Strata Cloud Manager v0.4.3 published on Saturday, Nov 8, 2025 by Pulumi
Strata Cloud Manager v0.4.3 published on Saturday, Nov 8, 2025 by Pulumi
ZoneProtectionProfile data source
Using getZoneProtectionProfile
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getZoneProtectionProfile(args: GetZoneProtectionProfileArgs, opts?: InvokeOptions): Promise<GetZoneProtectionProfileResult>
function getZoneProtectionProfileOutput(args: GetZoneProtectionProfileOutputArgs, opts?: InvokeOptions): Output<GetZoneProtectionProfileResult>def get_zone_protection_profile(id: Optional[str] = None,
name: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetZoneProtectionProfileResult
def get_zone_protection_profile_output(id: Optional[pulumi.Input[str]] = None,
name: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetZoneProtectionProfileResult]func LookupZoneProtectionProfile(ctx *Context, args *LookupZoneProtectionProfileArgs, opts ...InvokeOption) (*LookupZoneProtectionProfileResult, error)
func LookupZoneProtectionProfileOutput(ctx *Context, args *LookupZoneProtectionProfileOutputArgs, opts ...InvokeOption) LookupZoneProtectionProfileResultOutput> Note: This function is named LookupZoneProtectionProfile in the Go SDK.
public static class GetZoneProtectionProfile
{
public static Task<GetZoneProtectionProfileResult> InvokeAsync(GetZoneProtectionProfileArgs args, InvokeOptions? opts = null)
public static Output<GetZoneProtectionProfileResult> Invoke(GetZoneProtectionProfileInvokeArgs args, InvokeOptions? opts = null)
}public static CompletableFuture<GetZoneProtectionProfileResult> getZoneProtectionProfile(GetZoneProtectionProfileArgs args, InvokeOptions options)
public static Output<GetZoneProtectionProfileResult> getZoneProtectionProfile(GetZoneProtectionProfileArgs args, InvokeOptions options)
fn::invoke:
function: scm:index/getZoneProtectionProfile:getZoneProtectionProfile
arguments:
# arguments dictionaryThe following arguments are supported:
getZoneProtectionProfile Result
The following output properties are available:
- Asymmetric
Path string - Description string
- Device string
- Discard
Icmp boolEmbedded Error - Flood
Get
Zone Protection Profile Flood - Folder string
- Fragmented
Traffic boolDiscard - Icmp
Frag boolDiscard - Icmp
Large boolPacket Discard - Icmp
Ping boolZero Id Discard - Id string
- Ipv6
Get
Zone Protection Profile Ipv6 - L2Sec
Group GetTag Protection Zone Protection Profile L2Sec Group Tag Protection - Loose
Source boolRouting Discard - Malformed
Option boolDiscard - Mismatched
Overlapping boolTcp Segment Discard - Mptcp
Option stringStrip - Name string
- Non
Ip GetProtocol Zone Protection Profile Non Ip Protocol - Record
Route boolDiscard - Reject
Non stringSyn Tcp - Scan
White List<GetLists Zone Protection Profile Scan White List> - Scans
List<Get
Zone Protection Profile Scan> - Security
Discard bool - Snippet string
- Spoofed
Ip boolDiscard - Stream
Id boolDiscard - Strict
Ip boolCheck - Strict
Source boolRouting Discard - Suppress
Icmp boolNeedfrag - Suppress
Icmp boolTimeexceeded - Tcp
Fast boolOpen And Data Strip - Tcp
Handshake boolDiscard - Tcp
Syn boolWith Data Discard - Tcp
Synack boolWith Data Discard - Tcp
Timestamp boolStrip - Tfid string
- Timestamp
Discard bool - Unknown
Option boolDiscard
- Asymmetric
Path string - Description string
- Device string
- Discard
Icmp boolEmbedded Error - Flood
Get
Zone Protection Profile Flood - Folder string
- Fragmented
Traffic boolDiscard - Icmp
Frag boolDiscard - Icmp
Large boolPacket Discard - Icmp
Ping boolZero Id Discard - Id string
- Ipv6
Get
Zone Protection Profile Ipv6 - L2Sec
Group GetTag Protection Zone Protection Profile L2Sec Group Tag Protection - Loose
Source boolRouting Discard - Malformed
Option boolDiscard - Mismatched
Overlapping boolTcp Segment Discard - Mptcp
Option stringStrip - Name string
- Non
Ip GetProtocol Zone Protection Profile Non Ip Protocol - Record
Route boolDiscard - Reject
Non stringSyn Tcp - Scan
White []GetLists Zone Protection Profile Scan White List - Scans
[]Get
Zone Protection Profile Scan - Security
Discard bool - Snippet string
- Spoofed
Ip boolDiscard - Stream
Id boolDiscard - Strict
Ip boolCheck - Strict
Source boolRouting Discard - Suppress
Icmp boolNeedfrag - Suppress
Icmp boolTimeexceeded - Tcp
Fast boolOpen And Data Strip - Tcp
Handshake boolDiscard - Tcp
Syn boolWith Data Discard - Tcp
Synack boolWith Data Discard - Tcp
Timestamp boolStrip - Tfid string
- Timestamp
Discard bool - Unknown
Option boolDiscard
- asymmetric
Path String - description String
- device String
- discard
Icmp BooleanEmbedded Error - flood
Get
Zone Protection Profile Flood - folder String
- fragmented
Traffic BooleanDiscard - icmp
Frag BooleanDiscard - icmp
Large BooleanPacket Discard - icmp
Ping BooleanZero Id Discard - id String
- ipv6
Get
Zone Protection Profile Ipv6 - l2Sec
Group GetTag Protection Zone Protection Profile L2Sec Group Tag Protection - loose
Source BooleanRouting Discard - malformed
Option BooleanDiscard - mismatched
Overlapping BooleanTcp Segment Discard - mptcp
Option StringStrip - name String
- non
Ip GetProtocol Zone Protection Profile Non Ip Protocol - record
Route BooleanDiscard - reject
Non StringSyn Tcp - scan
White List<GetLists Zone Protection Profile Scan White List> - scans
List<Get
Zone Protection Profile Scan> - security
Discard Boolean - snippet String
- spoofed
Ip BooleanDiscard - stream
Id BooleanDiscard - strict
Ip BooleanCheck - strict
Source BooleanRouting Discard - suppress
Icmp BooleanNeedfrag - suppress
Icmp BooleanTimeexceeded - tcp
Fast BooleanOpen And Data Strip - tcp
Handshake BooleanDiscard - tcp
Syn BooleanWith Data Discard - tcp
Synack BooleanWith Data Discard - tcp
Timestamp BooleanStrip - tfid String
- timestamp
Discard Boolean - unknown
Option BooleanDiscard
- asymmetric
Path string - description string
- device string
- discard
Icmp booleanEmbedded Error - flood
Get
Zone Protection Profile Flood - folder string
- fragmented
Traffic booleanDiscard - icmp
Frag booleanDiscard - icmp
Large booleanPacket Discard - icmp
Ping booleanZero Id Discard - id string
- ipv6
Get
Zone Protection Profile Ipv6 - l2Sec
Group GetTag Protection Zone Protection Profile L2Sec Group Tag Protection - loose
Source booleanRouting Discard - malformed
Option booleanDiscard - mismatched
Overlapping booleanTcp Segment Discard - mptcp
Option stringStrip - name string
- non
Ip GetProtocol Zone Protection Profile Non Ip Protocol - record
Route booleanDiscard - reject
Non stringSyn Tcp - scan
White GetLists Zone Protection Profile Scan White List[] - scans
Get
Zone Protection Profile Scan[] - security
Discard boolean - snippet string
- spoofed
Ip booleanDiscard - stream
Id booleanDiscard - strict
Ip booleanCheck - strict
Source booleanRouting Discard - suppress
Icmp booleanNeedfrag - suppress
Icmp booleanTimeexceeded - tcp
Fast booleanOpen And Data Strip - tcp
Handshake booleanDiscard - tcp
Syn booleanWith Data Discard - tcp
Synack booleanWith Data Discard - tcp
Timestamp booleanStrip - tfid string
- timestamp
Discard boolean - unknown
Option booleanDiscard
- asymmetric_
path str - description str
- device str
- discard_
icmp_ boolembedded_ error - flood
Get
Zone Protection Profile Flood - folder str
- fragmented_
traffic_ booldiscard - icmp_
frag_ booldiscard - icmp_
large_ boolpacket_ discard - icmp_
ping_ boolzero_ id_ discard - id str
- ipv6
Get
Zone Protection Profile Ipv6 - l2_
sec_ Getgroup_ tag_ protection Zone Protection Profile L2Sec Group Tag Protection - loose_
source_ boolrouting_ discard - malformed_
option_ booldiscard - mismatched_
overlapping_ booltcp_ segment_ discard - mptcp_
option_ strstrip - name str
- non_
ip_ Getprotocol Zone Protection Profile Non Ip Protocol - record_
route_ booldiscard - reject_
non_ strsyn_ tcp - scan_
white_ Sequence[Getlists Zone Protection Profile Scan White List] - scans
Sequence[Get
Zone Protection Profile Scan] - security_
discard bool - snippet str
- spoofed_
ip_ booldiscard - stream_
id_ booldiscard - strict_
ip_ boolcheck - strict_
source_ boolrouting_ discard - suppress_
icmp_ boolneedfrag - suppress_
icmp_ booltimeexceeded - tcp_
fast_ boolopen_ and_ data_ strip - tcp_
handshake_ booldiscard - tcp_
syn_ boolwith_ data_ discard - tcp_
synack_ boolwith_ data_ discard - tcp_
timestamp_ boolstrip - tfid str
- timestamp_
discard bool - unknown_
option_ booldiscard
- asymmetric
Path String - description String
- device String
- discard
Icmp BooleanEmbedded Error - flood Property Map
- folder String
- fragmented
Traffic BooleanDiscard - icmp
Frag BooleanDiscard - icmp
Large BooleanPacket Discard - icmp
Ping BooleanZero Id Discard - id String
- ipv6 Property Map
- l2Sec
Group Property MapTag Protection - loose
Source BooleanRouting Discard - malformed
Option BooleanDiscard - mismatched
Overlapping BooleanTcp Segment Discard - mptcp
Option StringStrip - name String
- non
Ip Property MapProtocol - record
Route BooleanDiscard - reject
Non StringSyn Tcp - scan
White List<Property Map>Lists - scans List<Property Map>
- security
Discard Boolean - snippet String
- spoofed
Ip BooleanDiscard - stream
Id BooleanDiscard - strict
Ip BooleanCheck - strict
Source BooleanRouting Discard - suppress
Icmp BooleanNeedfrag - suppress
Icmp BooleanTimeexceeded - tcp
Fast BooleanOpen And Data Strip - tcp
Handshake BooleanDiscard - tcp
Syn BooleanWith Data Discard - tcp
Synack BooleanWith Data Discard - tcp
Timestamp BooleanStrip - tfid String
- timestamp
Discard Boolean - unknown
Option BooleanDiscard
Supporting Types
GetZoneProtectionProfileFlood
- icmp Property Map
- Icmp
- icmpv6 Property Map
- Icmpv6
- other
Ip Property Map - Other ip
- sctp
Init Property Map - Sctp init
- tcp
Syn Property Map - Tcp syn
- udp Property Map
- Udp
GetZoneProtectionProfileFloodIcmp
- Enable bool
- Enable protection against ICMP floods?
- Red
Get
Zone Protection Profile Flood Icmp Red - Red
- Enable bool
- Enable protection against ICMP floods?
- Red
Get
Zone Protection Profile Flood Icmp Red - Red
- enable Boolean
- Enable protection against ICMP floods?
- red
Get
Zone Protection Profile Flood Icmp Red - Red
- enable boolean
- Enable protection against ICMP floods?
- red
Get
Zone Protection Profile Flood Icmp Red - Red
- enable bool
- Enable protection against ICMP floods?
- red
Get
Zone Protection Profile Flood Icmp Red - Red
- enable Boolean
- Enable protection against ICMP floods?
- red Property Map
- Red
GetZoneProtectionProfileFloodIcmpRed
- Activate
Rate int - The number of ICMP packets (not matching an existing session) that the zone receives per second before subsequent ICMP packets are dropped.
- Alarm
Rate int - The number of ICMP echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- Maximal
Rate int - The maximum number of ICMP packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- Activate
Rate int - The number of ICMP packets (not matching an existing session) that the zone receives per second before subsequent ICMP packets are dropped.
- Alarm
Rate int - The number of ICMP echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- Maximal
Rate int - The maximum number of ICMP packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate Integer - The number of ICMP packets (not matching an existing session) that the zone receives per second before subsequent ICMP packets are dropped.
- alarm
Rate Integer - The number of ICMP echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate Integer - The maximum number of ICMP packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate number - The number of ICMP packets (not matching an existing session) that the zone receives per second before subsequent ICMP packets are dropped.
- alarm
Rate number - The number of ICMP echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate number - The maximum number of ICMP packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate_
rate int - The number of ICMP packets (not matching an existing session) that the zone receives per second before subsequent ICMP packets are dropped.
- alarm_
rate int - The number of ICMP echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal_
rate int - The maximum number of ICMP packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate Number - The number of ICMP packets (not matching an existing session) that the zone receives per second before subsequent ICMP packets are dropped.
- alarm
Rate Number - The number of ICMP echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate Number - The maximum number of ICMP packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
GetZoneProtectionProfileFloodIcmpv6
- Enable bool
- Enable protection against ICMPv6 floods?
- Red
Get
Zone Protection Profile Flood Icmpv6Red - Red
- Enable bool
- Enable protection against ICMPv6 floods?
- Red
Get
Zone Protection Profile Flood Icmpv6Red - Red
- enable Boolean
- Enable protection against ICMPv6 floods?
- red
Get
Zone Protection Profile Flood Icmpv6Red - Red
- enable boolean
- Enable protection against ICMPv6 floods?
- red
Get
Zone Protection Profile Flood Icmpv6Red - Red
- enable bool
- Enable protection against ICMPv6 floods?
- red
Get
Zone Protection Profile Flood Icmpv6Red - Red
- enable Boolean
- Enable protection against ICMPv6 floods?
- red Property Map
- Red
GetZoneProtectionProfileFloodIcmpv6Red
- Activate
Rate int - The number of ICMPv6 packets (not matching an existing session) that the zone receives per second before subsequent ICMPv6 packets are dropped.
- Alarm
Rate int - The number of ICMPv6 echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- Maximal
Rate int - The maximum number of ICMPv6 packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- Activate
Rate int - The number of ICMPv6 packets (not matching an existing session) that the zone receives per second before subsequent ICMPv6 packets are dropped.
- Alarm
Rate int - The number of ICMPv6 echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- Maximal
Rate int - The maximum number of ICMPv6 packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate Integer - The number of ICMPv6 packets (not matching an existing session) that the zone receives per second before subsequent ICMPv6 packets are dropped.
- alarm
Rate Integer - The number of ICMPv6 echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate Integer - The maximum number of ICMPv6 packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate number - The number of ICMPv6 packets (not matching an existing session) that the zone receives per second before subsequent ICMPv6 packets are dropped.
- alarm
Rate number - The number of ICMPv6 echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate number - The maximum number of ICMPv6 packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate_
rate int - The number of ICMPv6 packets (not matching an existing session) that the zone receives per second before subsequent ICMPv6 packets are dropped.
- alarm_
rate int - The number of ICMPv6 echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal_
rate int - The maximum number of ICMPv6 packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate Number - The number of ICMPv6 packets (not matching an existing session) that the zone receives per second before subsequent ICMPv6 packets are dropped.
- alarm
Rate Number - The number of ICMPv6 echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate Number - The maximum number of ICMPv6 packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
GetZoneProtectionProfileFloodOtherIp
- Enable bool
- Enable protection against other IP (non-TCP, non-ICMP, non-ICMPv6, non-SCTP, and non-UDP) floods?
- Red
Get
Zone Protection Profile Flood Other Ip Red - Red
- Enable bool
- Enable protection against other IP (non-TCP, non-ICMP, non-ICMPv6, non-SCTP, and non-UDP) floods?
- Red
Get
Zone Protection Profile Flood Other Ip Red - Red
- enable Boolean
- Enable protection against other IP (non-TCP, non-ICMP, non-ICMPv6, non-SCTP, and non-UDP) floods?
- red
Get
Zone Protection Profile Flood Other Ip Red - Red
- enable boolean
- Enable protection against other IP (non-TCP, non-ICMP, non-ICMPv6, non-SCTP, and non-UDP) floods?
- red
Get
Zone Protection Profile Flood Other Ip Red - Red
- enable bool
- Enable protection against other IP (non-TCP, non-ICMP, non-ICMPv6, non-SCTP, and non-UDP) floods?
- red
Get
Zone Protection Profile Flood Other Ip Red - Red
- enable Boolean
- Enable protection against other IP (non-TCP, non-ICMP, non-ICMPv6, non-SCTP, and non-UDP) floods?
- red Property Map
- Red
GetZoneProtectionProfileFloodOtherIpRed
- Activate
Rate int - Activate rate
- Alarm
Rate int - Alarm rate
- Maximal
Rate int - Maximal rate
- Activate
Rate int - Activate rate
- Alarm
Rate int - Alarm rate
- Maximal
Rate int - Maximal rate
- activate
Rate Integer - Activate rate
- alarm
Rate Integer - Alarm rate
- maximal
Rate Integer - Maximal rate
- activate
Rate number - Activate rate
- alarm
Rate number - Alarm rate
- maximal
Rate number - Maximal rate
- activate_
rate int - Activate rate
- alarm_
rate int - Alarm rate
- maximal_
rate int - Maximal rate
- activate
Rate Number - Activate rate
- alarm
Rate Number - Alarm rate
- maximal
Rate Number - Maximal rate
GetZoneProtectionProfileFloodSctpInit
- Enable bool
- Enable protection against floods of Stream Control Transmission Protocol (SCTP) packets that contain an Initiation (INIT) chunk?
- Red
Get
Zone Protection Profile Flood Sctp Init Red - Red
- Enable bool
- Enable protection against floods of Stream Control Transmission Protocol (SCTP) packets that contain an Initiation (INIT) chunk?
- Red
Get
Zone Protection Profile Flood Sctp Init Red - Red
- enable Boolean
- Enable protection against floods of Stream Control Transmission Protocol (SCTP) packets that contain an Initiation (INIT) chunk?
- red
Get
Zone Protection Profile Flood Sctp Init Red - Red
- enable boolean
- Enable protection against floods of Stream Control Transmission Protocol (SCTP) packets that contain an Initiation (INIT) chunk?
- red
Get
Zone Protection Profile Flood Sctp Init Red - Red
- enable bool
- Enable protection against floods of Stream Control Transmission Protocol (SCTP) packets that contain an Initiation (INIT) chunk?
- red
Get
Zone Protection Profile Flood Sctp Init Red - Red
- enable Boolean
- Enable protection against floods of Stream Control Transmission Protocol (SCTP) packets that contain an Initiation (INIT) chunk?
- red Property Map
- Red
GetZoneProtectionProfileFloodSctpInitRed
- Activate
Rate int - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second before subsequent SCTP INIT packets are dropped.
- Alarm
Rate int - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- Maximal
Rate int - The maximum number of SCTP INIT packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- Activate
Rate int - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second before subsequent SCTP INIT packets are dropped.
- Alarm
Rate int - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- Maximal
Rate int - The maximum number of SCTP INIT packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate Integer - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second before subsequent SCTP INIT packets are dropped.
- alarm
Rate Integer - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate Integer - The maximum number of SCTP INIT packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate number - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second before subsequent SCTP INIT packets are dropped.
- alarm
Rate number - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate number - The maximum number of SCTP INIT packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate_
rate int - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second before subsequent SCTP INIT packets are dropped.
- alarm_
rate int - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal_
rate int - The maximum number of SCTP INIT packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate Number - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second before subsequent SCTP INIT packets are dropped.
- alarm
Rate Number - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate Number - The maximum number of SCTP INIT packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
GetZoneProtectionProfileFloodTcpSyn
- Enable bool
- Enable protection against SYN floods?
- Red
Get
Zone Protection Profile Flood Tcp Syn Red - Red
-
Get
Zone Protection Profile Flood Tcp Syn Syn Cookies - Syn cookies
- Enable bool
- Enable protection against SYN floods?
- Red
Get
Zone Protection Profile Flood Tcp Syn Red - Red
-
Get
Zone Protection Profile Flood Tcp Syn Syn Cookies - Syn cookies
- enable Boolean
- Enable protection against SYN floods?
- red
Get
Zone Protection Profile Flood Tcp Syn Red - Red
-
Get
Zone Protection Profile Flood Tcp Syn Syn Cookies - Syn cookies
- enable boolean
- Enable protection against SYN floods?
- red
Get
Zone Protection Profile Flood Tcp Syn Red - Red
-
Get
Zone Protection Profile Flood Tcp Syn Syn Cookies - Syn cookies
- enable bool
- Enable protection against SYN floods?
- red
Get
Zone Protection Profile Flood Tcp Syn Red - Red
-
Get
Zone Protection Profile Flood Tcp Syn Syn Cookies - Syn cookies
- enable Boolean
- Enable protection against SYN floods?
- red Property Map
- Red
- Property Map
- Syn cookies
GetZoneProtectionProfileFloodTcpSynRed
- Activate
Rate int - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - Alarm
Rate int - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - Maximal
Rate int - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- Activate
Rate int - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - Alarm
Rate int - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - Maximal
Rate int - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- activate
Rate Integer - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - alarm
Rate Integer - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - maximal
Rate Integer - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- activate
Rate number - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - alarm
Rate number - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - maximal
Rate number - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- activate_
rate int - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - alarm_
rate int - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - maximal_
rate int - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- activate
Rate Number - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - alarm
Rate Number - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - maximal
Rate Number - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
GetZoneProtectionProfileFloodTcpSynSynCookies
- Activate
Rate int - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - Alarm
Rate int - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - Maximal
Rate int - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- Activate
Rate int - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - Alarm
Rate int - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - Maximal
Rate int - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- activate
Rate Integer - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - alarm
Rate Integer - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - maximal
Rate Integer - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- activate
Rate number - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - alarm
Rate number - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - maximal
Rate number - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- activate_
rate int - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - alarm_
rate int - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - maximal_
rate int - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- activate
Rate Number - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - alarm
Rate Number - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - maximal
Rate Number - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
GetZoneProtectionProfileFloodUdp
- Enable bool
- Enable protection against UDP floods?
- Red
Get
Zone Protection Profile Flood Udp Red - Red
- Enable bool
- Enable protection against UDP floods?
- Red
Get
Zone Protection Profile Flood Udp Red - Red
- enable Boolean
- Enable protection against UDP floods?
- red
Get
Zone Protection Profile Flood Udp Red - Red
- enable boolean
- Enable protection against UDP floods?
- red
Get
Zone Protection Profile Flood Udp Red - Red
- enable bool
- Enable protection against UDP floods?
- red
Get
Zone Protection Profile Flood Udp Red - Red
- enable Boolean
- Enable protection against UDP floods?
- red Property Map
- Red
GetZoneProtectionProfileFloodUdpRed
- Activate
Rate int - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers random dropping of UDP packets.
- Alarm
Rate int - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- Maximal
Rate int - The maximum number of UDP packets (not matching an existing session) the zone receives per second before packets exceeding the maximum are dropped.
- Activate
Rate int - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers random dropping of UDP packets.
- Alarm
Rate int - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- Maximal
Rate int - The maximum number of UDP packets (not matching an existing session) the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate Integer - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers random dropping of UDP packets.
- alarm
Rate Integer - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate Integer - The maximum number of UDP packets (not matching an existing session) the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate number - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers random dropping of UDP packets.
- alarm
Rate number - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate number - The maximum number of UDP packets (not matching an existing session) the zone receives per second before packets exceeding the maximum are dropped.
- activate_
rate int - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers random dropping of UDP packets.
- alarm_
rate int - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal_
rate int - The maximum number of UDP packets (not matching an existing session) the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate Number - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers random dropping of UDP packets.
- alarm
Rate Number - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate Number - The maximum number of UDP packets (not matching an existing session) the zone receives per second before packets exceeding the maximum are dropped.
GetZoneProtectionProfileIpv6
- Anycast
Source bool - Discard IPv6 packets that contain an anycast source address.
- Filter
Ext GetHdr Zone Protection Profile Ipv6Filter Ext Hdr - Filter ext hdr
- Icmpv6Too
Big boolSmall Mtu Discard - Discard IPv6 packets that contain a Packet Too Big ICMPv6 message when the maximum transmission unit (MTU) is less than 1,280 bytes.
- Ignore
Inv GetPkt Zone Protection Profile Ipv6Ignore Inv Pkt - Ignore inv pkt
- Ipv4Compatible
Address bool - Discard IPv6 packets that are defined as an RFC 4291 IPv4-Compatible IPv6 address.
- Needless
Fragment boolHdr - Discard IPv6 packets with the last fragment flag (M=0) and offset of zero.
- Options
Invalid boolIpv6Discard - Discard IPv6 packets that contain invalid IPv6 options in an extension header.
- Reserved
Field boolSet Discard - Discard IPv6 packets that have a header with a reserved field not set to zero.
- Routing
Header0 bool - Drop packets with type 0 routing header.
- Routing
Header1 bool - Drop packets with type 1 routing header.
- Routing
Header253 bool - Drop packets with type 253 routing header.
- Routing
Header254 bool - Drop packets with type 254 routing header.
- Routing
Header255 bool - Drop packets with type 255 routing header.
- Routing
Header3 bool - Drop packets with type 3 routing header.
- Routing
Header4252 bool - Drop packets with type 4 to type 252 routing header.
- Anycast
Source bool - Discard IPv6 packets that contain an anycast source address.
- Filter
Ext GetHdr Zone Protection Profile Ipv6Filter Ext Hdr - Filter ext hdr
- Icmpv6Too
Big boolSmall Mtu Discard - Discard IPv6 packets that contain a Packet Too Big ICMPv6 message when the maximum transmission unit (MTU) is less than 1,280 bytes.
- Ignore
Inv GetPkt Zone Protection Profile Ipv6Ignore Inv Pkt - Ignore inv pkt
- Ipv4Compatible
Address bool - Discard IPv6 packets that are defined as an RFC 4291 IPv4-Compatible IPv6 address.
- Needless
Fragment boolHdr - Discard IPv6 packets with the last fragment flag (M=0) and offset of zero.
- Options
Invalid boolIpv6Discard - Discard IPv6 packets that contain invalid IPv6 options in an extension header.
- Reserved
Field boolSet Discard - Discard IPv6 packets that have a header with a reserved field not set to zero.
- Routing
Header0 bool - Drop packets with type 0 routing header.
- Routing
Header1 bool - Drop packets with type 1 routing header.
- Routing
Header253 bool - Drop packets with type 253 routing header.
- Routing
Header254 bool - Drop packets with type 254 routing header.
- Routing
Header255 bool - Drop packets with type 255 routing header.
- Routing
Header3 bool - Drop packets with type 3 routing header.
- Routing
Header4252 bool - Drop packets with type 4 to type 252 routing header.
- anycast
Source Boolean - Discard IPv6 packets that contain an anycast source address.
- filter
Ext GetHdr Zone Protection Profile Ipv6Filter Ext Hdr - Filter ext hdr
- icmpv6Too
Big BooleanSmall Mtu Discard - Discard IPv6 packets that contain a Packet Too Big ICMPv6 message when the maximum transmission unit (MTU) is less than 1,280 bytes.
- ignore
Inv GetPkt Zone Protection Profile Ipv6Ignore Inv Pkt - Ignore inv pkt
- ipv4Compatible
Address Boolean - Discard IPv6 packets that are defined as an RFC 4291 IPv4-Compatible IPv6 address.
- needless
Fragment BooleanHdr - Discard IPv6 packets with the last fragment flag (M=0) and offset of zero.
- options
Invalid BooleanIpv6Discard - Discard IPv6 packets that contain invalid IPv6 options in an extension header.
- reserved
Field BooleanSet Discard - Discard IPv6 packets that have a header with a reserved field not set to zero.
- routing
Header0 Boolean - Drop packets with type 0 routing header.
- routing
Header1 Boolean - Drop packets with type 1 routing header.
- routing
Header253 Boolean - Drop packets with type 253 routing header.
- routing
Header254 Boolean - Drop packets with type 254 routing header.
- routing
Header255 Boolean - Drop packets with type 255 routing header.
- routing
Header3 Boolean - Drop packets with type 3 routing header.
- routing
Header4252 Boolean - Drop packets with type 4 to type 252 routing header.
- anycast
Source boolean - Discard IPv6 packets that contain an anycast source address.
- filter
Ext GetHdr Zone Protection Profile Ipv6Filter Ext Hdr - Filter ext hdr
- icmpv6Too
Big booleanSmall Mtu Discard - Discard IPv6 packets that contain a Packet Too Big ICMPv6 message when the maximum transmission unit (MTU) is less than 1,280 bytes.
- ignore
Inv GetPkt Zone Protection Profile Ipv6Ignore Inv Pkt - Ignore inv pkt
- ipv4Compatible
Address boolean - Discard IPv6 packets that are defined as an RFC 4291 IPv4-Compatible IPv6 address.
- needless
Fragment booleanHdr - Discard IPv6 packets with the last fragment flag (M=0) and offset of zero.
- options
Invalid booleanIpv6Discard - Discard IPv6 packets that contain invalid IPv6 options in an extension header.
- reserved
Field booleanSet Discard - Discard IPv6 packets that have a header with a reserved field not set to zero.
- routing
Header0 boolean - Drop packets with type 0 routing header.
- routing
Header1 boolean - Drop packets with type 1 routing header.
- routing
Header253 boolean - Drop packets with type 253 routing header.
- routing
Header254 boolean - Drop packets with type 254 routing header.
- routing
Header255 boolean - Drop packets with type 255 routing header.
- routing
Header3 boolean - Drop packets with type 3 routing header.
- routing
Header4252 boolean - Drop packets with type 4 to type 252 routing header.
- anycast_
source bool - Discard IPv6 packets that contain an anycast source address.
- filter_
ext_ Gethdr Zone Protection Profile Ipv6Filter Ext Hdr - Filter ext hdr
- icmpv6_
too_ boolbig_ small_ mtu_ discard - Discard IPv6 packets that contain a Packet Too Big ICMPv6 message when the maximum transmission unit (MTU) is less than 1,280 bytes.
- ignore_
inv_ Getpkt Zone Protection Profile Ipv6Ignore Inv Pkt - Ignore inv pkt
- ipv4_
compatible_ booladdress - Discard IPv6 packets that are defined as an RFC 4291 IPv4-Compatible IPv6 address.
- needless_
fragment_ boolhdr - Discard IPv6 packets with the last fragment flag (M=0) and offset of zero.
- options_
invalid_ boolipv6_ discard - Discard IPv6 packets that contain invalid IPv6 options in an extension header.
- reserved_
field_ boolset_ discard - Discard IPv6 packets that have a header with a reserved field not set to zero.
- routing_
header0 bool - Drop packets with type 0 routing header.
- routing_
header1 bool - Drop packets with type 1 routing header.
- routing_
header253 bool - Drop packets with type 253 routing header.
- routing_
header254 bool - Drop packets with type 254 routing header.
- routing_
header255 bool - Drop packets with type 255 routing header.
- routing_
header3 bool - Drop packets with type 3 routing header.
- routing_
header4252 bool - Drop packets with type 4 to type 252 routing header.
- anycast
Source Boolean - Discard IPv6 packets that contain an anycast source address.
- filter
Ext Property MapHdr - Filter ext hdr
- icmpv6Too
Big BooleanSmall Mtu Discard - Discard IPv6 packets that contain a Packet Too Big ICMPv6 message when the maximum transmission unit (MTU) is less than 1,280 bytes.
- ignore
Inv Property MapPkt - Ignore inv pkt
- ipv4Compatible
Address Boolean - Discard IPv6 packets that are defined as an RFC 4291 IPv4-Compatible IPv6 address.
- needless
Fragment BooleanHdr - Discard IPv6 packets with the last fragment flag (M=0) and offset of zero.
- options
Invalid BooleanIpv6Discard - Discard IPv6 packets that contain invalid IPv6 options in an extension header.
- reserved
Field BooleanSet Discard - Discard IPv6 packets that have a header with a reserved field not set to zero.
- routing
Header0 Boolean - Drop packets with type 0 routing header.
- routing
Header1 Boolean - Drop packets with type 1 routing header.
- routing
Header253 Boolean - Drop packets with type 253 routing header.
- routing
Header254 Boolean - Drop packets with type 254 routing header.
- routing
Header255 Boolean - Drop packets with type 255 routing header.
- routing
Header3 Boolean - Drop packets with type 3 routing header.
- routing
Header4252 Boolean - Drop packets with type 4 to type 252 routing header.
GetZoneProtectionProfileIpv6FilterExtHdr
- Dest
Option boolHdr - Discard IPv6 packets that contain the Destination Options extension, which contains options intended only for the destination of the packet.
- Hop
By boolHop Hdr - Discard IPv6 packets that contain the Hop-by-Hop Options extension header.
- Routing
Hdr bool - Discard IPv6 packets that contain the Routing extension header, which directs packets to one or more intermediate nodes on its way to its destination.
- Dest
Option boolHdr - Discard IPv6 packets that contain the Destination Options extension, which contains options intended only for the destination of the packet.
- Hop
By boolHop Hdr - Discard IPv6 packets that contain the Hop-by-Hop Options extension header.
- Routing
Hdr bool - Discard IPv6 packets that contain the Routing extension header, which directs packets to one or more intermediate nodes on its way to its destination.
- dest
Option BooleanHdr - Discard IPv6 packets that contain the Destination Options extension, which contains options intended only for the destination of the packet.
- hop
By BooleanHop Hdr - Discard IPv6 packets that contain the Hop-by-Hop Options extension header.
- routing
Hdr Boolean - Discard IPv6 packets that contain the Routing extension header, which directs packets to one or more intermediate nodes on its way to its destination.
- dest
Option booleanHdr - Discard IPv6 packets that contain the Destination Options extension, which contains options intended only for the destination of the packet.
- hop
By booleanHop Hdr - Discard IPv6 packets that contain the Hop-by-Hop Options extension header.
- routing
Hdr boolean - Discard IPv6 packets that contain the Routing extension header, which directs packets to one or more intermediate nodes on its way to its destination.
- dest_
option_ boolhdr - Discard IPv6 packets that contain the Destination Options extension, which contains options intended only for the destination of the packet.
- hop_
by_ boolhop_ hdr - Discard IPv6 packets that contain the Hop-by-Hop Options extension header.
- routing_
hdr bool - Discard IPv6 packets that contain the Routing extension header, which directs packets to one or more intermediate nodes on its way to its destination.
- dest
Option BooleanHdr - Discard IPv6 packets that contain the Destination Options extension, which contains options intended only for the destination of the packet.
- hop
By BooleanHop Hdr - Discard IPv6 packets that contain the Hop-by-Hop Options extension header.
- routing
Hdr Boolean - Discard IPv6 packets that contain the Routing extension header, which directs packets to one or more intermediate nodes on its way to its destination.
GetZoneProtectionProfileIpv6IgnoreInvPkt
- Dest
Unreach bool - Require an explicit Security policy match for Destination Unreachable ICMPv6 messages, even when the message is associated with an existing session.
- Param
Problem bool - Require an explicit Security policy match for Parameter Problem ICMPv6 messages, even when the message is associated with an existing session.
- Pkt
Too boolBig - Require an explicit Security policy match for Packet Too Big ICMPv6 messages, even when the message is associated with an existing session.
- Redirect bool
- Require an explicit Security policy match for Redirect Message ICMPv6 messages, even when the message is associated with an existing session.
- Time
Exceeded bool - Require an explicit Security policy match for Time Exceeded ICMPv6 messages, even when the message is associated with an existing session.
- Dest
Unreach bool - Require an explicit Security policy match for Destination Unreachable ICMPv6 messages, even when the message is associated with an existing session.
- Param
Problem bool - Require an explicit Security policy match for Parameter Problem ICMPv6 messages, even when the message is associated with an existing session.
- Pkt
Too boolBig - Require an explicit Security policy match for Packet Too Big ICMPv6 messages, even when the message is associated with an existing session.
- Redirect bool
- Require an explicit Security policy match for Redirect Message ICMPv6 messages, even when the message is associated with an existing session.
- Time
Exceeded bool - Require an explicit Security policy match for Time Exceeded ICMPv6 messages, even when the message is associated with an existing session.
- dest
Unreach Boolean - Require an explicit Security policy match for Destination Unreachable ICMPv6 messages, even when the message is associated with an existing session.
- param
Problem Boolean - Require an explicit Security policy match for Parameter Problem ICMPv6 messages, even when the message is associated with an existing session.
- pkt
Too BooleanBig - Require an explicit Security policy match for Packet Too Big ICMPv6 messages, even when the message is associated with an existing session.
- redirect Boolean
- Require an explicit Security policy match for Redirect Message ICMPv6 messages, even when the message is associated with an existing session.
- time
Exceeded Boolean - Require an explicit Security policy match for Time Exceeded ICMPv6 messages, even when the message is associated with an existing session.
- dest
Unreach boolean - Require an explicit Security policy match for Destination Unreachable ICMPv6 messages, even when the message is associated with an existing session.
- param
Problem boolean - Require an explicit Security policy match for Parameter Problem ICMPv6 messages, even when the message is associated with an existing session.
- pkt
Too booleanBig - Require an explicit Security policy match for Packet Too Big ICMPv6 messages, even when the message is associated with an existing session.
- redirect boolean
- Require an explicit Security policy match for Redirect Message ICMPv6 messages, even when the message is associated with an existing session.
- time
Exceeded boolean - Require an explicit Security policy match for Time Exceeded ICMPv6 messages, even when the message is associated with an existing session.
- dest_
unreach bool - Require an explicit Security policy match for Destination Unreachable ICMPv6 messages, even when the message is associated with an existing session.
- param_
problem bool - Require an explicit Security policy match for Parameter Problem ICMPv6 messages, even when the message is associated with an existing session.
- pkt_
too_ boolbig - Require an explicit Security policy match for Packet Too Big ICMPv6 messages, even when the message is associated with an existing session.
- redirect bool
- Require an explicit Security policy match for Redirect Message ICMPv6 messages, even when the message is associated with an existing session.
- time_
exceeded bool - Require an explicit Security policy match for Time Exceeded ICMPv6 messages, even when the message is associated with an existing session.
- dest
Unreach Boolean - Require an explicit Security policy match for Destination Unreachable ICMPv6 messages, even when the message is associated with an existing session.
- param
Problem Boolean - Require an explicit Security policy match for Parameter Problem ICMPv6 messages, even when the message is associated with an existing session.
- pkt
Too BooleanBig - Require an explicit Security policy match for Packet Too Big ICMPv6 messages, even when the message is associated with an existing session.
- redirect Boolean
- Require an explicit Security policy match for Redirect Message ICMPv6 messages, even when the message is associated with an existing session.
- time
Exceeded Boolean - Require an explicit Security policy match for Time Exceeded ICMPv6 messages, even when the message is associated with an existing session.
GetZoneProtectionProfileL2SecGroupTagProtection
GetZoneProtectionProfileL2SecGroupTagProtectionTag
- Enable bool
- Enable this exclude list for Ethernet SGT protection.
- Name string
- Name for the list of Security Group Tags (SGTs).
- Tag string
- The Layer 2 SGTs in headers of packets that you want to exclude (drop) when the SGT matches this list in the Zone Protection profile applied to a zone (range is 0 to 65,535).
- Enable bool
- Enable this exclude list for Ethernet SGT protection.
- Name string
- Name for the list of Security Group Tags (SGTs).
- Tag string
- The Layer 2 SGTs in headers of packets that you want to exclude (drop) when the SGT matches this list in the Zone Protection profile applied to a zone (range is 0 to 65,535).
- enable Boolean
- Enable this exclude list for Ethernet SGT protection.
- name String
- Name for the list of Security Group Tags (SGTs).
- tag String
- The Layer 2 SGTs in headers of packets that you want to exclude (drop) when the SGT matches this list in the Zone Protection profile applied to a zone (range is 0 to 65,535).
- enable boolean
- Enable this exclude list for Ethernet SGT protection.
- name string
- Name for the list of Security Group Tags (SGTs).
- tag string
- The Layer 2 SGTs in headers of packets that you want to exclude (drop) when the SGT matches this list in the Zone Protection profile applied to a zone (range is 0 to 65,535).
- enable bool
- Enable this exclude list for Ethernet SGT protection.
- name str
- Name for the list of Security Group Tags (SGTs).
- tag str
- The Layer 2 SGTs in headers of packets that you want to exclude (drop) when the SGT matches this list in the Zone Protection profile applied to a zone (range is 0 to 65,535).
- enable Boolean
- Enable this exclude list for Ethernet SGT protection.
- name String
- Name for the list of Security Group Tags (SGTs).
- tag String
- The Layer 2 SGTs in headers of packets that you want to exclude (drop) when the SGT matches this list in the Zone Protection profile applied to a zone (range is 0 to 65,535).
GetZoneProtectionProfileNonIpProtocol
- List
Type string - Specify the type of list you are creating for protocol protection:
- Include List—Only the protocols on the list are allowed—in addition to IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), and VLAN tagged frames (0x8100). All other protocols are implicitly denied (blocked).
- Exclude List—Only the protocols on the list are denied; all other protocols are implicitly allowed. You cannot exclude IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), or VLAN tagged frames (0x8100).
- Protocols
List<Get
Zone Protection Profile Non Ip Protocol Protocol> - Protocol
- List
Type string - Specify the type of list you are creating for protocol protection:
- Include List—Only the protocols on the list are allowed—in addition to IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), and VLAN tagged frames (0x8100). All other protocols are implicitly denied (blocked).
- Exclude List—Only the protocols on the list are denied; all other protocols are implicitly allowed. You cannot exclude IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), or VLAN tagged frames (0x8100).
- Protocols
[]Get
Zone Protection Profile Non Ip Protocol Protocol - Protocol
- list
Type String - Specify the type of list you are creating for protocol protection:
- Include List—Only the protocols on the list are allowed—in addition to IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), and VLAN tagged frames (0x8100). All other protocols are implicitly denied (blocked).
- Exclude List—Only the protocols on the list are denied; all other protocols are implicitly allowed. You cannot exclude IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), or VLAN tagged frames (0x8100).
- protocols
List<Get
Zone Protection Profile Non Ip Protocol Protocol> - Protocol
- list
Type string - Specify the type of list you are creating for protocol protection:
- Include List—Only the protocols on the list are allowed—in addition to IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), and VLAN tagged frames (0x8100). All other protocols are implicitly denied (blocked).
- Exclude List—Only the protocols on the list are denied; all other protocols are implicitly allowed. You cannot exclude IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), or VLAN tagged frames (0x8100).
- protocols
Get
Zone Protection Profile Non Ip Protocol Protocol[] - Protocol
- list_
type str - Specify the type of list you are creating for protocol protection:
- Include List—Only the protocols on the list are allowed—in addition to IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), and VLAN tagged frames (0x8100). All other protocols are implicitly denied (blocked).
- Exclude List—Only the protocols on the list are denied; all other protocols are implicitly allowed. You cannot exclude IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), or VLAN tagged frames (0x8100).
- protocols
Sequence[Get
Zone Protection Profile Non Ip Protocol Protocol] - Protocol
- list
Type String - Specify the type of list you are creating for protocol protection:
- Include List—Only the protocols on the list are allowed—in addition to IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), and VLAN tagged frames (0x8100). All other protocols are implicitly denied (blocked).
- Exclude List—Only the protocols on the list are denied; all other protocols are implicitly allowed. You cannot exclude IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), or VLAN tagged frames (0x8100).
- protocols List<Property Map>
- Protocol
GetZoneProtectionProfileNonIpProtocolProtocol
- Enable bool
- Enable the Ethertype code on the list.
- Ether
Type string - Enter an Ethertype code (protocol) preceded by 0x to indicate hexadecimal (range is 0x0000 to 0xFFFF). A list can have a maximum of 64 Ethertypes. Some sources of Ethertype codes are:
- Name string
- Enter the protocol name that corresponds to the Ethertype code you are adding to the list. The firewall does not verify that the protocol name matches the Ethertype code but the Ethertype code does determine the protocol filter.
- Enable bool
- Enable the Ethertype code on the list.
- Ether
Type string - Enter an Ethertype code (protocol) preceded by 0x to indicate hexadecimal (range is 0x0000 to 0xFFFF). A list can have a maximum of 64 Ethertypes. Some sources of Ethertype codes are:
- Name string
- Enter the protocol name that corresponds to the Ethertype code you are adding to the list. The firewall does not verify that the protocol name matches the Ethertype code but the Ethertype code does determine the protocol filter.
- enable Boolean
- Enable the Ethertype code on the list.
- ether
Type String - Enter an Ethertype code (protocol) preceded by 0x to indicate hexadecimal (range is 0x0000 to 0xFFFF). A list can have a maximum of 64 Ethertypes. Some sources of Ethertype codes are:
- name String
- Enter the protocol name that corresponds to the Ethertype code you are adding to the list. The firewall does not verify that the protocol name matches the Ethertype code but the Ethertype code does determine the protocol filter.
- enable boolean
- Enable the Ethertype code on the list.
- ether
Type string - Enter an Ethertype code (protocol) preceded by 0x to indicate hexadecimal (range is 0x0000 to 0xFFFF). A list can have a maximum of 64 Ethertypes. Some sources of Ethertype codes are:
- name string
- Enter the protocol name that corresponds to the Ethertype code you are adding to the list. The firewall does not verify that the protocol name matches the Ethertype code but the Ethertype code does determine the protocol filter.
- enable bool
- Enable the Ethertype code on the list.
- ether_
type str - Enter an Ethertype code (protocol) preceded by 0x to indicate hexadecimal (range is 0x0000 to 0xFFFF). A list can have a maximum of 64 Ethertypes. Some sources of Ethertype codes are:
- name str
- Enter the protocol name that corresponds to the Ethertype code you are adding to the list. The firewall does not verify that the protocol name matches the Ethertype code but the Ethertype code does determine the protocol filter.
- enable Boolean
- Enable the Ethertype code on the list.
- ether
Type String - Enter an Ethertype code (protocol) preceded by 0x to indicate hexadecimal (range is 0x0000 to 0xFFFF). A list can have a maximum of 64 Ethertypes. Some sources of Ethertype codes are:
- name String
- Enter the protocol name that corresponds to the Ethertype code you are adding to the list. The firewall does not verify that the protocol name matches the Ethertype code but the Ethertype code does determine the protocol filter.
GetZoneProtectionProfileScan
- Action
Get
Zone Protection Profile Scan Action - Action
- Interval int
- Interval
- Name string
- The threat ID number. These can be found in Palo Alto Networks ThreatVault.
- "8001" - TCP Port Scan
- "8002" - Host Sweep
- "8003" - UDP Port Scan
- "8006" - Port Scan
- Threshold int
- Threshold
- Action
Get
Zone Protection Profile Scan Action - Action
- Interval int
- Interval
- Name string
- The threat ID number. These can be found in Palo Alto Networks ThreatVault.
- "8001" - TCP Port Scan
- "8002" - Host Sweep
- "8003" - UDP Port Scan
- "8006" - Port Scan
- Threshold int
- Threshold
- action
Get
Zone Protection Profile Scan Action - Action
- interval Integer
- Interval
- name String
- The threat ID number. These can be found in Palo Alto Networks ThreatVault.
- "8001" - TCP Port Scan
- "8002" - Host Sweep
- "8003" - UDP Port Scan
- "8006" - Port Scan
- threshold Integer
- Threshold
- action
Get
Zone Protection Profile Scan Action - Action
- interval number
- Interval
- name string
- The threat ID number. These can be found in Palo Alto Networks ThreatVault.
- "8001" - TCP Port Scan
- "8002" - Host Sweep
- "8003" - UDP Port Scan
- "8006" - Port Scan
- threshold number
- Threshold
- action
Get
Zone Protection Profile Scan Action - Action
- interval int
- Interval
- name str
- The threat ID number. These can be found in Palo Alto Networks ThreatVault.
- "8001" - TCP Port Scan
- "8002" - Host Sweep
- "8003" - UDP Port Scan
- "8006" - Port Scan
- threshold int
- Threshold
- action Property Map
- Action
- interval Number
- Interval
- name String
- The threat ID number. These can be found in Palo Alto Networks ThreatVault.
- "8001" - TCP Port Scan
- "8002" - Host Sweep
- "8003" - UDP Port Scan
- "8006" - Port Scan
- threshold Number
- Threshold
GetZoneProtectionProfileScanAction
- alert Property Map
- Alert
- allow Property Map
- Allow
- block Property Map
- Block
- block
Ip Property Map - Block ip
GetZoneProtectionProfileScanActionBlockIp
GetZoneProtectionProfileScanWhiteList
Package Details
- Repository
- scm pulumi/pulumi-scm
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
scmTerraform Provider.
Strata Cloud Manager v0.4.3 published on Saturday, Nov 8, 2025 by Pulumi
