Class: Aws::NetworkFirewall::Types::StatefulRule
- Inherits:
-
Struct
- Object
- Struct
- Aws::NetworkFirewall::Types::StatefulRule
- Defined in:
- gems/aws-sdk-networkfirewall/lib/aws-sdk-networkfirewall/types.rb
Overview
A single Suricata rules specification, for use in a stateful rule
group. Use this option to specify a simple Suricata rule with
protocol, source and destination, ports, direction, and rule options.
For information about the Suricata Rules
format, see Rules
Format.
Constant Summary collapse
- SENSITIVE =
[]
Instance Attribute Summary collapse
-
#action ⇒ String
Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria.
-
#header ⇒ Types::Header
The stateful inspection criteria for this rule, used to inspect traffic flows.
-
#rule_options ⇒ Array<Types::RuleOption>
Additional options for the rule.
Instance Attribute Details
#action ⇒ String
Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow.
The actions for a stateful rule are defined as follows:
PASS - Permits the packets to go to the intended destination.
DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration.
ALERT - Sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration.
You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with
ALERT
action, verify in the logs that the rule is filtering as you want, then change the action toDROP
.REJECT - Drops traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and an RST bit contained in the TCP header flags. REJECT is available only for TCP traffic. This option doesn't support FTP or IMAP protocols.
3751 3752 3753 3754 3755 3756 3757 |
# File 'gems/aws-sdk-networkfirewall/lib/aws-sdk-networkfirewall/types.rb', line 3751 class StatefulRule < Struct.new( :action, :header, :rule_options) SENSITIVE = [] include Aws::Structure end |
#header ⇒ Types::Header
The stateful inspection criteria for this rule, used to inspect traffic flows.
3751 3752 3753 3754 3755 3756 3757 |
# File 'gems/aws-sdk-networkfirewall/lib/aws-sdk-networkfirewall/types.rb', line 3751 class StatefulRule < Struct.new( :action, :header, :rule_options) SENSITIVE = [] include Aws::Structure end |
#rule_options ⇒ Array<Types::RuleOption>
Additional options for the rule. These are the Suricata
RuleOptions
settings.
3751 3752 3753 3754 3755 3756 3757 |
# File 'gems/aws-sdk-networkfirewall/lib/aws-sdk-networkfirewall/types.rb', line 3751 class StatefulRule < Struct.new( :action, :header, :rule_options) SENSITIVE = [] include Aws::Structure end |