Struct aws_sdk_networkfirewall::model::FirewallPolicy
source · [−]#[non_exhaustive]pub struct FirewallPolicy {
pub stateless_rule_group_references: Option<Vec<StatelessRuleGroupReference>>,
pub stateless_default_actions: Option<Vec<String>>,
pub stateless_fragment_default_actions: Option<Vec<String>>,
pub stateless_custom_actions: Option<Vec<CustomAction>>,
pub stateful_rule_group_references: Option<Vec<StatefulRuleGroupReference>>,
pub stateful_default_actions: Option<Vec<String>>,
pub stateful_engine_options: Option<StatefulEngineOptions>,
}
Expand description
The firewall policy defines the behavior of a firewall using a collection of stateless and stateful rule groups and other settings. You can use one firewall policy for multiple firewalls.
This, along with FirewallPolicyResponse
, define the policy. You can retrieve all objects for a firewall policy by calling DescribeFirewallPolicy
.
Fields (Non-exhaustive)
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.stateless_rule_group_references: Option<Vec<StatelessRuleGroupReference>>
References to the stateless rule groups that are used in the policy. These define the matching criteria in stateless rules.
stateless_default_actions: Option<Vec<String>>
The actions to take on a packet if it doesn't match any of the stateless rules in the policy. If you want non-matching packets to be forwarded for stateful inspection, specify aws:forward_to_sfe
.
You must specify one of the standard actions: aws:pass
, aws:drop
, or aws:forward_to_sfe
. In addition, you can specify custom actions that are compatible with your standard section choice.
For example, you could specify ["aws:pass"]
or you could specify ["aws:pass", “customActionName”]
. For information about compatibility, see the custom action descriptions under CustomAction
.
stateless_fragment_default_actions: Option<Vec<String>>
The actions to take on a fragmented UDP packet if it doesn't match any of the stateless rules in the policy. Network Firewall only manages UDP packet fragments and silently drops packet fragments for other protocols. If you want non-matching fragmented UDP packets to be forwarded for stateful inspection, specify aws:forward_to_sfe
.
You must specify one of the standard actions: aws:pass
, aws:drop
, or aws:forward_to_sfe
. In addition, you can specify custom actions that are compatible with your standard section choice.
For example, you could specify ["aws:pass"]
or you could specify ["aws:pass", “customActionName”]
. For information about compatibility, see the custom action descriptions under CustomAction
.
stateless_custom_actions: Option<Vec<CustomAction>>
The custom action definitions that are available for use in the firewall policy's StatelessDefaultActions
setting. You name each custom action that you define, and then you can use it by name in your default actions specifications.
stateful_rule_group_references: Option<Vec<StatefulRuleGroupReference>>
References to the stateful rule groups that are used in the policy. These define the inspection criteria in stateful rules.
stateful_default_actions: Option<Vec<String>>
The default actions to take on a packet that doesn't match any stateful rules. The stateful default action is optional, and is only valid when using the strict rule order.
Valid values of the stateful default action:
-
aws:drop_strict
-
aws:drop_established
-
aws:alert_strict
-
aws:alert_established
For more information, see Strict evaluation order in the Network Firewall Developer Guide.
stateful_engine_options: Option<StatefulEngineOptions>
Additional options governing how Network Firewall handles stateful rules. The stateful rule groups that you use in your policy must have stateful rule options settings that are compatible with these settings.
Implementations
sourceimpl FirewallPolicy
impl FirewallPolicy
sourcepub fn stateless_rule_group_references(
&self
) -> Option<&[StatelessRuleGroupReference]>
pub fn stateless_rule_group_references(
&self
) -> Option<&[StatelessRuleGroupReference]>
References to the stateless rule groups that are used in the policy. These define the matching criteria in stateless rules.
sourcepub fn stateless_default_actions(&self) -> Option<&[String]>
pub fn stateless_default_actions(&self) -> Option<&[String]>
The actions to take on a packet if it doesn't match any of the stateless rules in the policy. If you want non-matching packets to be forwarded for stateful inspection, specify aws:forward_to_sfe
.
You must specify one of the standard actions: aws:pass
, aws:drop
, or aws:forward_to_sfe
. In addition, you can specify custom actions that are compatible with your standard section choice.
For example, you could specify ["aws:pass"]
or you could specify ["aws:pass", “customActionName”]
. For information about compatibility, see the custom action descriptions under CustomAction
.
sourcepub fn stateless_fragment_default_actions(&self) -> Option<&[String]>
pub fn stateless_fragment_default_actions(&self) -> Option<&[String]>
The actions to take on a fragmented UDP packet if it doesn't match any of the stateless rules in the policy. Network Firewall only manages UDP packet fragments and silently drops packet fragments for other protocols. If you want non-matching fragmented UDP packets to be forwarded for stateful inspection, specify aws:forward_to_sfe
.
You must specify one of the standard actions: aws:pass
, aws:drop
, or aws:forward_to_sfe
. In addition, you can specify custom actions that are compatible with your standard section choice.
For example, you could specify ["aws:pass"]
or you could specify ["aws:pass", “customActionName”]
. For information about compatibility, see the custom action descriptions under CustomAction
.
sourcepub fn stateless_custom_actions(&self) -> Option<&[CustomAction]>
pub fn stateless_custom_actions(&self) -> Option<&[CustomAction]>
The custom action definitions that are available for use in the firewall policy's StatelessDefaultActions
setting. You name each custom action that you define, and then you can use it by name in your default actions specifications.
sourcepub fn stateful_rule_group_references(
&self
) -> Option<&[StatefulRuleGroupReference]>
pub fn stateful_rule_group_references(
&self
) -> Option<&[StatefulRuleGroupReference]>
References to the stateful rule groups that are used in the policy. These define the inspection criteria in stateful rules.
sourcepub fn stateful_default_actions(&self) -> Option<&[String]>
pub fn stateful_default_actions(&self) -> Option<&[String]>
The default actions to take on a packet that doesn't match any stateful rules. The stateful default action is optional, and is only valid when using the strict rule order.
Valid values of the stateful default action:
-
aws:drop_strict
-
aws:drop_established
-
aws:alert_strict
-
aws:alert_established
For more information, see Strict evaluation order in the Network Firewall Developer Guide.
sourcepub fn stateful_engine_options(&self) -> Option<&StatefulEngineOptions>
pub fn stateful_engine_options(&self) -> Option<&StatefulEngineOptions>
Additional options governing how Network Firewall handles stateful rules. The stateful rule groups that you use in your policy must have stateful rule options settings that are compatible with these settings.
sourceimpl FirewallPolicy
impl FirewallPolicy
sourcepub fn builder() -> Builder
pub fn builder() -> Builder
Creates a new builder-style object to manufacture FirewallPolicy
Trait Implementations
sourceimpl Clone for FirewallPolicy
impl Clone for FirewallPolicy
sourcefn clone(&self) -> FirewallPolicy
fn clone(&self) -> FirewallPolicy
Returns a copy of the value. Read more
1.0.0 · sourcefn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
Performs copy-assignment from source
. Read more
sourceimpl Debug for FirewallPolicy
impl Debug for FirewallPolicy
sourceimpl PartialEq<FirewallPolicy> for FirewallPolicy
impl PartialEq<FirewallPolicy> for FirewallPolicy
sourcefn eq(&self, other: &FirewallPolicy) -> bool
fn eq(&self, other: &FirewallPolicy) -> bool
This method tests for self
and other
values to be equal, and is used
by ==
. Read more
sourcefn ne(&self, other: &FirewallPolicy) -> bool
fn ne(&self, other: &FirewallPolicy) -> bool
This method tests for !=
.
impl StructuralPartialEq for FirewallPolicy
Auto Trait Implementations
impl RefUnwindSafe for FirewallPolicy
impl Send for FirewallPolicy
impl Sync for FirewallPolicy
impl Unpin for FirewallPolicy
impl UnwindSafe for FirewallPolicy
Blanket Implementations
sourceimpl<T> BorrowMut<T> for T where
T: ?Sized,
impl<T> BorrowMut<T> for T where
T: ?Sized,
const: unstable · sourcefn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Mutably borrows from an owned value. Read more
sourceimpl<T> Instrument for T
impl<T> Instrument for T
sourcefn instrument(self, span: Span) -> Instrumented<Self>
fn instrument(self, span: Span) -> Instrumented<Self>
sourcefn in_current_span(self) -> Instrumented<Self>
fn in_current_span(self) -> Instrumented<Self>
sourceimpl<T> ToOwned for T where
T: Clone,
impl<T> ToOwned for T where
T: Clone,
type Owned = T
type Owned = T
The resulting type after obtaining ownership.
sourcefn clone_into(&self, target: &mut T)
fn clone_into(&self, target: &mut T)
toowned_clone_into
)Uses borrowed data to replace owned data, usually by cloning. Read more
sourceimpl<T> WithSubscriber for T
impl<T> WithSubscriber for T
sourcefn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self> where
S: Into<Dispatch>,
fn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self> where
S: Into<Dispatch>,
Attaches the provided Subscriber
to this type, returning a
WithDispatch
wrapper. Read more
sourcefn with_current_subscriber(self) -> WithDispatch<Self>
fn with_current_subscriber(self) -> WithDispatch<Self>
Attaches the current default Subscriber
to this type, returning a
WithDispatch
wrapper. Read more