NetworkFirewallClient

This is the API Reference for Network Firewall. This guide is for developers who need detailed information about the Network Firewall API actions, data types, and errors.

  • The REST API requires you to handle connection details, such as calculating signatures, handling request retries, and error handling. For general information about using the Amazon Web Services REST APIs, see Amazon Web Services APIs. To access Network Firewall using the REST API endpoint: https://network-firewall.<region>.amazonaws.com

  • Alternatively, you can use one of the Amazon Web Services SDKs to access an API that's tailored to the programming language or platform that you're using. For more information, see Amazon Web Services SDKs.

  • For descriptions of Network Firewall features, including and step-by-step instructions on how to use them through the Network Firewall console, see the Network Firewall Developer Guide.

Network Firewall is a stateful, managed, network firewall and intrusion detection and prevention service for Amazon Virtual Private Cloud (Amazon VPC). With Network Firewall, you can filter traffic at the perimeter of your VPC. This includes filtering traffic going to and coming from an internet gateway, NAT gateway, or over VPN or Direct Connect. Network Firewall uses rules that are compatible with Suricata, a free, open source network analysis and threat detection engine. Network Firewall supports Suricata version 6.0.9. For information about Suricata, see the Suricata website.

You can use Network Firewall to monitor and protect your VPC traffic in a number of ways. The following are just a few examples:

  • Allow domains or IP addresses for known Amazon Web Services service endpoints, such as Amazon S3, and block all other forms of traffic.

  • Use custom lists of known bad domains to limit the types of domain names that your applications can access.

  • Perform deep packet inspection on traffic entering or leaving your VPC.

  • Use stateful protocol detection to filter protocols like HTTPS, regardless of the port used.

To enable Network Firewall for your VPCs, you perform steps in both Amazon VPC and in Network Firewall. For information about using Amazon VPC, see Amazon VPC User Guide.

To start using Network Firewall, do the following:

  • (Optional) If you don't already have a VPC that you want to protect, create it in Amazon VPC.

  • In Amazon VPC, in each Availability Zone where you want to have a firewall endpoint, create a subnet for the sole use of Network Firewall.

  • In Network Firewall, create stateless and stateful rule groups, to define the components of the network traffic filtering behavior that you want your firewall to have.

  • In Network Firewall, create a firewall policy that uses your rule groups and specifies additional default traffic filtering behavior.

  • In Network Firewall, create a firewall and specify your new firewall policy and VPC subnets. Network Firewall creates a firewall endpoint in each subnet that you specify, with the behavior that's defined in the firewall policy.

  • In Amazon VPC, use ingress routing enhancements to route traffic through the new firewall endpoints.

Properties

Link copied to clipboard
abstract override val config: NetworkFirewallClient.Config

NetworkFirewallClient's configuration

Functions

Link copied to clipboard

Associates a FirewallPolicy to a Firewall.

Link copied to clipboard

Associates the specified subnets in the Amazon VPC to the firewall. You can specify one subnet for each of the Availability Zones that the VPC spans.

Link copied to clipboard

Creates an Network Firewall Firewall and accompanying FirewallStatus for a VPC.

Link copied to clipboard

Creates the firewall policy for the firewall according to the specifications.

Link copied to clipboard

Creates the specified stateless or stateful rule group, which includes the rules for network traffic inspection, a capacity setting, and tags.

Link copied to clipboard

Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains the Certificate Manager certificate references that Network Firewall uses to decrypt and re-encrypt inbound traffic.

Link copied to clipboard
abstract suspend fun deleteFirewall(input: DeleteFirewallRequest = DeleteFirewallRequest { }): DeleteFirewallResponse

Deletes the specified Firewall and its FirewallStatus. This operation requires the firewall's DeleteProtection flag to be FALSE. You can't revert this operation.

Link copied to clipboard
abstract suspend fun deleteFirewallPolicy(input: DeleteFirewallPolicyRequest = DeleteFirewallPolicyRequest { }): DeleteFirewallPolicyResponse

Deletes the specified FirewallPolicy.

Link copied to clipboard

Deletes a resource policy that you created in a PutResourcePolicy request.

Link copied to clipboard
abstract suspend fun deleteRuleGroup(input: DeleteRuleGroupRequest = DeleteRuleGroupRequest { }): DeleteRuleGroupResponse

Deletes the specified RuleGroup.

Link copied to clipboard
abstract suspend fun deleteTlsInspectionConfiguration(input: DeleteTlsInspectionConfigurationRequest = DeleteTlsInspectionConfigurationRequest { }): DeleteTlsInspectionConfigurationResponse

Deletes the specified TLSInspectionConfiguration.

Link copied to clipboard
abstract suspend fun describeFirewall(input: DescribeFirewallRequest = DescribeFirewallRequest { }): DescribeFirewallResponse

Returns the data objects for the specified firewall.

Link copied to clipboard
abstract suspend fun describeFirewallPolicy(input: DescribeFirewallPolicyRequest = DescribeFirewallPolicyRequest { }): DescribeFirewallPolicyResponse

Returns the data objects for the specified firewall policy.

Link copied to clipboard
abstract suspend fun describeLoggingConfiguration(input: DescribeLoggingConfigurationRequest = DescribeLoggingConfigurationRequest { }): DescribeLoggingConfigurationResponse

Returns the logging configuration for the specified firewall.

Link copied to clipboard

Retrieves a resource policy that you created in a PutResourcePolicy request.

Link copied to clipboard
abstract suspend fun describeRuleGroup(input: DescribeRuleGroupRequest = DescribeRuleGroupRequest { }): DescribeRuleGroupResponse

Returns the data objects for the specified rule group.

Link copied to clipboard
abstract suspend fun describeRuleGroupMetadata(input: DescribeRuleGroupMetadataRequest = DescribeRuleGroupMetadataRequest { }): DescribeRuleGroupMetadataResponse

High-level information about a rule group, returned by operations like create and describe. You can use the information provided in the metadata to retrieve and manage a rule group. You can retrieve all objects for a rule group by calling DescribeRuleGroup.

Link copied to clipboard
abstract suspend fun describeTlsInspectionConfiguration(input: DescribeTlsInspectionConfigurationRequest = DescribeTlsInspectionConfigurationRequest { }): DescribeTlsInspectionConfigurationResponse

Returns the data objects for the specified TLS inspection configuration.

Link copied to clipboard

Removes the specified subnet associations from the firewall. This removes the firewall endpoints from the subnets and removes any network filtering protections that the endpoints were providing.

Link copied to clipboard
abstract suspend fun listFirewallPolicies(input: ListFirewallPoliciesRequest = ListFirewallPoliciesRequest { }): ListFirewallPoliciesResponse

Retrieves the metadata for the firewall policies that you have defined. Depending on your setting for max results and the number of firewall policies, a single call might not return the full list.

Link copied to clipboard
abstract suspend fun listFirewalls(input: ListFirewallsRequest = ListFirewallsRequest { }): ListFirewallsResponse

Retrieves the metadata for the firewalls that you have defined. If you provide VPC identifiers in your request, this returns only the firewalls for those VPCs.

Link copied to clipboard
abstract suspend fun listRuleGroups(input: ListRuleGroupsRequest = ListRuleGroupsRequest { }): ListRuleGroupsResponse

Retrieves the metadata for the rule groups that you have defined. Depending on your setting for max results and the number of rule groups, a single call might not return the full list.

Link copied to clipboard

Retrieves the tags associated with the specified resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to "customer" and the value to the customer name or ID. You can specify one or more tags to add to each Amazon Web Services resource, up to 50 tags for a resource.

Link copied to clipboard
abstract suspend fun listTlsInspectionConfigurations(input: ListTlsInspectionConfigurationsRequest = ListTlsInspectionConfigurationsRequest { }): ListTlsInspectionConfigurationsResponse

Retrieves the metadata for the TLS inspection configurations that you have defined. Depending on your setting for max results and the number of TLS inspection configurations, a single call might not return the full list.

Link copied to clipboard

Creates or updates an IAM policy for your rule group or firewall policy. Use this to share rule groups and firewall policies between accounts. This operation works in conjunction with the Amazon Web Services Resource Access Manager (RAM) service to manage resource sharing for Network Firewall.

Link copied to clipboard
abstract suspend fun tagResource(input: TagResourceRequest): TagResourceResponse

Adds the specified tags to the specified resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to "customer" and the value to the customer name or ID. You can specify one or more tags to add to each Amazon Web Services resource, up to 50 tags for a resource.

Link copied to clipboard

Removes the tags with the specified keys from the specified resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to "customer" and the value to the customer name or ID. You can specify one or more tags to add to each Amazon Web Services resource, up to 50 tags for a resource.

Link copied to clipboard

Modifies the flag, DeleteProtection, which indicates whether it is possible to delete the firewall. If the flag is set to TRUE, the firewall is protected against deletion. This setting helps protect against accidentally deleting a firewall that's in use.

Link copied to clipboard
abstract suspend fun updateFirewallDescription(input: UpdateFirewallDescriptionRequest = UpdateFirewallDescriptionRequest { }): UpdateFirewallDescriptionResponse

Modifies the description for the specified firewall. Use the description to help you identify the firewall when you're working with it.

Link copied to clipboard

A complex type that contains settings for encryption of your firewall resources.

Link copied to clipboard

Updates the properties of the specified firewall policy.

Link copied to clipboard

Modifies the flag, ChangeProtection, which indicates whether it is possible to change the firewall. If the flag is set to TRUE, the firewall is protected from changes. This setting helps protect against accidentally changing a firewall that's in use.

Link copied to clipboard
abstract suspend fun updateLoggingConfiguration(input: UpdateLoggingConfigurationRequest = UpdateLoggingConfigurationRequest { }): UpdateLoggingConfigurationResponse

Sets the logging configuration for the specified firewall.

Link copied to clipboard

Updates the rule settings for the specified rule group. You use a rule group by reference in one or more firewall policies. When you modify a rule group, you modify all firewall policies that use the rule group.

Link copied to clipboard

Updates the TLS inspection configuration settings for the specified TLS inspection configuration. You use a TLS inspection configuration by reference in one or more firewall policies. When you modify a TLS inspection configuration, you modify all firewall policies that use the TLS inspection configuration.

Inherited functions

Link copied to clipboard

Associates a FirewallPolicy to a Firewall.

Link copied to clipboard

Associates the specified subnets in the Amazon VPC to the firewall. You can specify one subnet for each of the Availability Zones that the VPC spans.

Link copied to clipboard
expect abstract fun close()
Link copied to clipboard

Creates an Network Firewall Firewall and accompanying FirewallStatus for a VPC.

Link copied to clipboard

Creates the firewall policy for the firewall according to the specifications.

Link copied to clipboard

Creates the specified stateless or stateful rule group, which includes the rules for network traffic inspection, a capacity setting, and tags.

Link copied to clipboard

Creates an Network Firewall TLS inspection configuration. A TLS inspection configuration contains the Certificate Manager certificate references that Network Firewall uses to decrypt and re-encrypt inbound traffic.

Link copied to clipboard

Deletes the specified Firewall and its FirewallStatus. This operation requires the firewall's DeleteProtection flag to be FALSE. You can't revert this operation.

Link copied to clipboard

Deletes the specified FirewallPolicy.

Link copied to clipboard

Deletes a resource policy that you created in a PutResourcePolicy request.

Link copied to clipboard

Deletes the specified RuleGroup.

Link copied to clipboard

Deletes the specified TLSInspectionConfiguration.

Link copied to clipboard

Returns the data objects for the specified firewall.

Link copied to clipboard

Returns the data objects for the specified firewall policy.

Link copied to clipboard

Returns the logging configuration for the specified firewall.

Link copied to clipboard

Retrieves a resource policy that you created in a PutResourcePolicy request.

Link copied to clipboard

Returns the data objects for the specified rule group.

Link copied to clipboard

High-level information about a rule group, returned by operations like create and describe. You can use the information provided in the metadata to retrieve and manage a rule group. You can retrieve all objects for a rule group by calling DescribeRuleGroup.

Link copied to clipboard

Returns the data objects for the specified TLS inspection configuration.

Link copied to clipboard

Removes the specified subnet associations from the firewall. This removes the firewall endpoints from the subnets and removes any network filtering protections that the endpoints were providing.

Link copied to clipboard

Retrieves the metadata for the firewall policies that you have defined. Depending on your setting for max results and the number of firewall policies, a single call might not return the full list.

Link copied to clipboard

Retrieves the metadata for the firewalls that you have defined. If you provide VPC identifiers in your request, this returns only the firewalls for those VPCs.

Link copied to clipboard

Retrieves the metadata for the rule groups that you have defined. Depending on your setting for max results and the number of rule groups, a single call might not return the full list.

Link copied to clipboard

Retrieves the tags associated with the specified resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to "customer" and the value to the customer name or ID. You can specify one or more tags to add to each Amazon Web Services resource, up to 50 tags for a resource.

Link copied to clipboard

Retrieves the metadata for the TLS inspection configurations that you have defined. Depending on your setting for max results and the number of TLS inspection configurations, a single call might not return the full list.

Link copied to clipboard

Creates or updates an IAM policy for your rule group or firewall policy. Use this to share rule groups and firewall policies between accounts. This operation works in conjunction with the Amazon Web Services Resource Access Manager (RAM) service to manage resource sharing for Network Firewall.

Link copied to clipboard

Adds the specified tags to the specified resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to "customer" and the value to the customer name or ID. You can specify one or more tags to add to each Amazon Web Services resource, up to 50 tags for a resource.

Link copied to clipboard

Removes the tags with the specified keys from the specified resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to "customer" and the value to the customer name or ID. You can specify one or more tags to add to each Amazon Web Services resource, up to 50 tags for a resource.

Link copied to clipboard

Modifies the flag, DeleteProtection, which indicates whether it is possible to delete the firewall. If the flag is set to TRUE, the firewall is protected against deletion. This setting helps protect against accidentally deleting a firewall that's in use.

Link copied to clipboard

Modifies the description for the specified firewall. Use the description to help you identify the firewall when you're working with it.

Link copied to clipboard

A complex type that contains settings for encryption of your firewall resources.

Link copied to clipboard

Updates the properties of the specified firewall policy.

Link copied to clipboard

Modifies the flag, ChangeProtection, which indicates whether it is possible to change the firewall. If the flag is set to TRUE, the firewall is protected from changes. This setting helps protect against accidentally changing a firewall that's in use.

Link copied to clipboard

Sets the logging configuration for the specified firewall.

Link copied to clipboard

Updates the rule settings for the specified rule group. You use a rule group by reference in one or more firewall policies. When you modify a rule group, you modify all firewall policies that use the rule group.

Link copied to clipboard

Updates the TLS inspection configuration settings for the specified TLS inspection configuration. You use a TLS inspection configuration by reference in one or more firewall policies. When you modify a TLS inspection configuration, you modify all firewall policies that use the TLS inspection configuration.

Link copied to clipboard

Create a copy of the client with one or more configuration values overridden. This method allows the caller to perform scoped config overrides for one or more client operations.