Struct aws_sdk_networkfirewall::model::StatefulRule
source · [−]#[non_exhaustive]pub struct StatefulRule {
pub action: Option<StatefulAction>,
pub header: Option<Header>,
pub rule_options: Option<Vec<RuleOption>>,
}
Expand description
A single Suricata rules specification, for use in a stateful rule group. Use this option to specify a simple Suricata rule with protocol, source and destination, ports, direction, and rule options. For information about the Suricata Rules
format, see Rules Format.
Fields (Non-exhaustive)
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.action: Option<StatefulAction>
Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow.
The actions for a stateful rule are defined as follows:
-
PASS - Permits the packets to go to the intended destination.
-
DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the
Firewall
LoggingConfiguration
. -
ALERT - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the
Firewall
LoggingConfiguration
.You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with
ALERT
action, verify in the logs that the rule is filtering as you want, then change the action toDROP
.
header: Option<Header>
The stateful inspection criteria for this rule, used to inspect traffic flows.
rule_options: Option<Vec<RuleOption>>
Additional options for the rule. These are the Suricata RuleOptions
settings.
Implementations
Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow.
The actions for a stateful rule are defined as follows:
-
PASS - Permits the packets to go to the intended destination.
-
DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the
Firewall
LoggingConfiguration
. -
ALERT - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the
Firewall
LoggingConfiguration
.You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with
ALERT
action, verify in the logs that the rule is filtering as you want, then change the action toDROP
.
The stateful inspection criteria for this rule, used to inspect traffic flows.
Additional options for the rule. These are the Suricata RuleOptions
settings.
Creates a new builder-style object to manufacture StatefulRule
Trait Implementations
This method tests for self
and other
values to be equal, and is used
by ==
. Read more
This method tests for !=
.
Auto Trait Implementations
impl RefUnwindSafe for StatefulRule
impl Send for StatefulRule
impl Sync for StatefulRule
impl Unpin for StatefulRule
impl UnwindSafe for StatefulRule
Blanket Implementations
Mutably borrows from an owned value. Read more
Attaches the provided Subscriber
to this type, returning a
WithDispatch
wrapper. Read more
Attaches the current default Subscriber
to this type, returning a
WithDispatch
wrapper. Read more