Class: Aws::NetworkFirewall::Types::RulesSourceList
- Inherits:
-
Struct
- Object
- Struct
- Aws::NetworkFirewall::Types::RulesSourceList
- Defined in:
- gems/aws-sdk-networkfirewall/lib/aws-sdk-networkfirewall/types.rb
Overview
Stateful inspection criteria for a domain list rule group.
For HTTPS traffic, domain filtering is SNI-based. It uses the server name indicator extension of the TLS handshake.
By default, Network Firewall domain list inspection only includes
traffic coming from the VPC where you deploy the firewall. To inspect
traffic from IP addresses outside of the deployment VPC, you set the
HOME_NET
rule variable to include the CIDR range of the deployment
VPC plus the other CIDR ranges. For more information, see
RuleVariables in this guide and Stateful domain list rule groups in
Network Firewall in the Network Firewall Developer Guide.
Constant Summary collapse
- SENSITIVE =
[]
Instance Attribute Summary collapse
-
#generated_rules_type ⇒ String
Whether you want to allow or deny access to the domains in your target list.
-
#target_types ⇒ Array<String>
The protocols you want to inspect.
-
#targets ⇒ Array<String>
The domains that you want to inspect for in your traffic flows.
Instance Attribute Details
#generated_rules_type ⇒ String
Whether you want to allow or deny access to the domains in your target list.
3469 3470 3471 3472 3473 3474 3475 |
# File 'gems/aws-sdk-networkfirewall/lib/aws-sdk-networkfirewall/types.rb', line 3469 class RulesSourceList < Struct.new( :targets, :target_types, :generated_rules_type) SENSITIVE = [] include Aws::Structure end |
#target_types ⇒ Array<String>
The protocols you want to inspect. Specify TLS_SNI
for HTTPS
.
Specify HTTP_HOST
for HTTP
. You can specify either or both.
3469 3470 3471 3472 3473 3474 3475 |
# File 'gems/aws-sdk-networkfirewall/lib/aws-sdk-networkfirewall/types.rb', line 3469 class RulesSourceList < Struct.new( :targets, :target_types, :generated_rules_type) SENSITIVE = [] include Aws::Structure end |
#targets ⇒ Array<String>
The domains that you want to inspect for in your traffic flows. Valid domain specifications are the following:
Explicit names. For example,
abc.example.com
matches only the domainabc.example.com
.Names that use a domain wildcard, which you indicate with an initial '
.
'. For example,.example.com
matchesexample.com
and matches all subdomains ofexample.com
, such asabc.example.com
andwww.example.com
.
3469 3470 3471 3472 3473 3474 3475 |
# File 'gems/aws-sdk-networkfirewall/lib/aws-sdk-networkfirewall/types.rb', line 3469 class RulesSourceList < Struct.new( :targets, :target_types, :generated_rules_type) SENSITIVE = [] include Aws::Structure end |