Working with managed rule groups in Network Firewall
This section provides guidance for accessing and using AWS managed rule groups in Network Firewall.
You can select one or more rules or rule groups to use in your Network Firewall policies. Each set of managed rule groups counts as a single rule group toward the maximum number of stateful rule groups per firewall policy.
Through the console, you access managed rule group information when you add and edit rules in your firewall policies. Through the APIs and the command line interface (CLI), you can directly request managed rule group information.
When you use a managed rule group in your firewall policy, you can edit the following setting:
-
Set rule actions to alert – Managed rule groups are designed to block traffic with
drop
rules. This setting in the API matches the Run in alert mode setting in the console. This overrides all rule actions in the rule group toalert
instead. This is useful for testing a rule group before using it to control traffic.
To edit the managed rule group alert settings in your firewall policy:
-
Console
-
After you add the managed rule group to your firewall policy, from the Policies page, choose the firewall policy you just created. This takes you to the policy detail page where you can edit aspects of the policy, and view details about the policy.
In the Network Firewall rule groups tab, in the Stateful rule groups section, choose the rule group that you'd like to run in alert mode, then from the Actions drop-down menu, choose Rule group details. For the Run in alert mode setting, toggle to Enabled to run the rule group in alert mode.
-
-
API – StatefulRuleGroupOverride. StatefulRuleGroupOverride.
Topics
- Adding managed rule groups to your AWS Network Firewall policy using the console
- Viewing managed rule groups in AWS Network Firewall
- Copying threat signature rules into your own AWS Network Firewall rule group
- Getting notified of updates to a threat signature rule group in AWS Network Firewall
- Mitigating false-positive scenarios in AWS Network Firewall