Struct aws_sdk_networkfirewall::model::firewall_policy::Builder
source · [−]#[non_exhaustive]pub struct Builder { /* private fields */ }
Expand description
A builder for FirewallPolicy
Implementations
Appends an item to stateless_rule_group_references
.
To override the contents of this collection use set_stateless_rule_group_references
.
References to the stateless rule groups that are used in the policy. These define the matching criteria in stateless rules.
pub fn set_stateless_rule_group_references(
self,
input: Option<Vec<StatelessRuleGroupReference>>
) -> Self
pub fn set_stateless_rule_group_references(
self,
input: Option<Vec<StatelessRuleGroupReference>>
) -> Self
References to the stateless rule groups that are used in the policy. These define the matching criteria in stateless rules.
Appends an item to stateless_default_actions
.
To override the contents of this collection use set_stateless_default_actions
.
The actions to take on a packet if it doesn't match any of the stateless rules in the policy. If you want non-matching packets to be forwarded for stateful inspection, specify aws:forward_to_sfe
.
You must specify one of the standard actions: aws:pass
, aws:drop
, or aws:forward_to_sfe
. In addition, you can specify custom actions that are compatible with your standard section choice.
For example, you could specify ["aws:pass"]
or you could specify ["aws:pass", “customActionName”]
. For information about compatibility, see the custom action descriptions under CustomAction
.
The actions to take on a packet if it doesn't match any of the stateless rules in the policy. If you want non-matching packets to be forwarded for stateful inspection, specify aws:forward_to_sfe
.
You must specify one of the standard actions: aws:pass
, aws:drop
, or aws:forward_to_sfe
. In addition, you can specify custom actions that are compatible with your standard section choice.
For example, you could specify ["aws:pass"]
or you could specify ["aws:pass", “customActionName”]
. For information about compatibility, see the custom action descriptions under CustomAction
.
Appends an item to stateless_fragment_default_actions
.
To override the contents of this collection use set_stateless_fragment_default_actions
.
The actions to take on a fragmented UDP packet if it doesn't match any of the stateless rules in the policy. Network Firewall only manages UDP packet fragments and silently drops packet fragments for other protocols. If you want non-matching fragmented UDP packets to be forwarded for stateful inspection, specify aws:forward_to_sfe
.
You must specify one of the standard actions: aws:pass
, aws:drop
, or aws:forward_to_sfe
. In addition, you can specify custom actions that are compatible with your standard section choice.
For example, you could specify ["aws:pass"]
or you could specify ["aws:pass", “customActionName”]
. For information about compatibility, see the custom action descriptions under CustomAction
.
The actions to take on a fragmented UDP packet if it doesn't match any of the stateless rules in the policy. Network Firewall only manages UDP packet fragments and silently drops packet fragments for other protocols. If you want non-matching fragmented UDP packets to be forwarded for stateful inspection, specify aws:forward_to_sfe
.
You must specify one of the standard actions: aws:pass
, aws:drop
, or aws:forward_to_sfe
. In addition, you can specify custom actions that are compatible with your standard section choice.
For example, you could specify ["aws:pass"]
or you could specify ["aws:pass", “customActionName”]
. For information about compatibility, see the custom action descriptions under CustomAction
.
Appends an item to stateless_custom_actions
.
To override the contents of this collection use set_stateless_custom_actions
.
The custom action definitions that are available for use in the firewall policy's StatelessDefaultActions
setting. You name each custom action that you define, and then you can use it by name in your default actions specifications.
The custom action definitions that are available for use in the firewall policy's StatelessDefaultActions
setting. You name each custom action that you define, and then you can use it by name in your default actions specifications.
Appends an item to stateful_rule_group_references
.
To override the contents of this collection use set_stateful_rule_group_references
.
References to the stateful rule groups that are used in the policy. These define the inspection criteria in stateful rules.
pub fn set_stateful_rule_group_references(
self,
input: Option<Vec<StatefulRuleGroupReference>>
) -> Self
pub fn set_stateful_rule_group_references(
self,
input: Option<Vec<StatefulRuleGroupReference>>
) -> Self
References to the stateful rule groups that are used in the policy. These define the inspection criteria in stateful rules.
Appends an item to stateful_default_actions
.
To override the contents of this collection use set_stateful_default_actions
.
The default actions to take on a packet that doesn't match any stateful rules. The stateful default action is optional, and is only valid when using the strict rule order.
Valid values of the stateful default action:
-
aws:drop_strict
-
aws:drop_established
-
aws:alert_strict
-
aws:alert_established
For more information, see Strict evaluation order in the AWS Network Firewall Developer Guide.
The default actions to take on a packet that doesn't match any stateful rules. The stateful default action is optional, and is only valid when using the strict rule order.
Valid values of the stateful default action:
-
aws:drop_strict
-
aws:drop_established
-
aws:alert_strict
-
aws:alert_established
For more information, see Strict evaluation order in the AWS Network Firewall Developer Guide.
Additional options governing how Network Firewall handles stateful rules. The stateful rule groups that you use in your policy must have stateful rule options settings that are compatible with these settings.
Additional options governing how Network Firewall handles stateful rules. The stateful rule groups that you use in your policy must have stateful rule options settings that are compatible with these settings.
Consumes the builder and constructs a FirewallPolicy
Trait Implementations
Auto Trait Implementations
impl RefUnwindSafe for Builder
impl UnwindSafe for Builder
Blanket Implementations
Mutably borrows from an owned value. Read more
Attaches the provided Subscriber
to this type, returning a
WithDispatch
wrapper. Read more
Attaches the current default Subscriber
to this type, returning a
WithDispatch
wrapper. Read more