Interface CfnRuleGroup.JA3FingerprintProperty
- All Superinterfaces:
software.amazon.jsii.JsiiSerializable
- All Known Implementing Classes:
CfnRuleGroup.JA3FingerprintProperty.Jsii$Proxy
- Enclosing class:
CfnRuleGroup
Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. AWS WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information.
You can use this choice only with a string match
ByteMatchStatement
with thePositionalConstraint
set toEXACTLY
.
You can obtain the JA3 fingerprint for client requests from the web ACL logs. If AWS WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see Log fields in the AWS WAF Developer Guide .
Provide the JA3 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
Example:
// The code below shows an example of how to instantiate this type. // The values are placeholders you should change. import software.amazon.awscdk.services.wafv2.*; JA3FingerprintProperty jA3FingerprintProperty = JA3FingerprintProperty.builder() .fallbackBehavior("fallbackBehavior") .build();
- See Also:
-
Nested Class Summary
Modifier and TypeInterfaceDescriptionstatic final class
A builder forCfnRuleGroup.JA3FingerprintProperty
static final class
An implementation forCfnRuleGroup.JA3FingerprintProperty
-
Method Summary
Modifier and TypeMethodDescriptionbuilder()
The match status to assign to the web request if the request doesn't have a JA3 fingerprint.Methods inherited from interface software.amazon.jsii.JsiiSerializable
$jsii$toJson
-
Method Details
-
getFallbackBehavior
The match status to assign to the web request if the request doesn't have a JA3 fingerprint.You can specify the following fallback behaviors:
MATCH
- Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request.NO_MATCH
- Treat the web request as not matching the rule statement.
- See Also:
-
builder
-