parent
618fc4370e
commit
d447eac958
|
@ -84,7 +84,7 @@ assign a random, unique name
|
|||
The `ingress` block supports:
|
||||
|
||||
* `cidr_blocks` - (Optional) List of CIDR blocks.
|
||||
* `from_port` - (Required) The start port.
|
||||
* `from_port` - (Required) The start port (or ICMP type number if protocol is "icmp")
|
||||
* `protocol` - (Required) The protocol. If you select a protocol of
|
||||
"-1", you must specify a "from_port" and "to_port" equal to 0.
|
||||
* `security_groups` - (Optional) List of security group Group Names if using
|
||||
|
@ -96,7 +96,7 @@ The `ingress` block supports:
|
|||
The `egress` block supports:
|
||||
|
||||
* `cidr_blocks` - (Optional) List of CIDR blocks.
|
||||
* `from_port` - (Required) The start port.
|
||||
* `from_port` - (Required) The start port (or ICMP type number if protocol is "icmp")
|
||||
* `protocol` - (Required) The protocol. If you select a protocol of
|
||||
"-1", you must specify a "from_port" and "to_port" equal to 0.
|
||||
* `security_groups` - (Optional) List of security group Group Names if using
|
||||
|
|
|
@ -42,7 +42,7 @@ The following arguments are supported:
|
|||
* `type` - (Required) The type of rule being created. Valid options are `ingress` (inbound)
|
||||
or `egress` (outbound).
|
||||
* `cidr_blocks` - (Optional) List of CIDR blocks.
|
||||
* `from_port` - (Required) The start port.
|
||||
* `from_port` - (Required) The start port (or ICMP type number if protocol is "icmp").
|
||||
* `protocol` - (Required) The protocol.
|
||||
* `security_group_id` - (Required) The security group to apply this rule to.
|
||||
* `source_security_group_id` - (Optional) The security group id to allow access to/from,
|
||||
|
|
Loading…
Reference in New Issue