Struct aws_sdk_networkfirewall::model::Header
source · [−]#[non_exhaustive]pub struct Header {
pub protocol: Option<StatefulRuleProtocol>,
pub source: Option<String>,
pub source_port: Option<String>,
pub direction: Option<StatefulRuleDirection>,
pub destination: Option<String>,
pub destination_port: Option<String>,
}
Expand description
The basic rule criteria for AWS Network Firewall to use to inspect packet headers in stateful traffic flow inspection. Traffic flows that match the criteria are a match for the corresponding StatefulRule
.
Fields (Non-exhaustive)
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.protocol: Option<StatefulRuleProtocol>
The protocol to inspect for. To specify all, you can use IP
, because all traffic on AWS and on the internet is IP.
source: Option<String>
The source IP address or address range to inspect for, in CIDR notation. To match with any address, specify ANY
.
Specify an IP address or a block of IP addresses in Classless Inter-Domain Routing (CIDR) notation. Network Firewall supports all address ranges for IPv4.
Examples:
-
To configure Network Firewall to inspect for the IP address 192.0.2.44, specify
192.0.2.44/32
. -
To configure Network Firewall to inspect for IP addresses from 192.0.2.0 to 192.0.2.255, specify
192.0.2.0/24
.
For more information about CIDR notation, see the Wikipedia entry Classless Inter-Domain Routing.
source_port: Option<String>
The source port to inspect for. You can specify an individual port, for example 1994
and you can specify a port range, for example 1990:1994
. To match with any port, specify ANY
.
direction: Option<StatefulRuleDirection>
The direction of traffic flow to inspect. If set to ANY
, the inspection matches bidirectional traffic, both from the source to the destination and from the destination to the source. If set to FORWARD
, the inspection only matches traffic going from the source to the destination.
destination: Option<String>
The destination IP address or address range to inspect for, in CIDR notation. To match with any address, specify ANY
.
Specify an IP address or a block of IP addresses in Classless Inter-Domain Routing (CIDR) notation. Network Firewall supports all address ranges for IPv4.
Examples:
-
To configure Network Firewall to inspect for the IP address 192.0.2.44, specify
192.0.2.44/32
. -
To configure Network Firewall to inspect for IP addresses from 192.0.2.0 to 192.0.2.255, specify
192.0.2.0/24
.
For more information about CIDR notation, see the Wikipedia entry Classless Inter-Domain Routing.
destination_port: Option<String>
The destination port to inspect for. You can specify an individual port, for example 1994
and you can specify a port range, for example 1990:1994
. To match with any port, specify ANY
.
Implementations
The protocol to inspect for. To specify all, you can use IP
, because all traffic on AWS and on the internet is IP.
The source IP address or address range to inspect for, in CIDR notation. To match with any address, specify ANY
.
Specify an IP address or a block of IP addresses in Classless Inter-Domain Routing (CIDR) notation. Network Firewall supports all address ranges for IPv4.
Examples:
-
To configure Network Firewall to inspect for the IP address 192.0.2.44, specify
192.0.2.44/32
. -
To configure Network Firewall to inspect for IP addresses from 192.0.2.0 to 192.0.2.255, specify
192.0.2.0/24
.
For more information about CIDR notation, see the Wikipedia entry Classless Inter-Domain Routing.
The source port to inspect for. You can specify an individual port, for example 1994
and you can specify a port range, for example 1990:1994
. To match with any port, specify ANY
.
The direction of traffic flow to inspect. If set to ANY
, the inspection matches bidirectional traffic, both from the source to the destination and from the destination to the source. If set to FORWARD
, the inspection only matches traffic going from the source to the destination.
The destination IP address or address range to inspect for, in CIDR notation. To match with any address, specify ANY
.
Specify an IP address or a block of IP addresses in Classless Inter-Domain Routing (CIDR) notation. Network Firewall supports all address ranges for IPv4.
Examples:
-
To configure Network Firewall to inspect for the IP address 192.0.2.44, specify
192.0.2.44/32
. -
To configure Network Firewall to inspect for IP addresses from 192.0.2.0 to 192.0.2.255, specify
192.0.2.0/24
.
For more information about CIDR notation, see the Wikipedia entry Classless Inter-Domain Routing.
The destination port to inspect for. You can specify an individual port, for example 1994
and you can specify a port range, for example 1990:1994
. To match with any port, specify ANY
.
Trait Implementations
Auto Trait Implementations
impl RefUnwindSafe for Header
impl UnwindSafe for Header
Blanket Implementations
Mutably borrows from an owned value. Read more
Attaches the provided Subscriber
to this type, returning a
WithDispatch
wrapper. Read more
Attaches the current default Subscriber
to this type, returning a
WithDispatch
wrapper. Read more