@Generated(value="com.amazonaws:aws-java-sdk-code-generator") public class AnalysisResult extends Object implements Serializable, Cloneable, StructuredPojo
The analysis result for Network Firewall's stateless rule group analyzer. Every time you call CreateRuleGroup, UpdateRuleGroup, or DescribeRuleGroup on a stateless rule group, Network Firewall analyzes the stateless rule groups in your account and identifies the rules that might adversely effect your firewall's functionality. For example, if Network Firewall detects a rule that's routing traffic asymmetrically, which impacts the service's ability to properly process traffic, the service includes the rule in a list of analysis results.
Constructor and Description |
---|
AnalysisResult() |
Modifier and Type | Method and Description |
---|---|
AnalysisResult |
clone() |
boolean |
equals(Object obj) |
String |
getAnalysisDetail()
Provides analysis details for the identified rule.
|
List<String> |
getIdentifiedRuleIds()
The priority number of the stateless rules identified in the analysis.
|
String |
getIdentifiedType()
The types of rule configurations that Network Firewall analyzes your rule groups for.
|
int |
hashCode() |
void |
marshall(ProtocolMarshaller protocolMarshaller)
Marshalls this structured data using the given
ProtocolMarshaller . |
void |
setAnalysisDetail(String analysisDetail)
Provides analysis details for the identified rule.
|
void |
setIdentifiedRuleIds(Collection<String> identifiedRuleIds)
The priority number of the stateless rules identified in the analysis.
|
void |
setIdentifiedType(String identifiedType)
The types of rule configurations that Network Firewall analyzes your rule groups for.
|
String |
toString()
Returns a string representation of this object.
|
AnalysisResult |
withAnalysisDetail(String analysisDetail)
Provides analysis details for the identified rule.
|
AnalysisResult |
withIdentifiedRuleIds(Collection<String> identifiedRuleIds)
The priority number of the stateless rules identified in the analysis.
|
AnalysisResult |
withIdentifiedRuleIds(String... identifiedRuleIds)
The priority number of the stateless rules identified in the analysis.
|
AnalysisResult |
withIdentifiedType(IdentifiedType identifiedType)
The types of rule configurations that Network Firewall analyzes your rule groups for.
|
AnalysisResult |
withIdentifiedType(String identifiedType)
The types of rule configurations that Network Firewall analyzes your rule groups for.
|
public List<String> getIdentifiedRuleIds()
The priority number of the stateless rules identified in the analysis.
public void setIdentifiedRuleIds(Collection<String> identifiedRuleIds)
The priority number of the stateless rules identified in the analysis.
identifiedRuleIds
- The priority number of the stateless rules identified in the analysis.public AnalysisResult withIdentifiedRuleIds(String... identifiedRuleIds)
The priority number of the stateless rules identified in the analysis.
NOTE: This method appends the values to the existing list (if any). Use
setIdentifiedRuleIds(java.util.Collection)
or withIdentifiedRuleIds(java.util.Collection)
if
you want to override the existing values.
identifiedRuleIds
- The priority number of the stateless rules identified in the analysis.public AnalysisResult withIdentifiedRuleIds(Collection<String> identifiedRuleIds)
The priority number of the stateless rules identified in the analysis.
identifiedRuleIds
- The priority number of the stateless rules identified in the analysis.public void setIdentifiedType(String identifiedType)
The types of rule configurations that Network Firewall analyzes your rule groups for. Network Firewall analyzes stateless rule groups for the following types of rule configurations:
STATELESS_RULE_FORWARDING_ASYMMETRICALLY
Cause: One or more stateless rules with the action pass
or forward
are forwarding
traffic asymmetrically. Specifically, the rule's set of source IP addresses or their associated port numbers,
don't match the set of destination IP addresses or their associated port numbers.
To mitigate: Make sure that there's an existing return path. For example, if the rule allows traffic from source 10.1.0.0/24 to destination 20.1.0.0/24, you should allow return traffic from source 20.1.0.0/24 to destination 10.1.0.0/24.
STATELESS_RULE_CONTAINS_TCP_FLAGS
Cause: At least one stateless rule with the action pass
orforward
contains TCP flags
that are inconsistent in the forward and return directions.
To mitigate: Prevent asymmetric routing issues caused by TCP flags by following these actions:
Remove unnecessary TCP flag inspections from the rules.
If you need to inspect TCP flags, check that the rules correctly account for changes in TCP flags throughout the
TCP connection cycle, for example SYN
and ACK
flags used in a 3-way TCP handshake.
identifiedType
- The types of rule configurations that Network Firewall analyzes your rule groups for. Network Firewall
analyzes stateless rule groups for the following types of rule configurations:
STATELESS_RULE_FORWARDING_ASYMMETRICALLY
Cause: One or more stateless rules with the action pass
or forward
are
forwarding traffic asymmetrically. Specifically, the rule's set of source IP addresses or their associated
port numbers, don't match the set of destination IP addresses or their associated port numbers.
To mitigate: Make sure that there's an existing return path. For example, if the rule allows traffic from source 10.1.0.0/24 to destination 20.1.0.0/24, you should allow return traffic from source 20.1.0.0/24 to destination 10.1.0.0/24.
STATELESS_RULE_CONTAINS_TCP_FLAGS
Cause: At least one stateless rule with the action pass
orforward
contains TCP
flags that are inconsistent in the forward and return directions.
To mitigate: Prevent asymmetric routing issues caused by TCP flags by following these actions:
Remove unnecessary TCP flag inspections from the rules.
If you need to inspect TCP flags, check that the rules correctly account for changes in TCP flags
throughout the TCP connection cycle, for example SYN
and ACK
flags used in a
3-way TCP handshake.
IdentifiedType
public String getIdentifiedType()
The types of rule configurations that Network Firewall analyzes your rule groups for. Network Firewall analyzes stateless rule groups for the following types of rule configurations:
STATELESS_RULE_FORWARDING_ASYMMETRICALLY
Cause: One or more stateless rules with the action pass
or forward
are forwarding
traffic asymmetrically. Specifically, the rule's set of source IP addresses or their associated port numbers,
don't match the set of destination IP addresses or their associated port numbers.
To mitigate: Make sure that there's an existing return path. For example, if the rule allows traffic from source 10.1.0.0/24 to destination 20.1.0.0/24, you should allow return traffic from source 20.1.0.0/24 to destination 10.1.0.0/24.
STATELESS_RULE_CONTAINS_TCP_FLAGS
Cause: At least one stateless rule with the action pass
orforward
contains TCP flags
that are inconsistent in the forward and return directions.
To mitigate: Prevent asymmetric routing issues caused by TCP flags by following these actions:
Remove unnecessary TCP flag inspections from the rules.
If you need to inspect TCP flags, check that the rules correctly account for changes in TCP flags throughout the
TCP connection cycle, for example SYN
and ACK
flags used in a 3-way TCP handshake.
STATELESS_RULE_FORWARDING_ASYMMETRICALLY
Cause: One or more stateless rules with the action pass
or forward
are
forwarding traffic asymmetrically. Specifically, the rule's set of source IP addresses or their
associated port numbers, don't match the set of destination IP addresses or their associated port
numbers.
To mitigate: Make sure that there's an existing return path. For example, if the rule allows traffic from source 10.1.0.0/24 to destination 20.1.0.0/24, you should allow return traffic from source 20.1.0.0/24 to destination 10.1.0.0/24.
STATELESS_RULE_CONTAINS_TCP_FLAGS
Cause: At least one stateless rule with the action pass
orforward
contains TCP
flags that are inconsistent in the forward and return directions.
To mitigate: Prevent asymmetric routing issues caused by TCP flags by following these actions:
Remove unnecessary TCP flag inspections from the rules.
If you need to inspect TCP flags, check that the rules correctly account for changes in TCP flags
throughout the TCP connection cycle, for example SYN
and ACK
flags used in a
3-way TCP handshake.
IdentifiedType
public AnalysisResult withIdentifiedType(String identifiedType)
The types of rule configurations that Network Firewall analyzes your rule groups for. Network Firewall analyzes stateless rule groups for the following types of rule configurations:
STATELESS_RULE_FORWARDING_ASYMMETRICALLY
Cause: One or more stateless rules with the action pass
or forward
are forwarding
traffic asymmetrically. Specifically, the rule's set of source IP addresses or their associated port numbers,
don't match the set of destination IP addresses or their associated port numbers.
To mitigate: Make sure that there's an existing return path. For example, if the rule allows traffic from source 10.1.0.0/24 to destination 20.1.0.0/24, you should allow return traffic from source 20.1.0.0/24 to destination 10.1.0.0/24.
STATELESS_RULE_CONTAINS_TCP_FLAGS
Cause: At least one stateless rule with the action pass
orforward
contains TCP flags
that are inconsistent in the forward and return directions.
To mitigate: Prevent asymmetric routing issues caused by TCP flags by following these actions:
Remove unnecessary TCP flag inspections from the rules.
If you need to inspect TCP flags, check that the rules correctly account for changes in TCP flags throughout the
TCP connection cycle, for example SYN
and ACK
flags used in a 3-way TCP handshake.
identifiedType
- The types of rule configurations that Network Firewall analyzes your rule groups for. Network Firewall
analyzes stateless rule groups for the following types of rule configurations:
STATELESS_RULE_FORWARDING_ASYMMETRICALLY
Cause: One or more stateless rules with the action pass
or forward
are
forwarding traffic asymmetrically. Specifically, the rule's set of source IP addresses or their associated
port numbers, don't match the set of destination IP addresses or their associated port numbers.
To mitigate: Make sure that there's an existing return path. For example, if the rule allows traffic from source 10.1.0.0/24 to destination 20.1.0.0/24, you should allow return traffic from source 20.1.0.0/24 to destination 10.1.0.0/24.
STATELESS_RULE_CONTAINS_TCP_FLAGS
Cause: At least one stateless rule with the action pass
orforward
contains TCP
flags that are inconsistent in the forward and return directions.
To mitigate: Prevent asymmetric routing issues caused by TCP flags by following these actions:
Remove unnecessary TCP flag inspections from the rules.
If you need to inspect TCP flags, check that the rules correctly account for changes in TCP flags
throughout the TCP connection cycle, for example SYN
and ACK
flags used in a
3-way TCP handshake.
IdentifiedType
public AnalysisResult withIdentifiedType(IdentifiedType identifiedType)
The types of rule configurations that Network Firewall analyzes your rule groups for. Network Firewall analyzes stateless rule groups for the following types of rule configurations:
STATELESS_RULE_FORWARDING_ASYMMETRICALLY
Cause: One or more stateless rules with the action pass
or forward
are forwarding
traffic asymmetrically. Specifically, the rule's set of source IP addresses or their associated port numbers,
don't match the set of destination IP addresses or their associated port numbers.
To mitigate: Make sure that there's an existing return path. For example, if the rule allows traffic from source 10.1.0.0/24 to destination 20.1.0.0/24, you should allow return traffic from source 20.1.0.0/24 to destination 10.1.0.0/24.
STATELESS_RULE_CONTAINS_TCP_FLAGS
Cause: At least one stateless rule with the action pass
orforward
contains TCP flags
that are inconsistent in the forward and return directions.
To mitigate: Prevent asymmetric routing issues caused by TCP flags by following these actions:
Remove unnecessary TCP flag inspections from the rules.
If you need to inspect TCP flags, check that the rules correctly account for changes in TCP flags throughout the
TCP connection cycle, for example SYN
and ACK
flags used in a 3-way TCP handshake.
identifiedType
- The types of rule configurations that Network Firewall analyzes your rule groups for. Network Firewall
analyzes stateless rule groups for the following types of rule configurations:
STATELESS_RULE_FORWARDING_ASYMMETRICALLY
Cause: One or more stateless rules with the action pass
or forward
are
forwarding traffic asymmetrically. Specifically, the rule's set of source IP addresses or their associated
port numbers, don't match the set of destination IP addresses or their associated port numbers.
To mitigate: Make sure that there's an existing return path. For example, if the rule allows traffic from source 10.1.0.0/24 to destination 20.1.0.0/24, you should allow return traffic from source 20.1.0.0/24 to destination 10.1.0.0/24.
STATELESS_RULE_CONTAINS_TCP_FLAGS
Cause: At least one stateless rule with the action pass
orforward
contains TCP
flags that are inconsistent in the forward and return directions.
To mitigate: Prevent asymmetric routing issues caused by TCP flags by following these actions:
Remove unnecessary TCP flag inspections from the rules.
If you need to inspect TCP flags, check that the rules correctly account for changes in TCP flags
throughout the TCP connection cycle, for example SYN
and ACK
flags used in a
3-way TCP handshake.
IdentifiedType
public void setAnalysisDetail(String analysisDetail)
Provides analysis details for the identified rule.
analysisDetail
- Provides analysis details for the identified rule.public String getAnalysisDetail()
Provides analysis details for the identified rule.
public AnalysisResult withAnalysisDetail(String analysisDetail)
Provides analysis details for the identified rule.
analysisDetail
- Provides analysis details for the identified rule.public String toString()
toString
in class Object
Object.toString()
public AnalysisResult clone()
public void marshall(ProtocolMarshaller protocolMarshaller)
StructuredPojo
ProtocolMarshaller
.marshall
in interface StructuredPojo
protocolMarshaller
- Implementation of ProtocolMarshaller
used to marshall this object's data.