/** * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. * SPDX-License-Identifier: Apache-2.0. */ #pragma once #include #include #include #include #include #include namespace Aws { namespace Utils { namespace Json { class JsonValue; class JsonView; } // namespace Json } // namespace Utils namespace NetworkFirewall { namespace Model { /** *

A single Suricata rules specification, for use in a stateful rule group. Use * this option to specify a simple Suricata rule with protocol, source and * destination, ports, direction, and rule options. For information about the * Suricata Rules format, see Rules Format. *

See Also:

AWS * API Reference

*/ class StatefulRule { public: AWS_NETWORKFIREWALL_API StatefulRule(); AWS_NETWORKFIREWALL_API StatefulRule(Aws::Utils::Json::JsonView jsonValue); AWS_NETWORKFIREWALL_API StatefulRule& operator=(Aws::Utils::Json::JsonView jsonValue); AWS_NETWORKFIREWALL_API Aws::Utils::Json::JsonValue Jsonize() const; /** *

Defines what Network Firewall should do with the packets in a traffic flow * when the flow matches the stateful rule criteria. For all actions, Network * Firewall performs the specified action and discontinues stateful inspection of * the traffic flow.

The actions for a stateful rule are defined as * follows:

  • PASS - Permits the packets to go to the * intended destination.

  • DROP - Blocks the packets from * going to the intended destination and sends an alert log message, if alert * logging is configured in the Firewall LoggingConfiguration.

    *
  • ALERT - Permits the packets to go to the intended * destination and sends an alert log message, if alert logging is configured in * the Firewall LoggingConfiguration.

    You can use this action * to test a rule that you intend to use to drop traffic. You can enable the rule * with ALERT action, verify in the logs that the rule is filtering as * you want, then change the action to DROP.

  • * REJECT - Drops TCP traffic that matches the conditions of the stateful * rule, and sends a TCP reset packet back to sender of the packet. A TCP reset * packet is a packet with no payload and a RST bit contained in the * TCP header flags. Also sends an alert log mesage if alert logging is configured * in the Firewall LoggingConfiguration.

    REJECT * isn't currently available for use with IMAP and FTP protocols.

*/ inline const StatefulAction& GetAction() const{ return m_action; } /** *

Defines what Network Firewall should do with the packets in a traffic flow * when the flow matches the stateful rule criteria. For all actions, Network * Firewall performs the specified action and discontinues stateful inspection of * the traffic flow.

The actions for a stateful rule are defined as * follows:

  • PASS - Permits the packets to go to the * intended destination.

  • DROP - Blocks the packets from * going to the intended destination and sends an alert log message, if alert * logging is configured in the Firewall LoggingConfiguration.

    *
  • ALERT - Permits the packets to go to the intended * destination and sends an alert log message, if alert logging is configured in * the Firewall LoggingConfiguration.

    You can use this action * to test a rule that you intend to use to drop traffic. You can enable the rule * with ALERT action, verify in the logs that the rule is filtering as * you want, then change the action to DROP.

  • * REJECT - Drops TCP traffic that matches the conditions of the stateful * rule, and sends a TCP reset packet back to sender of the packet. A TCP reset * packet is a packet with no payload and a RST bit contained in the * TCP header flags. Also sends an alert log mesage if alert logging is configured * in the Firewall LoggingConfiguration.

    REJECT * isn't currently available for use with IMAP and FTP protocols.

*/ inline bool ActionHasBeenSet() const { return m_actionHasBeenSet; } /** *

Defines what Network Firewall should do with the packets in a traffic flow * when the flow matches the stateful rule criteria. For all actions, Network * Firewall performs the specified action and discontinues stateful inspection of * the traffic flow.

The actions for a stateful rule are defined as * follows:

  • PASS - Permits the packets to go to the * intended destination.

  • DROP - Blocks the packets from * going to the intended destination and sends an alert log message, if alert * logging is configured in the Firewall LoggingConfiguration.

    *
  • ALERT - Permits the packets to go to the intended * destination and sends an alert log message, if alert logging is configured in * the Firewall LoggingConfiguration.

    You can use this action * to test a rule that you intend to use to drop traffic. You can enable the rule * with ALERT action, verify in the logs that the rule is filtering as * you want, then change the action to DROP.

  • * REJECT - Drops TCP traffic that matches the conditions of the stateful * rule, and sends a TCP reset packet back to sender of the packet. A TCP reset * packet is a packet with no payload and a RST bit contained in the * TCP header flags. Also sends an alert log mesage if alert logging is configured * in the Firewall LoggingConfiguration.

    REJECT * isn't currently available for use with IMAP and FTP protocols.

*/ inline void SetAction(const StatefulAction& value) { m_actionHasBeenSet = true; m_action = value; } /** *

Defines what Network Firewall should do with the packets in a traffic flow * when the flow matches the stateful rule criteria. For all actions, Network * Firewall performs the specified action and discontinues stateful inspection of * the traffic flow.

The actions for a stateful rule are defined as * follows:

  • PASS - Permits the packets to go to the * intended destination.

  • DROP - Blocks the packets from * going to the intended destination and sends an alert log message, if alert * logging is configured in the Firewall LoggingConfiguration.

    *
  • ALERT - Permits the packets to go to the intended * destination and sends an alert log message, if alert logging is configured in * the Firewall LoggingConfiguration.

    You can use this action * to test a rule that you intend to use to drop traffic. You can enable the rule * with ALERT action, verify in the logs that the rule is filtering as * you want, then change the action to DROP.

  • * REJECT - Drops TCP traffic that matches the conditions of the stateful * rule, and sends a TCP reset packet back to sender of the packet. A TCP reset * packet is a packet with no payload and a RST bit contained in the * TCP header flags. Also sends an alert log mesage if alert logging is configured * in the Firewall LoggingConfiguration.

    REJECT * isn't currently available for use with IMAP and FTP protocols.

*/ inline void SetAction(StatefulAction&& value) { m_actionHasBeenSet = true; m_action = std::move(value); } /** *

Defines what Network Firewall should do with the packets in a traffic flow * when the flow matches the stateful rule criteria. For all actions, Network * Firewall performs the specified action and discontinues stateful inspection of * the traffic flow.

The actions for a stateful rule are defined as * follows:

  • PASS - Permits the packets to go to the * intended destination.

  • DROP - Blocks the packets from * going to the intended destination and sends an alert log message, if alert * logging is configured in the Firewall LoggingConfiguration.

    *
  • ALERT - Permits the packets to go to the intended * destination and sends an alert log message, if alert logging is configured in * the Firewall LoggingConfiguration.

    You can use this action * to test a rule that you intend to use to drop traffic. You can enable the rule * with ALERT action, verify in the logs that the rule is filtering as * you want, then change the action to DROP.

  • * REJECT - Drops TCP traffic that matches the conditions of the stateful * rule, and sends a TCP reset packet back to sender of the packet. A TCP reset * packet is a packet with no payload and a RST bit contained in the * TCP header flags. Also sends an alert log mesage if alert logging is configured * in the Firewall LoggingConfiguration.

    REJECT * isn't currently available for use with IMAP and FTP protocols.

*/ inline StatefulRule& WithAction(const StatefulAction& value) { SetAction(value); return *this;} /** *

Defines what Network Firewall should do with the packets in a traffic flow * when the flow matches the stateful rule criteria. For all actions, Network * Firewall performs the specified action and discontinues stateful inspection of * the traffic flow.

The actions for a stateful rule are defined as * follows:

  • PASS - Permits the packets to go to the * intended destination.

  • DROP - Blocks the packets from * going to the intended destination and sends an alert log message, if alert * logging is configured in the Firewall LoggingConfiguration.

    *
  • ALERT - Permits the packets to go to the intended * destination and sends an alert log message, if alert logging is configured in * the Firewall LoggingConfiguration.

    You can use this action * to test a rule that you intend to use to drop traffic. You can enable the rule * with ALERT action, verify in the logs that the rule is filtering as * you want, then change the action to DROP.

  • * REJECT - Drops TCP traffic that matches the conditions of the stateful * rule, and sends a TCP reset packet back to sender of the packet. A TCP reset * packet is a packet with no payload and a RST bit contained in the * TCP header flags. Also sends an alert log mesage if alert logging is configured * in the Firewall LoggingConfiguration.

    REJECT * isn't currently available for use with IMAP and FTP protocols.

*/ inline StatefulRule& WithAction(StatefulAction&& value) { SetAction(std::move(value)); return *this;} /** *

The stateful inspection criteria for this rule, used to inspect traffic * flows.

*/ inline const Header& GetHeader() const{ return m_header; } /** *

The stateful inspection criteria for this rule, used to inspect traffic * flows.

*/ inline bool HeaderHasBeenSet() const { return m_headerHasBeenSet; } /** *

The stateful inspection criteria for this rule, used to inspect traffic * flows.

*/ inline void SetHeader(const Header& value) { m_headerHasBeenSet = true; m_header = value; } /** *

The stateful inspection criteria for this rule, used to inspect traffic * flows.

*/ inline void SetHeader(Header&& value) { m_headerHasBeenSet = true; m_header = std::move(value); } /** *

The stateful inspection criteria for this rule, used to inspect traffic * flows.

*/ inline StatefulRule& WithHeader(const Header& value) { SetHeader(value); return *this;} /** *

The stateful inspection criteria for this rule, used to inspect traffic * flows.

*/ inline StatefulRule& WithHeader(Header&& value) { SetHeader(std::move(value)); return *this;} /** *

Additional options for the rule. These are the Suricata * RuleOptions settings.

*/ inline const Aws::Vector& GetRuleOptions() const{ return m_ruleOptions; } /** *

Additional options for the rule. These are the Suricata * RuleOptions settings.

*/ inline bool RuleOptionsHasBeenSet() const { return m_ruleOptionsHasBeenSet; } /** *

Additional options for the rule. These are the Suricata * RuleOptions settings.

*/ inline void SetRuleOptions(const Aws::Vector& value) { m_ruleOptionsHasBeenSet = true; m_ruleOptions = value; } /** *

Additional options for the rule. These are the Suricata * RuleOptions settings.

*/ inline void SetRuleOptions(Aws::Vector&& value) { m_ruleOptionsHasBeenSet = true; m_ruleOptions = std::move(value); } /** *

Additional options for the rule. These are the Suricata * RuleOptions settings.

*/ inline StatefulRule& WithRuleOptions(const Aws::Vector& value) { SetRuleOptions(value); return *this;} /** *

Additional options for the rule. These are the Suricata * RuleOptions settings.

*/ inline StatefulRule& WithRuleOptions(Aws::Vector&& value) { SetRuleOptions(std::move(value)); return *this;} /** *

Additional options for the rule. These are the Suricata * RuleOptions settings.

*/ inline StatefulRule& AddRuleOptions(const RuleOption& value) { m_ruleOptionsHasBeenSet = true; m_ruleOptions.push_back(value); return *this; } /** *

Additional options for the rule. These are the Suricata * RuleOptions settings.

*/ inline StatefulRule& AddRuleOptions(RuleOption&& value) { m_ruleOptionsHasBeenSet = true; m_ruleOptions.push_back(std::move(value)); return *this; } private: StatefulAction m_action; bool m_actionHasBeenSet = false; Header m_header; bool m_headerHasBeenSet = false; Aws::Vector m_ruleOptions; bool m_ruleOptionsHasBeenSet = false; }; } // namespace Model } // namespace NetworkFirewall } // namespace Aws