libZSservicesZSamazonka-network-firewallZSamazonka-network-firewall
Copyright(c) 2013-2021 Brendan Hay
LicenseMozilla Public License, v. 2.0.
MaintainerBrendan Hay <brendan.g.hay+amazonka@gmail.com>
Stabilityauto-generated
Portabilitynon-portable (GHC extensions)
Safe HaskellNone

Amazonka.NetworkFirewall.Types.StatefulEngineOptions

Description

 
Synopsis

Documentation

data StatefulEngineOptions Source #

Configuration settings for the handling of the stateful rule groups in a firewall policy.

See: newStatefulEngineOptions smart constructor.

Constructors

StatefulEngineOptions' 

Fields

  • ruleOrder :: Maybe RuleOrder

    Indicates how to manage the order of stateful rule evaluation for the policy. By default, Network Firewall leaves the rule evaluation order up to the Suricata rule processing engine. If you set this to STRICT_ORDER, your rules are evaluated in the exact order that you provide them in the policy. With strict ordering, the rule groups are evaluated by order of priority, starting from the lowest number, and the rules in each rule group are processed in the order that they're defined.

Instances

Instances details
Eq StatefulEngineOptions Source # 
Instance details

Defined in Amazonka.NetworkFirewall.Types.StatefulEngineOptions

Read StatefulEngineOptions Source # 
Instance details

Defined in Amazonka.NetworkFirewall.Types.StatefulEngineOptions

Show StatefulEngineOptions Source # 
Instance details

Defined in Amazonka.NetworkFirewall.Types.StatefulEngineOptions

Generic StatefulEngineOptions Source # 
Instance details

Defined in Amazonka.NetworkFirewall.Types.StatefulEngineOptions

Associated Types

type Rep StatefulEngineOptions :: Type -> Type #

NFData StatefulEngineOptions Source # 
Instance details

Defined in Amazonka.NetworkFirewall.Types.StatefulEngineOptions

Methods

rnf :: StatefulEngineOptions -> () #

Hashable StatefulEngineOptions Source # 
Instance details

Defined in Amazonka.NetworkFirewall.Types.StatefulEngineOptions

ToJSON StatefulEngineOptions Source # 
Instance details

Defined in Amazonka.NetworkFirewall.Types.StatefulEngineOptions

FromJSON StatefulEngineOptions Source # 
Instance details

Defined in Amazonka.NetworkFirewall.Types.StatefulEngineOptions

type Rep StatefulEngineOptions Source # 
Instance details

Defined in Amazonka.NetworkFirewall.Types.StatefulEngineOptions

type Rep StatefulEngineOptions = D1 ('MetaData "StatefulEngineOptions" "Amazonka.NetworkFirewall.Types.StatefulEngineOptions" "libZSservicesZSamazonka-network-firewallZSamazonka-network-firewall" 'False) (C1 ('MetaCons "StatefulEngineOptions'" 'PrefixI 'True) (S1 ('MetaSel ('Just "ruleOrder") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 (Maybe RuleOrder))))

newStatefulEngineOptions :: StatefulEngineOptions Source #

Create a value of StatefulEngineOptions with all optional fields omitted.

Use generic-lens or optics to modify other optional fields.

The following record fields are available, with the corresponding lenses provided for backwards compatibility:

$sel:ruleOrder:StatefulEngineOptions', statefulEngineOptions_ruleOrder - Indicates how to manage the order of stateful rule evaluation for the policy. By default, Network Firewall leaves the rule evaluation order up to the Suricata rule processing engine. If you set this to STRICT_ORDER, your rules are evaluated in the exact order that you provide them in the policy. With strict ordering, the rule groups are evaluated by order of priority, starting from the lowest number, and the rules in each rule group are processed in the order that they're defined.

statefulEngineOptions_ruleOrder :: Lens' StatefulEngineOptions (Maybe RuleOrder) Source #

Indicates how to manage the order of stateful rule evaluation for the policy. By default, Network Firewall leaves the rule evaluation order up to the Suricata rule processing engine. If you set this to STRICT_ORDER, your rules are evaluated in the exact order that you provide them in the policy. With strict ordering, the rule groups are evaluated by order of priority, starting from the lowest number, and the rules in each rule group are processed in the order that they're defined.