@aws-sdk/client-network-firewall 3.817.0 → 3.819.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +50 -2
- package/dist-cjs/index.js +198 -3
- package/dist-es/NetworkFirewall.js +10 -0
- package/dist-es/commands/CreateVpcEndpointAssociationCommand.js +22 -0
- package/dist-es/commands/DeleteVpcEndpointAssociationCommand.js +22 -0
- package/dist-es/commands/DescribeFirewallMetadataCommand.js +22 -0
- package/dist-es/commands/DescribeVpcEndpointAssociationCommand.js +22 -0
- package/dist-es/commands/ListVpcEndpointAssociationsCommand.js +22 -0
- package/dist-es/commands/index.js +5 -0
- package/dist-es/pagination/ListVpcEndpointAssociationsPaginator.js +4 -0
- package/dist-es/pagination/index.js +1 -0
- package/dist-es/protocols/Aws_json1_0.js +99 -0
- package/dist-types/NetworkFirewall.d.ts +50 -5
- package/dist-types/NetworkFirewallClient.d.ts +20 -7
- package/dist-types/commands/CreateFirewallCommand.d.ts +1 -0
- package/dist-types/commands/CreateVpcEndpointAssociationCommand.d.ts +150 -0
- package/dist-types/commands/DeleteFirewallCommand.d.ts +1 -0
- package/dist-types/commands/DeleteVpcEndpointAssociationCommand.d.ts +137 -0
- package/dist-types/commands/DescribeFirewallCommand.d.ts +1 -0
- package/dist-types/commands/DescribeFirewallMetadataCommand.d.ts +107 -0
- package/dist-types/commands/DescribeFlowOperationCommand.d.ts +4 -0
- package/dist-types/commands/DescribeVpcEndpointAssociationCommand.d.ts +127 -0
- package/dist-types/commands/ListFlowOperationResultsCommand.d.ts +4 -0
- package/dist-types/commands/ListFlowOperationsCommand.d.ts +2 -0
- package/dist-types/commands/ListVpcEndpointAssociationsCommand.d.ts +105 -0
- package/dist-types/commands/PutResourcePolicyCommand.d.ts +5 -4
- package/dist-types/commands/StartFlowCaptureCommand.d.ts +2 -0
- package/dist-types/commands/StartFlowFlushCommand.d.ts +2 -0
- package/dist-types/commands/index.d.ts +5 -0
- package/dist-types/index.d.ts +13 -5
- package/dist-types/models/models_0.d.ts +467 -43
- package/dist-types/pagination/ListVpcEndpointAssociationsPaginator.d.ts +7 -0
- package/dist-types/pagination/index.d.ts +1 -0
- package/dist-types/protocols/Aws_json1_0.d.ts +45 -0
- package/dist-types/ts3.4/NetworkFirewall.d.ts +87 -0
- package/dist-types/ts3.4/NetworkFirewallClient.d.ts +30 -0
- package/dist-types/ts3.4/commands/CreateVpcEndpointAssociationCommand.d.ts +51 -0
- package/dist-types/ts3.4/commands/DeleteVpcEndpointAssociationCommand.d.ts +51 -0
- package/dist-types/ts3.4/commands/DescribeFirewallMetadataCommand.d.ts +51 -0
- package/dist-types/ts3.4/commands/DescribeVpcEndpointAssociationCommand.d.ts +51 -0
- package/dist-types/ts3.4/commands/ListVpcEndpointAssociationsCommand.d.ts +51 -0
- package/dist-types/ts3.4/commands/index.d.ts +5 -0
- package/dist-types/ts3.4/models/models_0.d.ts +83 -0
- package/dist-types/ts3.4/pagination/ListVpcEndpointAssociationsPaginator.d.ts +11 -0
- package/dist-types/ts3.4/pagination/index.d.ts +1 -0
- package/dist-types/ts3.4/protocols/Aws_json1_0.d.ts +60 -0
- package/package.json +1 -1
|
@@ -396,8 +396,8 @@ export declare const IPAddressType: {
|
|
|
396
396
|
*/
|
|
397
397
|
export type IPAddressType = (typeof IPAddressType)[keyof typeof IPAddressType];
|
|
398
398
|
/**
|
|
399
|
-
* <p>The ID for a subnet that
|
|
400
|
-
*
|
|
399
|
+
* <p>The ID for a subnet that's used in an association with a firewall. This is used in
|
|
400
|
+
* <a>CreateFirewall</a>, <a>AssociateSubnets</a>, and <a>CreateVpcEndpointAssociation</a>. Network Firewall
|
|
401
401
|
* creates an instance of the associated firewall in each subnet that you specify, to filter
|
|
402
402
|
* traffic in the subnet's Availability Zone.</p>
|
|
403
403
|
* @public
|
|
@@ -501,14 +501,22 @@ export declare const AttachmentStatus: {
|
|
|
501
501
|
*/
|
|
502
502
|
export type AttachmentStatus = (typeof AttachmentStatus)[keyof typeof AttachmentStatus];
|
|
503
503
|
/**
|
|
504
|
-
* <p>The
|
|
505
|
-
*
|
|
504
|
+
* <p>The definition and status of the firewall endpoint for a single subnet. In each configured subnet, Network Firewall instantiates a firewall
|
|
505
|
+
* endpoint to handle network traffic. </p>
|
|
506
|
+
* <p>This data type is used for any firewall endpoint type: </p>
|
|
507
|
+
* <ul>
|
|
508
|
+
* <li>
|
|
509
|
+
* <p>For <code>Firewall.SubnetMappings</code>, this <code>Attachment</code> is part of the <code>FirewallStatus</code> sync states information. You define firewall subnets using <code>CreateFirewall</code> and <code>AssociateSubnets</code>. </p>
|
|
510
|
+
* </li>
|
|
511
|
+
* <li>
|
|
512
|
+
* <p>For <code>VpcEndpointAssociation</code>, this <code>Attachment</code> is part of the <code>VpcEndpointAssociationStatus</code> sync states information. You define these subnets using <code>CreateVpcEndpointAssociation</code>. </p>
|
|
513
|
+
* </li>
|
|
514
|
+
* </ul>
|
|
506
515
|
* @public
|
|
507
516
|
*/
|
|
508
517
|
export interface Attachment {
|
|
509
518
|
/**
|
|
510
|
-
* <p>The unique identifier of the subnet that you've specified to be used for a firewall
|
|
511
|
-
* endpoint. </p>
|
|
519
|
+
* <p>The unique identifier of the subnet that you've specified to be used for a firewall endpoint. </p>
|
|
512
520
|
* @public
|
|
513
521
|
*/
|
|
514
522
|
SubnetId?: string | undefined;
|
|
@@ -520,12 +528,9 @@ export interface Attachment {
|
|
|
520
528
|
*/
|
|
521
529
|
EndpointId?: string | undefined;
|
|
522
530
|
/**
|
|
523
|
-
* <p>The current status of the firewall endpoint in the subnet.
|
|
524
|
-
*
|
|
525
|
-
*
|
|
526
|
-
* available and configured properly to handle network traffic. When the endpoint isn't
|
|
527
|
-
* available for traffic, this value will reflect its state, for example
|
|
528
|
-
* <code>CREATING</code> or <code>DELETING</code>.</p>
|
|
531
|
+
* <p>The current status of the firewall endpoint instantiation in the subnet. </p>
|
|
532
|
+
* <p>When this value is <code>READY</code>, the endpoint is available to handle network traffic. Otherwise,
|
|
533
|
+
* this value reflects its state, for example <code>CREATING</code> or <code>DELETING</code>.</p>
|
|
529
534
|
* @public
|
|
530
535
|
*/
|
|
531
536
|
Status?: AttachmentStatus | undefined;
|
|
@@ -535,6 +540,38 @@ export interface Attachment {
|
|
|
535
540
|
*/
|
|
536
541
|
StatusMessage?: string | undefined;
|
|
537
542
|
}
|
|
543
|
+
/**
|
|
544
|
+
* <p>The status of the firewall endpoint defined by a <code>VpcEndpointAssociation</code>. </p>
|
|
545
|
+
* @public
|
|
546
|
+
*/
|
|
547
|
+
export interface AZSyncState {
|
|
548
|
+
/**
|
|
549
|
+
* <p>The definition and status of the firewall endpoint for a single subnet. In each configured subnet, Network Firewall instantiates a firewall
|
|
550
|
+
* endpoint to handle network traffic. </p>
|
|
551
|
+
* <p>This data type is used for any firewall endpoint type: </p>
|
|
552
|
+
* <ul>
|
|
553
|
+
* <li>
|
|
554
|
+
* <p>For <code>Firewall.SubnetMappings</code>, this <code>Attachment</code> is part of the <code>FirewallStatus</code> sync states information. You define firewall subnets using <code>CreateFirewall</code> and <code>AssociateSubnets</code>. </p>
|
|
555
|
+
* </li>
|
|
556
|
+
* <li>
|
|
557
|
+
* <p>For <code>VpcEndpointAssociation</code>, this <code>Attachment</code> is part of the <code>VpcEndpointAssociationStatus</code> sync states information. You define these subnets using <code>CreateVpcEndpointAssociation</code>. </p>
|
|
558
|
+
* </li>
|
|
559
|
+
* </ul>
|
|
560
|
+
* @public
|
|
561
|
+
*/
|
|
562
|
+
Attachment?: Attachment | undefined;
|
|
563
|
+
}
|
|
564
|
+
/**
|
|
565
|
+
* <p>High-level information about an Availability Zone where the firewall has an endpoint defined. </p>
|
|
566
|
+
* @public
|
|
567
|
+
*/
|
|
568
|
+
export interface AvailabilityZoneMetadata {
|
|
569
|
+
/**
|
|
570
|
+
* <p>The IP address type of the Firewall subnet in the Availability Zone. You can't change the IP address type after you create the subnet.</p>
|
|
571
|
+
* @public
|
|
572
|
+
*/
|
|
573
|
+
IPAddressType?: IPAddressType | undefined;
|
|
574
|
+
}
|
|
538
575
|
/**
|
|
539
576
|
* <p>General information about the IP set.</p>
|
|
540
577
|
* @public
|
|
@@ -795,10 +832,11 @@ export interface CreateFirewallRequest {
|
|
|
795
832
|
EnabledAnalysisTypes?: EnabledAnalysisType[] | undefined;
|
|
796
833
|
}
|
|
797
834
|
/**
|
|
798
|
-
* <p>
|
|
835
|
+
* <p>A firewall defines the behavior of a firewall, the main VPC where the firewall is used, the Availability Zones where the firewall can be used, and one subnet to use for a firewall endpoint within each of the Availability Zones. The Availability Zones are defined implicitly in the subnet specifications.</p>
|
|
836
|
+
* <p>In addition to the firewall endpoints that you define in this <code>Firewall</code> specification, you can create firewall endpoints in <code>VpcEndpointAssociation</code> resources for any VPC, in any Availability Zone where the firewall is already in use. </p>
|
|
799
837
|
* <p>The status of the firewall, for example whether it's ready to filter network traffic,
|
|
800
838
|
* is provided in the corresponding <a>FirewallStatus</a>. You can retrieve both
|
|
801
|
-
*
|
|
839
|
+
* the firewall and firewall status by calling <a>DescribeFirewall</a>.</p>
|
|
802
840
|
* @public
|
|
803
841
|
*/
|
|
804
842
|
export interface Firewall {
|
|
@@ -826,8 +864,9 @@ export interface Firewall {
|
|
|
826
864
|
*/
|
|
827
865
|
VpcId: string | undefined;
|
|
828
866
|
/**
|
|
829
|
-
* <p>The public subnets that Network Firewall is using for the firewall.
|
|
830
|
-
* to a different Availability Zone. </p>
|
|
867
|
+
* <p>The primary public subnets that Network Firewall is using for the firewall. Network Firewall creates a firewall endpoint in each subnet. Create a subnet mapping for each Availability Zone where you want to use the firewall.</p>
|
|
868
|
+
* <p>These subnets are all defined for a single, primary VPC, and each must belong to a different Availability Zone. Each of these subnets establishes the availability of the firewall in its Availability Zone. </p>
|
|
869
|
+
* <p>In addition to these subnets, you can define other endpoints for the firewall in <code>VpcEndpointAssociation</code> resources. You can define these additional endpoints for any VPC, and for any of the Availability Zones where the firewall resource already has a subnet mapping. VPC endpoint associations give you the ability to protect multiple VPCs using a single firewall, and to define multiple firewall endpoints for a VPC in a single Availability Zone. </p>
|
|
831
870
|
* @public
|
|
832
871
|
*/
|
|
833
872
|
SubnetMappings: SubnetMapping[] | undefined;
|
|
@@ -872,6 +911,11 @@ export interface Firewall {
|
|
|
872
911
|
* @public
|
|
873
912
|
*/
|
|
874
913
|
EncryptionConfiguration?: EncryptionConfiguration | undefined;
|
|
914
|
+
/**
|
|
915
|
+
* <p>The number of <code>VpcEndpointAssociation</code> resources that use this firewall. </p>
|
|
916
|
+
* @public
|
|
917
|
+
*/
|
|
918
|
+
NumberOfAssociations?: number | undefined;
|
|
875
919
|
/**
|
|
876
920
|
* <p>An optional setting indicating the specific traffic analysis types to enable on the firewall. </p>
|
|
877
921
|
* @public
|
|
@@ -924,8 +968,8 @@ export interface PerObjectStatus {
|
|
|
924
968
|
UpdateToken?: string | undefined;
|
|
925
969
|
}
|
|
926
970
|
/**
|
|
927
|
-
* <p>The status of the firewall endpoint and firewall policy configuration for a single VPC
|
|
928
|
-
*
|
|
971
|
+
* <p>The status of the firewall endpoint and firewall policy configuration for a single VPC subnet.
|
|
972
|
+
* This is part of the <a>FirewallStatus</a>. </p>
|
|
929
973
|
* <p>For each VPC subnet that you associate with a firewall, Network Firewall does the
|
|
930
974
|
* following: </p>
|
|
931
975
|
* <ul>
|
|
@@ -944,9 +988,9 @@ export interface PerObjectStatus {
|
|
|
944
988
|
*/
|
|
945
989
|
export interface SyncState {
|
|
946
990
|
/**
|
|
947
|
-
* <p>The
|
|
948
|
-
*
|
|
949
|
-
* endpoint in the subnet so that it's ready to take traffic.
|
|
991
|
+
* <p>The configuration and status for a single firewall subnet.
|
|
992
|
+
* For each configured subnet, Network Firewall creates the attachment by instantiating the firewall
|
|
993
|
+
* endpoint in the subnet so that it's ready to take traffic. </p>
|
|
950
994
|
* @public
|
|
951
995
|
*/
|
|
952
996
|
Attachment?: Attachment | undefined;
|
|
@@ -954,19 +998,20 @@ export interface SyncState {
|
|
|
954
998
|
* <p>The configuration status of the firewall endpoint in a single VPC subnet. Network Firewall
|
|
955
999
|
* provides each endpoint with the rules that are configured in the firewall policy. Each time
|
|
956
1000
|
* you add a subnet or modify the associated firewall policy, Network Firewall synchronizes the
|
|
957
|
-
*
|
|
1001
|
+
* rules in the endpoint, so it can properly filter network traffic. </p>
|
|
958
1002
|
* @public
|
|
959
1003
|
*/
|
|
960
1004
|
Config?: Record<string, PerObjectStatus> | undefined;
|
|
961
1005
|
}
|
|
962
1006
|
/**
|
|
963
1007
|
* <p>Detailed information about the current status of a <a>Firewall</a>. You can retrieve this for a firewall by calling <a>DescribeFirewall</a> and providing the firewall name and ARN.</p>
|
|
1008
|
+
* <p>The firewall status indicates a combined status. It indicates whether all subnets are up-to-date with the latest firewall configurations, which is based on the sync states config values, and also whether all subnets have their endpoints fully enabled, based on their sync states attachment values. </p>
|
|
964
1009
|
* @public
|
|
965
1010
|
*/
|
|
966
1011
|
export interface FirewallStatus {
|
|
967
1012
|
/**
|
|
968
1013
|
* <p>The readiness of the configured firewall to handle network traffic across all of the
|
|
969
|
-
* Availability Zones where you
|
|
1014
|
+
* Availability Zones where you have it configured. This setting is <code>READY</code> only when
|
|
970
1015
|
* the <code>ConfigurationSyncStateSummary</code> value is <code>IN_SYNC</code> and the
|
|
971
1016
|
* <code>Attachment</code>
|
|
972
1017
|
* <code>Status</code> values for all of the configured subnets are <code>READY</code>.
|
|
@@ -975,30 +1020,28 @@ export interface FirewallStatus {
|
|
|
975
1020
|
*/
|
|
976
1021
|
Status: FirewallStatusValue | undefined;
|
|
977
1022
|
/**
|
|
978
|
-
* <p>The configuration sync state for the firewall. This summarizes the
|
|
979
|
-
*
|
|
980
|
-
* configured the firewall. </p>
|
|
1023
|
+
* <p>The configuration sync state for the firewall. This summarizes the <code>Config</code>
|
|
1024
|
+
* settings in the <code>SyncStates</code> for this firewall status object. </p>
|
|
981
1025
|
* <p>When you create a firewall or update its configuration, for example by adding a rule
|
|
982
1026
|
* group to its firewall policy, Network Firewall distributes the configuration changes to all
|
|
983
|
-
*
|
|
1027
|
+
* Availability Zones that have subnets defined for the firewall. This summary indicates whether the configuration
|
|
984
1028
|
* changes have been applied everywhere. </p>
|
|
985
1029
|
* <p>This status must be <code>IN_SYNC</code> for the firewall to be ready for use, but it
|
|
986
1030
|
* doesn't indicate that the firewall is ready. The <code>Status</code> setting indicates
|
|
987
|
-
* firewall readiness
|
|
1031
|
+
* firewall readiness. It's based on this setting and the readiness of the firewall endpoints to take traffic. </p>
|
|
988
1032
|
* @public
|
|
989
1033
|
*/
|
|
990
1034
|
ConfigurationSyncStateSummary: ConfigurationSyncState | undefined;
|
|
991
1035
|
/**
|
|
992
|
-
* <p>
|
|
993
|
-
*
|
|
994
|
-
*
|
|
995
|
-
*
|
|
996
|
-
* and configuration object. </p>
|
|
1036
|
+
* <p>Status for the subnets that you've configured in the firewall. This contains
|
|
1037
|
+
* one array element per Availability Zone where you've configured a subnet in the firewall. </p>
|
|
1038
|
+
* <p>These objects provide detailed information for the settings
|
|
1039
|
+
* <code>ConfigurationSyncStateSummary</code> and <code>Status</code>. </p>
|
|
997
1040
|
* @public
|
|
998
1041
|
*/
|
|
999
1042
|
SyncStates?: Record<string, SyncState> | undefined;
|
|
1000
1043
|
/**
|
|
1001
|
-
* <p>Describes the capacity usage of the resources contained in a firewall's reference sets. Network Firewall
|
|
1044
|
+
* <p>Describes the capacity usage of the resources contained in a firewall's reference sets. Network Firewall calculates the capacity usage by taking an aggregated count of all of the resources used by all of the reference sets in a firewall.</p>
|
|
1002
1045
|
* @public
|
|
1003
1046
|
*/
|
|
1004
1047
|
CapacityUsageSummary?: CapacityUsageSummary | undefined;
|
|
@@ -1014,6 +1057,7 @@ export interface CreateFirewallResponse {
|
|
|
1014
1057
|
Firewall?: Firewall | undefined;
|
|
1015
1058
|
/**
|
|
1016
1059
|
* <p>Detailed information about the current status of a <a>Firewall</a>. You can retrieve this for a firewall by calling <a>DescribeFirewall</a> and providing the firewall name and ARN.</p>
|
|
1060
|
+
* <p>The firewall status indicates a combined status. It indicates whether all subnets are up-to-date with the latest firewall configurations, which is based on the sync states config values, and also whether all subnets have their endpoints fully enabled, based on their sync states attachment values. </p>
|
|
1017
1061
|
* @public
|
|
1018
1062
|
*/
|
|
1019
1063
|
FirewallStatus?: FirewallStatus | undefined;
|
|
@@ -2439,7 +2483,8 @@ export interface ServerCertificateConfiguration {
|
|
|
2439
2483
|
/**
|
|
2440
2484
|
* <p>The object that defines a TLS inspection configuration. This, along with <a>TLSInspectionConfigurationResponse</a>, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling <a>DescribeTLSInspectionConfiguration</a>. </p>
|
|
2441
2485
|
* <p>Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination.</p>
|
|
2442
|
-
* <p>To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect the traffic traveling through your firewalls. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see
|
|
2486
|
+
* <p>To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect the traffic traveling through your firewalls. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see
|
|
2487
|
+
* <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html">Inspecting SSL/TLS traffic with TLS
|
|
2443
2488
|
* inspection configurations</a> in the <i>Network Firewall Developer Guide</i>.</p>
|
|
2444
2489
|
* @public
|
|
2445
2490
|
*/
|
|
@@ -2462,7 +2507,8 @@ export interface CreateTLSInspectionConfigurationRequest {
|
|
|
2462
2507
|
/**
|
|
2463
2508
|
* <p>The object that defines a TLS inspection configuration. This, along with <a>TLSInspectionConfigurationResponse</a>, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling <a>DescribeTLSInspectionConfiguration</a>. </p>
|
|
2464
2509
|
* <p>Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination.</p>
|
|
2465
|
-
* <p>To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect the traffic traveling through your firewalls. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see
|
|
2510
|
+
* <p>To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect the traffic traveling through your firewalls. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see
|
|
2511
|
+
* <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html">Inspecting SSL/TLS traffic with TLS
|
|
2466
2512
|
* inspection configurations</a> in the <i>Network Firewall Developer Guide</i>.</p>
|
|
2467
2513
|
* @public
|
|
2468
2514
|
*/
|
|
@@ -2560,6 +2606,142 @@ export interface CreateTLSInspectionConfigurationResponse {
|
|
|
2560
2606
|
*/
|
|
2561
2607
|
TLSInspectionConfigurationResponse: TLSInspectionConfigurationResponse | undefined;
|
|
2562
2608
|
}
|
|
2609
|
+
/**
|
|
2610
|
+
* @public
|
|
2611
|
+
*/
|
|
2612
|
+
export interface CreateVpcEndpointAssociationRequest {
|
|
2613
|
+
/**
|
|
2614
|
+
* <p>The Amazon Resource Name (ARN) of the firewall.</p>
|
|
2615
|
+
* @public
|
|
2616
|
+
*/
|
|
2617
|
+
FirewallArn: string | undefined;
|
|
2618
|
+
/**
|
|
2619
|
+
* <p>The unique identifier of the VPC where you want to create a firewall endpoint. </p>
|
|
2620
|
+
* @public
|
|
2621
|
+
*/
|
|
2622
|
+
VpcId: string | undefined;
|
|
2623
|
+
/**
|
|
2624
|
+
* <p>The ID for a subnet that's used in an association with a firewall. This is used in
|
|
2625
|
+
* <a>CreateFirewall</a>, <a>AssociateSubnets</a>, and <a>CreateVpcEndpointAssociation</a>. Network Firewall
|
|
2626
|
+
* creates an instance of the associated firewall in each subnet that you specify, to filter
|
|
2627
|
+
* traffic in the subnet's Availability Zone.</p>
|
|
2628
|
+
* @public
|
|
2629
|
+
*/
|
|
2630
|
+
SubnetMapping: SubnetMapping | undefined;
|
|
2631
|
+
/**
|
|
2632
|
+
* <p>A description of the VPC endpoint association. </p>
|
|
2633
|
+
* @public
|
|
2634
|
+
*/
|
|
2635
|
+
Description?: string | undefined;
|
|
2636
|
+
/**
|
|
2637
|
+
* <p>The key:value pairs to associate with the resource.</p>
|
|
2638
|
+
* @public
|
|
2639
|
+
*/
|
|
2640
|
+
Tags?: Tag[] | undefined;
|
|
2641
|
+
}
|
|
2642
|
+
/**
|
|
2643
|
+
* <p>A VPC endpoint association defines a single subnet to use for a firewall endpoint for a <code>Firewall</code>.
|
|
2644
|
+
* You can define VPC endpoint associations only in the Availability Zones that already have
|
|
2645
|
+
* a subnet mapping defined in the <code>Firewall</code> resource. </p>
|
|
2646
|
+
* <note>
|
|
2647
|
+
* <p>You can retrieve the list of Availability Zones that are available for use by calling <code>DescribeFirewallMetadata</code>.</p>
|
|
2648
|
+
* </note>
|
|
2649
|
+
* <p>To manage firewall endpoints, first, in the <code>Firewall</code> specification, you specify a single VPC and one subnet
|
|
2650
|
+
* for each of the Availability Zones where you want to use the firewall. Then you can define additional endpoints as
|
|
2651
|
+
* VPC endpoint associations. </p>
|
|
2652
|
+
* <p>You can use VPC endpoint associations to expand the protections of the firewall as follows: </p>
|
|
2653
|
+
* <ul>
|
|
2654
|
+
* <li>
|
|
2655
|
+
* <p>
|
|
2656
|
+
* <b>Protect multiple VPCs with a single firewall</b> - You can use the firewall to protect other VPCs, either in your account or in accounts where the firewall is shared. You can only specify Availability Zones that already have a firewall endpoint defined in the <code>Firewall</code> subnet mappings.</p>
|
|
2657
|
+
* </li>
|
|
2658
|
+
* <li>
|
|
2659
|
+
* <p>
|
|
2660
|
+
* <b>Define multiple firewall endpoints for a VPC in an Availability Zone</b> - You can create additional firewall endpoints for the VPC that you have defined in the firewall, in any Availability Zone that already has an endpoint defined in the <code>Firewall</code> subnet mappings. You can create multiple VPC endpoint associations for any other VPC where you use the firewall.</p>
|
|
2661
|
+
* </li>
|
|
2662
|
+
* </ul>
|
|
2663
|
+
* <p>You can use Resource Access Manager to share a <code>Firewall</code> that you own with other accounts, which gives them the ability to use the firewall
|
|
2664
|
+
* to create VPC endpoint associations. For information about sharing a firewall, see <code>PutResourcePolicy</code>
|
|
2665
|
+
* in this guide and see
|
|
2666
|
+
* <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/sharing.html">Sharing Network Firewall resources</a> in the <i>Network Firewall Developer Guide</i>.</p>
|
|
2667
|
+
* <p>The status of the VPC endpoint association, which indicates whether it's ready to filter network traffic,
|
|
2668
|
+
* is provided in the corresponding <a>VpcEndpointAssociationStatus</a>. You can retrieve both
|
|
2669
|
+
* the association and its status by calling <a>DescribeVpcEndpointAssociation</a>.</p>
|
|
2670
|
+
* @public
|
|
2671
|
+
*/
|
|
2672
|
+
export interface VpcEndpointAssociation {
|
|
2673
|
+
/**
|
|
2674
|
+
* <p>The unique identifier of the VPC endpoint association. </p>
|
|
2675
|
+
* @public
|
|
2676
|
+
*/
|
|
2677
|
+
VpcEndpointAssociationId?: string | undefined;
|
|
2678
|
+
/**
|
|
2679
|
+
* <p>The Amazon Resource Name (ARN) of a VPC endpoint association.</p>
|
|
2680
|
+
* @public
|
|
2681
|
+
*/
|
|
2682
|
+
VpcEndpointAssociationArn: string | undefined;
|
|
2683
|
+
/**
|
|
2684
|
+
* <p>The Amazon Resource Name (ARN) of the firewall.</p>
|
|
2685
|
+
* @public
|
|
2686
|
+
*/
|
|
2687
|
+
FirewallArn: string | undefined;
|
|
2688
|
+
/**
|
|
2689
|
+
* <p>The unique identifier of the VPC for the endpoint association. </p>
|
|
2690
|
+
* @public
|
|
2691
|
+
*/
|
|
2692
|
+
VpcId: string | undefined;
|
|
2693
|
+
/**
|
|
2694
|
+
* <p>The ID for a subnet that's used in an association with a firewall. This is used in
|
|
2695
|
+
* <a>CreateFirewall</a>, <a>AssociateSubnets</a>, and <a>CreateVpcEndpointAssociation</a>. Network Firewall
|
|
2696
|
+
* creates an instance of the associated firewall in each subnet that you specify, to filter
|
|
2697
|
+
* traffic in the subnet's Availability Zone.</p>
|
|
2698
|
+
* @public
|
|
2699
|
+
*/
|
|
2700
|
+
SubnetMapping: SubnetMapping | undefined;
|
|
2701
|
+
/**
|
|
2702
|
+
* <p>A description of the VPC endpoint association. </p>
|
|
2703
|
+
* @public
|
|
2704
|
+
*/
|
|
2705
|
+
Description?: string | undefined;
|
|
2706
|
+
/**
|
|
2707
|
+
* <p>The key:value pairs to associate with the resource.</p>
|
|
2708
|
+
* @public
|
|
2709
|
+
*/
|
|
2710
|
+
Tags?: Tag[] | undefined;
|
|
2711
|
+
}
|
|
2712
|
+
/**
|
|
2713
|
+
* <p>Detailed information about the current status of a <a>VpcEndpointAssociation</a>. You can retrieve this
|
|
2714
|
+
* by calling <a>DescribeVpcEndpointAssociation</a> and providing the VPC endpoint association ARN.</p>
|
|
2715
|
+
* @public
|
|
2716
|
+
*/
|
|
2717
|
+
export interface VpcEndpointAssociationStatus {
|
|
2718
|
+
/**
|
|
2719
|
+
* <p>The readiness of the configured firewall endpoint to handle network traffic. </p>
|
|
2720
|
+
* @public
|
|
2721
|
+
*/
|
|
2722
|
+
Status: FirewallStatusValue | undefined;
|
|
2723
|
+
/**
|
|
2724
|
+
* <p>The list of the Availability Zone sync states for all subnets that are defined by the firewall. </p>
|
|
2725
|
+
* @public
|
|
2726
|
+
*/
|
|
2727
|
+
AssociationSyncState?: Record<string, AZSyncState> | undefined;
|
|
2728
|
+
}
|
|
2729
|
+
/**
|
|
2730
|
+
* @public
|
|
2731
|
+
*/
|
|
2732
|
+
export interface CreateVpcEndpointAssociationResponse {
|
|
2733
|
+
/**
|
|
2734
|
+
* <p>The configuration settings for the VPC endpoint association. These settings include the firewall and the VPC and subnet to use for the firewall endpoint. </p>
|
|
2735
|
+
* @public
|
|
2736
|
+
*/
|
|
2737
|
+
VpcEndpointAssociation?: VpcEndpointAssociation | undefined;
|
|
2738
|
+
/**
|
|
2739
|
+
* <p>Detailed information about the current status of a <a>VpcEndpointAssociation</a>. You can retrieve this
|
|
2740
|
+
* by calling <a>DescribeVpcEndpointAssociation</a> and providing the VPC endpoint association ARN.</p>
|
|
2741
|
+
* @public
|
|
2742
|
+
*/
|
|
2743
|
+
VpcEndpointAssociationStatus?: VpcEndpointAssociationStatus | undefined;
|
|
2744
|
+
}
|
|
2563
2745
|
/**
|
|
2564
2746
|
* @public
|
|
2565
2747
|
*/
|
|
@@ -2582,15 +2764,17 @@ export interface DeleteFirewallRequest {
|
|
|
2582
2764
|
*/
|
|
2583
2765
|
export interface DeleteFirewallResponse {
|
|
2584
2766
|
/**
|
|
2585
|
-
* <p>
|
|
2767
|
+
* <p>A firewall defines the behavior of a firewall, the main VPC where the firewall is used, the Availability Zones where the firewall can be used, and one subnet to use for a firewall endpoint within each of the Availability Zones. The Availability Zones are defined implicitly in the subnet specifications.</p>
|
|
2768
|
+
* <p>In addition to the firewall endpoints that you define in this <code>Firewall</code> specification, you can create firewall endpoints in <code>VpcEndpointAssociation</code> resources for any VPC, in any Availability Zone where the firewall is already in use. </p>
|
|
2586
2769
|
* <p>The status of the firewall, for example whether it's ready to filter network traffic,
|
|
2587
2770
|
* is provided in the corresponding <a>FirewallStatus</a>. You can retrieve both
|
|
2588
|
-
*
|
|
2771
|
+
* the firewall and firewall status by calling <a>DescribeFirewall</a>.</p>
|
|
2589
2772
|
* @public
|
|
2590
2773
|
*/
|
|
2591
2774
|
Firewall?: Firewall | undefined;
|
|
2592
2775
|
/**
|
|
2593
2776
|
* <p>Detailed information about the current status of a <a>Firewall</a>. You can retrieve this for a firewall by calling <a>DescribeFirewall</a> and providing the firewall name and ARN.</p>
|
|
2777
|
+
* <p>The firewall status indicates a combined status. It indicates whether all subnets are up-to-date with the latest firewall configurations, which is based on the sync states config values, and also whether all subnets have their endpoints fully enabled, based on their sync states attachment values. </p>
|
|
2594
2778
|
* @public
|
|
2595
2779
|
*/
|
|
2596
2780
|
FirewallStatus?: FirewallStatus | undefined;
|
|
@@ -2727,6 +2911,32 @@ export interface DeleteTLSInspectionConfigurationResponse {
|
|
|
2727
2911
|
*/
|
|
2728
2912
|
TLSInspectionConfigurationResponse: TLSInspectionConfigurationResponse | undefined;
|
|
2729
2913
|
}
|
|
2914
|
+
/**
|
|
2915
|
+
* @public
|
|
2916
|
+
*/
|
|
2917
|
+
export interface DeleteVpcEndpointAssociationRequest {
|
|
2918
|
+
/**
|
|
2919
|
+
* <p>The Amazon Resource Name (ARN) of a VPC endpoint association.</p>
|
|
2920
|
+
* @public
|
|
2921
|
+
*/
|
|
2922
|
+
VpcEndpointAssociationArn: string | undefined;
|
|
2923
|
+
}
|
|
2924
|
+
/**
|
|
2925
|
+
* @public
|
|
2926
|
+
*/
|
|
2927
|
+
export interface DeleteVpcEndpointAssociationResponse {
|
|
2928
|
+
/**
|
|
2929
|
+
* <p>The configuration settings for the VPC endpoint association. These settings include the firewall and the VPC and subnet to use for the firewall endpoint. </p>
|
|
2930
|
+
* @public
|
|
2931
|
+
*/
|
|
2932
|
+
VpcEndpointAssociation?: VpcEndpointAssociation | undefined;
|
|
2933
|
+
/**
|
|
2934
|
+
* <p>Detailed information about the current status of a <a>VpcEndpointAssociation</a>. You can retrieve this
|
|
2935
|
+
* by calling <a>DescribeVpcEndpointAssociation</a> and providing the VPC endpoint association ARN.</p>
|
|
2936
|
+
* @public
|
|
2937
|
+
*/
|
|
2938
|
+
VpcEndpointAssociationStatus?: VpcEndpointAssociationStatus | undefined;
|
|
2939
|
+
}
|
|
2730
2940
|
/**
|
|
2731
2941
|
* @public
|
|
2732
2942
|
*/
|
|
@@ -2762,10 +2972,57 @@ export interface DescribeFirewallResponse {
|
|
|
2762
2972
|
Firewall?: Firewall | undefined;
|
|
2763
2973
|
/**
|
|
2764
2974
|
* <p>Detailed information about the current status of a <a>Firewall</a>. You can retrieve this for a firewall by calling <a>DescribeFirewall</a> and providing the firewall name and ARN.</p>
|
|
2975
|
+
* <p>The firewall status indicates a combined status. It indicates whether all subnets are up-to-date with the latest firewall configurations, which is based on the sync states config values, and also whether all subnets have their endpoints fully enabled, based on their sync states attachment values. </p>
|
|
2765
2976
|
* @public
|
|
2766
2977
|
*/
|
|
2767
2978
|
FirewallStatus?: FirewallStatus | undefined;
|
|
2768
2979
|
}
|
|
2980
|
+
/**
|
|
2981
|
+
* @public
|
|
2982
|
+
*/
|
|
2983
|
+
export interface DescribeFirewallMetadataRequest {
|
|
2984
|
+
/**
|
|
2985
|
+
* <p>The Amazon Resource Name (ARN) of the firewall.</p>
|
|
2986
|
+
* @public
|
|
2987
|
+
*/
|
|
2988
|
+
FirewallArn?: string | undefined;
|
|
2989
|
+
}
|
|
2990
|
+
/**
|
|
2991
|
+
* @public
|
|
2992
|
+
*/
|
|
2993
|
+
export interface DescribeFirewallMetadataResponse {
|
|
2994
|
+
/**
|
|
2995
|
+
* <p>The Amazon Resource Name (ARN) of the firewall.</p>
|
|
2996
|
+
* @public
|
|
2997
|
+
*/
|
|
2998
|
+
FirewallArn?: string | undefined;
|
|
2999
|
+
/**
|
|
3000
|
+
* <p>The Amazon Resource Name (ARN) of the firewall policy.</p>
|
|
3001
|
+
* @public
|
|
3002
|
+
*/
|
|
3003
|
+
FirewallPolicyArn?: string | undefined;
|
|
3004
|
+
/**
|
|
3005
|
+
* <p>A description of the firewall.</p>
|
|
3006
|
+
* @public
|
|
3007
|
+
*/
|
|
3008
|
+
Description?: string | undefined;
|
|
3009
|
+
/**
|
|
3010
|
+
* <p>The readiness of the configured firewall to handle network traffic across all of the
|
|
3011
|
+
* Availability Zones where you have it configured. This setting is <code>READY</code> only when
|
|
3012
|
+
* the <code>ConfigurationSyncStateSummary</code> value is <code>IN_SYNC</code> and the
|
|
3013
|
+
* <code>Attachment</code>
|
|
3014
|
+
* <code>Status</code> values for all of the configured subnets are <code>READY</code>.
|
|
3015
|
+
* </p>
|
|
3016
|
+
* @public
|
|
3017
|
+
*/
|
|
3018
|
+
Status?: FirewallStatusValue | undefined;
|
|
3019
|
+
/**
|
|
3020
|
+
* <p>The Availability Zones that the firewall currently supports. This includes all Availability Zones for which
|
|
3021
|
+
* the firewall has a subnet defined. </p>
|
|
3022
|
+
* @public
|
|
3023
|
+
*/
|
|
3024
|
+
SupportedAvailabilityZones?: Record<string, AvailabilityZoneMetadata> | undefined;
|
|
3025
|
+
}
|
|
2769
3026
|
/**
|
|
2770
3027
|
* @public
|
|
2771
3028
|
*/
|
|
@@ -2819,6 +3076,16 @@ export interface DescribeFlowOperationRequest {
|
|
|
2819
3076
|
* @public
|
|
2820
3077
|
*/
|
|
2821
3078
|
AvailabilityZone?: string | undefined;
|
|
3079
|
+
/**
|
|
3080
|
+
* <p>The Amazon Resource Name (ARN) of a VPC endpoint association.</p>
|
|
3081
|
+
* @public
|
|
3082
|
+
*/
|
|
3083
|
+
VpcEndpointAssociationArn?: string | undefined;
|
|
3084
|
+
/**
|
|
3085
|
+
* <p>A unique identifier for the primary endpoint associated with a firewall.</p>
|
|
3086
|
+
* @public
|
|
3087
|
+
*/
|
|
3088
|
+
VpcEndpointId?: string | undefined;
|
|
2822
3089
|
/**
|
|
2823
3090
|
* <p>A unique identifier for the flow operation. This ID is returned in the responses to start and list commands. You provide to describe commands.</p>
|
|
2824
3091
|
* @public
|
|
@@ -2924,6 +3191,16 @@ export interface DescribeFlowOperationResponse {
|
|
|
2924
3191
|
* @public
|
|
2925
3192
|
*/
|
|
2926
3193
|
AvailabilityZone?: string | undefined;
|
|
3194
|
+
/**
|
|
3195
|
+
* <p>The Amazon Resource Name (ARN) of a VPC endpoint association.</p>
|
|
3196
|
+
* @public
|
|
3197
|
+
*/
|
|
3198
|
+
VpcEndpointAssociationArn?: string | undefined;
|
|
3199
|
+
/**
|
|
3200
|
+
* <p>A unique identifier for the primary endpoint associated with a firewall.</p>
|
|
3201
|
+
* @public
|
|
3202
|
+
*/
|
|
3203
|
+
VpcEndpointId?: string | undefined;
|
|
2927
3204
|
/**
|
|
2928
3205
|
* <p>A unique identifier for the flow operation. This ID is returned in the responses to start and list commands. You provide to describe commands.</p>
|
|
2929
3206
|
* @public
|
|
@@ -3281,7 +3558,8 @@ export interface DescribeTLSInspectionConfigurationResponse {
|
|
|
3281
3558
|
/**
|
|
3282
3559
|
* <p>The object that defines a TLS inspection configuration. This, along with <a>TLSInspectionConfigurationResponse</a>, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling <a>DescribeTLSInspectionConfiguration</a>. </p>
|
|
3283
3560
|
* <p>Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination.</p>
|
|
3284
|
-
* <p>To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect the traffic traveling through your firewalls. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see
|
|
3561
|
+
* <p>To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect the traffic traveling through your firewalls. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see
|
|
3562
|
+
* <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html">Inspecting SSL/TLS traffic with TLS
|
|
3285
3563
|
* inspection configurations</a> in the <i>Network Firewall Developer Guide</i>.</p>
|
|
3286
3564
|
* @public
|
|
3287
3565
|
*/
|
|
@@ -3292,6 +3570,32 @@ export interface DescribeTLSInspectionConfigurationResponse {
|
|
|
3292
3570
|
*/
|
|
3293
3571
|
TLSInspectionConfigurationResponse: TLSInspectionConfigurationResponse | undefined;
|
|
3294
3572
|
}
|
|
3573
|
+
/**
|
|
3574
|
+
* @public
|
|
3575
|
+
*/
|
|
3576
|
+
export interface DescribeVpcEndpointAssociationRequest {
|
|
3577
|
+
/**
|
|
3578
|
+
* <p>The Amazon Resource Name (ARN) of a VPC endpoint association.</p>
|
|
3579
|
+
* @public
|
|
3580
|
+
*/
|
|
3581
|
+
VpcEndpointAssociationArn: string | undefined;
|
|
3582
|
+
}
|
|
3583
|
+
/**
|
|
3584
|
+
* @public
|
|
3585
|
+
*/
|
|
3586
|
+
export interface DescribeVpcEndpointAssociationResponse {
|
|
3587
|
+
/**
|
|
3588
|
+
* <p>The configuration settings for the VPC endpoint association. These settings include the firewall and the VPC and subnet to use for the firewall endpoint. </p>
|
|
3589
|
+
* @public
|
|
3590
|
+
*/
|
|
3591
|
+
VpcEndpointAssociation?: VpcEndpointAssociation | undefined;
|
|
3592
|
+
/**
|
|
3593
|
+
* <p>Detailed information about the current status of a <a>VpcEndpointAssociation</a>. You can retrieve this
|
|
3594
|
+
* by calling <a>DescribeVpcEndpointAssociation</a> and providing the VPC endpoint association ARN.</p>
|
|
3595
|
+
* @public
|
|
3596
|
+
*/
|
|
3597
|
+
VpcEndpointAssociationStatus?: VpcEndpointAssociationStatus | undefined;
|
|
3598
|
+
}
|
|
3295
3599
|
/**
|
|
3296
3600
|
* @public
|
|
3297
3601
|
*/
|
|
@@ -3709,6 +4013,16 @@ export interface ListFlowOperationResultsRequest {
|
|
|
3709
4013
|
* @public
|
|
3710
4014
|
*/
|
|
3711
4015
|
AvailabilityZone?: string | undefined;
|
|
4016
|
+
/**
|
|
4017
|
+
* <p>A unique identifier for the primary endpoint associated with a firewall.</p>
|
|
4018
|
+
* @public
|
|
4019
|
+
*/
|
|
4020
|
+
VpcEndpointId?: string | undefined;
|
|
4021
|
+
/**
|
|
4022
|
+
* <p>The Amazon Resource Name (ARN) of a VPC endpoint association.</p>
|
|
4023
|
+
* @public
|
|
4024
|
+
*/
|
|
4025
|
+
VpcEndpointAssociationArn?: string | undefined;
|
|
3712
4026
|
}
|
|
3713
4027
|
/**
|
|
3714
4028
|
* @public
|
|
@@ -3725,6 +4039,16 @@ export interface ListFlowOperationResultsResponse {
|
|
|
3725
4039
|
* @public
|
|
3726
4040
|
*/
|
|
3727
4041
|
AvailabilityZone?: string | undefined;
|
|
4042
|
+
/**
|
|
4043
|
+
* <p></p>
|
|
4044
|
+
* @public
|
|
4045
|
+
*/
|
|
4046
|
+
VpcEndpointAssociationArn?: string | undefined;
|
|
4047
|
+
/**
|
|
4048
|
+
* <p></p>
|
|
4049
|
+
* @public
|
|
4050
|
+
*/
|
|
4051
|
+
VpcEndpointId?: string | undefined;
|
|
3728
4052
|
/**
|
|
3729
4053
|
* <p>A unique identifier for the flow operation. This ID is returned in the responses to start and list commands. You provide to describe commands.</p>
|
|
3730
4054
|
* @public
|
|
@@ -3777,6 +4101,16 @@ export interface ListFlowOperationsRequest {
|
|
|
3777
4101
|
* @public
|
|
3778
4102
|
*/
|
|
3779
4103
|
AvailabilityZone?: string | undefined;
|
|
4104
|
+
/**
|
|
4105
|
+
* <p>The Amazon Resource Name (ARN) of a VPC endpoint association.</p>
|
|
4106
|
+
* @public
|
|
4107
|
+
*/
|
|
4108
|
+
VpcEndpointAssociationArn?: string | undefined;
|
|
4109
|
+
/**
|
|
4110
|
+
* <p>A unique identifier for the primary endpoint associated with a firewall.</p>
|
|
4111
|
+
* @public
|
|
4112
|
+
*/
|
|
4113
|
+
VpcEndpointId?: string | undefined;
|
|
3780
4114
|
/**
|
|
3781
4115
|
* <p>An optional string that defines whether any or all operation types are returned.</p>
|
|
3782
4116
|
* @public
|
|
@@ -4005,6 +4339,63 @@ export interface ListTLSInspectionConfigurationsResponse {
|
|
|
4005
4339
|
*/
|
|
4006
4340
|
TLSInspectionConfigurations?: TLSInspectionConfigurationMetadata[] | undefined;
|
|
4007
4341
|
}
|
|
4342
|
+
/**
|
|
4343
|
+
* @public
|
|
4344
|
+
*/
|
|
4345
|
+
export interface ListVpcEndpointAssociationsRequest {
|
|
4346
|
+
/**
|
|
4347
|
+
* <p>When you request a list of objects with a <code>MaxResults</code> setting, if the number of objects that are still available
|
|
4348
|
+
* for retrieval exceeds the maximum you requested, Network Firewall returns a <code>NextToken</code>
|
|
4349
|
+
* value in the response. To retrieve the next batch of objects, use the token returned from the prior request in your next request.</p>
|
|
4350
|
+
* @public
|
|
4351
|
+
*/
|
|
4352
|
+
NextToken?: string | undefined;
|
|
4353
|
+
/**
|
|
4354
|
+
* <p>The maximum number of objects that you want Network Firewall to return for this request. If more
|
|
4355
|
+
* objects are available, in the response, Network Firewall provides a
|
|
4356
|
+
* <code>NextToken</code> value that you can use in a subsequent call to get the next batch of objects.</p>
|
|
4357
|
+
* @public
|
|
4358
|
+
*/
|
|
4359
|
+
MaxResults?: number | undefined;
|
|
4360
|
+
/**
|
|
4361
|
+
* <p>The Amazon Resource Name (ARN) of the firewall.</p>
|
|
4362
|
+
* <p>If you don't specify this, Network Firewall retrieves all VPC endpoint associations that you have defined.</p>
|
|
4363
|
+
* @public
|
|
4364
|
+
*/
|
|
4365
|
+
FirewallArn?: string | undefined;
|
|
4366
|
+
}
|
|
4367
|
+
/**
|
|
4368
|
+
* <p>High-level information about a VPC endpoint association, returned by <code>ListVpcEndpointAssociations</code>. You can use the information provided in the metadata to retrieve and manage a VPC endpoint association.</p>
|
|
4369
|
+
* @public
|
|
4370
|
+
*/
|
|
4371
|
+
export interface VpcEndpointAssociationMetadata {
|
|
4372
|
+
/**
|
|
4373
|
+
* <p>The Amazon Resource Name (ARN) of a VPC endpoint association.</p>
|
|
4374
|
+
* @public
|
|
4375
|
+
*/
|
|
4376
|
+
VpcEndpointAssociationArn?: string | undefined;
|
|
4377
|
+
}
|
|
4378
|
+
/**
|
|
4379
|
+
* @public
|
|
4380
|
+
*/
|
|
4381
|
+
export interface ListVpcEndpointAssociationsResponse {
|
|
4382
|
+
/**
|
|
4383
|
+
* <p>When you request a list of objects with a <code>MaxResults</code> setting, if the number of objects that are still available
|
|
4384
|
+
* for retrieval exceeds the maximum you requested, Network Firewall returns a <code>NextToken</code>
|
|
4385
|
+
* value in the response. To retrieve the next batch of objects, use the token returned from the prior request in your next request.</p>
|
|
4386
|
+
* @public
|
|
4387
|
+
*/
|
|
4388
|
+
NextToken?: string | undefined;
|
|
4389
|
+
/**
|
|
4390
|
+
* <p>The VPC endpoint assocation metadata objects for the firewall that you specified. If you didn't
|
|
4391
|
+
* specify a firewall, this is all VPC endpoint associations that you have defined. </p>
|
|
4392
|
+
* <p>Depending on your setting
|
|
4393
|
+
* for max results and the number of firewalls you have, a single call might not be the full
|
|
4394
|
+
* list. </p>
|
|
4395
|
+
* @public
|
|
4396
|
+
*/
|
|
4397
|
+
VpcEndpointAssociations?: VpcEndpointAssociationMetadata[] | undefined;
|
|
4398
|
+
}
|
|
4008
4399
|
/**
|
|
4009
4400
|
* <p>Unable to send logs to a configured logging destination. </p>
|
|
4010
4401
|
* @public
|
|
@@ -4023,12 +4414,12 @@ export declare class LogDestinationPermissionException extends __BaseException {
|
|
|
4023
4414
|
*/
|
|
4024
4415
|
export interface PutResourcePolicyRequest {
|
|
4025
4416
|
/**
|
|
4026
|
-
* <p>The Amazon Resource Name (ARN) of the account that you want to share
|
|
4417
|
+
* <p>The Amazon Resource Name (ARN) of the account that you want to share your Network Firewall resources with.</p>
|
|
4027
4418
|
* @public
|
|
4028
4419
|
*/
|
|
4029
4420
|
ResourceArn: string | undefined;
|
|
4030
4421
|
/**
|
|
4031
|
-
* <p>The IAM policy statement that lists the accounts that you want to share your
|
|
4422
|
+
* <p>The IAM policy statement that lists the accounts that you want to share your Network Firewall resources with
|
|
4032
4423
|
* and the operations that you want the accounts to be able to perform. </p>
|
|
4033
4424
|
* <p>For a rule group resource, you can specify the following operations in the Actions section of the statement:</p>
|
|
4034
4425
|
* <ul>
|
|
@@ -4051,7 +4442,19 @@ export interface PutResourcePolicyRequest {
|
|
|
4051
4442
|
* <p>network-firewall:ListFirewallPolicies</p>
|
|
4052
4443
|
* </li>
|
|
4053
4444
|
* </ul>
|
|
4054
|
-
* <p>
|
|
4445
|
+
* <p>For a firewall resource, you can specify the following operations in the Actions section of the statement:</p>
|
|
4446
|
+
* <ul>
|
|
4447
|
+
* <li>
|
|
4448
|
+
* <p>network-firewall:CreateVpcEndpointAssociation</p>
|
|
4449
|
+
* </li>
|
|
4450
|
+
* <li>
|
|
4451
|
+
* <p>network-firewall:DescribeFirewallMetadata</p>
|
|
4452
|
+
* </li>
|
|
4453
|
+
* <li>
|
|
4454
|
+
* <p>network-firewall:ListFirewalls</p>
|
|
4455
|
+
* </li>
|
|
4456
|
+
* </ul>
|
|
4457
|
+
* <p>In the Resource section of the statement, you specify the ARNs for the Network Firewall resources that you want to share with the account that you specified in <code>Arn</code>.</p>
|
|
4055
4458
|
* @public
|
|
4056
4459
|
*/
|
|
4057
4460
|
Policy: string | undefined;
|
|
@@ -4108,6 +4511,16 @@ export interface StartFlowCaptureRequest {
|
|
|
4108
4511
|
* @public
|
|
4109
4512
|
*/
|
|
4110
4513
|
AvailabilityZone?: string | undefined;
|
|
4514
|
+
/**
|
|
4515
|
+
* <p>The Amazon Resource Name (ARN) of a VPC endpoint association.</p>
|
|
4516
|
+
* @public
|
|
4517
|
+
*/
|
|
4518
|
+
VpcEndpointAssociationArn?: string | undefined;
|
|
4519
|
+
/**
|
|
4520
|
+
* <p>A unique identifier for the primary endpoint associated with a firewall.</p>
|
|
4521
|
+
* @public
|
|
4522
|
+
*/
|
|
4523
|
+
VpcEndpointId?: string | undefined;
|
|
4111
4524
|
/**
|
|
4112
4525
|
* <p>The reqested <code>FlowOperation</code> ignores flows with an age (in seconds) lower than <code>MinimumFlowAgeInSeconds</code>.
|
|
4113
4526
|
* You provide this for start commands.</p>
|
|
@@ -4160,6 +4573,16 @@ export interface StartFlowFlushRequest {
|
|
|
4160
4573
|
* @public
|
|
4161
4574
|
*/
|
|
4162
4575
|
AvailabilityZone?: string | undefined;
|
|
4576
|
+
/**
|
|
4577
|
+
* <p>The Amazon Resource Name (ARN) of a VPC endpoint association.</p>
|
|
4578
|
+
* @public
|
|
4579
|
+
*/
|
|
4580
|
+
VpcEndpointAssociationArn?: string | undefined;
|
|
4581
|
+
/**
|
|
4582
|
+
* <p>A unique identifier for the primary endpoint associated with a firewall.</p>
|
|
4583
|
+
* @public
|
|
4584
|
+
*/
|
|
4585
|
+
VpcEndpointId?: string | undefined;
|
|
4163
4586
|
/**
|
|
4164
4587
|
* <p>The reqested <code>FlowOperation</code> ignores flows with an age (in seconds) lower than <code>MinimumFlowAgeInSeconds</code>.
|
|
4165
4588
|
* You provide this for start commands.</p>
|
|
@@ -4817,7 +5240,8 @@ export interface UpdateTLSInspectionConfigurationRequest {
|
|
|
4817
5240
|
/**
|
|
4818
5241
|
* <p>The object that defines a TLS inspection configuration. This, along with <a>TLSInspectionConfigurationResponse</a>, define the TLS inspection configuration. You can retrieve all objects for a TLS inspection configuration by calling <a>DescribeTLSInspectionConfiguration</a>. </p>
|
|
4819
5242
|
* <p>Network Firewall uses a TLS inspection configuration to decrypt traffic. Network Firewall re-encrypts the traffic before sending it to its destination.</p>
|
|
4820
|
-
* <p>To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect the traffic traveling through your firewalls. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see
|
|
5243
|
+
* <p>To use a TLS inspection configuration, you add it to a new Network Firewall firewall policy, then you apply the firewall policy to a firewall. Network Firewall acts as a proxy service to decrypt and inspect the traffic traveling through your firewalls. You can reference a TLS inspection configuration from more than one firewall policy, and you can use a firewall policy in more than one firewall. For more information about using TLS inspection configurations, see
|
|
5244
|
+
* <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection.html">Inspecting SSL/TLS traffic with TLS
|
|
4821
5245
|
* inspection configurations</a> in the <i>Network Firewall Developer Guide</i>.</p>
|
|
4822
5246
|
* @public
|
|
4823
5247
|
*/
|