Strata Cloud Manager v0.4.3 published on Saturday, Nov 8, 2025 by Pulumi
Strata Cloud Manager v0.4.3 published on Saturday, Nov 8, 2025 by Pulumi
Retrieves a listing of config items.
Using getZoneProtectionProfileList
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getZoneProtectionProfileList(args: GetZoneProtectionProfileListArgs, opts?: InvokeOptions): Promise<GetZoneProtectionProfileListResult>
function getZoneProtectionProfileListOutput(args: GetZoneProtectionProfileListOutputArgs, opts?: InvokeOptions): Output<GetZoneProtectionProfileListResult>def get_zone_protection_profile_list(device: Optional[str] = None,
folder: Optional[str] = None,
limit: Optional[int] = None,
name: Optional[str] = None,
offset: Optional[int] = None,
snippet: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetZoneProtectionProfileListResult
def get_zone_protection_profile_list_output(device: Optional[pulumi.Input[str]] = None,
folder: Optional[pulumi.Input[str]] = None,
limit: Optional[pulumi.Input[int]] = None,
name: Optional[pulumi.Input[str]] = None,
offset: Optional[pulumi.Input[int]] = None,
snippet: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetZoneProtectionProfileListResult]func GetZoneProtectionProfileList(ctx *Context, args *GetZoneProtectionProfileListArgs, opts ...InvokeOption) (*GetZoneProtectionProfileListResult, error)
func GetZoneProtectionProfileListOutput(ctx *Context, args *GetZoneProtectionProfileListOutputArgs, opts ...InvokeOption) GetZoneProtectionProfileListResultOutput> Note: This function is named GetZoneProtectionProfileList in the Go SDK.
public static class GetZoneProtectionProfileList
{
public static Task<GetZoneProtectionProfileListResult> InvokeAsync(GetZoneProtectionProfileListArgs args, InvokeOptions? opts = null)
public static Output<GetZoneProtectionProfileListResult> Invoke(GetZoneProtectionProfileListInvokeArgs args, InvokeOptions? opts = null)
}public static CompletableFuture<GetZoneProtectionProfileListResult> getZoneProtectionProfileList(GetZoneProtectionProfileListArgs args, InvokeOptions options)
public static Output<GetZoneProtectionProfileListResult> getZoneProtectionProfileList(GetZoneProtectionProfileListArgs args, InvokeOptions options)
fn::invoke:
function: scm:index/getZoneProtectionProfileList:getZoneProtectionProfileList
arguments:
# arguments dictionaryThe following arguments are supported:
getZoneProtectionProfileList Result
The following output properties are available:
Supporting Types
GetZoneProtectionProfileListData
- Asymmetric
Path string - Determine whether to drop or bypass packets that contain out-of-sync ACKs or out-of-window sequence numbers:
global— Use system-wide setting that is assigned through TCP Settings or the CLI.drop— Drop packets that contain an asymmetric path.bypass— Bypass scanning on packets that contain an asymmetric path.
- Description string
- The description of the profile
- Device string
- The device in which the resource is defined
- Discard
Icmp boolEmbedded Error - Discard ICMP packets that are embedded with an error message.
- Flood
Get
Zone Protection Profile List Data Flood - Flood
- Folder string
- The folder in which the resource is defined
- Fragmented
Traffic boolDiscard - Discard fragmented IP packets.
- Icmp
Frag boolDiscard - Discard packets that consist of ICMP fragments.
- Icmp
Large boolPacket Discard - Discard ICMP packets that are larger than 1024 bytes.
- Icmp
Ping boolZero Id Discard - Discard packets if the ICMP ping packet has an identifier value of 0.
- Id string
- UUID of the resource
- Ipv6
Get
Zone Protection Profile List Data Ipv6 - Ipv6
- L2Sec
Group GetTag Protection Zone Protection Profile List Data L2Sec Group Tag Protection - L2 sec group tag protection
- Loose
Source boolRouting Discard - Discard packets with the Loose Source Routing IP option set. Loose Source Routing is an option whereby a source of a datagram provides routing information and a gateway or host is allowed to choose any route of a number of intermediate gateways to get the datagram to the next address in the route.
- Malformed
Option boolDiscard - Discard packets if they have incorrect combinations of class, number, and length based on RFCs 791, 1108, 1393, and 2113.
- Mismatched
Overlapping boolTcp Segment Discard - Drop packets with mismatched overlapping TCP segments.
- Mptcp
Option stringStrip - MPTCP is an extension of TCP that allows a client to maintain a connection by simultaneously using multiple paths to connect to the destination host. By default, MPTCP support is disabled, based on the global MPTCP setting. Review or adjust the MPTCP settings for the security zones associated with this profile:
no— Enable MPTCP support (do not strip the MPTCP option).yes— Disable MPTCP support (strip the MPTCP option). With this configured, MPTCP connections are converted to standard TCP connections, as MPTCP is backwards compatible with TCP.global— Support MPTCP based on the global MPTCP setting. By default, the global MPTCP setting is set to yes so that MPTCP is disabled (the MPTCP option is stripped from the packet).
- Name string
- The profile name
- Non
Ip GetProtocol Zone Protection Profile List Data Non Ip Protocol - Non ip protocol
- Record
Route boolDiscard - Discard packets with the Record Route IP option set. When a datagram has this option, each router that routes the datagram adds its own IP address to the header, thus providing the path to the recipient.
- Reject
Non stringSyn Tcp - Determine whether to reject the packet if the first packet for the TCP session setup is not a SYN packet:
global— Use system-wide setting that is assigned through the CLI.yes— Reject non-SYN TCP.no— Accept non-SYN TCP.
- Scan
White List<GetLists Zone Protection Profile List Data Scan White List> - Scan white list
- Scans
List<Get
Zone Protection Profile List Data Scan> - Scan
- Security
Discard bool - Discard packets if the security option is defined.
- Snippet string
- The snippet in which the resource is defined
- Spoofed
Ip boolDiscard - Check that the source IP address of the ingress packet is routable and the routing interface is in the same zone as the ingress interface. If either condition is not true, discard the packet.
- Stream
Id boolDiscard - Discard packets if the Stream ID option is defined.
- Strict
Ip boolCheck - Check that both conditions are true:
- The source IP address is not the subnet broadcast IP address of the ingress interface.
- The source IP address is routable over the exact ingress interface. If either condition is not true, discard the packet.
- Strict
Source boolRouting Discard - Discard packets with the Strict Source Routing IP option set. Strict Source Routing is an option whereby a source of a datagram provides routing information through which a gateway or host must send the datagram.
- Suppress
Icmp boolNeedfrag - Stop sending ICMP fragmentation needed messages in response to packets that exceed the interface MTU and have the do not fragment (DF) bit set. This setting will interfere with the PMTUD process performed by hosts behind the firewall.
- Suppress
Icmp boolTimeexceeded - Stop sending ICMP TTL expired messages.
- Tcp
Fast boolOpen And Data Strip - Strip the TCP Fast Open option (and data payload, if any) from the TCP SYN or SYN-ACK packet during a TCP three-way handshake.
- Tcp
Handshake boolDiscard - Drop packets with split handshakes.
- Tcp
Syn boolWith Data Discard - Prevent a TCP session from being established if the TCP SYN packet contains data during a three-way handshake.
- Tcp
Synack boolWith Data Discard - Prevent a TCP session from being established if the TCP SYN-ACK packet contains data during a three-way handshake.
- Tcp
Timestamp boolStrip - Determine whether the packet has a TCP timestamp in the header and, if it does, strip the timestamp from the header.
- Tfid string
- Timestamp
Discard bool - Discard packets with the Timestamp IP option set.
- Unknown
Option boolDiscard - Discard packets if the class and number are unknown.
- Asymmetric
Path string - Determine whether to drop or bypass packets that contain out-of-sync ACKs or out-of-window sequence numbers:
global— Use system-wide setting that is assigned through TCP Settings or the CLI.drop— Drop packets that contain an asymmetric path.bypass— Bypass scanning on packets that contain an asymmetric path.
- Description string
- The description of the profile
- Device string
- The device in which the resource is defined
- Discard
Icmp boolEmbedded Error - Discard ICMP packets that are embedded with an error message.
- Flood
Get
Zone Protection Profile List Data Flood - Flood
- Folder string
- The folder in which the resource is defined
- Fragmented
Traffic boolDiscard - Discard fragmented IP packets.
- Icmp
Frag boolDiscard - Discard packets that consist of ICMP fragments.
- Icmp
Large boolPacket Discard - Discard ICMP packets that are larger than 1024 bytes.
- Icmp
Ping boolZero Id Discard - Discard packets if the ICMP ping packet has an identifier value of 0.
- Id string
- UUID of the resource
- Ipv6
Get
Zone Protection Profile List Data Ipv6 - Ipv6
- L2Sec
Group GetTag Protection Zone Protection Profile List Data L2Sec Group Tag Protection - L2 sec group tag protection
- Loose
Source boolRouting Discard - Discard packets with the Loose Source Routing IP option set. Loose Source Routing is an option whereby a source of a datagram provides routing information and a gateway or host is allowed to choose any route of a number of intermediate gateways to get the datagram to the next address in the route.
- Malformed
Option boolDiscard - Discard packets if they have incorrect combinations of class, number, and length based on RFCs 791, 1108, 1393, and 2113.
- Mismatched
Overlapping boolTcp Segment Discard - Drop packets with mismatched overlapping TCP segments.
- Mptcp
Option stringStrip - MPTCP is an extension of TCP that allows a client to maintain a connection by simultaneously using multiple paths to connect to the destination host. By default, MPTCP support is disabled, based on the global MPTCP setting. Review or adjust the MPTCP settings for the security zones associated with this profile:
no— Enable MPTCP support (do not strip the MPTCP option).yes— Disable MPTCP support (strip the MPTCP option). With this configured, MPTCP connections are converted to standard TCP connections, as MPTCP is backwards compatible with TCP.global— Support MPTCP based on the global MPTCP setting. By default, the global MPTCP setting is set to yes so that MPTCP is disabled (the MPTCP option is stripped from the packet).
- Name string
- The profile name
- Non
Ip GetProtocol Zone Protection Profile List Data Non Ip Protocol - Non ip protocol
- Record
Route boolDiscard - Discard packets with the Record Route IP option set. When a datagram has this option, each router that routes the datagram adds its own IP address to the header, thus providing the path to the recipient.
- Reject
Non stringSyn Tcp - Determine whether to reject the packet if the first packet for the TCP session setup is not a SYN packet:
global— Use system-wide setting that is assigned through the CLI.yes— Reject non-SYN TCP.no— Accept non-SYN TCP.
- Scan
White []GetLists Zone Protection Profile List Data Scan White List - Scan white list
- Scans
[]Get
Zone Protection Profile List Data Scan - Scan
- Security
Discard bool - Discard packets if the security option is defined.
- Snippet string
- The snippet in which the resource is defined
- Spoofed
Ip boolDiscard - Check that the source IP address of the ingress packet is routable and the routing interface is in the same zone as the ingress interface. If either condition is not true, discard the packet.
- Stream
Id boolDiscard - Discard packets if the Stream ID option is defined.
- Strict
Ip boolCheck - Check that both conditions are true:
- The source IP address is not the subnet broadcast IP address of the ingress interface.
- The source IP address is routable over the exact ingress interface. If either condition is not true, discard the packet.
- Strict
Source boolRouting Discard - Discard packets with the Strict Source Routing IP option set. Strict Source Routing is an option whereby a source of a datagram provides routing information through which a gateway or host must send the datagram.
- Suppress
Icmp boolNeedfrag - Stop sending ICMP fragmentation needed messages in response to packets that exceed the interface MTU and have the do not fragment (DF) bit set. This setting will interfere with the PMTUD process performed by hosts behind the firewall.
- Suppress
Icmp boolTimeexceeded - Stop sending ICMP TTL expired messages.
- Tcp
Fast boolOpen And Data Strip - Strip the TCP Fast Open option (and data payload, if any) from the TCP SYN or SYN-ACK packet during a TCP three-way handshake.
- Tcp
Handshake boolDiscard - Drop packets with split handshakes.
- Tcp
Syn boolWith Data Discard - Prevent a TCP session from being established if the TCP SYN packet contains data during a three-way handshake.
- Tcp
Synack boolWith Data Discard - Prevent a TCP session from being established if the TCP SYN-ACK packet contains data during a three-way handshake.
- Tcp
Timestamp boolStrip - Determine whether the packet has a TCP timestamp in the header and, if it does, strip the timestamp from the header.
- Tfid string
- Timestamp
Discard bool - Discard packets with the Timestamp IP option set.
- Unknown
Option boolDiscard - Discard packets if the class and number are unknown.
- asymmetric
Path String - Determine whether to drop or bypass packets that contain out-of-sync ACKs or out-of-window sequence numbers:
global— Use system-wide setting that is assigned through TCP Settings or the CLI.drop— Drop packets that contain an asymmetric path.bypass— Bypass scanning on packets that contain an asymmetric path.
- description String
- The description of the profile
- device String
- The device in which the resource is defined
- discard
Icmp BooleanEmbedded Error - Discard ICMP packets that are embedded with an error message.
- flood
Get
Zone Protection Profile List Data Flood - Flood
- folder String
- The folder in which the resource is defined
- fragmented
Traffic BooleanDiscard - Discard fragmented IP packets.
- icmp
Frag BooleanDiscard - Discard packets that consist of ICMP fragments.
- icmp
Large BooleanPacket Discard - Discard ICMP packets that are larger than 1024 bytes.
- icmp
Ping BooleanZero Id Discard - Discard packets if the ICMP ping packet has an identifier value of 0.
- id String
- UUID of the resource
- ipv6
Get
Zone Protection Profile List Data Ipv6 - Ipv6
- l2Sec
Group GetTag Protection Zone Protection Profile List Data L2Sec Group Tag Protection - L2 sec group tag protection
- loose
Source BooleanRouting Discard - Discard packets with the Loose Source Routing IP option set. Loose Source Routing is an option whereby a source of a datagram provides routing information and a gateway or host is allowed to choose any route of a number of intermediate gateways to get the datagram to the next address in the route.
- malformed
Option BooleanDiscard - Discard packets if they have incorrect combinations of class, number, and length based on RFCs 791, 1108, 1393, and 2113.
- mismatched
Overlapping BooleanTcp Segment Discard - Drop packets with mismatched overlapping TCP segments.
- mptcp
Option StringStrip - MPTCP is an extension of TCP that allows a client to maintain a connection by simultaneously using multiple paths to connect to the destination host. By default, MPTCP support is disabled, based on the global MPTCP setting. Review or adjust the MPTCP settings for the security zones associated with this profile:
no— Enable MPTCP support (do not strip the MPTCP option).yes— Disable MPTCP support (strip the MPTCP option). With this configured, MPTCP connections are converted to standard TCP connections, as MPTCP is backwards compatible with TCP.global— Support MPTCP based on the global MPTCP setting. By default, the global MPTCP setting is set to yes so that MPTCP is disabled (the MPTCP option is stripped from the packet).
- name String
- The profile name
- non
Ip GetProtocol Zone Protection Profile List Data Non Ip Protocol - Non ip protocol
- record
Route BooleanDiscard - Discard packets with the Record Route IP option set. When a datagram has this option, each router that routes the datagram adds its own IP address to the header, thus providing the path to the recipient.
- reject
Non StringSyn Tcp - Determine whether to reject the packet if the first packet for the TCP session setup is not a SYN packet:
global— Use system-wide setting that is assigned through the CLI.yes— Reject non-SYN TCP.no— Accept non-SYN TCP.
- scan
White List<GetLists Zone Protection Profile List Data Scan White List> - Scan white list
- scans
List<Get
Zone Protection Profile List Data Scan> - Scan
- security
Discard Boolean - Discard packets if the security option is defined.
- snippet String
- The snippet in which the resource is defined
- spoofed
Ip BooleanDiscard - Check that the source IP address of the ingress packet is routable and the routing interface is in the same zone as the ingress interface. If either condition is not true, discard the packet.
- stream
Id BooleanDiscard - Discard packets if the Stream ID option is defined.
- strict
Ip BooleanCheck - Check that both conditions are true:
- The source IP address is not the subnet broadcast IP address of the ingress interface.
- The source IP address is routable over the exact ingress interface. If either condition is not true, discard the packet.
- strict
Source BooleanRouting Discard - Discard packets with the Strict Source Routing IP option set. Strict Source Routing is an option whereby a source of a datagram provides routing information through which a gateway or host must send the datagram.
- suppress
Icmp BooleanNeedfrag - Stop sending ICMP fragmentation needed messages in response to packets that exceed the interface MTU and have the do not fragment (DF) bit set. This setting will interfere with the PMTUD process performed by hosts behind the firewall.
- suppress
Icmp BooleanTimeexceeded - Stop sending ICMP TTL expired messages.
- tcp
Fast BooleanOpen And Data Strip - Strip the TCP Fast Open option (and data payload, if any) from the TCP SYN or SYN-ACK packet during a TCP three-way handshake.
- tcp
Handshake BooleanDiscard - Drop packets with split handshakes.
- tcp
Syn BooleanWith Data Discard - Prevent a TCP session from being established if the TCP SYN packet contains data during a three-way handshake.
- tcp
Synack BooleanWith Data Discard - Prevent a TCP session from being established if the TCP SYN-ACK packet contains data during a three-way handshake.
- tcp
Timestamp BooleanStrip - Determine whether the packet has a TCP timestamp in the header and, if it does, strip the timestamp from the header.
- tfid String
- timestamp
Discard Boolean - Discard packets with the Timestamp IP option set.
- unknown
Option BooleanDiscard - Discard packets if the class and number are unknown.
- asymmetric
Path string - Determine whether to drop or bypass packets that contain out-of-sync ACKs or out-of-window sequence numbers:
global— Use system-wide setting that is assigned through TCP Settings or the CLI.drop— Drop packets that contain an asymmetric path.bypass— Bypass scanning on packets that contain an asymmetric path.
- description string
- The description of the profile
- device string
- The device in which the resource is defined
- discard
Icmp booleanEmbedded Error - Discard ICMP packets that are embedded with an error message.
- flood
Get
Zone Protection Profile List Data Flood - Flood
- folder string
- The folder in which the resource is defined
- fragmented
Traffic booleanDiscard - Discard fragmented IP packets.
- icmp
Frag booleanDiscard - Discard packets that consist of ICMP fragments.
- icmp
Large booleanPacket Discard - Discard ICMP packets that are larger than 1024 bytes.
- icmp
Ping booleanZero Id Discard - Discard packets if the ICMP ping packet has an identifier value of 0.
- id string
- UUID of the resource
- ipv6
Get
Zone Protection Profile List Data Ipv6 - Ipv6
- l2Sec
Group GetTag Protection Zone Protection Profile List Data L2Sec Group Tag Protection - L2 sec group tag protection
- loose
Source booleanRouting Discard - Discard packets with the Loose Source Routing IP option set. Loose Source Routing is an option whereby a source of a datagram provides routing information and a gateway or host is allowed to choose any route of a number of intermediate gateways to get the datagram to the next address in the route.
- malformed
Option booleanDiscard - Discard packets if they have incorrect combinations of class, number, and length based on RFCs 791, 1108, 1393, and 2113.
- mismatched
Overlapping booleanTcp Segment Discard - Drop packets with mismatched overlapping TCP segments.
- mptcp
Option stringStrip - MPTCP is an extension of TCP that allows a client to maintain a connection by simultaneously using multiple paths to connect to the destination host. By default, MPTCP support is disabled, based on the global MPTCP setting. Review or adjust the MPTCP settings for the security zones associated with this profile:
no— Enable MPTCP support (do not strip the MPTCP option).yes— Disable MPTCP support (strip the MPTCP option). With this configured, MPTCP connections are converted to standard TCP connections, as MPTCP is backwards compatible with TCP.global— Support MPTCP based on the global MPTCP setting. By default, the global MPTCP setting is set to yes so that MPTCP is disabled (the MPTCP option is stripped from the packet).
- name string
- The profile name
- non
Ip GetProtocol Zone Protection Profile List Data Non Ip Protocol - Non ip protocol
- record
Route booleanDiscard - Discard packets with the Record Route IP option set. When a datagram has this option, each router that routes the datagram adds its own IP address to the header, thus providing the path to the recipient.
- reject
Non stringSyn Tcp - Determine whether to reject the packet if the first packet for the TCP session setup is not a SYN packet:
global— Use system-wide setting that is assigned through the CLI.yes— Reject non-SYN TCP.no— Accept non-SYN TCP.
- scan
White GetLists Zone Protection Profile List Data Scan White List[] - Scan white list
- scans
Get
Zone Protection Profile List Data Scan[] - Scan
- security
Discard boolean - Discard packets if the security option is defined.
- snippet string
- The snippet in which the resource is defined
- spoofed
Ip booleanDiscard - Check that the source IP address of the ingress packet is routable and the routing interface is in the same zone as the ingress interface. If either condition is not true, discard the packet.
- stream
Id booleanDiscard - Discard packets if the Stream ID option is defined.
- strict
Ip booleanCheck - Check that both conditions are true:
- The source IP address is not the subnet broadcast IP address of the ingress interface.
- The source IP address is routable over the exact ingress interface. If either condition is not true, discard the packet.
- strict
Source booleanRouting Discard - Discard packets with the Strict Source Routing IP option set. Strict Source Routing is an option whereby a source of a datagram provides routing information through which a gateway or host must send the datagram.
- suppress
Icmp booleanNeedfrag - Stop sending ICMP fragmentation needed messages in response to packets that exceed the interface MTU and have the do not fragment (DF) bit set. This setting will interfere with the PMTUD process performed by hosts behind the firewall.
- suppress
Icmp booleanTimeexceeded - Stop sending ICMP TTL expired messages.
- tcp
Fast booleanOpen And Data Strip - Strip the TCP Fast Open option (and data payload, if any) from the TCP SYN or SYN-ACK packet during a TCP three-way handshake.
- tcp
Handshake booleanDiscard - Drop packets with split handshakes.
- tcp
Syn booleanWith Data Discard - Prevent a TCP session from being established if the TCP SYN packet contains data during a three-way handshake.
- tcp
Synack booleanWith Data Discard - Prevent a TCP session from being established if the TCP SYN-ACK packet contains data during a three-way handshake.
- tcp
Timestamp booleanStrip - Determine whether the packet has a TCP timestamp in the header and, if it does, strip the timestamp from the header.
- tfid string
- timestamp
Discard boolean - Discard packets with the Timestamp IP option set.
- unknown
Option booleanDiscard - Discard packets if the class and number are unknown.
- asymmetric_
path str - Determine whether to drop or bypass packets that contain out-of-sync ACKs or out-of-window sequence numbers:
global— Use system-wide setting that is assigned through TCP Settings or the CLI.drop— Drop packets that contain an asymmetric path.bypass— Bypass scanning on packets that contain an asymmetric path.
- description str
- The description of the profile
- device str
- The device in which the resource is defined
- discard_
icmp_ boolembedded_ error - Discard ICMP packets that are embedded with an error message.
- flood
Get
Zone Protection Profile List Data Flood - Flood
- folder str
- The folder in which the resource is defined
- fragmented_
traffic_ booldiscard - Discard fragmented IP packets.
- icmp_
frag_ booldiscard - Discard packets that consist of ICMP fragments.
- icmp_
large_ boolpacket_ discard - Discard ICMP packets that are larger than 1024 bytes.
- icmp_
ping_ boolzero_ id_ discard - Discard packets if the ICMP ping packet has an identifier value of 0.
- id str
- UUID of the resource
- ipv6
Get
Zone Protection Profile List Data Ipv6 - Ipv6
- l2_
sec_ Getgroup_ tag_ protection Zone Protection Profile List Data L2Sec Group Tag Protection - L2 sec group tag protection
- loose_
source_ boolrouting_ discard - Discard packets with the Loose Source Routing IP option set. Loose Source Routing is an option whereby a source of a datagram provides routing information and a gateway or host is allowed to choose any route of a number of intermediate gateways to get the datagram to the next address in the route.
- malformed_
option_ booldiscard - Discard packets if they have incorrect combinations of class, number, and length based on RFCs 791, 1108, 1393, and 2113.
- mismatched_
overlapping_ booltcp_ segment_ discard - Drop packets with mismatched overlapping TCP segments.
- mptcp_
option_ strstrip - MPTCP is an extension of TCP that allows a client to maintain a connection by simultaneously using multiple paths to connect to the destination host. By default, MPTCP support is disabled, based on the global MPTCP setting. Review or adjust the MPTCP settings for the security zones associated with this profile:
no— Enable MPTCP support (do not strip the MPTCP option).yes— Disable MPTCP support (strip the MPTCP option). With this configured, MPTCP connections are converted to standard TCP connections, as MPTCP is backwards compatible with TCP.global— Support MPTCP based on the global MPTCP setting. By default, the global MPTCP setting is set to yes so that MPTCP is disabled (the MPTCP option is stripped from the packet).
- name str
- The profile name
- non_
ip_ Getprotocol Zone Protection Profile List Data Non Ip Protocol - Non ip protocol
- record_
route_ booldiscard - Discard packets with the Record Route IP option set. When a datagram has this option, each router that routes the datagram adds its own IP address to the header, thus providing the path to the recipient.
- reject_
non_ strsyn_ tcp - Determine whether to reject the packet if the first packet for the TCP session setup is not a SYN packet:
global— Use system-wide setting that is assigned through the CLI.yes— Reject non-SYN TCP.no— Accept non-SYN TCP.
- scan_
white_ Sequence[Getlists Zone Protection Profile List Data Scan White List] - Scan white list
- scans
Sequence[Get
Zone Protection Profile List Data Scan] - Scan
- security_
discard bool - Discard packets if the security option is defined.
- snippet str
- The snippet in which the resource is defined
- spoofed_
ip_ booldiscard - Check that the source IP address of the ingress packet is routable and the routing interface is in the same zone as the ingress interface. If either condition is not true, discard the packet.
- stream_
id_ booldiscard - Discard packets if the Stream ID option is defined.
- strict_
ip_ boolcheck - Check that both conditions are true:
- The source IP address is not the subnet broadcast IP address of the ingress interface.
- The source IP address is routable over the exact ingress interface. If either condition is not true, discard the packet.
- strict_
source_ boolrouting_ discard - Discard packets with the Strict Source Routing IP option set. Strict Source Routing is an option whereby a source of a datagram provides routing information through which a gateway or host must send the datagram.
- suppress_
icmp_ boolneedfrag - Stop sending ICMP fragmentation needed messages in response to packets that exceed the interface MTU and have the do not fragment (DF) bit set. This setting will interfere with the PMTUD process performed by hosts behind the firewall.
- suppress_
icmp_ booltimeexceeded - Stop sending ICMP TTL expired messages.
- tcp_
fast_ boolopen_ and_ data_ strip - Strip the TCP Fast Open option (and data payload, if any) from the TCP SYN or SYN-ACK packet during a TCP three-way handshake.
- tcp_
handshake_ booldiscard - Drop packets with split handshakes.
- tcp_
syn_ boolwith_ data_ discard - Prevent a TCP session from being established if the TCP SYN packet contains data during a three-way handshake.
- tcp_
synack_ boolwith_ data_ discard - Prevent a TCP session from being established if the TCP SYN-ACK packet contains data during a three-way handshake.
- tcp_
timestamp_ boolstrip - Determine whether the packet has a TCP timestamp in the header and, if it does, strip the timestamp from the header.
- tfid str
- timestamp_
discard bool - Discard packets with the Timestamp IP option set.
- unknown_
option_ booldiscard - Discard packets if the class and number are unknown.
- asymmetric
Path String - Determine whether to drop or bypass packets that contain out-of-sync ACKs or out-of-window sequence numbers:
global— Use system-wide setting that is assigned through TCP Settings or the CLI.drop— Drop packets that contain an asymmetric path.bypass— Bypass scanning on packets that contain an asymmetric path.
- description String
- The description of the profile
- device String
- The device in which the resource is defined
- discard
Icmp BooleanEmbedded Error - Discard ICMP packets that are embedded with an error message.
- flood Property Map
- Flood
- folder String
- The folder in which the resource is defined
- fragmented
Traffic BooleanDiscard - Discard fragmented IP packets.
- icmp
Frag BooleanDiscard - Discard packets that consist of ICMP fragments.
- icmp
Large BooleanPacket Discard - Discard ICMP packets that are larger than 1024 bytes.
- icmp
Ping BooleanZero Id Discard - Discard packets if the ICMP ping packet has an identifier value of 0.
- id String
- UUID of the resource
- ipv6 Property Map
- Ipv6
- l2Sec
Group Property MapTag Protection - L2 sec group tag protection
- loose
Source BooleanRouting Discard - Discard packets with the Loose Source Routing IP option set. Loose Source Routing is an option whereby a source of a datagram provides routing information and a gateway or host is allowed to choose any route of a number of intermediate gateways to get the datagram to the next address in the route.
- malformed
Option BooleanDiscard - Discard packets if they have incorrect combinations of class, number, and length based on RFCs 791, 1108, 1393, and 2113.
- mismatched
Overlapping BooleanTcp Segment Discard - Drop packets with mismatched overlapping TCP segments.
- mptcp
Option StringStrip - MPTCP is an extension of TCP that allows a client to maintain a connection by simultaneously using multiple paths to connect to the destination host. By default, MPTCP support is disabled, based on the global MPTCP setting. Review or adjust the MPTCP settings for the security zones associated with this profile:
no— Enable MPTCP support (do not strip the MPTCP option).yes— Disable MPTCP support (strip the MPTCP option). With this configured, MPTCP connections are converted to standard TCP connections, as MPTCP is backwards compatible with TCP.global— Support MPTCP based on the global MPTCP setting. By default, the global MPTCP setting is set to yes so that MPTCP is disabled (the MPTCP option is stripped from the packet).
- name String
- The profile name
- non
Ip Property MapProtocol - Non ip protocol
- record
Route BooleanDiscard - Discard packets with the Record Route IP option set. When a datagram has this option, each router that routes the datagram adds its own IP address to the header, thus providing the path to the recipient.
- reject
Non StringSyn Tcp - Determine whether to reject the packet if the first packet for the TCP session setup is not a SYN packet:
global— Use system-wide setting that is assigned through the CLI.yes— Reject non-SYN TCP.no— Accept non-SYN TCP.
- scan
White List<Property Map>Lists - Scan white list
- scans List<Property Map>
- Scan
- security
Discard Boolean - Discard packets if the security option is defined.
- snippet String
- The snippet in which the resource is defined
- spoofed
Ip BooleanDiscard - Check that the source IP address of the ingress packet is routable and the routing interface is in the same zone as the ingress interface. If either condition is not true, discard the packet.
- stream
Id BooleanDiscard - Discard packets if the Stream ID option is defined.
- strict
Ip BooleanCheck - Check that both conditions are true:
- The source IP address is not the subnet broadcast IP address of the ingress interface.
- The source IP address is routable over the exact ingress interface. If either condition is not true, discard the packet.
- strict
Source BooleanRouting Discard - Discard packets with the Strict Source Routing IP option set. Strict Source Routing is an option whereby a source of a datagram provides routing information through which a gateway or host must send the datagram.
- suppress
Icmp BooleanNeedfrag - Stop sending ICMP fragmentation needed messages in response to packets that exceed the interface MTU and have the do not fragment (DF) bit set. This setting will interfere with the PMTUD process performed by hosts behind the firewall.
- suppress
Icmp BooleanTimeexceeded - Stop sending ICMP TTL expired messages.
- tcp
Fast BooleanOpen And Data Strip - Strip the TCP Fast Open option (and data payload, if any) from the TCP SYN or SYN-ACK packet during a TCP three-way handshake.
- tcp
Handshake BooleanDiscard - Drop packets with split handshakes.
- tcp
Syn BooleanWith Data Discard - Prevent a TCP session from being established if the TCP SYN packet contains data during a three-way handshake.
- tcp
Synack BooleanWith Data Discard - Prevent a TCP session from being established if the TCP SYN-ACK packet contains data during a three-way handshake.
- tcp
Timestamp BooleanStrip - Determine whether the packet has a TCP timestamp in the header and, if it does, strip the timestamp from the header.
- tfid String
- timestamp
Discard Boolean - Discard packets with the Timestamp IP option set.
- unknown
Option BooleanDiscard - Discard packets if the class and number are unknown.
GetZoneProtectionProfileListDataFlood
- Icmp
Get
Zone Protection Profile List Data Flood Icmp - Icmp
- Icmpv6
Get
Zone Protection Profile List Data Flood Icmpv6 - Icmpv6
- Other
Ip GetZone Protection Profile List Data Flood Other Ip - Other ip
- Sctp
Init GetZone Protection Profile List Data Flood Sctp Init - Sctp init
- Tcp
Syn GetZone Protection Profile List Data Flood Tcp Syn - Tcp syn
- Udp
Get
Zone Protection Profile List Data Flood Udp - Udp
- Icmp
Get
Zone Protection Profile List Data Flood Icmp - Icmp
- Icmpv6
Get
Zone Protection Profile List Data Flood Icmpv6 - Icmpv6
- Other
Ip GetZone Protection Profile List Data Flood Other Ip - Other ip
- Sctp
Init GetZone Protection Profile List Data Flood Sctp Init - Sctp init
- Tcp
Syn GetZone Protection Profile List Data Flood Tcp Syn - Tcp syn
- Udp
Get
Zone Protection Profile List Data Flood Udp - Udp
- icmp
Get
Zone Protection Profile List Data Flood Icmp - Icmp
- icmpv6
Get
Zone Protection Profile List Data Flood Icmpv6 - Icmpv6
- other
Ip GetZone Protection Profile List Data Flood Other Ip - Other ip
- sctp
Init GetZone Protection Profile List Data Flood Sctp Init - Sctp init
- tcp
Syn GetZone Protection Profile List Data Flood Tcp Syn - Tcp syn
- udp
Get
Zone Protection Profile List Data Flood Udp - Udp
- icmp
Get
Zone Protection Profile List Data Flood Icmp - Icmp
- icmpv6
Get
Zone Protection Profile List Data Flood Icmpv6 - Icmpv6
- other
Ip GetZone Protection Profile List Data Flood Other Ip - Other ip
- sctp
Init GetZone Protection Profile List Data Flood Sctp Init - Sctp init
- tcp
Syn GetZone Protection Profile List Data Flood Tcp Syn - Tcp syn
- udp
Get
Zone Protection Profile List Data Flood Udp - Udp
- icmp
Get
Zone Protection Profile List Data Flood Icmp - Icmp
- icmpv6
Get
Zone Protection Profile List Data Flood Icmpv6 - Icmpv6
- other_
ip GetZone Protection Profile List Data Flood Other Ip - Other ip
- sctp_
init GetZone Protection Profile List Data Flood Sctp Init - Sctp init
- tcp_
syn GetZone Protection Profile List Data Flood Tcp Syn - Tcp syn
- udp
Get
Zone Protection Profile List Data Flood Udp - Udp
- icmp Property Map
- Icmp
- icmpv6 Property Map
- Icmpv6
- other
Ip Property Map - Other ip
- sctp
Init Property Map - Sctp init
- tcp
Syn Property Map - Tcp syn
- udp Property Map
- Udp
GetZoneProtectionProfileListDataFloodIcmp
- Enable bool
- Enable protection against ICMP floods?
- Red
Get
Zone Protection Profile List Data Flood Icmp Red - Red
- Enable bool
- Enable protection against ICMP floods?
- Red
Get
Zone Protection Profile List Data Flood Icmp Red - Red
- enable Boolean
- Enable protection against ICMP floods?
- red
Get
Zone Protection Profile List Data Flood Icmp Red - Red
- enable boolean
- Enable protection against ICMP floods?
- red
Get
Zone Protection Profile List Data Flood Icmp Red - Red
- enable bool
- Enable protection against ICMP floods?
- red
Get
Zone Protection Profile List Data Flood Icmp Red - Red
- enable Boolean
- Enable protection against ICMP floods?
- red Property Map
- Red
GetZoneProtectionProfileListDataFloodIcmpRed
- Activate
Rate int - The number of ICMP packets (not matching an existing session) that the zone receives per second before subsequent ICMP packets are dropped.
- Alarm
Rate int - The number of ICMP echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- Maximal
Rate int - The maximum number of ICMP packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- Activate
Rate int - The number of ICMP packets (not matching an existing session) that the zone receives per second before subsequent ICMP packets are dropped.
- Alarm
Rate int - The number of ICMP echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- Maximal
Rate int - The maximum number of ICMP packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate Integer - The number of ICMP packets (not matching an existing session) that the zone receives per second before subsequent ICMP packets are dropped.
- alarm
Rate Integer - The number of ICMP echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate Integer - The maximum number of ICMP packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate number - The number of ICMP packets (not matching an existing session) that the zone receives per second before subsequent ICMP packets are dropped.
- alarm
Rate number - The number of ICMP echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate number - The maximum number of ICMP packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate_
rate int - The number of ICMP packets (not matching an existing session) that the zone receives per second before subsequent ICMP packets are dropped.
- alarm_
rate int - The number of ICMP echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal_
rate int - The maximum number of ICMP packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate Number - The number of ICMP packets (not matching an existing session) that the zone receives per second before subsequent ICMP packets are dropped.
- alarm
Rate Number - The number of ICMP echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate Number - The maximum number of ICMP packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
GetZoneProtectionProfileListDataFloodIcmpv6
- Enable bool
- Enable protection against ICMPv6 floods?
- Red
Get
Zone Protection Profile List Data Flood Icmpv6Red - Red
- Enable bool
- Enable protection against ICMPv6 floods?
- Red
Get
Zone Protection Profile List Data Flood Icmpv6Red - Red
- enable Boolean
- Enable protection against ICMPv6 floods?
- red
Get
Zone Protection Profile List Data Flood Icmpv6Red - Red
- enable boolean
- Enable protection against ICMPv6 floods?
- red
Get
Zone Protection Profile List Data Flood Icmpv6Red - Red
- enable bool
- Enable protection against ICMPv6 floods?
- red
Get
Zone Protection Profile List Data Flood Icmpv6Red - Red
- enable Boolean
- Enable protection against ICMPv6 floods?
- red Property Map
- Red
GetZoneProtectionProfileListDataFloodIcmpv6Red
- Activate
Rate int - The number of ICMPv6 packets (not matching an existing session) that the zone receives per second before subsequent ICMPv6 packets are dropped.
- Alarm
Rate int - The number of ICMPv6 echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- Maximal
Rate int - The maximum number of ICMPv6 packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- Activate
Rate int - The number of ICMPv6 packets (not matching an existing session) that the zone receives per second before subsequent ICMPv6 packets are dropped.
- Alarm
Rate int - The number of ICMPv6 echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- Maximal
Rate int - The maximum number of ICMPv6 packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate Integer - The number of ICMPv6 packets (not matching an existing session) that the zone receives per second before subsequent ICMPv6 packets are dropped.
- alarm
Rate Integer - The number of ICMPv6 echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate Integer - The maximum number of ICMPv6 packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate number - The number of ICMPv6 packets (not matching an existing session) that the zone receives per second before subsequent ICMPv6 packets are dropped.
- alarm
Rate number - The number of ICMPv6 echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate number - The maximum number of ICMPv6 packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate_
rate int - The number of ICMPv6 packets (not matching an existing session) that the zone receives per second before subsequent ICMPv6 packets are dropped.
- alarm_
rate int - The number of ICMPv6 echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal_
rate int - The maximum number of ICMPv6 packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate Number - The number of ICMPv6 packets (not matching an existing session) that the zone receives per second before subsequent ICMPv6 packets are dropped.
- alarm
Rate Number - The number of ICMPv6 echo requests (pings not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate Number - The maximum number of ICMPv6 packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
GetZoneProtectionProfileListDataFloodOtherIp
- Enable bool
- Enable protection against other IP (non-TCP, non-ICMP, non-ICMPv6, non-SCTP, and non-UDP) floods?
- Red
Get
Zone Protection Profile List Data Flood Other Ip Red - Red
- Enable bool
- Enable protection against other IP (non-TCP, non-ICMP, non-ICMPv6, non-SCTP, and non-UDP) floods?
- Red
Get
Zone Protection Profile List Data Flood Other Ip Red - Red
- enable Boolean
- Enable protection against other IP (non-TCP, non-ICMP, non-ICMPv6, non-SCTP, and non-UDP) floods?
- red
Get
Zone Protection Profile List Data Flood Other Ip Red - Red
- enable boolean
- Enable protection against other IP (non-TCP, non-ICMP, non-ICMPv6, non-SCTP, and non-UDP) floods?
- red
Get
Zone Protection Profile List Data Flood Other Ip Red - Red
- enable bool
- Enable protection against other IP (non-TCP, non-ICMP, non-ICMPv6, non-SCTP, and non-UDP) floods?
- red
Get
Zone Protection Profile List Data Flood Other Ip Red - Red
- enable Boolean
- Enable protection against other IP (non-TCP, non-ICMP, non-ICMPv6, non-SCTP, and non-UDP) floods?
- red Property Map
- Red
GetZoneProtectionProfileListDataFloodOtherIpRed
- Activate
Rate int - Activate rate
- Alarm
Rate int - Alarm rate
- Maximal
Rate int - Maximal rate
- Activate
Rate int - Activate rate
- Alarm
Rate int - Alarm rate
- Maximal
Rate int - Maximal rate
- activate
Rate Integer - Activate rate
- alarm
Rate Integer - Alarm rate
- maximal
Rate Integer - Maximal rate
- activate
Rate number - Activate rate
- alarm
Rate number - Alarm rate
- maximal
Rate number - Maximal rate
- activate_
rate int - Activate rate
- alarm_
rate int - Alarm rate
- maximal_
rate int - Maximal rate
- activate
Rate Number - Activate rate
- alarm
Rate Number - Alarm rate
- maximal
Rate Number - Maximal rate
GetZoneProtectionProfileListDataFloodSctpInit
- Enable bool
- Enable protection against floods of Stream Control Transmission Protocol (SCTP) packets that contain an Initiation (INIT) chunk?
- Red
Get
Zone Protection Profile List Data Flood Sctp Init Red - Red
- Enable bool
- Enable protection against floods of Stream Control Transmission Protocol (SCTP) packets that contain an Initiation (INIT) chunk?
- Red
Get
Zone Protection Profile List Data Flood Sctp Init Red - Red
- enable Boolean
- Enable protection against floods of Stream Control Transmission Protocol (SCTP) packets that contain an Initiation (INIT) chunk?
- red
Get
Zone Protection Profile List Data Flood Sctp Init Red - Red
- enable boolean
- Enable protection against floods of Stream Control Transmission Protocol (SCTP) packets that contain an Initiation (INIT) chunk?
- red
Get
Zone Protection Profile List Data Flood Sctp Init Red - Red
- enable bool
- Enable protection against floods of Stream Control Transmission Protocol (SCTP) packets that contain an Initiation (INIT) chunk?
- red
Get
Zone Protection Profile List Data Flood Sctp Init Red - Red
- enable Boolean
- Enable protection against floods of Stream Control Transmission Protocol (SCTP) packets that contain an Initiation (INIT) chunk?
- red Property Map
- Red
GetZoneProtectionProfileListDataFloodSctpInitRed
- Activate
Rate int - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second before subsequent SCTP INIT packets are dropped.
- Alarm
Rate int - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- Maximal
Rate int - The maximum number of SCTP INIT packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- Activate
Rate int - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second before subsequent SCTP INIT packets are dropped.
- Alarm
Rate int - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- Maximal
Rate int - The maximum number of SCTP INIT packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate Integer - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second before subsequent SCTP INIT packets are dropped.
- alarm
Rate Integer - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate Integer - The maximum number of SCTP INIT packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate number - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second before subsequent SCTP INIT packets are dropped.
- alarm
Rate number - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate number - The maximum number of SCTP INIT packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate_
rate int - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second before subsequent SCTP INIT packets are dropped.
- alarm_
rate int - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal_
rate int - The maximum number of SCTP INIT packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate Number - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second before subsequent SCTP INIT packets are dropped.
- alarm
Rate Number - The number of SCTP INIT packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate Number - The maximum number of SCTP INIT packets (not matching an existing session) that the zone receives per second before packets exceeding the maximum are dropped.
GetZoneProtectionProfileListDataFloodTcpSyn
- Enable bool
- Enable protection against SYN floods?
- Red
Get
Zone Protection Profile List Data Flood Tcp Syn Red - Red
-
Get
Zone Protection Profile List Data Flood Tcp Syn Syn Cookies - Syn cookies
- Enable bool
- Enable protection against SYN floods?
- Red
Get
Zone Protection Profile List Data Flood Tcp Syn Red - Red
-
Get
Zone Protection Profile List Data Flood Tcp Syn Syn Cookies - Syn cookies
- enable Boolean
- Enable protection against SYN floods?
- red
Get
Zone Protection Profile List Data Flood Tcp Syn Red - Red
-
Get
Zone Protection Profile List Data Flood Tcp Syn Syn Cookies - Syn cookies
- enable boolean
- Enable protection against SYN floods?
- red
Get
Zone Protection Profile List Data Flood Tcp Syn Red - Red
-
Get
Zone Protection Profile List Data Flood Tcp Syn Syn Cookies - Syn cookies
- enable bool
- Enable protection against SYN floods?
- red
Get
Zone Protection Profile List Data Flood Tcp Syn Red - Red
-
Get
Zone Protection Profile List Data Flood Tcp Syn Syn Cookies - Syn cookies
- enable Boolean
- Enable protection against SYN floods?
- red Property Map
- Red
- Property Map
- Syn cookies
GetZoneProtectionProfileListDataFloodTcpSynRed
- Activate
Rate int - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - Alarm
Rate int - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - Maximal
Rate int - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- Activate
Rate int - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - Alarm
Rate int - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - Maximal
Rate int - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- activate
Rate Integer - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - alarm
Rate Integer - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - maximal
Rate Integer - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- activate
Rate number - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - alarm
Rate number - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - maximal
Rate number - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- activate_
rate int - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - alarm_
rate int - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - maximal_
rate int - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- activate
Rate Number - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - alarm
Rate Number - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - maximal
Rate Number - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
GetZoneProtectionProfileListDataFloodTcpSynSynCookies
- Activate
Rate int - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - Alarm
Rate int - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - Maximal
Rate int - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- Activate
Rate int - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - Alarm
Rate int - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - Maximal
Rate int - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- activate
Rate Integer - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - alarm
Rate Integer - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - maximal
Rate Integer - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- activate
Rate number - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - alarm
Rate number - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - maximal
Rate number - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- activate_
rate int - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - alarm_
rate int - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - maximal_
rate int - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
- activate
Rate Number - When the flow exceeds the
activate_rate` threshold, the firewall drops individual SYN packets randomly to restrict the flow. - alarm
Rate Number - When the flow exceeds the
alert_rate` threshold, an alarm is generated. - maximal
Rate Number - When the flow exceeds the
maximal_ratethreshold, 100% of incoming SYN packets are dropped.
GetZoneProtectionProfileListDataFloodUdp
- Enable bool
- Enable protection against UDP floods?
- Red
Get
Zone Protection Profile List Data Flood Udp Red - Red
- Enable bool
- Enable protection against UDP floods?
- Red
Get
Zone Protection Profile List Data Flood Udp Red - Red
- enable Boolean
- Enable protection against UDP floods?
- red
Get
Zone Protection Profile List Data Flood Udp Red - Red
- enable boolean
- Enable protection against UDP floods?
- red
Get
Zone Protection Profile List Data Flood Udp Red - Red
- enable bool
- Enable protection against UDP floods?
- red
Get
Zone Protection Profile List Data Flood Udp Red - Red
- enable Boolean
- Enable protection against UDP floods?
- red Property Map
- Red
GetZoneProtectionProfileListDataFloodUdpRed
- Activate
Rate int - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers random dropping of UDP packets.
- Alarm
Rate int - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- Maximal
Rate int - The maximum number of UDP packets (not matching an existing session) the zone receives per second before packets exceeding the maximum are dropped.
- Activate
Rate int - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers random dropping of UDP packets.
- Alarm
Rate int - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- Maximal
Rate int - The maximum number of UDP packets (not matching an existing session) the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate Integer - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers random dropping of UDP packets.
- alarm
Rate Integer - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate Integer - The maximum number of UDP packets (not matching an existing session) the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate number - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers random dropping of UDP packets.
- alarm
Rate number - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate number - The maximum number of UDP packets (not matching an existing session) the zone receives per second before packets exceeding the maximum are dropped.
- activate_
rate int - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers random dropping of UDP packets.
- alarm_
rate int - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal_
rate int - The maximum number of UDP packets (not matching an existing session) the zone receives per second before packets exceeding the maximum are dropped.
- activate
Rate Number - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers random dropping of UDP packets.
- alarm
Rate Number - The number of UDP packets (not matching an existing session) that the zone receives per second that triggers an attack alarm.
- maximal
Rate Number - The maximum number of UDP packets (not matching an existing session) the zone receives per second before packets exceeding the maximum are dropped.
GetZoneProtectionProfileListDataIpv6
- Anycast
Source bool - Discard IPv6 packets that contain an anycast source address.
- Filter
Ext GetHdr Zone Protection Profile List Data Ipv6Filter Ext Hdr - Filter ext hdr
- Icmpv6Too
Big boolSmall Mtu Discard - Discard IPv6 packets that contain a Packet Too Big ICMPv6 message when the maximum transmission unit (MTU) is less than 1,280 bytes.
- Ignore
Inv GetPkt Zone Protection Profile List Data Ipv6Ignore Inv Pkt - Ignore inv pkt
- Ipv4Compatible
Address bool - Discard IPv6 packets that are defined as an RFC 4291 IPv4-Compatible IPv6 address.
- Needless
Fragment boolHdr - Discard IPv6 packets with the last fragment flag (M=0) and offset of zero.
- Options
Invalid boolIpv6Discard - Discard IPv6 packets that contain invalid IPv6 options in an extension header.
- Reserved
Field boolSet Discard - Discard IPv6 packets that have a header with a reserved field not set to zero.
- Routing
Header0 bool - Drop packets with type 0 routing header.
- Routing
Header1 bool - Drop packets with type 1 routing header.
- Routing
Header253 bool - Drop packets with type 253 routing header.
- Routing
Header254 bool - Drop packets with type 254 routing header.
- Routing
Header255 bool - Drop packets with type 255 routing header.
- Routing
Header3 bool - Drop packets with type 3 routing header.
- Routing
Header4252 bool - Drop packets with type 4 to type 252 routing header.
- Anycast
Source bool - Discard IPv6 packets that contain an anycast source address.
- Filter
Ext GetHdr Zone Protection Profile List Data Ipv6Filter Ext Hdr - Filter ext hdr
- Icmpv6Too
Big boolSmall Mtu Discard - Discard IPv6 packets that contain a Packet Too Big ICMPv6 message when the maximum transmission unit (MTU) is less than 1,280 bytes.
- Ignore
Inv GetPkt Zone Protection Profile List Data Ipv6Ignore Inv Pkt - Ignore inv pkt
- Ipv4Compatible
Address bool - Discard IPv6 packets that are defined as an RFC 4291 IPv4-Compatible IPv6 address.
- Needless
Fragment boolHdr - Discard IPv6 packets with the last fragment flag (M=0) and offset of zero.
- Options
Invalid boolIpv6Discard - Discard IPv6 packets that contain invalid IPv6 options in an extension header.
- Reserved
Field boolSet Discard - Discard IPv6 packets that have a header with a reserved field not set to zero.
- Routing
Header0 bool - Drop packets with type 0 routing header.
- Routing
Header1 bool - Drop packets with type 1 routing header.
- Routing
Header253 bool - Drop packets with type 253 routing header.
- Routing
Header254 bool - Drop packets with type 254 routing header.
- Routing
Header255 bool - Drop packets with type 255 routing header.
- Routing
Header3 bool - Drop packets with type 3 routing header.
- Routing
Header4252 bool - Drop packets with type 4 to type 252 routing header.
- anycast
Source Boolean - Discard IPv6 packets that contain an anycast source address.
- filter
Ext GetHdr Zone Protection Profile List Data Ipv6Filter Ext Hdr - Filter ext hdr
- icmpv6Too
Big BooleanSmall Mtu Discard - Discard IPv6 packets that contain a Packet Too Big ICMPv6 message when the maximum transmission unit (MTU) is less than 1,280 bytes.
- ignore
Inv GetPkt Zone Protection Profile List Data Ipv6Ignore Inv Pkt - Ignore inv pkt
- ipv4Compatible
Address Boolean - Discard IPv6 packets that are defined as an RFC 4291 IPv4-Compatible IPv6 address.
- needless
Fragment BooleanHdr - Discard IPv6 packets with the last fragment flag (M=0) and offset of zero.
- options
Invalid BooleanIpv6Discard - Discard IPv6 packets that contain invalid IPv6 options in an extension header.
- reserved
Field BooleanSet Discard - Discard IPv6 packets that have a header with a reserved field not set to zero.
- routing
Header0 Boolean - Drop packets with type 0 routing header.
- routing
Header1 Boolean - Drop packets with type 1 routing header.
- routing
Header253 Boolean - Drop packets with type 253 routing header.
- routing
Header254 Boolean - Drop packets with type 254 routing header.
- routing
Header255 Boolean - Drop packets with type 255 routing header.
- routing
Header3 Boolean - Drop packets with type 3 routing header.
- routing
Header4252 Boolean - Drop packets with type 4 to type 252 routing header.
- anycast
Source boolean - Discard IPv6 packets that contain an anycast source address.
- filter
Ext GetHdr Zone Protection Profile List Data Ipv6Filter Ext Hdr - Filter ext hdr
- icmpv6Too
Big booleanSmall Mtu Discard - Discard IPv6 packets that contain a Packet Too Big ICMPv6 message when the maximum transmission unit (MTU) is less than 1,280 bytes.
- ignore
Inv GetPkt Zone Protection Profile List Data Ipv6Ignore Inv Pkt - Ignore inv pkt
- ipv4Compatible
Address boolean - Discard IPv6 packets that are defined as an RFC 4291 IPv4-Compatible IPv6 address.
- needless
Fragment booleanHdr - Discard IPv6 packets with the last fragment flag (M=0) and offset of zero.
- options
Invalid booleanIpv6Discard - Discard IPv6 packets that contain invalid IPv6 options in an extension header.
- reserved
Field booleanSet Discard - Discard IPv6 packets that have a header with a reserved field not set to zero.
- routing
Header0 boolean - Drop packets with type 0 routing header.
- routing
Header1 boolean - Drop packets with type 1 routing header.
- routing
Header253 boolean - Drop packets with type 253 routing header.
- routing
Header254 boolean - Drop packets with type 254 routing header.
- routing
Header255 boolean - Drop packets with type 255 routing header.
- routing
Header3 boolean - Drop packets with type 3 routing header.
- routing
Header4252 boolean - Drop packets with type 4 to type 252 routing header.
- anycast_
source bool - Discard IPv6 packets that contain an anycast source address.
- filter_
ext_ Gethdr Zone Protection Profile List Data Ipv6Filter Ext Hdr - Filter ext hdr
- icmpv6_
too_ boolbig_ small_ mtu_ discard - Discard IPv6 packets that contain a Packet Too Big ICMPv6 message when the maximum transmission unit (MTU) is less than 1,280 bytes.
- ignore_
inv_ Getpkt Zone Protection Profile List Data Ipv6Ignore Inv Pkt - Ignore inv pkt
- ipv4_
compatible_ booladdress - Discard IPv6 packets that are defined as an RFC 4291 IPv4-Compatible IPv6 address.
- needless_
fragment_ boolhdr - Discard IPv6 packets with the last fragment flag (M=0) and offset of zero.
- options_
invalid_ boolipv6_ discard - Discard IPv6 packets that contain invalid IPv6 options in an extension header.
- reserved_
field_ boolset_ discard - Discard IPv6 packets that have a header with a reserved field not set to zero.
- routing_
header0 bool - Drop packets with type 0 routing header.
- routing_
header1 bool - Drop packets with type 1 routing header.
- routing_
header253 bool - Drop packets with type 253 routing header.
- routing_
header254 bool - Drop packets with type 254 routing header.
- routing_
header255 bool - Drop packets with type 255 routing header.
- routing_
header3 bool - Drop packets with type 3 routing header.
- routing_
header4252 bool - Drop packets with type 4 to type 252 routing header.
- anycast
Source Boolean - Discard IPv6 packets that contain an anycast source address.
- filter
Ext Property MapHdr - Filter ext hdr
- icmpv6Too
Big BooleanSmall Mtu Discard - Discard IPv6 packets that contain a Packet Too Big ICMPv6 message when the maximum transmission unit (MTU) is less than 1,280 bytes.
- ignore
Inv Property MapPkt - Ignore inv pkt
- ipv4Compatible
Address Boolean - Discard IPv6 packets that are defined as an RFC 4291 IPv4-Compatible IPv6 address.
- needless
Fragment BooleanHdr - Discard IPv6 packets with the last fragment flag (M=0) and offset of zero.
- options
Invalid BooleanIpv6Discard - Discard IPv6 packets that contain invalid IPv6 options in an extension header.
- reserved
Field BooleanSet Discard - Discard IPv6 packets that have a header with a reserved field not set to zero.
- routing
Header0 Boolean - Drop packets with type 0 routing header.
- routing
Header1 Boolean - Drop packets with type 1 routing header.
- routing
Header253 Boolean - Drop packets with type 253 routing header.
- routing
Header254 Boolean - Drop packets with type 254 routing header.
- routing
Header255 Boolean - Drop packets with type 255 routing header.
- routing
Header3 Boolean - Drop packets with type 3 routing header.
- routing
Header4252 Boolean - Drop packets with type 4 to type 252 routing header.
GetZoneProtectionProfileListDataIpv6FilterExtHdr
- Dest
Option boolHdr - Discard IPv6 packets that contain the Destination Options extension, which contains options intended only for the destination of the packet.
- Hop
By boolHop Hdr - Discard IPv6 packets that contain the Hop-by-Hop Options extension header.
- Routing
Hdr bool - Discard IPv6 packets that contain the Routing extension header, which directs packets to one or more intermediate nodes on its way to its destination.
- Dest
Option boolHdr - Discard IPv6 packets that contain the Destination Options extension, which contains options intended only for the destination of the packet.
- Hop
By boolHop Hdr - Discard IPv6 packets that contain the Hop-by-Hop Options extension header.
- Routing
Hdr bool - Discard IPv6 packets that contain the Routing extension header, which directs packets to one or more intermediate nodes on its way to its destination.
- dest
Option BooleanHdr - Discard IPv6 packets that contain the Destination Options extension, which contains options intended only for the destination of the packet.
- hop
By BooleanHop Hdr - Discard IPv6 packets that contain the Hop-by-Hop Options extension header.
- routing
Hdr Boolean - Discard IPv6 packets that contain the Routing extension header, which directs packets to one or more intermediate nodes on its way to its destination.
- dest
Option booleanHdr - Discard IPv6 packets that contain the Destination Options extension, which contains options intended only for the destination of the packet.
- hop
By booleanHop Hdr - Discard IPv6 packets that contain the Hop-by-Hop Options extension header.
- routing
Hdr boolean - Discard IPv6 packets that contain the Routing extension header, which directs packets to one or more intermediate nodes on its way to its destination.
- dest_
option_ boolhdr - Discard IPv6 packets that contain the Destination Options extension, which contains options intended only for the destination of the packet.
- hop_
by_ boolhop_ hdr - Discard IPv6 packets that contain the Hop-by-Hop Options extension header.
- routing_
hdr bool - Discard IPv6 packets that contain the Routing extension header, which directs packets to one or more intermediate nodes on its way to its destination.
- dest
Option BooleanHdr - Discard IPv6 packets that contain the Destination Options extension, which contains options intended only for the destination of the packet.
- hop
By BooleanHop Hdr - Discard IPv6 packets that contain the Hop-by-Hop Options extension header.
- routing
Hdr Boolean - Discard IPv6 packets that contain the Routing extension header, which directs packets to one or more intermediate nodes on its way to its destination.
GetZoneProtectionProfileListDataIpv6IgnoreInvPkt
- Dest
Unreach bool - Require an explicit Security policy match for Destination Unreachable ICMPv6 messages, even when the message is associated with an existing session.
- Param
Problem bool - Require an explicit Security policy match for Parameter Problem ICMPv6 messages, even when the message is associated with an existing session.
- Pkt
Too boolBig - Require an explicit Security policy match for Packet Too Big ICMPv6 messages, even when the message is associated with an existing session.
- Redirect bool
- Require an explicit Security policy match for Redirect Message ICMPv6 messages, even when the message is associated with an existing session.
- Time
Exceeded bool - Require an explicit Security policy match for Time Exceeded ICMPv6 messages, even when the message is associated with an existing session.
- Dest
Unreach bool - Require an explicit Security policy match for Destination Unreachable ICMPv6 messages, even when the message is associated with an existing session.
- Param
Problem bool - Require an explicit Security policy match for Parameter Problem ICMPv6 messages, even when the message is associated with an existing session.
- Pkt
Too boolBig - Require an explicit Security policy match for Packet Too Big ICMPv6 messages, even when the message is associated with an existing session.
- Redirect bool
- Require an explicit Security policy match for Redirect Message ICMPv6 messages, even when the message is associated with an existing session.
- Time
Exceeded bool - Require an explicit Security policy match for Time Exceeded ICMPv6 messages, even when the message is associated with an existing session.
- dest
Unreach Boolean - Require an explicit Security policy match for Destination Unreachable ICMPv6 messages, even when the message is associated with an existing session.
- param
Problem Boolean - Require an explicit Security policy match for Parameter Problem ICMPv6 messages, even when the message is associated with an existing session.
- pkt
Too BooleanBig - Require an explicit Security policy match for Packet Too Big ICMPv6 messages, even when the message is associated with an existing session.
- redirect Boolean
- Require an explicit Security policy match for Redirect Message ICMPv6 messages, even when the message is associated with an existing session.
- time
Exceeded Boolean - Require an explicit Security policy match for Time Exceeded ICMPv6 messages, even when the message is associated with an existing session.
- dest
Unreach boolean - Require an explicit Security policy match for Destination Unreachable ICMPv6 messages, even when the message is associated with an existing session.
- param
Problem boolean - Require an explicit Security policy match for Parameter Problem ICMPv6 messages, even when the message is associated with an existing session.
- pkt
Too booleanBig - Require an explicit Security policy match for Packet Too Big ICMPv6 messages, even when the message is associated with an existing session.
- redirect boolean
- Require an explicit Security policy match for Redirect Message ICMPv6 messages, even when the message is associated with an existing session.
- time
Exceeded boolean - Require an explicit Security policy match for Time Exceeded ICMPv6 messages, even when the message is associated with an existing session.
- dest_
unreach bool - Require an explicit Security policy match for Destination Unreachable ICMPv6 messages, even when the message is associated with an existing session.
- param_
problem bool - Require an explicit Security policy match for Parameter Problem ICMPv6 messages, even when the message is associated with an existing session.
- pkt_
too_ boolbig - Require an explicit Security policy match for Packet Too Big ICMPv6 messages, even when the message is associated with an existing session.
- redirect bool
- Require an explicit Security policy match for Redirect Message ICMPv6 messages, even when the message is associated with an existing session.
- time_
exceeded bool - Require an explicit Security policy match for Time Exceeded ICMPv6 messages, even when the message is associated with an existing session.
- dest
Unreach Boolean - Require an explicit Security policy match for Destination Unreachable ICMPv6 messages, even when the message is associated with an existing session.
- param
Problem Boolean - Require an explicit Security policy match for Parameter Problem ICMPv6 messages, even when the message is associated with an existing session.
- pkt
Too BooleanBig - Require an explicit Security policy match for Packet Too Big ICMPv6 messages, even when the message is associated with an existing session.
- redirect Boolean
- Require an explicit Security policy match for Redirect Message ICMPv6 messages, even when the message is associated with an existing session.
- time
Exceeded Boolean - Require an explicit Security policy match for Time Exceeded ICMPv6 messages, even when the message is associated with an existing session.
GetZoneProtectionProfileListDataL2SecGroupTagProtection
GetZoneProtectionProfileListDataL2SecGroupTagProtectionTag
- Enable bool
- Enable this exclude list for Ethernet SGT protection.
- Name string
- Name for the list of Security Group Tags (SGTs).
- Tag string
- The Layer 2 SGTs in headers of packets that you want to exclude (drop) when the SGT matches this list in the Zone Protection profile applied to a zone (range is 0 to 65,535).
- Enable bool
- Enable this exclude list for Ethernet SGT protection.
- Name string
- Name for the list of Security Group Tags (SGTs).
- Tag string
- The Layer 2 SGTs in headers of packets that you want to exclude (drop) when the SGT matches this list in the Zone Protection profile applied to a zone (range is 0 to 65,535).
- enable Boolean
- Enable this exclude list for Ethernet SGT protection.
- name String
- Name for the list of Security Group Tags (SGTs).
- tag String
- The Layer 2 SGTs in headers of packets that you want to exclude (drop) when the SGT matches this list in the Zone Protection profile applied to a zone (range is 0 to 65,535).
- enable boolean
- Enable this exclude list for Ethernet SGT protection.
- name string
- Name for the list of Security Group Tags (SGTs).
- tag string
- The Layer 2 SGTs in headers of packets that you want to exclude (drop) when the SGT matches this list in the Zone Protection profile applied to a zone (range is 0 to 65,535).
- enable bool
- Enable this exclude list for Ethernet SGT protection.
- name str
- Name for the list of Security Group Tags (SGTs).
- tag str
- The Layer 2 SGTs in headers of packets that you want to exclude (drop) when the SGT matches this list in the Zone Protection profile applied to a zone (range is 0 to 65,535).
- enable Boolean
- Enable this exclude list for Ethernet SGT protection.
- name String
- Name for the list of Security Group Tags (SGTs).
- tag String
- The Layer 2 SGTs in headers of packets that you want to exclude (drop) when the SGT matches this list in the Zone Protection profile applied to a zone (range is 0 to 65,535).
GetZoneProtectionProfileListDataNonIpProtocol
- List
Type string - Specify the type of list you are creating for protocol protection:
- Include List—Only the protocols on the list are allowed—in addition to IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), and VLAN tagged frames (0x8100). All other protocols are implicitly denied (blocked).
- Exclude List—Only the protocols on the list are denied; all other protocols are implicitly allowed. You cannot exclude IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), or VLAN tagged frames (0x8100).
- Protocols
List<Get
Zone Protection Profile List Data Non Ip Protocol Protocol> - Protocol
- List
Type string - Specify the type of list you are creating for protocol protection:
- Include List—Only the protocols on the list are allowed—in addition to IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), and VLAN tagged frames (0x8100). All other protocols are implicitly denied (blocked).
- Exclude List—Only the protocols on the list are denied; all other protocols are implicitly allowed. You cannot exclude IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), or VLAN tagged frames (0x8100).
- Protocols
[]Get
Zone Protection Profile List Data Non Ip Protocol Protocol - Protocol
- list
Type String - Specify the type of list you are creating for protocol protection:
- Include List—Only the protocols on the list are allowed—in addition to IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), and VLAN tagged frames (0x8100). All other protocols are implicitly denied (blocked).
- Exclude List—Only the protocols on the list are denied; all other protocols are implicitly allowed. You cannot exclude IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), or VLAN tagged frames (0x8100).
- protocols
List<Get
Zone Protection Profile List Data Non Ip Protocol Protocol> - Protocol
- list
Type string - Specify the type of list you are creating for protocol protection:
- Include List—Only the protocols on the list are allowed—in addition to IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), and VLAN tagged frames (0x8100). All other protocols are implicitly denied (blocked).
- Exclude List—Only the protocols on the list are denied; all other protocols are implicitly allowed. You cannot exclude IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), or VLAN tagged frames (0x8100).
- protocols
Get
Zone Protection Profile List Data Non Ip Protocol Protocol[] - Protocol
- list_
type str - Specify the type of list you are creating for protocol protection:
- Include List—Only the protocols on the list are allowed—in addition to IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), and VLAN tagged frames (0x8100). All other protocols are implicitly denied (blocked).
- Exclude List—Only the protocols on the list are denied; all other protocols are implicitly allowed. You cannot exclude IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), or VLAN tagged frames (0x8100).
- protocols
Sequence[Get
Zone Protection Profile List Data Non Ip Protocol Protocol] - Protocol
- list
Type String - Specify the type of list you are creating for protocol protection:
- Include List—Only the protocols on the list are allowed—in addition to IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), and VLAN tagged frames (0x8100). All other protocols are implicitly denied (blocked).
- Exclude List—Only the protocols on the list are denied; all other protocols are implicitly allowed. You cannot exclude IPv4 (0x0800), IPv6 (0x86DD), ARP (0x0806), or VLAN tagged frames (0x8100).
- protocols List<Property Map>
- Protocol
GetZoneProtectionProfileListDataNonIpProtocolProtocol
- Enable bool
- Enable the Ethertype code on the list.
- Ether
Type string - Enter an Ethertype code (protocol) preceded by 0x to indicate hexadecimal (range is 0x0000 to 0xFFFF). A list can have a maximum of 64 Ethertypes. Some sources of Ethertype codes are:
- Name string
- Enter the protocol name that corresponds to the Ethertype code you are adding to the list. The firewall does not verify that the protocol name matches the Ethertype code but the Ethertype code does determine the protocol filter.
- Enable bool
- Enable the Ethertype code on the list.
- Ether
Type string - Enter an Ethertype code (protocol) preceded by 0x to indicate hexadecimal (range is 0x0000 to 0xFFFF). A list can have a maximum of 64 Ethertypes. Some sources of Ethertype codes are:
- Name string
- Enter the protocol name that corresponds to the Ethertype code you are adding to the list. The firewall does not verify that the protocol name matches the Ethertype code but the Ethertype code does determine the protocol filter.
- enable Boolean
- Enable the Ethertype code on the list.
- ether
Type String - Enter an Ethertype code (protocol) preceded by 0x to indicate hexadecimal (range is 0x0000 to 0xFFFF). A list can have a maximum of 64 Ethertypes. Some sources of Ethertype codes are:
- name String
- Enter the protocol name that corresponds to the Ethertype code you are adding to the list. The firewall does not verify that the protocol name matches the Ethertype code but the Ethertype code does determine the protocol filter.
- enable boolean
- Enable the Ethertype code on the list.
- ether
Type string - Enter an Ethertype code (protocol) preceded by 0x to indicate hexadecimal (range is 0x0000 to 0xFFFF). A list can have a maximum of 64 Ethertypes. Some sources of Ethertype codes are:
- name string
- Enter the protocol name that corresponds to the Ethertype code you are adding to the list. The firewall does not verify that the protocol name matches the Ethertype code but the Ethertype code does determine the protocol filter.
- enable bool
- Enable the Ethertype code on the list.
- ether_
type str - Enter an Ethertype code (protocol) preceded by 0x to indicate hexadecimal (range is 0x0000 to 0xFFFF). A list can have a maximum of 64 Ethertypes. Some sources of Ethertype codes are:
- name str
- Enter the protocol name that corresponds to the Ethertype code you are adding to the list. The firewall does not verify that the protocol name matches the Ethertype code but the Ethertype code does determine the protocol filter.
- enable Boolean
- Enable the Ethertype code on the list.
- ether
Type String - Enter an Ethertype code (protocol) preceded by 0x to indicate hexadecimal (range is 0x0000 to 0xFFFF). A list can have a maximum of 64 Ethertypes. Some sources of Ethertype codes are:
- name String
- Enter the protocol name that corresponds to the Ethertype code you are adding to the list. The firewall does not verify that the protocol name matches the Ethertype code but the Ethertype code does determine the protocol filter.
GetZoneProtectionProfileListDataScan
- Action
Get
Zone Protection Profile List Data Scan Action - Action
- Interval int
- Interval
- Name string
- The threat ID number. These can be found in Palo Alto Networks ThreatVault.
- "8001" - TCP Port Scan
- "8002" - Host Sweep
- "8003" - UDP Port Scan
- "8006" - Port Scan
- Threshold int
- Threshold
- Action
Get
Zone Protection Profile List Data Scan Action - Action
- Interval int
- Interval
- Name string
- The threat ID number. These can be found in Palo Alto Networks ThreatVault.
- "8001" - TCP Port Scan
- "8002" - Host Sweep
- "8003" - UDP Port Scan
- "8006" - Port Scan
- Threshold int
- Threshold
- action
Get
Zone Protection Profile List Data Scan Action - Action
- interval Integer
- Interval
- name String
- The threat ID number. These can be found in Palo Alto Networks ThreatVault.
- "8001" - TCP Port Scan
- "8002" - Host Sweep
- "8003" - UDP Port Scan
- "8006" - Port Scan
- threshold Integer
- Threshold
- action
Get
Zone Protection Profile List Data Scan Action - Action
- interval number
- Interval
- name string
- The threat ID number. These can be found in Palo Alto Networks ThreatVault.
- "8001" - TCP Port Scan
- "8002" - Host Sweep
- "8003" - UDP Port Scan
- "8006" - Port Scan
- threshold number
- Threshold
- action
Get
Zone Protection Profile List Data Scan Action - Action
- interval int
- Interval
- name str
- The threat ID number. These can be found in Palo Alto Networks ThreatVault.
- "8001" - TCP Port Scan
- "8002" - Host Sweep
- "8003" - UDP Port Scan
- "8006" - Port Scan
- threshold int
- Threshold
- action Property Map
- Action
- interval Number
- Interval
- name String
- The threat ID number. These can be found in Palo Alto Networks ThreatVault.
- "8001" - TCP Port Scan
- "8002" - Host Sweep
- "8003" - UDP Port Scan
- "8006" - Port Scan
- threshold Number
- Threshold
GetZoneProtectionProfileListDataScanAction
- alert Property Map
- Alert
- allow Property Map
- Allow
- block Property Map
- Block
- block
Ip Property Map - Block ip
GetZoneProtectionProfileListDataScanActionBlockIp
GetZoneProtectionProfileListDataScanWhiteList
Package Details
- Repository
- scm pulumi/pulumi-scm
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
scmTerraform Provider.
Strata Cloud Manager v0.4.3 published on Saturday, Nov 8, 2025 by Pulumi
