@aws-sdk/client-network-firewall 3.817.0 → 3.819.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (47) hide show
  1. package/README.md +50 -2
  2. package/dist-cjs/index.js +198 -3
  3. package/dist-es/NetworkFirewall.js +10 -0
  4. package/dist-es/commands/CreateVpcEndpointAssociationCommand.js +22 -0
  5. package/dist-es/commands/DeleteVpcEndpointAssociationCommand.js +22 -0
  6. package/dist-es/commands/DescribeFirewallMetadataCommand.js +22 -0
  7. package/dist-es/commands/DescribeVpcEndpointAssociationCommand.js +22 -0
  8. package/dist-es/commands/ListVpcEndpointAssociationsCommand.js +22 -0
  9. package/dist-es/commands/index.js +5 -0
  10. package/dist-es/pagination/ListVpcEndpointAssociationsPaginator.js +4 -0
  11. package/dist-es/pagination/index.js +1 -0
  12. package/dist-es/protocols/Aws_json1_0.js +99 -0
  13. package/dist-types/NetworkFirewall.d.ts +50 -5
  14. package/dist-types/NetworkFirewallClient.d.ts +20 -7
  15. package/dist-types/commands/CreateFirewallCommand.d.ts +1 -0
  16. package/dist-types/commands/CreateVpcEndpointAssociationCommand.d.ts +150 -0
  17. package/dist-types/commands/DeleteFirewallCommand.d.ts +1 -0
  18. package/dist-types/commands/DeleteVpcEndpointAssociationCommand.d.ts +137 -0
  19. package/dist-types/commands/DescribeFirewallCommand.d.ts +1 -0
  20. package/dist-types/commands/DescribeFirewallMetadataCommand.d.ts +107 -0
  21. package/dist-types/commands/DescribeFlowOperationCommand.d.ts +4 -0
  22. package/dist-types/commands/DescribeVpcEndpointAssociationCommand.d.ts +127 -0
  23. package/dist-types/commands/ListFlowOperationResultsCommand.d.ts +4 -0
  24. package/dist-types/commands/ListFlowOperationsCommand.d.ts +2 -0
  25. package/dist-types/commands/ListVpcEndpointAssociationsCommand.d.ts +105 -0
  26. package/dist-types/commands/PutResourcePolicyCommand.d.ts +5 -4
  27. package/dist-types/commands/StartFlowCaptureCommand.d.ts +2 -0
  28. package/dist-types/commands/StartFlowFlushCommand.d.ts +2 -0
  29. package/dist-types/commands/index.d.ts +5 -0
  30. package/dist-types/index.d.ts +13 -5
  31. package/dist-types/models/models_0.d.ts +467 -43
  32. package/dist-types/pagination/ListVpcEndpointAssociationsPaginator.d.ts +7 -0
  33. package/dist-types/pagination/index.d.ts +1 -0
  34. package/dist-types/protocols/Aws_json1_0.d.ts +45 -0
  35. package/dist-types/ts3.4/NetworkFirewall.d.ts +87 -0
  36. package/dist-types/ts3.4/NetworkFirewallClient.d.ts +30 -0
  37. package/dist-types/ts3.4/commands/CreateVpcEndpointAssociationCommand.d.ts +51 -0
  38. package/dist-types/ts3.4/commands/DeleteVpcEndpointAssociationCommand.d.ts +51 -0
  39. package/dist-types/ts3.4/commands/DescribeFirewallMetadataCommand.d.ts +51 -0
  40. package/dist-types/ts3.4/commands/DescribeVpcEndpointAssociationCommand.d.ts +51 -0
  41. package/dist-types/ts3.4/commands/ListVpcEndpointAssociationsCommand.d.ts +51 -0
  42. package/dist-types/ts3.4/commands/index.d.ts +5 -0
  43. package/dist-types/ts3.4/models/models_0.d.ts +83 -0
  44. package/dist-types/ts3.4/pagination/ListVpcEndpointAssociationsPaginator.d.ts +11 -0
  45. package/dist-types/ts3.4/pagination/index.d.ts +1 -0
  46. package/dist-types/ts3.4/protocols/Aws_json1_0.d.ts +60 -0
  47. package/package.json +1 -1
@@ -396,8 +396,8 @@ export declare const IPAddressType: {
396
396
  */
397
397
  export type IPAddressType = (typeof IPAddressType)[keyof typeof IPAddressType];
398
398
  /**
399
- * <p>The ID for a subnet that you want to associate with the firewall. This is used with
400
- * <a>CreateFirewall</a> and <a>AssociateSubnets</a>. Network Firewall
399
+ * <p>The ID for a subnet that's used in an association with a firewall. This is used in
400
+ * <a>CreateFirewall</a>, <a>AssociateSubnets</a>, and <a>CreateVpcEndpointAssociation</a>. Network Firewall
401
401
  * creates an instance of the associated firewall in each subnet that you specify, to filter
402
402
  * traffic in the subnet's Availability Zone.</p>
403
403
  * @public
@@ -501,14 +501,22 @@ export declare const AttachmentStatus: {
501
501
  */
502
502
  export type AttachmentStatus = (typeof AttachmentStatus)[keyof typeof AttachmentStatus];
503
503
  /**
504
- * <p>The configuration and status for a single subnet that you've specified for use by the
505
- * Network Firewall firewall. This is part of the <a>FirewallStatus</a>.</p>
504
+ * <p>The definition and status of the firewall endpoint for a single subnet. In each configured subnet, Network Firewall instantiates a firewall
505
+ * endpoint to handle network traffic. </p>
506
+ * <p>This data type is used for any firewall endpoint type: </p>
507
+ * <ul>
508
+ * <li>
509
+ * <p>For <code>Firewall.SubnetMappings</code>, this <code>Attachment</code> is part of the <code>FirewallStatus</code> sync states information. You define firewall subnets using <code>CreateFirewall</code> and <code>AssociateSubnets</code>. </p>
510
+ * </li>
511
+ * <li>
512
+ * <p>For <code>VpcEndpointAssociation</code>, this <code>Attachment</code> is part of the <code>VpcEndpointAssociationStatus</code> sync states information. You define these subnets using <code>CreateVpcEndpointAssociation</code>. </p>
513
+ * </li>
514
+ * </ul>
506
515
  * @public
507
516
  */
508
517
  export interface Attachment {
509
518
  /**
510
- * <p>The unique identifier of the subnet that you've specified to be used for a firewall
511
- * endpoint. </p>
519
+ * <p>The unique identifier of the subnet that you've specified to be used for a firewall endpoint. </p>
512
520
  * @public
513
521
  */
514
522
  SubnetId?: string | undefined;
@@ -520,12 +528,9 @@ export interface Attachment {
520
528
  */
521
529
  EndpointId?: string | undefined;
522
530
  /**
523
- * <p>The current status of the firewall endpoint in the subnet. This value reflects both the
524
- * instantiation of the endpoint in the VPC subnet and the sync states that are reported in
525
- * the <code>Config</code> settings. When this value is <code>READY</code>, the endpoint is
526
- * available and configured properly to handle network traffic. When the endpoint isn't
527
- * available for traffic, this value will reflect its state, for example
528
- * <code>CREATING</code> or <code>DELETING</code>.</p>
531
+ * <p>The current status of the firewall endpoint instantiation in the subnet. </p>
532
+ * <p>When this value is <code>READY</code>, the endpoint is available to handle network traffic. Otherwise,
533
+ * this value reflects its state, for example <code>CREATING</code> or <code>DELETING</code>.</p>
529
534
  * @public
530
535
  */
531
536
  Status?: AttachmentStatus | undefined;
@@ -535,6 +540,38 @@ export interface Attachment {
535
540
  */
536
541
  StatusMessage?: string | undefined;
537
542
  }
543
+ /**
544
+ * <p>The status of the firewall endpoint defined by a <code>VpcEndpointAssociation</code>. </p>
545
+ * @public
546
+ */
547
+ export interface AZSyncState {
548
+ /**
549
+ * <p>The definition and status of the firewall endpoint for a single subnet. In each configured subnet, Network Firewall instantiates a firewall
550
+ * endpoint to handle network traffic. </p>
551
+ * <p>This data type is used for any firewall endpoint type: </p>
552
+ * <ul>
553
+ * <li>
554
+ * <p>For <code>Firewall.SubnetMappings</code>, this <code>Attachment</code> is part of the <code>FirewallStatus</code> sync states information. You define firewall subnets using <code>CreateFirewall</code> and <code>AssociateSubnets</code>. </p>
555
+ * </li>
556
+ * <li>
557
+ * <p>For <code>VpcEndpointAssociation</code>, this <code>Attachment</code> is part of the <code>VpcEndpointAssociationStatus</code> sync states information. You define these subnets using <code>CreateVpcEndpointAssociation</code>. </p>
558
+ * </li>
559
+ * </ul>
560
+ * @public
561
+ */
562
+ Attachment?: Attachment | undefined;
563
+ }
564
+ /**
565
+ * <p>High-level information about an Availability Zone where the firewall has an endpoint defined. </p>
566
+ * @public
567
+ */
568
+ export interface AvailabilityZoneMetadata {
569
+ /**
570
+ * <p>The IP address type of the Firewall subnet in the Availability Zone. You can't change the IP address type after you create the subnet.</p>
571
+ * @public
572
+ */
573
+ IPAddressType?: IPAddressType | undefined;
574
+ }
538
575
  /**
539
576
  * <p>General information about the IP set.</p>
540
577
  * @public
@@ -795,10 +832,11 @@ export interface CreateFirewallRequest {
795
832
  EnabledAnalysisTypes?: EnabledAnalysisType[] | undefined;
796
833
  }
797
834
  /**
798
- * <p>The firewall defines the configuration settings for an Network Firewall firewall. These settings include the firewall policy, the subnets in your VPC to use for the firewall endpoints, and any tags that are attached to the firewall Amazon Web Services resource. </p>
835
+ * <p>A firewall defines the behavior of a firewall, the main VPC where the firewall is used, the Availability Zones where the firewall can be used, and one subnet to use for a firewall endpoint within each of the Availability Zones. The Availability Zones are defined implicitly in the subnet specifications.</p>
836
+ * <p>In addition to the firewall endpoints that you define in this <code>Firewall</code> specification, you can create firewall endpoints in <code>VpcEndpointAssociation</code> resources for any VPC, in any Availability Zone where the firewall is already in use. </p>
799
837
  * <p>The status of the firewall, for example whether it's ready to filter network traffic,
800
838
  * is provided in the corresponding <a>FirewallStatus</a>. You can retrieve both
801
- * objects by calling <a>DescribeFirewall</a>.</p>
839
+ * the firewall and firewall status by calling <a>DescribeFirewall</a>.</p>
802
840
  * @public
803
841
  */
804
842
  export interface Firewall {
@@ -826,8 +864,9 @@ export interface Firewall {
826
864
  */
827
865
  VpcId: string | undefined;
828
866
  /**
829
- * <p>The public subnets that Network Firewall is using for the firewall. Each subnet must belong
830
- * to a different Availability Zone. </p>
867
+ * <p>The primary public subnets that Network Firewall is using for the firewall. Network Firewall creates a firewall endpoint in each subnet. Create a subnet mapping for each Availability Zone where you want to use the firewall.</p>
868
+ * <p>These subnets are all defined for a single, primary VPC, and each must belong to a different Availability Zone. Each of these subnets establishes the availability of the firewall in its Availability Zone. </p>
869
+ * <p>In addition to these subnets, you can define other endpoints for the firewall in <code>VpcEndpointAssociation</code> resources. You can define these additional endpoints for any VPC, and for any of the Availability Zones where the firewall resource already has a subnet mapping. VPC endpoint associations give you the ability to protect multiple VPCs using a single firewall, and to define multiple firewall endpoints for a VPC in a single Availability Zone. </p>
831
870
  * @public
832
871
  */
833
872
  SubnetMappings: SubnetMapping[] | undefined;
@@ -872,6 +911,11 @@ export interface Firewall {
872
911
  * @public
873
912
  */
874
913
  EncryptionConfiguration?: EncryptionConfiguration | undefined;
914
+ /**
915
+ * <p>The number of <code>VpcEndpointAssociation</code> resources that use this firewall. </p>
916
+ * @public
917
+ */
918
+ NumberOfAssociations?: number | undefined;
875
919
  /**
876
920
  * <p>An optional setting indicating the specific traffic analysis types to enable on the firewall. </p>
877
921
  * @public
@@ -924,8 +968,8 @@ export interface PerObjectStatus {
924
968
  UpdateToken?: string | undefined;
925
969
  }
926
970
  /**
927
- * <p>The status of the firewall endpoint and firewall policy configuration for a single VPC
928
- * subnet. </p>
971
+ * <p>The status of the firewall endpoint and firewall policy configuration for a single VPC subnet.
972
+ * This is part of the <a>FirewallStatus</a>. </p>
929
973
  * <p>For each VPC subnet that you associate with a firewall, Network Firewall does the
930
974
  * following: </p>
931
975
  * <ul>
@@ -944,9 +988,9 @@ export interface PerObjectStatus {
944
988
  */
945
989
  export interface SyncState {
946
990
  /**
947
- * <p>The attachment status of the firewall's association with a single VPC subnet. For each
948
- * configured subnet, Network Firewall creates the attachment by instantiating the firewall
949
- * endpoint in the subnet so that it's ready to take traffic. This is part of the <a>FirewallStatus</a>.</p>
991
+ * <p>The configuration and status for a single firewall subnet.
992
+ * For each configured subnet, Network Firewall creates the attachment by instantiating the firewall
993
+ * endpoint in the subnet so that it's ready to take traffic. </p>
950
994
  * @public
951
995
  */
952
996
  Attachment?: Attachment | undefined;
@@ -954,19 +998,20 @@ export interface SyncState {
954
998
  * <p>The configuration status of the firewall endpoint in a single VPC subnet. Network Firewall
955
999
  * provides each endpoint with the rules that are configured in the firewall policy. Each time
956
1000
  * you add a subnet or modify the associated firewall policy, Network Firewall synchronizes the
957
- * rules in the endpoint, so it can properly filter network traffic. This is part of the <a>FirewallStatus</a>.</p>
1001
+ * rules in the endpoint, so it can properly filter network traffic. </p>
958
1002
  * @public
959
1003
  */
960
1004
  Config?: Record<string, PerObjectStatus> | undefined;
961
1005
  }
962
1006
  /**
963
1007
  * <p>Detailed information about the current status of a <a>Firewall</a>. You can retrieve this for a firewall by calling <a>DescribeFirewall</a> and providing the firewall name and ARN.</p>
1008
+ * <p>The firewall status indicates a combined status. It indicates whether all subnets are up-to-date with the latest firewall configurations, which is based on the sync states config values, and also whether all subnets have their endpoints fully enabled, based on their sync states attachment values. </p>
964
1009
  * @public
965
1010
  */
966
1011
  export interface FirewallStatus {
967
1012
  /**
968
1013
  * <p>The readiness of the configured firewall to handle network traffic across all of the
969
- * Availability Zones where you've configured it. This setting is <code>READY</code> only when
1014
+ * Availability Zones where you have it configured. This setting is <code>READY</code> only when
970
1015
  * the <code>ConfigurationSyncStateSummary</code> value is <code>IN_SYNC</code> and the
971
1016
  * <code>Attachment</code>
972
1017
  * <code>Status</code> values for all of the configured subnets are <code>READY</code>.
@@ -975,30 +1020,28 @@ export interface FirewallStatus {
975
1020
  */
976
1021
  Status: FirewallStatusValue | undefined;
977
1022
  /**
978
- * <p>The configuration sync state for the firewall. This summarizes the sync states reported
979
- * in the <code>Config</code> settings for all of the Availability Zones where you have
980
- * configured the firewall. </p>
1023
+ * <p>The configuration sync state for the firewall. This summarizes the <code>Config</code>
1024
+ * settings in the <code>SyncStates</code> for this firewall status object. </p>
981
1025
  * <p>When you create a firewall or update its configuration, for example by adding a rule
982
1026
  * group to its firewall policy, Network Firewall distributes the configuration changes to all
983
- * zones where the firewall is in use. This summary indicates whether the configuration
1027
+ * Availability Zones that have subnets defined for the firewall. This summary indicates whether the configuration
984
1028
  * changes have been applied everywhere. </p>
985
1029
  * <p>This status must be <code>IN_SYNC</code> for the firewall to be ready for use, but it
986
1030
  * doesn't indicate that the firewall is ready. The <code>Status</code> setting indicates
987
- * firewall readiness.</p>
1031
+ * firewall readiness. It's based on this setting and the readiness of the firewall endpoints to take traffic. </p>
988
1032
  * @public
989
1033
  */
990
1034
  ConfigurationSyncStateSummary: ConfigurationSyncState | undefined;
991
1035
  /**
992
- * <p>The subnets that you've configured for use by the Network Firewall firewall. This contains
993
- * one array element per Availability Zone where you've configured a subnet. These objects
994
- * provide details of the information that is summarized in the
995
- * <code>ConfigurationSyncStateSummary</code> and <code>Status</code>, broken down by zone
996
- * and configuration object. </p>
1036
+ * <p>Status for the subnets that you've configured in the firewall. This contains
1037
+ * one array element per Availability Zone where you've configured a subnet in the firewall. </p>
1038
+ * <p>These objects provide detailed information for the settings
1039
+ * <code>ConfigurationSyncStateSummary</code> and <code>Status</code>. </p>
997
1040
  * @public
998
1041
  */
999
1042
  SyncStates?: Record<string, SyncState> | undefined;
1000
1043
  /**
1001
- * <p>Describes the capacity usage of the resources contained in a firewall's reference sets. Network Firewall calclulates the capacity usage by taking an aggregated count of all of the resources used by all of the reference sets in a firewall.</p>
1044
+ * <p>Describes the capacity usage of the resources contained in a firewall's reference sets. Network Firewall calculates the capacity usage by taking an aggregated count of all of the resources used by all of the reference sets in a firewall.</p>
1002
1045
  * @public
1003
1046
  */
1004
1047
  CapacityUsageSummary?: CapacityUsageSummary | undefined;
@@ -1014,6 +1057,7 @@ export interface CreateFirewallResponse {
1014
1057
  Firewall?: Firewall | undefined;
1015
1058
  /**
1016
1059
  * <p>Detailed information about the current status of a <a>Firewall</a>. You can retrieve this for a firewall by calling <a>DescribeFirewall</a> and providing the firewall name and ARN.</p>
1060
+ * <p>The firewall status indicates a combined status. It indicates whether all subnets are up-to-date with the latest firewall configurations, which is based on the sync states config values, and also whether all subnets have their endpoints fully enabled, based on their sync states attachment values. </p>
1017
1061
  * @public
1018
1062
  */
1019
1063
  FirewallStatus?: FirewallStatus | undefined;
@@ -2439,7 +2483,8 @@ export interface ServerCertificateConfiguration {
2439
2483
  /**
2440
2484
  * <p>The object that defines a TLS inspection configuration. This, along with <a>TLSInspectionConfigurationResponse</a>, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling <a>DescribeTLSInspectionConfiguration</a>. </p>
2441
2485
  * <p>Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination.</p>
2442
- * <p>To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect the traffic traveling through your firewalls. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html">Inspecting SSL/TLS traffic with TLS
2486
+ * <p>To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect the traffic traveling through your firewalls. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see
2487
+ * <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html">Inspecting SSL/TLS traffic with TLS
2443
2488
  * inspection configurations</a> in the <i>Network Firewall Developer Guide</i>.</p>
2444
2489
  * @public
2445
2490
  */
@@ -2462,7 +2507,8 @@ export interface CreateTLSInspectionConfigurationRequest {
2462
2507
  /**
2463
2508
  * <p>The object that defines a TLS inspection configuration. This, along with <a>TLSInspectionConfigurationResponse</a>, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling <a>DescribeTLSInspectionConfiguration</a>. </p>
2464
2509
  * <p>Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination.</p>
2465
- * <p>To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect the traffic traveling through your firewalls. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html">Inspecting SSL/TLS traffic with TLS
2510
+ * <p>To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect the traffic traveling through your firewalls. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see
2511
+ * <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html">Inspecting SSL/TLS traffic with TLS
2466
2512
  * inspection configurations</a> in the <i>Network Firewall Developer Guide</i>.</p>
2467
2513
  * @public
2468
2514
  */
@@ -2560,6 +2606,142 @@ export interface CreateTLSInspectionConfigurationResponse {
2560
2606
  */
2561
2607
  TLSInspectionConfigurationResponse: TLSInspectionConfigurationResponse | undefined;
2562
2608
  }
2609
+ /**
2610
+ * @public
2611
+ */
2612
+ export interface CreateVpcEndpointAssociationRequest {
2613
+ /**
2614
+ * <p>The Amazon Resource Name (ARN) of the firewall.</p>
2615
+ * @public
2616
+ */
2617
+ FirewallArn: string | undefined;
2618
+ /**
2619
+ * <p>The unique identifier of the VPC where you want to create a firewall endpoint. </p>
2620
+ * @public
2621
+ */
2622
+ VpcId: string | undefined;
2623
+ /**
2624
+ * <p>The ID for a subnet that's used in an association with a firewall. This is used in
2625
+ * <a>CreateFirewall</a>, <a>AssociateSubnets</a>, and <a>CreateVpcEndpointAssociation</a>. Network Firewall
2626
+ * creates an instance of the associated firewall in each subnet that you specify, to filter
2627
+ * traffic in the subnet's Availability Zone.</p>
2628
+ * @public
2629
+ */
2630
+ SubnetMapping: SubnetMapping | undefined;
2631
+ /**
2632
+ * <p>A description of the VPC endpoint association. </p>
2633
+ * @public
2634
+ */
2635
+ Description?: string | undefined;
2636
+ /**
2637
+ * <p>The key:value pairs to associate with the resource.</p>
2638
+ * @public
2639
+ */
2640
+ Tags?: Tag[] | undefined;
2641
+ }
2642
+ /**
2643
+ * <p>A VPC endpoint association defines a single subnet to use for a firewall endpoint for a <code>Firewall</code>.
2644
+ * You can define VPC endpoint associations only in the Availability Zones that already have
2645
+ * a subnet mapping defined in the <code>Firewall</code> resource. </p>
2646
+ * <note>
2647
+ * <p>You can retrieve the list of Availability Zones that are available for use by calling <code>DescribeFirewallMetadata</code>.</p>
2648
+ * </note>
2649
+ * <p>To manage firewall endpoints, first, in the <code>Firewall</code> specification, you specify a single VPC and one subnet
2650
+ * for each of the Availability Zones where you want to use the firewall. Then you can define additional endpoints as
2651
+ * VPC endpoint associations. </p>
2652
+ * <p>You can use VPC endpoint associations to expand the protections of the firewall as follows: </p>
2653
+ * <ul>
2654
+ * <li>
2655
+ * <p>
2656
+ * <b>Protect multiple VPCs with a single firewall</b> - You can use the firewall to protect other VPCs, either in your account or in accounts where the firewall is shared. You can only specify Availability Zones that already have a firewall endpoint defined in the <code>Firewall</code> subnet mappings.</p>
2657
+ * </li>
2658
+ * <li>
2659
+ * <p>
2660
+ * <b>Define multiple firewall endpoints for a VPC in an Availability Zone</b> - You can create additional firewall endpoints for the VPC that you have defined in the firewall, in any Availability Zone that already has an endpoint defined in the <code>Firewall</code> subnet mappings. You can create multiple VPC endpoint associations for any other VPC where you use the firewall.</p>
2661
+ * </li>
2662
+ * </ul>
2663
+ * <p>You can use Resource Access Manager to share a <code>Firewall</code> that you own with other accounts, which gives them the ability to use the firewall
2664
+ * to create VPC endpoint associations. For information about sharing a firewall, see <code>PutResourcePolicy</code>
2665
+ * in this guide and see
2666
+ * <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/sharing.html">Sharing Network Firewall resources</a> in the <i>Network Firewall Developer Guide</i>.</p>
2667
+ * <p>The status of the VPC endpoint association, which indicates whether it's ready to filter network traffic,
2668
+ * is provided in the corresponding <a>VpcEndpointAssociationStatus</a>. You can retrieve both
2669
+ * the association and its status by calling <a>DescribeVpcEndpointAssociation</a>.</p>
2670
+ * @public
2671
+ */
2672
+ export interface VpcEndpointAssociation {
2673
+ /**
2674
+ * <p>The unique identifier of the VPC endpoint association. </p>
2675
+ * @public
2676
+ */
2677
+ VpcEndpointAssociationId?: string | undefined;
2678
+ /**
2679
+ * <p>The Amazon Resource Name (ARN) of a VPC endpoint association.</p>
2680
+ * @public
2681
+ */
2682
+ VpcEndpointAssociationArn: string | undefined;
2683
+ /**
2684
+ * <p>The Amazon Resource Name (ARN) of the firewall.</p>
2685
+ * @public
2686
+ */
2687
+ FirewallArn: string | undefined;
2688
+ /**
2689
+ * <p>The unique identifier of the VPC for the endpoint association. </p>
2690
+ * @public
2691
+ */
2692
+ VpcId: string | undefined;
2693
+ /**
2694
+ * <p>The ID for a subnet that's used in an association with a firewall. This is used in
2695
+ * <a>CreateFirewall</a>, <a>AssociateSubnets</a>, and <a>CreateVpcEndpointAssociation</a>. Network Firewall
2696
+ * creates an instance of the associated firewall in each subnet that you specify, to filter
2697
+ * traffic in the subnet's Availability Zone.</p>
2698
+ * @public
2699
+ */
2700
+ SubnetMapping: SubnetMapping | undefined;
2701
+ /**
2702
+ * <p>A description of the VPC endpoint association. </p>
2703
+ * @public
2704
+ */
2705
+ Description?: string | undefined;
2706
+ /**
2707
+ * <p>The key:value pairs to associate with the resource.</p>
2708
+ * @public
2709
+ */
2710
+ Tags?: Tag[] | undefined;
2711
+ }
2712
+ /**
2713
+ * <p>Detailed information about the current status of a <a>VpcEndpointAssociation</a>. You can retrieve this
2714
+ * by calling <a>DescribeVpcEndpointAssociation</a> and providing the VPC endpoint association ARN.</p>
2715
+ * @public
2716
+ */
2717
+ export interface VpcEndpointAssociationStatus {
2718
+ /**
2719
+ * <p>The readiness of the configured firewall endpoint to handle network traffic. </p>
2720
+ * @public
2721
+ */
2722
+ Status: FirewallStatusValue | undefined;
2723
+ /**
2724
+ * <p>The list of the Availability Zone sync states for all subnets that are defined by the firewall. </p>
2725
+ * @public
2726
+ */
2727
+ AssociationSyncState?: Record<string, AZSyncState> | undefined;
2728
+ }
2729
+ /**
2730
+ * @public
2731
+ */
2732
+ export interface CreateVpcEndpointAssociationResponse {
2733
+ /**
2734
+ * <p>The configuration settings for the VPC endpoint association. These settings include the firewall and the VPC and subnet to use for the firewall endpoint. </p>
2735
+ * @public
2736
+ */
2737
+ VpcEndpointAssociation?: VpcEndpointAssociation | undefined;
2738
+ /**
2739
+ * <p>Detailed information about the current status of a <a>VpcEndpointAssociation</a>. You can retrieve this
2740
+ * by calling <a>DescribeVpcEndpointAssociation</a> and providing the VPC endpoint association ARN.</p>
2741
+ * @public
2742
+ */
2743
+ VpcEndpointAssociationStatus?: VpcEndpointAssociationStatus | undefined;
2744
+ }
2563
2745
  /**
2564
2746
  * @public
2565
2747
  */
@@ -2582,15 +2764,17 @@ export interface DeleteFirewallRequest {
2582
2764
  */
2583
2765
  export interface DeleteFirewallResponse {
2584
2766
  /**
2585
- * <p>The firewall defines the configuration settings for an Network Firewall firewall. These settings include the firewall policy, the subnets in your VPC to use for the firewall endpoints, and any tags that are attached to the firewall Amazon Web Services resource. </p>
2767
+ * <p>A firewall defines the behavior of a firewall, the main VPC where the firewall is used, the Availability Zones where the firewall can be used, and one subnet to use for a firewall endpoint within each of the Availability Zones. The Availability Zones are defined implicitly in the subnet specifications.</p>
2768
+ * <p>In addition to the firewall endpoints that you define in this <code>Firewall</code> specification, you can create firewall endpoints in <code>VpcEndpointAssociation</code> resources for any VPC, in any Availability Zone where the firewall is already in use. </p>
2586
2769
  * <p>The status of the firewall, for example whether it's ready to filter network traffic,
2587
2770
  * is provided in the corresponding <a>FirewallStatus</a>. You can retrieve both
2588
- * objects by calling <a>DescribeFirewall</a>.</p>
2771
+ * the firewall and firewall status by calling <a>DescribeFirewall</a>.</p>
2589
2772
  * @public
2590
2773
  */
2591
2774
  Firewall?: Firewall | undefined;
2592
2775
  /**
2593
2776
  * <p>Detailed information about the current status of a <a>Firewall</a>. You can retrieve this for a firewall by calling <a>DescribeFirewall</a> and providing the firewall name and ARN.</p>
2777
+ * <p>The firewall status indicates a combined status. It indicates whether all subnets are up-to-date with the latest firewall configurations, which is based on the sync states config values, and also whether all subnets have their endpoints fully enabled, based on their sync states attachment values. </p>
2594
2778
  * @public
2595
2779
  */
2596
2780
  FirewallStatus?: FirewallStatus | undefined;
@@ -2727,6 +2911,32 @@ export interface DeleteTLSInspectionConfigurationResponse {
2727
2911
  */
2728
2912
  TLSInspectionConfigurationResponse: TLSInspectionConfigurationResponse | undefined;
2729
2913
  }
2914
+ /**
2915
+ * @public
2916
+ */
2917
+ export interface DeleteVpcEndpointAssociationRequest {
2918
+ /**
2919
+ * <p>The Amazon Resource Name (ARN) of a VPC endpoint association.</p>
2920
+ * @public
2921
+ */
2922
+ VpcEndpointAssociationArn: string | undefined;
2923
+ }
2924
+ /**
2925
+ * @public
2926
+ */
2927
+ export interface DeleteVpcEndpointAssociationResponse {
2928
+ /**
2929
+ * <p>The configuration settings for the VPC endpoint association. These settings include the firewall and the VPC and subnet to use for the firewall endpoint. </p>
2930
+ * @public
2931
+ */
2932
+ VpcEndpointAssociation?: VpcEndpointAssociation | undefined;
2933
+ /**
2934
+ * <p>Detailed information about the current status of a <a>VpcEndpointAssociation</a>. You can retrieve this
2935
+ * by calling <a>DescribeVpcEndpointAssociation</a> and providing the VPC endpoint association ARN.</p>
2936
+ * @public
2937
+ */
2938
+ VpcEndpointAssociationStatus?: VpcEndpointAssociationStatus | undefined;
2939
+ }
2730
2940
  /**
2731
2941
  * @public
2732
2942
  */
@@ -2762,10 +2972,57 @@ export interface DescribeFirewallResponse {
2762
2972
  Firewall?: Firewall | undefined;
2763
2973
  /**
2764
2974
  * <p>Detailed information about the current status of a <a>Firewall</a>. You can retrieve this for a firewall by calling <a>DescribeFirewall</a> and providing the firewall name and ARN.</p>
2975
+ * <p>The firewall status indicates a combined status. It indicates whether all subnets are up-to-date with the latest firewall configurations, which is based on the sync states config values, and also whether all subnets have their endpoints fully enabled, based on their sync states attachment values. </p>
2765
2976
  * @public
2766
2977
  */
2767
2978
  FirewallStatus?: FirewallStatus | undefined;
2768
2979
  }
2980
+ /**
2981
+ * @public
2982
+ */
2983
+ export interface DescribeFirewallMetadataRequest {
2984
+ /**
2985
+ * <p>The Amazon Resource Name (ARN) of the firewall.</p>
2986
+ * @public
2987
+ */
2988
+ FirewallArn?: string | undefined;
2989
+ }
2990
+ /**
2991
+ * @public
2992
+ */
2993
+ export interface DescribeFirewallMetadataResponse {
2994
+ /**
2995
+ * <p>The Amazon Resource Name (ARN) of the firewall.</p>
2996
+ * @public
2997
+ */
2998
+ FirewallArn?: string | undefined;
2999
+ /**
3000
+ * <p>The Amazon Resource Name (ARN) of the firewall policy.</p>
3001
+ * @public
3002
+ */
3003
+ FirewallPolicyArn?: string | undefined;
3004
+ /**
3005
+ * <p>A description of the firewall.</p>
3006
+ * @public
3007
+ */
3008
+ Description?: string | undefined;
3009
+ /**
3010
+ * <p>The readiness of the configured firewall to handle network traffic across all of the
3011
+ * Availability Zones where you have it configured. This setting is <code>READY</code> only when
3012
+ * the <code>ConfigurationSyncStateSummary</code> value is <code>IN_SYNC</code> and the
3013
+ * <code>Attachment</code>
3014
+ * <code>Status</code> values for all of the configured subnets are <code>READY</code>.
3015
+ * </p>
3016
+ * @public
3017
+ */
3018
+ Status?: FirewallStatusValue | undefined;
3019
+ /**
3020
+ * <p>The Availability Zones that the firewall currently supports. This includes all Availability Zones for which
3021
+ * the firewall has a subnet defined. </p>
3022
+ * @public
3023
+ */
3024
+ SupportedAvailabilityZones?: Record<string, AvailabilityZoneMetadata> | undefined;
3025
+ }
2769
3026
  /**
2770
3027
  * @public
2771
3028
  */
@@ -2819,6 +3076,16 @@ export interface DescribeFlowOperationRequest {
2819
3076
  * @public
2820
3077
  */
2821
3078
  AvailabilityZone?: string | undefined;
3079
+ /**
3080
+ * <p>The Amazon Resource Name (ARN) of a VPC endpoint association.</p>
3081
+ * @public
3082
+ */
3083
+ VpcEndpointAssociationArn?: string | undefined;
3084
+ /**
3085
+ * <p>A unique identifier for the primary endpoint associated with a firewall.</p>
3086
+ * @public
3087
+ */
3088
+ VpcEndpointId?: string | undefined;
2822
3089
  /**
2823
3090
  * <p>A unique identifier for the flow operation. This ID is returned in the responses to start and list commands. You provide to describe commands.</p>
2824
3091
  * @public
@@ -2924,6 +3191,16 @@ export interface DescribeFlowOperationResponse {
2924
3191
  * @public
2925
3192
  */
2926
3193
  AvailabilityZone?: string | undefined;
3194
+ /**
3195
+ * <p>The Amazon Resource Name (ARN) of a VPC endpoint association.</p>
3196
+ * @public
3197
+ */
3198
+ VpcEndpointAssociationArn?: string | undefined;
3199
+ /**
3200
+ * <p>A unique identifier for the primary endpoint associated with a firewall.</p>
3201
+ * @public
3202
+ */
3203
+ VpcEndpointId?: string | undefined;
2927
3204
  /**
2928
3205
  * <p>A unique identifier for the flow operation. This ID is returned in the responses to start and list commands. You provide to describe commands.</p>
2929
3206
  * @public
@@ -3281,7 +3558,8 @@ export interface DescribeTLSInspectionConfigurationResponse {
3281
3558
  /**
3282
3559
  * <p>The object that defines a TLS inspection configuration. This, along with <a>TLSInspectionConfigurationResponse</a>, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling <a>DescribeTLSInspectionConfiguration</a>. </p>
3283
3560
  * <p>Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination.</p>
3284
- * <p>To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect the traffic traveling through your firewalls. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html">Inspecting SSL/TLS traffic with TLS
3561
+ * <p>To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect the traffic traveling through your firewalls. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see
3562
+ * <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html">Inspecting SSL/TLS traffic with TLS
3285
3563
  * inspection configurations</a> in the <i>Network Firewall Developer Guide</i>.</p>
3286
3564
  * @public
3287
3565
  */
@@ -3292,6 +3570,32 @@ export interface DescribeTLSInspectionConfigurationResponse {
3292
3570
  */
3293
3571
  TLSInspectionConfigurationResponse: TLSInspectionConfigurationResponse | undefined;
3294
3572
  }
3573
+ /**
3574
+ * @public
3575
+ */
3576
+ export interface DescribeVpcEndpointAssociationRequest {
3577
+ /**
3578
+ * <p>The Amazon Resource Name (ARN) of a VPC endpoint association.</p>
3579
+ * @public
3580
+ */
3581
+ VpcEndpointAssociationArn: string | undefined;
3582
+ }
3583
+ /**
3584
+ * @public
3585
+ */
3586
+ export interface DescribeVpcEndpointAssociationResponse {
3587
+ /**
3588
+ * <p>The configuration settings for the VPC endpoint association. These settings include the firewall and the VPC and subnet to use for the firewall endpoint. </p>
3589
+ * @public
3590
+ */
3591
+ VpcEndpointAssociation?: VpcEndpointAssociation | undefined;
3592
+ /**
3593
+ * <p>Detailed information about the current status of a <a>VpcEndpointAssociation</a>. You can retrieve this
3594
+ * by calling <a>DescribeVpcEndpointAssociation</a> and providing the VPC endpoint association ARN.</p>
3595
+ * @public
3596
+ */
3597
+ VpcEndpointAssociationStatus?: VpcEndpointAssociationStatus | undefined;
3598
+ }
3295
3599
  /**
3296
3600
  * @public
3297
3601
  */
@@ -3709,6 +4013,16 @@ export interface ListFlowOperationResultsRequest {
3709
4013
  * @public
3710
4014
  */
3711
4015
  AvailabilityZone?: string | undefined;
4016
+ /**
4017
+ * <p>A unique identifier for the primary endpoint associated with a firewall.</p>
4018
+ * @public
4019
+ */
4020
+ VpcEndpointId?: string | undefined;
4021
+ /**
4022
+ * <p>The Amazon Resource Name (ARN) of a VPC endpoint association.</p>
4023
+ * @public
4024
+ */
4025
+ VpcEndpointAssociationArn?: string | undefined;
3712
4026
  }
3713
4027
  /**
3714
4028
  * @public
@@ -3725,6 +4039,16 @@ export interface ListFlowOperationResultsResponse {
3725
4039
  * @public
3726
4040
  */
3727
4041
  AvailabilityZone?: string | undefined;
4042
+ /**
4043
+ * <p></p>
4044
+ * @public
4045
+ */
4046
+ VpcEndpointAssociationArn?: string | undefined;
4047
+ /**
4048
+ * <p></p>
4049
+ * @public
4050
+ */
4051
+ VpcEndpointId?: string | undefined;
3728
4052
  /**
3729
4053
  * <p>A unique identifier for the flow operation. This ID is returned in the responses to start and list commands. You provide to describe commands.</p>
3730
4054
  * @public
@@ -3777,6 +4101,16 @@ export interface ListFlowOperationsRequest {
3777
4101
  * @public
3778
4102
  */
3779
4103
  AvailabilityZone?: string | undefined;
4104
+ /**
4105
+ * <p>The Amazon Resource Name (ARN) of a VPC endpoint association.</p>
4106
+ * @public
4107
+ */
4108
+ VpcEndpointAssociationArn?: string | undefined;
4109
+ /**
4110
+ * <p>A unique identifier for the primary endpoint associated with a firewall.</p>
4111
+ * @public
4112
+ */
4113
+ VpcEndpointId?: string | undefined;
3780
4114
  /**
3781
4115
  * <p>An optional string that defines whether any or all operation types are returned.</p>
3782
4116
  * @public
@@ -4005,6 +4339,63 @@ export interface ListTLSInspectionConfigurationsResponse {
4005
4339
  */
4006
4340
  TLSInspectionConfigurations?: TLSInspectionConfigurationMetadata[] | undefined;
4007
4341
  }
4342
+ /**
4343
+ * @public
4344
+ */
4345
+ export interface ListVpcEndpointAssociationsRequest {
4346
+ /**
4347
+ * <p>When you request a list of objects with a <code>MaxResults</code> setting, if the number of objects that are still available
4348
+ * for retrieval exceeds the maximum you requested, Network Firewall returns a <code>NextToken</code>
4349
+ * value in the response. To retrieve the next batch of objects, use the token returned from the prior request in your next request.</p>
4350
+ * @public
4351
+ */
4352
+ NextToken?: string | undefined;
4353
+ /**
4354
+ * <p>The maximum number of objects that you want Network Firewall to return for this request. If more
4355
+ * objects are available, in the response, Network Firewall provides a
4356
+ * <code>NextToken</code> value that you can use in a subsequent call to get the next batch of objects.</p>
4357
+ * @public
4358
+ */
4359
+ MaxResults?: number | undefined;
4360
+ /**
4361
+ * <p>The Amazon Resource Name (ARN) of the firewall.</p>
4362
+ * <p>If you don't specify this, Network Firewall retrieves all VPC endpoint associations that you have defined.</p>
4363
+ * @public
4364
+ */
4365
+ FirewallArn?: string | undefined;
4366
+ }
4367
+ /**
4368
+ * <p>High-level information about a VPC endpoint association, returned by <code>ListVpcEndpointAssociations</code>. You can use the information provided in the metadata to retrieve and manage a VPC endpoint association.</p>
4369
+ * @public
4370
+ */
4371
+ export interface VpcEndpointAssociationMetadata {
4372
+ /**
4373
+ * <p>The Amazon Resource Name (ARN) of a VPC endpoint association.</p>
4374
+ * @public
4375
+ */
4376
+ VpcEndpointAssociationArn?: string | undefined;
4377
+ }
4378
+ /**
4379
+ * @public
4380
+ */
4381
+ export interface ListVpcEndpointAssociationsResponse {
4382
+ /**
4383
+ * <p>When you request a list of objects with a <code>MaxResults</code> setting, if the number of objects that are still available
4384
+ * for retrieval exceeds the maximum you requested, Network Firewall returns a <code>NextToken</code>
4385
+ * value in the response. To retrieve the next batch of objects, use the token returned from the prior request in your next request.</p>
4386
+ * @public
4387
+ */
4388
+ NextToken?: string | undefined;
4389
+ /**
4390
+ * <p>The VPC endpoint assocation metadata objects for the firewall that you specified. If you didn't
4391
+ * specify a firewall, this is all VPC endpoint associations that you have defined. </p>
4392
+ * <p>Depending on your setting
4393
+ * for max results and the number of firewalls you have, a single call might not be the full
4394
+ * list. </p>
4395
+ * @public
4396
+ */
4397
+ VpcEndpointAssociations?: VpcEndpointAssociationMetadata[] | undefined;
4398
+ }
4008
4399
  /**
4009
4400
  * <p>Unable to send logs to a configured logging destination. </p>
4010
4401
  * @public
@@ -4023,12 +4414,12 @@ export declare class LogDestinationPermissionException extends __BaseException {
4023
4414
  */
4024
4415
  export interface PutResourcePolicyRequest {
4025
4416
  /**
4026
- * <p>The Amazon Resource Name (ARN) of the account that you want to share rule groups and firewall policies with.</p>
4417
+ * <p>The Amazon Resource Name (ARN) of the account that you want to share your Network Firewall resources with.</p>
4027
4418
  * @public
4028
4419
  */
4029
4420
  ResourceArn: string | undefined;
4030
4421
  /**
4031
- * <p>The IAM policy statement that lists the accounts that you want to share your rule group or firewall policy with
4422
+ * <p>The IAM policy statement that lists the accounts that you want to share your Network Firewall resources with
4032
4423
  * and the operations that you want the accounts to be able to perform. </p>
4033
4424
  * <p>For a rule group resource, you can specify the following operations in the Actions section of the statement:</p>
4034
4425
  * <ul>
@@ -4051,7 +4442,19 @@ export interface PutResourcePolicyRequest {
4051
4442
  * <p>network-firewall:ListFirewallPolicies</p>
4052
4443
  * </li>
4053
4444
  * </ul>
4054
- * <p>In the Resource section of the statement, you specify the ARNs for the rule groups and firewall policies that you want to share with the account that you specified in <code>Arn</code>.</p>
4445
+ * <p>For a firewall resource, you can specify the following operations in the Actions section of the statement:</p>
4446
+ * <ul>
4447
+ * <li>
4448
+ * <p>network-firewall:CreateVpcEndpointAssociation</p>
4449
+ * </li>
4450
+ * <li>
4451
+ * <p>network-firewall:DescribeFirewallMetadata</p>
4452
+ * </li>
4453
+ * <li>
4454
+ * <p>network-firewall:ListFirewalls</p>
4455
+ * </li>
4456
+ * </ul>
4457
+ * <p>In the Resource section of the statement, you specify the ARNs for the Network Firewall resources that you want to share with the account that you specified in <code>Arn</code>.</p>
4055
4458
  * @public
4056
4459
  */
4057
4460
  Policy: string | undefined;
@@ -4108,6 +4511,16 @@ export interface StartFlowCaptureRequest {
4108
4511
  * @public
4109
4512
  */
4110
4513
  AvailabilityZone?: string | undefined;
4514
+ /**
4515
+ * <p>The Amazon Resource Name (ARN) of a VPC endpoint association.</p>
4516
+ * @public
4517
+ */
4518
+ VpcEndpointAssociationArn?: string | undefined;
4519
+ /**
4520
+ * <p>A unique identifier for the primary endpoint associated with a firewall.</p>
4521
+ * @public
4522
+ */
4523
+ VpcEndpointId?: string | undefined;
4111
4524
  /**
4112
4525
  * <p>The reqested <code>FlowOperation</code> ignores flows with an age (in seconds) lower than <code>MinimumFlowAgeInSeconds</code>.
4113
4526
  * You provide this for start commands.</p>
@@ -4160,6 +4573,16 @@ export interface StartFlowFlushRequest {
4160
4573
  * @public
4161
4574
  */
4162
4575
  AvailabilityZone?: string | undefined;
4576
+ /**
4577
+ * <p>The Amazon Resource Name (ARN) of a VPC endpoint association.</p>
4578
+ * @public
4579
+ */
4580
+ VpcEndpointAssociationArn?: string | undefined;
4581
+ /**
4582
+ * <p>A unique identifier for the primary endpoint associated with a firewall.</p>
4583
+ * @public
4584
+ */
4585
+ VpcEndpointId?: string | undefined;
4163
4586
  /**
4164
4587
  * <p>The reqested <code>FlowOperation</code> ignores flows with an age (in seconds) lower than <code>MinimumFlowAgeInSeconds</code>.
4165
4588
  * You provide this for start commands.</p>
@@ -4817,7 +5240,8 @@ export interface UpdateTLSInspectionConfigurationRequest {
4817
5240
  /**
4818
5241
  * <p>The object that defines a TLS inspection configuration. This, along with <a>TLSInspectionConfigurationResponse</a>, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling <a>DescribeTLSInspectionConfiguration</a>. </p>
4819
5242
  * <p>Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination.</p>
4820
- * <p>To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect the traffic traveling through your firewalls. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html">Inspecting SSL/TLS traffic with TLS
5243
+ * <p>To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect the traffic traveling through your firewalls. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see
5244
+ * <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html">Inspecting SSL/TLS traffic with TLS
4821
5245
  * inspection configurations</a> in the <i>Network Firewall Developer Guide</i>.</p>
4822
5246
  * @public
4823
5247
  */