<  Back to rules search

Network ACL inbound traffic is restricted

vpc

Classification:

compliance

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。

Description

Investigate AWS Network Access Control Lists (NACLs) for rules that enable multiple open ports and limit ingress traffic access based on port range.

Rationale

Eliminate the threat of unauthorized access malicious activities, such as Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks, by opening only the ports that are required by your application.

Remediation

Console

Follow the Adding and deleting rules docs to limit ingress traffic access based on port range.

CLI

  1. Run replace-network-acl-entry to create a rule that only allows ingress traffic from a specific port range.

    replace-network-acl-entry.sh

        aws ec2 replace-network-acl-entry
            --network-acl-id id-01234567
            --ingress
            --rule-number 01
            --protocol tcp
            --port-range From=000,To=000
            --rule-action allow