NetworkConfig / CentralNetworkServicesConfig / NfwConfig / NfwRuleGroupConfig / NfwRuleGroupRuleConfig / NfwRuleSourceConfig / NfwRuleSourceStatefulRuleConfig / NfwRuleSourceStatefulRuleHeaderConfig

Network Firewall stateful rule header configuration.

Use this configuration to define stateful rules for Network Firewall in an IP packet header format. This header format can be used instead of Suricata-compatible rules to define your stateful firewall filtering behavior.

https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-networkfirewall-rulegroup-header.html for more details.

The following example creates a stateful rule that inspects all traffic from source 10.1.0.0/16 to destination 10.0.0.0/16:

source: 10.1.0.0/16
sourcePort: ANY
destination: 10.0.0.0/16
destinationPort: ANY
direction: FORWARD
protocol: IP
interface INfwRuleSourceStatefulRuleHeaderConfig {
    destination: string;
    destinationPort: string;
    direction: NfwStatefulRuleDirectionType;
    protocol: NfwStatefulRuleProtocolType;
    source: string;
    sourcePort: string;
}

Properties

destination: string

The destination CIDR range to inspect for.

Use CIDR notation, i.e. 10.0.0.0/16

destinationPort: string

The destination port or port range to inspect.

To specify a port range, separate the values with a colon :. For example: 80:443. To specify all ports, use ANY.

direction: NfwStatefulRuleDirectionType

The direction of the traffic flow to inspect.

Use ANY to match bidirectional traffic.

Use FORWARD to match only traffic going from the source to destination.

protocol: NfwStatefulRuleProtocolType

The protocol to inspect.

To specify all traffic, use IP.

source: string

The source CIDR range to inspect for.

Use CIDR notation, i.e. 10.0.0.0/16

sourcePort: string

The source port or port range to inspect.

To specify a port range, separate the values with a colon :. For example: 80:443. To specify all ports, use ANY.