Network Firewall Policy With Rules Rule Match Args
Constructors
Properties
Address groups which should be matched against the traffic destination. Maximum number of destination address groups is 10.
Destination IP address range in CIDR format. Required for EGRESS rules.
Network scope of the traffic destination. Possible values are: INTERNET
, INTRA_VPC
, NON_INTERNET
, VPC_NETWORKS
.
Region codes whose IP addresses will be used to match for destination of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex."US" Maximum number of destination region codes allowed is 5000.
Names of Network Threat Intelligence lists. The IPs in these lists will be matched against traffic destination.
Pairs of IP protocols and ports that the rule should match. Structure is documented below.
Address groups which should be matched against the traffic source. Maximum number of source address groups is 10.
Source IP address range in CIDR format. Required for INGRESS rules.
Networks of the traffic source. It can be either a full or partial url.
Network scope of the traffic source. Possible values are: INTERNET
, INTRA_VPC
, NON_INTERNET
, VPC_NETWORKS
.
Region codes whose IP addresses will be used to match for source of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex."US" Maximum number of source region codes allowed is 5000.
List of secure tag values, which should be matched at the source of the traffic. For INGRESS rule, if all the srcSecureTag
are INEFFECTIVE, and there is no srcIpRange
, this rule will be ignored. Maximum number of source tag values allowed is 256. Structure is documented below. The layer4_config
block supports:
Names of Network Threat Intelligence lists. The IPs in these lists will be matched against traffic source.