aws-sdk-networkfirewall 1.36.0 → 1.37.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-networkfirewall/client.rb +47 -4
- data/lib/aws-sdk-networkfirewall/client_api.rb +17 -0
- data/lib/aws-sdk-networkfirewall/types.rb +153 -37
- data/lib/aws-sdk-networkfirewall.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 1ead7232a47e4248e5f8e27ffea9f25c2440d542fc0bfa6578c81b9486b7b07b
|
4
|
+
data.tar.gz: c85889a00b03ab03b4b4497d90bc5d43b820a91ed2138c8794e65bd58f5eba3e
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 0f9693651148e310a4006394e3381083ef03f7eff5d883e8cf5e9ac9957d55ec79b1cce56c4251feca36e702c1136804a58740568ccd3b7088a321edad22af15
|
7
|
+
data.tar.gz: dfc2ed10eb6ad18b5191eddc9c48ce7d233239c5fe911503882d981891d126e7a0c6ae6e2c189ee1ce8344051a4b8dfc3b44a7396a7cd5c97c878027e8831fbe
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,11 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.37.0 (2023-11-02)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - This release introduces the stateless rule analyzer, which enables you to analyze your stateless rules for asymmetric routing.
|
8
|
+
|
4
9
|
1.36.0 (2023-10-26)
|
5
10
|
------------------
|
6
11
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.37.0
|
@@ -955,6 +955,13 @@ module Aws::NetworkFirewall
|
|
955
955
|
# own rule group is copied from. You can use the metadata to keep track
|
956
956
|
# of updates made to the originating rule group.
|
957
957
|
#
|
958
|
+
# @option params [Boolean] :analyze_rule_group
|
959
|
+
# Indicates whether you want Network Firewall to analyze the stateless
|
960
|
+
# rules in the rule group for rule behavior such as asymmetric routing.
|
961
|
+
# If set to `TRUE`, Network Firewall runs the analysis and then creates
|
962
|
+
# the rule group for you. To run the stateless rule group analyzer
|
963
|
+
# without creating the rule group, set `DryRun` to `TRUE`.
|
964
|
+
#
|
958
965
|
# @return [Types::CreateRuleGroupResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
959
966
|
#
|
960
967
|
# * {Types::CreateRuleGroupResponse#update_token #update_token} => String
|
@@ -1089,6 +1096,7 @@ module Aws::NetworkFirewall
|
|
1089
1096
|
# source_arn: "ResourceArn",
|
1090
1097
|
# source_update_token: "UpdateToken",
|
1091
1098
|
# },
|
1099
|
+
# analyze_rule_group: false,
|
1092
1100
|
# })
|
1093
1101
|
#
|
1094
1102
|
# @example Response structure
|
@@ -1112,6 +1120,11 @@ module Aws::NetworkFirewall
|
|
1112
1120
|
# resp.rule_group_response.source_metadata.source_update_token #=> String
|
1113
1121
|
# resp.rule_group_response.sns_topic #=> String
|
1114
1122
|
# resp.rule_group_response.last_modified_time #=> Time
|
1123
|
+
# resp.rule_group_response.analysis_results #=> Array
|
1124
|
+
# resp.rule_group_response.analysis_results[0].identified_rule_ids #=> Array
|
1125
|
+
# resp.rule_group_response.analysis_results[0].identified_rule_ids[0] #=> String
|
1126
|
+
# resp.rule_group_response.analysis_results[0].identified_type #=> String, one of "STATELESS_RULE_FORWARDING_ASYMMETRICALLY", "STATELESS_RULE_CONTAINS_TCP_FLAGS"
|
1127
|
+
# resp.rule_group_response.analysis_results[0].analysis_detail #=> String
|
1115
1128
|
#
|
1116
1129
|
# @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/CreateRuleGroup AWS API Documentation
|
1117
1130
|
#
|
@@ -1123,9 +1136,10 @@ module Aws::NetworkFirewall
|
|
1123
1136
|
end
|
1124
1137
|
|
1125
1138
|
# Creates an Network Firewall TLS inspection configuration. A TLS
|
1126
|
-
# inspection configuration contains
|
1127
|
-
# associations
|
1128
|
-
# traffic traveling through your
|
1139
|
+
# inspection configuration contains Certificate Manager certificate
|
1140
|
+
# associations between and the scope configurations that Network
|
1141
|
+
# Firewall uses to decrypt and re-encrypt traffic traveling through your
|
1142
|
+
# firewall.
|
1129
1143
|
#
|
1130
1144
|
# After you create a TLS inspection configuration, you can associate it
|
1131
1145
|
# with a new firewall policy.
|
@@ -1508,6 +1522,11 @@ module Aws::NetworkFirewall
|
|
1508
1522
|
# resp.rule_group_response.source_metadata.source_update_token #=> String
|
1509
1523
|
# resp.rule_group_response.sns_topic #=> String
|
1510
1524
|
# resp.rule_group_response.last_modified_time #=> Time
|
1525
|
+
# resp.rule_group_response.analysis_results #=> Array
|
1526
|
+
# resp.rule_group_response.analysis_results[0].identified_rule_ids #=> Array
|
1527
|
+
# resp.rule_group_response.analysis_results[0].identified_rule_ids[0] #=> String
|
1528
|
+
# resp.rule_group_response.analysis_results[0].identified_type #=> String, one of "STATELESS_RULE_FORWARDING_ASYMMETRICALLY", "STATELESS_RULE_CONTAINS_TCP_FLAGS"
|
1529
|
+
# resp.rule_group_response.analysis_results[0].analysis_detail #=> String
|
1511
1530
|
#
|
1512
1531
|
# @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/DeleteRuleGroup AWS API Documentation
|
1513
1532
|
#
|
@@ -1817,6 +1836,11 @@ module Aws::NetworkFirewall
|
|
1817
1836
|
#
|
1818
1837
|
# </note>
|
1819
1838
|
#
|
1839
|
+
# @option params [Boolean] :analyze_rule_group
|
1840
|
+
# Indicates whether you want Network Firewall to analyze the stateless
|
1841
|
+
# rules in the rule group for rule behavior such as asymmetric routing.
|
1842
|
+
# If set to `TRUE`, Network Firewall runs the analysis.
|
1843
|
+
#
|
1820
1844
|
# @return [Types::DescribeRuleGroupResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
1821
1845
|
#
|
1822
1846
|
# * {Types::DescribeRuleGroupResponse#update_token #update_token} => String
|
@@ -1829,6 +1853,7 @@ module Aws::NetworkFirewall
|
|
1829
1853
|
# rule_group_name: "ResourceName",
|
1830
1854
|
# rule_group_arn: "ResourceArn",
|
1831
1855
|
# type: "STATELESS", # accepts STATELESS, STATEFUL
|
1856
|
+
# analyze_rule_group: false,
|
1832
1857
|
# })
|
1833
1858
|
#
|
1834
1859
|
# @example Response structure
|
@@ -1904,6 +1929,11 @@ module Aws::NetworkFirewall
|
|
1904
1929
|
# resp.rule_group_response.source_metadata.source_update_token #=> String
|
1905
1930
|
# resp.rule_group_response.sns_topic #=> String
|
1906
1931
|
# resp.rule_group_response.last_modified_time #=> Time
|
1932
|
+
# resp.rule_group_response.analysis_results #=> Array
|
1933
|
+
# resp.rule_group_response.analysis_results[0].identified_rule_ids #=> Array
|
1934
|
+
# resp.rule_group_response.analysis_results[0].identified_rule_ids[0] #=> String
|
1935
|
+
# resp.rule_group_response.analysis_results[0].identified_type #=> String, one of "STATELESS_RULE_FORWARDING_ASYMMETRICALLY", "STATELESS_RULE_CONTAINS_TCP_FLAGS"
|
1936
|
+
# resp.rule_group_response.analysis_results[0].analysis_detail #=> String
|
1907
1937
|
#
|
1908
1938
|
# @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/DescribeRuleGroup AWS API Documentation
|
1909
1939
|
#
|
@@ -3169,6 +3199,13 @@ module Aws::NetworkFirewall
|
|
3169
3199
|
# own rule group is copied from. You can use the metadata to keep track
|
3170
3200
|
# of updates made to the originating rule group.
|
3171
3201
|
#
|
3202
|
+
# @option params [Boolean] :analyze_rule_group
|
3203
|
+
# Indicates whether you want Network Firewall to analyze the stateless
|
3204
|
+
# rules in the rule group for rule behavior such as asymmetric routing.
|
3205
|
+
# If set to `TRUE`, Network Firewall runs the analysis and then updates
|
3206
|
+
# the rule group for you. To run the stateless rule group analyzer
|
3207
|
+
# without updating the rule group, set `DryRun` to `TRUE`.
|
3208
|
+
#
|
3172
3209
|
# @return [Types::UpdateRuleGroupResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
3173
3210
|
#
|
3174
3211
|
# * {Types::UpdateRuleGroupResponse#update_token #update_token} => String
|
@@ -3298,6 +3335,7 @@ module Aws::NetworkFirewall
|
|
3298
3335
|
# source_arn: "ResourceArn",
|
3299
3336
|
# source_update_token: "UpdateToken",
|
3300
3337
|
# },
|
3338
|
+
# analyze_rule_group: false,
|
3301
3339
|
# })
|
3302
3340
|
#
|
3303
3341
|
# @example Response structure
|
@@ -3321,6 +3359,11 @@ module Aws::NetworkFirewall
|
|
3321
3359
|
# resp.rule_group_response.source_metadata.source_update_token #=> String
|
3322
3360
|
# resp.rule_group_response.sns_topic #=> String
|
3323
3361
|
# resp.rule_group_response.last_modified_time #=> Time
|
3362
|
+
# resp.rule_group_response.analysis_results #=> Array
|
3363
|
+
# resp.rule_group_response.analysis_results[0].identified_rule_ids #=> Array
|
3364
|
+
# resp.rule_group_response.analysis_results[0].identified_rule_ids[0] #=> String
|
3365
|
+
# resp.rule_group_response.analysis_results[0].identified_type #=> String, one of "STATELESS_RULE_FORWARDING_ASYMMETRICALLY", "STATELESS_RULE_CONTAINS_TCP_FLAGS"
|
3366
|
+
# resp.rule_group_response.analysis_results[0].analysis_detail #=> String
|
3324
3367
|
#
|
3325
3368
|
# @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/UpdateRuleGroup AWS API Documentation
|
3326
3369
|
#
|
@@ -3572,7 +3615,7 @@ module Aws::NetworkFirewall
|
|
3572
3615
|
params: params,
|
3573
3616
|
config: config)
|
3574
3617
|
context[:gem_name] = 'aws-sdk-networkfirewall'
|
3575
|
-
context[:gem_version] = '1.
|
3618
|
+
context[:gem_version] = '1.37.0'
|
3576
3619
|
Seahorse::Client::Request.new(handlers, context)
|
3577
3620
|
end
|
3578
3621
|
|
@@ -18,6 +18,8 @@ module Aws::NetworkFirewall
|
|
18
18
|
Address = Shapes::StructureShape.new(name: 'Address')
|
19
19
|
AddressDefinition = Shapes::StringShape.new(name: 'AddressDefinition')
|
20
20
|
Addresses = Shapes::ListShape.new(name: 'Addresses')
|
21
|
+
AnalysisResult = Shapes::StructureShape.new(name: 'AnalysisResult')
|
22
|
+
AnalysisResultList = Shapes::ListShape.new(name: 'AnalysisResultList')
|
21
23
|
AssociateFirewallPolicyRequest = Shapes::StructureShape.new(name: 'AssociateFirewallPolicyRequest')
|
22
24
|
AssociateFirewallPolicyResponse = Shapes::StructureShape.new(name: 'AssociateFirewallPolicyResponse')
|
23
25
|
AssociateSubnetsRequest = Shapes::StructureShape.new(name: 'AssociateSubnetsRequest')
|
@@ -103,6 +105,7 @@ module Aws::NetworkFirewall
|
|
103
105
|
IPSetReferenceMap = Shapes::MapShape.new(name: 'IPSetReferenceMap')
|
104
106
|
IPSetReferenceName = Shapes::StringShape.new(name: 'IPSetReferenceName')
|
105
107
|
IPSets = Shapes::MapShape.new(name: 'IPSets')
|
108
|
+
IdentifiedType = Shapes::StringShape.new(name: 'IdentifiedType')
|
106
109
|
InsufficientCapacityException = Shapes::StructureShape.new(name: 'InsufficientCapacityException')
|
107
110
|
InternalServerError = Shapes::StructureShape.new(name: 'InternalServerError')
|
108
111
|
InvalidOperationException = Shapes::StructureShape.new(name: 'InvalidOperationException')
|
@@ -168,6 +171,7 @@ module Aws::NetworkFirewall
|
|
168
171
|
RuleGroupResponse = Shapes::StructureShape.new(name: 'RuleGroupResponse')
|
169
172
|
RuleGroupType = Shapes::StringShape.new(name: 'RuleGroupType')
|
170
173
|
RuleGroups = Shapes::ListShape.new(name: 'RuleGroups')
|
174
|
+
RuleIdList = Shapes::ListShape.new(name: 'RuleIdList')
|
171
175
|
RuleOption = Shapes::StructureShape.new(name: 'RuleOption')
|
172
176
|
RuleOptions = Shapes::ListShape.new(name: 'RuleOptions')
|
173
177
|
RuleOrder = Shapes::StringShape.new(name: 'RuleOrder')
|
@@ -266,6 +270,13 @@ module Aws::NetworkFirewall
|
|
266
270
|
|
267
271
|
Addresses.member = Shapes::ShapeRef.new(shape: Address)
|
268
272
|
|
273
|
+
AnalysisResult.add_member(:identified_rule_ids, Shapes::ShapeRef.new(shape: RuleIdList, location_name: "IdentifiedRuleIds"))
|
274
|
+
AnalysisResult.add_member(:identified_type, Shapes::ShapeRef.new(shape: IdentifiedType, location_name: "IdentifiedType"))
|
275
|
+
AnalysisResult.add_member(:analysis_detail, Shapes::ShapeRef.new(shape: CollectionMember_String, location_name: "AnalysisDetail"))
|
276
|
+
AnalysisResult.struct_class = Types::AnalysisResult
|
277
|
+
|
278
|
+
AnalysisResultList.member = Shapes::ShapeRef.new(shape: AnalysisResult)
|
279
|
+
|
269
280
|
AssociateFirewallPolicyRequest.add_member(:update_token, Shapes::ShapeRef.new(shape: UpdateToken, location_name: "UpdateToken"))
|
270
281
|
AssociateFirewallPolicyRequest.add_member(:firewall_arn, Shapes::ShapeRef.new(shape: ResourceArn, location_name: "FirewallArn"))
|
271
282
|
AssociateFirewallPolicyRequest.add_member(:firewall_name, Shapes::ShapeRef.new(shape: ResourceName, location_name: "FirewallName"))
|
@@ -350,6 +361,7 @@ module Aws::NetworkFirewall
|
|
350
361
|
CreateRuleGroupRequest.add_member(:dry_run, Shapes::ShapeRef.new(shape: Boolean, location_name: "DryRun"))
|
351
362
|
CreateRuleGroupRequest.add_member(:encryption_configuration, Shapes::ShapeRef.new(shape: EncryptionConfiguration, location_name: "EncryptionConfiguration"))
|
352
363
|
CreateRuleGroupRequest.add_member(:source_metadata, Shapes::ShapeRef.new(shape: SourceMetadata, location_name: "SourceMetadata"))
|
364
|
+
CreateRuleGroupRequest.add_member(:analyze_rule_group, Shapes::ShapeRef.new(shape: Boolean, location_name: "AnalyzeRuleGroup"))
|
353
365
|
CreateRuleGroupRequest.struct_class = Types::CreateRuleGroupRequest
|
354
366
|
|
355
367
|
CreateRuleGroupResponse.add_member(:update_token, Shapes::ShapeRef.new(shape: UpdateToken, required: true, location_name: "UpdateToken"))
|
@@ -457,6 +469,7 @@ module Aws::NetworkFirewall
|
|
457
469
|
DescribeRuleGroupRequest.add_member(:rule_group_name, Shapes::ShapeRef.new(shape: ResourceName, location_name: "RuleGroupName"))
|
458
470
|
DescribeRuleGroupRequest.add_member(:rule_group_arn, Shapes::ShapeRef.new(shape: ResourceArn, location_name: "RuleGroupArn"))
|
459
471
|
DescribeRuleGroupRequest.add_member(:type, Shapes::ShapeRef.new(shape: RuleGroupType, location_name: "Type"))
|
472
|
+
DescribeRuleGroupRequest.add_member(:analyze_rule_group, Shapes::ShapeRef.new(shape: Boolean, location_name: "AnalyzeRuleGroup"))
|
460
473
|
DescribeRuleGroupRequest.struct_class = Types::DescribeRuleGroupRequest
|
461
474
|
|
462
475
|
DescribeRuleGroupResponse.add_member(:update_token, Shapes::ShapeRef.new(shape: UpdateToken, required: true, location_name: "UpdateToken"))
|
@@ -735,10 +748,13 @@ module Aws::NetworkFirewall
|
|
735
748
|
RuleGroupResponse.add_member(:source_metadata, Shapes::ShapeRef.new(shape: SourceMetadata, location_name: "SourceMetadata"))
|
736
749
|
RuleGroupResponse.add_member(:sns_topic, Shapes::ShapeRef.new(shape: ResourceArn, location_name: "SnsTopic"))
|
737
750
|
RuleGroupResponse.add_member(:last_modified_time, Shapes::ShapeRef.new(shape: LastUpdateTime, location_name: "LastModifiedTime"))
|
751
|
+
RuleGroupResponse.add_member(:analysis_results, Shapes::ShapeRef.new(shape: AnalysisResultList, location_name: "AnalysisResults"))
|
738
752
|
RuleGroupResponse.struct_class = Types::RuleGroupResponse
|
739
753
|
|
740
754
|
RuleGroups.member = Shapes::ShapeRef.new(shape: RuleGroupMetadata)
|
741
755
|
|
756
|
+
RuleIdList.member = Shapes::ShapeRef.new(shape: CollectionMember_String)
|
757
|
+
|
742
758
|
RuleOption.add_member(:keyword, Shapes::ShapeRef.new(shape: Keyword, required: true, location_name: "Keyword"))
|
743
759
|
RuleOption.add_member(:settings, Shapes::ShapeRef.new(shape: Settings, location_name: "Settings"))
|
744
760
|
RuleOption.struct_class = Types::RuleOption
|
@@ -993,6 +1009,7 @@ module Aws::NetworkFirewall
|
|
993
1009
|
UpdateRuleGroupRequest.add_member(:dry_run, Shapes::ShapeRef.new(shape: Boolean, location_name: "DryRun"))
|
994
1010
|
UpdateRuleGroupRequest.add_member(:encryption_configuration, Shapes::ShapeRef.new(shape: EncryptionConfiguration, location_name: "EncryptionConfiguration"))
|
995
1011
|
UpdateRuleGroupRequest.add_member(:source_metadata, Shapes::ShapeRef.new(shape: SourceMetadata, location_name: "SourceMetadata"))
|
1012
|
+
UpdateRuleGroupRequest.add_member(:analyze_rule_group, Shapes::ShapeRef.new(shape: Boolean, location_name: "AnalyzeRuleGroup"))
|
996
1013
|
UpdateRuleGroupRequest.struct_class = Types::UpdateRuleGroupRequest
|
997
1014
|
|
998
1015
|
UpdateRuleGroupResponse.add_member(:update_token, Shapes::ShapeRef.new(shape: UpdateToken, required: true, location_name: "UpdateToken"))
|
@@ -74,6 +74,70 @@ module Aws::NetworkFirewall
|
|
74
74
|
include Aws::Structure
|
75
75
|
end
|
76
76
|
|
77
|
+
# The analysis result for Network Firewall's stateless rule group
|
78
|
+
# analyzer. Every time you call CreateRuleGroup, UpdateRuleGroup, or
|
79
|
+
# DescribeRuleGroup on a stateless rule group, Network Firewall analyzes
|
80
|
+
# the stateless rule groups in your account and identifies the rules
|
81
|
+
# that might adversely effect your firewall's functionality. For
|
82
|
+
# example, if Network Firewall detects a rule that's routing traffic
|
83
|
+
# asymmetrically, which impacts the service's ability to properly
|
84
|
+
# process traffic, the service includes the rule in a list of analysis
|
85
|
+
# results.
|
86
|
+
#
|
87
|
+
# @!attribute [rw] identified_rule_ids
|
88
|
+
# The priority number of the stateless rules identified in the
|
89
|
+
# analysis.
|
90
|
+
# @return [Array<String>]
|
91
|
+
#
|
92
|
+
# @!attribute [rw] identified_type
|
93
|
+
# The types of rule configurations that Network Firewall analyzes your
|
94
|
+
# rule groups for. Network Firewall analyzes stateless rule groups for
|
95
|
+
# the following types of rule configurations:
|
96
|
+
#
|
97
|
+
# * `STATELESS_RULE_FORWARDING_ASYMMETRICALLY`
|
98
|
+
#
|
99
|
+
# Cause: One or more stateless rules with the action `pass` or
|
100
|
+
# `forward` are forwarding traffic asymmetrically. Specifically, the
|
101
|
+
# rule's set of source IP addresses or their associated port
|
102
|
+
# numbers, don't match the set of destination IP addresses or their
|
103
|
+
# associated port numbers.
|
104
|
+
#
|
105
|
+
# To mitigate: Make sure that there's an existing return path. For
|
106
|
+
# example, if the rule allows traffic from source 10.1.0.0/24 to
|
107
|
+
# destination 20.1.0.0/24, you should allow return traffic from
|
108
|
+
# source 20.1.0.0/24 to destination 10.1.0.0/24.
|
109
|
+
#
|
110
|
+
# * `STATELESS_RULE_CONTAINS_TCP_FLAGS`
|
111
|
+
#
|
112
|
+
# Cause: At least one stateless rule with the action `pass`
|
113
|
+
# or`forward` contains TCP flags that are inconsistent in the
|
114
|
+
# forward and return directions.
|
115
|
+
#
|
116
|
+
# To mitigate: Prevent asymmetric routing issues caused by TCP flags
|
117
|
+
# by following these actions:
|
118
|
+
#
|
119
|
+
# * Remove unnecessary TCP flag inspections from the rules.
|
120
|
+
#
|
121
|
+
# * If you need to inspect TCP flags, check that the rules correctly
|
122
|
+
# account for changes in TCP flags throughout the TCP connection
|
123
|
+
# cycle, for example `SYN` and `ACK` flags used in a 3-way TCP
|
124
|
+
# handshake.
|
125
|
+
# @return [String]
|
126
|
+
#
|
127
|
+
# @!attribute [rw] analysis_detail
|
128
|
+
# Provides analysis details for the identified rule.
|
129
|
+
# @return [String]
|
130
|
+
#
|
131
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/AnalysisResult AWS API Documentation
|
132
|
+
#
|
133
|
+
class AnalysisResult < Struct.new(
|
134
|
+
:identified_rule_ids,
|
135
|
+
:identified_type,
|
136
|
+
:analysis_detail)
|
137
|
+
SENSITIVE = []
|
138
|
+
include Aws::Structure
|
139
|
+
end
|
140
|
+
|
77
141
|
# @!attribute [rw] update_token
|
78
142
|
# An optional token that you can use for optimistic locking. Network
|
79
143
|
# Firewall returns a token to your requests that access the firewall.
|
@@ -367,13 +431,13 @@ module Aws::NetworkFirewall
|
|
367
431
|
# * **PASS** - Allow the connection to continue, and pass subsequent
|
368
432
|
# packets to the stateful engine for inspection.
|
369
433
|
#
|
370
|
-
# * **DROP** - Network Firewall
|
371
|
-
#
|
434
|
+
# * **DROP** - Network Firewall closes the connection and drops
|
435
|
+
# subsequent packets for that connection.
|
372
436
|
#
|
373
437
|
# * **REJECT** - Network Firewall sends a TCP reject packet back to
|
374
|
-
# your client
|
375
|
-
#
|
376
|
-
#
|
438
|
+
# your client. The service closes the connection and drops
|
439
|
+
# subsequent packets for that connection. `REJECT` is available only
|
440
|
+
# for TCP traffic.
|
377
441
|
# @return [String]
|
378
442
|
#
|
379
443
|
# @!attribute [rw] unknown_status_action
|
@@ -386,13 +450,13 @@ module Aws::NetworkFirewall
|
|
386
450
|
# * **PASS** - Allow the connection to continue, and pass subsequent
|
387
451
|
# packets to the stateful engine for inspection.
|
388
452
|
#
|
389
|
-
# * **DROP** - Network Firewall
|
390
|
-
#
|
453
|
+
# * **DROP** - Network Firewall closes the connection and drops
|
454
|
+
# subsequent packets for that connection.
|
391
455
|
#
|
392
456
|
# * **REJECT** - Network Firewall sends a TCP reject packet back to
|
393
|
-
# your client
|
394
|
-
#
|
395
|
-
#
|
457
|
+
# your client. The service closes the connection and drops
|
458
|
+
# subsequent packets for that connection. `REJECT` is available only
|
459
|
+
# for TCP traffic.
|
396
460
|
# @return [String]
|
397
461
|
#
|
398
462
|
# @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/CheckCertificateRevocationStatusActions AWS API Documentation
|
@@ -704,6 +768,14 @@ module Aws::NetworkFirewall
|
|
704
768
|
# track of updates made to the originating rule group.
|
705
769
|
# @return [Types::SourceMetadata]
|
706
770
|
#
|
771
|
+
# @!attribute [rw] analyze_rule_group
|
772
|
+
# Indicates whether you want Network Firewall to analyze the stateless
|
773
|
+
# rules in the rule group for rule behavior such as asymmetric
|
774
|
+
# routing. If set to `TRUE`, Network Firewall runs the analysis and
|
775
|
+
# then creates the rule group for you. To run the stateless rule group
|
776
|
+
# analyzer without creating the rule group, set `DryRun` to `TRUE`.
|
777
|
+
# @return [Boolean]
|
778
|
+
#
|
707
779
|
# @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/CreateRuleGroupRequest AWS API Documentation
|
708
780
|
#
|
709
781
|
class CreateRuleGroupRequest < Struct.new(
|
@@ -716,7 +788,8 @@ module Aws::NetworkFirewall
|
|
716
788
|
:tags,
|
717
789
|
:dry_run,
|
718
790
|
:encryption_configuration,
|
719
|
-
:source_metadata
|
791
|
+
:source_metadata,
|
792
|
+
:analyze_rule_group)
|
720
793
|
SENSITIVE = []
|
721
794
|
include Aws::Structure
|
722
795
|
end
|
@@ -1382,12 +1455,19 @@ module Aws::NetworkFirewall
|
|
1382
1455
|
# </note>
|
1383
1456
|
# @return [String]
|
1384
1457
|
#
|
1458
|
+
# @!attribute [rw] analyze_rule_group
|
1459
|
+
# Indicates whether you want Network Firewall to analyze the stateless
|
1460
|
+
# rules in the rule group for rule behavior such as asymmetric
|
1461
|
+
# routing. If set to `TRUE`, Network Firewall runs the analysis.
|
1462
|
+
# @return [Boolean]
|
1463
|
+
#
|
1385
1464
|
# @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/DescribeRuleGroupRequest AWS API Documentation
|
1386
1465
|
#
|
1387
1466
|
class DescribeRuleGroupRequest < Struct.new(
|
1388
1467
|
:rule_group_name,
|
1389
1468
|
:rule_group_arn,
|
1390
|
-
:type
|
1469
|
+
:type,
|
1470
|
+
:analyze_rule_group)
|
1391
1471
|
SENSITIVE = []
|
1392
1472
|
include Aws::Structure
|
1393
1473
|
end
|
@@ -3033,7 +3113,12 @@ module Aws::NetworkFirewall
|
|
3033
3113
|
# Additional options governing how Network Firewall handles stateful
|
3034
3114
|
# rules. The policies where you use your stateful rule group must have
|
3035
3115
|
# stateful rule options settings that are compatible with these
|
3036
|
-
# settings.
|
3116
|
+
# settings. Some limitations apply; for more information, see [Strict
|
3117
|
+
# evaluation order][1] in the *Network Firewall Developer Guide*.
|
3118
|
+
#
|
3119
|
+
#
|
3120
|
+
#
|
3121
|
+
# [1]: https://docs.aws.amazon.com/network-firewall/latest/developerguide/suricata-limitations-caveats.html
|
3037
3122
|
# @return [Types::StatefulRuleOptions]
|
3038
3123
|
#
|
3039
3124
|
# @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/RuleGroup AWS API Documentation
|
@@ -3159,6 +3244,17 @@ module Aws::NetworkFirewall
|
|
3159
3244
|
# The last time that the rule group was changed.
|
3160
3245
|
# @return [Time]
|
3161
3246
|
#
|
3247
|
+
# @!attribute [rw] analysis_results
|
3248
|
+
# The list of analysis results for `AnalyzeRuleGroup`. If you set
|
3249
|
+
# `AnalyzeRuleGroup` to `TRUE` in CreateRuleGroup, UpdateRuleGroup, or
|
3250
|
+
# DescribeRuleGroup, Network Firewall analyzes the rule group and
|
3251
|
+
# identifies the rules that might adversely effect your firewall's
|
3252
|
+
# functionality. For example, if Network Firewall detects a rule
|
3253
|
+
# that's routing traffic asymmetrically, which impacts the service's
|
3254
|
+
# ability to properly process traffic, the service includes the rule
|
3255
|
+
# in the list of analysis results.
|
3256
|
+
# @return [Array<Types::AnalysisResult>]
|
3257
|
+
#
|
3162
3258
|
# @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/RuleGroupResponse AWS API Documentation
|
3163
3259
|
#
|
3164
3260
|
class RuleGroupResponse < Struct.new(
|
@@ -3175,7 +3271,8 @@ module Aws::NetworkFirewall
|
|
3175
3271
|
:encryption_configuration,
|
3176
3272
|
:source_metadata,
|
3177
3273
|
:sns_topic,
|
3178
|
-
:last_modified_time
|
3274
|
+
:last_modified_time,
|
3275
|
+
:analysis_results)
|
3179
3276
|
SENSITIVE = []
|
3180
3277
|
include Aws::Structure
|
3181
3278
|
end
|
@@ -3239,14 +3336,18 @@ module Aws::NetworkFirewall
|
|
3239
3336
|
# instance of this for either stateless rules or stateful rules.
|
3240
3337
|
#
|
3241
3338
|
# @!attribute [rw] rules_string
|
3242
|
-
# Stateful inspection criteria, provided in Suricata compatible
|
3243
|
-
#
|
3244
|
-
#
|
3245
|
-
# traffic inspection.
|
3339
|
+
# Stateful inspection criteria, provided in Suricata compatible rules.
|
3340
|
+
# Suricata is an open-source threat detection framework that includes
|
3341
|
+
# a standard rule-based language for network traffic inspection.
|
3246
3342
|
#
|
3247
3343
|
# These rules contain the inspection criteria and the action to take
|
3248
3344
|
# for traffic that matches the criteria, so this type of rule group
|
3249
3345
|
# doesn't have a separate action setting.
|
3346
|
+
#
|
3347
|
+
# <note markdown="1"> You can't use the `priority` keyword if the `RuleOrder` option in
|
3348
|
+
# StatefulRuleOptions is set to `STRICT_ORDER`.
|
3349
|
+
#
|
3350
|
+
# </note>
|
3250
3351
|
# @return [String]
|
3251
3352
|
#
|
3252
3353
|
# @!attribute [rw] rules_source_list
|
@@ -3365,9 +3466,9 @@ module Aws::NetworkFirewall
|
|
3365
3466
|
# TLSInspectionConfiguration. You can configure `ServerCertificates` for
|
3366
3467
|
# inbound SSL/TLS inspection, a `CertificateAuthorityArn` for outbound
|
3367
3468
|
# SSL/TLS inspection, or both. For information about working with
|
3368
|
-
# certificates for TLS inspection, see [
|
3369
|
-
#
|
3370
|
-
#
|
3469
|
+
# certificates for TLS inspection, see [ Using SSL/TLS server
|
3470
|
+
# certficiates with TLS inspection configurations][1] in the *Network
|
3471
|
+
# Firewall Developer Guide*.
|
3371
3472
|
#
|
3372
3473
|
# <note markdown="1"> If a server certificate that's associated with your
|
3373
3474
|
# TLSInspectionConfiguration is revoked, deleted, or expired it can
|
@@ -3380,8 +3481,8 @@ module Aws::NetworkFirewall
|
|
3380
3481
|
# [1]: https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html
|
3381
3482
|
#
|
3382
3483
|
# @!attribute [rw] server_certificates
|
3383
|
-
# The list of
|
3384
|
-
#
|
3484
|
+
# The list of server certificates to use for inbound SSL/TLS
|
3485
|
+
# inspection.
|
3385
3486
|
# @return [Array<Types::ServerCertificate>]
|
3386
3487
|
#
|
3387
3488
|
# @!attribute [rw] scopes
|
@@ -3390,7 +3491,7 @@ module Aws::NetworkFirewall
|
|
3390
3491
|
#
|
3391
3492
|
# @!attribute [rw] certificate_authority_arn
|
3392
3493
|
# The Amazon Resource Name (ARN) of the imported certificate authority
|
3393
|
-
# (CA) certificate
|
3494
|
+
# (CA) certificate within Certificate Manager (ACM) to use for
|
3394
3495
|
# outbound SSL/TLS inspection.
|
3395
3496
|
#
|
3396
3497
|
# The following limitations apply:
|
@@ -3401,8 +3502,8 @@ module Aws::NetworkFirewall
|
|
3401
3502
|
# * You can't use certificates issued by Private Certificate
|
3402
3503
|
# Authority.
|
3403
3504
|
#
|
3404
|
-
# For more information about
|
3405
|
-
# inspection, see [
|
3505
|
+
# For more information about configuring certificates for outbound
|
3506
|
+
# inspection, see [Using SSL/TLS certificates with certificates with
|
3406
3507
|
# TLS inspection configurations][1] in the *Network Firewall Developer
|
3407
3508
|
# Guide*.
|
3408
3509
|
#
|
@@ -3420,8 +3521,9 @@ module Aws::NetworkFirewall
|
|
3420
3521
|
# presented by the server in the SSL/TLS connection has a revoked or
|
3421
3522
|
# unkown status. If the certificate has an unknown or revoked status,
|
3422
3523
|
# you must specify the actions that Network Firewall takes on outbound
|
3423
|
-
# traffic. To
|
3424
|
-
# `CertificateAuthorityArn` in
|
3524
|
+
# traffic. To check the certificate revocation status, you must also
|
3525
|
+
# specify a `CertificateAuthorityArn` in
|
3526
|
+
# ServerCertificateConfiguration.
|
3425
3527
|
# @return [Types::CheckCertificateRevocationStatusActions]
|
3426
3528
|
#
|
3427
3529
|
# @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/ServerCertificateConfiguration AWS API Documentation
|
@@ -3525,11 +3627,17 @@ module Aws::NetworkFirewall
|
|
3525
3627
|
#
|
3526
3628
|
# @!attribute [rw] rule_order
|
3527
3629
|
# Indicates how to manage the order of stateful rule evaluation for
|
3528
|
-
# the policy. `
|
3529
|
-
#
|
3530
|
-
#
|
3531
|
-
#
|
3532
|
-
# the
|
3630
|
+
# the policy. `STRICT_ORDER` is the default and recommended option.
|
3631
|
+
# With `STRICT_ORDER`, provide your rules in the order that you want
|
3632
|
+
# them to be evaluated. You can then choose one or more default
|
3633
|
+
# actions for packets that don't match any rules. Choose
|
3634
|
+
# `STRICT_ORDER` to have the stateful rules engine determine the
|
3635
|
+
# evaluation order of your rules. The default action for this rule
|
3636
|
+
# order is `PASS`, followed by `DROP`, `REJECT`, and `ALERT` actions.
|
3637
|
+
# Stateful rules are provided to the rule engine as Suricata
|
3638
|
+
# compatible strings, and Suricata evaluates them based on your
|
3639
|
+
# settings. For more information, see [Evaluation order for stateful
|
3640
|
+
# rules][1] in the *Network Firewall Developer Guide*.
|
3533
3641
|
#
|
3534
3642
|
#
|
3535
3643
|
#
|
@@ -3596,9 +3704,8 @@ module Aws::NetworkFirewall
|
|
3596
3704
|
# destination and sends an alert log message, if alert logging is
|
3597
3705
|
# configured in the Firewall LoggingConfiguration.
|
3598
3706
|
#
|
3599
|
-
# * **ALERT** -
|
3600
|
-
#
|
3601
|
-
# the Firewall LoggingConfiguration.
|
3707
|
+
# * **ALERT** - Sends an alert log message, if alert logging is
|
3708
|
+
# configured in the Firewall LoggingConfiguration.
|
3602
3709
|
#
|
3603
3710
|
# You can use this action to test a rule that you intend to use to
|
3604
3711
|
# drop traffic. You can enable the rule with `ALERT` action, verify
|
@@ -4803,6 +4910,14 @@ module Aws::NetworkFirewall
|
|
4803
4910
|
# track of updates made to the originating rule group.
|
4804
4911
|
# @return [Types::SourceMetadata]
|
4805
4912
|
#
|
4913
|
+
# @!attribute [rw] analyze_rule_group
|
4914
|
+
# Indicates whether you want Network Firewall to analyze the stateless
|
4915
|
+
# rules in the rule group for rule behavior such as asymmetric
|
4916
|
+
# routing. If set to `TRUE`, Network Firewall runs the analysis and
|
4917
|
+
# then updates the rule group for you. To run the stateless rule group
|
4918
|
+
# analyzer without updating the rule group, set `DryRun` to `TRUE`.
|
4919
|
+
# @return [Boolean]
|
4920
|
+
#
|
4806
4921
|
# @see http://docs.aws.amazon.com/goto/WebAPI/network-firewall-2020-11-12/UpdateRuleGroupRequest AWS API Documentation
|
4807
4922
|
#
|
4808
4923
|
class UpdateRuleGroupRequest < Struct.new(
|
@@ -4815,7 +4930,8 @@ module Aws::NetworkFirewall
|
|
4815
4930
|
:description,
|
4816
4931
|
:dry_run,
|
4817
4932
|
:encryption_configuration,
|
4818
|
-
:source_metadata
|
4933
|
+
:source_metadata,
|
4934
|
+
:analyze_rule_group)
|
4819
4935
|
SENSITIVE = []
|
4820
4936
|
include Aws::Structure
|
4821
4937
|
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-networkfirewall
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.37.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2023-
|
11
|
+
date: 2023-11-02 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|