/**
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
* SPDX-License-Identifier: Apache-2.0.
*/
#pragma once
#include Settings that define the Secure Sockets Layer/Transport Layer Security
* (SSL/TLS) traffic that Network Firewall should decrypt for inspection by the
* stateful rule engine.See Also:
AWS
* API Reference
The source IP addresses and address ranges to decrypt for inspection, in CIDR * notation. If not specified, this matches with any source address.
*/ inline const Aws::Vector& GetSources() const{ return m_sources; } /** *The source IP addresses and address ranges to decrypt for inspection, in CIDR * notation. If not specified, this matches with any source address.
*/ inline bool SourcesHasBeenSet() const { return m_sourcesHasBeenSet; } /** *The source IP addresses and address ranges to decrypt for inspection, in CIDR * notation. If not specified, this matches with any source address.
*/ inline void SetSources(const Aws::Vector& value) { m_sourcesHasBeenSet = true; m_sources = value; } /** *The source IP addresses and address ranges to decrypt for inspection, in CIDR * notation. If not specified, this matches with any source address.
*/ inline void SetSources(Aws::Vector&& value) { m_sourcesHasBeenSet = true; m_sources = std::move(value); } /** *The source IP addresses and address ranges to decrypt for inspection, in CIDR * notation. If not specified, this matches with any source address.
*/ inline ServerCertificateScope& WithSources(const Aws::Vector& value) { SetSources(value); return *this;} /** *The source IP addresses and address ranges to decrypt for inspection, in CIDR * notation. If not specified, this matches with any source address.
*/ inline ServerCertificateScope& WithSources(Aws::Vector&& value) { SetSources(std::move(value)); return *this;} /** *The source IP addresses and address ranges to decrypt for inspection, in CIDR * notation. If not specified, this matches with any source address.
*/ inline ServerCertificateScope& AddSources(const Address& value) { m_sourcesHasBeenSet = true; m_sources.push_back(value); return *this; } /** *The source IP addresses and address ranges to decrypt for inspection, in CIDR * notation. If not specified, this matches with any source address.
*/ inline ServerCertificateScope& AddSources(Address&& value) { m_sourcesHasBeenSet = true; m_sources.push_back(std::move(value)); return *this; } /** *The destination IP addresses and address ranges to decrypt for inspection, in * CIDR notation. If not specified, this matches with any destination address.
*/ inline const Aws::Vector& GetDestinations() const{ return m_destinations; } /** *The destination IP addresses and address ranges to decrypt for inspection, in * CIDR notation. If not specified, this matches with any destination address.
*/ inline bool DestinationsHasBeenSet() const { return m_destinationsHasBeenSet; } /** *The destination IP addresses and address ranges to decrypt for inspection, in * CIDR notation. If not specified, this matches with any destination address.
*/ inline void SetDestinations(const Aws::Vector& value) { m_destinationsHasBeenSet = true; m_destinations = value; } /** *The destination IP addresses and address ranges to decrypt for inspection, in * CIDR notation. If not specified, this matches with any destination address.
*/ inline void SetDestinations(Aws::Vector&& value) { m_destinationsHasBeenSet = true; m_destinations = std::move(value); } /** *The destination IP addresses and address ranges to decrypt for inspection, in * CIDR notation. If not specified, this matches with any destination address.
*/ inline ServerCertificateScope& WithDestinations(const Aws::Vector& value) { SetDestinations(value); return *this;} /** *The destination IP addresses and address ranges to decrypt for inspection, in * CIDR notation. If not specified, this matches with any destination address.
*/ inline ServerCertificateScope& WithDestinations(Aws::Vector&& value) { SetDestinations(std::move(value)); return *this;} /** *The destination IP addresses and address ranges to decrypt for inspection, in * CIDR notation. If not specified, this matches with any destination address.
*/ inline ServerCertificateScope& AddDestinations(const Address& value) { m_destinationsHasBeenSet = true; m_destinations.push_back(value); return *this; } /** *The destination IP addresses and address ranges to decrypt for inspection, in * CIDR notation. If not specified, this matches with any destination address.
*/ inline ServerCertificateScope& AddDestinations(Address&& value) { m_destinationsHasBeenSet = true; m_destinations.push_back(std::move(value)); return *this; } /** *The source ports to decrypt for inspection, in Transmission Control Protocol * (TCP) format. If not specified, this matches with any source port.
You
* can specify individual ports, for example 1994
, and you can specify
* port ranges, such as 1990:1994
.
The source ports to decrypt for inspection, in Transmission Control Protocol * (TCP) format. If not specified, this matches with any source port.
You
* can specify individual ports, for example 1994
, and you can specify
* port ranges, such as 1990:1994
.
The source ports to decrypt for inspection, in Transmission Control Protocol * (TCP) format. If not specified, this matches with any source port.
You
* can specify individual ports, for example 1994
, and you can specify
* port ranges, such as 1990:1994
.
The source ports to decrypt for inspection, in Transmission Control Protocol * (TCP) format. If not specified, this matches with any source port.
You
* can specify individual ports, for example 1994
, and you can specify
* port ranges, such as 1990:1994
.
The source ports to decrypt for inspection, in Transmission Control Protocol * (TCP) format. If not specified, this matches with any source port.
You
* can specify individual ports, for example 1994
, and you can specify
* port ranges, such as 1990:1994
.
The source ports to decrypt for inspection, in Transmission Control Protocol * (TCP) format. If not specified, this matches with any source port.
You
* can specify individual ports, for example 1994
, and you can specify
* port ranges, such as 1990:1994
.
The source ports to decrypt for inspection, in Transmission Control Protocol * (TCP) format. If not specified, this matches with any source port.
You
* can specify individual ports, for example 1994
, and you can specify
* port ranges, such as 1990:1994
.
The source ports to decrypt for inspection, in Transmission Control Protocol * (TCP) format. If not specified, this matches with any source port.
You
* can specify individual ports, for example 1994
, and you can specify
* port ranges, such as 1990:1994
.
The destination ports to decrypt for inspection, in Transmission Control * Protocol (TCP) format. If not specified, this matches with any destination * port.
You can specify individual ports, for example 1994
,
* and you can specify port ranges, such as 1990:1994
.
The destination ports to decrypt for inspection, in Transmission Control * Protocol (TCP) format. If not specified, this matches with any destination * port.
You can specify individual ports, for example 1994
,
* and you can specify port ranges, such as 1990:1994
.
The destination ports to decrypt for inspection, in Transmission Control * Protocol (TCP) format. If not specified, this matches with any destination * port.
You can specify individual ports, for example 1994
,
* and you can specify port ranges, such as 1990:1994
.
The destination ports to decrypt for inspection, in Transmission Control * Protocol (TCP) format. If not specified, this matches with any destination * port.
You can specify individual ports, for example 1994
,
* and you can specify port ranges, such as 1990:1994
.
The destination ports to decrypt for inspection, in Transmission Control * Protocol (TCP) format. If not specified, this matches with any destination * port.
You can specify individual ports, for example 1994
,
* and you can specify port ranges, such as 1990:1994
.
The destination ports to decrypt for inspection, in Transmission Control * Protocol (TCP) format. If not specified, this matches with any destination * port.
You can specify individual ports, for example 1994
,
* and you can specify port ranges, such as 1990:1994
.
The destination ports to decrypt for inspection, in Transmission Control * Protocol (TCP) format. If not specified, this matches with any destination * port.
You can specify individual ports, for example 1994
,
* and you can specify port ranges, such as 1990:1994
.
The destination ports to decrypt for inspection, in Transmission Control * Protocol (TCP) format. If not specified, this matches with any destination * port.
You can specify individual ports, for example 1994
,
* and you can specify port ranges, such as 1990:1994
.
The protocols to decrypt for inspection, specified using each protocol's * assigned internet protocol number (IANA). Network Firewall currently supports * only TCP.
*/ inline const Aws::VectorThe protocols to decrypt for inspection, specified using each protocol's * assigned internet protocol number (IANA). Network Firewall currently supports * only TCP.
*/ inline bool ProtocolsHasBeenSet() const { return m_protocolsHasBeenSet; } /** *The protocols to decrypt for inspection, specified using each protocol's * assigned internet protocol number (IANA). Network Firewall currently supports * only TCP.
*/ inline void SetProtocols(const Aws::VectorThe protocols to decrypt for inspection, specified using each protocol's * assigned internet protocol number (IANA). Network Firewall currently supports * only TCP.
*/ inline void SetProtocols(Aws::VectorThe protocols to decrypt for inspection, specified using each protocol's * assigned internet protocol number (IANA). Network Firewall currently supports * only TCP.
*/ inline ServerCertificateScope& WithProtocols(const Aws::VectorThe protocols to decrypt for inspection, specified using each protocol's * assigned internet protocol number (IANA). Network Firewall currently supports * only TCP.
*/ inline ServerCertificateScope& WithProtocols(Aws::VectorThe protocols to decrypt for inspection, specified using each protocol's * assigned internet protocol number (IANA). Network Firewall currently supports * only TCP.
*/ inline ServerCertificateScope& AddProtocols(int value) { m_protocolsHasBeenSet = true; m_protocols.push_back(value); return *this; } private: Aws::Vector m_sources; bool m_sourcesHasBeenSet = false; Aws::Vector m_destinations; bool m_destinationsHasBeenSet = false; Aws::Vector