ALIYUN::VPC::TrafficMirrorFilter is used to create a filter for traffic mirroring.
Syntax
{
"Type": "ALIYUN::VPC::TrafficMirrorFilter",
"Properties": {
"TrafficMirrorFilterDescription": String,
"EgressRules": List,
"TrafficMirrorFilterName": String,
"IngressRules": List
}
}
Properties
Property | Type | Required | Editable | Description | Constraint |
TrafficMirrorFilterDescription | String | No | Yes | The description of the filter. | The description must be 1 to 256 characters in length. The description cannot start with |
EgressRules | List | No | No | Details of the outbound rules in the filter. | For more information, see EgressRules properties. |
TrafficMirrorFilterName | String | No | Yes | The name of the filter. | The name must be 1 to 128 characters in length. The name cannot start with |
IngressRules | List | No | No | Details of the inbound rules in the filter. | For more information, see IngressRules properties. |
EgressRules syntax
"EgressRules": [
{
"DestinationPortRange": String,
"Action": String,
"SourcePortRange": String,
"Priority": Integer,
"SourceCidrBlock": String,
"DestinationCidrBlock": String,
"Protocol": String
}
]
EgressRules properties
Property | Type | Required | Editable | Description | Constraint |
DestinationPortRange | String | No | No | The destination port range of the outbound traffic. | The supported ports range from 1 to 65535. Separate the start port and the end port with a forward slash (/). Sample values: 1/200 and 80/80. You cannot set this property to -1/-1. The value -1/-1 indicates that all ports are allowed. Note If you set the Protocol property in EgressRules to ALL or ICMP, you do not need to specify the DestinationPortRange property. In this case, all ports are allowed. |
Action | String | Yes | No | The action of the outbound rule. | Valid values:
|
SourcePortRange | String | No | No | The source port range of the outbound traffic. | The supported ports range from 1 to 65535. Separate the start port and the end port with a forward slash (/). Sample values: 1/200 and 80/80. You cannot set this property to -1/-1. The value -1/-1 indicates that all ports are allowed. Note If you set the Protocol property in EgressRules to ALL or ICMP, you do not need to specify the SourcePortRange property. In this case, all ports are allowed. |
Priority | Integer | No | No | The priority of the outbound rule. | A smaller value indicates a higher priority. You can add up to 10 outbound rules in a filter. |
SourceCidrBlock | String | No | No | The source CIDR block of the outbound traffic. | None. |
DestinationCidrBlock | String | No | No | The destination CIDR block of the outbound traffic. | None. |
Protocol | String | Yes | No | The type of the protocol that is used by the outbound traffic that you want to mirror. | Valid values:
|
IngressRules syntax
"IngressRules": [
{
"DestinationPortRange": String,
"Action": String,
"SourcePortRange": String,
"Priority": Integer,
"SourceCidrBlock": String,
"DestinationCidrBlock": String,
"Protocol": String
}
]
IngressRules properties
Property | Type | Required | Editable | Description | Constraint |
DestinationPortRange | String | No | No | The destination port range of the inbound traffic. | The supported ports range from 1 to 65535. Separate the start port and the end port with a forward slash (/). Sample values: 1/200 and 80/80. Note If you set the Protocol property in IngressRules to ALL or ICMP, you do not need to specify the DestinationPortRange property. In this case, all ports are allowed. |
Action | String | Yes | No | The action of the inbound rule. | Valid values:
|
SourcePortRange | String | No | No | The source port range of the inbound traffic. | The supported ports range from 1 to 65535. Separate the start port and the end port with a forward slash (/). Sample values: 1/200 and 80/80. Note If you set the Protocol property in IngressRules to ALL or ICMP, you do not need to specify the SourcePortRange property. In this case, all ports are allowed. |
Priority | Integer | No | No | The priority of the inbound rule. | A smaller value indicates a higher priority. You can add up to 10 inbound rules in a filter. |
SourceCidrBlock | String | No | No | The source CIDR block of the inbound traffic. | None. |
DestinationCidrBlock | String | No | No | The destination CIDR block of the inbound traffic. | None. |
Protocol | String | Yes | No | The type of the protocol that is used by the inbound traffic that you want to mirror. | Valid values:
|
Return values
Fn::GetAtt
TrafficMirrorFilterDescription: the description of the filter.
EgressRules: details of the outbound rules in the filter.
TrafficMirrorFilterId: the ID of the filter.
TrafficMirrorFilterName: the name of the filter.
IngressRules: details of the inbound rules in the filter.