aws_network_firewall_firewall
account_id
Type: STRING
delete_protection
Type: BOOLEAN
Provider name: DeleteProtection
Description: A flag indicating whether it is possible to delete the firewall. A setting of TRUE
indicates that the firewall is protected against deletion. Use this setting to protect against accidentally deleting a firewall that is in use. When you create a firewall, the operation initializes this flag to TRUE
.
description
Type: STRING
Provider name: Description
Description: A description of the firewall.
encryption_configuration
Type: STRUCT
Provider name: EncryptionConfiguration
Description: A complex type that contains the Amazon Web Services KMS encryption configuration settings for your firewall.
key_id
Type: STRING
Provider name: KeyId
Description: The ID of the Amazon Web Services Key Management Service (KMS) customer managed key. You can use any of the key identifiers that KMS supports, unless you’re using a key that’s managed by another account. If you’re using a key managed by another account, then specify the key ARN. For more information, see Key ID in the Amazon Web Services KMS Developer Guide.
type
Type: STRING
Provider name: Type
Description: The type of Amazon Web Services KMS key to use for encryption of your Network Firewall resources.
firewall_arn
Type: STRING
Provider name: FirewallArn
Description: The Amazon Resource Name (ARN) of the firewall.
firewall_id
Type: STRING
Provider name: FirewallId
Description: The unique identifier for the firewall.
firewall_name
Type: STRING
Provider name: FirewallName
Description: The descriptive name of the firewall. You can’t change the name of a firewall after you create it.
firewall_policy
Type: STRUCT
Provider name: FirewallPolicy
Description: The policy for the specified firewall policy.
policy_variables
Type: STRUCT
Provider name: PolicyVariables
Description: Contains variables that you can use to override default Suricata settings in your firewall policy.
rule_variables
Type: STRING
Provider name: RuleVariables
Description: The IPv4 or IPv6 addresses in CIDR notation to use for the Suricata HOME_NET
variable. If your firewall uses an inspection VPC, you might want to override the HOME_NET
variable with the CIDRs of your home networks. If you don’t override HOME_NET
with your own CIDRs, Network Firewall by default uses the CIDR of your inspection VPC.
stateful_default_actions
Type: UNORDERED_LIST_STRING
Provider name: StatefulDefaultActions
Description: The default actions to take on a packet that doesn’t match any stateful rules. The stateful default action is optional, and is only valid when using the strict rule order. Valid values of the stateful default action:- aws:drop_strict
- aws:drop_established
- aws:alert_strict
- aws:alert_established
For more information, see Strict evaluation order in the Network Firewall Developer Guide.
stateful_engine_options
Type: STRUCT
Provider name: StatefulEngineOptions
Description: Additional options governing how Network Firewall handles stateful rules. The stateful rule groups that you use in your policy must have stateful rule options settings that are compatible with these settings.
rule_order
Type: STRING
Provider name: RuleOrder
Description: Indicates how to manage the order of stateful rule evaluation for the policy. STRICT_ORDER
is the default and recommended option. With STRICT_ORDER
, provide your rules in the order that you want them to be evaluated. You can then choose one or more default actions for packets that don’t match any rules. Choose STRICT_ORDER
to have the stateful rules engine determine the evaluation order of your rules. The default action for this rule order is PASS
, followed by DROP
, REJECT
, and ALERT
actions. Stateful rules are provided to the rule engine as Suricata compatible strings, and Suricata evaluates them based on your settings. For more information, see Evaluation order for stateful rules in the Network Firewall Developer Guide.
stream_exception_policy
Type: STRING
Provider name: StreamExceptionPolicy
Description: Configures how Network Firewall processes traffic when a network connection breaks midstream. Network connections can break due to disruptions in external networks or within the firewall itself.DROP
- Network Firewall fails closed and drops all subsequent traffic going to the firewall. This is the default behavior.CONTINUE
- Network Firewall continues to apply rules to the subsequent traffic without context from traffic before the break. This impacts the behavior of rules that depend on this context. For example, if you have a stateful rule to drop http
traffic, Network Firewall won’t match the traffic for this rule because the service won’t have the context from session initialization defining the application layer protocol as HTTP. However, this behavior is rule dependent—a TCP-layer rule using a flow:stateless
rule would still match, as would the aws:drop_strict
default action.REJECT
- Network Firewall fails closed and drops all subsequent traffic going to the firewall. Network Firewall also sends a TCP reject packet back to your client so that the client can immediately establish a new session. Network Firewall will have context about the new session and will apply rules to the subsequent traffic.
stateful_rule_group_references
Type: UNORDERED_LIST_STRUCT
Provider name: StatefulRuleGroupReferences
Description: References to the stateful rule groups that are used in the policy. These define the inspection criteria in stateful rules.
override
Type: STRUCT
Provider name: Override
Description: The action that allows the policy owner to override the behavior of the rule group within a policy.
action
Type: STRING
Provider name: Action
Description: The action that changes the rule group from DROP
to ALERT
. This only applies to managed rule groups.
priority
Type: INT32
Provider name: Priority
Description: An integer setting that indicates the order in which to run the stateful rule groups in a single FirewallPolicy. This setting only applies to firewall policies that specify the STRICT_ORDER
rule order in the stateful engine options settings. Network Firewall evalutes each stateful rule group against a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy. You can change the priority settings of your rule groups at any time. To make it easier to insert rule groups later, number them so there’s a wide range in between, for example use 100, 200, and so on.
resource_arn
Type: STRING
Provider name: ResourceArn
Description: The Amazon Resource Name (ARN) of the stateful rule group.
stateless_custom_actions
Type: UNORDERED_LIST_STRUCT
Provider name: StatelessCustomActions
Description: The custom action definitions that are available for use in the firewall policy’s StatelessDefaultActions
setting. You name each custom action that you define, and then you can use it by name in your default actions specifications.
action_definition
Type: STRUCT
Provider name: ActionDefinition
Description: The custom action associated with the action name.
publish_metric_action
Type: STRUCT
Provider name: PublishMetricAction
Description: Stateless inspection criteria that publishes the specified metrics to Amazon CloudWatch for the matching packet. This setting defines a CloudWatch dimension value to be published. You can pair this custom action with any of the standard stateless rule actions. For example, you could pair this in a rule action with the standard action that forwards the packet for stateful inspection. Then, when a packet matches the rule, Network Firewall publishes metrics for the packet and forwards it.
dimensions
Type: UNORDERED_LIST_STRUCT
Provider name: Dimensions
Description:
value
Type: STRING
Provider name: Value
Description: The value to use in the custom metric dimension.
action_name
Type: STRING
Provider name: ActionName
Description: The descriptive name of the custom action. You can’t change the name of a custom action after you create it.
stateless_default_actions
Type: UNORDERED_LIST_STRING
Provider name: StatelessDefaultActions
Description: The actions to take on a packet if it doesn’t match any of the stateless rules in the policy. If you want non-matching packets to be forwarded for stateful inspection, specify aws:forward_to_sfe
. You must specify one of the standard actions: aws:pass
, aws:drop
, or aws:forward_to_sfe
. In addition, you can specify custom actions that are compatible with your standard section choice. For example, you could specify [“aws:pass”]
or you could specify [“aws:pass”, “customActionName”]
. For information about compatibility, see the custom action descriptions under CustomAction.
stateless_fragment_default_actions
Type: UNORDERED_LIST_STRING
Provider name: StatelessFragmentDefaultActions
Description: The actions to take on a fragmented UDP packet if it doesn’t match any of the stateless rules in the policy. Network Firewall only manages UDP packet fragments and silently drops packet fragments for other protocols. If you want non-matching fragmented UDP packets to be forwarded for stateful inspection, specify aws:forward_to_sfe
. You must specify one of the standard actions: aws:pass
, aws:drop
, or aws:forward_to_sfe
. In addition, you can specify custom actions that are compatible with your standard section choice. For example, you could specify [“aws:pass”]
or you could specify [“aws:pass”, “customActionName”]
. For information about compatibility, see the custom action descriptions under CustomAction.
stateless_rule_group_references
Type: UNORDERED_LIST_STRUCT
Provider name: StatelessRuleGroupReferences
Description: References to the stateless rule groups that are used in the policy. These define the matching criteria in stateless rules.
priority
Type: INT32
Provider name: Priority
Description: An integer setting that indicates the order in which to run the stateless rule groups in a single FirewallPolicy. Network Firewall applies each stateless rule group to a packet starting with the group that has the lowest priority setting. You must ensure that the priority settings are unique within each policy.
resource_arn
Type: STRING
Provider name: ResourceArn
Description: The Amazon Resource Name (ARN) of the stateless rule group.
tls_inspection_configuration_arn
Type: STRING
Provider name: TLSInspectionConfigurationArn
Description: The Amazon Resource Name (ARN) of the TLS inspection configuration.
firewall_policy_arn
Type: STRING
Provider name: FirewallPolicyArn
Description: The Amazon Resource Name (ARN) of the firewall policy. The relationship of firewall to firewall policy is many to one. Each firewall requires one firewall policy association, and you can use the same firewall policy for multiple firewalls.
firewall_policy_change_protection
Type: BOOLEAN
Provider name: FirewallPolicyChangeProtection
Description: A setting indicating whether the firewall is protected against a change to the firewall policy association. Use this setting to protect against accidentally modifying the firewall policy for a firewall that is in use. When you create a firewall, the operation initializes this setting to TRUE
.
firewall_policy_response
Type: STRUCT
Provider name: FirewallPolicyResponse
Description: The high-level properties of a firewall policy. This, along with the FirewallPolicy, define the policy. You can retrieve all objects for a firewall policy by calling DescribeFirewallPolicy.
consumed_stateful_rule_capacity
Type: INT32
Provider name: ConsumedStatefulRuleCapacity
Description: The number of capacity units currently consumed by the policy’s stateful rules.
consumed_stateless_rule_capacity
Type: INT32
Provider name: ConsumedStatelessRuleCapacity
Description: The number of capacity units currently consumed by the policy’s stateless rules.
description
Type: STRING
Provider name: Description
Description: A description of the firewall policy.
encryption_configuration
Type: STRUCT
Provider name: EncryptionConfiguration
Description: A complex type that contains the Amazon Web Services KMS encryption configuration settings for your firewall policy.
key_id
Type: STRING
Provider name: KeyId
Description: The ID of the Amazon Web Services Key Management Service (KMS) customer managed key. You can use any of the key identifiers that KMS supports, unless you’re using a key that’s managed by another account. If you’re using a key managed by another account, then specify the key ARN. For more information, see Key ID in the Amazon Web Services KMS Developer Guide.
type
Type: STRING
Provider name: Type
Description: The type of Amazon Web Services KMS key to use for encryption of your Network Firewall resources.
firewall_policy_arn
Type: STRING
Provider name: FirewallPolicyArn
Description: The Amazon Resource Name (ARN) of the firewall policy. If this response is for a create request that had DryRun
set to TRUE
, then this ARN is a placeholder that isn’t attached to a valid resource.
firewall_policy_id
Type: STRING
Provider name: FirewallPolicyId
Description: The unique identifier for the firewall policy.
firewall_policy_name
Type: STRING
Provider name: FirewallPolicyName
Description: The descriptive name of the firewall policy. You can’t change the name of a firewall policy after you create it.
firewall_policy_status
Type: STRING
Provider name: FirewallPolicyStatus
Description: The current status of the firewall policy. You can retrieve this for a firewall policy by calling DescribeFirewallPolicy and providing the firewall policy’s name or ARN.
last_modified_time
Type: TIMESTAMP
Provider name: LastModifiedTime
Description: The last time that the firewall policy was changed.
number_of_associations
Type: INT32
Provider name: NumberOfAssociations
Description: The number of firewalls that are associated with this firewall policy.
firewall_status
Type: STRUCT
Provider name: FirewallStatus
Description: Detailed information about the current status of a Firewall. You can retrieve this for a firewall by calling DescribeFirewall and providing the firewall name and ARN.
capacity_usage_summary
Type: STRUCT
Provider name: CapacityUsageSummary
Description: Describes the capacity usage of the resources contained in a firewall’s reference sets. Network Firewall calclulates the capacity usage by taking an aggregated count of all of the resources used by all of the reference sets in a firewall.
cidrs
Type: STRUCT
Provider name: CIDRs
Description: Describes the capacity usage of the CIDR blocks used by the IP set references in a firewall.
available_cidr_count
Type: INT32
Provider name: AvailableCIDRCount
Description: The number of CIDR blocks available for use by the IP set references in a firewall.
ip_set_references
Type: STRING
Provider name: IPSetReferences
Description: The list of the IP set references used by a firewall.
utilized_cidr_count
Type: INT32
Provider name: UtilizedCIDRCount
Description: The number of CIDR blocks used by the IP set references in a firewall.
configuration_sync_state_summary
Type: STRING
Provider name: ConfigurationSyncStateSummary
Description: The configuration sync state for the firewall. This summarizes the sync states reported in the Config
settings for all of the Availability Zones where you have configured the firewall. When you create a firewall or update its configuration, for example by adding a rule group to its firewall policy, Network Firewall distributes the configuration changes to all zones where the firewall is in use. This summary indicates whether the configuration changes have been applied everywhere. This status must be IN_SYNC
for the firewall to be ready for use, but it doesn’t indicate that the firewall is ready. The Status
setting indicates firewall readiness.
status
Type: STRING
Provider name: Status
Description: The readiness of the configured firewall to handle network traffic across all of the Availability Zones where you’ve configured it. This setting is READY
only when the ConfigurationSyncStateSummary
value is IN_SYNC
and the Attachment
Status
values for all of the configured subnets are READY
.
sync_states
Type: STRING
Provider name: SyncStates
Description: The subnets that you’ve configured for use by the Network Firewall firewall. This contains one array element per Availability Zone where you’ve configured a subnet. These objects provide details of the information that is summarized in the ConfigurationSyncStateSummary
and Status
, broken down by zone and configuration object.
logging_configuration
Type: STRUCT
Provider name: LoggingConfiguration
log_destination_configs
Type: UNORDERED_LIST_STRUCT
Provider name: LogDestinationConfigs
Description: Defines the logging destinations for the logs for a firewall. Network Firewall generates logs for stateful rule groups.
log_destination
Type: MAP_STRING_STRING
Provider name: LogDestination
Description: The named location for the logs, provided in a key:value mapping that is specific to the chosen destination type.- For an Amazon S3 bucket, provide the name of the bucket, with key
bucketName
, and optionally provide a prefix, with key prefix
. The following example specifies an Amazon S3 bucket named DOC-EXAMPLE-BUCKET
and the prefix alerts
: “LogDestination”: { “bucketName”: “DOC-EXAMPLE-BUCKET”, “prefix”: “alerts” }
- For a CloudWatch log group, provide the name of the CloudWatch log group, with key
logGroup
. The following example specifies a log group named alert-log-group
: “LogDestination”: { “logGroup”: “alert-log-group” }
- For a Firehose delivery stream, provide the name of the delivery stream, with key
deliveryStream
. The following example specifies a delivery stream named alert-delivery-stream
: “LogDestination”: { “deliveryStream”: “alert-delivery-stream” }
log_destination_type
Type: STRING
Provider name: LogDestinationType
Description: The type of storage destination to send these logs to. You can send logs to an Amazon S3 bucket, a CloudWatch log group, or a Firehose delivery stream.
log_type
Type: STRING
Provider name: LogType
Description: The type of log to record. You can record the following types of logs from your Network Firewall stateful engine.ALERT
- Logs for traffic that matches your stateful rules and that have an action that sends an alert. A stateful rule sends alerts for the rule actions DROP, ALERT, and REJECT. For more information, see StatefulRule.FLOW
- Standard network traffic flow logs. The stateful rules engine records flow logs for all network traffic that it receives. Each flow log record captures the network flow for a specific standard stateless rule group.TLS
- Logs for events that are related to TLS inspection. For more information, see Inspecting SSL/TLS traffic with TLS inspection configurations in the Network Firewall Developer Guide.
subnet_change_protection
Type: BOOLEAN
Provider name: SubnetChangeProtection
Description: A setting indicating whether the firewall is protected against changes to the subnet associations. Use this setting to protect against accidentally modifying the subnet associations for a firewall that is in use. When you create a firewall, the operation initializes this setting to TRUE
.
subnet_mappings
Type: UNORDERED_LIST_STRUCT
Provider name: SubnetMappings
Description: The public subnets that Network Firewall is using for the firewall. Each subnet must belong to a different Availability Zone.
ip_address_type
Type: STRING
Provider name: IPAddressType
Description: The subnet’s IP address type. You can’t change the IP address type after you create the subnet.
subnet_id
Type: STRING
Provider name: SubnetId
Description: The unique identifier for the subnet.
Type: UNORDERED_LIST_STRING
update_token
Type: STRING
Provider name: UpdateToken
Description: A token used for optimistic locking. Network Firewall returns a token to your requests that access the firewall policy. The token marks the state of the policy resource at the time of the request. To make changes to the policy, you provide the token in your request. Network Firewall uses the token to ensure that the policy hasn’t changed since you last retrieved it. If it has changed, the operation fails with an InvalidTokenException
. If this happens, retrieve the firewall policy again to get a current copy of it with current token. Reapply your changes as needed, then try the operation again using the new token.
vpc_id
Type: STRING
Provider name: VpcId
Description: The unique identifier of the VPC where the firewall is in use.