@aws-sdk/client-network-firewall 3.301.0 → 3.306.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (54) hide show
  1. package/README.md +40 -0
  2. package/dist-cjs/NetworkFirewall.js +75 -0
  3. package/dist-cjs/commands/CreateTLSInspectionConfigurationCommand.js +45 -0
  4. package/dist-cjs/commands/DeleteTLSInspectionConfigurationCommand.js +45 -0
  5. package/dist-cjs/commands/DescribeTLSInspectionConfigurationCommand.js +45 -0
  6. package/dist-cjs/commands/ListTLSInspectionConfigurationsCommand.js +45 -0
  7. package/dist-cjs/commands/UpdateTLSInspectionConfigurationCommand.js +45 -0
  8. package/dist-cjs/commands/index.js +5 -0
  9. package/dist-cjs/endpoint/ruleset.js +3 -3
  10. package/dist-cjs/models/models_0.js +114 -135
  11. package/dist-cjs/pagination/ListTLSInspectionConfigurationsPaginator.js +29 -0
  12. package/dist-cjs/pagination/index.js +1 -0
  13. package/dist-cjs/protocols/Aws_json1_0.js +540 -2
  14. package/dist-es/NetworkFirewall.js +75 -0
  15. package/dist-es/commands/CreateTLSInspectionConfigurationCommand.js +41 -0
  16. package/dist-es/commands/DeleteTLSInspectionConfigurationCommand.js +41 -0
  17. package/dist-es/commands/DescribeTLSInspectionConfigurationCommand.js +41 -0
  18. package/dist-es/commands/ListTLSInspectionConfigurationsCommand.js +41 -0
  19. package/dist-es/commands/UpdateTLSInspectionConfigurationCommand.js +41 -0
  20. package/dist-es/commands/index.js +5 -0
  21. package/dist-es/endpoint/ruleset.js +3 -3
  22. package/dist-es/models/models_0.js +114 -135
  23. package/dist-es/pagination/ListTLSInspectionConfigurationsPaginator.js +25 -0
  24. package/dist-es/pagination/index.js +1 -0
  25. package/dist-es/protocols/Aws_json1_0.js +528 -0
  26. package/dist-types/NetworkFirewall.d.ts +53 -0
  27. package/dist-types/NetworkFirewallClient.d.ts +7 -2
  28. package/dist-types/commands/CreateFirewallPolicyCommand.d.ts +1 -0
  29. package/dist-types/commands/CreateTLSInspectionConfigurationCommand.d.ts +145 -0
  30. package/dist-types/commands/DeleteTLSInspectionConfigurationCommand.d.ts +94 -0
  31. package/dist-types/commands/DescribeTLSInspectionConfigurationCommand.d.ts +90 -0
  32. package/dist-types/commands/ListTLSInspectionConfigurationsCommand.d.ts +87 -0
  33. package/dist-types/commands/UpdateFirewallPolicyCommand.d.ts +1 -0
  34. package/dist-types/commands/UpdateTLSInspectionConfigurationCommand.d.ts +144 -0
  35. package/dist-types/commands/index.d.ts +5 -0
  36. package/dist-types/endpoint/EndpointParameters.d.ts +1 -1
  37. package/dist-types/models/models_0.d.ts +558 -115
  38. package/dist-types/pagination/ListTLSInspectionConfigurationsPaginator.d.ts +7 -0
  39. package/dist-types/pagination/index.d.ts +1 -0
  40. package/dist-types/protocols/Aws_json1_0.d.ts +15 -0
  41. package/dist-types/ts3.4/NetworkFirewall.d.ts +91 -0
  42. package/dist-types/ts3.4/NetworkFirewallClient.d.ts +32 -2
  43. package/dist-types/ts3.4/commands/CreateTLSInspectionConfigurationCommand.d.ts +41 -0
  44. package/dist-types/ts3.4/commands/DeleteTLSInspectionConfigurationCommand.d.ts +41 -0
  45. package/dist-types/ts3.4/commands/DescribeTLSInspectionConfigurationCommand.d.ts +41 -0
  46. package/dist-types/ts3.4/commands/ListTLSInspectionConfigurationsCommand.d.ts +41 -0
  47. package/dist-types/ts3.4/commands/UpdateTLSInspectionConfigurationCommand.d.ts +41 -0
  48. package/dist-types/ts3.4/commands/index.d.ts +5 -0
  49. package/dist-types/ts3.4/endpoint/EndpointParameters.d.ts +1 -1
  50. package/dist-types/ts3.4/models/models_0.d.ts +244 -113
  51. package/dist-types/ts3.4/pagination/ListTLSInspectionConfigurationsPaginator.d.ts +11 -0
  52. package/dist-types/ts3.4/pagination/index.d.ts +1 -0
  53. package/dist-types/ts3.4/protocols/Aws_json1_0.d.ts +60 -0
  54. package/package.json +34 -34
@@ -214,11 +214,16 @@ export declare class ThrottlingException extends __BaseException {
214
214
  }
215
215
  /**
216
216
  * @public
217
+ * @enum
217
218
  */
218
- export declare enum IPAddressType {
219
- DUALSTACK = "DUALSTACK",
220
- IPV4 = "IPV4"
221
- }
219
+ export declare const IPAddressType: {
220
+ readonly DUALSTACK: "DUALSTACK";
221
+ readonly IPV4: "IPV4";
222
+ };
223
+ /**
224
+ * @public
225
+ */
226
+ export type IPAddressType = (typeof IPAddressType)[keyof typeof IPAddressType];
222
227
  /**
223
228
  * @public
224
229
  * <p>The ID for a subnet that you want to associate with the firewall. This is used with
@@ -300,13 +305,18 @@ export declare class InsufficientCapacityException extends __BaseException {
300
305
  }
301
306
  /**
302
307
  * @public
308
+ * @enum
303
309
  */
304
- export declare enum AttachmentStatus {
305
- CREATING = "CREATING",
306
- DELETING = "DELETING",
307
- READY = "READY",
308
- SCALING = "SCALING"
309
- }
310
+ export declare const AttachmentStatus: {
311
+ readonly CREATING: "CREATING";
312
+ readonly DELETING: "DELETING";
313
+ readonly READY: "READY";
314
+ readonly SCALING: "SCALING";
315
+ };
316
+ /**
317
+ * @public
318
+ */
319
+ export type AttachmentStatus = (typeof AttachmentStatus)[keyof typeof AttachmentStatus];
310
320
  /**
311
321
  * @public
312
322
  * <p>The configuration and status for a single subnet that you've specified for use by the
@@ -378,19 +388,51 @@ export interface CapacityUsageSummary {
378
388
  }
379
389
  /**
380
390
  * @public
391
+ * <p>Contains metadata about an Certificate Manager certificate.</p>
381
392
  */
382
- export declare enum ConfigurationSyncState {
383
- CAPACITY_CONSTRAINED = "CAPACITY_CONSTRAINED",
384
- IN_SYNC = "IN_SYNC",
385
- PENDING = "PENDING"
393
+ export interface TlsCertificateData {
394
+ /**
395
+ * <p>The Amazon Resource Name (ARN) of the certificate.</p>
396
+ */
397
+ CertificateArn?: string;
398
+ /**
399
+ * <p>The serial number of the certificate.</p>
400
+ */
401
+ CertificateSerial?: string;
402
+ /**
403
+ * <p>The status of the certificate.</p>
404
+ */
405
+ Status?: string;
406
+ /**
407
+ * <p>Contains details about the certificate status, including information about certificate errors.</p>
408
+ */
409
+ StatusMessage?: string;
386
410
  }
387
411
  /**
388
412
  * @public
413
+ * @enum
389
414
  */
390
- export declare enum EncryptionType {
391
- AWS_OWNED_KMS_KEY = "AWS_OWNED_KMS_KEY",
392
- CUSTOMER_KMS = "CUSTOMER_KMS"
393
- }
415
+ export declare const ConfigurationSyncState: {
416
+ readonly CAPACITY_CONSTRAINED: "CAPACITY_CONSTRAINED";
417
+ readonly IN_SYNC: "IN_SYNC";
418
+ readonly PENDING: "PENDING";
419
+ };
420
+ /**
421
+ * @public
422
+ */
423
+ export type ConfigurationSyncState = (typeof ConfigurationSyncState)[keyof typeof ConfigurationSyncState];
424
+ /**
425
+ * @public
426
+ * @enum
427
+ */
428
+ export declare const EncryptionType: {
429
+ readonly AWS_OWNED_KMS_KEY: "AWS_OWNED_KMS_KEY";
430
+ readonly CUSTOMER_KMS: "CUSTOMER_KMS";
431
+ };
432
+ /**
433
+ * @public
434
+ */
435
+ export type EncryptionType = (typeof EncryptionType)[keyof typeof EncryptionType];
394
436
  /**
395
437
  * @public
396
438
  * <p>A complex type that contains optional Amazon Web Services Key Management Service (KMS) encryption settings for your Network Firewall resources. Your data is encrypted by default with an Amazon Web Services owned key that Amazon Web Services owns and manages for you. You can use either the Amazon Web Services owned key, or provide your own customer managed key. To learn more about KMS encryption of your Network Firewall resources, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-encryption-at-rest.html">Encryption at rest with Amazon Web Services Key Managment Service</a> in the <i>Network Firewall Developer Guide</i>.</p>
@@ -549,20 +591,30 @@ export interface Firewall {
549
591
  }
550
592
  /**
551
593
  * @public
594
+ * @enum
552
595
  */
553
- export declare enum FirewallStatusValue {
554
- DELETING = "DELETING",
555
- PROVISIONING = "PROVISIONING",
556
- READY = "READY"
557
- }
596
+ export declare const FirewallStatusValue: {
597
+ readonly DELETING: "DELETING";
598
+ readonly PROVISIONING: "PROVISIONING";
599
+ readonly READY: "READY";
600
+ };
558
601
  /**
559
602
  * @public
560
603
  */
561
- export declare enum PerObjectSyncStatus {
562
- CAPACITY_CONSTRAINED = "CAPACITY_CONSTRAINED",
563
- IN_SYNC = "IN_SYNC",
564
- PENDING = "PENDING"
565
- }
604
+ export type FirewallStatusValue = (typeof FirewallStatusValue)[keyof typeof FirewallStatusValue];
605
+ /**
606
+ * @public
607
+ * @enum
608
+ */
609
+ export declare const PerObjectSyncStatus: {
610
+ readonly CAPACITY_CONSTRAINED: "CAPACITY_CONSTRAINED";
611
+ readonly IN_SYNC: "IN_SYNC";
612
+ readonly PENDING: "PENDING";
613
+ };
614
+ /**
615
+ * @public
616
+ */
617
+ export type PerObjectSyncStatus = (typeof PerObjectSyncStatus)[keyof typeof PerObjectSyncStatus];
566
618
  /**
567
619
  * @public
568
620
  * <p>Provides configuration status for a single policy or rule group that is used for a firewall endpoint. Network Firewall
@@ -682,18 +734,28 @@ export declare class LimitExceededException extends __BaseException {
682
734
  }
683
735
  /**
684
736
  * @public
737
+ * @enum
685
738
  */
686
- export declare enum RuleOrder {
687
- DEFAULT_ACTION_ORDER = "DEFAULT_ACTION_ORDER",
688
- STRICT_ORDER = "STRICT_ORDER"
689
- }
739
+ export declare const RuleOrder: {
740
+ readonly DEFAULT_ACTION_ORDER: "DEFAULT_ACTION_ORDER";
741
+ readonly STRICT_ORDER: "STRICT_ORDER";
742
+ };
690
743
  /**
691
744
  * @public
692
745
  */
693
- export declare enum StreamExceptionPolicy {
694
- CONTINUE = "CONTINUE",
695
- DROP = "DROP"
696
- }
746
+ export type RuleOrder = (typeof RuleOrder)[keyof typeof RuleOrder];
747
+ /**
748
+ * @public
749
+ * @enum
750
+ */
751
+ export declare const StreamExceptionPolicy: {
752
+ readonly CONTINUE: "CONTINUE";
753
+ readonly DROP: "DROP";
754
+ };
755
+ /**
756
+ * @public
757
+ */
758
+ export type StreamExceptionPolicy = (typeof StreamExceptionPolicy)[keyof typeof StreamExceptionPolicy];
697
759
  /**
698
760
  * @public
699
761
  * <p>Configuration settings for the handling of the stateful rule groups in a firewall policy. </p>
@@ -724,10 +786,15 @@ export interface StatefulEngineOptions {
724
786
  }
725
787
  /**
726
788
  * @public
789
+ * @enum
727
790
  */
728
- export declare enum OverrideAction {
729
- DROP_TO_ALERT = "DROP_TO_ALERT"
730
- }
791
+ export declare const OverrideAction: {
792
+ readonly DROP_TO_ALERT: "DROP_TO_ALERT";
793
+ };
794
+ /**
795
+ * @public
796
+ */
797
+ export type OverrideAction = (typeof OverrideAction)[keyof typeof OverrideAction];
731
798
  /**
732
799
  * @public
733
800
  * <p>The setting that allows the policy owner to change the behavior of the rule group within a policy. </p>
@@ -896,6 +963,10 @@ export interface FirewallPolicy {
896
963
  * rule groups that you use in your policy must have stateful rule options settings that are compatible with these settings.</p>
897
964
  */
898
965
  StatefulEngineOptions?: StatefulEngineOptions;
966
+ /**
967
+ * <p>The Amazon Resource Name (ARN) of the TLS inspection configuration.</p>
968
+ */
969
+ TLSInspectionConfigurationArn?: string;
899
970
  }
900
971
  /**
901
972
  * @public
@@ -933,11 +1004,16 @@ export interface CreateFirewallPolicyRequest {
933
1004
  }
934
1005
  /**
935
1006
  * @public
1007
+ * @enum
936
1008
  */
937
- export declare enum ResourceStatus {
938
- ACTIVE = "ACTIVE",
939
- DELETING = "DELETING"
940
- }
1009
+ export declare const ResourceStatus: {
1010
+ readonly ACTIVE: "ACTIVE";
1011
+ readonly DELETING: "DELETING";
1012
+ };
1013
+ /**
1014
+ * @public
1015
+ */
1016
+ export type ResourceStatus = (typeof ResourceStatus)[keyof typeof ResourceStatus];
941
1017
  /**
942
1018
  * @public
943
1019
  * <p>The high-level properties of a firewall policy. This, along with the <a>FirewallPolicy</a>, define the policy. You can retrieve all objects for a firewall policy by calling <a>DescribeFirewallPolicy</a>. </p>
@@ -1011,9 +1087,9 @@ export interface CreateFirewallPolicyResponse {
1011
1087
  }
1012
1088
  /**
1013
1089
  * @public
1014
- * <p>Configures one or more IP set references for a Suricata-compatible rule group. This is used in <a>CreateRuleGroup</a> or <a>UpdateRuleGroup</a>. An IP set reference is a rule variable that references a resource that you create and manage in another Amazon Web Services service, such as an Amazon VPC prefix list. Network Firewall IP set references enable you to dynamically update the contents of your rules. When you create, update, or delete the IP set you are referencing in your rule, Network Firewall automatically updates the rule's content with the changes. For more information about IP set references in Network Firewall, see <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/rule-groups-ip-set-references">Using IP set references</a> in the <i>Network Firewall Developer Guide</i>.</p>
1090
+ * <p>Configures one or more IP set references for a Suricata-compatible rule group. This is used in <a>CreateRuleGroup</a> or <a>UpdateRuleGroup</a>. An IP set reference is a rule variable that references resources that you create and manage in another Amazon Web Services service, such as an Amazon VPC prefix list. Network Firewall IP set references enable you to dynamically update the contents of your rules. When you create, update, or delete the resource you are referencing in your rule, Network Firewall automatically updates the rule's content with the changes. For more information about IP set references in Network Firewall, see <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/rule-groups-ip-set-references">Using IP set references</a> in the <i>Network Firewall Developer Guide</i>.</p>
1015
1091
  * <p>
1016
- * Network Firewall currently supports only <a href="https://docs.aws.amazon.com/vpc/latest/userguide/managed-prefix-lists.html">Amazon VPC prefix lists</a> as IP set references.
1092
+ * Network Firewall currently supports <a href="https://docs.aws.amazon.com/vpc/latest/userguide/managed-prefix-lists.html">Amazon VPC prefix lists</a> and <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/rule-groups-ip-set-references.html#rule-groups-referencing-resource-groups">resource groups</a> in IP set references.
1017
1093
  * </p>
1018
1094
  */
1019
1095
  export interface IPSetReference {
@@ -1034,18 +1110,28 @@ export interface ReferenceSets {
1034
1110
  }
1035
1111
  /**
1036
1112
  * @public
1113
+ * @enum
1037
1114
  */
1038
- export declare enum GeneratedRulesType {
1039
- ALLOWLIST = "ALLOWLIST",
1040
- DENYLIST = "DENYLIST"
1041
- }
1115
+ export declare const GeneratedRulesType: {
1116
+ readonly ALLOWLIST: "ALLOWLIST";
1117
+ readonly DENYLIST: "DENYLIST";
1118
+ };
1042
1119
  /**
1043
1120
  * @public
1044
1121
  */
1045
- export declare enum TargetType {
1046
- HTTP_HOST = "HTTP_HOST",
1047
- TLS_SNI = "TLS_SNI"
1048
- }
1122
+ export type GeneratedRulesType = (typeof GeneratedRulesType)[keyof typeof GeneratedRulesType];
1123
+ /**
1124
+ * @public
1125
+ * @enum
1126
+ */
1127
+ export declare const TargetType: {
1128
+ readonly HTTP_HOST: "HTTP_HOST";
1129
+ readonly TLS_SNI: "TLS_SNI";
1130
+ };
1131
+ /**
1132
+ * @public
1133
+ */
1134
+ export type TargetType = (typeof TargetType)[keyof typeof TargetType];
1049
1135
  /**
1050
1136
  * @public
1051
1137
  * <p>Stateful inspection criteria for a domain list rule group. </p>
@@ -1076,44 +1162,59 @@ export interface RulesSourceList {
1076
1162
  }
1077
1163
  /**
1078
1164
  * @public
1165
+ * @enum
1079
1166
  */
1080
- export declare enum StatefulAction {
1081
- ALERT = "ALERT",
1082
- DROP = "DROP",
1083
- PASS = "PASS",
1084
- REJECT = "REJECT"
1085
- }
1167
+ export declare const StatefulAction: {
1168
+ readonly ALERT: "ALERT";
1169
+ readonly DROP: "DROP";
1170
+ readonly PASS: "PASS";
1171
+ readonly REJECT: "REJECT";
1172
+ };
1086
1173
  /**
1087
1174
  * @public
1088
1175
  */
1089
- export declare enum StatefulRuleDirection {
1090
- ANY = "ANY",
1091
- FORWARD = "FORWARD"
1092
- }
1176
+ export type StatefulAction = (typeof StatefulAction)[keyof typeof StatefulAction];
1093
1177
  /**
1094
1178
  * @public
1179
+ * @enum
1095
1180
  */
1096
- export declare enum StatefulRuleProtocol {
1097
- ANY = "IP",
1098
- DCERPC = "DCERPC",
1099
- DHCP = "DHCP",
1100
- DNS = "DNS",
1101
- FTP = "FTP",
1102
- HTTP = "HTTP",
1103
- ICMP = "ICMP",
1104
- IKEV2 = "IKEV2",
1105
- IMAP = "IMAP",
1106
- KRB5 = "KRB5",
1107
- MSN = "MSN",
1108
- NTP = "NTP",
1109
- SMB = "SMB",
1110
- SMTP = "SMTP",
1111
- SSH = "SSH",
1112
- TCP = "TCP",
1113
- TFTP = "TFTP",
1114
- TLS = "TLS",
1115
- UDP = "UDP"
1116
- }
1181
+ export declare const StatefulRuleDirection: {
1182
+ readonly ANY: "ANY";
1183
+ readonly FORWARD: "FORWARD";
1184
+ };
1185
+ /**
1186
+ * @public
1187
+ */
1188
+ export type StatefulRuleDirection = (typeof StatefulRuleDirection)[keyof typeof StatefulRuleDirection];
1189
+ /**
1190
+ * @public
1191
+ * @enum
1192
+ */
1193
+ export declare const StatefulRuleProtocol: {
1194
+ readonly ANY: "IP";
1195
+ readonly DCERPC: "DCERPC";
1196
+ readonly DHCP: "DHCP";
1197
+ readonly DNS: "DNS";
1198
+ readonly FTP: "FTP";
1199
+ readonly HTTP: "HTTP";
1200
+ readonly ICMP: "ICMP";
1201
+ readonly IKEV2: "IKEV2";
1202
+ readonly IMAP: "IMAP";
1203
+ readonly KRB5: "KRB5";
1204
+ readonly MSN: "MSN";
1205
+ readonly NTP: "NTP";
1206
+ readonly SMB: "SMB";
1207
+ readonly SMTP: "SMTP";
1208
+ readonly SSH: "SSH";
1209
+ readonly TCP: "TCP";
1210
+ readonly TFTP: "TFTP";
1211
+ readonly TLS: "TLS";
1212
+ readonly UDP: "UDP";
1213
+ };
1214
+ /**
1215
+ * @public
1216
+ */
1217
+ export type StatefulRuleProtocol = (typeof StatefulRuleProtocol)[keyof typeof StatefulRuleProtocol];
1117
1218
  /**
1118
1219
  * @public
1119
1220
  * <p>The basic rule criteria for Network Firewall to use to inspect packet headers in stateful
@@ -1281,17 +1382,22 @@ export interface PortRange {
1281
1382
  }
1282
1383
  /**
1283
1384
  * @public
1385
+ * @enum
1284
1386
  */
1285
- export declare enum TCPFlag {
1286
- ACK = "ACK",
1287
- CWR = "CWR",
1288
- ECE = "ECE",
1289
- FIN = "FIN",
1290
- PSH = "PSH",
1291
- RST = "RST",
1292
- SYN = "SYN",
1293
- URG = "URG"
1294
- }
1387
+ export declare const TCPFlag: {
1388
+ readonly ACK: "ACK";
1389
+ readonly CWR: "CWR";
1390
+ readonly ECE: "ECE";
1391
+ readonly FIN: "FIN";
1392
+ readonly PSH: "PSH";
1393
+ readonly RST: "RST";
1394
+ readonly SYN: "SYN";
1395
+ readonly URG: "URG";
1396
+ };
1397
+ /**
1398
+ * @public
1399
+ */
1400
+ export type TCPFlag = (typeof TCPFlag)[keyof typeof TCPFlag];
1295
1401
  /**
1296
1402
  * @public
1297
1403
  * <p>TCP flags and masks to inspect packets for, used in stateless rules <a>MatchAttributes</a> settings.</p>
@@ -1581,11 +1687,16 @@ export interface SourceMetadata {
1581
1687
  }
1582
1688
  /**
1583
1689
  * @public
1690
+ * @enum
1584
1691
  */
1585
- export declare enum RuleGroupType {
1586
- STATEFUL = "STATEFUL",
1587
- STATELESS = "STATELESS"
1588
- }
1692
+ export declare const RuleGroupType: {
1693
+ readonly STATEFUL: "STATEFUL";
1694
+ readonly STATELESS: "STATELESS";
1695
+ };
1696
+ /**
1697
+ * @public
1698
+ */
1699
+ export type RuleGroupType = (typeof RuleGroupType)[keyof typeof RuleGroupType];
1589
1700
  /**
1590
1701
  * @public
1591
1702
  */
@@ -1775,6 +1886,165 @@ export interface CreateRuleGroupResponse {
1775
1886
  */
1776
1887
  RuleGroupResponse: RuleGroupResponse | undefined;
1777
1888
  }
1889
+ /**
1890
+ * @public
1891
+ * <p>Settings that define the Secure Sockets Layer/Transport Layer Security (SSL/TLS) traffic that Network Firewall should decrypt for inspection by the stateful rule engine.</p>
1892
+ */
1893
+ export interface ServerCertificateScope {
1894
+ /**
1895
+ * <p>The source IP addresses and address ranges to decrypt for inspection, in CIDR notation. If not specified, this
1896
+ * matches with any source address.</p>
1897
+ */
1898
+ Sources?: Address[];
1899
+ /**
1900
+ * <p>The destination IP addresses and address ranges to decrypt for inspection, in CIDR notation. If not specified, this
1901
+ * matches with any destination address.</p>
1902
+ */
1903
+ Destinations?: Address[];
1904
+ /**
1905
+ * <p>The source ports to decrypt for inspection, in Transmission Control Protocol (TCP) format. If not specified, this matches with any source port.</p>
1906
+ * <p>You can specify individual ports, for example <code>1994</code>, and you can specify port ranges, such as <code>1990:1994</code>.</p>
1907
+ */
1908
+ SourcePorts?: PortRange[];
1909
+ /**
1910
+ * <p>The destination ports to decrypt for inspection, in Transmission Control Protocol (TCP) format. If not specified, this matches with any destination port.</p>
1911
+ * <p>You can specify individual ports, for example <code>1994</code>, and you can specify port ranges, such as <code>1990:1994</code>.</p>
1912
+ */
1913
+ DestinationPorts?: PortRange[];
1914
+ /**
1915
+ * <p>The protocols to decrypt for inspection, specified using each protocol's assigned internet protocol number
1916
+ * (IANA). Network Firewall currently supports only TCP.</p>
1917
+ */
1918
+ Protocols?: number[];
1919
+ }
1920
+ /**
1921
+ * @public
1922
+ * <p>Any Certificate Manager Secure Sockets Layer/Transport Layer Security (SSL/TLS) server certificate that's associated with a <a>ServerCertificateConfiguration</a> used in a <a>TLSInspectionConfiguration</a>. You must request or import a SSL/TLS certificate into ACM for each domain Network Firewall needs to decrypt and inspect. Network Firewall uses the SSL/TLS certificates to decrypt specified inbound SSL/TLS traffic going to your firewall. For information about working with certificates in Certificate Manager, see <a href="https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-request-public.html">Request a public certificate </a> or <a href="https://docs.aws.amazon.com/acm/latest/userguide/import-certificate.html">Importing certificates</a> in the <i>Certificate Manager User Guide</i>.</p>
1923
+ */
1924
+ export interface ServerCertificate {
1925
+ /**
1926
+ * <p>The Amazon Resource Name (ARN) of the Certificate Manager SSL/TLS server certificate.</p>
1927
+ */
1928
+ ResourceArn?: string;
1929
+ }
1930
+ /**
1931
+ * @public
1932
+ * <p>Configures the associated Certificate Manager Secure Sockets Layer/Transport Layer Security (SSL/TLS) server certificates and scope settings Network Firewall uses to decrypt traffic in a <a>TLSInspectionConfiguration</a>. For information about working with SSL/TLS certificates for TLS inspection, see <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-certificate-requirements.html"> Requirements for using SSL/TLS server certficiates with TLS inspection configurations</a> in the <i>Network Firewall Developer Guide</i>.</p>
1933
+ * <note>
1934
+ * <p>If a server certificate that's associated with your <a>TLSInspectionConfiguration</a> is revoked, deleted, or expired it can result in client-side TLS errors.</p>
1935
+ * </note>
1936
+ */
1937
+ export interface ServerCertificateConfiguration {
1938
+ /**
1939
+ * <p>The list of a server certificate configuration's Certificate Manager SSL/TLS certificates.</p>
1940
+ */
1941
+ ServerCertificates?: ServerCertificate[];
1942
+ /**
1943
+ * <p>A list of a server certificate configuration's scopes.</p>
1944
+ */
1945
+ Scopes?: ServerCertificateScope[];
1946
+ }
1947
+ /**
1948
+ * @public
1949
+ * <p>The object that defines a TLS inspection configuration. This, along with <a>TLSInspectionConfigurationResponse</a>, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling <a>DescribeTLSInspectionConfiguration</a>. </p>
1950
+ * <p>Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination.</p>
1951
+ * <p>To use a TLS inspection configuration, you add it to a Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html">Decrypting SSL/TLS traffic with TLS
1952
+ * inspection configurations</a> in the <i>Network Firewall Developer Guide</i>.</p>
1953
+ */
1954
+ export interface TLSInspectionConfiguration {
1955
+ /**
1956
+ * <p>Lists the server certificate configurations that are associated with the TLS configuration.</p>
1957
+ */
1958
+ ServerCertificateConfigurations?: ServerCertificateConfiguration[];
1959
+ }
1960
+ /**
1961
+ * @public
1962
+ */
1963
+ export interface CreateTLSInspectionConfigurationRequest {
1964
+ /**
1965
+ * <p>The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.</p>
1966
+ */
1967
+ TLSInspectionConfigurationName: string | undefined;
1968
+ /**
1969
+ * <p>The object that defines a TLS inspection configuration. This, along with <a>TLSInspectionConfigurationResponse</a>, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling <a>DescribeTLSInspectionConfiguration</a>. </p>
1970
+ * <p>Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination.</p>
1971
+ * <p>To use a TLS inspection configuration, you add it to a Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html">Decrypting SSL/TLS traffic with TLS
1972
+ * inspection configurations</a> in the <i>Network Firewall Developer Guide</i>.</p>
1973
+ */
1974
+ TLSInspectionConfiguration: TLSInspectionConfiguration | undefined;
1975
+ /**
1976
+ * <p>A description of the TLS inspection configuration. </p>
1977
+ */
1978
+ Description?: string;
1979
+ /**
1980
+ * <p>The key:value pairs to associate with the resource.</p>
1981
+ */
1982
+ Tags?: Tag[];
1983
+ /**
1984
+ * <p>A complex type that contains optional Amazon Web Services Key Management Service (KMS) encryption settings for your Network Firewall resources. Your data is encrypted by default with an Amazon Web Services owned key that Amazon Web Services owns and manages for you. You can use either the Amazon Web Services owned key, or provide your own customer managed key. To learn more about KMS encryption of your Network Firewall resources, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-encryption-at-rest.html">Encryption at rest with Amazon Web Services Key Managment Service</a> in the <i>Network Firewall Developer Guide</i>.</p>
1985
+ */
1986
+ EncryptionConfiguration?: EncryptionConfiguration;
1987
+ }
1988
+ /**
1989
+ * @public
1990
+ * <p>The high-level properties of a TLS inspection configuration. This, along with the <code>TLSInspectionConfiguration</code>, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling <code>DescribeTLSInspectionConfiguration</code>.</p>
1991
+ */
1992
+ export interface TLSInspectionConfigurationResponse {
1993
+ /**
1994
+ * <p>The Amazon Resource Name (ARN) of the TLS inspection configuration.</p>
1995
+ */
1996
+ TLSInspectionConfigurationArn: string | undefined;
1997
+ /**
1998
+ * <p>The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.</p>
1999
+ */
2000
+ TLSInspectionConfigurationName: string | undefined;
2001
+ /**
2002
+ * <p>A unique identifier for the TLS inspection configuration. This ID is returned in the responses to create and list commands. You provide it to operations such as update and delete.</p>
2003
+ */
2004
+ TLSInspectionConfigurationId: string | undefined;
2005
+ /**
2006
+ * <p>Detailed information about the current status of a <a>TLSInspectionConfiguration</a>. You can retrieve this for a TLS inspection configuration by calling <a>DescribeTLSInspectionConfiguration</a> and providing the TLS inspection configuration name and ARN.</p>
2007
+ */
2008
+ TLSInspectionConfigurationStatus?: ResourceStatus | string;
2009
+ /**
2010
+ * <p>A description of the TLS inspection configuration. </p>
2011
+ */
2012
+ Description?: string;
2013
+ /**
2014
+ * <p>The key:value pairs to associate with the resource.</p>
2015
+ */
2016
+ Tags?: Tag[];
2017
+ /**
2018
+ * <p>The last time that the TLS inspection configuration was changed.</p>
2019
+ */
2020
+ LastModifiedTime?: Date;
2021
+ /**
2022
+ * <p>The number of firewall policies that use this TLS inspection configuration.</p>
2023
+ */
2024
+ NumberOfAssociations?: number;
2025
+ /**
2026
+ * <p>A complex type that contains the Amazon Web Services KMS encryption configuration settings for your TLS inspection configuration.</p>
2027
+ */
2028
+ EncryptionConfiguration?: EncryptionConfiguration;
2029
+ /**
2030
+ * <p>A list of the certificates associated with the TLS inspection configuration.</p>
2031
+ */
2032
+ Certificates?: TlsCertificateData[];
2033
+ }
2034
+ /**
2035
+ * @public
2036
+ */
2037
+ export interface CreateTLSInspectionConfigurationResponse {
2038
+ /**
2039
+ * <p>A token used for optimistic locking. Network Firewall returns a token to your requests that access the TLS inspection configuration. The token marks the state of the TLS inspection configuration resource at the time of the request. </p>
2040
+ * <p>To make changes to the TLS inspection configuration, you provide the token in your request. Network Firewall uses the token to ensure that the TLS inspection configuration hasn't changed since you last retrieved it. If it has changed, the operation fails with an <code>InvalidTokenException</code>. If this happens, retrieve the TLS inspection configuration again to get a current copy of it with a current token. Reapply your changes as needed, then try the operation again using the new token. </p>
2041
+ */
2042
+ UpdateToken: string | undefined;
2043
+ /**
2044
+ * <p>The high-level properties of a TLS inspection configuration. This, along with the <a>TLSInspectionConfiguration</a>, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling <a>DescribeTLSInspectionConfiguration</a>. </p>
2045
+ */
2046
+ TLSInspectionConfigurationResponse: TLSInspectionConfigurationResponse | undefined;
2047
+ }
1778
2048
  /**
1779
2049
  * @public
1780
2050
  */
@@ -1903,6 +2173,30 @@ export interface DeleteRuleGroupResponse {
1903
2173
  */
1904
2174
  RuleGroupResponse: RuleGroupResponse | undefined;
1905
2175
  }
2176
+ /**
2177
+ * @public
2178
+ */
2179
+ export interface DeleteTLSInspectionConfigurationRequest {
2180
+ /**
2181
+ * <p>The Amazon Resource Name (ARN) of the TLS inspection configuration.</p>
2182
+ * <p>You must specify the ARN or the name, and you can specify both. </p>
2183
+ */
2184
+ TLSInspectionConfigurationArn?: string;
2185
+ /**
2186
+ * <p>The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.</p>
2187
+ * <p>You must specify the ARN or the name, and you can specify both. </p>
2188
+ */
2189
+ TLSInspectionConfigurationName?: string;
2190
+ }
2191
+ /**
2192
+ * @public
2193
+ */
2194
+ export interface DeleteTLSInspectionConfigurationResponse {
2195
+ /**
2196
+ * <p>The high-level properties of a TLS inspection configuration. This, along with the <a>TLSInspectionConfiguration</a>, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling <a>DescribeTLSInspectionConfiguration</a>. </p>
2197
+ */
2198
+ TLSInspectionConfigurationResponse: TLSInspectionConfigurationResponse | undefined;
2199
+ }
1906
2200
  /**
1907
2201
  * @public
1908
2202
  */
@@ -1987,19 +2281,29 @@ export interface DescribeLoggingConfigurationRequest {
1987
2281
  }
1988
2282
  /**
1989
2283
  * @public
2284
+ * @enum
1990
2285
  */
1991
- export declare enum LogDestinationType {
1992
- CLOUDWATCH_LOGS = "CloudWatchLogs",
1993
- KINESIS_DATA_FIREHOSE = "KinesisDataFirehose",
1994
- S3 = "S3"
1995
- }
2286
+ export declare const LogDestinationType: {
2287
+ readonly CLOUDWATCH_LOGS: "CloudWatchLogs";
2288
+ readonly KINESIS_DATA_FIREHOSE: "KinesisDataFirehose";
2289
+ readonly S3: "S3";
2290
+ };
1996
2291
  /**
1997
2292
  * @public
1998
2293
  */
1999
- export declare enum LogType {
2000
- ALERT = "ALERT",
2001
- FLOW = "FLOW"
2002
- }
2294
+ export type LogDestinationType = (typeof LogDestinationType)[keyof typeof LogDestinationType];
2295
+ /**
2296
+ * @public
2297
+ * @enum
2298
+ */
2299
+ export declare const LogType: {
2300
+ readonly ALERT: "ALERT";
2301
+ readonly FLOW: "FLOW";
2302
+ };
2303
+ /**
2304
+ * @public
2305
+ */
2306
+ export type LogType = (typeof LogType)[keyof typeof LogType];
2003
2307
  /**
2004
2308
  * @public
2005
2309
  * <p>Defines where Network Firewall sends logs for the firewall for one log type. This is used
@@ -2210,6 +2514,42 @@ export interface DescribeRuleGroupMetadataResponse {
2210
2514
  */
2211
2515
  LastModifiedTime?: Date;
2212
2516
  }
2517
+ /**
2518
+ * @public
2519
+ */
2520
+ export interface DescribeTLSInspectionConfigurationRequest {
2521
+ /**
2522
+ * <p>The Amazon Resource Name (ARN) of the TLS inspection configuration.</p>
2523
+ * <p>You must specify the ARN or the name, and you can specify both. </p>
2524
+ */
2525
+ TLSInspectionConfigurationArn?: string;
2526
+ /**
2527
+ * <p>The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.</p>
2528
+ * <p>You must specify the ARN or the name, and you can specify both. </p>
2529
+ */
2530
+ TLSInspectionConfigurationName?: string;
2531
+ }
2532
+ /**
2533
+ * @public
2534
+ */
2535
+ export interface DescribeTLSInspectionConfigurationResponse {
2536
+ /**
2537
+ * <p>A token used for optimistic locking. Network Firewall returns a token to your requests that access the TLS inspection configuration. The token marks the state of the TLS inspection configuration resource at the time of the request. </p>
2538
+ * <p>To make changes to the TLS inspection configuration, you provide the token in your request. Network Firewall uses the token to ensure that the TLS inspection configuration hasn't changed since you last retrieved it. If it has changed, the operation fails with an <code>InvalidTokenException</code>. If this happens, retrieve the TLS inspection configuration again to get a current copy of it with a current token. Reapply your changes as needed, then try the operation again using the new token. </p>
2539
+ */
2540
+ UpdateToken: string | undefined;
2541
+ /**
2542
+ * <p>The object that defines a TLS inspection configuration. This, along with <a>TLSInspectionConfigurationResponse</a>, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling <a>DescribeTLSInspectionConfiguration</a>. </p>
2543
+ * <p>Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination.</p>
2544
+ * <p>To use a TLS inspection configuration, you add it to a Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html">Decrypting SSL/TLS traffic with TLS
2545
+ * inspection configurations</a> in the <i>Network Firewall Developer Guide</i>.</p>
2546
+ */
2547
+ TLSInspectionConfiguration?: TLSInspectionConfiguration;
2548
+ /**
2549
+ * <p>The high-level properties of a TLS inspection configuration. This, along with the <a>TLSInspectionConfiguration</a>, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling <a>DescribeTLSInspectionConfiguration</a>. </p>
2550
+ */
2551
+ TLSInspectionConfigurationResponse: TLSInspectionConfigurationResponse | undefined;
2552
+ }
2213
2553
  /**
2214
2554
  * @public
2215
2555
  */
@@ -2364,18 +2704,28 @@ export interface ListFirewallsResponse {
2364
2704
  }
2365
2705
  /**
2366
2706
  * @public
2707
+ * @enum
2367
2708
  */
2368
- export declare enum ResourceManagedType {
2369
- AWS_MANAGED_DOMAIN_LISTS = "AWS_MANAGED_DOMAIN_LISTS",
2370
- AWS_MANAGED_THREAT_SIGNATURES = "AWS_MANAGED_THREAT_SIGNATURES"
2371
- }
2709
+ export declare const ResourceManagedType: {
2710
+ readonly AWS_MANAGED_DOMAIN_LISTS: "AWS_MANAGED_DOMAIN_LISTS";
2711
+ readonly AWS_MANAGED_THREAT_SIGNATURES: "AWS_MANAGED_THREAT_SIGNATURES";
2712
+ };
2372
2713
  /**
2373
2714
  * @public
2374
2715
  */
2375
- export declare enum ResourceManagedStatus {
2376
- ACCOUNT = "ACCOUNT",
2377
- MANAGED = "MANAGED"
2378
- }
2716
+ export type ResourceManagedType = (typeof ResourceManagedType)[keyof typeof ResourceManagedType];
2717
+ /**
2718
+ * @public
2719
+ * @enum
2720
+ */
2721
+ export declare const ResourceManagedStatus: {
2722
+ readonly ACCOUNT: "ACCOUNT";
2723
+ readonly MANAGED: "MANAGED";
2724
+ };
2725
+ /**
2726
+ * @public
2727
+ */
2728
+ export type ResourceManagedStatus = (typeof ResourceManagedStatus)[keyof typeof ResourceManagedStatus];
2379
2729
  /**
2380
2730
  * @public
2381
2731
  */
@@ -2475,6 +2825,52 @@ export interface ListTagsForResourceResponse {
2475
2825
  */
2476
2826
  Tags?: Tag[];
2477
2827
  }
2828
+ /**
2829
+ * @public
2830
+ */
2831
+ export interface ListTLSInspectionConfigurationsRequest {
2832
+ /**
2833
+ * <p>When you request a list of objects with a <code>MaxResults</code> setting, if the number of objects that are still available
2834
+ * for retrieval exceeds the maximum you requested, Network Firewall returns a <code>NextToken</code>
2835
+ * value in the response. To retrieve the next batch of objects, use the token returned from the prior request in your next request.</p>
2836
+ */
2837
+ NextToken?: string;
2838
+ /**
2839
+ * <p>The maximum number of objects that you want Network Firewall to return for this request. If more
2840
+ * objects are available, in the response, Network Firewall provides a
2841
+ * <code>NextToken</code> value that you can use in a subsequent call to get the next batch of objects.</p>
2842
+ */
2843
+ MaxResults?: number;
2844
+ }
2845
+ /**
2846
+ * @public
2847
+ * <p>High-level information about a TLS inspection configuration, returned by <code>ListTLSInspectionConfigurations</code>. You can use the information provided in the metadata to retrieve and manage a TLS configuration.</p>
2848
+ */
2849
+ export interface TLSInspectionConfigurationMetadata {
2850
+ /**
2851
+ * <p>The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.</p>
2852
+ */
2853
+ Name?: string;
2854
+ /**
2855
+ * <p>The Amazon Resource Name (ARN) of the TLS inspection configuration.</p>
2856
+ */
2857
+ Arn?: string;
2858
+ }
2859
+ /**
2860
+ * @public
2861
+ */
2862
+ export interface ListTLSInspectionConfigurationsResponse {
2863
+ /**
2864
+ * <p>When you request a list of objects with a <code>MaxResults</code> setting, if the number of objects that are still available
2865
+ * for retrieval exceeds the maximum you requested, Network Firewall returns a <code>NextToken</code>
2866
+ * value in the response. To retrieve the next batch of objects, use the token returned from the prior request in your next request.</p>
2867
+ */
2868
+ NextToken?: string;
2869
+ /**
2870
+ * <p>The TLS inspection configuration metadata objects that you've defined. Depending on your setting for max results and the number of TLS inspection configurations, this might not be the full list.</p>
2871
+ */
2872
+ TLSInspectionConfigurations?: TLSInspectionConfigurationMetadata[];
2873
+ }
2478
2874
  /**
2479
2875
  * @public
2480
2876
  * <p>Unable to send logs to a configured logging destination. </p>
@@ -3007,3 +3403,50 @@ export interface UpdateSubnetChangeProtectionResponse {
3007
3403
  */
3008
3404
  SubnetChangeProtection?: boolean;
3009
3405
  }
3406
+ /**
3407
+ * @public
3408
+ */
3409
+ export interface UpdateTLSInspectionConfigurationRequest {
3410
+ /**
3411
+ * <p>The Amazon Resource Name (ARN) of the TLS inspection configuration.</p>
3412
+ */
3413
+ TLSInspectionConfigurationArn?: string;
3414
+ /**
3415
+ * <p>The descriptive name of the TLS inspection configuration. You can't change the name of a TLS inspection configuration after you create it.</p>
3416
+ */
3417
+ TLSInspectionConfigurationName?: string;
3418
+ /**
3419
+ * <p>The object that defines a TLS inspection configuration. This, along with <a>TLSInspectionConfigurationResponse</a>, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling <a>DescribeTLSInspectionConfiguration</a>. </p>
3420
+ * <p>Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination.</p>
3421
+ * <p>To use a TLS inspection configuration, you add it to a Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect inbound traffic. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html">Decrypting SSL/TLS traffic with TLS
3422
+ * inspection configurations</a> in the <i>Network Firewall Developer Guide</i>.</p>
3423
+ */
3424
+ TLSInspectionConfiguration: TLSInspectionConfiguration | undefined;
3425
+ /**
3426
+ * <p>A description of the TLS inspection configuration. </p>
3427
+ */
3428
+ Description?: string;
3429
+ /**
3430
+ * <p>A complex type that contains the Amazon Web Services KMS encryption configuration settings for your TLS inspection configuration.</p>
3431
+ */
3432
+ EncryptionConfiguration?: EncryptionConfiguration;
3433
+ /**
3434
+ * <p>A token used for optimistic locking. Network Firewall returns a token to your requests that access the TLS inspection configuration. The token marks the state of the TLS inspection configuration resource at the time of the request. </p>
3435
+ * <p>To make changes to the TLS inspection configuration, you provide the token in your request. Network Firewall uses the token to ensure that the TLS inspection configuration hasn't changed since you last retrieved it. If it has changed, the operation fails with an <code>InvalidTokenException</code>. If this happens, retrieve the TLS inspection configuration again to get a current copy of it with a current token. Reapply your changes as needed, then try the operation again using the new token. </p>
3436
+ */
3437
+ UpdateToken: string | undefined;
3438
+ }
3439
+ /**
3440
+ * @public
3441
+ */
3442
+ export interface UpdateTLSInspectionConfigurationResponse {
3443
+ /**
3444
+ * <p>A token used for optimistic locking. Network Firewall returns a token to your requests that access the TLS inspection configuration. The token marks the state of the TLS inspection configuration resource at the time of the request. </p>
3445
+ * <p>To make changes to the TLS inspection configuration, you provide the token in your request. Network Firewall uses the token to ensure that the TLS inspection configuration hasn't changed since you last retrieved it. If it has changed, the operation fails with an <code>InvalidTokenException</code>. If this happens, retrieve the TLS inspection configuration again to get a current copy of it with a current token. Reapply your changes as needed, then try the operation again using the new token. </p>
3446
+ */
3447
+ UpdateToken: string | undefined;
3448
+ /**
3449
+ * <p>The high-level properties of a TLS inspection configuration. This, along with the <a>TLSInspectionConfiguration</a>, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling <a>DescribeTLSInspectionConfiguration</a>. </p>
3450
+ */
3451
+ TLSInspectionConfigurationResponse: TLSInspectionConfigurationResponse | undefined;
3452
+ }