f5-icontrol 0.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- data/.gitignore +18 -0
- data/.travis.yml +5 -0
- data/Gemfile +4 -0
- data/LICENSE +9 -0
- data/LICENSE.txt +22 -0
- data/README.md +55 -0
- data/Rakefile +7 -0
- data/bin/f5 +6 -0
- data/f5-icontrol.gemspec +30 -0
- data/lib/f5/cli/application.rb +102 -0
- data/lib/f5/cli/config.rb +21 -0
- data/lib/f5/icontrol.rb +40 -0
- data/lib/f5/icontrol/local_lb/node_address_v2.rb +27 -0
- data/lib/f5/icontrol/local_lb/pool.rb +27 -0
- data/lib/f5/icontrol/system/system_info.rb +27 -0
- data/lib/f5/icontrol/version.rb +5 -0
- data/lib/wsdl/ASM.LoggingProfile.wsdl +1467 -0
- data/lib/wsdl/ASM.ObjectParams.wsdl +198 -0
- data/lib/wsdl/ASM.PSMProfile.wsdl +228 -0
- data/lib/wsdl/ASM.Policy.wsdl +3504 -0
- data/lib/wsdl/ASM.PolicyGroup.wsdl +389 -0
- data/lib/wsdl/ASM.SystemConfiguration.wsdl +730 -0
- data/lib/wsdl/ASM.WebApplication.wsdl +1138 -0
- data/lib/wsdl/ASM.WebApplicationGroup.wsdl +393 -0
- data/lib/wsdl/Classification.Application.wsdl +517 -0
- data/lib/wsdl/Classification.Category.wsdl +519 -0
- data/lib/wsdl/Classification.SignatureDefinition.wsdl +541 -0
- data/lib/wsdl/Classification.SignatureUpdateSchedule.wsdl +382 -0
- data/lib/wsdl/Classification.SignatureVersion.wsdl +233 -0
- data/lib/wsdl/GlobalLB.Application.wsdl +963 -0
- data/lib/wsdl/GlobalLB.DNSSECKey.wsdl +1642 -0
- data/lib/wsdl/GlobalLB.DNSSECZone.wsdl +825 -0
- data/lib/wsdl/GlobalLB.DataCenter.wsdl +7144 -0
- data/lib/wsdl/GlobalLB.Globals.wsdl +5513 -0
- data/lib/wsdl/GlobalLB.Link.wsdl +7654 -0
- data/lib/wsdl/GlobalLB.Monitor.wsdl +2228 -0
- data/lib/wsdl/GlobalLB.Pool.wsdl +9949 -0
- data/lib/wsdl/GlobalLB.PoolMember.wsdl +6939 -0
- data/lib/wsdl/GlobalLB.ProberPool.wsdl +7026 -0
- data/lib/wsdl/GlobalLB.Region.wsdl +560 -0
- data/lib/wsdl/GlobalLB.Rule.wsdl +6632 -0
- data/lib/wsdl/GlobalLB.Server.wsdl +8234 -0
- data/lib/wsdl/GlobalLB.Topology.wsdl +548 -0
- data/lib/wsdl/GlobalLB.VirtualServer.wsdl +6916 -0
- data/lib/wsdl/GlobalLB.VirtualServerV2.wsdl +7016 -0
- data/lib/wsdl/GlobalLB.WideIP.wsdl +8154 -0
- data/lib/wsdl/LTConfig.Class.wsdl +656 -0
- data/lib/wsdl/LTConfig.Field.wsdl +679 -0
- data/lib/wsdl/LocalLB.Class.wsdl +2153 -0
- data/lib/wsdl/LocalLB.DNSCache.wsdl +8380 -0
- data/lib/wsdl/LocalLB.DNSExpress.wsdl +6972 -0
- data/lib/wsdl/LocalLB.DNSGlobals.wsdl +457 -0
- data/lib/wsdl/LocalLB.DataGroupFile.wsdl +971 -0
- data/lib/wsdl/LocalLB.LSNPool.wsdl +7461 -0
- data/lib/wsdl/LocalLB.Monitor.wsdl +2214 -0
- data/lib/wsdl/LocalLB.NAT.wsdl +6413 -0
- data/lib/wsdl/LocalLB.NATV2.wsdl +6748 -0
- data/lib/wsdl/LocalLB.NodeAddress.wsdl +7143 -0
- data/lib/wsdl/LocalLB.NodeAddressV2.wsdl +7754 -0
- data/lib/wsdl/LocalLB.Pool.wsdl +11328 -0
- data/lib/wsdl/LocalLB.PoolMember.wsdl +7156 -0
- data/lib/wsdl/LocalLB.ProfileAnalytics.wsdl +5756 -0
- data/lib/wsdl/LocalLB.ProfileAuth.wsdl +6957 -0
- data/lib/wsdl/LocalLB.ProfileClassification.wsdl +370 -0
- data/lib/wsdl/LocalLB.ProfileClientSSL.wsdl +10232 -0
- data/lib/wsdl/LocalLB.ProfileDNS.wsdl +7723 -0
- data/lib/wsdl/LocalLB.ProfileDNSLogging.wsdl +852 -0
- data/lib/wsdl/LocalLB.ProfileDiameter.wsdl +8070 -0
- data/lib/wsdl/LocalLB.ProfileDiameterEndpoint.wsdl +7199 -0
- data/lib/wsdl/LocalLB.ProfileFTP.wsdl +6564 -0
- data/lib/wsdl/LocalLB.ProfileFastHttp.wsdl +7944 -0
- data/lib/wsdl/LocalLB.ProfileFastL4.wsdl +8235 -0
- data/lib/wsdl/LocalLB.ProfileHttp.wsdl +12256 -0
- data/lib/wsdl/LocalLB.ProfileHttpClass.wsdl +7414 -0
- data/lib/wsdl/LocalLB.ProfileHttpCompression.wsdl +8166 -0
- data/lib/wsdl/LocalLB.ProfileICAP.wsdl +6917 -0
- data/lib/wsdl/LocalLB.ProfileIIOP.wsdl +6726 -0
- data/lib/wsdl/LocalLB.ProfileOneConnect.wsdl +6784 -0
- data/lib/wsdl/LocalLB.ProfilePersistence.wsdl +2740 -0
- data/lib/wsdl/LocalLB.ProfileRADIUS.wsdl +6696 -0
- data/lib/wsdl/LocalLB.ProfileRTSP.wsdl +7424 -0
- data/lib/wsdl/LocalLB.ProfileRequestAdapt.wsdl +7041 -0
- data/lib/wsdl/LocalLB.ProfileRequestLogging.wsdl +2042 -0
- data/lib/wsdl/LocalLB.ProfileResponseAdapt.wsdl +7041 -0
- data/lib/wsdl/LocalLB.ProfileSCTP.wsdl +7887 -0
- data/lib/wsdl/LocalLB.ProfileSIP.wsdl +7866 -0
- data/lib/wsdl/LocalLB.ProfileSPDY.wsdl +7489 -0
- data/lib/wsdl/LocalLB.ProfileSPM.wsdl +953 -0
- data/lib/wsdl/LocalLB.ProfileServerSSL.wsdl +9566 -0
- data/lib/wsdl/LocalLB.ProfileStream.wsdl +6561 -0
- data/lib/wsdl/LocalLB.ProfileTCP.wsdl +9869 -0
- data/lib/wsdl/LocalLB.ProfileUDP.wsdl +6948 -0
- data/lib/wsdl/LocalLB.ProfileUserStatistic.wsdl +916 -0
- data/lib/wsdl/LocalLB.ProfileWebAcceleration.wsdl +8213 -0
- data/lib/wsdl/LocalLB.ProfileXML.wsdl +7022 -0
- data/lib/wsdl/LocalLB.RAMCacheInformation.wsdl +372 -0
- data/lib/wsdl/LocalLB.RateClass.wsdl +9480 -0
- data/lib/wsdl/LocalLB.Rule.wsdl +7033 -0
- data/lib/wsdl/LocalLB.SNAT.wsdl +7262 -0
- data/lib/wsdl/LocalLB.SNATPool.wsdl +6606 -0
- data/lib/wsdl/LocalLB.SNATPoolMember.wsdl +5960 -0
- data/lib/wsdl/LocalLB.SNATTranslationAddress.wsdl +6599 -0
- data/lib/wsdl/LocalLB.SNATTranslationAddressV2.wsdl +6760 -0
- data/lib/wsdl/LocalLB.VirtualAddress.wsdl +6676 -0
- data/lib/wsdl/LocalLB.VirtualAddressV2.wsdl +7539 -0
- data/lib/wsdl/LocalLB.VirtualServer.wsdl +14758 -0
- data/lib/wsdl/LocalLB.iFile.wsdl +302 -0
- data/lib/wsdl/LocalLB.iFileFile.wsdl +712 -0
- data/lib/wsdl/Log.DestinationArcSight.wsdl +377 -0
- data/lib/wsdl/Log.DestinationLocalSyslog.wsdl +469 -0
- data/lib/wsdl/Log.DestinationRemoteHighSpeedLog.wsdl +486 -0
- data/lib/wsdl/Log.DestinationRemoteSyslog.wsdl +751 -0
- data/lib/wsdl/Log.DestinationSplunk.wsdl +377 -0
- data/lib/wsdl/Log.Filter.wsdl +1175 -0
- data/lib/wsdl/Log.Publisher.wsdl +448 -0
- data/lib/wsdl/Management.ApplicationPresentationScript.wsdl +698 -0
- data/lib/wsdl/Management.ApplicationService.wsdl +1804 -0
- data/lib/wsdl/Management.ApplicationTemplate.wsdl +1323 -0
- data/lib/wsdl/Management.CCLDAPConfiguration.wsdl +1637 -0
- data/lib/wsdl/Management.CLIScript.wsdl +684 -0
- data/lib/wsdl/Management.CRLDPConfiguration.wsdl +763 -0
- data/lib/wsdl/Management.CRLDPServer.wsdl +626 -0
- data/lib/wsdl/Management.CertLDAPConfiguration.wsdl +2453 -0
- data/lib/wsdl/Management.ChangeControl.wsdl +735 -0
- data/lib/wsdl/Management.DBVariable.wsdl +352 -0
- data/lib/wsdl/Management.Device.wsdl +1697 -0
- data/lib/wsdl/Management.DeviceGroup.wsdl +1241 -0
- data/lib/wsdl/Management.EM.wsdl +456 -0
- data/lib/wsdl/Management.EventNotification.wsdl +1031 -0
- data/lib/wsdl/Management.EventSubscription.wsdl +1542 -0
- data/lib/wsdl/Management.FeatureModule.wsdl +424 -0
- data/lib/wsdl/Management.Folder.wsdl +635 -0
- data/lib/wsdl/Management.Globals.wsdl +166 -0
- data/lib/wsdl/Management.KeyCertificate.wsdl +2027 -0
- data/lib/wsdl/Management.LDAPConfiguration.wsdl +2645 -0
- data/lib/wsdl/Management.LicenseAdministration.wsdl +906 -0
- data/lib/wsdl/Management.Named.wsdl +740 -0
- data/lib/wsdl/Management.OCSPConfiguration.wsdl +447 -0
- data/lib/wsdl/Management.OCSPResponder.wsdl +2370 -0
- data/lib/wsdl/Management.Partition.wsdl +545 -0
- data/lib/wsdl/Management.Provision.wsdl +743 -0
- data/lib/wsdl/Management.RADIUSConfiguration.wsdl +951 -0
- data/lib/wsdl/Management.RADIUSServer.wsdl +602 -0
- data/lib/wsdl/Management.ResourceRecord.wsdl +2168 -0
- data/lib/wsdl/Management.SFlowDataSource.wsdl +776 -0
- data/lib/wsdl/Management.SFlowGlobals.wsdl +826 -0
- data/lib/wsdl/Management.SFlowReceiver.wsdl +694 -0
- data/lib/wsdl/Management.SMTPConfiguration.wsdl +854 -0
- data/lib/wsdl/Management.SNMPConfiguration.wsdl +4672 -0
- data/lib/wsdl/Management.TACACSConfiguration.wsdl +943 -0
- data/lib/wsdl/Management.TMOSModule.wsdl +309 -0
- data/lib/wsdl/Management.TrafficGroup.wsdl +953 -0
- data/lib/wsdl/Management.Trust.wsdl +703 -0
- data/lib/wsdl/Management.UserManagement.wsdl +1693 -0
- data/lib/wsdl/Management.View.wsdl +381 -0
- data/lib/wsdl/Management.Zone.wsdl +528 -0
- data/lib/wsdl/Management.ZoneRunner.wsdl +206 -0
- data/lib/wsdl/Networking.ARP.wsdl +776 -0
- data/lib/wsdl/Networking.AdminIP.wsdl +864 -0
- data/lib/wsdl/Networking.BWControllerPolicy.wsdl +1107 -0
- data/lib/wsdl/Networking.IPsecIkeDaemon.wsdl +368 -0
- data/lib/wsdl/Networking.IPsecIkePeer.wsdl +2701 -0
- data/lib/wsdl/Networking.IPsecManualSecurityAssociation.wsdl +1146 -0
- data/lib/wsdl/Networking.IPsecPolicy.wsdl +1380 -0
- data/lib/wsdl/Networking.IPsecTrafficSelector.wsdl +1104 -0
- data/lib/wsdl/Networking.Interfaces.wsdl +8359 -0
- data/lib/wsdl/Networking.LLDPGlobals.wsdl +590 -0
- data/lib/wsdl/Networking.PacketFilter.wsdl +6728 -0
- data/lib/wsdl/Networking.PacketFilterGlobals.wsdl +926 -0
- data/lib/wsdl/Networking.PortMirror.wsdl +373 -0
- data/lib/wsdl/Networking.ProfileFEC.wsdl +1350 -0
- data/lib/wsdl/Networking.ProfileGRE.wsdl +645 -0
- data/lib/wsdl/Networking.ProfileIPIP.wsdl +695 -0
- data/lib/wsdl/Networking.ProfileVXLAN.wsdl +563 -0
- data/lib/wsdl/Networking.ProfileWCCPGRE.wsdl +841 -0
- data/lib/wsdl/Networking.RouteDomain.wsdl +646 -0
- data/lib/wsdl/Networking.RouteDomainV2.wsdl +10056 -0
- data/lib/wsdl/Networking.RouteTable.wsdl +1209 -0
- data/lib/wsdl/Networking.RouteTableV2.wsdl +1531 -0
- data/lib/wsdl/Networking.RouterAdvertisement.wsdl +1067 -0
- data/lib/wsdl/Networking.STPGlobals.wsdl +796 -0
- data/lib/wsdl/Networking.STPInstance.wsdl +1147 -0
- data/lib/wsdl/Networking.STPInstanceV2.wsdl +1232 -0
- data/lib/wsdl/Networking.SelfIP.wsdl +557 -0
- data/lib/wsdl/Networking.SelfIPPortLockdown.wsdl +421 -0
- data/lib/wsdl/Networking.SelfIPV2.wsdl +10077 -0
- data/lib/wsdl/Networking.Trunk.wsdl +7133 -0
- data/lib/wsdl/Networking.Tunnel.wsdl +1354 -0
- data/lib/wsdl/Networking.VLAN.wsdl +2215 -0
- data/lib/wsdl/Networking.VLANGroup.wsdl +1441 -0
- data/lib/wsdl/Networking.iSessionAdvertisedRoute.wsdl +491 -0
- data/lib/wsdl/Networking.iSessionAdvertisedRouteV2.wsdl +619 -0
- data/lib/wsdl/Networking.iSessionDatastor.wsdl +459 -0
- data/lib/wsdl/Networking.iSessionDeduplication.wsdl +401 -0
- data/lib/wsdl/Networking.iSessionLocalInterface.wsdl +922 -0
- data/lib/wsdl/Networking.iSessionPeerDiscovery.wsdl +818 -0
- data/lib/wsdl/Networking.iSessionRemoteInterface.wsdl +1100 -0
- data/lib/wsdl/Networking.iSessionRemoteInterfaceV2.wsdl +1307 -0
- data/lib/wsdl/PEM.FormatScript.wsdl +542 -0
- data/lib/wsdl/PEM.ForwardingEndpoint.wsdl +849 -0
- data/lib/wsdl/PEM.InterceptionEndpoint.wsdl +414 -0
- data/lib/wsdl/PEM.Listener.wsdl +495 -0
- data/lib/wsdl/PEM.Policy.wsdl +4097 -0
- data/lib/wsdl/PEM.ServiceChainEndpoint.wsdl +762 -0
- data/lib/wsdl/PEM.Subscriber.wsdl +6527 -0
- data/lib/wsdl/Security.DoSDevice.wsdl +6670 -0
- data/lib/wsdl/Security.FirewallAddressList.wsdl +542 -0
- data/lib/wsdl/Security.FirewallGlobalAdminIPRuleList.wsdl +8891 -0
- data/lib/wsdl/Security.FirewallGlobalRuleList.wsdl +9171 -0
- data/lib/wsdl/Security.FirewallPolicy.wsdl +9355 -0
- data/lib/wsdl/Security.FirewallPortList.wsdl +544 -0
- data/lib/wsdl/Security.FirewallRuleList.wsdl +3360 -0
- data/lib/wsdl/Security.FirewallWeeklySchedule.wsdl +825 -0
- data/lib/wsdl/Security.LogProfile.wsdl +6927 -0
- data/lib/wsdl/Security.ProfileDNSSecurity.wsdl +6881 -0
- data/lib/wsdl/Security.ProfileDoS.wsdl +10389 -0
- data/lib/wsdl/Security.ProfileIPIntelligence.wsdl +7154 -0
- data/lib/wsdl/System.CertificateRevocationListFile.wsdl +840 -0
- data/lib/wsdl/System.Cluster.wsdl +956 -0
- data/lib/wsdl/System.ConfigSync.wsdl +1289 -0
- data/lib/wsdl/System.Connections.wsdl +497 -0
- data/lib/wsdl/System.Disk.wsdl +1442 -0
- data/lib/wsdl/System.ExternalMonitorFile.wsdl +834 -0
- data/lib/wsdl/System.Failover.wsdl +539 -0
- data/lib/wsdl/System.GeoIP.wsdl +181 -0
- data/lib/wsdl/System.HAGroup.wsdl +1983 -0
- data/lib/wsdl/System.HAStatus.wsdl +695 -0
- data/lib/wsdl/System.Inet.wsdl +438 -0
- data/lib/wsdl/System.Internal.wsdl +279 -0
- data/lib/wsdl/System.PerformanceSFlow.wsdl +722 -0
- data/lib/wsdl/System.Services.wsdl +1054 -0
- data/lib/wsdl/System.Session.wsdl +1023 -0
- data/lib/wsdl/System.SoftwareManagement.wsdl +1073 -0
- data/lib/wsdl/System.Statistics.wsdl +9469 -0
- data/lib/wsdl/System.SystemInfo.wsdl +7493 -0
- data/lib/wsdl/System.VCMP.wsdl +7766 -0
- data/lib/wsdl/WebAccelerator.Applications.wsdl +7765 -0
- data/lib/wsdl/WebAccelerator.Policies.wsdl +570 -0
- data/lib/wsdl/WebAccelerator.ProxyMessage.wsdl +157 -0
- data/lib/wsdl/iCall.PeriodicHandler.wsdl +751 -0
- data/lib/wsdl/iCall.PerpetualHandler.wsdl +1081 -0
- data/lib/wsdl/iCall.Script.wsdl +372 -0
- data/lib/wsdl/iCall.TriggeredHandler.wsdl +1071 -0
- data/metadata +323 -0
- data/spec/cassettes/F5_Icontrol_LocalLB_Pool/creates_a_pool.yml +49 -0
- data/spec/cassettes/F5_Icontrol_System_SystemInfo/retrieves_something_with_a_complex_return_type_and_input.yml +49 -0
- data/spec/cassettes/F5_Icontrol_System_SystemInfo/retrieves_the_uptime.yml +96 -0
- data/spec/cassettes/F5_Icontrol_System_SystemInfo/retrieves_the_version.yml +99 -0
- data/spec/models/local_lb/pool_spec.rb +26 -0
- data/spec/models/system/system_info_spec.rb +31 -0
- data/spec/spec_helper.rb +13 -0
- metadata +415 -0
@@ -0,0 +1,926 @@
|
|
1
|
+
<?xml version="1.0" ?>
|
2
|
+
<!--
|
3
|
+
Copyright (c) 1996-2013, F5 Networks, Inc., Seattle, Washington. All rights reserved.
|
4
|
+
|
5
|
+
F5, F5 Networks, the F5 logo, BIG-IP, 3-DNS, iControl, GLOBAL-SITE, SEE-IT, EDGE-FX, FireGuard, Internet Control Architecture, IP Application Switch, iRules, PACKET VELOCITY, SYN Check, CONTROL YOUR WORLD, OneConnect, ZoneRunner, uRoam, FirePass, and TrafficShield are registered trademarks or trademarks of F5 Networks, Inc., in the U.S. and certain other countries.
|
6
|
+
|
7
|
+
All other trademarks mentioned in this document are the property of their respective owners. F5 Networks' trademarks may not be used in connection with any product or service except as permitted in writing by F5.
|
8
|
+
|
9
|
+
-->
|
10
|
+
<definitions name="Networking.PacketFilterGlobals"
|
11
|
+
targetNamespace="urn:iControl"
|
12
|
+
xmlns:tns="urn:iControl"
|
13
|
+
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
|
14
|
+
xmlns:soap="http://schemas.xmlsoap.org/wsdl/soap/"
|
15
|
+
xmlns="http://schemas.xmlsoap.org/wsdl/">
|
16
|
+
|
17
|
+
<!-- types -->
|
18
|
+
|
19
|
+
<types>
|
20
|
+
<xsd:schema targetNamespace='urn:iControl'
|
21
|
+
xmlns='http://www.w3.org/2001/XMLSchema'
|
22
|
+
xmlns:SOAP-ENC='http://schemas.xmlsoap.org/soap/encoding/'
|
23
|
+
xmlns:wsdl='http://schemas.xmlsoap.org/wsdl/'>
|
24
|
+
<xsd:simpleType name="Common.EnabledState">
|
25
|
+
<xsd:restriction base="xsd:string">
|
26
|
+
<xsd:enumeration value="STATE_DISABLED">
|
27
|
+
<xsd:annotation>
|
28
|
+
<xsd:documentation>STATE_DISABLED</xsd:documentation>
|
29
|
+
</xsd:annotation>
|
30
|
+
</xsd:enumeration>
|
31
|
+
<xsd:enumeration value="STATE_ENABLED">
|
32
|
+
<xsd:annotation>
|
33
|
+
<xsd:documentation>STATE_ENABLED</xsd:documentation>
|
34
|
+
</xsd:annotation>
|
35
|
+
</xsd:enumeration>
|
36
|
+
</xsd:restriction>
|
37
|
+
</xsd:simpleType>
|
38
|
+
<xsd:complexType name="Common.StringSequence">
|
39
|
+
<xsd:complexContent>
|
40
|
+
<xsd:restriction base='SOAP-ENC:Array'>
|
41
|
+
<xsd:attribute ref='SOAP-ENC:arrayType' wsdl:arrayType='xsd:string[]'/>
|
42
|
+
</xsd:restriction>
|
43
|
+
</xsd:complexContent>
|
44
|
+
</xsd:complexType>
|
45
|
+
<xsd:simpleType name="Networking.PacketFilterGlobals.DefaultAction">
|
46
|
+
<xsd:restriction base="xsd:string">
|
47
|
+
<xsd:enumeration value="PACKET_FILTER_DEFAULT_ACTION_UNKNOWN">
|
48
|
+
<xsd:annotation>
|
49
|
+
<xsd:documentation>PACKET_FILTER_DEFAULT_ACTION_UNKNOWN</xsd:documentation>
|
50
|
+
</xsd:annotation>
|
51
|
+
</xsd:enumeration>
|
52
|
+
<xsd:enumeration value="PACKET_FILTER_DEFAULT_ACTION_ACCEPT">
|
53
|
+
<xsd:annotation>
|
54
|
+
<xsd:documentation>PACKET_FILTER_DEFAULT_ACTION_ACCEPT</xsd:documentation>
|
55
|
+
</xsd:annotation>
|
56
|
+
</xsd:enumeration>
|
57
|
+
<xsd:enumeration value="PACKET_FILTER_DEFAULT_ACTION_DISCARD">
|
58
|
+
<xsd:annotation>
|
59
|
+
<xsd:documentation>PACKET_FILTER_DEFAULT_ACTION_DISCARD</xsd:documentation>
|
60
|
+
</xsd:annotation>
|
61
|
+
</xsd:enumeration>
|
62
|
+
<xsd:enumeration value="PACKET_FILTER_DEFAULT_ACTION_REJECT">
|
63
|
+
<xsd:annotation>
|
64
|
+
<xsd:documentation>PACKET_FILTER_DEFAULT_ACTION_REJECT</xsd:documentation>
|
65
|
+
</xsd:annotation>
|
66
|
+
</xsd:enumeration>
|
67
|
+
</xsd:restriction>
|
68
|
+
</xsd:simpleType>
|
69
|
+
<xsd:complexType name="Common.IPAddressSequence">
|
70
|
+
<xsd:complexContent>
|
71
|
+
<xsd:restriction base='SOAP-ENC:Array'>
|
72
|
+
<xsd:attribute ref='SOAP-ENC:arrayType' wsdl:arrayType='xsd:string[]'/>
|
73
|
+
</xsd:restriction>
|
74
|
+
</xsd:complexContent>
|
75
|
+
</xsd:complexType>
|
76
|
+
</xsd:schema>
|
77
|
+
</types>
|
78
|
+
|
79
|
+
<!-- message -->
|
80
|
+
|
81
|
+
<message name="Networking.PacketFilterGlobals.set_packet_filter_stateRequest">
|
82
|
+
<part name="state" type="tns:Common.EnabledState"/>
|
83
|
+
</message>
|
84
|
+
<message name="Networking.PacketFilterGlobals.set_packet_filter_stateResponse">
|
85
|
+
</message>
|
86
|
+
|
87
|
+
<message name="Networking.PacketFilterGlobals.get_packet_filter_stateRequest">
|
88
|
+
</message>
|
89
|
+
<message name="Networking.PacketFilterGlobals.get_packet_filter_stateResponse">
|
90
|
+
<part name="return" type="tns:Common.EnabledState"/>
|
91
|
+
</message>
|
92
|
+
|
93
|
+
<message name="Networking.PacketFilterGlobals.set_filter_established_connections_stateRequest">
|
94
|
+
<part name="state" type="tns:Common.EnabledState"/>
|
95
|
+
</message>
|
96
|
+
<message name="Networking.PacketFilterGlobals.set_filter_established_connections_stateResponse">
|
97
|
+
</message>
|
98
|
+
|
99
|
+
<message name="Networking.PacketFilterGlobals.get_filter_established_connections_stateRequest">
|
100
|
+
</message>
|
101
|
+
<message name="Networking.PacketFilterGlobals.get_filter_established_connections_stateResponse">
|
102
|
+
<part name="return" type="tns:Common.EnabledState"/>
|
103
|
+
</message>
|
104
|
+
|
105
|
+
<message name="Networking.PacketFilterGlobals.set_send_icmp_error_on_packet_reject_stateRequest">
|
106
|
+
<part name="state" type="tns:Common.EnabledState"/>
|
107
|
+
</message>
|
108
|
+
<message name="Networking.PacketFilterGlobals.set_send_icmp_error_on_packet_reject_stateResponse">
|
109
|
+
</message>
|
110
|
+
|
111
|
+
<message name="Networking.PacketFilterGlobals.get_send_icmp_error_on_packet_reject_stateRequest">
|
112
|
+
</message>
|
113
|
+
<message name="Networking.PacketFilterGlobals.get_send_icmp_error_on_packet_reject_stateResponse">
|
114
|
+
<part name="return" type="tns:Common.EnabledState"/>
|
115
|
+
</message>
|
116
|
+
|
117
|
+
<message name="Networking.PacketFilterGlobals.set_always_accept_arp_stateRequest">
|
118
|
+
<part name="state" type="tns:Common.EnabledState"/>
|
119
|
+
</message>
|
120
|
+
<message name="Networking.PacketFilterGlobals.set_always_accept_arp_stateResponse">
|
121
|
+
</message>
|
122
|
+
|
123
|
+
<message name="Networking.PacketFilterGlobals.get_always_accept_arp_stateRequest">
|
124
|
+
</message>
|
125
|
+
<message name="Networking.PacketFilterGlobals.get_always_accept_arp_stateResponse">
|
126
|
+
<part name="return" type="tns:Common.EnabledState"/>
|
127
|
+
</message>
|
128
|
+
|
129
|
+
<message name="Networking.PacketFilterGlobals.set_always_accept_important_icmp_stateRequest">
|
130
|
+
<part name="state" type="tns:Common.EnabledState"/>
|
131
|
+
</message>
|
132
|
+
<message name="Networking.PacketFilterGlobals.set_always_accept_important_icmp_stateResponse">
|
133
|
+
</message>
|
134
|
+
|
135
|
+
<message name="Networking.PacketFilterGlobals.get_always_accept_important_icmp_stateRequest">
|
136
|
+
</message>
|
137
|
+
<message name="Networking.PacketFilterGlobals.get_always_accept_important_icmp_stateResponse">
|
138
|
+
<part name="return" type="tns:Common.EnabledState"/>
|
139
|
+
</message>
|
140
|
+
|
141
|
+
<message name="Networking.PacketFilterGlobals.set_default_actionRequest">
|
142
|
+
<part name="action" type="tns:Networking.PacketFilterGlobals.DefaultAction"/>
|
143
|
+
</message>
|
144
|
+
<message name="Networking.PacketFilterGlobals.set_default_actionResponse">
|
145
|
+
</message>
|
146
|
+
|
147
|
+
<message name="Networking.PacketFilterGlobals.get_default_actionRequest">
|
148
|
+
</message>
|
149
|
+
<message name="Networking.PacketFilterGlobals.get_default_actionResponse">
|
150
|
+
<part name="return" type="tns:Networking.PacketFilterGlobals.DefaultAction"/>
|
151
|
+
</message>
|
152
|
+
|
153
|
+
<message name="Networking.PacketFilterGlobals.get_trusted_vlanRequest">
|
154
|
+
</message>
|
155
|
+
<message name="Networking.PacketFilterGlobals.get_trusted_vlanResponse">
|
156
|
+
<part name="return" type="tns:Common.StringSequence"/>
|
157
|
+
</message>
|
158
|
+
|
159
|
+
<message name="Networking.PacketFilterGlobals.add_trusted_vlanRequest">
|
160
|
+
<part name="vlans" type="tns:Common.StringSequence"/>
|
161
|
+
</message>
|
162
|
+
<message name="Networking.PacketFilterGlobals.add_trusted_vlanResponse">
|
163
|
+
</message>
|
164
|
+
|
165
|
+
<message name="Networking.PacketFilterGlobals.remove_trusted_vlanRequest">
|
166
|
+
<part name="vlans" type="tns:Common.StringSequence"/>
|
167
|
+
</message>
|
168
|
+
<message name="Networking.PacketFilterGlobals.remove_trusted_vlanResponse">
|
169
|
+
</message>
|
170
|
+
|
171
|
+
<message name="Networking.PacketFilterGlobals.get_trusted_addressRequest">
|
172
|
+
</message>
|
173
|
+
<message name="Networking.PacketFilterGlobals.get_trusted_addressResponse">
|
174
|
+
<part name="return" type="tns:Common.IPAddressSequence"/>
|
175
|
+
</message>
|
176
|
+
|
177
|
+
<message name="Networking.PacketFilterGlobals.add_trusted_addressRequest">
|
178
|
+
<part name="addresses" type="tns:Common.IPAddressSequence"/>
|
179
|
+
</message>
|
180
|
+
<message name="Networking.PacketFilterGlobals.add_trusted_addressResponse">
|
181
|
+
</message>
|
182
|
+
|
183
|
+
<message name="Networking.PacketFilterGlobals.remove_trusted_addressRequest">
|
184
|
+
<part name="addresses" type="tns:Common.IPAddressSequence"/>
|
185
|
+
</message>
|
186
|
+
<message name="Networking.PacketFilterGlobals.remove_trusted_addressResponse">
|
187
|
+
</message>
|
188
|
+
|
189
|
+
<message name="Networking.PacketFilterGlobals.get_trusted_mac_addressRequest">
|
190
|
+
</message>
|
191
|
+
<message name="Networking.PacketFilterGlobals.get_trusted_mac_addressResponse">
|
192
|
+
<part name="return" type="tns:Common.StringSequence"/>
|
193
|
+
</message>
|
194
|
+
|
195
|
+
<message name="Networking.PacketFilterGlobals.add_trusted_mac_addressRequest">
|
196
|
+
<part name="mac_addresses" type="tns:Common.StringSequence"/>
|
197
|
+
</message>
|
198
|
+
<message name="Networking.PacketFilterGlobals.add_trusted_mac_addressResponse">
|
199
|
+
</message>
|
200
|
+
|
201
|
+
<message name="Networking.PacketFilterGlobals.remove_trusted_mac_addressRequest">
|
202
|
+
<part name="mac_addresses" type="tns:Common.StringSequence"/>
|
203
|
+
</message>
|
204
|
+
<message name="Networking.PacketFilterGlobals.remove_trusted_mac_addressResponse">
|
205
|
+
</message>
|
206
|
+
|
207
|
+
<message name="Networking.PacketFilterGlobals.get_versionRequest">
|
208
|
+
</message>
|
209
|
+
<message name="Networking.PacketFilterGlobals.get_versionResponse">
|
210
|
+
<part name="return" type="xsd:string"/>
|
211
|
+
</message>
|
212
|
+
|
213
|
+
<!-- portType -->
|
214
|
+
|
215
|
+
<portType name="Networking.PacketFilterGlobalsPortType">
|
216
|
+
<operation name="set_packet_filter_state">
|
217
|
+
<documentation>
|
218
|
+
Sets the state indicating whether packet filtering is
|
219
|
+
enabled or disabled. The default is disabled.
|
220
|
+
|
221
|
+
If enabled, the system filters incoming packets, and
|
222
|
+
directs traffic based on the criteria you specify, both in
|
223
|
+
the packet filter globals and in the packet filter rules.
|
224
|
+
|
225
|
+
</documentation>
|
226
|
+
<input message="tns:Networking.PacketFilterGlobals.set_packet_filter_stateRequest"/>
|
227
|
+
<output message="tns:Networking.PacketFilterGlobals.set_packet_filter_stateResponse"/>
|
228
|
+
</operation>
|
229
|
+
<operation name="get_packet_filter_state">
|
230
|
+
<documentation>
|
231
|
+
Gets the state indicating whether packet filtering is
|
232
|
+
enabled or disabled.
|
233
|
+
|
234
|
+
</documentation>
|
235
|
+
<input message="tns:Networking.PacketFilterGlobals.get_packet_filter_stateRequest"/>
|
236
|
+
<output message="tns:Networking.PacketFilterGlobals.get_packet_filter_stateResponse"/>
|
237
|
+
</operation>
|
238
|
+
<operation name="set_filter_established_connections_state">
|
239
|
+
<documentation>
|
240
|
+
Sets the state indicating whether the system should filter
|
241
|
+
all ingress packets, even if the packets are part of an
|
242
|
+
existing connection. The default is disabled (unchecked).
|
243
|
+
|
244
|
+
</documentation>
|
245
|
+
<input message="tns:Networking.PacketFilterGlobals.set_filter_established_connections_stateRequest"/>
|
246
|
+
<output message="tns:Networking.PacketFilterGlobals.set_filter_established_connections_stateResponse"/>
|
247
|
+
</operation>
|
248
|
+
<operation name="get_filter_established_connections_state">
|
249
|
+
<documentation>
|
250
|
+
Gets the state indicating whether the system should filter
|
251
|
+
all ingress packets, even if the packets are part of an
|
252
|
+
existing connection.
|
253
|
+
|
254
|
+
</documentation>
|
255
|
+
<input message="tns:Networking.PacketFilterGlobals.get_filter_established_connections_stateRequest"/>
|
256
|
+
<output message="tns:Networking.PacketFilterGlobals.get_filter_established_connections_stateResponse"/>
|
257
|
+
</operation>
|
258
|
+
<operation name="set_send_icmp_error_on_packet_reject_state">
|
259
|
+
<documentation>
|
260
|
+
Sets the state indicating whether the system should send an
|
261
|
+
ICMP type 3 (destination unreachable), code 13
|
262
|
+
(administratively prohibited) packet when an ingress packet
|
263
|
+
is rejected.
|
264
|
+
|
265
|
+
When disabled, the system sends an ICMP reject
|
266
|
+
packet that is protocol-dependent. The default is disabled.
|
267
|
+
|
268
|
+
</documentation>
|
269
|
+
<input message="tns:Networking.PacketFilterGlobals.set_send_icmp_error_on_packet_reject_stateRequest"/>
|
270
|
+
<output message="tns:Networking.PacketFilterGlobals.set_send_icmp_error_on_packet_reject_stateResponse"/>
|
271
|
+
</operation>
|
272
|
+
<operation name="get_send_icmp_error_on_packet_reject_state">
|
273
|
+
<documentation>
|
274
|
+
Gets the state indicating whether the system should send an
|
275
|
+
ICMP type 3 (destination unreachable), code 13
|
276
|
+
(administratively prohibited) packet when an ingress packet
|
277
|
+
is rejected.
|
278
|
+
|
279
|
+
</documentation>
|
280
|
+
<input message="tns:Networking.PacketFilterGlobals.get_send_icmp_error_on_packet_reject_stateRequest"/>
|
281
|
+
<output message="tns:Networking.PacketFilterGlobals.get_send_icmp_error_on_packet_reject_stateResponse"/>
|
282
|
+
</operation>
|
283
|
+
<operation name="set_always_accept_arp_state">
|
284
|
+
<documentation>
|
285
|
+
Sets the state indicating whether the system automatically
|
286
|
+
accepts ARP packets. The default is enabled.
|
287
|
+
|
288
|
+
</documentation>
|
289
|
+
<input message="tns:Networking.PacketFilterGlobals.set_always_accept_arp_stateRequest"/>
|
290
|
+
<output message="tns:Networking.PacketFilterGlobals.set_always_accept_arp_stateResponse"/>
|
291
|
+
</operation>
|
292
|
+
<operation name="get_always_accept_arp_state">
|
293
|
+
<documentation>
|
294
|
+
Gets the state indicating whether the system automatically
|
295
|
+
accepts ARP packets.
|
296
|
+
|
297
|
+
</documentation>
|
298
|
+
<input message="tns:Networking.PacketFilterGlobals.get_always_accept_arp_stateRequest"/>
|
299
|
+
<output message="tns:Networking.PacketFilterGlobals.get_always_accept_arp_stateResponse"/>
|
300
|
+
</operation>
|
301
|
+
<operation name="set_always_accept_important_icmp_state">
|
302
|
+
<documentation>
|
303
|
+
Sets the state indicating whether the system automatically
|
304
|
+
accepts the following ICMP packet types: UNREACH,
|
305
|
+
SOURCEQUENCH, REDIRECT, TIMEXCEED. The default is enabled.
|
306
|
+
|
307
|
+
</documentation>
|
308
|
+
<input message="tns:Networking.PacketFilterGlobals.set_always_accept_important_icmp_stateRequest"/>
|
309
|
+
<output message="tns:Networking.PacketFilterGlobals.set_always_accept_important_icmp_stateResponse"/>
|
310
|
+
</operation>
|
311
|
+
<operation name="get_always_accept_important_icmp_state">
|
312
|
+
<documentation>
|
313
|
+
Gets the state indicating whether the system automatically
|
314
|
+
accepts the following ICMP packet types: UNREACH,
|
315
|
+
SOURCEQUENCH, REDIRECT, TIMEXCEED.
|
316
|
+
|
317
|
+
</documentation>
|
318
|
+
<input message="tns:Networking.PacketFilterGlobals.get_always_accept_important_icmp_stateRequest"/>
|
319
|
+
<output message="tns:Networking.PacketFilterGlobals.get_always_accept_important_icmp_stateResponse"/>
|
320
|
+
</operation>
|
321
|
+
<operation name="set_default_action">
|
322
|
+
<documentation>
|
323
|
+
Sets the action to take for packets that do not match the
|
324
|
+
criteria specified in any of the packet filter rules. The
|
325
|
+
default is accept. Note that you can effectively stop all
|
326
|
+
traffic to the system if you select either discard or
|
327
|
+
reject, and you do not configure additional packet filter
|
328
|
+
rules to accept management or other acceptable traffic. We
|
329
|
+
recommend that you leave this setting at the default value,
|
330
|
+
accept.
|
331
|
+
|
332
|
+
</documentation>
|
333
|
+
<input message="tns:Networking.PacketFilterGlobals.set_default_actionRequest"/>
|
334
|
+
<output message="tns:Networking.PacketFilterGlobals.set_default_actionResponse"/>
|
335
|
+
</operation>
|
336
|
+
<operation name="get_default_action">
|
337
|
+
<documentation>
|
338
|
+
Gets the action to take for packets that do not match the
|
339
|
+
criteria specified in any of the packet filter rules.
|
340
|
+
|
341
|
+
</documentation>
|
342
|
+
<input message="tns:Networking.PacketFilterGlobals.get_default_actionRequest"/>
|
343
|
+
<output message="tns:Networking.PacketFilterGlobals.get_default_actionResponse"/>
|
344
|
+
</operation>
|
345
|
+
<operation name="get_trusted_vlan">
|
346
|
+
<documentation>
|
347
|
+
Gets a list of all trusted ingress VLANs used in packet filtering on this device.
|
348
|
+
|
349
|
+
</documentation>
|
350
|
+
<input message="tns:Networking.PacketFilterGlobals.get_trusted_vlanRequest"/>
|
351
|
+
<output message="tns:Networking.PacketFilterGlobals.get_trusted_vlanResponse"/>
|
352
|
+
</operation>
|
353
|
+
<operation name="add_trusted_vlan">
|
354
|
+
<documentation>
|
355
|
+
Adds the specified ingress VLANs to the list of trusted VLANs.
|
356
|
+
|
357
|
+
</documentation>
|
358
|
+
<input message="tns:Networking.PacketFilterGlobals.add_trusted_vlanRequest"/>
|
359
|
+
<output message="tns:Networking.PacketFilterGlobals.add_trusted_vlanResponse"/>
|
360
|
+
</operation>
|
361
|
+
<operation name="remove_trusted_vlan">
|
362
|
+
<documentation>
|
363
|
+
Removes the specified ingress VLANs from the list of trusted VLANs.
|
364
|
+
|
365
|
+
</documentation>
|
366
|
+
<input message="tns:Networking.PacketFilterGlobals.remove_trusted_vlanRequest"/>
|
367
|
+
<output message="tns:Networking.PacketFilterGlobals.remove_trusted_vlanResponse"/>
|
368
|
+
</operation>
|
369
|
+
<operation name="get_trusted_address">
|
370
|
+
<documentation>
|
371
|
+
Gets a list of all trusted source addresses used in packet filtering on this device.
|
372
|
+
|
373
|
+
</documentation>
|
374
|
+
<input message="tns:Networking.PacketFilterGlobals.get_trusted_addressRequest"/>
|
375
|
+
<output message="tns:Networking.PacketFilterGlobals.get_trusted_addressResponse"/>
|
376
|
+
</operation>
|
377
|
+
<operation name="add_trusted_address">
|
378
|
+
<documentation>
|
379
|
+
Adds the specified addresses to the list of trusted source addresses.
|
380
|
+
|
381
|
+
</documentation>
|
382
|
+
<input message="tns:Networking.PacketFilterGlobals.add_trusted_addressRequest"/>
|
383
|
+
<output message="tns:Networking.PacketFilterGlobals.add_trusted_addressResponse"/>
|
384
|
+
</operation>
|
385
|
+
<operation name="remove_trusted_address">
|
386
|
+
<documentation>
|
387
|
+
Removes the specified addresses from the list of trusted source addresses.
|
388
|
+
|
389
|
+
</documentation>
|
390
|
+
<input message="tns:Networking.PacketFilterGlobals.remove_trusted_addressRequest"/>
|
391
|
+
<output message="tns:Networking.PacketFilterGlobals.remove_trusted_addressResponse"/>
|
392
|
+
</operation>
|
393
|
+
<operation name="get_trusted_mac_address">
|
394
|
+
<documentation>
|
395
|
+
Gets a list of all trusted MAC addresses used in packet filtering on this device.
|
396
|
+
|
397
|
+
</documentation>
|
398
|
+
<input message="tns:Networking.PacketFilterGlobals.get_trusted_mac_addressRequest"/>
|
399
|
+
<output message="tns:Networking.PacketFilterGlobals.get_trusted_mac_addressResponse"/>
|
400
|
+
</operation>
|
401
|
+
<operation name="add_trusted_mac_address">
|
402
|
+
<documentation>
|
403
|
+
Adds the specified MAC addresses to the list of trusted MAC addresses.
|
404
|
+
|
405
|
+
</documentation>
|
406
|
+
<input message="tns:Networking.PacketFilterGlobals.add_trusted_mac_addressRequest"/>
|
407
|
+
<output message="tns:Networking.PacketFilterGlobals.add_trusted_mac_addressResponse"/>
|
408
|
+
</operation>
|
409
|
+
<operation name="remove_trusted_mac_address">
|
410
|
+
<documentation>
|
411
|
+
Removes the specified MAC addresses from the list of trusted MAC addresses.
|
412
|
+
|
413
|
+
</documentation>
|
414
|
+
<input message="tns:Networking.PacketFilterGlobals.remove_trusted_mac_addressRequest"/>
|
415
|
+
<output message="tns:Networking.PacketFilterGlobals.remove_trusted_mac_addressResponse"/>
|
416
|
+
</operation>
|
417
|
+
<operation name="get_version">
|
418
|
+
<documentation>
|
419
|
+
Gets the version information for this interface.
|
420
|
+
|
421
|
+
</documentation>
|
422
|
+
<input message="tns:Networking.PacketFilterGlobals.get_versionRequest"/>
|
423
|
+
<output message="tns:Networking.PacketFilterGlobals.get_versionResponse"/>
|
424
|
+
</operation>
|
425
|
+
</portType>
|
426
|
+
|
427
|
+
<!-- binding -->
|
428
|
+
|
429
|
+
<binding name="Networking.PacketFilterGlobalsBinding" type="tns:Networking.PacketFilterGlobalsPortType">
|
430
|
+
<soap:binding style="rpc" transport="http://schemas.xmlsoap.org/soap/http"/>
|
431
|
+
<operation name="set_packet_filter_state">
|
432
|
+
<documentation>
|
433
|
+
Sets the state indicating whether packet filtering is
|
434
|
+
enabled or disabled. The default is disabled.
|
435
|
+
|
436
|
+
If enabled, the system filters incoming packets, and
|
437
|
+
directs traffic based on the criteria you specify, both in
|
438
|
+
the packet filter globals and in the packet filter rules.
|
439
|
+
|
440
|
+
</documentation>
|
441
|
+
<soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
|
442
|
+
<input>
|
443
|
+
<soap:body
|
444
|
+
use="encoded"
|
445
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
446
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
447
|
+
</input>
|
448
|
+
<output>
|
449
|
+
<soap:body
|
450
|
+
use="encoded"
|
451
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
452
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
453
|
+
</output>
|
454
|
+
</operation>
|
455
|
+
|
456
|
+
<operation name="get_packet_filter_state">
|
457
|
+
<documentation>
|
458
|
+
Gets the state indicating whether packet filtering is
|
459
|
+
enabled or disabled.
|
460
|
+
|
461
|
+
</documentation>
|
462
|
+
<soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
|
463
|
+
<input>
|
464
|
+
<soap:body
|
465
|
+
use="encoded"
|
466
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
467
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
468
|
+
</input>
|
469
|
+
<output>
|
470
|
+
<soap:body
|
471
|
+
use="encoded"
|
472
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
473
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
474
|
+
</output>
|
475
|
+
</operation>
|
476
|
+
|
477
|
+
<operation name="set_filter_established_connections_state">
|
478
|
+
<documentation>
|
479
|
+
Sets the state indicating whether the system should filter
|
480
|
+
all ingress packets, even if the packets are part of an
|
481
|
+
existing connection. The default is disabled (unchecked).
|
482
|
+
|
483
|
+
</documentation>
|
484
|
+
<soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
|
485
|
+
<input>
|
486
|
+
<soap:body
|
487
|
+
use="encoded"
|
488
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
489
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
490
|
+
</input>
|
491
|
+
<output>
|
492
|
+
<soap:body
|
493
|
+
use="encoded"
|
494
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
495
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
496
|
+
</output>
|
497
|
+
</operation>
|
498
|
+
|
499
|
+
<operation name="get_filter_established_connections_state">
|
500
|
+
<documentation>
|
501
|
+
Gets the state indicating whether the system should filter
|
502
|
+
all ingress packets, even if the packets are part of an
|
503
|
+
existing connection.
|
504
|
+
|
505
|
+
</documentation>
|
506
|
+
<soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
|
507
|
+
<input>
|
508
|
+
<soap:body
|
509
|
+
use="encoded"
|
510
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
511
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
512
|
+
</input>
|
513
|
+
<output>
|
514
|
+
<soap:body
|
515
|
+
use="encoded"
|
516
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
517
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
518
|
+
</output>
|
519
|
+
</operation>
|
520
|
+
|
521
|
+
<operation name="set_send_icmp_error_on_packet_reject_state">
|
522
|
+
<documentation>
|
523
|
+
Sets the state indicating whether the system should send an
|
524
|
+
ICMP type 3 (destination unreachable), code 13
|
525
|
+
(administratively prohibited) packet when an ingress packet
|
526
|
+
is rejected.
|
527
|
+
|
528
|
+
When disabled, the system sends an ICMP reject
|
529
|
+
packet that is protocol-dependent. The default is disabled.
|
530
|
+
|
531
|
+
</documentation>
|
532
|
+
<soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
|
533
|
+
<input>
|
534
|
+
<soap:body
|
535
|
+
use="encoded"
|
536
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
537
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
538
|
+
</input>
|
539
|
+
<output>
|
540
|
+
<soap:body
|
541
|
+
use="encoded"
|
542
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
543
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
544
|
+
</output>
|
545
|
+
</operation>
|
546
|
+
|
547
|
+
<operation name="get_send_icmp_error_on_packet_reject_state">
|
548
|
+
<documentation>
|
549
|
+
Gets the state indicating whether the system should send an
|
550
|
+
ICMP type 3 (destination unreachable), code 13
|
551
|
+
(administratively prohibited) packet when an ingress packet
|
552
|
+
is rejected.
|
553
|
+
|
554
|
+
</documentation>
|
555
|
+
<soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
|
556
|
+
<input>
|
557
|
+
<soap:body
|
558
|
+
use="encoded"
|
559
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
560
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
561
|
+
</input>
|
562
|
+
<output>
|
563
|
+
<soap:body
|
564
|
+
use="encoded"
|
565
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
566
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
567
|
+
</output>
|
568
|
+
</operation>
|
569
|
+
|
570
|
+
<operation name="set_always_accept_arp_state">
|
571
|
+
<documentation>
|
572
|
+
Sets the state indicating whether the system automatically
|
573
|
+
accepts ARP packets. The default is enabled.
|
574
|
+
|
575
|
+
</documentation>
|
576
|
+
<soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
|
577
|
+
<input>
|
578
|
+
<soap:body
|
579
|
+
use="encoded"
|
580
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
581
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
582
|
+
</input>
|
583
|
+
<output>
|
584
|
+
<soap:body
|
585
|
+
use="encoded"
|
586
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
587
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
588
|
+
</output>
|
589
|
+
</operation>
|
590
|
+
|
591
|
+
<operation name="get_always_accept_arp_state">
|
592
|
+
<documentation>
|
593
|
+
Gets the state indicating whether the system automatically
|
594
|
+
accepts ARP packets.
|
595
|
+
|
596
|
+
</documentation>
|
597
|
+
<soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
|
598
|
+
<input>
|
599
|
+
<soap:body
|
600
|
+
use="encoded"
|
601
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
602
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
603
|
+
</input>
|
604
|
+
<output>
|
605
|
+
<soap:body
|
606
|
+
use="encoded"
|
607
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
608
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
609
|
+
</output>
|
610
|
+
</operation>
|
611
|
+
|
612
|
+
<operation name="set_always_accept_important_icmp_state">
|
613
|
+
<documentation>
|
614
|
+
Sets the state indicating whether the system automatically
|
615
|
+
accepts the following ICMP packet types: UNREACH,
|
616
|
+
SOURCEQUENCH, REDIRECT, TIMEXCEED. The default is enabled.
|
617
|
+
|
618
|
+
</documentation>
|
619
|
+
<soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
|
620
|
+
<input>
|
621
|
+
<soap:body
|
622
|
+
use="encoded"
|
623
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
624
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
625
|
+
</input>
|
626
|
+
<output>
|
627
|
+
<soap:body
|
628
|
+
use="encoded"
|
629
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
630
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
631
|
+
</output>
|
632
|
+
</operation>
|
633
|
+
|
634
|
+
<operation name="get_always_accept_important_icmp_state">
|
635
|
+
<documentation>
|
636
|
+
Gets the state indicating whether the system automatically
|
637
|
+
accepts the following ICMP packet types: UNREACH,
|
638
|
+
SOURCEQUENCH, REDIRECT, TIMEXCEED.
|
639
|
+
|
640
|
+
</documentation>
|
641
|
+
<soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
|
642
|
+
<input>
|
643
|
+
<soap:body
|
644
|
+
use="encoded"
|
645
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
646
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
647
|
+
</input>
|
648
|
+
<output>
|
649
|
+
<soap:body
|
650
|
+
use="encoded"
|
651
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
652
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
653
|
+
</output>
|
654
|
+
</operation>
|
655
|
+
|
656
|
+
<operation name="set_default_action">
|
657
|
+
<documentation>
|
658
|
+
Sets the action to take for packets that do not match the
|
659
|
+
criteria specified in any of the packet filter rules. The
|
660
|
+
default is accept. Note that you can effectively stop all
|
661
|
+
traffic to the system if you select either discard or
|
662
|
+
reject, and you do not configure additional packet filter
|
663
|
+
rules to accept management or other acceptable traffic. We
|
664
|
+
recommend that you leave this setting at the default value,
|
665
|
+
accept.
|
666
|
+
|
667
|
+
</documentation>
|
668
|
+
<soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
|
669
|
+
<input>
|
670
|
+
<soap:body
|
671
|
+
use="encoded"
|
672
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
673
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
674
|
+
</input>
|
675
|
+
<output>
|
676
|
+
<soap:body
|
677
|
+
use="encoded"
|
678
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
679
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
680
|
+
</output>
|
681
|
+
</operation>
|
682
|
+
|
683
|
+
<operation name="get_default_action">
|
684
|
+
<documentation>
|
685
|
+
Gets the action to take for packets that do not match the
|
686
|
+
criteria specified in any of the packet filter rules.
|
687
|
+
|
688
|
+
</documentation>
|
689
|
+
<soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
|
690
|
+
<input>
|
691
|
+
<soap:body
|
692
|
+
use="encoded"
|
693
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
694
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
695
|
+
</input>
|
696
|
+
<output>
|
697
|
+
<soap:body
|
698
|
+
use="encoded"
|
699
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
700
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
701
|
+
</output>
|
702
|
+
</operation>
|
703
|
+
|
704
|
+
<operation name="get_trusted_vlan">
|
705
|
+
<documentation>
|
706
|
+
Gets a list of all trusted ingress VLANs used in packet filtering on this device.
|
707
|
+
|
708
|
+
</documentation>
|
709
|
+
<soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
|
710
|
+
<input>
|
711
|
+
<soap:body
|
712
|
+
use="encoded"
|
713
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
714
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
715
|
+
</input>
|
716
|
+
<output>
|
717
|
+
<soap:body
|
718
|
+
use="encoded"
|
719
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
720
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
721
|
+
</output>
|
722
|
+
</operation>
|
723
|
+
|
724
|
+
<operation name="add_trusted_vlan">
|
725
|
+
<documentation>
|
726
|
+
Adds the specified ingress VLANs to the list of trusted VLANs.
|
727
|
+
|
728
|
+
</documentation>
|
729
|
+
<soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
|
730
|
+
<input>
|
731
|
+
<soap:body
|
732
|
+
use="encoded"
|
733
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
734
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
735
|
+
</input>
|
736
|
+
<output>
|
737
|
+
<soap:body
|
738
|
+
use="encoded"
|
739
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
740
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
741
|
+
</output>
|
742
|
+
</operation>
|
743
|
+
|
744
|
+
<operation name="remove_trusted_vlan">
|
745
|
+
<documentation>
|
746
|
+
Removes the specified ingress VLANs from the list of trusted VLANs.
|
747
|
+
|
748
|
+
</documentation>
|
749
|
+
<soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
|
750
|
+
<input>
|
751
|
+
<soap:body
|
752
|
+
use="encoded"
|
753
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
754
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
755
|
+
</input>
|
756
|
+
<output>
|
757
|
+
<soap:body
|
758
|
+
use="encoded"
|
759
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
760
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
761
|
+
</output>
|
762
|
+
</operation>
|
763
|
+
|
764
|
+
<operation name="get_trusted_address">
|
765
|
+
<documentation>
|
766
|
+
Gets a list of all trusted source addresses used in packet filtering on this device.
|
767
|
+
|
768
|
+
</documentation>
|
769
|
+
<soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
|
770
|
+
<input>
|
771
|
+
<soap:body
|
772
|
+
use="encoded"
|
773
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
774
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
775
|
+
</input>
|
776
|
+
<output>
|
777
|
+
<soap:body
|
778
|
+
use="encoded"
|
779
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
780
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
781
|
+
</output>
|
782
|
+
</operation>
|
783
|
+
|
784
|
+
<operation name="add_trusted_address">
|
785
|
+
<documentation>
|
786
|
+
Adds the specified addresses to the list of trusted source addresses.
|
787
|
+
|
788
|
+
</documentation>
|
789
|
+
<soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
|
790
|
+
<input>
|
791
|
+
<soap:body
|
792
|
+
use="encoded"
|
793
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
794
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
795
|
+
</input>
|
796
|
+
<output>
|
797
|
+
<soap:body
|
798
|
+
use="encoded"
|
799
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
800
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
801
|
+
</output>
|
802
|
+
</operation>
|
803
|
+
|
804
|
+
<operation name="remove_trusted_address">
|
805
|
+
<documentation>
|
806
|
+
Removes the specified addresses from the list of trusted source addresses.
|
807
|
+
|
808
|
+
</documentation>
|
809
|
+
<soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
|
810
|
+
<input>
|
811
|
+
<soap:body
|
812
|
+
use="encoded"
|
813
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
814
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
815
|
+
</input>
|
816
|
+
<output>
|
817
|
+
<soap:body
|
818
|
+
use="encoded"
|
819
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
820
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
821
|
+
</output>
|
822
|
+
</operation>
|
823
|
+
|
824
|
+
<operation name="get_trusted_mac_address">
|
825
|
+
<documentation>
|
826
|
+
Gets a list of all trusted MAC addresses used in packet filtering on this device.
|
827
|
+
|
828
|
+
</documentation>
|
829
|
+
<soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
|
830
|
+
<input>
|
831
|
+
<soap:body
|
832
|
+
use="encoded"
|
833
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
834
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
835
|
+
</input>
|
836
|
+
<output>
|
837
|
+
<soap:body
|
838
|
+
use="encoded"
|
839
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
840
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
841
|
+
</output>
|
842
|
+
</operation>
|
843
|
+
|
844
|
+
<operation name="add_trusted_mac_address">
|
845
|
+
<documentation>
|
846
|
+
Adds the specified MAC addresses to the list of trusted MAC addresses.
|
847
|
+
|
848
|
+
</documentation>
|
849
|
+
<soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
|
850
|
+
<input>
|
851
|
+
<soap:body
|
852
|
+
use="encoded"
|
853
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
854
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
855
|
+
</input>
|
856
|
+
<output>
|
857
|
+
<soap:body
|
858
|
+
use="encoded"
|
859
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
860
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
861
|
+
</output>
|
862
|
+
</operation>
|
863
|
+
|
864
|
+
<operation name="remove_trusted_mac_address">
|
865
|
+
<documentation>
|
866
|
+
Removes the specified MAC addresses from the list of trusted MAC addresses.
|
867
|
+
|
868
|
+
</documentation>
|
869
|
+
<soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
|
870
|
+
<input>
|
871
|
+
<soap:body
|
872
|
+
use="encoded"
|
873
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
874
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
875
|
+
</input>
|
876
|
+
<output>
|
877
|
+
<soap:body
|
878
|
+
use="encoded"
|
879
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
880
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
881
|
+
</output>
|
882
|
+
</operation>
|
883
|
+
|
884
|
+
<operation name="get_version">
|
885
|
+
<documentation>
|
886
|
+
Gets the version information for this interface.
|
887
|
+
|
888
|
+
</documentation>
|
889
|
+
<soap:operation soapAction="urn:iControl:Networking/PacketFilterGlobals"/>
|
890
|
+
<input>
|
891
|
+
<soap:body
|
892
|
+
use="encoded"
|
893
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
894
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
895
|
+
</input>
|
896
|
+
<output>
|
897
|
+
<soap:body
|
898
|
+
use="encoded"
|
899
|
+
namespace="urn:iControl:Networking/PacketFilterGlobals"
|
900
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
901
|
+
</output>
|
902
|
+
</operation>
|
903
|
+
</binding>
|
904
|
+
|
905
|
+
<!-- service -->
|
906
|
+
|
907
|
+
<service name="Networking.PacketFilterGlobals">
|
908
|
+
<documentation>
|
909
|
+
The PacketFilterGlobals interface enables you to work with the
|
910
|
+
global lists of trusted source addresses and ingress VLANs used
|
911
|
+
in packet filtering, and allows you to view and modify other
|
912
|
+
overall packet filter settings.
|
913
|
+
|
914
|
+
Note: The system processes exemptions before packet filter
|
915
|
+
rules, so you cannot override such settings with a packet
|
916
|
+
filter rule. Attributes controlling exemptions include:
|
917
|
+
always_accept_arp, always_accept_important_icmp, and those
|
918
|
+
involving trusted VLANs, trusted addresses, and trusted MAC
|
919
|
+
addresses.
|
920
|
+
|
921
|
+
</documentation>
|
922
|
+
<port name="Networking.PacketFilterGlobalsPort" binding="tns:Networking.PacketFilterGlobalsBinding">
|
923
|
+
<soap:address location="https://url_to_service"/>
|
924
|
+
</port>
|
925
|
+
</service>
|
926
|
+
</definitions>
|