Skip to content

Commit bf77a24

Browse files
author
awstools
committed
feat(client-network-firewall): AWS Network Firewall now supports configuring TCP idle timeout
1 parent 2c0ec7d commit bf77a24

File tree

10 files changed

+69
-14
lines changed

10 files changed

+69
-14
lines changed

clients/client-network-firewall/README.md

+2-4
Original file line numberDiff line numberDiff line change
@@ -32,9 +32,7 @@ Guide</a>.</p>
3232
prevention service for Amazon Virtual Private Cloud (Amazon VPC). With Network Firewall, you can filter traffic at the
3333
perimeter of your VPC. This includes filtering traffic going to and coming from an internet
3434
gateway, NAT gateway, or over VPN or Direct Connect. Network Firewall uses rules that are compatible
35-
with Suricata, a free, open source network analysis and threat detection engine.
36-
Network Firewall supports Suricata version 6.0.9. For information about Suricata,
37-
see the <a href="https://suricata.io/">Suricata website</a>.</p>
35+
with Suricata, a free, open source network analysis and threat detection engine. </p>
3836
<p>You can use Network Firewall to monitor and protect your VPC traffic in a number of ways.
3937
The following are just a few examples: </p>
4038
<ul>
@@ -87,7 +85,7 @@ endpoints.</p>
8785

8886
## Installing
8987

90-
To install the this package, simply type add or install @aws-sdk/client-network-firewall
88+
To install this package, simply type add or install @aws-sdk/client-network-firewall
9189
using your favorite package manager:
9290

9391
- `npm install @aws-sdk/client-network-firewall`

clients/client-network-firewall/src/NetworkFirewall.ts

+1-3
Original file line numberDiff line numberDiff line change
@@ -841,9 +841,7 @@ export interface NetworkFirewall {
841841
* prevention service for Amazon Virtual Private Cloud (Amazon VPC). With Network Firewall, you can filter traffic at the
842842
* perimeter of your VPC. This includes filtering traffic going to and coming from an internet
843843
* gateway, NAT gateway, or over VPN or Direct Connect. Network Firewall uses rules that are compatible
844-
* with Suricata, a free, open source network analysis and threat detection engine.
845-
* Network Firewall supports Suricata version 6.0.9. For information about Suricata,
846-
* see the <a href="https://suricata.io/">Suricata website</a>.</p>
844+
* with Suricata, a free, open source network analysis and threat detection engine. </p>
847845
* <p>You can use Network Firewall to monitor and protect your VPC traffic in a number of ways.
848846
* The following are just a few examples: </p>
849847
* <ul>

clients/client-network-firewall/src/NetworkFirewallClient.ts

+1-3
Original file line numberDiff line numberDiff line change
@@ -449,9 +449,7 @@ export interface NetworkFirewallClientResolvedConfig extends NetworkFirewallClie
449449
* prevention service for Amazon Virtual Private Cloud (Amazon VPC). With Network Firewall, you can filter traffic at the
450450
* perimeter of your VPC. This includes filtering traffic going to and coming from an internet
451451
* gateway, NAT gateway, or over VPN or Direct Connect. Network Firewall uses rules that are compatible
452-
* with Suricata, a free, open source network analysis and threat detection engine.
453-
* Network Firewall supports Suricata version 6.0.9. For information about Suricata,
454-
* see the <a href="https://suricata.io/">Suricata website</a>.</p>
452+
* with Suricata, a free, open source network analysis and threat detection engine. </p>
455453
* <p>You can use Network Firewall to monitor and protect your VPC traffic in a number of ways.
456454
* The following are just a few examples: </p>
457455
* <ul>

clients/client-network-firewall/src/commands/CreateFirewallPolicyCommand.ts

+3
Original file line numberDiff line numberDiff line change
@@ -82,6 +82,9 @@ export interface CreateFirewallPolicyCommandOutput extends CreateFirewallPolicyR
8282
* StatefulEngineOptions: { // StatefulEngineOptions
8383
* RuleOrder: "DEFAULT_ACTION_ORDER" || "STRICT_ORDER",
8484
* StreamExceptionPolicy: "DROP" || "CONTINUE" || "REJECT",
85+
* FlowTimeouts: { // FlowTimeouts
86+
* TcpIdleTimeoutSeconds: Number("int"),
87+
* },
8588
* },
8689
* TLSInspectionConfigurationArn: "STRING_VALUE",
8790
* PolicyVariables: { // PolicyVariables

clients/client-network-firewall/src/commands/DescribeFirewallPolicyCommand.ts

+3
Original file line numberDiff line numberDiff line change
@@ -106,6 +106,9 @@ export interface DescribeFirewallPolicyCommandOutput extends DescribeFirewallPol
106106
* // StatefulEngineOptions: { // StatefulEngineOptions
107107
* // RuleOrder: "DEFAULT_ACTION_ORDER" || "STRICT_ORDER",
108108
* // StreamExceptionPolicy: "DROP" || "CONTINUE" || "REJECT",
109+
* // FlowTimeouts: { // FlowTimeouts
110+
* // TcpIdleTimeoutSeconds: Number("int"),
111+
* // },
109112
* // },
110113
* // TLSInspectionConfigurationArn: "STRING_VALUE",
111114
* // PolicyVariables: { // PolicyVariables

clients/client-network-firewall/src/commands/UpdateFirewallPolicyCommand.ts

+3
Original file line numberDiff line numberDiff line change
@@ -81,6 +81,9 @@ export interface UpdateFirewallPolicyCommandOutput extends UpdateFirewallPolicyR
8181
* StatefulEngineOptions: { // StatefulEngineOptions
8282
* RuleOrder: "DEFAULT_ACTION_ORDER" || "STRICT_ORDER",
8383
* StreamExceptionPolicy: "DROP" || "CONTINUE" || "REJECT",
84+
* FlowTimeouts: { // FlowTimeouts
85+
* TcpIdleTimeoutSeconds: Number("int"),
86+
* },
8487
* },
8588
* TLSInspectionConfigurationArn: "STRING_VALUE",
8689
* PolicyVariables: { // PolicyVariables

clients/client-network-firewall/src/index.ts

+1-3
Original file line numberDiff line numberDiff line change
@@ -27,9 +27,7 @@
2727
* prevention service for Amazon Virtual Private Cloud (Amazon VPC). With Network Firewall, you can filter traffic at the
2828
* perimeter of your VPC. This includes filtering traffic going to and coming from an internet
2929
* gateway, NAT gateway, or over VPN or Direct Connect. Network Firewall uses rules that are compatible
30-
* with Suricata, a free, open source network analysis and threat detection engine.
31-
* Network Firewall supports Suricata version 6.0.9. For information about Suricata,
32-
* see the <a href="https://suricata.io/">Suricata website</a>.</p>
30+
* with Suricata, a free, open source network analysis and threat detection engine. </p>
3331
* <p>You can use Network Firewall to monitor and protect your VPC traffic in a number of ways.
3432
* The following are just a few examples: </p>
3533
* <ul>

clients/client-network-firewall/src/models/models_0.ts

+26
Original file line numberDiff line numberDiff line change
@@ -1113,6 +1113,25 @@ export interface PolicyVariables {
11131113
RuleVariables?: Record<string, IPSet>;
11141114
}
11151115

1116+
/**
1117+
* <p>Describes the amount of time that can pass without any traffic sent through the firewall before the firewall determines that the connection is idle and Network Firewall removes the flow entry from its flow table.
1118+
* Existing connections and flows are not impacted when you update this value. Only new connections after you update this value are impacted.
1119+
* </p>
1120+
* @public
1121+
*/
1122+
export interface FlowTimeouts {
1123+
/**
1124+
* <p>The number of seconds that can pass without any TCP traffic sent through the firewall before the firewall determines that the connection is idle.
1125+
* After the idle timeout passes, data packets are dropped, however, the next TCP SYN packet is considered a new flow and is processed by the firewall.
1126+
* Clients or targets can use TCP keepalive packets to reset the idle timeout.
1127+
* </p>
1128+
* <p>You can define the <code>TcpIdleTimeoutSeconds</code> value to be between 60 and 6000 seconds. If no value is provided, it defaults to 350 seconds.
1129+
* </p>
1130+
* @public
1131+
*/
1132+
TcpIdleTimeoutSeconds?: number;
1133+
}
1134+
11161135
/**
11171136
* @public
11181137
* @enum
@@ -1176,6 +1195,13 @@ export interface StatefulEngineOptions {
11761195
* @public
11771196
*/
11781197
StreamExceptionPolicy?: StreamExceptionPolicy;
1198+
1199+
/**
1200+
* <p>Configures the amount of time that can pass without any traffic sent through the firewall before the firewall determines that the connection is idle.
1201+
* </p>
1202+
* @public
1203+
*/
1204+
FlowTimeouts?: FlowTimeouts;
11791205
}
11801206

11811207
/**

clients/client-network-firewall/src/protocols/Aws_json1_0.ts

+5
Original file line numberDiff line numberDiff line change
@@ -163,6 +163,7 @@ import {
163163
EncryptionConfiguration,
164164
FirewallPolicy,
165165
FirewallPolicyResponse,
166+
FlowTimeouts,
166167
Header,
167168
InsufficientCapacityException,
168169
InternalServerError,
@@ -1744,6 +1745,8 @@ const se_CreateRuleGroupRequest = (input: CreateRuleGroupRequest, context: __Ser
17441745

17451746
// se_Flags omitted.
17461747

1748+
// se_FlowTimeouts omitted.
1749+
17471750
// se_Header omitted.
17481751

17491752
// se_IPSet omitted.
@@ -2113,6 +2116,8 @@ const de_FirewallPolicyResponse = (output: any, context: __SerdeContext): Firewa
21132116

21142117
// de_Flags omitted.
21152118

2119+
// de_FlowTimeouts omitted.
2120+
21162121
// de_Header omitted.
21172122

21182123
// de_InsufficientCapacityException omitted.

0 commit comments

Comments
 (0)