Struct aws_sdk_networkfirewall::model::stateful_rule::Builder
source · pub struct Builder { /* private fields */ }
Expand description
A builder for StatefulRule
.
Implementations§
source§impl Builder
impl Builder
sourcepub fn action(self, input: StatefulAction) -> Self
pub fn action(self, input: StatefulAction) -> Self
Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow.
The actions for a stateful rule are defined as follows:
-
PASS - Permits the packets to go to the intended destination.
-
DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the
Firewall
LoggingConfiguration
. -
ALERT - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the
Firewall
LoggingConfiguration
.You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with
ALERT
action, verify in the logs that the rule is filtering as you want, then change the action toDROP
. -
REJECT - Drops TCP traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a
RST
bit contained in the TCP header flags. Also sends an alert log mesage if alert logging is configured in theFirewall
LoggingConfiguration
.REJECT
isn't currently available for use with IMAP and FTP protocols.
sourcepub fn set_action(self, input: Option<StatefulAction>) -> Self
pub fn set_action(self, input: Option<StatefulAction>) -> Self
Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow.
The actions for a stateful rule are defined as follows:
-
PASS - Permits the packets to go to the intended destination.
-
DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the
Firewall
LoggingConfiguration
. -
ALERT - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the
Firewall
LoggingConfiguration
.You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with
ALERT
action, verify in the logs that the rule is filtering as you want, then change the action toDROP
. -
REJECT - Drops TCP traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a
RST
bit contained in the TCP header flags. Also sends an alert log mesage if alert logging is configured in theFirewall
LoggingConfiguration
.REJECT
isn't currently available for use with IMAP and FTP protocols.
sourcepub fn header(self, input: Header) -> Self
pub fn header(self, input: Header) -> Self
The stateful inspection criteria for this rule, used to inspect traffic flows.
sourcepub fn set_header(self, input: Option<Header>) -> Self
pub fn set_header(self, input: Option<Header>) -> Self
The stateful inspection criteria for this rule, used to inspect traffic flows.
sourcepub fn rule_options(self, input: RuleOption) -> Self
pub fn rule_options(self, input: RuleOption) -> Self
Appends an item to rule_options
.
To override the contents of this collection use set_rule_options
.
Additional options for the rule. These are the Suricata RuleOptions
settings.
sourcepub fn set_rule_options(self, input: Option<Vec<RuleOption>>) -> Self
pub fn set_rule_options(self, input: Option<Vec<RuleOption>>) -> Self
Additional options for the rule. These are the Suricata RuleOptions
settings.
sourcepub fn build(self) -> StatefulRule
pub fn build(self) -> StatefulRule
Consumes the builder and constructs a StatefulRule
.