public static interface StatefulRule.Builder extends SdkPojo, CopyableBuilder<StatefulRule.Builder,StatefulRule>
| Modifier and Type | Method and Description |
|---|---|
StatefulRule.Builder |
action(StatefulAction action)
Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful
rule criteria.
|
StatefulRule.Builder |
action(String action)
Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful
rule criteria.
|
default StatefulRule.Builder |
header(Consumer<Header.Builder> header)
The stateful inspection criteria for this rule, used to inspect traffic flows.
|
StatefulRule.Builder |
header(Header header)
The stateful inspection criteria for this rule, used to inspect traffic flows.
|
StatefulRule.Builder |
ruleOptions(Collection<RuleOption> ruleOptions)
Additional options for the rule.
|
StatefulRule.Builder |
ruleOptions(Consumer<RuleOption.Builder>... ruleOptions)
Additional options for the rule.
|
StatefulRule.Builder |
ruleOptions(RuleOption... ruleOptions)
Additional options for the rule.
|
equalsBySdkFields, sdkFieldscopyapplyMutation, buildStatefulRule.Builder action(String action)
Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow.
The actions for a stateful rule are defined as follows:
PASS - Permits the packets to go to the intended destination.
DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration.
ALERT - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration.
You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with
ALERT action, verify in the logs that the rule is filtering as you want, then change the action
to DROP.
REJECT - Drops TCP traffic that matches the conditions of the stateful rule, and sends a TCP reset
packet back to sender of the packet. A TCP reset packet is a packet with no payload and a RST
bit contained in the TCP header flags. Also sends an alert log mesage if alert logging is configured in the
Firewall LoggingConfiguration.
REJECT isn't currently available for use with IMAP and FTP protocols.
action - Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the
stateful rule criteria. For all actions, Network Firewall performs the specified action and
discontinues stateful inspection of the traffic flow.
The actions for a stateful rule are defined as follows:
PASS - Permits the packets to go to the intended destination.
DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration.
ALERT - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration.
You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule
with ALERT action, verify in the logs that the rule is filtering as you want, then change
the action to DROP.
REJECT - Drops TCP traffic that matches the conditions of the stateful rule, and sends a TCP
reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a
RST bit contained in the TCP header flags. Also sends an alert log mesage if alert
logging is configured in the Firewall LoggingConfiguration.
REJECT isn't currently available for use with IMAP and FTP protocols.
StatefulAction,
StatefulActionStatefulRule.Builder action(StatefulAction action)
Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the stateful rule criteria. For all actions, Network Firewall performs the specified action and discontinues stateful inspection of the traffic flow.
The actions for a stateful rule are defined as follows:
PASS - Permits the packets to go to the intended destination.
DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration.
ALERT - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration.
You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule with
ALERT action, verify in the logs that the rule is filtering as you want, then change the action
to DROP.
REJECT - Drops TCP traffic that matches the conditions of the stateful rule, and sends a TCP reset
packet back to sender of the packet. A TCP reset packet is a packet with no payload and a RST
bit contained in the TCP header flags. Also sends an alert log mesage if alert logging is configured in the
Firewall LoggingConfiguration.
REJECT isn't currently available for use with IMAP and FTP protocols.
action - Defines what Network Firewall should do with the packets in a traffic flow when the flow matches the
stateful rule criteria. For all actions, Network Firewall performs the specified action and
discontinues stateful inspection of the traffic flow.
The actions for a stateful rule are defined as follows:
PASS - Permits the packets to go to the intended destination.
DROP - Blocks the packets from going to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration.
ALERT - Permits the packets to go to the intended destination and sends an alert log message, if alert logging is configured in the Firewall LoggingConfiguration.
You can use this action to test a rule that you intend to use to drop traffic. You can enable the rule
with ALERT action, verify in the logs that the rule is filtering as you want, then change
the action to DROP.
REJECT - Drops TCP traffic that matches the conditions of the stateful rule, and sends a TCP
reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and a
RST bit contained in the TCP header flags. Also sends an alert log mesage if alert
logging is configured in the Firewall LoggingConfiguration.
REJECT isn't currently available for use with IMAP and FTP protocols.
StatefulAction,
StatefulActionStatefulRule.Builder header(Header header)
The stateful inspection criteria for this rule, used to inspect traffic flows.
header - The stateful inspection criteria for this rule, used to inspect traffic flows.default StatefulRule.Builder header(Consumer<Header.Builder> header)
The stateful inspection criteria for this rule, used to inspect traffic flows.
This is a convenience method that creates an instance of theHeader.Builder avoiding the need to
create one manually via Header.builder().
When the Consumer completes, SdkBuilder.build() is called immediately and its result is
passed to header(Header).
header - a consumer that will call methods on Header.Builderheader(Header)StatefulRule.Builder ruleOptions(Collection<RuleOption> ruleOptions)
Additional options for the rule. These are the Suricata RuleOptions settings.
ruleOptions - Additional options for the rule. These are the Suricata RuleOptions settings.StatefulRule.Builder ruleOptions(RuleOption... ruleOptions)
Additional options for the rule. These are the Suricata RuleOptions settings.
ruleOptions - Additional options for the rule. These are the Suricata RuleOptions settings.StatefulRule.Builder ruleOptions(Consumer<RuleOption.Builder>... ruleOptions)
Additional options for the rule. These are the Suricata RuleOptions settings.
RuleOption.Builder avoiding the need to create
one manually via RuleOption.builder().
When the Consumer completes,
SdkBuilder.build() is called
immediately and its result is passed to #ruleOptions(List.
ruleOptions - a consumer that will call methods on
RuleOption.Builder#ruleOptions(java.util.Collection) Copyright © 2023. All rights reserved.