@aws-sdk/client-network-firewall 3.301.0 → 3.303.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +40 -0
- package/dist-cjs/NetworkFirewall.js +75 -0
- package/dist-cjs/commands/CreateTLSInspectionConfigurationCommand.js +45 -0
- package/dist-cjs/commands/DeleteTLSInspectionConfigurationCommand.js +45 -0
- package/dist-cjs/commands/DescribeTLSInspectionConfigurationCommand.js +45 -0
- package/dist-cjs/commands/ListTLSInspectionConfigurationsCommand.js +45 -0
- package/dist-cjs/commands/UpdateTLSInspectionConfigurationCommand.js +45 -0
- package/dist-cjs/commands/index.js +5 -0
- package/dist-cjs/endpoint/ruleset.js +3 -3
- package/dist-cjs/models/models_0.js +114 -135
- package/dist-cjs/pagination/ListTLSInspectionConfigurationsPaginator.js +29 -0
- package/dist-cjs/pagination/index.js +1 -0
- package/dist-cjs/protocols/Aws_json1_0.js +540 -2
- package/dist-es/NetworkFirewall.js +75 -0
- package/dist-es/commands/CreateTLSInspectionConfigurationCommand.js +41 -0
- package/dist-es/commands/DeleteTLSInspectionConfigurationCommand.js +41 -0
- package/dist-es/commands/DescribeTLSInspectionConfigurationCommand.js +41 -0
- package/dist-es/commands/ListTLSInspectionConfigurationsCommand.js +41 -0
- package/dist-es/commands/UpdateTLSInspectionConfigurationCommand.js +41 -0
- package/dist-es/commands/index.js +5 -0
- package/dist-es/endpoint/ruleset.js +3 -3
- package/dist-es/models/models_0.js +114 -135
- package/dist-es/pagination/ListTLSInspectionConfigurationsPaginator.js +25 -0
- package/dist-es/pagination/index.js +1 -0
- package/dist-es/protocols/Aws_json1_0.js +528 -0
- package/dist-types/NetworkFirewall.d.ts +53 -0
- package/dist-types/NetworkFirewallClient.d.ts +7 -2
- package/dist-types/commands/CreateFirewallPolicyCommand.d.ts +1 -0
- package/dist-types/commands/CreateTLSInspectionConfigurationCommand.d.ts +145 -0
- package/dist-types/commands/DeleteTLSInspectionConfigurationCommand.d.ts +94 -0
- package/dist-types/commands/DescribeTLSInspectionConfigurationCommand.d.ts +90 -0
- package/dist-types/commands/ListTLSInspectionConfigurationsCommand.d.ts +87 -0
- package/dist-types/commands/UpdateFirewallPolicyCommand.d.ts +1 -0
- package/dist-types/commands/UpdateTLSInspectionConfigurationCommand.d.ts +144 -0
- package/dist-types/commands/index.d.ts +5 -0
- package/dist-types/endpoint/EndpointParameters.d.ts +1 -1
- package/dist-types/models/models_0.d.ts +558 -115
- package/dist-types/pagination/ListTLSInspectionConfigurationsPaginator.d.ts +7 -0
- package/dist-types/pagination/index.d.ts +1 -0
- package/dist-types/protocols/Aws_json1_0.d.ts +15 -0
- package/dist-types/ts3.4/NetworkFirewall.d.ts +91 -0
- package/dist-types/ts3.4/NetworkFirewallClient.d.ts +32 -2
- package/dist-types/ts3.4/commands/CreateTLSInspectionConfigurationCommand.d.ts +41 -0
- package/dist-types/ts3.4/commands/DeleteTLSInspectionConfigurationCommand.d.ts +41 -0
- package/dist-types/ts3.4/commands/DescribeTLSInspectionConfigurationCommand.d.ts +41 -0
- package/dist-types/ts3.4/commands/ListTLSInspectionConfigurationsCommand.d.ts +41 -0
- package/dist-types/ts3.4/commands/UpdateTLSInspectionConfigurationCommand.d.ts +41 -0
- package/dist-types/ts3.4/commands/index.d.ts +5 -0
- package/dist-types/ts3.4/endpoint/EndpointParameters.d.ts +1 -1
- package/dist-types/ts3.4/models/models_0.d.ts +244 -113
- package/dist-types/ts3.4/pagination/ListTLSInspectionConfigurationsPaginator.d.ts +11 -0
- package/dist-types/ts3.4/pagination/index.d.ts +1 -0
- package/dist-types/ts3.4/protocols/Aws_json1_0.d.ts +60 -0
- package/package.json +34 -34
|
@@ -214,11 +214,16 @@ export declare class ThrottlingException extends __BaseException {
|
|
|
214
214
|
}
|
|
215
215
|
/**
|
|
216
216
|
* @public
|
|
217
|
+
* @enum
|
|
217
218
|
*/
|
|
218
|
-
export declare
|
|
219
|
-
DUALSTACK
|
|
220
|
-
IPV4
|
|
221
|
-
}
|
|
219
|
+
export declare const IPAddressType: {
|
|
220
|
+
readonly DUALSTACK: "DUALSTACK";
|
|
221
|
+
readonly IPV4: "IPV4";
|
|
222
|
+
};
|
|
223
|
+
/**
|
|
224
|
+
* @public
|
|
225
|
+
*/
|
|
226
|
+
export type IPAddressType = (typeof IPAddressType)[keyof typeof IPAddressType];
|
|
222
227
|
/**
|
|
223
228
|
* @public
|
|
224
229
|
* <p>The ID for a subnet that you want to associate with the firewall. This is used with
|
|
@@ -300,13 +305,18 @@ export declare class InsufficientCapacityException extends __BaseException {
|
|
|
300
305
|
}
|
|
301
306
|
/**
|
|
302
307
|
* @public
|
|
308
|
+
* @enum
|
|
303
309
|
*/
|
|
304
|
-
export declare
|
|
305
|
-
CREATING
|
|
306
|
-
DELETING
|
|
307
|
-
READY
|
|
308
|
-
SCALING
|
|
309
|
-
}
|
|
310
|
+
export declare const AttachmentStatus: {
|
|
311
|
+
readonly CREATING: "CREATING";
|
|
312
|
+
readonly DELETING: "DELETING";
|
|
313
|
+
readonly READY: "READY";
|
|
314
|
+
readonly SCALING: "SCALING";
|
|
315
|
+
};
|
|
316
|
+
/**
|
|
317
|
+
* @public
|
|
318
|
+
*/
|
|
319
|
+
export type AttachmentStatus = (typeof AttachmentStatus)[keyof typeof AttachmentStatus];
|
|
310
320
|
/**
|
|
311
321
|
* @public
|
|
312
322
|
* <p>The configuration and status for a single subnet that you've specified for use by the
|
|
@@ -378,19 +388,51 @@ export interface CapacityUsageSummary {
|
|
|
378
388
|
}
|
|
379
389
|
/**
|
|
380
390
|
* @public
|
|
391
|
+
* <p>Contains metadata about an Certificate Manager certificate.</p>
|
|
381
392
|
*/
|
|
382
|
-
export
|
|
383
|
-
|
|
384
|
-
|
|
385
|
-
|
|
393
|
+
export interface TlsCertificateData {
|
|
394
|
+
/**
|
|
395
|
+
* <p>The Amazon Resource Name (ARN) of the certificate.</p>
|
|
396
|
+
*/
|
|
397
|
+
CertificateArn?: string;
|
|
398
|
+
/**
|
|
399
|
+
* <p>The serial number of the certificate.</p>
|
|
400
|
+
*/
|
|
401
|
+
CertificateSerial?: string;
|
|
402
|
+
/**
|
|
403
|
+
* <p>The status of the certificate.</p>
|
|
404
|
+
*/
|
|
405
|
+
Status?: string;
|
|
406
|
+
/**
|
|
407
|
+
* <p>Contains details about the certificate status, including information about certificate errors.</p>
|
|
408
|
+
*/
|
|
409
|
+
StatusMessage?: string;
|
|
386
410
|
}
|
|
387
411
|
/**
|
|
388
412
|
* @public
|
|
413
|
+
* @enum
|
|
389
414
|
*/
|
|
390
|
-
export declare
|
|
391
|
-
|
|
392
|
-
|
|
393
|
-
|
|
415
|
+
export declare const ConfigurationSyncState: {
|
|
416
|
+
readonly CAPACITY_CONSTRAINED: "CAPACITY_CONSTRAINED";
|
|
417
|
+
readonly IN_SYNC: "IN_SYNC";
|
|
418
|
+
readonly PENDING: "PENDING";
|
|
419
|
+
};
|
|
420
|
+
/**
|
|
421
|
+
* @public
|
|
422
|
+
*/
|
|
423
|
+
export type ConfigurationSyncState = (typeof ConfigurationSyncState)[keyof typeof ConfigurationSyncState];
|
|
424
|
+
/**
|
|
425
|
+
* @public
|
|
426
|
+
* @enum
|
|
427
|
+
*/
|
|
428
|
+
export declare const EncryptionType: {
|
|
429
|
+
readonly AWS_OWNED_KMS_KEY: "AWS_OWNED_KMS_KEY";
|
|
430
|
+
readonly CUSTOMER_KMS: "CUSTOMER_KMS";
|
|
431
|
+
};
|
|
432
|
+
/**
|
|
433
|
+
* @public
|
|
434
|
+
*/
|
|
435
|
+
export type EncryptionType = (typeof EncryptionType)[keyof typeof EncryptionType];
|
|
394
436
|
/**
|
|
395
437
|
* @public
|
|
396
438
|
* <p>A complex type that contains optional Amazon Web Services Key Management Service (KMS) encryption settings for your Network Firewall resources. Your data is encrypted by default with an Amazon Web Services owned key that Amazon Web Services owns and manages for you. You can use either the Amazon Web Services owned key, or provide your own customer managed key. To learn more about KMS encryption of your Network Firewall resources, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-encryption-at-rest.html">Encryption at rest with Amazon Web Services Key Managment Service</a> in the <i>Network Firewall Developer Guide</i>.</p>
|
|
@@ -549,20 +591,30 @@ export interface Firewall {
|
|
|
549
591
|
}
|
|
550
592
|
/**
|
|
551
593
|
* @public
|
|
594
|
+
* @enum
|
|
552
595
|
*/
|
|
553
|
-
export declare
|
|
554
|
-
DELETING
|
|
555
|
-
PROVISIONING
|
|
556
|
-
READY
|
|
557
|
-
}
|
|
596
|
+
export declare const FirewallStatusValue: {
|
|
597
|
+
readonly DELETING: "DELETING";
|
|
598
|
+
readonly PROVISIONING: "PROVISIONING";
|
|
599
|
+
readonly READY: "READY";
|
|
600
|
+
};
|
|
558
601
|
/**
|
|
559
602
|
* @public
|
|
560
603
|
*/
|
|
561
|
-
export
|
|
562
|
-
|
|
563
|
-
|
|
564
|
-
|
|
565
|
-
|
|
604
|
+
export type FirewallStatusValue = (typeof FirewallStatusValue)[keyof typeof FirewallStatusValue];
|
|
605
|
+
/**
|
|
606
|
+
* @public
|
|
607
|
+
* @enum
|
|
608
|
+
*/
|
|
609
|
+
export declare const PerObjectSyncStatus: {
|
|
610
|
+
readonly CAPACITY_CONSTRAINED: "CAPACITY_CONSTRAINED";
|
|
611
|
+
readonly IN_SYNC: "IN_SYNC";
|
|
612
|
+
readonly PENDING: "PENDING";
|
|
613
|
+
};
|
|
614
|
+
/**
|
|
615
|
+
* @public
|
|
616
|
+
*/
|
|
617
|
+
export type PerObjectSyncStatus = (typeof PerObjectSyncStatus)[keyof typeof PerObjectSyncStatus];
|
|
566
618
|
/**
|
|
567
619
|
* @public
|
|
568
620
|
* <p>Provides configuration status for a single policy or rule group that is used for a firewall endpoint. Network Firewall
|
|
@@ -682,18 +734,28 @@ export declare class LimitExceededException extends __BaseException {
|
|
|
682
734
|
}
|
|
683
735
|
/**
|
|
684
736
|
* @public
|
|
737
|
+
* @enum
|
|
685
738
|
*/
|
|
686
|
-
export declare
|
|
687
|
-
DEFAULT_ACTION_ORDER
|
|
688
|
-
STRICT_ORDER
|
|
689
|
-
}
|
|
739
|
+
export declare const RuleOrder: {
|
|
740
|
+
readonly DEFAULT_ACTION_ORDER: "DEFAULT_ACTION_ORDER";
|
|
741
|
+
readonly STRICT_ORDER: "STRICT_ORDER";
|
|
742
|
+
};
|
|
690
743
|
/**
|
|
691
744
|
* @public
|
|
692
745
|
*/
|
|
693
|
-
export
|
|
694
|
-
|
|
695
|
-
|
|
696
|
-
|
|
746
|
+
export type RuleOrder = (typeof RuleOrder)[keyof typeof RuleOrder];
|
|
747
|
+
/**
|
|
748
|
+
* @public
|
|
749
|
+
* @enum
|
|
750
|
+
*/
|
|
751
|
+
export declare const StreamExceptionPolicy: {
|
|
752
|
+
readonly CONTINUE: "CONTINUE";
|
|
753
|
+
readonly DROP: "DROP";
|
|
754
|
+
};
|
|
755
|
+
/**
|
|
756
|
+
* @public
|
|
757
|
+
*/
|
|
758
|
+
export type StreamExceptionPolicy = (typeof StreamExceptionPolicy)[keyof typeof StreamExceptionPolicy];
|
|
697
759
|
/**
|
|
698
760
|
* @public
|
|
699
761
|
* <p>Configuration settings for the handling of the stateful rule groups in a firewall policy. </p>
|
|
@@ -724,10 +786,15 @@ export interface StatefulEngineOptions {
|
|
|
724
786
|
}
|
|
725
787
|
/**
|
|
726
788
|
* @public
|
|
789
|
+
* @enum
|
|
727
790
|
*/
|
|
728
|
-
export declare
|
|
729
|
-
DROP_TO_ALERT
|
|
730
|
-
}
|
|
791
|
+
export declare const OverrideAction: {
|
|
792
|
+
readonly DROP_TO_ALERT: "DROP_TO_ALERT";
|
|
793
|
+
};
|
|
794
|
+
/**
|
|
795
|
+
* @public
|
|
796
|
+
*/
|
|
797
|
+
export type OverrideAction = (typeof OverrideAction)[keyof typeof OverrideAction];
|
|
731
798
|
/**
|
|
732
799
|
* @public
|
|
733
800
|
* <p>The setting that allows the policy owner to change the behavior of the rule group within a policy. </p>
|
|
@@ -896,6 +963,10 @@ export interface FirewallPolicy {
|
|
|
896
963
|
* rule groups that you use in your policy must have stateful rule options settings that are compatible with these settings.</p>
|
|
897
964
|
*/
|
|
898
965
|
StatefulEngineOptions?: StatefulEngineOptions;
|
|
966
|
+
/**
|
|
967
|
+
* <p>The Amazon Resource Name (ARN) of the TLS inspection configuration.</p>
|
|
968
|
+
*/
|
|
969
|
+
TLSInspectionConfigurationArn?: string;
|
|
899
970
|
}
|
|
900
971
|
/**
|
|
901
972
|
* @public
|
|
@@ -933,11 +1004,16 @@ export interface CreateFirewallPolicyRequest {
|
|
|
933
1004
|
}
|
|
934
1005
|
/**
|
|
935
1006
|
* @public
|
|
1007
|
+
* @enum
|
|
936
1008
|
*/
|
|
937
|
-
export declare
|
|
938
|
-
ACTIVE
|
|
939
|
-
DELETING
|
|
940
|
-
}
|
|
1009
|
+
export declare const ResourceStatus: {
|
|
1010
|
+
readonly ACTIVE: "ACTIVE";
|
|
1011
|
+
readonly DELETING: "DELETING";
|
|
1012
|
+
};
|
|
1013
|
+
/**
|
|
1014
|
+
* @public
|
|
1015
|
+
*/
|
|
1016
|
+
export type ResourceStatus = (typeof ResourceStatus)[keyof typeof ResourceStatus];
|
|
941
1017
|
/**
|
|
942
1018
|
* @public
|
|
943
1019
|
* <p>The high-level properties of a firewall policy. This, along with the <a>FirewallPolicy</a>, define the policy. You can retrieve all objects for a firewall policy by calling <a>DescribeFirewallPolicy</a>. </p>
|
|
@@ -1011,9 +1087,9 @@ export interface CreateFirewallPolicyResponse {
|
|
|
1011
1087
|
}
|
|
1012
1088
|
/**
|
|
1013
1089
|
* @public
|
|
1014
|
-
* <p>Configures one or more IP set references for a Suricata-compatible rule group. This is used in <a>CreateRuleGroup</a> or <a>UpdateRuleGroup</a>. An IP set reference is a rule variable that references
|
|
1090
|
+
* <p>Configures one or more IP set references for a Suricata-compatible rule group. This is used in <a>CreateRuleGroup</a> or <a>UpdateRuleGroup</a>. An IP set reference is a rule variable that references resources that you create and manage in another Amazon Web Services service, such as an Amazon VPC prefix list. Network Firewall IP set references enable you to dynamically update the contents of your rules. When you create, update, or delete the resource you are referencing in your rule, Network Firewall automatically updates the rule's content with the changes. For more information about IP set references in Network Firewall, see <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/rule-groups-ip-set-references">Using IP set references</a> in the <i>Network Firewall Developer Guide</i>.</p>
|
|
1015
1091
|
* <p>
|
|
1016
|
-
* Network Firewall currently supports
|
|
1092
|
+
* Network Firewall currently supports <a href="https://docs.aws.amazon.com/vpc/latest/userguide/managed-prefix-lists.html">Amazon VPC prefix lists</a> and <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/rule-groups-ip-set-references.html#rule-groups-referencing-resource-groups">resource groups</a> in IP set references.
|
|
1017
1093
|
* </p>
|
|
1018
1094
|
*/
|
|
1019
1095
|
export interface IPSetReference {
|
|
@@ -1034,18 +1110,28 @@ export interface ReferenceSets {
|
|
|
1034
1110
|
}
|
|
1035
1111
|
/**
|
|
1036
1112
|
* @public
|
|
1113
|
+
* @enum
|
|
1037
1114
|
*/
|
|
1038
|
-
export declare
|
|
1039
|
-
ALLOWLIST
|
|
1040
|
-
DENYLIST
|
|
1041
|
-
}
|
|
1115
|
+
export declare const GeneratedRulesType: {
|
|
1116
|
+
readonly ALLOWLIST: "ALLOWLIST";
|
|
1117
|
+
readonly DENYLIST: "DENYLIST";
|
|
1118
|
+
};
|
|
1042
1119
|
/**
|
|
1043
1120
|
* @public
|
|
1044
1121
|
*/
|
|
1045
|
-
export
|
|
1046
|
-
|
|
1047
|
-
|
|
1048
|
-
|
|
1122
|
+
export type GeneratedRulesType = (typeof GeneratedRulesType)[keyof typeof GeneratedRulesType];
|
|
1123
|
+
/**
|
|
1124
|
+
* @public
|
|
1125
|
+
* @enum
|
|
1126
|
+
*/
|
|
1127
|
+
export declare const TargetType: {
|
|
1128
|
+
readonly HTTP_HOST: "HTTP_HOST";
|
|
1129
|
+
readonly TLS_SNI: "TLS_SNI";
|
|
1130
|
+
};
|
|
1131
|
+
/**
|
|
1132
|
+
* @public
|
|
1133
|
+
*/
|
|
1134
|
+
export type TargetType = (typeof TargetType)[keyof typeof TargetType];
|
|
1049
1135
|
/**
|
|
1050
1136
|
* @public
|
|
1051
1137
|
* <p>Stateful inspection criteria for a domain list rule group. </p>
|
|
@@ -1076,44 +1162,59 @@ export interface RulesSourceList {
|
|
|
1076
1162
|
}
|
|
1077
1163
|
/**
|
|
1078
1164
|
* @public
|
|
1165
|
+
* @enum
|
|
1079
1166
|
*/
|
|
1080
|
-
export declare
|
|
1081
|
-
ALERT
|
|
1082
|
-
DROP
|
|
1083
|
-
PASS
|
|
1084
|
-
REJECT
|
|
1085
|
-
}
|
|
1167
|
+
export declare const StatefulAction: {
|
|
1168
|
+
readonly ALERT: "ALERT";
|
|
1169
|
+
readonly DROP: "DROP";
|
|
1170
|
+
readonly PASS: "PASS";
|
|
1171
|
+
readonly REJECT: "REJECT";
|
|
1172
|
+
};
|
|
1086
1173
|
/**
|
|
1087
1174
|
* @public
|
|
1088
1175
|
*/
|
|
1089
|
-
export
|
|
1090
|
-
ANY = "ANY",
|
|
1091
|
-
FORWARD = "FORWARD"
|
|
1092
|
-
}
|
|
1176
|
+
export type StatefulAction = (typeof StatefulAction)[keyof typeof StatefulAction];
|
|
1093
1177
|
/**
|
|
1094
1178
|
* @public
|
|
1179
|
+
* @enum
|
|
1095
1180
|
*/
|
|
1096
|
-
export declare
|
|
1097
|
-
ANY
|
|
1098
|
-
|
|
1099
|
-
|
|
1100
|
-
|
|
1101
|
-
|
|
1102
|
-
|
|
1103
|
-
|
|
1104
|
-
|
|
1105
|
-
|
|
1106
|
-
|
|
1107
|
-
|
|
1108
|
-
|
|
1109
|
-
|
|
1110
|
-
|
|
1111
|
-
|
|
1112
|
-
|
|
1113
|
-
|
|
1114
|
-
|
|
1115
|
-
|
|
1116
|
-
|
|
1181
|
+
export declare const StatefulRuleDirection: {
|
|
1182
|
+
readonly ANY: "ANY";
|
|
1183
|
+
readonly FORWARD: "FORWARD";
|
|
1184
|
+
};
|
|
1185
|
+
/**
|
|
1186
|
+
* @public
|
|
1187
|
+
*/
|
|
1188
|
+
export type StatefulRuleDirection = (typeof StatefulRuleDirection)[keyof typeof StatefulRuleDirection];
|
|
1189
|
+
/**
|
|
1190
|
+
* @public
|
|
1191
|
+
* @enum
|
|
1192
|
+
*/
|
|
1193
|
+
export declare const StatefulRuleProtocol: {
|
|
1194
|
+
readonly ANY: "IP";
|
|
1195
|
+
readonly DCERPC: "DCERPC";
|
|
1196
|
+
readonly DHCP: "DHCP";
|
|
1197
|
+
readonly DNS: "DNS";
|
|
1198
|
+
readonly FTP: "FTP";
|
|
1199
|
+
readonly HTTP: "HTTP";
|
|
1200
|
+
readonly ICMP: "ICMP";
|
|
1201
|
+
readonly IKEV2: "IKEV2";
|
|
1202
|
+
readonly IMAP: "IMAP";
|
|
1203
|
+
readonly KRB5: "KRB5";
|
|
1204
|
+
readonly MSN: "MSN";
|
|
1205
|
+
readonly NTP: "NTP";
|
|
1206
|
+
readonly SMB: "SMB";
|
|
1207
|
+
readonly SMTP: "SMTP";
|
|
1208
|
+
readonly SSH: "SSH";
|
|
1209
|
+
readonly TCP: "TCP";
|
|
1210
|
+
readonly TFTP: "TFTP";
|
|
1211
|
+
readonly TLS: "TLS";
|
|
1212
|
+
readonly UDP: "UDP";
|
|
1213
|
+
};
|
|
1214
|
+
/**
|
|
1215
|
+
* @public
|
|
1216
|
+
*/
|
|
1217
|
+
export type StatefulRuleProtocol = (typeof StatefulRuleProtocol)[keyof typeof StatefulRuleProtocol];
|
|
1117
1218
|
/**
|
|
1118
1219
|
* @public
|
|
1119
1220
|
* <p>The basic rule criteria for Network Firewall to use to inspect packet headers in stateful
|
|
@@ -1281,17 +1382,22 @@ export interface PortRange {
|
|
|
1281
1382
|
}
|
|
1282
1383
|
/**
|
|
1283
1384
|
* @public
|
|
1385
|
+
* @enum
|
|
1284
1386
|
*/
|
|
1285
|
-
export declare
|
|
1286
|
-
ACK
|
|
1287
|
-
CWR
|
|
1288
|
-
ECE
|
|
1289
|
-
FIN
|
|
1290
|
-
PSH
|
|
1291
|
-
RST
|
|
1292
|
-
SYN
|
|
1293
|
-
URG
|
|
1294
|
-
}
|
|
1387
|
+
export declare const TCPFlag: {
|
|
1388
|
+
readonly ACK: "ACK";
|
|
1389
|
+
readonly CWR: "CWR";
|
|
1390
|
+
readonly ECE: "ECE";
|
|
1391
|
+
readonly FIN: "FIN";
|
|
1392
|
+
readonly PSH: "PSH";
|
|
1393
|
+
readonly RST: "RST";
|
|
1394
|
+
readonly SYN: "SYN";
|
|
1395
|
+
readonly URG: "URG";
|
|
1396
|
+
};
|
|
1397
|
+
/**
|
|
1398
|
+
* @public
|
|
1399
|
+
*/
|
|
1400
|
+
export type TCPFlag = (typeof TCPFlag)[keyof typeof TCPFlag];
|
|
1295
1401
|
/**
|
|
1296
1402
|
* @public
|
|
1297
1403
|
* <p>TCP flags and masks to inspect packets for, used in stateless rules <a>MatchAttributes</a> settings.</p>
|
|
@@ -1581,11 +1687,16 @@ export interface SourceMetadata {
|
|
|
1581
1687
|
}
|
|
1582
1688
|
/**
|
|
1583
1689
|
* @public
|
|
1690
|
+
* @enum
|
|
1584
1691
|
*/
|
|
1585
|
-
export declare
|
|
1586
|
-
STATEFUL
|
|
1587
|
-
STATELESS
|
|
1588
|
-
}
|
|
1692
|
+
export declare const RuleGroupType: {
|
|
1693
|
+
readonly STATEFUL: "STATEFUL";
|
|
1694
|
+
readonly STATELESS: "STATELESS";
|
|
1695
|
+
};
|
|
1696
|
+
/**
|
|
1697
|
+
* @public
|
|
1698
|
+
*/
|
|
1699
|
+
export type RuleGroupType = (typeof RuleGroupType)[keyof typeof RuleGroupType];
|
|
1589
1700
|
/**
|
|
1590
1701
|
* @public
|
|
1591
1702
|
*/
|
|
@@ -1775,6 +1886,165 @@ export interface CreateRuleGroupResponse {
|
|
|
1775
1886
|
*/
|
|
1776
1887
|
RuleGroupResponse: RuleGroupResponse | undefined;
|
|
1777
1888
|
}
|
|
1889
|
+
/**
|
|
1890
|
+
* @public
|
|
1891
|
+
* <p>Settings that define the Secure Sockets Layer/Transport Layer Security (SSL/TLS) traffic that Network Firewall should decrypt for inspection by the stateful rule engine.</p>
|
|
1892
|
+
*/
|
|
1893
|
+
export interface ServerCertificateScope {
|
|
1894
|
+
/**
|
|
1895
|
+
* <p>The source IP addresses and address ranges to decrypt for inspection, in CIDR notation. If not specified, this
|
|
1896
|
+
* matches with any source address.</p>
|
|
1897
|
+
*/
|
|
1898
|
+
Sources?: Address[];
|
|
1899
|
+
/**
|
|
1900
|
+
* <p>The destination IP addresses and address ranges to decrypt for inspection, in CIDR notation. If not specified, this
|
|
1901
|
+
* matches with any destination address.</p>
|
|
1902
|
+
*/
|
|
1903
|
+
Destinations?: Address[];
|
|
1904
|
+
/**
|
|
1905
|
+
* <p>The source ports to decrypt for inspection, in Transmission Control Protocol (TCP) format. If not specified, this matches with any source port.</p>
|
|
1906
|
+
* <p>You can specify individual ports, for example <code>1994</code>, and you can specify port ranges, such as <code>1990:1994</code>.</p>
|
|
1907
|
+
*/
|
|
1908
|
+
SourcePorts?: PortRange[];
|
|
1909
|
+
/**
|
|
1910
|
+
* <p>The destination ports to decrypt for inspection, in Transmission Control Protocol (TCP) format. If not specified, this matches with any destination port.</p>
|
|
1911
|
+
* <p>You can specify individual ports, for example <code>1994</code>, and you can specify port ranges, such as <code>1990:1994</code>.</p>
|
|
1912
|
+
*/
|
|
1913
|
+
DestinationPorts?: PortRange[];
|
|
1914
|
+
/**
|
|
1915
|
+
* <p>The protocols to decrypt for inspection, specified using each protocol's assigned internet protocol number
|
|
1916
|
+
* (IANA). Network Firewall currently supports only TCP.</p>
|
|
1917
|
+
*/
|
|
1918
|
+
Protocols?: number[];
|
|
1919
|
+
}
|
|
1920
|
+
/**
|
|
1921
|
+
* @public
|
|
1922
|
+
* <p>Any Certificate Manager Secure Sockets Layer/Transport Layer Security (SSL/TLS) server certificate that's associated with a <a>ServerCertificateConfiguration</a> used in a <a>TLSInspectionConfiguration</a>. You must request or import a SSL/TLS certificate into ACM for each domain Network Firewall needs to decrypt and inspect. Network Firewall uses the SSL/TLS certificates to decrypt specified inbound SSL/TLS traffic going to your firewall. For information about working with certificates in Certificate Manager, see <a href="https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-request-public.html">Request a public certificate </a> or <a href="https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html">Importing certificates</a> in the <i>Certificate Manager User Guide</i>.</p>
|
|
1923
|
+
*/
|
|
1924
|
+
export interface ServerCertificate {
|
|
1925
|
+
/**
|
|
1926
|
+
* <p>The Amazon Resource Name (ARN) of the Certificate Manager SSL/TLS server certificate.</p>
|
|
1927
|
+
*/
|
|
1928
|
+
ResourceArn?: string;
|
|
1929
|
+
}
|
|
1930
|
+
/**
|
|
1931
|
+
* @public
|
|
1932
|
+
* <p>Configures the associated Certificate Manager Secure Sockets Layer/Transport Layer Security (SSL/TLS) server certificates and scope settings Network Firewall uses to decrypt traffic in a <a>TLSInspectionConfiguration</a>. For information about working with SSL/TLS certificates for TLS inspection, see <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html"> Requirements for using SSL/TLS server certficiates with TLS inspection configurations</a> in the <i>Network Firewall Developer Guide</i>.</p>
|
|
1933
|
+
* <note>
|
|
1934
|
+
* <p>If a server certificate that's associated with your <a>TLSInspectionConfiguration</a> is revoked, deleted, or expired it can result in client-side TLS errors.</p>
|
|
1935
|
+
* </note>
|
|
1936
|
+
*/
|
|
1937
|
+
export interface ServerCertificateConfiguration {
|
|
1938
|
+
/**
|
|
1939
|
+
* <p>The list of a server certificate configuration's Certificate Manager SSL/TLS certificates.</p>
|
|
1940
|
+
*/
|
|
1941
|
+
ServerCertificates?: ServerCertificate[];
|
|
1942
|
+
/**
|
|
1943
|
+
* <p>A list of a server certificate configuration's scopes.</p>
|
|
1944
|
+
*/
|
|
1945
|
+
Scopes?: ServerCertificateScope[];
|
|
1946
|
+
}
|
|
1947
|
+
/**
|
|
1948
|
+
* @public
|
|
1949
|
+
* <p>The object that defines a TLS inspection configuration. This, along with <a>TLSInspectionConfigurationResponse</a>, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling <a>DescribeTLSInspectionConfiguration</a>. </p>
|
|
1950
|
+
* <p>Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination.</p>
|
|
1951
|
+
* <p>To use a TLS inspection configuration, you add it to a Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html">Decrypting SSL/TLS traffic with TLS
|
|
1952
|
+
* inspection configurations</a> in the <i>Network Firewall Developer Guide</i>.</p>
|
|
1953
|
+
*/
|
|
1954
|
+
export interface TLSInspectionConfiguration {
|
|
1955
|
+
/**
|
|
1956
|
+
* <p>Lists the server certificate configurations that are associated with the TLS configuration.</p>
|
|
1957
|
+
*/
|
|
1958
|
+
ServerCertificateConfigurations?: ServerCertificateConfiguration[];
|
|
1959
|
+
}
|
|
1960
|
+
/**
|
|
1961
|
+
* @public
|
|
1962
|
+
*/
|
|
1963
|
+
export interface CreateTLSInspectionConfigurationRequest {
|
|
1964
|
+
/**
|
|
1965
|
+
* <p>The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.</p>
|
|
1966
|
+
*/
|
|
1967
|
+
TLSInspectionConfigurationName: string | undefined;
|
|
1968
|
+
/**
|
|
1969
|
+
* <p>The object that defines a TLS inspection configuration. This, along with <a>TLSInspectionConfigurationResponse</a>, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling <a>DescribeTLSInspectionConfiguration</a>. </p>
|
|
1970
|
+
* <p>Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination.</p>
|
|
1971
|
+
* <p>To use a TLS inspection configuration, you add it to a Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html">Decrypting SSL/TLS traffic with TLS
|
|
1972
|
+
* inspection configurations</a> in the <i>Network Firewall Developer Guide</i>.</p>
|
|
1973
|
+
*/
|
|
1974
|
+
TLSInspectionConfiguration: TLSInspectionConfiguration | undefined;
|
|
1975
|
+
/**
|
|
1976
|
+
* <p>A description of the TLS inspection configuration. </p>
|
|
1977
|
+
*/
|
|
1978
|
+
Description?: string;
|
|
1979
|
+
/**
|
|
1980
|
+
* <p>The key:value pairs to associate with the resource.</p>
|
|
1981
|
+
*/
|
|
1982
|
+
Tags?: Tag[];
|
|
1983
|
+
/**
|
|
1984
|
+
* <p>A complex type that contains optional Amazon Web Services Key Management Service (KMS) encryption settings for your Network Firewall resources. Your data is encrypted by default with an Amazon Web Services owned key that Amazon Web Services owns and manages for you. You can use either the Amazon Web Services owned key, or provide your own customer managed key. To learn more about KMS encryption of your Network Firewall resources, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-encryption-at-rest.html">Encryption at rest with Amazon Web Services Key Managment Service</a> in the <i>Network Firewall Developer Guide</i>.</p>
|
|
1985
|
+
*/
|
|
1986
|
+
EncryptionConfiguration?: EncryptionConfiguration;
|
|
1987
|
+
}
|
|
1988
|
+
/**
|
|
1989
|
+
* @public
|
|
1990
|
+
* <p>The high-level properties of a TLS inspection configuration. This, along with the <code>TLSInspectionConfiguration</code>, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling <code>DescribeTLSInspectionConfiguration</code>.</p>
|
|
1991
|
+
*/
|
|
1992
|
+
export interface TLSInspectionConfigurationResponse {
|
|
1993
|
+
/**
|
|
1994
|
+
* <p>The Amazon Resource Name (ARN) of the TLS inspection configuration.</p>
|
|
1995
|
+
*/
|
|
1996
|
+
TLSInspectionConfigurationArn: string | undefined;
|
|
1997
|
+
/**
|
|
1998
|
+
* <p>The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.</p>
|
|
1999
|
+
*/
|
|
2000
|
+
TLSInspectionConfigurationName: string | undefined;
|
|
2001
|
+
/**
|
|
2002
|
+
* <p>A unique identifier for the TLS inspection configuration. This ID is returned in the responses to create and list commands. You provide it to operations such as update and delete.</p>
|
|
2003
|
+
*/
|
|
2004
|
+
TLSInspectionConfigurationId: string | undefined;
|
|
2005
|
+
/**
|
|
2006
|
+
* <p>Detailed information about the current status of a <a>TLSInspectionConfiguration</a>. You can retrieve this for a TLS inspection configuration by calling <a>DescribeTLSInspectionConfiguration</a> and providing the TLS inspection configuration name and ARN.</p>
|
|
2007
|
+
*/
|
|
2008
|
+
TLSInspectionConfigurationStatus?: ResourceStatus | string;
|
|
2009
|
+
/**
|
|
2010
|
+
* <p>A description of the TLS inspection configuration. </p>
|
|
2011
|
+
*/
|
|
2012
|
+
Description?: string;
|
|
2013
|
+
/**
|
|
2014
|
+
* <p>The key:value pairs to associate with the resource.</p>
|
|
2015
|
+
*/
|
|
2016
|
+
Tags?: Tag[];
|
|
2017
|
+
/**
|
|
2018
|
+
* <p>The last time that the TLS inspection configuration was changed.</p>
|
|
2019
|
+
*/
|
|
2020
|
+
LastModifiedTime?: Date;
|
|
2021
|
+
/**
|
|
2022
|
+
* <p>The number of firewall policies that use this TLS inspection configuration.</p>
|
|
2023
|
+
*/
|
|
2024
|
+
NumberOfAssociations?: number;
|
|
2025
|
+
/**
|
|
2026
|
+
* <p>A complex type that contains the Amazon Web Services KMS encryption configuration settings for your TLS inspection configuration.</p>
|
|
2027
|
+
*/
|
|
2028
|
+
EncryptionConfiguration?: EncryptionConfiguration;
|
|
2029
|
+
/**
|
|
2030
|
+
* <p>A list of the certificates associated with the TLS inspection configuration.</p>
|
|
2031
|
+
*/
|
|
2032
|
+
Certificates?: TlsCertificateData[];
|
|
2033
|
+
}
|
|
2034
|
+
/**
|
|
2035
|
+
* @public
|
|
2036
|
+
*/
|
|
2037
|
+
export interface CreateTLSInspectionConfigurationResponse {
|
|
2038
|
+
/**
|
|
2039
|
+
* <p>A token used for optimistic locking. Network Firewall returns a token to your requests that access the TLS inspection configuration. The token marks the state of the TLS inspection configuration resource at the time of the request. </p>
|
|
2040
|
+
* <p>To make changes to the TLS inspection configuration, you provide the token in your request. Network Firewall uses the token to ensure that the TLS inspection configuration hasn't changed since you last retrieved it. If it has changed, the operation fails with an <code>InvalidTokenException</code>. If this happens, retrieve the TLS inspection configuration again to get a current copy of it with a current token. Reapply your changes as needed, then try the operation again using the new token. </p>
|
|
2041
|
+
*/
|
|
2042
|
+
UpdateToken: string | undefined;
|
|
2043
|
+
/**
|
|
2044
|
+
* <p>The high-level properties of a TLS inspection configuration. This, along with the <a>TLSInspectionConfiguration</a>, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling <a>DescribeTLSInspectionConfiguration</a>. </p>
|
|
2045
|
+
*/
|
|
2046
|
+
TLSInspectionConfigurationResponse: TLSInspectionConfigurationResponse | undefined;
|
|
2047
|
+
}
|
|
1778
2048
|
/**
|
|
1779
2049
|
* @public
|
|
1780
2050
|
*/
|
|
@@ -1903,6 +2173,30 @@ export interface DeleteRuleGroupResponse {
|
|
|
1903
2173
|
*/
|
|
1904
2174
|
RuleGroupResponse: RuleGroupResponse | undefined;
|
|
1905
2175
|
}
|
|
2176
|
+
/**
|
|
2177
|
+
* @public
|
|
2178
|
+
*/
|
|
2179
|
+
export interface DeleteTLSInspectionConfigurationRequest {
|
|
2180
|
+
/**
|
|
2181
|
+
* <p>The Amazon Resource Name (ARN) of the TLS inspection configuration.</p>
|
|
2182
|
+
* <p>You must specify the ARN or the name, and you can specify both. </p>
|
|
2183
|
+
*/
|
|
2184
|
+
TLSInspectionConfigurationArn?: string;
|
|
2185
|
+
/**
|
|
2186
|
+
* <p>The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.</p>
|
|
2187
|
+
* <p>You must specify the ARN or the name, and you can specify both. </p>
|
|
2188
|
+
*/
|
|
2189
|
+
TLSInspectionConfigurationName?: string;
|
|
2190
|
+
}
|
|
2191
|
+
/**
|
|
2192
|
+
* @public
|
|
2193
|
+
*/
|
|
2194
|
+
export interface DeleteTLSInspectionConfigurationResponse {
|
|
2195
|
+
/**
|
|
2196
|
+
* <p>The high-level properties of a TLS inspection configuration. This, along with the <a>TLSInspectionConfiguration</a>, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling <a>DescribeTLSInspectionConfiguration</a>. </p>
|
|
2197
|
+
*/
|
|
2198
|
+
TLSInspectionConfigurationResponse: TLSInspectionConfigurationResponse | undefined;
|
|
2199
|
+
}
|
|
1906
2200
|
/**
|
|
1907
2201
|
* @public
|
|
1908
2202
|
*/
|
|
@@ -1987,19 +2281,29 @@ export interface DescribeLoggingConfigurationRequest {
|
|
|
1987
2281
|
}
|
|
1988
2282
|
/**
|
|
1989
2283
|
* @public
|
|
2284
|
+
* @enum
|
|
1990
2285
|
*/
|
|
1991
|
-
export declare
|
|
1992
|
-
CLOUDWATCH_LOGS
|
|
1993
|
-
KINESIS_DATA_FIREHOSE
|
|
1994
|
-
S3
|
|
1995
|
-
}
|
|
2286
|
+
export declare const LogDestinationType: {
|
|
2287
|
+
readonly CLOUDWATCH_LOGS: "CloudWatchLogs";
|
|
2288
|
+
readonly KINESIS_DATA_FIREHOSE: "KinesisDataFirehose";
|
|
2289
|
+
readonly S3: "S3";
|
|
2290
|
+
};
|
|
1996
2291
|
/**
|
|
1997
2292
|
* @public
|
|
1998
2293
|
*/
|
|
1999
|
-
export
|
|
2000
|
-
|
|
2001
|
-
|
|
2002
|
-
|
|
2294
|
+
export type LogDestinationType = (typeof LogDestinationType)[keyof typeof LogDestinationType];
|
|
2295
|
+
/**
|
|
2296
|
+
* @public
|
|
2297
|
+
* @enum
|
|
2298
|
+
*/
|
|
2299
|
+
export declare const LogType: {
|
|
2300
|
+
readonly ALERT: "ALERT";
|
|
2301
|
+
readonly FLOW: "FLOW";
|
|
2302
|
+
};
|
|
2303
|
+
/**
|
|
2304
|
+
* @public
|
|
2305
|
+
*/
|
|
2306
|
+
export type LogType = (typeof LogType)[keyof typeof LogType];
|
|
2003
2307
|
/**
|
|
2004
2308
|
* @public
|
|
2005
2309
|
* <p>Defines where Network Firewall sends logs for the firewall for one log type. This is used
|
|
@@ -2210,6 +2514,42 @@ export interface DescribeRuleGroupMetadataResponse {
|
|
|
2210
2514
|
*/
|
|
2211
2515
|
LastModifiedTime?: Date;
|
|
2212
2516
|
}
|
|
2517
|
+
/**
|
|
2518
|
+
* @public
|
|
2519
|
+
*/
|
|
2520
|
+
export interface DescribeTLSInspectionConfigurationRequest {
|
|
2521
|
+
/**
|
|
2522
|
+
* <p>The Amazon Resource Name (ARN) of the TLS inspection configuration.</p>
|
|
2523
|
+
* <p>You must specify the ARN or the name, and you can specify both. </p>
|
|
2524
|
+
*/
|
|
2525
|
+
TLSInspectionConfigurationArn?: string;
|
|
2526
|
+
/**
|
|
2527
|
+
* <p>The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.</p>
|
|
2528
|
+
* <p>You must specify the ARN or the name, and you can specify both. </p>
|
|
2529
|
+
*/
|
|
2530
|
+
TLSInspectionConfigurationName?: string;
|
|
2531
|
+
}
|
|
2532
|
+
/**
|
|
2533
|
+
* @public
|
|
2534
|
+
*/
|
|
2535
|
+
export interface DescribeTLSInspectionConfigurationResponse {
|
|
2536
|
+
/**
|
|
2537
|
+
* <p>A token used for optimistic locking. Network Firewall returns a token to your requests that access the TLS inspection configuration. The token marks the state of the TLS inspection configuration resource at the time of the request. </p>
|
|
2538
|
+
* <p>To make changes to the TLS inspection configuration, you provide the token in your request. Network Firewall uses the token to ensure that the TLS inspection configuration hasn't changed since you last retrieved it. If it has changed, the operation fails with an <code>InvalidTokenException</code>. If this happens, retrieve the TLS inspection configuration again to get a current copy of it with a current token. Reapply your changes as needed, then try the operation again using the new token. </p>
|
|
2539
|
+
*/
|
|
2540
|
+
UpdateToken: string | undefined;
|
|
2541
|
+
/**
|
|
2542
|
+
* <p>The object that defines a TLS inspection configuration. This, along with <a>TLSInspectionConfigurationResponse</a>, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling <a>DescribeTLSInspectionConfiguration</a>. </p>
|
|
2543
|
+
* <p>Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination.</p>
|
|
2544
|
+
* <p>To use a TLS inspection configuration, you add it to a Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html">Decrypting SSL/TLS traffic with TLS
|
|
2545
|
+
* inspection configurations</a> in the <i>Network Firewall Developer Guide</i>.</p>
|
|
2546
|
+
*/
|
|
2547
|
+
TLSInspectionConfiguration?: TLSInspectionConfiguration;
|
|
2548
|
+
/**
|
|
2549
|
+
* <p>The high-level properties of a TLS inspection configuration. This, along with the <a>TLSInspectionConfiguration</a>, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling <a>DescribeTLSInspectionConfiguration</a>. </p>
|
|
2550
|
+
*/
|
|
2551
|
+
TLSInspectionConfigurationResponse: TLSInspectionConfigurationResponse | undefined;
|
|
2552
|
+
}
|
|
2213
2553
|
/**
|
|
2214
2554
|
* @public
|
|
2215
2555
|
*/
|
|
@@ -2364,18 +2704,28 @@ export interface ListFirewallsResponse {
|
|
|
2364
2704
|
}
|
|
2365
2705
|
/**
|
|
2366
2706
|
* @public
|
|
2707
|
+
* @enum
|
|
2367
2708
|
*/
|
|
2368
|
-
export declare
|
|
2369
|
-
AWS_MANAGED_DOMAIN_LISTS
|
|
2370
|
-
AWS_MANAGED_THREAT_SIGNATURES
|
|
2371
|
-
}
|
|
2709
|
+
export declare const ResourceManagedType: {
|
|
2710
|
+
readonly AWS_MANAGED_DOMAIN_LISTS: "AWS_MANAGED_DOMAIN_LISTS";
|
|
2711
|
+
readonly AWS_MANAGED_THREAT_SIGNATURES: "AWS_MANAGED_THREAT_SIGNATURES";
|
|
2712
|
+
};
|
|
2372
2713
|
/**
|
|
2373
2714
|
* @public
|
|
2374
2715
|
*/
|
|
2375
|
-
export
|
|
2376
|
-
|
|
2377
|
-
|
|
2378
|
-
|
|
2716
|
+
export type ResourceManagedType = (typeof ResourceManagedType)[keyof typeof ResourceManagedType];
|
|
2717
|
+
/**
|
|
2718
|
+
* @public
|
|
2719
|
+
* @enum
|
|
2720
|
+
*/
|
|
2721
|
+
export declare const ResourceManagedStatus: {
|
|
2722
|
+
readonly ACCOUNT: "ACCOUNT";
|
|
2723
|
+
readonly MANAGED: "MANAGED";
|
|
2724
|
+
};
|
|
2725
|
+
/**
|
|
2726
|
+
* @public
|
|
2727
|
+
*/
|
|
2728
|
+
export type ResourceManagedStatus = (typeof ResourceManagedStatus)[keyof typeof ResourceManagedStatus];
|
|
2379
2729
|
/**
|
|
2380
2730
|
* @public
|
|
2381
2731
|
*/
|
|
@@ -2475,6 +2825,52 @@ export interface ListTagsForResourceResponse {
|
|
|
2475
2825
|
*/
|
|
2476
2826
|
Tags?: Tag[];
|
|
2477
2827
|
}
|
|
2828
|
+
/**
|
|
2829
|
+
* @public
|
|
2830
|
+
*/
|
|
2831
|
+
export interface ListTLSInspectionConfigurationsRequest {
|
|
2832
|
+
/**
|
|
2833
|
+
* <p>When you request a list of objects with a <code>MaxResults</code> setting, if the number of objects that are still available
|
|
2834
|
+
* for retrieval exceeds the maximum you requested, Network Firewall returns a <code>NextToken</code>
|
|
2835
|
+
* value in the response. To retrieve the next batch of objects, use the token returned from the prior request in your next request.</p>
|
|
2836
|
+
*/
|
|
2837
|
+
NextToken?: string;
|
|
2838
|
+
/**
|
|
2839
|
+
* <p>The maximum number of objects that you want Network Firewall to return for this request. If more
|
|
2840
|
+
* objects are available, in the response, Network Firewall provides a
|
|
2841
|
+
* <code>NextToken</code> value that you can use in a subsequent call to get the next batch of objects.</p>
|
|
2842
|
+
*/
|
|
2843
|
+
MaxResults?: number;
|
|
2844
|
+
}
|
|
2845
|
+
/**
|
|
2846
|
+
* @public
|
|
2847
|
+
* <p>High-level information about a TLS inspection configuration, returned by <code>ListTLSInspectionConfigurations</code>. You can use the information provided in the metadata to retrieve and manage a TLS configuration.</p>
|
|
2848
|
+
*/
|
|
2849
|
+
export interface TLSInspectionConfigurationMetadata {
|
|
2850
|
+
/**
|
|
2851
|
+
* <p>The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.</p>
|
|
2852
|
+
*/
|
|
2853
|
+
Name?: string;
|
|
2854
|
+
/**
|
|
2855
|
+
* <p>The Amazon Resource Name (ARN) of the TLS inspection configuration.</p>
|
|
2856
|
+
*/
|
|
2857
|
+
Arn?: string;
|
|
2858
|
+
}
|
|
2859
|
+
/**
|
|
2860
|
+
* @public
|
|
2861
|
+
*/
|
|
2862
|
+
export interface ListTLSInspectionConfigurationsResponse {
|
|
2863
|
+
/**
|
|
2864
|
+
* <p>When you request a list of objects with a <code>MaxResults</code> setting, if the number of objects that are still available
|
|
2865
|
+
* for retrieval exceeds the maximum you requested, Network Firewall returns a <code>NextToken</code>
|
|
2866
|
+
* value in the response. To retrieve the next batch of objects, use the token returned from the prior request in your next request.</p>
|
|
2867
|
+
*/
|
|
2868
|
+
NextToken?: string;
|
|
2869
|
+
/**
|
|
2870
|
+
* <p>The TLS inspection configuration metadata objects that you've defined. Depending on your setting for max results and the number of TLS inspection configurations, this might not be the full list.</p>
|
|
2871
|
+
*/
|
|
2872
|
+
TLSInspectionConfigurations?: TLSInspectionConfigurationMetadata[];
|
|
2873
|
+
}
|
|
2478
2874
|
/**
|
|
2479
2875
|
* @public
|
|
2480
2876
|
* <p>Unable to send logs to a configured logging destination. </p>
|
|
@@ -3007,3 +3403,50 @@ export interface UpdateSubnetChangeProtectionResponse {
|
|
|
3007
3403
|
*/
|
|
3008
3404
|
SubnetChangeProtection?: boolean;
|
|
3009
3405
|
}
|
|
3406
|
+
/**
|
|
3407
|
+
* @public
|
|
3408
|
+
*/
|
|
3409
|
+
export interface UpdateTLSInspectionConfigurationRequest {
|
|
3410
|
+
/**
|
|
3411
|
+
* <p>The Amazon Resource Name (ARN) of the TLS inspection configuration.</p>
|
|
3412
|
+
*/
|
|
3413
|
+
TLSInspectionConfigurationArn?: string;
|
|
3414
|
+
/**
|
|
3415
|
+
* <p>The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.</p>
|
|
3416
|
+
*/
|
|
3417
|
+
TLSInspectionConfigurationName?: string;
|
|
3418
|
+
/**
|
|
3419
|
+
* <p>The object that defines a TLS inspection configuration. This, along with <a>TLSInspectionConfigurationResponse</a>, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling <a>DescribeTLSInspectionConfiguration</a>. </p>
|
|
3420
|
+
* <p>Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination.</p>
|
|
3421
|
+
* <p>To use a TLS inspection configuration, you add it to a Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html">Decrypting SSL/TLS traffic with TLS
|
|
3422
|
+
* inspection configurations</a> in the <i>Network Firewall Developer Guide</i>.</p>
|
|
3423
|
+
*/
|
|
3424
|
+
TLSInspectionConfiguration: TLSInspectionConfiguration | undefined;
|
|
3425
|
+
/**
|
|
3426
|
+
* <p>A description of the TLS inspection configuration. </p>
|
|
3427
|
+
*/
|
|
3428
|
+
Description?: string;
|
|
3429
|
+
/**
|
|
3430
|
+
* <p>A complex type that contains the Amazon Web Services KMS encryption configuration settings for your TLS inspection configuration.</p>
|
|
3431
|
+
*/
|
|
3432
|
+
EncryptionConfiguration?: EncryptionConfiguration;
|
|
3433
|
+
/**
|
|
3434
|
+
* <p>A token used for optimistic locking. Network Firewall returns a token to your requests that access the TLS inspection configuration. The token marks the state of the TLS inspection configuration resource at the time of the request. </p>
|
|
3435
|
+
* <p>To make changes to the TLS inspection configuration, you provide the token in your request. Network Firewall uses the token to ensure that the TLS inspection configuration hasn't changed since you last retrieved it. If it has changed, the operation fails with an <code>InvalidTokenException</code>. If this happens, retrieve the TLS inspection configuration again to get a current copy of it with a current token. Reapply your changes as needed, then try the operation again using the new token. </p>
|
|
3436
|
+
*/
|
|
3437
|
+
UpdateToken: string | undefined;
|
|
3438
|
+
}
|
|
3439
|
+
/**
|
|
3440
|
+
* @public
|
|
3441
|
+
*/
|
|
3442
|
+
export interface UpdateTLSInspectionConfigurationResponse {
|
|
3443
|
+
/**
|
|
3444
|
+
* <p>A token used for optimistic locking. Network Firewall returns a token to your requests that access the TLS inspection configuration. The token marks the state of the TLS inspection configuration resource at the time of the request. </p>
|
|
3445
|
+
* <p>To make changes to the TLS inspection configuration, you provide the token in your request. Network Firewall uses the token to ensure that the TLS inspection configuration hasn't changed since you last retrieved it. If it has changed, the operation fails with an <code>InvalidTokenException</code>. If this happens, retrieve the TLS inspection configuration again to get a current copy of it with a current token. Reapply your changes as needed, then try the operation again using the new token. </p>
|
|
3446
|
+
*/
|
|
3447
|
+
UpdateToken: string | undefined;
|
|
3448
|
+
/**
|
|
3449
|
+
* <p>The high-level properties of a TLS inspection configuration. This, along with the <a>TLSInspectionConfiguration</a>, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling <a>DescribeTLSInspectionConfiguration</a>. </p>
|
|
3450
|
+
*/
|
|
3451
|
+
TLSInspectionConfigurationResponse: TLSInspectionConfigurationResponse | undefined;
|
|
3452
|
+
}
|