routeros.ToolSniffer
Explore with Pulumi AI
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as routeros from "@pulumi/routeros";
const test = new routeros.ToolSniffer("test", {
enabled: true,
filterDirection: "rx",
filterInterfaces: ["ether2"],
filterOperatorBetweenEntries: "and",
filterStream: true,
streamingEnabled: true,
streamingServer: "192.168.88.5:37008",
});
import pulumi
import pulumi_routeros as routeros
test = routeros.ToolSniffer("test",
enabled=True,
filter_direction="rx",
filter_interfaces=["ether2"],
filter_operator_between_entries="and",
filter_stream=True,
streaming_enabled=True,
streaming_server="192.168.88.5:37008")
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/routeros/routeros"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := routeros.NewToolSniffer(ctx, "test", &routeros.ToolSnifferArgs{
Enabled: pulumi.Bool(true),
FilterDirection: pulumi.String("rx"),
FilterInterfaces: pulumi.StringArray{
pulumi.String("ether2"),
},
FilterOperatorBetweenEntries: pulumi.String("and"),
FilterStream: pulumi.Bool(true),
StreamingEnabled: pulumi.Bool(true),
StreamingServer: pulumi.String("192.168.88.5:37008"),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Routeros = Pulumi.Routeros;
return await Deployment.RunAsync(() =>
{
var test = new Routeros.ToolSniffer("test", new()
{
Enabled = true,
FilterDirection = "rx",
FilterInterfaces = new[]
{
"ether2",
},
FilterOperatorBetweenEntries = "and",
FilterStream = true,
StreamingEnabled = true,
StreamingServer = "192.168.88.5:37008",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.routeros.ToolSniffer;
import com.pulumi.routeros.ToolSnifferArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var test = new ToolSniffer("test", ToolSnifferArgs.builder()
.enabled(true)
.filterDirection("rx")
.filterInterfaces("ether2")
.filterOperatorBetweenEntries("and")
.filterStream(true)
.streamingEnabled(true)
.streamingServer("192.168.88.5:37008")
.build());
}
}
resources:
test:
type: routeros:ToolSniffer
properties:
enabled: true
filterDirection: rx
filterInterfaces:
- ether2
filterOperatorBetweenEntries: and
filterStream: true
streamingEnabled: true
streamingServer: 192.168.88.5:37008
Create ToolSniffer Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new ToolSniffer(name: string, args?: ToolSnifferArgs, opts?: CustomResourceOptions);
@overload
def ToolSniffer(resource_name: str,
args: Optional[ToolSnifferArgs] = None,
opts: Optional[ResourceOptions] = None)
@overload
def ToolSniffer(resource_name: str,
opts: Optional[ResourceOptions] = None,
___id_: Optional[float] = None,
___path_: Optional[str] = None,
___skip_: Optional[str] = None,
enabled: Optional[bool] = None,
file_limit: Optional[float] = None,
file_name: Optional[str] = None,
filter_cpu: Optional[str] = None,
filter_direction: Optional[str] = None,
filter_dst_ip_addresses: Optional[Sequence[str]] = None,
filter_dst_ipv6_addresses: Optional[Sequence[str]] = None,
filter_dst_mac_addresses: Optional[Sequence[str]] = None,
filter_dst_ports: Optional[Sequence[str]] = None,
filter_interfaces: Optional[Sequence[str]] = None,
filter_ip_addresses: Optional[Sequence[str]] = None,
filter_ip_protocols: Optional[Sequence[str]] = None,
filter_ipv6_addresses: Optional[Sequence[str]] = None,
filter_mac_addresses: Optional[Sequence[str]] = None,
filter_mac_protocols: Optional[Sequence[str]] = None,
filter_operator_between_entries: Optional[str] = None,
filter_ports: Optional[Sequence[str]] = None,
filter_size: Optional[str] = None,
filter_src_ip_addresses: Optional[Sequence[str]] = None,
filter_src_ipv6_addresses: Optional[Sequence[str]] = None,
filter_src_mac_addresses: Optional[Sequence[str]] = None,
filter_src_ports: Optional[Sequence[str]] = None,
filter_stream: Optional[bool] = None,
filter_vlans: Optional[Sequence[float]] = None,
memory_limit: Optional[float] = None,
memory_scroll: Optional[bool] = None,
only_headers: Optional[bool] = None,
streaming_enabled: Optional[bool] = None,
streaming_server: Optional[str] = None,
tool_sniffer_id: Optional[str] = None)
func NewToolSniffer(ctx *Context, name string, args *ToolSnifferArgs, opts ...ResourceOption) (*ToolSniffer, error)
public ToolSniffer(string name, ToolSnifferArgs? args = null, CustomResourceOptions? opts = null)
public ToolSniffer(String name, ToolSnifferArgs args)
public ToolSniffer(String name, ToolSnifferArgs args, CustomResourceOptions options)
type: routeros:ToolSniffer
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args ToolSnifferArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args ToolSnifferArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args ToolSnifferArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args ToolSnifferArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args ToolSnifferArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
ToolSniffer Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The ToolSniffer resource accepts the following input properties:
- Enabled bool
- Start packet capture.
- File
Limit double - File size limit. Sniffer will stop when a limit is reached.
- File
Name string - Name of the file where sniffed packets will be saved.
- Filter
Cpu string - CPU core used as a filter.
- Filter
Direction string - Specifies which direction filtering will be applied.
- Filter
Dst List<string>Ip Addresses - Up to 16 IP destination addresses used as a filter.
- Filter
Dst List<string>Ipv6Addresses - Up to 16 IPv6 destination addresses used as a filter.
- Filter
Dst List<string>Mac Addresses - Up to 16 MAC destination addresses and MAC address masks used as a filter.
- Filter
Dst List<string>Ports - Up to 16 comma-separated destination ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- Filter
Interfaces List<string> - Interface name on which sniffer will be running. all indicates that the sniffer will sniff packets on all interfaces.
- Filter
Ip List<string>Addresses - Up to 16 IP addresses used as a filter.
- Filter
Ip List<string>Protocols - Up to 16 comma-separated IP/IPv6 protocols used as a filter. IP protocols (instead of protocol names, protocol numbers
can be used): * ipsec-ah - IPsec AH protocol * ipsec-esp - IPsec ESP protocol * ddp - datagram delivery protocol * egp -
exterior gateway protocol * ggp - gateway-gateway protocol * gre - general routing encapsulation * hmp - host monitoring
protocol * idpr-cmtp - idpr control message transport * icmp - internet control message protocol * icmpv6 - internet
control message protocol v6 * igmp - internet group management protocol * ipencap - ip encapsulated in ip * ipip - ip
encapsulation * encap - ip encapsulation * iso-tp4 - iso transport protocol class 4 * ospf - open shortest path first *
pup - parc universal packet protocol * pim - protocol independent multicast * rspf - radio shortest path first * rdp -
reliable datagram protocol * st - st datagram mode * tcp - transmission control protocol * udp - user datagram protocol
- vmtp versatile message transport * vrrp - virtual router redundancy protocol * xns-idp - xerox xns idp * xtp - xpress transfer protocol
- Filter
Ipv6Addresses List<string> - Up to 16 IPv6 addresses used as a filter.
- Filter
Mac List<string>Addresses - Up to 16 MAC addresses and MAC address masks used as a filter.
- Filter
Mac List<string>Protocols - Up to 16 comma separated entries used as a filter. Mac protocols (instead of protocol names, protocol number can be
used): * 802.2 - 802.2 Frames (0x0004) * arp - Address Resolution Protocol (0x0806) * homeplug-av - HomePlug AV MME
(0x88E1) * ip - Internet Protocol version 4 (0x0800) * ipv6 - Internet Protocol Version 6 (0x86DD) * ipx - Internetwork
Packet Exchange (0x8137) * lldp - Link Layer Discovery Protocol (0x88CC) * loop-protect - Loop Protect Protocol (0x9003)
- mpls-multicast - MPLS multicast (0x8848) * mpls-unicast - MPLS unicast (0x8847) * packing-compr - Encapsulated packets with compressed IP packing (0x9001) * packing-simple - Encapsulated packets with simple IP packing (0x9000) * pppoe - PPPoE Session Stage (0x8864) * pppoe-discovery - PPPoE Discovery Stage (0x8863) * rarp - Reverse Address Resolution Protocol (0x8035) * service-vlan - Provider Bridging (IEEE 802.1ad) & Shortest Path Bridging IEEE 802.1aq (0x88A8) * vlan - VLAN-tagged frame (IEEE 802.1Q) and Shortest Path Bridging IEEE 802.1aq with NNI compatibility (0x8100)
- Filter
Operator stringBetween Entries - Changes the logic for filters with multiple entries.
- Filter
Ports List<string> - Up to 16 comma-separated ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- Filter
Size string - Filters packets of specified size or size range in bytes.
- Filter
Src List<string>Ip Addresses - Up to 16 IP source addresses used as a filter.
- Filter
Src List<string>Ipv6Addresses - Up to 16 IPv6 source addresses used as a filter.
- Filter
Src List<string>Mac Addresses - Up to 16 MAC source addresses and MAC address masks used as a filter.
- Filter
Src List<string>Ports - Up to 16 comma-separated source ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- Filter
Stream bool - Sniffed packets that are devised for the sniffer server are ignored.
- Filter
Vlans List<double> - Up to 16 VLAN IDs used as a filter.
- Memory
Limit double - Memory amount used to store sniffed data.
- Memory
Scroll bool - Whether to rewrite older sniffed data when the memory limit is reached.
- Only
Headers bool - Save in the memory only the packet's headers, not the whole packet.
- Streaming
Enabled bool - Defines whether to send sniffed packets to the streaming server.
- Streaming
Server string - Tazmen Sniffer Protocol (TZSP) stream receiver.
- Tool
Sniffer stringId - ___
id_ double - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ string - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- ___
skip_ string - A set of transformations for field names. This is an internal service field, setting a value is not required.
- Enabled bool
- Start packet capture.
- File
Limit float64 - File size limit. Sniffer will stop when a limit is reached.
- File
Name string - Name of the file where sniffed packets will be saved.
- Filter
Cpu string - CPU core used as a filter.
- Filter
Direction string - Specifies which direction filtering will be applied.
- Filter
Dst []stringIp Addresses - Up to 16 IP destination addresses used as a filter.
- Filter
Dst []stringIpv6Addresses - Up to 16 IPv6 destination addresses used as a filter.
- Filter
Dst []stringMac Addresses - Up to 16 MAC destination addresses and MAC address masks used as a filter.
- Filter
Dst []stringPorts - Up to 16 comma-separated destination ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- Filter
Interfaces []string - Interface name on which sniffer will be running. all indicates that the sniffer will sniff packets on all interfaces.
- Filter
Ip []stringAddresses - Up to 16 IP addresses used as a filter.
- Filter
Ip []stringProtocols - Up to 16 comma-separated IP/IPv6 protocols used as a filter. IP protocols (instead of protocol names, protocol numbers
can be used): * ipsec-ah - IPsec AH protocol * ipsec-esp - IPsec ESP protocol * ddp - datagram delivery protocol * egp -
exterior gateway protocol * ggp - gateway-gateway protocol * gre - general routing encapsulation * hmp - host monitoring
protocol * idpr-cmtp - idpr control message transport * icmp - internet control message protocol * icmpv6 - internet
control message protocol v6 * igmp - internet group management protocol * ipencap - ip encapsulated in ip * ipip - ip
encapsulation * encap - ip encapsulation * iso-tp4 - iso transport protocol class 4 * ospf - open shortest path first *
pup - parc universal packet protocol * pim - protocol independent multicast * rspf - radio shortest path first * rdp -
reliable datagram protocol * st - st datagram mode * tcp - transmission control protocol * udp - user datagram protocol
- vmtp versatile message transport * vrrp - virtual router redundancy protocol * xns-idp - xerox xns idp * xtp - xpress transfer protocol
- Filter
Ipv6Addresses []string - Up to 16 IPv6 addresses used as a filter.
- Filter
Mac []stringAddresses - Up to 16 MAC addresses and MAC address masks used as a filter.
- Filter
Mac []stringProtocols - Up to 16 comma separated entries used as a filter. Mac protocols (instead of protocol names, protocol number can be
used): * 802.2 - 802.2 Frames (0x0004) * arp - Address Resolution Protocol (0x0806) * homeplug-av - HomePlug AV MME
(0x88E1) * ip - Internet Protocol version 4 (0x0800) * ipv6 - Internet Protocol Version 6 (0x86DD) * ipx - Internetwork
Packet Exchange (0x8137) * lldp - Link Layer Discovery Protocol (0x88CC) * loop-protect - Loop Protect Protocol (0x9003)
- mpls-multicast - MPLS multicast (0x8848) * mpls-unicast - MPLS unicast (0x8847) * packing-compr - Encapsulated packets with compressed IP packing (0x9001) * packing-simple - Encapsulated packets with simple IP packing (0x9000) * pppoe - PPPoE Session Stage (0x8864) * pppoe-discovery - PPPoE Discovery Stage (0x8863) * rarp - Reverse Address Resolution Protocol (0x8035) * service-vlan - Provider Bridging (IEEE 802.1ad) & Shortest Path Bridging IEEE 802.1aq (0x88A8) * vlan - VLAN-tagged frame (IEEE 802.1Q) and Shortest Path Bridging IEEE 802.1aq with NNI compatibility (0x8100)
- Filter
Operator stringBetween Entries - Changes the logic for filters with multiple entries.
- Filter
Ports []string - Up to 16 comma-separated ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- Filter
Size string - Filters packets of specified size or size range in bytes.
- Filter
Src []stringIp Addresses - Up to 16 IP source addresses used as a filter.
- Filter
Src []stringIpv6Addresses - Up to 16 IPv6 source addresses used as a filter.
- Filter
Src []stringMac Addresses - Up to 16 MAC source addresses and MAC address masks used as a filter.
- Filter
Src []stringPorts - Up to 16 comma-separated source ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- Filter
Stream bool - Sniffed packets that are devised for the sniffer server are ignored.
- Filter
Vlans []float64 - Up to 16 VLAN IDs used as a filter.
- Memory
Limit float64 - Memory amount used to store sniffed data.
- Memory
Scroll bool - Whether to rewrite older sniffed data when the memory limit is reached.
- Only
Headers bool - Save in the memory only the packet's headers, not the whole packet.
- Streaming
Enabled bool - Defines whether to send sniffed packets to the streaming server.
- Streaming
Server string - Tazmen Sniffer Protocol (TZSP) stream receiver.
- Tool
Sniffer stringId - ___
id_ float64 - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ string - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- ___
skip_ string - A set of transformations for field names. This is an internal service field, setting a value is not required.
- ___
id_ Double - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ String - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- ___
skip_ String - A set of transformations for field names. This is an internal service field, setting a value is not required.
- enabled Boolean
- Start packet capture.
- file
Limit Double - File size limit. Sniffer will stop when a limit is reached.
- file
Name String - Name of the file where sniffed packets will be saved.
- filter
Cpu String - CPU core used as a filter.
- filter
Direction String - Specifies which direction filtering will be applied.
- filter
Dst List<String>Ip Addresses - Up to 16 IP destination addresses used as a filter.
- filter
Dst List<String>Ipv6Addresses - Up to 16 IPv6 destination addresses used as a filter.
- filter
Dst List<String>Mac Addresses - Up to 16 MAC destination addresses and MAC address masks used as a filter.
- filter
Dst List<String>Ports - Up to 16 comma-separated destination ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- filter
Interfaces List<String> - Interface name on which sniffer will be running. all indicates that the sniffer will sniff packets on all interfaces.
- filter
Ip List<String>Addresses - Up to 16 IP addresses used as a filter.
- filter
Ip List<String>Protocols - Up to 16 comma-separated IP/IPv6 protocols used as a filter. IP protocols (instead of protocol names, protocol numbers
can be used): * ipsec-ah - IPsec AH protocol * ipsec-esp - IPsec ESP protocol * ddp - datagram delivery protocol * egp -
exterior gateway protocol * ggp - gateway-gateway protocol * gre - general routing encapsulation * hmp - host monitoring
protocol * idpr-cmtp - idpr control message transport * icmp - internet control message protocol * icmpv6 - internet
control message protocol v6 * igmp - internet group management protocol * ipencap - ip encapsulated in ip * ipip - ip
encapsulation * encap - ip encapsulation * iso-tp4 - iso transport protocol class 4 * ospf - open shortest path first *
pup - parc universal packet protocol * pim - protocol independent multicast * rspf - radio shortest path first * rdp -
reliable datagram protocol * st - st datagram mode * tcp - transmission control protocol * udp - user datagram protocol
- vmtp versatile message transport * vrrp - virtual router redundancy protocol * xns-idp - xerox xns idp * xtp - xpress transfer protocol
- filter
Ipv6Addresses List<String> - Up to 16 IPv6 addresses used as a filter.
- filter
Mac List<String>Addresses - Up to 16 MAC addresses and MAC address masks used as a filter.
- filter
Mac List<String>Protocols - Up to 16 comma separated entries used as a filter. Mac protocols (instead of protocol names, protocol number can be
used): * 802.2 - 802.2 Frames (0x0004) * arp - Address Resolution Protocol (0x0806) * homeplug-av - HomePlug AV MME
(0x88E1) * ip - Internet Protocol version 4 (0x0800) * ipv6 - Internet Protocol Version 6 (0x86DD) * ipx - Internetwork
Packet Exchange (0x8137) * lldp - Link Layer Discovery Protocol (0x88CC) * loop-protect - Loop Protect Protocol (0x9003)
- mpls-multicast - MPLS multicast (0x8848) * mpls-unicast - MPLS unicast (0x8847) * packing-compr - Encapsulated packets with compressed IP packing (0x9001) * packing-simple - Encapsulated packets with simple IP packing (0x9000) * pppoe - PPPoE Session Stage (0x8864) * pppoe-discovery - PPPoE Discovery Stage (0x8863) * rarp - Reverse Address Resolution Protocol (0x8035) * service-vlan - Provider Bridging (IEEE 802.1ad) & Shortest Path Bridging IEEE 802.1aq (0x88A8) * vlan - VLAN-tagged frame (IEEE 802.1Q) and Shortest Path Bridging IEEE 802.1aq with NNI compatibility (0x8100)
- filter
Operator StringBetween Entries - Changes the logic for filters with multiple entries.
- filter
Ports List<String> - Up to 16 comma-separated ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- filter
Size String - Filters packets of specified size or size range in bytes.
- filter
Src List<String>Ip Addresses - Up to 16 IP source addresses used as a filter.
- filter
Src List<String>Ipv6Addresses - Up to 16 IPv6 source addresses used as a filter.
- filter
Src List<String>Mac Addresses - Up to 16 MAC source addresses and MAC address masks used as a filter.
- filter
Src List<String>Ports - Up to 16 comma-separated source ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- filter
Stream Boolean - Sniffed packets that are devised for the sniffer server are ignored.
- filter
Vlans List<Double> - Up to 16 VLAN IDs used as a filter.
- memory
Limit Double - Memory amount used to store sniffed data.
- memory
Scroll Boolean - Whether to rewrite older sniffed data when the memory limit is reached.
- only
Headers Boolean - Save in the memory only the packet's headers, not the whole packet.
- streaming
Enabled Boolean - Defines whether to send sniffed packets to the streaming server.
- streaming
Server String - Tazmen Sniffer Protocol (TZSP) stream receiver.
- tool
Sniffer StringId
- ___
id_ number - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ string - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- ___
skip_ string - A set of transformations for field names. This is an internal service field, setting a value is not required.
- enabled boolean
- Start packet capture.
- file
Limit number - File size limit. Sniffer will stop when a limit is reached.
- file
Name string - Name of the file where sniffed packets will be saved.
- filter
Cpu string - CPU core used as a filter.
- filter
Direction string - Specifies which direction filtering will be applied.
- filter
Dst string[]Ip Addresses - Up to 16 IP destination addresses used as a filter.
- filter
Dst string[]Ipv6Addresses - Up to 16 IPv6 destination addresses used as a filter.
- filter
Dst string[]Mac Addresses - Up to 16 MAC destination addresses and MAC address masks used as a filter.
- filter
Dst string[]Ports - Up to 16 comma-separated destination ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- filter
Interfaces string[] - Interface name on which sniffer will be running. all indicates that the sniffer will sniff packets on all interfaces.
- filter
Ip string[]Addresses - Up to 16 IP addresses used as a filter.
- filter
Ip string[]Protocols - Up to 16 comma-separated IP/IPv6 protocols used as a filter. IP protocols (instead of protocol names, protocol numbers
can be used): * ipsec-ah - IPsec AH protocol * ipsec-esp - IPsec ESP protocol * ddp - datagram delivery protocol * egp -
exterior gateway protocol * ggp - gateway-gateway protocol * gre - general routing encapsulation * hmp - host monitoring
protocol * idpr-cmtp - idpr control message transport * icmp - internet control message protocol * icmpv6 - internet
control message protocol v6 * igmp - internet group management protocol * ipencap - ip encapsulated in ip * ipip - ip
encapsulation * encap - ip encapsulation * iso-tp4 - iso transport protocol class 4 * ospf - open shortest path first *
pup - parc universal packet protocol * pim - protocol independent multicast * rspf - radio shortest path first * rdp -
reliable datagram protocol * st - st datagram mode * tcp - transmission control protocol * udp - user datagram protocol
- vmtp versatile message transport * vrrp - virtual router redundancy protocol * xns-idp - xerox xns idp * xtp - xpress transfer protocol
- filter
Ipv6Addresses string[] - Up to 16 IPv6 addresses used as a filter.
- filter
Mac string[]Addresses - Up to 16 MAC addresses and MAC address masks used as a filter.
- filter
Mac string[]Protocols - Up to 16 comma separated entries used as a filter. Mac protocols (instead of protocol names, protocol number can be
used): * 802.2 - 802.2 Frames (0x0004) * arp - Address Resolution Protocol (0x0806) * homeplug-av - HomePlug AV MME
(0x88E1) * ip - Internet Protocol version 4 (0x0800) * ipv6 - Internet Protocol Version 6 (0x86DD) * ipx - Internetwork
Packet Exchange (0x8137) * lldp - Link Layer Discovery Protocol (0x88CC) * loop-protect - Loop Protect Protocol (0x9003)
- mpls-multicast - MPLS multicast (0x8848) * mpls-unicast - MPLS unicast (0x8847) * packing-compr - Encapsulated packets with compressed IP packing (0x9001) * packing-simple - Encapsulated packets with simple IP packing (0x9000) * pppoe - PPPoE Session Stage (0x8864) * pppoe-discovery - PPPoE Discovery Stage (0x8863) * rarp - Reverse Address Resolution Protocol (0x8035) * service-vlan - Provider Bridging (IEEE 802.1ad) & Shortest Path Bridging IEEE 802.1aq (0x88A8) * vlan - VLAN-tagged frame (IEEE 802.1Q) and Shortest Path Bridging IEEE 802.1aq with NNI compatibility (0x8100)
- filter
Operator stringBetween Entries - Changes the logic for filters with multiple entries.
- filter
Ports string[] - Up to 16 comma-separated ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- filter
Size string - Filters packets of specified size or size range in bytes.
- filter
Src string[]Ip Addresses - Up to 16 IP source addresses used as a filter.
- filter
Src string[]Ipv6Addresses - Up to 16 IPv6 source addresses used as a filter.
- filter
Src string[]Mac Addresses - Up to 16 MAC source addresses and MAC address masks used as a filter.
- filter
Src string[]Ports - Up to 16 comma-separated source ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- filter
Stream boolean - Sniffed packets that are devised for the sniffer server are ignored.
- filter
Vlans number[] - Up to 16 VLAN IDs used as a filter.
- memory
Limit number - Memory amount used to store sniffed data.
- memory
Scroll boolean - Whether to rewrite older sniffed data when the memory limit is reached.
- only
Headers boolean - Save in the memory only the packet's headers, not the whole packet.
- streaming
Enabled boolean - Defines whether to send sniffed packets to the streaming server.
- streaming
Server string - Tazmen Sniffer Protocol (TZSP) stream receiver.
- tool
Sniffer stringId
- ___
id_ float - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ str - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- ___
skip_ str - A set of transformations for field names. This is an internal service field, setting a value is not required.
- enabled bool
- Start packet capture.
- file_
limit float - File size limit. Sniffer will stop when a limit is reached.
- file_
name str - Name of the file where sniffed packets will be saved.
- filter_
cpu str - CPU core used as a filter.
- filter_
direction str - Specifies which direction filtering will be applied.
- filter_
dst_ Sequence[str]ip_ addresses - Up to 16 IP destination addresses used as a filter.
- filter_
dst_ Sequence[str]ipv6_ addresses - Up to 16 IPv6 destination addresses used as a filter.
- filter_
dst_ Sequence[str]mac_ addresses - Up to 16 MAC destination addresses and MAC address masks used as a filter.
- filter_
dst_ Sequence[str]ports - Up to 16 comma-separated destination ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- filter_
interfaces Sequence[str] - Interface name on which sniffer will be running. all indicates that the sniffer will sniff packets on all interfaces.
- filter_
ip_ Sequence[str]addresses - Up to 16 IP addresses used as a filter.
- filter_
ip_ Sequence[str]protocols - Up to 16 comma-separated IP/IPv6 protocols used as a filter. IP protocols (instead of protocol names, protocol numbers
can be used): * ipsec-ah - IPsec AH protocol * ipsec-esp - IPsec ESP protocol * ddp - datagram delivery protocol * egp -
exterior gateway protocol * ggp - gateway-gateway protocol * gre - general routing encapsulation * hmp - host monitoring
protocol * idpr-cmtp - idpr control message transport * icmp - internet control message protocol * icmpv6 - internet
control message protocol v6 * igmp - internet group management protocol * ipencap - ip encapsulated in ip * ipip - ip
encapsulation * encap - ip encapsulation * iso-tp4 - iso transport protocol class 4 * ospf - open shortest path first *
pup - parc universal packet protocol * pim - protocol independent multicast * rspf - radio shortest path first * rdp -
reliable datagram protocol * st - st datagram mode * tcp - transmission control protocol * udp - user datagram protocol
- vmtp versatile message transport * vrrp - virtual router redundancy protocol * xns-idp - xerox xns idp * xtp - xpress transfer protocol
- filter_
ipv6_ Sequence[str]addresses - Up to 16 IPv6 addresses used as a filter.
- filter_
mac_ Sequence[str]addresses - Up to 16 MAC addresses and MAC address masks used as a filter.
- filter_
mac_ Sequence[str]protocols - Up to 16 comma separated entries used as a filter. Mac protocols (instead of protocol names, protocol number can be
used): * 802.2 - 802.2 Frames (0x0004) * arp - Address Resolution Protocol (0x0806) * homeplug-av - HomePlug AV MME
(0x88E1) * ip - Internet Protocol version 4 (0x0800) * ipv6 - Internet Protocol Version 6 (0x86DD) * ipx - Internetwork
Packet Exchange (0x8137) * lldp - Link Layer Discovery Protocol (0x88CC) * loop-protect - Loop Protect Protocol (0x9003)
- mpls-multicast - MPLS multicast (0x8848) * mpls-unicast - MPLS unicast (0x8847) * packing-compr - Encapsulated packets with compressed IP packing (0x9001) * packing-simple - Encapsulated packets with simple IP packing (0x9000) * pppoe - PPPoE Session Stage (0x8864) * pppoe-discovery - PPPoE Discovery Stage (0x8863) * rarp - Reverse Address Resolution Protocol (0x8035) * service-vlan - Provider Bridging (IEEE 802.1ad) & Shortest Path Bridging IEEE 802.1aq (0x88A8) * vlan - VLAN-tagged frame (IEEE 802.1Q) and Shortest Path Bridging IEEE 802.1aq with NNI compatibility (0x8100)
- filter_
operator_ strbetween_ entries - Changes the logic for filters with multiple entries.
- filter_
ports Sequence[str] - Up to 16 comma-separated ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- filter_
size str - Filters packets of specified size or size range in bytes.
- filter_
src_ Sequence[str]ip_ addresses - Up to 16 IP source addresses used as a filter.
- filter_
src_ Sequence[str]ipv6_ addresses - Up to 16 IPv6 source addresses used as a filter.
- filter_
src_ Sequence[str]mac_ addresses - Up to 16 MAC source addresses and MAC address masks used as a filter.
- filter_
src_ Sequence[str]ports - Up to 16 comma-separated source ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- filter_
stream bool - Sniffed packets that are devised for the sniffer server are ignored.
- filter_
vlans Sequence[float] - Up to 16 VLAN IDs used as a filter.
- memory_
limit float - Memory amount used to store sniffed data.
- memory_
scroll bool - Whether to rewrite older sniffed data when the memory limit is reached.
- only_
headers bool - Save in the memory only the packet's headers, not the whole packet.
- streaming_
enabled bool - Defines whether to send sniffed packets to the streaming server.
- streaming_
server str - Tazmen Sniffer Protocol (TZSP) stream receiver.
- tool_
sniffer_ strid
- ___
id_ Number - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ String - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- ___
skip_ String - A set of transformations for field names. This is an internal service field, setting a value is not required.
- enabled Boolean
- Start packet capture.
- file
Limit Number - File size limit. Sniffer will stop when a limit is reached.
- file
Name String - Name of the file where sniffed packets will be saved.
- filter
Cpu String - CPU core used as a filter.
- filter
Direction String - Specifies which direction filtering will be applied.
- filter
Dst List<String>Ip Addresses - Up to 16 IP destination addresses used as a filter.
- filter
Dst List<String>Ipv6Addresses - Up to 16 IPv6 destination addresses used as a filter.
- filter
Dst List<String>Mac Addresses - Up to 16 MAC destination addresses and MAC address masks used as a filter.
- filter
Dst List<String>Ports - Up to 16 comma-separated destination ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- filter
Interfaces List<String> - Interface name on which sniffer will be running. all indicates that the sniffer will sniff packets on all interfaces.
- filter
Ip List<String>Addresses - Up to 16 IP addresses used as a filter.
- filter
Ip List<String>Protocols - Up to 16 comma-separated IP/IPv6 protocols used as a filter. IP protocols (instead of protocol names, protocol numbers
can be used): * ipsec-ah - IPsec AH protocol * ipsec-esp - IPsec ESP protocol * ddp - datagram delivery protocol * egp -
exterior gateway protocol * ggp - gateway-gateway protocol * gre - general routing encapsulation * hmp - host monitoring
protocol * idpr-cmtp - idpr control message transport * icmp - internet control message protocol * icmpv6 - internet
control message protocol v6 * igmp - internet group management protocol * ipencap - ip encapsulated in ip * ipip - ip
encapsulation * encap - ip encapsulation * iso-tp4 - iso transport protocol class 4 * ospf - open shortest path first *
pup - parc universal packet protocol * pim - protocol independent multicast * rspf - radio shortest path first * rdp -
reliable datagram protocol * st - st datagram mode * tcp - transmission control protocol * udp - user datagram protocol
- vmtp versatile message transport * vrrp - virtual router redundancy protocol * xns-idp - xerox xns idp * xtp - xpress transfer protocol
- filter
Ipv6Addresses List<String> - Up to 16 IPv6 addresses used as a filter.
- filter
Mac List<String>Addresses - Up to 16 MAC addresses and MAC address masks used as a filter.
- filter
Mac List<String>Protocols - Up to 16 comma separated entries used as a filter. Mac protocols (instead of protocol names, protocol number can be
used): * 802.2 - 802.2 Frames (0x0004) * arp - Address Resolution Protocol (0x0806) * homeplug-av - HomePlug AV MME
(0x88E1) * ip - Internet Protocol version 4 (0x0800) * ipv6 - Internet Protocol Version 6 (0x86DD) * ipx - Internetwork
Packet Exchange (0x8137) * lldp - Link Layer Discovery Protocol (0x88CC) * loop-protect - Loop Protect Protocol (0x9003)
- mpls-multicast - MPLS multicast (0x8848) * mpls-unicast - MPLS unicast (0x8847) * packing-compr - Encapsulated packets with compressed IP packing (0x9001) * packing-simple - Encapsulated packets with simple IP packing (0x9000) * pppoe - PPPoE Session Stage (0x8864) * pppoe-discovery - PPPoE Discovery Stage (0x8863) * rarp - Reverse Address Resolution Protocol (0x8035) * service-vlan - Provider Bridging (IEEE 802.1ad) & Shortest Path Bridging IEEE 802.1aq (0x88A8) * vlan - VLAN-tagged frame (IEEE 802.1Q) and Shortest Path Bridging IEEE 802.1aq with NNI compatibility (0x8100)
- filter
Operator StringBetween Entries - Changes the logic for filters with multiple entries.
- filter
Ports List<String> - Up to 16 comma-separated ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- filter
Size String - Filters packets of specified size or size range in bytes.
- filter
Src List<String>Ip Addresses - Up to 16 IP source addresses used as a filter.
- filter
Src List<String>Ipv6Addresses - Up to 16 IPv6 source addresses used as a filter.
- filter
Src List<String>Mac Addresses - Up to 16 MAC source addresses and MAC address masks used as a filter.
- filter
Src List<String>Ports - Up to 16 comma-separated source ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- filter
Stream Boolean - Sniffed packets that are devised for the sniffer server are ignored.
- filter
Vlans List<Number> - Up to 16 VLAN IDs used as a filter.
- memory
Limit Number - Memory amount used to store sniffed data.
- memory
Scroll Boolean - Whether to rewrite older sniffed data when the memory limit is reached.
- only
Headers Boolean - Save in the memory only the packet's headers, not the whole packet.
- streaming
Enabled Boolean - Defines whether to send sniffed packets to the streaming server.
- streaming
Server String - Tazmen Sniffer Protocol (TZSP) stream receiver.
- tool
Sniffer StringId
Outputs
All input properties are implicitly available as output properties. Additionally, the ToolSniffer resource produces the following output properties:
Look up Existing ToolSniffer Resource
Get an existing ToolSniffer resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: ToolSnifferState, opts?: CustomResourceOptions): ToolSniffer
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
___id_: Optional[float] = None,
___path_: Optional[str] = None,
___skip_: Optional[str] = None,
enabled: Optional[bool] = None,
file_limit: Optional[float] = None,
file_name: Optional[str] = None,
filter_cpu: Optional[str] = None,
filter_direction: Optional[str] = None,
filter_dst_ip_addresses: Optional[Sequence[str]] = None,
filter_dst_ipv6_addresses: Optional[Sequence[str]] = None,
filter_dst_mac_addresses: Optional[Sequence[str]] = None,
filter_dst_ports: Optional[Sequence[str]] = None,
filter_interfaces: Optional[Sequence[str]] = None,
filter_ip_addresses: Optional[Sequence[str]] = None,
filter_ip_protocols: Optional[Sequence[str]] = None,
filter_ipv6_addresses: Optional[Sequence[str]] = None,
filter_mac_addresses: Optional[Sequence[str]] = None,
filter_mac_protocols: Optional[Sequence[str]] = None,
filter_operator_between_entries: Optional[str] = None,
filter_ports: Optional[Sequence[str]] = None,
filter_size: Optional[str] = None,
filter_src_ip_addresses: Optional[Sequence[str]] = None,
filter_src_ipv6_addresses: Optional[Sequence[str]] = None,
filter_src_mac_addresses: Optional[Sequence[str]] = None,
filter_src_ports: Optional[Sequence[str]] = None,
filter_stream: Optional[bool] = None,
filter_vlans: Optional[Sequence[float]] = None,
memory_limit: Optional[float] = None,
memory_scroll: Optional[bool] = None,
only_headers: Optional[bool] = None,
running: Optional[bool] = None,
streaming_enabled: Optional[bool] = None,
streaming_server: Optional[str] = None,
tool_sniffer_id: Optional[str] = None) -> ToolSniffer
func GetToolSniffer(ctx *Context, name string, id IDInput, state *ToolSnifferState, opts ...ResourceOption) (*ToolSniffer, error)
public static ToolSniffer Get(string name, Input<string> id, ToolSnifferState? state, CustomResourceOptions? opts = null)
public static ToolSniffer get(String name, Output<String> id, ToolSnifferState state, CustomResourceOptions options)
resources: _: type: routeros:ToolSniffer get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Enabled bool
- Start packet capture.
- File
Limit double - File size limit. Sniffer will stop when a limit is reached.
- File
Name string - Name of the file where sniffed packets will be saved.
- Filter
Cpu string - CPU core used as a filter.
- Filter
Direction string - Specifies which direction filtering will be applied.
- Filter
Dst List<string>Ip Addresses - Up to 16 IP destination addresses used as a filter.
- Filter
Dst List<string>Ipv6Addresses - Up to 16 IPv6 destination addresses used as a filter.
- Filter
Dst List<string>Mac Addresses - Up to 16 MAC destination addresses and MAC address masks used as a filter.
- Filter
Dst List<string>Ports - Up to 16 comma-separated destination ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- Filter
Interfaces List<string> - Interface name on which sniffer will be running. all indicates that the sniffer will sniff packets on all interfaces.
- Filter
Ip List<string>Addresses - Up to 16 IP addresses used as a filter.
- Filter
Ip List<string>Protocols - Up to 16 comma-separated IP/IPv6 protocols used as a filter. IP protocols (instead of protocol names, protocol numbers
can be used): * ipsec-ah - IPsec AH protocol * ipsec-esp - IPsec ESP protocol * ddp - datagram delivery protocol * egp -
exterior gateway protocol * ggp - gateway-gateway protocol * gre - general routing encapsulation * hmp - host monitoring
protocol * idpr-cmtp - idpr control message transport * icmp - internet control message protocol * icmpv6 - internet
control message protocol v6 * igmp - internet group management protocol * ipencap - ip encapsulated in ip * ipip - ip
encapsulation * encap - ip encapsulation * iso-tp4 - iso transport protocol class 4 * ospf - open shortest path first *
pup - parc universal packet protocol * pim - protocol independent multicast * rspf - radio shortest path first * rdp -
reliable datagram protocol * st - st datagram mode * tcp - transmission control protocol * udp - user datagram protocol
- vmtp versatile message transport * vrrp - virtual router redundancy protocol * xns-idp - xerox xns idp * xtp - xpress transfer protocol
- Filter
Ipv6Addresses List<string> - Up to 16 IPv6 addresses used as a filter.
- Filter
Mac List<string>Addresses - Up to 16 MAC addresses and MAC address masks used as a filter.
- Filter
Mac List<string>Protocols - Up to 16 comma separated entries used as a filter. Mac protocols (instead of protocol names, protocol number can be
used): * 802.2 - 802.2 Frames (0x0004) * arp - Address Resolution Protocol (0x0806) * homeplug-av - HomePlug AV MME
(0x88E1) * ip - Internet Protocol version 4 (0x0800) * ipv6 - Internet Protocol Version 6 (0x86DD) * ipx - Internetwork
Packet Exchange (0x8137) * lldp - Link Layer Discovery Protocol (0x88CC) * loop-protect - Loop Protect Protocol (0x9003)
- mpls-multicast - MPLS multicast (0x8848) * mpls-unicast - MPLS unicast (0x8847) * packing-compr - Encapsulated packets with compressed IP packing (0x9001) * packing-simple - Encapsulated packets with simple IP packing (0x9000) * pppoe - PPPoE Session Stage (0x8864) * pppoe-discovery - PPPoE Discovery Stage (0x8863) * rarp - Reverse Address Resolution Protocol (0x8035) * service-vlan - Provider Bridging (IEEE 802.1ad) & Shortest Path Bridging IEEE 802.1aq (0x88A8) * vlan - VLAN-tagged frame (IEEE 802.1Q) and Shortest Path Bridging IEEE 802.1aq with NNI compatibility (0x8100)
- Filter
Operator stringBetween Entries - Changes the logic for filters with multiple entries.
- Filter
Ports List<string> - Up to 16 comma-separated ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- Filter
Size string - Filters packets of specified size or size range in bytes.
- Filter
Src List<string>Ip Addresses - Up to 16 IP source addresses used as a filter.
- Filter
Src List<string>Ipv6Addresses - Up to 16 IPv6 source addresses used as a filter.
- Filter
Src List<string>Mac Addresses - Up to 16 MAC source addresses and MAC address masks used as a filter.
- Filter
Src List<string>Ports - Up to 16 comma-separated source ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- Filter
Stream bool - Sniffed packets that are devised for the sniffer server are ignored.
- Filter
Vlans List<double> - Up to 16 VLAN IDs used as a filter.
- Memory
Limit double - Memory amount used to store sniffed data.
- Memory
Scroll bool - Whether to rewrite older sniffed data when the memory limit is reached.
- Only
Headers bool - Save in the memory only the packet's headers, not the whole packet.
- Running bool
- Streaming
Enabled bool - Defines whether to send sniffed packets to the streaming server.
- Streaming
Server string - Tazmen Sniffer Protocol (TZSP) stream receiver.
- Tool
Sniffer stringId - ___
id_ double - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ string - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- ___
skip_ string - A set of transformations for field names. This is an internal service field, setting a value is not required.
- Enabled bool
- Start packet capture.
- File
Limit float64 - File size limit. Sniffer will stop when a limit is reached.
- File
Name string - Name of the file where sniffed packets will be saved.
- Filter
Cpu string - CPU core used as a filter.
- Filter
Direction string - Specifies which direction filtering will be applied.
- Filter
Dst []stringIp Addresses - Up to 16 IP destination addresses used as a filter.
- Filter
Dst []stringIpv6Addresses - Up to 16 IPv6 destination addresses used as a filter.
- Filter
Dst []stringMac Addresses - Up to 16 MAC destination addresses and MAC address masks used as a filter.
- Filter
Dst []stringPorts - Up to 16 comma-separated destination ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- Filter
Interfaces []string - Interface name on which sniffer will be running. all indicates that the sniffer will sniff packets on all interfaces.
- Filter
Ip []stringAddresses - Up to 16 IP addresses used as a filter.
- Filter
Ip []stringProtocols - Up to 16 comma-separated IP/IPv6 protocols used as a filter. IP protocols (instead of protocol names, protocol numbers
can be used): * ipsec-ah - IPsec AH protocol * ipsec-esp - IPsec ESP protocol * ddp - datagram delivery protocol * egp -
exterior gateway protocol * ggp - gateway-gateway protocol * gre - general routing encapsulation * hmp - host monitoring
protocol * idpr-cmtp - idpr control message transport * icmp - internet control message protocol * icmpv6 - internet
control message protocol v6 * igmp - internet group management protocol * ipencap - ip encapsulated in ip * ipip - ip
encapsulation * encap - ip encapsulation * iso-tp4 - iso transport protocol class 4 * ospf - open shortest path first *
pup - parc universal packet protocol * pim - protocol independent multicast * rspf - radio shortest path first * rdp -
reliable datagram protocol * st - st datagram mode * tcp - transmission control protocol * udp - user datagram protocol
- vmtp versatile message transport * vrrp - virtual router redundancy protocol * xns-idp - xerox xns idp * xtp - xpress transfer protocol
- Filter
Ipv6Addresses []string - Up to 16 IPv6 addresses used as a filter.
- Filter
Mac []stringAddresses - Up to 16 MAC addresses and MAC address masks used as a filter.
- Filter
Mac []stringProtocols - Up to 16 comma separated entries used as a filter. Mac protocols (instead of protocol names, protocol number can be
used): * 802.2 - 802.2 Frames (0x0004) * arp - Address Resolution Protocol (0x0806) * homeplug-av - HomePlug AV MME
(0x88E1) * ip - Internet Protocol version 4 (0x0800) * ipv6 - Internet Protocol Version 6 (0x86DD) * ipx - Internetwork
Packet Exchange (0x8137) * lldp - Link Layer Discovery Protocol (0x88CC) * loop-protect - Loop Protect Protocol (0x9003)
- mpls-multicast - MPLS multicast (0x8848) * mpls-unicast - MPLS unicast (0x8847) * packing-compr - Encapsulated packets with compressed IP packing (0x9001) * packing-simple - Encapsulated packets with simple IP packing (0x9000) * pppoe - PPPoE Session Stage (0x8864) * pppoe-discovery - PPPoE Discovery Stage (0x8863) * rarp - Reverse Address Resolution Protocol (0x8035) * service-vlan - Provider Bridging (IEEE 802.1ad) & Shortest Path Bridging IEEE 802.1aq (0x88A8) * vlan - VLAN-tagged frame (IEEE 802.1Q) and Shortest Path Bridging IEEE 802.1aq with NNI compatibility (0x8100)
- Filter
Operator stringBetween Entries - Changes the logic for filters with multiple entries.
- Filter
Ports []string - Up to 16 comma-separated ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- Filter
Size string - Filters packets of specified size or size range in bytes.
- Filter
Src []stringIp Addresses - Up to 16 IP source addresses used as a filter.
- Filter
Src []stringIpv6Addresses - Up to 16 IPv6 source addresses used as a filter.
- Filter
Src []stringMac Addresses - Up to 16 MAC source addresses and MAC address masks used as a filter.
- Filter
Src []stringPorts - Up to 16 comma-separated source ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- Filter
Stream bool - Sniffed packets that are devised for the sniffer server are ignored.
- Filter
Vlans []float64 - Up to 16 VLAN IDs used as a filter.
- Memory
Limit float64 - Memory amount used to store sniffed data.
- Memory
Scroll bool - Whether to rewrite older sniffed data when the memory limit is reached.
- Only
Headers bool - Save in the memory only the packet's headers, not the whole packet.
- Running bool
- Streaming
Enabled bool - Defines whether to send sniffed packets to the streaming server.
- Streaming
Server string - Tazmen Sniffer Protocol (TZSP) stream receiver.
- Tool
Sniffer stringId - ___
id_ float64 - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ string - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- ___
skip_ string - A set of transformations for field names. This is an internal service field, setting a value is not required.
- ___
id_ Double - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ String - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- ___
skip_ String - A set of transformations for field names. This is an internal service field, setting a value is not required.
- enabled Boolean
- Start packet capture.
- file
Limit Double - File size limit. Sniffer will stop when a limit is reached.
- file
Name String - Name of the file where sniffed packets will be saved.
- filter
Cpu String - CPU core used as a filter.
- filter
Direction String - Specifies which direction filtering will be applied.
- filter
Dst List<String>Ip Addresses - Up to 16 IP destination addresses used as a filter.
- filter
Dst List<String>Ipv6Addresses - Up to 16 IPv6 destination addresses used as a filter.
- filter
Dst List<String>Mac Addresses - Up to 16 MAC destination addresses and MAC address masks used as a filter.
- filter
Dst List<String>Ports - Up to 16 comma-separated destination ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- filter
Interfaces List<String> - Interface name on which sniffer will be running. all indicates that the sniffer will sniff packets on all interfaces.
- filter
Ip List<String>Addresses - Up to 16 IP addresses used as a filter.
- filter
Ip List<String>Protocols - Up to 16 comma-separated IP/IPv6 protocols used as a filter. IP protocols (instead of protocol names, protocol numbers
can be used): * ipsec-ah - IPsec AH protocol * ipsec-esp - IPsec ESP protocol * ddp - datagram delivery protocol * egp -
exterior gateway protocol * ggp - gateway-gateway protocol * gre - general routing encapsulation * hmp - host monitoring
protocol * idpr-cmtp - idpr control message transport * icmp - internet control message protocol * icmpv6 - internet
control message protocol v6 * igmp - internet group management protocol * ipencap - ip encapsulated in ip * ipip - ip
encapsulation * encap - ip encapsulation * iso-tp4 - iso transport protocol class 4 * ospf - open shortest path first *
pup - parc universal packet protocol * pim - protocol independent multicast * rspf - radio shortest path first * rdp -
reliable datagram protocol * st - st datagram mode * tcp - transmission control protocol * udp - user datagram protocol
- vmtp versatile message transport * vrrp - virtual router redundancy protocol * xns-idp - xerox xns idp * xtp - xpress transfer protocol
- filter
Ipv6Addresses List<String> - Up to 16 IPv6 addresses used as a filter.
- filter
Mac List<String>Addresses - Up to 16 MAC addresses and MAC address masks used as a filter.
- filter
Mac List<String>Protocols - Up to 16 comma separated entries used as a filter. Mac protocols (instead of protocol names, protocol number can be
used): * 802.2 - 802.2 Frames (0x0004) * arp - Address Resolution Protocol (0x0806) * homeplug-av - HomePlug AV MME
(0x88E1) * ip - Internet Protocol version 4 (0x0800) * ipv6 - Internet Protocol Version 6 (0x86DD) * ipx - Internetwork
Packet Exchange (0x8137) * lldp - Link Layer Discovery Protocol (0x88CC) * loop-protect - Loop Protect Protocol (0x9003)
- mpls-multicast - MPLS multicast (0x8848) * mpls-unicast - MPLS unicast (0x8847) * packing-compr - Encapsulated packets with compressed IP packing (0x9001) * packing-simple - Encapsulated packets with simple IP packing (0x9000) * pppoe - PPPoE Session Stage (0x8864) * pppoe-discovery - PPPoE Discovery Stage (0x8863) * rarp - Reverse Address Resolution Protocol (0x8035) * service-vlan - Provider Bridging (IEEE 802.1ad) & Shortest Path Bridging IEEE 802.1aq (0x88A8) * vlan - VLAN-tagged frame (IEEE 802.1Q) and Shortest Path Bridging IEEE 802.1aq with NNI compatibility (0x8100)
- filter
Operator StringBetween Entries - Changes the logic for filters with multiple entries.
- filter
Ports List<String> - Up to 16 comma-separated ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- filter
Size String - Filters packets of specified size or size range in bytes.
- filter
Src List<String>Ip Addresses - Up to 16 IP source addresses used as a filter.
- filter
Src List<String>Ipv6Addresses - Up to 16 IPv6 source addresses used as a filter.
- filter
Src List<String>Mac Addresses - Up to 16 MAC source addresses and MAC address masks used as a filter.
- filter
Src List<String>Ports - Up to 16 comma-separated source ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- filter
Stream Boolean - Sniffed packets that are devised for the sniffer server are ignored.
- filter
Vlans List<Double> - Up to 16 VLAN IDs used as a filter.
- memory
Limit Double - Memory amount used to store sniffed data.
- memory
Scroll Boolean - Whether to rewrite older sniffed data when the memory limit is reached.
- only
Headers Boolean - Save in the memory only the packet's headers, not the whole packet.
- running Boolean
- streaming
Enabled Boolean - Defines whether to send sniffed packets to the streaming server.
- streaming
Server String - Tazmen Sniffer Protocol (TZSP) stream receiver.
- tool
Sniffer StringId
- ___
id_ number - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ string - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- ___
skip_ string - A set of transformations for field names. This is an internal service field, setting a value is not required.
- enabled boolean
- Start packet capture.
- file
Limit number - File size limit. Sniffer will stop when a limit is reached.
- file
Name string - Name of the file where sniffed packets will be saved.
- filter
Cpu string - CPU core used as a filter.
- filter
Direction string - Specifies which direction filtering will be applied.
- filter
Dst string[]Ip Addresses - Up to 16 IP destination addresses used as a filter.
- filter
Dst string[]Ipv6Addresses - Up to 16 IPv6 destination addresses used as a filter.
- filter
Dst string[]Mac Addresses - Up to 16 MAC destination addresses and MAC address masks used as a filter.
- filter
Dst string[]Ports - Up to 16 comma-separated destination ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- filter
Interfaces string[] - Interface name on which sniffer will be running. all indicates that the sniffer will sniff packets on all interfaces.
- filter
Ip string[]Addresses - Up to 16 IP addresses used as a filter.
- filter
Ip string[]Protocols - Up to 16 comma-separated IP/IPv6 protocols used as a filter. IP protocols (instead of protocol names, protocol numbers
can be used): * ipsec-ah - IPsec AH protocol * ipsec-esp - IPsec ESP protocol * ddp - datagram delivery protocol * egp -
exterior gateway protocol * ggp - gateway-gateway protocol * gre - general routing encapsulation * hmp - host monitoring
protocol * idpr-cmtp - idpr control message transport * icmp - internet control message protocol * icmpv6 - internet
control message protocol v6 * igmp - internet group management protocol * ipencap - ip encapsulated in ip * ipip - ip
encapsulation * encap - ip encapsulation * iso-tp4 - iso transport protocol class 4 * ospf - open shortest path first *
pup - parc universal packet protocol * pim - protocol independent multicast * rspf - radio shortest path first * rdp -
reliable datagram protocol * st - st datagram mode * tcp - transmission control protocol * udp - user datagram protocol
- vmtp versatile message transport * vrrp - virtual router redundancy protocol * xns-idp - xerox xns idp * xtp - xpress transfer protocol
- filter
Ipv6Addresses string[] - Up to 16 IPv6 addresses used as a filter.
- filter
Mac string[]Addresses - Up to 16 MAC addresses and MAC address masks used as a filter.
- filter
Mac string[]Protocols - Up to 16 comma separated entries used as a filter. Mac protocols (instead of protocol names, protocol number can be
used): * 802.2 - 802.2 Frames (0x0004) * arp - Address Resolution Protocol (0x0806) * homeplug-av - HomePlug AV MME
(0x88E1) * ip - Internet Protocol version 4 (0x0800) * ipv6 - Internet Protocol Version 6 (0x86DD) * ipx - Internetwork
Packet Exchange (0x8137) * lldp - Link Layer Discovery Protocol (0x88CC) * loop-protect - Loop Protect Protocol (0x9003)
- mpls-multicast - MPLS multicast (0x8848) * mpls-unicast - MPLS unicast (0x8847) * packing-compr - Encapsulated packets with compressed IP packing (0x9001) * packing-simple - Encapsulated packets with simple IP packing (0x9000) * pppoe - PPPoE Session Stage (0x8864) * pppoe-discovery - PPPoE Discovery Stage (0x8863) * rarp - Reverse Address Resolution Protocol (0x8035) * service-vlan - Provider Bridging (IEEE 802.1ad) & Shortest Path Bridging IEEE 802.1aq (0x88A8) * vlan - VLAN-tagged frame (IEEE 802.1Q) and Shortest Path Bridging IEEE 802.1aq with NNI compatibility (0x8100)
- filter
Operator stringBetween Entries - Changes the logic for filters with multiple entries.
- filter
Ports string[] - Up to 16 comma-separated ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- filter
Size string - Filters packets of specified size or size range in bytes.
- filter
Src string[]Ip Addresses - Up to 16 IP source addresses used as a filter.
- filter
Src string[]Ipv6Addresses - Up to 16 IPv6 source addresses used as a filter.
- filter
Src string[]Mac Addresses - Up to 16 MAC source addresses and MAC address masks used as a filter.
- filter
Src string[]Ports - Up to 16 comma-separated source ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- filter
Stream boolean - Sniffed packets that are devised for the sniffer server are ignored.
- filter
Vlans number[] - Up to 16 VLAN IDs used as a filter.
- memory
Limit number - Memory amount used to store sniffed data.
- memory
Scroll boolean - Whether to rewrite older sniffed data when the memory limit is reached.
- only
Headers boolean - Save in the memory only the packet's headers, not the whole packet.
- running boolean
- streaming
Enabled boolean - Defines whether to send sniffed packets to the streaming server.
- streaming
Server string - Tazmen Sniffer Protocol (TZSP) stream receiver.
- tool
Sniffer stringId
- ___
id_ float - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ str - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- ___
skip_ str - A set of transformations for field names. This is an internal service field, setting a value is not required.
- enabled bool
- Start packet capture.
- file_
limit float - File size limit. Sniffer will stop when a limit is reached.
- file_
name str - Name of the file where sniffed packets will be saved.
- filter_
cpu str - CPU core used as a filter.
- filter_
direction str - Specifies which direction filtering will be applied.
- filter_
dst_ Sequence[str]ip_ addresses - Up to 16 IP destination addresses used as a filter.
- filter_
dst_ Sequence[str]ipv6_ addresses - Up to 16 IPv6 destination addresses used as a filter.
- filter_
dst_ Sequence[str]mac_ addresses - Up to 16 MAC destination addresses and MAC address masks used as a filter.
- filter_
dst_ Sequence[str]ports - Up to 16 comma-separated destination ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- filter_
interfaces Sequence[str] - Interface name on which sniffer will be running. all indicates that the sniffer will sniff packets on all interfaces.
- filter_
ip_ Sequence[str]addresses - Up to 16 IP addresses used as a filter.
- filter_
ip_ Sequence[str]protocols - Up to 16 comma-separated IP/IPv6 protocols used as a filter. IP protocols (instead of protocol names, protocol numbers
can be used): * ipsec-ah - IPsec AH protocol * ipsec-esp - IPsec ESP protocol * ddp - datagram delivery protocol * egp -
exterior gateway protocol * ggp - gateway-gateway protocol * gre - general routing encapsulation * hmp - host monitoring
protocol * idpr-cmtp - idpr control message transport * icmp - internet control message protocol * icmpv6 - internet
control message protocol v6 * igmp - internet group management protocol * ipencap - ip encapsulated in ip * ipip - ip
encapsulation * encap - ip encapsulation * iso-tp4 - iso transport protocol class 4 * ospf - open shortest path first *
pup - parc universal packet protocol * pim - protocol independent multicast * rspf - radio shortest path first * rdp -
reliable datagram protocol * st - st datagram mode * tcp - transmission control protocol * udp - user datagram protocol
- vmtp versatile message transport * vrrp - virtual router redundancy protocol * xns-idp - xerox xns idp * xtp - xpress transfer protocol
- filter_
ipv6_ Sequence[str]addresses - Up to 16 IPv6 addresses used as a filter.
- filter_
mac_ Sequence[str]addresses - Up to 16 MAC addresses and MAC address masks used as a filter.
- filter_
mac_ Sequence[str]protocols - Up to 16 comma separated entries used as a filter. Mac protocols (instead of protocol names, protocol number can be
used): * 802.2 - 802.2 Frames (0x0004) * arp - Address Resolution Protocol (0x0806) * homeplug-av - HomePlug AV MME
(0x88E1) * ip - Internet Protocol version 4 (0x0800) * ipv6 - Internet Protocol Version 6 (0x86DD) * ipx - Internetwork
Packet Exchange (0x8137) * lldp - Link Layer Discovery Protocol (0x88CC) * loop-protect - Loop Protect Protocol (0x9003)
- mpls-multicast - MPLS multicast (0x8848) * mpls-unicast - MPLS unicast (0x8847) * packing-compr - Encapsulated packets with compressed IP packing (0x9001) * packing-simple - Encapsulated packets with simple IP packing (0x9000) * pppoe - PPPoE Session Stage (0x8864) * pppoe-discovery - PPPoE Discovery Stage (0x8863) * rarp - Reverse Address Resolution Protocol (0x8035) * service-vlan - Provider Bridging (IEEE 802.1ad) & Shortest Path Bridging IEEE 802.1aq (0x88A8) * vlan - VLAN-tagged frame (IEEE 802.1Q) and Shortest Path Bridging IEEE 802.1aq with NNI compatibility (0x8100)
- filter_
operator_ strbetween_ entries - Changes the logic for filters with multiple entries.
- filter_
ports Sequence[str] - Up to 16 comma-separated ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- filter_
size str - Filters packets of specified size or size range in bytes.
- filter_
src_ Sequence[str]ip_ addresses - Up to 16 IP source addresses used as a filter.
- filter_
src_ Sequence[str]ipv6_ addresses - Up to 16 IPv6 source addresses used as a filter.
- filter_
src_ Sequence[str]mac_ addresses - Up to 16 MAC source addresses and MAC address masks used as a filter.
- filter_
src_ Sequence[str]ports - Up to 16 comma-separated source ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- filter_
stream bool - Sniffed packets that are devised for the sniffer server are ignored.
- filter_
vlans Sequence[float] - Up to 16 VLAN IDs used as a filter.
- memory_
limit float - Memory amount used to store sniffed data.
- memory_
scroll bool - Whether to rewrite older sniffed data when the memory limit is reached.
- only_
headers bool - Save in the memory only the packet's headers, not the whole packet.
- running bool
- streaming_
enabled bool - Defines whether to send sniffed packets to the streaming server.
- streaming_
server str - Tazmen Sniffer Protocol (TZSP) stream receiver.
- tool_
sniffer_ strid
- ___
id_ Number - Resource ID type (.id / name). This is an internal service field, setting a value is not required.
- ___
path_ String - Resource path for CRUD operations. This is an internal service field, setting a value is not required.
- ___
skip_ String - A set of transformations for field names. This is an internal service field, setting a value is not required.
- enabled Boolean
- Start packet capture.
- file
Limit Number - File size limit. Sniffer will stop when a limit is reached.
- file
Name String - Name of the file where sniffed packets will be saved.
- filter
Cpu String - CPU core used as a filter.
- filter
Direction String - Specifies which direction filtering will be applied.
- filter
Dst List<String>Ip Addresses - Up to 16 IP destination addresses used as a filter.
- filter
Dst List<String>Ipv6Addresses - Up to 16 IPv6 destination addresses used as a filter.
- filter
Dst List<String>Mac Addresses - Up to 16 MAC destination addresses and MAC address masks used as a filter.
- filter
Dst List<String>Ports - Up to 16 comma-separated destination ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- filter
Interfaces List<String> - Interface name on which sniffer will be running. all indicates that the sniffer will sniff packets on all interfaces.
- filter
Ip List<String>Addresses - Up to 16 IP addresses used as a filter.
- filter
Ip List<String>Protocols - Up to 16 comma-separated IP/IPv6 protocols used as a filter. IP protocols (instead of protocol names, protocol numbers
can be used): * ipsec-ah - IPsec AH protocol * ipsec-esp - IPsec ESP protocol * ddp - datagram delivery protocol * egp -
exterior gateway protocol * ggp - gateway-gateway protocol * gre - general routing encapsulation * hmp - host monitoring
protocol * idpr-cmtp - idpr control message transport * icmp - internet control message protocol * icmpv6 - internet
control message protocol v6 * igmp - internet group management protocol * ipencap - ip encapsulated in ip * ipip - ip
encapsulation * encap - ip encapsulation * iso-tp4 - iso transport protocol class 4 * ospf - open shortest path first *
pup - parc universal packet protocol * pim - protocol independent multicast * rspf - radio shortest path first * rdp -
reliable datagram protocol * st - st datagram mode * tcp - transmission control protocol * udp - user datagram protocol
- vmtp versatile message transport * vrrp - virtual router redundancy protocol * xns-idp - xerox xns idp * xtp - xpress transfer protocol
- filter
Ipv6Addresses List<String> - Up to 16 IPv6 addresses used as a filter.
- filter
Mac List<String>Addresses - Up to 16 MAC addresses and MAC address masks used as a filter.
- filter
Mac List<String>Protocols - Up to 16 comma separated entries used as a filter. Mac protocols (instead of protocol names, protocol number can be
used): * 802.2 - 802.2 Frames (0x0004) * arp - Address Resolution Protocol (0x0806) * homeplug-av - HomePlug AV MME
(0x88E1) * ip - Internet Protocol version 4 (0x0800) * ipv6 - Internet Protocol Version 6 (0x86DD) * ipx - Internetwork
Packet Exchange (0x8137) * lldp - Link Layer Discovery Protocol (0x88CC) * loop-protect - Loop Protect Protocol (0x9003)
- mpls-multicast - MPLS multicast (0x8848) * mpls-unicast - MPLS unicast (0x8847) * packing-compr - Encapsulated packets with compressed IP packing (0x9001) * packing-simple - Encapsulated packets with simple IP packing (0x9000) * pppoe - PPPoE Session Stage (0x8864) * pppoe-discovery - PPPoE Discovery Stage (0x8863) * rarp - Reverse Address Resolution Protocol (0x8035) * service-vlan - Provider Bridging (IEEE 802.1ad) & Shortest Path Bridging IEEE 802.1aq (0x88A8) * vlan - VLAN-tagged frame (IEEE 802.1Q) and Shortest Path Bridging IEEE 802.1aq with NNI compatibility (0x8100)
- filter
Operator StringBetween Entries - Changes the logic for filters with multiple entries.
- filter
Ports List<String> - Up to 16 comma-separated ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- filter
Size String - Filters packets of specified size or size range in bytes.
- filter
Src List<String>Ip Addresses - Up to 16 IP source addresses used as a filter.
- filter
Src List<String>Ipv6Addresses - Up to 16 IPv6 source addresses used as a filter.
- filter
Src List<String>Mac Addresses - Up to 16 MAC source addresses and MAC address masks used as a filter.
- filter
Src List<String>Ports - Up to 16 comma-separated source ports used as a filter. A list of predefined port names is also available, like ssh and telnet.
- filter
Stream Boolean - Sniffed packets that are devised for the sniffer server are ignored.
- filter
Vlans List<Number> - Up to 16 VLAN IDs used as a filter.
- memory
Limit Number - Memory amount used to store sniffed data.
- memory
Scroll Boolean - Whether to rewrite older sniffed data when the memory limit is reached.
- only
Headers Boolean - Save in the memory only the packet's headers, not the whole packet.
- running Boolean
- streaming
Enabled Boolean - Defines whether to send sniffed packets to the streaming server.
- streaming
Server String - Tazmen Sniffer Protocol (TZSP) stream receiver.
- tool
Sniffer StringId
Import
$ pulumi import routeros:index/toolSniffer:ToolSniffer test .
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- routeros terraform-routeros/terraform-provider-routeros
- License
- Notes
- This Pulumi package is based on the
routeros
Terraform Provider.