Skip to content

Commit 64ae593

Browse files
author
AWS
committed
AWS Network Firewall Update: Network Firewall now introduces Reject and Alert action support for stateful domain list rule groups, providing customers with more granular control over their network traffic.
1 parent 7fd5726 commit 64ae593

File tree

2 files changed

+10
-2
lines changed

2 files changed

+10
-2
lines changed
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
{
2+
"type": "feature",
3+
"category": "AWS Network Firewall",
4+
"contributor": "",
5+
"description": "Network Firewall now introduces Reject and Alert action support for stateful domain list rule groups, providing customers with more granular control over their network traffic."
6+
}

services/networkfirewall/src/main/resources/codegen-resources/service-2.json

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2856,7 +2856,9 @@
28562856
"type":"string",
28572857
"enum":[
28582858
"ALLOWLIST",
2859-
"DENYLIST"
2859+
"DENYLIST",
2860+
"REJECTLIST",
2861+
"ALERTLIST"
28602862
]
28612863
},
28622864
"GetAnalysisReportResultsRequest":{
@@ -4082,7 +4084,7 @@
40824084
},
40834085
"GeneratedRulesType":{
40844086
"shape":"GeneratedRulesType",
4085-
"documentation":"<p>Whether you want to allow or deny access to the domains in your target list.</p>"
4087+
"documentation":"<p>Whether you want to apply allow, reject, alert, or drop behavior to the domains in your target list.</p> <note> <p>When logging is enabled and you choose Alert, traffic that matches the domain specifications generates an alert in the firewall's logs. Then, traffic either passes, is rejected, or drops based on other rules in the firewall policy.</p> </note>"
40864088
}
40874089
},
40884090
"documentation":"<p>Stateful inspection criteria for a domain list rule group. </p> <p>For HTTPS traffic, domain filtering is SNI-based. It uses the server name indicator extension of the TLS handshake.</p> <p>By default, Network Firewall domain list inspection only includes traffic coming from the VPC where you deploy the firewall. To inspect traffic from IP addresses outside of the deployment VPC, you set the <code>HOME_NET</code> rule variable to include the CIDR range of the deployment VPC plus the other CIDR ranges. For more information, see <a>RuleVariables</a> in this guide and <a href=\"https://docs.aws.amazon.com/network-firewall/latest/developerguide/stateful-rule-groups-domain-names.html\">Stateful domain list rule groups in Network Firewall</a> in the <i>Network Firewall Developer Guide</i>.</p>"

0 commit comments

Comments
 (0)