RulesSourceList
Stateful inspection criteria for a domain list rule group.
For HTTPS traffic, domain filtering is SNI-based. It uses the server name indicator extension of the TLS handshake.
By default, Network Firewall domain list inspection only includes traffic coming from the VPC where you deploy the firewall. To inspect traffic from IP addresses outside of the deployment VPC, you set the HOME_NET
rule variable to include the CIDR range of the deployment VPC plus the other CIDR ranges. For more information, see RuleVariables in this guide and
Stateful domain list rule groups in AWS Network Firewall in the Network Firewall Developer Guide.
Contents
- GeneratedRulesType
-
Whether you want to allow or deny access to the domains in your target list.
Type: String
Valid Values:
ALLOWLIST | DENYLIST
Required: Yes
- Targets
-
The domains that you want to inspect for in your traffic flows. Valid domain specifications are the following:
-
Explicit names. For example,
abc.example.com
matches only the domainabc.example.com
. -
Names that use a domain wildcard, which you indicate with an initial '
.
'. For example,.example.com
matchesexample.com
and matches all subdomains ofexample.com
, such asabc.example.com
andwww.example.com
.
Type: Array of strings
Required: Yes
-
- TargetTypes
-
The protocols you want to inspect. Specify
TLS_SNI
forHTTPS
. SpecifyHTTP_HOST
forHTTP
. You can specify either or both.Type: Array of strings
Valid Values:
TLS_SNI | HTTP_HOST
Required: Yes
See Also
For more information about using this API in one of the language-specific AWS SDKs, see the following: