@Generated(value="com.amazonaws:aws-java-sdk-code-generator") public class StatefulEngineOptions extends Object implements Serializable, Cloneable, StructuredPojo
Configuration settings for the handling of the stateful rule groups in a Network Firewall firewall policy.
Constructor and Description |
---|
StatefulEngineOptions() |
Modifier and Type | Method and Description |
---|---|
StatefulEngineOptions |
clone() |
boolean |
equals(Object obj) |
String |
getRuleOrder()
Indicates how to manage the order of stateful rule evaluation for the policy.
|
String |
getStreamExceptionPolicy()
Indicates how Network Firewall should handle traffic when a network connection breaks midstream.
|
int |
hashCode() |
void |
marshall(ProtocolMarshaller protocolMarshaller)
Marshalls this structured data using the given
ProtocolMarshaller . |
void |
setRuleOrder(String ruleOrder)
Indicates how to manage the order of stateful rule evaluation for the policy.
|
void |
setStreamExceptionPolicy(String streamExceptionPolicy)
Indicates how Network Firewall should handle traffic when a network connection breaks midstream.
|
String |
toString()
Returns a string representation of this object.
|
StatefulEngineOptions |
withRuleOrder(RuleOrder ruleOrder)
Indicates how to manage the order of stateful rule evaluation for the policy.
|
StatefulEngineOptions |
withRuleOrder(String ruleOrder)
Indicates how to manage the order of stateful rule evaluation for the policy.
|
StatefulEngineOptions |
withStreamExceptionPolicy(StreamExceptionPolicy streamExceptionPolicy)
Indicates how Network Firewall should handle traffic when a network connection breaks midstream.
|
StatefulEngineOptions |
withStreamExceptionPolicy(String streamExceptionPolicy)
Indicates how Network Firewall should handle traffic when a network connection breaks midstream.
|
public void setRuleOrder(String ruleOrder)
Indicates how to manage the order of stateful rule evaluation for the policy. Stateful rules are provided to the rule engine as Suricata compatible strings, and Suricata evaluates them based on certain settings. For more information, see Evaluation order for stateful rules in the Network Firewall Developer Guide.
Default: DEFAULT_ACTION_ORDER
ruleOrder
- Indicates how to manage the order of stateful rule evaluation for the policy. Stateful rules are provided
to the rule engine as Suricata compatible strings, and Suricata evaluates them based on certain settings.
For more information, see Evaluation order for stateful rules in the Network Firewall Developer Guide.
Default: DEFAULT_ACTION_ORDER
RuleOrder
public String getRuleOrder()
Indicates how to manage the order of stateful rule evaluation for the policy. Stateful rules are provided to the rule engine as Suricata compatible strings, and Suricata evaluates them based on certain settings. For more information, see Evaluation order for stateful rules in the Network Firewall Developer Guide.
Default: DEFAULT_ACTION_ORDER
Default: DEFAULT_ACTION_ORDER
RuleOrder
public StatefulEngineOptions withRuleOrder(String ruleOrder)
Indicates how to manage the order of stateful rule evaluation for the policy. Stateful rules are provided to the rule engine as Suricata compatible strings, and Suricata evaluates them based on certain settings. For more information, see Evaluation order for stateful rules in the Network Firewall Developer Guide.
Default: DEFAULT_ACTION_ORDER
ruleOrder
- Indicates how to manage the order of stateful rule evaluation for the policy. Stateful rules are provided
to the rule engine as Suricata compatible strings, and Suricata evaluates them based on certain settings.
For more information, see Evaluation order for stateful rules in the Network Firewall Developer Guide.
Default: DEFAULT_ACTION_ORDER
RuleOrder
public StatefulEngineOptions withRuleOrder(RuleOrder ruleOrder)
Indicates how to manage the order of stateful rule evaluation for the policy. Stateful rules are provided to the rule engine as Suricata compatible strings, and Suricata evaluates them based on certain settings. For more information, see Evaluation order for stateful rules in the Network Firewall Developer Guide.
Default: DEFAULT_ACTION_ORDER
ruleOrder
- Indicates how to manage the order of stateful rule evaluation for the policy. Stateful rules are provided
to the rule engine as Suricata compatible strings, and Suricata evaluates them based on certain settings.
For more information, see Evaluation order for stateful rules in the Network Firewall Developer Guide.
Default: DEFAULT_ACTION_ORDER
RuleOrder
public void setStreamExceptionPolicy(String streamExceptionPolicy)
Indicates how Network Firewall should handle traffic when a network connection breaks midstream.
DROP
- Fail closed and drop all subsequent traffic going to the firewall.
CONTINUE
- Continue to apply rules to subsequent traffic without context from traffic before the
break. This impacts the behavior of rules that depend on context. For example, with a stateful rule that drops
HTTP traffic, Network Firewall won't match subsequent traffic because the it won't have the context from session
initialization, which defines the application layer protocol as HTTP. However, a TCP-layer rule using a
flow:stateless
rule would still match, and so would the aws:drop_strict
default action.
REJECT
- Fail closed and drop all subsequent traffic going to the firewall. With this option,
Network Firewall also sends a TCP reject packet back to the client so the client can immediately establish a new
session. With the new session, Network Firewall will have context and will apply rules appropriately.
For applications that are reliant on long-lived TCP connections that trigger Gateway Load Balancer idle timeouts, this is the recommended setting.
FMS_IGNORE
- Firewall Manager doesn't monitor or modify the Network Firewall stream exception policy
settings.
For more information, see Stream exception policy in your firewall policy in the Network Firewall Developer Guide.
Default: FMS_IGNORE
streamExceptionPolicy
- Indicates how Network Firewall should handle traffic when a network connection breaks midstream.
DROP
- Fail closed and drop all subsequent traffic going to the firewall.
CONTINUE
- Continue to apply rules to subsequent traffic without context from traffic before
the break. This impacts the behavior of rules that depend on context. For example, with a stateful rule
that drops HTTP traffic, Network Firewall won't match subsequent traffic because the it won't have the
context from session initialization, which defines the application layer protocol as HTTP. However, a
TCP-layer rule using a flow:stateless
rule would still match, and so would the
aws:drop_strict
default action.
REJECT
- Fail closed and drop all subsequent traffic going to the firewall. With this option,
Network Firewall also sends a TCP reject packet back to the client so the client can immediately establish
a new session. With the new session, Network Firewall will have context and will apply rules
appropriately.
For applications that are reliant on long-lived TCP connections that trigger Gateway Load Balancer idle timeouts, this is the recommended setting.
FMS_IGNORE
- Firewall Manager doesn't monitor or modify the Network Firewall stream exception
policy settings.
For more information, see Stream exception policy in your firewall policy in the Network Firewall Developer Guide.
Default: FMS_IGNORE
StreamExceptionPolicy
public String getStreamExceptionPolicy()
Indicates how Network Firewall should handle traffic when a network connection breaks midstream.
DROP
- Fail closed and drop all subsequent traffic going to the firewall.
CONTINUE
- Continue to apply rules to subsequent traffic without context from traffic before the
break. This impacts the behavior of rules that depend on context. For example, with a stateful rule that drops
HTTP traffic, Network Firewall won't match subsequent traffic because the it won't have the context from session
initialization, which defines the application layer protocol as HTTP. However, a TCP-layer rule using a
flow:stateless
rule would still match, and so would the aws:drop_strict
default action.
REJECT
- Fail closed and drop all subsequent traffic going to the firewall. With this option,
Network Firewall also sends a TCP reject packet back to the client so the client can immediately establish a new
session. With the new session, Network Firewall will have context and will apply rules appropriately.
For applications that are reliant on long-lived TCP connections that trigger Gateway Load Balancer idle timeouts, this is the recommended setting.
FMS_IGNORE
- Firewall Manager doesn't monitor or modify the Network Firewall stream exception policy
settings.
For more information, see Stream exception policy in your firewall policy in the Network Firewall Developer Guide.
Default: FMS_IGNORE
DROP
- Fail closed and drop all subsequent traffic going to the firewall.
CONTINUE
- Continue to apply rules to subsequent traffic without context from traffic before
the break. This impacts the behavior of rules that depend on context. For example, with a stateful rule
that drops HTTP traffic, Network Firewall won't match subsequent traffic because the it won't have the
context from session initialization, which defines the application layer protocol as HTTP. However, a
TCP-layer rule using a flow:stateless
rule would still match, and so would the
aws:drop_strict
default action.
REJECT
- Fail closed and drop all subsequent traffic going to the firewall. With this
option, Network Firewall also sends a TCP reject packet back to the client so the client can immediately
establish a new session. With the new session, Network Firewall will have context and will apply rules
appropriately.
For applications that are reliant on long-lived TCP connections that trigger Gateway Load Balancer idle timeouts, this is the recommended setting.
FMS_IGNORE
- Firewall Manager doesn't monitor or modify the Network Firewall stream
exception policy settings.
For more information, see Stream exception policy in your firewall policy in the Network Firewall Developer Guide.
Default: FMS_IGNORE
StreamExceptionPolicy
public StatefulEngineOptions withStreamExceptionPolicy(String streamExceptionPolicy)
Indicates how Network Firewall should handle traffic when a network connection breaks midstream.
DROP
- Fail closed and drop all subsequent traffic going to the firewall.
CONTINUE
- Continue to apply rules to subsequent traffic without context from traffic before the
break. This impacts the behavior of rules that depend on context. For example, with a stateful rule that drops
HTTP traffic, Network Firewall won't match subsequent traffic because the it won't have the context from session
initialization, which defines the application layer protocol as HTTP. However, a TCP-layer rule using a
flow:stateless
rule would still match, and so would the aws:drop_strict
default action.
REJECT
- Fail closed and drop all subsequent traffic going to the firewall. With this option,
Network Firewall also sends a TCP reject packet back to the client so the client can immediately establish a new
session. With the new session, Network Firewall will have context and will apply rules appropriately.
For applications that are reliant on long-lived TCP connections that trigger Gateway Load Balancer idle timeouts, this is the recommended setting.
FMS_IGNORE
- Firewall Manager doesn't monitor or modify the Network Firewall stream exception policy
settings.
For more information, see Stream exception policy in your firewall policy in the Network Firewall Developer Guide.
Default: FMS_IGNORE
streamExceptionPolicy
- Indicates how Network Firewall should handle traffic when a network connection breaks midstream.
DROP
- Fail closed and drop all subsequent traffic going to the firewall.
CONTINUE
- Continue to apply rules to subsequent traffic without context from traffic before
the break. This impacts the behavior of rules that depend on context. For example, with a stateful rule
that drops HTTP traffic, Network Firewall won't match subsequent traffic because the it won't have the
context from session initialization, which defines the application layer protocol as HTTP. However, a
TCP-layer rule using a flow:stateless
rule would still match, and so would the
aws:drop_strict
default action.
REJECT
- Fail closed and drop all subsequent traffic going to the firewall. With this option,
Network Firewall also sends a TCP reject packet back to the client so the client can immediately establish
a new session. With the new session, Network Firewall will have context and will apply rules
appropriately.
For applications that are reliant on long-lived TCP connections that trigger Gateway Load Balancer idle timeouts, this is the recommended setting.
FMS_IGNORE
- Firewall Manager doesn't monitor or modify the Network Firewall stream exception
policy settings.
For more information, see Stream exception policy in your firewall policy in the Network Firewall Developer Guide.
Default: FMS_IGNORE
StreamExceptionPolicy
public StatefulEngineOptions withStreamExceptionPolicy(StreamExceptionPolicy streamExceptionPolicy)
Indicates how Network Firewall should handle traffic when a network connection breaks midstream.
DROP
- Fail closed and drop all subsequent traffic going to the firewall.
CONTINUE
- Continue to apply rules to subsequent traffic without context from traffic before the
break. This impacts the behavior of rules that depend on context. For example, with a stateful rule that drops
HTTP traffic, Network Firewall won't match subsequent traffic because the it won't have the context from session
initialization, which defines the application layer protocol as HTTP. However, a TCP-layer rule using a
flow:stateless
rule would still match, and so would the aws:drop_strict
default action.
REJECT
- Fail closed and drop all subsequent traffic going to the firewall. With this option,
Network Firewall also sends a TCP reject packet back to the client so the client can immediately establish a new
session. With the new session, Network Firewall will have context and will apply rules appropriately.
For applications that are reliant on long-lived TCP connections that trigger Gateway Load Balancer idle timeouts, this is the recommended setting.
FMS_IGNORE
- Firewall Manager doesn't monitor or modify the Network Firewall stream exception policy
settings.
For more information, see Stream exception policy in your firewall policy in the Network Firewall Developer Guide.
Default: FMS_IGNORE
streamExceptionPolicy
- Indicates how Network Firewall should handle traffic when a network connection breaks midstream.
DROP
- Fail closed and drop all subsequent traffic going to the firewall.
CONTINUE
- Continue to apply rules to subsequent traffic without context from traffic before
the break. This impacts the behavior of rules that depend on context. For example, with a stateful rule
that drops HTTP traffic, Network Firewall won't match subsequent traffic because the it won't have the
context from session initialization, which defines the application layer protocol as HTTP. However, a
TCP-layer rule using a flow:stateless
rule would still match, and so would the
aws:drop_strict
default action.
REJECT
- Fail closed and drop all subsequent traffic going to the firewall. With this option,
Network Firewall also sends a TCP reject packet back to the client so the client can immediately establish
a new session. With the new session, Network Firewall will have context and will apply rules
appropriately.
For applications that are reliant on long-lived TCP connections that trigger Gateway Load Balancer idle timeouts, this is the recommended setting.
FMS_IGNORE
- Firewall Manager doesn't monitor or modify the Network Firewall stream exception
policy settings.
For more information, see Stream exception policy in your firewall policy in the Network Firewall Developer Guide.
Default: FMS_IGNORE
StreamExceptionPolicy
public String toString()
toString
in class Object
Object.toString()
public StatefulEngineOptions clone()
public void marshall(ProtocolMarshaller protocolMarshaller)
StructuredPojo
ProtocolMarshaller
.marshall
in interface StructuredPojo
protocolMarshaller
- Implementation of ProtocolMarshaller
used to marshall this object's data.