f5-icontrol 0.1.6 → 0.2.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (277) hide show
  1. checksums.yaml +4 -4
  2. data/CHANGELOG.md +3 -0
  3. data/README.md +0 -3
  4. data/lib/f5/icontrol/api.rb +1 -1
  5. data/lib/f5/icontrol/version.rb +1 -1
  6. data/lib/wsdl/ASM.LoggingProfile.wsdl +1 -1
  7. data/lib/wsdl/ASM.ObjectParams.wsdl +1 -1
  8. data/lib/wsdl/ASM.PSMProfile.wsdl +1 -1
  9. data/lib/wsdl/ASM.Policy.wsdl +106 -1
  10. data/lib/wsdl/ASM.PolicyGroup.wsdl +1 -1
  11. data/lib/wsdl/ASM.SystemConfiguration.wsdl +66 -1
  12. data/lib/wsdl/ASM.WebApplication.wsdl +6 -1
  13. data/lib/wsdl/ASM.WebApplicationGroup.wsdl +1 -1
  14. data/lib/wsdl/Classification.Application.wsdl +1 -1
  15. data/lib/wsdl/Classification.Category.wsdl +1 -1
  16. data/lib/wsdl/Classification.SignatureDefinition.wsdl +30 -30
  17. data/lib/wsdl/Classification.SignatureUpdateSchedule.wsdl +59 -5
  18. data/lib/wsdl/Classification.SignatureVersion.wsdl +1 -1
  19. data/lib/wsdl/GlobalLB.Application.wsdl +211 -3
  20. data/lib/wsdl/GlobalLB.DNSSECKey.wsdl +1 -1
  21. data/lib/wsdl/GlobalLB.DNSSECZone.wsdl +7930 -17
  22. data/lib/wsdl/GlobalLB.DataCenter.wsdl +1841 -1
  23. data/lib/wsdl/GlobalLB.Globals.wsdl +272 -27
  24. data/lib/wsdl/GlobalLB.Link.wsdl +1841 -1
  25. data/lib/wsdl/GlobalLB.Monitor.wsdl +11 -1
  26. data/lib/wsdl/GlobalLB.Pool.wsdl +2752 -68
  27. data/lib/wsdl/GlobalLB.PoolMember.wsdl +1844 -2
  28. data/lib/wsdl/GlobalLB.PoolV2.wsdl +13122 -0
  29. data/lib/wsdl/GlobalLB.ProberPool.wsdl +1841 -1
  30. data/lib/wsdl/GlobalLB.Region.wsdl +1 -1
  31. data/lib/wsdl/GlobalLB.Rule.wsdl +1841 -1
  32. data/lib/wsdl/GlobalLB.Server.wsdl +1841 -1
  33. data/lib/wsdl/GlobalLB.Topology.wsdl +1 -1
  34. data/lib/wsdl/GlobalLB.VirtualServer.wsdl +1841 -1
  35. data/lib/wsdl/GlobalLB.VirtualServerV2.wsdl +1841 -1
  36. data/lib/wsdl/GlobalLB.WideIP.wsdl +2478 -166
  37. data/lib/wsdl/GlobalLB.WideIPV2.wsdl +10494 -0
  38. data/lib/wsdl/LTConfig.Class.wsdl +1 -1
  39. data/lib/wsdl/LTConfig.Field.wsdl +1 -1
  40. data/lib/wsdl/LocalLB.ALGLogProfile.wsdl +1479 -0
  41. data/lib/wsdl/LocalLB.Class.wsdl +1 -1
  42. data/lib/wsdl/LocalLB.ContentPolicy.wsdl +7021 -0
  43. data/lib/wsdl/LocalLB.ContentPolicyStrategy.wsdl +1264 -0
  44. data/lib/wsdl/LocalLB.DNSCache.wsdl +3023 -474
  45. data/lib/wsdl/LocalLB.DNSExpress.wsdl +2282 -251
  46. data/lib/wsdl/LocalLB.DNSGlobals.wsdl +1 -1
  47. data/lib/wsdl/LocalLB.DNSServer.wsdl +8213 -0
  48. data/lib/wsdl/LocalLB.DNSTSIGKey.wsdl +400 -0
  49. data/lib/wsdl/LocalLB.DNSZone.wsdl +8744 -0
  50. data/lib/wsdl/LocalLB.DataGroupFile.wsdl +1 -1
  51. data/lib/wsdl/LocalLB.FlowEvictionPolicy.wsdl +10188 -0
  52. data/lib/wsdl/LocalLB.LSNLogProfile.wsdl +1257 -0
  53. data/lib/wsdl/LocalLB.LSNPool.wsdl +3454 -667
  54. data/lib/wsdl/LocalLB.MessageRoutingPeer.wsdl +803 -0
  55. data/lib/wsdl/LocalLB.MessageRoutingSIPRoute.wsdl +838 -0
  56. data/lib/wsdl/LocalLB.MessageRoutingTransportConfig.wsdl +1153 -0
  57. data/lib/wsdl/LocalLB.Monitor.wsdl +429 -1
  58. data/lib/wsdl/LocalLB.NAT.wsdl +1841 -1
  59. data/lib/wsdl/LocalLB.NATV2.wsdl +1841 -1
  60. data/lib/wsdl/LocalLB.NodeAddress.wsdl +1841 -1
  61. data/lib/wsdl/LocalLB.NodeAddressV2.wsdl +2165 -251
  62. data/lib/wsdl/LocalLB.OCSPStaplingParameters.wsdl +1537 -0
  63. data/lib/wsdl/LocalLB.Pool.wsdl +5568 -2423
  64. data/lib/wsdl/LocalLB.PoolMember.wsdl +1841 -1
  65. data/lib/wsdl/LocalLB.ProfileAnalytics.wsdl +364 -1
  66. data/lib/wsdl/LocalLB.ProfileAuth.wsdl +1846 -1
  67. data/lib/wsdl/LocalLB.ProfileClassification.wsdl +1 -1
  68. data/lib/wsdl/LocalLB.ProfileClientLDAP.wsdl +8361 -0
  69. data/lib/wsdl/LocalLB.ProfileClientSSL.wsdl +6168 -1858
  70. data/lib/wsdl/LocalLB.ProfileDNS.wsdl +2582 -310
  71. data/lib/wsdl/LocalLB.ProfileDNSLogging.wsdl +1 -1
  72. data/lib/wsdl/LocalLB.ProfileDiameter.wsdl +1841 -1
  73. data/lib/wsdl/LocalLB.ProfileDiameterEndpoint.wsdl +1841 -1
  74. data/lib/wsdl/LocalLB.ProfileFIX.wsdl +8992 -0
  75. data/lib/wsdl/LocalLB.ProfileFTP.wsdl +2399 -276
  76. data/lib/wsdl/LocalLB.ProfileFastHttp.wsdl +1846 -1
  77. data/lib/wsdl/LocalLB.ProfileFastL4.wsdl +2476 -244
  78. data/lib/wsdl/LocalLB.ProfileHttp.wsdl +4569 -1825
  79. data/lib/wsdl/LocalLB.ProfileHttpClass.wsdl +1841 -1
  80. data/lib/wsdl/LocalLB.ProfileHttpCompression.wsdl +1841 -1
  81. data/lib/wsdl/LocalLB.ProfileICAP.wsdl +1841 -1
  82. data/lib/wsdl/LocalLB.ProfileIIOP.wsdl +1841 -1
  83. data/lib/wsdl/LocalLB.ProfileOneConnect.wsdl +2332 -256
  84. data/lib/wsdl/LocalLB.ProfilePCP.wsdl +1499 -0
  85. data/lib/wsdl/LocalLB.ProfilePPTP.wsdl +8423 -0
  86. data/lib/wsdl/LocalLB.ProfilePersistence.wsdl +466 -31
  87. data/lib/wsdl/LocalLB.ProfileRADIUS.wsdl +1841 -1
  88. data/lib/wsdl/LocalLB.ProfileRTSP.wsdl +2193 -159
  89. data/lib/wsdl/LocalLB.ProfileRequestAdapt.wsdl +1841 -1
  90. data/lib/wsdl/LocalLB.ProfileRequestLogging.wsdl +1 -1
  91. data/lib/wsdl/LocalLB.ProfileResponseAdapt.wsdl +1841 -1
  92. data/lib/wsdl/LocalLB.ProfileSCTP.wsdl +2918 -463
  93. data/lib/wsdl/LocalLB.ProfileSIP.wsdl +2189 -155
  94. data/lib/wsdl/LocalLB.ProfileSIPRouter.wsdl +9215 -0
  95. data/lib/wsdl/LocalLB.ProfileSIPSession.wsdl +9655 -0
  96. data/lib/wsdl/LocalLB.ProfileSMTPS.wsdl +8361 -0
  97. data/lib/wsdl/LocalLB.ProfileSPDY.wsdl +1870 -25
  98. data/lib/wsdl/LocalLB.ProfileSPM.wsdl +1 -1
  99. data/lib/wsdl/LocalLB.ProfileServerLDAP.wsdl +8361 -0
  100. data/lib/wsdl/LocalLB.ProfileServerSSL.wsdl +2729 -230
  101. data/lib/wsdl/LocalLB.ProfileStream.wsdl +1841 -1
  102. data/lib/wsdl/LocalLB.ProfileTCP.wsdl +3235 -309
  103. data/lib/wsdl/LocalLB.ProfileTCPAnalytics.wsdl +1466 -0
  104. data/lib/wsdl/LocalLB.ProfileTFTP.wsdl +8544 -0
  105. data/lib/wsdl/LocalLB.ProfileUDP.wsdl +1841 -1
  106. data/lib/wsdl/LocalLB.ProfileUserStatistic.wsdl +1 -1
  107. data/lib/wsdl/LocalLB.ProfileWebAcceleration.wsdl +1841 -1
  108. data/lib/wsdl/LocalLB.ProfileXML.wsdl +1841 -1
  109. data/lib/wsdl/LocalLB.RAMCacheInformation.wsdl +1 -1
  110. data/lib/wsdl/LocalLB.RateClass.wsdl +2192 -132
  111. data/lib/wsdl/LocalLB.Rule.wsdl +1841 -1
  112. data/lib/wsdl/LocalLB.SNAT.wsdl +1841 -1
  113. data/lib/wsdl/LocalLB.SNATPool.wsdl +1841 -1
  114. data/lib/wsdl/LocalLB.SNATPoolMember.wsdl +1841 -1
  115. data/lib/wsdl/LocalLB.SNATTranslationAddress.wsdl +1841 -1
  116. data/lib/wsdl/LocalLB.SNATTranslationAddressV2.wsdl +1841 -1
  117. data/lib/wsdl/LocalLB.VirtualAddress.wsdl +1841 -1
  118. data/lib/wsdl/LocalLB.VirtualAddressV2.wsdl +2265 -239
  119. data/lib/wsdl/LocalLB.VirtualServer.wsdl +10764 -5504
  120. data/lib/wsdl/LocalLB.iFile.wsdl +1 -1
  121. data/lib/wsdl/LocalLB.iFileFile.wsdl +1 -1
  122. data/lib/wsdl/Log.DestinationArcSight.wsdl +1 -1
  123. data/lib/wsdl/Log.DestinationIPFIX.wsdl +783 -0
  124. data/lib/wsdl/Log.DestinationLocalSyslog.wsdl +5 -5
  125. data/lib/wsdl/Log.DestinationManagementPort.wsdl +570 -0
  126. data/lib/wsdl/Log.DestinationRemoteHighSpeedLog.wsdl +268 -10
  127. data/lib/wsdl/Log.DestinationRemoteSyslog.wsdl +134 -14
  128. data/lib/wsdl/Log.DestinationSplunk.wsdl +1 -1
  129. data/lib/wsdl/Log.Filter.wsdl +266 -1
  130. data/lib/wsdl/Log.IPFIXInformationElement.wsdl +811 -0
  131. data/lib/wsdl/Log.Publisher.wsdl +1 -1
  132. data/lib/wsdl/Management.ApplicationPresentationScript.wsdl +1 -1
  133. data/lib/wsdl/Management.ApplicationService.wsdl +1 -1
  134. data/lib/wsdl/Management.ApplicationTemplate.wsdl +16 -1
  135. data/lib/wsdl/Management.CCLDAPConfiguration.wsdl +1 -1
  136. data/lib/wsdl/Management.CLIScript.wsdl +1 -1
  137. data/lib/wsdl/Management.CRLDPConfiguration.wsdl +1 -1
  138. data/lib/wsdl/Management.CRLDPServer.wsdl +1 -1
  139. data/lib/wsdl/Management.CertLDAPConfiguration.wsdl +1 -1
  140. data/lib/wsdl/Management.ChangeControl.wsdl +1 -1
  141. data/lib/wsdl/Management.DBVariable.wsdl +1 -1
  142. data/lib/wsdl/Management.Device.wsdl +36 -1
  143. data/lib/wsdl/Management.DeviceGroup.wsdl +1 -1
  144. data/lib/wsdl/Management.EM.wsdl +1 -1
  145. data/lib/wsdl/Management.EventNotification.wsdl +1 -1
  146. data/lib/wsdl/Management.EventSubscription.wsdl +1 -1
  147. data/lib/wsdl/Management.FeatureModule.wsdl +16 -1
  148. data/lib/wsdl/Management.Folder.wsdl +1 -1
  149. data/lib/wsdl/Management.Globals.wsdl +1 -1
  150. data/lib/wsdl/Management.KeyCertificate.wsdl +738 -64
  151. data/lib/wsdl/Management.LDAPConfiguration.wsdl +1 -1
  152. data/lib/wsdl/Management.LicenseAdministration.wsdl +16 -1
  153. data/lib/wsdl/Management.Named.wsdl +1 -1
  154. data/lib/wsdl/Management.OCSPConfiguration.wsdl +1 -1
  155. data/lib/wsdl/Management.OCSPResponder.wsdl +1 -1
  156. data/lib/wsdl/Management.Partition.wsdl +1 -1
  157. data/lib/wsdl/Management.Provision.wsdl +16 -1
  158. data/lib/wsdl/Management.RADIUSConfiguration.wsdl +1 -1
  159. data/lib/wsdl/Management.RADIUSServer.wsdl +1 -1
  160. data/lib/wsdl/Management.ResourceRecord.wsdl +1 -1
  161. data/lib/wsdl/Management.SFlowDataSource.wsdl +1 -1
  162. data/lib/wsdl/Management.SFlowGlobals.wsdl +1 -1
  163. data/lib/wsdl/Management.SFlowReceiver.wsdl +1 -1
  164. data/lib/wsdl/Management.SMTPConfiguration.wsdl +1 -1
  165. data/lib/wsdl/Management.SNMPConfiguration.wsdl +3 -5
  166. data/lib/wsdl/Management.TACACSConfiguration.wsdl +1 -1
  167. data/lib/wsdl/Management.TMOSModule.wsdl +16 -1
  168. data/lib/wsdl/Management.TrafficGroup.wsdl +77 -1
  169. data/lib/wsdl/Management.Trust.wsdl +1 -1
  170. data/lib/wsdl/Management.UserManagement.wsdl +47 -1
  171. data/lib/wsdl/Management.View.wsdl +1 -1
  172. data/lib/wsdl/Management.Zone.wsdl +104 -17
  173. data/lib/wsdl/Management.ZoneRunner.wsdl +1 -1
  174. data/lib/wsdl/Networking.ARP.wsdl +1 -1
  175. data/lib/wsdl/Networking.AdminIP.wsdl +1 -1
  176. data/lib/wsdl/Networking.BWControllerPolicy.wsdl +515 -36
  177. data/lib/wsdl/Networking.BWPriorityGroup.wsdl +655 -0
  178. data/lib/wsdl/Networking.DNSResolver.wsdl +1278 -0
  179. data/lib/wsdl/Networking.IPsecIkeDaemon.wsdl +1 -1
  180. data/lib/wsdl/Networking.IPsecIkePeer.wsdl +661 -29
  181. data/lib/wsdl/Networking.IPsecManualSecurityAssociation.wsdl +107 -5
  182. data/lib/wsdl/Networking.IPsecPolicy.wsdl +21 -1
  183. data/lib/wsdl/Networking.IPsecTrafficSelector.wsdl +1 -1
  184. data/lib/wsdl/Networking.Interfaces.wsdl +2165 -251
  185. data/lib/wsdl/Networking.LLDPGlobals.wsdl +1 -1
  186. data/lib/wsdl/Networking.MulticastRoute.wsdl +265 -0
  187. data/lib/wsdl/Networking.PacketFilter.wsdl +1841 -1
  188. data/lib/wsdl/Networking.PacketFilterGlobals.wsdl +1 -1
  189. data/lib/wsdl/Networking.PortMirror.wsdl +1 -1
  190. data/lib/wsdl/Networking.ProfileFEC.wsdl +1 -1
  191. data/lib/wsdl/Networking.ProfileGRE.wsdl +232 -1
  192. data/lib/wsdl/Networking.ProfileGeneve.wsdl +674 -0
  193. data/lib/wsdl/Networking.ProfileIPIP.wsdl +1 -1
  194. data/lib/wsdl/Networking.ProfileIPsec.wsdl +560 -0
  195. data/lib/wsdl/Networking.ProfileLightweight4Over6Tunnel.wsdl +663 -0
  196. data/lib/wsdl/Networking.ProfileMAP.wsdl +834 -0
  197. data/lib/wsdl/Networking.ProfileV6RD.wsdl +861 -0
  198. data/lib/wsdl/Networking.ProfileVXLAN.wsdl +223 -1
  199. data/lib/wsdl/Networking.ProfileWCCPGRE.wsdl +1 -1
  200. data/lib/wsdl/Networking.RouteDomain.wsdl +4 -9
  201. data/lib/wsdl/Networking.RouteDomainV2.wsdl +8959 -3933
  202. data/lib/wsdl/Networking.RouteTable.wsdl +1 -1
  203. data/lib/wsdl/Networking.RouteTableV2.wsdl +1 -1
  204. data/lib/wsdl/Networking.RouterAdvertisement.wsdl +1 -1
  205. data/lib/wsdl/Networking.STPGlobals.wsdl +1 -1
  206. data/lib/wsdl/Networking.STPInstance.wsdl +1 -1
  207. data/lib/wsdl/Networking.STPInstanceV2.wsdl +1 -1
  208. data/lib/wsdl/Networking.SelfIP.wsdl +1 -1
  209. data/lib/wsdl/Networking.SelfIPPortLockdown.wsdl +1216 -1
  210. data/lib/wsdl/Networking.SelfIPV2.wsdl +8717 -3908
  211. data/lib/wsdl/Networking.Trunk.wsdl +2173 -259
  212. data/lib/wsdl/Networking.Tunnel.wsdl +617 -1
  213. data/lib/wsdl/Networking.VLAN.wsdl +322 -39
  214. data/lib/wsdl/Networking.VLANGroup.wsdl +40 -1
  215. data/lib/wsdl/Networking.iSessionAdvertisedRoute.wsdl +1 -1
  216. data/lib/wsdl/Networking.iSessionAdvertisedRouteV2.wsdl +1 -1
  217. data/lib/wsdl/Networking.iSessionDatastor.wsdl +7 -13
  218. data/lib/wsdl/Networking.iSessionDeduplication.wsdl +1 -1
  219. data/lib/wsdl/Networking.iSessionLocalInterface.wsdl +77 -1
  220. data/lib/wsdl/Networking.iSessionPeerDiscovery.wsdl +1 -1
  221. data/lib/wsdl/Networking.iSessionRemoteInterface.wsdl +1 -1
  222. data/lib/wsdl/Networking.iSessionRemoteInterfaceV2.wsdl +108 -1
  223. data/lib/wsdl/PEM.FormatScript.wsdl +1 -1
  224. data/lib/wsdl/PEM.ForwardingEndpoint.wsdl +111 -1
  225. data/lib/wsdl/PEM.InterceptionEndpoint.wsdl +1 -1
  226. data/lib/wsdl/PEM.Listener.wsdl +1 -1
  227. data/lib/wsdl/PEM.Policy.wsdl +591 -1
  228. data/lib/wsdl/PEM.ServiceChainEndpoint.wsdl +169 -1
  229. data/lib/wsdl/PEM.Subscriber.wsdl +1841 -1
  230. data/lib/wsdl/Security.DoSDevice.wsdl +3097 -336
  231. data/lib/wsdl/Security.DoSWhitelist.wsdl +877 -0
  232. data/lib/wsdl/Security.FirewallAddressList.wsdl +959 -33
  233. data/lib/wsdl/Security.FirewallGlobalAdminIPRuleList.wsdl +5955 -2350
  234. data/lib/wsdl/Security.FirewallGlobalRuleList.wsdl +8370 -3601
  235. data/lib/wsdl/Security.FirewallPolicy.wsdl +7786 -3589
  236. data/lib/wsdl/Security.FirewallPortList.wsdl +287 -1
  237. data/lib/wsdl/Security.FirewallRuleList.wsdl +3633 -1276
  238. data/lib/wsdl/Security.FirewallWeeklySchedule.wsdl +1 -1
  239. data/lib/wsdl/Security.IPIntelligenceBlacklistCategory.wsdl +555 -0
  240. data/lib/wsdl/Security.IPIntelligenceFeedList.wsdl +1086 -0
  241. data/lib/wsdl/Security.IPIntelligenceGlobalPolicy.wsdl +285 -0
  242. data/lib/wsdl/Security.IPIntelligencePolicy.wsdl +1393 -0
  243. data/lib/wsdl/Security.LogProfile.wsdl +784 -66
  244. data/lib/wsdl/Security.ProfileDNSSecurity.wsdl +1841 -1
  245. data/lib/wsdl/Security.ProfileDoS.wsdl +5602 -1813
  246. data/lib/wsdl/Security.ProfileIPIntelligence.wsdl +2100 -256
  247. data/lib/wsdl/System.CertificateRevocationListFile.wsdl +1 -1
  248. data/lib/wsdl/System.Cluster.wsdl +17 -1
  249. data/lib/wsdl/System.ConfigSync.wsdl +226 -5
  250. data/lib/wsdl/System.Connections.wsdl +1216 -1
  251. data/lib/wsdl/System.CryptoClient.wsdl +8697 -0
  252. data/lib/wsdl/System.CryptoServer.wsdl +8507 -0
  253. data/lib/wsdl/System.Disk.wsdl +11 -1
  254. data/lib/wsdl/System.ExternalMonitorFile.wsdl +1 -1
  255. data/lib/wsdl/System.Failover.wsdl +1 -1
  256. data/lib/wsdl/System.GeoIP.wsdl +31 -15
  257. data/lib/wsdl/System.HAGroup.wsdl +1 -1
  258. data/lib/wsdl/System.HAStatus.wsdl +1 -1
  259. data/lib/wsdl/System.Inet.wsdl +1 -1
  260. data/lib/wsdl/System.Internal.wsdl +1 -1
  261. data/lib/wsdl/System.LightweightTunnelTableFile.wsdl +639 -0
  262. data/lib/wsdl/System.PerformanceSFlow.wsdl +1 -1
  263. data/lib/wsdl/System.Services.wsdl +6 -1
  264. data/lib/wsdl/System.Session.wsdl +203 -1
  265. data/lib/wsdl/System.SoftwareManagement.wsdl +275 -58
  266. data/lib/wsdl/System.Statistics.wsdl +4292 -1426
  267. data/lib/wsdl/System.SystemInfo.wsdl +1877 -32
  268. data/lib/wsdl/System.VCMP.wsdl +3498 -664
  269. data/lib/wsdl/WebAccelerator.Applications.wsdl +1841 -1
  270. data/lib/wsdl/WebAccelerator.Policies.wsdl +1 -1
  271. data/lib/wsdl/WebAccelerator.ProxyMessage.wsdl +1 -1
  272. data/lib/wsdl/iCall.PeriodicHandler.wsdl +1 -1
  273. data/lib/wsdl/iCall.PerpetualHandler.wsdl +1 -1
  274. data/lib/wsdl/iCall.Script.wsdl +43 -3
  275. data/lib/wsdl/iCall.TriggeredHandler.wsdl +1 -1
  276. metadata +46 -4
  277. data/LICENSE +0 -9
@@ -0,0 +1,285 @@
1
+ <?xml version="1.0" ?>
2
+ <!--
3
+ Copyright (c) 1996-2016, F5 Networks, Inc., Seattle, Washington. All rights reserved.
4
+
5
+ F5, F5 Networks, the F5 logo, BIG-IP, 3-DNS, iControl, GLOBAL-SITE, SEE-IT, EDGE-FX, FireGuard, Internet Control Architecture, IP Application Switch, iRules, PACKET VELOCITY, SYN Check, CONTROL YOUR WORLD, OneConnect, ZoneRunner, uRoam, FirePass, and TrafficShield are registered trademarks or trademarks of F5 Networks, Inc., in the U.S. and certain other countries.
6
+
7
+ All other trademarks mentioned in this document are the property of their respective owners. F5 Networks' trademarks may not be used in connection with any product or service except as permitted in writing by F5.
8
+
9
+ -->
10
+ <definitions name="Security.IPIntelligenceGlobalPolicy"
11
+ targetNamespace="urn:iControl"
12
+ xmlns:tns="urn:iControl"
13
+ xmlns:xsd="http://www.w3.org/2001/XMLSchema"
14
+ xmlns:soap="http://schemas.xmlsoap.org/wsdl/soap/"
15
+ xmlns="http://schemas.xmlsoap.org/wsdl/">
16
+
17
+ <!-- types -->
18
+
19
+ <types>
20
+ <xsd:schema targetNamespace='urn:iControl'
21
+ xmlns='http://www.w3.org/2001/XMLSchema'
22
+ xmlns:SOAP-ENC='http://schemas.xmlsoap.org/soap/encoding/'
23
+ xmlns:wsdl='http://schemas.xmlsoap.org/wsdl/'>
24
+ <xsd:complexType name="Common.StringSequence">
25
+ <xsd:complexContent>
26
+ <xsd:restriction base='SOAP-ENC:Array'>
27
+ <xsd:attribute ref='SOAP-ENC:arrayType' wsdl:arrayType='xsd:string[]'/>
28
+ </xsd:restriction>
29
+ </xsd:complexContent>
30
+ </xsd:complexType>
31
+ </xsd:schema>
32
+ </types>
33
+
34
+ <!-- message -->
35
+
36
+ <message name="Security.IPIntelligenceGlobalPolicy.get_listRequest">
37
+ </message>
38
+ <message name="Security.IPIntelligenceGlobalPolicy.get_listResponse">
39
+ <part name="return" type="tns:Common.StringSequence"/>
40
+ </message>
41
+
42
+ <message name="Security.IPIntelligenceGlobalPolicy.set_policyRequest">
43
+ <part name="global_policies" type="tns:Common.StringSequence"/>
44
+ <part name="policies" type="tns:Common.StringSequence"/>
45
+ </message>
46
+ <message name="Security.IPIntelligenceGlobalPolicy.set_policyResponse">
47
+ </message>
48
+
49
+ <message name="Security.IPIntelligenceGlobalPolicy.get_policyRequest">
50
+ <part name="global_policies" type="tns:Common.StringSequence"/>
51
+ </message>
52
+ <message name="Security.IPIntelligenceGlobalPolicy.get_policyResponse">
53
+ <part name="return" type="tns:Common.StringSequence"/>
54
+ </message>
55
+
56
+ <message name="Security.IPIntelligenceGlobalPolicy.set_descriptionRequest">
57
+ <part name="global_policies" type="tns:Common.StringSequence"/>
58
+ <part name="descriptions" type="tns:Common.StringSequence"/>
59
+ </message>
60
+ <message name="Security.IPIntelligenceGlobalPolicy.set_descriptionResponse">
61
+ </message>
62
+
63
+ <message name="Security.IPIntelligenceGlobalPolicy.get_descriptionRequest">
64
+ <part name="global_policies" type="tns:Common.StringSequence"/>
65
+ </message>
66
+ <message name="Security.IPIntelligenceGlobalPolicy.get_descriptionResponse">
67
+ <part name="return" type="tns:Common.StringSequence"/>
68
+ </message>
69
+
70
+ <message name="Security.IPIntelligenceGlobalPolicy.get_versionRequest">
71
+ </message>
72
+ <message name="Security.IPIntelligenceGlobalPolicy.get_versionResponse">
73
+ <part name="return" type="xsd:string"/>
74
+ </message>
75
+
76
+ <!-- portType -->
77
+
78
+ <portType name="Security.IPIntelligenceGlobalPolicyPortType">
79
+ <operation name="get_list">
80
+ <documentation>
81
+ Gets a list of all global policies.
82
+ The IP intelligence policy contents/filters are applied to all
83
+ packets except those going through the management interface.
84
+ They are applied first, before any firewall rules for the
85
+ packet's virtual server and route domain.
86
+
87
+ </documentation>
88
+ <input message="tns:Security.IPIntelligenceGlobalPolicy.get_listRequest"/>
89
+ <output message="tns:Security.IPIntelligenceGlobalPolicy.get_listResponse"/>
90
+ </operation>
91
+ <operation name="set_policy">
92
+ <documentation>
93
+ Sets the policies for the specified global policies.
94
+ Specifies an existing IP intelligence policy. Policy contents
95
+ are enforced at a global level.
96
+
97
+ </documentation>
98
+ <input message="tns:Security.IPIntelligenceGlobalPolicy.set_policyRequest"/>
99
+ <output message="tns:Security.IPIntelligenceGlobalPolicy.set_policyResponse"/>
100
+ </operation>
101
+ <operation name="get_policy">
102
+ <documentation>
103
+ Gets the policies for the specified global policies.
104
+
105
+ </documentation>
106
+ <input message="tns:Security.IPIntelligenceGlobalPolicy.get_policyRequest"/>
107
+ <output message="tns:Security.IPIntelligenceGlobalPolicy.get_policyResponse"/>
108
+ </operation>
109
+ <operation name="set_description">
110
+ <documentation>
111
+ Sets the descriptions for the specified global policies.
112
+ This is an arbitrary field which can be used for any purpose.
113
+
114
+ </documentation>
115
+ <input message="tns:Security.IPIntelligenceGlobalPolicy.set_descriptionRequest"/>
116
+ <output message="tns:Security.IPIntelligenceGlobalPolicy.set_descriptionResponse"/>
117
+ </operation>
118
+ <operation name="get_description">
119
+ <documentation>
120
+ Gets the descriptions for the specified global policies.
121
+
122
+ </documentation>
123
+ <input message="tns:Security.IPIntelligenceGlobalPolicy.get_descriptionRequest"/>
124
+ <output message="tns:Security.IPIntelligenceGlobalPolicy.get_descriptionResponse"/>
125
+ </operation>
126
+ <operation name="get_version">
127
+ <documentation>
128
+ Gets the version information for this interface.
129
+
130
+ </documentation>
131
+ <input message="tns:Security.IPIntelligenceGlobalPolicy.get_versionRequest"/>
132
+ <output message="tns:Security.IPIntelligenceGlobalPolicy.get_versionResponse"/>
133
+ </operation>
134
+ </portType>
135
+
136
+ <!-- binding -->
137
+
138
+ <binding name="Security.IPIntelligenceGlobalPolicyBinding" type="tns:Security.IPIntelligenceGlobalPolicyPortType">
139
+ <soap:binding style="rpc" transport="http://schemas.xmlsoap.org/soap/http"/>
140
+ <operation name="get_list">
141
+ <documentation>
142
+ Gets a list of all global policies.
143
+ The IP intelligence policy contents/filters are applied to all
144
+ packets except those going through the management interface.
145
+ They are applied first, before any firewall rules for the
146
+ packet's virtual server and route domain.
147
+
148
+ </documentation>
149
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligenceGlobalPolicy"/>
150
+ <input>
151
+ <soap:body
152
+ use="encoded"
153
+ namespace="urn:iControl:Security/IPIntelligenceGlobalPolicy"
154
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
155
+ </input>
156
+ <output>
157
+ <soap:body
158
+ use="encoded"
159
+ namespace="urn:iControl:Security/IPIntelligenceGlobalPolicy"
160
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
161
+ </output>
162
+ </operation>
163
+
164
+ <operation name="set_policy">
165
+ <documentation>
166
+ Sets the policies for the specified global policies.
167
+ Specifies an existing IP intelligence policy. Policy contents
168
+ are enforced at a global level.
169
+
170
+ </documentation>
171
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligenceGlobalPolicy"/>
172
+ <input>
173
+ <soap:body
174
+ use="encoded"
175
+ namespace="urn:iControl:Security/IPIntelligenceGlobalPolicy"
176
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
177
+ </input>
178
+ <output>
179
+ <soap:body
180
+ use="encoded"
181
+ namespace="urn:iControl:Security/IPIntelligenceGlobalPolicy"
182
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
183
+ </output>
184
+ </operation>
185
+
186
+ <operation name="get_policy">
187
+ <documentation>
188
+ Gets the policies for the specified global policies.
189
+
190
+ </documentation>
191
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligenceGlobalPolicy"/>
192
+ <input>
193
+ <soap:body
194
+ use="encoded"
195
+ namespace="urn:iControl:Security/IPIntelligenceGlobalPolicy"
196
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
197
+ </input>
198
+ <output>
199
+ <soap:body
200
+ use="encoded"
201
+ namespace="urn:iControl:Security/IPIntelligenceGlobalPolicy"
202
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
203
+ </output>
204
+ </operation>
205
+
206
+ <operation name="set_description">
207
+ <documentation>
208
+ Sets the descriptions for the specified global policies.
209
+ This is an arbitrary field which can be used for any purpose.
210
+
211
+ </documentation>
212
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligenceGlobalPolicy"/>
213
+ <input>
214
+ <soap:body
215
+ use="encoded"
216
+ namespace="urn:iControl:Security/IPIntelligenceGlobalPolicy"
217
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
218
+ </input>
219
+ <output>
220
+ <soap:body
221
+ use="encoded"
222
+ namespace="urn:iControl:Security/IPIntelligenceGlobalPolicy"
223
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
224
+ </output>
225
+ </operation>
226
+
227
+ <operation name="get_description">
228
+ <documentation>
229
+ Gets the descriptions for the specified global policies.
230
+
231
+ </documentation>
232
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligenceGlobalPolicy"/>
233
+ <input>
234
+ <soap:body
235
+ use="encoded"
236
+ namespace="urn:iControl:Security/IPIntelligenceGlobalPolicy"
237
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
238
+ </input>
239
+ <output>
240
+ <soap:body
241
+ use="encoded"
242
+ namespace="urn:iControl:Security/IPIntelligenceGlobalPolicy"
243
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
244
+ </output>
245
+ </operation>
246
+
247
+ <operation name="get_version">
248
+ <documentation>
249
+ Gets the version information for this interface.
250
+
251
+ </documentation>
252
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligenceGlobalPolicy"/>
253
+ <input>
254
+ <soap:body
255
+ use="encoded"
256
+ namespace="urn:iControl:Security/IPIntelligenceGlobalPolicy"
257
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
258
+ </input>
259
+ <output>
260
+ <soap:body
261
+ use="encoded"
262
+ namespace="urn:iControl:Security/IPIntelligenceGlobalPolicy"
263
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
264
+ </output>
265
+ </operation>
266
+ </binding>
267
+
268
+ <!-- service -->
269
+
270
+ <service name="Security.IPIntelligenceGlobalPolicy">
271
+ <documentation>
272
+ The IPIntelligenceGlobalPolicy interface enables you to set a
273
+ global IP Intelligence policy. The global IP intelligence policy
274
+ is applied to all the packets before route domain's and/or
275
+ virtual server's IP Intelligence policies.
276
+
277
+ There is only one IP intelligence global policy for the entire system, called "/Common/global-dwbl-container".
278
+ Please supply this key to all methods requiring the "global_policies" argument.
279
+
280
+ </documentation>
281
+ <port name="Security.IPIntelligenceGlobalPolicyPort" binding="tns:Security.IPIntelligenceGlobalPolicyBinding">
282
+ <soap:address location="https://url_to_service"/>
283
+ </port>
284
+ </service>
285
+ </definitions>
@@ -0,0 +1,1393 @@
1
+ <?xml version="1.0" ?>
2
+ <!--
3
+ Copyright (c) 1996-2016, F5 Networks, Inc., Seattle, Washington. All rights reserved.
4
+
5
+ F5, F5 Networks, the F5 logo, BIG-IP, 3-DNS, iControl, GLOBAL-SITE, SEE-IT, EDGE-FX, FireGuard, Internet Control Architecture, IP Application Switch, iRules, PACKET VELOCITY, SYN Check, CONTROL YOUR WORLD, OneConnect, ZoneRunner, uRoam, FirePass, and TrafficShield are registered trademarks or trademarks of F5 Networks, Inc., in the U.S. and certain other countries.
6
+
7
+ All other trademarks mentioned in this document are the property of their respective owners. F5 Networks' trademarks may not be used in connection with any product or service except as permitted in writing by F5.
8
+
9
+ -->
10
+ <definitions name="Security.IPIntelligencePolicy"
11
+ targetNamespace="urn:iControl"
12
+ xmlns:tns="urn:iControl"
13
+ xmlns:xsd="http://www.w3.org/2001/XMLSchema"
14
+ xmlns:soap="http://schemas.xmlsoap.org/wsdl/soap/"
15
+ xmlns="http://schemas.xmlsoap.org/wsdl/">
16
+
17
+ <!-- types -->
18
+
19
+ <types>
20
+ <xsd:schema targetNamespace='urn:iControl'
21
+ xmlns='http://www.w3.org/2001/XMLSchema'
22
+ xmlns:SOAP-ENC='http://schemas.xmlsoap.org/soap/encoding/'
23
+ xmlns:wsdl='http://schemas.xmlsoap.org/wsdl/'>
24
+ <xsd:complexType name="Security.IPIntelligencePolicy.IPIntelligencePolicyActionTypeSequence">
25
+ <xsd:complexContent>
26
+ <xsd:restriction base='SOAP-ENC:Array'>
27
+ <xsd:attribute ref='SOAP-ENC:arrayType' wsdl:arrayType='tns:Security.IPIntelligencePolicy.IPIntelligencePolicyActionType[]'/>
28
+ </xsd:restriction>
29
+ </xsd:complexContent>
30
+ </xsd:complexType>
31
+ <xsd:simpleType name="Common.EnabledState">
32
+ <xsd:restriction base="xsd:string">
33
+ <xsd:enumeration value="STATE_DISABLED">
34
+ <xsd:annotation>
35
+ <xsd:documentation>STATE_DISABLED</xsd:documentation>
36
+ </xsd:annotation>
37
+ </xsd:enumeration>
38
+ <xsd:enumeration value="STATE_ENABLED">
39
+ <xsd:annotation>
40
+ <xsd:documentation>STATE_ENABLED</xsd:documentation>
41
+ </xsd:annotation>
42
+ </xsd:enumeration>
43
+ </xsd:restriction>
44
+ </xsd:simpleType>
45
+ <xsd:simpleType name="Security.IPIntelligencePolicy.IPIntelligencePolicyMatchDirection">
46
+ <xsd:restriction base="xsd:string">
47
+ <xsd:enumeration value="IP_INTELLIGENCE_POLICY_MATCH_DIRECTION_UNKNOWN">
48
+ <xsd:annotation>
49
+ <xsd:documentation>IP_INTELLIGENCE_POLICY_MATCH_DIRECTION_UNKNOWN</xsd:documentation>
50
+ </xsd:annotation>
51
+ </xsd:enumeration>
52
+ <xsd:enumeration value="IP_INTELLIGENCE_POLICY_MATCH_DIRECTION_SOURCE">
53
+ <xsd:annotation>
54
+ <xsd:documentation>IP_INTELLIGENCE_POLICY_MATCH_DIRECTION_SOURCE</xsd:documentation>
55
+ </xsd:annotation>
56
+ </xsd:enumeration>
57
+ <xsd:enumeration value="IP_INTELLIGENCE_POLICY_MATCH_DIRECTION_DESTINATION">
58
+ <xsd:annotation>
59
+ <xsd:documentation>IP_INTELLIGENCE_POLICY_MATCH_DIRECTION_DESTINATION</xsd:documentation>
60
+ </xsd:annotation>
61
+ </xsd:enumeration>
62
+ <xsd:enumeration value="IP_INTELLIGENCE_POLICY_MATCH_DIRECTION_SOURCE_AND_DESTINATION">
63
+ <xsd:annotation>
64
+ <xsd:documentation>IP_INTELLIGENCE_POLICY_MATCH_DIRECTION_SOURCE_AND_DESTINATION</xsd:documentation>
65
+ </xsd:annotation>
66
+ </xsd:enumeration>
67
+ </xsd:restriction>
68
+ </xsd:simpleType>
69
+ <xsd:complexType name="Common.StringSequence">
70
+ <xsd:complexContent>
71
+ <xsd:restriction base='SOAP-ENC:Array'>
72
+ <xsd:attribute ref='SOAP-ENC:arrayType' wsdl:arrayType='xsd:string[]'/>
73
+ </xsd:restriction>
74
+ </xsd:complexContent>
75
+ </xsd:complexType>
76
+ <xsd:simpleType name="Security.IPIntelligencePolicy.IPIntelligencePolicyActionType">
77
+ <xsd:restriction base="xsd:string">
78
+ <xsd:enumeration value="IP_INTELLIGENCE_POLICY_ACTION_TYPE_UNKNOWN">
79
+ <xsd:annotation>
80
+ <xsd:documentation>IP_INTELLIGENCE_POLICY_ACTION_TYPE_UNKNOWN</xsd:documentation>
81
+ </xsd:annotation>
82
+ </xsd:enumeration>
83
+ <xsd:enumeration value="IP_INTELLIGENCE_POLICY_ACTION_TYPE_USE_PARENT">
84
+ <xsd:annotation>
85
+ <xsd:documentation>IP_INTELLIGENCE_POLICY_ACTION_TYPE_USE_PARENT</xsd:documentation>
86
+ </xsd:annotation>
87
+ </xsd:enumeration>
88
+ <xsd:enumeration value="IP_INTELLIGENCE_POLICY_ACTION_TYPE_ALLOW">
89
+ <xsd:annotation>
90
+ <xsd:documentation>IP_INTELLIGENCE_POLICY_ACTION_TYPE_ALLOW</xsd:documentation>
91
+ </xsd:annotation>
92
+ </xsd:enumeration>
93
+ <xsd:enumeration value="IP_INTELLIGENCE_POLICY_ACTION_TYPE_DROP">
94
+ <xsd:annotation>
95
+ <xsd:documentation>IP_INTELLIGENCE_POLICY_ACTION_TYPE_DROP</xsd:documentation>
96
+ </xsd:annotation>
97
+ </xsd:enumeration>
98
+ </xsd:restriction>
99
+ </xsd:simpleType>
100
+ <xsd:complexType name="Security.IPIntelligencePolicy.IPIntelligencePolicyBlacklistCategoryLogTypeSequence">
101
+ <xsd:complexContent>
102
+ <xsd:restriction base='SOAP-ENC:Array'>
103
+ <xsd:attribute ref='SOAP-ENC:arrayType' wsdl:arrayType='tns:Security.IPIntelligencePolicy.IPIntelligencePolicyBlacklistCategoryLogType[]'/>
104
+ </xsd:restriction>
105
+ </xsd:complexContent>
106
+ </xsd:complexType>
107
+ <xsd:complexType name="Security.IPIntelligencePolicy.IPIntelligencePolicyMatchDirectionSequenceSequence">
108
+ <xsd:complexContent>
109
+ <xsd:restriction base='SOAP-ENC:Array'>
110
+ <xsd:attribute ref='SOAP-ENC:arrayType' wsdl:arrayType='tns:Security.IPIntelligencePolicy.IPIntelligencePolicyMatchDirectionSequence[]'/>
111
+ </xsd:restriction>
112
+ </xsd:complexContent>
113
+ </xsd:complexType>
114
+ <xsd:complexType name="Security.IPIntelligencePolicy.IPIntelligencePolicyActionTypeSequenceSequence">
115
+ <xsd:complexContent>
116
+ <xsd:restriction base='SOAP-ENC:Array'>
117
+ <xsd:attribute ref='SOAP-ENC:arrayType' wsdl:arrayType='tns:Security.IPIntelligencePolicy.IPIntelligencePolicyActionTypeSequence[]'/>
118
+ </xsd:restriction>
119
+ </xsd:complexContent>
120
+ </xsd:complexType>
121
+ <xsd:complexType name="Security.IPIntelligencePolicy.IPIntelligencePolicyBlacklistCategoryLogTypeSequenceSequence">
122
+ <xsd:complexContent>
123
+ <xsd:restriction base='SOAP-ENC:Array'>
124
+ <xsd:attribute ref='SOAP-ENC:arrayType' wsdl:arrayType='tns:Security.IPIntelligencePolicy.IPIntelligencePolicyBlacklistCategoryLogTypeSequence[]'/>
125
+ </xsd:restriction>
126
+ </xsd:complexContent>
127
+ </xsd:complexType>
128
+ <xsd:complexType name="Common.StringSequenceSequence">
129
+ <xsd:complexContent>
130
+ <xsd:restriction base='SOAP-ENC:Array'>
131
+ <xsd:attribute ref='SOAP-ENC:arrayType' wsdl:arrayType='tns:Common.StringSequence[]'/>
132
+ </xsd:restriction>
133
+ </xsd:complexContent>
134
+ </xsd:complexType>
135
+ <xsd:simpleType name="Security.IPIntelligencePolicy.IPIntelligencePolicyBlacklistCategoryLogType">
136
+ <xsd:restriction base="xsd:string">
137
+ <xsd:enumeration value="IP_INTELLIGENCE_POLICY_BLACKLIST_CATEGORY_LOG_TYPE_UNKNOWN">
138
+ <xsd:annotation>
139
+ <xsd:documentation>IP_INTELLIGENCE_POLICY_BLACKLIST_CATEGORY_LOG_TYPE_UNKNOWN</xsd:documentation>
140
+ </xsd:annotation>
141
+ </xsd:enumeration>
142
+ <xsd:enumeration value="IP_INTELLIGENCE_POLICY_BLACKLIST_CATEGORY_LOG_TYPE_USE_PARENT">
143
+ <xsd:annotation>
144
+ <xsd:documentation>IP_INTELLIGENCE_POLICY_BLACKLIST_CATEGORY_LOG_TYPE_USE_PARENT</xsd:documentation>
145
+ </xsd:annotation>
146
+ </xsd:enumeration>
147
+ <xsd:enumeration value="IP_INTELLIGENCE_POLICY_BLACKLIST_CATEGORY_LOG_TYPE_YES">
148
+ <xsd:annotation>
149
+ <xsd:documentation>IP_INTELLIGENCE_POLICY_BLACKLIST_CATEGORY_LOG_TYPE_YES</xsd:documentation>
150
+ </xsd:annotation>
151
+ </xsd:enumeration>
152
+ <xsd:enumeration value="IP_INTELLIGENCE_POLICY_BLACKLIST_CATEGORY_LOG_TYPE_NO">
153
+ <xsd:annotation>
154
+ <xsd:documentation>IP_INTELLIGENCE_POLICY_BLACKLIST_CATEGORY_LOG_TYPE_NO</xsd:documentation>
155
+ </xsd:annotation>
156
+ </xsd:enumeration>
157
+ </xsd:restriction>
158
+ </xsd:simpleType>
159
+ <xsd:complexType name="Security.IPIntelligencePolicy.IPIntelligencePolicyMatchDirectionSequence">
160
+ <xsd:complexContent>
161
+ <xsd:restriction base='SOAP-ENC:Array'>
162
+ <xsd:attribute ref='SOAP-ENC:arrayType' wsdl:arrayType='tns:Security.IPIntelligencePolicy.IPIntelligencePolicyMatchDirection[]'/>
163
+ </xsd:restriction>
164
+ </xsd:complexContent>
165
+ </xsd:complexType>
166
+ <xsd:complexType name="Common.EnabledStateSequence">
167
+ <xsd:complexContent>
168
+ <xsd:restriction base='SOAP-ENC:Array'>
169
+ <xsd:attribute ref='SOAP-ENC:arrayType' wsdl:arrayType='tns:Common.EnabledState[]'/>
170
+ </xsd:restriction>
171
+ </xsd:complexContent>
172
+ </xsd:complexType>
173
+ </xsd:schema>
174
+ </types>
175
+
176
+ <!-- message -->
177
+
178
+ <message name="Security.IPIntelligencePolicy.get_listRequest">
179
+ </message>
180
+ <message name="Security.IPIntelligencePolicy.get_listResponse">
181
+ <part name="return" type="tns:Common.StringSequence"/>
182
+ </message>
183
+
184
+ <message name="Security.IPIntelligencePolicy.createRequest">
185
+ <part name="policies" type="tns:Common.StringSequence"/>
186
+ </message>
187
+ <message name="Security.IPIntelligencePolicy.createResponse">
188
+ </message>
189
+
190
+ <message name="Security.IPIntelligencePolicy.delete_policyRequest">
191
+ <part name="policies" type="tns:Common.StringSequence"/>
192
+ </message>
193
+ <message name="Security.IPIntelligencePolicy.delete_policyResponse">
194
+ </message>
195
+
196
+ <message name="Security.IPIntelligencePolicy.delete_all_policiesRequest">
197
+ </message>
198
+ <message name="Security.IPIntelligencePolicy.delete_all_policiesResponse">
199
+ </message>
200
+
201
+ <message name="Security.IPIntelligencePolicy.set_default_action_typeRequest">
202
+ <part name="policies" type="tns:Common.StringSequence"/>
203
+ <part name="types" type="tns:Security.IPIntelligencePolicy.IPIntelligencePolicyActionTypeSequence"/>
204
+ </message>
205
+ <message name="Security.IPIntelligencePolicy.set_default_action_typeResponse">
206
+ </message>
207
+
208
+ <message name="Security.IPIntelligencePolicy.get_default_action_typeRequest">
209
+ <part name="policies" type="tns:Common.StringSequence"/>
210
+ </message>
211
+ <message name="Security.IPIntelligencePolicy.get_default_action_typeResponse">
212
+ <part name="return" type="tns:Security.IPIntelligencePolicy.IPIntelligencePolicyActionTypeSequence"/>
213
+ </message>
214
+
215
+ <message name="Security.IPIntelligencePolicy.set_log_blacklist_hit_stateRequest">
216
+ <part name="policies" type="tns:Common.StringSequence"/>
217
+ <part name="states" type="tns:Common.EnabledStateSequence"/>
218
+ </message>
219
+ <message name="Security.IPIntelligencePolicy.set_log_blacklist_hit_stateResponse">
220
+ </message>
221
+
222
+ <message name="Security.IPIntelligencePolicy.get_log_blacklist_hit_stateRequest">
223
+ <part name="policies" type="tns:Common.StringSequence"/>
224
+ </message>
225
+ <message name="Security.IPIntelligencePolicy.get_log_blacklist_hit_stateResponse">
226
+ <part name="return" type="tns:Common.EnabledStateSequence"/>
227
+ </message>
228
+
229
+ <message name="Security.IPIntelligencePolicy.set_log_blacklist_whitelist_both_hit_stateRequest">
230
+ <part name="policies" type="tns:Common.StringSequence"/>
231
+ <part name="states" type="tns:Common.EnabledStateSequence"/>
232
+ </message>
233
+ <message name="Security.IPIntelligencePolicy.set_log_blacklist_whitelist_both_hit_stateResponse">
234
+ </message>
235
+
236
+ <message name="Security.IPIntelligencePolicy.get_log_blacklist_whitelist_both_hit_stateRequest">
237
+ <part name="policies" type="tns:Common.StringSequence"/>
238
+ </message>
239
+ <message name="Security.IPIntelligencePolicy.get_log_blacklist_whitelist_both_hit_stateResponse">
240
+ <part name="return" type="tns:Common.EnabledStateSequence"/>
241
+ </message>
242
+
243
+ <message name="Security.IPIntelligencePolicy.set_descriptionRequest">
244
+ <part name="policies" type="tns:Common.StringSequence"/>
245
+ <part name="descriptions" type="tns:Common.StringSequence"/>
246
+ </message>
247
+ <message name="Security.IPIntelligencePolicy.set_descriptionResponse">
248
+ </message>
249
+
250
+ <message name="Security.IPIntelligencePolicy.get_descriptionRequest">
251
+ <part name="policies" type="tns:Common.StringSequence"/>
252
+ </message>
253
+ <message name="Security.IPIntelligencePolicy.get_descriptionResponse">
254
+ <part name="return" type="tns:Common.StringSequence"/>
255
+ </message>
256
+
257
+ <message name="Security.IPIntelligencePolicy.get_blacklist_categoryRequest">
258
+ <part name="policies" type="tns:Common.StringSequence"/>
259
+ </message>
260
+ <message name="Security.IPIntelligencePolicy.get_blacklist_categoryResponse">
261
+ <part name="return" type="tns:Common.StringSequenceSequence"/>
262
+ </message>
263
+
264
+ <message name="Security.IPIntelligencePolicy.add_blacklist_categoryRequest">
265
+ <part name="policies" type="tns:Common.StringSequence"/>
266
+ <part name="categories" type="tns:Common.StringSequenceSequence"/>
267
+ </message>
268
+ <message name="Security.IPIntelligencePolicy.add_blacklist_categoryResponse">
269
+ </message>
270
+
271
+ <message name="Security.IPIntelligencePolicy.remove_blacklist_categoryRequest">
272
+ <part name="policies" type="tns:Common.StringSequence"/>
273
+ <part name="categories" type="tns:Common.StringSequenceSequence"/>
274
+ </message>
275
+ <message name="Security.IPIntelligencePolicy.remove_blacklist_categoryResponse">
276
+ </message>
277
+
278
+ <message name="Security.IPIntelligencePolicy.remove_all_blacklist_categoriesRequest">
279
+ <part name="policies" type="tns:Common.StringSequence"/>
280
+ </message>
281
+ <message name="Security.IPIntelligencePolicy.remove_all_blacklist_categoriesResponse">
282
+ </message>
283
+
284
+ <message name="Security.IPIntelligencePolicy.set_blacklist_category_action_typeRequest">
285
+ <part name="policies" type="tns:Common.StringSequence"/>
286
+ <part name="categories" type="tns:Common.StringSequenceSequence"/>
287
+ <part name="types" type="tns:Security.IPIntelligencePolicy.IPIntelligencePolicyActionTypeSequenceSequence"/>
288
+ </message>
289
+ <message name="Security.IPIntelligencePolicy.set_blacklist_category_action_typeResponse">
290
+ </message>
291
+
292
+ <message name="Security.IPIntelligencePolicy.get_blacklist_category_action_typeRequest">
293
+ <part name="policies" type="tns:Common.StringSequence"/>
294
+ <part name="categories" type="tns:Common.StringSequenceSequence"/>
295
+ </message>
296
+ <message name="Security.IPIntelligencePolicy.get_blacklist_category_action_typeResponse">
297
+ <part name="return" type="tns:Security.IPIntelligencePolicy.IPIntelligencePolicyActionTypeSequenceSequence"/>
298
+ </message>
299
+
300
+ <message name="Security.IPIntelligencePolicy.set_blacklist_category_log_blacklist_hit_only_settingRequest">
301
+ <part name="policies" type="tns:Common.StringSequence"/>
302
+ <part name="categories" type="tns:Common.StringSequenceSequence"/>
303
+ <part name="hits" type="tns:Security.IPIntelligencePolicy.IPIntelligencePolicyBlacklistCategoryLogTypeSequenceSequence"/>
304
+ </message>
305
+ <message name="Security.IPIntelligencePolicy.set_blacklist_category_log_blacklist_hit_only_settingResponse">
306
+ </message>
307
+
308
+ <message name="Security.IPIntelligencePolicy.get_blacklist_category_log_blacklist_hit_only_settingRequest">
309
+ <part name="policies" type="tns:Common.StringSequence"/>
310
+ <part name="categories" type="tns:Common.StringSequenceSequence"/>
311
+ </message>
312
+ <message name="Security.IPIntelligencePolicy.get_blacklist_category_log_blacklist_hit_only_settingResponse">
313
+ <part name="return" type="tns:Security.IPIntelligencePolicy.IPIntelligencePolicyBlacklistCategoryLogTypeSequenceSequence"/>
314
+ </message>
315
+
316
+ <message name="Security.IPIntelligencePolicy.set_blacklist_category_log_blacklist_whitelist_hit_settingRequest">
317
+ <part name="policies" type="tns:Common.StringSequence"/>
318
+ <part name="categories" type="tns:Common.StringSequenceSequence"/>
319
+ <part name="hits" type="tns:Security.IPIntelligencePolicy.IPIntelligencePolicyBlacklistCategoryLogTypeSequenceSequence"/>
320
+ </message>
321
+ <message name="Security.IPIntelligencePolicy.set_blacklist_category_log_blacklist_whitelist_hit_settingResponse">
322
+ </message>
323
+
324
+ <message name="Security.IPIntelligencePolicy.get_blacklist_category_log_blacklist_whitelist_hit_settingRequest">
325
+ <part name="policies" type="tns:Common.StringSequence"/>
326
+ <part name="categories" type="tns:Common.StringSequenceSequence"/>
327
+ </message>
328
+ <message name="Security.IPIntelligencePolicy.get_blacklist_category_log_blacklist_whitelist_hit_settingResponse">
329
+ <part name="return" type="tns:Security.IPIntelligencePolicy.IPIntelligencePolicyBlacklistCategoryLogTypeSequenceSequence"/>
330
+ </message>
331
+
332
+ <message name="Security.IPIntelligencePolicy.set_blacklist_category_descriptionRequest">
333
+ <part name="policies" type="tns:Common.StringSequence"/>
334
+ <part name="categories" type="tns:Common.StringSequenceSequence"/>
335
+ <part name="descriptions" type="tns:Common.StringSequenceSequence"/>
336
+ </message>
337
+ <message name="Security.IPIntelligencePolicy.set_blacklist_category_descriptionResponse">
338
+ </message>
339
+
340
+ <message name="Security.IPIntelligencePolicy.get_blacklist_category_descriptionRequest">
341
+ <part name="policies" type="tns:Common.StringSequence"/>
342
+ <part name="categories" type="tns:Common.StringSequenceSequence"/>
343
+ </message>
344
+ <message name="Security.IPIntelligencePolicy.get_blacklist_category_descriptionResponse">
345
+ <part name="return" type="tns:Common.StringSequenceSequence"/>
346
+ </message>
347
+
348
+ <message name="Security.IPIntelligencePolicy.get_feed_listRequest">
349
+ <part name="policies" type="tns:Common.StringSequence"/>
350
+ </message>
351
+ <message name="Security.IPIntelligencePolicy.get_feed_listResponse">
352
+ <part name="return" type="tns:Common.StringSequenceSequence"/>
353
+ </message>
354
+
355
+ <message name="Security.IPIntelligencePolicy.add_feed_listRequest">
356
+ <part name="policies" type="tns:Common.StringSequence"/>
357
+ <part name="lists" type="tns:Common.StringSequenceSequence"/>
358
+ </message>
359
+ <message name="Security.IPIntelligencePolicy.add_feed_listResponse">
360
+ </message>
361
+
362
+ <message name="Security.IPIntelligencePolicy.remove_feed_listRequest">
363
+ <part name="policies" type="tns:Common.StringSequence"/>
364
+ <part name="lists" type="tns:Common.StringSequenceSequence"/>
365
+ </message>
366
+ <message name="Security.IPIntelligencePolicy.remove_feed_listResponse">
367
+ </message>
368
+
369
+ <message name="Security.IPIntelligencePolicy.remove_all_feed_listsRequest">
370
+ <part name="policies" type="tns:Common.StringSequence"/>
371
+ </message>
372
+ <message name="Security.IPIntelligencePolicy.remove_all_feed_listsResponse">
373
+ </message>
374
+
375
+ <message name="Security.IPIntelligencePolicy.set_blacklist_category_match_directionRequest">
376
+ <part name="policies" type="tns:Common.StringSequence"/>
377
+ <part name="categories" type="tns:Common.StringSequenceSequence"/>
378
+ <part name="directions" type="tns:Security.IPIntelligencePolicy.IPIntelligencePolicyMatchDirectionSequenceSequence"/>
379
+ </message>
380
+ <message name="Security.IPIntelligencePolicy.set_blacklist_category_match_directionResponse">
381
+ </message>
382
+
383
+ <message name="Security.IPIntelligencePolicy.get_blacklist_category_match_directionRequest">
384
+ <part name="policies" type="tns:Common.StringSequence"/>
385
+ <part name="categories" type="tns:Common.StringSequenceSequence"/>
386
+ </message>
387
+ <message name="Security.IPIntelligencePolicy.get_blacklist_category_match_directionResponse">
388
+ <part name="return" type="tns:Security.IPIntelligencePolicy.IPIntelligencePolicyMatchDirectionSequenceSequence"/>
389
+ </message>
390
+
391
+ <message name="Security.IPIntelligencePolicy.get_versionRequest">
392
+ </message>
393
+ <message name="Security.IPIntelligencePolicy.get_versionResponse">
394
+ <part name="return" type="xsd:string"/>
395
+ </message>
396
+
397
+ <!-- portType -->
398
+
399
+ <portType name="Security.IPIntelligencePolicyPortType">
400
+ <operation name="get_list">
401
+ <documentation>
402
+ Gets a list of all policies.
403
+ An IP intelligence policy is comprised of three logical groups
404
+ of settings: list of feed lists, enforcement and logging
405
+ settings per blacklist category, and default enforcement and
406
+ logging settings for blacklist categories.
407
+
408
+ </documentation>
409
+ <input message="tns:Security.IPIntelligencePolicy.get_listRequest"/>
410
+ <output message="tns:Security.IPIntelligencePolicy.get_listResponse"/>
411
+ </operation>
412
+ <operation name="create">
413
+ <documentation>
414
+ Creates a set of policies.
415
+
416
+ </documentation>
417
+ <input message="tns:Security.IPIntelligencePolicy.createRequest"/>
418
+ <output message="tns:Security.IPIntelligencePolicy.createResponse"/>
419
+ </operation>
420
+ <operation name="delete_policy">
421
+ <documentation>
422
+ Deletes the specified policies.
423
+
424
+ </documentation>
425
+ <input message="tns:Security.IPIntelligencePolicy.delete_policyRequest"/>
426
+ <output message="tns:Security.IPIntelligencePolicy.delete_policyResponse"/>
427
+ </operation>
428
+ <operation name="delete_all_policies">
429
+ <documentation>
430
+ Deletes all user defined policies.
431
+
432
+ </documentation>
433
+ <input message="tns:Security.IPIntelligencePolicy.delete_all_policiesRequest"/>
434
+ <output message="tns:Security.IPIntelligencePolicy.delete_all_policiesResponse"/>
435
+ </operation>
436
+ <operation name="set_default_action_type">
437
+ <documentation>
438
+ Sets the default action types for the specified policies.
439
+ Specifies a default enforcement action which will be performed
440
+ on the matched packet unless an implicit action is specified for
441
+ one of the blacklist categories the packet's IP is categorized
442
+ with. If the packet's IP is listed in a white list the action is
443
+ always accept.
444
+
445
+ </documentation>
446
+ <input message="tns:Security.IPIntelligencePolicy.set_default_action_typeRequest"/>
447
+ <output message="tns:Security.IPIntelligencePolicy.set_default_action_typeResponse"/>
448
+ </operation>
449
+ <operation name="get_default_action_type">
450
+ <documentation>
451
+ Gets the default action types for the specified policies.
452
+
453
+ </documentation>
454
+ <input message="tns:Security.IPIntelligencePolicy.get_default_action_typeRequest"/>
455
+ <output message="tns:Security.IPIntelligencePolicy.get_default_action_typeResponse"/>
456
+ </operation>
457
+ <operation name="set_log_blacklist_hit_state">
458
+ <documentation>
459
+ Sets the log blacklist hit states for the specified policies.
460
+ Specifies whether a log message will be generated if packet's
461
+ source IP is categorized with blacklist only (but not whitelist).
462
+
463
+ </documentation>
464
+ <input message="tns:Security.IPIntelligencePolicy.set_log_blacklist_hit_stateRequest"/>
465
+ <output message="tns:Security.IPIntelligencePolicy.set_log_blacklist_hit_stateResponse"/>
466
+ </operation>
467
+ <operation name="get_log_blacklist_hit_state">
468
+ <documentation>
469
+ Gets the log blacklist hit states for the specified policies.
470
+
471
+ </documentation>
472
+ <input message="tns:Security.IPIntelligencePolicy.get_log_blacklist_hit_stateRequest"/>
473
+ <output message="tns:Security.IPIntelligencePolicy.get_log_blacklist_hit_stateResponse"/>
474
+ </operation>
475
+ <operation name="set_log_blacklist_whitelist_both_hit_state">
476
+ <documentation>
477
+ Sets the log blacklist whitelist both hit states for the
478
+ specified policies.
479
+ Specifies whether log message will be generated if packet's
480
+ source IP is categorized with both blacklist and whitelist.
481
+
482
+ </documentation>
483
+ <input message="tns:Security.IPIntelligencePolicy.set_log_blacklist_whitelist_both_hit_stateRequest"/>
484
+ <output message="tns:Security.IPIntelligencePolicy.set_log_blacklist_whitelist_both_hit_stateResponse"/>
485
+ </operation>
486
+ <operation name="get_log_blacklist_whitelist_both_hit_state">
487
+ <documentation>
488
+ Gets the log blacklist whitelist both hit states for the
489
+ specified policies.
490
+
491
+ </documentation>
492
+ <input message="tns:Security.IPIntelligencePolicy.get_log_blacklist_whitelist_both_hit_stateRequest"/>
493
+ <output message="tns:Security.IPIntelligencePolicy.get_log_blacklist_whitelist_both_hit_stateResponse"/>
494
+ </operation>
495
+ <operation name="set_description">
496
+ <documentation>
497
+ Sets the descriptions for the specified policies.
498
+ This is an arbitrary field which can be used for any purpose.
499
+
500
+ </documentation>
501
+ <input message="tns:Security.IPIntelligencePolicy.set_descriptionRequest"/>
502
+ <output message="tns:Security.IPIntelligencePolicy.set_descriptionResponse"/>
503
+ </operation>
504
+ <operation name="get_description">
505
+ <documentation>
506
+ Gets the descriptions for the specified policies.
507
+
508
+ </documentation>
509
+ <input message="tns:Security.IPIntelligencePolicy.get_descriptionRequest"/>
510
+ <output message="tns:Security.IPIntelligencePolicy.get_descriptionResponse"/>
511
+ </operation>
512
+ <operation name="get_blacklist_category">
513
+ <documentation>
514
+ Gets categories for the specified policies.
515
+ You can add or remove blacklist categories for the policy. Each
516
+ category specifies the action, the log message for blacklist hit
517
+ only setting, and the log message for blacklist and whitelist
518
+ both hit setting.
519
+
520
+ </documentation>
521
+ <input message="tns:Security.IPIntelligencePolicy.get_blacklist_categoryRequest"/>
522
+ <output message="tns:Security.IPIntelligencePolicy.get_blacklist_categoryResponse"/>
523
+ </operation>
524
+ <operation name="add_blacklist_category">
525
+ <documentation>
526
+ Adds a list of categories for the specified policies.
527
+
528
+ </documentation>
529
+ <input message="tns:Security.IPIntelligencePolicy.add_blacklist_categoryRequest"/>
530
+ <output message="tns:Security.IPIntelligencePolicy.add_blacklist_categoryResponse"/>
531
+ </operation>
532
+ <operation name="remove_blacklist_category">
533
+ <documentation>
534
+ Removes a list of categories from the specified policies.
535
+
536
+ </documentation>
537
+ <input message="tns:Security.IPIntelligencePolicy.remove_blacklist_categoryRequest"/>
538
+ <output message="tns:Security.IPIntelligencePolicy.remove_blacklist_categoryResponse"/>
539
+ </operation>
540
+ <operation name="remove_all_blacklist_categories">
541
+ <documentation>
542
+ Removes all categories from the specified policies.
543
+
544
+ </documentation>
545
+ <input message="tns:Security.IPIntelligencePolicy.remove_all_blacklist_categoriesRequest"/>
546
+ <output message="tns:Security.IPIntelligencePolicy.remove_all_blacklist_categoriesResponse"/>
547
+ </operation>
548
+ <operation name="set_blacklist_category_action_type">
549
+ <documentation>
550
+ Sets the action types for the specified blacklist categories.
551
+ Specifies what enforcement action will be applied if the packet
552
+ is categorized with this blacklist category. If the packet is
553
+ categorized with more than one blacklist the most restrictive
554
+ action will be applied.
555
+
556
+ </documentation>
557
+ <input message="tns:Security.IPIntelligencePolicy.set_blacklist_category_action_typeRequest"/>
558
+ <output message="tns:Security.IPIntelligencePolicy.set_blacklist_category_action_typeResponse"/>
559
+ </operation>
560
+ <operation name="get_blacklist_category_action_type">
561
+ <documentation>
562
+ Gets the action types for the specified blacklist categories.
563
+
564
+ </documentation>
565
+ <input message="tns:Security.IPIntelligencePolicy.get_blacklist_category_action_typeRequest"/>
566
+ <output message="tns:Security.IPIntelligencePolicy.get_blacklist_category_action_typeResponse"/>
567
+ </operation>
568
+ <operation name="set_blacklist_category_log_blacklist_hit_only_setting">
569
+ <documentation>
570
+ Sets the log blacklist hit only settings for the specified
571
+ blacklist categories.
572
+ Specifies if a log message will be generated if the packet is
573
+ categorized with this blacklist and no whitelists includes this
574
+ packet's IP.
575
+
576
+ </documentation>
577
+ <input message="tns:Security.IPIntelligencePolicy.set_blacklist_category_log_blacklist_hit_only_settingRequest"/>
578
+ <output message="tns:Security.IPIntelligencePolicy.set_blacklist_category_log_blacklist_hit_only_settingResponse"/>
579
+ </operation>
580
+ <operation name="get_blacklist_category_log_blacklist_hit_only_setting">
581
+ <documentation>
582
+ Gets the log blacklist hit only settings for the specified
583
+ blacklist categories.
584
+
585
+ </documentation>
586
+ <input message="tns:Security.IPIntelligencePolicy.get_blacklist_category_log_blacklist_hit_only_settingRequest"/>
587
+ <output message="tns:Security.IPIntelligencePolicy.get_blacklist_category_log_blacklist_hit_only_settingResponse"/>
588
+ </operation>
589
+ <operation name="set_blacklist_category_log_blacklist_whitelist_hit_setting">
590
+ <documentation>
591
+ Sets the log blacklist whitelist hit settings for the specified
592
+ blacklist categories.
593
+ Specifies if a log message will be generated if the packet is
594
+ categorized with this blacklist and the packet's IP is listed in
595
+ a whitelist.
596
+
597
+ </documentation>
598
+ <input message="tns:Security.IPIntelligencePolicy.set_blacklist_category_log_blacklist_whitelist_hit_settingRequest"/>
599
+ <output message="tns:Security.IPIntelligencePolicy.set_blacklist_category_log_blacklist_whitelist_hit_settingResponse"/>
600
+ </operation>
601
+ <operation name="get_blacklist_category_log_blacklist_whitelist_hit_setting">
602
+ <documentation>
603
+ Gets the log blacklist whitelist hit settings for the specified
604
+ blacklist categories.
605
+
606
+ </documentation>
607
+ <input message="tns:Security.IPIntelligencePolicy.get_blacklist_category_log_blacklist_whitelist_hit_settingRequest"/>
608
+ <output message="tns:Security.IPIntelligencePolicy.get_blacklist_category_log_blacklist_whitelist_hit_settingResponse"/>
609
+ </operation>
610
+ <operation name="set_blacklist_category_description">
611
+ <documentation>
612
+ Sets the descriptions for the specified blacklist categories.
613
+ This is an arbitrary field which can be used for any purpose.
614
+
615
+ </documentation>
616
+ <input message="tns:Security.IPIntelligencePolicy.set_blacklist_category_descriptionRequest"/>
617
+ <output message="tns:Security.IPIntelligencePolicy.set_blacklist_category_descriptionResponse"/>
618
+ </operation>
619
+ <operation name="get_blacklist_category_description">
620
+ <documentation>
621
+ Gets the descriptions for the specified blacklist categories.
622
+
623
+ </documentation>
624
+ <input message="tns:Security.IPIntelligencePolicy.get_blacklist_category_descriptionRequest"/>
625
+ <output message="tns:Security.IPIntelligencePolicy.get_blacklist_category_descriptionResponse"/>
626
+ </operation>
627
+ <operation name="get_feed_list">
628
+ <documentation>
629
+ Gets feed lists for the specified policies.
630
+ You can add or remove feed lists for the policy. A feed list is
631
+ a list of URL feeds.
632
+
633
+ </documentation>
634
+ <input message="tns:Security.IPIntelligencePolicy.get_feed_listRequest"/>
635
+ <output message="tns:Security.IPIntelligencePolicy.get_feed_listResponse"/>
636
+ </operation>
637
+ <operation name="add_feed_list">
638
+ <documentation>
639
+ Adds a list of feed lists for the specified policies.
640
+
641
+ </documentation>
642
+ <input message="tns:Security.IPIntelligencePolicy.add_feed_listRequest"/>
643
+ <output message="tns:Security.IPIntelligencePolicy.add_feed_listResponse"/>
644
+ </operation>
645
+ <operation name="remove_feed_list">
646
+ <documentation>
647
+ Removes a list of feed lists from the specified policies.
648
+
649
+ </documentation>
650
+ <input message="tns:Security.IPIntelligencePolicy.remove_feed_listRequest"/>
651
+ <output message="tns:Security.IPIntelligencePolicy.remove_feed_listResponse"/>
652
+ </operation>
653
+ <operation name="remove_all_feed_lists">
654
+ <documentation>
655
+ Removes all feed lists from the specified policies.
656
+
657
+ </documentation>
658
+ <input message="tns:Security.IPIntelligencePolicy.remove_all_feed_listsRequest"/>
659
+ <output message="tns:Security.IPIntelligencePolicy.remove_all_feed_listsResponse"/>
660
+ </operation>
661
+ <operation name="set_blacklist_category_match_direction">
662
+ <documentation>
663
+ Sets the match directions for the specified blacklist categories.
664
+ Specifies the match direction for this blacklist category within
665
+ this policy. This can be set to source, destination, or both.
666
+
667
+ </documentation>
668
+ <input message="tns:Security.IPIntelligencePolicy.set_blacklist_category_match_directionRequest"/>
669
+ <output message="tns:Security.IPIntelligencePolicy.set_blacklist_category_match_directionResponse"/>
670
+ </operation>
671
+ <operation name="get_blacklist_category_match_direction">
672
+ <documentation>
673
+ Gets the match directions for the specified blacklist categories.
674
+
675
+ </documentation>
676
+ <input message="tns:Security.IPIntelligencePolicy.get_blacklist_category_match_directionRequest"/>
677
+ <output message="tns:Security.IPIntelligencePolicy.get_blacklist_category_match_directionResponse"/>
678
+ </operation>
679
+ <operation name="get_version">
680
+ <documentation>
681
+ Gets the version information for this interface.
682
+
683
+ </documentation>
684
+ <input message="tns:Security.IPIntelligencePolicy.get_versionRequest"/>
685
+ <output message="tns:Security.IPIntelligencePolicy.get_versionResponse"/>
686
+ </operation>
687
+ </portType>
688
+
689
+ <!-- binding -->
690
+
691
+ <binding name="Security.IPIntelligencePolicyBinding" type="tns:Security.IPIntelligencePolicyPortType">
692
+ <soap:binding style="rpc" transport="http://schemas.xmlsoap.org/soap/http"/>
693
+ <operation name="get_list">
694
+ <documentation>
695
+ Gets a list of all policies.
696
+ An IP intelligence policy is comprised of three logical groups
697
+ of settings: list of feed lists, enforcement and logging
698
+ settings per blacklist category, and default enforcement and
699
+ logging settings for blacklist categories.
700
+
701
+ </documentation>
702
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
703
+ <input>
704
+ <soap:body
705
+ use="encoded"
706
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
707
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
708
+ </input>
709
+ <output>
710
+ <soap:body
711
+ use="encoded"
712
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
713
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
714
+ </output>
715
+ </operation>
716
+
717
+ <operation name="create">
718
+ <documentation>
719
+ Creates a set of policies.
720
+
721
+ </documentation>
722
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
723
+ <input>
724
+ <soap:body
725
+ use="encoded"
726
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
727
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
728
+ </input>
729
+ <output>
730
+ <soap:body
731
+ use="encoded"
732
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
733
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
734
+ </output>
735
+ </operation>
736
+
737
+ <operation name="delete_policy">
738
+ <documentation>
739
+ Deletes the specified policies.
740
+
741
+ </documentation>
742
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
743
+ <input>
744
+ <soap:body
745
+ use="encoded"
746
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
747
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
748
+ </input>
749
+ <output>
750
+ <soap:body
751
+ use="encoded"
752
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
753
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
754
+ </output>
755
+ </operation>
756
+
757
+ <operation name="delete_all_policies">
758
+ <documentation>
759
+ Deletes all user defined policies.
760
+
761
+ </documentation>
762
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
763
+ <input>
764
+ <soap:body
765
+ use="encoded"
766
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
767
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
768
+ </input>
769
+ <output>
770
+ <soap:body
771
+ use="encoded"
772
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
773
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
774
+ </output>
775
+ </operation>
776
+
777
+ <operation name="set_default_action_type">
778
+ <documentation>
779
+ Sets the default action types for the specified policies.
780
+ Specifies a default enforcement action which will be performed
781
+ on the matched packet unless an implicit action is specified for
782
+ one of the blacklist categories the packet's IP is categorized
783
+ with. If the packet's IP is listed in a white list the action is
784
+ always accept.
785
+
786
+ </documentation>
787
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
788
+ <input>
789
+ <soap:body
790
+ use="encoded"
791
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
792
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
793
+ </input>
794
+ <output>
795
+ <soap:body
796
+ use="encoded"
797
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
798
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
799
+ </output>
800
+ </operation>
801
+
802
+ <operation name="get_default_action_type">
803
+ <documentation>
804
+ Gets the default action types for the specified policies.
805
+
806
+ </documentation>
807
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
808
+ <input>
809
+ <soap:body
810
+ use="encoded"
811
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
812
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
813
+ </input>
814
+ <output>
815
+ <soap:body
816
+ use="encoded"
817
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
818
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
819
+ </output>
820
+ </operation>
821
+
822
+ <operation name="set_log_blacklist_hit_state">
823
+ <documentation>
824
+ Sets the log blacklist hit states for the specified policies.
825
+ Specifies whether a log message will be generated if packet's
826
+ source IP is categorized with blacklist only (but not whitelist).
827
+
828
+ </documentation>
829
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
830
+ <input>
831
+ <soap:body
832
+ use="encoded"
833
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
834
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
835
+ </input>
836
+ <output>
837
+ <soap:body
838
+ use="encoded"
839
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
840
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
841
+ </output>
842
+ </operation>
843
+
844
+ <operation name="get_log_blacklist_hit_state">
845
+ <documentation>
846
+ Gets the log blacklist hit states for the specified policies.
847
+
848
+ </documentation>
849
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
850
+ <input>
851
+ <soap:body
852
+ use="encoded"
853
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
854
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
855
+ </input>
856
+ <output>
857
+ <soap:body
858
+ use="encoded"
859
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
860
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
861
+ </output>
862
+ </operation>
863
+
864
+ <operation name="set_log_blacklist_whitelist_both_hit_state">
865
+ <documentation>
866
+ Sets the log blacklist whitelist both hit states for the
867
+ specified policies.
868
+ Specifies whether log message will be generated if packet's
869
+ source IP is categorized with both blacklist and whitelist.
870
+
871
+ </documentation>
872
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
873
+ <input>
874
+ <soap:body
875
+ use="encoded"
876
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
877
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
878
+ </input>
879
+ <output>
880
+ <soap:body
881
+ use="encoded"
882
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
883
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
884
+ </output>
885
+ </operation>
886
+
887
+ <operation name="get_log_blacklist_whitelist_both_hit_state">
888
+ <documentation>
889
+ Gets the log blacklist whitelist both hit states for the
890
+ specified policies.
891
+
892
+ </documentation>
893
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
894
+ <input>
895
+ <soap:body
896
+ use="encoded"
897
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
898
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
899
+ </input>
900
+ <output>
901
+ <soap:body
902
+ use="encoded"
903
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
904
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
905
+ </output>
906
+ </operation>
907
+
908
+ <operation name="set_description">
909
+ <documentation>
910
+ Sets the descriptions for the specified policies.
911
+ This is an arbitrary field which can be used for any purpose.
912
+
913
+ </documentation>
914
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
915
+ <input>
916
+ <soap:body
917
+ use="encoded"
918
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
919
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
920
+ </input>
921
+ <output>
922
+ <soap:body
923
+ use="encoded"
924
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
925
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
926
+ </output>
927
+ </operation>
928
+
929
+ <operation name="get_description">
930
+ <documentation>
931
+ Gets the descriptions for the specified policies.
932
+
933
+ </documentation>
934
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
935
+ <input>
936
+ <soap:body
937
+ use="encoded"
938
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
939
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
940
+ </input>
941
+ <output>
942
+ <soap:body
943
+ use="encoded"
944
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
945
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
946
+ </output>
947
+ </operation>
948
+
949
+ <operation name="get_blacklist_category">
950
+ <documentation>
951
+ Gets categories for the specified policies.
952
+ You can add or remove blacklist categories for the policy. Each
953
+ category specifies the action, the log message for blacklist hit
954
+ only setting, and the log message for blacklist and whitelist
955
+ both hit setting.
956
+
957
+ </documentation>
958
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
959
+ <input>
960
+ <soap:body
961
+ use="encoded"
962
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
963
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
964
+ </input>
965
+ <output>
966
+ <soap:body
967
+ use="encoded"
968
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
969
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
970
+ </output>
971
+ </operation>
972
+
973
+ <operation name="add_blacklist_category">
974
+ <documentation>
975
+ Adds a list of categories for the specified policies.
976
+
977
+ </documentation>
978
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
979
+ <input>
980
+ <soap:body
981
+ use="encoded"
982
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
983
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
984
+ </input>
985
+ <output>
986
+ <soap:body
987
+ use="encoded"
988
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
989
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
990
+ </output>
991
+ </operation>
992
+
993
+ <operation name="remove_blacklist_category">
994
+ <documentation>
995
+ Removes a list of categories from the specified policies.
996
+
997
+ </documentation>
998
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
999
+ <input>
1000
+ <soap:body
1001
+ use="encoded"
1002
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1003
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1004
+ </input>
1005
+ <output>
1006
+ <soap:body
1007
+ use="encoded"
1008
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1009
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1010
+ </output>
1011
+ </operation>
1012
+
1013
+ <operation name="remove_all_blacklist_categories">
1014
+ <documentation>
1015
+ Removes all categories from the specified policies.
1016
+
1017
+ </documentation>
1018
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
1019
+ <input>
1020
+ <soap:body
1021
+ use="encoded"
1022
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1023
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1024
+ </input>
1025
+ <output>
1026
+ <soap:body
1027
+ use="encoded"
1028
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1029
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1030
+ </output>
1031
+ </operation>
1032
+
1033
+ <operation name="set_blacklist_category_action_type">
1034
+ <documentation>
1035
+ Sets the action types for the specified blacklist categories.
1036
+ Specifies what enforcement action will be applied if the packet
1037
+ is categorized with this blacklist category. If the packet is
1038
+ categorized with more than one blacklist the most restrictive
1039
+ action will be applied.
1040
+
1041
+ </documentation>
1042
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
1043
+ <input>
1044
+ <soap:body
1045
+ use="encoded"
1046
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1047
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1048
+ </input>
1049
+ <output>
1050
+ <soap:body
1051
+ use="encoded"
1052
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1053
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1054
+ </output>
1055
+ </operation>
1056
+
1057
+ <operation name="get_blacklist_category_action_type">
1058
+ <documentation>
1059
+ Gets the action types for the specified blacklist categories.
1060
+
1061
+ </documentation>
1062
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
1063
+ <input>
1064
+ <soap:body
1065
+ use="encoded"
1066
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1067
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1068
+ </input>
1069
+ <output>
1070
+ <soap:body
1071
+ use="encoded"
1072
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1073
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1074
+ </output>
1075
+ </operation>
1076
+
1077
+ <operation name="set_blacklist_category_log_blacklist_hit_only_setting">
1078
+ <documentation>
1079
+ Sets the log blacklist hit only settings for the specified
1080
+ blacklist categories.
1081
+ Specifies if a log message will be generated if the packet is
1082
+ categorized with this blacklist and no whitelists includes this
1083
+ packet's IP.
1084
+
1085
+ </documentation>
1086
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
1087
+ <input>
1088
+ <soap:body
1089
+ use="encoded"
1090
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1091
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1092
+ </input>
1093
+ <output>
1094
+ <soap:body
1095
+ use="encoded"
1096
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1097
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1098
+ </output>
1099
+ </operation>
1100
+
1101
+ <operation name="get_blacklist_category_log_blacklist_hit_only_setting">
1102
+ <documentation>
1103
+ Gets the log blacklist hit only settings for the specified
1104
+ blacklist categories.
1105
+
1106
+ </documentation>
1107
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
1108
+ <input>
1109
+ <soap:body
1110
+ use="encoded"
1111
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1112
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1113
+ </input>
1114
+ <output>
1115
+ <soap:body
1116
+ use="encoded"
1117
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1118
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1119
+ </output>
1120
+ </operation>
1121
+
1122
+ <operation name="set_blacklist_category_log_blacklist_whitelist_hit_setting">
1123
+ <documentation>
1124
+ Sets the log blacklist whitelist hit settings for the specified
1125
+ blacklist categories.
1126
+ Specifies if a log message will be generated if the packet is
1127
+ categorized with this blacklist and the packet's IP is listed in
1128
+ a whitelist.
1129
+
1130
+ </documentation>
1131
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
1132
+ <input>
1133
+ <soap:body
1134
+ use="encoded"
1135
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1136
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1137
+ </input>
1138
+ <output>
1139
+ <soap:body
1140
+ use="encoded"
1141
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1142
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1143
+ </output>
1144
+ </operation>
1145
+
1146
+ <operation name="get_blacklist_category_log_blacklist_whitelist_hit_setting">
1147
+ <documentation>
1148
+ Gets the log blacklist whitelist hit settings for the specified
1149
+ blacklist categories.
1150
+
1151
+ </documentation>
1152
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
1153
+ <input>
1154
+ <soap:body
1155
+ use="encoded"
1156
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1157
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1158
+ </input>
1159
+ <output>
1160
+ <soap:body
1161
+ use="encoded"
1162
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1163
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1164
+ </output>
1165
+ </operation>
1166
+
1167
+ <operation name="set_blacklist_category_description">
1168
+ <documentation>
1169
+ Sets the descriptions for the specified blacklist categories.
1170
+ This is an arbitrary field which can be used for any purpose.
1171
+
1172
+ </documentation>
1173
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
1174
+ <input>
1175
+ <soap:body
1176
+ use="encoded"
1177
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1178
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1179
+ </input>
1180
+ <output>
1181
+ <soap:body
1182
+ use="encoded"
1183
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1184
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1185
+ </output>
1186
+ </operation>
1187
+
1188
+ <operation name="get_blacklist_category_description">
1189
+ <documentation>
1190
+ Gets the descriptions for the specified blacklist categories.
1191
+
1192
+ </documentation>
1193
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
1194
+ <input>
1195
+ <soap:body
1196
+ use="encoded"
1197
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1198
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1199
+ </input>
1200
+ <output>
1201
+ <soap:body
1202
+ use="encoded"
1203
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1204
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1205
+ </output>
1206
+ </operation>
1207
+
1208
+ <operation name="get_feed_list">
1209
+ <documentation>
1210
+ Gets feed lists for the specified policies.
1211
+ You can add or remove feed lists for the policy. A feed list is
1212
+ a list of URL feeds.
1213
+
1214
+ </documentation>
1215
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
1216
+ <input>
1217
+ <soap:body
1218
+ use="encoded"
1219
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1220
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1221
+ </input>
1222
+ <output>
1223
+ <soap:body
1224
+ use="encoded"
1225
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1226
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1227
+ </output>
1228
+ </operation>
1229
+
1230
+ <operation name="add_feed_list">
1231
+ <documentation>
1232
+ Adds a list of feed lists for the specified policies.
1233
+
1234
+ </documentation>
1235
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
1236
+ <input>
1237
+ <soap:body
1238
+ use="encoded"
1239
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1240
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1241
+ </input>
1242
+ <output>
1243
+ <soap:body
1244
+ use="encoded"
1245
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1246
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1247
+ </output>
1248
+ </operation>
1249
+
1250
+ <operation name="remove_feed_list">
1251
+ <documentation>
1252
+ Removes a list of feed lists from the specified policies.
1253
+
1254
+ </documentation>
1255
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
1256
+ <input>
1257
+ <soap:body
1258
+ use="encoded"
1259
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1260
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1261
+ </input>
1262
+ <output>
1263
+ <soap:body
1264
+ use="encoded"
1265
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1266
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1267
+ </output>
1268
+ </operation>
1269
+
1270
+ <operation name="remove_all_feed_lists">
1271
+ <documentation>
1272
+ Removes all feed lists from the specified policies.
1273
+
1274
+ </documentation>
1275
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
1276
+ <input>
1277
+ <soap:body
1278
+ use="encoded"
1279
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1280
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1281
+ </input>
1282
+ <output>
1283
+ <soap:body
1284
+ use="encoded"
1285
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1286
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1287
+ </output>
1288
+ </operation>
1289
+
1290
+ <operation name="set_blacklist_category_match_direction">
1291
+ <documentation>
1292
+ Sets the match directions for the specified blacklist categories.
1293
+ Specifies the match direction for this blacklist category within
1294
+ this policy. This can be set to source, destination, or both.
1295
+
1296
+ </documentation>
1297
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
1298
+ <input>
1299
+ <soap:body
1300
+ use="encoded"
1301
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1302
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1303
+ </input>
1304
+ <output>
1305
+ <soap:body
1306
+ use="encoded"
1307
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1308
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1309
+ </output>
1310
+ </operation>
1311
+
1312
+ <operation name="get_blacklist_category_match_direction">
1313
+ <documentation>
1314
+ Gets the match directions for the specified blacklist categories.
1315
+
1316
+ </documentation>
1317
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
1318
+ <input>
1319
+ <soap:body
1320
+ use="encoded"
1321
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1322
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1323
+ </input>
1324
+ <output>
1325
+ <soap:body
1326
+ use="encoded"
1327
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1328
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1329
+ </output>
1330
+ </operation>
1331
+
1332
+ <operation name="get_version">
1333
+ <documentation>
1334
+ Gets the version information for this interface.
1335
+
1336
+ </documentation>
1337
+ <soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
1338
+ <input>
1339
+ <soap:body
1340
+ use="encoded"
1341
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1342
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1343
+ </input>
1344
+ <output>
1345
+ <soap:body
1346
+ use="encoded"
1347
+ namespace="urn:iControl:Security/IPIntelligencePolicy"
1348
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
1349
+ </output>
1350
+ </operation>
1351
+ </binding>
1352
+
1353
+ <!-- service -->
1354
+
1355
+ <service name="Security.IPIntelligencePolicy">
1356
+ <documentation>
1357
+ The IPIntelligencePolicy interface enables you to manipulate an
1358
+ IP Intelligence policy. The IP Intelligence policy is a
1359
+ functionally enriched generalization of the IP Intelligence
1360
+ profile (the latter has been immediately deprecated in this
1361
+ release). As opposed to the deprecated profile, policy can be
1362
+ applied to route domains and globally in addition to virtual
1363
+ servers. When packet passes through the system first the global
1364
+ policy is applied, then route domain's one and then virtual's
1365
+ one provided the configured policies are applicable to the
1366
+ packet's source IP. In addition to the predefined blacklist
1367
+ categories (see the IPIntelligenceBlacklistCategory interface)
1368
+ and 3rd party integrated IP reputation database coming with the
1369
+ system the IP Intelligence policy provides an ability to
1370
+ configure dynamic IP whitelists and blacklists downloaded from
1371
+ external web feeds (see IPIntelligenceFeedList interface). The
1372
+ IP Intelligence policy is comprised of three logical groups of
1373
+ settings: 1) List of feed lists create the union set of IP
1374
+ addresses/subnets with their blacklist/whitelist categorization.
1375
+ The policy is applied on the packet only if packet's source IP
1376
+ is found in that set. 2. Enforcement and logging settings per
1377
+ blacklist category. If the policy applies to the packet and the
1378
+ packet's source IP's blacklist category is explicitly confgured
1379
+ in the policy, the configuration settings will be applied to
1380
+ that packet. When the packet's source IP is categorized with
1381
+ more than one category the most restrictive action and logging
1382
+ settings will apply. 3. Default policy enforcement and logging
1383
+ settings are used when the packet to which the policy applied is
1384
+ categorized with the blacklist which isn't explicitly configured
1385
+ in this policy or it is configured and the corresponding setting
1386
+ is set with the option "use policy setting".
1387
+
1388
+ </documentation>
1389
+ <port name="Security.IPIntelligencePolicyPort" binding="tns:Security.IPIntelligencePolicyBinding">
1390
+ <soap:address location="https://url_to_service"/>
1391
+ </port>
1392
+ </service>
1393
+ </definitions>