Package-level declarations
Types
Functions
Associates a FirewallPolicy to a Firewall.
Associates the specified subnets in the Amazon VPC to the firewall. You can specify one subnet for each of the Availability Zones that the VPC spans.
Creates an Network Firewall Firewall and accompanying FirewallStatus for a VPC.
Creates the firewall policy for the firewall according to the specifications.
Creates the specified stateless or stateful rule group, which includes the rules for network traffic inspection, a capacity setting, and tags.
Creates an Network Firewall TLS inspection configuration. Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using ACM, create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall.
Deletes the specified Firewall and its FirewallStatus. This operation requires the firewall's DeleteProtection
flag to be FALSE
. You can't revert this operation.
Deletes the specified FirewallPolicy.
Deletes a resource policy that you created in a PutResourcePolicy request.
Deletes the specified RuleGroup.
Deletes the specified TLSInspectionConfiguration.
Returns the data objects for the specified firewall.
Returns the data objects for the specified firewall policy.
Returns key information about a specific flow operation.
Returns the logging configuration for the specified firewall.
Retrieves a resource policy that you created in a PutResourcePolicy request.
Returns the data objects for the specified rule group.
High-level information about a rule group, returned by operations like create and describe. You can use the information provided in the metadata to retrieve and manage a rule group. You can retrieve all objects for a rule group by calling DescribeRuleGroup.
Returns the data objects for the specified TLS inspection configuration.
Removes the specified subnet associations from the firewall. This removes the firewall endpoints from the subnets and removes any network filtering protections that the endpoints were providing.
The results of a COMPLETED
analysis report generated with StartAnalysisReport.
Returns a list of all traffic analysis reports generated within the last 30 days.
Retrieves the metadata for the firewall policies that you have defined. Depending on your setting for max results and the number of firewall policies, a single call might not return the full list.
Retrieves the metadata for the firewalls that you have defined. If you provide VPC identifiers in your request, this returns only the firewalls for those VPCs.
Returns the results of a specific flow operation.
Returns a list of all flow operations ran in a specific firewall. You can optionally narrow the request scope by specifying the operation type or Availability Zone associated with a firewall's flow operations.
Retrieves the metadata for the rule groups that you have defined. Depending on your setting for max results and the number of rule groups, a single call might not return the full list.
Retrieves the tags associated with the specified resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to "customer" and the value to the customer name or ID. You can specify one or more tags to add to each Amazon Web Services resource, up to 50 tags for a resource.
Retrieves the metadata for the TLS inspection configurations that you have defined. Depending on your setting for max results and the number of TLS inspection configurations, a single call might not return the full list.
Creates or updates an IAM policy for your rule group or firewall policy. Use this to share rule groups and firewall policies between accounts. This operation works in conjunction with the Amazon Web Services Resource Access Manager (RAM) service to manage resource sharing for Network Firewall.
Generates a traffic analysis report for the timeframe and traffic type you specify.
Begins capturing the flows in a firewall, according to the filters you define. Captures are similar, but not identical to snapshots. Capture operations provide visibility into flows that are not closed and are tracked by a firewall's flow table. Unlike snapshots, captures are a time-boxed view.
Begins the flushing of traffic from the firewall, according to the filters you define. When the operation starts, impacted flows are temporarily marked as timed out before the Suricata engine prunes, or flushes, the flows from the firewall table.
Adds the specified tags to the specified resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to "customer" and the value to the customer name or ID. You can specify one or more tags to add to each Amazon Web Services resource, up to 50 tags for a resource.
Removes the tags with the specified keys from the specified resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to "customer" and the value to the customer name or ID. You can specify one or more tags to add to each Amazon Web Services resource, up to 50 tags for a resource.
Enables specific types of firewall analysis on a specific firewall you define.
Modifies the flag, DeleteProtection
, which indicates whether it is possible to delete the firewall. If the flag is set to TRUE
, the firewall is protected against deletion. This setting helps protect against accidentally deleting a firewall that's in use.
Modifies the description for the specified firewall. Use the description to help you identify the firewall when you're working with it.
A complex type that contains settings for encryption of your firewall resources.
Updates the properties of the specified firewall policy.
Modifies the flag, ChangeProtection
, which indicates whether it is possible to change the firewall. If the flag is set to TRUE
, the firewall is protected from changes. This setting helps protect against accidentally changing a firewall that's in use.
Sets the logging configuration for the specified firewall.
Updates the rule settings for the specified rule group. You use a rule group by reference in one or more firewall policies. When you modify a rule group, you modify all firewall policies that use the rule group.
Updates the TLS inspection configuration settings for the specified TLS inspection configuration. You use a TLS inspection configuration by referencing it in one or more firewall policies. When you modify a TLS inspection configuration, you modify all firewall policies that use the TLS inspection configuration.
Create a copy of the client with one or more configuration values overridden. This method allows the caller to perform scoped config overrides for one or more client operations.