I have my CloudFormation script like this now:
\"SecurityGroupIngress\" : [{
\"IpProtocol\" : \"tcp\",
\"FromPort\" : \"0\",
\"ToPort\" : \
If you are looking to allow all protocols and all ports, then you can do the following
{
"IpProtocol" : "-1"
"CidrIp" : "0.0.0.0/0"
}
FromPort
Start of port range for the TCP and UDP protocols, or an ICMP type number. If you specify icmp for the IpProtocol property, you can specify -1 as a wildcard (i.e., any ICMP type number).
ToPort
End of port range for the TCP and UDP protocols, or an ICMP code. If you specify icmp for the IpProtocol property, you can specify -1 as a wildcard (i.e., any ICMP code).
ex.
{ "IpProtocol" : "icmp", "FromPort" : "8", "ToPort" : "-1", "CidrIp" : "10.0.0.0/24" }
ref:
https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-security-group-ingress.html
The original solution I posted (and accepted by the original poster) stopped working as AWS no longer supports it. To avoid the barrage of downvotes, I deleted the answer. The alternatives are:
or
Open all ports for all protocols not just TCP (as suggested by thewire247
below)
"SecurityGroupIngress" : [{
"IpProtocol" : "-1",
"CidrIp" : "0.0.0.0/0"
}]