Documentation ¶
Index ¶
- func CfnFirewallPolicy_CFN_RESOURCE_TYPE_NAME() *string
- func CfnFirewallPolicy_IsCfnElement(x interface{}) *bool
- func CfnFirewallPolicy_IsCfnResource(construct constructs.IConstruct) *bool
- func CfnFirewallPolicy_IsConstruct(x interface{}) *bool
- func CfnFirewall_CFN_RESOURCE_TYPE_NAME() *string
- func CfnFirewall_IsCfnElement(x interface{}) *bool
- func CfnFirewall_IsCfnResource(construct constructs.IConstruct) *bool
- func CfnFirewall_IsConstruct(x interface{}) *bool
- func CfnLoggingConfiguration_CFN_RESOURCE_TYPE_NAME() *string
- func CfnLoggingConfiguration_IsCfnElement(x interface{}) *bool
- func CfnLoggingConfiguration_IsCfnResource(construct constructs.IConstruct) *bool
- func CfnLoggingConfiguration_IsConstruct(x interface{}) *bool
- func CfnRuleGroup_CFN_RESOURCE_TYPE_NAME() *string
- func CfnRuleGroup_IsCfnElement(x interface{}) *bool
- func CfnRuleGroup_IsCfnResource(construct constructs.IConstruct) *bool
- func CfnRuleGroup_IsConstruct(x interface{}) *bool
- func NewCfnFirewallPolicy_Override(c CfnFirewallPolicy, scope constructs.Construct, id *string, ...)
- func NewCfnFirewall_Override(c CfnFirewall, scope constructs.Construct, id *string, props *CfnFirewallProps)
- func NewCfnLoggingConfiguration_Override(c CfnLoggingConfiguration, scope constructs.Construct, id *string, ...)
- func NewCfnRuleGroup_Override(c CfnRuleGroup, scope constructs.Construct, id *string, ...)
- type CfnFirewall
- type CfnFirewallPolicy
- type CfnFirewallPolicyProps
- type CfnFirewallPolicy_ActionDefinitionProperty
- type CfnFirewallPolicy_CustomActionProperty
- type CfnFirewallPolicy_DimensionProperty
- type CfnFirewallPolicy_FirewallPolicyProperty
- type CfnFirewallPolicy_PublishMetricActionProperty
- type CfnFirewallPolicy_StatefulEngineOptionsProperty
- type CfnFirewallPolicy_StatefulRuleGroupReferenceProperty
- type CfnFirewallPolicy_StatelessRuleGroupReferenceProperty
- type CfnFirewallProps
- type CfnFirewall_SubnetMappingProperty
- type CfnLoggingConfiguration
- type CfnLoggingConfigurationProps
- type CfnLoggingConfiguration_LogDestinationConfigProperty
- type CfnLoggingConfiguration_LoggingConfigurationProperty
- type CfnRuleGroup
- type CfnRuleGroupProps
- type CfnRuleGroup_ActionDefinitionProperty
- type CfnRuleGroup_AddressProperty
- type CfnRuleGroup_CustomActionProperty
- type CfnRuleGroup_DimensionProperty
- type CfnRuleGroup_HeaderProperty
- type CfnRuleGroup_IPSetProperty
- type CfnRuleGroup_MatchAttributesProperty
- type CfnRuleGroup_PortRangeProperty
- type CfnRuleGroup_PortSetProperty
- type CfnRuleGroup_PublishMetricActionProperty
- type CfnRuleGroup_RuleDefinitionProperty
- type CfnRuleGroup_RuleGroupProperty
- type CfnRuleGroup_RuleOptionProperty
- type CfnRuleGroup_RuleVariablesProperty
- type CfnRuleGroup_RulesSourceListProperty
- type CfnRuleGroup_RulesSourceProperty
- type CfnRuleGroup_StatefulRuleOptionsProperty
- type CfnRuleGroup_StatefulRuleProperty
- type CfnRuleGroup_StatelessRuleProperty
- type CfnRuleGroup_StatelessRulesAndCustomActionsProperty
- type CfnRuleGroup_TCPFlagFieldProperty
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func CfnFirewallPolicy_CFN_RESOURCE_TYPE_NAME ¶
func CfnFirewallPolicy_CFN_RESOURCE_TYPE_NAME() *string
func CfnFirewallPolicy_IsCfnElement ¶
func CfnFirewallPolicy_IsCfnElement(x interface{}) *bool
Returns `true` if a construct is a stack element (i.e. part of the synthesized cloudformation template).
Uses duck-typing instead of `instanceof` to allow stack elements from different versions of this library to be included in the same stack.
Returns: The construct as a stack element or undefined if it is not a stack element.
func CfnFirewallPolicy_IsCfnResource ¶
func CfnFirewallPolicy_IsCfnResource(construct constructs.IConstruct) *bool
Check whether the given construct is a CfnResource.
func CfnFirewallPolicy_IsConstruct ¶
func CfnFirewallPolicy_IsConstruct(x interface{}) *bool
Checks if `x` is a construct.
Returns: true if `x` is an object created from a class which extends `Construct`. Deprecated: use `x instanceof Construct` instead
func CfnFirewall_CFN_RESOURCE_TYPE_NAME ¶
func CfnFirewall_CFN_RESOURCE_TYPE_NAME() *string
func CfnFirewall_IsCfnElement ¶
func CfnFirewall_IsCfnElement(x interface{}) *bool
Returns `true` if a construct is a stack element (i.e. part of the synthesized cloudformation template).
Uses duck-typing instead of `instanceof` to allow stack elements from different versions of this library to be included in the same stack.
Returns: The construct as a stack element or undefined if it is not a stack element.
func CfnFirewall_IsCfnResource ¶
func CfnFirewall_IsCfnResource(construct constructs.IConstruct) *bool
Check whether the given construct is a CfnResource.
func CfnFirewall_IsConstruct ¶
func CfnFirewall_IsConstruct(x interface{}) *bool
Checks if `x` is a construct.
Returns: true if `x` is an object created from a class which extends `Construct`. Deprecated: use `x instanceof Construct` instead
func CfnLoggingConfiguration_CFN_RESOURCE_TYPE_NAME ¶
func CfnLoggingConfiguration_CFN_RESOURCE_TYPE_NAME() *string
func CfnLoggingConfiguration_IsCfnElement ¶
func CfnLoggingConfiguration_IsCfnElement(x interface{}) *bool
Returns `true` if a construct is a stack element (i.e. part of the synthesized cloudformation template).
Uses duck-typing instead of `instanceof` to allow stack elements from different versions of this library to be included in the same stack.
Returns: The construct as a stack element or undefined if it is not a stack element.
func CfnLoggingConfiguration_IsCfnResource ¶
func CfnLoggingConfiguration_IsCfnResource(construct constructs.IConstruct) *bool
Check whether the given construct is a CfnResource.
func CfnLoggingConfiguration_IsConstruct ¶
func CfnLoggingConfiguration_IsConstruct(x interface{}) *bool
Checks if `x` is a construct.
Returns: true if `x` is an object created from a class which extends `Construct`. Deprecated: use `x instanceof Construct` instead
func CfnRuleGroup_CFN_RESOURCE_TYPE_NAME ¶
func CfnRuleGroup_CFN_RESOURCE_TYPE_NAME() *string
func CfnRuleGroup_IsCfnElement ¶
func CfnRuleGroup_IsCfnElement(x interface{}) *bool
Returns `true` if a construct is a stack element (i.e. part of the synthesized cloudformation template).
Uses duck-typing instead of `instanceof` to allow stack elements from different versions of this library to be included in the same stack.
Returns: The construct as a stack element or undefined if it is not a stack element.
func CfnRuleGroup_IsCfnResource ¶
func CfnRuleGroup_IsCfnResource(construct constructs.IConstruct) *bool
Check whether the given construct is a CfnResource.
func CfnRuleGroup_IsConstruct ¶
func CfnRuleGroup_IsConstruct(x interface{}) *bool
Checks if `x` is a construct.
Returns: true if `x` is an object created from a class which extends `Construct`. Deprecated: use `x instanceof Construct` instead
func NewCfnFirewallPolicy_Override ¶
func NewCfnFirewallPolicy_Override(c CfnFirewallPolicy, scope constructs.Construct, id *string, props *CfnFirewallPolicyProps)
Create a new `AWS::NetworkFirewall::FirewallPolicy`.
func NewCfnFirewall_Override ¶
func NewCfnFirewall_Override(c CfnFirewall, scope constructs.Construct, id *string, props *CfnFirewallProps)
Create a new `AWS::NetworkFirewall::Firewall`.
func NewCfnLoggingConfiguration_Override ¶
func NewCfnLoggingConfiguration_Override(c CfnLoggingConfiguration, scope constructs.Construct, id *string, props *CfnLoggingConfigurationProps)
Create a new `AWS::NetworkFirewall::LoggingConfiguration`.
func NewCfnRuleGroup_Override ¶
func NewCfnRuleGroup_Override(c CfnRuleGroup, scope constructs.Construct, id *string, props *CfnRuleGroupProps)
Create a new `AWS::NetworkFirewall::RuleGroup`.
Types ¶
type CfnFirewall ¶
type CfnFirewall interface { awscdk.CfnResource awscdk.IInspectable AttrEndpointIds() *[]*string AttrFirewallArn() *string AttrFirewallId() *string CfnOptions() awscdk.ICfnResourceOptions CfnProperties() *map[string]interface{} CfnResourceType() *string CreationStack() *[]*string DeleteProtection() interface{} SetDeleteProtection(val interface{}) Description() *string SetDescription(val *string) FirewallName() *string SetFirewallName(val *string) FirewallPolicyArn() *string SetFirewallPolicyArn(val *string) FirewallPolicyChangeProtection() interface{} SetFirewallPolicyChangeProtection(val interface{}) LogicalId() *string Node() constructs.Node Ref() *string Stack() awscdk.Stack SubnetChangeProtection() interface{} SetSubnetChangeProtection(val interface{}) SubnetMappings() interface{} SetSubnetMappings(val interface{}) Tags() awscdk.TagManager UpdatedProperites() *map[string]interface{} VpcId() *string SetVpcId(val *string) AddDeletionOverride(path *string) AddDependsOn(target awscdk.CfnResource) AddMetadata(key *string, value interface{}) AddOverride(path *string, value interface{}) AddPropertyDeletionOverride(propertyPath *string) AddPropertyOverride(propertyPath *string, value interface{}) ApplyRemovalPolicy(policy awscdk.RemovalPolicy, options *awscdk.RemovalPolicyOptions) GetAtt(attributeName *string) awscdk.Reference GetMetadata(key *string) interface{} Inspect(inspector awscdk.TreeInspector) OverrideLogicalId(newLogicalId *string) RenderProperties(props *map[string]interface{}) *map[string]interface{} ShouldSynthesize() *bool ToString() *string ValidateProperties(_properties interface{}) }
A CloudFormation `AWS::NetworkFirewall::Firewall`.
Use the `Firewall` to provide stateful, managed, network firewall and intrusion detection and prevention filtering for your VPCs in Amazon VPC .
The firewall defines the configuration settings for an AWS Network Firewall firewall. The settings include the firewall policy, the subnets in your VPC to use for the firewall endpoints, and any tags that are attached to the firewall AWS resource.
TODO: EXAMPLE
func NewCfnFirewall ¶
func NewCfnFirewall(scope constructs.Construct, id *string, props *CfnFirewallProps) CfnFirewall
Create a new `AWS::NetworkFirewall::Firewall`.
type CfnFirewallPolicy ¶
type CfnFirewallPolicy interface { awscdk.CfnResource awscdk.IInspectable AttrFirewallPolicyArn() *string AttrFirewallPolicyId() *string CfnOptions() awscdk.ICfnResourceOptions CfnProperties() *map[string]interface{} CfnResourceType() *string CreationStack() *[]*string Description() *string SetDescription(val *string) FirewallPolicy() interface{} SetFirewallPolicy(val interface{}) FirewallPolicyName() *string SetFirewallPolicyName(val *string) LogicalId() *string Node() constructs.Node Ref() *string Stack() awscdk.Stack Tags() awscdk.TagManager UpdatedProperites() *map[string]interface{} AddDeletionOverride(path *string) AddDependsOn(target awscdk.CfnResource) AddMetadata(key *string, value interface{}) AddOverride(path *string, value interface{}) AddPropertyDeletionOverride(propertyPath *string) AddPropertyOverride(propertyPath *string, value interface{}) ApplyRemovalPolicy(policy awscdk.RemovalPolicy, options *awscdk.RemovalPolicyOptions) GetAtt(attributeName *string) awscdk.Reference GetMetadata(key *string) interface{} Inspect(inspector awscdk.TreeInspector) OverrideLogicalId(newLogicalId *string) RenderProperties(props *map[string]interface{}) *map[string]interface{} ShouldSynthesize() *bool ToString() *string ValidateProperties(_properties interface{}) }
A CloudFormation `AWS::NetworkFirewall::FirewallPolicy`.
Use the `FirewallPolicy` to define the stateless and stateful network traffic filtering behavior for your `Firewall` . You can use one firewall policy for multiple firewalls.
TODO: EXAMPLE
func NewCfnFirewallPolicy ¶
func NewCfnFirewallPolicy(scope constructs.Construct, id *string, props *CfnFirewallPolicyProps) CfnFirewallPolicy
Create a new `AWS::NetworkFirewall::FirewallPolicy`.
type CfnFirewallPolicyProps ¶
type CfnFirewallPolicyProps struct { // The traffic filtering behavior of a firewall policy, defined in a collection of stateless and stateful rule groups and other settings. FirewallPolicy interface{} `json:"firewallPolicy" yaml:"firewallPolicy"` // The descriptive name of the firewall policy. // // You can't change the name of a firewall policy after you create it. FirewallPolicyName *string `json:"firewallPolicyName" yaml:"firewallPolicyName"` // A description of the firewall policy. Description *string `json:"description" yaml:"description"` // An array of key-value pairs to apply to this resource. // // For more information, see [Tag](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html) . Tags *[]*awscdk.CfnTag `json:"tags" yaml:"tags"` }
Properties for defining a `CfnFirewallPolicy`.
TODO: EXAMPLE
type CfnFirewallPolicy_ActionDefinitionProperty ¶
type CfnFirewallPolicy_ActionDefinitionProperty struct { // Stateless inspection criteria that publishes the specified metrics to Amazon CloudWatch for the matching packet. // // This setting defines a CloudWatch dimension value to be published. // // You can pair this custom action with any of the standard stateless rule actions. For example, you could pair this in a rule action with the standard action that forwards the packet for stateful inspection. Then, when a packet matches the rule, Network Firewall publishes metrics for the packet and forwards it. PublishMetricAction interface{} `json:"publishMetricAction" yaml:"publishMetricAction"` }
A custom action to use in stateless rule actions settings.
TODO: EXAMPLE
type CfnFirewallPolicy_CustomActionProperty ¶
type CfnFirewallPolicy_CustomActionProperty struct { // The custom action associated with the action name. ActionDefinition interface{} `json:"actionDefinition" yaml:"actionDefinition"` // The descriptive name of the custom action. // // You can't change the name of a custom action after you create it. ActionName *string `json:"actionName" yaml:"actionName"` }
An optional, non-standard action to use for stateless packet handling.
You can define this in addition to the standard action that you must specify.
You define and name the custom actions that you want to be able to use, and then you reference them by name in your actions settings.
You can use custom actions in the following places:
- In an `RuleGroup.StatelessRulesAndCustomActions` . The custom actions are available for use by name inside the `StatelessRulesAndCustomActions` where you define them. You can use them for your stateless rule actions to specify what to do with a packet that matches the rule's match attributes. - In an `FirewallPolicy` specification, in `StatelessCustomActions` . The custom actions are available for use inside the policy where you define them. You can use them for the policy's default stateless actions settings to specify what to do with packets that don't match any of the policy's stateless rules.
TODO: EXAMPLE
type CfnFirewallPolicy_DimensionProperty ¶
type CfnFirewallPolicy_DimensionProperty struct { // The value to use in the custom metric dimension. Value *string `json:"value" yaml:"value"` }
The value to use in an Amazon CloudWatch custom metric dimension.
This is used in the `PublishMetrics` custom action. A CloudWatch custom metric dimension is a name/value pair that's part of the identity of a metric.
AWS Network Firewall sets the dimension name to `CustomAction` and you provide the dimension value.
For more information about CloudWatch custom metric dimensions, see [Publishing Custom Metrics](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/publishingMetrics.html#usingDimensions) in the [Amazon CloudWatch User Guide](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/WhatIsCloudWatch.html) .
TODO: EXAMPLE
type CfnFirewallPolicy_FirewallPolicyProperty ¶
type CfnFirewallPolicy_FirewallPolicyProperty struct { // The actions to take on a packet if it doesn't match any of the stateless rules in the policy. // // If you want non-matching packets to be forwarded for stateful inspection, specify `aws:forward_to_sfe` . // // You must specify one of the standard actions: `aws:pass` , `aws:drop` , or `aws:forward_to_sfe` . In addition, you can specify custom actions that are compatible with your standard section choice. // // For example, you could specify `["aws:pass"]` or you could specify `["aws:pass", “customActionName”]` . For information about compatibility, see the custom action descriptions. StatelessDefaultActions *[]*string `json:"statelessDefaultActions" yaml:"statelessDefaultActions"` // The actions to take on a fragmented packet if it doesn't match any of the stateless rules in the policy. // // If you want non-matching fragmented packets to be forwarded for stateful inspection, specify `aws:forward_to_sfe` . // // You must specify one of the standard actions: `aws:pass` , `aws:drop` , or `aws:forward_to_sfe` . In addition, you can specify custom actions that are compatible with your standard section choice. // // For example, you could specify `["aws:pass"]` or you could specify `["aws:pass", “customActionName”]` . For information about compatibility, see the custom action descriptions. StatelessFragmentDefaultActions *[]*string `json:"statelessFragmentDefaultActions" yaml:"statelessFragmentDefaultActions"` // The default actions to take on a packet that doesn't match any stateful rules. // // The stateful default action is optional, and is only valid when using the strict rule order. // // Valid values of the stateful default action: // // - aws:drop_strict // - aws:drop_established // - aws:alert_strict // - aws:alert_established // // For more information, see [Strict evaluation order](https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html#suricata-strict-rule-evaluation-order.html) in the *AWS Network Firewall Developer Guide* . StatefulDefaultActions *[]*string `json:"statefulDefaultActions" yaml:"statefulDefaultActions"` // Additional options governing how Network Firewall handles stateful rules. // // The stateful rule groups that you use in your policy must have stateful rule options settings that are compatible with these settings. StatefulEngineOptions interface{} `json:"statefulEngineOptions" yaml:"statefulEngineOptions"` // References to the stateful rule groups that are used in the policy. // // These define the inspection criteria in stateful rules. StatefulRuleGroupReferences interface{} `json:"statefulRuleGroupReferences" yaml:"statefulRuleGroupReferences"` // The custom action definitions that are available for use in the firewall policy's `StatelessDefaultActions` setting. // // You name each custom action that you define, and then you can use it by name in your default actions specifications. StatelessCustomActions interface{} `json:"statelessCustomActions" yaml:"statelessCustomActions"` // References to the stateless rule groups that are used in the policy. // // These define the matching criteria in stateless rules. StatelessRuleGroupReferences interface{} `json:"statelessRuleGroupReferences" yaml:"statelessRuleGroupReferences"` }
The traffic filtering behavior of a firewall policy, defined in a collection of stateless and stateful rule groups and other settings.
TODO: EXAMPLE
type CfnFirewallPolicy_PublishMetricActionProperty ¶
type CfnFirewallPolicy_PublishMetricActionProperty struct {
// `CfnFirewallPolicy.PublishMetricActionProperty.Dimensions`.
Dimensions interface{} `json:"dimensions" yaml:"dimensions"`
}
Stateless inspection criteria that publishes the specified metrics to Amazon CloudWatch for the matching packet.
This setting defines a CloudWatch dimension value to be published.
TODO: EXAMPLE
type CfnFirewallPolicy_StatefulEngineOptionsProperty ¶
type CfnFirewallPolicy_StatefulEngineOptionsProperty struct { // Indicates how to manage the order of stateful rule evaluation for the policy. // // `DEFAULT_ACTION_ORDER` is the default behavior. Stateful rules are provided to the rule engine as Suricata compatible strings, and Suricata evaluates them based on certain settings. For more information, see [Evaluation order for stateful rules](https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html) in the *AWS Network Firewall Developer Guide* . RuleOrder *string `json:"ruleOrder" yaml:"ruleOrder"` }
Configuration settings for the handling of the stateful rule groups in a firewall policy.
TODO: EXAMPLE
type CfnFirewallPolicy_StatefulRuleGroupReferenceProperty ¶
type CfnFirewallPolicy_StatefulRuleGroupReferenceProperty struct { // The Amazon Resource Name (ARN) of the stateful rule group. ResourceArn *string `json:"resourceArn" yaml:"resourceArn"` // An integer setting that indicates the order in which to run the stateful rule groups in a single `FirewallPolicy` . // // This setting only applies to firewall policies that specify the `STRICT_ORDER` rule order in the stateful engine options settings. // // Network Firewall evalutes each stateful rule group against a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy. // // You can change the priority settings of your rule groups at any time. To make it easier to insert rule groups later, number them so there's a wide range in between, for example use 100, 200, and so on. Priority *float64 `json:"priority" yaml:"priority"` }
Identifier for a single stateful rule group, used in a firewall policy to refer to a rule group.
TODO: EXAMPLE
type CfnFirewallPolicy_StatelessRuleGroupReferenceProperty ¶
type CfnFirewallPolicy_StatelessRuleGroupReferenceProperty struct { // An integer setting that indicates the order in which to run the stateless rule groups in a single `FirewallPolicy` . // // Network Firewall applies each stateless rule group to a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy. Priority *float64 `json:"priority" yaml:"priority"` // The Amazon Resource Name (ARN) of the stateless rule group. ResourceArn *string `json:"resourceArn" yaml:"resourceArn"` }
Identifier for a single stateless rule group, used in a firewall policy to refer to the rule group.
TODO: EXAMPLE
type CfnFirewallProps ¶
type CfnFirewallProps struct { // The descriptive name of the firewall. // // You can't change the name of a firewall after you create it. FirewallName *string `json:"firewallName" yaml:"firewallName"` // The Amazon Resource Name (ARN) of the firewall policy. // // The relationship of firewall to firewall policy is many to one. Each firewall requires one firewall policy association, and you can use the same firewall policy for multiple firewalls. FirewallPolicyArn *string `json:"firewallPolicyArn" yaml:"firewallPolicyArn"` // The public subnets that Network Firewall is using for the firewall. // // Each subnet must belong to a different Availability Zone. SubnetMappings interface{} `json:"subnetMappings" yaml:"subnetMappings"` // The unique identifier of the VPC where the firewall is in use. // // You can't change the VPC of a firewall after you create the firewall. VpcId *string `json:"vpcId" yaml:"vpcId"` // A flag indicating whether it is possible to delete the firewall. // // A setting of `TRUE` indicates that the firewall is protected against deletion. Use this setting to protect against accidentally deleting a firewall that is in use. When you create a firewall, the operation initializes this flag to `TRUE` . DeleteProtection interface{} `json:"deleteProtection" yaml:"deleteProtection"` // A description of the firewall. Description *string `json:"description" yaml:"description"` // A setting indicating whether the firewall is protected against a change to the firewall policy association. // // Use this setting to protect against accidentally modifying the firewall policy for a firewall that is in use. When you create a firewall, the operation initializes this setting to `TRUE` . FirewallPolicyChangeProtection interface{} `json:"firewallPolicyChangeProtection" yaml:"firewallPolicyChangeProtection"` // A setting indicating whether the firewall is protected against changes to the subnet associations. // // Use this setting to protect against accidentally modifying the subnet associations for a firewall that is in use. When you create a firewall, the operation initializes this setting to `TRUE` . SubnetChangeProtection interface{} `json:"subnetChangeProtection" yaml:"subnetChangeProtection"` // An array of key-value pairs to apply to this resource. // // For more information, see [Tag](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html) . Tags *[]*awscdk.CfnTag `json:"tags" yaml:"tags"` }
Properties for defining a `CfnFirewall`.
TODO: EXAMPLE
type CfnFirewall_SubnetMappingProperty ¶
type CfnFirewall_SubnetMappingProperty struct { // The unique identifier for the subnet. SubnetId *string `json:"subnetId" yaml:"subnetId"` }
The ID for a subnet that you want to associate with the firewall.
AWS Network Firewall creates an instance of the associated firewall in each subnet that you specify, to filter traffic in the subnet's Availability Zone.
TODO: EXAMPLE
type CfnLoggingConfiguration ¶
type CfnLoggingConfiguration interface { awscdk.CfnResource awscdk.IInspectable CfnOptions() awscdk.ICfnResourceOptions CfnProperties() *map[string]interface{} CfnResourceType() *string CreationStack() *[]*string FirewallArn() *string SetFirewallArn(val *string) FirewallName() *string SetFirewallName(val *string) LoggingConfiguration() interface{} SetLoggingConfiguration(val interface{}) LogicalId() *string Node() constructs.Node Ref() *string Stack() awscdk.Stack UpdatedProperites() *map[string]interface{} AddDeletionOverride(path *string) AddDependsOn(target awscdk.CfnResource) AddMetadata(key *string, value interface{}) AddOverride(path *string, value interface{}) AddPropertyDeletionOverride(propertyPath *string) AddPropertyOverride(propertyPath *string, value interface{}) ApplyRemovalPolicy(policy awscdk.RemovalPolicy, options *awscdk.RemovalPolicyOptions) GetAtt(attributeName *string) awscdk.Reference GetMetadata(key *string) interface{} Inspect(inspector awscdk.TreeInspector) OverrideLogicalId(newLogicalId *string) RenderProperties(props *map[string]interface{}) *map[string]interface{} ShouldSynthesize() *bool ToString() *string ValidateProperties(_properties interface{}) }
A CloudFormation `AWS::NetworkFirewall::LoggingConfiguration`.
Use the `LoggingConfiguration` to define the destinations and logging options for an `Firewall` .
You must change the logging configuration by changing one `LogDestinationConfig` setting at a time in your `LogDestinationConfigs` .
You can make only one of the following changes to your `LoggingConfiguration` resource:
- Create a new log destination object by adding a single `LogDestinationConfig` array element to `LogDestinationConfigs` . - Delete a log destination object by removing a single `LogDestinationConfig` array element from `LogDestinationConfigs` . - Change the `LogDestination` setting in a single `LogDestinationConfig` array element.
You can't change the `LogDestinationType` or `LogType` in a `LogDestinationConfig` . To change these settings, delete the existing `LogDestinationConfig` object and create a new one, in two separate modifications.
TODO: EXAMPLE
func NewCfnLoggingConfiguration ¶
func NewCfnLoggingConfiguration(scope constructs.Construct, id *string, props *CfnLoggingConfigurationProps) CfnLoggingConfiguration
Create a new `AWS::NetworkFirewall::LoggingConfiguration`.
type CfnLoggingConfigurationProps ¶
type CfnLoggingConfigurationProps struct { // The Amazon Resource Name (ARN) of the `Firewall` that the logging configuration is associated with. // // You can't change the firewall specification after you create the logging configuration. FirewallArn *string `json:"firewallArn" yaml:"firewallArn"` // Defines how AWS Network Firewall performs logging for a `Firewall` . LoggingConfiguration interface{} `json:"loggingConfiguration" yaml:"loggingConfiguration"` // The name of the firewall that the logging configuration is associated with. // // You can't change the firewall specification after you create the logging configuration. FirewallName *string `json:"firewallName" yaml:"firewallName"` }
Properties for defining a `CfnLoggingConfiguration`.
TODO: EXAMPLE
type CfnLoggingConfiguration_LogDestinationConfigProperty ¶
type CfnLoggingConfiguration_LogDestinationConfigProperty struct { // The named location for the logs, provided in a key:value mapping that is specific to the chosen destination type. // // - For an Amazon S3 bucket, provide the name of the bucket, with key `bucketName` , and optionally provide a prefix, with key `prefix` . The following example specifies an Amazon S3 bucket named `DOC-EXAMPLE-BUCKET` and the prefix `alerts` : // // `"LogDestination": { "bucketName": "DOC-EXAMPLE-BUCKET", "prefix": "alerts" }` // - For a CloudWatch log group, provide the name of the CloudWatch log group, with key `logGroup` . The following example specifies a log group named `alert-log-group` : // // `"LogDestination": { "logGroup": "alert-log-group" }` // - For a Kinesis Data Firehose delivery stream, provide the name of the delivery stream, with key `deliveryStream` . The following example specifies a delivery stream named `alert-delivery-stream` : // // `"LogDestination": { "deliveryStream": "alert-delivery-stream" }` LogDestination interface{} `json:"logDestination" yaml:"logDestination"` // The type of storage destination to send these logs to. // // You can send logs to an Amazon S3 bucket, a CloudWatch log group, or a Kinesis Data Firehose delivery stream. LogDestinationType *string `json:"logDestinationType" yaml:"logDestinationType"` // The type of log to send. // // Alert logs report traffic that matches a stateful rule with an action setting that sends an alert log message. Flow logs are standard network traffic flow logs. LogType *string `json:"logType" yaml:"logType"` }
Defines where AWS Network Firewall sends logs for the firewall for one log type.
This is used in `LoggingConfiguration` . You can send each type of log to an Amazon S3 bucket, a CloudWatch log group, or a Kinesis Data Firehose delivery stream.
Network Firewall generates logs for stateful rule groups. You can save alert and flow log types. The stateful rules engine records flow logs for all network traffic that it receives. It records alert logs for traffic that matches stateful rules that have the rule action set to `DROP` or `ALERT` .
TODO: EXAMPLE
type CfnLoggingConfiguration_LoggingConfigurationProperty ¶
type CfnLoggingConfiguration_LoggingConfigurationProperty struct { // Defines the logging destinations for the logs for a firewall. // // Network Firewall generates logs for stateful rule groups. LogDestinationConfigs interface{} `json:"logDestinationConfigs" yaml:"logDestinationConfigs"` }
Defines how AWS Network Firewall performs logging for a `Firewall` .
TODO: EXAMPLE
type CfnRuleGroup ¶
type CfnRuleGroup interface { awscdk.CfnResource awscdk.IInspectable AttrRuleGroupArn() *string AttrRuleGroupId() *string Capacity() *float64 SetCapacity(val *float64) CfnOptions() awscdk.ICfnResourceOptions CfnProperties() *map[string]interface{} CfnResourceType() *string CreationStack() *[]*string Description() *string SetDescription(val *string) LogicalId() *string Node() constructs.Node Ref() *string RuleGroup() interface{} SetRuleGroup(val interface{}) RuleGroupName() *string SetRuleGroupName(val *string) Stack() awscdk.Stack Tags() awscdk.TagManager Type() *string SetType(val *string) UpdatedProperites() *map[string]interface{} AddDeletionOverride(path *string) AddDependsOn(target awscdk.CfnResource) AddMetadata(key *string, value interface{}) AddOverride(path *string, value interface{}) AddPropertyDeletionOverride(propertyPath *string) AddPropertyOverride(propertyPath *string, value interface{}) ApplyRemovalPolicy(policy awscdk.RemovalPolicy, options *awscdk.RemovalPolicyOptions) GetAtt(attributeName *string) awscdk.Reference GetMetadata(key *string) interface{} Inspect(inspector awscdk.TreeInspector) OverrideLogicalId(newLogicalId *string) RenderProperties(props *map[string]interface{}) *map[string]interface{} ShouldSynthesize() *bool ToString() *string ValidateProperties(_properties interface{}) }
A CloudFormation `AWS::NetworkFirewall::RuleGroup`.
Use the `RuleGroup` to define a reusable collection of stateless or stateful network traffic filtering rules. You use rule groups in an `FirewallPolicy` to specify the filtering behavior of an `Firewall` .
TODO: EXAMPLE
func NewCfnRuleGroup ¶
func NewCfnRuleGroup(scope constructs.Construct, id *string, props *CfnRuleGroupProps) CfnRuleGroup
Create a new `AWS::NetworkFirewall::RuleGroup`.
type CfnRuleGroupProps ¶
type CfnRuleGroupProps struct { // The maximum operating resources that this rule group can use. // // You can't change a rule group's capacity setting after you create the rule group. When you update a rule group, you are limited to this capacity. When you reference a rule group from a firewall policy, Network Firewall reserves this capacity for the rule group. Capacity *float64 `json:"capacity" yaml:"capacity"` // The descriptive name of the rule group. // // You can't change the name of a rule group after you create it. RuleGroupName *string `json:"ruleGroupName" yaml:"ruleGroupName"` // Indicates whether the rule group is stateless or stateful. // // If the rule group is stateless, it contains stateless rules. If it is stateful, it contains stateful rules. Type *string `json:"type" yaml:"type"` // A description of the rule group. Description *string `json:"description" yaml:"description"` // An object that defines the rule group rules. RuleGroup interface{} `json:"ruleGroup" yaml:"ruleGroup"` // An array of key-value pairs to apply to this resource. // // For more information, see [Tag](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-resource-tags.html) . Tags *[]*awscdk.CfnTag `json:"tags" yaml:"tags"` }
Properties for defining a `CfnRuleGroup`.
TODO: EXAMPLE
type CfnRuleGroup_ActionDefinitionProperty ¶
type CfnRuleGroup_ActionDefinitionProperty struct { // Stateless inspection criteria that publishes the specified metrics to Amazon CloudWatch for the matching packet. // // This setting defines a CloudWatch dimension value to be published. // // You can pair this custom action with any of the standard stateless rule actions. For example, you could pair this in a rule action with the standard action that forwards the packet for stateful inspection. Then, when a packet matches the rule, Network Firewall publishes metrics for the packet and forwards it. PublishMetricAction interface{} `json:"publishMetricAction" yaml:"publishMetricAction"` }
A custom action to use in stateless rule actions settings.
TODO: EXAMPLE
type CfnRuleGroup_AddressProperty ¶
type CfnRuleGroup_AddressProperty struct { // Specify an IP address or a block of IP addresses in Classless Inter-Domain Routing (CIDR) notation. // // Network Firewall supports all address ranges for IPv4. // // Examples: // // - To configure Network Firewall to inspect for the IP address 192.0.2.44, specify `192.0.2.44/32` . // - To configure Network Firewall to inspect for IP addresses from 192.0.2.0 to 192.0.2.255, specify `192.0.2.0/24` . // // For more information about CIDR notation, see the Wikipedia entry [Classless Inter-Domain Routing](https://docs.aws.amazon.com/https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing) . AddressDefinition *string `json:"addressDefinition" yaml:"addressDefinition"` }
A single IP address specification.
This is used in the `RuleGroup.MatchAttributes` source and destination specifications.
TODO: EXAMPLE
type CfnRuleGroup_CustomActionProperty ¶
type CfnRuleGroup_CustomActionProperty struct { // The custom action associated with the action name. ActionDefinition interface{} `json:"actionDefinition" yaml:"actionDefinition"` // The descriptive name of the custom action. // // You can't change the name of a custom action after you create it. ActionName *string `json:"actionName" yaml:"actionName"` }
An optional, non-standard action to use for stateless packet handling.
You can define this in addition to the standard action that you must specify.
You define and name the custom actions that you want to be able to use, and then you reference them by name in your actions settings.
You can use custom actions in the following places:
- In an `RuleGroup.StatelessRulesAndCustomActions` . The custom actions are available for use by name inside the `StatelessRulesAndCustomActions` where you define them. You can use them for your stateless rule actions to specify what to do with a packet that matches the rule's match attributes. - In an `FirewallPolicy` specification, in `StatelessCustomActions` . The custom actions are available for use inside the policy where you define them. You can use them for the policy's default stateless actions settings to specify what to do with packets that don't match any of the policy's stateless rules.
TODO: EXAMPLE
type CfnRuleGroup_DimensionProperty ¶
type CfnRuleGroup_DimensionProperty struct { // The value to use in the custom metric dimension. Value *string `json:"value" yaml:"value"` }
The value to use in an Amazon CloudWatch custom metric dimension.
This is used in the `PublishMetrics` custom action. A CloudWatch custom metric dimension is a name/value pair that's part of the identity of a metric.
AWS Network Firewall sets the dimension name to `CustomAction` and you provide the dimension value.
For more information about CloudWatch custom metric dimensions, see [Publishing Custom Metrics](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/publishingMetrics.html#usingDimensions) in the [Amazon CloudWatch User Guide](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/WhatIsCloudWatch.html) .
TODO: EXAMPLE
type CfnRuleGroup_HeaderProperty ¶
type CfnRuleGroup_HeaderProperty struct { // The destination IP address or address range to inspect for, in CIDR notation. // // To match with any address, specify `ANY` . // // Specify an IP address or a block of IP addresses in Classless Inter-Domain Routing (CIDR) notation. Network Firewall supports all address ranges for IPv4. // // Examples: // // - To configure Network Firewall to inspect for the IP address 192.0.2.44, specify `192.0.2.44/32` . // - To configure Network Firewall to inspect for IP addresses from 192.0.2.0 to 192.0.2.255, specify `192.0.2.0/24` . // // For more information about CIDR notation, see the Wikipedia entry [Classless Inter-Domain Routing](https://docs.aws.amazon.com/https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing) . Destination *string `json:"destination" yaml:"destination"` // The destination port to inspect for. // // You can specify an individual port, for example `1994` and you can specify a port range, for example `1990:1994` . To match with any port, specify `ANY` . DestinationPort *string `json:"destinationPort" yaml:"destinationPort"` // The direction of traffic flow to inspect. // // If set to `ANY` , the inspection matches bidirectional traffic, both from the source to the destination and from the destination to the source. If set to `FORWARD` , the inspection only matches traffic going from the source to the destination. Direction *string `json:"direction" yaml:"direction"` // The protocol to inspect for. // // To specify all, you can use `IP` , because all traffic on AWS and on the internet is IP. Protocol *string `json:"protocol" yaml:"protocol"` // The source IP address or address range to inspect for, in CIDR notation. // // To match with any address, specify `ANY` . // // Specify an IP address or a block of IP addresses in Classless Inter-Domain Routing (CIDR) notation. Network Firewall supports all address ranges for IPv4. // // Examples: // // - To configure Network Firewall to inspect for the IP address 192.0.2.44, specify `192.0.2.44/32` . // - To configure Network Firewall to inspect for IP addresses from 192.0.2.0 to 192.0.2.255, specify `192.0.2.0/24` . // // For more information about CIDR notation, see the Wikipedia entry [Classless Inter-Domain Routing](https://docs.aws.amazon.com/https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing) . Source *string `json:"source" yaml:"source"` // The source port to inspect for. // // You can specify an individual port, for example `1994` and you can specify a port range, for example `1990:1994` . To match with any port, specify `ANY` . SourcePort *string `json:"sourcePort" yaml:"sourcePort"` }
The 5-tuple criteria for AWS Network Firewall to use to inspect packet headers in stateful traffic flow inspection.
Traffic flows that match the criteria are a match for the corresponding stateful rule.
TODO: EXAMPLE
type CfnRuleGroup_IPSetProperty ¶
type CfnRuleGroup_IPSetProperty struct { // The list of IP addresses and address ranges, in CIDR notation. Definition *[]*string `json:"definition" yaml:"definition"` }
A list of IP addresses and address ranges, in CIDR notation.
This is part of a `RuleGroup.RuleVariables` .
TODO: EXAMPLE
type CfnRuleGroup_MatchAttributesProperty ¶
type CfnRuleGroup_MatchAttributesProperty struct { // The destination ports to inspect for. // // If not specified, this matches with any destination port. This setting is only used for protocols 6 (TCP) and 17 (UDP). // // You can specify individual ports, for example `1994` and you can specify port ranges, for example `1990:1994` . DestinationPorts interface{} `json:"destinationPorts" yaml:"destinationPorts"` // The destination IP addresses and address ranges to inspect for, in CIDR notation. // // If not specified, this matches with any destination address. Destinations interface{} `json:"destinations" yaml:"destinations"` // The protocols to inspect for, specified using each protocol's assigned internet protocol number (IANA). // // If not specified, this matches with any protocol. Protocols interface{} `json:"protocols" yaml:"protocols"` // The source ports to inspect for. // // If not specified, this matches with any source port. This setting is only used for protocols 6 (TCP) and 17 (UDP). // // You can specify individual ports, for example `1994` and you can specify port ranges, for example `1990:1994` . SourcePorts interface{} `json:"sourcePorts" yaml:"sourcePorts"` // The source IP addresses and address ranges to inspect for, in CIDR notation. // // If not specified, this matches with any source address. Sources interface{} `json:"sources" yaml:"sources"` // The TCP flags and masks to inspect for. // // If not specified, this matches with any settings. This setting is only used for protocol 6 (TCP). TcpFlags interface{} `json:"tcpFlags" yaml:"tcpFlags"` }
Criteria for Network Firewall to use to inspect an individual packet in stateless rule inspection.
Each match attributes set can include one or more items such as IP address, CIDR range, port number, protocol, and TCP flags.
TODO: EXAMPLE
type CfnRuleGroup_PortRangeProperty ¶
type CfnRuleGroup_PortRangeProperty struct { // The lower limit of the port range. // // This must be less than or equal to the `ToPort` specification. FromPort *float64 `json:"fromPort" yaml:"fromPort"` // The upper limit of the port range. // // This must be greater than or equal to the `FromPort` specification. ToPort *float64 `json:"toPort" yaml:"toPort"` }
A single port range specification.
This is used for source and destination port ranges in the stateless `RuleGroup.MatchAttributes` .
TODO: EXAMPLE
type CfnRuleGroup_PortSetProperty ¶
type CfnRuleGroup_PortSetProperty struct { // The set of port ranges. Definition *[]*string `json:"definition" yaml:"definition"` }
A set of port ranges for use in the rules in a rule group.
TODO: EXAMPLE
type CfnRuleGroup_PublishMetricActionProperty ¶
type CfnRuleGroup_PublishMetricActionProperty struct {
// `CfnRuleGroup.PublishMetricActionProperty.Dimensions`.
Dimensions interface{} `json:"dimensions" yaml:"dimensions"`
}
Stateless inspection criteria that publishes the specified metrics to Amazon CloudWatch for the matching packet.
This setting defines a CloudWatch dimension value to be published.
TODO: EXAMPLE
type CfnRuleGroup_RuleDefinitionProperty ¶
type CfnRuleGroup_RuleDefinitionProperty struct { // The actions to take on a packet that matches one of the stateless rule definition's match attributes. // // You must specify a standard action and you can add custom actions. // // > Network Firewall only forwards a packet for stateful rule inspection if you specify `aws:forward_to_sfe` for a rule that the packet matches, or if the packet doesn't match any stateless rule and you specify `aws:forward_to_sfe` for the `StatelessDefaultActions` setting for the `FirewallPolicy` . // // For every rule, you must specify exactly one of the following standard actions. // // - *aws:pass* - Discontinues all inspection of the packet and permits it to go to its intended destination. // - *aws:drop* - Discontinues all inspection of the packet and blocks it from going to its intended destination. // - *aws:forward_to_sfe* - Discontinues stateless inspection of the packet and forwards it to the stateful rule engine for inspection. // // Additionally, you can specify a custom action. To do this, you define a custom action by name and type, then provide the name you've assigned to the action in this `Actions` setting. // // To provide more than one action in this setting, separate the settings with a comma. For example, if you have a publish metrics custom action that you've named `MyMetricsAction` , then you could specify the standard action `aws:pass` combined with the custom action using `[“aws:pass”, “MyMetricsAction”]` . Actions *[]*string `json:"actions" yaml:"actions"` // Criteria for Network Firewall to use to inspect an individual packet in stateless rule inspection. // // Each match attributes set can include one or more items such as IP address, CIDR range, port number, protocol, and TCP flags. MatchAttributes interface{} `json:"matchAttributes" yaml:"matchAttributes"` }
The inspection criteria and action for a single stateless rule.
AWS Network Firewall inspects each packet for the specified matching criteria. When a packet matches the criteria, Network Firewall performs the rule's actions on the packet.
TODO: EXAMPLE
type CfnRuleGroup_RuleGroupProperty ¶
type CfnRuleGroup_RuleGroupProperty struct { // The stateful rules or stateless rules for the rule group. RulesSource interface{} `json:"rulesSource" yaml:"rulesSource"` // Settings that are available for use in the rules in the rule group. // // You can only use these for stateful rule groups. RuleVariables interface{} `json:"ruleVariables" yaml:"ruleVariables"` // Additional options governing how Network Firewall handles stateful rules. // // The policies where you use your stateful rule group must have stateful rule options settings that are compatible with these settings. StatefulRuleOptions interface{} `json:"statefulRuleOptions" yaml:"statefulRuleOptions"` }
The object that defines the rules in a rule group.
AWS Network Firewall uses a rule group to inspect and control network traffic. You define stateless rule groups to inspect individual packets and you define stateful rule groups to inspect packets in the context of their traffic flow.
To use a rule group, you include it by reference in an Network Firewall firewall policy, then you use the policy in a firewall. You can reference a rule group from more than one firewall policy, and you can use a firewall policy in more than one firewall.
TODO: EXAMPLE
type CfnRuleGroup_RuleOptionProperty ¶
type CfnRuleGroup_RuleOptionProperty struct { // `CfnRuleGroup.RuleOptionProperty.Keyword`. Keyword *string `json:"keyword" yaml:"keyword"` // `CfnRuleGroup.RuleOptionProperty.Settings`. Settings *[]*string `json:"settings" yaml:"settings"` }
Additional settings for a stateful rule.
TODO: EXAMPLE
type CfnRuleGroup_RuleVariablesProperty ¶
type CfnRuleGroup_RuleVariablesProperty struct { // A list of IP addresses and address ranges, in CIDR notation. IpSets interface{} `json:"ipSets" yaml:"ipSets"` // A list of port ranges. PortSets interface{} `json:"portSets" yaml:"portSets"` }
Settings that are available for use in the rules in the `RuleGroup` where this is defined.
TODO: EXAMPLE
type CfnRuleGroup_RulesSourceListProperty ¶
type CfnRuleGroup_RulesSourceListProperty struct { // Whether you want to allow or deny access to the domains in your target list. GeneratedRulesType *string `json:"generatedRulesType" yaml:"generatedRulesType"` // The domains that you want to inspect for in your traffic flows. Valid domain specifications are the following:. // // - Explicit names. For example, `abc.example.com` matches only the domain `abc.example.com` . // - Names that use a domain wildcard, which you indicate with an initial ' `.` '. For example, `.example.com` matches `example.com` and matches all subdomains of `example.com` , such as `abc.example.com` and `www.example.com` . Targets *[]*string `json:"targets" yaml:"targets"` // The types of targets to inspect for. // // Valid values are `TLS_SNI` and `HTTP_HOST` . TargetTypes *[]*string `json:"targetTypes" yaml:"targetTypes"` }
Stateful inspection criteria for a domain list rule group.
For HTTPS traffic, domain filtering is SNI-based. It uses the server name indicator extension of the TLS handshake.
By default, Network Firewall domain list inspection only includes traffic coming from the VPC where you deploy the firewall. To inspect traffic from IP addresses outside of the deployment VPC, you set the `HOME_NET` rule variable to include the CIDR range of the deployment VPC plus the other CIDR ranges. For more information, see `RuleGroup.RuleVariables` in this guide and [Stateful domain list rule groups in AWS Network Firewall](https://docs.aws.amazon.com/network-firewall/latest/developerguide/stateful-rule-groups-domain-names.html) in the *Network Firewall Developer Guide*
TODO: EXAMPLE
type CfnRuleGroup_RulesSourceProperty ¶
type CfnRuleGroup_RulesSourceProperty struct { // Stateful inspection criteria for a domain list rule group. RulesSourceList interface{} `json:"rulesSourceList" yaml:"rulesSourceList"` // Stateful inspection criteria, provided in Suricata compatible intrusion prevention system (IPS) rules. // // Suricata is an open-source network IPS that includes a standard rule-based language for network traffic inspection. // // These rules contain the inspection criteria and the action to take for traffic that matches the criteria, so this type of rule group doesn't have a separate action setting. RulesString *string `json:"rulesString" yaml:"rulesString"` // An array of individual stateful rules inspection criteria to be used together in a stateful rule group. // // Use this option to specify simple Suricata rules with protocol, source and destination, ports, direction, and rule options. For information about the Suricata `Rules` format, see [Rules Format](https://docs.aws.amazon.com/https://suricata.readthedocs.io/en/suricata-5.0.0/rules/intro.html#) . StatefulRules interface{} `json:"statefulRules" yaml:"statefulRules"` // Stateless inspection criteria to be used in a stateless rule group. StatelessRulesAndCustomActions interface{} `json:"statelessRulesAndCustomActions" yaml:"statelessRulesAndCustomActions"` }
The stateless or stateful rules definitions for use in a single rule group.
Each rule group requires a single `RulesSource` . You can use an instance of this for either stateless rules or stateful rules.
TODO: EXAMPLE
type CfnRuleGroup_StatefulRuleOptionsProperty ¶
type CfnRuleGroup_StatefulRuleOptionsProperty struct { // Indicates how to manage the order of the rule evaluation for the rule group. // // `DEFAULT_ACTION_ORDER` is the default behavior. Stateful rules are provided to the rule engine as Suricata compatible strings, and Suricata evaluates them based on certain settings. For more information, see [Evaluation order for stateful rules](https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-rule-evaluation-order.html) in the *AWS Network Firewall Developer Guide* . RuleOrder *string `json:"ruleOrder" yaml:"ruleOrder"` }
Additional options governing how Network Firewall handles the rule group.
You can only use these for stateful rule groups.
TODO: EXAMPLE
type CfnRuleGroup_StatefulRuleProperty ¶
type CfnRuleGroup_StatefulRuleProperty struct { // Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. // // For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow. // // The actions for a stateful rule are defined as follows: // // - *PASS* - Permits the packets to go to the intended destination. // - *DROP* - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the firewall's `LoggingConfiguration` . // - *ALERT* - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the firewall's `LoggingConfiguration` . // // You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with `ALERT` action, verify in the logs that the rule is filtering as you want, then change the action to `DROP` . Action *string `json:"action" yaml:"action"` // The stateful inspection criteria for this rule, used to inspect traffic flows. Header interface{} `json:"header" yaml:"header"` // Additional settings for a stateful rule, provided as keywords and settings. RuleOptions interface{} `json:"ruleOptions" yaml:"ruleOptions"` }
A single Suricata rules specification, for use in a stateful rule group.
Use this option to specify a simple Suricata rule with protocol, source and destination, ports, direction, and rule options. For information about the Suricata `Rules` format, see [Rules Format](https://docs.aws.amazon.com/https://suricata.readthedocs.io/en/suricata-5.0.0/rules/intro.html#) .
TODO: EXAMPLE
type CfnRuleGroup_StatelessRuleProperty ¶
type CfnRuleGroup_StatelessRuleProperty struct { // Indicates the order in which to run this rule relative to all of the rules that are defined for a stateless rule group. // // Network Firewall evaluates the rules in a rule group starting with the lowest priority setting. You must ensure that the priority settings are unique for the rule group. // // Each stateless rule group uses exactly one `StatelessRulesAndCustomActions` object, and each `StatelessRulesAndCustomActions` contains exactly one `StatelessRules` object. To ensure unique priority settings for your rule groups, set unique priorities for the stateless rules that you define inside any single `StatelessRules` object. // // You can change the priority settings of your rules at any time. To make it easier to insert rules later, number them so there's a wide range in between, for example use 100, 200, and so on. Priority *float64 `json:"priority" yaml:"priority"` // Defines the stateless 5-tuple packet inspection criteria and the action to take on a packet that matches the criteria. RuleDefinition interface{} `json:"ruleDefinition" yaml:"ruleDefinition"` }
A single stateless rule.
This is used in `RuleGroup.StatelessRulesAndCustomActions` .
TODO: EXAMPLE
type CfnRuleGroup_StatelessRulesAndCustomActionsProperty ¶
type CfnRuleGroup_StatelessRulesAndCustomActionsProperty struct { // Defines the set of stateless rules for use in a stateless rule group. StatelessRules interface{} `json:"statelessRules" yaml:"statelessRules"` // Defines an array of individual custom action definitions that are available for use by the stateless rules in this `StatelessRulesAndCustomActions` specification. // // You name each custom action that you define, and then you can use it by name in your stateless rule `RuleGroup.RuleDefinition` `Actions` specification. CustomActions interface{} `json:"customActions" yaml:"customActions"` }
Stateless inspection criteria.
Each stateless rule group uses exactly one of these data types to define its stateless rules.
TODO: EXAMPLE
type CfnRuleGroup_TCPFlagFieldProperty ¶
type CfnRuleGroup_TCPFlagFieldProperty struct { // Used in conjunction with the `Masks` setting to define the flags that must be set and flags that must not be set in order for the packet to match. // // This setting can only specify values that are also specified in the `Masks` setting. // // For the flags that are specified in the masks setting, the following must be true for the packet to match: // // - The ones that are set in this flags setting must be set in the packet. // - The ones that are not set in this flags setting must also not be set in the packet. Flags *[]*string `json:"flags" yaml:"flags"` // The set of flags to consider in the inspection. // // To inspect all flags in the valid values list, leave this with no setting. Masks *[]*string `json:"masks" yaml:"masks"` }
TCP flags and masks to inspect packets for. This is used in the `RuleGroup.MatchAttributes` specification.
For example:
`"TCPFlags": [ { "Flags": [ "ECE", "SYN" ], "Masks": [ "SYN", "ECE" ] } ]`
TODO: EXAMPLE