Struct aws_sdk_networkfirewall::model::Header
source · [−]#[non_exhaustive]pub struct Header { /* private fields */ }
Expand description
The basic rule criteria for Network Firewall to use to inspect packet headers in stateful traffic flow inspection. Traffic flows that match the criteria are a match for the corresponding StatefulRule
.
Implementations
sourceimpl Header
impl Header
sourcepub fn protocol(&self) -> Option<&StatefulRuleProtocol>
pub fn protocol(&self) -> Option<&StatefulRuleProtocol>
The protocol to inspect for. To specify all, you can use IP
, because all traffic on Amazon Web Services and on the internet is IP.
sourcepub fn source(&self) -> Option<&str>
pub fn source(&self) -> Option<&str>
The source IP address or address range to inspect for, in CIDR notation. To match with any address, specify ANY
.
Specify an IP address or a block of IP addresses in Classless Inter-Domain Routing (CIDR) notation. Network Firewall supports all address ranges for IPv4.
Examples:
-
To configure Network Firewall to inspect for the IP address 192.0.2.44, specify
192.0.2.44/32
. -
To configure Network Firewall to inspect for IP addresses from 192.0.2.0 to 192.0.2.255, specify
192.0.2.0/24
.
For more information about CIDR notation, see the Wikipedia entry Classless Inter-Domain Routing.
sourcepub fn source_port(&self) -> Option<&str>
pub fn source_port(&self) -> Option<&str>
The source port to inspect for. You can specify an individual port, for example 1994
and you can specify a port range, for example 1990:1994
. To match with any port, specify ANY
.
sourcepub fn direction(&self) -> Option<&StatefulRuleDirection>
pub fn direction(&self) -> Option<&StatefulRuleDirection>
The direction of traffic flow to inspect. If set to ANY
, the inspection matches bidirectional traffic, both from the source to the destination and from the destination to the source. If set to FORWARD
, the inspection only matches traffic going from the source to the destination.
sourcepub fn destination(&self) -> Option<&str>
pub fn destination(&self) -> Option<&str>
The destination IP address or address range to inspect for, in CIDR notation. To match with any address, specify ANY
.
Specify an IP address or a block of IP addresses in Classless Inter-Domain Routing (CIDR) notation. Network Firewall supports all address ranges for IPv4.
Examples:
-
To configure Network Firewall to inspect for the IP address 192.0.2.44, specify
192.0.2.44/32
. -
To configure Network Firewall to inspect for IP addresses from 192.0.2.0 to 192.0.2.255, specify
192.0.2.0/24
.
For more information about CIDR notation, see the Wikipedia entry Classless Inter-Domain Routing.
sourcepub fn destination_port(&self) -> Option<&str>
pub fn destination_port(&self) -> Option<&str>
The destination port to inspect for. You can specify an individual port, for example 1994
and you can specify a port range, for example 1990:1994
. To match with any port, specify ANY
.