By Implementation

Service Control PoliciesConfig RulesAuto Remediation RulesConformance PacksAmazon GuardDutyAmazon InspectorAWS Security HubAWS Network FirewallRoute53 Resolver SecurityAmazon MacieS3 Bucket PoliciesCloudWatch Alarms and Event RulesAWS WAFAWS Secrets ManagerAWS Systems ManagerSecurity Groups & NACLsAWS KMSIAM PoliciesVPC Endpoint PoliciesAmazon ECRRDS Event Subscriptions

By Service Protected

Configuration Packages

Strategy Guides

Other

Security Groups & NACLs

Whitelist Port(s)

A network ACL that whitelists inbound and outbound traffic based on Port(s) and blocks all other traffic.

The template creates the network access list (NACL) into an existing VPC, and requires the following details: 

  • VPC ID: Provide the VPC ID to create the NACL in.
  • NACL Rules: Click on 'Customize Rules' and enter the missing rule information (Source IP, Port number, Protocol, and Action) depending on the NACL template. 

See Related Items section for configuration templates to create a new VPC.

Items
5
Size
1.2 KB
Missing Parameters
AWSTemplateFormatVersion: "2010-09-09"
Description: ""
Resources:
  NetworkAcl:
    Type: "AWS::EC2::NetworkAcl"
    Properties:
      VpcId: ""
  IngressRule0:
    Type: "AWS::EC2::NetworkAclEntry"
    Properties:
      Egress: false
      NetworkAclId:
        Ref: "NetworkAcl"
      CidrBlock: "0.0.0.0/0"
      Protocol: "tcp"
      PortRange:
        From: ""
        To: ""
      RuleNumber: "100"
      RuleAction: "allow"
  IngressRule1:
    Type: "AWS::EC2::NetworkAclEntry"
    Properties:
      Egress: false
      NetworkAclId:
        Ref: "NetworkAcl"
      CidrBlock: "0.0.0.0/0"
      Protocol: "-1"
      RuleNumber: "200"
      RuleAction: "deny"
  EgressRule0:
    Type: "AWS::EC2::NetworkAclEntry"
    Properties:
      Egress: true
      NetworkAclId:
        Ref: "NetworkAcl"
      CidrBlock: "0.0.0.0/0"
      Protocol: "tcp"
      PortRange:
        From: ""
        To: ""
      RuleNumber: "100"
      RuleAction: "allow"
  EgressRule1:
    Type: "AWS::EC2::NetworkAclEntry"
    Properties:
      Egress: true
      NetworkAclId:
        Ref: "NetworkAcl"
      CidrBlock: "0.0.0.0/0"
      Protocol: "-1"
      RuleNumber: "200"
      RuleAction: "deny"
Parameters: {}
Metadata: {}
Conditions: {}

Actions



Customize Template

 
* Required field