The network ACL containing the entry violations.
Detailed information about the entry violations in the network ACL.
The subnet that's associated with the network ACL.
The Availability Zone where the network ACL is in use.
The VPC where the violation was found.