AWS SDK for C++  1.9.67
AWS SDK for C++
Public Member Functions | List of all members
Aws::NetworkFirewall::Model::RulesSourceList Class Reference

#include <RulesSourceList.h>

Public Member Functions

 RulesSourceList ()
 
 RulesSourceList (Aws::Utils::Json::JsonView jsonValue)
 
RulesSourceListoperator= (Aws::Utils::Json::JsonView jsonValue)
 
Aws::Utils::Json::JsonValue Jsonize () const
 
const Aws::Vector< Aws::String > & GetTargets () const
 
bool TargetsHasBeenSet () const
 
void SetTargets (const Aws::Vector< Aws::String > &value)
 
void SetTargets (Aws::Vector< Aws::String > &&value)
 
RulesSourceListWithTargets (const Aws::Vector< Aws::String > &value)
 
RulesSourceListWithTargets (Aws::Vector< Aws::String > &&value)
 
RulesSourceListAddTargets (const Aws::String &value)
 
RulesSourceListAddTargets (Aws::String &&value)
 
RulesSourceListAddTargets (const char *value)
 
const Aws::Vector< TargetType > & GetTargetTypes () const
 
bool TargetTypesHasBeenSet () const
 
void SetTargetTypes (const Aws::Vector< TargetType > &value)
 
void SetTargetTypes (Aws::Vector< TargetType > &&value)
 
RulesSourceListWithTargetTypes (const Aws::Vector< TargetType > &value)
 
RulesSourceListWithTargetTypes (Aws::Vector< TargetType > &&value)
 
RulesSourceListAddTargetTypes (const TargetType &value)
 
RulesSourceListAddTargetTypes (TargetType &&value)
 
const GeneratedRulesTypeGetGeneratedRulesType () const
 
bool GeneratedRulesTypeHasBeenSet () const
 
void SetGeneratedRulesType (const GeneratedRulesType &value)
 
void SetGeneratedRulesType (GeneratedRulesType &&value)
 
RulesSourceListWithGeneratedRulesType (const GeneratedRulesType &value)
 
RulesSourceListWithGeneratedRulesType (GeneratedRulesType &&value)
 

Detailed Description

Stateful inspection criteria for a domain list rule group.

For HTTPS traffic, domain filtering is SNI-based. It uses the server name indicator extension of the TLS handshake.

By default, Network Firewall domain list inspection only includes traffic coming from the VPC where you deploy the firewall. To inspect traffic from IP addresses outside of the deployment VPC, you set the HOME_NET rule variable to include the CIDR range of the deployment VPC plus the other CIDR ranges. For more information, see RuleVariables in this guide and Stateful domain list rule groups in AWS Network Firewall in the Network Firewall Developer Guide

See Also:

AWS API Reference

Definition at line 44 of file RulesSourceList.h.

Constructor & Destructor Documentation

◆ RulesSourceList() [1/2]

Aws::NetworkFirewall::Model::RulesSourceList::RulesSourceList ( )

◆ RulesSourceList() [2/2]

Aws::NetworkFirewall::Model::RulesSourceList::RulesSourceList ( Aws::Utils::Json::JsonView  jsonValue)

Member Function Documentation

◆ AddTargets() [1/3]

RulesSourceList& Aws::NetworkFirewall::Model::RulesSourceList::AddTargets ( Aws::String &&  value)
inline

The domains that you want to inspect for in your traffic flows. To provide multiple domains, separate them with commas. Valid domain specifications are the following:

  • Explicit names. For example, abc.example.com matches only the domain abc.example.com.

  • Names that use a domain wildcard, which you indicate with an initial '.'. For example,.example.com matches example.com and matches all subdomains of example.com, such as abc.example.com and www.example.com.

Definition at line 155 of file RulesSourceList.h.

◆ AddTargets() [2/3]

RulesSourceList& Aws::NetworkFirewall::Model::RulesSourceList::AddTargets ( const Aws::String value)
inline

The domains that you want to inspect for in your traffic flows. To provide multiple domains, separate them with commas. Valid domain specifications are the following:

  • Explicit names. For example, abc.example.com matches only the domain abc.example.com.

  • Names that use a domain wildcard, which you indicate with an initial '.'. For example,.example.com matches example.com and matches all subdomains of example.com, such as abc.example.com and www.example.com.

Definition at line 142 of file RulesSourceList.h.

◆ AddTargets() [3/3]

RulesSourceList& Aws::NetworkFirewall::Model::RulesSourceList::AddTargets ( const char *  value)
inline

The domains that you want to inspect for in your traffic flows. To provide multiple domains, separate them with commas. Valid domain specifications are the following:

  • Explicit names. For example, abc.example.com matches only the domain abc.example.com.

  • Names that use a domain wildcard, which you indicate with an initial '.'. For example,.example.com matches example.com and matches all subdomains of example.com, such as abc.example.com and www.example.com.

Definition at line 168 of file RulesSourceList.h.

◆ AddTargetTypes() [1/2]

RulesSourceList& Aws::NetworkFirewall::Model::RulesSourceList::AddTargetTypes ( const TargetType value)
inline

The protocols you want to inspect. Specify TLS_SNI for HTTPS. Specity HTTP_HOST for HTTP. You can specify either or both.

Definition at line 218 of file RulesSourceList.h.

◆ AddTargetTypes() [2/2]

RulesSourceList& Aws::NetworkFirewall::Model::RulesSourceList::AddTargetTypes ( TargetType &&  value)
inline

The protocols you want to inspect. Specify TLS_SNI for HTTPS. Specity HTTP_HOST for HTTP. You can specify either or both.

Definition at line 225 of file RulesSourceList.h.

◆ GeneratedRulesTypeHasBeenSet()

bool Aws::NetworkFirewall::Model::RulesSourceList::GeneratedRulesTypeHasBeenSet ( ) const
inline

Whether you want to allow or deny access to the domains in your target list.

Definition at line 238 of file RulesSourceList.h.

◆ GetGeneratedRulesType()

const GeneratedRulesType& Aws::NetworkFirewall::Model::RulesSourceList::GetGeneratedRulesType ( ) const
inline

Whether you want to allow or deny access to the domains in your target list.

Definition at line 232 of file RulesSourceList.h.

◆ GetTargets()

const Aws::Vector<Aws::String>& Aws::NetworkFirewall::Model::RulesSourceList::GetTargets ( ) const
inline

The domains that you want to inspect for in your traffic flows. To provide multiple domains, separate them with commas. Valid domain specifications are the following:

  • Explicit names. For example, abc.example.com matches only the domain abc.example.com.

  • Names that use a domain wildcard, which you indicate with an initial '.'. For example,.example.com matches example.com and matches all subdomains of example.com, such as abc.example.com and www.example.com.

Definition at line 64 of file RulesSourceList.h.

◆ GetTargetTypes()

const Aws::Vector<TargetType>& Aws::NetworkFirewall::Model::RulesSourceList::GetTargetTypes ( ) const
inline

The protocols you want to inspect. Specify TLS_SNI for HTTPS. Specity HTTP_HOST for HTTP. You can specify either or both.

Definition at line 176 of file RulesSourceList.h.

◆ Jsonize()

Aws::Utils::Json::JsonValue Aws::NetworkFirewall::Model::RulesSourceList::Jsonize ( ) const

◆ operator=()

RulesSourceList& Aws::NetworkFirewall::Model::RulesSourceList::operator= ( Aws::Utils::Json::JsonView  jsonValue)

◆ SetGeneratedRulesType() [1/2]

void Aws::NetworkFirewall::Model::RulesSourceList::SetGeneratedRulesType ( const GeneratedRulesType value)
inline

Whether you want to allow or deny access to the domains in your target list.

Definition at line 244 of file RulesSourceList.h.

◆ SetGeneratedRulesType() [2/2]

void Aws::NetworkFirewall::Model::RulesSourceList::SetGeneratedRulesType ( GeneratedRulesType &&  value)
inline

Whether you want to allow or deny access to the domains in your target list.

Definition at line 250 of file RulesSourceList.h.

◆ SetTargets() [1/2]

void Aws::NetworkFirewall::Model::RulesSourceList::SetTargets ( Aws::Vector< Aws::String > &&  value)
inline

The domains that you want to inspect for in your traffic flows. To provide multiple domains, separate them with commas. Valid domain specifications are the following:

  • Explicit names. For example, abc.example.com matches only the domain abc.example.com.

  • Names that use a domain wildcard, which you indicate with an initial '.'. For example,.example.com matches example.com and matches all subdomains of example.com, such as abc.example.com and www.example.com.

Definition at line 103 of file RulesSourceList.h.

◆ SetTargets() [2/2]

void Aws::NetworkFirewall::Model::RulesSourceList::SetTargets ( const Aws::Vector< Aws::String > &  value)
inline

The domains that you want to inspect for in your traffic flows. To provide multiple domains, separate them with commas. Valid domain specifications are the following:

  • Explicit names. For example, abc.example.com matches only the domain abc.example.com.

  • Names that use a domain wildcard, which you indicate with an initial '.'. For example,.example.com matches example.com and matches all subdomains of example.com, such as abc.example.com and www.example.com.

Definition at line 90 of file RulesSourceList.h.

◆ SetTargetTypes() [1/2]

void Aws::NetworkFirewall::Model::RulesSourceList::SetTargetTypes ( Aws::Vector< TargetType > &&  value)
inline

The protocols you want to inspect. Specify TLS_SNI for HTTPS. Specity HTTP_HOST for HTTP. You can specify either or both.

Definition at line 197 of file RulesSourceList.h.

◆ SetTargetTypes() [2/2]

void Aws::NetworkFirewall::Model::RulesSourceList::SetTargetTypes ( const Aws::Vector< TargetType > &  value)
inline

The protocols you want to inspect. Specify TLS_SNI for HTTPS. Specity HTTP_HOST for HTTP. You can specify either or both.

Definition at line 190 of file RulesSourceList.h.

◆ TargetsHasBeenSet()

bool Aws::NetworkFirewall::Model::RulesSourceList::TargetsHasBeenSet ( ) const
inline

The domains that you want to inspect for in your traffic flows. To provide multiple domains, separate them with commas. Valid domain specifications are the following:

  • Explicit names. For example, abc.example.com matches only the domain abc.example.com.

  • Names that use a domain wildcard, which you indicate with an initial '.'. For example,.example.com matches example.com and matches all subdomains of example.com, such as abc.example.com and www.example.com.

Definition at line 77 of file RulesSourceList.h.

◆ TargetTypesHasBeenSet()

bool Aws::NetworkFirewall::Model::RulesSourceList::TargetTypesHasBeenSet ( ) const
inline

The protocols you want to inspect. Specify TLS_SNI for HTTPS. Specity HTTP_HOST for HTTP. You can specify either or both.

Definition at line 183 of file RulesSourceList.h.

◆ WithGeneratedRulesType() [1/2]

RulesSourceList& Aws::NetworkFirewall::Model::RulesSourceList::WithGeneratedRulesType ( const GeneratedRulesType value)
inline

Whether you want to allow or deny access to the domains in your target list.

Definition at line 256 of file RulesSourceList.h.

◆ WithGeneratedRulesType() [2/2]

RulesSourceList& Aws::NetworkFirewall::Model::RulesSourceList::WithGeneratedRulesType ( GeneratedRulesType &&  value)
inline

Whether you want to allow or deny access to the domains in your target list.

Definition at line 262 of file RulesSourceList.h.

◆ WithTargets() [1/2]

RulesSourceList& Aws::NetworkFirewall::Model::RulesSourceList::WithTargets ( Aws::Vector< Aws::String > &&  value)
inline

The domains that you want to inspect for in your traffic flows. To provide multiple domains, separate them with commas. Valid domain specifications are the following:

  • Explicit names. For example, abc.example.com matches only the domain abc.example.com.

  • Names that use a domain wildcard, which you indicate with an initial '.'. For example,.example.com matches example.com and matches all subdomains of example.com, such as abc.example.com and www.example.com.

Definition at line 129 of file RulesSourceList.h.

◆ WithTargets() [2/2]

RulesSourceList& Aws::NetworkFirewall::Model::RulesSourceList::WithTargets ( const Aws::Vector< Aws::String > &  value)
inline

The domains that you want to inspect for in your traffic flows. To provide multiple domains, separate them with commas. Valid domain specifications are the following:

  • Explicit names. For example, abc.example.com matches only the domain abc.example.com.

  • Names that use a domain wildcard, which you indicate with an initial '.'. For example,.example.com matches example.com and matches all subdomains of example.com, such as abc.example.com and www.example.com.

Definition at line 116 of file RulesSourceList.h.

◆ WithTargetTypes() [1/2]

RulesSourceList& Aws::NetworkFirewall::Model::RulesSourceList::WithTargetTypes ( Aws::Vector< TargetType > &&  value)
inline

The protocols you want to inspect. Specify TLS_SNI for HTTPS. Specity HTTP_HOST for HTTP. You can specify either or both.

Definition at line 211 of file RulesSourceList.h.

◆ WithTargetTypes() [2/2]

RulesSourceList& Aws::NetworkFirewall::Model::RulesSourceList::WithTargetTypes ( const Aws::Vector< TargetType > &  value)
inline

The protocols you want to inspect. Specify TLS_SNI for HTTPS. Specity HTTP_HOST for HTTP. You can specify either or both.

Definition at line 204 of file RulesSourceList.h.


The documentation for this class was generated from the following file: