f5-icontrol 0.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (253) hide show
  1. checksums.yaml +7 -0
  2. data/.gitignore +18 -0
  3. data/.travis.yml +5 -0
  4. data/Gemfile +4 -0
  5. data/LICENSE +9 -0
  6. data/LICENSE.txt +22 -0
  7. data/README.md +55 -0
  8. data/Rakefile +7 -0
  9. data/bin/f5 +6 -0
  10. data/f5-icontrol.gemspec +30 -0
  11. data/lib/f5/cli/application.rb +102 -0
  12. data/lib/f5/cli/config.rb +21 -0
  13. data/lib/f5/icontrol.rb +40 -0
  14. data/lib/f5/icontrol/local_lb/node_address_v2.rb +27 -0
  15. data/lib/f5/icontrol/local_lb/pool.rb +27 -0
  16. data/lib/f5/icontrol/system/system_info.rb +27 -0
  17. data/lib/f5/icontrol/version.rb +5 -0
  18. data/lib/wsdl/ASM.LoggingProfile.wsdl +1467 -0
  19. data/lib/wsdl/ASM.ObjectParams.wsdl +198 -0
  20. data/lib/wsdl/ASM.PSMProfile.wsdl +228 -0
  21. data/lib/wsdl/ASM.Policy.wsdl +3504 -0
  22. data/lib/wsdl/ASM.PolicyGroup.wsdl +389 -0
  23. data/lib/wsdl/ASM.SystemConfiguration.wsdl +730 -0
  24. data/lib/wsdl/ASM.WebApplication.wsdl +1138 -0
  25. data/lib/wsdl/ASM.WebApplicationGroup.wsdl +393 -0
  26. data/lib/wsdl/Classification.Application.wsdl +517 -0
  27. data/lib/wsdl/Classification.Category.wsdl +519 -0
  28. data/lib/wsdl/Classification.SignatureDefinition.wsdl +541 -0
  29. data/lib/wsdl/Classification.SignatureUpdateSchedule.wsdl +382 -0
  30. data/lib/wsdl/Classification.SignatureVersion.wsdl +233 -0
  31. data/lib/wsdl/GlobalLB.Application.wsdl +963 -0
  32. data/lib/wsdl/GlobalLB.DNSSECKey.wsdl +1642 -0
  33. data/lib/wsdl/GlobalLB.DNSSECZone.wsdl +825 -0
  34. data/lib/wsdl/GlobalLB.DataCenter.wsdl +7144 -0
  35. data/lib/wsdl/GlobalLB.Globals.wsdl +5513 -0
  36. data/lib/wsdl/GlobalLB.Link.wsdl +7654 -0
  37. data/lib/wsdl/GlobalLB.Monitor.wsdl +2228 -0
  38. data/lib/wsdl/GlobalLB.Pool.wsdl +9949 -0
  39. data/lib/wsdl/GlobalLB.PoolMember.wsdl +6939 -0
  40. data/lib/wsdl/GlobalLB.ProberPool.wsdl +7026 -0
  41. data/lib/wsdl/GlobalLB.Region.wsdl +560 -0
  42. data/lib/wsdl/GlobalLB.Rule.wsdl +6632 -0
  43. data/lib/wsdl/GlobalLB.Server.wsdl +8234 -0
  44. data/lib/wsdl/GlobalLB.Topology.wsdl +548 -0
  45. data/lib/wsdl/GlobalLB.VirtualServer.wsdl +6916 -0
  46. data/lib/wsdl/GlobalLB.VirtualServerV2.wsdl +7016 -0
  47. data/lib/wsdl/GlobalLB.WideIP.wsdl +8154 -0
  48. data/lib/wsdl/LTConfig.Class.wsdl +656 -0
  49. data/lib/wsdl/LTConfig.Field.wsdl +679 -0
  50. data/lib/wsdl/LocalLB.Class.wsdl +2153 -0
  51. data/lib/wsdl/LocalLB.DNSCache.wsdl +8380 -0
  52. data/lib/wsdl/LocalLB.DNSExpress.wsdl +6972 -0
  53. data/lib/wsdl/LocalLB.DNSGlobals.wsdl +457 -0
  54. data/lib/wsdl/LocalLB.DataGroupFile.wsdl +971 -0
  55. data/lib/wsdl/LocalLB.LSNPool.wsdl +7461 -0
  56. data/lib/wsdl/LocalLB.Monitor.wsdl +2214 -0
  57. data/lib/wsdl/LocalLB.NAT.wsdl +6413 -0
  58. data/lib/wsdl/LocalLB.NATV2.wsdl +6748 -0
  59. data/lib/wsdl/LocalLB.NodeAddress.wsdl +7143 -0
  60. data/lib/wsdl/LocalLB.NodeAddressV2.wsdl +7754 -0
  61. data/lib/wsdl/LocalLB.Pool.wsdl +11328 -0
  62. data/lib/wsdl/LocalLB.PoolMember.wsdl +7156 -0
  63. data/lib/wsdl/LocalLB.ProfileAnalytics.wsdl +5756 -0
  64. data/lib/wsdl/LocalLB.ProfileAuth.wsdl +6957 -0
  65. data/lib/wsdl/LocalLB.ProfileClassification.wsdl +370 -0
  66. data/lib/wsdl/LocalLB.ProfileClientSSL.wsdl +10232 -0
  67. data/lib/wsdl/LocalLB.ProfileDNS.wsdl +7723 -0
  68. data/lib/wsdl/LocalLB.ProfileDNSLogging.wsdl +852 -0
  69. data/lib/wsdl/LocalLB.ProfileDiameter.wsdl +8070 -0
  70. data/lib/wsdl/LocalLB.ProfileDiameterEndpoint.wsdl +7199 -0
  71. data/lib/wsdl/LocalLB.ProfileFTP.wsdl +6564 -0
  72. data/lib/wsdl/LocalLB.ProfileFastHttp.wsdl +7944 -0
  73. data/lib/wsdl/LocalLB.ProfileFastL4.wsdl +8235 -0
  74. data/lib/wsdl/LocalLB.ProfileHttp.wsdl +12256 -0
  75. data/lib/wsdl/LocalLB.ProfileHttpClass.wsdl +7414 -0
  76. data/lib/wsdl/LocalLB.ProfileHttpCompression.wsdl +8166 -0
  77. data/lib/wsdl/LocalLB.ProfileICAP.wsdl +6917 -0
  78. data/lib/wsdl/LocalLB.ProfileIIOP.wsdl +6726 -0
  79. data/lib/wsdl/LocalLB.ProfileOneConnect.wsdl +6784 -0
  80. data/lib/wsdl/LocalLB.ProfilePersistence.wsdl +2740 -0
  81. data/lib/wsdl/LocalLB.ProfileRADIUS.wsdl +6696 -0
  82. data/lib/wsdl/LocalLB.ProfileRTSP.wsdl +7424 -0
  83. data/lib/wsdl/LocalLB.ProfileRequestAdapt.wsdl +7041 -0
  84. data/lib/wsdl/LocalLB.ProfileRequestLogging.wsdl +2042 -0
  85. data/lib/wsdl/LocalLB.ProfileResponseAdapt.wsdl +7041 -0
  86. data/lib/wsdl/LocalLB.ProfileSCTP.wsdl +7887 -0
  87. data/lib/wsdl/LocalLB.ProfileSIP.wsdl +7866 -0
  88. data/lib/wsdl/LocalLB.ProfileSPDY.wsdl +7489 -0
  89. data/lib/wsdl/LocalLB.ProfileSPM.wsdl +953 -0
  90. data/lib/wsdl/LocalLB.ProfileServerSSL.wsdl +9566 -0
  91. data/lib/wsdl/LocalLB.ProfileStream.wsdl +6561 -0
  92. data/lib/wsdl/LocalLB.ProfileTCP.wsdl +9869 -0
  93. data/lib/wsdl/LocalLB.ProfileUDP.wsdl +6948 -0
  94. data/lib/wsdl/LocalLB.ProfileUserStatistic.wsdl +916 -0
  95. data/lib/wsdl/LocalLB.ProfileWebAcceleration.wsdl +8213 -0
  96. data/lib/wsdl/LocalLB.ProfileXML.wsdl +7022 -0
  97. data/lib/wsdl/LocalLB.RAMCacheInformation.wsdl +372 -0
  98. data/lib/wsdl/LocalLB.RateClass.wsdl +9480 -0
  99. data/lib/wsdl/LocalLB.Rule.wsdl +7033 -0
  100. data/lib/wsdl/LocalLB.SNAT.wsdl +7262 -0
  101. data/lib/wsdl/LocalLB.SNATPool.wsdl +6606 -0
  102. data/lib/wsdl/LocalLB.SNATPoolMember.wsdl +5960 -0
  103. data/lib/wsdl/LocalLB.SNATTranslationAddress.wsdl +6599 -0
  104. data/lib/wsdl/LocalLB.SNATTranslationAddressV2.wsdl +6760 -0
  105. data/lib/wsdl/LocalLB.VirtualAddress.wsdl +6676 -0
  106. data/lib/wsdl/LocalLB.VirtualAddressV2.wsdl +7539 -0
  107. data/lib/wsdl/LocalLB.VirtualServer.wsdl +14758 -0
  108. data/lib/wsdl/LocalLB.iFile.wsdl +302 -0
  109. data/lib/wsdl/LocalLB.iFileFile.wsdl +712 -0
  110. data/lib/wsdl/Log.DestinationArcSight.wsdl +377 -0
  111. data/lib/wsdl/Log.DestinationLocalSyslog.wsdl +469 -0
  112. data/lib/wsdl/Log.DestinationRemoteHighSpeedLog.wsdl +486 -0
  113. data/lib/wsdl/Log.DestinationRemoteSyslog.wsdl +751 -0
  114. data/lib/wsdl/Log.DestinationSplunk.wsdl +377 -0
  115. data/lib/wsdl/Log.Filter.wsdl +1175 -0
  116. data/lib/wsdl/Log.Publisher.wsdl +448 -0
  117. data/lib/wsdl/Management.ApplicationPresentationScript.wsdl +698 -0
  118. data/lib/wsdl/Management.ApplicationService.wsdl +1804 -0
  119. data/lib/wsdl/Management.ApplicationTemplate.wsdl +1323 -0
  120. data/lib/wsdl/Management.CCLDAPConfiguration.wsdl +1637 -0
  121. data/lib/wsdl/Management.CLIScript.wsdl +684 -0
  122. data/lib/wsdl/Management.CRLDPConfiguration.wsdl +763 -0
  123. data/lib/wsdl/Management.CRLDPServer.wsdl +626 -0
  124. data/lib/wsdl/Management.CertLDAPConfiguration.wsdl +2453 -0
  125. data/lib/wsdl/Management.ChangeControl.wsdl +735 -0
  126. data/lib/wsdl/Management.DBVariable.wsdl +352 -0
  127. data/lib/wsdl/Management.Device.wsdl +1697 -0
  128. data/lib/wsdl/Management.DeviceGroup.wsdl +1241 -0
  129. data/lib/wsdl/Management.EM.wsdl +456 -0
  130. data/lib/wsdl/Management.EventNotification.wsdl +1031 -0
  131. data/lib/wsdl/Management.EventSubscription.wsdl +1542 -0
  132. data/lib/wsdl/Management.FeatureModule.wsdl +424 -0
  133. data/lib/wsdl/Management.Folder.wsdl +635 -0
  134. data/lib/wsdl/Management.Globals.wsdl +166 -0
  135. data/lib/wsdl/Management.KeyCertificate.wsdl +2027 -0
  136. data/lib/wsdl/Management.LDAPConfiguration.wsdl +2645 -0
  137. data/lib/wsdl/Management.LicenseAdministration.wsdl +906 -0
  138. data/lib/wsdl/Management.Named.wsdl +740 -0
  139. data/lib/wsdl/Management.OCSPConfiguration.wsdl +447 -0
  140. data/lib/wsdl/Management.OCSPResponder.wsdl +2370 -0
  141. data/lib/wsdl/Management.Partition.wsdl +545 -0
  142. data/lib/wsdl/Management.Provision.wsdl +743 -0
  143. data/lib/wsdl/Management.RADIUSConfiguration.wsdl +951 -0
  144. data/lib/wsdl/Management.RADIUSServer.wsdl +602 -0
  145. data/lib/wsdl/Management.ResourceRecord.wsdl +2168 -0
  146. data/lib/wsdl/Management.SFlowDataSource.wsdl +776 -0
  147. data/lib/wsdl/Management.SFlowGlobals.wsdl +826 -0
  148. data/lib/wsdl/Management.SFlowReceiver.wsdl +694 -0
  149. data/lib/wsdl/Management.SMTPConfiguration.wsdl +854 -0
  150. data/lib/wsdl/Management.SNMPConfiguration.wsdl +4672 -0
  151. data/lib/wsdl/Management.TACACSConfiguration.wsdl +943 -0
  152. data/lib/wsdl/Management.TMOSModule.wsdl +309 -0
  153. data/lib/wsdl/Management.TrafficGroup.wsdl +953 -0
  154. data/lib/wsdl/Management.Trust.wsdl +703 -0
  155. data/lib/wsdl/Management.UserManagement.wsdl +1693 -0
  156. data/lib/wsdl/Management.View.wsdl +381 -0
  157. data/lib/wsdl/Management.Zone.wsdl +528 -0
  158. data/lib/wsdl/Management.ZoneRunner.wsdl +206 -0
  159. data/lib/wsdl/Networking.ARP.wsdl +776 -0
  160. data/lib/wsdl/Networking.AdminIP.wsdl +864 -0
  161. data/lib/wsdl/Networking.BWControllerPolicy.wsdl +1107 -0
  162. data/lib/wsdl/Networking.IPsecIkeDaemon.wsdl +368 -0
  163. data/lib/wsdl/Networking.IPsecIkePeer.wsdl +2701 -0
  164. data/lib/wsdl/Networking.IPsecManualSecurityAssociation.wsdl +1146 -0
  165. data/lib/wsdl/Networking.IPsecPolicy.wsdl +1380 -0
  166. data/lib/wsdl/Networking.IPsecTrafficSelector.wsdl +1104 -0
  167. data/lib/wsdl/Networking.Interfaces.wsdl +8359 -0
  168. data/lib/wsdl/Networking.LLDPGlobals.wsdl +590 -0
  169. data/lib/wsdl/Networking.PacketFilter.wsdl +6728 -0
  170. data/lib/wsdl/Networking.PacketFilterGlobals.wsdl +926 -0
  171. data/lib/wsdl/Networking.PortMirror.wsdl +373 -0
  172. data/lib/wsdl/Networking.ProfileFEC.wsdl +1350 -0
  173. data/lib/wsdl/Networking.ProfileGRE.wsdl +645 -0
  174. data/lib/wsdl/Networking.ProfileIPIP.wsdl +695 -0
  175. data/lib/wsdl/Networking.ProfileVXLAN.wsdl +563 -0
  176. data/lib/wsdl/Networking.ProfileWCCPGRE.wsdl +841 -0
  177. data/lib/wsdl/Networking.RouteDomain.wsdl +646 -0
  178. data/lib/wsdl/Networking.RouteDomainV2.wsdl +10056 -0
  179. data/lib/wsdl/Networking.RouteTable.wsdl +1209 -0
  180. data/lib/wsdl/Networking.RouteTableV2.wsdl +1531 -0
  181. data/lib/wsdl/Networking.RouterAdvertisement.wsdl +1067 -0
  182. data/lib/wsdl/Networking.STPGlobals.wsdl +796 -0
  183. data/lib/wsdl/Networking.STPInstance.wsdl +1147 -0
  184. data/lib/wsdl/Networking.STPInstanceV2.wsdl +1232 -0
  185. data/lib/wsdl/Networking.SelfIP.wsdl +557 -0
  186. data/lib/wsdl/Networking.SelfIPPortLockdown.wsdl +421 -0
  187. data/lib/wsdl/Networking.SelfIPV2.wsdl +10077 -0
  188. data/lib/wsdl/Networking.Trunk.wsdl +7133 -0
  189. data/lib/wsdl/Networking.Tunnel.wsdl +1354 -0
  190. data/lib/wsdl/Networking.VLAN.wsdl +2215 -0
  191. data/lib/wsdl/Networking.VLANGroup.wsdl +1441 -0
  192. data/lib/wsdl/Networking.iSessionAdvertisedRoute.wsdl +491 -0
  193. data/lib/wsdl/Networking.iSessionAdvertisedRouteV2.wsdl +619 -0
  194. data/lib/wsdl/Networking.iSessionDatastor.wsdl +459 -0
  195. data/lib/wsdl/Networking.iSessionDeduplication.wsdl +401 -0
  196. data/lib/wsdl/Networking.iSessionLocalInterface.wsdl +922 -0
  197. data/lib/wsdl/Networking.iSessionPeerDiscovery.wsdl +818 -0
  198. data/lib/wsdl/Networking.iSessionRemoteInterface.wsdl +1100 -0
  199. data/lib/wsdl/Networking.iSessionRemoteInterfaceV2.wsdl +1307 -0
  200. data/lib/wsdl/PEM.FormatScript.wsdl +542 -0
  201. data/lib/wsdl/PEM.ForwardingEndpoint.wsdl +849 -0
  202. data/lib/wsdl/PEM.InterceptionEndpoint.wsdl +414 -0
  203. data/lib/wsdl/PEM.Listener.wsdl +495 -0
  204. data/lib/wsdl/PEM.Policy.wsdl +4097 -0
  205. data/lib/wsdl/PEM.ServiceChainEndpoint.wsdl +762 -0
  206. data/lib/wsdl/PEM.Subscriber.wsdl +6527 -0
  207. data/lib/wsdl/Security.DoSDevice.wsdl +6670 -0
  208. data/lib/wsdl/Security.FirewallAddressList.wsdl +542 -0
  209. data/lib/wsdl/Security.FirewallGlobalAdminIPRuleList.wsdl +8891 -0
  210. data/lib/wsdl/Security.FirewallGlobalRuleList.wsdl +9171 -0
  211. data/lib/wsdl/Security.FirewallPolicy.wsdl +9355 -0
  212. data/lib/wsdl/Security.FirewallPortList.wsdl +544 -0
  213. data/lib/wsdl/Security.FirewallRuleList.wsdl +3360 -0
  214. data/lib/wsdl/Security.FirewallWeeklySchedule.wsdl +825 -0
  215. data/lib/wsdl/Security.LogProfile.wsdl +6927 -0
  216. data/lib/wsdl/Security.ProfileDNSSecurity.wsdl +6881 -0
  217. data/lib/wsdl/Security.ProfileDoS.wsdl +10389 -0
  218. data/lib/wsdl/Security.ProfileIPIntelligence.wsdl +7154 -0
  219. data/lib/wsdl/System.CertificateRevocationListFile.wsdl +840 -0
  220. data/lib/wsdl/System.Cluster.wsdl +956 -0
  221. data/lib/wsdl/System.ConfigSync.wsdl +1289 -0
  222. data/lib/wsdl/System.Connections.wsdl +497 -0
  223. data/lib/wsdl/System.Disk.wsdl +1442 -0
  224. data/lib/wsdl/System.ExternalMonitorFile.wsdl +834 -0
  225. data/lib/wsdl/System.Failover.wsdl +539 -0
  226. data/lib/wsdl/System.GeoIP.wsdl +181 -0
  227. data/lib/wsdl/System.HAGroup.wsdl +1983 -0
  228. data/lib/wsdl/System.HAStatus.wsdl +695 -0
  229. data/lib/wsdl/System.Inet.wsdl +438 -0
  230. data/lib/wsdl/System.Internal.wsdl +279 -0
  231. data/lib/wsdl/System.PerformanceSFlow.wsdl +722 -0
  232. data/lib/wsdl/System.Services.wsdl +1054 -0
  233. data/lib/wsdl/System.Session.wsdl +1023 -0
  234. data/lib/wsdl/System.SoftwareManagement.wsdl +1073 -0
  235. data/lib/wsdl/System.Statistics.wsdl +9469 -0
  236. data/lib/wsdl/System.SystemInfo.wsdl +7493 -0
  237. data/lib/wsdl/System.VCMP.wsdl +7766 -0
  238. data/lib/wsdl/WebAccelerator.Applications.wsdl +7765 -0
  239. data/lib/wsdl/WebAccelerator.Policies.wsdl +570 -0
  240. data/lib/wsdl/WebAccelerator.ProxyMessage.wsdl +157 -0
  241. data/lib/wsdl/iCall.PeriodicHandler.wsdl +751 -0
  242. data/lib/wsdl/iCall.PerpetualHandler.wsdl +1081 -0
  243. data/lib/wsdl/iCall.Script.wsdl +372 -0
  244. data/lib/wsdl/iCall.TriggeredHandler.wsdl +1071 -0
  245. data/metadata +323 -0
  246. data/spec/cassettes/F5_Icontrol_LocalLB_Pool/creates_a_pool.yml +49 -0
  247. data/spec/cassettes/F5_Icontrol_System_SystemInfo/retrieves_something_with_a_complex_return_type_and_input.yml +49 -0
  248. data/spec/cassettes/F5_Icontrol_System_SystemInfo/retrieves_the_uptime.yml +96 -0
  249. data/spec/cassettes/F5_Icontrol_System_SystemInfo/retrieves_the_version.yml +99 -0
  250. data/spec/models/local_lb/pool_spec.rb +26 -0
  251. data/spec/models/system/system_info_spec.rb +31 -0
  252. data/spec/spec_helper.rb +13 -0
  253. metadata +415 -0
@@ -0,0 +1,926 @@
1
+ <?xml version="1.0" ?>
2
+ <!--
3
+ Copyright (c) 1996-2013, F5 Networks, Inc., Seattle, Washington. All rights reserved.
4
+
5
+ F5, F5 Networks, the F5 logo, BIG-IP, 3-DNS, iControl, GLOBAL-SITE, SEE-IT, EDGE-FX, FireGuard, Internet Control Architecture, IP Application Switch, iRules, PACKET VELOCITY, SYN Check, CONTROL YOUR WORLD, OneConnect, ZoneRunner, uRoam, FirePass, and TrafficShield are registered trademarks or trademarks of F5 Networks, Inc., in the U.S. and certain other countries.
6
+
7
+ All other trademarks mentioned in this document are the property of their respective owners. F5 Networks' trademarks may not be used in connection with any product or service except as permitted in writing by F5.
8
+
9
+ -->
10
+ <definitions name="Networking.PacketFilterGlobals"
11
+ targetNamespace="urn:iControl"
12
+ xmlns:tns="urn:iControl"
13
+ xmlns:xsd="http://www.w3.org/2001/XMLSchema"
14
+ xmlns:soap="http://schemas.xmlsoap.org/wsdl/soap/"
15
+ xmlns="http://schemas.xmlsoap.org/wsdl/">
16
+
17
+ <!-- types -->
18
+
19
+ <types>
20
+ <xsd:schema targetNamespace='urn:iControl'
21
+ xmlns='http://www.w3.org/2001/XMLSchema'
22
+ xmlns:SOAP-ENC='http://schemas.xmlsoap.org/soap/encoding/'
23
+ xmlns:wsdl='http://schemas.xmlsoap.org/wsdl/'>
24
+ <xsd:simpleType name="Common.EnabledState">
25
+ <xsd:restriction base="xsd:string">
26
+ <xsd:enumeration value="STATE_DISABLED">
27
+ <xsd:annotation>
28
+ <xsd:documentation>STATE_DISABLED</xsd:documentation>
29
+ </xsd:annotation>
30
+ </xsd:enumeration>
31
+ <xsd:enumeration value="STATE_ENABLED">
32
+ <xsd:annotation>
33
+ <xsd:documentation>STATE_ENABLED</xsd:documentation>
34
+ </xsd:annotation>
35
+ </xsd:enumeration>
36
+ </xsd:restriction>
37
+ </xsd:simpleType>
38
+ <xsd:complexType name="Common.StringSequence">
39
+ <xsd:complexContent>
40
+ <xsd:restriction base='SOAP-ENC:Array'>
41
+ <xsd:attribute ref='SOAP-ENC:arrayType' wsdl:arrayType='xsd:string[]'/>
42
+ </xsd:restriction>
43
+ </xsd:complexContent>
44
+ </xsd:complexType>
45
+ <xsd:simpleType name="Networking.PacketFilterGlobals.DefaultAction">
46
+ <xsd:restriction base="xsd:string">
47
+ <xsd:enumeration value="PACKET_FILTER_DEFAULT_ACTION_UNKNOWN">
48
+ <xsd:annotation>
49
+ <xsd:documentation>PACKET_FILTER_DEFAULT_ACTION_UNKNOWN</xsd:documentation>
50
+ </xsd:annotation>
51
+ </xsd:enumeration>
52
+ <xsd:enumeration value="PACKET_FILTER_DEFAULT_ACTION_ACCEPT">
53
+ <xsd:annotation>
54
+ <xsd:documentation>PACKET_FILTER_DEFAULT_ACTION_ACCEPT</xsd:documentation>
55
+ </xsd:annotation>
56
+ </xsd:enumeration>
57
+ <xsd:enumeration value="PACKET_FILTER_DEFAULT_ACTION_DISCARD">
58
+ <xsd:annotation>
59
+ <xsd:documentation>PACKET_FILTER_DEFAULT_ACTION_DISCARD</xsd:documentation>
60
+ </xsd:annotation>
61
+ </xsd:enumeration>
62
+ <xsd:enumeration value="PACKET_FILTER_DEFAULT_ACTION_REJECT">
63
+ <xsd:annotation>
64
+ <xsd:documentation>PACKET_FILTER_DEFAULT_ACTION_REJECT</xsd:documentation>
65
+ </xsd:annotation>
66
+ </xsd:enumeration>
67
+ </xsd:restriction>
68
+ </xsd:simpleType>
69
+ <xsd:complexType name="Common.IPAddressSequence">
70
+ <xsd:complexContent>
71
+ <xsd:restriction base='SOAP-ENC:Array'>
72
+ <xsd:attribute ref='SOAP-ENC:arrayType' wsdl:arrayType='xsd:string[]'/>
73
+ </xsd:restriction>
74
+ </xsd:complexContent>
75
+ </xsd:complexType>
76
+ </xsd:schema>
77
+ </types>
78
+
79
+ <!-- message -->
80
+
81
+ <message name="Networking.PacketFilterGlobals.set_packet_filter_stateRequest">
82
+ <part name="state" type="tns:Common.EnabledState"/>
83
+ </message>
84
+ <message name="Networking.PacketFilterGlobals.set_packet_filter_stateResponse">
85
+ </message>
86
+
87
+ <message name="Networking.PacketFilterGlobals.get_packet_filter_stateRequest">
88
+ </message>
89
+ <message name="Networking.PacketFilterGlobals.get_packet_filter_stateResponse">
90
+ <part name="return" type="tns:Common.EnabledState"/>
91
+ </message>
92
+
93
+ <message name="Networking.PacketFilterGlobals.set_filter_established_connections_stateRequest">
94
+ <part name="state" type="tns:Common.EnabledState"/>
95
+ </message>
96
+ <message name="Networking.PacketFilterGlobals.set_filter_established_connections_stateResponse">
97
+ </message>
98
+
99
+ <message name="Networking.PacketFilterGlobals.get_filter_established_connections_stateRequest">
100
+ </message>
101
+ <message name="Networking.PacketFilterGlobals.get_filter_established_connections_stateResponse">
102
+ <part name="return" type="tns:Common.EnabledState"/>
103
+ </message>
104
+
105
+ <message name="Networking.PacketFilterGlobals.set_send_icmp_error_on_packet_reject_stateRequest">
106
+ <part name="state" type="tns:Common.EnabledState"/>
107
+ </message>
108
+ <message name="Networking.PacketFilterGlobals.set_send_icmp_error_on_packet_reject_stateResponse">
109
+ </message>
110
+
111
+ <message name="Networking.PacketFilterGlobals.get_send_icmp_error_on_packet_reject_stateRequest">
112
+ </message>
113
+ <message name="Networking.PacketFilterGlobals.get_send_icmp_error_on_packet_reject_stateResponse">
114
+ <part name="return" type="tns:Common.EnabledState"/>
115
+ </message>
116
+
117
+ <message name="Networking.PacketFilterGlobals.set_always_accept_arp_stateRequest">
118
+ <part name="state" type="tns:Common.EnabledState"/>
119
+ </message>
120
+ <message name="Networking.PacketFilterGlobals.set_always_accept_arp_stateResponse">
121
+ </message>
122
+
123
+ <message name="Networking.PacketFilterGlobals.get_always_accept_arp_stateRequest">
124
+ </message>
125
+ <message name="Networking.PacketFilterGlobals.get_always_accept_arp_stateResponse">
126
+ <part name="return" type="tns:Common.EnabledState"/>
127
+ </message>
128
+
129
+ <message name="Networking.PacketFilterGlobals.set_always_accept_important_icmp_stateRequest">
130
+ <part name="state" type="tns:Common.EnabledState"/>
131
+ </message>
132
+ <message name="Networking.PacketFilterGlobals.set_always_accept_important_icmp_stateResponse">
133
+ </message>
134
+
135
+ <message name="Networking.PacketFilterGlobals.get_always_accept_important_icmp_stateRequest">
136
+ </message>
137
+ <message name="Networking.PacketFilterGlobals.get_always_accept_important_icmp_stateResponse">
138
+ <part name="return" type="tns:Common.EnabledState"/>
139
+ </message>
140
+
141
+ <message name="Networking.PacketFilterGlobals.set_default_actionRequest">
142
+ <part name="action" type="tns:Networking.PacketFilterGlobals.DefaultAction"/>
143
+ </message>
144
+ <message name="Networking.PacketFilterGlobals.set_default_actionResponse">
145
+ </message>
146
+
147
+ <message name="Networking.PacketFilterGlobals.get_default_actionRequest">
148
+ </message>
149
+ <message name="Networking.PacketFilterGlobals.get_default_actionResponse">
150
+ <part name="return" type="tns:Networking.PacketFilterGlobals.DefaultAction"/>
151
+ </message>
152
+
153
+ <message name="Networking.PacketFilterGlobals.get_trusted_vlanRequest">
154
+ </message>
155
+ <message name="Networking.PacketFilterGlobals.get_trusted_vlanResponse">
156
+ <part name="return" type="tns:Common.StringSequence"/>
157
+ </message>
158
+
159
+ <message name="Networking.PacketFilterGlobals.add_trusted_vlanRequest">
160
+ <part name="vlans" type="tns:Common.StringSequence"/>
161
+ </message>
162
+ <message name="Networking.PacketFilterGlobals.add_trusted_vlanResponse">
163
+ </message>
164
+
165
+ <message name="Networking.PacketFilterGlobals.remove_trusted_vlanRequest">
166
+ <part name="vlans" type="tns:Common.StringSequence"/>
167
+ </message>
168
+ <message name="Networking.PacketFilterGlobals.remove_trusted_vlanResponse">
169
+ </message>
170
+
171
+ <message name="Networking.PacketFilterGlobals.get_trusted_addressRequest">
172
+ </message>
173
+ <message name="Networking.PacketFilterGlobals.get_trusted_addressResponse">
174
+ <part name="return" type="tns:Common.IPAddressSequence"/>
175
+ </message>
176
+
177
+ <message name="Networking.PacketFilterGlobals.add_trusted_addressRequest">
178
+ <part name="addresses" type="tns:Common.IPAddressSequence"/>
179
+ </message>
180
+ <message name="Networking.PacketFilterGlobals.add_trusted_addressResponse">
181
+ </message>
182
+
183
+ <message name="Networking.PacketFilterGlobals.remove_trusted_addressRequest">
184
+ <part name="addresses" type="tns:Common.IPAddressSequence"/>
185
+ </message>
186
+ <message name="Networking.PacketFilterGlobals.remove_trusted_addressResponse">
187
+ </message>
188
+
189
+ <message name="Networking.PacketFilterGlobals.get_trusted_mac_addressRequest">
190
+ </message>
191
+ <message name="Networking.PacketFilterGlobals.get_trusted_mac_addressResponse">
192
+ <part name="return" type="tns:Common.StringSequence"/>
193
+ </message>
194
+
195
+ <message name="Networking.PacketFilterGlobals.add_trusted_mac_addressRequest">
196
+ <part name="mac_addresses" type="tns:Common.StringSequence"/>
197
+ </message>
198
+ <message name="Networking.PacketFilterGlobals.add_trusted_mac_addressResponse">
199
+ </message>
200
+
201
+ <message name="Networking.PacketFilterGlobals.remove_trusted_mac_addressRequest">
202
+ <part name="mac_addresses" type="tns:Common.StringSequence"/>
203
+ </message>
204
+ <message name="Networking.PacketFilterGlobals.remove_trusted_mac_addressResponse">
205
+ </message>
206
+
207
+ <message name="Networking.PacketFilterGlobals.get_versionRequest">
208
+ </message>
209
+ <message name="Networking.PacketFilterGlobals.get_versionResponse">
210
+ <part name="return" type="xsd:string"/>
211
+ </message>
212
+
213
+ <!-- portType -->
214
+
215
+ <portType name="Networking.PacketFilterGlobalsPortType">
216
+ <operation name="set_packet_filter_state">
217
+ <documentation>
218
+ Sets the state indicating whether packet filtering is
219
+ enabled or disabled. The default is disabled.
220
+
221
+ If enabled, the system filters incoming packets, and
222
+ directs traffic based on the criteria you specify, both in
223
+ the packet filter globals and in the packet filter rules.
224
+
225
+ </documentation>
226
+ <input message="tns:Networking.PacketFilterGlobals.set_packet_filter_stateRequest"/>
227
+ <output message="tns:Networking.PacketFilterGlobals.set_packet_filter_stateResponse"/>
228
+ </operation>
229
+ <operation name="get_packet_filter_state">
230
+ <documentation>
231
+ Gets the state indicating whether packet filtering is
232
+ enabled or disabled.
233
+
234
+ </documentation>
235
+ <input message="tns:Networking.PacketFilterGlobals.get_packet_filter_stateRequest"/>
236
+ <output message="tns:Networking.PacketFilterGlobals.get_packet_filter_stateResponse"/>
237
+ </operation>
238
+ <operation name="set_filter_established_connections_state">
239
+ <documentation>
240
+ Sets the state indicating whether the system should filter
241
+ all ingress packets, even if the packets are part of an
242
+ existing connection. The default is disabled (unchecked).
243
+
244
+ </documentation>
245
+ <input message="tns:Networking.PacketFilterGlobals.set_filter_established_connections_stateRequest"/>
246
+ <output message="tns:Networking.PacketFilterGlobals.set_filter_established_connections_stateResponse"/>
247
+ </operation>
248
+ <operation name="get_filter_established_connections_state">
249
+ <documentation>
250
+ Gets the state indicating whether the system should filter
251
+ all ingress packets, even if the packets are part of an
252
+ existing connection.
253
+
254
+ </documentation>
255
+ <input message="tns:Networking.PacketFilterGlobals.get_filter_established_connections_stateRequest"/>
256
+ <output message="tns:Networking.PacketFilterGlobals.get_filter_established_connections_stateResponse"/>
257
+ </operation>
258
+ <operation name="set_send_icmp_error_on_packet_reject_state">
259
+ <documentation>
260
+ Sets the state indicating whether the system should send an
261
+ ICMP type 3 (destination unreachable), code 13
262
+ (administratively prohibited) packet when an ingress packet
263
+ is rejected.
264
+
265
+ When disabled, the system sends an ICMP reject
266
+ packet that is protocol-dependent. The default is disabled.
267
+
268
+ </documentation>
269
+ <input message="tns:Networking.PacketFilterGlobals.set_send_icmp_error_on_packet_reject_stateRequest"/>
270
+ <output message="tns:Networking.PacketFilterGlobals.set_send_icmp_error_on_packet_reject_stateResponse"/>
271
+ </operation>
272
+ <operation name="get_send_icmp_error_on_packet_reject_state">
273
+ <documentation>
274
+ Gets the state indicating whether the system should send an
275
+ ICMP type 3 (destination unreachable), code 13
276
+ (administratively prohibited) packet when an ingress packet
277
+ is rejected.
278
+
279
+ </documentation>
280
+ <input message="tns:Networking.PacketFilterGlobals.get_send_icmp_error_on_packet_reject_stateRequest"/>
281
+ <output message="tns:Networking.PacketFilterGlobals.get_send_icmp_error_on_packet_reject_stateResponse"/>
282
+ </operation>
283
+ <operation name="set_always_accept_arp_state">
284
+ <documentation>
285
+ Sets the state indicating whether the system automatically
286
+ accepts ARP packets. The default is enabled.
287
+
288
+ </documentation>
289
+ <input message="tns:Networking.PacketFilterGlobals.set_always_accept_arp_stateRequest"/>
290
+ <output message="tns:Networking.PacketFilterGlobals.set_always_accept_arp_stateResponse"/>
291
+ </operation>
292
+ <operation name="get_always_accept_arp_state">
293
+ <documentation>
294
+ Gets the state indicating whether the system automatically
295
+ accepts ARP packets.
296
+
297
+ </documentation>
298
+ <input message="tns:Networking.PacketFilterGlobals.get_always_accept_arp_stateRequest"/>
299
+ <output message="tns:Networking.PacketFilterGlobals.get_always_accept_arp_stateResponse"/>
300
+ </operation>
301
+ <operation name="set_always_accept_important_icmp_state">
302
+ <documentation>
303
+ Sets the state indicating whether the system automatically
304
+ accepts the following ICMP packet types: UNREACH,
305
+ SOURCEQUENCH, REDIRECT, TIMEXCEED. The default is enabled.
306
+
307
+ </documentation>
308
+ <input message="tns:Networking.PacketFilterGlobals.set_always_accept_important_icmp_stateRequest"/>
309
+ <output message="tns:Networking.PacketFilterGlobals.set_always_accept_important_icmp_stateResponse"/>
310
+ </operation>
311
+ <operation name="get_always_accept_important_icmp_state">
312
+ <documentation>
313
+ Gets the state indicating whether the system automatically
314
+ accepts the following ICMP packet types: UNREACH,
315
+ SOURCEQUENCH, REDIRECT, TIMEXCEED.
316
+
317
+ </documentation>
318
+ <input message="tns:Networking.PacketFilterGlobals.get_always_accept_important_icmp_stateRequest"/>
319
+ <output message="tns:Networking.PacketFilterGlobals.get_always_accept_important_icmp_stateResponse"/>
320
+ </operation>
321
+ <operation name="set_default_action">
322
+ <documentation>
323
+ Sets the action to take for packets that do not match the
324
+ criteria specified in any of the packet filter rules. The
325
+ default is accept. Note that you can effectively stop all
326
+ traffic to the system if you select either discard or
327
+ reject, and you do not configure additional packet filter
328
+ rules to accept management or other acceptable traffic. We
329
+ recommend that you leave this setting at the default value,
330
+ accept.
331
+
332
+ </documentation>
333
+ <input message="tns:Networking.PacketFilterGlobals.set_default_actionRequest"/>
334
+ <output message="tns:Networking.PacketFilterGlobals.set_default_actionResponse"/>
335
+ </operation>
336
+ <operation name="get_default_action">
337
+ <documentation>
338
+ Gets the action to take for packets that do not match the
339
+ criteria specified in any of the packet filter rules.
340
+
341
+ </documentation>
342
+ <input message="tns:Networking.PacketFilterGlobals.get_default_actionRequest"/>
343
+ <output message="tns:Networking.PacketFilterGlobals.get_default_actionResponse"/>
344
+ </operation>
345
+ <operation name="get_trusted_vlan">
346
+ <documentation>
347
+ Gets a list of all trusted ingress VLANs used in packet filtering on this device.
348
+
349
+ </documentation>
350
+ <input message="tns:Networking.PacketFilterGlobals.get_trusted_vlanRequest"/>
351
+ <output message="tns:Networking.PacketFilterGlobals.get_trusted_vlanResponse"/>
352
+ </operation>
353
+ <operation name="add_trusted_vlan">
354
+ <documentation>
355
+ Adds the specified ingress VLANs to the list of trusted VLANs.
356
+
357
+ </documentation>
358
+ <input message="tns:Networking.PacketFilterGlobals.add_trusted_vlanRequest"/>
359
+ <output message="tns:Networking.PacketFilterGlobals.add_trusted_vlanResponse"/>
360
+ </operation>
361
+ <operation name="remove_trusted_vlan">
362
+ <documentation>
363
+ Removes the specified ingress VLANs from the list of trusted VLANs.
364
+
365
+ </documentation>
366
+ <input message="tns:Networking.PacketFilterGlobals.remove_trusted_vlanRequest"/>
367
+ <output message="tns:Networking.PacketFilterGlobals.remove_trusted_vlanResponse"/>
368
+ </operation>
369
+ <operation name="get_trusted_address">
370
+ <documentation>
371
+ Gets a list of all trusted source addresses used in packet filtering on this device.
372
+
373
+ </documentation>
374
+ <input message="tns:Networking.PacketFilterGlobals.get_trusted_addressRequest"/>
375
+ <output message="tns:Networking.PacketFilterGlobals.get_trusted_addressResponse"/>
376
+ </operation>
377
+ <operation name="add_trusted_address">
378
+ <documentation>
379
+ Adds the specified addresses to the list of trusted source addresses.
380
+
381
+ </documentation>
382
+ <input message="tns:Networking.PacketFilterGlobals.add_trusted_addressRequest"/>
383
+ <output message="tns:Networking.PacketFilterGlobals.add_trusted_addressResponse"/>
384
+ </operation>
385
+ <operation name="remove_trusted_address">
386
+ <documentation>
387
+ Removes the specified addresses from the list of trusted source addresses.
388
+
389
+ </documentation>
390
+ <input message="tns:Networking.PacketFilterGlobals.remove_trusted_addressRequest"/>
391
+ <output message="tns:Networking.PacketFilterGlobals.remove_trusted_addressResponse"/>
392
+ </operation>
393
+ <operation name="get_trusted_mac_address">
394
+ <documentation>
395
+ Gets a list of all trusted MAC addresses used in packet filtering on this device.
396
+
397
+ </documentation>
398
+ <input message="tns:Networking.PacketFilterGlobals.get_trusted_mac_addressRequest"/>
399
+ <output message="tns:Networking.PacketFilterGlobals.get_trusted_mac_addressResponse"/>
400
+ </operation>
401
+ <operation name="add_trusted_mac_address">
402
+ <documentation>
403
+ Adds the specified MAC addresses to the list of trusted MAC addresses.
404
+
405
+ </documentation>
406
+ <input message="tns:Networking.PacketFilterGlobals.add_trusted_mac_addressRequest"/>
407
+ <output message="tns:Networking.PacketFilterGlobals.add_trusted_mac_addressResponse"/>
408
+ </operation>
409
+ <operation name="remove_trusted_mac_address">
410
+ <documentation>
411
+ Removes the specified MAC addresses from the list of trusted MAC addresses.
412
+
413
+ </documentation>
414
+ <input message="tns:Networking.PacketFilterGlobals.remove_trusted_mac_addressRequest"/>
415
+ <output message="tns:Networking.PacketFilterGlobals.remove_trusted_mac_addressResponse"/>
416
+ </operation>
417
+ <operation name="get_version">
418
+ <documentation>
419
+ Gets the version information for this interface.
420
+
421
+ </documentation>
422
+ <input message="tns:Networking.PacketFilterGlobals.get_versionRequest"/>
423
+ <output message="tns:Networking.PacketFilterGlobals.get_versionResponse"/>
424
+ </operation>
425
+ </portType>
426
+
427
+ <!-- binding -->
428
+
429
+ <binding name="Networking.PacketFilterGlobalsBinding" type="tns:Networking.PacketFilterGlobalsPortType">
430
+ <soap:binding style="rpc" transport="http://schemas.xmlsoap.org/soap/http"/>
431
+ <operation name="set_packet_filter_state">
432
+ <documentation>
433
+ Sets the state indicating whether packet filtering is
434
+ enabled or disabled. The default is disabled.
435
+
436
+ If enabled, the system filters incoming packets, and
437
+ directs traffic based on the criteria you specify, both in
438
+ the packet filter globals and in the packet filter rules.
439
+
440
+ </documentation>
441
+ <soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
442
+ <input>
443
+ <soap:body
444
+ use="encoded"
445
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
446
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
447
+ </input>
448
+ <output>
449
+ <soap:body
450
+ use="encoded"
451
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
452
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
453
+ </output>
454
+ </operation>
455
+
456
+ <operation name="get_packet_filter_state">
457
+ <documentation>
458
+ Gets the state indicating whether packet filtering is
459
+ enabled or disabled.
460
+
461
+ </documentation>
462
+ <soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
463
+ <input>
464
+ <soap:body
465
+ use="encoded"
466
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
467
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
468
+ </input>
469
+ <output>
470
+ <soap:body
471
+ use="encoded"
472
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
473
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
474
+ </output>
475
+ </operation>
476
+
477
+ <operation name="set_filter_established_connections_state">
478
+ <documentation>
479
+ Sets the state indicating whether the system should filter
480
+ all ingress packets, even if the packets are part of an
481
+ existing connection. The default is disabled (unchecked).
482
+
483
+ </documentation>
484
+ <soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
485
+ <input>
486
+ <soap:body
487
+ use="encoded"
488
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
489
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
490
+ </input>
491
+ <output>
492
+ <soap:body
493
+ use="encoded"
494
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
495
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
496
+ </output>
497
+ </operation>
498
+
499
+ <operation name="get_filter_established_connections_state">
500
+ <documentation>
501
+ Gets the state indicating whether the system should filter
502
+ all ingress packets, even if the packets are part of an
503
+ existing connection.
504
+
505
+ </documentation>
506
+ <soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
507
+ <input>
508
+ <soap:body
509
+ use="encoded"
510
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
511
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
512
+ </input>
513
+ <output>
514
+ <soap:body
515
+ use="encoded"
516
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
517
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
518
+ </output>
519
+ </operation>
520
+
521
+ <operation name="set_send_icmp_error_on_packet_reject_state">
522
+ <documentation>
523
+ Sets the state indicating whether the system should send an
524
+ ICMP type 3 (destination unreachable), code 13
525
+ (administratively prohibited) packet when an ingress packet
526
+ is rejected.
527
+
528
+ When disabled, the system sends an ICMP reject
529
+ packet that is protocol-dependent. The default is disabled.
530
+
531
+ </documentation>
532
+ <soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
533
+ <input>
534
+ <soap:body
535
+ use="encoded"
536
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
537
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
538
+ </input>
539
+ <output>
540
+ <soap:body
541
+ use="encoded"
542
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
543
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
544
+ </output>
545
+ </operation>
546
+
547
+ <operation name="get_send_icmp_error_on_packet_reject_state">
548
+ <documentation>
549
+ Gets the state indicating whether the system should send an
550
+ ICMP type 3 (destination unreachable), code 13
551
+ (administratively prohibited) packet when an ingress packet
552
+ is rejected.
553
+
554
+ </documentation>
555
+ <soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
556
+ <input>
557
+ <soap:body
558
+ use="encoded"
559
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
560
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
561
+ </input>
562
+ <output>
563
+ <soap:body
564
+ use="encoded"
565
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
566
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
567
+ </output>
568
+ </operation>
569
+
570
+ <operation name="set_always_accept_arp_state">
571
+ <documentation>
572
+ Sets the state indicating whether the system automatically
573
+ accepts ARP packets. The default is enabled.
574
+
575
+ </documentation>
576
+ <soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
577
+ <input>
578
+ <soap:body
579
+ use="encoded"
580
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
581
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
582
+ </input>
583
+ <output>
584
+ <soap:body
585
+ use="encoded"
586
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
587
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
588
+ </output>
589
+ </operation>
590
+
591
+ <operation name="get_always_accept_arp_state">
592
+ <documentation>
593
+ Gets the state indicating whether the system automatically
594
+ accepts ARP packets.
595
+
596
+ </documentation>
597
+ <soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
598
+ <input>
599
+ <soap:body
600
+ use="encoded"
601
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
602
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
603
+ </input>
604
+ <output>
605
+ <soap:body
606
+ use="encoded"
607
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
608
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
609
+ </output>
610
+ </operation>
611
+
612
+ <operation name="set_always_accept_important_icmp_state">
613
+ <documentation>
614
+ Sets the state indicating whether the system automatically
615
+ accepts the following ICMP packet types: UNREACH,
616
+ SOURCEQUENCH, REDIRECT, TIMEXCEED. The default is enabled.
617
+
618
+ </documentation>
619
+ <soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
620
+ <input>
621
+ <soap:body
622
+ use="encoded"
623
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
624
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
625
+ </input>
626
+ <output>
627
+ <soap:body
628
+ use="encoded"
629
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
630
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
631
+ </output>
632
+ </operation>
633
+
634
+ <operation name="get_always_accept_important_icmp_state">
635
+ <documentation>
636
+ Gets the state indicating whether the system automatically
637
+ accepts the following ICMP packet types: UNREACH,
638
+ SOURCEQUENCH, REDIRECT, TIMEXCEED.
639
+
640
+ </documentation>
641
+ <soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
642
+ <input>
643
+ <soap:body
644
+ use="encoded"
645
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
646
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
647
+ </input>
648
+ <output>
649
+ <soap:body
650
+ use="encoded"
651
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
652
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
653
+ </output>
654
+ </operation>
655
+
656
+ <operation name="set_default_action">
657
+ <documentation>
658
+ Sets the action to take for packets that do not match the
659
+ criteria specified in any of the packet filter rules. The
660
+ default is accept. Note that you can effectively stop all
661
+ traffic to the system if you select either discard or
662
+ reject, and you do not configure additional packet filter
663
+ rules to accept management or other acceptable traffic. We
664
+ recommend that you leave this setting at the default value,
665
+ accept.
666
+
667
+ </documentation>
668
+ <soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
669
+ <input>
670
+ <soap:body
671
+ use="encoded"
672
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
673
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
674
+ </input>
675
+ <output>
676
+ <soap:body
677
+ use="encoded"
678
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
679
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
680
+ </output>
681
+ </operation>
682
+
683
+ <operation name="get_default_action">
684
+ <documentation>
685
+ Gets the action to take for packets that do not match the
686
+ criteria specified in any of the packet filter rules.
687
+
688
+ </documentation>
689
+ <soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
690
+ <input>
691
+ <soap:body
692
+ use="encoded"
693
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
694
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
695
+ </input>
696
+ <output>
697
+ <soap:body
698
+ use="encoded"
699
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
700
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
701
+ </output>
702
+ </operation>
703
+
704
+ <operation name="get_trusted_vlan">
705
+ <documentation>
706
+ Gets a list of all trusted ingress VLANs used in packet filtering on this device.
707
+
708
+ </documentation>
709
+ <soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
710
+ <input>
711
+ <soap:body
712
+ use="encoded"
713
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
714
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
715
+ </input>
716
+ <output>
717
+ <soap:body
718
+ use="encoded"
719
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
720
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
721
+ </output>
722
+ </operation>
723
+
724
+ <operation name="add_trusted_vlan">
725
+ <documentation>
726
+ Adds the specified ingress VLANs to the list of trusted VLANs.
727
+
728
+ </documentation>
729
+ <soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
730
+ <input>
731
+ <soap:body
732
+ use="encoded"
733
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
734
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
735
+ </input>
736
+ <output>
737
+ <soap:body
738
+ use="encoded"
739
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
740
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
741
+ </output>
742
+ </operation>
743
+
744
+ <operation name="remove_trusted_vlan">
745
+ <documentation>
746
+ Removes the specified ingress VLANs from the list of trusted VLANs.
747
+
748
+ </documentation>
749
+ <soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
750
+ <input>
751
+ <soap:body
752
+ use="encoded"
753
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
754
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
755
+ </input>
756
+ <output>
757
+ <soap:body
758
+ use="encoded"
759
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
760
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
761
+ </output>
762
+ </operation>
763
+
764
+ <operation name="get_trusted_address">
765
+ <documentation>
766
+ Gets a list of all trusted source addresses used in packet filtering on this device.
767
+
768
+ </documentation>
769
+ <soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
770
+ <input>
771
+ <soap:body
772
+ use="encoded"
773
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
774
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
775
+ </input>
776
+ <output>
777
+ <soap:body
778
+ use="encoded"
779
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
780
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
781
+ </output>
782
+ </operation>
783
+
784
+ <operation name="add_trusted_address">
785
+ <documentation>
786
+ Adds the specified addresses to the list of trusted source addresses.
787
+
788
+ </documentation>
789
+ <soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
790
+ <input>
791
+ <soap:body
792
+ use="encoded"
793
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
794
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
795
+ </input>
796
+ <output>
797
+ <soap:body
798
+ use="encoded"
799
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
800
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
801
+ </output>
802
+ </operation>
803
+
804
+ <operation name="remove_trusted_address">
805
+ <documentation>
806
+ Removes the specified addresses from the list of trusted source addresses.
807
+
808
+ </documentation>
809
+ <soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
810
+ <input>
811
+ <soap:body
812
+ use="encoded"
813
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
814
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
815
+ </input>
816
+ <output>
817
+ <soap:body
818
+ use="encoded"
819
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
820
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
821
+ </output>
822
+ </operation>
823
+
824
+ <operation name="get_trusted_mac_address">
825
+ <documentation>
826
+ Gets a list of all trusted MAC addresses used in packet filtering on this device.
827
+
828
+ </documentation>
829
+ <soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
830
+ <input>
831
+ <soap:body
832
+ use="encoded"
833
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
834
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
835
+ </input>
836
+ <output>
837
+ <soap:body
838
+ use="encoded"
839
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
840
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
841
+ </output>
842
+ </operation>
843
+
844
+ <operation name="add_trusted_mac_address">
845
+ <documentation>
846
+ Adds the specified MAC addresses to the list of trusted MAC addresses.
847
+
848
+ </documentation>
849
+ <soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
850
+ <input>
851
+ <soap:body
852
+ use="encoded"
853
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
854
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
855
+ </input>
856
+ <output>
857
+ <soap:body
858
+ use="encoded"
859
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
860
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
861
+ </output>
862
+ </operation>
863
+
864
+ <operation name="remove_trusted_mac_address">
865
+ <documentation>
866
+ Removes the specified MAC addresses from the list of trusted MAC addresses.
867
+
868
+ </documentation>
869
+ <soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
870
+ <input>
871
+ <soap:body
872
+ use="encoded"
873
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
874
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
875
+ </input>
876
+ <output>
877
+ <soap:body
878
+ use="encoded"
879
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
880
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
881
+ </output>
882
+ </operation>
883
+
884
+ <operation name="get_version">
885
+ <documentation>
886
+ Gets the version information for this interface.
887
+
888
+ </documentation>
889
+ <soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
890
+ <input>
891
+ <soap:body
892
+ use="encoded"
893
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
894
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
895
+ </input>
896
+ <output>
897
+ <soap:body
898
+ use="encoded"
899
+ namespace="urn:iControl:Networking/PacketFilterGlobals"
900
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
901
+ </output>
902
+ </operation>
903
+ </binding>
904
+
905
+ <!-- service -->
906
+
907
+ <service name="Networking.PacketFilterGlobals">
908
+ <documentation>
909
+ The PacketFilterGlobals interface enables you to work with the
910
+ global lists of trusted source addresses and ingress VLANs used
911
+ in packet filtering, and allows you to view and modify other
912
+ overall packet filter settings.
913
+
914
+ Note: The system processes exemptions before packet filter
915
+ rules, so you cannot override such settings with a packet
916
+ filter rule. Attributes controlling exemptions include:
917
+ always_accept_arp, always_accept_important_icmp, and those
918
+ involving trusted VLANs, trusted addresses, and trusted MAC
919
+ addresses.
920
+
921
+ </documentation>
922
+ <port name="Networking.PacketFilterGlobalsPort" binding="tns:Networking.PacketFilterGlobalsBinding">
923
+ <soap:address location="https://url_to_service"/>
924
+ </port>
925
+ </service>
926
+ </definitions>