You can add inbound and outbound rules to a network ACL to control the traffic in and out of a subnet. Network ACL rules are matched in an ascending order, either by the system-generated rule numbers or those you define.
As shown in Table 1, there are two custom inbound rules (rule A and rule B) and one default rule. The priority of rule A is 1 and that of rule B is 2. The default rule has the lowest priority. If rule C is added, the system sets its priority to 3, which has lower priority than rules A and B and higher priority than the default rule.
Priority (Rules A and B) | Priority (Rules A, B, and C) | ||
|---|---|---|---|
Custom rule A | 1 | Custom rule A | 1 |
-- | -- | Custom rule B | 2 |
Custom rule B | 2 | Custom rule C | 3 |
Default rule | * | Default rule | * |
In Table 2, there are two custom inbound rules (rule A and rule B) and one default rule. The priority of rule A is 1 and that of rule B is 2. The default rule has the lowest priority. If you want rule C to be matched earlier than rule B, you can insert rule C above rule B. After rule C is added, the priority of rule C is 2, and that of rule B is 3.
Priority (Rules A and B) | Priority (Rules A, B, and C) | ||
|---|---|---|---|
Custom rule A | 1 | Custom rule A | 1 |
-- | -- | Custom rule C | 2 |
Custom rule B | 2 | Custom rule B | 3 |
Default rule | * | Default rule | * |
in the upper left corner and choose Network > Virtual Private Cloud.The Virtual Private Cloud page is displayed.
The network ACL list is displayed.
The network ACL summary page is displayed.
The Add Inbound Rule or Add Outbound Rule dialog box is displayed.
to add more rules.Parameter | Description | Example Value |
|---|---|---|
Type | Network ACL type. There are two options:
| IPv4 |
Action | The action for the network ACL rule. There are two options:
| Allow |
Protocol | The protocol supported by the network ACL to match traffic. The value can be TCP, UDP, or ICMP. | TCP |
Source | The source from which the traffic is allowed. The source can be an IP address, IP address range, or IP address group. Either the source or the destination can use the IP address group.
| 192.168.0.0/24 |
Source Port Range | The source ports or port ranges used to match traffic. The value ranges from 1 to 65535. | 22-30 |
Destination | The destination to which the traffic is allowed. The destination can be an IP address, IP address range, or IP address group. Either the source or the destination can use the IP address group.
| 0.0.0.0/0 |
Destination Port Range | The destination ports or port ranges used to match traffic. The value ranges from 1 to 65535. | 22-30 |
Description | Supplementary information about the network ACL rule. This parameter is optional. The description can contain a maximum of 255 characters and cannot contain angle brackets (< or >). | N/A |
Return to the rule list to check the new rule.
in the upper left corner and choose Network > Virtual Private Cloud.The Virtual Private Cloud page is displayed.
The network ACL list is displayed.
The network ACL summary page is displayed.