1[0-2]|[0-9]))?$
Update requires: No interruption
PortRange
-
TCP or UDP protocols: The range of ports the rule applies to.
Required: No
Type: PortRange
Update requires: No interruption
Protocol
-
The protocol number. A value of "-1" means all protocols.
Required: Yes
Type: String
Pattern:
^(tcp|udp|icmp|-1|([0-9]|[1-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5]))$
Update requires: No interruption
RuleAction
-
Indicates whether to allow or deny the traffic that matches the rule.
Required: Yes
Type: String
Allowed values:
allow | deny
Update requires: No interruption