-
Notifications
You must be signed in to change notification settings - Fork 150
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Restrictions on ingress CIDR for unknown ports #216
Comments
Hi Steve, This is not specific to a network right ? It is just the netmask, as I understand ? So you are not looking for 10.0.0.0/8 (or any other /8 network) but specifically any network with /8 cidr ? |
Hi, A specific network would be nice but for now just looking at netmask would be great. Thanks :) |
Ok then, that requires a new step :) I will change this issue as a Feature Request and implement it as soon as possible. I think this is a good idea. Currently you can achieve this for a specific network, but just pure netmask is not supported till it is implemented :) Few more days please :) |
That's great, thanks for replying so quickly. I was looking at using regex - something like
But I couldn't get it working. Also, I don't know how to get both parts (for the known and unknown ports) to work as one feature. thanks :) |
Unfortunately regex are not supported on that step, but that is another good idea ! :) |
Hi, I wonder if you've had a chance to look at this at all just yet? Thanks |
Hi @SteveL1 , It has been quite hectic days for the last few weeks. Apologies for the delay. :( I am planning to have a look to all issues around the end of this week. |
Hi, I think those of us that are fortunate to still be working seem to be busier than before lockdown!!! Appreciate your time looking at this :) Thanks |
Added this functionality within 894a36c. Will release today. |
Closing the issue since we think it is fixed and there is no response so far. Please do not hesitate to create a new one if the problem still occurs. |
Hi,
I'm trying to create a scenario that passes a security group that has a /0 ingress for known ports (eg 80/443) but fails if any other port has a range of less than /8.
is that possible to do?
The text was updated successfully, but these errors were encountered: