Policy: AWS > VPC > Network ACL > Ingress Rules > Approved > Prohibited Ports
A YAML list of ports that are prohibited and may not be used for ingress in custom network ACLs. For example, 21 might be prohibited to prevent the use of FTP. This list is also applied to ICMP rules, so should be checked against valid ICMP numbers.
Applies to non-Turbot managed Network ACLs.
Examples: - 21 # FTP - 25 # SMTP
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Controls
Policy Specification
Schema Type |
|
---|---|
Default |
|
Category
In Your Workspace
Developers
- tmod:@turbot/turbot#/control/categories/resourceApproved
- tmod:@turbot/aws-vpc-security#/policy/types/networkAclIngressRulesApprovedProhibitedPorts
- turbot graphql policy-type --id "tmod:@turbot/aws-vpc-security#/policy/types/networkAclIngressRulesApprovedProhibitedPorts"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/aws-vpc-security#/policy/types/networkAclIngressRulesApprovedProhibitedPorts"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI