Hi there! Are you looking for the official Deno documentation? Try docs.deno.com for all your Deno learning needs.

AddIpRoutesRequest

import type { AddIpRoutesRequest } from "https://aws-api.deno.dev/v0.3/services/directoryservice.ts?docs=full";
interface AddIpRoutesRequest {
DirectoryId: string;
IpRoutes: IpRoute[];
UpdateSecurityGroupForDirectoryControllers?: boolean | null;
}

§Properties

§
DirectoryId: string
[src]

Identifier (ID) of the directory to which to add the address block.

§
IpRoutes: IpRoute[]
[src]

IP address blocks, using CIDR format, of the traffic to route. This is often the IP address block of the DNS server used for your self-managed domain.

§
UpdateSecurityGroupForDirectoryControllers?: boolean | null
[src]

If set to true, updates the inbound and outbound rules of the security group that has the description: "Amazon Web Services created security group for directory ID directory controllers." Following are the new rules:

Inbound:

  • Type: Custom UDP Rule, Protocol: UDP, Range: 88, Source: 0.0.0.0/0
  • Type: Custom UDP Rule, Protocol: UDP, Range: 123, Source: 0.0.0.0/0
  • Type: Custom UDP Rule, Protocol: UDP, Range: 138, Source: 0.0.0.0/0
  • Type: Custom UDP Rule, Protocol: UDP, Range: 389, Source: 0.0.0.0/0
  • Type: Custom UDP Rule, Protocol: UDP, Range: 464, Source: 0.0.0.0/0
  • Type: Custom UDP Rule, Protocol: UDP, Range: 445, Source: 0.0.0.0/0
  • Type: Custom TCP Rule, Protocol: TCP, Range: 88, Source: 0.0.0.0/0
  • Type: Custom TCP Rule, Protocol: TCP, Range: 135, Source: 0.0.0.0/0
  • Type: Custom TCP Rule, Protocol: TCP, Range: 445, Source: 0.0.0.0/0
  • Type: Custom TCP Rule, Protocol: TCP, Range: 464, Source: 0.0.0.0/0
  • Type: Custom TCP Rule, Protocol: TCP, Range: 636, Source: 0.0.0.0/0
  • Type: Custom TCP Rule, Protocol: TCP, Range: 1024-65535, Source: 0.0.0.0/0
  • Type: Custom TCP Rule, Protocol: TCP, Range: 3268-33269, Source: 0.0.0.0/0
  • Type: DNS (UDP), Protocol: UDP, Range: 53, Source: 0.0.0.0/0
  • Type: DNS (TCP), Protocol: TCP, Range: 53, Source: 0.0.0.0/0
  • Type: LDAP, Protocol: TCP, Range: 389, Source: 0.0.0.0/0
  • Type: All ICMP, Protocol: All, Range: N/A, Source: 0.0.0.0/0

Outbound:

  • Type: All traffic, Protocol: All, Range: All, Destination: 0.0.0.0/0

These security rules impact an internal network interface that is not exposed publicly.