Interface CfnWebACL.ClientSideActionProperty
- All Superinterfaces:
software.amazon.jsii.JsiiSerializable
- All Known Implementing Classes:
CfnWebACL.ClientSideActionProperty.Jsii$Proxy
- Enclosing class:
CfnWebACL
AWSManagedRulesAntiDDoSRuleSet ClientSideActionConfig configuration in ManagedRuleGroupConfig .
Example:
// The code below shows an example of how to instantiate this type.
// The values are placeholders you should change.
import software.amazon.awscdk.services.wafv2.*;
ClientSideActionProperty clientSideActionProperty = ClientSideActionProperty.builder()
.usageOfAction("usageOfAction")
// the properties below are optional
.exemptUriRegularExpressions(List.of(RegexProperty.builder()
.regexString("regexString")
.build()))
.sensitivity("sensitivity")
.build();
- See Also:
-
Nested Class Summary
Nested ClassesModifier and TypeInterfaceDescriptionstatic final classA builder forCfnWebACL.ClientSideActionPropertystatic final classAn implementation forCfnWebACL.ClientSideActionProperty -
Method Summary
Modifier and TypeMethodDescriptionbuilder()default ObjectThe regular expression to match against the web request URI, used to identify requests that can't handle a silent browser challenge.default StringThe sensitivity that the rule group ruleChallengeDDoSRequestsuses when matching against the DDoS suspicion labeling on a request.Determines whether to use theAWSManagedRulesAntiDDoSRuleSetrulesChallengeAllDuringEventandChallengeDDoSRequestsin the rule group evaluation and the related labelawswaf:managed:aws:anti-ddos:challengeable-request.Methods inherited from interface software.amazon.jsii.JsiiSerializable
$jsii$toJson
-
Method Details
-
getUsageOfAction
Determines whether to use theAWSManagedRulesAntiDDoSRuleSetrulesChallengeAllDuringEventandChallengeDDoSRequestsin the rule group evaluation and the related labelawswaf:managed:aws:anti-ddos:challengeable-request.- If usage is enabled:
- The managed rule group adds the label
awswaf:managed:aws:anti-ddos:challengeable-requestto any web request whose URL does NOT match the regular expressions provided in theClientSideActionsettingExemptUriRegularExpressions. - The two rules are evaluated against web requests for protected resources that are experiencing a DDoS attack. The two rules only apply their action to matching requests that have the label
awswaf:managed:aws:anti-ddos:challengeable-request. - If usage is disabled:
- The managed rule group doesn't add the label
awswaf:managed:aws:anti-ddos:challengeable-requestto any web requests. - The two rules are not evaluated.
- None of the other
ClientSideActionsettings have any effect.
This setting only enables or disables the use of the two anti-DDOS rules
ChallengeAllDuringEventandChallengeDDoSRequestsin the anti-DDoS managed rule group.This setting doesn't alter the action setting in the two rules. To override the actions used by the rules
ChallengeAllDuringEventandChallengeDDoSRequests, enable this setting, and then override the rule actions in the usual way, in your managed rule group configuration.- See Also:
-
getExemptUriRegularExpressions
The regular expression to match against the web request URI, used to identify requests that can't handle a silent browser challenge.When the
ClientSideActionsettingUsageOfActionis enabled, the managed rule group uses this setting to determine which requests to label withawswaf:managed:aws:anti-ddos:challengeable-request. IfUsageOfActionis disabled, this setting has no effect and the managed rule group doesn't add the label to any requests.The anti-DDoS managed rule group doesn't evaluate the rules
ChallengeDDoSRequestsorChallengeAllDuringEventfor web requests whose URIs match this regex. This is true regardless of whether you override the rule action for either of the rules in your web ACL configuration.AWS recommends using a regular expression.
This setting is required if
UsageOfActionis set toENABLED. If required, you can provide between 1 and 5 regex objects in the array of settings.AWS recommends starting with the following setting. Review and update it for your application's needs:
\/api\/|\.(acc|avi|css|gif|jpe?g|js|mp[34]|ogg|otf|pdf|png|tiff?|ttf|webm|webp|woff2?)$Returns union: either
IResolvableor Listinvalid input: '<'eitherIResolvableorCfnWebACL.RegexProperty>- See Also:
-
getSensitivity
The sensitivity that the rule group ruleChallengeDDoSRequestsuses when matching against the DDoS suspicion labeling on a request.The managed rule group adds the labeling during DDoS events, before the
ChallengeDDoSRequestsrule runs.The higher the sensitivity, the more levels of labeling that the rule matches:
- Low sensitivity is less sensitive, causing the rule to match only on the most likely participants in an attack, which are the requests with the high suspicion label
awswaf:managed:aws:anti-ddos:high-suspicion-ddos-request. - Medium sensitivity causes the rule to match on the medium and high suspicion labels.
- High sensitivity causes the rule to match on all of the suspicion labels: low, medium, and high.
Default:
HIGH- See Also:
- Low sensitivity is less sensitive, causing the rule to match only on the most likely participants in an attack, which are the requests with the high suspicion label
-
builder
-