/**
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
* SPDX-License-Identifier: Apache-2.0.
*/
#pragma once
#include The inspection criteria and action for a single stateless rule. Network
* Firewall inspects each packet for the specified matching criteria. When a packet
* matches the criteria, Network Firewall performs the rule's actions on the
* packet.See Also:
AWS
* API Reference
Criteria for Network Firewall to use to inspect an individual packet in * stateless rule inspection. Each match attributes set can include one or more * items such as IP address, CIDR range, port number, protocol, and TCP flags.
*/ inline const MatchAttributes& GetMatchAttributes() const{ return m_matchAttributes; } /** *Criteria for Network Firewall to use to inspect an individual packet in * stateless rule inspection. Each match attributes set can include one or more * items such as IP address, CIDR range, port number, protocol, and TCP flags.
*/ inline bool MatchAttributesHasBeenSet() const { return m_matchAttributesHasBeenSet; } /** *Criteria for Network Firewall to use to inspect an individual packet in * stateless rule inspection. Each match attributes set can include one or more * items such as IP address, CIDR range, port number, protocol, and TCP flags.
*/ inline void SetMatchAttributes(const MatchAttributes& value) { m_matchAttributesHasBeenSet = true; m_matchAttributes = value; } /** *Criteria for Network Firewall to use to inspect an individual packet in * stateless rule inspection. Each match attributes set can include one or more * items such as IP address, CIDR range, port number, protocol, and TCP flags.
*/ inline void SetMatchAttributes(MatchAttributes&& value) { m_matchAttributesHasBeenSet = true; m_matchAttributes = std::move(value); } /** *Criteria for Network Firewall to use to inspect an individual packet in * stateless rule inspection. Each match attributes set can include one or more * items such as IP address, CIDR range, port number, protocol, and TCP flags.
*/ inline RuleDefinition& WithMatchAttributes(const MatchAttributes& value) { SetMatchAttributes(value); return *this;} /** *Criteria for Network Firewall to use to inspect an individual packet in * stateless rule inspection. Each match attributes set can include one or more * items such as IP address, CIDR range, port number, protocol, and TCP flags.
*/ inline RuleDefinition& WithMatchAttributes(MatchAttributes&& value) { SetMatchAttributes(std::move(value)); return *this;} /** *The actions to take on a packet that matches one of the stateless rule * definition's match attributes. You must specify a standard action and you can * add custom actions.
Network Firewall only forwards a packet for
* stateful rule inspection if you specify aws:forward_to_sfe
for a
* rule that the packet matches, or if the packet doesn't match any stateless rule
* and you specify aws:forward_to_sfe
for the
* StatelessDefaultActions
setting for the FirewallPolicy.
For every rule, you must specify exactly one of the following * standard actions.
aws:pass - Discontinues all * inspection of the packet and permits it to go to its intended destination.
*aws:drop - Discontinues all inspection of the packet and * blocks it from going to its intended destination.
* aws:forward_to_sfe - Discontinues stateless inspection of the packet and * forwards it to the stateful rule engine for inspection.
Additionally, you can specify a custom action. To do this, you define a
* custom action by name and type, then provide the name you've assigned to the
* action in this Actions
setting. For information about the options,
* see CustomAction.
To provide more than one action in this
* setting, separate the settings with a comma. For example, if you have a custom
* PublishMetrics
action that you've named
* MyMetricsAction
, then you could specify the standard action
* aws:pass
and the custom action with [“aws:pass”,
* “MyMetricsAction��]
.
The actions to take on a packet that matches one of the stateless rule * definition's match attributes. You must specify a standard action and you can * add custom actions.
Network Firewall only forwards a packet for
* stateful rule inspection if you specify aws:forward_to_sfe
for a
* rule that the packet matches, or if the packet doesn't match any stateless rule
* and you specify aws:forward_to_sfe
for the
* StatelessDefaultActions
setting for the FirewallPolicy.
For every rule, you must specify exactly one of the following * standard actions.
aws:pass - Discontinues all * inspection of the packet and permits it to go to its intended destination.
*aws:drop - Discontinues all inspection of the packet and * blocks it from going to its intended destination.
* aws:forward_to_sfe - Discontinues stateless inspection of the packet and * forwards it to the stateful rule engine for inspection.
Additionally, you can specify a custom action. To do this, you define a
* custom action by name and type, then provide the name you've assigned to the
* action in this Actions
setting. For information about the options,
* see CustomAction.
To provide more than one action in this
* setting, separate the settings with a comma. For example, if you have a custom
* PublishMetrics
action that you've named
* MyMetricsAction
, then you could specify the standard action
* aws:pass
and the custom action with [“aws:pass”,
* “MyMetricsAction��]
.
The actions to take on a packet that matches one of the stateless rule * definition's match attributes. You must specify a standard action and you can * add custom actions.
Network Firewall only forwards a packet for
* stateful rule inspection if you specify aws:forward_to_sfe
for a
* rule that the packet matches, or if the packet doesn't match any stateless rule
* and you specify aws:forward_to_sfe
for the
* StatelessDefaultActions
setting for the FirewallPolicy.
For every rule, you must specify exactly one of the following * standard actions.
aws:pass - Discontinues all * inspection of the packet and permits it to go to its intended destination.
*aws:drop - Discontinues all inspection of the packet and * blocks it from going to its intended destination.
* aws:forward_to_sfe - Discontinues stateless inspection of the packet and * forwards it to the stateful rule engine for inspection.
Additionally, you can specify a custom action. To do this, you define a
* custom action by name and type, then provide the name you've assigned to the
* action in this Actions
setting. For information about the options,
* see CustomAction.
To provide more than one action in this
* setting, separate the settings with a comma. For example, if you have a custom
* PublishMetrics
action that you've named
* MyMetricsAction
, then you could specify the standard action
* aws:pass
and the custom action with [“aws:pass”,
* “MyMetricsAction��]
.
The actions to take on a packet that matches one of the stateless rule * definition's match attributes. You must specify a standard action and you can * add custom actions.
Network Firewall only forwards a packet for
* stateful rule inspection if you specify aws:forward_to_sfe
for a
* rule that the packet matches, or if the packet doesn't match any stateless rule
* and you specify aws:forward_to_sfe
for the
* StatelessDefaultActions
setting for the FirewallPolicy.
For every rule, you must specify exactly one of the following * standard actions.
aws:pass - Discontinues all * inspection of the packet and permits it to go to its intended destination.
*aws:drop - Discontinues all inspection of the packet and * blocks it from going to its intended destination.
* aws:forward_to_sfe - Discontinues stateless inspection of the packet and * forwards it to the stateful rule engine for inspection.
Additionally, you can specify a custom action. To do this, you define a
* custom action by name and type, then provide the name you've assigned to the
* action in this Actions
setting. For information about the options,
* see CustomAction.
To provide more than one action in this
* setting, separate the settings with a comma. For example, if you have a custom
* PublishMetrics
action that you've named
* MyMetricsAction
, then you could specify the standard action
* aws:pass
and the custom action with [“aws:pass”,
* “MyMetricsAction��]
.
The actions to take on a packet that matches one of the stateless rule * definition's match attributes. You must specify a standard action and you can * add custom actions.
Network Firewall only forwards a packet for
* stateful rule inspection if you specify aws:forward_to_sfe
for a
* rule that the packet matches, or if the packet doesn't match any stateless rule
* and you specify aws:forward_to_sfe
for the
* StatelessDefaultActions
setting for the FirewallPolicy.
For every rule, you must specify exactly one of the following * standard actions.
aws:pass - Discontinues all * inspection of the packet and permits it to go to its intended destination.
*aws:drop - Discontinues all inspection of the packet and * blocks it from going to its intended destination.
* aws:forward_to_sfe - Discontinues stateless inspection of the packet and * forwards it to the stateful rule engine for inspection.
Additionally, you can specify a custom action. To do this, you define a
* custom action by name and type, then provide the name you've assigned to the
* action in this Actions
setting. For information about the options,
* see CustomAction.
To provide more than one action in this
* setting, separate the settings with a comma. For example, if you have a custom
* PublishMetrics
action that you've named
* MyMetricsAction
, then you could specify the standard action
* aws:pass
and the custom action with [“aws:pass”,
* “MyMetricsAction��]
.
The actions to take on a packet that matches one of the stateless rule * definition's match attributes. You must specify a standard action and you can * add custom actions.
Network Firewall only forwards a packet for
* stateful rule inspection if you specify aws:forward_to_sfe
for a
* rule that the packet matches, or if the packet doesn't match any stateless rule
* and you specify aws:forward_to_sfe
for the
* StatelessDefaultActions
setting for the FirewallPolicy.
For every rule, you must specify exactly one of the following * standard actions.
aws:pass - Discontinues all * inspection of the packet and permits it to go to its intended destination.
*aws:drop - Discontinues all inspection of the packet and * blocks it from going to its intended destination.
* aws:forward_to_sfe - Discontinues stateless inspection of the packet and * forwards it to the stateful rule engine for inspection.
Additionally, you can specify a custom action. To do this, you define a
* custom action by name and type, then provide the name you've assigned to the
* action in this Actions
setting. For information about the options,
* see CustomAction.
To provide more than one action in this
* setting, separate the settings with a comma. For example, if you have a custom
* PublishMetrics
action that you've named
* MyMetricsAction
, then you could specify the standard action
* aws:pass
and the custom action with [“aws:pass”,
* “MyMetricsAction��]
.
The actions to take on a packet that matches one of the stateless rule * definition's match attributes. You must specify a standard action and you can * add custom actions.
Network Firewall only forwards a packet for
* stateful rule inspection if you specify aws:forward_to_sfe
for a
* rule that the packet matches, or if the packet doesn't match any stateless rule
* and you specify aws:forward_to_sfe
for the
* StatelessDefaultActions
setting for the FirewallPolicy.
For every rule, you must specify exactly one of the following * standard actions.
aws:pass - Discontinues all * inspection of the packet and permits it to go to its intended destination.
*aws:drop - Discontinues all inspection of the packet and * blocks it from going to its intended destination.
* aws:forward_to_sfe - Discontinues stateless inspection of the packet and * forwards it to the stateful rule engine for inspection.
Additionally, you can specify a custom action. To do this, you define a
* custom action by name and type, then provide the name you've assigned to the
* action in this Actions
setting. For information about the options,
* see CustomAction.
To provide more than one action in this
* setting, separate the settings with a comma. For example, if you have a custom
* PublishMetrics
action that you've named
* MyMetricsAction
, then you could specify the standard action
* aws:pass
and the custom action with [“aws:pass”,
* “MyMetricsAction��]
.
The actions to take on a packet that matches one of the stateless rule * definition's match attributes. You must specify a standard action and you can * add custom actions.
Network Firewall only forwards a packet for
* stateful rule inspection if you specify aws:forward_to_sfe
for a
* rule that the packet matches, or if the packet doesn't match any stateless rule
* and you specify aws:forward_to_sfe
for the
* StatelessDefaultActions
setting for the FirewallPolicy.
For every rule, you must specify exactly one of the following * standard actions.
aws:pass - Discontinues all * inspection of the packet and permits it to go to its intended destination.
*aws:drop - Discontinues all inspection of the packet and * blocks it from going to its intended destination.
* aws:forward_to_sfe - Discontinues stateless inspection of the packet and * forwards it to the stateful rule engine for inspection.
Additionally, you can specify a custom action. To do this, you define a
* custom action by name and type, then provide the name you've assigned to the
* action in this Actions
setting. For information about the options,
* see CustomAction.
To provide more than one action in this
* setting, separate the settings with a comma. For example, if you have a custom
* PublishMetrics
action that you've named
* MyMetricsAction
, then you could specify the standard action
* aws:pass
and the custom action with [“aws:pass”,
* “MyMetricsAction��]
.
The actions to take on a packet that matches one of the stateless rule * definition's match attributes. You must specify a standard action and you can * add custom actions.
Network Firewall only forwards a packet for
* stateful rule inspection if you specify aws:forward_to_sfe
for a
* rule that the packet matches, or if the packet doesn't match any stateless rule
* and you specify aws:forward_to_sfe
for the
* StatelessDefaultActions
setting for the FirewallPolicy.
For every rule, you must specify exactly one of the following * standard actions.
aws:pass - Discontinues all * inspection of the packet and permits it to go to its intended destination.
*aws:drop - Discontinues all inspection of the packet and * blocks it from going to its intended destination.
* aws:forward_to_sfe - Discontinues stateless inspection of the packet and * forwards it to the stateful rule engine for inspection.
Additionally, you can specify a custom action. To do this, you define a
* custom action by name and type, then provide the name you've assigned to the
* action in this Actions
setting. For information about the options,
* see CustomAction.
To provide more than one action in this
* setting, separate the settings with a comma. For example, if you have a custom
* PublishMetrics
action that you've named
* MyMetricsAction
, then you could specify the standard action
* aws:pass
and the custom action with [“aws:pass”,
* “MyMetricsAction��]
.