- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
account_id
Type: STRING
delete_protection
Type: BOOLEAN
Provider name: DeleteProtection
Description: A flag indicating whether it is possible to delete the firewall. A setting of TRUE
indicates that the firewall is protected against deletion. Use this setting to protect against accidentally deleting a firewall that is in use. When you create a firewall, the operation initializes this flag to TRUE
.
description
Type: STRING
Provider name: Description
Description: A description of the firewall.
encryption_configuration
Type: STRUCT
Provider name: EncryptionConfiguration
Description: A complex type that contains the Amazon Web Services KMS encryption configuration settings for your firewall.
key_id
STRING
KeyId
type
STRING
Type
firewall_arn
Type: STRING
Provider name: FirewallArn
Description: The Amazon Resource Name (ARN) of the firewall.
firewall_id
Type: STRING
Provider name: FirewallId
Description: The unique identifier for the firewall.
firewall_name
Type: STRING
Provider name: FirewallName
Description: The descriptive name of the firewall. You can’t change the name of a firewall after you create it.
firewall_policy
Type: STRUCT
Provider name: FirewallPolicy
Description: The policy for the specified firewall policy.
policy_variables
STRUCT
PolicyVariables
rule_variables
STRING
RuleVariables
HOME_NET
variable. If your firewall uses an inspection VPC, you might want to override the HOME_NET
variable with the CIDRs of your home networks. If you don’t override HOME_NET
with your own CIDRs, Network Firewall by default uses the CIDR of your inspection VPC.stateful_default_actions
UNORDERED_LIST_STRING
StatefulDefaultActions
stateful_engine_options
STRUCT
StatefulEngineOptions
rule_order
STRING
RuleOrder
STRICT_ORDER
is the default and recommended option. With STRICT_ORDER
, provide your rules in the order that you want them to be evaluated. You can then choose one or more default actions for packets that don’t match any rules. Choose STRICT_ORDER
to have the stateful rules engine determine the evaluation order of your rules. The default action for this rule order is PASS
, followed by DROP
, REJECT
, and ALERT
actions. Stateful rules are provided to the rule engine as Suricata compatible strings, and Suricata evaluates them based on your settings. For more information, see Evaluation order for stateful rules in the Network Firewall Developer Guide.stream_exception_policy
STRING
StreamExceptionPolicy
DROP
- Network Firewall fails closed and drops all subsequent traffic going to the firewall. This is the default behavior.CONTINUE
- Network Firewall continues to apply rules to the subsequent traffic without context from traffic before the break. This impacts the behavior of rules that depend on this context. For example, if you have a stateful rule to drop http
traffic, Network Firewall won’t match the traffic for this rule because the service won’t have the context from session initialization defining the application layer protocol as HTTP. However, this behavior is rule dependent—a TCP-layer rule using a flow:stateless
rule would still match, as would the aws:drop_strict
default action.REJECT
- Network Firewall fails closed and drops all subsequent traffic going to the firewall. Network Firewall also sends a TCP reject packet back to your client so that the client can immediately establish a new session. Network Firewall will have context about the new session and will apply rules to the subsequent traffic.stateful_rule_group_references
UNORDERED_LIST_STRUCT
StatefulRuleGroupReferences
override
STRUCT
Override
action
STRING
Action
DROP
to ALERT
. This only applies to managed rule groups.priority
INT32
Priority
STRICT_ORDER
rule order in the stateful engine options settings. Network Firewall evalutes each stateful rule group against a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy. You can change the priority settings of your rule groups at any time. To make it easier to insert rule groups later, number them so there’s a wide range in between, for example use 100, 200, and so on.resource_arn
STRING
ResourceArn
stateless_custom_actions
UNORDERED_LIST_STRUCT
StatelessCustomActions
StatelessDefaultActions
setting. You name each custom action that you define, and then you can use it by name in your default actions specifications.action_definition
STRUCT
ActionDefinition
publish_metric_action
STRUCT
PublishMetricAction
dimensions
UNORDERED_LIST_STRUCT
Dimensions
value
STRING
Value
action_name
STRING
ActionName
stateless_default_actions
UNORDERED_LIST_STRING
StatelessDefaultActions
aws:forward_to_sfe
. You must specify one of the standard actions: aws:pass
, aws:drop
, or aws:forward_to_sfe
. In addition, you can specify custom actions that are compatible with your standard section choice. For example, you could specify [“aws:pass”]
or you could specify [“aws:pass”, “customActionName”]
. For information about compatibility, see the custom action descriptions under CustomAction.stateless_fragment_default_actions
UNORDERED_LIST_STRING
StatelessFragmentDefaultActions
aws:forward_to_sfe
. You must specify one of the standard actions: aws:pass
, aws:drop
, or aws:forward_to_sfe
. In addition, you can specify custom actions that are compatible with your standard section choice. For example, you could specify [“aws:pass”]
or you could specify [“aws:pass”, “customActionName”]
. For information about compatibility, see the custom action descriptions under CustomAction.stateless_rule_group_references
UNORDERED_LIST_STRUCT
StatelessRuleGroupReferences
priority
INT32
Priority
resource_arn
STRING
ResourceArn
tls_inspection_configuration_arn
STRING
TLSInspectionConfigurationArn
firewall_policy_arn
Type: STRING
Provider name: FirewallPolicyArn
Description: The Amazon Resource Name (ARN) of the firewall policy. The relationship of firewall to firewall policy is many to one. Each firewall requires one firewall policy association, and you can use the same firewall policy for multiple firewalls.
firewall_policy_change_protection
Type: BOOLEAN
Provider name: FirewallPolicyChangeProtection
Description: A setting indicating whether the firewall is protected against a change to the firewall policy association. Use this setting to protect against accidentally modifying the firewall policy for a firewall that is in use. When you create a firewall, the operation initializes this setting to TRUE
.
firewall_policy_response
Type: STRUCT
Provider name: FirewallPolicyResponse
Description: The high-level properties of a firewall policy. This, along with the FirewallPolicy, define the policy. You can retrieve all objects for a firewall policy by calling DescribeFirewallPolicy.
consumed_stateful_rule_capacity
INT32
ConsumedStatefulRuleCapacity
consumed_stateless_rule_capacity
INT32
ConsumedStatelessRuleCapacity
description
STRING
Description
encryption_configuration
STRUCT
EncryptionConfiguration
key_id
STRING
KeyId
type
STRING
Type
firewall_policy_arn
STRING
FirewallPolicyArn
DryRun
set to TRUE
, then this ARN is a placeholder that isn’t attached to a valid resource.firewall_policy_id
STRING
FirewallPolicyId
firewall_policy_name
STRING
FirewallPolicyName
firewall_policy_status
STRING
FirewallPolicyStatus
last_modified_time
TIMESTAMP
LastModifiedTime
number_of_associations
INT32
NumberOfAssociations
firewall_status
Type: STRUCT
Provider name: FirewallStatus
Description: Detailed information about the current status of a Firewall. You can retrieve this for a firewall by calling DescribeFirewall and providing the firewall name and ARN.
capacity_usage_summary
STRUCT
CapacityUsageSummary
cidrs
STRUCT
CIDRs
available_cidr_count
INT32
AvailableCIDRCount
ip_set_references
STRING
IPSetReferences
utilized_cidr_count
INT32
UtilizedCIDRCount
configuration_sync_state_summary
STRING
ConfigurationSyncStateSummary
Config
settings for all of the Availability Zones where you have configured the firewall. When you create a firewall or update its configuration, for example by adding a rule group to its firewall policy, Network Firewall distributes the configuration changes to all zones where the firewall is in use. This summary indicates whether the configuration changes have been applied everywhere. This status must be IN_SYNC
for the firewall to be ready for use, but it doesn’t indicate that the firewall is ready. The Status
setting indicates firewall readiness.status
STRING
Status
READY
only when the ConfigurationSyncStateSummary
value is IN_SYNC
and the Attachment
Status
values for all of the configured subnets are READY
.sync_states
STRING
SyncStates
ConfigurationSyncStateSummary
and Status
, broken down by zone and configuration object.logging_configuration
Type: STRUCT
Provider name: LoggingConfiguration
log_destination_configs
UNORDERED_LIST_STRUCT
LogDestinationConfigs
log_destination
MAP_STRING_STRING
LogDestination
bucketName
, and optionally provide a prefix, with key prefix
. The following example specifies an Amazon S3 bucket named DOC-EXAMPLE-BUCKET
and the prefix alerts
: “LogDestination”: { “bucketName”: “DOC-EXAMPLE-BUCKET”, “prefix”: “alerts” }
logGroup
. The following example specifies a log group named alert-log-group
: “LogDestination”: { “logGroup”: “alert-log-group” }
deliveryStream
. The following example specifies a delivery stream named alert-delivery-stream
: “LogDestination”: { “deliveryStream”: “alert-delivery-stream” }
log_destination_type
STRING
LogDestinationType
log_type
STRING
LogType
ALERT
- Logs for traffic that matches your stateful rules and that have an action that sends an alert. A stateful rule sends alerts for the rule actions DROP, ALERT, and REJECT. For more information, see StatefulRule.FLOW
- Standard network traffic flow logs. The stateful rules engine records flow logs for all network traffic that it receives. Each flow log record captures the network flow for a specific standard stateless rule group.TLS
- Logs for events that are related to TLS inspection. For more information, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.subnet_change_protection
Type: BOOLEAN
Provider name: SubnetChangeProtection
Description: A setting indicating whether the firewall is protected against changes to the subnet associations. Use this setting to protect against accidentally modifying the subnet associations for a firewall that is in use. When you create a firewall, the operation initializes this setting to TRUE
.
subnet_mappings
Type: UNORDERED_LIST_STRUCT
Provider name: SubnetMappings
Description: The public subnets that Network Firewall is using for the firewall. Each subnet must belong to a different Availability Zone.
ip_address_type
STRING
IPAddressType
subnet_id
STRING
SubnetId
tags
Type: UNORDERED_LIST_STRING
update_token
Type: STRING
Provider name: UpdateToken
Description: A token used for optimistic locking. Network Firewall returns a token to your requests that access the firewall policy. The token marks the state of the policy resource at the time of the request. To make changes to the policy, you provide the token in your request. Network Firewall uses the token to ensure that the policy hasn’t changed since you last retrieved it. If it has changed, the operation fails with an InvalidTokenException
. If this happens, retrieve the firewall policy again to get a current copy of it with current token. Reapply your changes as needed, then try the operation again using the new token.
vpc_id
Type: STRING
Provider name: VpcId
Description: The unique identifier of the VPC where the firewall is in use.