RulesSourceList - AWS Network Firewall

RulesSourceList

Stateful inspection criteria for a domain list rule group.

For HTTPS traffic, domain filtering is SNI-based. It uses the server name indicator extension of the TLS handshake.

By default, Network Firewall domain list inspection only includes traffic coming from the VPC where you deploy the firewall. To inspect traffic from IP addresses outside of the deployment VPC, you set the HOME_NET rule variable to include the CIDR range of the deployment VPC plus the other CIDR ranges. For more information, see RuleVariables in this guide and Stateful domain list rule groups in AWS Network Firewall in the Network Firewall Developer Guide.

Contents

GeneratedRulesType

Whether you want to allow or deny access to the domains in your target list.

Type: String

Valid Values: ALLOWLIST | DENYLIST

Required: Yes

Targets

The domains that you want to inspect for in your traffic flows. Valid domain specifications are the following:

  • Explicit names. For example, abc.example.com matches only the domain abc.example.com.

  • Names that use a domain wildcard, which you indicate with an initial '.'. For example,.example.com matches example.com and matches all subdomains of example.com, such as abc.example.com and www.example.com.

Type: Array of strings

Required: Yes

TargetTypes

The protocols you want to inspect. Specify TLS_SNI for HTTPS. Specify HTTP_HOST for HTTP. You can specify either or both.

Type: Array of strings

Valid Values: TLS_SNI | HTTP_HOST

Required: Yes

See Also

For more information about using this API in one of the language-specific AWS SDKs, see the following: