@Generated(value="com.amazonaws:aws-java-sdk-code-generator") public class StatefulRule extends Object implements Serializable, Cloneable, StructuredPojo
A single Suricata rules specification, for use in a stateful rule group. Use this option to specify a simple Suricata
rule with protocol, source and destination, ports, direction, and rule options. For information about the Suricata
Rules
format, see Rules
Format.
Constructor and Description |
---|
StatefulRule() |
Modifier and Type | Method and Description |
---|---|
StatefulRule |
clone() |
boolean |
equals(Object obj) |
String |
getAction()
Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful
rule criteria.
|
Header |
getHeader()
The stateful inspection criteria for this rule, used to inspect traffic flows.
|
List<RuleOption> |
getRuleOptions()
Additional options for the rule.
|
int |
hashCode() |
void |
marshall(ProtocolMarshaller protocolMarshaller)
Marshalls this structured data using the given
ProtocolMarshaller . |
void |
setAction(String action)
Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful
rule criteria.
|
void |
setHeader(Header header)
The stateful inspection criteria for this rule, used to inspect traffic flows.
|
void |
setRuleOptions(Collection<RuleOption> ruleOptions)
Additional options for the rule.
|
String |
toString()
Returns a string representation of this object.
|
StatefulRule |
withAction(StatefulAction action)
Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful
rule criteria.
|
StatefulRule |
withAction(String action)
Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful
rule criteria.
|
StatefulRule |
withHeader(Header header)
The stateful inspection criteria for this rule, used to inspect traffic flows.
|
StatefulRule |
withRuleOptions(Collection<RuleOption> ruleOptions)
Additional options for the rule.
|
StatefulRule |
withRuleOptions(RuleOption... ruleOptions)
Additional options for the rule.
|
public void setAction(String action)
Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow.
The actions for a stateful rule are defined as follows:
PASS - Permits the packets to go to the intended destination.
DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration.
ALERT - Sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration.
You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with
ALERT
action, verify in the logs that the rule is filtering as you want, then change the action to
DROP
.
REJECT - Drops traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and an RST bit contained in the TCP header flags. REJECT is available only for TCP traffic. This option doesn't support FTP or IMAP protocols.
action
- Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the
stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues
stateful inspection of the traffic flow.
The actions for a stateful rule are defined as follows:
PASS - Permits the packets to go to the intended destination.
DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration.
ALERT - Sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration.
You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule
with ALERT
action, verify in the logs that the rule is filtering as you want, then change the
action to DROP
.
REJECT - Drops traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and an RST bit contained in the TCP header flags. REJECT is available only for TCP traffic. This option doesn't support FTP or IMAP protocols.
StatefulAction
public String getAction()
Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow.
The actions for a stateful rule are defined as follows:
PASS - Permits the packets to go to the intended destination.
DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration.
ALERT - Sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration.
You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with
ALERT
action, verify in the logs that the rule is filtering as you want, then change the action to
DROP
.
REJECT - Drops traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and an RST bit contained in the TCP header flags. REJECT is available only for TCP traffic. This option doesn't support FTP or IMAP protocols.
The actions for a stateful rule are defined as follows:
PASS - Permits the packets to go to the intended destination.
DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration.
ALERT - Sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration.
You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule
with ALERT
action, verify in the logs that the rule is filtering as you want, then change
the action to DROP
.
REJECT - Drops traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and an RST bit contained in the TCP header flags. REJECT is available only for TCP traffic. This option doesn't support FTP or IMAP protocols.
StatefulAction
public StatefulRule withAction(String action)
Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow.
The actions for a stateful rule are defined as follows:
PASS - Permits the packets to go to the intended destination.
DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration.
ALERT - Sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration.
You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with
ALERT
action, verify in the logs that the rule is filtering as you want, then change the action to
DROP
.
REJECT - Drops traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and an RST bit contained in the TCP header flags. REJECT is available only for TCP traffic. This option doesn't support FTP or IMAP protocols.
action
- Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the
stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues
stateful inspection of the traffic flow.
The actions for a stateful rule are defined as follows:
PASS - Permits the packets to go to the intended destination.
DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration.
ALERT - Sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration.
You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule
with ALERT
action, verify in the logs that the rule is filtering as you want, then change the
action to DROP
.
REJECT - Drops traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and an RST bit contained in the TCP header flags. REJECT is available only for TCP traffic. This option doesn't support FTP or IMAP protocols.
StatefulAction
public StatefulRule withAction(StatefulAction action)
Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow.
The actions for a stateful rule are defined as follows:
PASS - Permits the packets to go to the intended destination.
DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration.
ALERT - Sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration.
You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with
ALERT
action, verify in the logs that the rule is filtering as you want, then change the action to
DROP
.
REJECT - Drops traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and an RST bit contained in the TCP header flags. REJECT is available only for TCP traffic. This option doesn't support FTP or IMAP protocols.
action
- Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the
stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues
stateful inspection of the traffic flow.
The actions for a stateful rule are defined as follows:
PASS - Permits the packets to go to the intended destination.
DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration.
ALERT - Sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration.
You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule
with ALERT
action, verify in the logs that the rule is filtering as you want, then change the
action to DROP
.
REJECT - Drops traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and an RST bit contained in the TCP header flags. REJECT is available only for TCP traffic. This option doesn't support FTP or IMAP protocols.
StatefulAction
public void setHeader(Header header)
The stateful inspection criteria for this rule, used to inspect traffic flows.
header
- The stateful inspection criteria for this rule, used to inspect traffic flows.public Header getHeader()
The stateful inspection criteria for this rule, used to inspect traffic flows.
public StatefulRule withHeader(Header header)
The stateful inspection criteria for this rule, used to inspect traffic flows.
header
- The stateful inspection criteria for this rule, used to inspect traffic flows.public List<RuleOption> getRuleOptions()
Additional options for the rule. These are the Suricata RuleOptions
settings.
RuleOptions
settings.public void setRuleOptions(Collection<RuleOption> ruleOptions)
Additional options for the rule. These are the Suricata RuleOptions
settings.
ruleOptions
- Additional options for the rule. These are the Suricata RuleOptions
settings.public StatefulRule withRuleOptions(RuleOption... ruleOptions)
Additional options for the rule. These are the Suricata RuleOptions
settings.
NOTE: This method appends the values to the existing list (if any). Use
setRuleOptions(java.util.Collection)
or withRuleOptions(java.util.Collection)
if you want to
override the existing values.
ruleOptions
- Additional options for the rule. These are the Suricata RuleOptions
settings.public StatefulRule withRuleOptions(Collection<RuleOption> ruleOptions)
Additional options for the rule. These are the Suricata RuleOptions
settings.
ruleOptions
- Additional options for the rule. These are the Suricata RuleOptions
settings.public String toString()
toString
in class Object
Object.toString()
public StatefulRule clone()
public void marshall(ProtocolMarshaller protocolMarshaller)
StructuredPojo
ProtocolMarshaller
.marshall
in interface StructuredPojo
protocolMarshaller
- Implementation of ProtocolMarshaller
used to marshall this object's data.