aws-cdk-lib.aws_networkfirewall.CfnFirewallPolicy.StatefulEngineOptionsProperty

interface StatefulEngineOptionsProperty

LanguageType name
.NETAmazon.CDK.AWS.NetworkFirewall.CfnFirewallPolicy.StatefulEngineOptionsProperty
Gogithub.com/aws/aws-cdk-go/awscdk/v2/awsnetworkfirewall#CfnFirewallPolicy_StatefulEngineOptionsProperty
Javasoftware.amazon.awscdk.services.networkfirewall.CfnFirewallPolicy.StatefulEngineOptionsProperty
Pythonaws_cdk.aws_networkfirewall.CfnFirewallPolicy.StatefulEngineOptionsProperty
TypeScript aws-cdk-lib » aws_networkfirewall » CfnFirewallPolicy » StatefulEngineOptionsProperty

Configuration settings for the handling of the stateful rule groups in a firewall policy.

Example

// The code below shows an example of how to instantiate this type.
// The values are placeholders you should change.
import { aws_networkfirewall as networkfirewall } from 'aws-cdk-lib';
const statefulEngineOptionsProperty: networkfirewall.CfnFirewallPolicy.StatefulEngineOptionsProperty = {
  ruleOrder: 'ruleOrder',
  streamExceptionPolicy: 'streamExceptionPolicy',
};

Properties

NameTypeDescription
ruleOrder?stringIndicates how to manage the order of stateful rule evaluation for the policy.
streamExceptionPolicy?stringConfigures how Network Firewall processes traffic when a network connection breaks midstream.

ruleOrder?

Type: string (optional)

Indicates how to manage the order of stateful rule evaluation for the policy.

DEFAULT_ACTION_ORDER is the default behavior. Stateful rules are provided to the rule engine as Suricata compatible strings, and Suricata evaluates them based on certain settings. For more information, see Evaluation order for stateful rules in the AWS Network Firewall Developer Guide .


streamExceptionPolicy?

Type: string (optional)

Configures how Network Firewall processes traffic when a network connection breaks midstream.

Network connections can break due to disruptions in external networks or within the firewall itself.

  • DROP - Network Firewall fails closed and drops all subsequent traffic going to the firewall. This is the default behavior.
  • CONTINUE - Network Firewall continues to apply rules to the subsequent traffic without context from traffic before the break. This impacts the behavior of rules that depend on this context. For example, if you have a stateful rule to drop http traffic, Network Firewall won't match the traffic for this rule because the service won't have the context from session initialization defining the application layer protocol as HTTP. However, this behavior is rule dependent—a TCP-layer rule using a flow:stateless rule would still match, as would the aws:drop_strict default action.
  • REJECT - Network Firewall fails closed and drops all subsequent traffic going to the firewall. Network Firewall also sends a TCP reject packet back to your client so that the client can immediately establish a new session. Network Firewall will have context about the new session and will apply rules to the subsequent traffic.