interface NetworkAclEntryProperty
| Language | Type name |
|---|---|
.NET | Amazon.CDK.Mixins.Preview.AWS.FMS.Mixins.CfnPolicyPropsMixin.NetworkAclEntryProperty |
Go | github.com/aws/aws-cdk-go/awscdkmixinspreview/v2/awsfms/mixins#CfnPolicyPropsMixin_NetworkAclEntryProperty |
Java | software.amazon.awscdk.mixins.preview.services.fms.mixins.CfnPolicyPropsMixin.NetworkAclEntryProperty |
Python | aws_cdk.mixins_preview.aws_fms.mixins.CfnPolicyPropsMixin.NetworkAclEntryProperty |
TypeScript | @aws-cdk/mixins-preview » aws_fms » mixins » CfnPolicyPropsMixin » NetworkAclEntryProperty |
Describes a rule in a network ACL.
Each network ACL has a set of numbered ingress rules and a separate set of numbered egress rules. When determining whether a packet should be allowed in or out of a subnet associated with the network ACL, AWS processes the entries in the network ACL according to the rule numbers, in ascending order.
When you manage an individual network ACL, you explicitly specify the rule numbers. When you specify the network ACL rules in a Firewall Manager policy, you provide the rules to run first, in the order that you want them to run, and the rules to run last, in the order that you want them to run. Firewall Manager assigns the rule numbers for you when you save the network ACL policy specification.
Example
// The code below shows an example of how to instantiate this type.
// The values are placeholders you should change.
import { mixins as fms_mixins } from '@aws-cdk/mixins-preview/aws-fms';
const networkAclEntryProperty: fms_mixins.CfnPolicyPropsMixin.NetworkAclEntryProperty = {
cidrBlock: 'cidrBlock',
egress: false,
icmpTypeCode: {
code: 123,
type: 123,
},
ipv6CidrBlock: 'ipv6CidrBlock',
portRange: {
from: 123,
to: 123,
},
protocol: 'protocol',
ruleAction: 'ruleAction',
};
Properties
| Name | Type | Description |
|---|---|---|
| cidr | string | The IPv4 network range to allow or deny, in CIDR notation. |
| egress? | boolean | IResolvable | Indicates whether the rule is an egress, or outbound, rule (applied to traffic leaving the subnet). |
| icmp | IResolvable | Icmp | ICMP protocol: The ICMP type and code. |
| ipv6 | string | The IPv6 network range to allow or deny, in CIDR notation. |
| port | IResolvable | Port | TCP or UDP protocols: The range of ports the rule applies to. |
| protocol? | string | The protocol number. |
| rule | string | Indicates whether to allow or deny the traffic that matches the rule. |
cidrBlock?
Type:
string
(optional)
The IPv4 network range to allow or deny, in CIDR notation.
egress?
Type:
boolean | IResolvable
(optional)
Indicates whether the rule is an egress, or outbound, rule (applied to traffic leaving the subnet).
If it's not an egress rule, then it's an ingress, or inbound, rule.
icmpTypeCode?
Type:
IResolvable | Icmp
(optional)
ICMP protocol: The ICMP type and code.
ipv6CidrBlock?
Type:
string
(optional)
The IPv6 network range to allow or deny, in CIDR notation.
portRange?
Type:
IResolvable | Port
(optional)
TCP or UDP protocols: The range of ports the rule applies to.
protocol?
Type:
string
(optional)
The protocol number.
A value of "-1" means all protocols.
ruleAction?
Type:
string
(optional)
Indicates whether to allow or deny the traffic that matches the rule.

.NET
Go
Java
Python
TypeScript