This action applies only to security groups in a VPC; it's not supported for EC2 security groups. For information about Amazon Virtual Private Cloud and VPC security groups, go to the Amazon Virtual Private Cloud User Guide.
The action adds one or more egress rules to a VPC security group. Specifically, this permits instances in a security group to send traffic to either one or more destination CIDR IP address ranges, or to one or more destination security groups in the same VPC.
Each rule consists of the
protocol (e.g., TCP), plus either a CIDR range, or a source group. For the TCP and UDP protocols, you must also specify the destination port
or port range. For the ICMP protocol, you must also specify the ICMP type and code. You can use
Rule changes are propagated to instances within the security group as quickly as possible. However, a small delay might occur.
Important: For VPC security groups: You can have up to 50 rules total per group (covering both ingress and egress).
Inheritance Hierarchy
Amazon.Runtime.AmazonWebServiceRequest
Amazon.EC2.Model.AuthorizeSecurityGroupEgressRequest
Namespace: Amazon.EC2.Model
Assembly: AWSSDK.dll
Version: 2.0.0.3
Syntax
public class AuthorizeSecurityGroupEgressRequest : AmazonWebServiceRequest IRequestEvents
The AuthorizeSecurityGroupEgressRequest type exposes the following members
Constructors
Name | Description | |
---|---|---|
![]() |
AuthorizeSecurityGroupEgressRequest() |
Properties
Name | Description | |
---|---|---|
![]() |
GroupId | ID of the VPC security group to modify. |
![]() |
IpPermissions | List of IP permissions to authorize on the specified security group. Specifying permissions through IP permissions is the preferred way of authorizing permissions since it offers more flexibility and control. |
Version Information
.NET Framework:
Supported in: 4.5, 4.0, 3.5
.NET for Windows Store apps:
Supported in: Windows 8
.NET for Windows Phone:
Supported in: Window Phone 8