f5-icontrol 0.1.6 → 0.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +3 -0
- data/README.md +0 -3
- data/lib/f5/icontrol/api.rb +1 -1
- data/lib/f5/icontrol/version.rb +1 -1
- data/lib/wsdl/ASM.LoggingProfile.wsdl +1 -1
- data/lib/wsdl/ASM.ObjectParams.wsdl +1 -1
- data/lib/wsdl/ASM.PSMProfile.wsdl +1 -1
- data/lib/wsdl/ASM.Policy.wsdl +106 -1
- data/lib/wsdl/ASM.PolicyGroup.wsdl +1 -1
- data/lib/wsdl/ASM.SystemConfiguration.wsdl +66 -1
- data/lib/wsdl/ASM.WebApplication.wsdl +6 -1
- data/lib/wsdl/ASM.WebApplicationGroup.wsdl +1 -1
- data/lib/wsdl/Classification.Application.wsdl +1 -1
- data/lib/wsdl/Classification.Category.wsdl +1 -1
- data/lib/wsdl/Classification.SignatureDefinition.wsdl +30 -30
- data/lib/wsdl/Classification.SignatureUpdateSchedule.wsdl +59 -5
- data/lib/wsdl/Classification.SignatureVersion.wsdl +1 -1
- data/lib/wsdl/GlobalLB.Application.wsdl +211 -3
- data/lib/wsdl/GlobalLB.DNSSECKey.wsdl +1 -1
- data/lib/wsdl/GlobalLB.DNSSECZone.wsdl +7930 -17
- data/lib/wsdl/GlobalLB.DataCenter.wsdl +1841 -1
- data/lib/wsdl/GlobalLB.Globals.wsdl +272 -27
- data/lib/wsdl/GlobalLB.Link.wsdl +1841 -1
- data/lib/wsdl/GlobalLB.Monitor.wsdl +11 -1
- data/lib/wsdl/GlobalLB.Pool.wsdl +2752 -68
- data/lib/wsdl/GlobalLB.PoolMember.wsdl +1844 -2
- data/lib/wsdl/GlobalLB.PoolV2.wsdl +13122 -0
- data/lib/wsdl/GlobalLB.ProberPool.wsdl +1841 -1
- data/lib/wsdl/GlobalLB.Region.wsdl +1 -1
- data/lib/wsdl/GlobalLB.Rule.wsdl +1841 -1
- data/lib/wsdl/GlobalLB.Server.wsdl +1841 -1
- data/lib/wsdl/GlobalLB.Topology.wsdl +1 -1
- data/lib/wsdl/GlobalLB.VirtualServer.wsdl +1841 -1
- data/lib/wsdl/GlobalLB.VirtualServerV2.wsdl +1841 -1
- data/lib/wsdl/GlobalLB.WideIP.wsdl +2478 -166
- data/lib/wsdl/GlobalLB.WideIPV2.wsdl +10494 -0
- data/lib/wsdl/LTConfig.Class.wsdl +1 -1
- data/lib/wsdl/LTConfig.Field.wsdl +1 -1
- data/lib/wsdl/LocalLB.ALGLogProfile.wsdl +1479 -0
- data/lib/wsdl/LocalLB.Class.wsdl +1 -1
- data/lib/wsdl/LocalLB.ContentPolicy.wsdl +7021 -0
- data/lib/wsdl/LocalLB.ContentPolicyStrategy.wsdl +1264 -0
- data/lib/wsdl/LocalLB.DNSCache.wsdl +3023 -474
- data/lib/wsdl/LocalLB.DNSExpress.wsdl +2282 -251
- data/lib/wsdl/LocalLB.DNSGlobals.wsdl +1 -1
- data/lib/wsdl/LocalLB.DNSServer.wsdl +8213 -0
- data/lib/wsdl/LocalLB.DNSTSIGKey.wsdl +400 -0
- data/lib/wsdl/LocalLB.DNSZone.wsdl +8744 -0
- data/lib/wsdl/LocalLB.DataGroupFile.wsdl +1 -1
- data/lib/wsdl/LocalLB.FlowEvictionPolicy.wsdl +10188 -0
- data/lib/wsdl/LocalLB.LSNLogProfile.wsdl +1257 -0
- data/lib/wsdl/LocalLB.LSNPool.wsdl +3454 -667
- data/lib/wsdl/LocalLB.MessageRoutingPeer.wsdl +803 -0
- data/lib/wsdl/LocalLB.MessageRoutingSIPRoute.wsdl +838 -0
- data/lib/wsdl/LocalLB.MessageRoutingTransportConfig.wsdl +1153 -0
- data/lib/wsdl/LocalLB.Monitor.wsdl +429 -1
- data/lib/wsdl/LocalLB.NAT.wsdl +1841 -1
- data/lib/wsdl/LocalLB.NATV2.wsdl +1841 -1
- data/lib/wsdl/LocalLB.NodeAddress.wsdl +1841 -1
- data/lib/wsdl/LocalLB.NodeAddressV2.wsdl +2165 -251
- data/lib/wsdl/LocalLB.OCSPStaplingParameters.wsdl +1537 -0
- data/lib/wsdl/LocalLB.Pool.wsdl +5568 -2423
- data/lib/wsdl/LocalLB.PoolMember.wsdl +1841 -1
- data/lib/wsdl/LocalLB.ProfileAnalytics.wsdl +364 -1
- data/lib/wsdl/LocalLB.ProfileAuth.wsdl +1846 -1
- data/lib/wsdl/LocalLB.ProfileClassification.wsdl +1 -1
- data/lib/wsdl/LocalLB.ProfileClientLDAP.wsdl +8361 -0
- data/lib/wsdl/LocalLB.ProfileClientSSL.wsdl +6168 -1858
- data/lib/wsdl/LocalLB.ProfileDNS.wsdl +2582 -310
- data/lib/wsdl/LocalLB.ProfileDNSLogging.wsdl +1 -1
- data/lib/wsdl/LocalLB.ProfileDiameter.wsdl +1841 -1
- data/lib/wsdl/LocalLB.ProfileDiameterEndpoint.wsdl +1841 -1
- data/lib/wsdl/LocalLB.ProfileFIX.wsdl +8992 -0
- data/lib/wsdl/LocalLB.ProfileFTP.wsdl +2399 -276
- data/lib/wsdl/LocalLB.ProfileFastHttp.wsdl +1846 -1
- data/lib/wsdl/LocalLB.ProfileFastL4.wsdl +2476 -244
- data/lib/wsdl/LocalLB.ProfileHttp.wsdl +4569 -1825
- data/lib/wsdl/LocalLB.ProfileHttpClass.wsdl +1841 -1
- data/lib/wsdl/LocalLB.ProfileHttpCompression.wsdl +1841 -1
- data/lib/wsdl/LocalLB.ProfileICAP.wsdl +1841 -1
- data/lib/wsdl/LocalLB.ProfileIIOP.wsdl +1841 -1
- data/lib/wsdl/LocalLB.ProfileOneConnect.wsdl +2332 -256
- data/lib/wsdl/LocalLB.ProfilePCP.wsdl +1499 -0
- data/lib/wsdl/LocalLB.ProfilePPTP.wsdl +8423 -0
- data/lib/wsdl/LocalLB.ProfilePersistence.wsdl +466 -31
- data/lib/wsdl/LocalLB.ProfileRADIUS.wsdl +1841 -1
- data/lib/wsdl/LocalLB.ProfileRTSP.wsdl +2193 -159
- data/lib/wsdl/LocalLB.ProfileRequestAdapt.wsdl +1841 -1
- data/lib/wsdl/LocalLB.ProfileRequestLogging.wsdl +1 -1
- data/lib/wsdl/LocalLB.ProfileResponseAdapt.wsdl +1841 -1
- data/lib/wsdl/LocalLB.ProfileSCTP.wsdl +2918 -463
- data/lib/wsdl/LocalLB.ProfileSIP.wsdl +2189 -155
- data/lib/wsdl/LocalLB.ProfileSIPRouter.wsdl +9215 -0
- data/lib/wsdl/LocalLB.ProfileSIPSession.wsdl +9655 -0
- data/lib/wsdl/LocalLB.ProfileSMTPS.wsdl +8361 -0
- data/lib/wsdl/LocalLB.ProfileSPDY.wsdl +1870 -25
- data/lib/wsdl/LocalLB.ProfileSPM.wsdl +1 -1
- data/lib/wsdl/LocalLB.ProfileServerLDAP.wsdl +8361 -0
- data/lib/wsdl/LocalLB.ProfileServerSSL.wsdl +2729 -230
- data/lib/wsdl/LocalLB.ProfileStream.wsdl +1841 -1
- data/lib/wsdl/LocalLB.ProfileTCP.wsdl +3235 -309
- data/lib/wsdl/LocalLB.ProfileTCPAnalytics.wsdl +1466 -0
- data/lib/wsdl/LocalLB.ProfileTFTP.wsdl +8544 -0
- data/lib/wsdl/LocalLB.ProfileUDP.wsdl +1841 -1
- data/lib/wsdl/LocalLB.ProfileUserStatistic.wsdl +1 -1
- data/lib/wsdl/LocalLB.ProfileWebAcceleration.wsdl +1841 -1
- data/lib/wsdl/LocalLB.ProfileXML.wsdl +1841 -1
- data/lib/wsdl/LocalLB.RAMCacheInformation.wsdl +1 -1
- data/lib/wsdl/LocalLB.RateClass.wsdl +2192 -132
- data/lib/wsdl/LocalLB.Rule.wsdl +1841 -1
- data/lib/wsdl/LocalLB.SNAT.wsdl +1841 -1
- data/lib/wsdl/LocalLB.SNATPool.wsdl +1841 -1
- data/lib/wsdl/LocalLB.SNATPoolMember.wsdl +1841 -1
- data/lib/wsdl/LocalLB.SNATTranslationAddress.wsdl +1841 -1
- data/lib/wsdl/LocalLB.SNATTranslationAddressV2.wsdl +1841 -1
- data/lib/wsdl/LocalLB.VirtualAddress.wsdl +1841 -1
- data/lib/wsdl/LocalLB.VirtualAddressV2.wsdl +2265 -239
- data/lib/wsdl/LocalLB.VirtualServer.wsdl +10764 -5504
- data/lib/wsdl/LocalLB.iFile.wsdl +1 -1
- data/lib/wsdl/LocalLB.iFileFile.wsdl +1 -1
- data/lib/wsdl/Log.DestinationArcSight.wsdl +1 -1
- data/lib/wsdl/Log.DestinationIPFIX.wsdl +783 -0
- data/lib/wsdl/Log.DestinationLocalSyslog.wsdl +5 -5
- data/lib/wsdl/Log.DestinationManagementPort.wsdl +570 -0
- data/lib/wsdl/Log.DestinationRemoteHighSpeedLog.wsdl +268 -10
- data/lib/wsdl/Log.DestinationRemoteSyslog.wsdl +134 -14
- data/lib/wsdl/Log.DestinationSplunk.wsdl +1 -1
- data/lib/wsdl/Log.Filter.wsdl +266 -1
- data/lib/wsdl/Log.IPFIXInformationElement.wsdl +811 -0
- data/lib/wsdl/Log.Publisher.wsdl +1 -1
- data/lib/wsdl/Management.ApplicationPresentationScript.wsdl +1 -1
- data/lib/wsdl/Management.ApplicationService.wsdl +1 -1
- data/lib/wsdl/Management.ApplicationTemplate.wsdl +16 -1
- data/lib/wsdl/Management.CCLDAPConfiguration.wsdl +1 -1
- data/lib/wsdl/Management.CLIScript.wsdl +1 -1
- data/lib/wsdl/Management.CRLDPConfiguration.wsdl +1 -1
- data/lib/wsdl/Management.CRLDPServer.wsdl +1 -1
- data/lib/wsdl/Management.CertLDAPConfiguration.wsdl +1 -1
- data/lib/wsdl/Management.ChangeControl.wsdl +1 -1
- data/lib/wsdl/Management.DBVariable.wsdl +1 -1
- data/lib/wsdl/Management.Device.wsdl +36 -1
- data/lib/wsdl/Management.DeviceGroup.wsdl +1 -1
- data/lib/wsdl/Management.EM.wsdl +1 -1
- data/lib/wsdl/Management.EventNotification.wsdl +1 -1
- data/lib/wsdl/Management.EventSubscription.wsdl +1 -1
- data/lib/wsdl/Management.FeatureModule.wsdl +16 -1
- data/lib/wsdl/Management.Folder.wsdl +1 -1
- data/lib/wsdl/Management.Globals.wsdl +1 -1
- data/lib/wsdl/Management.KeyCertificate.wsdl +738 -64
- data/lib/wsdl/Management.LDAPConfiguration.wsdl +1 -1
- data/lib/wsdl/Management.LicenseAdministration.wsdl +16 -1
- data/lib/wsdl/Management.Named.wsdl +1 -1
- data/lib/wsdl/Management.OCSPConfiguration.wsdl +1 -1
- data/lib/wsdl/Management.OCSPResponder.wsdl +1 -1
- data/lib/wsdl/Management.Partition.wsdl +1 -1
- data/lib/wsdl/Management.Provision.wsdl +16 -1
- data/lib/wsdl/Management.RADIUSConfiguration.wsdl +1 -1
- data/lib/wsdl/Management.RADIUSServer.wsdl +1 -1
- data/lib/wsdl/Management.ResourceRecord.wsdl +1 -1
- data/lib/wsdl/Management.SFlowDataSource.wsdl +1 -1
- data/lib/wsdl/Management.SFlowGlobals.wsdl +1 -1
- data/lib/wsdl/Management.SFlowReceiver.wsdl +1 -1
- data/lib/wsdl/Management.SMTPConfiguration.wsdl +1 -1
- data/lib/wsdl/Management.SNMPConfiguration.wsdl +3 -5
- data/lib/wsdl/Management.TACACSConfiguration.wsdl +1 -1
- data/lib/wsdl/Management.TMOSModule.wsdl +16 -1
- data/lib/wsdl/Management.TrafficGroup.wsdl +77 -1
- data/lib/wsdl/Management.Trust.wsdl +1 -1
- data/lib/wsdl/Management.UserManagement.wsdl +47 -1
- data/lib/wsdl/Management.View.wsdl +1 -1
- data/lib/wsdl/Management.Zone.wsdl +104 -17
- data/lib/wsdl/Management.ZoneRunner.wsdl +1 -1
- data/lib/wsdl/Networking.ARP.wsdl +1 -1
- data/lib/wsdl/Networking.AdminIP.wsdl +1 -1
- data/lib/wsdl/Networking.BWControllerPolicy.wsdl +515 -36
- data/lib/wsdl/Networking.BWPriorityGroup.wsdl +655 -0
- data/lib/wsdl/Networking.DNSResolver.wsdl +1278 -0
- data/lib/wsdl/Networking.IPsecIkeDaemon.wsdl +1 -1
- data/lib/wsdl/Networking.IPsecIkePeer.wsdl +661 -29
- data/lib/wsdl/Networking.IPsecManualSecurityAssociation.wsdl +107 -5
- data/lib/wsdl/Networking.IPsecPolicy.wsdl +21 -1
- data/lib/wsdl/Networking.IPsecTrafficSelector.wsdl +1 -1
- data/lib/wsdl/Networking.Interfaces.wsdl +2165 -251
- data/lib/wsdl/Networking.LLDPGlobals.wsdl +1 -1
- data/lib/wsdl/Networking.MulticastRoute.wsdl +265 -0
- data/lib/wsdl/Networking.PacketFilter.wsdl +1841 -1
- data/lib/wsdl/Networking.PacketFilterGlobals.wsdl +1 -1
- data/lib/wsdl/Networking.PortMirror.wsdl +1 -1
- data/lib/wsdl/Networking.ProfileFEC.wsdl +1 -1
- data/lib/wsdl/Networking.ProfileGRE.wsdl +232 -1
- data/lib/wsdl/Networking.ProfileGeneve.wsdl +674 -0
- data/lib/wsdl/Networking.ProfileIPIP.wsdl +1 -1
- data/lib/wsdl/Networking.ProfileIPsec.wsdl +560 -0
- data/lib/wsdl/Networking.ProfileLightweight4Over6Tunnel.wsdl +663 -0
- data/lib/wsdl/Networking.ProfileMAP.wsdl +834 -0
- data/lib/wsdl/Networking.ProfileV6RD.wsdl +861 -0
- data/lib/wsdl/Networking.ProfileVXLAN.wsdl +223 -1
- data/lib/wsdl/Networking.ProfileWCCPGRE.wsdl +1 -1
- data/lib/wsdl/Networking.RouteDomain.wsdl +4 -9
- data/lib/wsdl/Networking.RouteDomainV2.wsdl +8959 -3933
- data/lib/wsdl/Networking.RouteTable.wsdl +1 -1
- data/lib/wsdl/Networking.RouteTableV2.wsdl +1 -1
- data/lib/wsdl/Networking.RouterAdvertisement.wsdl +1 -1
- data/lib/wsdl/Networking.STPGlobals.wsdl +1 -1
- data/lib/wsdl/Networking.STPInstance.wsdl +1 -1
- data/lib/wsdl/Networking.STPInstanceV2.wsdl +1 -1
- data/lib/wsdl/Networking.SelfIP.wsdl +1 -1
- data/lib/wsdl/Networking.SelfIPPortLockdown.wsdl +1216 -1
- data/lib/wsdl/Networking.SelfIPV2.wsdl +8717 -3908
- data/lib/wsdl/Networking.Trunk.wsdl +2173 -259
- data/lib/wsdl/Networking.Tunnel.wsdl +617 -1
- data/lib/wsdl/Networking.VLAN.wsdl +322 -39
- data/lib/wsdl/Networking.VLANGroup.wsdl +40 -1
- data/lib/wsdl/Networking.iSessionAdvertisedRoute.wsdl +1 -1
- data/lib/wsdl/Networking.iSessionAdvertisedRouteV2.wsdl +1 -1
- data/lib/wsdl/Networking.iSessionDatastor.wsdl +7 -13
- data/lib/wsdl/Networking.iSessionDeduplication.wsdl +1 -1
- data/lib/wsdl/Networking.iSessionLocalInterface.wsdl +77 -1
- data/lib/wsdl/Networking.iSessionPeerDiscovery.wsdl +1 -1
- data/lib/wsdl/Networking.iSessionRemoteInterface.wsdl +1 -1
- data/lib/wsdl/Networking.iSessionRemoteInterfaceV2.wsdl +108 -1
- data/lib/wsdl/PEM.FormatScript.wsdl +1 -1
- data/lib/wsdl/PEM.ForwardingEndpoint.wsdl +111 -1
- data/lib/wsdl/PEM.InterceptionEndpoint.wsdl +1 -1
- data/lib/wsdl/PEM.Listener.wsdl +1 -1
- data/lib/wsdl/PEM.Policy.wsdl +591 -1
- data/lib/wsdl/PEM.ServiceChainEndpoint.wsdl +169 -1
- data/lib/wsdl/PEM.Subscriber.wsdl +1841 -1
- data/lib/wsdl/Security.DoSDevice.wsdl +3097 -336
- data/lib/wsdl/Security.DoSWhitelist.wsdl +877 -0
- data/lib/wsdl/Security.FirewallAddressList.wsdl +959 -33
- data/lib/wsdl/Security.FirewallGlobalAdminIPRuleList.wsdl +5955 -2350
- data/lib/wsdl/Security.FirewallGlobalRuleList.wsdl +8370 -3601
- data/lib/wsdl/Security.FirewallPolicy.wsdl +7786 -3589
- data/lib/wsdl/Security.FirewallPortList.wsdl +287 -1
- data/lib/wsdl/Security.FirewallRuleList.wsdl +3633 -1276
- data/lib/wsdl/Security.FirewallWeeklySchedule.wsdl +1 -1
- data/lib/wsdl/Security.IPIntelligenceBlacklistCategory.wsdl +555 -0
- data/lib/wsdl/Security.IPIntelligenceFeedList.wsdl +1086 -0
- data/lib/wsdl/Security.IPIntelligenceGlobalPolicy.wsdl +285 -0
- data/lib/wsdl/Security.IPIntelligencePolicy.wsdl +1393 -0
- data/lib/wsdl/Security.LogProfile.wsdl +784 -66
- data/lib/wsdl/Security.ProfileDNSSecurity.wsdl +1841 -1
- data/lib/wsdl/Security.ProfileDoS.wsdl +5602 -1813
- data/lib/wsdl/Security.ProfileIPIntelligence.wsdl +2100 -256
- data/lib/wsdl/System.CertificateRevocationListFile.wsdl +1 -1
- data/lib/wsdl/System.Cluster.wsdl +17 -1
- data/lib/wsdl/System.ConfigSync.wsdl +226 -5
- data/lib/wsdl/System.Connections.wsdl +1216 -1
- data/lib/wsdl/System.CryptoClient.wsdl +8697 -0
- data/lib/wsdl/System.CryptoServer.wsdl +8507 -0
- data/lib/wsdl/System.Disk.wsdl +11 -1
- data/lib/wsdl/System.ExternalMonitorFile.wsdl +1 -1
- data/lib/wsdl/System.Failover.wsdl +1 -1
- data/lib/wsdl/System.GeoIP.wsdl +31 -15
- data/lib/wsdl/System.HAGroup.wsdl +1 -1
- data/lib/wsdl/System.HAStatus.wsdl +1 -1
- data/lib/wsdl/System.Inet.wsdl +1 -1
- data/lib/wsdl/System.Internal.wsdl +1 -1
- data/lib/wsdl/System.LightweightTunnelTableFile.wsdl +639 -0
- data/lib/wsdl/System.PerformanceSFlow.wsdl +1 -1
- data/lib/wsdl/System.Services.wsdl +6 -1
- data/lib/wsdl/System.Session.wsdl +203 -1
- data/lib/wsdl/System.SoftwareManagement.wsdl +275 -58
- data/lib/wsdl/System.Statistics.wsdl +4292 -1426
- data/lib/wsdl/System.SystemInfo.wsdl +1877 -32
- data/lib/wsdl/System.VCMP.wsdl +3498 -664
- data/lib/wsdl/WebAccelerator.Applications.wsdl +1841 -1
- data/lib/wsdl/WebAccelerator.Policies.wsdl +1 -1
- data/lib/wsdl/WebAccelerator.ProxyMessage.wsdl +1 -1
- data/lib/wsdl/iCall.PeriodicHandler.wsdl +1 -1
- data/lib/wsdl/iCall.PerpetualHandler.wsdl +1 -1
- data/lib/wsdl/iCall.Script.wsdl +43 -3
- data/lib/wsdl/iCall.TriggeredHandler.wsdl +1 -1
- metadata +46 -4
- data/LICENSE +0 -9
@@ -0,0 +1,285 @@
|
|
1
|
+
<?xml version="1.0" ?>
|
2
|
+
<!--
|
3
|
+
Copyright (c) 1996-2016, F5 Networks, Inc., Seattle, Washington. All rights reserved.
|
4
|
+
|
5
|
+
F5, F5 Networks, the F5 logo, BIG-IP, 3-DNS, iControl, GLOBAL-SITE, SEE-IT, EDGE-FX, FireGuard, Internet Control Architecture, IP Application Switch, iRules, PACKET VELOCITY, SYN Check, CONTROL YOUR WORLD, OneConnect, ZoneRunner, uRoam, FirePass, and TrafficShield are registered trademarks or trademarks of F5 Networks, Inc., in the U.S. and certain other countries.
|
6
|
+
|
7
|
+
All other trademarks mentioned in this document are the property of their respective owners. F5 Networks' trademarks may not be used in connection with any product or service except as permitted in writing by F5.
|
8
|
+
|
9
|
+
-->
|
10
|
+
<definitions name="Security.IPIntelligenceGlobalPolicy"
|
11
|
+
targetNamespace="urn:iControl"
|
12
|
+
xmlns:tns="urn:iControl"
|
13
|
+
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
|
14
|
+
xmlns:soap="http://schemas.xmlsoap.org/wsdl/soap/"
|
15
|
+
xmlns="http://schemas.xmlsoap.org/wsdl/">
|
16
|
+
|
17
|
+
<!-- types -->
|
18
|
+
|
19
|
+
<types>
|
20
|
+
<xsd:schema targetNamespace='urn:iControl'
|
21
|
+
xmlns='http://www.w3.org/2001/XMLSchema'
|
22
|
+
xmlns:SOAP-ENC='http://schemas.xmlsoap.org/soap/encoding/'
|
23
|
+
xmlns:wsdl='http://schemas.xmlsoap.org/wsdl/'>
|
24
|
+
<xsd:complexType name="Common.StringSequence">
|
25
|
+
<xsd:complexContent>
|
26
|
+
<xsd:restriction base='SOAP-ENC:Array'>
|
27
|
+
<xsd:attribute ref='SOAP-ENC:arrayType' wsdl:arrayType='xsd:string[]'/>
|
28
|
+
</xsd:restriction>
|
29
|
+
</xsd:complexContent>
|
30
|
+
</xsd:complexType>
|
31
|
+
</xsd:schema>
|
32
|
+
</types>
|
33
|
+
|
34
|
+
<!-- message -->
|
35
|
+
|
36
|
+
<message name="Security.IPIntelligenceGlobalPolicy.get_listRequest">
|
37
|
+
</message>
|
38
|
+
<message name="Security.IPIntelligenceGlobalPolicy.get_listResponse">
|
39
|
+
<part name="return" type="tns:Common.StringSequence"/>
|
40
|
+
</message>
|
41
|
+
|
42
|
+
<message name="Security.IPIntelligenceGlobalPolicy.set_policyRequest">
|
43
|
+
<part name="global_policies" type="tns:Common.StringSequence"/>
|
44
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
45
|
+
</message>
|
46
|
+
<message name="Security.IPIntelligenceGlobalPolicy.set_policyResponse">
|
47
|
+
</message>
|
48
|
+
|
49
|
+
<message name="Security.IPIntelligenceGlobalPolicy.get_policyRequest">
|
50
|
+
<part name="global_policies" type="tns:Common.StringSequence"/>
|
51
|
+
</message>
|
52
|
+
<message name="Security.IPIntelligenceGlobalPolicy.get_policyResponse">
|
53
|
+
<part name="return" type="tns:Common.StringSequence"/>
|
54
|
+
</message>
|
55
|
+
|
56
|
+
<message name="Security.IPIntelligenceGlobalPolicy.set_descriptionRequest">
|
57
|
+
<part name="global_policies" type="tns:Common.StringSequence"/>
|
58
|
+
<part name="descriptions" type="tns:Common.StringSequence"/>
|
59
|
+
</message>
|
60
|
+
<message name="Security.IPIntelligenceGlobalPolicy.set_descriptionResponse">
|
61
|
+
</message>
|
62
|
+
|
63
|
+
<message name="Security.IPIntelligenceGlobalPolicy.get_descriptionRequest">
|
64
|
+
<part name="global_policies" type="tns:Common.StringSequence"/>
|
65
|
+
</message>
|
66
|
+
<message name="Security.IPIntelligenceGlobalPolicy.get_descriptionResponse">
|
67
|
+
<part name="return" type="tns:Common.StringSequence"/>
|
68
|
+
</message>
|
69
|
+
|
70
|
+
<message name="Security.IPIntelligenceGlobalPolicy.get_versionRequest">
|
71
|
+
</message>
|
72
|
+
<message name="Security.IPIntelligenceGlobalPolicy.get_versionResponse">
|
73
|
+
<part name="return" type="xsd:string"/>
|
74
|
+
</message>
|
75
|
+
|
76
|
+
<!-- portType -->
|
77
|
+
|
78
|
+
<portType name="Security.IPIntelligenceGlobalPolicyPortType">
|
79
|
+
<operation name="get_list">
|
80
|
+
<documentation>
|
81
|
+
Gets a list of all global policies.
|
82
|
+
The IP intelligence policy contents/filters are applied to all
|
83
|
+
packets except those going through the management interface.
|
84
|
+
They are applied first, before any firewall rules for the
|
85
|
+
packet's virtual server and route domain.
|
86
|
+
|
87
|
+
</documentation>
|
88
|
+
<input message="tns:Security.IPIntelligenceGlobalPolicy.get_listRequest"/>
|
89
|
+
<output message="tns:Security.IPIntelligenceGlobalPolicy.get_listResponse"/>
|
90
|
+
</operation>
|
91
|
+
<operation name="set_policy">
|
92
|
+
<documentation>
|
93
|
+
Sets the policies for the specified global policies.
|
94
|
+
Specifies an existing IP intelligence policy. Policy contents
|
95
|
+
are enforced at a global level.
|
96
|
+
|
97
|
+
</documentation>
|
98
|
+
<input message="tns:Security.IPIntelligenceGlobalPolicy.set_policyRequest"/>
|
99
|
+
<output message="tns:Security.IPIntelligenceGlobalPolicy.set_policyResponse"/>
|
100
|
+
</operation>
|
101
|
+
<operation name="get_policy">
|
102
|
+
<documentation>
|
103
|
+
Gets the policies for the specified global policies.
|
104
|
+
|
105
|
+
</documentation>
|
106
|
+
<input message="tns:Security.IPIntelligenceGlobalPolicy.get_policyRequest"/>
|
107
|
+
<output message="tns:Security.IPIntelligenceGlobalPolicy.get_policyResponse"/>
|
108
|
+
</operation>
|
109
|
+
<operation name="set_description">
|
110
|
+
<documentation>
|
111
|
+
Sets the descriptions for the specified global policies.
|
112
|
+
This is an arbitrary field which can be used for any purpose.
|
113
|
+
|
114
|
+
</documentation>
|
115
|
+
<input message="tns:Security.IPIntelligenceGlobalPolicy.set_descriptionRequest"/>
|
116
|
+
<output message="tns:Security.IPIntelligenceGlobalPolicy.set_descriptionResponse"/>
|
117
|
+
</operation>
|
118
|
+
<operation name="get_description">
|
119
|
+
<documentation>
|
120
|
+
Gets the descriptions for the specified global policies.
|
121
|
+
|
122
|
+
</documentation>
|
123
|
+
<input message="tns:Security.IPIntelligenceGlobalPolicy.get_descriptionRequest"/>
|
124
|
+
<output message="tns:Security.IPIntelligenceGlobalPolicy.get_descriptionResponse"/>
|
125
|
+
</operation>
|
126
|
+
<operation name="get_version">
|
127
|
+
<documentation>
|
128
|
+
Gets the version information for this interface.
|
129
|
+
|
130
|
+
</documentation>
|
131
|
+
<input message="tns:Security.IPIntelligenceGlobalPolicy.get_versionRequest"/>
|
132
|
+
<output message="tns:Security.IPIntelligenceGlobalPolicy.get_versionResponse"/>
|
133
|
+
</operation>
|
134
|
+
</portType>
|
135
|
+
|
136
|
+
<!-- binding -->
|
137
|
+
|
138
|
+
<binding name="Security.IPIntelligenceGlobalPolicyBinding" type="tns:Security.IPIntelligenceGlobalPolicyPortType">
|
139
|
+
<soap:binding style="rpc" transport="http://schemas.xmlsoap.org/soap/http"/>
|
140
|
+
<operation name="get_list">
|
141
|
+
<documentation>
|
142
|
+
Gets a list of all global policies.
|
143
|
+
The IP intelligence policy contents/filters are applied to all
|
144
|
+
packets except those going through the management interface.
|
145
|
+
They are applied first, before any firewall rules for the
|
146
|
+
packet's virtual server and route domain.
|
147
|
+
|
148
|
+
</documentation>
|
149
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligenceGlobalPolicy"/>
|
150
|
+
<input>
|
151
|
+
<soap:body
|
152
|
+
use="encoded"
|
153
|
+
namespace="urn:iControl:Security/IPIntelligenceGlobalPolicy"
|
154
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
155
|
+
</input>
|
156
|
+
<output>
|
157
|
+
<soap:body
|
158
|
+
use="encoded"
|
159
|
+
namespace="urn:iControl:Security/IPIntelligenceGlobalPolicy"
|
160
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
161
|
+
</output>
|
162
|
+
</operation>
|
163
|
+
|
164
|
+
<operation name="set_policy">
|
165
|
+
<documentation>
|
166
|
+
Sets the policies for the specified global policies.
|
167
|
+
Specifies an existing IP intelligence policy. Policy contents
|
168
|
+
are enforced at a global level.
|
169
|
+
|
170
|
+
</documentation>
|
171
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligenceGlobalPolicy"/>
|
172
|
+
<input>
|
173
|
+
<soap:body
|
174
|
+
use="encoded"
|
175
|
+
namespace="urn:iControl:Security/IPIntelligenceGlobalPolicy"
|
176
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
177
|
+
</input>
|
178
|
+
<output>
|
179
|
+
<soap:body
|
180
|
+
use="encoded"
|
181
|
+
namespace="urn:iControl:Security/IPIntelligenceGlobalPolicy"
|
182
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
183
|
+
</output>
|
184
|
+
</operation>
|
185
|
+
|
186
|
+
<operation name="get_policy">
|
187
|
+
<documentation>
|
188
|
+
Gets the policies for the specified global policies.
|
189
|
+
|
190
|
+
</documentation>
|
191
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligenceGlobalPolicy"/>
|
192
|
+
<input>
|
193
|
+
<soap:body
|
194
|
+
use="encoded"
|
195
|
+
namespace="urn:iControl:Security/IPIntelligenceGlobalPolicy"
|
196
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
197
|
+
</input>
|
198
|
+
<output>
|
199
|
+
<soap:body
|
200
|
+
use="encoded"
|
201
|
+
namespace="urn:iControl:Security/IPIntelligenceGlobalPolicy"
|
202
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
203
|
+
</output>
|
204
|
+
</operation>
|
205
|
+
|
206
|
+
<operation name="set_description">
|
207
|
+
<documentation>
|
208
|
+
Sets the descriptions for the specified global policies.
|
209
|
+
This is an arbitrary field which can be used for any purpose.
|
210
|
+
|
211
|
+
</documentation>
|
212
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligenceGlobalPolicy"/>
|
213
|
+
<input>
|
214
|
+
<soap:body
|
215
|
+
use="encoded"
|
216
|
+
namespace="urn:iControl:Security/IPIntelligenceGlobalPolicy"
|
217
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
218
|
+
</input>
|
219
|
+
<output>
|
220
|
+
<soap:body
|
221
|
+
use="encoded"
|
222
|
+
namespace="urn:iControl:Security/IPIntelligenceGlobalPolicy"
|
223
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
224
|
+
</output>
|
225
|
+
</operation>
|
226
|
+
|
227
|
+
<operation name="get_description">
|
228
|
+
<documentation>
|
229
|
+
Gets the descriptions for the specified global policies.
|
230
|
+
|
231
|
+
</documentation>
|
232
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligenceGlobalPolicy"/>
|
233
|
+
<input>
|
234
|
+
<soap:body
|
235
|
+
use="encoded"
|
236
|
+
namespace="urn:iControl:Security/IPIntelligenceGlobalPolicy"
|
237
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
238
|
+
</input>
|
239
|
+
<output>
|
240
|
+
<soap:body
|
241
|
+
use="encoded"
|
242
|
+
namespace="urn:iControl:Security/IPIntelligenceGlobalPolicy"
|
243
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
244
|
+
</output>
|
245
|
+
</operation>
|
246
|
+
|
247
|
+
<operation name="get_version">
|
248
|
+
<documentation>
|
249
|
+
Gets the version information for this interface.
|
250
|
+
|
251
|
+
</documentation>
|
252
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligenceGlobalPolicy"/>
|
253
|
+
<input>
|
254
|
+
<soap:body
|
255
|
+
use="encoded"
|
256
|
+
namespace="urn:iControl:Security/IPIntelligenceGlobalPolicy"
|
257
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
258
|
+
</input>
|
259
|
+
<output>
|
260
|
+
<soap:body
|
261
|
+
use="encoded"
|
262
|
+
namespace="urn:iControl:Security/IPIntelligenceGlobalPolicy"
|
263
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
264
|
+
</output>
|
265
|
+
</operation>
|
266
|
+
</binding>
|
267
|
+
|
268
|
+
<!-- service -->
|
269
|
+
|
270
|
+
<service name="Security.IPIntelligenceGlobalPolicy">
|
271
|
+
<documentation>
|
272
|
+
The IPIntelligenceGlobalPolicy interface enables you to set a
|
273
|
+
global IP Intelligence policy. The global IP intelligence policy
|
274
|
+
is applied to all the packets before route domain's and/or
|
275
|
+
virtual server's IP Intelligence policies.
|
276
|
+
|
277
|
+
There is only one IP intelligence global policy for the entire system, called "/Common/global-dwbl-container".
|
278
|
+
Please supply this key to all methods requiring the "global_policies" argument.
|
279
|
+
|
280
|
+
</documentation>
|
281
|
+
<port name="Security.IPIntelligenceGlobalPolicyPort" binding="tns:Security.IPIntelligenceGlobalPolicyBinding">
|
282
|
+
<soap:address location="https://url_to_service"/>
|
283
|
+
</port>
|
284
|
+
</service>
|
285
|
+
</definitions>
|
@@ -0,0 +1,1393 @@
|
|
1
|
+
<?xml version="1.0" ?>
|
2
|
+
<!--
|
3
|
+
Copyright (c) 1996-2016, F5 Networks, Inc., Seattle, Washington. All rights reserved.
|
4
|
+
|
5
|
+
F5, F5 Networks, the F5 logo, BIG-IP, 3-DNS, iControl, GLOBAL-SITE, SEE-IT, EDGE-FX, FireGuard, Internet Control Architecture, IP Application Switch, iRules, PACKET VELOCITY, SYN Check, CONTROL YOUR WORLD, OneConnect, ZoneRunner, uRoam, FirePass, and TrafficShield are registered trademarks or trademarks of F5 Networks, Inc., in the U.S. and certain other countries.
|
6
|
+
|
7
|
+
All other trademarks mentioned in this document are the property of their respective owners. F5 Networks' trademarks may not be used in connection with any product or service except as permitted in writing by F5.
|
8
|
+
|
9
|
+
-->
|
10
|
+
<definitions name="Security.IPIntelligencePolicy"
|
11
|
+
targetNamespace="urn:iControl"
|
12
|
+
xmlns:tns="urn:iControl"
|
13
|
+
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
|
14
|
+
xmlns:soap="http://schemas.xmlsoap.org/wsdl/soap/"
|
15
|
+
xmlns="http://schemas.xmlsoap.org/wsdl/">
|
16
|
+
|
17
|
+
<!-- types -->
|
18
|
+
|
19
|
+
<types>
|
20
|
+
<xsd:schema targetNamespace='urn:iControl'
|
21
|
+
xmlns='http://www.w3.org/2001/XMLSchema'
|
22
|
+
xmlns:SOAP-ENC='http://schemas.xmlsoap.org/soap/encoding/'
|
23
|
+
xmlns:wsdl='http://schemas.xmlsoap.org/wsdl/'>
|
24
|
+
<xsd:complexType name="Security.IPIntelligencePolicy.IPIntelligencePolicyActionTypeSequence">
|
25
|
+
<xsd:complexContent>
|
26
|
+
<xsd:restriction base='SOAP-ENC:Array'>
|
27
|
+
<xsd:attribute ref='SOAP-ENC:arrayType' wsdl:arrayType='tns:Security.IPIntelligencePolicy.IPIntelligencePolicyActionType[]'/>
|
28
|
+
</xsd:restriction>
|
29
|
+
</xsd:complexContent>
|
30
|
+
</xsd:complexType>
|
31
|
+
<xsd:simpleType name="Common.EnabledState">
|
32
|
+
<xsd:restriction base="xsd:string">
|
33
|
+
<xsd:enumeration value="STATE_DISABLED">
|
34
|
+
<xsd:annotation>
|
35
|
+
<xsd:documentation>STATE_DISABLED</xsd:documentation>
|
36
|
+
</xsd:annotation>
|
37
|
+
</xsd:enumeration>
|
38
|
+
<xsd:enumeration value="STATE_ENABLED">
|
39
|
+
<xsd:annotation>
|
40
|
+
<xsd:documentation>STATE_ENABLED</xsd:documentation>
|
41
|
+
</xsd:annotation>
|
42
|
+
</xsd:enumeration>
|
43
|
+
</xsd:restriction>
|
44
|
+
</xsd:simpleType>
|
45
|
+
<xsd:simpleType name="Security.IPIntelligencePolicy.IPIntelligencePolicyMatchDirection">
|
46
|
+
<xsd:restriction base="xsd:string">
|
47
|
+
<xsd:enumeration value="IP_INTELLIGENCE_POLICY_MATCH_DIRECTION_UNKNOWN">
|
48
|
+
<xsd:annotation>
|
49
|
+
<xsd:documentation>IP_INTELLIGENCE_POLICY_MATCH_DIRECTION_UNKNOWN</xsd:documentation>
|
50
|
+
</xsd:annotation>
|
51
|
+
</xsd:enumeration>
|
52
|
+
<xsd:enumeration value="IP_INTELLIGENCE_POLICY_MATCH_DIRECTION_SOURCE">
|
53
|
+
<xsd:annotation>
|
54
|
+
<xsd:documentation>IP_INTELLIGENCE_POLICY_MATCH_DIRECTION_SOURCE</xsd:documentation>
|
55
|
+
</xsd:annotation>
|
56
|
+
</xsd:enumeration>
|
57
|
+
<xsd:enumeration value="IP_INTELLIGENCE_POLICY_MATCH_DIRECTION_DESTINATION">
|
58
|
+
<xsd:annotation>
|
59
|
+
<xsd:documentation>IP_INTELLIGENCE_POLICY_MATCH_DIRECTION_DESTINATION</xsd:documentation>
|
60
|
+
</xsd:annotation>
|
61
|
+
</xsd:enumeration>
|
62
|
+
<xsd:enumeration value="IP_INTELLIGENCE_POLICY_MATCH_DIRECTION_SOURCE_AND_DESTINATION">
|
63
|
+
<xsd:annotation>
|
64
|
+
<xsd:documentation>IP_INTELLIGENCE_POLICY_MATCH_DIRECTION_SOURCE_AND_DESTINATION</xsd:documentation>
|
65
|
+
</xsd:annotation>
|
66
|
+
</xsd:enumeration>
|
67
|
+
</xsd:restriction>
|
68
|
+
</xsd:simpleType>
|
69
|
+
<xsd:complexType name="Common.StringSequence">
|
70
|
+
<xsd:complexContent>
|
71
|
+
<xsd:restriction base='SOAP-ENC:Array'>
|
72
|
+
<xsd:attribute ref='SOAP-ENC:arrayType' wsdl:arrayType='xsd:string[]'/>
|
73
|
+
</xsd:restriction>
|
74
|
+
</xsd:complexContent>
|
75
|
+
</xsd:complexType>
|
76
|
+
<xsd:simpleType name="Security.IPIntelligencePolicy.IPIntelligencePolicyActionType">
|
77
|
+
<xsd:restriction base="xsd:string">
|
78
|
+
<xsd:enumeration value="IP_INTELLIGENCE_POLICY_ACTION_TYPE_UNKNOWN">
|
79
|
+
<xsd:annotation>
|
80
|
+
<xsd:documentation>IP_INTELLIGENCE_POLICY_ACTION_TYPE_UNKNOWN</xsd:documentation>
|
81
|
+
</xsd:annotation>
|
82
|
+
</xsd:enumeration>
|
83
|
+
<xsd:enumeration value="IP_INTELLIGENCE_POLICY_ACTION_TYPE_USE_PARENT">
|
84
|
+
<xsd:annotation>
|
85
|
+
<xsd:documentation>IP_INTELLIGENCE_POLICY_ACTION_TYPE_USE_PARENT</xsd:documentation>
|
86
|
+
</xsd:annotation>
|
87
|
+
</xsd:enumeration>
|
88
|
+
<xsd:enumeration value="IP_INTELLIGENCE_POLICY_ACTION_TYPE_ALLOW">
|
89
|
+
<xsd:annotation>
|
90
|
+
<xsd:documentation>IP_INTELLIGENCE_POLICY_ACTION_TYPE_ALLOW</xsd:documentation>
|
91
|
+
</xsd:annotation>
|
92
|
+
</xsd:enumeration>
|
93
|
+
<xsd:enumeration value="IP_INTELLIGENCE_POLICY_ACTION_TYPE_DROP">
|
94
|
+
<xsd:annotation>
|
95
|
+
<xsd:documentation>IP_INTELLIGENCE_POLICY_ACTION_TYPE_DROP</xsd:documentation>
|
96
|
+
</xsd:annotation>
|
97
|
+
</xsd:enumeration>
|
98
|
+
</xsd:restriction>
|
99
|
+
</xsd:simpleType>
|
100
|
+
<xsd:complexType name="Security.IPIntelligencePolicy.IPIntelligencePolicyBlacklistCategoryLogTypeSequence">
|
101
|
+
<xsd:complexContent>
|
102
|
+
<xsd:restriction base='SOAP-ENC:Array'>
|
103
|
+
<xsd:attribute ref='SOAP-ENC:arrayType' wsdl:arrayType='tns:Security.IPIntelligencePolicy.IPIntelligencePolicyBlacklistCategoryLogType[]'/>
|
104
|
+
</xsd:restriction>
|
105
|
+
</xsd:complexContent>
|
106
|
+
</xsd:complexType>
|
107
|
+
<xsd:complexType name="Security.IPIntelligencePolicy.IPIntelligencePolicyMatchDirectionSequenceSequence">
|
108
|
+
<xsd:complexContent>
|
109
|
+
<xsd:restriction base='SOAP-ENC:Array'>
|
110
|
+
<xsd:attribute ref='SOAP-ENC:arrayType' wsdl:arrayType='tns:Security.IPIntelligencePolicy.IPIntelligencePolicyMatchDirectionSequence[]'/>
|
111
|
+
</xsd:restriction>
|
112
|
+
</xsd:complexContent>
|
113
|
+
</xsd:complexType>
|
114
|
+
<xsd:complexType name="Security.IPIntelligencePolicy.IPIntelligencePolicyActionTypeSequenceSequence">
|
115
|
+
<xsd:complexContent>
|
116
|
+
<xsd:restriction base='SOAP-ENC:Array'>
|
117
|
+
<xsd:attribute ref='SOAP-ENC:arrayType' wsdl:arrayType='tns:Security.IPIntelligencePolicy.IPIntelligencePolicyActionTypeSequence[]'/>
|
118
|
+
</xsd:restriction>
|
119
|
+
</xsd:complexContent>
|
120
|
+
</xsd:complexType>
|
121
|
+
<xsd:complexType name="Security.IPIntelligencePolicy.IPIntelligencePolicyBlacklistCategoryLogTypeSequenceSequence">
|
122
|
+
<xsd:complexContent>
|
123
|
+
<xsd:restriction base='SOAP-ENC:Array'>
|
124
|
+
<xsd:attribute ref='SOAP-ENC:arrayType' wsdl:arrayType='tns:Security.IPIntelligencePolicy.IPIntelligencePolicyBlacklistCategoryLogTypeSequence[]'/>
|
125
|
+
</xsd:restriction>
|
126
|
+
</xsd:complexContent>
|
127
|
+
</xsd:complexType>
|
128
|
+
<xsd:complexType name="Common.StringSequenceSequence">
|
129
|
+
<xsd:complexContent>
|
130
|
+
<xsd:restriction base='SOAP-ENC:Array'>
|
131
|
+
<xsd:attribute ref='SOAP-ENC:arrayType' wsdl:arrayType='tns:Common.StringSequence[]'/>
|
132
|
+
</xsd:restriction>
|
133
|
+
</xsd:complexContent>
|
134
|
+
</xsd:complexType>
|
135
|
+
<xsd:simpleType name="Security.IPIntelligencePolicy.IPIntelligencePolicyBlacklistCategoryLogType">
|
136
|
+
<xsd:restriction base="xsd:string">
|
137
|
+
<xsd:enumeration value="IP_INTELLIGENCE_POLICY_BLACKLIST_CATEGORY_LOG_TYPE_UNKNOWN">
|
138
|
+
<xsd:annotation>
|
139
|
+
<xsd:documentation>IP_INTELLIGENCE_POLICY_BLACKLIST_CATEGORY_LOG_TYPE_UNKNOWN</xsd:documentation>
|
140
|
+
</xsd:annotation>
|
141
|
+
</xsd:enumeration>
|
142
|
+
<xsd:enumeration value="IP_INTELLIGENCE_POLICY_BLACKLIST_CATEGORY_LOG_TYPE_USE_PARENT">
|
143
|
+
<xsd:annotation>
|
144
|
+
<xsd:documentation>IP_INTELLIGENCE_POLICY_BLACKLIST_CATEGORY_LOG_TYPE_USE_PARENT</xsd:documentation>
|
145
|
+
</xsd:annotation>
|
146
|
+
</xsd:enumeration>
|
147
|
+
<xsd:enumeration value="IP_INTELLIGENCE_POLICY_BLACKLIST_CATEGORY_LOG_TYPE_YES">
|
148
|
+
<xsd:annotation>
|
149
|
+
<xsd:documentation>IP_INTELLIGENCE_POLICY_BLACKLIST_CATEGORY_LOG_TYPE_YES</xsd:documentation>
|
150
|
+
</xsd:annotation>
|
151
|
+
</xsd:enumeration>
|
152
|
+
<xsd:enumeration value="IP_INTELLIGENCE_POLICY_BLACKLIST_CATEGORY_LOG_TYPE_NO">
|
153
|
+
<xsd:annotation>
|
154
|
+
<xsd:documentation>IP_INTELLIGENCE_POLICY_BLACKLIST_CATEGORY_LOG_TYPE_NO</xsd:documentation>
|
155
|
+
</xsd:annotation>
|
156
|
+
</xsd:enumeration>
|
157
|
+
</xsd:restriction>
|
158
|
+
</xsd:simpleType>
|
159
|
+
<xsd:complexType name="Security.IPIntelligencePolicy.IPIntelligencePolicyMatchDirectionSequence">
|
160
|
+
<xsd:complexContent>
|
161
|
+
<xsd:restriction base='SOAP-ENC:Array'>
|
162
|
+
<xsd:attribute ref='SOAP-ENC:arrayType' wsdl:arrayType='tns:Security.IPIntelligencePolicy.IPIntelligencePolicyMatchDirection[]'/>
|
163
|
+
</xsd:restriction>
|
164
|
+
</xsd:complexContent>
|
165
|
+
</xsd:complexType>
|
166
|
+
<xsd:complexType name="Common.EnabledStateSequence">
|
167
|
+
<xsd:complexContent>
|
168
|
+
<xsd:restriction base='SOAP-ENC:Array'>
|
169
|
+
<xsd:attribute ref='SOAP-ENC:arrayType' wsdl:arrayType='tns:Common.EnabledState[]'/>
|
170
|
+
</xsd:restriction>
|
171
|
+
</xsd:complexContent>
|
172
|
+
</xsd:complexType>
|
173
|
+
</xsd:schema>
|
174
|
+
</types>
|
175
|
+
|
176
|
+
<!-- message -->
|
177
|
+
|
178
|
+
<message name="Security.IPIntelligencePolicy.get_listRequest">
|
179
|
+
</message>
|
180
|
+
<message name="Security.IPIntelligencePolicy.get_listResponse">
|
181
|
+
<part name="return" type="tns:Common.StringSequence"/>
|
182
|
+
</message>
|
183
|
+
|
184
|
+
<message name="Security.IPIntelligencePolicy.createRequest">
|
185
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
186
|
+
</message>
|
187
|
+
<message name="Security.IPIntelligencePolicy.createResponse">
|
188
|
+
</message>
|
189
|
+
|
190
|
+
<message name="Security.IPIntelligencePolicy.delete_policyRequest">
|
191
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
192
|
+
</message>
|
193
|
+
<message name="Security.IPIntelligencePolicy.delete_policyResponse">
|
194
|
+
</message>
|
195
|
+
|
196
|
+
<message name="Security.IPIntelligencePolicy.delete_all_policiesRequest">
|
197
|
+
</message>
|
198
|
+
<message name="Security.IPIntelligencePolicy.delete_all_policiesResponse">
|
199
|
+
</message>
|
200
|
+
|
201
|
+
<message name="Security.IPIntelligencePolicy.set_default_action_typeRequest">
|
202
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
203
|
+
<part name="types" type="tns:Security.IPIntelligencePolicy.IPIntelligencePolicyActionTypeSequence"/>
|
204
|
+
</message>
|
205
|
+
<message name="Security.IPIntelligencePolicy.set_default_action_typeResponse">
|
206
|
+
</message>
|
207
|
+
|
208
|
+
<message name="Security.IPIntelligencePolicy.get_default_action_typeRequest">
|
209
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
210
|
+
</message>
|
211
|
+
<message name="Security.IPIntelligencePolicy.get_default_action_typeResponse">
|
212
|
+
<part name="return" type="tns:Security.IPIntelligencePolicy.IPIntelligencePolicyActionTypeSequence"/>
|
213
|
+
</message>
|
214
|
+
|
215
|
+
<message name="Security.IPIntelligencePolicy.set_log_blacklist_hit_stateRequest">
|
216
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
217
|
+
<part name="states" type="tns:Common.EnabledStateSequence"/>
|
218
|
+
</message>
|
219
|
+
<message name="Security.IPIntelligencePolicy.set_log_blacklist_hit_stateResponse">
|
220
|
+
</message>
|
221
|
+
|
222
|
+
<message name="Security.IPIntelligencePolicy.get_log_blacklist_hit_stateRequest">
|
223
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
224
|
+
</message>
|
225
|
+
<message name="Security.IPIntelligencePolicy.get_log_blacklist_hit_stateResponse">
|
226
|
+
<part name="return" type="tns:Common.EnabledStateSequence"/>
|
227
|
+
</message>
|
228
|
+
|
229
|
+
<message name="Security.IPIntelligencePolicy.set_log_blacklist_whitelist_both_hit_stateRequest">
|
230
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
231
|
+
<part name="states" type="tns:Common.EnabledStateSequence"/>
|
232
|
+
</message>
|
233
|
+
<message name="Security.IPIntelligencePolicy.set_log_blacklist_whitelist_both_hit_stateResponse">
|
234
|
+
</message>
|
235
|
+
|
236
|
+
<message name="Security.IPIntelligencePolicy.get_log_blacklist_whitelist_both_hit_stateRequest">
|
237
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
238
|
+
</message>
|
239
|
+
<message name="Security.IPIntelligencePolicy.get_log_blacklist_whitelist_both_hit_stateResponse">
|
240
|
+
<part name="return" type="tns:Common.EnabledStateSequence"/>
|
241
|
+
</message>
|
242
|
+
|
243
|
+
<message name="Security.IPIntelligencePolicy.set_descriptionRequest">
|
244
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
245
|
+
<part name="descriptions" type="tns:Common.StringSequence"/>
|
246
|
+
</message>
|
247
|
+
<message name="Security.IPIntelligencePolicy.set_descriptionResponse">
|
248
|
+
</message>
|
249
|
+
|
250
|
+
<message name="Security.IPIntelligencePolicy.get_descriptionRequest">
|
251
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
252
|
+
</message>
|
253
|
+
<message name="Security.IPIntelligencePolicy.get_descriptionResponse">
|
254
|
+
<part name="return" type="tns:Common.StringSequence"/>
|
255
|
+
</message>
|
256
|
+
|
257
|
+
<message name="Security.IPIntelligencePolicy.get_blacklist_categoryRequest">
|
258
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
259
|
+
</message>
|
260
|
+
<message name="Security.IPIntelligencePolicy.get_blacklist_categoryResponse">
|
261
|
+
<part name="return" type="tns:Common.StringSequenceSequence"/>
|
262
|
+
</message>
|
263
|
+
|
264
|
+
<message name="Security.IPIntelligencePolicy.add_blacklist_categoryRequest">
|
265
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
266
|
+
<part name="categories" type="tns:Common.StringSequenceSequence"/>
|
267
|
+
</message>
|
268
|
+
<message name="Security.IPIntelligencePolicy.add_blacklist_categoryResponse">
|
269
|
+
</message>
|
270
|
+
|
271
|
+
<message name="Security.IPIntelligencePolicy.remove_blacklist_categoryRequest">
|
272
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
273
|
+
<part name="categories" type="tns:Common.StringSequenceSequence"/>
|
274
|
+
</message>
|
275
|
+
<message name="Security.IPIntelligencePolicy.remove_blacklist_categoryResponse">
|
276
|
+
</message>
|
277
|
+
|
278
|
+
<message name="Security.IPIntelligencePolicy.remove_all_blacklist_categoriesRequest">
|
279
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
280
|
+
</message>
|
281
|
+
<message name="Security.IPIntelligencePolicy.remove_all_blacklist_categoriesResponse">
|
282
|
+
</message>
|
283
|
+
|
284
|
+
<message name="Security.IPIntelligencePolicy.set_blacklist_category_action_typeRequest">
|
285
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
286
|
+
<part name="categories" type="tns:Common.StringSequenceSequence"/>
|
287
|
+
<part name="types" type="tns:Security.IPIntelligencePolicy.IPIntelligencePolicyActionTypeSequenceSequence"/>
|
288
|
+
</message>
|
289
|
+
<message name="Security.IPIntelligencePolicy.set_blacklist_category_action_typeResponse">
|
290
|
+
</message>
|
291
|
+
|
292
|
+
<message name="Security.IPIntelligencePolicy.get_blacklist_category_action_typeRequest">
|
293
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
294
|
+
<part name="categories" type="tns:Common.StringSequenceSequence"/>
|
295
|
+
</message>
|
296
|
+
<message name="Security.IPIntelligencePolicy.get_blacklist_category_action_typeResponse">
|
297
|
+
<part name="return" type="tns:Security.IPIntelligencePolicy.IPIntelligencePolicyActionTypeSequenceSequence"/>
|
298
|
+
</message>
|
299
|
+
|
300
|
+
<message name="Security.IPIntelligencePolicy.set_blacklist_category_log_blacklist_hit_only_settingRequest">
|
301
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
302
|
+
<part name="categories" type="tns:Common.StringSequenceSequence"/>
|
303
|
+
<part name="hits" type="tns:Security.IPIntelligencePolicy.IPIntelligencePolicyBlacklistCategoryLogTypeSequenceSequence"/>
|
304
|
+
</message>
|
305
|
+
<message name="Security.IPIntelligencePolicy.set_blacklist_category_log_blacklist_hit_only_settingResponse">
|
306
|
+
</message>
|
307
|
+
|
308
|
+
<message name="Security.IPIntelligencePolicy.get_blacklist_category_log_blacklist_hit_only_settingRequest">
|
309
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
310
|
+
<part name="categories" type="tns:Common.StringSequenceSequence"/>
|
311
|
+
</message>
|
312
|
+
<message name="Security.IPIntelligencePolicy.get_blacklist_category_log_blacklist_hit_only_settingResponse">
|
313
|
+
<part name="return" type="tns:Security.IPIntelligencePolicy.IPIntelligencePolicyBlacklistCategoryLogTypeSequenceSequence"/>
|
314
|
+
</message>
|
315
|
+
|
316
|
+
<message name="Security.IPIntelligencePolicy.set_blacklist_category_log_blacklist_whitelist_hit_settingRequest">
|
317
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
318
|
+
<part name="categories" type="tns:Common.StringSequenceSequence"/>
|
319
|
+
<part name="hits" type="tns:Security.IPIntelligencePolicy.IPIntelligencePolicyBlacklistCategoryLogTypeSequenceSequence"/>
|
320
|
+
</message>
|
321
|
+
<message name="Security.IPIntelligencePolicy.set_blacklist_category_log_blacklist_whitelist_hit_settingResponse">
|
322
|
+
</message>
|
323
|
+
|
324
|
+
<message name="Security.IPIntelligencePolicy.get_blacklist_category_log_blacklist_whitelist_hit_settingRequest">
|
325
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
326
|
+
<part name="categories" type="tns:Common.StringSequenceSequence"/>
|
327
|
+
</message>
|
328
|
+
<message name="Security.IPIntelligencePolicy.get_blacklist_category_log_blacklist_whitelist_hit_settingResponse">
|
329
|
+
<part name="return" type="tns:Security.IPIntelligencePolicy.IPIntelligencePolicyBlacklistCategoryLogTypeSequenceSequence"/>
|
330
|
+
</message>
|
331
|
+
|
332
|
+
<message name="Security.IPIntelligencePolicy.set_blacklist_category_descriptionRequest">
|
333
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
334
|
+
<part name="categories" type="tns:Common.StringSequenceSequence"/>
|
335
|
+
<part name="descriptions" type="tns:Common.StringSequenceSequence"/>
|
336
|
+
</message>
|
337
|
+
<message name="Security.IPIntelligencePolicy.set_blacklist_category_descriptionResponse">
|
338
|
+
</message>
|
339
|
+
|
340
|
+
<message name="Security.IPIntelligencePolicy.get_blacklist_category_descriptionRequest">
|
341
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
342
|
+
<part name="categories" type="tns:Common.StringSequenceSequence"/>
|
343
|
+
</message>
|
344
|
+
<message name="Security.IPIntelligencePolicy.get_blacklist_category_descriptionResponse">
|
345
|
+
<part name="return" type="tns:Common.StringSequenceSequence"/>
|
346
|
+
</message>
|
347
|
+
|
348
|
+
<message name="Security.IPIntelligencePolicy.get_feed_listRequest">
|
349
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
350
|
+
</message>
|
351
|
+
<message name="Security.IPIntelligencePolicy.get_feed_listResponse">
|
352
|
+
<part name="return" type="tns:Common.StringSequenceSequence"/>
|
353
|
+
</message>
|
354
|
+
|
355
|
+
<message name="Security.IPIntelligencePolicy.add_feed_listRequest">
|
356
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
357
|
+
<part name="lists" type="tns:Common.StringSequenceSequence"/>
|
358
|
+
</message>
|
359
|
+
<message name="Security.IPIntelligencePolicy.add_feed_listResponse">
|
360
|
+
</message>
|
361
|
+
|
362
|
+
<message name="Security.IPIntelligencePolicy.remove_feed_listRequest">
|
363
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
364
|
+
<part name="lists" type="tns:Common.StringSequenceSequence"/>
|
365
|
+
</message>
|
366
|
+
<message name="Security.IPIntelligencePolicy.remove_feed_listResponse">
|
367
|
+
</message>
|
368
|
+
|
369
|
+
<message name="Security.IPIntelligencePolicy.remove_all_feed_listsRequest">
|
370
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
371
|
+
</message>
|
372
|
+
<message name="Security.IPIntelligencePolicy.remove_all_feed_listsResponse">
|
373
|
+
</message>
|
374
|
+
|
375
|
+
<message name="Security.IPIntelligencePolicy.set_blacklist_category_match_directionRequest">
|
376
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
377
|
+
<part name="categories" type="tns:Common.StringSequenceSequence"/>
|
378
|
+
<part name="directions" type="tns:Security.IPIntelligencePolicy.IPIntelligencePolicyMatchDirectionSequenceSequence"/>
|
379
|
+
</message>
|
380
|
+
<message name="Security.IPIntelligencePolicy.set_blacklist_category_match_directionResponse">
|
381
|
+
</message>
|
382
|
+
|
383
|
+
<message name="Security.IPIntelligencePolicy.get_blacklist_category_match_directionRequest">
|
384
|
+
<part name="policies" type="tns:Common.StringSequence"/>
|
385
|
+
<part name="categories" type="tns:Common.StringSequenceSequence"/>
|
386
|
+
</message>
|
387
|
+
<message name="Security.IPIntelligencePolicy.get_blacklist_category_match_directionResponse">
|
388
|
+
<part name="return" type="tns:Security.IPIntelligencePolicy.IPIntelligencePolicyMatchDirectionSequenceSequence"/>
|
389
|
+
</message>
|
390
|
+
|
391
|
+
<message name="Security.IPIntelligencePolicy.get_versionRequest">
|
392
|
+
</message>
|
393
|
+
<message name="Security.IPIntelligencePolicy.get_versionResponse">
|
394
|
+
<part name="return" type="xsd:string"/>
|
395
|
+
</message>
|
396
|
+
|
397
|
+
<!-- portType -->
|
398
|
+
|
399
|
+
<portType name="Security.IPIntelligencePolicyPortType">
|
400
|
+
<operation name="get_list">
|
401
|
+
<documentation>
|
402
|
+
Gets a list of all policies.
|
403
|
+
An IP intelligence policy is comprised of three logical groups
|
404
|
+
of settings: list of feed lists, enforcement and logging
|
405
|
+
settings per blacklist category, and default enforcement and
|
406
|
+
logging settings for blacklist categories.
|
407
|
+
|
408
|
+
</documentation>
|
409
|
+
<input message="tns:Security.IPIntelligencePolicy.get_listRequest"/>
|
410
|
+
<output message="tns:Security.IPIntelligencePolicy.get_listResponse"/>
|
411
|
+
</operation>
|
412
|
+
<operation name="create">
|
413
|
+
<documentation>
|
414
|
+
Creates a set of policies.
|
415
|
+
|
416
|
+
</documentation>
|
417
|
+
<input message="tns:Security.IPIntelligencePolicy.createRequest"/>
|
418
|
+
<output message="tns:Security.IPIntelligencePolicy.createResponse"/>
|
419
|
+
</operation>
|
420
|
+
<operation name="delete_policy">
|
421
|
+
<documentation>
|
422
|
+
Deletes the specified policies.
|
423
|
+
|
424
|
+
</documentation>
|
425
|
+
<input message="tns:Security.IPIntelligencePolicy.delete_policyRequest"/>
|
426
|
+
<output message="tns:Security.IPIntelligencePolicy.delete_policyResponse"/>
|
427
|
+
</operation>
|
428
|
+
<operation name="delete_all_policies">
|
429
|
+
<documentation>
|
430
|
+
Deletes all user defined policies.
|
431
|
+
|
432
|
+
</documentation>
|
433
|
+
<input message="tns:Security.IPIntelligencePolicy.delete_all_policiesRequest"/>
|
434
|
+
<output message="tns:Security.IPIntelligencePolicy.delete_all_policiesResponse"/>
|
435
|
+
</operation>
|
436
|
+
<operation name="set_default_action_type">
|
437
|
+
<documentation>
|
438
|
+
Sets the default action types for the specified policies.
|
439
|
+
Specifies a default enforcement action which will be performed
|
440
|
+
on the matched packet unless an implicit action is specified for
|
441
|
+
one of the blacklist categories the packet's IP is categorized
|
442
|
+
with. If the packet's IP is listed in a white list the action is
|
443
|
+
always accept.
|
444
|
+
|
445
|
+
</documentation>
|
446
|
+
<input message="tns:Security.IPIntelligencePolicy.set_default_action_typeRequest"/>
|
447
|
+
<output message="tns:Security.IPIntelligencePolicy.set_default_action_typeResponse"/>
|
448
|
+
</operation>
|
449
|
+
<operation name="get_default_action_type">
|
450
|
+
<documentation>
|
451
|
+
Gets the default action types for the specified policies.
|
452
|
+
|
453
|
+
</documentation>
|
454
|
+
<input message="tns:Security.IPIntelligencePolicy.get_default_action_typeRequest"/>
|
455
|
+
<output message="tns:Security.IPIntelligencePolicy.get_default_action_typeResponse"/>
|
456
|
+
</operation>
|
457
|
+
<operation name="set_log_blacklist_hit_state">
|
458
|
+
<documentation>
|
459
|
+
Sets the log blacklist hit states for the specified policies.
|
460
|
+
Specifies whether a log message will be generated if packet's
|
461
|
+
source IP is categorized with blacklist only (but not whitelist).
|
462
|
+
|
463
|
+
</documentation>
|
464
|
+
<input message="tns:Security.IPIntelligencePolicy.set_log_blacklist_hit_stateRequest"/>
|
465
|
+
<output message="tns:Security.IPIntelligencePolicy.set_log_blacklist_hit_stateResponse"/>
|
466
|
+
</operation>
|
467
|
+
<operation name="get_log_blacklist_hit_state">
|
468
|
+
<documentation>
|
469
|
+
Gets the log blacklist hit states for the specified policies.
|
470
|
+
|
471
|
+
</documentation>
|
472
|
+
<input message="tns:Security.IPIntelligencePolicy.get_log_blacklist_hit_stateRequest"/>
|
473
|
+
<output message="tns:Security.IPIntelligencePolicy.get_log_blacklist_hit_stateResponse"/>
|
474
|
+
</operation>
|
475
|
+
<operation name="set_log_blacklist_whitelist_both_hit_state">
|
476
|
+
<documentation>
|
477
|
+
Sets the log blacklist whitelist both hit states for the
|
478
|
+
specified policies.
|
479
|
+
Specifies whether log message will be generated if packet's
|
480
|
+
source IP is categorized with both blacklist and whitelist.
|
481
|
+
|
482
|
+
</documentation>
|
483
|
+
<input message="tns:Security.IPIntelligencePolicy.set_log_blacklist_whitelist_both_hit_stateRequest"/>
|
484
|
+
<output message="tns:Security.IPIntelligencePolicy.set_log_blacklist_whitelist_both_hit_stateResponse"/>
|
485
|
+
</operation>
|
486
|
+
<operation name="get_log_blacklist_whitelist_both_hit_state">
|
487
|
+
<documentation>
|
488
|
+
Gets the log blacklist whitelist both hit states for the
|
489
|
+
specified policies.
|
490
|
+
|
491
|
+
</documentation>
|
492
|
+
<input message="tns:Security.IPIntelligencePolicy.get_log_blacklist_whitelist_both_hit_stateRequest"/>
|
493
|
+
<output message="tns:Security.IPIntelligencePolicy.get_log_blacklist_whitelist_both_hit_stateResponse"/>
|
494
|
+
</operation>
|
495
|
+
<operation name="set_description">
|
496
|
+
<documentation>
|
497
|
+
Sets the descriptions for the specified policies.
|
498
|
+
This is an arbitrary field which can be used for any purpose.
|
499
|
+
|
500
|
+
</documentation>
|
501
|
+
<input message="tns:Security.IPIntelligencePolicy.set_descriptionRequest"/>
|
502
|
+
<output message="tns:Security.IPIntelligencePolicy.set_descriptionResponse"/>
|
503
|
+
</operation>
|
504
|
+
<operation name="get_description">
|
505
|
+
<documentation>
|
506
|
+
Gets the descriptions for the specified policies.
|
507
|
+
|
508
|
+
</documentation>
|
509
|
+
<input message="tns:Security.IPIntelligencePolicy.get_descriptionRequest"/>
|
510
|
+
<output message="tns:Security.IPIntelligencePolicy.get_descriptionResponse"/>
|
511
|
+
</operation>
|
512
|
+
<operation name="get_blacklist_category">
|
513
|
+
<documentation>
|
514
|
+
Gets categories for the specified policies.
|
515
|
+
You can add or remove blacklist categories for the policy. Each
|
516
|
+
category specifies the action, the log message for blacklist hit
|
517
|
+
only setting, and the log message for blacklist and whitelist
|
518
|
+
both hit setting.
|
519
|
+
|
520
|
+
</documentation>
|
521
|
+
<input message="tns:Security.IPIntelligencePolicy.get_blacklist_categoryRequest"/>
|
522
|
+
<output message="tns:Security.IPIntelligencePolicy.get_blacklist_categoryResponse"/>
|
523
|
+
</operation>
|
524
|
+
<operation name="add_blacklist_category">
|
525
|
+
<documentation>
|
526
|
+
Adds a list of categories for the specified policies.
|
527
|
+
|
528
|
+
</documentation>
|
529
|
+
<input message="tns:Security.IPIntelligencePolicy.add_blacklist_categoryRequest"/>
|
530
|
+
<output message="tns:Security.IPIntelligencePolicy.add_blacklist_categoryResponse"/>
|
531
|
+
</operation>
|
532
|
+
<operation name="remove_blacklist_category">
|
533
|
+
<documentation>
|
534
|
+
Removes a list of categories from the specified policies.
|
535
|
+
|
536
|
+
</documentation>
|
537
|
+
<input message="tns:Security.IPIntelligencePolicy.remove_blacklist_categoryRequest"/>
|
538
|
+
<output message="tns:Security.IPIntelligencePolicy.remove_blacklist_categoryResponse"/>
|
539
|
+
</operation>
|
540
|
+
<operation name="remove_all_blacklist_categories">
|
541
|
+
<documentation>
|
542
|
+
Removes all categories from the specified policies.
|
543
|
+
|
544
|
+
</documentation>
|
545
|
+
<input message="tns:Security.IPIntelligencePolicy.remove_all_blacklist_categoriesRequest"/>
|
546
|
+
<output message="tns:Security.IPIntelligencePolicy.remove_all_blacklist_categoriesResponse"/>
|
547
|
+
</operation>
|
548
|
+
<operation name="set_blacklist_category_action_type">
|
549
|
+
<documentation>
|
550
|
+
Sets the action types for the specified blacklist categories.
|
551
|
+
Specifies what enforcement action will be applied if the packet
|
552
|
+
is categorized with this blacklist category. If the packet is
|
553
|
+
categorized with more than one blacklist the most restrictive
|
554
|
+
action will be applied.
|
555
|
+
|
556
|
+
</documentation>
|
557
|
+
<input message="tns:Security.IPIntelligencePolicy.set_blacklist_category_action_typeRequest"/>
|
558
|
+
<output message="tns:Security.IPIntelligencePolicy.set_blacklist_category_action_typeResponse"/>
|
559
|
+
</operation>
|
560
|
+
<operation name="get_blacklist_category_action_type">
|
561
|
+
<documentation>
|
562
|
+
Gets the action types for the specified blacklist categories.
|
563
|
+
|
564
|
+
</documentation>
|
565
|
+
<input message="tns:Security.IPIntelligencePolicy.get_blacklist_category_action_typeRequest"/>
|
566
|
+
<output message="tns:Security.IPIntelligencePolicy.get_blacklist_category_action_typeResponse"/>
|
567
|
+
</operation>
|
568
|
+
<operation name="set_blacklist_category_log_blacklist_hit_only_setting">
|
569
|
+
<documentation>
|
570
|
+
Sets the log blacklist hit only settings for the specified
|
571
|
+
blacklist categories.
|
572
|
+
Specifies if a log message will be generated if the packet is
|
573
|
+
categorized with this blacklist and no whitelists includes this
|
574
|
+
packet's IP.
|
575
|
+
|
576
|
+
</documentation>
|
577
|
+
<input message="tns:Security.IPIntelligencePolicy.set_blacklist_category_log_blacklist_hit_only_settingRequest"/>
|
578
|
+
<output message="tns:Security.IPIntelligencePolicy.set_blacklist_category_log_blacklist_hit_only_settingResponse"/>
|
579
|
+
</operation>
|
580
|
+
<operation name="get_blacklist_category_log_blacklist_hit_only_setting">
|
581
|
+
<documentation>
|
582
|
+
Gets the log blacklist hit only settings for the specified
|
583
|
+
blacklist categories.
|
584
|
+
|
585
|
+
</documentation>
|
586
|
+
<input message="tns:Security.IPIntelligencePolicy.get_blacklist_category_log_blacklist_hit_only_settingRequest"/>
|
587
|
+
<output message="tns:Security.IPIntelligencePolicy.get_blacklist_category_log_blacklist_hit_only_settingResponse"/>
|
588
|
+
</operation>
|
589
|
+
<operation name="set_blacklist_category_log_blacklist_whitelist_hit_setting">
|
590
|
+
<documentation>
|
591
|
+
Sets the log blacklist whitelist hit settings for the specified
|
592
|
+
blacklist categories.
|
593
|
+
Specifies if a log message will be generated if the packet is
|
594
|
+
categorized with this blacklist and the packet's IP is listed in
|
595
|
+
a whitelist.
|
596
|
+
|
597
|
+
</documentation>
|
598
|
+
<input message="tns:Security.IPIntelligencePolicy.set_blacklist_category_log_blacklist_whitelist_hit_settingRequest"/>
|
599
|
+
<output message="tns:Security.IPIntelligencePolicy.set_blacklist_category_log_blacklist_whitelist_hit_settingResponse"/>
|
600
|
+
</operation>
|
601
|
+
<operation name="get_blacklist_category_log_blacklist_whitelist_hit_setting">
|
602
|
+
<documentation>
|
603
|
+
Gets the log blacklist whitelist hit settings for the specified
|
604
|
+
blacklist categories.
|
605
|
+
|
606
|
+
</documentation>
|
607
|
+
<input message="tns:Security.IPIntelligencePolicy.get_blacklist_category_log_blacklist_whitelist_hit_settingRequest"/>
|
608
|
+
<output message="tns:Security.IPIntelligencePolicy.get_blacklist_category_log_blacklist_whitelist_hit_settingResponse"/>
|
609
|
+
</operation>
|
610
|
+
<operation name="set_blacklist_category_description">
|
611
|
+
<documentation>
|
612
|
+
Sets the descriptions for the specified blacklist categories.
|
613
|
+
This is an arbitrary field which can be used for any purpose.
|
614
|
+
|
615
|
+
</documentation>
|
616
|
+
<input message="tns:Security.IPIntelligencePolicy.set_blacklist_category_descriptionRequest"/>
|
617
|
+
<output message="tns:Security.IPIntelligencePolicy.set_blacklist_category_descriptionResponse"/>
|
618
|
+
</operation>
|
619
|
+
<operation name="get_blacklist_category_description">
|
620
|
+
<documentation>
|
621
|
+
Gets the descriptions for the specified blacklist categories.
|
622
|
+
|
623
|
+
</documentation>
|
624
|
+
<input message="tns:Security.IPIntelligencePolicy.get_blacklist_category_descriptionRequest"/>
|
625
|
+
<output message="tns:Security.IPIntelligencePolicy.get_blacklist_category_descriptionResponse"/>
|
626
|
+
</operation>
|
627
|
+
<operation name="get_feed_list">
|
628
|
+
<documentation>
|
629
|
+
Gets feed lists for the specified policies.
|
630
|
+
You can add or remove feed lists for the policy. A feed list is
|
631
|
+
a list of URL feeds.
|
632
|
+
|
633
|
+
</documentation>
|
634
|
+
<input message="tns:Security.IPIntelligencePolicy.get_feed_listRequest"/>
|
635
|
+
<output message="tns:Security.IPIntelligencePolicy.get_feed_listResponse"/>
|
636
|
+
</operation>
|
637
|
+
<operation name="add_feed_list">
|
638
|
+
<documentation>
|
639
|
+
Adds a list of feed lists for the specified policies.
|
640
|
+
|
641
|
+
</documentation>
|
642
|
+
<input message="tns:Security.IPIntelligencePolicy.add_feed_listRequest"/>
|
643
|
+
<output message="tns:Security.IPIntelligencePolicy.add_feed_listResponse"/>
|
644
|
+
</operation>
|
645
|
+
<operation name="remove_feed_list">
|
646
|
+
<documentation>
|
647
|
+
Removes a list of feed lists from the specified policies.
|
648
|
+
|
649
|
+
</documentation>
|
650
|
+
<input message="tns:Security.IPIntelligencePolicy.remove_feed_listRequest"/>
|
651
|
+
<output message="tns:Security.IPIntelligencePolicy.remove_feed_listResponse"/>
|
652
|
+
</operation>
|
653
|
+
<operation name="remove_all_feed_lists">
|
654
|
+
<documentation>
|
655
|
+
Removes all feed lists from the specified policies.
|
656
|
+
|
657
|
+
</documentation>
|
658
|
+
<input message="tns:Security.IPIntelligencePolicy.remove_all_feed_listsRequest"/>
|
659
|
+
<output message="tns:Security.IPIntelligencePolicy.remove_all_feed_listsResponse"/>
|
660
|
+
</operation>
|
661
|
+
<operation name="set_blacklist_category_match_direction">
|
662
|
+
<documentation>
|
663
|
+
Sets the match directions for the specified blacklist categories.
|
664
|
+
Specifies the match direction for this blacklist category within
|
665
|
+
this policy. This can be set to source, destination, or both.
|
666
|
+
|
667
|
+
</documentation>
|
668
|
+
<input message="tns:Security.IPIntelligencePolicy.set_blacklist_category_match_directionRequest"/>
|
669
|
+
<output message="tns:Security.IPIntelligencePolicy.set_blacklist_category_match_directionResponse"/>
|
670
|
+
</operation>
|
671
|
+
<operation name="get_blacklist_category_match_direction">
|
672
|
+
<documentation>
|
673
|
+
Gets the match directions for the specified blacklist categories.
|
674
|
+
|
675
|
+
</documentation>
|
676
|
+
<input message="tns:Security.IPIntelligencePolicy.get_blacklist_category_match_directionRequest"/>
|
677
|
+
<output message="tns:Security.IPIntelligencePolicy.get_blacklist_category_match_directionResponse"/>
|
678
|
+
</operation>
|
679
|
+
<operation name="get_version">
|
680
|
+
<documentation>
|
681
|
+
Gets the version information for this interface.
|
682
|
+
|
683
|
+
</documentation>
|
684
|
+
<input message="tns:Security.IPIntelligencePolicy.get_versionRequest"/>
|
685
|
+
<output message="tns:Security.IPIntelligencePolicy.get_versionResponse"/>
|
686
|
+
</operation>
|
687
|
+
</portType>
|
688
|
+
|
689
|
+
<!-- binding -->
|
690
|
+
|
691
|
+
<binding name="Security.IPIntelligencePolicyBinding" type="tns:Security.IPIntelligencePolicyPortType">
|
692
|
+
<soap:binding style="rpc" transport="http://schemas.xmlsoap.org/soap/http"/>
|
693
|
+
<operation name="get_list">
|
694
|
+
<documentation>
|
695
|
+
Gets a list of all policies.
|
696
|
+
An IP intelligence policy is comprised of three logical groups
|
697
|
+
of settings: list of feed lists, enforcement and logging
|
698
|
+
settings per blacklist category, and default enforcement and
|
699
|
+
logging settings for blacklist categories.
|
700
|
+
|
701
|
+
</documentation>
|
702
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
703
|
+
<input>
|
704
|
+
<soap:body
|
705
|
+
use="encoded"
|
706
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
707
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
708
|
+
</input>
|
709
|
+
<output>
|
710
|
+
<soap:body
|
711
|
+
use="encoded"
|
712
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
713
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
714
|
+
</output>
|
715
|
+
</operation>
|
716
|
+
|
717
|
+
<operation name="create">
|
718
|
+
<documentation>
|
719
|
+
Creates a set of policies.
|
720
|
+
|
721
|
+
</documentation>
|
722
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
723
|
+
<input>
|
724
|
+
<soap:body
|
725
|
+
use="encoded"
|
726
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
727
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
728
|
+
</input>
|
729
|
+
<output>
|
730
|
+
<soap:body
|
731
|
+
use="encoded"
|
732
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
733
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
734
|
+
</output>
|
735
|
+
</operation>
|
736
|
+
|
737
|
+
<operation name="delete_policy">
|
738
|
+
<documentation>
|
739
|
+
Deletes the specified policies.
|
740
|
+
|
741
|
+
</documentation>
|
742
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
743
|
+
<input>
|
744
|
+
<soap:body
|
745
|
+
use="encoded"
|
746
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
747
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
748
|
+
</input>
|
749
|
+
<output>
|
750
|
+
<soap:body
|
751
|
+
use="encoded"
|
752
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
753
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
754
|
+
</output>
|
755
|
+
</operation>
|
756
|
+
|
757
|
+
<operation name="delete_all_policies">
|
758
|
+
<documentation>
|
759
|
+
Deletes all user defined policies.
|
760
|
+
|
761
|
+
</documentation>
|
762
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
763
|
+
<input>
|
764
|
+
<soap:body
|
765
|
+
use="encoded"
|
766
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
767
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
768
|
+
</input>
|
769
|
+
<output>
|
770
|
+
<soap:body
|
771
|
+
use="encoded"
|
772
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
773
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
774
|
+
</output>
|
775
|
+
</operation>
|
776
|
+
|
777
|
+
<operation name="set_default_action_type">
|
778
|
+
<documentation>
|
779
|
+
Sets the default action types for the specified policies.
|
780
|
+
Specifies a default enforcement action which will be performed
|
781
|
+
on the matched packet unless an implicit action is specified for
|
782
|
+
one of the blacklist categories the packet's IP is categorized
|
783
|
+
with. If the packet's IP is listed in a white list the action is
|
784
|
+
always accept.
|
785
|
+
|
786
|
+
</documentation>
|
787
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
788
|
+
<input>
|
789
|
+
<soap:body
|
790
|
+
use="encoded"
|
791
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
792
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
793
|
+
</input>
|
794
|
+
<output>
|
795
|
+
<soap:body
|
796
|
+
use="encoded"
|
797
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
798
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
799
|
+
</output>
|
800
|
+
</operation>
|
801
|
+
|
802
|
+
<operation name="get_default_action_type">
|
803
|
+
<documentation>
|
804
|
+
Gets the default action types for the specified policies.
|
805
|
+
|
806
|
+
</documentation>
|
807
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
808
|
+
<input>
|
809
|
+
<soap:body
|
810
|
+
use="encoded"
|
811
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
812
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
813
|
+
</input>
|
814
|
+
<output>
|
815
|
+
<soap:body
|
816
|
+
use="encoded"
|
817
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
818
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
819
|
+
</output>
|
820
|
+
</operation>
|
821
|
+
|
822
|
+
<operation name="set_log_blacklist_hit_state">
|
823
|
+
<documentation>
|
824
|
+
Sets the log blacklist hit states for the specified policies.
|
825
|
+
Specifies whether a log message will be generated if packet's
|
826
|
+
source IP is categorized with blacklist only (but not whitelist).
|
827
|
+
|
828
|
+
</documentation>
|
829
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
830
|
+
<input>
|
831
|
+
<soap:body
|
832
|
+
use="encoded"
|
833
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
834
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
835
|
+
</input>
|
836
|
+
<output>
|
837
|
+
<soap:body
|
838
|
+
use="encoded"
|
839
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
840
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
841
|
+
</output>
|
842
|
+
</operation>
|
843
|
+
|
844
|
+
<operation name="get_log_blacklist_hit_state">
|
845
|
+
<documentation>
|
846
|
+
Gets the log blacklist hit states for the specified policies.
|
847
|
+
|
848
|
+
</documentation>
|
849
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
850
|
+
<input>
|
851
|
+
<soap:body
|
852
|
+
use="encoded"
|
853
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
854
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
855
|
+
</input>
|
856
|
+
<output>
|
857
|
+
<soap:body
|
858
|
+
use="encoded"
|
859
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
860
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
861
|
+
</output>
|
862
|
+
</operation>
|
863
|
+
|
864
|
+
<operation name="set_log_blacklist_whitelist_both_hit_state">
|
865
|
+
<documentation>
|
866
|
+
Sets the log blacklist whitelist both hit states for the
|
867
|
+
specified policies.
|
868
|
+
Specifies whether log message will be generated if packet's
|
869
|
+
source IP is categorized with both blacklist and whitelist.
|
870
|
+
|
871
|
+
</documentation>
|
872
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
873
|
+
<input>
|
874
|
+
<soap:body
|
875
|
+
use="encoded"
|
876
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
877
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
878
|
+
</input>
|
879
|
+
<output>
|
880
|
+
<soap:body
|
881
|
+
use="encoded"
|
882
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
883
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
884
|
+
</output>
|
885
|
+
</operation>
|
886
|
+
|
887
|
+
<operation name="get_log_blacklist_whitelist_both_hit_state">
|
888
|
+
<documentation>
|
889
|
+
Gets the log blacklist whitelist both hit states for the
|
890
|
+
specified policies.
|
891
|
+
|
892
|
+
</documentation>
|
893
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
894
|
+
<input>
|
895
|
+
<soap:body
|
896
|
+
use="encoded"
|
897
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
898
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
899
|
+
</input>
|
900
|
+
<output>
|
901
|
+
<soap:body
|
902
|
+
use="encoded"
|
903
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
904
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
905
|
+
</output>
|
906
|
+
</operation>
|
907
|
+
|
908
|
+
<operation name="set_description">
|
909
|
+
<documentation>
|
910
|
+
Sets the descriptions for the specified policies.
|
911
|
+
This is an arbitrary field which can be used for any purpose.
|
912
|
+
|
913
|
+
</documentation>
|
914
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
915
|
+
<input>
|
916
|
+
<soap:body
|
917
|
+
use="encoded"
|
918
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
919
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
920
|
+
</input>
|
921
|
+
<output>
|
922
|
+
<soap:body
|
923
|
+
use="encoded"
|
924
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
925
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
926
|
+
</output>
|
927
|
+
</operation>
|
928
|
+
|
929
|
+
<operation name="get_description">
|
930
|
+
<documentation>
|
931
|
+
Gets the descriptions for the specified policies.
|
932
|
+
|
933
|
+
</documentation>
|
934
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
935
|
+
<input>
|
936
|
+
<soap:body
|
937
|
+
use="encoded"
|
938
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
939
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
940
|
+
</input>
|
941
|
+
<output>
|
942
|
+
<soap:body
|
943
|
+
use="encoded"
|
944
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
945
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
946
|
+
</output>
|
947
|
+
</operation>
|
948
|
+
|
949
|
+
<operation name="get_blacklist_category">
|
950
|
+
<documentation>
|
951
|
+
Gets categories for the specified policies.
|
952
|
+
You can add or remove blacklist categories for the policy. Each
|
953
|
+
category specifies the action, the log message for blacklist hit
|
954
|
+
only setting, and the log message for blacklist and whitelist
|
955
|
+
both hit setting.
|
956
|
+
|
957
|
+
</documentation>
|
958
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
959
|
+
<input>
|
960
|
+
<soap:body
|
961
|
+
use="encoded"
|
962
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
963
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
964
|
+
</input>
|
965
|
+
<output>
|
966
|
+
<soap:body
|
967
|
+
use="encoded"
|
968
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
969
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
970
|
+
</output>
|
971
|
+
</operation>
|
972
|
+
|
973
|
+
<operation name="add_blacklist_category">
|
974
|
+
<documentation>
|
975
|
+
Adds a list of categories for the specified policies.
|
976
|
+
|
977
|
+
</documentation>
|
978
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
979
|
+
<input>
|
980
|
+
<soap:body
|
981
|
+
use="encoded"
|
982
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
983
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
984
|
+
</input>
|
985
|
+
<output>
|
986
|
+
<soap:body
|
987
|
+
use="encoded"
|
988
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
989
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
990
|
+
</output>
|
991
|
+
</operation>
|
992
|
+
|
993
|
+
<operation name="remove_blacklist_category">
|
994
|
+
<documentation>
|
995
|
+
Removes a list of categories from the specified policies.
|
996
|
+
|
997
|
+
</documentation>
|
998
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
999
|
+
<input>
|
1000
|
+
<soap:body
|
1001
|
+
use="encoded"
|
1002
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1003
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1004
|
+
</input>
|
1005
|
+
<output>
|
1006
|
+
<soap:body
|
1007
|
+
use="encoded"
|
1008
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1009
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1010
|
+
</output>
|
1011
|
+
</operation>
|
1012
|
+
|
1013
|
+
<operation name="remove_all_blacklist_categories">
|
1014
|
+
<documentation>
|
1015
|
+
Removes all categories from the specified policies.
|
1016
|
+
|
1017
|
+
</documentation>
|
1018
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
1019
|
+
<input>
|
1020
|
+
<soap:body
|
1021
|
+
use="encoded"
|
1022
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1023
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1024
|
+
</input>
|
1025
|
+
<output>
|
1026
|
+
<soap:body
|
1027
|
+
use="encoded"
|
1028
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1029
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1030
|
+
</output>
|
1031
|
+
</operation>
|
1032
|
+
|
1033
|
+
<operation name="set_blacklist_category_action_type">
|
1034
|
+
<documentation>
|
1035
|
+
Sets the action types for the specified blacklist categories.
|
1036
|
+
Specifies what enforcement action will be applied if the packet
|
1037
|
+
is categorized with this blacklist category. If the packet is
|
1038
|
+
categorized with more than one blacklist the most restrictive
|
1039
|
+
action will be applied.
|
1040
|
+
|
1041
|
+
</documentation>
|
1042
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
1043
|
+
<input>
|
1044
|
+
<soap:body
|
1045
|
+
use="encoded"
|
1046
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1047
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1048
|
+
</input>
|
1049
|
+
<output>
|
1050
|
+
<soap:body
|
1051
|
+
use="encoded"
|
1052
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1053
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1054
|
+
</output>
|
1055
|
+
</operation>
|
1056
|
+
|
1057
|
+
<operation name="get_blacklist_category_action_type">
|
1058
|
+
<documentation>
|
1059
|
+
Gets the action types for the specified blacklist categories.
|
1060
|
+
|
1061
|
+
</documentation>
|
1062
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
1063
|
+
<input>
|
1064
|
+
<soap:body
|
1065
|
+
use="encoded"
|
1066
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1067
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1068
|
+
</input>
|
1069
|
+
<output>
|
1070
|
+
<soap:body
|
1071
|
+
use="encoded"
|
1072
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1073
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1074
|
+
</output>
|
1075
|
+
</operation>
|
1076
|
+
|
1077
|
+
<operation name="set_blacklist_category_log_blacklist_hit_only_setting">
|
1078
|
+
<documentation>
|
1079
|
+
Sets the log blacklist hit only settings for the specified
|
1080
|
+
blacklist categories.
|
1081
|
+
Specifies if a log message will be generated if the packet is
|
1082
|
+
categorized with this blacklist and no whitelists includes this
|
1083
|
+
packet's IP.
|
1084
|
+
|
1085
|
+
</documentation>
|
1086
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
1087
|
+
<input>
|
1088
|
+
<soap:body
|
1089
|
+
use="encoded"
|
1090
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1091
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1092
|
+
</input>
|
1093
|
+
<output>
|
1094
|
+
<soap:body
|
1095
|
+
use="encoded"
|
1096
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1097
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1098
|
+
</output>
|
1099
|
+
</operation>
|
1100
|
+
|
1101
|
+
<operation name="get_blacklist_category_log_blacklist_hit_only_setting">
|
1102
|
+
<documentation>
|
1103
|
+
Gets the log blacklist hit only settings for the specified
|
1104
|
+
blacklist categories.
|
1105
|
+
|
1106
|
+
</documentation>
|
1107
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
1108
|
+
<input>
|
1109
|
+
<soap:body
|
1110
|
+
use="encoded"
|
1111
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1112
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1113
|
+
</input>
|
1114
|
+
<output>
|
1115
|
+
<soap:body
|
1116
|
+
use="encoded"
|
1117
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1118
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1119
|
+
</output>
|
1120
|
+
</operation>
|
1121
|
+
|
1122
|
+
<operation name="set_blacklist_category_log_blacklist_whitelist_hit_setting">
|
1123
|
+
<documentation>
|
1124
|
+
Sets the log blacklist whitelist hit settings for the specified
|
1125
|
+
blacklist categories.
|
1126
|
+
Specifies if a log message will be generated if the packet is
|
1127
|
+
categorized with this blacklist and the packet's IP is listed in
|
1128
|
+
a whitelist.
|
1129
|
+
|
1130
|
+
</documentation>
|
1131
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
1132
|
+
<input>
|
1133
|
+
<soap:body
|
1134
|
+
use="encoded"
|
1135
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1136
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1137
|
+
</input>
|
1138
|
+
<output>
|
1139
|
+
<soap:body
|
1140
|
+
use="encoded"
|
1141
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1142
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1143
|
+
</output>
|
1144
|
+
</operation>
|
1145
|
+
|
1146
|
+
<operation name="get_blacklist_category_log_blacklist_whitelist_hit_setting">
|
1147
|
+
<documentation>
|
1148
|
+
Gets the log blacklist whitelist hit settings for the specified
|
1149
|
+
blacklist categories.
|
1150
|
+
|
1151
|
+
</documentation>
|
1152
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
1153
|
+
<input>
|
1154
|
+
<soap:body
|
1155
|
+
use="encoded"
|
1156
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1157
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1158
|
+
</input>
|
1159
|
+
<output>
|
1160
|
+
<soap:body
|
1161
|
+
use="encoded"
|
1162
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1163
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1164
|
+
</output>
|
1165
|
+
</operation>
|
1166
|
+
|
1167
|
+
<operation name="set_blacklist_category_description">
|
1168
|
+
<documentation>
|
1169
|
+
Sets the descriptions for the specified blacklist categories.
|
1170
|
+
This is an arbitrary field which can be used for any purpose.
|
1171
|
+
|
1172
|
+
</documentation>
|
1173
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
1174
|
+
<input>
|
1175
|
+
<soap:body
|
1176
|
+
use="encoded"
|
1177
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1178
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1179
|
+
</input>
|
1180
|
+
<output>
|
1181
|
+
<soap:body
|
1182
|
+
use="encoded"
|
1183
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1184
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1185
|
+
</output>
|
1186
|
+
</operation>
|
1187
|
+
|
1188
|
+
<operation name="get_blacklist_category_description">
|
1189
|
+
<documentation>
|
1190
|
+
Gets the descriptions for the specified blacklist categories.
|
1191
|
+
|
1192
|
+
</documentation>
|
1193
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
1194
|
+
<input>
|
1195
|
+
<soap:body
|
1196
|
+
use="encoded"
|
1197
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1198
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1199
|
+
</input>
|
1200
|
+
<output>
|
1201
|
+
<soap:body
|
1202
|
+
use="encoded"
|
1203
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1204
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1205
|
+
</output>
|
1206
|
+
</operation>
|
1207
|
+
|
1208
|
+
<operation name="get_feed_list">
|
1209
|
+
<documentation>
|
1210
|
+
Gets feed lists for the specified policies.
|
1211
|
+
You can add or remove feed lists for the policy. A feed list is
|
1212
|
+
a list of URL feeds.
|
1213
|
+
|
1214
|
+
</documentation>
|
1215
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
1216
|
+
<input>
|
1217
|
+
<soap:body
|
1218
|
+
use="encoded"
|
1219
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1220
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1221
|
+
</input>
|
1222
|
+
<output>
|
1223
|
+
<soap:body
|
1224
|
+
use="encoded"
|
1225
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1226
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1227
|
+
</output>
|
1228
|
+
</operation>
|
1229
|
+
|
1230
|
+
<operation name="add_feed_list">
|
1231
|
+
<documentation>
|
1232
|
+
Adds a list of feed lists for the specified policies.
|
1233
|
+
|
1234
|
+
</documentation>
|
1235
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
1236
|
+
<input>
|
1237
|
+
<soap:body
|
1238
|
+
use="encoded"
|
1239
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1240
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1241
|
+
</input>
|
1242
|
+
<output>
|
1243
|
+
<soap:body
|
1244
|
+
use="encoded"
|
1245
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1246
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1247
|
+
</output>
|
1248
|
+
</operation>
|
1249
|
+
|
1250
|
+
<operation name="remove_feed_list">
|
1251
|
+
<documentation>
|
1252
|
+
Removes a list of feed lists from the specified policies.
|
1253
|
+
|
1254
|
+
</documentation>
|
1255
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
1256
|
+
<input>
|
1257
|
+
<soap:body
|
1258
|
+
use="encoded"
|
1259
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1260
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1261
|
+
</input>
|
1262
|
+
<output>
|
1263
|
+
<soap:body
|
1264
|
+
use="encoded"
|
1265
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1266
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1267
|
+
</output>
|
1268
|
+
</operation>
|
1269
|
+
|
1270
|
+
<operation name="remove_all_feed_lists">
|
1271
|
+
<documentation>
|
1272
|
+
Removes all feed lists from the specified policies.
|
1273
|
+
|
1274
|
+
</documentation>
|
1275
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
1276
|
+
<input>
|
1277
|
+
<soap:body
|
1278
|
+
use="encoded"
|
1279
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1280
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1281
|
+
</input>
|
1282
|
+
<output>
|
1283
|
+
<soap:body
|
1284
|
+
use="encoded"
|
1285
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1286
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1287
|
+
</output>
|
1288
|
+
</operation>
|
1289
|
+
|
1290
|
+
<operation name="set_blacklist_category_match_direction">
|
1291
|
+
<documentation>
|
1292
|
+
Sets the match directions for the specified blacklist categories.
|
1293
|
+
Specifies the match direction for this blacklist category within
|
1294
|
+
this policy. This can be set to source, destination, or both.
|
1295
|
+
|
1296
|
+
</documentation>
|
1297
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
1298
|
+
<input>
|
1299
|
+
<soap:body
|
1300
|
+
use="encoded"
|
1301
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1302
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1303
|
+
</input>
|
1304
|
+
<output>
|
1305
|
+
<soap:body
|
1306
|
+
use="encoded"
|
1307
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1308
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1309
|
+
</output>
|
1310
|
+
</operation>
|
1311
|
+
|
1312
|
+
<operation name="get_blacklist_category_match_direction">
|
1313
|
+
<documentation>
|
1314
|
+
Gets the match directions for the specified blacklist categories.
|
1315
|
+
|
1316
|
+
</documentation>
|
1317
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
1318
|
+
<input>
|
1319
|
+
<soap:body
|
1320
|
+
use="encoded"
|
1321
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1322
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1323
|
+
</input>
|
1324
|
+
<output>
|
1325
|
+
<soap:body
|
1326
|
+
use="encoded"
|
1327
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1328
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1329
|
+
</output>
|
1330
|
+
</operation>
|
1331
|
+
|
1332
|
+
<operation name="get_version">
|
1333
|
+
<documentation>
|
1334
|
+
Gets the version information for this interface.
|
1335
|
+
|
1336
|
+
</documentation>
|
1337
|
+
<soap:operation soapAction="urn:iControl:Security/IPIntelligencePolicy"/>
|
1338
|
+
<input>
|
1339
|
+
<soap:body
|
1340
|
+
use="encoded"
|
1341
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1342
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1343
|
+
</input>
|
1344
|
+
<output>
|
1345
|
+
<soap:body
|
1346
|
+
use="encoded"
|
1347
|
+
namespace="urn:iControl:Security/IPIntelligencePolicy"
|
1348
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
1349
|
+
</output>
|
1350
|
+
</operation>
|
1351
|
+
</binding>
|
1352
|
+
|
1353
|
+
<!-- service -->
|
1354
|
+
|
1355
|
+
<service name="Security.IPIntelligencePolicy">
|
1356
|
+
<documentation>
|
1357
|
+
The IPIntelligencePolicy interface enables you to manipulate an
|
1358
|
+
IP Intelligence policy. The IP Intelligence policy is a
|
1359
|
+
functionally enriched generalization of the IP Intelligence
|
1360
|
+
profile (the latter has been immediately deprecated in this
|
1361
|
+
release). As opposed to the deprecated profile, policy can be
|
1362
|
+
applied to route domains and globally in addition to virtual
|
1363
|
+
servers. When packet passes through the system first the global
|
1364
|
+
policy is applied, then route domain's one and then virtual's
|
1365
|
+
one provided the configured policies are applicable to the
|
1366
|
+
packet's source IP. In addition to the predefined blacklist
|
1367
|
+
categories (see the IPIntelligenceBlacklistCategory interface)
|
1368
|
+
and 3rd party integrated IP reputation database coming with the
|
1369
|
+
system the IP Intelligence policy provides an ability to
|
1370
|
+
configure dynamic IP whitelists and blacklists downloaded from
|
1371
|
+
external web feeds (see IPIntelligenceFeedList interface). The
|
1372
|
+
IP Intelligence policy is comprised of three logical groups of
|
1373
|
+
settings: 1) List of feed lists create the union set of IP
|
1374
|
+
addresses/subnets with their blacklist/whitelist categorization.
|
1375
|
+
The policy is applied on the packet only if packet's source IP
|
1376
|
+
is found in that set. 2. Enforcement and logging settings per
|
1377
|
+
blacklist category. If the policy applies to the packet and the
|
1378
|
+
packet's source IP's blacklist category is explicitly confgured
|
1379
|
+
in the policy, the configuration settings will be applied to
|
1380
|
+
that packet. When the packet's source IP is categorized with
|
1381
|
+
more than one category the most restrictive action and logging
|
1382
|
+
settings will apply. 3. Default policy enforcement and logging
|
1383
|
+
settings are used when the packet to which the policy applied is
|
1384
|
+
categorized with the blacklist which isn't explicitly configured
|
1385
|
+
in this policy or it is configured and the corresponding setting
|
1386
|
+
is set with the option "use policy setting".
|
1387
|
+
|
1388
|
+
</documentation>
|
1389
|
+
<port name="Security.IPIntelligencePolicyPort" binding="tns:Security.IPIntelligencePolicyBinding">
|
1390
|
+
<soap:address location="https://url_to_service"/>
|
1391
|
+
</port>
|
1392
|
+
</service>
|
1393
|
+
</definitions>
|