Selecione suas preferências de cookies

Usamos cookies essenciais e ferramentas semelhantes que são necessárias para fornecer nosso site e serviços. Usamos cookies de desempenho para coletar estatísticas anônimas, para que possamos entender como os clientes usam nosso site e fazer as devidas melhorias. Cookies essenciais não podem ser desativados, mas você pode clicar em “Personalizar” ou “Recusar” para recusar cookies de desempenho.

Se você concordar, a AWS e terceiros aprovados também usarão cookies para fornecer recursos úteis do site, lembrar suas preferências e exibir conteúdo relevante, incluindo publicidade relevante. Para aceitar ou recusar todos os cookies não essenciais, clique em “Aceitar” ou “Recusar”. Para fazer escolhas mais detalhadas, clique em “Personalizar”.

Rule groups in AWS Network Firewall

Modo de foco
Rule groups in AWS Network Firewall - AWS Network Firewall
Esta página não foi traduzida para seu idioma. Solicitar tradução

An AWS Network Firewall rule group is a reusable set of criteria for inspecting and handling network traffic. You add one or more rule groups to a firewall policy as part of policy configuration. For more information about firewall policies and firewalls, see Firewall policies in AWS Network Firewall and Firewalls in AWS Network Firewall.

You can use your own rule groups and you can use rule groups that are managed for you by AWS.

Network Firewall rule groups are either stateless or stateful. Stateless rule groups evaluate packets in isolation, while stateful rule groups evaluate them in the context of their traffic flow. You can create and manage the following categories of rule groups in Network Firewall:

  • Stateless – Defines standard network connection attributes for examining a packet on its own, with no additional context.

  • Stateful – Defines criteria for examining a packet in the context of traffic flow and of other traffic that's related to the packet.

    Network Firewall uses a Suricata rules engine to process all stateful rules. You can write any of your stateful rules in Suricata compatible format. Alternately, for domain list rules and for very basic rules, you can use an easy entry form provided by Network Firewall.

    Stateful rule groups are available in the following categories:

    • Suricata compatible rule strings – Provides match and action settings, in Suricata compatible format. You can provide all of your stateful rules through this method if you want to.

    • Domain list – Defines a list of domain names and specifies the protocol type to inspect. You can create these rules from traffic analysis reports. For information, see Creating stateful rule groups from reports.

    • Standard stateful rules – Defines standard network connection attributes for examining a packet within the context of a traffic flow.

Depending on the type of rule group, you might also define rules inside the rule group. Rules provide detailed criteria for packet inspection and specify what to do when a packet matches the criteria. When Network Firewall finds a match between the criteria and a packet, we say that the packet matches the rule group.

This section provides guidance for creating and managing your own rule groups.

PrivacidadeTermos do sitePreferências de cookies
© 2025, Amazon Web Services, Inc. ou suas afiliadas. Todos os direitos reservados.