|
226 | 226 | {"shape":"ResourceNotFoundException"}, |
227 | 227 | {"shape":"ThrottlingException"} |
228 | 228 | ], |
229 | | - "documentation":"<p>Deletes a transit gateway attachment from a Network Firewall. Either the firewall owner or the transit gateway owner can delete the attachment.</p> <important> <p>After you delete a transit gateway attachment, raffic will no longer flow through the firewall endpoints.</p> </important> <p>After you initiate the delete operation, use <a>DescribeFirewall</a> to monitor the deletion status.</p>" |
| 229 | + "documentation":"<p>Deletes a transit gateway attachment from a Network Firewall. Either the firewall owner or the transit gateway owner can delete the attachment.</p> <important> <p>After you delete a transit gateway attachment, traffic will no longer flow through the firewall endpoints.</p> </important> <p>After you initiate the delete operation, use <a>DescribeFirewall</a> to monitor the deletion status.</p>" |
230 | 230 | }, |
231 | 231 | "DeleteResourcePolicy":{ |
232 | 232 | "name":"DeleteResourcePolicy", |
|
695 | 695 | {"shape":"ResourceNotFoundException"}, |
696 | 696 | {"shape":"ThrottlingException"} |
697 | 697 | ], |
698 | | - "documentation":"<p>Rejects a transit gateway attachment request for Network Firewall. When you reject the attachment request, Network Firewall cancels the creation of routing components between the transit gateway and firewall endpoints.</p> <p>Only the firewall owner can reject the attachment. After rejection, no traffic will flow through the firewall endpoints for this attachment.</p> <p>Use <a>DescribeFirewall</a> to monitor the rejection status. To accept the attachment instead of rejecting it, use <a>AcceptNetworkFirewallTransitGatewayAttachment</a>.</p> <note> <p>Once rejected, you cannot reverse this action. To establish connectivity, you must create a new transit gateway-attached firewall.</p> </note>" |
| 698 | + "documentation":"<p>Rejects a transit gateway attachment request for Network Firewall. When you reject the attachment request, Network Firewall cancels the creation of routing components between the transit gateway and firewall endpoints.</p> <p>Only the transit gateway owner can reject the attachment. After rejection, no traffic will flow through the firewall endpoints for this attachment.</p> <p>Use <a>DescribeFirewall</a> to monitor the rejection status. To accept the attachment instead of rejecting it, use <a>AcceptNetworkFirewallTransitGatewayAttachment</a>.</p> <note> <p>Once rejected, you cannot reverse this action. To establish connectivity, you must create a new transit gateway-attached firewall.</p> </note>" |
699 | 699 | }, |
700 | 700 | "StartAnalysisReport":{ |
701 | 701 | "name":"StartAnalysisReport", |
|
1522 | 1522 | }, |
1523 | 1523 | "AvailabilityZoneMappings":{ |
1524 | 1524 | "shape":"AvailabilityZoneMappings", |
1525 | | - "documentation":"<p>Required. The Availability Zones where you want to create firewall endpoints for a transit gateway-attached firewall. You must specify at least one Availability Zone. Consider enabling the firewall in every Availability Zone where you have workloads to maintain Availability Zone independence.</p> <p>You can modify Availability Zones later using <a>AssociateAvailabilityZones</a> or <a>DisassociateAvailabilityZones</a>, but this may briefly disrupt traffic. The <code>AvailabilityZoneChangeProtection</code> setting controls whether you can make these modifications.</p>" |
| 1525 | + "documentation":"<p>Required. The Availability Zones where you want to create firewall endpoints for a transit gateway-attached firewall. You must specify at least one Availability Zone. Consider enabling the firewall in every Availability Zone where you have workloads to maintain Availability Zone isolation.</p> <p>You can modify Availability Zones later using <a>AssociateAvailabilityZones</a> or <a>DisassociateAvailabilityZones</a>, but this may briefly disrupt traffic. The <code>AvailabilityZoneChangeProtection</code> setting controls whether you can make these modifications.</p>" |
1526 | 1526 | }, |
1527 | 1527 | "AvailabilityZoneChangeProtection":{ |
1528 | 1528 | "shape":"Boolean", |
|
2410 | 2410 | }, |
2411 | 2411 | "Domain":{"type":"string"}, |
2412 | 2412 | "EnableMonitoringDashboard":{"type":"boolean"}, |
| 2413 | + "EnableTLSSessionHolding":{"type":"boolean"}, |
2413 | 2414 | "EnabledAnalysisType":{ |
2414 | 2415 | "type":"string", |
2415 | 2416 | "enum":[ |
|
2594 | 2595 | "PolicyVariables":{ |
2595 | 2596 | "shape":"PolicyVariables", |
2596 | 2597 | "documentation":"<p>Contains variables that you can use to override default Suricata settings in your firewall policy.</p>" |
| 2598 | + }, |
| 2599 | + "EnableTLSSessionHolding":{ |
| 2600 | + "shape":"EnableTLSSessionHolding", |
| 2601 | + "documentation":"<p>When true, prevents TCP and TLS packets from reaching destination servers until TLS Inspection has evaluated Server Name Indication (SNI) rules. Requires an associated TLS Inspection configuration.</p>" |
2597 | 2602 | } |
2598 | 2603 | }, |
2599 | 2604 | "documentation":"<p>The firewall policy defines the behavior of a firewall using a collection of stateless and stateful rule groups and other settings. You can use one firewall policy for multiple firewalls. </p> <p>This, along with <a>FirewallPolicyResponse</a>, define the policy. You can retrieve all objects for a firewall policy by calling <a>DescribeFirewallPolicy</a>.</p>" |
|
0 commit comments