This is the new AWS CloudFormation Template Reference Guide. Please update your bookmarks and links. For help getting started with CloudFormation, see the AWS CloudFormation User Guide.
AWS::FMS::Policy NetworkAclEntry
Describes a rule in a network ACL.
Each network ACL has a set of numbered ingress rules and a separate set of numbered egress rules. When determining whether a packet should be allowed in or out of a subnet associated with the network ACL, AWS processes the entries in the network ACL according to the rule numbers, in ascending order.
When you manage an individual network ACL, you explicitly specify the rule numbers. When you specify the network ACL rules in a Firewall Manager policy, you provide the rules to run first, in the order that you want them to run, and the rules to run last, in the order that you want them to run. Firewall Manager assigns the rule numbers for you when you save the network ACL policy specification.
Syntax
To declare this entity in your AWS CloudFormation template, use the following syntax:
JSON
{ "CidrBlock" :String, "Egress" :Boolean, "IcmpTypeCode" :IcmpTypeCode, "Ipv6CidrBlock" :String, "PortRange" :PortRange, "Protocol" :String, "RuleAction" :String}
YAML
CidrBlock:StringEgress:BooleanIcmpTypeCode:IcmpTypeCodeIpv6CidrBlock:StringPortRange:PortRangeProtocol:StringRuleAction:String
Properties
- CidrBlock
- 
                    The IPv4 network range to allow or deny, in CIDR notation. Required: No Type: String Pattern: ^(([0-9]|[1-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])\.){3}([0-9]|[1-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])(\/([0-9]|[1-2][0-9]|3[0-2]))$Update requires: No interruption 
- Egress
- 
                    Indicates whether the rule is an egress, or outbound, rule (applied to traffic leaving the subnet). If it's not an egress rule, then it's an ingress, or inbound, rule. Required: Yes Type: Boolean Update requires: No interruption 
- IcmpTypeCode
- 
                    ICMP protocol: The ICMP type and code. Required: No Type: IcmpTypeCode Update requires: No interruption 
- Ipv6CidrBlock
- 
                    The IPv6 network range to allow or deny, in CIDR notation. Required: No Type: String Pattern: ^(([0-9a-fA-F]{1,4}:){7,7}[0-9a-fA-F]{1,4}|([0-9a-fA-F]{1,4}:){1,7}:|([0-9a-fA-F]{1,4}:){1,6}:[0-9a-fA-F]{1,4}|([0-9a-fA-F]{1,4}:){1,5}(:[0-9a-fA-F]{1,4}){1,2}|([0-9a-fA-F]{1,4}:){1,4}(:[0-9a-fA-F]{1,4}){1,3}|([0-9a-fA-F]{1,4}:){1,3}(:[0-9a-fA-F]{1,4}){1,4}|([0-9a-fA-F]{1,4}:){1,2}(:[0-9a-fA-F]{1,4}){1,5}|[0-9a-fA-F]{1,4}:((:[0-9a-fA-F]{1,4}){1,6})|:((:[0-9a-fA-F]{1,4}){1,7}|:)|fe80:(:[0-9a-fA-F]{0,4}){0,4}%[0-9a-zA-Z]{1,}|::(ffff(:0{1,4}){0,1}:){0,1}((25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])\.){3,3}(25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])|([0-9a-fA-F]{1,4}:){1,4}:((25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])\.){3,3}(25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9]))(/(1[0-2]|[0-9]))?$Update requires: No interruption 
- PortRange
- 
                    TCP or UDP protocols: The range of ports the rule applies to. Required: No Type: PortRange Update requires: No interruption 
- Protocol
- 
                    The protocol number. A value of "-1" means all protocols. Required: Yes Type: String Pattern: ^(tcp|udp|icmp|-1|([0-9]|[1-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5]))$Update requires: No interruption 
- RuleAction
- 
                    Indicates whether to allow or deny the traffic that matches the rule. Required: Yes Type: String Allowed values: allow | denyUpdate requires: No interruption