{"published":"2024-06-19 09:00:00","title":"AWS Network Firewall\u3068\u305d\u306e\u30eb\u30fc\u30eb\u30b0\u30eb\u30fc\u30d7\u306b\u3064\u3044\u3066\u89e3\u8aac\u3059\u308b","blog_title":"NRI\u30cd\u30c3\u30c8\u30b3\u30e0Blog","blog_url":"https://tech.nri-net.com/","provider_url":"https://hatena.blog","width":"100%","height":"190","type":"rich","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Ftech.nri-net.com%2Fentry%2Fdescribe_the_aws_network_firewall_and_its_rule_groups\" title=\"AWS Network Firewall\u3068\u305d\u306e\u30eb\u30fc\u30eb\u30b0\u30eb\u30fc\u30d7\u306b\u3064\u3044\u3066\u89e3\u8aac\u3059\u308b - NRI\u30cd\u30c3\u30c8\u30b3\u30e0Blog\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","author_name":"h-ukita","categories":["\u30af\u30e9\u30a6\u30c9","AWS","\u304a\u5f79\u7acb\u3061\u60c5\u5831"],"provider_name":"Hatena Blog","description":"\u306f\u3058\u3081\u306b \u30c9\u30fc\u30e2\u3001\u306f\u3058\u3081\u307e\u3057\u3066\u3002\u30a6\u30ad\u30bf\u3067\u3059\u3002\u5148\u65e5\u3001AWS Network Firewall\u3092\u89e6\u308b\u6a5f\u4f1a\u304c\u3042\u308a\u307e\u3057\u305f\u3002\u305d\u3093\u306a\u306b\u8abf\u3079\u306a\u304f\u3066\u3082\u3042\u308b\u7a0b\u5ea6\u306e\u8a2d\u5b9a\u306f\u3067\u304d\u308b\u3060\u308d\u3046\u3068\u30bf\u30ab\u3092\u304f\u304f\u3063\u3066\u3044\u305f\u3089\u3001\u30b9\u30c6\u30fc\u30c8\u30ec\u30b9\u30eb\u30fc\u30eb/\u30b9\u30c6\u30fc\u30c8\u30d5\u30eb\u30eb\u30fc\u30eb\u306e\u3069\u3061\u3089\u3092\u8a2d\u5b9a\u3059\u308c\u3070\u826f\u3044\u306e\u304b\u3001\u4f55\u306e\u30a2\u30af\u30b7\u30e7\u30f3\u3092\u9078\u3079\u3070\u3044\u3044\u306e\u304b\u3001\u30eb\u30fc\u30c6\u30a3\u30f3\u30b0\u8a2d\u5b9a\u3057\u305f\u306f\u305a\u306a\u306e\u306b\u901a\u4fe1\u3067\u304d\u306a\u3044\u306a\u3069...\u8272\u3005\u3068\u82e6\u6226\u3057\u307e\u3057\u305f\u3002\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306e\u77e5\u8b58\u306f\u5c11\u3057\u3042\u308b\u306e\u3067\u3001\u81ea\u5206\u306a\u308a\u306b\u88dc\u8db3\u3092\u5165\u308c\u306a\u304c\u3089AWS Network Firewall\u3068\u305d\u306e\u30eb\u30fc\u30eb\u306b\u3064\u3044\u3066\u89e3\u8aac\u3057\u3066\u3044\u304d\u307e\u3059\u3002\u30eb\u30fc\u30c6\u30a3\u30f3\u30b0\u306b\u3064\u3044\u3066\u306f\u3001\u5225\u306e\u8a18\u4e8b\u3067\u8aac\u660e\u3059\u308b\u4e88\u5b9a\u3067\u3059\u3002 \u306f\u3058\u3081\u306b \u3053\u306e\u30da\u30fc\u30b8\u3067\u8aac\u660e\u3059\u308b\u3053\u3068 AWS Net\u2026","image_url":"https://cdn-ak.f.st-hatena.com/images/fotolife/h/h-ukita/20240613/20240613161551.png","author_url":"https://blog.hatena.ne.jp/h-ukita/","version":"1.0","url":"https://tech.nri-net.com/entry/describe_the_aws_network_firewall_and_its_rule_groups"}