You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* <p>Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains Certificate Manager certificate associations between and the scope configurations that Network Firewall uses to decrypt and re-encrypt traffic traveling through your firewall.</p>
37
-
* <p>After you create a TLS inspection configuration, you can associate it with a new firewall policy.</p>
36
+
* <p>Creates an Network Firewall TLS inspection configuration. Network Firewall uses TLS inspection configurations to decrypt your firewall's inbound and outbound SSL/TLS traffic. After decryption, Network Firewall inspects the traffic according to your firewall policy's stateful rules, and then re-encrypts it before sending it to its destination. You can enable inspection of your firewall's inbound traffic, outbound traffic, or both. To use TLS inspection with your firewall, you must first import or provision certificates using ACM, create a TLS inspection configuration, add that configuration to a new firewall policy, and then associate that policy with your firewall.</p>
38
37
* <p>To update the settings for a TLS inspection configuration, use <a>UpdateTLSInspectionConfiguration</a>.</p>
39
38
* <p>To manage a TLS inspection configuration's tags, use the standard Amazon Web Services resource tagging operations, <a>ListTagsForResource</a>, <a>TagResource</a>, and <a>UntagResource</a>.</p>
40
39
* <p>To retrieve information about TLS inspection configurations, use <a>ListTLSInspectionConfigurations</a> and <a>DescribeTLSInspectionConfiguration</a>.</p>
* <p>Stateful inspection criteria for a domain list rule group. </p>
1620
1620
* <p>For HTTPS traffic, domain filtering is SNI-based. It uses the server name indicator extension of the TLS handshake.</p>
1621
-
* <p>By default, Network Firewall domain list inspection only includes traffic coming from the VPC where you deploy the firewall. To inspect traffic from IP addresses outside of the deployment VPC, you set the <code>HOME_NET</code> rule variable to include the CIDR range of the deployment VPC plus the other CIDR ranges. For more information, see <a>RuleVariables</a> in this guide and <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/stateful-rule-groups-domain-names.html">Stateful domain list rule groups in Network Firewall</a> in the <i>Network Firewall Developer Guide</i>.</p>
1621
+
* <p>By default, Network Firewall domain list inspection only includes traffic coming from the VPC where you deploy the firewall. To inspect traffic from IP addresses outside of the deployment VPC, you set the <code>HOME_NET</code> rule variable to include the CIDR range of the deployment VPC plus the other CIDR ranges. For more information, see <a>RuleVariables</a> in this guide and
1622
+
* <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/stateful-rule-groups-domain-names.html">Stateful domain list rule groups in Network Firewall</a> in the <i>Network Firewall Developer Guide</i>.</p>
* can enable the rule with <code>ALERT</code> action, verify in the logs that the rule
1853
1854
* is filtering as you want, then change the action to <code>DROP</code>.</p>
1854
1855
* </li>
1856
+
* <li>
1857
+
* <p>
1858
+
* <b>REJECT</b> - Drops traffic that matches the conditions of the stateful rule, and sends a TCP reset packet back to sender of the packet. A TCP reset packet is a packet with no payload and an RST bit contained in the TCP header flags. REJECT is available only for TCP traffic. This option doesn't support FTP or IMAP protocols.</p>
* <p>Defines where Network Firewall sends logs for the firewall for one log type. This is used
3093
-
* in <a>LoggingConfiguration</a>. You can send each type of log to an Amazon S3 bucket, a CloudWatch log group, or a Kinesis Data Firehose delivery stream.</p>
3094
-
* <p>Network Firewall generates logs for stateful rule groups. You can save alert and flow log
3095
-
* types. The stateful rules engine records flow logs for all network traffic that it receives.
3096
-
* It records alert logs for traffic that matches stateful rules that have the rule
3097
-
* action set to <code>DROP</code> or <code>ALERT</code>. </p>
3098
+
* in <a>LoggingConfiguration</a>. You can send each type of log to an Amazon S3 bucket, a CloudWatch log group, or a Firehose delivery stream.</p>
3099
+
* <p>Network Firewall generates logs for stateful rule groups. You can save alert, flow, and TLS log
3100
+
* types. </p>
3098
3101
* @public
3099
3102
*/
3100
3103
exportinterfaceLogDestinationConfig{
3101
3104
/**
3102
-
* <p>The type of log to send. Alert logs report traffic that matches a <a>StatefulRule</a> with an action setting that sends an alert log message. Flow logs are
3103
-
* standard network traffic flow logs. </p>
3105
+
* <p>The type of log to record. You can record the following types of logs from your Network Firewall stateful engine.</p>
3106
+
* <ul>
3107
+
* <li>
3108
+
* <p>
3109
+
* <code>ALERT</code> - Logs for traffic that matches your stateful rules and that have an action that sends an alert. A stateful rule sends alerts for the rule actions DROP, ALERT, and REJECT. For more information, see <a>StatefulRule</a>.</p>
3110
+
* </li>
3111
+
* <li>
3112
+
* <p>
3113
+
* <code>FLOW</code> - Standard network traffic flow logs. The stateful rules engine records flow logs for all network traffic that it receives. Each flow log record captures the network flow for a specific standard stateless rule group.</p>
3114
+
* </li>
3115
+
* <li>
3116
+
* <p>
3117
+
* <code>TLS</code> - Logs for events that are related to TLS inspection. For more information, see
3118
+
* <a href="https://docs.aws.amazon.com/network-firewall/latest/developerguide/tls-inspection-configurations.html">Inspecting SSL/TLS traffic with TLS inspection configurations</a>
3119
+
* in the <i>Network Firewall Developer Guide</i>.</p>
3120
+
* </li>
3121
+
* </ul>
3104
3122
* @public
3105
3123
*/
3106
3124
LogType: LogType|undefined;
3107
3125
3108
3126
/**
3109
3127
* <p>The type of storage destination to send these logs to. You can send logs to an Amazon S3 bucket,
3110
-
* a CloudWatch log group, or a Kinesis Data Firehose delivery stream.</p>
3128
+
* a CloudWatch log group, or a Firehose delivery stream.</p>
0 commit comments