f5-icontrol 0.1.6 → 0.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +3 -0
- data/README.md +0 -3
- data/lib/f5/icontrol/api.rb +1 -1
- data/lib/f5/icontrol/version.rb +1 -1
- data/lib/wsdl/ASM.LoggingProfile.wsdl +1 -1
- data/lib/wsdl/ASM.ObjectParams.wsdl +1 -1
- data/lib/wsdl/ASM.PSMProfile.wsdl +1 -1
- data/lib/wsdl/ASM.Policy.wsdl +106 -1
- data/lib/wsdl/ASM.PolicyGroup.wsdl +1 -1
- data/lib/wsdl/ASM.SystemConfiguration.wsdl +66 -1
- data/lib/wsdl/ASM.WebApplication.wsdl +6 -1
- data/lib/wsdl/ASM.WebApplicationGroup.wsdl +1 -1
- data/lib/wsdl/Classification.Application.wsdl +1 -1
- data/lib/wsdl/Classification.Category.wsdl +1 -1
- data/lib/wsdl/Classification.SignatureDefinition.wsdl +30 -30
- data/lib/wsdl/Classification.SignatureUpdateSchedule.wsdl +59 -5
- data/lib/wsdl/Classification.SignatureVersion.wsdl +1 -1
- data/lib/wsdl/GlobalLB.Application.wsdl +211 -3
- data/lib/wsdl/GlobalLB.DNSSECKey.wsdl +1 -1
- data/lib/wsdl/GlobalLB.DNSSECZone.wsdl +7930 -17
- data/lib/wsdl/GlobalLB.DataCenter.wsdl +1841 -1
- data/lib/wsdl/GlobalLB.Globals.wsdl +272 -27
- data/lib/wsdl/GlobalLB.Link.wsdl +1841 -1
- data/lib/wsdl/GlobalLB.Monitor.wsdl +11 -1
- data/lib/wsdl/GlobalLB.Pool.wsdl +2752 -68
- data/lib/wsdl/GlobalLB.PoolMember.wsdl +1844 -2
- data/lib/wsdl/GlobalLB.PoolV2.wsdl +13122 -0
- data/lib/wsdl/GlobalLB.ProberPool.wsdl +1841 -1
- data/lib/wsdl/GlobalLB.Region.wsdl +1 -1
- data/lib/wsdl/GlobalLB.Rule.wsdl +1841 -1
- data/lib/wsdl/GlobalLB.Server.wsdl +1841 -1
- data/lib/wsdl/GlobalLB.Topology.wsdl +1 -1
- data/lib/wsdl/GlobalLB.VirtualServer.wsdl +1841 -1
- data/lib/wsdl/GlobalLB.VirtualServerV2.wsdl +1841 -1
- data/lib/wsdl/GlobalLB.WideIP.wsdl +2478 -166
- data/lib/wsdl/GlobalLB.WideIPV2.wsdl +10494 -0
- data/lib/wsdl/LTConfig.Class.wsdl +1 -1
- data/lib/wsdl/LTConfig.Field.wsdl +1 -1
- data/lib/wsdl/LocalLB.ALGLogProfile.wsdl +1479 -0
- data/lib/wsdl/LocalLB.Class.wsdl +1 -1
- data/lib/wsdl/LocalLB.ContentPolicy.wsdl +7021 -0
- data/lib/wsdl/LocalLB.ContentPolicyStrategy.wsdl +1264 -0
- data/lib/wsdl/LocalLB.DNSCache.wsdl +3023 -474
- data/lib/wsdl/LocalLB.DNSExpress.wsdl +2282 -251
- data/lib/wsdl/LocalLB.DNSGlobals.wsdl +1 -1
- data/lib/wsdl/LocalLB.DNSServer.wsdl +8213 -0
- data/lib/wsdl/LocalLB.DNSTSIGKey.wsdl +400 -0
- data/lib/wsdl/LocalLB.DNSZone.wsdl +8744 -0
- data/lib/wsdl/LocalLB.DataGroupFile.wsdl +1 -1
- data/lib/wsdl/LocalLB.FlowEvictionPolicy.wsdl +10188 -0
- data/lib/wsdl/LocalLB.LSNLogProfile.wsdl +1257 -0
- data/lib/wsdl/LocalLB.LSNPool.wsdl +3454 -667
- data/lib/wsdl/LocalLB.MessageRoutingPeer.wsdl +803 -0
- data/lib/wsdl/LocalLB.MessageRoutingSIPRoute.wsdl +838 -0
- data/lib/wsdl/LocalLB.MessageRoutingTransportConfig.wsdl +1153 -0
- data/lib/wsdl/LocalLB.Monitor.wsdl +429 -1
- data/lib/wsdl/LocalLB.NAT.wsdl +1841 -1
- data/lib/wsdl/LocalLB.NATV2.wsdl +1841 -1
- data/lib/wsdl/LocalLB.NodeAddress.wsdl +1841 -1
- data/lib/wsdl/LocalLB.NodeAddressV2.wsdl +2165 -251
- data/lib/wsdl/LocalLB.OCSPStaplingParameters.wsdl +1537 -0
- data/lib/wsdl/LocalLB.Pool.wsdl +5568 -2423
- data/lib/wsdl/LocalLB.PoolMember.wsdl +1841 -1
- data/lib/wsdl/LocalLB.ProfileAnalytics.wsdl +364 -1
- data/lib/wsdl/LocalLB.ProfileAuth.wsdl +1846 -1
- data/lib/wsdl/LocalLB.ProfileClassification.wsdl +1 -1
- data/lib/wsdl/LocalLB.ProfileClientLDAP.wsdl +8361 -0
- data/lib/wsdl/LocalLB.ProfileClientSSL.wsdl +6168 -1858
- data/lib/wsdl/LocalLB.ProfileDNS.wsdl +2582 -310
- data/lib/wsdl/LocalLB.ProfileDNSLogging.wsdl +1 -1
- data/lib/wsdl/LocalLB.ProfileDiameter.wsdl +1841 -1
- data/lib/wsdl/LocalLB.ProfileDiameterEndpoint.wsdl +1841 -1
- data/lib/wsdl/LocalLB.ProfileFIX.wsdl +8992 -0
- data/lib/wsdl/LocalLB.ProfileFTP.wsdl +2399 -276
- data/lib/wsdl/LocalLB.ProfileFastHttp.wsdl +1846 -1
- data/lib/wsdl/LocalLB.ProfileFastL4.wsdl +2476 -244
- data/lib/wsdl/LocalLB.ProfileHttp.wsdl +4569 -1825
- data/lib/wsdl/LocalLB.ProfileHttpClass.wsdl +1841 -1
- data/lib/wsdl/LocalLB.ProfileHttpCompression.wsdl +1841 -1
- data/lib/wsdl/LocalLB.ProfileICAP.wsdl +1841 -1
- data/lib/wsdl/LocalLB.ProfileIIOP.wsdl +1841 -1
- data/lib/wsdl/LocalLB.ProfileOneConnect.wsdl +2332 -256
- data/lib/wsdl/LocalLB.ProfilePCP.wsdl +1499 -0
- data/lib/wsdl/LocalLB.ProfilePPTP.wsdl +8423 -0
- data/lib/wsdl/LocalLB.ProfilePersistence.wsdl +466 -31
- data/lib/wsdl/LocalLB.ProfileRADIUS.wsdl +1841 -1
- data/lib/wsdl/LocalLB.ProfileRTSP.wsdl +2193 -159
- data/lib/wsdl/LocalLB.ProfileRequestAdapt.wsdl +1841 -1
- data/lib/wsdl/LocalLB.ProfileRequestLogging.wsdl +1 -1
- data/lib/wsdl/LocalLB.ProfileResponseAdapt.wsdl +1841 -1
- data/lib/wsdl/LocalLB.ProfileSCTP.wsdl +2918 -463
- data/lib/wsdl/LocalLB.ProfileSIP.wsdl +2189 -155
- data/lib/wsdl/LocalLB.ProfileSIPRouter.wsdl +9215 -0
- data/lib/wsdl/LocalLB.ProfileSIPSession.wsdl +9655 -0
- data/lib/wsdl/LocalLB.ProfileSMTPS.wsdl +8361 -0
- data/lib/wsdl/LocalLB.ProfileSPDY.wsdl +1870 -25
- data/lib/wsdl/LocalLB.ProfileSPM.wsdl +1 -1
- data/lib/wsdl/LocalLB.ProfileServerLDAP.wsdl +8361 -0
- data/lib/wsdl/LocalLB.ProfileServerSSL.wsdl +2729 -230
- data/lib/wsdl/LocalLB.ProfileStream.wsdl +1841 -1
- data/lib/wsdl/LocalLB.ProfileTCP.wsdl +3235 -309
- data/lib/wsdl/LocalLB.ProfileTCPAnalytics.wsdl +1466 -0
- data/lib/wsdl/LocalLB.ProfileTFTP.wsdl +8544 -0
- data/lib/wsdl/LocalLB.ProfileUDP.wsdl +1841 -1
- data/lib/wsdl/LocalLB.ProfileUserStatistic.wsdl +1 -1
- data/lib/wsdl/LocalLB.ProfileWebAcceleration.wsdl +1841 -1
- data/lib/wsdl/LocalLB.ProfileXML.wsdl +1841 -1
- data/lib/wsdl/LocalLB.RAMCacheInformation.wsdl +1 -1
- data/lib/wsdl/LocalLB.RateClass.wsdl +2192 -132
- data/lib/wsdl/LocalLB.Rule.wsdl +1841 -1
- data/lib/wsdl/LocalLB.SNAT.wsdl +1841 -1
- data/lib/wsdl/LocalLB.SNATPool.wsdl +1841 -1
- data/lib/wsdl/LocalLB.SNATPoolMember.wsdl +1841 -1
- data/lib/wsdl/LocalLB.SNATTranslationAddress.wsdl +1841 -1
- data/lib/wsdl/LocalLB.SNATTranslationAddressV2.wsdl +1841 -1
- data/lib/wsdl/LocalLB.VirtualAddress.wsdl +1841 -1
- data/lib/wsdl/LocalLB.VirtualAddressV2.wsdl +2265 -239
- data/lib/wsdl/LocalLB.VirtualServer.wsdl +10764 -5504
- data/lib/wsdl/LocalLB.iFile.wsdl +1 -1
- data/lib/wsdl/LocalLB.iFileFile.wsdl +1 -1
- data/lib/wsdl/Log.DestinationArcSight.wsdl +1 -1
- data/lib/wsdl/Log.DestinationIPFIX.wsdl +783 -0
- data/lib/wsdl/Log.DestinationLocalSyslog.wsdl +5 -5
- data/lib/wsdl/Log.DestinationManagementPort.wsdl +570 -0
- data/lib/wsdl/Log.DestinationRemoteHighSpeedLog.wsdl +268 -10
- data/lib/wsdl/Log.DestinationRemoteSyslog.wsdl +134 -14
- data/lib/wsdl/Log.DestinationSplunk.wsdl +1 -1
- data/lib/wsdl/Log.Filter.wsdl +266 -1
- data/lib/wsdl/Log.IPFIXInformationElement.wsdl +811 -0
- data/lib/wsdl/Log.Publisher.wsdl +1 -1
- data/lib/wsdl/Management.ApplicationPresentationScript.wsdl +1 -1
- data/lib/wsdl/Management.ApplicationService.wsdl +1 -1
- data/lib/wsdl/Management.ApplicationTemplate.wsdl +16 -1
- data/lib/wsdl/Management.CCLDAPConfiguration.wsdl +1 -1
- data/lib/wsdl/Management.CLIScript.wsdl +1 -1
- data/lib/wsdl/Management.CRLDPConfiguration.wsdl +1 -1
- data/lib/wsdl/Management.CRLDPServer.wsdl +1 -1
- data/lib/wsdl/Management.CertLDAPConfiguration.wsdl +1 -1
- data/lib/wsdl/Management.ChangeControl.wsdl +1 -1
- data/lib/wsdl/Management.DBVariable.wsdl +1 -1
- data/lib/wsdl/Management.Device.wsdl +36 -1
- data/lib/wsdl/Management.DeviceGroup.wsdl +1 -1
- data/lib/wsdl/Management.EM.wsdl +1 -1
- data/lib/wsdl/Management.EventNotification.wsdl +1 -1
- data/lib/wsdl/Management.EventSubscription.wsdl +1 -1
- data/lib/wsdl/Management.FeatureModule.wsdl +16 -1
- data/lib/wsdl/Management.Folder.wsdl +1 -1
- data/lib/wsdl/Management.Globals.wsdl +1 -1
- data/lib/wsdl/Management.KeyCertificate.wsdl +738 -64
- data/lib/wsdl/Management.LDAPConfiguration.wsdl +1 -1
- data/lib/wsdl/Management.LicenseAdministration.wsdl +16 -1
- data/lib/wsdl/Management.Named.wsdl +1 -1
- data/lib/wsdl/Management.OCSPConfiguration.wsdl +1 -1
- data/lib/wsdl/Management.OCSPResponder.wsdl +1 -1
- data/lib/wsdl/Management.Partition.wsdl +1 -1
- data/lib/wsdl/Management.Provision.wsdl +16 -1
- data/lib/wsdl/Management.RADIUSConfiguration.wsdl +1 -1
- data/lib/wsdl/Management.RADIUSServer.wsdl +1 -1
- data/lib/wsdl/Management.ResourceRecord.wsdl +1 -1
- data/lib/wsdl/Management.SFlowDataSource.wsdl +1 -1
- data/lib/wsdl/Management.SFlowGlobals.wsdl +1 -1
- data/lib/wsdl/Management.SFlowReceiver.wsdl +1 -1
- data/lib/wsdl/Management.SMTPConfiguration.wsdl +1 -1
- data/lib/wsdl/Management.SNMPConfiguration.wsdl +3 -5
- data/lib/wsdl/Management.TACACSConfiguration.wsdl +1 -1
- data/lib/wsdl/Management.TMOSModule.wsdl +16 -1
- data/lib/wsdl/Management.TrafficGroup.wsdl +77 -1
- data/lib/wsdl/Management.Trust.wsdl +1 -1
- data/lib/wsdl/Management.UserManagement.wsdl +47 -1
- data/lib/wsdl/Management.View.wsdl +1 -1
- data/lib/wsdl/Management.Zone.wsdl +104 -17
- data/lib/wsdl/Management.ZoneRunner.wsdl +1 -1
- data/lib/wsdl/Networking.ARP.wsdl +1 -1
- data/lib/wsdl/Networking.AdminIP.wsdl +1 -1
- data/lib/wsdl/Networking.BWControllerPolicy.wsdl +515 -36
- data/lib/wsdl/Networking.BWPriorityGroup.wsdl +655 -0
- data/lib/wsdl/Networking.DNSResolver.wsdl +1278 -0
- data/lib/wsdl/Networking.IPsecIkeDaemon.wsdl +1 -1
- data/lib/wsdl/Networking.IPsecIkePeer.wsdl +661 -29
- data/lib/wsdl/Networking.IPsecManualSecurityAssociation.wsdl +107 -5
- data/lib/wsdl/Networking.IPsecPolicy.wsdl +21 -1
- data/lib/wsdl/Networking.IPsecTrafficSelector.wsdl +1 -1
- data/lib/wsdl/Networking.Interfaces.wsdl +2165 -251
- data/lib/wsdl/Networking.LLDPGlobals.wsdl +1 -1
- data/lib/wsdl/Networking.MulticastRoute.wsdl +265 -0
- data/lib/wsdl/Networking.PacketFilter.wsdl +1841 -1
- data/lib/wsdl/Networking.PacketFilterGlobals.wsdl +1 -1
- data/lib/wsdl/Networking.PortMirror.wsdl +1 -1
- data/lib/wsdl/Networking.ProfileFEC.wsdl +1 -1
- data/lib/wsdl/Networking.ProfileGRE.wsdl +232 -1
- data/lib/wsdl/Networking.ProfileGeneve.wsdl +674 -0
- data/lib/wsdl/Networking.ProfileIPIP.wsdl +1 -1
- data/lib/wsdl/Networking.ProfileIPsec.wsdl +560 -0
- data/lib/wsdl/Networking.ProfileLightweight4Over6Tunnel.wsdl +663 -0
- data/lib/wsdl/Networking.ProfileMAP.wsdl +834 -0
- data/lib/wsdl/Networking.ProfileV6RD.wsdl +861 -0
- data/lib/wsdl/Networking.ProfileVXLAN.wsdl +223 -1
- data/lib/wsdl/Networking.ProfileWCCPGRE.wsdl +1 -1
- data/lib/wsdl/Networking.RouteDomain.wsdl +4 -9
- data/lib/wsdl/Networking.RouteDomainV2.wsdl +8959 -3933
- data/lib/wsdl/Networking.RouteTable.wsdl +1 -1
- data/lib/wsdl/Networking.RouteTableV2.wsdl +1 -1
- data/lib/wsdl/Networking.RouterAdvertisement.wsdl +1 -1
- data/lib/wsdl/Networking.STPGlobals.wsdl +1 -1
- data/lib/wsdl/Networking.STPInstance.wsdl +1 -1
- data/lib/wsdl/Networking.STPInstanceV2.wsdl +1 -1
- data/lib/wsdl/Networking.SelfIP.wsdl +1 -1
- data/lib/wsdl/Networking.SelfIPPortLockdown.wsdl +1216 -1
- data/lib/wsdl/Networking.SelfIPV2.wsdl +8717 -3908
- data/lib/wsdl/Networking.Trunk.wsdl +2173 -259
- data/lib/wsdl/Networking.Tunnel.wsdl +617 -1
- data/lib/wsdl/Networking.VLAN.wsdl +322 -39
- data/lib/wsdl/Networking.VLANGroup.wsdl +40 -1
- data/lib/wsdl/Networking.iSessionAdvertisedRoute.wsdl +1 -1
- data/lib/wsdl/Networking.iSessionAdvertisedRouteV2.wsdl +1 -1
- data/lib/wsdl/Networking.iSessionDatastor.wsdl +7 -13
- data/lib/wsdl/Networking.iSessionDeduplication.wsdl +1 -1
- data/lib/wsdl/Networking.iSessionLocalInterface.wsdl +77 -1
- data/lib/wsdl/Networking.iSessionPeerDiscovery.wsdl +1 -1
- data/lib/wsdl/Networking.iSessionRemoteInterface.wsdl +1 -1
- data/lib/wsdl/Networking.iSessionRemoteInterfaceV2.wsdl +108 -1
- data/lib/wsdl/PEM.FormatScript.wsdl +1 -1
- data/lib/wsdl/PEM.ForwardingEndpoint.wsdl +111 -1
- data/lib/wsdl/PEM.InterceptionEndpoint.wsdl +1 -1
- data/lib/wsdl/PEM.Listener.wsdl +1 -1
- data/lib/wsdl/PEM.Policy.wsdl +591 -1
- data/lib/wsdl/PEM.ServiceChainEndpoint.wsdl +169 -1
- data/lib/wsdl/PEM.Subscriber.wsdl +1841 -1
- data/lib/wsdl/Security.DoSDevice.wsdl +3097 -336
- data/lib/wsdl/Security.DoSWhitelist.wsdl +877 -0
- data/lib/wsdl/Security.FirewallAddressList.wsdl +959 -33
- data/lib/wsdl/Security.FirewallGlobalAdminIPRuleList.wsdl +5955 -2350
- data/lib/wsdl/Security.FirewallGlobalRuleList.wsdl +8370 -3601
- data/lib/wsdl/Security.FirewallPolicy.wsdl +7786 -3589
- data/lib/wsdl/Security.FirewallPortList.wsdl +287 -1
- data/lib/wsdl/Security.FirewallRuleList.wsdl +3633 -1276
- data/lib/wsdl/Security.FirewallWeeklySchedule.wsdl +1 -1
- data/lib/wsdl/Security.IPIntelligenceBlacklistCategory.wsdl +555 -0
- data/lib/wsdl/Security.IPIntelligenceFeedList.wsdl +1086 -0
- data/lib/wsdl/Security.IPIntelligenceGlobalPolicy.wsdl +285 -0
- data/lib/wsdl/Security.IPIntelligencePolicy.wsdl +1393 -0
- data/lib/wsdl/Security.LogProfile.wsdl +784 -66
- data/lib/wsdl/Security.ProfileDNSSecurity.wsdl +1841 -1
- data/lib/wsdl/Security.ProfileDoS.wsdl +5602 -1813
- data/lib/wsdl/Security.ProfileIPIntelligence.wsdl +2100 -256
- data/lib/wsdl/System.CertificateRevocationListFile.wsdl +1 -1
- data/lib/wsdl/System.Cluster.wsdl +17 -1
- data/lib/wsdl/System.ConfigSync.wsdl +226 -5
- data/lib/wsdl/System.Connections.wsdl +1216 -1
- data/lib/wsdl/System.CryptoClient.wsdl +8697 -0
- data/lib/wsdl/System.CryptoServer.wsdl +8507 -0
- data/lib/wsdl/System.Disk.wsdl +11 -1
- data/lib/wsdl/System.ExternalMonitorFile.wsdl +1 -1
- data/lib/wsdl/System.Failover.wsdl +1 -1
- data/lib/wsdl/System.GeoIP.wsdl +31 -15
- data/lib/wsdl/System.HAGroup.wsdl +1 -1
- data/lib/wsdl/System.HAStatus.wsdl +1 -1
- data/lib/wsdl/System.Inet.wsdl +1 -1
- data/lib/wsdl/System.Internal.wsdl +1 -1
- data/lib/wsdl/System.LightweightTunnelTableFile.wsdl +639 -0
- data/lib/wsdl/System.PerformanceSFlow.wsdl +1 -1
- data/lib/wsdl/System.Services.wsdl +6 -1
- data/lib/wsdl/System.Session.wsdl +203 -1
- data/lib/wsdl/System.SoftwareManagement.wsdl +275 -58
- data/lib/wsdl/System.Statistics.wsdl +4292 -1426
- data/lib/wsdl/System.SystemInfo.wsdl +1877 -32
- data/lib/wsdl/System.VCMP.wsdl +3498 -664
- data/lib/wsdl/WebAccelerator.Applications.wsdl +1841 -1
- data/lib/wsdl/WebAccelerator.Policies.wsdl +1 -1
- data/lib/wsdl/WebAccelerator.ProxyMessage.wsdl +1 -1
- data/lib/wsdl/iCall.PeriodicHandler.wsdl +1 -1
- data/lib/wsdl/iCall.PerpetualHandler.wsdl +1 -1
- data/lib/wsdl/iCall.Script.wsdl +43 -3
- data/lib/wsdl/iCall.TriggeredHandler.wsdl +1 -1
- metadata +46 -4
- data/LICENSE +0 -9
@@ -1,6 +1,6 @@
|
|
1
1
|
<?xml version="1.0" ?>
|
2
2
|
<!--
|
3
|
-
Copyright (c) 1996-
|
3
|
+
Copyright (c) 1996-2016, F5 Networks, Inc., Seattle, Washington. All rights reserved.
|
4
4
|
|
5
5
|
F5, F5 Networks, the F5 logo, BIG-IP, 3-DNS, iControl, GLOBAL-SITE, SEE-IT, EDGE-FX, FireGuard, Internet Control Architecture, IP Application Switch, iRules, PACKET VELOCITY, SYN Check, CONTROL YOUR WORLD, OneConnect, ZoneRunner, uRoam, FirePass, and TrafficShield are registered trademarks or trademarks of F5 Networks, Inc., in the U.S. and certain other countries.
|
6
6
|
|
@@ -715,6 +715,20 @@ All other trademarks mentioned in this document are the property of their respec
|
|
715
715
|
<part name="return" type="tns:Common.EnabledStateSequence"/>
|
716
716
|
</message>
|
717
717
|
|
718
|
+
<message name="Security.LogProfile.set_dos_network_publisherRequest">
|
719
|
+
<part name="profile_names" type="tns:Common.StringSequence"/>
|
720
|
+
<part name="publishers" type="tns:Common.StringSequence"/>
|
721
|
+
</message>
|
722
|
+
<message name="Security.LogProfile.set_dos_network_publisherResponse">
|
723
|
+
</message>
|
724
|
+
|
725
|
+
<message name="Security.LogProfile.get_dos_network_publisherRequest">
|
726
|
+
<part name="profile_names" type="tns:Common.StringSequence"/>
|
727
|
+
</message>
|
728
|
+
<message name="Security.LogProfile.get_dos_network_publisherResponse">
|
729
|
+
<part name="return" type="tns:Common.StringSequence"/>
|
730
|
+
</message>
|
731
|
+
|
718
732
|
<message name="Security.LogProfile.get_applicationRequest">
|
719
733
|
<part name="profile_names" type="tns:Common.StringSequence"/>
|
720
734
|
</message>
|
@@ -1623,6 +1637,132 @@ All other trademarks mentioned in this document are the property of their respec
|
|
1623
1637
|
<part name="return" type="tns:Common.StringSequenceSequence"/>
|
1624
1638
|
</message>
|
1625
1639
|
|
1640
|
+
<message name="Security.LogProfile.set_ip_intelligence_log_aggregate_rate_limitRequest">
|
1641
|
+
<part name="profile_names" type="tns:Common.StringSequence"/>
|
1642
|
+
<part name="values" type="tns:Common.ULongSequence"/>
|
1643
|
+
</message>
|
1644
|
+
<message name="Security.LogProfile.set_ip_intelligence_log_aggregate_rate_limitResponse">
|
1645
|
+
</message>
|
1646
|
+
|
1647
|
+
<message name="Security.LogProfile.get_ip_intelligence_log_aggregate_rate_limitRequest">
|
1648
|
+
<part name="profile_names" type="tns:Common.StringSequence"/>
|
1649
|
+
</message>
|
1650
|
+
<message name="Security.LogProfile.get_ip_intelligence_log_aggregate_rate_limitResponse">
|
1651
|
+
<part name="return" type="tns:Common.ULongSequence"/>
|
1652
|
+
</message>
|
1653
|
+
|
1654
|
+
<message name="Security.LogProfile.set_network_log_aggregate_rate_limitRequest">
|
1655
|
+
<part name="profile_names" type="tns:Common.StringSequence"/>
|
1656
|
+
<part name="networks" type="tns:Common.StringSequenceSequence"/>
|
1657
|
+
<part name="values" type="tns:Common.ULongSequenceSequence"/>
|
1658
|
+
</message>
|
1659
|
+
<message name="Security.LogProfile.set_network_log_aggregate_rate_limitResponse">
|
1660
|
+
</message>
|
1661
|
+
|
1662
|
+
<message name="Security.LogProfile.get_network_log_aggregate_rate_limitRequest">
|
1663
|
+
<part name="profile_names" type="tns:Common.StringSequence"/>
|
1664
|
+
<part name="networks" type="tns:Common.StringSequenceSequence"/>
|
1665
|
+
</message>
|
1666
|
+
<message name="Security.LogProfile.get_network_log_aggregate_rate_limitResponse">
|
1667
|
+
<part name="return" type="tns:Common.ULongSequenceSequence"/>
|
1668
|
+
</message>
|
1669
|
+
|
1670
|
+
<message name="Security.LogProfile.set_network_log_acl_match_accept_rate_limitRequest">
|
1671
|
+
<part name="profile_names" type="tns:Common.StringSequence"/>
|
1672
|
+
<part name="networks" type="tns:Common.StringSequenceSequence"/>
|
1673
|
+
<part name="values" type="tns:Common.ULongSequenceSequence"/>
|
1674
|
+
</message>
|
1675
|
+
<message name="Security.LogProfile.set_network_log_acl_match_accept_rate_limitResponse">
|
1676
|
+
</message>
|
1677
|
+
|
1678
|
+
<message name="Security.LogProfile.get_network_log_acl_match_accept_rate_limitRequest">
|
1679
|
+
<part name="profile_names" type="tns:Common.StringSequence"/>
|
1680
|
+
<part name="networks" type="tns:Common.StringSequenceSequence"/>
|
1681
|
+
</message>
|
1682
|
+
<message name="Security.LogProfile.get_network_log_acl_match_accept_rate_limitResponse">
|
1683
|
+
<part name="return" type="tns:Common.ULongSequenceSequence"/>
|
1684
|
+
</message>
|
1685
|
+
|
1686
|
+
<message name="Security.LogProfile.set_network_log_acl_match_drop_rate_limitRequest">
|
1687
|
+
<part name="profile_names" type="tns:Common.StringSequence"/>
|
1688
|
+
<part name="networks" type="tns:Common.StringSequenceSequence"/>
|
1689
|
+
<part name="values" type="tns:Common.ULongSequenceSequence"/>
|
1690
|
+
</message>
|
1691
|
+
<message name="Security.LogProfile.set_network_log_acl_match_drop_rate_limitResponse">
|
1692
|
+
</message>
|
1693
|
+
|
1694
|
+
<message name="Security.LogProfile.get_network_log_acl_match_drop_rate_limitRequest">
|
1695
|
+
<part name="profile_names" type="tns:Common.StringSequence"/>
|
1696
|
+
<part name="networks" type="tns:Common.StringSequenceSequence"/>
|
1697
|
+
</message>
|
1698
|
+
<message name="Security.LogProfile.get_network_log_acl_match_drop_rate_limitResponse">
|
1699
|
+
<part name="return" type="tns:Common.ULongSequenceSequence"/>
|
1700
|
+
</message>
|
1701
|
+
|
1702
|
+
<message name="Security.LogProfile.set_network_log_acl_match_reject_rate_limitRequest">
|
1703
|
+
<part name="profile_names" type="tns:Common.StringSequence"/>
|
1704
|
+
<part name="networks" type="tns:Common.StringSequenceSequence"/>
|
1705
|
+
<part name="values" type="tns:Common.ULongSequenceSequence"/>
|
1706
|
+
</message>
|
1707
|
+
<message name="Security.LogProfile.set_network_log_acl_match_reject_rate_limitResponse">
|
1708
|
+
</message>
|
1709
|
+
|
1710
|
+
<message name="Security.LogProfile.get_network_log_acl_match_reject_rate_limitRequest">
|
1711
|
+
<part name="profile_names" type="tns:Common.StringSequence"/>
|
1712
|
+
<part name="networks" type="tns:Common.StringSequenceSequence"/>
|
1713
|
+
</message>
|
1714
|
+
<message name="Security.LogProfile.get_network_log_acl_match_reject_rate_limitResponse">
|
1715
|
+
<part name="return" type="tns:Common.ULongSequenceSequence"/>
|
1716
|
+
</message>
|
1717
|
+
|
1718
|
+
<message name="Security.LogProfile.set_network_log_ip_errors_rate_limitRequest">
|
1719
|
+
<part name="profile_names" type="tns:Common.StringSequence"/>
|
1720
|
+
<part name="networks" type="tns:Common.StringSequenceSequence"/>
|
1721
|
+
<part name="values" type="tns:Common.ULongSequenceSequence"/>
|
1722
|
+
</message>
|
1723
|
+
<message name="Security.LogProfile.set_network_log_ip_errors_rate_limitResponse">
|
1724
|
+
</message>
|
1725
|
+
|
1726
|
+
<message name="Security.LogProfile.get_network_log_ip_errors_rate_limitRequest">
|
1727
|
+
<part name="profile_names" type="tns:Common.StringSequence"/>
|
1728
|
+
<part name="networks" type="tns:Common.StringSequenceSequence"/>
|
1729
|
+
</message>
|
1730
|
+
<message name="Security.LogProfile.get_network_log_ip_errors_rate_limitResponse">
|
1731
|
+
<part name="return" type="tns:Common.ULongSequenceSequence"/>
|
1732
|
+
</message>
|
1733
|
+
|
1734
|
+
<message name="Security.LogProfile.set_network_log_tcp_errors_rate_limitRequest">
|
1735
|
+
<part name="profile_names" type="tns:Common.StringSequence"/>
|
1736
|
+
<part name="networks" type="tns:Common.StringSequenceSequence"/>
|
1737
|
+
<part name="values" type="tns:Common.ULongSequenceSequence"/>
|
1738
|
+
</message>
|
1739
|
+
<message name="Security.LogProfile.set_network_log_tcp_errors_rate_limitResponse">
|
1740
|
+
</message>
|
1741
|
+
|
1742
|
+
<message name="Security.LogProfile.get_network_log_tcp_errors_rate_limitRequest">
|
1743
|
+
<part name="profile_names" type="tns:Common.StringSequence"/>
|
1744
|
+
<part name="networks" type="tns:Common.StringSequenceSequence"/>
|
1745
|
+
</message>
|
1746
|
+
<message name="Security.LogProfile.get_network_log_tcp_errors_rate_limitResponse">
|
1747
|
+
<part name="return" type="tns:Common.ULongSequenceSequence"/>
|
1748
|
+
</message>
|
1749
|
+
|
1750
|
+
<message name="Security.LogProfile.set_network_log_tcp_events_rate_limitRequest">
|
1751
|
+
<part name="profile_names" type="tns:Common.StringSequence"/>
|
1752
|
+
<part name="networks" type="tns:Common.StringSequenceSequence"/>
|
1753
|
+
<part name="values" type="tns:Common.ULongSequenceSequence"/>
|
1754
|
+
</message>
|
1755
|
+
<message name="Security.LogProfile.set_network_log_tcp_events_rate_limitResponse">
|
1756
|
+
</message>
|
1757
|
+
|
1758
|
+
<message name="Security.LogProfile.get_network_log_tcp_events_rate_limitRequest">
|
1759
|
+
<part name="profile_names" type="tns:Common.StringSequence"/>
|
1760
|
+
<part name="networks" type="tns:Common.StringSequenceSequence"/>
|
1761
|
+
</message>
|
1762
|
+
<message name="Security.LogProfile.get_network_log_tcp_events_rate_limitResponse">
|
1763
|
+
<part name="return" type="tns:Common.ULongSequenceSequence"/>
|
1764
|
+
</message>
|
1765
|
+
|
1626
1766
|
<message name="Security.LogProfile.get_protocol_dnsRequest">
|
1627
1767
|
<part name="profile_names" type="tns:Common.StringSequence"/>
|
1628
1768
|
</message>
|
@@ -2011,11 +2151,28 @@ All other trademarks mentioned in this document are the property of their respec
|
|
2011
2151
|
<operation name="get_ip_intelligence_log_translation_fields_filter_state">
|
2012
2152
|
<documentation>
|
2013
2153
|
Gets the IP Intelligence log translation fields filter state in Logging profile.
|
2014
|
-
|
2154
|
+
|
2015
2155
|
</documentation>
|
2016
2156
|
<input message="tns:Security.LogProfile.get_ip_intelligence_log_translation_fields_filter_stateRequest"/>
|
2017
2157
|
<output message="tns:Security.LogProfile.get_ip_intelligence_log_translation_fields_filter_stateResponse"/>
|
2018
2158
|
</operation>
|
2159
|
+
<operation name="set_dos_network_publisher">
|
2160
|
+
<documentation>
|
2161
|
+
Sets the DoS Network log publisher in a Logging profile. This determines
|
2162
|
+
where the DoS Network log information is sent.
|
2163
|
+
|
2164
|
+
</documentation>
|
2165
|
+
<input message="tns:Security.LogProfile.set_dos_network_publisherRequest"/>
|
2166
|
+
<output message="tns:Security.LogProfile.set_dos_network_publisherResponse"/>
|
2167
|
+
</operation>
|
2168
|
+
<operation name="get_dos_network_publisher">
|
2169
|
+
<documentation>
|
2170
|
+
Gets the DoS Network log publisher in Logging profile.
|
2171
|
+
|
2172
|
+
</documentation>
|
2173
|
+
<input message="tns:Security.LogProfile.get_dos_network_publisherRequest"/>
|
2174
|
+
<output message="tns:Security.LogProfile.get_dos_network_publisherResponse"/>
|
2175
|
+
</operation>
|
2019
2176
|
<operation name="get_application">
|
2020
2177
|
<documentation>
|
2021
2178
|
Gets a list of Application Security sub-profiles for a list of given logging profiles.
|
@@ -2241,7 +2398,7 @@ All other trademarks mentioned in this document are the property of their respec
|
|
2241
2398
|
This is relevant only for the remote storage of type remote, since Splunk and ArcSight have their fixed format.
|
2242
2399
|
|
2243
2400
|
Field delimiter specifies which delimiter the remote machine uses to separate the fields in the logging file.
|
2244
|
-
You may not use the
|
2401
|
+
You may not use the &#37; character. The default delimiter is the comma character, for Comma Separated Value (CSV).
|
2245
2402
|
|
2246
2403
|
</documentation>
|
2247
2404
|
<input message="tns:Security.LogProfile.set_application_field_delimiterRequest"/>
|
@@ -2261,8 +2418,7 @@ All other trademarks mentioned in this document are the property of their respec
|
|
2261
2418
|
This is relevant only for the remote storage of type remote, since Splunk and ArcSight have their fixed format.
|
2262
2419
|
|
2263
2420
|
Field format specifies which format the remote machine uses for each key/value pair in the logging file.
|
2264
|
-
Use
|
2265
|
-
|
2421
|
+
Use
|
2266
2422
|
</documentation>
|
2267
2423
|
<input message="tns:Security.LogProfile.set_application_field_formatRequest"/>
|
2268
2424
|
<output message="tns:Security.LogProfile.set_application_field_formatResponse"/>
|
@@ -2301,7 +2457,7 @@ All other trademarks mentioned in this document are the property of their respec
|
|
2301
2457
|
This is relevant only for the remote storage of type remote, since Splunk and ArcSight have their fixed format.
|
2302
2458
|
|
2303
2459
|
User string specifies the format in which the server logs traffic items.
|
2304
|
-
You can use free text between the traffic items enclosed in
|
2460
|
+
You can use free text between the traffic items enclosed in 0n both sides.
|
2305
2461
|
|
2306
2462
|
</documentation>
|
2307
2463
|
<input message="tns:Security.LogProfile.set_application_user_stringRequest"/>
|
@@ -2715,7 +2871,7 @@ All other trademarks mentioned in this document are the property of their respec
|
|
2715
2871
|
Sets the field-list delimiter of the field-list storage format in Protocol (SIP) Security.
|
2716
2872
|
|
2717
2873
|
Field delimiter specifies which delimiter the remote machine uses to separate the fields in the logging file.
|
2718
|
-
You may not use the
|
2874
|
+
You may not use the haracter. The default delimiter is the comma character, for Comma Separated Value (CSV).
|
2719
2875
|
|
2720
2876
|
</documentation>
|
2721
2877
|
<input message="tns:Security.LogProfile.set_protocol_sip_field_list_delimiterRequest"/>
|
@@ -2735,8 +2891,7 @@ All other trademarks mentioned in this document are the property of their respec
|
|
2735
2891
|
This is relevant only for the remote storage of type remote, since Splunk and ArcSight have their fixed format.
|
2736
2892
|
|
2737
2893
|
Field format specifies which format the remote machine uses for each key/value pair in the logging file.
|
2738
|
-
Use
|
2739
|
-
|
2894
|
+
Use
|
2740
2895
|
</documentation>
|
2741
2896
|
<input message="tns:Security.LogProfile.set_protocol_sip_field_formatRequest"/>
|
2742
2897
|
<output message="tns:Security.LogProfile.set_protocol_sip_field_formatResponse"/>
|
@@ -2773,7 +2928,7 @@ All other trademarks mentioned in this document are the property of their respec
|
|
2773
2928
|
<documentation>
|
2774
2929
|
Sets the user defined string of the user-defined storage format in Protocol (SIP) Security.
|
2775
2930
|
|
2776
|
-
You can use free text between the traffic items enclosed in
|
2931
|
+
You can use free text between the traffic items enclosed in 0n both sides.
|
2777
2932
|
|
2778
2933
|
</documentation>
|
2779
2934
|
<input message="tns:Security.LogProfile.set_protocol_sip_user_defined_stringRequest"/>
|
@@ -3003,7 +3158,7 @@ All other trademarks mentioned in this document are the property of their respec
|
|
3003
3158
|
Sets the field-list delimiter of the field-list storage format in Network Firewall.
|
3004
3159
|
|
3005
3160
|
Field delimiter specifies which delimiter the remote machine uses to separate the fields in the logging file.
|
3006
|
-
You may not use the
|
3161
|
+
You may not use the haracter. The default delimiter is the comma character, for Comma Separated Value (CSV).
|
3007
3162
|
|
3008
3163
|
</documentation>
|
3009
3164
|
<input message="tns:Security.LogProfile.set_network_field_list_delimiterRequest"/>
|
@@ -3023,8 +3178,7 @@ All other trademarks mentioned in this document are the property of their respec
|
|
3023
3178
|
This is relevant only for the remote storage of type remote, since Splunk and ArcSight have their fixed format.
|
3024
3179
|
|
3025
3180
|
Field format specifies which format the remote machine uses for each key/value pair in the logging file.
|
3026
|
-
Use
|
3027
|
-
|
3181
|
+
Use
|
3028
3182
|
</documentation>
|
3029
3183
|
<input message="tns:Security.LogProfile.set_network_field_formatRequest"/>
|
3030
3184
|
<output message="tns:Security.LogProfile.set_network_field_formatResponse"/>
|
@@ -3061,7 +3215,7 @@ All other trademarks mentioned in this document are the property of their respec
|
|
3061
3215
|
<documentation>
|
3062
3216
|
Sets the user defined string of the user-defined storage format in Network Firewall.
|
3063
3217
|
|
3064
|
-
You can use free text between the traffic items enclosed in
|
3218
|
+
You can use free text between the traffic items enclosed in 0n both sides.
|
3065
3219
|
|
3066
3220
|
</documentation>
|
3067
3221
|
<input message="tns:Security.LogProfile.set_network_user_defined_stringRequest"/>
|
@@ -3094,6 +3248,166 @@ All other trademarks mentioned in this document are the property of their respec
|
|
3094
3248
|
<input message="tns:Security.LogProfile.get_network_log_publisherRequest"/>
|
3095
3249
|
<output message="tns:Security.LogProfile.get_network_log_publisherResponse"/>
|
3096
3250
|
</operation>
|
3251
|
+
<operation name="set_ip_intelligence_log_aggregate_rate_limit">
|
3252
|
+
<documentation>
|
3253
|
+
Sets the aggregate log throttle rate limit for IP Intelligence log
|
3254
|
+
messages in logging profile.
|
3255
|
+
When set, the system allows logging of IP Intelligence log
|
3256
|
+
messages up to the configured number of log messages per second,
|
3257
|
+
beyond which log messages are dropped.
|
3258
|
+
The default rate limit is unlimited.
|
3259
|
+
|
3260
|
+
</documentation>
|
3261
|
+
<input message="tns:Security.LogProfile.set_ip_intelligence_log_aggregate_rate_limitRequest"/>
|
3262
|
+
<output message="tns:Security.LogProfile.set_ip_intelligence_log_aggregate_rate_limitResponse"/>
|
3263
|
+
</operation>
|
3264
|
+
<operation name="get_ip_intelligence_log_aggregate_rate_limit">
|
3265
|
+
<documentation>
|
3266
|
+
Gets the aggregate log throttle rate limit for IP Intelligence log messages in logging profile.
|
3267
|
+
|
3268
|
+
</documentation>
|
3269
|
+
<input message="tns:Security.LogProfile.get_ip_intelligence_log_aggregate_rate_limitRequest"/>
|
3270
|
+
<output message="tns:Security.LogProfile.get_ip_intelligence_log_aggregate_rate_limitResponse"/>
|
3271
|
+
</operation>
|
3272
|
+
<operation name="set_network_log_aggregate_rate_limit">
|
3273
|
+
<documentation>
|
3274
|
+
Sets the aggregate log throttle rate limit for all log messages in network firewall.
|
3275
|
+
When set, the system allows logging up to the configured number of log
|
3276
|
+
messages per second, beyond which network log messages are dropped.
|
3277
|
+
The default rate limit is unlimited.
|
3278
|
+
|
3279
|
+
</documentation>
|
3280
|
+
<input message="tns:Security.LogProfile.set_network_log_aggregate_rate_limitRequest"/>
|
3281
|
+
<output message="tns:Security.LogProfile.set_network_log_aggregate_rate_limitResponse"/>
|
3282
|
+
</operation>
|
3283
|
+
<operation name="get_network_log_aggregate_rate_limit">
|
3284
|
+
<documentation>
|
3285
|
+
Gets the aggregate log throttle rate limit in Network Firewall.
|
3286
|
+
|
3287
|
+
</documentation>
|
3288
|
+
<input message="tns:Security.LogProfile.get_network_log_aggregate_rate_limitRequest"/>
|
3289
|
+
<output message="tns:Security.LogProfile.get_network_log_aggregate_rate_limitResponse"/>
|
3290
|
+
</operation>
|
3291
|
+
<operation name="set_network_log_acl_match_accept_rate_limit">
|
3292
|
+
<documentation>
|
3293
|
+
Sets the log throttle rate limit for ACL match accept log messages
|
3294
|
+
in Network Firewall. When set, the system allows logging of ACL
|
3295
|
+
match log messages up to the configured number of log messages per second,
|
3296
|
+
beyond which log messages are dropped.
|
3297
|
+
The default rate limit is unlimited.
|
3298
|
+
|
3299
|
+
</documentation>
|
3300
|
+
<input message="tns:Security.LogProfile.set_network_log_acl_match_accept_rate_limitRequest"/>
|
3301
|
+
<output message="tns:Security.LogProfile.set_network_log_acl_match_accept_rate_limitResponse"/>
|
3302
|
+
</operation>
|
3303
|
+
<operation name="get_network_log_acl_match_accept_rate_limit">
|
3304
|
+
<documentation>
|
3305
|
+
Gets the log throttle rate limit for ACL match accept log messages in Network Firewall.
|
3306
|
+
|
3307
|
+
</documentation>
|
3308
|
+
<input message="tns:Security.LogProfile.get_network_log_acl_match_accept_rate_limitRequest"/>
|
3309
|
+
<output message="tns:Security.LogProfile.get_network_log_acl_match_accept_rate_limitResponse"/>
|
3310
|
+
</operation>
|
3311
|
+
<operation name="set_network_log_acl_match_drop_rate_limit">
|
3312
|
+
<documentation>
|
3313
|
+
Sets the log throttle rate limit for ACL match drop log messages
|
3314
|
+
in Network Firewall. When set, the system allows logging of ACL
|
3315
|
+
match drop log messages up to the configured number of log messages per second,
|
3316
|
+
beyond which log messages are dropped.
|
3317
|
+
The default rate limit is unlimited.
|
3318
|
+
|
3319
|
+
</documentation>
|
3320
|
+
<input message="tns:Security.LogProfile.set_network_log_acl_match_drop_rate_limitRequest"/>
|
3321
|
+
<output message="tns:Security.LogProfile.set_network_log_acl_match_drop_rate_limitResponse"/>
|
3322
|
+
</operation>
|
3323
|
+
<operation name="get_network_log_acl_match_drop_rate_limit">
|
3324
|
+
<documentation>
|
3325
|
+
Gets the log throttle rate limit for ACL match drop log messages in Network Firewall.
|
3326
|
+
|
3327
|
+
</documentation>
|
3328
|
+
<input message="tns:Security.LogProfile.get_network_log_acl_match_drop_rate_limitRequest"/>
|
3329
|
+
<output message="tns:Security.LogProfile.get_network_log_acl_match_drop_rate_limitResponse"/>
|
3330
|
+
</operation>
|
3331
|
+
<operation name="set_network_log_acl_match_reject_rate_limit">
|
3332
|
+
<documentation>
|
3333
|
+
Sets the log throttle rate limit for ACL match reject log messages
|
3334
|
+
in Network Firewall. When set, the system allows logging of ACL
|
3335
|
+
match reject log messages up to the configured number of log messages per second,
|
3336
|
+
beyond which log messages are dropped.
|
3337
|
+
The default rate limit is unlimited.
|
3338
|
+
|
3339
|
+
</documentation>
|
3340
|
+
<input message="tns:Security.LogProfile.set_network_log_acl_match_reject_rate_limitRequest"/>
|
3341
|
+
<output message="tns:Security.LogProfile.set_network_log_acl_match_reject_rate_limitResponse"/>
|
3342
|
+
</operation>
|
3343
|
+
<operation name="get_network_log_acl_match_reject_rate_limit">
|
3344
|
+
<documentation>
|
3345
|
+
Gets the log throttle rate limit for ACL match reject log messages in Network Firewall.
|
3346
|
+
|
3347
|
+
</documentation>
|
3348
|
+
<input message="tns:Security.LogProfile.get_network_log_acl_match_reject_rate_limitRequest"/>
|
3349
|
+
<output message="tns:Security.LogProfile.get_network_log_acl_match_reject_rate_limitResponse"/>
|
3350
|
+
</operation>
|
3351
|
+
<operation name="set_network_log_ip_errors_rate_limit">
|
3352
|
+
<documentation>
|
3353
|
+
Sets the log throttle rate limit for IP error log messages
|
3354
|
+
in Network Firewall. When set, the system allows logging of IP
|
3355
|
+
error log messages up to the configured number of log messages per second,
|
3356
|
+
beyond which log messages are dropped.
|
3357
|
+
The default rate limit is unlimited.
|
3358
|
+
|
3359
|
+
</documentation>
|
3360
|
+
<input message="tns:Security.LogProfile.set_network_log_ip_errors_rate_limitRequest"/>
|
3361
|
+
<output message="tns:Security.LogProfile.set_network_log_ip_errors_rate_limitResponse"/>
|
3362
|
+
</operation>
|
3363
|
+
<operation name="get_network_log_ip_errors_rate_limit">
|
3364
|
+
<documentation>
|
3365
|
+
Gets the log throttle rate limit for IP error log messages in Network Firewall.
|
3366
|
+
|
3367
|
+
</documentation>
|
3368
|
+
<input message="tns:Security.LogProfile.get_network_log_ip_errors_rate_limitRequest"/>
|
3369
|
+
<output message="tns:Security.LogProfile.get_network_log_ip_errors_rate_limitResponse"/>
|
3370
|
+
</operation>
|
3371
|
+
<operation name="set_network_log_tcp_errors_rate_limit">
|
3372
|
+
<documentation>
|
3373
|
+
Sets the log throttle rate limit for TCP error log messages
|
3374
|
+
in Network Firewall. When set, the system allows logging of TCP
|
3375
|
+
error log messages up to the configured number of log messages per second,
|
3376
|
+
beyond which log messages are dropped.
|
3377
|
+
The default rate limit is unlimited.
|
3378
|
+
|
3379
|
+
</documentation>
|
3380
|
+
<input message="tns:Security.LogProfile.set_network_log_tcp_errors_rate_limitRequest"/>
|
3381
|
+
<output message="tns:Security.LogProfile.set_network_log_tcp_errors_rate_limitResponse"/>
|
3382
|
+
</operation>
|
3383
|
+
<operation name="get_network_log_tcp_errors_rate_limit">
|
3384
|
+
<documentation>
|
3385
|
+
Gets the log throttle rate limit for TCP error log messages in Network Firewall.
|
3386
|
+
|
3387
|
+
</documentation>
|
3388
|
+
<input message="tns:Security.LogProfile.get_network_log_tcp_errors_rate_limitRequest"/>
|
3389
|
+
<output message="tns:Security.LogProfile.get_network_log_tcp_errors_rate_limitResponse"/>
|
3390
|
+
</operation>
|
3391
|
+
<operation name="set_network_log_tcp_events_rate_limit">
|
3392
|
+
<documentation>
|
3393
|
+
Sets the log throttle rate limit for TCP Event log messages
|
3394
|
+
in Network Firewall. When set, the system allows logging of TCP
|
3395
|
+
Event log messages up to the configured number of log messages per second,
|
3396
|
+
beyond which log messages are dropped.
|
3397
|
+
The default rate limit is unlimited.
|
3398
|
+
|
3399
|
+
</documentation>
|
3400
|
+
<input message="tns:Security.LogProfile.set_network_log_tcp_events_rate_limitRequest"/>
|
3401
|
+
<output message="tns:Security.LogProfile.set_network_log_tcp_events_rate_limitResponse"/>
|
3402
|
+
</operation>
|
3403
|
+
<operation name="get_network_log_tcp_events_rate_limit">
|
3404
|
+
<documentation>
|
3405
|
+
Gets the log throttle rate limit for TCP Event log messages in Network Firewall.
|
3406
|
+
|
3407
|
+
</documentation>
|
3408
|
+
<input message="tns:Security.LogProfile.get_network_log_tcp_events_rate_limitRequest"/>
|
3409
|
+
<output message="tns:Security.LogProfile.get_network_log_tcp_events_rate_limitResponse"/>
|
3410
|
+
</operation>
|
3097
3411
|
<operation name="get_protocol_dns">
|
3098
3412
|
<documentation>
|
3099
3413
|
Gets a list of Protocol (DNS) Security sub-profiles for a list of given logging profiles.
|
@@ -3253,7 +3567,7 @@ All other trademarks mentioned in this document are the property of their respec
|
|
3253
3567
|
Sets the field-list delimiter of the field-list storage format in Protocol (DNS) Security.
|
3254
3568
|
|
3255
3569
|
Field delimiter specifies which delimiter the remote machine uses to separate the fields in the logging file.
|
3256
|
-
You may not use the
|
3570
|
+
You may not use the haracter. The default delimiter is the comma character, for Comma Separated Value (CSV).
|
3257
3571
|
|
3258
3572
|
</documentation>
|
3259
3573
|
<input message="tns:Security.LogProfile.set_protocol_dns_field_list_delimiterRequest"/>
|
@@ -3273,8 +3587,7 @@ All other trademarks mentioned in this document are the property of their respec
|
|
3273
3587
|
This is relevant only for the remote storage of type remote, since Splunk and ArcSight have their fixed format.
|
3274
3588
|
|
3275
3589
|
Field format specifies which format the remote machine uses for each key/value pair in the logging file.
|
3276
|
-
Use
|
3277
|
-
|
3590
|
+
Use
|
3278
3591
|
</documentation>
|
3279
3592
|
<input message="tns:Security.LogProfile.set_protocol_dns_field_formatRequest"/>
|
3280
3593
|
<output message="tns:Security.LogProfile.set_protocol_dns_field_formatResponse"/>
|
@@ -3311,7 +3624,7 @@ All other trademarks mentioned in this document are the property of their respec
|
|
3311
3624
|
<documentation>
|
3312
3625
|
Sets the user defined string of the user-defined storage format in Protocol (DNS) Security.
|
3313
3626
|
|
3314
|
-
You can use free text between the traffic items enclosed in
|
3627
|
+
You can use free text between the traffic items enclosed in 0n both sides.
|
3315
3628
|
|
3316
3629
|
</documentation>
|
3317
3630
|
<input message="tns:Security.LogProfile.set_protocol_dns_user_defined_stringRequest"/>
|
@@ -3703,7 +4016,48 @@ All other trademarks mentioned in this document are the property of their respec
|
|
3703
4016
|
<operation name="get_ip_intelligence_log_translation_fields_filter_state">
|
3704
4017
|
<documentation>
|
3705
4018
|
Gets the IP Intelligence log translation fields filter state in Logging profile.
|
3706
|
-
|
4019
|
+
|
4020
|
+
</documentation>
|
4021
|
+
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
4022
|
+
<input>
|
4023
|
+
<soap:body
|
4024
|
+
use="encoded"
|
4025
|
+
namespace="urn:iControl:Security/LogProfile"
|
4026
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
4027
|
+
</input>
|
4028
|
+
<output>
|
4029
|
+
<soap:body
|
4030
|
+
use="encoded"
|
4031
|
+
namespace="urn:iControl:Security/LogProfile"
|
4032
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
4033
|
+
</output>
|
4034
|
+
</operation>
|
4035
|
+
|
4036
|
+
<operation name="set_dos_network_publisher">
|
4037
|
+
<documentation>
|
4038
|
+
Sets the DoS Network log publisher in a Logging profile. This determines
|
4039
|
+
where the DoS Network log information is sent.
|
4040
|
+
|
4041
|
+
</documentation>
|
4042
|
+
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
4043
|
+
<input>
|
4044
|
+
<soap:body
|
4045
|
+
use="encoded"
|
4046
|
+
namespace="urn:iControl:Security/LogProfile"
|
4047
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
4048
|
+
</input>
|
4049
|
+
<output>
|
4050
|
+
<soap:body
|
4051
|
+
use="encoded"
|
4052
|
+
namespace="urn:iControl:Security/LogProfile"
|
4053
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
4054
|
+
</output>
|
4055
|
+
</operation>
|
4056
|
+
|
4057
|
+
<operation name="get_dos_network_publisher">
|
4058
|
+
<documentation>
|
4059
|
+
Gets the DoS Network log publisher in Logging profile.
|
4060
|
+
|
3707
4061
|
</documentation>
|
3708
4062
|
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
3709
4063
|
<input>
|
@@ -4221,7 +4575,7 @@ All other trademarks mentioned in this document are the property of their respec
|
|
4221
4575
|
This is relevant only for the remote storage of type remote, since Splunk and ArcSight have their fixed format.
|
4222
4576
|
|
4223
4577
|
Field delimiter specifies which delimiter the remote machine uses to separate the fields in the logging file.
|
4224
|
-
You may not use the
|
4578
|
+
You may not use the &#37; character. The default delimiter is the comma character, for Comma Separated Value (CSV).
|
4225
4579
|
|
4226
4580
|
</documentation>
|
4227
4581
|
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
@@ -4265,8 +4619,7 @@ All other trademarks mentioned in this document are the property of their respec
|
|
4265
4619
|
This is relevant only for the remote storage of type remote, since Splunk and ArcSight have their fixed format.
|
4266
4620
|
|
4267
4621
|
Field format specifies which format the remote machine uses for each key/value pair in the logging file.
|
4268
|
-
Use
|
4269
|
-
|
4622
|
+
Use
|
4270
4623
|
</documentation>
|
4271
4624
|
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
4272
4625
|
<input>
|
@@ -4353,7 +4706,7 @@ All other trademarks mentioned in this document are the property of their respec
|
|
4353
4706
|
This is relevant only for the remote storage of type remote, since Splunk and ArcSight have their fixed format.
|
4354
4707
|
|
4355
4708
|
User string specifies the format in which the server logs traffic items.
|
4356
|
-
You can use free text between the traffic items enclosed in
|
4709
|
+
You can use free text between the traffic items enclosed in 0n both sides.
|
4357
4710
|
|
4358
4711
|
</documentation>
|
4359
4712
|
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
@@ -5307,7 +5660,7 @@ All other trademarks mentioned in this document are the property of their respec
|
|
5307
5660
|
Sets the field-list delimiter of the field-list storage format in Protocol (SIP) Security.
|
5308
5661
|
|
5309
5662
|
Field delimiter specifies which delimiter the remote machine uses to separate the fields in the logging file.
|
5310
|
-
You may not use the
|
5663
|
+
You may not use the haracter. The default delimiter is the comma character, for Comma Separated Value (CSV).
|
5311
5664
|
|
5312
5665
|
</documentation>
|
5313
5666
|
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
@@ -5351,8 +5704,7 @@ All other trademarks mentioned in this document are the property of their respec
|
|
5351
5704
|
This is relevant only for the remote storage of type remote, since Splunk and ArcSight have their fixed format.
|
5352
5705
|
|
5353
5706
|
Field format specifies which format the remote machine uses for each key/value pair in the logging file.
|
5354
|
-
Use
|
5355
|
-
|
5707
|
+
Use
|
5356
5708
|
</documentation>
|
5357
5709
|
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
5358
5710
|
<input>
|
@@ -5437,7 +5789,7 @@ All other trademarks mentioned in this document are the property of their respec
|
|
5437
5789
|
<documentation>
|
5438
5790
|
Sets the user defined string of the user-defined storage format in Protocol (SIP) Security.
|
5439
5791
|
|
5440
|
-
You can use free text between the traffic items enclosed in
|
5792
|
+
You can use free text between the traffic items enclosed in 0n both sides.
|
5441
5793
|
|
5442
5794
|
</documentation>
|
5443
5795
|
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
@@ -5967,7 +6319,7 @@ All other trademarks mentioned in this document are the property of their respec
|
|
5967
6319
|
Sets the field-list delimiter of the field-list storage format in Network Firewall.
|
5968
6320
|
|
5969
6321
|
Field delimiter specifies which delimiter the remote machine uses to separate the fields in the logging file.
|
5970
|
-
You may not use the
|
6322
|
+
You may not use the haracter. The default delimiter is the comma character, for Comma Separated Value (CSV).
|
5971
6323
|
|
5972
6324
|
</documentation>
|
5973
6325
|
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
@@ -6011,8 +6363,7 @@ All other trademarks mentioned in this document are the property of their respec
|
|
6011
6363
|
This is relevant only for the remote storage of type remote, since Splunk and ArcSight have their fixed format.
|
6012
6364
|
|
6013
6365
|
Field format specifies which format the remote machine uses for each key/value pair in the logging file.
|
6014
|
-
Use
|
6015
|
-
|
6366
|
+
Use
|
6016
6367
|
</documentation>
|
6017
6368
|
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
6018
6369
|
<input>
|
@@ -6097,7 +6448,7 @@ All other trademarks mentioned in this document are the property of their respec
|
|
6097
6448
|
<documentation>
|
6098
6449
|
Sets the user defined string of the user-defined storage format in Network Firewall.
|
6099
6450
|
|
6100
|
-
You can use free text between the traffic items enclosed in
|
6451
|
+
You can use free text between the traffic items enclosed in 0n both sides.
|
6101
6452
|
|
6102
6453
|
</documentation>
|
6103
6454
|
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
@@ -6178,9 +6529,14 @@ All other trademarks mentioned in this document are the property of their respec
|
|
6178
6529
|
</output>
|
6179
6530
|
</operation>
|
6180
6531
|
|
6181
|
-
<operation name="
|
6532
|
+
<operation name="set_ip_intelligence_log_aggregate_rate_limit">
|
6182
6533
|
<documentation>
|
6183
|
-
|
6534
|
+
Sets the aggregate log throttle rate limit for IP Intelligence log
|
6535
|
+
messages in logging profile.
|
6536
|
+
When set, the system allows logging of IP Intelligence log
|
6537
|
+
messages up to the configured number of log messages per second,
|
6538
|
+
beyond which log messages are dropped.
|
6539
|
+
The default rate limit is unlimited.
|
6184
6540
|
|
6185
6541
|
</documentation>
|
6186
6542
|
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
@@ -6198,10 +6554,9 @@ All other trademarks mentioned in this document are the property of their respec
|
|
6198
6554
|
</output>
|
6199
6555
|
</operation>
|
6200
6556
|
|
6201
|
-
<operation name="
|
6557
|
+
<operation name="get_ip_intelligence_log_aggregate_rate_limit">
|
6202
6558
|
<documentation>
|
6203
|
-
|
6204
|
-
Note: Only one Protocol (DNS) Security sub-profile can exist per logging profile.
|
6559
|
+
Gets the aggregate log throttle rate limit for IP Intelligence log messages in logging profile.
|
6205
6560
|
|
6206
6561
|
</documentation>
|
6207
6562
|
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
@@ -6219,10 +6574,13 @@ All other trademarks mentioned in this document are the property of their respec
|
|
6219
6574
|
</output>
|
6220
6575
|
</operation>
|
6221
6576
|
|
6222
|
-
<operation name="
|
6577
|
+
<operation name="set_network_log_aggregate_rate_limit">
|
6223
6578
|
<documentation>
|
6224
|
-
|
6225
|
-
|
6579
|
+
Sets the aggregate log throttle rate limit for all log messages in network firewall.
|
6580
|
+
When set, the system allows logging up to the configured number of log
|
6581
|
+
messages per second, beyond which network log messages are dropped.
|
6582
|
+
The default rate limit is unlimited.
|
6583
|
+
|
6226
6584
|
</documentation>
|
6227
6585
|
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
6228
6586
|
<input>
|
@@ -6239,10 +6597,10 @@ All other trademarks mentioned in this document are the property of their respec
|
|
6239
6597
|
</output>
|
6240
6598
|
</operation>
|
6241
6599
|
|
6242
|
-
<operation name="
|
6600
|
+
<operation name="get_network_log_aggregate_rate_limit">
|
6243
6601
|
<documentation>
|
6244
|
-
|
6245
|
-
|
6602
|
+
Gets the aggregate log throttle rate limit in Network Firewall.
|
6603
|
+
|
6246
6604
|
</documentation>
|
6247
6605
|
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
6248
6606
|
<input>
|
@@ -6259,11 +6617,13 @@ All other trademarks mentioned in this document are the property of their respec
|
|
6259
6617
|
</output>
|
6260
6618
|
</operation>
|
6261
6619
|
|
6262
|
-
<operation name="
|
6620
|
+
<operation name="set_network_log_acl_match_accept_rate_limit">
|
6263
6621
|
<documentation>
|
6264
|
-
Sets the
|
6265
|
-
|
6266
|
-
|
6622
|
+
Sets the log throttle rate limit for ACL match accept log messages
|
6623
|
+
in Network Firewall. When set, the system allows logging of ACL
|
6624
|
+
match log messages up to the configured number of log messages per second,
|
6625
|
+
beyond which log messages are dropped.
|
6626
|
+
The default rate limit is unlimited.
|
6267
6627
|
|
6268
6628
|
</documentation>
|
6269
6629
|
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
@@ -6281,10 +6641,10 @@ All other trademarks mentioned in this document are the property of their respec
|
|
6281
6641
|
</output>
|
6282
6642
|
</operation>
|
6283
6643
|
|
6284
|
-
<operation name="
|
6644
|
+
<operation name="get_network_log_acl_match_accept_rate_limit">
|
6285
6645
|
<documentation>
|
6286
|
-
Gets the
|
6287
|
-
|
6646
|
+
Gets the log throttle rate limit for ACL match accept log messages in Network Firewall.
|
6647
|
+
|
6288
6648
|
</documentation>
|
6289
6649
|
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
6290
6650
|
<input>
|
@@ -6301,11 +6661,13 @@ All other trademarks mentioned in this document are the property of their respec
|
|
6301
6661
|
</output>
|
6302
6662
|
</operation>
|
6303
6663
|
|
6304
|
-
<operation name="
|
6664
|
+
<operation name="set_network_log_acl_match_drop_rate_limit">
|
6305
6665
|
<documentation>
|
6306
|
-
Sets the
|
6307
|
-
When
|
6308
|
-
|
6666
|
+
Sets the log throttle rate limit for ACL match drop log messages
|
6667
|
+
in Network Firewall. When set, the system allows logging of ACL
|
6668
|
+
match drop log messages up to the configured number of log messages per second,
|
6669
|
+
beyond which log messages are dropped.
|
6670
|
+
The default rate limit is unlimited.
|
6309
6671
|
|
6310
6672
|
</documentation>
|
6311
6673
|
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
@@ -6323,10 +6685,10 @@ All other trademarks mentioned in this document are the property of their respec
|
|
6323
6685
|
</output>
|
6324
6686
|
</operation>
|
6325
6687
|
|
6326
|
-
<operation name="
|
6688
|
+
<operation name="get_network_log_acl_match_drop_rate_limit">
|
6327
6689
|
<documentation>
|
6328
|
-
Gets the
|
6329
|
-
|
6690
|
+
Gets the log throttle rate limit for ACL match drop log messages in Network Firewall.
|
6691
|
+
|
6330
6692
|
</documentation>
|
6331
6693
|
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
6332
6694
|
<input>
|
@@ -6343,11 +6705,13 @@ All other trademarks mentioned in this document are the property of their respec
|
|
6343
6705
|
</output>
|
6344
6706
|
</operation>
|
6345
6707
|
|
6346
|
-
<operation name="
|
6708
|
+
<operation name="set_network_log_acl_match_reject_rate_limit">
|
6347
6709
|
<documentation>
|
6348
|
-
Sets the
|
6349
|
-
|
6350
|
-
|
6710
|
+
Sets the log throttle rate limit for ACL match reject log messages
|
6711
|
+
in Network Firewall. When set, the system allows logging of ACL
|
6712
|
+
match reject log messages up to the configured number of log messages per second,
|
6713
|
+
beyond which log messages are dropped.
|
6714
|
+
The default rate limit is unlimited.
|
6351
6715
|
|
6352
6716
|
</documentation>
|
6353
6717
|
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
@@ -6365,9 +6729,348 @@ All other trademarks mentioned in this document are the property of their respec
|
|
6365
6729
|
</output>
|
6366
6730
|
</operation>
|
6367
6731
|
|
6368
|
-
<operation name="
|
6732
|
+
<operation name="get_network_log_acl_match_reject_rate_limit">
|
6369
6733
|
<documentation>
|
6370
|
-
Gets the
|
6734
|
+
Gets the log throttle rate limit for ACL match reject log messages in Network Firewall.
|
6735
|
+
|
6736
|
+
</documentation>
|
6737
|
+
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
6738
|
+
<input>
|
6739
|
+
<soap:body
|
6740
|
+
use="encoded"
|
6741
|
+
namespace="urn:iControl:Security/LogProfile"
|
6742
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
6743
|
+
</input>
|
6744
|
+
<output>
|
6745
|
+
<soap:body
|
6746
|
+
use="encoded"
|
6747
|
+
namespace="urn:iControl:Security/LogProfile"
|
6748
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
6749
|
+
</output>
|
6750
|
+
</operation>
|
6751
|
+
|
6752
|
+
<operation name="set_network_log_ip_errors_rate_limit">
|
6753
|
+
<documentation>
|
6754
|
+
Sets the log throttle rate limit for IP error log messages
|
6755
|
+
in Network Firewall. When set, the system allows logging of IP
|
6756
|
+
error log messages up to the configured number of log messages per second,
|
6757
|
+
beyond which log messages are dropped.
|
6758
|
+
The default rate limit is unlimited.
|
6759
|
+
|
6760
|
+
</documentation>
|
6761
|
+
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
6762
|
+
<input>
|
6763
|
+
<soap:body
|
6764
|
+
use="encoded"
|
6765
|
+
namespace="urn:iControl:Security/LogProfile"
|
6766
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
6767
|
+
</input>
|
6768
|
+
<output>
|
6769
|
+
<soap:body
|
6770
|
+
use="encoded"
|
6771
|
+
namespace="urn:iControl:Security/LogProfile"
|
6772
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
6773
|
+
</output>
|
6774
|
+
</operation>
|
6775
|
+
|
6776
|
+
<operation name="get_network_log_ip_errors_rate_limit">
|
6777
|
+
<documentation>
|
6778
|
+
Gets the log throttle rate limit for IP error log messages in Network Firewall.
|
6779
|
+
|
6780
|
+
</documentation>
|
6781
|
+
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
6782
|
+
<input>
|
6783
|
+
<soap:body
|
6784
|
+
use="encoded"
|
6785
|
+
namespace="urn:iControl:Security/LogProfile"
|
6786
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
6787
|
+
</input>
|
6788
|
+
<output>
|
6789
|
+
<soap:body
|
6790
|
+
use="encoded"
|
6791
|
+
namespace="urn:iControl:Security/LogProfile"
|
6792
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
6793
|
+
</output>
|
6794
|
+
</operation>
|
6795
|
+
|
6796
|
+
<operation name="set_network_log_tcp_errors_rate_limit">
|
6797
|
+
<documentation>
|
6798
|
+
Sets the log throttle rate limit for TCP error log messages
|
6799
|
+
in Network Firewall. When set, the system allows logging of TCP
|
6800
|
+
error log messages up to the configured number of log messages per second,
|
6801
|
+
beyond which log messages are dropped.
|
6802
|
+
The default rate limit is unlimited.
|
6803
|
+
|
6804
|
+
</documentation>
|
6805
|
+
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
6806
|
+
<input>
|
6807
|
+
<soap:body
|
6808
|
+
use="encoded"
|
6809
|
+
namespace="urn:iControl:Security/LogProfile"
|
6810
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
6811
|
+
</input>
|
6812
|
+
<output>
|
6813
|
+
<soap:body
|
6814
|
+
use="encoded"
|
6815
|
+
namespace="urn:iControl:Security/LogProfile"
|
6816
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
6817
|
+
</output>
|
6818
|
+
</operation>
|
6819
|
+
|
6820
|
+
<operation name="get_network_log_tcp_errors_rate_limit">
|
6821
|
+
<documentation>
|
6822
|
+
Gets the log throttle rate limit for TCP error log messages in Network Firewall.
|
6823
|
+
|
6824
|
+
</documentation>
|
6825
|
+
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
6826
|
+
<input>
|
6827
|
+
<soap:body
|
6828
|
+
use="encoded"
|
6829
|
+
namespace="urn:iControl:Security/LogProfile"
|
6830
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
6831
|
+
</input>
|
6832
|
+
<output>
|
6833
|
+
<soap:body
|
6834
|
+
use="encoded"
|
6835
|
+
namespace="urn:iControl:Security/LogProfile"
|
6836
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
6837
|
+
</output>
|
6838
|
+
</operation>
|
6839
|
+
|
6840
|
+
<operation name="set_network_log_tcp_events_rate_limit">
|
6841
|
+
<documentation>
|
6842
|
+
Sets the log throttle rate limit for TCP Event log messages
|
6843
|
+
in Network Firewall. When set, the system allows logging of TCP
|
6844
|
+
Event log messages up to the configured number of log messages per second,
|
6845
|
+
beyond which log messages are dropped.
|
6846
|
+
The default rate limit is unlimited.
|
6847
|
+
|
6848
|
+
</documentation>
|
6849
|
+
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
6850
|
+
<input>
|
6851
|
+
<soap:body
|
6852
|
+
use="encoded"
|
6853
|
+
namespace="urn:iControl:Security/LogProfile"
|
6854
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
6855
|
+
</input>
|
6856
|
+
<output>
|
6857
|
+
<soap:body
|
6858
|
+
use="encoded"
|
6859
|
+
namespace="urn:iControl:Security/LogProfile"
|
6860
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
6861
|
+
</output>
|
6862
|
+
</operation>
|
6863
|
+
|
6864
|
+
<operation name="get_network_log_tcp_events_rate_limit">
|
6865
|
+
<documentation>
|
6866
|
+
Gets the log throttle rate limit for TCP Event log messages in Network Firewall.
|
6867
|
+
|
6868
|
+
</documentation>
|
6869
|
+
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
6870
|
+
<input>
|
6871
|
+
<soap:body
|
6872
|
+
use="encoded"
|
6873
|
+
namespace="urn:iControl:Security/LogProfile"
|
6874
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
6875
|
+
</input>
|
6876
|
+
<output>
|
6877
|
+
<soap:body
|
6878
|
+
use="encoded"
|
6879
|
+
namespace="urn:iControl:Security/LogProfile"
|
6880
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
6881
|
+
</output>
|
6882
|
+
</operation>
|
6883
|
+
|
6884
|
+
<operation name="get_protocol_dns">
|
6885
|
+
<documentation>
|
6886
|
+
Gets a list of Protocol (DNS) Security sub-profiles for a list of given logging profiles.
|
6887
|
+
|
6888
|
+
</documentation>
|
6889
|
+
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
6890
|
+
<input>
|
6891
|
+
<soap:body
|
6892
|
+
use="encoded"
|
6893
|
+
namespace="urn:iControl:Security/LogProfile"
|
6894
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
6895
|
+
</input>
|
6896
|
+
<output>
|
6897
|
+
<soap:body
|
6898
|
+
use="encoded"
|
6899
|
+
namespace="urn:iControl:Security/LogProfile"
|
6900
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
6901
|
+
</output>
|
6902
|
+
</operation>
|
6903
|
+
|
6904
|
+
<operation name="add_protocol_dns">
|
6905
|
+
<documentation>
|
6906
|
+
Adds a list of Protocol (DNS) Security sub-profiles to given logging profiles.
|
6907
|
+
Note: Only one Protocol (DNS) Security sub-profile can exist per logging profile.
|
6908
|
+
|
6909
|
+
</documentation>
|
6910
|
+
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
6911
|
+
<input>
|
6912
|
+
<soap:body
|
6913
|
+
use="encoded"
|
6914
|
+
namespace="urn:iControl:Security/LogProfile"
|
6915
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
6916
|
+
</input>
|
6917
|
+
<output>
|
6918
|
+
<soap:body
|
6919
|
+
use="encoded"
|
6920
|
+
namespace="urn:iControl:Security/LogProfile"
|
6921
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
6922
|
+
</output>
|
6923
|
+
</operation>
|
6924
|
+
|
6925
|
+
<operation name="remove_protocol_dns">
|
6926
|
+
<documentation>
|
6927
|
+
Removes specific Protocol (DNS) Security sub-profiles from the specified logging profiles.
|
6928
|
+
|
6929
|
+
</documentation>
|
6930
|
+
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
6931
|
+
<input>
|
6932
|
+
<soap:body
|
6933
|
+
use="encoded"
|
6934
|
+
namespace="urn:iControl:Security/LogProfile"
|
6935
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
6936
|
+
</input>
|
6937
|
+
<output>
|
6938
|
+
<soap:body
|
6939
|
+
use="encoded"
|
6940
|
+
namespace="urn:iControl:Security/LogProfile"
|
6941
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
6942
|
+
</output>
|
6943
|
+
</operation>
|
6944
|
+
|
6945
|
+
<operation name="remove_all_protocol_dnses">
|
6946
|
+
<documentation>
|
6947
|
+
Removes all Protocol (DNS) Security sub-profiles from the specified logging profiles.
|
6948
|
+
|
6949
|
+
</documentation>
|
6950
|
+
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
6951
|
+
<input>
|
6952
|
+
<soap:body
|
6953
|
+
use="encoded"
|
6954
|
+
namespace="urn:iControl:Security/LogProfile"
|
6955
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
6956
|
+
</input>
|
6957
|
+
<output>
|
6958
|
+
<soap:body
|
6959
|
+
use="encoded"
|
6960
|
+
namespace="urn:iControl:Security/LogProfile"
|
6961
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
6962
|
+
</output>
|
6963
|
+
</operation>
|
6964
|
+
|
6965
|
+
<operation name="set_protocol_dns_log_drop_filter_state">
|
6966
|
+
<documentation>
|
6967
|
+
Sets the drop log filter state in Protocol (DNS) Security.
|
6968
|
+
When enabled, the system logs all DNS requests that are dropped. When disabled, the system does not log.
|
6969
|
+
The default is disabled.
|
6970
|
+
|
6971
|
+
</documentation>
|
6972
|
+
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
6973
|
+
<input>
|
6974
|
+
<soap:body
|
6975
|
+
use="encoded"
|
6976
|
+
namespace="urn:iControl:Security/LogProfile"
|
6977
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
6978
|
+
</input>
|
6979
|
+
<output>
|
6980
|
+
<soap:body
|
6981
|
+
use="encoded"
|
6982
|
+
namespace="urn:iControl:Security/LogProfile"
|
6983
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
6984
|
+
</output>
|
6985
|
+
</operation>
|
6986
|
+
|
6987
|
+
<operation name="get_protocol_dns_log_drop_filter_state">
|
6988
|
+
<documentation>
|
6989
|
+
Gets the drop log filter state in Protocol (DNS) Security.
|
6990
|
+
|
6991
|
+
</documentation>
|
6992
|
+
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
6993
|
+
<input>
|
6994
|
+
<soap:body
|
6995
|
+
use="encoded"
|
6996
|
+
namespace="urn:iControl:Security/LogProfile"
|
6997
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
6998
|
+
</input>
|
6999
|
+
<output>
|
7000
|
+
<soap:body
|
7001
|
+
use="encoded"
|
7002
|
+
namespace="urn:iControl:Security/LogProfile"
|
7003
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
7004
|
+
</output>
|
7005
|
+
</operation>
|
7006
|
+
|
7007
|
+
<operation name="set_protocol_dns_log_filtered_drop_filter_state">
|
7008
|
+
<documentation>
|
7009
|
+
Sets the filtered-drop log filter state in Protocol (DNS) Security.
|
7010
|
+
When enabled, the system logs all DNS requests that are dropped due to security filtering.
|
7011
|
+
When disabled, the system does not log. The default is disabled.
|
7012
|
+
|
7013
|
+
</documentation>
|
7014
|
+
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
7015
|
+
<input>
|
7016
|
+
<soap:body
|
7017
|
+
use="encoded"
|
7018
|
+
namespace="urn:iControl:Security/LogProfile"
|
7019
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
7020
|
+
</input>
|
7021
|
+
<output>
|
7022
|
+
<soap:body
|
7023
|
+
use="encoded"
|
7024
|
+
namespace="urn:iControl:Security/LogProfile"
|
7025
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
7026
|
+
</output>
|
7027
|
+
</operation>
|
7028
|
+
|
7029
|
+
<operation name="get_protocol_dns_log_filtered_drop_filter_state">
|
7030
|
+
<documentation>
|
7031
|
+
Gets the filtered-drop log filter state in Protocol (DNS) Security.
|
7032
|
+
|
7033
|
+
</documentation>
|
7034
|
+
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
7035
|
+
<input>
|
7036
|
+
<soap:body
|
7037
|
+
use="encoded"
|
7038
|
+
namespace="urn:iControl:Security/LogProfile"
|
7039
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
7040
|
+
</input>
|
7041
|
+
<output>
|
7042
|
+
<soap:body
|
7043
|
+
use="encoded"
|
7044
|
+
namespace="urn:iControl:Security/LogProfile"
|
7045
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
7046
|
+
</output>
|
7047
|
+
</operation>
|
7048
|
+
|
7049
|
+
<operation name="set_protocol_dns_log_malformed_filter_state">
|
7050
|
+
<documentation>
|
7051
|
+
Sets the malformed log filter state in Protocol (DNS) Security.
|
7052
|
+
When enabled, the system logs all DNS requests that are malformed. When disabled, the system does not log.
|
7053
|
+
The default is disabled.
|
7054
|
+
|
7055
|
+
</documentation>
|
7056
|
+
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
7057
|
+
<input>
|
7058
|
+
<soap:body
|
7059
|
+
use="encoded"
|
7060
|
+
namespace="urn:iControl:Security/LogProfile"
|
7061
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
7062
|
+
</input>
|
7063
|
+
<output>
|
7064
|
+
<soap:body
|
7065
|
+
use="encoded"
|
7066
|
+
namespace="urn:iControl:Security/LogProfile"
|
7067
|
+
encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
|
7068
|
+
</output>
|
7069
|
+
</operation>
|
7070
|
+
|
7071
|
+
<operation name="get_protocol_dns_log_malformed_filter_state">
|
7072
|
+
<documentation>
|
7073
|
+
Gets the malformed log filter state in Protocol (DNS) Security.
|
6371
7074
|
|
6372
7075
|
</documentation>
|
6373
7076
|
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
@@ -6541,7 +7244,7 @@ All other trademarks mentioned in this document are the property of their respec
|
|
6541
7244
|
Sets the field-list delimiter of the field-list storage format in Protocol (DNS) Security.
|
6542
7245
|
|
6543
7246
|
Field delimiter specifies which delimiter the remote machine uses to separate the fields in the logging file.
|
6544
|
-
You may not use the
|
7247
|
+
You may not use the haracter. The default delimiter is the comma character, for Comma Separated Value (CSV).
|
6545
7248
|
|
6546
7249
|
</documentation>
|
6547
7250
|
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
@@ -6585,8 +7288,7 @@ All other trademarks mentioned in this document are the property of their respec
|
|
6585
7288
|
This is relevant only for the remote storage of type remote, since Splunk and ArcSight have their fixed format.
|
6586
7289
|
|
6587
7290
|
Field format specifies which format the remote machine uses for each key/value pair in the logging file.
|
6588
|
-
Use
|
6589
|
-
|
7291
|
+
Use
|
6590
7292
|
</documentation>
|
6591
7293
|
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
6592
7294
|
<input>
|
@@ -6671,7 +7373,7 @@ All other trademarks mentioned in this document are the property of their respec
|
|
6671
7373
|
<documentation>
|
6672
7374
|
Sets the user defined string of the user-defined storage format in Protocol (DNS) Security.
|
6673
7375
|
|
6674
|
-
You can use free text between the traffic items enclosed in
|
7376
|
+
You can use free text between the traffic items enclosed in 0n both sides.
|
6675
7377
|
|
6676
7378
|
</documentation>
|
6677
7379
|
<soap:operation soapAction="urn:iControl:Security/LogProfile"/>
|
@@ -6919,6 +7621,22 @@ All other trademarks mentioned in this document are the property of their respec
|
|
6919
7621
|
virtual server as the logging profile containing it.
|
6920
7622
|
Note that Application and Protocol (Transfer) Security are mutually exclusive parts per logging profile and virtual server.
|
6921
7623
|
|
7624
|
+
A Network Firewall sub-profile allows you to configure where to log requests to the virtual server to which the log profile is attached.
|
7625
|
+
The system groups the requests into several categories (e.g., ACL matches, TCP errors etc). In addition, you can configure whether
|
7626
|
+
the requests need to be locally stored on the system or sent to an external server (e.g., syslog, ArcSight, Splunk servers).
|
7627
|
+
|
7628
|
+
A Protocol DNS Security sub-profile allows you to configure where to log DNS requests to the virtual server to which the log profile is
|
7629
|
+
attached. The system groups the requests into several categories (e.g., malicious, malformed, dropped, rejected etc). In addition, you can
|
7630
|
+
configure whether the requests need to be locally stored on the system or sent to an external server (e.g., syslog, ArcSight, Splunk servers).
|
7631
|
+
|
7632
|
+
A Protocol SIP Security sub-profile allows you to configure where to log SIP requests to the virtual server to which the log profile is
|
7633
|
+
attached. The system groups the requests into several categories (e.g., malformed, dropped etc). In addition, you can configure whether the
|
7634
|
+
requests need to be locally stored on the system or sent to an external server (e.g., syslog, ArcSight, Splunk servers).
|
7635
|
+
|
7636
|
+
A DoS Network Security log publisher allows you to configure where to log DoS Network information for the virtual server that the log profile is
|
7637
|
+
attached to. DoS Network is similar to DoS Device, as it offers DoS attack protection at the virtual server level. The information can be
|
7638
|
+
locally stored on the system or sent to an external server (e.g., syslog, ArcSight, Splunk servers). See Log::Publisher for more information.
|
7639
|
+
|
6922
7640
|
</documentation>
|
6923
7641
|
<port name="Security.LogProfilePort" binding="tns:Security.LogProfileBinding">
|
6924
7642
|
<soap:address location="https://url_to_service"/>
|