f5-icontrol 0.1.6 → 0.2.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (277) hide show
  1. checksums.yaml +4 -4
  2. data/CHANGELOG.md +3 -0
  3. data/README.md +0 -3
  4. data/lib/f5/icontrol/api.rb +1 -1
  5. data/lib/f5/icontrol/version.rb +1 -1
  6. data/lib/wsdl/ASM.LoggingProfile.wsdl +1 -1
  7. data/lib/wsdl/ASM.ObjectParams.wsdl +1 -1
  8. data/lib/wsdl/ASM.PSMProfile.wsdl +1 -1
  9. data/lib/wsdl/ASM.Policy.wsdl +106 -1
  10. data/lib/wsdl/ASM.PolicyGroup.wsdl +1 -1
  11. data/lib/wsdl/ASM.SystemConfiguration.wsdl +66 -1
  12. data/lib/wsdl/ASM.WebApplication.wsdl +6 -1
  13. data/lib/wsdl/ASM.WebApplicationGroup.wsdl +1 -1
  14. data/lib/wsdl/Classification.Application.wsdl +1 -1
  15. data/lib/wsdl/Classification.Category.wsdl +1 -1
  16. data/lib/wsdl/Classification.SignatureDefinition.wsdl +30 -30
  17. data/lib/wsdl/Classification.SignatureUpdateSchedule.wsdl +59 -5
  18. data/lib/wsdl/Classification.SignatureVersion.wsdl +1 -1
  19. data/lib/wsdl/GlobalLB.Application.wsdl +211 -3
  20. data/lib/wsdl/GlobalLB.DNSSECKey.wsdl +1 -1
  21. data/lib/wsdl/GlobalLB.DNSSECZone.wsdl +7930 -17
  22. data/lib/wsdl/GlobalLB.DataCenter.wsdl +1841 -1
  23. data/lib/wsdl/GlobalLB.Globals.wsdl +272 -27
  24. data/lib/wsdl/GlobalLB.Link.wsdl +1841 -1
  25. data/lib/wsdl/GlobalLB.Monitor.wsdl +11 -1
  26. data/lib/wsdl/GlobalLB.Pool.wsdl +2752 -68
  27. data/lib/wsdl/GlobalLB.PoolMember.wsdl +1844 -2
  28. data/lib/wsdl/GlobalLB.PoolV2.wsdl +13122 -0
  29. data/lib/wsdl/GlobalLB.ProberPool.wsdl +1841 -1
  30. data/lib/wsdl/GlobalLB.Region.wsdl +1 -1
  31. data/lib/wsdl/GlobalLB.Rule.wsdl +1841 -1
  32. data/lib/wsdl/GlobalLB.Server.wsdl +1841 -1
  33. data/lib/wsdl/GlobalLB.Topology.wsdl +1 -1
  34. data/lib/wsdl/GlobalLB.VirtualServer.wsdl +1841 -1
  35. data/lib/wsdl/GlobalLB.VirtualServerV2.wsdl +1841 -1
  36. data/lib/wsdl/GlobalLB.WideIP.wsdl +2478 -166
  37. data/lib/wsdl/GlobalLB.WideIPV2.wsdl +10494 -0
  38. data/lib/wsdl/LTConfig.Class.wsdl +1 -1
  39. data/lib/wsdl/LTConfig.Field.wsdl +1 -1
  40. data/lib/wsdl/LocalLB.ALGLogProfile.wsdl +1479 -0
  41. data/lib/wsdl/LocalLB.Class.wsdl +1 -1
  42. data/lib/wsdl/LocalLB.ContentPolicy.wsdl +7021 -0
  43. data/lib/wsdl/LocalLB.ContentPolicyStrategy.wsdl +1264 -0
  44. data/lib/wsdl/LocalLB.DNSCache.wsdl +3023 -474
  45. data/lib/wsdl/LocalLB.DNSExpress.wsdl +2282 -251
  46. data/lib/wsdl/LocalLB.DNSGlobals.wsdl +1 -1
  47. data/lib/wsdl/LocalLB.DNSServer.wsdl +8213 -0
  48. data/lib/wsdl/LocalLB.DNSTSIGKey.wsdl +400 -0
  49. data/lib/wsdl/LocalLB.DNSZone.wsdl +8744 -0
  50. data/lib/wsdl/LocalLB.DataGroupFile.wsdl +1 -1
  51. data/lib/wsdl/LocalLB.FlowEvictionPolicy.wsdl +10188 -0
  52. data/lib/wsdl/LocalLB.LSNLogProfile.wsdl +1257 -0
  53. data/lib/wsdl/LocalLB.LSNPool.wsdl +3454 -667
  54. data/lib/wsdl/LocalLB.MessageRoutingPeer.wsdl +803 -0
  55. data/lib/wsdl/LocalLB.MessageRoutingSIPRoute.wsdl +838 -0
  56. data/lib/wsdl/LocalLB.MessageRoutingTransportConfig.wsdl +1153 -0
  57. data/lib/wsdl/LocalLB.Monitor.wsdl +429 -1
  58. data/lib/wsdl/LocalLB.NAT.wsdl +1841 -1
  59. data/lib/wsdl/LocalLB.NATV2.wsdl +1841 -1
  60. data/lib/wsdl/LocalLB.NodeAddress.wsdl +1841 -1
  61. data/lib/wsdl/LocalLB.NodeAddressV2.wsdl +2165 -251
  62. data/lib/wsdl/LocalLB.OCSPStaplingParameters.wsdl +1537 -0
  63. data/lib/wsdl/LocalLB.Pool.wsdl +5568 -2423
  64. data/lib/wsdl/LocalLB.PoolMember.wsdl +1841 -1
  65. data/lib/wsdl/LocalLB.ProfileAnalytics.wsdl +364 -1
  66. data/lib/wsdl/LocalLB.ProfileAuth.wsdl +1846 -1
  67. data/lib/wsdl/LocalLB.ProfileClassification.wsdl +1 -1
  68. data/lib/wsdl/LocalLB.ProfileClientLDAP.wsdl +8361 -0
  69. data/lib/wsdl/LocalLB.ProfileClientSSL.wsdl +6168 -1858
  70. data/lib/wsdl/LocalLB.ProfileDNS.wsdl +2582 -310
  71. data/lib/wsdl/LocalLB.ProfileDNSLogging.wsdl +1 -1
  72. data/lib/wsdl/LocalLB.ProfileDiameter.wsdl +1841 -1
  73. data/lib/wsdl/LocalLB.ProfileDiameterEndpoint.wsdl +1841 -1
  74. data/lib/wsdl/LocalLB.ProfileFIX.wsdl +8992 -0
  75. data/lib/wsdl/LocalLB.ProfileFTP.wsdl +2399 -276
  76. data/lib/wsdl/LocalLB.ProfileFastHttp.wsdl +1846 -1
  77. data/lib/wsdl/LocalLB.ProfileFastL4.wsdl +2476 -244
  78. data/lib/wsdl/LocalLB.ProfileHttp.wsdl +4569 -1825
  79. data/lib/wsdl/LocalLB.ProfileHttpClass.wsdl +1841 -1
  80. data/lib/wsdl/LocalLB.ProfileHttpCompression.wsdl +1841 -1
  81. data/lib/wsdl/LocalLB.ProfileICAP.wsdl +1841 -1
  82. data/lib/wsdl/LocalLB.ProfileIIOP.wsdl +1841 -1
  83. data/lib/wsdl/LocalLB.ProfileOneConnect.wsdl +2332 -256
  84. data/lib/wsdl/LocalLB.ProfilePCP.wsdl +1499 -0
  85. data/lib/wsdl/LocalLB.ProfilePPTP.wsdl +8423 -0
  86. data/lib/wsdl/LocalLB.ProfilePersistence.wsdl +466 -31
  87. data/lib/wsdl/LocalLB.ProfileRADIUS.wsdl +1841 -1
  88. data/lib/wsdl/LocalLB.ProfileRTSP.wsdl +2193 -159
  89. data/lib/wsdl/LocalLB.ProfileRequestAdapt.wsdl +1841 -1
  90. data/lib/wsdl/LocalLB.ProfileRequestLogging.wsdl +1 -1
  91. data/lib/wsdl/LocalLB.ProfileResponseAdapt.wsdl +1841 -1
  92. data/lib/wsdl/LocalLB.ProfileSCTP.wsdl +2918 -463
  93. data/lib/wsdl/LocalLB.ProfileSIP.wsdl +2189 -155
  94. data/lib/wsdl/LocalLB.ProfileSIPRouter.wsdl +9215 -0
  95. data/lib/wsdl/LocalLB.ProfileSIPSession.wsdl +9655 -0
  96. data/lib/wsdl/LocalLB.ProfileSMTPS.wsdl +8361 -0
  97. data/lib/wsdl/LocalLB.ProfileSPDY.wsdl +1870 -25
  98. data/lib/wsdl/LocalLB.ProfileSPM.wsdl +1 -1
  99. data/lib/wsdl/LocalLB.ProfileServerLDAP.wsdl +8361 -0
  100. data/lib/wsdl/LocalLB.ProfileServerSSL.wsdl +2729 -230
  101. data/lib/wsdl/LocalLB.ProfileStream.wsdl +1841 -1
  102. data/lib/wsdl/LocalLB.ProfileTCP.wsdl +3235 -309
  103. data/lib/wsdl/LocalLB.ProfileTCPAnalytics.wsdl +1466 -0
  104. data/lib/wsdl/LocalLB.ProfileTFTP.wsdl +8544 -0
  105. data/lib/wsdl/LocalLB.ProfileUDP.wsdl +1841 -1
  106. data/lib/wsdl/LocalLB.ProfileUserStatistic.wsdl +1 -1
  107. data/lib/wsdl/LocalLB.ProfileWebAcceleration.wsdl +1841 -1
  108. data/lib/wsdl/LocalLB.ProfileXML.wsdl +1841 -1
  109. data/lib/wsdl/LocalLB.RAMCacheInformation.wsdl +1 -1
  110. data/lib/wsdl/LocalLB.RateClass.wsdl +2192 -132
  111. data/lib/wsdl/LocalLB.Rule.wsdl +1841 -1
  112. data/lib/wsdl/LocalLB.SNAT.wsdl +1841 -1
  113. data/lib/wsdl/LocalLB.SNATPool.wsdl +1841 -1
  114. data/lib/wsdl/LocalLB.SNATPoolMember.wsdl +1841 -1
  115. data/lib/wsdl/LocalLB.SNATTranslationAddress.wsdl +1841 -1
  116. data/lib/wsdl/LocalLB.SNATTranslationAddressV2.wsdl +1841 -1
  117. data/lib/wsdl/LocalLB.VirtualAddress.wsdl +1841 -1
  118. data/lib/wsdl/LocalLB.VirtualAddressV2.wsdl +2265 -239
  119. data/lib/wsdl/LocalLB.VirtualServer.wsdl +10764 -5504
  120. data/lib/wsdl/LocalLB.iFile.wsdl +1 -1
  121. data/lib/wsdl/LocalLB.iFileFile.wsdl +1 -1
  122. data/lib/wsdl/Log.DestinationArcSight.wsdl +1 -1
  123. data/lib/wsdl/Log.DestinationIPFIX.wsdl +783 -0
  124. data/lib/wsdl/Log.DestinationLocalSyslog.wsdl +5 -5
  125. data/lib/wsdl/Log.DestinationManagementPort.wsdl +570 -0
  126. data/lib/wsdl/Log.DestinationRemoteHighSpeedLog.wsdl +268 -10
  127. data/lib/wsdl/Log.DestinationRemoteSyslog.wsdl +134 -14
  128. data/lib/wsdl/Log.DestinationSplunk.wsdl +1 -1
  129. data/lib/wsdl/Log.Filter.wsdl +266 -1
  130. data/lib/wsdl/Log.IPFIXInformationElement.wsdl +811 -0
  131. data/lib/wsdl/Log.Publisher.wsdl +1 -1
  132. data/lib/wsdl/Management.ApplicationPresentationScript.wsdl +1 -1
  133. data/lib/wsdl/Management.ApplicationService.wsdl +1 -1
  134. data/lib/wsdl/Management.ApplicationTemplate.wsdl +16 -1
  135. data/lib/wsdl/Management.CCLDAPConfiguration.wsdl +1 -1
  136. data/lib/wsdl/Management.CLIScript.wsdl +1 -1
  137. data/lib/wsdl/Management.CRLDPConfiguration.wsdl +1 -1
  138. data/lib/wsdl/Management.CRLDPServer.wsdl +1 -1
  139. data/lib/wsdl/Management.CertLDAPConfiguration.wsdl +1 -1
  140. data/lib/wsdl/Management.ChangeControl.wsdl +1 -1
  141. data/lib/wsdl/Management.DBVariable.wsdl +1 -1
  142. data/lib/wsdl/Management.Device.wsdl +36 -1
  143. data/lib/wsdl/Management.DeviceGroup.wsdl +1 -1
  144. data/lib/wsdl/Management.EM.wsdl +1 -1
  145. data/lib/wsdl/Management.EventNotification.wsdl +1 -1
  146. data/lib/wsdl/Management.EventSubscription.wsdl +1 -1
  147. data/lib/wsdl/Management.FeatureModule.wsdl +16 -1
  148. data/lib/wsdl/Management.Folder.wsdl +1 -1
  149. data/lib/wsdl/Management.Globals.wsdl +1 -1
  150. data/lib/wsdl/Management.KeyCertificate.wsdl +738 -64
  151. data/lib/wsdl/Management.LDAPConfiguration.wsdl +1 -1
  152. data/lib/wsdl/Management.LicenseAdministration.wsdl +16 -1
  153. data/lib/wsdl/Management.Named.wsdl +1 -1
  154. data/lib/wsdl/Management.OCSPConfiguration.wsdl +1 -1
  155. data/lib/wsdl/Management.OCSPResponder.wsdl +1 -1
  156. data/lib/wsdl/Management.Partition.wsdl +1 -1
  157. data/lib/wsdl/Management.Provision.wsdl +16 -1
  158. data/lib/wsdl/Management.RADIUSConfiguration.wsdl +1 -1
  159. data/lib/wsdl/Management.RADIUSServer.wsdl +1 -1
  160. data/lib/wsdl/Management.ResourceRecord.wsdl +1 -1
  161. data/lib/wsdl/Management.SFlowDataSource.wsdl +1 -1
  162. data/lib/wsdl/Management.SFlowGlobals.wsdl +1 -1
  163. data/lib/wsdl/Management.SFlowReceiver.wsdl +1 -1
  164. data/lib/wsdl/Management.SMTPConfiguration.wsdl +1 -1
  165. data/lib/wsdl/Management.SNMPConfiguration.wsdl +3 -5
  166. data/lib/wsdl/Management.TACACSConfiguration.wsdl +1 -1
  167. data/lib/wsdl/Management.TMOSModule.wsdl +16 -1
  168. data/lib/wsdl/Management.TrafficGroup.wsdl +77 -1
  169. data/lib/wsdl/Management.Trust.wsdl +1 -1
  170. data/lib/wsdl/Management.UserManagement.wsdl +47 -1
  171. data/lib/wsdl/Management.View.wsdl +1 -1
  172. data/lib/wsdl/Management.Zone.wsdl +104 -17
  173. data/lib/wsdl/Management.ZoneRunner.wsdl +1 -1
  174. data/lib/wsdl/Networking.ARP.wsdl +1 -1
  175. data/lib/wsdl/Networking.AdminIP.wsdl +1 -1
  176. data/lib/wsdl/Networking.BWControllerPolicy.wsdl +515 -36
  177. data/lib/wsdl/Networking.BWPriorityGroup.wsdl +655 -0
  178. data/lib/wsdl/Networking.DNSResolver.wsdl +1278 -0
  179. data/lib/wsdl/Networking.IPsecIkeDaemon.wsdl +1 -1
  180. data/lib/wsdl/Networking.IPsecIkePeer.wsdl +661 -29
  181. data/lib/wsdl/Networking.IPsecManualSecurityAssociation.wsdl +107 -5
  182. data/lib/wsdl/Networking.IPsecPolicy.wsdl +21 -1
  183. data/lib/wsdl/Networking.IPsecTrafficSelector.wsdl +1 -1
  184. data/lib/wsdl/Networking.Interfaces.wsdl +2165 -251
  185. data/lib/wsdl/Networking.LLDPGlobals.wsdl +1 -1
  186. data/lib/wsdl/Networking.MulticastRoute.wsdl +265 -0
  187. data/lib/wsdl/Networking.PacketFilter.wsdl +1841 -1
  188. data/lib/wsdl/Networking.PacketFilterGlobals.wsdl +1 -1
  189. data/lib/wsdl/Networking.PortMirror.wsdl +1 -1
  190. data/lib/wsdl/Networking.ProfileFEC.wsdl +1 -1
  191. data/lib/wsdl/Networking.ProfileGRE.wsdl +232 -1
  192. data/lib/wsdl/Networking.ProfileGeneve.wsdl +674 -0
  193. data/lib/wsdl/Networking.ProfileIPIP.wsdl +1 -1
  194. data/lib/wsdl/Networking.ProfileIPsec.wsdl +560 -0
  195. data/lib/wsdl/Networking.ProfileLightweight4Over6Tunnel.wsdl +663 -0
  196. data/lib/wsdl/Networking.ProfileMAP.wsdl +834 -0
  197. data/lib/wsdl/Networking.ProfileV6RD.wsdl +861 -0
  198. data/lib/wsdl/Networking.ProfileVXLAN.wsdl +223 -1
  199. data/lib/wsdl/Networking.ProfileWCCPGRE.wsdl +1 -1
  200. data/lib/wsdl/Networking.RouteDomain.wsdl +4 -9
  201. data/lib/wsdl/Networking.RouteDomainV2.wsdl +8959 -3933
  202. data/lib/wsdl/Networking.RouteTable.wsdl +1 -1
  203. data/lib/wsdl/Networking.RouteTableV2.wsdl +1 -1
  204. data/lib/wsdl/Networking.RouterAdvertisement.wsdl +1 -1
  205. data/lib/wsdl/Networking.STPGlobals.wsdl +1 -1
  206. data/lib/wsdl/Networking.STPInstance.wsdl +1 -1
  207. data/lib/wsdl/Networking.STPInstanceV2.wsdl +1 -1
  208. data/lib/wsdl/Networking.SelfIP.wsdl +1 -1
  209. data/lib/wsdl/Networking.SelfIPPortLockdown.wsdl +1216 -1
  210. data/lib/wsdl/Networking.SelfIPV2.wsdl +8717 -3908
  211. data/lib/wsdl/Networking.Trunk.wsdl +2173 -259
  212. data/lib/wsdl/Networking.Tunnel.wsdl +617 -1
  213. data/lib/wsdl/Networking.VLAN.wsdl +322 -39
  214. data/lib/wsdl/Networking.VLANGroup.wsdl +40 -1
  215. data/lib/wsdl/Networking.iSessionAdvertisedRoute.wsdl +1 -1
  216. data/lib/wsdl/Networking.iSessionAdvertisedRouteV2.wsdl +1 -1
  217. data/lib/wsdl/Networking.iSessionDatastor.wsdl +7 -13
  218. data/lib/wsdl/Networking.iSessionDeduplication.wsdl +1 -1
  219. data/lib/wsdl/Networking.iSessionLocalInterface.wsdl +77 -1
  220. data/lib/wsdl/Networking.iSessionPeerDiscovery.wsdl +1 -1
  221. data/lib/wsdl/Networking.iSessionRemoteInterface.wsdl +1 -1
  222. data/lib/wsdl/Networking.iSessionRemoteInterfaceV2.wsdl +108 -1
  223. data/lib/wsdl/PEM.FormatScript.wsdl +1 -1
  224. data/lib/wsdl/PEM.ForwardingEndpoint.wsdl +111 -1
  225. data/lib/wsdl/PEM.InterceptionEndpoint.wsdl +1 -1
  226. data/lib/wsdl/PEM.Listener.wsdl +1 -1
  227. data/lib/wsdl/PEM.Policy.wsdl +591 -1
  228. data/lib/wsdl/PEM.ServiceChainEndpoint.wsdl +169 -1
  229. data/lib/wsdl/PEM.Subscriber.wsdl +1841 -1
  230. data/lib/wsdl/Security.DoSDevice.wsdl +3097 -336
  231. data/lib/wsdl/Security.DoSWhitelist.wsdl +877 -0
  232. data/lib/wsdl/Security.FirewallAddressList.wsdl +959 -33
  233. data/lib/wsdl/Security.FirewallGlobalAdminIPRuleList.wsdl +5955 -2350
  234. data/lib/wsdl/Security.FirewallGlobalRuleList.wsdl +8370 -3601
  235. data/lib/wsdl/Security.FirewallPolicy.wsdl +7786 -3589
  236. data/lib/wsdl/Security.FirewallPortList.wsdl +287 -1
  237. data/lib/wsdl/Security.FirewallRuleList.wsdl +3633 -1276
  238. data/lib/wsdl/Security.FirewallWeeklySchedule.wsdl +1 -1
  239. data/lib/wsdl/Security.IPIntelligenceBlacklistCategory.wsdl +555 -0
  240. data/lib/wsdl/Security.IPIntelligenceFeedList.wsdl +1086 -0
  241. data/lib/wsdl/Security.IPIntelligenceGlobalPolicy.wsdl +285 -0
  242. data/lib/wsdl/Security.IPIntelligencePolicy.wsdl +1393 -0
  243. data/lib/wsdl/Security.LogProfile.wsdl +784 -66
  244. data/lib/wsdl/Security.ProfileDNSSecurity.wsdl +1841 -1
  245. data/lib/wsdl/Security.ProfileDoS.wsdl +5602 -1813
  246. data/lib/wsdl/Security.ProfileIPIntelligence.wsdl +2100 -256
  247. data/lib/wsdl/System.CertificateRevocationListFile.wsdl +1 -1
  248. data/lib/wsdl/System.Cluster.wsdl +17 -1
  249. data/lib/wsdl/System.ConfigSync.wsdl +226 -5
  250. data/lib/wsdl/System.Connections.wsdl +1216 -1
  251. data/lib/wsdl/System.CryptoClient.wsdl +8697 -0
  252. data/lib/wsdl/System.CryptoServer.wsdl +8507 -0
  253. data/lib/wsdl/System.Disk.wsdl +11 -1
  254. data/lib/wsdl/System.ExternalMonitorFile.wsdl +1 -1
  255. data/lib/wsdl/System.Failover.wsdl +1 -1
  256. data/lib/wsdl/System.GeoIP.wsdl +31 -15
  257. data/lib/wsdl/System.HAGroup.wsdl +1 -1
  258. data/lib/wsdl/System.HAStatus.wsdl +1 -1
  259. data/lib/wsdl/System.Inet.wsdl +1 -1
  260. data/lib/wsdl/System.Internal.wsdl +1 -1
  261. data/lib/wsdl/System.LightweightTunnelTableFile.wsdl +639 -0
  262. data/lib/wsdl/System.PerformanceSFlow.wsdl +1 -1
  263. data/lib/wsdl/System.Services.wsdl +6 -1
  264. data/lib/wsdl/System.Session.wsdl +203 -1
  265. data/lib/wsdl/System.SoftwareManagement.wsdl +275 -58
  266. data/lib/wsdl/System.Statistics.wsdl +4292 -1426
  267. data/lib/wsdl/System.SystemInfo.wsdl +1877 -32
  268. data/lib/wsdl/System.VCMP.wsdl +3498 -664
  269. data/lib/wsdl/WebAccelerator.Applications.wsdl +1841 -1
  270. data/lib/wsdl/WebAccelerator.Policies.wsdl +1 -1
  271. data/lib/wsdl/WebAccelerator.ProxyMessage.wsdl +1 -1
  272. data/lib/wsdl/iCall.PeriodicHandler.wsdl +1 -1
  273. data/lib/wsdl/iCall.PerpetualHandler.wsdl +1 -1
  274. data/lib/wsdl/iCall.Script.wsdl +43 -3
  275. data/lib/wsdl/iCall.TriggeredHandler.wsdl +1 -1
  276. metadata +46 -4
  277. data/LICENSE +0 -9
@@ -1,6 +1,6 @@
1
1
  <?xml version="1.0" ?>
2
2
  <!--
3
- Copyright (c) 1996-2013, F5 Networks, Inc., Seattle, Washington. All rights reserved.
3
+ Copyright (c) 1996-2016, F5 Networks, Inc., Seattle, Washington. All rights reserved.
4
4
 
5
5
  F5, F5 Networks, the F5 logo, BIG-IP, 3-DNS, iControl, GLOBAL-SITE, SEE-IT, EDGE-FX, FireGuard, Internet Control Architecture, IP Application Switch, iRules, PACKET VELOCITY, SYN Check, CONTROL YOUR WORLD, OneConnect, ZoneRunner, uRoam, FirePass, and TrafficShield are registered trademarks or trademarks of F5 Networks, Inc., in the U.S. and certain other countries.
6
6
 
@@ -715,6 +715,20 @@ All other trademarks mentioned in this document are the property of their respec
715
715
  <part name="return" type="tns:Common.EnabledStateSequence"/>
716
716
  </message>
717
717
 
718
+ <message name="Security.LogProfile.set_dos_network_publisherRequest">
719
+ <part name="profile_names" type="tns:Common.StringSequence"/>
720
+ <part name="publishers" type="tns:Common.StringSequence"/>
721
+ </message>
722
+ <message name="Security.LogProfile.set_dos_network_publisherResponse">
723
+ </message>
724
+
725
+ <message name="Security.LogProfile.get_dos_network_publisherRequest">
726
+ <part name="profile_names" type="tns:Common.StringSequence"/>
727
+ </message>
728
+ <message name="Security.LogProfile.get_dos_network_publisherResponse">
729
+ <part name="return" type="tns:Common.StringSequence"/>
730
+ </message>
731
+
718
732
  <message name="Security.LogProfile.get_applicationRequest">
719
733
  <part name="profile_names" type="tns:Common.StringSequence"/>
720
734
  </message>
@@ -1623,6 +1637,132 @@ All other trademarks mentioned in this document are the property of their respec
1623
1637
  <part name="return" type="tns:Common.StringSequenceSequence"/>
1624
1638
  </message>
1625
1639
 
1640
+ <message name="Security.LogProfile.set_ip_intelligence_log_aggregate_rate_limitRequest">
1641
+ <part name="profile_names" type="tns:Common.StringSequence"/>
1642
+ <part name="values" type="tns:Common.ULongSequence"/>
1643
+ </message>
1644
+ <message name="Security.LogProfile.set_ip_intelligence_log_aggregate_rate_limitResponse">
1645
+ </message>
1646
+
1647
+ <message name="Security.LogProfile.get_ip_intelligence_log_aggregate_rate_limitRequest">
1648
+ <part name="profile_names" type="tns:Common.StringSequence"/>
1649
+ </message>
1650
+ <message name="Security.LogProfile.get_ip_intelligence_log_aggregate_rate_limitResponse">
1651
+ <part name="return" type="tns:Common.ULongSequence"/>
1652
+ </message>
1653
+
1654
+ <message name="Security.LogProfile.set_network_log_aggregate_rate_limitRequest">
1655
+ <part name="profile_names" type="tns:Common.StringSequence"/>
1656
+ <part name="networks" type="tns:Common.StringSequenceSequence"/>
1657
+ <part name="values" type="tns:Common.ULongSequenceSequence"/>
1658
+ </message>
1659
+ <message name="Security.LogProfile.set_network_log_aggregate_rate_limitResponse">
1660
+ </message>
1661
+
1662
+ <message name="Security.LogProfile.get_network_log_aggregate_rate_limitRequest">
1663
+ <part name="profile_names" type="tns:Common.StringSequence"/>
1664
+ <part name="networks" type="tns:Common.StringSequenceSequence"/>
1665
+ </message>
1666
+ <message name="Security.LogProfile.get_network_log_aggregate_rate_limitResponse">
1667
+ <part name="return" type="tns:Common.ULongSequenceSequence"/>
1668
+ </message>
1669
+
1670
+ <message name="Security.LogProfile.set_network_log_acl_match_accept_rate_limitRequest">
1671
+ <part name="profile_names" type="tns:Common.StringSequence"/>
1672
+ <part name="networks" type="tns:Common.StringSequenceSequence"/>
1673
+ <part name="values" type="tns:Common.ULongSequenceSequence"/>
1674
+ </message>
1675
+ <message name="Security.LogProfile.set_network_log_acl_match_accept_rate_limitResponse">
1676
+ </message>
1677
+
1678
+ <message name="Security.LogProfile.get_network_log_acl_match_accept_rate_limitRequest">
1679
+ <part name="profile_names" type="tns:Common.StringSequence"/>
1680
+ <part name="networks" type="tns:Common.StringSequenceSequence"/>
1681
+ </message>
1682
+ <message name="Security.LogProfile.get_network_log_acl_match_accept_rate_limitResponse">
1683
+ <part name="return" type="tns:Common.ULongSequenceSequence"/>
1684
+ </message>
1685
+
1686
+ <message name="Security.LogProfile.set_network_log_acl_match_drop_rate_limitRequest">
1687
+ <part name="profile_names" type="tns:Common.StringSequence"/>
1688
+ <part name="networks" type="tns:Common.StringSequenceSequence"/>
1689
+ <part name="values" type="tns:Common.ULongSequenceSequence"/>
1690
+ </message>
1691
+ <message name="Security.LogProfile.set_network_log_acl_match_drop_rate_limitResponse">
1692
+ </message>
1693
+
1694
+ <message name="Security.LogProfile.get_network_log_acl_match_drop_rate_limitRequest">
1695
+ <part name="profile_names" type="tns:Common.StringSequence"/>
1696
+ <part name="networks" type="tns:Common.StringSequenceSequence"/>
1697
+ </message>
1698
+ <message name="Security.LogProfile.get_network_log_acl_match_drop_rate_limitResponse">
1699
+ <part name="return" type="tns:Common.ULongSequenceSequence"/>
1700
+ </message>
1701
+
1702
+ <message name="Security.LogProfile.set_network_log_acl_match_reject_rate_limitRequest">
1703
+ <part name="profile_names" type="tns:Common.StringSequence"/>
1704
+ <part name="networks" type="tns:Common.StringSequenceSequence"/>
1705
+ <part name="values" type="tns:Common.ULongSequenceSequence"/>
1706
+ </message>
1707
+ <message name="Security.LogProfile.set_network_log_acl_match_reject_rate_limitResponse">
1708
+ </message>
1709
+
1710
+ <message name="Security.LogProfile.get_network_log_acl_match_reject_rate_limitRequest">
1711
+ <part name="profile_names" type="tns:Common.StringSequence"/>
1712
+ <part name="networks" type="tns:Common.StringSequenceSequence"/>
1713
+ </message>
1714
+ <message name="Security.LogProfile.get_network_log_acl_match_reject_rate_limitResponse">
1715
+ <part name="return" type="tns:Common.ULongSequenceSequence"/>
1716
+ </message>
1717
+
1718
+ <message name="Security.LogProfile.set_network_log_ip_errors_rate_limitRequest">
1719
+ <part name="profile_names" type="tns:Common.StringSequence"/>
1720
+ <part name="networks" type="tns:Common.StringSequenceSequence"/>
1721
+ <part name="values" type="tns:Common.ULongSequenceSequence"/>
1722
+ </message>
1723
+ <message name="Security.LogProfile.set_network_log_ip_errors_rate_limitResponse">
1724
+ </message>
1725
+
1726
+ <message name="Security.LogProfile.get_network_log_ip_errors_rate_limitRequest">
1727
+ <part name="profile_names" type="tns:Common.StringSequence"/>
1728
+ <part name="networks" type="tns:Common.StringSequenceSequence"/>
1729
+ </message>
1730
+ <message name="Security.LogProfile.get_network_log_ip_errors_rate_limitResponse">
1731
+ <part name="return" type="tns:Common.ULongSequenceSequence"/>
1732
+ </message>
1733
+
1734
+ <message name="Security.LogProfile.set_network_log_tcp_errors_rate_limitRequest">
1735
+ <part name="profile_names" type="tns:Common.StringSequence"/>
1736
+ <part name="networks" type="tns:Common.StringSequenceSequence"/>
1737
+ <part name="values" type="tns:Common.ULongSequenceSequence"/>
1738
+ </message>
1739
+ <message name="Security.LogProfile.set_network_log_tcp_errors_rate_limitResponse">
1740
+ </message>
1741
+
1742
+ <message name="Security.LogProfile.get_network_log_tcp_errors_rate_limitRequest">
1743
+ <part name="profile_names" type="tns:Common.StringSequence"/>
1744
+ <part name="networks" type="tns:Common.StringSequenceSequence"/>
1745
+ </message>
1746
+ <message name="Security.LogProfile.get_network_log_tcp_errors_rate_limitResponse">
1747
+ <part name="return" type="tns:Common.ULongSequenceSequence"/>
1748
+ </message>
1749
+
1750
+ <message name="Security.LogProfile.set_network_log_tcp_events_rate_limitRequest">
1751
+ <part name="profile_names" type="tns:Common.StringSequence"/>
1752
+ <part name="networks" type="tns:Common.StringSequenceSequence"/>
1753
+ <part name="values" type="tns:Common.ULongSequenceSequence"/>
1754
+ </message>
1755
+ <message name="Security.LogProfile.set_network_log_tcp_events_rate_limitResponse">
1756
+ </message>
1757
+
1758
+ <message name="Security.LogProfile.get_network_log_tcp_events_rate_limitRequest">
1759
+ <part name="profile_names" type="tns:Common.StringSequence"/>
1760
+ <part name="networks" type="tns:Common.StringSequenceSequence"/>
1761
+ </message>
1762
+ <message name="Security.LogProfile.get_network_log_tcp_events_rate_limitResponse">
1763
+ <part name="return" type="tns:Common.ULongSequenceSequence"/>
1764
+ </message>
1765
+
1626
1766
  <message name="Security.LogProfile.get_protocol_dnsRequest">
1627
1767
  <part name="profile_names" type="tns:Common.StringSequence"/>
1628
1768
  </message>
@@ -2011,11 +2151,28 @@ All other trademarks mentioned in this document are the property of their respec
2011
2151
  <operation name="get_ip_intelligence_log_translation_fields_filter_state">
2012
2152
  <documentation>
2013
2153
  Gets the IP Intelligence log translation fields filter state in Logging profile.
2014
-
2154
+
2015
2155
  </documentation>
2016
2156
  <input message="tns:Security.LogProfile.get_ip_intelligence_log_translation_fields_filter_stateRequest"/>
2017
2157
  <output message="tns:Security.LogProfile.get_ip_intelligence_log_translation_fields_filter_stateResponse"/>
2018
2158
  </operation>
2159
+ <operation name="set_dos_network_publisher">
2160
+ <documentation>
2161
+ Sets the DoS Network log publisher in a Logging profile. This determines
2162
+ where the DoS Network log information is sent.
2163
+
2164
+ </documentation>
2165
+ <input message="tns:Security.LogProfile.set_dos_network_publisherRequest"/>
2166
+ <output message="tns:Security.LogProfile.set_dos_network_publisherResponse"/>
2167
+ </operation>
2168
+ <operation name="get_dos_network_publisher">
2169
+ <documentation>
2170
+ Gets the DoS Network log publisher in Logging profile.
2171
+
2172
+ </documentation>
2173
+ <input message="tns:Security.LogProfile.get_dos_network_publisherRequest"/>
2174
+ <output message="tns:Security.LogProfile.get_dos_network_publisherResponse"/>
2175
+ </operation>
2019
2176
  <operation name="get_application">
2020
2177
  <documentation>
2021
2178
  Gets a list of Application Security sub-profiles for a list of given logging profiles.
@@ -2241,7 +2398,7 @@ All other trademarks mentioned in this document are the property of their respec
2241
2398
  This is relevant only for the remote storage of type remote, since Splunk and ArcSight have their fixed format.
2242
2399
 
2243
2400
  Field delimiter specifies which delimiter the remote machine uses to separate the fields in the logging file.
2244
- You may not use the % character. The default delimiter is the comma character, for Comma Separated Value (CSV).
2401
+ You may not use the &amp;#37; character. The default delimiter is the comma character, for Comma Separated Value (CSV).
2245
2402
 
2246
2403
  </documentation>
2247
2404
  <input message="tns:Security.LogProfile.set_application_field_delimiterRequest"/>
@@ -2261,8 +2418,7 @@ All other trademarks mentioned in this document are the property of their respec
2261
2418
  This is relevant only for the remote storage of type remote, since Splunk and ArcSight have their fixed format.
2262
2419
 
2263
2420
  Field format specifies which format the remote machine uses for each key/value pair in the logging file.
2264
- Use %k for key and %v for value. The default format is empty that is interpreted as "%v", for CSV.
2265
-
2421
+ Use
2266
2422
  </documentation>
2267
2423
  <input message="tns:Security.LogProfile.set_application_field_formatRequest"/>
2268
2424
  <output message="tns:Security.LogProfile.set_application_field_formatResponse"/>
@@ -2301,7 +2457,7 @@ All other trademarks mentioned in this document are the property of their respec
2301
2457
  This is relevant only for the remote storage of type remote, since Splunk and ArcSight have their fixed format.
2302
2458
 
2303
2459
  User string specifies the format in which the server logs traffic items.
2304
- You can use free text between the traffic items enclosed in % on both sides.
2460
+ You can use free text between the traffic items enclosed in 0n both sides.
2305
2461
 
2306
2462
  </documentation>
2307
2463
  <input message="tns:Security.LogProfile.set_application_user_stringRequest"/>
@@ -2715,7 +2871,7 @@ All other trademarks mentioned in this document are the property of their respec
2715
2871
  Sets the field-list delimiter of the field-list storage format in Protocol (SIP) Security.
2716
2872
 
2717
2873
  Field delimiter specifies which delimiter the remote machine uses to separate the fields in the logging file.
2718
- You may not use the % character. The default delimiter is the comma character, for Comma Separated Value (CSV).
2874
+ You may not use the haracter. The default delimiter is the comma character, for Comma Separated Value (CSV).
2719
2875
 
2720
2876
  </documentation>
2721
2877
  <input message="tns:Security.LogProfile.set_protocol_sip_field_list_delimiterRequest"/>
@@ -2735,8 +2891,7 @@ All other trademarks mentioned in this document are the property of their respec
2735
2891
  This is relevant only for the remote storage of type remote, since Splunk and ArcSight have their fixed format.
2736
2892
 
2737
2893
  Field format specifies which format the remote machine uses for each key/value pair in the logging file.
2738
- Use %k for key and %v for value. The default format is empty that is interpreted as "%v", for CSV.
2739
-
2894
+ Use
2740
2895
  </documentation>
2741
2896
  <input message="tns:Security.LogProfile.set_protocol_sip_field_formatRequest"/>
2742
2897
  <output message="tns:Security.LogProfile.set_protocol_sip_field_formatResponse"/>
@@ -2773,7 +2928,7 @@ All other trademarks mentioned in this document are the property of their respec
2773
2928
  <documentation>
2774
2929
  Sets the user defined string of the user-defined storage format in Protocol (SIP) Security.
2775
2930
 
2776
- You can use free text between the traffic items enclosed in % on both sides.
2931
+ You can use free text between the traffic items enclosed in 0n both sides.
2777
2932
 
2778
2933
  </documentation>
2779
2934
  <input message="tns:Security.LogProfile.set_protocol_sip_user_defined_stringRequest"/>
@@ -3003,7 +3158,7 @@ All other trademarks mentioned in this document are the property of their respec
3003
3158
  Sets the field-list delimiter of the field-list storage format in Network Firewall.
3004
3159
 
3005
3160
  Field delimiter specifies which delimiter the remote machine uses to separate the fields in the logging file.
3006
- You may not use the % character. The default delimiter is the comma character, for Comma Separated Value (CSV).
3161
+ You may not use the haracter. The default delimiter is the comma character, for Comma Separated Value (CSV).
3007
3162
 
3008
3163
  </documentation>
3009
3164
  <input message="tns:Security.LogProfile.set_network_field_list_delimiterRequest"/>
@@ -3023,8 +3178,7 @@ All other trademarks mentioned in this document are the property of their respec
3023
3178
  This is relevant only for the remote storage of type remote, since Splunk and ArcSight have their fixed format.
3024
3179
 
3025
3180
  Field format specifies which format the remote machine uses for each key/value pair in the logging file.
3026
- Use %k for key and %v for value. The default format is empty that is interpreted as "%v", for CSV.
3027
-
3181
+ Use
3028
3182
  </documentation>
3029
3183
  <input message="tns:Security.LogProfile.set_network_field_formatRequest"/>
3030
3184
  <output message="tns:Security.LogProfile.set_network_field_formatResponse"/>
@@ -3061,7 +3215,7 @@ All other trademarks mentioned in this document are the property of their respec
3061
3215
  <documentation>
3062
3216
  Sets the user defined string of the user-defined storage format in Network Firewall.
3063
3217
 
3064
- You can use free text between the traffic items enclosed in % on both sides.
3218
+ You can use free text between the traffic items enclosed in 0n both sides.
3065
3219
 
3066
3220
  </documentation>
3067
3221
  <input message="tns:Security.LogProfile.set_network_user_defined_stringRequest"/>
@@ -3094,6 +3248,166 @@ All other trademarks mentioned in this document are the property of their respec
3094
3248
  <input message="tns:Security.LogProfile.get_network_log_publisherRequest"/>
3095
3249
  <output message="tns:Security.LogProfile.get_network_log_publisherResponse"/>
3096
3250
  </operation>
3251
+ <operation name="set_ip_intelligence_log_aggregate_rate_limit">
3252
+ <documentation>
3253
+ Sets the aggregate log throttle rate limit for IP Intelligence log
3254
+ messages in logging profile.
3255
+ When set, the system allows logging of IP Intelligence log
3256
+ messages up to the configured number of log messages per second,
3257
+ beyond which log messages are dropped.
3258
+ The default rate limit is unlimited.
3259
+
3260
+ </documentation>
3261
+ <input message="tns:Security.LogProfile.set_ip_intelligence_log_aggregate_rate_limitRequest"/>
3262
+ <output message="tns:Security.LogProfile.set_ip_intelligence_log_aggregate_rate_limitResponse"/>
3263
+ </operation>
3264
+ <operation name="get_ip_intelligence_log_aggregate_rate_limit">
3265
+ <documentation>
3266
+ Gets the aggregate log throttle rate limit for IP Intelligence log messages in logging profile.
3267
+
3268
+ </documentation>
3269
+ <input message="tns:Security.LogProfile.get_ip_intelligence_log_aggregate_rate_limitRequest"/>
3270
+ <output message="tns:Security.LogProfile.get_ip_intelligence_log_aggregate_rate_limitResponse"/>
3271
+ </operation>
3272
+ <operation name="set_network_log_aggregate_rate_limit">
3273
+ <documentation>
3274
+ Sets the aggregate log throttle rate limit for all log messages in network firewall.
3275
+ When set, the system allows logging up to the configured number of log
3276
+ messages per second, beyond which network log messages are dropped.
3277
+ The default rate limit is unlimited.
3278
+
3279
+ </documentation>
3280
+ <input message="tns:Security.LogProfile.set_network_log_aggregate_rate_limitRequest"/>
3281
+ <output message="tns:Security.LogProfile.set_network_log_aggregate_rate_limitResponse"/>
3282
+ </operation>
3283
+ <operation name="get_network_log_aggregate_rate_limit">
3284
+ <documentation>
3285
+ Gets the aggregate log throttle rate limit in Network Firewall.
3286
+
3287
+ </documentation>
3288
+ <input message="tns:Security.LogProfile.get_network_log_aggregate_rate_limitRequest"/>
3289
+ <output message="tns:Security.LogProfile.get_network_log_aggregate_rate_limitResponse"/>
3290
+ </operation>
3291
+ <operation name="set_network_log_acl_match_accept_rate_limit">
3292
+ <documentation>
3293
+ Sets the log throttle rate limit for ACL match accept log messages
3294
+ in Network Firewall. When set, the system allows logging of ACL
3295
+ match log messages up to the configured number of log messages per second,
3296
+ beyond which log messages are dropped.
3297
+ The default rate limit is unlimited.
3298
+
3299
+ </documentation>
3300
+ <input message="tns:Security.LogProfile.set_network_log_acl_match_accept_rate_limitRequest"/>
3301
+ <output message="tns:Security.LogProfile.set_network_log_acl_match_accept_rate_limitResponse"/>
3302
+ </operation>
3303
+ <operation name="get_network_log_acl_match_accept_rate_limit">
3304
+ <documentation>
3305
+ Gets the log throttle rate limit for ACL match accept log messages in Network Firewall.
3306
+
3307
+ </documentation>
3308
+ <input message="tns:Security.LogProfile.get_network_log_acl_match_accept_rate_limitRequest"/>
3309
+ <output message="tns:Security.LogProfile.get_network_log_acl_match_accept_rate_limitResponse"/>
3310
+ </operation>
3311
+ <operation name="set_network_log_acl_match_drop_rate_limit">
3312
+ <documentation>
3313
+ Sets the log throttle rate limit for ACL match drop log messages
3314
+ in Network Firewall. When set, the system allows logging of ACL
3315
+ match drop log messages up to the configured number of log messages per second,
3316
+ beyond which log messages are dropped.
3317
+ The default rate limit is unlimited.
3318
+
3319
+ </documentation>
3320
+ <input message="tns:Security.LogProfile.set_network_log_acl_match_drop_rate_limitRequest"/>
3321
+ <output message="tns:Security.LogProfile.set_network_log_acl_match_drop_rate_limitResponse"/>
3322
+ </operation>
3323
+ <operation name="get_network_log_acl_match_drop_rate_limit">
3324
+ <documentation>
3325
+ Gets the log throttle rate limit for ACL match drop log messages in Network Firewall.
3326
+
3327
+ </documentation>
3328
+ <input message="tns:Security.LogProfile.get_network_log_acl_match_drop_rate_limitRequest"/>
3329
+ <output message="tns:Security.LogProfile.get_network_log_acl_match_drop_rate_limitResponse"/>
3330
+ </operation>
3331
+ <operation name="set_network_log_acl_match_reject_rate_limit">
3332
+ <documentation>
3333
+ Sets the log throttle rate limit for ACL match reject log messages
3334
+ in Network Firewall. When set, the system allows logging of ACL
3335
+ match reject log messages up to the configured number of log messages per second,
3336
+ beyond which log messages are dropped.
3337
+ The default rate limit is unlimited.
3338
+
3339
+ </documentation>
3340
+ <input message="tns:Security.LogProfile.set_network_log_acl_match_reject_rate_limitRequest"/>
3341
+ <output message="tns:Security.LogProfile.set_network_log_acl_match_reject_rate_limitResponse"/>
3342
+ </operation>
3343
+ <operation name="get_network_log_acl_match_reject_rate_limit">
3344
+ <documentation>
3345
+ Gets the log throttle rate limit for ACL match reject log messages in Network Firewall.
3346
+
3347
+ </documentation>
3348
+ <input message="tns:Security.LogProfile.get_network_log_acl_match_reject_rate_limitRequest"/>
3349
+ <output message="tns:Security.LogProfile.get_network_log_acl_match_reject_rate_limitResponse"/>
3350
+ </operation>
3351
+ <operation name="set_network_log_ip_errors_rate_limit">
3352
+ <documentation>
3353
+ Sets the log throttle rate limit for IP error log messages
3354
+ in Network Firewall. When set, the system allows logging of IP
3355
+ error log messages up to the configured number of log messages per second,
3356
+ beyond which log messages are dropped.
3357
+ The default rate limit is unlimited.
3358
+
3359
+ </documentation>
3360
+ <input message="tns:Security.LogProfile.set_network_log_ip_errors_rate_limitRequest"/>
3361
+ <output message="tns:Security.LogProfile.set_network_log_ip_errors_rate_limitResponse"/>
3362
+ </operation>
3363
+ <operation name="get_network_log_ip_errors_rate_limit">
3364
+ <documentation>
3365
+ Gets the log throttle rate limit for IP error log messages in Network Firewall.
3366
+
3367
+ </documentation>
3368
+ <input message="tns:Security.LogProfile.get_network_log_ip_errors_rate_limitRequest"/>
3369
+ <output message="tns:Security.LogProfile.get_network_log_ip_errors_rate_limitResponse"/>
3370
+ </operation>
3371
+ <operation name="set_network_log_tcp_errors_rate_limit">
3372
+ <documentation>
3373
+ Sets the log throttle rate limit for TCP error log messages
3374
+ in Network Firewall. When set, the system allows logging of TCP
3375
+ error log messages up to the configured number of log messages per second,
3376
+ beyond which log messages are dropped.
3377
+ The default rate limit is unlimited.
3378
+
3379
+ </documentation>
3380
+ <input message="tns:Security.LogProfile.set_network_log_tcp_errors_rate_limitRequest"/>
3381
+ <output message="tns:Security.LogProfile.set_network_log_tcp_errors_rate_limitResponse"/>
3382
+ </operation>
3383
+ <operation name="get_network_log_tcp_errors_rate_limit">
3384
+ <documentation>
3385
+ Gets the log throttle rate limit for TCP error log messages in Network Firewall.
3386
+
3387
+ </documentation>
3388
+ <input message="tns:Security.LogProfile.get_network_log_tcp_errors_rate_limitRequest"/>
3389
+ <output message="tns:Security.LogProfile.get_network_log_tcp_errors_rate_limitResponse"/>
3390
+ </operation>
3391
+ <operation name="set_network_log_tcp_events_rate_limit">
3392
+ <documentation>
3393
+ Sets the log throttle rate limit for TCP Event log messages
3394
+ in Network Firewall. When set, the system allows logging of TCP
3395
+ Event log messages up to the configured number of log messages per second,
3396
+ beyond which log messages are dropped.
3397
+ The default rate limit is unlimited.
3398
+
3399
+ </documentation>
3400
+ <input message="tns:Security.LogProfile.set_network_log_tcp_events_rate_limitRequest"/>
3401
+ <output message="tns:Security.LogProfile.set_network_log_tcp_events_rate_limitResponse"/>
3402
+ </operation>
3403
+ <operation name="get_network_log_tcp_events_rate_limit">
3404
+ <documentation>
3405
+ Gets the log throttle rate limit for TCP Event log messages in Network Firewall.
3406
+
3407
+ </documentation>
3408
+ <input message="tns:Security.LogProfile.get_network_log_tcp_events_rate_limitRequest"/>
3409
+ <output message="tns:Security.LogProfile.get_network_log_tcp_events_rate_limitResponse"/>
3410
+ </operation>
3097
3411
  <operation name="get_protocol_dns">
3098
3412
  <documentation>
3099
3413
  Gets a list of Protocol (DNS) Security sub-profiles for a list of given logging profiles.
@@ -3253,7 +3567,7 @@ All other trademarks mentioned in this document are the property of their respec
3253
3567
  Sets the field-list delimiter of the field-list storage format in Protocol (DNS) Security.
3254
3568
 
3255
3569
  Field delimiter specifies which delimiter the remote machine uses to separate the fields in the logging file.
3256
- You may not use the % character. The default delimiter is the comma character, for Comma Separated Value (CSV).
3570
+ You may not use the haracter. The default delimiter is the comma character, for Comma Separated Value (CSV).
3257
3571
 
3258
3572
  </documentation>
3259
3573
  <input message="tns:Security.LogProfile.set_protocol_dns_field_list_delimiterRequest"/>
@@ -3273,8 +3587,7 @@ All other trademarks mentioned in this document are the property of their respec
3273
3587
  This is relevant only for the remote storage of type remote, since Splunk and ArcSight have their fixed format.
3274
3588
 
3275
3589
  Field format specifies which format the remote machine uses for each key/value pair in the logging file.
3276
- Use %k for key and %v for value. The default format is empty that is interpreted as "%v", for CSV.
3277
-
3590
+ Use
3278
3591
  </documentation>
3279
3592
  <input message="tns:Security.LogProfile.set_protocol_dns_field_formatRequest"/>
3280
3593
  <output message="tns:Security.LogProfile.set_protocol_dns_field_formatResponse"/>
@@ -3311,7 +3624,7 @@ All other trademarks mentioned in this document are the property of their respec
3311
3624
  <documentation>
3312
3625
  Sets the user defined string of the user-defined storage format in Protocol (DNS) Security.
3313
3626
 
3314
- You can use free text between the traffic items enclosed in % on both sides.
3627
+ You can use free text between the traffic items enclosed in 0n both sides.
3315
3628
 
3316
3629
  </documentation>
3317
3630
  <input message="tns:Security.LogProfile.set_protocol_dns_user_defined_stringRequest"/>
@@ -3703,7 +4016,48 @@ All other trademarks mentioned in this document are the property of their respec
3703
4016
  <operation name="get_ip_intelligence_log_translation_fields_filter_state">
3704
4017
  <documentation>
3705
4018
  Gets the IP Intelligence log translation fields filter state in Logging profile.
3706
-
4019
+
4020
+ </documentation>
4021
+ <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
4022
+ <input>
4023
+ <soap:body
4024
+ use="encoded"
4025
+ namespace="urn:iControl:Security/LogProfile"
4026
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
4027
+ </input>
4028
+ <output>
4029
+ <soap:body
4030
+ use="encoded"
4031
+ namespace="urn:iControl:Security/LogProfile"
4032
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
4033
+ </output>
4034
+ </operation>
4035
+
4036
+ <operation name="set_dos_network_publisher">
4037
+ <documentation>
4038
+ Sets the DoS Network log publisher in a Logging profile. This determines
4039
+ where the DoS Network log information is sent.
4040
+
4041
+ </documentation>
4042
+ <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
4043
+ <input>
4044
+ <soap:body
4045
+ use="encoded"
4046
+ namespace="urn:iControl:Security/LogProfile"
4047
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
4048
+ </input>
4049
+ <output>
4050
+ <soap:body
4051
+ use="encoded"
4052
+ namespace="urn:iControl:Security/LogProfile"
4053
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
4054
+ </output>
4055
+ </operation>
4056
+
4057
+ <operation name="get_dos_network_publisher">
4058
+ <documentation>
4059
+ Gets the DoS Network log publisher in Logging profile.
4060
+
3707
4061
  </documentation>
3708
4062
  <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
3709
4063
  <input>
@@ -4221,7 +4575,7 @@ All other trademarks mentioned in this document are the property of their respec
4221
4575
  This is relevant only for the remote storage of type remote, since Splunk and ArcSight have their fixed format.
4222
4576
 
4223
4577
  Field delimiter specifies which delimiter the remote machine uses to separate the fields in the logging file.
4224
- You may not use the % character. The default delimiter is the comma character, for Comma Separated Value (CSV).
4578
+ You may not use the &amp;#37; character. The default delimiter is the comma character, for Comma Separated Value (CSV).
4225
4579
 
4226
4580
  </documentation>
4227
4581
  <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
@@ -4265,8 +4619,7 @@ All other trademarks mentioned in this document are the property of their respec
4265
4619
  This is relevant only for the remote storage of type remote, since Splunk and ArcSight have their fixed format.
4266
4620
 
4267
4621
  Field format specifies which format the remote machine uses for each key/value pair in the logging file.
4268
- Use %k for key and %v for value. The default format is empty that is interpreted as "%v", for CSV.
4269
-
4622
+ Use
4270
4623
  </documentation>
4271
4624
  <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
4272
4625
  <input>
@@ -4353,7 +4706,7 @@ All other trademarks mentioned in this document are the property of their respec
4353
4706
  This is relevant only for the remote storage of type remote, since Splunk and ArcSight have their fixed format.
4354
4707
 
4355
4708
  User string specifies the format in which the server logs traffic items.
4356
- You can use free text between the traffic items enclosed in % on both sides.
4709
+ You can use free text between the traffic items enclosed in 0n both sides.
4357
4710
 
4358
4711
  </documentation>
4359
4712
  <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
@@ -5307,7 +5660,7 @@ All other trademarks mentioned in this document are the property of their respec
5307
5660
  Sets the field-list delimiter of the field-list storage format in Protocol (SIP) Security.
5308
5661
 
5309
5662
  Field delimiter specifies which delimiter the remote machine uses to separate the fields in the logging file.
5310
- You may not use the % character. The default delimiter is the comma character, for Comma Separated Value (CSV).
5663
+ You may not use the haracter. The default delimiter is the comma character, for Comma Separated Value (CSV).
5311
5664
 
5312
5665
  </documentation>
5313
5666
  <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
@@ -5351,8 +5704,7 @@ All other trademarks mentioned in this document are the property of their respec
5351
5704
  This is relevant only for the remote storage of type remote, since Splunk and ArcSight have their fixed format.
5352
5705
 
5353
5706
  Field format specifies which format the remote machine uses for each key/value pair in the logging file.
5354
- Use %k for key and %v for value. The default format is empty that is interpreted as "%v", for CSV.
5355
-
5707
+ Use
5356
5708
  </documentation>
5357
5709
  <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
5358
5710
  <input>
@@ -5437,7 +5789,7 @@ All other trademarks mentioned in this document are the property of their respec
5437
5789
  <documentation>
5438
5790
  Sets the user defined string of the user-defined storage format in Protocol (SIP) Security.
5439
5791
 
5440
- You can use free text between the traffic items enclosed in % on both sides.
5792
+ You can use free text between the traffic items enclosed in 0n both sides.
5441
5793
 
5442
5794
  </documentation>
5443
5795
  <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
@@ -5967,7 +6319,7 @@ All other trademarks mentioned in this document are the property of their respec
5967
6319
  Sets the field-list delimiter of the field-list storage format in Network Firewall.
5968
6320
 
5969
6321
  Field delimiter specifies which delimiter the remote machine uses to separate the fields in the logging file.
5970
- You may not use the % character. The default delimiter is the comma character, for Comma Separated Value (CSV).
6322
+ You may not use the haracter. The default delimiter is the comma character, for Comma Separated Value (CSV).
5971
6323
 
5972
6324
  </documentation>
5973
6325
  <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
@@ -6011,8 +6363,7 @@ All other trademarks mentioned in this document are the property of their respec
6011
6363
  This is relevant only for the remote storage of type remote, since Splunk and ArcSight have their fixed format.
6012
6364
 
6013
6365
  Field format specifies which format the remote machine uses for each key/value pair in the logging file.
6014
- Use %k for key and %v for value. The default format is empty that is interpreted as "%v", for CSV.
6015
-
6366
+ Use
6016
6367
  </documentation>
6017
6368
  <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
6018
6369
  <input>
@@ -6097,7 +6448,7 @@ All other trademarks mentioned in this document are the property of their respec
6097
6448
  <documentation>
6098
6449
  Sets the user defined string of the user-defined storage format in Network Firewall.
6099
6450
 
6100
- You can use free text between the traffic items enclosed in % on both sides.
6451
+ You can use free text between the traffic items enclosed in 0n both sides.
6101
6452
 
6102
6453
  </documentation>
6103
6454
  <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
@@ -6178,9 +6529,14 @@ All other trademarks mentioned in this document are the property of their respec
6178
6529
  </output>
6179
6530
  </operation>
6180
6531
 
6181
- <operation name="get_protocol_dns">
6532
+ <operation name="set_ip_intelligence_log_aggregate_rate_limit">
6182
6533
  <documentation>
6183
- Gets a list of Protocol (DNS) Security sub-profiles for a list of given logging profiles.
6534
+ Sets the aggregate log throttle rate limit for IP Intelligence log
6535
+ messages in logging profile.
6536
+ When set, the system allows logging of IP Intelligence log
6537
+ messages up to the configured number of log messages per second,
6538
+ beyond which log messages are dropped.
6539
+ The default rate limit is unlimited.
6184
6540
 
6185
6541
  </documentation>
6186
6542
  <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
@@ -6198,10 +6554,9 @@ All other trademarks mentioned in this document are the property of their respec
6198
6554
  </output>
6199
6555
  </operation>
6200
6556
 
6201
- <operation name="add_protocol_dns">
6557
+ <operation name="get_ip_intelligence_log_aggregate_rate_limit">
6202
6558
  <documentation>
6203
- Adds a list of Protocol (DNS) Security sub-profiles to given logging profiles.
6204
- Note: Only one Protocol (DNS) Security sub-profile can exist per logging profile.
6559
+ Gets the aggregate log throttle rate limit for IP Intelligence log messages in logging profile.
6205
6560
 
6206
6561
  </documentation>
6207
6562
  <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
@@ -6219,10 +6574,13 @@ All other trademarks mentioned in this document are the property of their respec
6219
6574
  </output>
6220
6575
  </operation>
6221
6576
 
6222
- <operation name="remove_protocol_dns">
6577
+ <operation name="set_network_log_aggregate_rate_limit">
6223
6578
  <documentation>
6224
- Removes specific Protocol (DNS) Security sub-profiles from the specified logging profiles.
6225
-
6579
+ Sets the aggregate log throttle rate limit for all log messages in network firewall.
6580
+ When set, the system allows logging up to the configured number of log
6581
+ messages per second, beyond which network log messages are dropped.
6582
+ The default rate limit is unlimited.
6583
+
6226
6584
  </documentation>
6227
6585
  <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
6228
6586
  <input>
@@ -6239,10 +6597,10 @@ All other trademarks mentioned in this document are the property of their respec
6239
6597
  </output>
6240
6598
  </operation>
6241
6599
 
6242
- <operation name="remove_all_protocol_dnses">
6600
+ <operation name="get_network_log_aggregate_rate_limit">
6243
6601
  <documentation>
6244
- Removes all Protocol (DNS) Security sub-profiles from the specified logging profiles.
6245
-
6602
+ Gets the aggregate log throttle rate limit in Network Firewall.
6603
+
6246
6604
  </documentation>
6247
6605
  <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
6248
6606
  <input>
@@ -6259,11 +6617,13 @@ All other trademarks mentioned in this document are the property of their respec
6259
6617
  </output>
6260
6618
  </operation>
6261
6619
 
6262
- <operation name="set_protocol_dns_log_drop_filter_state">
6620
+ <operation name="set_network_log_acl_match_accept_rate_limit">
6263
6621
  <documentation>
6264
- Sets the drop log filter state in Protocol (DNS) Security.
6265
- When enabled, the system logs all DNS requests that are dropped. When disabled, the system does not log.
6266
- The default is disabled.
6622
+ Sets the log throttle rate limit for ACL match accept log messages
6623
+ in Network Firewall. When set, the system allows logging of ACL
6624
+ match log messages up to the configured number of log messages per second,
6625
+ beyond which log messages are dropped.
6626
+ The default rate limit is unlimited.
6267
6627
 
6268
6628
  </documentation>
6269
6629
  <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
@@ -6281,10 +6641,10 @@ All other trademarks mentioned in this document are the property of their respec
6281
6641
  </output>
6282
6642
  </operation>
6283
6643
 
6284
- <operation name="get_protocol_dns_log_drop_filter_state">
6644
+ <operation name="get_network_log_acl_match_accept_rate_limit">
6285
6645
  <documentation>
6286
- Gets the drop log filter state in Protocol (DNS) Security.
6287
-
6646
+ Gets the log throttle rate limit for ACL match accept log messages in Network Firewall.
6647
+
6288
6648
  </documentation>
6289
6649
  <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
6290
6650
  <input>
@@ -6301,11 +6661,13 @@ All other trademarks mentioned in this document are the property of their respec
6301
6661
  </output>
6302
6662
  </operation>
6303
6663
 
6304
- <operation name="set_protocol_dns_log_filtered_drop_filter_state">
6664
+ <operation name="set_network_log_acl_match_drop_rate_limit">
6305
6665
  <documentation>
6306
- Sets the filtered-drop log filter state in Protocol (DNS) Security.
6307
- When enabled, the system logs all DNS requests that are dropped due to security filtering.
6308
- When disabled, the system does not log. The default is disabled.
6666
+ Sets the log throttle rate limit for ACL match drop log messages
6667
+ in Network Firewall. When set, the system allows logging of ACL
6668
+ match drop log messages up to the configured number of log messages per second,
6669
+ beyond which log messages are dropped.
6670
+ The default rate limit is unlimited.
6309
6671
 
6310
6672
  </documentation>
6311
6673
  <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
@@ -6323,10 +6685,10 @@ All other trademarks mentioned in this document are the property of their respec
6323
6685
  </output>
6324
6686
  </operation>
6325
6687
 
6326
- <operation name="get_protocol_dns_log_filtered_drop_filter_state">
6688
+ <operation name="get_network_log_acl_match_drop_rate_limit">
6327
6689
  <documentation>
6328
- Gets the filtered-drop log filter state in Protocol (DNS) Security.
6329
-
6690
+ Gets the log throttle rate limit for ACL match drop log messages in Network Firewall.
6691
+
6330
6692
  </documentation>
6331
6693
  <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
6332
6694
  <input>
@@ -6343,11 +6705,13 @@ All other trademarks mentioned in this document are the property of their respec
6343
6705
  </output>
6344
6706
  </operation>
6345
6707
 
6346
- <operation name="set_protocol_dns_log_malformed_filter_state">
6708
+ <operation name="set_network_log_acl_match_reject_rate_limit">
6347
6709
  <documentation>
6348
- Sets the malformed log filter state in Protocol (DNS) Security.
6349
- When enabled, the system logs all DNS requests that are malformed. When disabled, the system does not log.
6350
- The default is disabled.
6710
+ Sets the log throttle rate limit for ACL match reject log messages
6711
+ in Network Firewall. When set, the system allows logging of ACL
6712
+ match reject log messages up to the configured number of log messages per second,
6713
+ beyond which log messages are dropped.
6714
+ The default rate limit is unlimited.
6351
6715
 
6352
6716
  </documentation>
6353
6717
  <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
@@ -6365,9 +6729,348 @@ All other trademarks mentioned in this document are the property of their respec
6365
6729
  </output>
6366
6730
  </operation>
6367
6731
 
6368
- <operation name="get_protocol_dns_log_malformed_filter_state">
6732
+ <operation name="get_network_log_acl_match_reject_rate_limit">
6369
6733
  <documentation>
6370
- Gets the malformed log filter state in Protocol (DNS) Security.
6734
+ Gets the log throttle rate limit for ACL match reject log messages in Network Firewall.
6735
+
6736
+ </documentation>
6737
+ <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
6738
+ <input>
6739
+ <soap:body
6740
+ use="encoded"
6741
+ namespace="urn:iControl:Security/LogProfile"
6742
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
6743
+ </input>
6744
+ <output>
6745
+ <soap:body
6746
+ use="encoded"
6747
+ namespace="urn:iControl:Security/LogProfile"
6748
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
6749
+ </output>
6750
+ </operation>
6751
+
6752
+ <operation name="set_network_log_ip_errors_rate_limit">
6753
+ <documentation>
6754
+ Sets the log throttle rate limit for IP error log messages
6755
+ in Network Firewall. When set, the system allows logging of IP
6756
+ error log messages up to the configured number of log messages per second,
6757
+ beyond which log messages are dropped.
6758
+ The default rate limit is unlimited.
6759
+
6760
+ </documentation>
6761
+ <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
6762
+ <input>
6763
+ <soap:body
6764
+ use="encoded"
6765
+ namespace="urn:iControl:Security/LogProfile"
6766
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
6767
+ </input>
6768
+ <output>
6769
+ <soap:body
6770
+ use="encoded"
6771
+ namespace="urn:iControl:Security/LogProfile"
6772
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
6773
+ </output>
6774
+ </operation>
6775
+
6776
+ <operation name="get_network_log_ip_errors_rate_limit">
6777
+ <documentation>
6778
+ Gets the log throttle rate limit for IP error log messages in Network Firewall.
6779
+
6780
+ </documentation>
6781
+ <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
6782
+ <input>
6783
+ <soap:body
6784
+ use="encoded"
6785
+ namespace="urn:iControl:Security/LogProfile"
6786
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
6787
+ </input>
6788
+ <output>
6789
+ <soap:body
6790
+ use="encoded"
6791
+ namespace="urn:iControl:Security/LogProfile"
6792
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
6793
+ </output>
6794
+ </operation>
6795
+
6796
+ <operation name="set_network_log_tcp_errors_rate_limit">
6797
+ <documentation>
6798
+ Sets the log throttle rate limit for TCP error log messages
6799
+ in Network Firewall. When set, the system allows logging of TCP
6800
+ error log messages up to the configured number of log messages per second,
6801
+ beyond which log messages are dropped.
6802
+ The default rate limit is unlimited.
6803
+
6804
+ </documentation>
6805
+ <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
6806
+ <input>
6807
+ <soap:body
6808
+ use="encoded"
6809
+ namespace="urn:iControl:Security/LogProfile"
6810
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
6811
+ </input>
6812
+ <output>
6813
+ <soap:body
6814
+ use="encoded"
6815
+ namespace="urn:iControl:Security/LogProfile"
6816
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
6817
+ </output>
6818
+ </operation>
6819
+
6820
+ <operation name="get_network_log_tcp_errors_rate_limit">
6821
+ <documentation>
6822
+ Gets the log throttle rate limit for TCP error log messages in Network Firewall.
6823
+
6824
+ </documentation>
6825
+ <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
6826
+ <input>
6827
+ <soap:body
6828
+ use="encoded"
6829
+ namespace="urn:iControl:Security/LogProfile"
6830
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
6831
+ </input>
6832
+ <output>
6833
+ <soap:body
6834
+ use="encoded"
6835
+ namespace="urn:iControl:Security/LogProfile"
6836
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
6837
+ </output>
6838
+ </operation>
6839
+
6840
+ <operation name="set_network_log_tcp_events_rate_limit">
6841
+ <documentation>
6842
+ Sets the log throttle rate limit for TCP Event log messages
6843
+ in Network Firewall. When set, the system allows logging of TCP
6844
+ Event log messages up to the configured number of log messages per second,
6845
+ beyond which log messages are dropped.
6846
+ The default rate limit is unlimited.
6847
+
6848
+ </documentation>
6849
+ <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
6850
+ <input>
6851
+ <soap:body
6852
+ use="encoded"
6853
+ namespace="urn:iControl:Security/LogProfile"
6854
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
6855
+ </input>
6856
+ <output>
6857
+ <soap:body
6858
+ use="encoded"
6859
+ namespace="urn:iControl:Security/LogProfile"
6860
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
6861
+ </output>
6862
+ </operation>
6863
+
6864
+ <operation name="get_network_log_tcp_events_rate_limit">
6865
+ <documentation>
6866
+ Gets the log throttle rate limit for TCP Event log messages in Network Firewall.
6867
+
6868
+ </documentation>
6869
+ <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
6870
+ <input>
6871
+ <soap:body
6872
+ use="encoded"
6873
+ namespace="urn:iControl:Security/LogProfile"
6874
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
6875
+ </input>
6876
+ <output>
6877
+ <soap:body
6878
+ use="encoded"
6879
+ namespace="urn:iControl:Security/LogProfile"
6880
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
6881
+ </output>
6882
+ </operation>
6883
+
6884
+ <operation name="get_protocol_dns">
6885
+ <documentation>
6886
+ Gets a list of Protocol (DNS) Security sub-profiles for a list of given logging profiles.
6887
+
6888
+ </documentation>
6889
+ <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
6890
+ <input>
6891
+ <soap:body
6892
+ use="encoded"
6893
+ namespace="urn:iControl:Security/LogProfile"
6894
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
6895
+ </input>
6896
+ <output>
6897
+ <soap:body
6898
+ use="encoded"
6899
+ namespace="urn:iControl:Security/LogProfile"
6900
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
6901
+ </output>
6902
+ </operation>
6903
+
6904
+ <operation name="add_protocol_dns">
6905
+ <documentation>
6906
+ Adds a list of Protocol (DNS) Security sub-profiles to given logging profiles.
6907
+ Note: Only one Protocol (DNS) Security sub-profile can exist per logging profile.
6908
+
6909
+ </documentation>
6910
+ <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
6911
+ <input>
6912
+ <soap:body
6913
+ use="encoded"
6914
+ namespace="urn:iControl:Security/LogProfile"
6915
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
6916
+ </input>
6917
+ <output>
6918
+ <soap:body
6919
+ use="encoded"
6920
+ namespace="urn:iControl:Security/LogProfile"
6921
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
6922
+ </output>
6923
+ </operation>
6924
+
6925
+ <operation name="remove_protocol_dns">
6926
+ <documentation>
6927
+ Removes specific Protocol (DNS) Security sub-profiles from the specified logging profiles.
6928
+
6929
+ </documentation>
6930
+ <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
6931
+ <input>
6932
+ <soap:body
6933
+ use="encoded"
6934
+ namespace="urn:iControl:Security/LogProfile"
6935
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
6936
+ </input>
6937
+ <output>
6938
+ <soap:body
6939
+ use="encoded"
6940
+ namespace="urn:iControl:Security/LogProfile"
6941
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
6942
+ </output>
6943
+ </operation>
6944
+
6945
+ <operation name="remove_all_protocol_dnses">
6946
+ <documentation>
6947
+ Removes all Protocol (DNS) Security sub-profiles from the specified logging profiles.
6948
+
6949
+ </documentation>
6950
+ <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
6951
+ <input>
6952
+ <soap:body
6953
+ use="encoded"
6954
+ namespace="urn:iControl:Security/LogProfile"
6955
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
6956
+ </input>
6957
+ <output>
6958
+ <soap:body
6959
+ use="encoded"
6960
+ namespace="urn:iControl:Security/LogProfile"
6961
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
6962
+ </output>
6963
+ </operation>
6964
+
6965
+ <operation name="set_protocol_dns_log_drop_filter_state">
6966
+ <documentation>
6967
+ Sets the drop log filter state in Protocol (DNS) Security.
6968
+ When enabled, the system logs all DNS requests that are dropped. When disabled, the system does not log.
6969
+ The default is disabled.
6970
+
6971
+ </documentation>
6972
+ <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
6973
+ <input>
6974
+ <soap:body
6975
+ use="encoded"
6976
+ namespace="urn:iControl:Security/LogProfile"
6977
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
6978
+ </input>
6979
+ <output>
6980
+ <soap:body
6981
+ use="encoded"
6982
+ namespace="urn:iControl:Security/LogProfile"
6983
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
6984
+ </output>
6985
+ </operation>
6986
+
6987
+ <operation name="get_protocol_dns_log_drop_filter_state">
6988
+ <documentation>
6989
+ Gets the drop log filter state in Protocol (DNS) Security.
6990
+
6991
+ </documentation>
6992
+ <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
6993
+ <input>
6994
+ <soap:body
6995
+ use="encoded"
6996
+ namespace="urn:iControl:Security/LogProfile"
6997
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
6998
+ </input>
6999
+ <output>
7000
+ <soap:body
7001
+ use="encoded"
7002
+ namespace="urn:iControl:Security/LogProfile"
7003
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
7004
+ </output>
7005
+ </operation>
7006
+
7007
+ <operation name="set_protocol_dns_log_filtered_drop_filter_state">
7008
+ <documentation>
7009
+ Sets the filtered-drop log filter state in Protocol (DNS) Security.
7010
+ When enabled, the system logs all DNS requests that are dropped due to security filtering.
7011
+ When disabled, the system does not log. The default is disabled.
7012
+
7013
+ </documentation>
7014
+ <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
7015
+ <input>
7016
+ <soap:body
7017
+ use="encoded"
7018
+ namespace="urn:iControl:Security/LogProfile"
7019
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
7020
+ </input>
7021
+ <output>
7022
+ <soap:body
7023
+ use="encoded"
7024
+ namespace="urn:iControl:Security/LogProfile"
7025
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
7026
+ </output>
7027
+ </operation>
7028
+
7029
+ <operation name="get_protocol_dns_log_filtered_drop_filter_state">
7030
+ <documentation>
7031
+ Gets the filtered-drop log filter state in Protocol (DNS) Security.
7032
+
7033
+ </documentation>
7034
+ <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
7035
+ <input>
7036
+ <soap:body
7037
+ use="encoded"
7038
+ namespace="urn:iControl:Security/LogProfile"
7039
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
7040
+ </input>
7041
+ <output>
7042
+ <soap:body
7043
+ use="encoded"
7044
+ namespace="urn:iControl:Security/LogProfile"
7045
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
7046
+ </output>
7047
+ </operation>
7048
+
7049
+ <operation name="set_protocol_dns_log_malformed_filter_state">
7050
+ <documentation>
7051
+ Sets the malformed log filter state in Protocol (DNS) Security.
7052
+ When enabled, the system logs all DNS requests that are malformed. When disabled, the system does not log.
7053
+ The default is disabled.
7054
+
7055
+ </documentation>
7056
+ <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
7057
+ <input>
7058
+ <soap:body
7059
+ use="encoded"
7060
+ namespace="urn:iControl:Security/LogProfile"
7061
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
7062
+ </input>
7063
+ <output>
7064
+ <soap:body
7065
+ use="encoded"
7066
+ namespace="urn:iControl:Security/LogProfile"
7067
+ encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"/>
7068
+ </output>
7069
+ </operation>
7070
+
7071
+ <operation name="get_protocol_dns_log_malformed_filter_state">
7072
+ <documentation>
7073
+ Gets the malformed log filter state in Protocol (DNS) Security.
6371
7074
 
6372
7075
  </documentation>
6373
7076
  <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
@@ -6541,7 +7244,7 @@ All other trademarks mentioned in this document are the property of their respec
6541
7244
  Sets the field-list delimiter of the field-list storage format in Protocol (DNS) Security.
6542
7245
 
6543
7246
  Field delimiter specifies which delimiter the remote machine uses to separate the fields in the logging file.
6544
- You may not use the % character. The default delimiter is the comma character, for Comma Separated Value (CSV).
7247
+ You may not use the haracter. The default delimiter is the comma character, for Comma Separated Value (CSV).
6545
7248
 
6546
7249
  </documentation>
6547
7250
  <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
@@ -6585,8 +7288,7 @@ All other trademarks mentioned in this document are the property of their respec
6585
7288
  This is relevant only for the remote storage of type remote, since Splunk and ArcSight have their fixed format.
6586
7289
 
6587
7290
  Field format specifies which format the remote machine uses for each key/value pair in the logging file.
6588
- Use %k for key and %v for value. The default format is empty that is interpreted as "%v", for CSV.
6589
-
7291
+ Use
6590
7292
  </documentation>
6591
7293
  <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
6592
7294
  <input>
@@ -6671,7 +7373,7 @@ All other trademarks mentioned in this document are the property of their respec
6671
7373
  <documentation>
6672
7374
  Sets the user defined string of the user-defined storage format in Protocol (DNS) Security.
6673
7375
 
6674
- You can use free text between the traffic items enclosed in % on both sides.
7376
+ You can use free text between the traffic items enclosed in 0n both sides.
6675
7377
 
6676
7378
  </documentation>
6677
7379
  <soap:operation soapAction="urn:iControl:Security/LogProfile"/>
@@ -6919,6 +7621,22 @@ All other trademarks mentioned in this document are the property of their respec
6919
7621
  virtual server as the logging profile containing it.
6920
7622
  Note that Application and Protocol (Transfer) Security are mutually exclusive parts per logging profile and virtual server.
6921
7623
 
7624
+ A Network Firewall sub-profile allows you to configure where to log requests to the virtual server to which the log profile is attached.
7625
+ The system groups the requests into several categories (e.g., ACL matches, TCP errors etc). In addition, you can configure whether
7626
+ the requests need to be locally stored on the system or sent to an external server (e.g., syslog, ArcSight, Splunk servers).
7627
+
7628
+ A Protocol DNS Security sub-profile allows you to configure where to log DNS requests to the virtual server to which the log profile is
7629
+ attached. The system groups the requests into several categories (e.g., malicious, malformed, dropped, rejected etc). In addition, you can
7630
+ configure whether the requests need to be locally stored on the system or sent to an external server (e.g., syslog, ArcSight, Splunk servers).
7631
+
7632
+ A Protocol SIP Security sub-profile allows you to configure where to log SIP requests to the virtual server to which the log profile is
7633
+ attached. The system groups the requests into several categories (e.g., malformed, dropped etc). In addition, you can configure whether the
7634
+ requests need to be locally stored on the system or sent to an external server (e.g., syslog, ArcSight, Splunk servers).
7635
+
7636
+ A DoS Network Security log publisher allows you to configure where to log DoS Network information for the virtual server that the log profile is
7637
+ attached to. DoS Network is similar to DoS Device, as it offers DoS attack protection at the virtual server level. The information can be
7638
+ locally stored on the system or sent to an external server (e.g., syslog, ArcSight, Splunk servers). See Log::Publisher for more information.
7639
+
6922
7640
  </documentation>
6923
7641
  <port name="Security.LogProfilePort" binding="tns:Security.LogProfileBinding">
6924
7642
  <soap:address location="https://url_to_service"/>