Struct aws_sdk_networkfirewall::model::RulesSourceList
source · [−]#[non_exhaustive]pub struct RulesSourceList {
pub targets: Option<Vec<String>>,
pub target_types: Option<Vec<TargetType>>,
pub generated_rules_type: Option<GeneratedRulesType>,
}
Expand description
Stateful inspection criteria for a domain list rule group.
For HTTPS traffic, domain filtering is SNI-based. It uses the server name indicator extension of the TLS handshake.
By default, Network Firewall domain list inspection only includes traffic coming from the VPC where you deploy the firewall. To inspect traffic from IP addresses outside of the deployment VPC, you set the HOME_NET
rule variable to include the CIDR range of the deployment VPC plus the other CIDR ranges. For more information, see RuleVariables
in this guide and Stateful domain list rule groups in AWS Network Firewall in the Network Firewall Developer Guide.
Fields (Non-exhaustive)
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.targets: Option<Vec<String>>
The domains that you want to inspect for in your traffic flows. Valid domain specifications are the following:
-
Explicit names. For example,
abc.example.com
matches only the domainabc.example.com
. -
Names that use a domain wildcard, which you indicate with an initial '
.
'. For example,.example.com
matchesexample.com
and matches all subdomains ofexample.com
, such asabc.example.com
andwww.example.com
.
target_types: Option<Vec<TargetType>>
The protocols you want to inspect. Specify TLS_SNI
for HTTPS
. Specify HTTP_HOST
for HTTP
. You can specify either or both.
generated_rules_type: Option<GeneratedRulesType>
Whether you want to allow or deny access to the domains in your target list.
Implementations
The domains that you want to inspect for in your traffic flows. Valid domain specifications are the following:
-
Explicit names. For example,
abc.example.com
matches only the domainabc.example.com
. -
Names that use a domain wildcard, which you indicate with an initial '
.
'. For example,.example.com
matchesexample.com
and matches all subdomains ofexample.com
, such asabc.example.com
andwww.example.com
.
The protocols you want to inspect. Specify TLS_SNI
for HTTPS
. Specify HTTP_HOST
for HTTP
. You can specify either or both.
Whether you want to allow or deny access to the domains in your target list.
Creates a new builder-style object to manufacture RulesSourceList
Trait Implementations
This method tests for self
and other
values to be equal, and is used
by ==
. Read more
This method tests for !=
.
Auto Trait Implementations
impl RefUnwindSafe for RulesSourceList
impl Send for RulesSourceList
impl Sync for RulesSourceList
impl Unpin for RulesSourceList
impl UnwindSafe for RulesSourceList
Blanket Implementations
Mutably borrows from an owned value. Read more
Attaches the provided Subscriber
to this type, returning a
WithDispatch
wrapper. Read more
Attaches the current default Subscriber
to this type, returning a
WithDispatch
wrapper. Read more