You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
feat(client-network-firewall): AWS Network Firewall now enables customers to use a customer managed AWS KMS key for the encryption of their firewall resources.
Copy file name to clipboardExpand all lines: clients/client-network-firewall/README.md
+7-7Lines changed: 7 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -7,21 +7,21 @@
7
7
8
8
AWS SDK for JavaScript NetworkFirewall Client for Node.js, Browser and React Native.
9
9
10
-
<p>This is the API Reference for AWS Network Firewall. This guide is for developers who need
10
+
<p>This is the API Reference for Network Firewall. This guide is for developers who need
11
11
detailed information about the Network Firewall API actions, data types, and errors. </p>
12
12
<ul>
13
13
<li>
14
14
<p>The REST API requires you to handle connection details, such as calculating
15
15
signatures, handling request retries, and error handling. For general information
16
-
about using the AWS REST APIs, see <ahref="https://docs.aws.amazon.com/general/latest/gr/aws-apis.html">AWS APIs</a>. </p>
16
+
about using the Amazon Web Services REST APIs, see <ahref="https://docs.aws.amazon.com/general/latest/gr/aws-apis.html">Amazon Web Services APIs</a>. </p>
17
17
<p>To access Network Firewall using the REST API endpoint:
* <p>This is the API Reference for AWS Network Firewall. This guide is for developers who need
157
+
* <p>This is the API Reference for Network Firewall. This guide is for developers who need
153
158
* detailed information about the Network Firewall API actions, data types, and errors. </p>
154
159
* <ul>
155
160
* <li>
156
161
* <p>The REST API requires you to handle connection details, such as calculating
157
162
* signatures, handling request retries, and error handling. For general information
158
-
* about using the AWS REST APIs, see <a href="https://docs.aws.amazon.com/general/latest/gr/aws-apis.html">AWS APIs</a>. </p>
163
+
* about using the Amazon Web Services REST APIs, see <a href="https://docs.aws.amazon.com/general/latest/gr/aws-apis.html">Amazon Web Services APIs</a>. </p>
159
164
* <p>To access Network Firewall using the REST API endpoint:
* <a href="http://aws.amazon.com/tools/#SDKs">Amazon Web Services SDKs</a>.</p>
167
172
* </li>
168
173
* <li>
169
174
* <p>For descriptions of Network Firewall features, including and step-by-step
@@ -174,15 +179,15 @@ import { NetworkFirewallClient } from "./NetworkFirewallClient";
174
179
* <p>Network Firewall is a stateful, managed, network firewall and intrusion detection and
175
180
* prevention service for Amazon Virtual Private Cloud (Amazon VPC). With Network Firewall, you can filter traffic at the
176
181
* perimeter of your VPC. This includes filtering traffic going to and coming from an internet
177
-
* gateway, NAT gateway, or over VPN or AWS Direct Connect. Network Firewall uses rules that are compatible
182
+
* gateway, NAT gateway, or over VPN or Direct Connect. Network Firewall uses rules that are compatible
178
183
* with Suricata, a free, open source intrusion detection system (IDS) engine.
179
-
* AWS Network Firewall supports Suricata version 5.0.2. For information about Suricata,
184
+
* Network Firewall supports Suricata version 5.0.2. For information about Suricata,
180
185
* see the <a href="https://suricata-ids.org/">Suricata website</a>.</p>
181
186
* <p>You can use Network Firewall to monitor and protect your VPC traffic in a number of ways.
182
187
* The following are just a few examples: </p>
183
188
* <ul>
184
189
* <li>
185
-
* <p>Allow domains or IP addresses for known AWS service endpoints, such as Amazon S3, and
190
+
* <p>Allow domains or IP addresses for known Amazon Web Services service endpoints, such as Amazon S3, and
186
191
* block all other forms of traffic.</p>
187
192
* </li>
188
193
* <li>
@@ -268,7 +273,7 @@ export class NetworkFirewall extends NetworkFirewallClient {
268
273
/**
269
274
* <p>Associates the specified subnets in the Amazon VPC to the firewall. You can specify one
270
275
* subnet for each of the Availability Zones that the VPC spans. </p>
271
-
* <p>This request creates an AWS Network Firewall firewall endpoint in each of the subnets. To
276
+
* <p>This request creates an Network Firewall firewall endpoint in each of the subnets. To
272
277
* enable the firewall's protections, you must also modify the VPC's route tables for each
273
278
* subnet's Availability Zone, to redirect the traffic that's coming into and going out of the
274
279
* zone through the firewall endpoint. </p>
@@ -303,12 +308,12 @@ export class NetworkFirewall extends NetworkFirewallClient {
303
308
}
304
309
305
310
/**
306
-
* <p>Creates an AWS Network Firewall <a>Firewall</a> and accompanying <a>FirewallStatus</a> for a VPC. </p>
307
-
* <p>The firewall defines the configuration settings for an AWS Network Firewall firewall. The settings that you can define at creation include the firewall policy, the subnets in your VPC to use for the firewall endpoints, and any tags that are attached to the firewall AWS resource. </p>
311
+
* <p>Creates an Network Firewall <a>Firewall</a> and accompanying <a>FirewallStatus</a> for a VPC. </p>
312
+
* <p>The firewall defines the configuration settings for an Network Firewall firewall. The settings that you can define at creation include the firewall policy, the subnets in your VPC to use for the firewall endpoints, and any tags that are attached to the firewall Amazon Web Services resource. </p>
308
313
* <p>After you create a firewall, you can provide additional settings, like the logging configuration. </p>
309
314
* <p>To update the settings for a firewall, you use the operations that apply to the settings
310
315
* themselves, for example <a>UpdateLoggingConfiguration</a>, <a>AssociateSubnets</a>, and <a>UpdateFirewallDeleteProtection</a>. </p>
311
-
* <p>To manage a firewall's tags, use the standard AWS resource tagging operations, <a>ListTagsForResource</a>, <a>TagResource</a>, and <a>UntagResource</a>.</p>
316
+
* <p>To manage a firewall's tags, use the standard Amazon Web Services resource tagging operations, <a>ListTagsForResource</a>, <a>TagResource</a>, and <a>UntagResource</a>.</p>
312
317
* <p>To retrieve information about firewalls, use <a>ListFirewalls</a> and <a>DescribeFirewall</a>.</p>
313
318
*/
314
319
publiccreateFirewall(
@@ -342,7 +347,7 @@ export class NetworkFirewall extends NetworkFirewallClient {
342
347
343
348
/**
344
349
* <p>Creates the firewall policy for the firewall according to the specifications. </p>
345
-
* <p>An AWS Network Firewall firewall policy defines the behavior of a firewall, in a collection of
350
+
* <p>An Network Firewall firewall policy defines the behavior of a firewall, in a collection of
346
351
* stateless and stateful rule groups and other settings. You can use one firewall policy for
347
352
* multiple firewalls. </p>
348
353
*/
@@ -885,9 +890,9 @@ export class NetworkFirewall extends NetworkFirewallClient {
885
890
* <p>Retrieves the tags associated with the specified resource. Tags are key:value pairs that
886
891
* you can use to categorize and manage your resources, for purposes like billing. For
887
892
* example, you might set the tag key to "customer" and the value to the customer name or ID.
888
-
* You can specify one or more tags to add to each AWS resource, up to 50 tags for a
893
+
* You can specify one or more tags to add to each Amazon Web Services resource, up to 50 tags for a
889
894
* resource.</p>
890
-
* <p>You can tag the AWS resources that you manage through AWS Network Firewall: firewalls, firewall
895
+
* <p>You can tag the Amazon Web Services resources that you manage through Network Firewall: firewalls, firewall
891
896
* policies, and rule groups. </p>
892
897
*/
893
898
publiclistTagsForResource(
@@ -920,7 +925,7 @@ export class NetworkFirewall extends NetworkFirewallClient {
920
925
}
921
926
922
927
/**
923
-
* <p>Creates or updates an AWS Identity and Access Management policy for your rule group or firewall policy. Use this to share rule groups and firewall policies between accounts. This operation works in conjunction with the AWS Resource Access Manager (RAM) service
928
+
* <p>Creates or updates an IAM policy for your rule group or firewall policy. Use this to share rule groups and firewall policies between accounts. This operation works in conjunction with the Amazon Web Services Resource Access Manager (RAM) service
924
929
* to manage resource sharing for Network Firewall. </p>
925
930
* <p>Use this operation to create or update a resource policy for your rule group or firewall policy. In the policy, you specify the accounts that you want to share the resource with and the operations that you want the accounts to be able to perform. </p>
926
931
* <p>When you add an account in the resource policy, you then run the following Resource Access Manager (RAM) operations to access and accept the shared rule group or firewall policy. </p>
@@ -934,7 +939,7 @@ export class NetworkFirewall extends NetworkFirewallClient {
934
939
* <a href="https://docs.aws.amazon.com/ram/latest/APIReference/API_AcceptResourceShareInvitation.html">AcceptResourceShareInvitation</a> - Accepts the share invitation for a specified resource share. </p>
935
940
* </li>
936
941
* </ul>
937
-
* <p>For additional information about resource sharing using RAM, see <a href="https://docs.aws.amazon.com/ram/latest/userguide/what-is.html">AWS Resource Access Manager User Guide</a>.</p>
942
+
* <p>For additional information about resource sharing using RAM, see <a href="https://docs.aws.amazon.com/ram/latest/userguide/what-is.html">Resource Access Manager User Guide</a>.</p>
938
943
*/
939
944
publicputResourcePolicy(
940
945
args: PutResourcePolicyCommandInput,
@@ -969,8 +974,8 @@ export class NetworkFirewall extends NetworkFirewallClient {
969
974
* <p>Adds the specified tags to the specified resource. Tags are key:value pairs that you can
970
975
* use to categorize and manage your resources, for purposes like billing. For example, you
971
976
* might set the tag key to "customer" and the value to the customer name or ID. You can
972
-
* specify one or more tags to add to each AWS resource, up to 50 tags for a resource.</p>
973
-
* <p>You can tag the AWS resources that you manage through AWS Network Firewall: firewalls, firewall
977
+
* specify one or more tags to add to each Amazon Web Services resource, up to 50 tags for a resource.</p>
978
+
* <p>You can tag the Amazon Web Services resources that you manage through Network Firewall: firewalls, firewall
0 commit comments