/**
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
* SPDX-License-Identifier: Apache-2.0.
*/
#pragma once
#include A single Suricata rules specification, for use in a stateful rule group. Use
* this option to specify a simple Suricata rule with protocol, source and
* destination, ports, direction, and rule options. For information about the
* Suricata Rules
format, see Rules Format.
* See Also:
AWS
* API Reference
Defines what Network Firewall should do with the packets in a traffic flow * when the flow matches the stateful rule criteria. For all actions, Network * Firewall performs the specified action and discontinues stateful inspection of * the traffic flow.
The actions for a stateful rule are defined as * follows:
PASS - Permits the packets to go to the * intended destination.
DROP - Blocks the packets from * going to the intended destination and sends an alert log message, if alert * logging is configured in the Firewall LoggingConfiguration.
*ALERT - Permits the packets to go to the intended * destination and sends an alert log message, if alert logging is configured in * the Firewall LoggingConfiguration.
You can use this action
* to test a rule that you intend to use to drop traffic. You can enable the rule
* with ALERT
action, verify in the logs that the rule is filtering as
* you want, then change the action to DROP
.
* REJECT - Drops TCP traffic that matches the conditions of the stateful
* rule, and sends a TCP reset packet back to sender of the packet. A TCP reset
* packet is a packet with no payload and a RST
bit contained in the
* TCP header flags. Also sends an alert log mesage if alert logging is configured
* in the Firewall LoggingConfiguration.
REJECT
* isn't currently available for use with IMAP and FTP protocols.
Defines what Network Firewall should do with the packets in a traffic flow * when the flow matches the stateful rule criteria. For all actions, Network * Firewall performs the specified action and discontinues stateful inspection of * the traffic flow.
The actions for a stateful rule are defined as * follows:
PASS - Permits the packets to go to the * intended destination.
DROP - Blocks the packets from * going to the intended destination and sends an alert log message, if alert * logging is configured in the Firewall LoggingConfiguration.
*ALERT - Permits the packets to go to the intended * destination and sends an alert log message, if alert logging is configured in * the Firewall LoggingConfiguration.
You can use this action
* to test a rule that you intend to use to drop traffic. You can enable the rule
* with ALERT
action, verify in the logs that the rule is filtering as
* you want, then change the action to DROP
.
* REJECT - Drops TCP traffic that matches the conditions of the stateful
* rule, and sends a TCP reset packet back to sender of the packet. A TCP reset
* packet is a packet with no payload and a RST
bit contained in the
* TCP header flags. Also sends an alert log mesage if alert logging is configured
* in the Firewall LoggingConfiguration.
REJECT
* isn't currently available for use with IMAP and FTP protocols.
Defines what Network Firewall should do with the packets in a traffic flow * when the flow matches the stateful rule criteria. For all actions, Network * Firewall performs the specified action and discontinues stateful inspection of * the traffic flow.
The actions for a stateful rule are defined as * follows:
PASS - Permits the packets to go to the * intended destination.
DROP - Blocks the packets from * going to the intended destination and sends an alert log message, if alert * logging is configured in the Firewall LoggingConfiguration.
*ALERT - Permits the packets to go to the intended * destination and sends an alert log message, if alert logging is configured in * the Firewall LoggingConfiguration.
You can use this action
* to test a rule that you intend to use to drop traffic. You can enable the rule
* with ALERT
action, verify in the logs that the rule is filtering as
* you want, then change the action to DROP
.
* REJECT - Drops TCP traffic that matches the conditions of the stateful
* rule, and sends a TCP reset packet back to sender of the packet. A TCP reset
* packet is a packet with no payload and a RST
bit contained in the
* TCP header flags. Also sends an alert log mesage if alert logging is configured
* in the Firewall LoggingConfiguration.
REJECT
* isn't currently available for use with IMAP and FTP protocols.
Defines what Network Firewall should do with the packets in a traffic flow * when the flow matches the stateful rule criteria. For all actions, Network * Firewall performs the specified action and discontinues stateful inspection of * the traffic flow.
The actions for a stateful rule are defined as * follows:
PASS - Permits the packets to go to the * intended destination.
DROP - Blocks the packets from * going to the intended destination and sends an alert log message, if alert * logging is configured in the Firewall LoggingConfiguration.
*ALERT - Permits the packets to go to the intended * destination and sends an alert log message, if alert logging is configured in * the Firewall LoggingConfiguration.
You can use this action
* to test a rule that you intend to use to drop traffic. You can enable the rule
* with ALERT
action, verify in the logs that the rule is filtering as
* you want, then change the action to DROP
.
* REJECT - Drops TCP traffic that matches the conditions of the stateful
* rule, and sends a TCP reset packet back to sender of the packet. A TCP reset
* packet is a packet with no payload and a RST
bit contained in the
* TCP header flags. Also sends an alert log mesage if alert logging is configured
* in the Firewall LoggingConfiguration.
REJECT
* isn't currently available for use with IMAP and FTP protocols.
Defines what Network Firewall should do with the packets in a traffic flow * when the flow matches the stateful rule criteria. For all actions, Network * Firewall performs the specified action and discontinues stateful inspection of * the traffic flow.
The actions for a stateful rule are defined as * follows:
PASS - Permits the packets to go to the * intended destination.
DROP - Blocks the packets from * going to the intended destination and sends an alert log message, if alert * logging is configured in the Firewall LoggingConfiguration.
*ALERT - Permits the packets to go to the intended * destination and sends an alert log message, if alert logging is configured in * the Firewall LoggingConfiguration.
You can use this action
* to test a rule that you intend to use to drop traffic. You can enable the rule
* with ALERT
action, verify in the logs that the rule is filtering as
* you want, then change the action to DROP
.
* REJECT - Drops TCP traffic that matches the conditions of the stateful
* rule, and sends a TCP reset packet back to sender of the packet. A TCP reset
* packet is a packet with no payload and a RST
bit contained in the
* TCP header flags. Also sends an alert log mesage if alert logging is configured
* in the Firewall LoggingConfiguration.
REJECT
* isn't currently available for use with IMAP and FTP protocols.
Defines what Network Firewall should do with the packets in a traffic flow * when the flow matches the stateful rule criteria. For all actions, Network * Firewall performs the specified action and discontinues stateful inspection of * the traffic flow.
The actions for a stateful rule are defined as * follows:
PASS - Permits the packets to go to the * intended destination.
DROP - Blocks the packets from * going to the intended destination and sends an alert log message, if alert * logging is configured in the Firewall LoggingConfiguration.
*ALERT - Permits the packets to go to the intended * destination and sends an alert log message, if alert logging is configured in * the Firewall LoggingConfiguration.
You can use this action
* to test a rule that you intend to use to drop traffic. You can enable the rule
* with ALERT
action, verify in the logs that the rule is filtering as
* you want, then change the action to DROP
.
* REJECT - Drops TCP traffic that matches the conditions of the stateful
* rule, and sends a TCP reset packet back to sender of the packet. A TCP reset
* packet is a packet with no payload and a RST
bit contained in the
* TCP header flags. Also sends an alert log mesage if alert logging is configured
* in the Firewall LoggingConfiguration.
REJECT
* isn't currently available for use with IMAP and FTP protocols.
The stateful inspection criteria for this rule, used to inspect traffic * flows.
*/ inline const Header& GetHeader() const{ return m_header; } /** *The stateful inspection criteria for this rule, used to inspect traffic * flows.
*/ inline bool HeaderHasBeenSet() const { return m_headerHasBeenSet; } /** *The stateful inspection criteria for this rule, used to inspect traffic * flows.
*/ inline void SetHeader(const Header& value) { m_headerHasBeenSet = true; m_header = value; } /** *The stateful inspection criteria for this rule, used to inspect traffic * flows.
*/ inline void SetHeader(Header&& value) { m_headerHasBeenSet = true; m_header = std::move(value); } /** *The stateful inspection criteria for this rule, used to inspect traffic * flows.
*/ inline StatefulRule& WithHeader(const Header& value) { SetHeader(value); return *this;} /** *The stateful inspection criteria for this rule, used to inspect traffic * flows.
*/ inline StatefulRule& WithHeader(Header&& value) { SetHeader(std::move(value)); return *this;} /** *Additional options for the rule. These are the Suricata
* RuleOptions
settings.
Additional options for the rule. These are the Suricata
* RuleOptions
settings.
Additional options for the rule. These are the Suricata
* RuleOptions
settings.
Additional options for the rule. These are the Suricata
* RuleOptions
settings.
Additional options for the rule. These are the Suricata
* RuleOptions
settings.
Additional options for the rule. These are the Suricata
* RuleOptions
settings.
Additional options for the rule. These are the Suricata
* RuleOptions
settings.
Additional options for the rule. These are the Suricata
* RuleOptions
settings.