File: doc.go

package info (click to toggle)
golang-github-aws-aws-sdk-go-v2 1.24.1-2~bpo12%2B1
  • links: PTS, VCS
  • area: main
  • in suites: bookworm-backports
  • size: 554,032 kB
  • sloc: java: 15,941; makefile: 419; sh: 175
file content (60 lines) | stat: -rw-r--r-- 3,849 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
// Code generated by smithy-go-codegen DO NOT EDIT.

// Package networkfirewall provides the API client, operations, and parameter
// types for AWS Network Firewall.
//
// This is the API Reference for Network Firewall. This guide is for developers
// who need detailed information about the Network Firewall API actions, data
// types, and errors.
//   - The REST API requires you to handle connection details, such as calculating
//     signatures, handling request retries, and error handling. For general
//     information about using the Amazon Web Services REST APIs, see Amazon Web
//     Services APIs (https://docs.aws.amazon.com/general/latest/gr/aws-apis.html) .
//     To access Network Firewall using the REST API endpoint:
//     https://network-firewall..amazonaws.com
//   - Alternatively, you can use one of the Amazon Web Services SDKs to access an
//     API that's tailored to the programming language or platform that you're using.
//     For more information, see Amazon Web Services SDKs (http://aws.amazon.com/tools/#SDKs)
//     .
//   - For descriptions of Network Firewall features, including and step-by-step
//     instructions on how to use them through the Network Firewall console, see the
//     Network Firewall Developer Guide (https://docs.aws.amazon.com/network-firewall/latest/developerguide/)
//     .
//
// Network Firewall is a stateful, managed, network firewall and intrusion
// detection and prevention service for Amazon Virtual Private Cloud (Amazon VPC).
// With Network Firewall, you can filter traffic at the perimeter of your VPC. This
// includes filtering traffic going to and coming from an internet gateway, NAT
// gateway, or over VPN or Direct Connect. Network Firewall uses rules that are
// compatible with Suricata, a free, open source network analysis and threat
// detection engine. Network Firewall supports Suricata version 6.0.9. For
// information about Suricata, see the Suricata website (https://suricata.io/) .
// You can use Network Firewall to monitor and protect your VPC traffic in a number
// of ways. The following are just a few examples:
//   - Allow domains or IP addresses for known Amazon Web Services service
//     endpoints, such as Amazon S3, and block all other forms of traffic.
//   - Use custom lists of known bad domains to limit the types of domain names
//     that your applications can access.
//   - Perform deep packet inspection on traffic entering or leaving your VPC.
//   - Use stateful protocol detection to filter protocols like HTTPS, regardless
//     of the port used.
//
// To enable Network Firewall for your VPCs, you perform steps in both Amazon VPC
// and in Network Firewall. For information about using Amazon VPC, see Amazon VPC
// User Guide (https://docs.aws.amazon.com/vpc/latest/userguide/) . To start using
// Network Firewall, do the following:
//   - (Optional) If you don't already have a VPC that you want to protect, create
//     it in Amazon VPC.
//   - In Amazon VPC, in each Availability Zone where you want to have a firewall
//     endpoint, create a subnet for the sole use of Network Firewall.
//   - In Network Firewall, create stateless and stateful rule groups, to define
//     the components of the network traffic filtering behavior that you want your
//     firewall to have.
//   - In Network Firewall, create a firewall policy that uses your rule groups
//     and specifies additional default traffic filtering behavior.
//   - In Network Firewall, create a firewall and specify your new firewall policy
//     and VPC subnets. Network Firewall creates a firewall endpoint in each subnet
//     that you specify, with the behavior that's defined in the firewall policy.
//   - In Amazon VPC, use ingress routing enhancements to route traffic through
//     the new firewall endpoints.
package networkfirewall