Menu
Amazon Elastic Compute Cloud
API Reference (API Version 2016-11-15)

DescribeNetworkAcls

Describes one or more of your network ACLs.

For more information about network ACLs, see Network ACLs in the Amazon Virtual Private Cloud User Guide.

Request Parameters

The following parameters are for this specific action. For more information about required and optional parameters that are common to all actions, see Common Query Parameters.

DryRun

Checks whether you have the required permissions for the action, without actually making the request, and provides an error response. If you have the required permissions, the error response is DryRunOperation. Otherwise, it is UnauthorizedOperation.

Type: Boolean

Required: No

Filter.N

One or more filters.

  • association.association-id - The ID of an association ID for the ACL.

  • association.network-acl-id - The ID of the network ACL involved in the association.

  • association.subnet-id - The ID of the subnet involved in the association.

  • default - Indicates whether the ACL is the default network ACL for the VPC.

  • entry.cidr - The IPv4 CIDR range specified in the entry.

  • entry.egress - Indicates whether the entry applies to egress traffic.

  • entry.icmp.code - The ICMP code specified in the entry, if any.

  • entry.icmp.type - The ICMP type specified in the entry, if any.

  • entry.ipv6-cidr - The IPv6 CIDR range specified in the entry.

  • entry.port-range.from - The start of the port range specified in the entry.

  • entry.port-range.to - The end of the port range specified in the entry.

  • entry.protocol - The protocol specified in the entry (tcp | udp | icmp or a protocol number).

  • entry.rule-action - Allows or denies the matching traffic (allow | deny).

  • entry.rule-number - The number of an entry (in other words, rule) in the ACL's set of entries.

  • network-acl-id - The ID of the network ACL.

  • tag:key=value - The key/value combination of a tag assigned to the resource. Specify the key of the tag in the filter name and the value of the tag in the filter value. For example, for the tag Purpose=X, specify tag:Purpose for the filter name and X for the filter value.

  • tag-key - The key of a tag assigned to the resource. This filter is independent of the tag-value filter. For example, if you use both the filter "tag-key=Purpose" and the filter "tag-value=X", you get any resources assigned both the tag key Purpose (regardless of what the tag's value is), and the tag value X (regardless of what the tag's key is). If you want to list only resources where Purpose is X, see the tag:key=value filter.

  • tag-value - The value of a tag assigned to the resource. This filter is independent of the tag-key filter.

  • vpc-id - The ID of the VPC for the network ACL.

Type: Array of Filter objects

Required: No

NetworkAclId.N

One or more network ACL IDs.

Default: Describes all your network ACLs.

Type: Array of strings

Required: No

Response Elements

The following elements are returned by the service.

networkAclSet

Information about one or more network ACLs.

Type: Array of NetworkAcl objects

requestId

The ID of the request.

Type: String

Errors

For information about the errors that are common to all actions, see Common Client Errors.

Example

Example

This example describes all your network ACLs.

Sample Request

https://ec2.amazonaws.com/?Action=DescribeNetworkAcls
&AUTHPARAMS

Sample Response

<DescribeNetworkAclsResponse xmlns="http://ec2.amazonaws.com/doc/2016-11-15/">
   <requestId>59dbff89-35bd-4eac-99ed-be587EXAMPLE</requestId> 
   <networkAclSet>
   <item>
     <networkAclId>acl-5566953c</networkAclId>
     <vpcId>vpc-5266953b</vpcId>
     <default>true</default>
     <entrySet>
       <item>
         <ruleNumber>100</ruleNumber>
         <protocol>all</protocol>
         <ruleAction>allow</ruleAction>
         <egress>true</egress>
         <cidrBlock>0.0.0.0/0</cidrBlock>
       </item>
       <item>
         <ruleNumber>32767</ruleNumber>
         <protocol>all</protocol>
         <ruleAction>deny</ruleAction>
         <egress>true</egress>
         <cidrBlock>0.0.0.0/0</cidrBlock>
       </item>
       <item>
         <ruleNumber>100</ruleNumber>
         <protocol>all</protocol>
         <ruleAction>allow</ruleAction>
         <egress>false</egress>
         <cidrBlock>0.0.0.0/0</cidrBlock>
       </item>
       <item>
         <ruleNumber>32767</ruleNumber>
         <protocol>all</protocol>
         <ruleAction>deny</ruleAction>
         <egress>false</egress>
         <cidrBlock>0.0.0.0/0</cidrBlock>
       </item>
     </entrySet>
     <associationSet/>
     <tagSet/>
   </item>
   <item>
     <networkAclId>acl-5d659634</networkAclId>
     <vpcId>vpc-5266953b</vpcId>
     <default>false</default>
     <entrySet>
       <item>
         <ruleNumber>110</ruleNumber>
         <protocol>6</protocol>
         <ruleAction>allow</ruleAction>
         <egress>true</egress>
         <cidrBlock>0.0.0.0/0</cidrBlock>
         <portRange>
           <from>49152</from>
           <to>65535</to>
         </portRange>
       </item>
       <item>
         <ruleNumber>120</ruleNumber>
         <protocol>6</protocol>
         <ruleAction>allow</ruleAction>
         <egress>true</egress>
         <ipv6CidrBlock>::/0</ipv6CidrBlock>
         <portRange>
           <from>49152</from>
           <to>65535</to>
         </portRange>
       </item>
       <item>
         <ruleNumber>32767</ruleNumber>
         <protocol>all</protocol>
         <ruleAction>deny</ruleAction>
         <egress>true</egress>
         <cidrBlock>0.0.0.0/0</cidrBlock>
       </item>
       <item>
         <ruleNumber>32768</ruleNumber>
         <protocol>all</protocol>
         <ruleAction>deny</ruleAction>
         <egress>true</egress>
         <ipv6CidrBlock>::/0</ipv6CidrBlock>
       </item>
       <item>
         <ruleNumber>110</ruleNumber>
         <protocol>6</protocol>
         <ruleAction>allow</ruleAction>
         <egress>false</egress>
         <cidrBlock>0.0.0.0/0</cidrBlock>
         <portRange>
           <from>80</from>
           <to>80</to>
         </portRange>
       </item>
       <item>
         <ruleNumber>115</ruleNumber>
         <protocol>6</protocol>
         <ruleAction>allow</ruleAction>
         <egress>false</egress>
         <ipv6CidrBlock>::/0</ipv6CidrBlock>
         <portRange>
           <from>80</from>
           <to>80</to>
         </portRange>
       </item>
       <item>
         <ruleNumber>120</ruleNumber>
         <protocol>6</protocol>
         <ruleAction>allow</ruleAction>
         <egress>false</egress>
         <cidrBlock>0.0.0.0/0</cidrBlock>
         <portRange>
           <from>443</from>
           <to>443</to>
         </portRange>
       </item>
       <item>
         <ruleNumber>32767</ruleNumber>
         <protocol>all</protocol>
         <ruleAction>deny</ruleAction>
         <egress>false</egress>
         <cidrBlock>0.0.0.0/0</cidrBlock>
       </item>
       <item>
         <ruleNumber>32768</ruleNumber>
         <protocol>all</protocol>
         <ruleAction>deny</ruleAction>
         <egress>false</egress>
         <ipv6CidrBlock>::/0</ipv6CidrBlock>
       </item>
     </entrySet>
     <associationSet>
       <item>
         <networkAclAssociationId>aclassoc-5c659635</networkAclAssociationId>
         <networkAclId>acl-5d659634</networkAclId>
         <subnetId>subnet-ff669596</subnetId>
       </item>
       <item>
         <networkAclAssociationId>aclassoc-c26596ab</networkAclAssociationId>
         <networkAclId>acl-5d659634</networkAclId>
         <subnetId>subnet-f0669599</subnetId>
       </item>
     </associationSet>
     <tagSet/>
   </item>
 </networkAclSet>
</DescribeNetworkAclsResponse>

See Also

For more information about using this API in one of the language-specific AWS SDKs, see the following: