Skip to content

/AWS1/CL_NWFSTATEFULRLGRREFE00

Identifier for a single stateful rule group, used in a firewall policy to refer to a rule group.

CONSTRUCTOR

IMPORTING

Required arguments:

iv_resourcearn TYPE /AWS1/NWFRESOURCEARN /AWS1/NWFRESOURCEARN

The Amazon Resource Name (ARN) of the stateful rule group.

Optional arguments:

iv_priority TYPE /AWS1/NWFPRIORITY /AWS1/NWFPRIORITY

An integer setting that indicates the order in which to run the stateful rule groups in a single FirewallPolicy. This setting only applies to firewall policies that specify the STRICT_ORDER rule order in the stateful engine options settings.

Network Firewall evalutes each stateful rule group against a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy.

You can change the priority settings of your rule groups at any time. To make it easier to insert rule groups later, number them so there's a wide range in between, for example use 100, 200, and so on.

io_override TYPE REF TO /AWS1/CL_NWFSTATEFULRLGROVER00 /AWS1/CL_NWFSTATEFULRLGROVER00

The action that allows the policy owner to override the behavior of the rule group within a policy.

iv_deepthreatinspection TYPE /AWS1/NWFDEEPTHREATINSPECTION /AWS1/NWFDEEPTHREATINSPECTION

Network Firewall plans to augment the active threat defense managed rule group with an additional deep threat inspection capability. When this capability is released, Amazon Web Services will analyze service logs of network traffic processed by these rule groups to identify threat indicators across customers. Amazon Web Services will use these threat indicators to improve the active threat defense managed rule groups and protect the security of Amazon Web Services customers and services.

Customers can opt-out of deep threat inspection at any time through the Network Firewall console or API. When customers opt out, Network Firewall will not use the network traffic processed by those customers' active threat defense rule groups for rule group improvement.


Queryable Attributes

ResourceArn

The Amazon Resource Name (ARN) of the stateful rule group.

Accessible with the following methods

Method Description
GET_RESOURCEARN() Getter for RESOURCEARN, with configurable default
ASK_RESOURCEARN() Getter for RESOURCEARN w/ exceptions if field has no value
HAS_RESOURCEARN() Determine if RESOURCEARN has a value

Priority

An integer setting that indicates the order in which to run the stateful rule groups in a single FirewallPolicy. This setting only applies to firewall policies that specify the STRICT_ORDER rule order in the stateful engine options settings.

Network Firewall evalutes each stateful rule group against a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy.

You can change the priority settings of your rule groups at any time. To make it easier to insert rule groups later, number them so there's a wide range in between, for example use 100, 200, and so on.

Accessible with the following methods

Method Description
GET_PRIORITY() Getter for PRIORITY, with configurable default
ASK_PRIORITY() Getter for PRIORITY w/ exceptions if field has no value
HAS_PRIORITY() Determine if PRIORITY has a value

Override

The action that allows the policy owner to override the behavior of the rule group within a policy.

Accessible with the following methods

Method Description
GET_OVERRIDE() Getter for OVERRIDE

DeepThreatInspection

Network Firewall plans to augment the active threat defense managed rule group with an additional deep threat inspection capability. When this capability is released, Amazon Web Services will analyze service logs of network traffic processed by these rule groups to identify threat indicators across customers. Amazon Web Services will use these threat indicators to improve the active threat defense managed rule groups and protect the security of Amazon Web Services customers and services.

Customers can opt-out of deep threat inspection at any time through the Network Firewall console or API. When customers opt out, Network Firewall will not use the network traffic processed by those customers' active threat defense rule groups for rule group improvement.

Accessible with the following methods

Method Description
GET_DEEPTHREATINSPECTION() Getter for DEEPTHREATINSPECTION, with configurable default
ASK_DEEPTHREATINSPECTION() Getter for DEEPTHREATINSPECTION w/ exceptions if field has n
HAS_DEEPTHREATINSPECTION() Determine if DEEPTHREATINSPECTION has a value

Public Local Types In This Class

Internal table types, representing arrays and maps of this class, are defined as local types:

TT_STATEFULRULEGROUPREFERENCES

TYPES TT_STATEFULRULEGROUPREFERENCES TYPE STANDARD TABLE OF REF TO /AWS1/CL_NWFSTATEFULRLGRREFE00 WITH DEFAULT KEY
.