-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathnacl.tf
64 lines (55 loc) · 1.69 KB
/
nacl.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
# nacl.tf
# # # # # # # # # # # Task_2 code start # # # # # # # # # #
# Create a Public Network ACL
resource "aws_network_acl" "public_acl" {
vpc_id = aws_vpc.main_vpc.id
tags = {
Name = "Public Network ACL"
}
}
# Create Inbound Rule for ICMP traffic for the Public Network ACL
resource "aws_network_acl_rule" "inbound_rule_icmp" {
network_acl_id = aws_network_acl.public_acl.id
rule_number = 101
egress = false
protocol = "icmp"
rule_action = "allow"
cidr_block = "0.0.0.0/0"
icmp_type = -1
icmp_code = -1
}
# Create Inbound Rule for SSH traffic for the Public Network ACL
resource "aws_network_acl_rule" "inbound_rule_ssh" {
network_acl_id = aws_network_acl.public_acl.id
rule_number = 102
egress = false
protocol = "tcp"
rule_action = "allow"
cidr_block = "0.0.0.0/0"
from_port = 22
to_port = 22
}
# Create Inbound Rule for ephemeral ports for the Public Network ACL
# https://alliescomputing.com/knowledge-base/how-to-handle-ephemeral-ports
resource "aws_network_acl_rule" "inbound_rule_ephemeral" {
network_acl_id = aws_network_acl.public_acl.id
rule_number = 103
egress = false
protocol = "tcp"
rule_action = "allow"
cidr_block = "0.0.0.0/0"
from_port = 80
to_port = 65535
}
# Create Outbound Rule for the Public Network ACL
resource "aws_network_acl_rule" "outbound_rule" {
network_acl_id = aws_network_acl.public_acl.id
rule_number = 100
egress = true
protocol = "all"
rule_action = "allow"
cidr_block = "0.0.0.0/0"
from_port = 0
to_port = 0
}
# # # # # # # # # # # Task_2 code end # # # # # # # # # #