Reachability Analyzer explanation codes
If a destination is not reachable, Reachability Analyzer provides one or more explanation codes to help you diagnose and address network misconfiguration.
Path is not reachable
The following explanation codes indicate that the path analysis determined that the path is not reachable.
- BAD_STATE
- This component is not in a functional state. 
- BAD_STATE_ATTACHMENT
- The attachment between these components is not in a functional state. 
- BAD_STATE_ROUTE
- This route is not in a functional state. 
- BAD_STATE_VPN
- This VPN connection is not in a functional state. 
- CANNOT_ROUTE
- This route can't transmit traffic because its destination CIDR or prefix list does not match the destination address of the packet. 
- ELB_ACL_RESTRICTION
- Classic Load Balancers apply network ACLs to outbound traffic, even if it's destined for a target in the same subnet as the load balancer. 
- ELB_INSTALLED_AZ_RESTRICTION
- This load balancer can send traffic only to targets in Availability Zones that are enabled for the load balancer. 
- ELB_LISTENER_PORT_RESTRICTION
- This Classic Load Balancer listener allows only inbound traffic destined for the specified port, and outbound traffic with the specified destination port. 
- ELB_LISTENERS_MISMATCH
- This Classic Load Balancer does not have a listener that accepts the traffic. 
- ELB_NOT_CROSSZONE
- This load balancer can't send traffic to some targets because cross-zone load balancing is disabled. 
- ELBV2_LISTENER_HAS_NO_TG
- This listener is associated with target groups that have no targets. 
- ELBV2_LISTENER_PORT_RESTRICTION
- This listener does not accept traffic unless it has the specified destination port. 
- ELBV2_LISTENER_REQUIRES_TG_ACCEPT
- This listener does not have a target group that accepts the traffic. 
- ELBV2_LISTENERS_MISMATCH
- This load balancer does not have a listener that accepts the traffic. 
- ELBV2_NO_TARGETS_IN_AZ
- The load balancer does not have targets in the specified Availability Zones. 
- ELBV2_SOURCE_ADDRESS_PRESERVATION
- If source address preservation is enabled, the outgoing source address is unaltered while traversing the Network Load Balancer. 
- ENI_ADDRESS_RESTRICTION
- This network interface does not allow inbound or outbound traffic unless the source or destination address matches its private IP address. 
- ENI_SG_RULES_MISMATCH
- This security group has no inbound or outbound rules that apply. 
- ENI_SOURCE_DEST_CHECK_RESTRICTION
- Network interfaces with source/destination check enabled reject inbound traffic if the destination address does not match one of its private IP addresses, and reject outbound traffic if the source address does not match one of their private IP addresses. 
- FIREWALL_RULES_RESTRICTION
- The traffic is blocked by a matching Network Firewall firewall rule. 
- GATEWAY_REJECTS_SPOOFED_TRAFFIC
- Gateways reject traffic with spoofed addresses from the VPC. 
- GWLB_DESTINATION_PORT_RESTRICTION
- Traffic between a Gateway Load Balancer and its targets must use port 6081 as the destination port. To analyze connectivity through a Gateway Load Balancer, specify port 6081 in the path definition. 
- GWLB_PROTOCOL_RESTRICTION
- Traffic between a Gateway Load Balancer and its targets must use the GENEVE protocol, which is UDP-based. To analyze connectivity through a Gateway Load Balancer, specify the UDP protocol in the path definition. 
- HIGHER_PRIORITY_ROUTE
- This route table contains a route to the destination that can't be used because there is a higher priority route with the same destination CIDR. 
- IGW_DESTINATION_ADDRESS_IN_VPC_CIDRS
- Internet gateways accept traffic only if the destination address is within the VPC CIDR block. 
- IGW_DESTINATION_ADDRESS_NOT_IN_RFC1918_EGRESS
- Internet gateways reject outbound traffic with destination addresses in the private IP address range (see RFC1918 - ). 
- IGW_DESTINATION_ADDRESS_NOT_IN_RFC6598_EGRESS
- Internet gateways reject outbound traffic with destination addresses in the shared IP address range (see RFC6598 - ). 
- IGW_NAT_REFLECTION
- The path has an internet gateway as an intermediate component, which Reachability Analyzer does not support. Instead, analyze the path from the source to the internet gateway and then analyze the path from the internet gateway to the destination. 
- IGW_PRIVATE_IP_ASSOCIATION_FOR_INGRESS
- Internet gateways reject inbound traffic with a destination address that is not the public IP address of a network interface in the VPC with an available attachment. 
- IGW_PUBLIC_IP_ASSOCIATION_FOR_EGRESS
- Traffic can't reach the internet through the internet gateway if the source address is not paired with a public IP address or if the source address does not belong to a network interface in the VPC with an available attachment. 
- IGW_SOURCE_ADDRESS_NOT_IN_RFC1918_INGRESS
- Internet gateways reject inbound traffic with source addresses in the private IP address range (see RFC1918 - ). 
- IGW_SOURCE_ADDRESS_NOT_IN_RFC6598_INGRESS
- Internet gateways reject inbound traffic with source addresses in the shared IP address range (see RFC6598 - ). 
- INGRESS_RTB_NO_PUBLIC_IP
- A middlebox appliance can't receive traffic from the internet through an ingress route table if it does not have a public IP address. 
- INGRESS_RTB_TRAFFIC_REDIRECTION
- Subnets whose traffic is redirected to a middlebox appliance can't use a direct route to the internet gateway even when the subnet route table provides one. 
- MORE_SPECIFIC_ROUTE
- The specified route can't be used to transmit traffic because there is a more specific route that matches. You can use filters to require that a path include a specific intermediate component. 
- NGW_DEST_ADDRESS_PRESERVATION
- NAT gateways do not alter destination addresses. 
- NGW_REQUIRES_SOURCE_IN_VPC
- NAT gateways can only transmit traffic that originates from network interfaces within the same VPC. NAT gateways can't transmit traffic that originates from peering connections, VPN connections, or AWS Direct Connect. 
- NGW_SOURCE_ADDRESS_REASSIGN
- NAT gateways transform the source's addresses in outbound traffic to match its private IP address. 
- NO_POSSIBLE_DESTINATION
- The network component can't deliver the packet to any possible destination, or the network component sent traffic to a destination in another account or Region. If the destination is in another account, enable cross-account analyses. 
- NO_ROUTE_TO_DESTINATION
- The route table does not have an applicable route to the destination resource. 
- PCX_REQUIRES_ADDRESS_IN_VPC_CIDR
- Traffic can traverse this peering connection only if the destination or source address is within the CIDR block of the destination VPC. 
- PROTOCOL_RESTRICTION
- This component only accepts traffic with specific protocols. 
- REMAP_EPHEMERAL_PORT
- Outbound traffic from a NAT gateway or load balancer has the source port remapped to an ephemeral port in the range [1024–65535]. 
- SG_HAS_NO_RULES
- This security group has no inbound or outbound rules. 
- SG_REFERENCES_NOT_PRESERVED
- The network component discards security group information about forwarded traffic. This prevents traffic from being accepted by security group rules that accept traffic only from a source or destination that belongs to a security group. 
- SG_REFERENCING_SUPPORT
- The transit gateway VPC attachment does not have security group referencing support enabled. Therefore, we discard security group information about forwarded traffic. 
- SUBNET_ACL_RESTRICTION
- Inbound or outbound traffic for a subnet must be admitted by the network ACL for the subnet. 
- TARGET_ADDRESS_RESTRICTION
- A load balancer can only route traffic that is destined for the address of one of its targets. 
- TARGET_PORT_RESTRICTION
- A load balancer can only route traffic to a target using its registered port. 
- TGW_ATTACH_MISSING_TGW_RTB_ASSOCIATION
- This transit gateway attachment doesn't have a valid transit gateway route table association. 
- TGW_ATTACH_VPC_AZ_RESTRICTION
- Traffic from a VPC attachment in the default mode can't be forwarded to the network interface in this Availability Zone because it comes from an Availability Zone where the attachment has a different network interface. Traffic from a VPC attachment in appliance mode can't be forwarded to the network interface in this Availability Zone because on the forward path it used a different Availability Zone. 
- TGW_BAD_STATE_VPN
- This VPN connection is in a non-functional state. 
- TGW_ROUTE_AZ_RESTRICTION
- This transit gateway is not registered in the Availability Zone where the traffic originates. The VPC attachment must have a subnet association in the Availability Zone. 
- TGW_RTB_BAD_STATE_ROUTE
- This transit gateway route table has a route to the destination that is in a bad state. 
- TGW_RTB_CANNOT_ROUTE
- This transit gateway route table has a route to the intended destination, but the route does not match the packet destination address. 
- TGW_RTB_HIGHER_PRIORITY_ROUTE
- This transit gateway route table contains a route to the intended destination that can't be used because there is a higher-priority route with the same destination CIDR. 
- TGW_RTB_MORE_SPECIFIC_ROUTE
- This transit gateway route table has a route to the destination, but there is a more specific route. 
- TGW_RTB_NO_ROUTE_TO_TGW_ATTACHMENT
- This transit gateway route table has no route to this transit gateway attachment. 
- TGW_RTB_ROUTES_ARE_UNKNOWN
- The routes of this transit gateway route table are not known. This might be due to an internal error or because the transit gateway route table does not belong to the account running the analysis. 
- UNKNOWN_DESTINATION
- The path can't be extended because the information about the destination is insufficient. 
- UNKNOWN_PEERED_SGS
- One of the VPCs in the VPC peering connection is unknown. This is typically because the VPC is in a different account. Access controls referencing security groups are treated as inaccessible and deny traffic crossing this peering connection. 
- UNKNOWN_RESOURCE
- Reachability Analyzer can't analyze this resource because it can't describe the resource. 
- VGW_PRIVATE_IP_ASSOCIATION_FOR_EGRESS
- Virtual private gateways can't accept outbound traffic if the source address does not belong to a network interface in the VPC with an available attachment. 
- VGW_PRIVATE_IP_ASSOCIATION_FOR_INGRESS
- Virtual private gateways can't accept inbound traffic if the destination address is not the private IP address of a network interface in the VPC with an available attachment. 
- VPC_BLOCK_PUBLIC_ACCESS_ENABLED
- Internet traffic is blocked because VPC Block Public Access (BPA) is enabled. 
- VPC_LOCAL_ROUTE_CIDR_RESTRICTION
- Local routes apply only to packets with a destination address within the VPC CIDR block. 
- VPCE_GATEWAY_EGRESS_SOURCE_ADDRESS_RESTRICTION
- VPC gateway endpoints emit only traffic with source addresses within the CIDRs of their corresponding prefix lists. 
- VPCE_GATEWAY_PROTOCOL_RESTRICTION
- VPC gateway endpoints accept only TCP or ICMP ECHO traffic, and emit only TCP or ICMP ECHO reply traffic. 
- VPCE_INTRA_VPC_TRAFFIC
- A VPC endpoint can't initiate connections to resources in the same VPC where it is deployed. Instead, analyze the path in the reverse direction. 
- VPCE_SERVICE_NOT_INSTALLED_IN_AZ
- The VPC endpoint service is not installed in the specified Availability Zone. 
Configuration
The following explanation codes indicate that the path analysis determined that no path is possible.
- DISCONNECTED_VPCS
- The source and destination are in separate VPCs that are not connected by a supported resource. 
- NO_PATH
- 
            Reachability Analyzer was unable to find a path from the source to the destination. The following are the most common causes: - The path does not meet the optional configuration details, such as an IP address, port, or filter. 
- The source or destination components are temporarily isolated from the network (for example, a newly started instance that does not yet have a network interface). 
- The source can't initiate traffic to the destination (for example, an interface VPC endpoint or gateway VPC endpoint can't initiate connections with components in the same VPC as the VPC endpoint). 
- The path requires the ability to analyze an unsupported feature (for example, IPv6) or an unsupported network component. 
 
- NO_SOURCE_OR_DESTINATION
- The source or destination resource does not exist. 
- UNASSOCIATED_COMPONENT
- The component is not associated with a VPC in your account (for example, a recently terminated instance), or none of its network interfaces has an IPv4 address. 
- UNSUPPORTED_COMPONENT
- The component is not supported by Reachability Analyzer. 
Search filter codes
The following explanation codes indicate that the path analysis couldn't find a path from the source to the destination that matched the specified filters. However, there might be a path that matches some of the specified filters. Verify that the filters are as intended. Otherwise, remove the filters that didn't match.
- COMPONENT_FILTER_RESTRICTION
- There is no path that traverses the specified component. 
- COMPONENT_FILTER_RESTRICTION_REMOVED_COMPONENT
- There is no path that traverses the specified component because of an intermediate component filter. 
- FILTER_AT_DESTINATION_DESTINATION_ADDRESS
- There is no path that matches the specified destination IP address at the destination. 
- FILTER_AT_DESTINATION_DESTINATION_PORT_RANGE
- There is no path that matches the specified destination port range at the destination. 
- FILTER_AT_DESTINATION_PROTOCOL
- There is no path that matches the specified destination protocol. 
- FILTER_AT_DESTINATION_SOURCE_ADDRESS
- There is no path that matches the specified source address at the destination. 
- FILTER_AT_DESTINATION_SOURCE_PORT_RANGE
- There is no path that matches the specified source port range at the destination. 
- FILTER_AT_SOURCE_DESTINATION_ADDRESS
- There is no path that matches the specified destination IP address at the source. 
- FILTER_AT_SOURCE_DESTINATION_PORT_RANGE
- There is no path that matches the specified destination port range at the source. 
- FILTER_AT_SOURCE_PROTOCOL
- There is no path that matches the specified protocol. 
- FILTER_AT_SOURCE_SOURCE_ADDRESS
- There is no path that matches the specified source IP address at the source. 
- FILTER_AT_SOURCE_SOURCE_PORT_RANGE
- There is no path that matches the specified source port range at the source. 
- IGW_EXPECTS_PUBLIC_ADDRESS
- IP addresses must be public IP addresses when the resource is an internet gateway.