ZoneProtectionProfile resource
Create ZoneProtectionProfile Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new ZoneProtectionProfile(name: string, args?: ZoneProtectionProfileArgs, opts?: CustomResourceOptions);@overload
def ZoneProtectionProfile(resource_name: str,
args: Optional[ZoneProtectionProfileArgs] = None,
opts: Optional[ResourceOptions] = None)
@overload
def ZoneProtectionProfile(resource_name: str,
opts: Optional[ResourceOptions] = None,
asymmetric_path: Optional[str] = None,
description: Optional[str] = None,
device: Optional[str] = None,
discard_icmp_embedded_error: Optional[bool] = None,
flood: Optional[ZoneProtectionProfileFloodArgs] = None,
folder: Optional[str] = None,
fragmented_traffic_discard: Optional[bool] = None,
icmp_frag_discard: Optional[bool] = None,
icmp_large_packet_discard: Optional[bool] = None,
icmp_ping_zero_id_discard: Optional[bool] = None,
ipv6: Optional[ZoneProtectionProfileIpv6Args] = None,
l2_sec_group_tag_protection: Optional[ZoneProtectionProfileL2SecGroupTagProtectionArgs] = None,
loose_source_routing_discard: Optional[bool] = None,
malformed_option_discard: Optional[bool] = None,
mismatched_overlapping_tcp_segment_discard: Optional[bool] = None,
mptcp_option_strip: Optional[str] = None,
name: Optional[str] = None,
non_ip_protocol: Optional[ZoneProtectionProfileNonIpProtocolArgs] = None,
record_route_discard: Optional[bool] = None,
reject_non_syn_tcp: Optional[str] = None,
scan_white_lists: Optional[Sequence[ZoneProtectionProfileScanWhiteListArgs]] = None,
scans: Optional[Sequence[ZoneProtectionProfileScanArgs]] = None,
security_discard: Optional[bool] = None,
snippet: Optional[str] = None,
spoofed_ip_discard: Optional[bool] = None,
stream_id_discard: Optional[bool] = None,
strict_ip_check: Optional[bool] = None,
strict_source_routing_discard: Optional[bool] = None,
suppress_icmp_needfrag: Optional[bool] = None,
suppress_icmp_timeexceeded: Optional[bool] = None,
tcp_fast_open_and_data_strip: Optional[bool] = None,
tcp_handshake_discard: Optional[bool] = None,
tcp_syn_with_data_discard: Optional[bool] = None,
tcp_synack_with_data_discard: Optional[bool] = None,
tcp_timestamp_strip: Optional[bool] = None,
timestamp_discard: Optional[bool] = None,
unknown_option_discard: Optional[bool] = None)func NewZoneProtectionProfile(ctx *Context, name string, args *ZoneProtectionProfileArgs, opts ...ResourceOption) (*ZoneProtectionProfile, error)public ZoneProtectionProfile(string name, ZoneProtectionProfileArgs? args = null, CustomResourceOptions? opts = null)
public ZoneProtectionProfile(String name, ZoneProtectionProfileArgs args)
public ZoneProtectionProfile(String name, ZoneProtectionProfileArgs args, CustomResourceOptions options)
type: scm:ZoneProtectionProfile
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args ZoneProtectionProfileArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args ZoneProtectionProfileArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args ZoneProtectionProfileArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args ZoneProtectionProfileArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args ZoneProtectionProfileArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var zoneProtectionProfileResource = new Scm.ZoneProtectionProfile("zoneProtectionProfileResource", new()
{
AsymmetricPath = "string",
Description = "string",
Device = "string",
DiscardIcmpEmbeddedError = false,
Flood = new Scm.Inputs.ZoneProtectionProfileFloodArgs
{
Icmp = new Scm.Inputs.ZoneProtectionProfileFloodIcmpArgs
{
Enable = false,
Red = new Scm.Inputs.ZoneProtectionProfileFloodIcmpRedArgs
{
ActivateRate = 0,
AlarmRate = 0,
MaximalRate = 0,
},
},
Icmpv6 = new Scm.Inputs.ZoneProtectionProfileFloodIcmpv6Args
{
Enable = false,
Red = new Scm.Inputs.ZoneProtectionProfileFloodIcmpv6RedArgs
{
ActivateRate = 0,
AlarmRate = 0,
MaximalRate = 0,
},
},
OtherIp = new Scm.Inputs.ZoneProtectionProfileFloodOtherIpArgs
{
Enable = false,
Red = new Scm.Inputs.ZoneProtectionProfileFloodOtherIpRedArgs
{
ActivateRate = 0,
AlarmRate = 0,
MaximalRate = 0,
},
},
SctpInit = new Scm.Inputs.ZoneProtectionProfileFloodSctpInitArgs
{
Enable = false,
Red = new Scm.Inputs.ZoneProtectionProfileFloodSctpInitRedArgs
{
ActivateRate = 0,
AlarmRate = 0,
MaximalRate = 0,
},
},
TcpSyn = new Scm.Inputs.ZoneProtectionProfileFloodTcpSynArgs
{
Enable = false,
Red = new Scm.Inputs.ZoneProtectionProfileFloodTcpSynRedArgs
{
ActivateRate = 0,
AlarmRate = 0,
MaximalRate = 0,
},
SynCookies = new Scm.Inputs.ZoneProtectionProfileFloodTcpSynSynCookiesArgs
{
ActivateRate = 0,
AlarmRate = 0,
MaximalRate = 0,
},
},
Udp = new Scm.Inputs.ZoneProtectionProfileFloodUdpArgs
{
Enable = false,
Red = new Scm.Inputs.ZoneProtectionProfileFloodUdpRedArgs
{
ActivateRate = 0,
AlarmRate = 0,
MaximalRate = 0,
},
},
},
Folder = "string",
FragmentedTrafficDiscard = false,
IcmpFragDiscard = false,
IcmpLargePacketDiscard = false,
IcmpPingZeroIdDiscard = false,
Ipv6 = new Scm.Inputs.ZoneProtectionProfileIpv6Args
{
AnycastSource = false,
FilterExtHdr = new Scm.Inputs.ZoneProtectionProfileIpv6FilterExtHdrArgs
{
DestOptionHdr = false,
HopByHopHdr = false,
RoutingHdr = false,
},
Icmpv6TooBigSmallMtuDiscard = false,
IgnoreInvPkt = new Scm.Inputs.ZoneProtectionProfileIpv6IgnoreInvPktArgs
{
DestUnreach = false,
ParamProblem = false,
PktTooBig = false,
Redirect = false,
TimeExceeded = false,
},
Ipv4CompatibleAddress = false,
NeedlessFragmentHdr = false,
OptionsInvalidIpv6Discard = false,
ReservedFieldSetDiscard = false,
RoutingHeader0 = false,
RoutingHeader1 = false,
RoutingHeader253 = false,
RoutingHeader254 = false,
RoutingHeader255 = false,
RoutingHeader3 = false,
RoutingHeader4252 = false,
},
L2SecGroupTagProtection = new Scm.Inputs.ZoneProtectionProfileL2SecGroupTagProtectionArgs
{
Tags = new[]
{
new Scm.Inputs.ZoneProtectionProfileL2SecGroupTagProtectionTagArgs
{
Name = "string",
Tag = "string",
Enable = false,
},
},
},
LooseSourceRoutingDiscard = false,
MalformedOptionDiscard = false,
MismatchedOverlappingTcpSegmentDiscard = false,
MptcpOptionStrip = "string",
Name = "string",
NonIpProtocol = new Scm.Inputs.ZoneProtectionProfileNonIpProtocolArgs
{
ListType = "string",
Protocols = new[]
{
new Scm.Inputs.ZoneProtectionProfileNonIpProtocolProtocolArgs
{
EtherType = "string",
Name = "string",
Enable = false,
},
},
},
RecordRouteDiscard = false,
RejectNonSynTcp = "string",
ScanWhiteLists = new[]
{
new Scm.Inputs.ZoneProtectionProfileScanWhiteListArgs
{
Name = "string",
Ipv4 = "string",
Ipv6 = "string",
},
},
Scans = new[]
{
new Scm.Inputs.ZoneProtectionProfileScanArgs
{
Name = "string",
Action = new Scm.Inputs.ZoneProtectionProfileScanActionArgs
{
Alert = null,
Allow = null,
Block = null,
BlockIp = new Scm.Inputs.ZoneProtectionProfileScanActionBlockIpArgs
{
Duration = 0,
TrackBy = "string",
},
},
Interval = 0,
Threshold = 0,
},
},
SecurityDiscard = false,
Snippet = "string",
SpoofedIpDiscard = false,
StreamIdDiscard = false,
StrictIpCheck = false,
StrictSourceRoutingDiscard = false,
SuppressIcmpNeedfrag = false,
SuppressIcmpTimeexceeded = false,
TcpFastOpenAndDataStrip = false,
TcpHandshakeDiscard = false,
TcpSynWithDataDiscard = false,
TcpSynackWithDataDiscard = false,
TcpTimestampStrip = false,
TimestampDiscard = false,
UnknownOptionDiscard = false,
});
example, err := scm.NewZoneProtectionProfile(ctx, "zoneProtectionProfileResource", &scm.ZoneProtectionProfileArgs{
AsymmetricPath: pulumi.String("string"),
Description: pulumi.String("string"),
Device: pulumi.String("string"),
DiscardIcmpEmbeddedError: pulumi.Bool(false),
Flood: &scm.ZoneProtectionProfileFloodArgs{
Icmp: &scm.ZoneProtectionProfileFloodIcmpArgs{
Enable: pulumi.Bool(false),
Red: &scm.ZoneProtectionProfileFloodIcmpRedArgs{
ActivateRate: pulumi.Int(0),
AlarmRate: pulumi.Int(0),
MaximalRate: pulumi.Int(0),
},
},
Icmpv6: &scm.ZoneProtectionProfileFloodIcmpv6Args{
Enable: pulumi.Bool(false),
Red: &scm.ZoneProtectionProfileFloodIcmpv6RedArgs{
ActivateRate: pulumi.Int(0),
AlarmRate: pulumi.Int(0),
MaximalRate: pulumi.Int(0),
},
},
OtherIp: &scm.ZoneProtectionProfileFloodOtherIpArgs{
Enable: pulumi.Bool(false),
Red: &scm.ZoneProtectionProfileFloodOtherIpRedArgs{
ActivateRate: pulumi.Int(0),
AlarmRate: pulumi.Int(0),
MaximalRate: pulumi.Int(0),
},
},
SctpInit: &scm.ZoneProtectionProfileFloodSctpInitArgs{
Enable: pulumi.Bool(false),
Red: &scm.ZoneProtectionProfileFloodSctpInitRedArgs{
ActivateRate: pulumi.Int(0),
AlarmRate: pulumi.Int(0),
MaximalRate: pulumi.Int(0),
},
},
TcpSyn: &scm.ZoneProtectionProfileFloodTcpSynArgs{
Enable: pulumi.Bool(false),
Red: &scm.ZoneProtectionProfileFloodTcpSynRedArgs{
ActivateRate: pulumi.Int(0),
AlarmRate: pulumi.Int(0),
MaximalRate: pulumi.Int(0),
},
SynCookies: &scm.ZoneProtectionProfileFloodTcpSynSynCookiesArgs{
ActivateRate: pulumi.Int(0),
AlarmRate: pulumi.Int(0),
MaximalRate: pulumi.Int(0),
},
},
Udp: &scm.ZoneProtectionProfileFloodUdpArgs{
Enable: pulumi.Bool(false),
Red: &scm.ZoneProtectionProfileFloodUdpRedArgs{
ActivateRate: pulumi.Int(0),
AlarmRate: pulumi.Int(0),
MaximalRate: pulumi.Int(0),
},
},
},
Folder: pulumi.String("string"),
FragmentedTrafficDiscard: pulumi.Bool(false),
IcmpFragDiscard: pulumi.Bool(false),
IcmpLargePacketDiscard: pulumi.Bool(false),
IcmpPingZeroIdDiscard: pulumi.Bool(false),
Ipv6: &scm.ZoneProtectionProfileIpv6Args{
AnycastSource: pulumi.Bool(false),
FilterExtHdr: &scm.ZoneProtectionProfileIpv6FilterExtHdrArgs{
DestOptionHdr: pulumi.Bool(false),
HopByHopHdr: pulumi.Bool(false),
RoutingHdr: pulumi.Bool(false),
},
Icmpv6TooBigSmallMtuDiscard: pulumi.Bool(false),
IgnoreInvPkt: &scm.ZoneProtectionProfileIpv6IgnoreInvPktArgs{
DestUnreach: pulumi.Bool(false),
ParamProblem: pulumi.Bool(false),
PktTooBig: pulumi.Bool(false),
Redirect: pulumi.Bool(false),
TimeExceeded: pulumi.Bool(false),
},
Ipv4CompatibleAddress: pulumi.Bool(false),
NeedlessFragmentHdr: pulumi.Bool(false),
OptionsInvalidIpv6Discard: pulumi.Bool(false),
ReservedFieldSetDiscard: pulumi.Bool(false),
RoutingHeader0: pulumi.Bool(false),
RoutingHeader1: pulumi.Bool(false),
RoutingHeader253: pulumi.Bool(false),
RoutingHeader254: pulumi.Bool(false),
RoutingHeader255: pulumi.Bool(false),
RoutingHeader3: pulumi.Bool(false),
RoutingHeader4252: pulumi.Bool(false),
},
L2SecGroupTagProtection: &scm.ZoneProtectionProfileL2SecGroupTagProtectionArgs{
Tags: scm.ZoneProtectionProfileL2SecGroupTagProtectionTagArray{
&scm.ZoneProtectionProfileL2SecGroupTagProtectionTagArgs{
Name: pulumi.String("string"),
Tag: pulumi.String("string"),
Enable: pulumi.Bool(false),
},
},
},
LooseSourceRoutingDiscard: pulumi.Bool(false),
MalformedOptionDiscard: pulumi.Bool(false),
MismatchedOverlappingTcpSegmentDiscard: pulumi.Bool(false),
MptcpOptionStrip: pulumi.String("string"),
Name: pulumi.String("string"),
NonIpProtocol: &scm.ZoneProtectionProfileNonIpProtocolArgs{
ListType: pulumi.String("string"),
Protocols: scm.ZoneProtectionProfileNonIpProtocolProtocolArray{
&scm.ZoneProtectionProfileNonIpProtocolProtocolArgs{
EtherType: pulumi.String("string"),
Name: pulumi.String("string"),
Enable: pulumi.Bool(false),
},
},
},
RecordRouteDiscard: pulumi.Bool(false),
RejectNonSynTcp: pulumi.String("string"),
ScanWhiteLists: scm.ZoneProtectionProfileScanWhiteListArray{
&scm.ZoneProtectionProfileScanWhiteListArgs{
Name: pulumi.String("string"),
Ipv4: pulumi.String("string"),
Ipv6: pulumi.String("string"),
},
},
Scans: scm.ZoneProtectionProfileScanArray{
&scm.ZoneProtectionProfileScanArgs{
Name: pulumi.String("string"),
Action: &scm.ZoneProtectionProfileScanActionArgs{
Alert: &scm.ZoneProtectionProfileScanActionAlertArgs{},
Allow: &scm.ZoneProtectionProfileScanActionAllowArgs{},
Block: &scm.ZoneProtectionProfileScanActionBlockArgs{},
BlockIp: &scm.ZoneProtectionProfileScanActionBlockIpArgs{
Duration: pulumi.Int(0),
TrackBy: pulumi.String("string"),
},
},
Interval: pulumi.Int(0),
Threshold: pulumi.Int(0),
},
},
SecurityDiscard: pulumi.Bool(false),
Snippet: pulumi.String("string"),
SpoofedIpDiscard: pulumi.Bool(false),
StreamIdDiscard: pulumi.Bool(false),
StrictIpCheck: pulumi.Bool(false),
StrictSourceRoutingDiscard: pulumi.Bool(false),
SuppressIcmpNeedfrag: pulumi.Bool(false),
SuppressIcmpTimeexceeded: pulumi.Bool(false),
TcpFastOpenAndDataStrip: pulumi.Bool(false),
TcpHandshakeDiscard: pulumi.Bool(false),
TcpSynWithDataDiscard: pulumi.Bool(false),
TcpSynackWithDataDiscard: pulumi.Bool(false),
TcpTimestampStrip: pulumi.Bool(false),
TimestampDiscard: pulumi.Bool(false),
UnknownOptionDiscard: pulumi.Bool(false),
})
var zoneProtectionProfileResource = new ZoneProtectionProfile("zoneProtectionProfileResource", ZoneProtectionProfileArgs.builder()
.asymmetricPath("string")
.description("string")
.device("string")
.discardIcmpEmbeddedError(false)
.flood(ZoneProtectionProfileFloodArgs.builder()
.icmp(ZoneProtectionProfileFloodIcmpArgs.builder()
.enable(false)
.red(ZoneProtectionProfileFloodIcmpRedArgs.builder()
.activateRate(0)
.alarmRate(0)
.maximalRate(0)
.build())
.build())
.icmpv6(ZoneProtectionProfileFloodIcmpv6Args.builder()
.enable(false)
.red(ZoneProtectionProfileFloodIcmpv6RedArgs.builder()
.activateRate(0)
.alarmRate(0)
.maximalRate(0)
.build())
.build())
.otherIp(ZoneProtectionProfileFloodOtherIpArgs.builder()
.enable(false)
.red(ZoneProtectionProfileFloodOtherIpRedArgs.builder()
.activateRate(0)
.alarmRate(0)
.maximalRate(0)
.build())
.build())
.sctpInit(ZoneProtectionProfileFloodSctpInitArgs.builder()
.enable(false)
.red(ZoneProtectionProfileFloodSctpInitRedArgs.builder()
.activateRate(0)
.alarmRate(0)
.maximalRate(0)
.build())
.build())
.tcpSyn(ZoneProtectionProfileFloodTcpSynArgs.builder()
.enable(false)
.red(ZoneProtectionProfileFloodTcpSynRedArgs.builder()
.activateRate(0)
.alarmRate(0)
.maximalRate(0)
.build())
.synCookies(ZoneProtectionProfileFloodTcpSynSynCookiesArgs.builder()
.activateRate(0)
.alarmRate(0)
.maximalRate(0)
.build())
.build())
.udp(ZoneProtectionProfileFloodUdpArgs.builder()
.enable(false)
.red(ZoneProtectionProfileFloodUdpRedArgs.builder()
.activateRate(0)
.alarmRate(0)
.maximalRate(0)
.build())
.build())
.build())
.folder("string")
.fragmentedTrafficDiscard(false)
.icmpFragDiscard(false)
.icmpLargePacketDiscard(false)
.icmpPingZeroIdDiscard(false)
.ipv6(ZoneProtectionProfileIpv6Args.builder()
.anycastSource(false)
.filterExtHdr(ZoneProtectionProfileIpv6FilterExtHdrArgs.builder()
.destOptionHdr(false)
.hopByHopHdr(false)
.routingHdr(false)
.build())
.icmpv6TooBigSmallMtuDiscard(false)
.ignoreInvPkt(ZoneProtectionProfileIpv6IgnoreInvPktArgs.builder()
.destUnreach(false)
.paramProblem(false)
.pktTooBig(false)
.redirect(false)
.timeExceeded(false)
.build())
.ipv4CompatibleAddress(false)
.needlessFragmentHdr(false)
.optionsInvalidIpv6Discard(false)
.reservedFieldSetDiscard(false)
.routingHeader0(false)
.routingHeader1(false)
.routingHeader253(false)
.routingHeader254(false)
.routingHeader255(false)
.routingHeader3(false)
.routingHeader4252(false)
.build())
.l2SecGroupTagProtection(ZoneProtectionProfileL2SecGroupTagProtectionArgs.builder()
.tags(ZoneProtectionProfileL2SecGroupTagProtectionTagArgs.builder()
.name("string")
.tag("string")
.enable(false)
.build())
.build())
.looseSourceRoutingDiscard(false)
.malformedOptionDiscard(false)
.mismatchedOverlappingTcpSegmentDiscard(false)
.mptcpOptionStrip("string")
.name("string")
.nonIpProtocol(ZoneProtectionProfileNonIpProtocolArgs.builder()
.listType("string")
.protocols(ZoneProtectionProfileNonIpProtocolProtocolArgs.builder()
.etherType("string")
.name("string")
.enable(false)
.build())
.build())
.recordRouteDiscard(false)
.rejectNonSynTcp("string")
.scanWhiteLists(ZoneProtectionProfileScanWhiteListArgs.builder()
.name("string")
.ipv4("string")
.ipv6("string")
.build())
.scans(ZoneProtectionProfileScanArgs.builder()
.name("string")
.action(ZoneProtectionProfileScanActionArgs.builder()
.alert(ZoneProtectionProfileScanActionAlertArgs.builder()
.build())
.allow(ZoneProtectionProfileScanActionAllowArgs.builder()
.build())
.block(ZoneProtectionProfileScanActionBlockArgs.builder()
.build())
.blockIp(ZoneProtectionProfileScanActionBlockIpArgs.builder()
.duration(0)
.trackBy("string")
.build())
.build())
.interval(0)
.threshold(0)
.build())
.securityDiscard(false)
.snippet("string")
.spoofedIpDiscard(false)
.streamIdDiscard(false)
.strictIpCheck(false)
.strictSourceRoutingDiscard(false)
.suppressIcmpNeedfrag(false)
.suppressIcmpTimeexceeded(false)
.tcpFastOpenAndDataStrip(false)
.tcpHandshakeDiscard(false)
.tcpSynWithDataDiscard(false)
.tcpSynackWithDataDiscard(false)
.tcpTimestampStrip(false)
.timestampDiscard(false)
.unknownOptionDiscard(false)
.build());
zone_protection_profile_resource = scm.ZoneProtectionProfile("zoneProtectionProfileResource",
asymmetric_path="string",
description="string",
device="string",
discard_icmp_embedded_error=False,
flood={
"icmp": {
"enable": False,
"red": {
"activate_rate": 0,
"alarm_rate": 0,
"maximal_rate": 0,
},
},
"icmpv6": {
"enable": False,
"red": {
"activate_rate": 0,
"alarm_rate": 0,
"maximal_rate": 0,
},
},
"other_ip": {
"enable": False,
"red": {
"activate_rate": 0,
"alarm_rate": 0,
"maximal_rate": 0,
},
},
"sctp_init": {
"enable": False,
"red": {
"activate_rate": 0,
"alarm_rate": 0,
"maximal_rate": 0,
},
},
"tcp_syn": {
"enable": False,
"red": {
"activate_rate": 0,
"alarm_rate": 0,
"maximal_rate": 0,
},
"syn_cookies": {
"activate_rate": 0,
"alarm_rate": 0,
"maximal_rate": 0,
},
},
"udp": {
"enable": False,
"red": {
"activate_rate": 0,
"alarm_rate": 0,
"maximal_rate": 0,
},
},
},
folder="string",
fragmented_traffic_discard=False,
icmp_frag_discard=False,
icmp_large_packet_discard=False,
icmp_ping_zero_id_discard=False,
ipv6={
"anycast_source": False,
"filter_ext_hdr": {
"dest_option_hdr": False,
"hop_by_hop_hdr": False,
"routing_hdr": False,
},
"icmpv6_too_big_small_mtu_discard": False,
"ignore_inv_pkt": {
"dest_unreach": False,
"param_problem": False,
"pkt_too_big": False,
"redirect": False,
"time_exceeded": False,
},
"ipv4_compatible_address": False,
"needless_fragment_hdr": False,
"options_invalid_ipv6_discard": False,
"reserved_field_set_discard": False,
"routing_header0": False,
"routing_header1": False,
"routing_header253": False,
"routing_header254": False,
"routing_header255": False,
"routing_header3": False,
"routing_header4252": False,
},
l2_sec_group_tag_protection={
"tags": [{
"name": "string",
"tag": "string",
"enable": False,
}],
},
loose_source_routing_discard=False,
malformed_option_discard=False,
mismatched_overlapping_tcp_segment_discard=False,
mptcp_option_strip="string",
name="string",
non_ip_protocol={
"list_type": "string",
"protocols": [{
"ether_type": "string",
"name": "string",
"enable": False,
}],
},
record_route_discard=False,
reject_non_syn_tcp="string",
scan_white_lists=[{
"name": "string",
"ipv4": "string",
"ipv6": "string",
}],
scans=[{
"name": "string",
"action": {
"alert": {},
"allow": {},
"block": {},
"block_ip": {
"duration": 0,
"track_by": "string",
},
},
"interval": 0,
"threshold": 0,
}],
security_discard=False,
snippet="string",
spoofed_ip_discard=False,
stream_id_discard=False,
strict_ip_check=False,
strict_source_routing_discard=False,
suppress_icmp_needfrag=False,
suppress_icmp_timeexceeded=False,
tcp_fast_open_and_data_strip=False,
tcp_handshake_discard=False,
tcp_syn_with_data_discard=False,
tcp_synack_with_data_discard=False,
tcp_timestamp_strip=False,
timestamp_discard=False,
unknown_option_discard=False)
const zoneProtectionProfileResource = new scm.ZoneProtectionProfile("zoneProtectionProfileResource", {
asymmetricPath: "string",
description: "string",
device: "string",
discardIcmpEmbeddedError: false,
flood: {
icmp: {
enable: false,
red: {
activateRate: 0,
alarmRate: 0,
maximalRate: 0,
},
},
icmpv6: {
enable: false,
red: {
activateRate: 0,
alarmRate: 0,
maximalRate: 0,
},
},
otherIp: {
enable: false,
red: {
activateRate: 0,
alarmRate: 0,
maximalRate: 0,
},
},
sctpInit: {
enable: false,
red: {
activateRate: 0,
alarmRate: 0,
maximalRate: 0,
},
},
tcpSyn: {
enable: false,
red: {
activateRate: 0,
alarmRate: 0,
maximalRate: 0,
},
synCookies: {
activateRate: 0,
alarmRate: 0,
maximalRate: 0,
},
},
udp: {
enable: false,
red: {
activateRate: 0,
alarmRate: 0,
maximalRate: 0,
},
},
},
folder: "string",
fragmentedTrafficDiscard: false,
icmpFragDiscard: false,
icmpLargePacketDiscard: false,
icmpPingZeroIdDiscard: false,
ipv6: {
anycastSource: false,
filterExtHdr: {
destOptionHdr: false,
hopByHopHdr: false,
routingHdr: false,
},
icmpv6TooBigSmallMtuDiscard: false,
ignoreInvPkt: {
destUnreach: false,
paramProblem: false,
pktTooBig: false,
redirect: false,
timeExceeded: false,
},
ipv4CompatibleAddress: false,
needlessFragmentHdr: false,
optionsInvalidIpv6Discard: false,
reservedFieldSetDiscard: false,
routingHeader0: false,
routingHeader1: false,
routingHeader253: false,
routingHeader254: false,
routingHeader255: false,
routingHeader3: false,
routingHeader4252: false,
},
l2SecGroupTagProtection: {
tags: [{
name: "string",
tag: "string",
enable: false,
}],
},
looseSourceRoutingDiscard: false,
malformedOptionDiscard: false,
mismatchedOverlappingTcpSegmentDiscard: false,
mptcpOptionStrip: "string",
name: "string",
nonIpProtocol: {
listType: "string",
protocols: [{
etherType: "string",
name: "string",
enable: false,
}],
},
recordRouteDiscard: false,
rejectNonSynTcp: "string",
scanWhiteLists: [{
name: "string",
ipv4: "string",
ipv6: "string",
}],
scans: [{
name: "string",
action: {
alert: {},
allow: {},
block: {},
blockIp: {
duration: 0,
trackBy: "string",
},
},
interval: 0,
threshold: 0,
}],
securityDiscard: false,
snippet: "string",
spoofedIpDiscard: false,
streamIdDiscard: false,
strictIpCheck: false,
strictSourceRoutingDiscard: false,
suppressIcmpNeedfrag: false,
suppressIcmpTimeexceeded: false,
tcpFastOpenAndDataStrip: false,
tcpHandshakeDiscard: false,
tcpSynWithDataDiscard: false,
tcpSynackWithDataDiscard: false,
tcpTimestampStrip: false,
timestampDiscard: false,
unknownOptionDiscard: false,
});
type: scm:ZoneProtectionProfile
properties:
asymmetricPath: string
description: string
device: string
discardIcmpEmbeddedError: false
flood:
icmp:
enable: false
red:
activateRate: 0
alarmRate: 0
maximalRate: 0
icmpv6:
enable: false
red:
activateRate: 0
alarmRate: 0
maximalRate: 0
otherIp:
enable: false
red:
activateRate: 0
alarmRate: 0
maximalRate: 0
sctpInit:
enable: false
red:
activateRate: 0
alarmRate: 0
maximalRate: 0
tcpSyn:
enable: false
red:
activateRate: 0
alarmRate: 0
maximalRate: 0
synCookies:
activateRate: 0
alarmRate: 0
maximalRate: 0
udp:
enable: false
red:
activateRate: 0
alarmRate: 0
maximalRate: 0
folder: string
fragmentedTrafficDiscard: false
icmpFragDiscard: false
icmpLargePacketDiscard: false
icmpPingZeroIdDiscard: false
ipv6:
anycastSource: false
filterExtHdr:
destOptionHdr: false
hopByHopHdr: false
routingHdr: false
icmpv6TooBigSmallMtuDiscard: false
ignoreInvPkt:
destUnreach: false
paramProblem: false
pktTooBig: false
redirect: false
timeExceeded: false
ipv4CompatibleAddress: false
needlessFragmentHdr: false
optionsInvalidIpv6Discard: false
reservedFieldSetDiscard: false
routingHeader0: false
routingHeader1: false
routingHeader3: false
routingHeader253: false
routingHeader254: false
routingHeader255: false
routingHeader4252: false
l2SecGroupTagProtection:
tags:
- enable: false
name: string
tag: string
looseSourceRoutingDiscard: false
malformedOptionDiscard: false
mismatchedOverlappingTcpSegmentDiscard: false
mptcpOptionStrip: string
name: string
nonIpProtocol:
listType: string
protocols:
- enable: false
etherType: string
name: string
recordRouteDiscard: false
rejectNonSynTcp: string
scanWhiteLists:
- ipv4: string
ipv6: string
name: string
scans:
- action:
alert: {}
allow: {}
block: {}
blockIp:
duration: 0
trackBy: string
interval: 0
name: string
threshold: 0
securityDiscard: false
snippet: string
spoofedIpDiscard: false
streamIdDiscard: false
strictIpCheck: false
strictSourceRoutingDiscard: false
suppressIcmpNeedfrag: false
suppressIcmpTimeexceeded: false
tcpFastOpenAndDataStrip: false
tcpHandshakeDiscard: false
tcpSynWithDataDiscard: false
tcpSynackWithDataDiscard: false
tcpTimestampStrip: false
timestampDiscard: false
unknownOptionDiscard: false
ZoneProtectionProfile Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The ZoneProtectionProfile resource accepts the following input properties:
- Asymmetric
Path string - Determine whether to drop or bypass packets that contain out-of-sync ACKs or out-of-window sequence numbers:
global— Use system-wide setting that is assigned through TCP Settings or the CLI.drop— Drop packets that contain an asymmetric path.bypass— Bypass scanning on packets that contain an asymmetric path.
- Description string
- The description of the profile
- Device string
- The device in which the resource is defined
- Discard
Icmp boolEmbedded Error - Discard ICMP packets that are embedded with an error message.
- Flood
Zone
Protection Profile Flood - Flood
- Folder string
- The folder in which the resource is defined
- Fragmented
Traffic boolDiscard - Discard fragmented IP packets.
- Icmp
Frag boolDiscard - Discard packets that consist of ICMP fragments.
- Icmp
Large boolPacket Discard - Discard ICMP packets that are larger than 1024 bytes.
- Icmp
Ping boolZero Id Discard - Discard packets if the ICMP ping packet has an identifier value of 0.
- Ipv6
Zone
Protection Profile Ipv6 - Ipv6
- L2Sec
Group ZoneTag Protection Protection Profile L2Sec Group Tag Protection - L2 sec group tag protection
- Loose
Source boolRouting Discard - Discard packets with the Loose Source Routing IP option set. Loose Source Routing is an option whereby a source of a datagram provides routing information and a gateway or host is allowed to choose any route of a number of intermediate gateways to get the datagram to the next address in the route.
- Malformed
Option boolDiscard - Discard packets if they have incorrect combinations of class, number, and length based on RFCs 791, 1108, 1393, and 2113.
- Mismatched
Overlapping boolTcp Segment Discard - Drop packets with mismatched overlapping TCP segments.
- Mptcp
Option stringStrip - MPTCP is an extension of TCP that allows a client to maintain a connection by simultaneously using multiple paths to connect to the destination host. By default, MPTCP support is disabled, based on the global MPTCP setting. Review or adjust the MPTCP settings for the security zones associated with this profile:
no— Enable MPTCP support (do not strip the MPTCP option).yes— Disable MPTCP support (strip the MPTCP option). With this configured, MPTCP connections are converted to standard TCP connections, as MPTCP is backwards compatible with TCP.global— Support MPTCP based on the global MPTCP setting. By default, the global MPTCP setting is set to yes so that MPTCP is disabled (the MPTCP option is stripped from the packet).
- Name string
- The profile name
- Non
Ip ZoneProtocol Protection Profile Non Ip Protocol - Non ip protocol
- Record
Route boolDiscard - Discard packets with the Record Route IP option set. When a datagram has this option, each router that routes the datagram adds its own IP address to the header, thus providing the path to the recipient.
- Reject
Non stringSyn Tcp - Determine whether to reject the packet if the first packet for the TCP session setup is not a SYN packet:
global— Use system-wide setting that is assigned through the CLI.yes— Reject non-SYN TCP.no— Accept non-SYN TCP.
- Scan
White List<ZoneLists Protection Profile Scan White List> - Scan white list
- Scans
List<Zone
Protection Profile Scan> - Scan
- Security
Discard bool - Discard packets if the security option is defined.
- Snippet string
- The snippet in which the resource is defined
- Spoofed
Ip boolDiscard - Check that the source IP address of the ingress packet is routable and the routing interface is in the same zone as the ingress interface. If either condition is not true, discard the packet.
- Stream
Id boolDiscard - Discard packets if the Stream ID option is defined.
- Strict
Ip boolCheck - Check that both conditions are true:
- The source IP address is not the subnet broadcast IP address of the ingress interface.
- The source IP address is routable over the exact ingress interface. If either condition is not true, discard the packet.
- Strict
Source boolRouting Discard - Discard packets with the Strict Source Routing IP option set. Strict Source Routing is an option whereby a source of a datagram provides routing information through which a gateway or host must send the datagram.
- Suppress
Icmp boolNeedfrag - Stop sending ICMP fragmentation needed messages in response to packets that exceed the interface MTU and have the do not fragment (DF) bit set. This setting will interfere with the PMTUD process performed by hosts behind the firewall.
- Suppress
Icmp boolTimeexceeded - Stop sending ICMP TTL expired messages.
- Tcp
Fast boolOpen And Data Strip - Strip the TCP Fast Open option (and data payload, if any) from the TCP SYN or SYN-ACK packet during a TCP three-way handshake.
- Tcp
Handshake boolDiscard - Drop packets with split handshakes.
- Tcp
Syn boolWith Data Discard - Prevent a TCP session from being established if the TCP SYN packet contains data during a three-way handshake.
- Tcp
Synack boolWith Data Discard - Prevent a TCP session from being established if the TCP SYN-ACK packet contains data during a three-way handshake.
- Tcp
Timestamp boolStrip - Determine whether the packet has a TCP timestamp in the header and, if it does, strip the timestamp from the header.
- Timestamp
Discard bool - Discard packets with the Timestamp IP option set.
- Unknown
Option boolDiscard - Discard packets if the class and number are unknown.
- Asymmetric
Path string - Determine whether to drop or bypass packets that contain out-of-sync ACKs or out-of-window sequence numbers:
global— Use system-wide setting that is assigned through TCP Settings or the CLI.drop— Drop packets that contain an asymmetric path.bypass— Bypass scanning on packets that contain an asymmetric path.
- Description string
- The description of the profile
- Device string
- The device in which the resource is defined
- Discard
Icmp boolEmbedded Error - Discard ICMP packets that are embedded with an error message.
- Flood
Zone
Protection Profile Flood Args - Flood
- Folder string
- The folder in which the resource is defined
- Fragmented
Traffic boolDiscard - Discard fragmented IP packets.
- Icmp
Frag boolDiscard - Discard packets that consist of ICMP fragments.
- Icmp
Large boolPacket Discard - Discard ICMP packets that are larger than 1024 bytes.
- Icmp
Ping boolZero Id Discard - Discard packets if the ICMP ping packet has an identifier value of 0.
- Ipv6
Zone
Protection Profile Ipv6Args - Ipv6
- L2Sec
Group ZoneTag Protection Protection Profile L2Sec Group Tag Protection Args - L2 sec group tag protection
- Loose
Source boolRouting Discard - Discard packets with the Loose Source Routing IP option set. Loose Source Routing is an option whereby a source of a datagram provides routing information and a gateway or host is allowed to choose any route of a number of intermediate gateways to get the datagram to the next address in the route.
- Malformed
Option boolDiscard - Discard packets if they have incorrect combinations of class, number, and length based on RFCs 791, 1108, 1393, and 2113.
- Mismatched
Overlapping boolTcp Segment Discard - Drop packets with mismatched overlapping TCP segments.
- Mptcp
Option stringStrip - MPTCP is an extension of TCP that allows a client to maintain a connection by simultaneously using multiple paths to connect to the destination host. By default, MPTCP support is disabled, based on the global MPTCP setting. Review or adjust the MPTCP settings for the security zones associated with this profile:
no— Enable MPTCP support (do not strip the MPTCP option).yes— Disable MPTCP support (strip the MPTCP option). With this configured, MPTCP connections are converted to standard TCP connections, as MPTCP is backwards compatible with TCP.global— Support MPTCP based on the global MPTCP setting. By default, the global MPTCP setting is set to yes so that MPTCP is disabled (the MPTCP option is stripped from the packet).
- Name string
- The profile name
- Non
Ip ZoneProtocol Protection Profile Non Ip Protocol Args - Non ip protocol
- Record
Route boolDiscard - Discard packets with the Record Route IP option set. When a datagram has this option, each router that routes the datagram adds its own IP address to the header, thus providing the path to the recipient.
- Reject
Non stringSyn Tcp - Determine whether to reject the packet if the first packet for the TCP session setup is not a SYN packet:
global— Use system-wide setting that is assigned through the CLI.yes— Reject non-SYN TCP.no— Accept non-SYN TCP.
- Scan
White []ZoneLists Protection Profile Scan White List Args - Scan white list
- Scans
[]Zone
Protection Profile Scan Args - Scan
- Security
Discard bool - Discard packets if the security option is defined.
- Snippet string
- The snippet in which the resource is defined
- Spoofed
Ip boolDiscard - Check that the source IP address of the ingress packet is routable and the routing interface is in the same zone as the ingress interface. If either condition is not true, discard the packet.
- Stream
Id boolDiscard - Discard packets if the Stream ID option is defined.
- Strict
Ip boolCheck - Check that both conditions are true:
- The source IP address is not the subnet broadcast IP address of the ingress interface.
- The source IP address is routable over the exact ingress interface. If either condition is not true, discard the packet.
- Strict
Source boolRouting Discard - Discard packets with the Strict Source Routing IP option set. Strict Source Routing is an option whereby a source of a datagram provides routing information through which a gateway or host must send the datagram.
- Suppress
Icmp boolNeedfrag - Stop sending ICMP fragmentation needed messages in response to packets that exceed the interface MTU and have the do not fragment (DF) bit set. This setting will interfere with the PMTUD process performed by hosts behind the firewall.
- Suppress
Icmp boolTimeexceeded - Stop sending ICMP TTL expired messages.
- Tcp
Fast boolOpen And Data Strip - Strip the TCP Fast Open option (and data payload, if any) from the TCP SYN or SYN-ACK packet during a TCP three-way handshake.
- Tcp
Handshake boolDiscard - Drop packets with split handshakes.
- Tcp
Syn boolWith Data Discard - Prevent a TCP session from being established if the TCP SYN packet contains data during a three-way handshake.
- Tcp
Synack boolWith Data Discard - Prevent a TCP session from being established if the TCP SYN-ACK packet contains data during a three-way handshake.
- Tcp
Timestamp boolStrip - Determine whether the packet has a TCP timestamp in the header and, if it does, strip the timestamp from the header.
- Timestamp
Discard bool - Discard packets with the Timestamp IP option set.
- Unknown
Option boolDiscard - Discard packets if the class and number are unknown.
- asymmetric
Path String - Determine whether to drop or bypass packets that contain out-of-sync ACKs or out-of-window sequence numbers:
global— Use system-wide setting that is assigned through TCP Settings or the CLI.drop— Drop packets that contain an asymmetric path.bypass— Bypass scanning on packets that contain an asymmetric path.
- description String
- The description of the profile
- device String
- The device in which the resource is defined
- discard
Icmp BooleanEmbedded Error - Discard ICMP packets that are embedded with an error message.
- flood
Zone
Protection Profile Flood - Flood
- folder String
- The folder in which the resource is defined
- fragmented
Traffic BooleanDiscard - Discard fragmented IP packets.
- icmp
Frag BooleanDiscard - Discard packets that consist of ICMP fragments.
- icmp
Large BooleanPacket Discard - Discard ICMP packets that are larger than 1024 bytes.
- icmp
Ping BooleanZero Id Discard - Discard packets if the ICMP ping packet has an identifier value of 0.
- ipv6
Zone
Protection Profile Ipv6 - Ipv6
- l2Sec
Group ZoneTag Protection Protection Profile L2Sec Group Tag Protection - L2 sec group tag protection
- loose
Source BooleanRouting Discard - Discard packets with the Loose Source Routing IP option set. Loose Source Routing is an option whereby a source of a datagram provides routing information and a gateway or host is allowed to choose any route of a number of intermediate gateways to get the datagram to the next address in the route.
- malformed
Option BooleanDiscard - Discard packets if they have incorrect combinations of class, number, and length based on RFCs 791, 1108, 1393, and 2113.
- mismatched
Overlapping BooleanTcp Segment Discard - Drop packets with mismatched overlapping TCP segments.
- mptcp
Option StringStrip - MPTCP is an extension of TCP that allows a client to maintain a connection by simultaneously using multiple paths to connect to the destination host. By default, MPTCP support is disabled, based on the global MPTCP setting. Review or adjust the MPTCP settings for the security zones associated with this profile:
no— Enable MPTCP support (do not strip the MPTCP option).yes— Disable MPTCP support (strip the MPTCP option). With this configured, MPTCP connections are converted to standard TCP connections, as MPTCP is backwards compatible with TCP.global— Support MPTCP based on the global MPTCP setting. By default, the global MPTCP setting is set to yes so that MPTCP is disabled (the MPTCP option is stripped from the packet).
- name String
- The profile name
- non
Ip ZoneProtocol Protection Profile Non Ip Protocol - Non ip protocol
- record
Route BooleanDiscard - Discard packets with the Record Route IP option set. When a datagram has this option, each router that routes the datagram adds its own IP address to the header, thus providing the path to the recipient.
- reject
Non StringSyn Tcp - Determine whether to reject the packet if the first packet for the TCP session setup is not a SYN packet:
global— Use system-wide setting that is assigned through the CLI.yes— Reject non-SYN TCP.no— Accept non-SYN TCP.
- scan
White List<ZoneLists Protection Profile Scan White List> - Scan white list
- scans
List<Zone
Protection Profile Scan> - Scan
- security
Discard Boolean - Discard packets if the security option is defined.
- snippet String
- The snippet in which the resource is defined
- spoofed
Ip BooleanDiscard - Check that the source IP address of the ingress packet is routable and the routing interface is in the same zone as the ingress interface. If either condition is not true, discard the packet.
- stream
Id BooleanDiscard - Discard packets if the Stream ID option is defined.
- strict
Ip BooleanCheck - Check that both conditions are true:
- The source IP address is not the subnet broadcast IP address of the ingress interface.
- The source IP address is routable over the exact ingress interface. If either condition is not true, discard the packet.
- strict
Source BooleanRouting Discard - Discard packets with the Strict Source Routing IP option set. Strict Source Routing is an option whereby a source of a datagram provides routing information through which a gateway or host must send the datagram.
- suppress
Icmp BooleanNeedfrag - Stop sending ICMP fragmentation needed messages in response to packets that exceed the interface MTU and have the do not fragment (DF) bit set. This setting will interfere with the PMTUD process performed by hosts behind the firewall.
- suppress
Icmp BooleanTimeexceeded - Stop sending ICMP TTL expired messages.
- tcp
Fast BooleanOpen And Data Strip - Strip the TCP Fast Open option (and data payload, if any) from the TCP SYN or SYN-ACK packet during a TCP three-way handshake.
- tcp
Handshake BooleanDiscard - Drop packets with split handshakes.
- tcp
Syn BooleanWith Data Discard - Prevent a TCP session from being established if the TCP SYN packet contains data during a three-way handshake.
- tcp
Synack BooleanWith Data Discard - Prevent a TCP session from being established if the TCP SYN-ACK packet contains data during a three-way handshake.
- tcp
Timestamp BooleanStrip - Determine whether the packet has a TCP timestamp in the header and, if it does, strip the timestamp from the header.
- timestamp
Discard Boolean - Discard packets with the Timestamp IP option set.
- unknown
Option BooleanDiscard - Discard packets if the class and number are unknown.
- asymmetric
Path string - Determine whether to drop or bypass packets that contain out-of-sync ACKs or out-of-window sequence numbers:
global— Use system-wide setting that is assigned through TCP Settings or the CLI.drop— Drop packets that contain an asymmetric path.bypass— Bypass scanning on packets that contain an asymmetric path.
- description string
- The description of the profile
- device string
- The device in which the resource is defined
- discard
Icmp booleanEmbedded Error - Discard ICMP packets that are embedded with an error message.
- flood
Zone
Protection Profile Flood - Flood
- folder string
- The folder in which the resource is defined
- fragmented
Traffic booleanDiscard - Discard fragmented IP packets.
- icmp
Frag booleanDiscard - Discard packets that consist of ICMP fragments.
- icmp
Large booleanPacket Discard - Discard ICMP packets that are larger than 1024 bytes.
- icmp
Ping booleanZero Id Discard - Discard packets if the ICMP ping packet has an identifier value of 0.
- ipv6
Zone
Protection Profile Ipv6 - Ipv6
- l2Sec
Group ZoneTag Protection Protection Profile L2Sec Group Tag Protection - L2 sec group tag protection
- loose
Source booleanRouting Discard - Discard packets with the Loose Source Routing IP option set. Loose Source Routing is an option whereby a source of a datagram provides routing information and a gateway or host is allowed to choose any route of a number of intermediate gateways to get the datagram to the next address in the route.
- malformed
Option booleanDiscard - Discard packets if they have incorrect combinations of class, number, and length based on RFCs 791, 1108, 1393, and 2113.
- mismatched
Overlapping booleanTcp Segment Discard - Drop packets with mismatched overlapping TCP segments.
- mptcp
Option stringStrip - MPTCP is an extension of TCP that allows a client to maintain a connection by simultaneously using multiple paths to connect to the destination host. By default, MPTCP support is disabled, based on the global MPTCP setting. Review or adjust the MPTCP settings for the security zones associated with this profile:
no— Enable MPTCP support (do not strip the MPTCP option).yes— Disable MPTCP support (strip the MPTCP option). With this configured, MPTCP connections are converted to standard TCP connections, as MPTCP is backwards compatible with TCP.global— Support MPTCP based on the global MPTCP setting. By default, the global MPTCP setting is set to yes so that MPTCP is disabled (the MPTCP option is stripped from the packet).
- name string
- The profile name
- non
Ip ZoneProtocol Protection Profile Non Ip Protocol - Non ip protocol
- record
Route booleanDiscard - Discard packets with the Record Route IP option set. When a datagram has this option, each router that routes the datagram adds its own IP address to the header, thus providing the path to the recipient.
- reject
Non stringSyn Tcp - Determine whether to reject the packet if the first packet for the TCP session setup is not a SYN packet:
global— Use system-wide setting that is assigned through the CLI.yes— Reject non-SYN TCP.no— Accept non-SYN TCP.
- scan
White ZoneLists Protection Profile Scan White List[] - Scan white list
- scans
Zone
Protection Profile Scan[] - Scan
- security
Discard boolean - Discard packets if the security option is defined.
- snippet string
- The snippet in which the resource is defined
- spoofed
Ip booleanDiscard - Check that the source IP address of the ingress packet is routable and the routing interface is in the same zone as the ingress interface. If either condition is not true, discard the packet.
- stream
Id booleanDiscard - Discard packets if the Stream ID option is defined.
- strict
Ip booleanCheck - Check that both conditions are true:
- The source IP address is not the subnet broadcast IP address of the ingress interface.
- The source IP address is routable over the exact ingress interface. If either condition is not true, discard the packet.
- strict
Source booleanRouting Discard - Discard packets with the Strict Source Routing IP option set. Strict Source Routing is an option whereby a source of a datagram provides routing information through which a gateway or host must send the datagram.
- suppress
Icmp booleanNeedfrag - Stop sending ICMP fragmentation needed messages in response to packets that exceed the interface MTU and have the do not fragment (DF) bit set. This setting will interfere with the PMTUD process performed by hosts behind the firewall.
- suppress
Icmp booleanTimeexceeded - Stop sending ICMP TTL expired messages.
- tcp
Fast booleanOpen And Data Strip - Strip the TCP Fast Open option (and data payload, if any) from the TCP SYN or SYN-ACK packet during a TCP three-way handshake.
- tcp
Handshake booleanDiscard - Drop packets with split handshakes.
- tcp
Syn booleanWith Data Discard - Prevent a TCP session from being established if the TCP SYN packet contains data during a three-way handshake.
- tcp
Synack booleanWith Data Discard - Prevent a TCP session from being established if the TCP SYN-ACK packet contains data during a three-way handshake.
- tcp
Timestamp booleanStrip - Determine whether the packet has a TCP timestamp in the header and, if it does, strip the timestamp from the header.
- timestamp
Discard boolean - Discard packets with the Timestamp IP option set.
- unknown
Option booleanDiscard - Discard packets if the class and number are unknown.
- asymmetric_
path str - Determine whether to drop or bypass packets that contain out-of-sync ACKs or out-of-window sequence numbers:
global— Use system-wide setting that is assigned through TCP Settings or the CLI.drop— Drop packets that contain an asymmetric path.bypass— Bypass scanning on packets that contain an asymmetric path.
- description str
- The description of the profile
- device str
- The device in which the resource is defined
- discard_
icmp_ boolembedded_ error - Discard ICMP packets that are embedded with an error message.
- flood
Zone
Protection Profile Flood Args - Flood
- folder str
- The folder in which the resource is defined
- fragmented_
traffic_ booldiscard - Discard fragmented IP packets.
- icmp_
frag_ booldiscard - Discard packets that consist of ICMP fragments.
- icmp_
large_ boolpacket_ discard - Discard ICMP packets that are larger than 1024 bytes.
- icmp_
ping_ boolzero_ id_ discard - Discard packets if the ICMP ping packet has an identifier value of 0.
- ipv6
Zone
Protection Profile Ipv6Args - Ipv6
- l2_
sec_ Zonegroup_ tag_ protection Protection Profile L2Sec Group Tag Protection Args - L2 sec group tag protection
- loose_
source_ boolrouting_ discard - Discard packets with the Loose Source Routing IP option set. Loose Source Routing is an option whereby a source of a datagram provides routing information and a gateway or host is allowed to choose any route of a number of intermediate gateways to get the datagram to the next address in the route.
- malformed_
option_ booldiscard - Discard packets if they have incorrect combinations of class, number, and length based on RFCs 791, 1108, 1393, and 2113.
- mismatched_
overlapping_ booltcp_ segment_ discard - Drop packets with mismatched overlapping TCP segments.
- mptcp_
option_ strstrip - MPTCP is an extension of TCP that allows a client to maintain a connection by simultaneously using multiple paths to connect to the destination host. By default, MPTCP support is disabled, based on the global MPTCP setting. Review or adjust the MPTCP settings for the security zones associated with this profile:
no— Enable MPTCP support (do not strip the MPTCP option).yes— Disable MPTCP support (strip the MPTCP option). With this configured, MPTCP connections are converted to standard TCP connections, as MPTCP is backwards compatible with TCP.global— Support MPTCP based on the global MPTCP setting. By default, the global MPTCP setting is set to yes so that MPTCP is disabled (the MPTCP option is stripped from the packet).
- name str
- The profile name
- non_
ip_ Zoneprotocol Protection Profile Non Ip Protocol Args - Non ip protocol
- record_
route_ booldiscard - Discard packets with the Record Route IP option set. When a datagram has this option, each router that routes the datagram adds its own IP address to the header, thus providing the path to the recipient.
- reject_
non_ strsyn_ tcp - Determine whether to reject the packet if the first packet for the TCP session setup is not a SYN packet:
global— Use system-wide setting that is assigned through the CLI.yes— Reject non-SYN TCP.no— Accept non-SYN TCP.
- scan_
white_ Sequence[Zonelists Protection Profile Scan White List Args] - Scan white list
- scans
Sequence[Zone
Protection Profile Scan Args] - Scan
- security_
discard bool - Discard packets if the security option is defined.
- snippet str
- The snippet in which the resource is defined
- spoofed_
ip_ booldiscard - Check that the source IP address of the ingress packet is routable and the routing interface is in the same zone as the ingress interface. If either condition is not true, discard the packet.
- stream_
id_ booldiscard - Discard packets if the Stream ID option is defined.
- strict_
ip_ boolcheck - Check that both conditions are true:
- The source IP address is not the subnet broadcast IP address of the ingress interface.
- The source IP address is routable over the exact ingress interface. If either condition is not true, discard the packet.
- strict_
source_ boolrouting_ discard - Discard packets with the Strict Source Routing IP option set. Strict Source Routing is an option whereby a source of a datagram provides routing information through which a gateway or host must send the datagram.
- suppress_
icmp_ boolneedfrag - Stop sending ICMP fragmentation needed messages in response to packets that exceed the interface MTU and have the do not fragment (DF) bit set. This setting will interfere with the PMTUD process performed by hosts behind the firewall.
- suppress_
icmp_ booltimeexceeded - Stop sending ICMP TTL expired messages.
- tcp_
fast_ boolopen_ and_ data_ strip - Strip the TCP Fast Open option (and data payload, if any) from the TCP SYN or SYN-ACK packet during a TCP three-way handshake.
- tcp_
handshake_ booldiscard - Drop packets with split handshakes.
- tcp_
syn_ boolwith_ data_ discard - Prevent a TCP session from being established if the TCP SYN packet contains data during a three-way handshake.
- tcp_
synack_ boolwith_ data_ discard - Prevent a TCP session from being established if the TCP SYN-ACK packet contains data during a three-way handshake.
- tcp_
timestamp_ boolstrip - Determine whether the packet has a TCP timestamp in the header and, if it does, strip the timestamp from the header.
- timestamp_
discard bool - Discard packets with the Timestamp IP option set.
- unknown_
option_ booldiscard - Discard packets if the class and number are unknown.
- asymmetric
Path String - Determine whether to drop or bypass packets that contain out-of-sync ACKs or out-of-window sequence numbers:
global— Use system-wide setting that is assigned through TCP Settings or the CLI.drop— Drop packets that contain an asymmetric path.bypass— Bypass scanning on packets that contain an asymmetric path.
- description String
- The description of the profile
- device String
- The device in which the resource is defined
- discard
Icmp BooleanEmbedded Error - Discard ICMP packets that are embedded with an error message.
- flood Property Map
- Flood
- folder String
- The folder in which the resource is defined
- fragmented
Traffic BooleanDiscard - Discard fragmented IP packets.
- icmp
Frag BooleanDiscard - Discard packets that consist of ICMP fragments.
- icmp
Large BooleanPacket Discard - Discard ICMP packets that are larger than 1024 bytes.
- icmp
Ping BooleanZero Id Discard - Discard packets if the ICMP ping packet has an identifier value of 0.
- ipv6 Property Map
- Ipv6
- l2Sec
Group Property MapTag Protection - L2 sec group tag protection
- loose
Source BooleanRouting Discard - Discard packets with the Loose Source Routing IP option set. Loose Source Routing is an option whereby a source of a datagram provides routing information and a gateway or host is allowed to choose any route of a number of intermediate gateways to get the datagram to the next address in the route.
- malformed
Option BooleanDiscard - Discard packets if they have incorrect combinations of class, number, and length based on RFCs 791, 1108, 1393, and 2113.
- mismatched
Overlapping BooleanTcp Segment Discard - Drop packets with mismatched overlapping TCP segments.
- mptcp
Option StringStrip - MPTCP is an extension of TCP that allows a client to maintain a connection by simultaneously using multiple paths to connect to the destination host. By default, MPTCP support is disabled, based on the global MPTCP setting. Review or adjust the MPTCP settings for the security zones associated with this profile:
no— Enable MPTCP support (do not strip the MPTCP option).yes— Disable MPTCP support (strip the MPTCP option). With this configured, MPTCP connections are converted to standard TCP connections, as MPTCP is backwards compatible with TCP.global— Support MPTCP based on the global MPTCP setting. By default, the global MPTCP setting is set to yes so that MPTCP is disabled (the MPTCP option is stripped from the packet).
- name String
- The profile name
- non
Ip Property MapProtocol - Non ip protocol
- record
Route BooleanDiscard - Discard packets with the Record Route IP option set. When a datagram has this option, each router that routes the datagram adds its own IP address to the header, thus providing the path to the recipient.
- reject
Non StringSyn Tcp - Determine whether to reject the packet if the first packet for the TCP session setup is not a SYN packet:
global— Use system-wide setting that is assigned through the CLI.yes— Reject non-SYN TCP.no— Accept non-SYN TCP.
- scan
White List<Property Map>Lists - Scan white list
- scans List<Property Map>
- Scan
- security
Discard Boolean - Discard packets if the security option is defined.
- snippet String
- The snippet in which the resource is defined
- spoofed
Ip BooleanDiscard - Check that the source IP address of the ingress packet is routable and the routing interface is in the same zone as the ingress interface. If either condition is not true, discard the packet.
- stream
Id BooleanDiscard - Discard packets if the Stream ID option is defined.
- strict
Ip BooleanCheck - Check that both conditions are true:
- The source IP address is not the subnet broadcast IP address of the ingress interface.
- The source IP address is routable over the exact ingress interface. If either condition is not true, discard the packet.
- strict
Source BooleanRouting Discard - Discard packets with the Strict Source Routing IP option set. Strict Source Routing is an option whereby a source of a datagram provides routing information through which a gateway or host must send the datagram.
- suppress
Icmp BooleanNeedfrag - Stop sending ICMP fragmentation needed messages in response to packets that exceed the interface MTU and have the do not fragment (DF) bit set. This setting will interfere with the PMTUD process performed by hosts behind the firewall.
- suppress
Icmp BooleanTimeexceeded - Stop sending ICMP TTL expired messages.
- tcp
Fast BooleanOpen And Data Strip - Strip the TCP Fast Open option (and data payload, if any) from the TCP SYN or SYN-ACK packet during a TCP three-way handshake.
- tcp
Handshake BooleanDiscard - Drop packets with split handshakes.
- tcp
Syn BooleanWith Data Discard - Prevent a TCP session from being established if the TCP SYN packet contains data during a three-way handshake.
- tcp
Synack BooleanWith Data Discard - Prevent a TCP session from being established if the TCP SYN-ACK packet contains data during a three-way handshake.
- tcp
Timestamp BooleanStrip - Determine whether the packet has a TCP timestamp in the header and, if it does, strip the timestamp from the header.
- timestamp
Discard Boolean - Discard packets with the Timestamp IP option set.
- unknown
Option BooleanDiscard - Discard packets if the class and number are unknown.
Outputs
All input properties are implicitly available as output properties. Additionally, the ZoneProtectionProfile resource produces the following output properties:
Look up Existing ZoneProtectionProfile Resource
Get an existing ZoneProtectionProfile resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: ZoneProtectionProfileState, opts?: CustomResourceOptions): ZoneProtectionProfile@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
asymmetric_path: Optional[str] = None,
description: Optional[str] = None,
device: Optional[str] = None,
discard_icmp_embedded_error: Optional[bool] = None,
flood: Optional[ZoneProtectionProfileFloodArgs] = None,
folder: Optional[str] = None,
fragmented_traffic_discard: Optional[bool] = None,
icmp_frag_discard: Optional[bool] = None,
icmp_large_packet_discard: Optional[bool] = None,
icmp_ping_zero_id_discard: Optional[bool] = None,
ipv6: Optional[ZoneProtectionProfileIpv6Args] = None,
l2_sec_group_tag_protection: Optional[ZoneProtectionProfileL2SecGroupTagProtectionArgs] = None,
loose_source_routing_discard: Optional[bool] = None,
malformed_option_discard: Optional[bool] = None,
mismatched_overlapping_tcp_segment_discard: Optional[bool] = None,
mptcp_option_strip: Optional[str] = None,
name: Optional[str] = None,
non_ip_protocol: Optional[ZoneProtectionProfileNonIpProtocolArgs] = None,
record_route_discard: Optional[bool] = None,
reject_non_syn_tcp: Optional[str] = None,
scan_white_lists: Optional[Sequence[ZoneProtectionProfileScanWhiteListArgs]] = None,
scans: Optional[Sequence[ZoneProtectionProfileScanArgs]] = None,
security_discard: Optional[bool] = None,
snippet: Optional[str] = None,
spoofed_ip_discard: Optional[bool] = None,
stream_id_discard: Optional[bool] = None,
strict_ip_check: Optional[bool] = None,
strict_source_routing_discard: Optional[bool] = None,
suppress_icmp_needfrag: Optional[bool] = None,
suppress_icmp_timeexceeded: Optional[bool] = None,
tcp_fast_open_and_data_strip: Optional[bool] = None,
tcp_handshake_discard: Optional[bool] = None,
tcp_syn_with_data_discard: Optional[bool] = None,
tcp_synack_with_data_discard: Optional[bool] = None,
tcp_timestamp_strip: Optional[bool] = None,
tfid: Optional[str] = None,
timestamp_discard: Optional[bool] = None,
unknown_option_discard: Optional[bool] = None) -> ZoneProtectionProfilefunc GetZoneProtectionProfile(ctx *Context, name string, id IDInput, state *ZoneProtectionProfileState, opts ...ResourceOption) (*ZoneProtectionProfile, error)public static ZoneProtectionProfile Get(string name, Input<string> id, ZoneProtectionProfileState? state, CustomResourceOptions? opts = null)public static ZoneProtectionProfile get(String name, Output<String> id, ZoneProtectionProfileState state, CustomResourceOptions options)resources: _: type: scm:ZoneProtectionProfile get: id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Asymmetric
Path string - Determine whether to drop or bypass packets that contain out-of-sync ACKs or out-of-window sequence numbers:
global— Use system-wide setting that is assigned through TCP Settings or the CLI.drop— Drop packets that contain an asymmetric path.bypass— Bypass scanning on packets that contain an asymmetric path.
- Description string
- The description of the profile
- Device string
- The device in which the resource is defined
- Discard
Icmp boolEmbedded Error - Discard ICMP packets that are embedded with an error message.
- Flood
Zone
Protection Profile Flood - Flood
- Folder string
- The folder in which the resource is defined
- Fragmented
Traffic boolDiscard - Discard fragmented IP packets.
- Icmp
Frag boolDiscard - Discard packets that consist of ICMP fragments.
- Icmp
Large boolPacket Discard - Discard ICMP packets that are larger than 1024 bytes.
- Icmp
Ping boolZero Id Discard - Discard packets if the ICMP ping packet has an identifier value of 0.
- Ipv6
Zone
Protection Profile Ipv6 - Ipv6
- L2Sec
Group ZoneTag Protection Protection Profile L2Sec Group Tag Protection - L2 sec group tag protection
- Loose
Source boolRouting Discard - Discard packets with the Loose Source Routing IP option set. Loose Source Routing is an option whereby a source of a datagram provides routing information and a gateway or host is allowed to choose any route of a number of intermediate gateways to get the datagram to the next address in the route.
- Malformed
Option boolDiscard - Discard packets if they have incorrect combinations of class, number, and length based on RFCs 791, 1108, 1393, and 2113.
- Mismatched
Overlapping boolTcp Segment Discard - Drop packets with mismatched overlapping TCP segments.
- Mptcp
Option stringStrip - MPTCP is an extension of TCP that allows a client to maintain a connection by simultaneously using multiple paths to connect to the destination host. By default, MPTCP support is disabled, based on the global MPTCP setting. Review or adjust the MPTCP settings for the security zones associated with this profile:
no— Enable MPTCP support (do not strip the MPTCP option).yes— Disable MPTCP support (strip the MPTCP option). With this configured, MPTCP connections are converted to standard TCP connections, as MPTCP is backwards compatible with TCP.global— Support MPTCP based on the global MPTCP setting. By default, the global MPTCP setting is set to yes so that MPTCP is disabled (the MPTCP option is stripped from the packet).
- Name string
- The profile name
- Non
Ip ZoneProtocol Protection Profile Non Ip Protocol - Non ip protocol
- Record
Route boolDiscard - Discard packets with the Record Route IP option set. When a datagram has this option, each router that routes the datagram adds its own IP address to the header, thus providing the path to the recipient.
- Reject
Non stringSyn Tcp - Determine whether to reject the packet if the first packet for the TCP session setup is not a SYN packet:
global— Use system-wide setting that is assigned through the CLI.yes— Reject non-SYN TCP.no— Accept non-SYN TCP.
- Scan
White List<ZoneLists Protection Profile Scan White List> - Scan white list
- Scans
List<Zone
Protection Profile Scan> - Scan
- Security
Discard bool - Discard packets if the security option is defined.
- Snippet string
- The snippet in which the resource is defined
- Spoofed
Ip boolDiscard - Check that the source IP address of the ingress packet is routable and the routing interface is in the same zone as the ingress interface. If either condition is not true, discard the packet.
- Stream
Id boolDiscard - Discard packets if the Stream ID option is defined.
- Strict
Ip boolCheck - Check that both conditions are true:
- The source IP address is not the subnet broadcast IP address of the ingress interface.
- The source IP address is routable over the exact ingress interface. If either condition is not true, discard the packet.
- Strict
Source boolRouting Discard - Discard packets with the Strict Source Routing IP option set. Strict Source Routing is an option whereby a source of a datagram provides routing information through which a gateway or host must send the datagram.
- Suppress
Icmp boolNeedfrag - Stop sending ICMP fragmentation needed messages in response to packets that exceed the interface MTU and have the do not fragment (DF) bit set. This setting will interfere with the PMTUD process performed by hosts behind the firewall.
- Suppress
Icmp boolTimeexceeded - Stop sending ICMP TTL expired messages.
- Tcp
Fast boolOpen And Data Strip - Strip the TCP Fast Open option (and data payload, if any) from the TCP SYN or SYN-ACK packet during a TCP three-way handshake.
- Tcp
Handshake boolDiscard - Drop packets with split handshakes.
- Tcp
Syn boolWith Data Discard - Prevent a TCP session from being established if the TCP SYN packet contains data during a three-way handshake.
- Tcp
Synack boolWith Data Discard - Prevent a TCP session from being established if the TCP SYN-ACK packet contains data during a three-way handshake.
- Tcp
Timestamp boolStrip - Determine whether the packet has a TCP timestamp in the header and, if it does, strip the timestamp from the header.
- Tfid string
- Timestamp
Discard bool - Discard packets with the Timestamp IP option set.
- Unknown
Option boolDiscard - Discard packets if the class and number are unknown.
- Asymmetric
Path string - Determine whether to drop or bypass packets that contain out-of-sync ACKs or out-of-window sequence numbers:
global— Use system-wide setting that is assigned through TCP Settings or the CLI.drop— Drop packets that contain an asymmetric path.bypass— Bypass scanning on packets that contain an asymmetric path.
- Description string
- The description of the profile
- Device string
- The device in which the resource is defined
- Discard
Icmp boolEmbedded Error - Discard ICMP packets that are embedded with an error message.
- Flood
Zone
Protection Profile Flood Args - Flood
- Folder string
- The folder in which the resource is defined
- Fragmented
Traffic boolDiscard - Discard fragmented IP packets.
- Icmp
Frag boolDiscard - Discard packets that consist of ICMP fragments.
- Icmp
Large boolPacket Discard - Discard ICMP packets that are larger than 1024 bytes.
- Icmp
Ping boolZero Id Discard - Discard packets if the ICMP ping packet has an identifier value of 0.
- Ipv6
Zone
Protection Profile Ipv6Args - Ipv6
- L2Sec
Group ZoneTag Protection Protection Profile L2Sec Group Tag Protection Args - L2 sec group tag protection
- Loose
Source boolRouting Discard - Discard packets with the Loose Source Routing IP option set. Loose Source Routing is an option whereby a source of a datagram provides routing information and a gateway or host is allowed to choose any route of a number of intermediate gateways to get the datagram to the next address in the route.
- Malformed
Option boolDiscard - Discard packets if they have incorrect combinations of class, number, and length based on RFCs 791, 1108, 1393, and 2113.
- Mismatched
Overlapping boolTcp Segment Discard - Drop packets with mismatched overlapping TCP segments.
- Mptcp
Option stringStrip - MPTCP is an extension of TCP that allows a client to maintain a connection by simultaneously using multiple paths to connect to the destination host. By default, MPTCP support is disabled, based on the global MPTCP setting. Review or adjust the MPTCP settings for the security zones associated with this profile:
no— Enable MPTCP support (do not strip the MPTCP option).yes— Disable MPTCP support (strip the MPTCP option). With this configured, MPTCP connections are converted to standard TCP connections, as MPTCP is backwards compatible with TCP.global— Support MPTCP based on the global MPTCP setting. By default, the global MPTCP setting is set to yes so that MPTCP is disabled (the MPTCP option is stripped from the packet).
- Name string
- The profile name
- Non
Ip ZoneProtocol Protection Profile Non Ip Protocol Args - Non ip protocol
- Record
Route boolDiscard - Discard packets with the Record Route IP option set. When a datagram has this option, each router that routes the datagram adds its own IP address to the header, thus providing the path to the recipient.
- Reject
Non stringSyn Tcp - Determine whether to reject the packet if the first packet for the TCP session setup is not a SYN packet:
global— Use system-wide setting that is assigned through the CLI.yes— Reject non-SYN TCP.no— Accept non-SYN TCP.
- Scan
White []ZoneLists Protection Profile Scan White List Args - Scan white list
- Scans
[]Zone
Protection Profile Scan Args - Scan
- Security
Discard bool - Discard packets if the security option is defined.
- Snippet string
- The snippet in which the resource is defined
- Spoofed
Ip boolDiscard - Check that the source IP address of the ingress packet is routable and the routing interface is in the same zone as the ingress interface. If either condition is not true, discard the packet.
- Stream
Id boolDiscard - Discard packets if the Stream ID option is defined.
- Strict
Ip boolCheck - Check that both conditions are true:
- The source IP address is not the subnet broadcast IP address of the ingress interface.
- The source IP address is routable over the exact ingress interface. If either condition is not true, discard the packet.
- Strict
Source boolRouting Discard - Discard packets with the Strict Source Routing IP option set. Strict Source Routing is an option whereby a source of a datagram provides routing information through which a gateway or host must send the datagram.
- Suppress
Icmp boolNeedfrag - Stop sending ICMP fragmentation needed messages in response to packets that exceed the interface MTU and have the do not fragment (DF) bit set. This setting will interfere with the PMTUD process performed by hosts behind the firewall.
- Suppress
Icmp boolTimeexceeded - Stop sending ICMP TTL expired messages.
- Tcp
Fast boolOpen And Data Strip - Strip the TCP Fast Open option (and data payload, if any) from the TCP SYN or SYN-ACK packet during a TCP three-way handshake.
- Tcp
Handshake boolDiscard - Drop packets with split handshakes.
- Tcp
Syn boolWith Data Discard - Prevent a TCP session from being established if the TCP SYN packet contains data during a three-way handshake.
- Tcp
Synack boolWith Data Discard - Prevent a TCP session from being established if the TCP SYN-ACK packet contains data during a three-way handshake.
- Tcp
Timestamp boolStrip - Determine whether the packet has a TCP timestamp in the header and, if it does, strip the timestamp from the header.
- Tfid string
- Timestamp
Discard bool - Discard packets with the Timestamp IP option set.
- Unknown
Option boolDiscard - Discard packets if the class and number are unknown.
- asymmetric
Path String - Determine whether to drop or bypass packets that contain out-of-sync ACKs or out-of-window sequence numbers:
global— Use system-wide setting that is assigned through TCP Settings or the CLI.drop— Drop packets that contain an asymmetric path.bypass— Bypass scanning on packets that contain an asymmetric path.
- description String
- The description of the profile
- device String
- The device in which the resource is defined
- discard
Icmp BooleanEmbedded Error - Discard ICMP packets that are embedded with an error message.
- flood
Zone
Protection Profile Flood - Flood
- folder String
- The folder in which the resource is defined
- fragmented
Traffic BooleanDiscard - Discard fragmented IP packets.
- icmp
Frag BooleanDiscard - Discard packets that consist of ICMP fragments.
- icmp
Large BooleanPacket Discard - Discard ICMP packets that are larger than 1024 bytes.
- icmp
Ping BooleanZero Id Discard - Discard packets if the ICMP ping packet has an identifier value of 0.
- ipv6
Zone
Protection Profile Ipv6 - Ipv6
- l2Sec
Group ZoneTag Protection Protection Profile L2Sec Group Tag Protection - L2 sec group tag protection
- loose
Source BooleanRouting Discard - Discard packets with the Loose Source Routing IP option set. Loose Source Routing is an option whereby a source of a datagram provides routing information and a gateway or host is allowed to choose any route of a number of intermediate gateways to get the datagram to the next address in the route.
- malformed
Option BooleanDiscard - Discard packets if they have incorrect combinations of class, number, and length based on RFCs 791, 1108, 1393, and 2113.
- mismatched
Overlapping BooleanTcp Segment Discard - Drop packets with mismatched overlapping TCP segments.
- mptcp
Option StringStrip - MPTCP is an extension of TCP that allows a client to maintain a connection by simultaneously using multiple paths to connect to the destination host. By default, MPTCP support is disabled, based on the global MPTCP setting. Review or adjust the MPTCP settings for the security zones associated with this profile:
no— Enable MPTCP support (do not strip the MPTCP option).yes— Disable MPTCP support (strip the MPTCP option). With this configured, MPTCP connections are converted to standard TCP connections, as MPTCP is backwards compatible with TCP.global— Support MPTCP based on the global MPTCP setting. By default, the global MPTCP setting is set to yes so that MPTCP is disabled (the MPTCP option is stripped from the packet).
- name String
- The profile name
- non
Ip ZoneProtocol Protection Profile Non Ip Protocol - Non ip protocol
- record
Route BooleanDiscard - Discard packets with the Record Route IP option set. When a datagram has this option, each router that routes the datagram adds its own IP address to the header, thus providing the path to the recipient.
- reject
Non StringSyn Tcp - Determine whether to reject the packet if the first packet for the TCP session setup is not a SYN packet:
global— Use system-wide setting that is assigned through the CLI.yes— Reject non-SYN TCP.no— Accept non-SYN TCP.
- scan
White List<ZoneLists Protection Profile Scan White List> - Scan white list
- scans
List<Zone
Protection Profile Scan> - Scan
- security
Discard Boolean - Discard packets if the security option is defined.
- snippet String
- The snippet in which the resource is defined
- spoofed
Ip BooleanDiscard - Check that the source IP address of the ingress packet is routable and the routing interface is in the same zone as the ingress interface. If either condition is not true, discard the packet.
- stream
Id BooleanDiscard - Discard packets if the Stream ID option is defined.
- strict
Ip BooleanCheck - Check that both conditions are true:
- The source IP address is not the subnet broadcast IP address of the ingress interface.
- The source IP address is routable over the exact ingress interface. If either condition is not true, discard the packet.
- strict
Source BooleanRouting Discard - Discard packets with the Strict Source Routing IP option set. Strict Source Routing is an option whereby a source of a datagram provides routing information through which a gateway or host must send the datagram.
- suppress
Icmp BooleanNeedfrag - Stop sending ICMP fragmentation needed messages in response to packets that exceed the interface MTU and have the do not fragment (DF) bit set. This setting will interfere with the PMTUD process performed by hosts behind the firewall.
- suppress
Icmp BooleanTimeexceeded - Stop sending ICMP TTL expired messages.
- tcp
Fast BooleanOpen And Data Strip - Strip the TCP Fast Open option (and data payload, if any) from the TCP SYN or SYN-ACK packet during a TCP three-way handshake.
- tcp
Handshake BooleanDiscard - Drop packets with split handshakes.
- tcp
Syn BooleanWith Data Discard - Prevent a TCP session from being established if the TCP SYN packet contains data during a three-way handshake.
- tcp
Synack BooleanWith Data Discard - Prevent a TCP session from being established if the TCP SYN-ACK packet contains data during a three-way handshake.
- tcp
Timestamp BooleanStrip - Determine whether the packet has a TCP timestamp in the header and, if it does, strip the timestamp from the header.
- tfid String
- timestamp
Discard Boolean - Discard packets with the Timestamp IP option set.
- unknown
Option BooleanDiscard - Discard packets if the class and number are unknown.
- asymmetric
Path string - Determine whether to drop or bypass packets that contain out-of-sync ACKs or out-of-window sequence numbers:
global— Use system-wide setting that is assigned through TCP Settings or the CLI.drop— Drop packets that contain an asymmetric path.bypass— Bypass scanning on packets that contain an asymmetric path.
- description string
- The description of the profile
- device string
- The device in which the resource is defined
- discard
Icmp booleanEmbedded Error - Discard ICMP packets that are embedded with an error message.
- flood
Zone
Protection Profile Flood - Flood
- folder string
- The folder in which the resource is defined
- fragmented
Traffic booleanDiscard - Discard fragmented IP packets.
- icmp
Frag booleanDiscard - Discard packets that consist of ICMP fragments.
- icmp
Large booleanPacket Discard - Discard ICMP packets that are larger than 1024 bytes.
- icmp
Ping booleanZero Id Discard - Discard packets if the ICMP ping packet has an identifier value of 0.
- ipv6
Zone
Protection Profile Ipv6 - Ipv6
- l2Sec
Group ZoneTag Protection Protection Profile L2Sec Group Tag Protection - L2 sec group tag protection
- loose
Source booleanRouting Discard - Discard packets with the Loose Source Routing IP option set. Loose Source Routing is an option whereby a source of a datagram provides routing information and a gateway or host is allowed to choose any route of a number of intermediate gateways to get the datagram to the next address in the route.
- malformed
Option booleanDiscard - Discard packets if they have incorrect combinations of class, number, and length based on RFCs 791, 1108, 1393, and 2113.
- mismatched
Overlapping booleanTcp Segment Discard - Drop packets with mismatched overlapping TCP segments.
- mptcp
Option stringStrip - MPTCP is an extension of TCP that allows a client to maintain a connection by simultaneously using multiple paths to connect to the destination host. By default, MPTCP support is disabled, based on the global MPTCP setting. Review or adjust the MPTCP settings for the security zones associated with this profile:
no— Enable MPTCP support (do not strip the MPTCP option).yes— Disable MPTCP support (strip the MPTCP option). With this configured, MPTCP connections are converted to standard TCP connections, as MPTCP is backwards compatible with TCP.global— Support MPTCP based on the global MPTCP setting. By default, the global MPTCP setting is set to yes so that MPTCP is disabled (the MPTCP option is stripped from the packet).
- name string
- The profile name
- non
Ip ZoneProtocol Protection Profile Non Ip Protocol - Non ip protocol
- record
Route booleanDiscard - Discard packets with the Record Route IP option set. When a datagram has this option, each router that routes the datagram adds its own IP address to the header, thus providing the path to the recipient.
- reject
Non stringSyn Tcp - Determine whether to reject the packet if the first packet for the TCP session setup is not a SYN packet:
global— Use system-wide setting that is assigned through the CLI.yes— Reject non-SYN TCP.no— Accept non-SYN TCP.
- scan
White ZoneLists Protection Profile Scan White List[] - Scan white list
- scans
Zone
Protection Profile Scan[] - Scan
- security
Discard boolean - Discard packets if the security option is defined.
- snippet string
- The snippet in which the resource is defined
- spoofed
Ip booleanDiscard - Check that the source IP address of the ingress packet is routable and the routing interface is in the same zone as the ingress interface. If either condition is not true, discard the packet.
- stream
Id booleanDiscard - Discard packets if the Stream ID option is defined.
- strict
Ip booleanCheck - Check that both conditions are true:
- The source IP address is not the subnet broadcast IP address of the ingress interface.
- The source IP address is routable over the exact ingress interface. If either condition is not true, discard the packet.
- strict
Source booleanRouting Discard - Discard packets with the Strict Source Routing IP option set. Strict Source Routing is an option whereby a source of a datagram provides routing information through which a gateway or host must send the datagram.
- suppress
Icmp booleanNeedfrag - Stop sending ICMP fragmentation needed messages in response to packets that exceed the interface MTU and have the do not fragment (DF) bit set. This setting will interfere with the PMTUD process performed by hosts behind the firewall.
- suppress
Icmp booleanTimeexceeded - Stop sending ICMP TTL expired messages.
- tcp
Fast booleanOpen And Data Strip - Strip the TCP Fast Open option (and data payload, if any) from the TCP SYN or SYN-ACK packet during a TCP three-way handshake.
- tcp
Handshake booleanDiscard - Drop packets with split handshakes.
- tcp
Syn booleanWith Data Discard - Prevent a TCP session from being established if the TCP SYN packet contains data during a three-way handshake.
- tcp
Synack booleanWith Data Discard - Prevent a TCP session from being established if the TCP SYN-ACK packet contains data during a three-way handshake.
- tcp
Timestamp booleanStrip - Determine whether the packet has a TCP timestamp in the header and, if it does, strip the timestamp from the header.
- tfid string
- timestamp
Discard boolean - Discard packets with the Timestamp IP option set.
- unknown
Option booleanDiscard - Discard packets if the class and number are unknown.
- asymmetric_
path str - Determine whether to drop or bypass packets that contain out-of-sync ACKs or out-of-window sequence numbers:
global— Use system-wide setting that is assigned through TCP Settings or the CLI.drop— Drop packets that contain an asymmetric path.bypass— Bypass scanning on packets that contain an asymmetric path.
- description str
- The description of the profile
- device str
- The device in which the resource is defined
- discard_
icmp_ boolembedded_ error - Discard ICMP packets that are embedded with an error message.
- flood
Zone
Protection Profile Flood Args - Flood
- folder str
- The folder in which the resource is defined
- fragmented_
traffic_ booldiscard - Discard fragmented IP packets.
- icmp_
frag_ booldiscard - Discard packets that consist of ICMP fragments.
- icmp_
large_ boolpacket_ discard - Discard ICMP packets that are larger than 1024 bytes.
- icmp_
ping_ boolzero_ id_ discard - Discard packets if the ICMP ping packet has an identifier value of 0.
- ipv6
Zone
Protection Profile Ipv6Args - Ipv6
- l2_
sec_ Zonegroup_ tag_ protection Protection Profile L2Sec Group Tag Protection Args - L2 sec group tag protection
- loose_
source_ boolrouting_ discard - Discard packets with the Loose Source Routing IP option set. Loose Source Routing is an option whereby a source of a datagram provides routing information and a gateway or host is allowed to choose any route of a number of intermediate gateways to get the datagram to the next address in the route.
- malformed_
option_ booldiscard - Discard packets if they have incorrect combinations of class, number, and length based on RFCs 791, 1108, 1393, and 2113.
- mismatched_
overlapping_ booltcp_ segment_ discard - Drop packets with mismatched overlapping TCP segments.
- mptcp_
option_ strstrip - MPTCP is an extension of TCP that allows a client to maintain a connection by simultaneously using multiple paths to connect to the destination host. By default, MPTCP support is disabled, based on the global MPTCP setting. Review or adjust the MPTCP settings for the security zones associated with this profile:
no— Enable MPTCP support (do not strip the MPTCP option).yes— Disable MPTCP support (strip the MPTCP option). With this configured, MPTCP connections are converted to standard TCP connections, as MPTCP is backwards compatible with TCP.global— Support MPTCP based on the global MPTCP setting. By default, the global MPTCP setting is set to yes so that MPTCP is disabled (the MPTCP option is stripped from the packet).
- name str
- The profile name
- non_
ip_ Zoneprotocol Protection Profile Non Ip Protocol Args - Non ip protocol
- record_
route_ booldiscard - Discard packets with the Record Route IP option set. When a datagram has this option, each router that routes the datagram adds its own IP address to the header, thus providing the path to the recipient.
- reject_
non_ strsyn_ tcp - Determine whether to reject the packet if the first packet for the TCP session setup is not a SYN packet:
global— Use system-wide setting that is assigned through the CLI.yes— Reject non-SYN TCP.no— Accept non-SYN TCP.
- scan_
white_ Sequence[Zonelists Protection Profile Scan White List Args] - Scan white list
- scans
Sequence[Zone
Protection Profile Scan Args] - Scan
- security_
discard bool - Discard packets if the security option is defined.
- snippet str
- The snippet in which the resource is defined
- spoofed_
ip_ booldiscard - Check that the source IP address of the ingress packet is routable and the routing interface is in the same zone as the ingress interface. If either condition is not true, discard the packet.
- stream_
id_ booldiscard - Discard packets if the Stream ID option is defined.
- strict_
ip_ boolcheck - Check that both conditions are true:
- The source IP address is not the subnet broadcast IP address of the ingress interface.
- The source IP address is routable over the exact ingress interface. If either condition is not true, discard the packet.
- strict_
source_ boolrouting_ discard - Discard packets with the Strict Source Routing IP option set. Strict Source Routing is an option whereby a source of a datagram provides routing information through which a gateway or host must send the datagram.
- suppress_
icmp_ boolneedfrag - Stop sending ICMP fragmentation needed messages in response to packets that exceed the interface MTU and have the do not fragment (DF) bit set. This setting will interfere with the PMTUD process performed by hosts behind the firewall.
- suppress_
icmp_ booltimeexceeded - Stop sending ICMP TTL expired messages.
- tcp_
fast_ boolopen_ and_ data_ strip - Strip the TCP Fast Open option (and data payload, if any) from the TCP SYN or SYN-ACK packet during a TCP three-way handshake.
- tcp_
handshake_ booldiscard - Drop packets with split handshakes.
- tcp_
syn_ boolwith_ data_ discard - Prevent a TCP session from being established if the TCP SYN packet contains data during a three-way handshake.
- tcp_
synack_ boolwith_ data_ discard - Prevent a TCP session from being established if the TCP SYN-ACK packet contains data during a three-way handshake.
- tcp_
timestamp_ boolstrip - Determine whether the packet has a TCP timestamp in the header and, if it does, strip the timestamp from the header.
- tfid str
- timestamp_
discard bool - Discard packets with the Timestamp IP option set.
- unknown_
option_ booldiscard - Discard packets if the class and number are unknown.
- asymmetric
Path String - Determine whether to drop or bypass packets that contain out-of-sync ACKs or out-of-window sequence numbers:
global— Use system-wide setting that is assigned through TCP Settings or the CLI.drop— Drop packets that contain an asymmetric path.bypass— Bypass scanning on packets that contain an asymmetric path.
- description String
- The description of the profile
- device String
- The device in which the resource is defined
- discard
Icmp BooleanEmbedded Error - Discard ICMP packets that are embedded with an error message.
- flood Property Map
- Flood
- folder String
- The folder in which the resource is defined
- fragmented
Traffic BooleanDiscard - Discard fragmented IP packets.
- icmp
Frag BooleanDiscard - Discard packets that consist of ICMP fragments.
- icmp
Large BooleanPacket Discard - Discard ICMP packets that are larger than 1024 bytes.
- icmp
Ping BooleanZero Id Discard - Discard packets if the ICMP ping packet has an identifier value of 0.
- ipv6 Property Map
- Ipv6
- l2Sec
Group Property MapTag Protection - L2 sec group tag protection
- loose
Source BooleanRouting Discard - Discard packets with the Loose Source Routing IP option set. Loose Source Routing is an option whereby a source of a datagram provides routing information and a gateway or host is allowed to choose any route of a number of intermediate gateways to get the datagram to the next address in the route.
- malformed
Option BooleanDiscard - Discard packets if they have incorrect combinations of class, number, and length based on RFCs 791, 1108, 1393, and 2113.
- mismatched
Overlapping BooleanTcp Segment Discard - Drop packets with mismatched overlapping TCP segments.
- mptcp
Option StringStrip - MPTCP is an extension of TCP that allows a client to maintain a connection by simultaneously using multiple paths to connect to the destination host. By default, MPTCP support is disabled, based on the global MPTCP setting. Review or adjust the MPTCP settings for the security zones associated with this profile:
no— Enable MPTCP support (do not strip the MPTCP option).yes— Disable MPTCP support (strip the MPTCP option). With this configured, MPTCP connections are converted to standard TCP connections, as MPTCP is backwards compatible with TCP.global— Support MPTCP based on the global MPTCP setting. By default, the global MPTCP setting is set to yes so that MPTCP is disabled (the MPTCP option is stripped from the packet).
- name String
- The profile name
- non
Ip Property MapProtocol - Non ip protocol
- record
Route BooleanDiscard - Discard packets with the Record Route IP option set. When a datagram has this option, each router that routes the datagram adds its own IP address to the header, thus providing the path to the recipient.
- reject
Non StringSyn Tcp - Determine whether to reject the packet if the first packet for the TCP session setup is not a SYN packet:
global— Use system-wide setting that is assigned through the CLI.yes— Reject non-SYN TCP.no— Accept non-SYN TCP.
- scan
White List<Property Map>Lists - Scan white list
- scans List<Property Map>
- Scan
- security
Discard Boolean - Discard packets if the security option is defined.
- snippet String
- The snippet in which the resource is defined
- spoofed
Ip BooleanDiscard - Check that the source IP address of the ingress packet is routable and the routing interface is in the same zone as the ingress interface. If either condition is not true, discard the packet.
- stream
Id BooleanDiscard - Discard packets if the Stream ID option is defined.
- strict
Ip BooleanCheck - Check that both conditions are true:
- The source IP address is not the subnet broadcast IP address of the ingress interface.
- The source IP address is routable over the exact ingress interface. If either condition is not true, discard the packet.
- strict
Source BooleanRouting Discard - Discard packets with the Strict Source Routing IP option set. Strict Source Routing is an option whereby a source of a datagram provides routing information through which a gateway or host must send the datagram.
- suppress
Icmp BooleanNeedfrag - Stop sending ICMP fragmentation needed messages in response to packets that exceed the interface MTU and have the do not fragment (DF) bit set. This setting will interfere with the PMTUD process performed by hosts behind the firewall.
- suppress
Icmp BooleanTimeexceeded - Stop sending ICMP TTL expired messages.
- tcp
Fast BooleanOpen And Data Strip - Strip the TCP Fast Open option (and data payload, if any) from the TCP SYN or SYN-ACK packet during a TCP three-way handshake.
- tcp
Handshake BooleanDiscard - Drop packets with split handshakes.
- tcp
Syn BooleanWith Data Discard - Prevent a TCP session from being established if the TCP SYN packet contains data during a three-way handshake.
- tcp
Synack BooleanWith Data Discard - Prevent a TCP session from being established if the TCP SYN-ACK packet contains data during a three-way handshake.
- tcp
Timestamp BooleanStrip - Determine whether the packet has a TCP timestamp in the header and, if it does, strip the timestamp from the header.
- tfid String
- timestamp
Discard Boolean - Discard packets with the Timestamp IP option set.
- unknown
Option BooleanDiscard - Discard packets if the class and number are unknown.
Supporting Types
ZoneProtectionProfileFlood, ZoneProtectionProfileFloodArgs
- icmp Property Map
- Icmp
- icmpv6 Property Map
- Icmpv6
- other
Ip Property Map - Other ip
- sctp
Init Property Map - Sctp init
- tcp
Syn Property Map - Tcp syn
- udp Property Map
- Udp
ZoneProtectionProfileFloodIcmp, ZoneProtectionProfileFloodIcmpArgs
- Enable bool
- Enable protection against ICMP floods?
- Red
Zone
Protection Profile Flood Icmp Red - Red
- Enable bool
- Enable protection against ICMP floods?
- Red
Zone
Protection Profile Flood Icmp Red - Red
- enable Boolean
- Enable protection against ICMP floods?
- red
Zone
Protection Profile Flood Icmp Red - Red
- enable boolean
- Enable protection against ICMP floods?
- red
Zone
Protection Profile Flood Icmp Red - Red
- enable bool
- Enable protection against ICMP floods?
- red
Zone
Protection Profile Flood Icmp Red - Red
- enable Boolean
- Enable protection against ICMP floods?
- red Property Map
- Red
ZoneProtectionProfileFloodIcmpRed, ZoneProtectionProfileFloodIcmpRedArgs
- Activate
Rate int - The number of ICMP packets (not matching an existing session) that the zone receives per second before subsequent ICMP packets are dropped.
- Alarm
Rate int - The number of ICMP echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- Maximal
Rate int - The maximum number of ICMP packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- Activate
Rate int - The number of ICMP packets (not matching an existing session) that the zone receives per second before subsequent ICMP packets are dropped.
- Alarm
Rate int - The number of ICMP echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- Maximal
Rate int - The maximum number of ICMP packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate Integer - The number of ICMP packets (not matching an existing session) that the zone receives per second before subsequent ICMP packets are dropped.
- alarm
Rate Integer - The number of ICMP echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate Integer - The maximum number of ICMP packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate number - The number of ICMP packets (not matching an existing session) that the zone receives per second before subsequent ICMP packets are dropped.
- alarm
Rate number - The number of ICMP echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate number - The maximum number of ICMP packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate_
rate int - The number of ICMP packets (not matching an existing session) that the zone receives per second before subsequent ICMP packets are dropped.
- alarm_
rate int - The number of ICMP echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal_
rate int - The maximum number of ICMP packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate Number - The number of ICMP packets (not matching an existing session) that the zone receives per second before subsequent ICMP packets are dropped.
- alarm
Rate Number - The number of ICMP echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate Number - The maximum number of ICMP packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
ZoneProtectionProfileFloodIcmpv6, ZoneProtectionProfileFloodIcmpv6Args
- Enable bool
- Enable protection against ICMPv6 floods?
- Red
Zone
Protection Profile Flood Icmpv6Red - Red
- Enable bool
- Enable protection against ICMPv6 floods?
- Red
Zone
Protection Profile Flood Icmpv6Red - Red
- enable Boolean
- Enable protection against ICMPv6 floods?
- red
Zone
Protection Profile Flood Icmpv6Red - Red
- enable boolean
- Enable protection against ICMPv6 floods?
- red
Zone
Protection Profile Flood Icmpv6Red - Red
- enable bool
- Enable protection against ICMPv6 floods?
- red
Zone
Protection Profile Flood Icmpv6Red - Red
- enable Boolean
- Enable protection against ICMPv6 floods?
- red Property Map
- Red
ZoneProtectionProfileFloodIcmpv6Red, ZoneProtectionProfileFloodIcmpv6RedArgs
- Activate
Rate int - The number of ICMPv6 packets (not matching an existing session) that the zone receives per second before subsequent ICMPv6 packets are dropped.
- Alarm
Rate int - The number of ICMPv6 echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- Maximal
Rate int - The maximum number of ICMPv6 packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- Activate
Rate int - The number of ICMPv6 packets (not matching an existing session) that the zone receives per second before subsequent ICMPv6 packets are dropped.
- Alarm
Rate int - The number of ICMPv6 echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- Maximal
Rate int - The maximum number of ICMPv6 packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate Integer - The number of ICMPv6 packets (not matching an existing session) that the zone receives per second before subsequent ICMPv6 packets are dropped.
- alarm
Rate Integer - The number of ICMPv6 echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate Integer - The maximum number of ICMPv6 packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate number - The number of ICMPv6 packets (not matching an existing session) that the zone receives per second before subsequent ICMPv6 packets are dropped.
- alarm
Rate number - The number of ICMPv6 echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate number - The maximum number of ICMPv6 packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate_
rate int - The number of ICMPv6 packets (not matching an existing session) that the zone receives per second before subsequent ICMPv6 packets are dropped.
- alarm_
rate int - The number of ICMPv6 echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal_
rate int - The maximum number of ICMPv6 packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate Number - The number of ICMPv6 packets (not matching an existing session) that the zone receives per second before subsequent ICMPv6 packets are dropped.
- alarm
Rate Number - The number of ICMPv6 echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate Number - The maximum number of ICMPv6 packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
ZoneProtectionProfileFloodOtherIp, ZoneProtectionProfileFloodOtherIpArgs
- Enable bool
- Enable protection against other IP (non-TCP, non-ICMP, non-ICMPv6, non-SCTP, and non-UDP) floods?
- Red
Zone
Protection Profile Flood Other Ip Red - Red
- Enable bool
- Enable protection against other IP (non-TCP, non-ICMP, non-ICMPv6, non-SCTP, and non-UDP) floods?
- Red
Zone
Protection Profile Flood Other Ip Red - Red
- enable Boolean
- Enable protection against other IP (non-TCP, non-ICMP, non-ICMPv6, non-SCTP, and non-UDP) floods?
- red
Zone
Protection Profile Flood Other Ip Red - Red
- enable boolean
- Enable protection against other IP (non-TCP, non-ICMP, non-ICMPv6, non-SCTP, and non-UDP) floods?
- red
Zone
Protection Profile Flood Other Ip Red - Red
- enable bool
- Enable protection against other IP (non-TCP, non-ICMP, non-ICMPv6, non-SCTP, and non-UDP) floods?
- red
Zone
Protection Profile Flood Other Ip Red - Red
- enable Boolean
- Enable protection against other IP (non-TCP, non-ICMP, non-ICMPv6, non-SCTP, and non-UDP) floods?
- red Property Map
- Red
ZoneProtectionProfileFloodOtherIpRed, ZoneProtectionProfileFloodOtherIpRedArgs
- Activate
Rate int - Activate rate
- Alarm
Rate int - Alarm rate
- Maximal
Rate int - Maximal rate
- Activate
Rate int - Activate rate
- Alarm
Rate int - Alarm rate
- Maximal
Rate int - Maximal rate
- activate
Rate Integer - Activate rate
- alarm
Rate Integer - Alarm rate
- maximal
Rate Integer - Maximal rate
- activate
Rate number - Activate rate
- alarm
Rate number - Alarm rate
- maximal
Rate number - Maximal rate
- activate_
rate int - Activate rate
- alarm_
rate int - Alarm rate
- maximal_
rate int - Maximal rate
- activate
Rate Number - Activate rate
- alarm
Rate Number - Alarm rate
- maximal
Rate Number - Maximal rate
ZoneProtectionProfileFloodSctpInit, ZoneProtectionProfileFloodSctpInitArgs
- Enable bool
- Enable protection against floods of Stream Control Transmission Protocol (SCTP) packets that contain an Initiation (INIT) chunk?
- Red
Zone
Protection Profile Flood Sctp Init Red - Red
- Enable bool
- Enable protection against floods of Stream Control Transmission Protocol (SCTP) packets that contain an Initiation (INIT) chunk?
- Red
Zone
Protection Profile Flood Sctp Init Red - Red
- enable Boolean
- Enable protection against floods of Stream Control Transmission Protocol (SCTP) packets that contain an Initiation (INIT) chunk?
- red
Zone
Protection Profile Flood Sctp Init Red - Red
- enable boolean
- Enable protection against floods of Stream Control Transmission Protocol (SCTP) packets that contain an Initiation (INIT) chunk?
- red
Zone
Protection Profile Flood Sctp Init Red - Red
- enable bool
- Enable protection against floods of Stream Control Transmission Protocol (SCTP) packets that contain an Initiation (INIT) chunk?
- red
Zone
Protection Profile Flood Sctp Init Red - Red
- enable Boolean
- Enable protection against floods of Stream Control Transmission Protocol (SCTP) packets that contain an Initiation (INIT) chunk?
- red Property Map
- Red
ZoneProtectionProfileFloodSctpInitRed, ZoneProtectionProfileFloodSctpInitRedArgs
- Activate
Rate int - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second before subsequent SCTP INIT packets are dropped.
- Alarm
Rate int - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- Maximal
Rate int - The maximum number of SCTP INIT packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- Activate
Rate int - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second before subsequent SCTP INIT packets are dropped.
- Alarm
Rate int - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- Maximal
Rate int - The maximum number of SCTP INIT packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate Integer - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second before subsequent SCTP INIT packets are dropped.
- alarm
Rate Integer - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate Integer - The maximum number of SCTP INIT packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate number - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second before subsequent SCTP INIT packets are dropped.
- alarm
Rate number - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate number - The maximum number of SCTP INIT packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate_
rate int - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second before subsequent SCTP INIT packets are dropped.
- alarm_
rate int - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal_
rate int - The maximum number of SCTP INIT packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate Number - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second before subsequent SCTP INIT packets are dropped.
- alarm
Rate Number - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate Number - The maximum number of SCTP INIT packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
ZoneProtectionProfileFloodTcpSyn, ZoneProtectionProfileFloodTcpSynArgs
- Enable bool
- Enable protection against SYN floods?
- Red
Zone
Protection Profile Flood Tcp Syn Red - Red
-
Zone
Protection Profile Flood Tcp Syn Syn Cookies - Syn cookies
- Enable bool
- Enable protection against SYN floods?
- Red
Zone
Protection Profile Flood Tcp Syn Red - Red
-
Zone
Protection Profile Flood Tcp Syn Syn Cookies - Syn cookies
- enable Boolean
- Enable protection against SYN floods?
- red
Zone
Protection Profile Flood Tcp Syn Red - Red
-
Zone
Protection Profile Flood Tcp Syn Syn Cookies - Syn cookies
- enable boolean
- Enable protection against SYN floods?
- red
Zone
Protection Profile Flood Tcp Syn Red - Red
-
Zone
Protection Profile Flood Tcp Syn Syn Cookies - Syn cookies
- enable bool
- Enable protection against SYN floods?
- red
Zone
Protection Profile Flood Tcp Syn Red - Red
-
Zone
Protection Profile Flood Tcp Syn Syn Cookies - Syn cookies
- enable Boolean
- Enable protection against SYN floods?
- red Property Map
- Red
- Property Map
- Syn cookies
ZoneProtectionProfileFloodTcpSynRed, ZoneProtectionProfileFloodTcpSynRedArgs
- Activate
Rate int - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - Alarm
Rate int - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - Maximal
Rate int - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- Activate
Rate int - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - Alarm
Rate int - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - Maximal
Rate int - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- activate
Rate Integer - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - alarm
Rate Integer - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - maximal
Rate Integer - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- activate
Rate number - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - alarm
Rate number - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - maximal
Rate number - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- activate_
rate int - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - alarm_
rate int - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - maximal_
rate int - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- activate
Rate Number - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - alarm
Rate Number - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - maximal
Rate Number - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
ZoneProtectionProfileFloodTcpSynSynCookies, ZoneProtectionProfileFloodTcpSynSynCookiesArgs
- Activate
Rate int - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - Alarm
Rate int - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - Maximal
Rate int - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- Activate
Rate int - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - Alarm
Rate int - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - Maximal
Rate int - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- activate
Rate Integer - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - alarm
Rate Integer - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - maximal
Rate Integer - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- activate
Rate number - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - alarm
Rate number - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - maximal
Rate number - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- activate_
rate int - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - alarm_
rate int - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - maximal_
rate int - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- activate
Rate Number - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - alarm
Rate Number - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - maximal
Rate Number - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
ZoneProtectionProfileFloodUdp, ZoneProtectionProfileFloodUdpArgs
- Enable bool
- Enable protection against UDP floods?
- Red
Zone
Protection Profile Flood Udp Red - Red
- Enable bool
- Enable protection against UDP floods?
- Red
Zone
Protection Profile Flood Udp Red - Red
- enable Boolean
- Enable protection against UDP floods?
- red
Zone
Protection Profile Flood Udp Red - Red
- enable boolean
- Enable protection against UDP floods?
- red
Zone
Protection Profile Flood Udp Red - Red
- enable bool
- Enable protection against UDP floods?
- red
Zone
Protection Profile Flood Udp Red - Red
- enable Boolean
- Enable protection against UDP floods?
- red Property Map
- Red
ZoneProtectionProfileFloodUdpRed, ZoneProtectionProfileFloodUdpRedArgs
- Activate
Rate int - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers random dropping of UDP packets.
- Alarm
Rate int - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- Maximal
Rate int - The maximum number of UDP packets (not matching an existing session) the zone receives per second before packets exceeding the maximum are dropped.
- Activate
Rate int - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers random dropping of UDP packets.
- Alarm
Rate int - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- Maximal
Rate int - The maximum number of UDP packets (not matching an existing session) the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate Integer - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers random dropping of UDP packets.
- alarm
Rate Integer - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate Integer - The maximum number of UDP packets (not matching an existing session) the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate number - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers random dropping of UDP packets.
- alarm
Rate number - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate number - The maximum number of UDP packets (not matching an existing session) the zone receives per second before packets exceeding the maximum are dropped.
- activate_
rate int - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers random dropping of UDP packets.
- alarm_
rate int - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal_
rate int - The maximum number of UDP packets (not matching an existing session) the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate Number - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers random dropping of UDP packets.
- alarm
Rate Number - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate Number - The maximum number of UDP packets (not matching an existing session) the zone receives per second before packets exceeding the maximum are dropped.
ZoneProtectionProfileIpv6, ZoneProtectionProfileIpv6Args
- Anycast
Source bool - Discard IPv6 packets that contain an anycast source address.
- Filter
Ext ZoneHdr Protection Profile Ipv6Filter Ext Hdr - Filter ext hdr
- Icmpv6Too
Big boolSmall Mtu Discard - Discard IPv6 packets that contain a Packet Too Big ICMPv6 message when the maximum transmission unit (MTU) is less than 1,280 bytes.
- Ignore
Inv ZonePkt Protection Profile Ipv6Ignore Inv Pkt - Ignore inv pkt
- Ipv4Compatible
Address bool - Discard IPv6 packets that are defined as an RFC 4291 IPv4-Compatible IPv6 address.
- Needless
Fragment boolHdr - Discard IPv6 packets with the last fragment flag (M=0) and offset of zero.
- Options
Invalid boolIpv6Discard - Discard IPv6 packets that contain invalid IPv6 options in an extension header.
- Reserved
Field boolSet Discard - Discard IPv6 packets that have a header with a reserved field not set to zero.
- Routing
Header0 bool - Drop packets with type 0 routing header.
- Routing
Header1 bool - Drop packets with type 1 routing header.
- Routing
Header253 bool - Drop packets with type 253 routing header.
- Routing
Header254 bool - Drop packets with type 254 routing header.
- Routing
Header255 bool - Drop packets with type 255 routing header.
- Routing
Header3 bool - Drop packets with type 3 routing header.
- Routing
Header4252 bool - Drop packets with type 4 to type 252 routing header.
- Anycast
Source bool - Discard IPv6 packets that contain an anycast source address.
- Filter
Ext ZoneHdr Protection Profile Ipv6Filter Ext Hdr - Filter ext hdr
- Icmpv6Too
Big boolSmall Mtu Discard - Discard IPv6 packets that contain a Packet Too Big ICMPv6 message when the maximum transmission unit (MTU) is less than 1,280 bytes.
- Ignore
Inv ZonePkt Protection Profile Ipv6Ignore Inv Pkt - Ignore inv pkt
- Ipv4Compatible
Address bool - Discard IPv6 packets that are defined as an RFC 4291 IPv4-Compatible IPv6 address.
- Needless
Fragment boolHdr - Discard IPv6 packets with the last fragment flag (M=0) and offset of zero.
- Options
Invalid boolIpv6Discard - Discard IPv6 packets that contain invalid IPv6 options in an extension header.
- Reserved
Field boolSet Discard - Discard IPv6 packets that have a header with a reserved field not set to zero.
- Routing
Header0 bool - Drop packets with type 0 routing header.
- Routing
Header1 bool - Drop packets with type 1 routing header.
- Routing
Header253 bool - Drop packets with type 253 routing header.
- Routing
Header254 bool - Drop packets with type 254 routing header.
- Routing
Header255 bool - Drop packets with type 255 routing header.
- Routing
Header3 bool - Drop packets with type 3 routing header.
- Routing
Header4252 bool - Drop packets with type 4 to type 252 routing header.
- anycast
Source Boolean - Discard IPv6 packets that contain an anycast source address.
- filter
Ext ZoneHdr Protection Profile Ipv6Filter Ext Hdr - Filter ext hdr
- icmpv6Too
Big BooleanSmall Mtu Discard - Discard IPv6 packets that contain a Packet Too Big ICMPv6 message when the maximum transmission unit (MTU) is less than 1,280 bytes.
- ignore
Inv ZonePkt Protection Profile Ipv6Ignore Inv Pkt - Ignore inv pkt
- ipv4Compatible
Address Boolean - Discard IPv6 packets that are defined as an RFC 4291 IPv4-Compatible IPv6 address.
- needless
Fragment BooleanHdr - Discard IPv6 packets with the last fragment flag (M=0) and offset of zero.
- options
Invalid BooleanIpv6Discard - Discard IPv6 packets that contain invalid IPv6 options in an extension header.
- reserved
Field BooleanSet Discard - Discard IPv6 packets that have a header with a reserved field not set to zero.
- routing
Header0 Boolean - Drop packets with type 0 routing header.
- routing
Header1 Boolean - Drop packets with type 1 routing header.
- routing
Header253 Boolean - Drop packets with type 253 routing header.
- routing
Header254 Boolean - Drop packets with type 254 routing header.
- routing
Header255 Boolean - Drop packets with type 255 routing header.
- routing
Header3 Boolean - Drop packets with type 3 routing header.
- routing
Header4252 Boolean - Drop packets with type 4 to type 252 routing header.
- anycast
Source boolean - Discard IPv6 packets that contain an anycast source address.
- filter
Ext ZoneHdr Protection Profile Ipv6Filter Ext Hdr - Filter ext hdr
- icmpv6Too
Big booleanSmall Mtu Discard - Discard IPv6 packets that contain a Packet Too Big ICMPv6 message when the maximum transmission unit (MTU) is less than 1,280 bytes.
- ignore
Inv ZonePkt Protection Profile Ipv6Ignore Inv Pkt - Ignore inv pkt
- ipv4Compatible
Address boolean - Discard IPv6 packets that are defined as an RFC 4291 IPv4-Compatible IPv6 address.
- needless
Fragment booleanHdr - Discard IPv6 packets with the last fragment flag (M=0) and offset of zero.
- options
Invalid booleanIpv6Discard - Discard IPv6 packets that contain invalid IPv6 options in an extension header.
- reserved
Field booleanSet Discard - Discard IPv6 packets that have a header with a reserved field not set to zero.
- routing
Header0 boolean - Drop packets with type 0 routing header.
- routing
Header1 boolean - Drop packets with type 1 routing header.
- routing
Header253 boolean - Drop packets with type 253 routing header.
- routing
Header254 boolean - Drop packets with type 254 routing header.
- routing
Header255 boolean - Drop packets with type 255 routing header.
- routing
Header3 boolean - Drop packets with type 3 routing header.
- routing
Header4252 boolean - Drop packets with type 4 to type 252 routing header.
- anycast_
source bool - Discard IPv6 packets that contain an anycast source address.
- filter_
ext_ Zonehdr Protection Profile Ipv6Filter Ext Hdr - Filter ext hdr
- icmpv6_
too_ boolbig_ small_ mtu_ discard - Discard IPv6 packets that contain a Packet Too Big ICMPv6 message when the maximum transmission unit (MTU) is less than 1,280 bytes.
- ignore_
inv_ Zonepkt Protection Profile Ipv6Ignore Inv Pkt - Ignore inv pkt
- ipv4_
compatible_ booladdress - Discard IPv6 packets that are defined as an RFC 4291 IPv4-Compatible IPv6 address.
- needless_
fragment_ boolhdr - Discard IPv6 packets with the last fragment flag (M=0) and offset of zero.
- options_
invalid_ boolipv6_ discard - Discard IPv6 packets that contain invalid IPv6 options in an extension header.
- reserved_
field_ boolset_ discard - Discard IPv6 packets that have a header with a reserved field not set to zero.
- routing_
header0 bool - Drop packets with type 0 routing header.
- routing_
header1 bool - Drop packets with type 1 routing header.
- routing_
header253 bool - Drop packets with type 253 routing header.
- routing_
header254 bool - Drop packets with type 254 routing header.
- routing_
header255 bool - Drop packets with type 255 routing header.
- routing_
header3 bool - Drop packets with type 3 routing header.
- routing_
header4252 bool - Drop packets with type 4 to type 252 routing header.
- anycast
Source Boolean - Discard IPv6 packets that contain an anycast source address.
- filter
Ext Property MapHdr - Filter ext hdr
- icmpv6Too
Big BooleanSmall Mtu Discard - Discard IPv6 packets that contain a Packet Too Big ICMPv6 message when the maximum transmission unit (MTU) is less than 1,280 bytes.
- ignore
Inv Property MapPkt - Ignore inv pkt
- ipv4Compatible
Address Boolean - Discard IPv6 packets that are defined as an RFC 4291 IPv4-Compatible IPv6 address.
- needless
Fragment BooleanHdr - Discard IPv6 packets with the last fragment flag (M=0) and offset of zero.
- options
Invalid BooleanIpv6Discard - Discard IPv6 packets that contain invalid IPv6 options in an extension header.
- reserved
Field BooleanSet Discard - Discard IPv6 packets that have a header with a reserved field not set to zero.
- routing
Header0 Boolean - Drop packets with type 0 routing header.
- routing
Header1 Boolean - Drop packets with type 1 routing header.
- routing
Header253 Boolean - Drop packets with type 253 routing header.
- routing
Header254 Boolean - Drop packets with type 254 routing header.
- routing
Header255 Boolean - Drop packets with type 255 routing header.
- routing
Header3 Boolean - Drop packets with type 3 routing header.
- routing
Header4252 Boolean - Drop packets with type 4 to type 252 routing header.
ZoneProtectionProfileIpv6FilterExtHdr, ZoneProtectionProfileIpv6FilterExtHdrArgs
- Dest
Option boolHdr - Discard IPv6 packets that contain the Destination Options extension, which contains options intended only for the destination of the packet.
- Hop
By boolHop Hdr - Discard IPv6 packets that contain the Hop-by-Hop Options extension header.
- Routing
Hdr bool - Discard IPv6 packets that contain the Routing extension header, which directs packets to one or more intermediate nodes on its way to its destination.
- Dest
Option boolHdr - Discard IPv6 packets that contain the Destination Options extension, which contains options intended only for the destination of the packet.
- Hop
By boolHop Hdr - Discard IPv6 packets that contain the Hop-by-Hop Options extension header.
- Routing
Hdr bool - Discard IPv6 packets that contain the Routing extension header, which directs packets to one or more intermediate nodes on its way to its destination.
- dest
Option BooleanHdr - Discard IPv6 packets that contain the Destination Options extension, which contains options intended only for the destination of the packet.
- hop
By BooleanHop Hdr - Discard IPv6 packets that contain the Hop-by-Hop Options extension header.
- routing
Hdr Boolean - Discard IPv6 packets that contain the Routing extension header, which directs packets to one or more intermediate nodes on its way to its destination.
- dest
Option booleanHdr - Discard IPv6 packets that contain the Destination Options extension, which contains options intended only for the destination of the packet.
- hop
By booleanHop Hdr - Discard IPv6 packets that contain the Hop-by-Hop Options extension header.
- routing
Hdr boolean - Discard IPv6 packets that contain the Routing extension header, which directs packets to one or more intermediate nodes on its way to its destination.
- dest_
option_ boolhdr - Discard IPv6 packets that contain the Destination Options extension, which contains options intended only for the destination of the packet.
- hop_
by_ boolhop_ hdr - Discard IPv6 packets that contain the Hop-by-Hop Options extension header.
- routing_
hdr bool - Discard IPv6 packets that contain the Routing extension header, which directs packets to one or more intermediate nodes on its way to its destination.
- dest
Option BooleanHdr - Discard IPv6 packets that contain the Destination Options extension, which contains options intended only for the destination of the packet.
- hop
By BooleanHop Hdr - Discard IPv6 packets that contain the Hop-by-Hop Options extension header.
- routing
Hdr Boolean - Discard IPv6 packets that contain the Routing extension header, which directs packets to one or more intermediate nodes on its way to its destination.
ZoneProtectionProfileIpv6IgnoreInvPkt, ZoneProtectionProfileIpv6IgnoreInvPktArgs
- Dest
Unreach bool - Require an explicit Security policy match for Destination Unreachable ICMPv6 messages, even when the message is associated with an existing session.
- Param
Problem bool - Require an explicit Security policy match for Parameter Problem ICMPv6 messages, even when the message is associated with an existing session.
- Pkt
Too boolBig - Require an explicit Security policy match for Packet Too Big ICMPv6 messages, even when the message is associated with an existing session.
- Redirect bool
- Require an explicit Security policy match for Redirect Message ICMPv6 messages, even when the message is associated with an existing session.
- Time
Exceeded bool - Require an explicit Security policy match for Time Exceeded ICMPv6 messages, even when the message is associated with an existing session.
- Dest
Unreach bool - Require an explicit Security policy match for Destination Unreachable ICMPv6 messages, even when the message is associated with an existing session.
- Param
Problem bool - Require an explicit Security policy match for Parameter Problem ICMPv6 messages, even when the message is associated with an existing session.
- Pkt
Too boolBig - Require an explicit Security policy match for Packet Too Big ICMPv6 messages, even when the message is associated with an existing session.
- Redirect bool
- Require an explicit Security policy match for Redirect Message ICMPv6 messages, even when the message is associated with an existing session.
- Time
Exceeded bool - Require an explicit Security policy match for Time Exceeded ICMPv6 messages, even when the message is associated with an existing session.
- dest
Unreach Boolean - Require an explicit Security policy match for Destination Unreachable ICMPv6 messages, even when the message is associated with an existing session.
- param
Problem Boolean - Require an explicit Security policy match for Parameter Problem ICMPv6 messages, even when the message is associated with an existing session.
- pkt
Too BooleanBig - Require an explicit Security policy match for Packet Too Big ICMPv6 messages, even when the message is associated with an existing session.
- redirect Boolean
- Require an explicit Security policy match for Redirect Message ICMPv6 messages, even when the message is associated with an existing session.
- time
Exceeded Boolean - Require an explicit Security policy match for Time Exceeded ICMPv6 messages, even when the message is associated with an existing session.
- dest
Unreach boolean - Require an explicit Security policy match for Destination Unreachable ICMPv6 messages, even when the message is associated with an existing session.
- param
Problem boolean - Require an explicit Security policy match for Parameter Problem ICMPv6 messages, even when the message is associated with an existing session.
- pkt
Too booleanBig - Require an explicit Security policy match for Packet Too Big ICMPv6 messages, even when the message is associated with an existing session.
- redirect boolean
- Require an explicit Security policy match for Redirect Message ICMPv6 messages, even when the message is associated with an existing session.
- time
Exceeded boolean - Require an explicit Security policy match for Time Exceeded ICMPv6 messages, even when the message is associated with an existing session.
- dest_
unreach bool - Require an explicit Security policy match for Destination Unreachable ICMPv6 messages, even when the message is associated with an existing session.
- param_
problem bool - Require an explicit Security policy match for Parameter Problem ICMPv6 messages, even when the message is associated with an existing session.
- pkt_
too_ boolbig - Require an explicit Security policy match for Packet Too Big ICMPv6 messages, even when the message is associated with an existing session.
- redirect bool
- Require an explicit Security policy match for Redirect Message ICMPv6 messages, even when the message is associated with an existing session.
- time_
exceeded bool - Require an explicit Security policy match for Time Exceeded ICMPv6 messages, even when the message is associated with an existing session.
- dest
Unreach Boolean - Require an explicit Security policy match for Destination Unreachable ICMPv6 messages, even when the message is associated with an existing session.
- param
Problem Boolean - Require an explicit Security policy match for Parameter Problem ICMPv6 messages, even when the message is associated with an existing session.
- pkt
Too BooleanBig - Require an explicit Security policy match for Packet Too Big ICMPv6 messages, even when the message is associated with an existing session.
- redirect Boolean
- Require an explicit Security policy match for Redirect Message ICMPv6 messages, even when the message is associated with an existing session.
- time
Exceeded Boolean - Require an explicit Security policy match for Time Exceeded ICMPv6 messages, even when the message is associated with an existing session.
ZoneProtectionProfileL2SecGroupTagProtection, ZoneProtectionProfileL2SecGroupTagProtectionArgs
ZoneProtectionProfileL2SecGroupTagProtectionTag, ZoneProtectionProfileL2SecGroupTagProtectionTagArgs
- Name string
- Name for the list of Security Group Tags (SGTs).
- Tag string
- The Layer 2 SGTs in headers of packets that you want to exclude (drop) when the SGT matches this list in the Zone Protection profile applied to a zone (range is 0 to 65,535).
- Enable bool
- Enable this exclude list for Ethernet SGT protection.
- Name string
- Name for the list of Security Group Tags (SGTs).
- Tag string
- The Layer 2 SGTs in headers of packets that you want to exclude (drop) when the SGT matches this list in the Zone Protection profile applied to a zone (range is 0 to 65,535).
- Enable bool
- Enable this exclude list for Ethernet SGT protection.
- name String
- Name for the list of Security Group Tags (SGTs).
- tag String
- The Layer 2 SGTs in headers of packets that you want to exclude (drop) when the SGT matches this list in the Zone Protection profile applied to a zone (range is 0 to 65,535).
- enable Boolean
- Enable this exclude list for Ethernet SGT protection.
- name string
- Name for the list of Security Group Tags (SGTs).
- tag string
- The Layer 2 SGTs in headers of packets that you want to exclude (drop) when the SGT matches this list in the Zone Protection profile applied to a zone (range is 0 to 65,535).
- enable boolean
- Enable this exclude list for Ethernet SGT protection.
- name str
- Name for the list of Security Group Tags (SGTs).
- tag str
- The Layer 2 SGTs in headers of packets that you want to exclude (drop) when the SGT matches this list in the Zone Protection profile applied to a zone (range is 0 to 65,535).
- enable bool
- Enable this exclude list for Ethernet SGT protection.
- name String
- Name for the list of Security Group Tags (SGTs).
- tag String
- The Layer 2 SGTs in headers of packets that you want to exclude (drop) when the SGT matches this list in the Zone Protection profile applied to a zone (range is 0 to 65,535).
- enable Boolean
- Enable this exclude list for Ethernet SGT protection.
ZoneProtectionProfileNonIpProtocol, ZoneProtectionProfileNonIpProtocolArgs
- List
Type string - Specify the type of list you are creating for protocol protection:
- Include List—Only the protocols on the list are allowed—in addition to IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), and VLAN tagged frames (0x8100). All other protocols are implicitly denied (blocked).
- Exclude List—Only the protocols on the list are denied; all other protocols are implicitly allowed. You cannot exclude IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), or VLAN tagged frames (0x8100).
- Protocols
List<Zone
Protection Profile Non Ip Protocol Protocol> - Protocol
- List
Type string - Specify the type of list you are creating for protocol protection:
- Include List—Only the protocols on the list are allowed—in addition to IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), and VLAN tagged frames (0x8100). All other protocols are implicitly denied (blocked).
- Exclude List—Only the protocols on the list are denied; all other protocols are implicitly allowed. You cannot exclude IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), or VLAN tagged frames (0x8100).
- Protocols
[]Zone
Protection Profile Non Ip Protocol Protocol - Protocol
- list
Type String - Specify the type of list you are creating for protocol protection:
- Include List—Only the protocols on the list are allowed—in addition to IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), and VLAN tagged frames (0x8100). All other protocols are implicitly denied (blocked).
- Exclude List—Only the protocols on the list are denied; all other protocols are implicitly allowed. You cannot exclude IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), or VLAN tagged frames (0x8100).
- protocols
List<Zone
Protection Profile Non Ip Protocol Protocol> - Protocol
- list
Type string - Specify the type of list you are creating for protocol protection:
- Include List—Only the protocols on the list are allowed—in addition to IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), and VLAN tagged frames (0x8100). All other protocols are implicitly denied (blocked).
- Exclude List—Only the protocols on the list are denied; all other protocols are implicitly allowed. You cannot exclude IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), or VLAN tagged frames (0x8100).
- protocols
Zone
Protection Profile Non Ip Protocol Protocol[] - Protocol
- list_
type str - Specify the type of list you are creating for protocol protection:
- Include List—Only the protocols on the list are allowed—in addition to IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), and VLAN tagged frames (0x8100). All other protocols are implicitly denied (blocked).
- Exclude List—Only the protocols on the list are denied; all other protocols are implicitly allowed. You cannot exclude IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), or VLAN tagged frames (0x8100).
- protocols
Sequence[Zone
Protection Profile Non Ip Protocol Protocol] - Protocol
- list
Type String - Specify the type of list you are creating for protocol protection:
- Include List—Only the protocols on the list are allowed—in addition to IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), and VLAN tagged frames (0x8100). All other protocols are implicitly denied (blocked).
- Exclude List—Only the protocols on the list are denied; all other protocols are implicitly allowed. You cannot exclude IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), or VLAN tagged frames (0x8100).
- protocols List<Property Map>
- Protocol
ZoneProtectionProfileNonIpProtocolProtocol, ZoneProtectionProfileNonIpProtocolProtocolArgs
- Ether
Type string - Enter an Ethertype code (protocol) preceded by 0x to indicate hexadecimal (range is 0x0000 to 0xFFFF). A list can have a maximum of 64 Ethertypes. Some sources of Ethertype codes are:
- Name string
- Enter the protocol name that corresponds to the Ethertype code you are adding to the list. The firewall does not verify that the protocol name matches the Ethertype code but the Ethertype code does determine the protocol filter.
- Enable bool
- Enable the Ethertype code on the list.
- Ether
Type string - Enter an Ethertype code (protocol) preceded by 0x to indicate hexadecimal (range is 0x0000 to 0xFFFF). A list can have a maximum of 64 Ethertypes. Some sources of Ethertype codes are:
- Name string
- Enter the protocol name that corresponds to the Ethertype code you are adding to the list. The firewall does not verify that the protocol name matches the Ethertype code but the Ethertype code does determine the protocol filter.
- Enable bool
- Enable the Ethertype code on the list.
- ether
Type String - Enter an Ethertype code (protocol) preceded by 0x to indicate hexadecimal (range is 0x0000 to 0xFFFF). A list can have a maximum of 64 Ethertypes. Some sources of Ethertype codes are:
- name String
- Enter the protocol name that corresponds to the Ethertype code you are adding to the list. The firewall does not verify that the protocol name matches the Ethertype code but the Ethertype code does determine the protocol filter.
- enable Boolean
- Enable the Ethertype code on the list.
- ether
Type string - Enter an Ethertype code (protocol) preceded by 0x to indicate hexadecimal (range is 0x0000 to 0xFFFF). A list can have a maximum of 64 Ethertypes. Some sources of Ethertype codes are:
- name string
- Enter the protocol name that corresponds to the Ethertype code you are adding to the list. The firewall does not verify that the protocol name matches the Ethertype code but the Ethertype code does determine the protocol filter.
- enable boolean
- Enable the Ethertype code on the list.
- ether_
type str - Enter an Ethertype code (protocol) preceded by 0x to indicate hexadecimal (range is 0x0000 to 0xFFFF). A list can have a maximum of 64 Ethertypes. Some sources of Ethertype codes are:
- name str
- Enter the protocol name that corresponds to the Ethertype code you are adding to the list. The firewall does not verify that the protocol name matches the Ethertype code but the Ethertype code does determine the protocol filter.
- enable bool
- Enable the Ethertype code on the list.
- ether
Type String - Enter an Ethertype code (protocol) preceded by 0x to indicate hexadecimal (range is 0x0000 to 0xFFFF). A list can have a maximum of 64 Ethertypes. Some sources of Ethertype codes are:
- name String
- Enter the protocol name that corresponds to the Ethertype code you are adding to the list. The firewall does not verify that the protocol name matches the Ethertype code but the Ethertype code does determine the protocol filter.
- enable Boolean
- Enable the Ethertype code on the list.
ZoneProtectionProfileScan, ZoneProtectionProfileScanArgs
- Name string
- The threat ID number. These can be found in Palo Alto Networks ThreatVault.
- "8001" - TCP Port Scan
- "8002" - Host Sweep
- "8003" - UDP Port Scan
- "8006" - Port Scan
- Action
Zone
Protection Profile Scan Action - Action
- Interval int
- Interval
- Threshold int
- Threshold
- Name string
- The threat ID number. These can be found in Palo Alto Networks ThreatVault.
- "8001" - TCP Port Scan
- "8002" - Host Sweep
- "8003" - UDP Port Scan
- "8006" - Port Scan
- Action
Zone
Protection Profile Scan Action - Action
- Interval int
- Interval
- Threshold int
- Threshold
- name String
- The threat ID number. These can be found in Palo Alto Networks ThreatVault.
- "8001" - TCP Port Scan
- "8002" - Host Sweep
- "8003" - UDP Port Scan
- "8006" - Port Scan
- action
Zone
Protection Profile Scan Action - Action
- interval Integer
- Interval
- threshold Integer
- Threshold
- name string
- The threat ID number. These can be found in Palo Alto Networks ThreatVault.
- "8001" - TCP Port Scan
- "8002" - Host Sweep
- "8003" - UDP Port Scan
- "8006" - Port Scan
- action
Zone
Protection Profile Scan Action - Action
- interval number
- Interval
- threshold number
- Threshold
- name str
- The threat ID number. These can be found in Palo Alto Networks ThreatVault.
- "8001" - TCP Port Scan
- "8002" - Host Sweep
- "8003" - UDP Port Scan
- "8006" - Port Scan
- action
Zone
Protection Profile Scan Action - Action
- interval int
- Interval
- threshold int
- Threshold
- name String
- The threat ID number. These can be found in Palo Alto Networks ThreatVault.
- "8001" - TCP Port Scan
- "8002" - Host Sweep
- "8003" - UDP Port Scan
- "8006" - Port Scan
- action Property Map
- Action
- interval Number
- Interval
- threshold Number
- Threshold
ZoneProtectionProfileScanAction, ZoneProtectionProfileScanActionArgs
- alert Property Map
- Alert
- allow Property Map
- Allow
- block Property Map
- Block
- block
Ip Property Map - Block ip
ZoneProtectionProfileScanActionBlockIp, ZoneProtectionProfileScanActionBlockIpArgs
ZoneProtectionProfileScanWhiteList, ZoneProtectionProfileScanWhiteListArgs
Package Details
- Repository
- scm pulumi/pulumi-scm
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
scmTerraform Provider.
