@pulumi/scm 1.0.5 → 1.0.6
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/forwardingProfile.d.ts +294 -0
- package/forwardingProfile.js +247 -0
- package/forwardingProfile.js.map +1 -0
- package/forwardingProfileDestination.d.ts +190 -0
- package/forwardingProfileDestination.js +143 -0
- package/forwardingProfileDestination.js.map +1 -0
- package/forwardingProfileRegionalAndCustomProxy.d.ts +289 -0
- package/forwardingProfileRegionalAndCustomProxy.js +192 -0
- package/forwardingProfileRegionalAndCustomProxy.js.map +1 -0
- package/forwardingProfileSourceApplication.d.ts +161 -0
- package/forwardingProfileSourceApplication.js +129 -0
- package/forwardingProfileSourceApplication.js.map +1 -0
- package/forwardingProfileUserLocation.d.ts +172 -0
- package/forwardingProfileUserLocation.js +125 -0
- package/forwardingProfileUserLocation.js.map +1 -0
- package/getAddressGroupList.d.ts +4 -4
- package/getAddressGroupList.js +4 -4
- package/getAddressList.d.ts +4 -4
- package/getAddressList.js +4 -4
- package/getAggregateInterfaceList.d.ts +2 -2
- package/getAggregateInterfaceList.js +2 -2
- package/getApplicationGroupList.d.ts +4 -4
- package/getApplicationGroupList.js +4 -4
- package/getBgpAuthProfileList.d.ts +2 -2
- package/getBgpAuthProfileList.js +2 -2
- package/getBgpRedistributionProfileList.d.ts +2 -2
- package/getBgpRedistributionProfileList.js +2 -2
- package/getBgpRouteMapList.d.ts +2 -2
- package/getBgpRouteMapList.js +2 -2
- package/getConfigMatchListList.d.ts +2 -2
- package/getConfigMatchListList.js +2 -2
- package/getDevice.d.ts +267 -0
- package/getDevice.js +82 -0
- package/getDevice.js.map +1 -0
- package/getDeviceList.d.ts +171 -0
- package/getDeviceList.js +88 -0
- package/getDeviceList.js.map +1 -0
- package/getDynamicUserGroupList.d.ts +4 -4
- package/getDynamicUserGroupList.js +4 -4
- package/getEthernetInterfaceList.d.ts +2 -2
- package/getEthernetInterfaceList.js +2 -2
- package/getForwardingProfile.d.ts +137 -0
- package/getForwardingProfile.js +92 -0
- package/getForwardingProfile.js.map +1 -0
- package/getForwardingProfileDestination.d.ts +127 -0
- package/getForwardingProfileDestination.js +82 -0
- package/getForwardingProfileDestination.js.map +1 -0
- package/getForwardingProfileDestinationList.d.ts +163 -0
- package/getForwardingProfileDestinationList.js +90 -0
- package/getForwardingProfileDestinationList.js.map +1 -0
- package/getForwardingProfileList.d.ts +163 -0
- package/getForwardingProfileList.js +90 -0
- package/getForwardingProfileList.js.map +1 -0
- package/getForwardingProfileRegionalAndCustomProxy.d.ts +157 -0
- package/getForwardingProfileRegionalAndCustomProxy.js +92 -0
- package/getForwardingProfileRegionalAndCustomProxy.js.map +1 -0
- package/getForwardingProfileRegionalAndCustomProxyList.d.ts +163 -0
- package/getForwardingProfileRegionalAndCustomProxyList.js +90 -0
- package/getForwardingProfileRegionalAndCustomProxyList.js.map +1 -0
- package/getForwardingProfileSourceApplication.d.ts +98 -0
- package/getForwardingProfileSourceApplication.js +58 -0
- package/getForwardingProfileSourceApplication.js.map +1 -0
- package/getForwardingProfileSourceApplicationList.d.ts +113 -0
- package/getForwardingProfileSourceApplicationList.js +40 -0
- package/getForwardingProfileSourceApplicationList.js.map +1 -0
- package/getForwardingProfileUserLocation.d.ts +127 -0
- package/getForwardingProfileUserLocation.js +82 -0
- package/getForwardingProfileUserLocation.js.map +1 -0
- package/getForwardingProfileUserLocationList.d.ts +163 -0
- package/getForwardingProfileUserLocationList.js +90 -0
- package/getForwardingProfileUserLocationList.js.map +1 -0
- package/getGlobalprotectMatchListList.d.ts +2 -2
- package/getGlobalprotectMatchListList.js +2 -2
- package/getHipmatchMatchListList.d.ts +2 -2
- package/getHipmatchMatchListList.js +2 -2
- package/getIptagMatchListList.d.ts +2 -2
- package/getIptagMatchListList.js +2 -2
- package/getLayer2SubinterfaceList.d.ts +2 -2
- package/getLayer2SubinterfaceList.js +2 -2
- package/getLayer3SubinterfaceList.d.ts +2 -2
- package/getLayer3SubinterfaceList.js +2 -2
- package/getLogicalRouterList.d.ts +2 -2
- package/getLogicalRouterList.js +2 -2
- package/getLoopbackInterfaceList.d.ts +2 -2
- package/getLoopbackInterfaceList.js +2 -2
- package/getServiceConnection.d.ts +4 -0
- package/getServiceConnection.js.map +1 -1
- package/getServiceList.d.ts +2 -2
- package/getServiceList.js +2 -2
- package/getSystemMatchListList.d.ts +2 -2
- package/getSystemMatchListList.js +2 -2
- package/getTunnelInterfaceList.d.ts +2 -2
- package/getTunnelInterfaceList.js +2 -2
- package/getUseridMatchListList.d.ts +2 -2
- package/getUseridMatchListList.js +2 -2
- package/getVlanInterfaceList.d.ts +2 -2
- package/getVlanInterfaceList.js +2 -2
- package/getZoneList.d.ts +2 -2
- package/getZoneList.js +2 -2
- package/index.d.ts +51 -0
- package/index.js +74 -13
- package/index.js.map +1 -1
- package/package.json +2 -2
- package/securityRule.d.ts +27 -0
- package/securityRule.js +27 -0
- package/securityRule.js.map +1 -1
- package/serviceConnection.d.ts +12 -0
- package/serviceConnection.js +2 -0
- package/serviceConnection.js.map +1 -1
- package/types/input.d.ts +335 -1
- package/types/output.d.ts +1423 -1
package/types/output.d.ts
CHANGED
|
@@ -4873,6 +4873,332 @@ export interface FileBlockingProfileRule {
|
|
|
4873
4873
|
*/
|
|
4874
4874
|
name: string;
|
|
4875
4875
|
}
|
|
4876
|
+
export interface ForwardingProfileDestinationFqdn {
|
|
4877
|
+
/**
|
|
4878
|
+
* alphanumeric string [*0-9a-zA-Z._-] and at most one $ by the end
|
|
4879
|
+
*/
|
|
4880
|
+
name: string;
|
|
4881
|
+
/**
|
|
4882
|
+
* Port number for fqdn based destination
|
|
4883
|
+
*/
|
|
4884
|
+
port?: number;
|
|
4885
|
+
}
|
|
4886
|
+
export interface ForwardingProfileDestinationIpAddress {
|
|
4887
|
+
/**
|
|
4888
|
+
* IP address with wildcards and CIDR notation support
|
|
4889
|
+
*/
|
|
4890
|
+
name: string;
|
|
4891
|
+
/**
|
|
4892
|
+
* Port number for IP address based destination
|
|
4893
|
+
*/
|
|
4894
|
+
port?: number;
|
|
4895
|
+
}
|
|
4896
|
+
export interface ForwardingProfileRegionalAndCustomProxyConnectivityPreference {
|
|
4897
|
+
/**
|
|
4898
|
+
* Indicates whether this connectivity method is enabled for use in the proxy configuration
|
|
4899
|
+
*/
|
|
4900
|
+
enabled: boolean;
|
|
4901
|
+
/**
|
|
4902
|
+
* Connectivity method type - 'tunnel' for VPN tunnels, 'proxy' for HTTP/HTTPS proxies, 'adns' for authenticated DNS, 'masque' for MASQUE protocol
|
|
4903
|
+
*/
|
|
4904
|
+
name: string;
|
|
4905
|
+
}
|
|
4906
|
+
export interface ForwardingProfileRegionalAndCustomProxyPrismaAccessLocation {
|
|
4907
|
+
/**
|
|
4908
|
+
* Add list of locations separated by space, in that region
|
|
4909
|
+
*/
|
|
4910
|
+
locations?: string[];
|
|
4911
|
+
/**
|
|
4912
|
+
* One of the region from 'americas', 'europe', 'apac'
|
|
4913
|
+
*/
|
|
4914
|
+
name: string;
|
|
4915
|
+
}
|
|
4916
|
+
export interface ForwardingProfileRegionalAndCustomProxyProxy1 {
|
|
4917
|
+
/**
|
|
4918
|
+
* fqdn of the primary proxy server (supports wildcards and alphanumeric characters with dots, hyphens, and underscores)
|
|
4919
|
+
*/
|
|
4920
|
+
fqdn?: string;
|
|
4921
|
+
/**
|
|
4922
|
+
* Geographic or network location identifier for the primary proxy server
|
|
4923
|
+
*/
|
|
4924
|
+
location?: string;
|
|
4925
|
+
/**
|
|
4926
|
+
* port number for primary proxy
|
|
4927
|
+
*/
|
|
4928
|
+
port?: number;
|
|
4929
|
+
}
|
|
4930
|
+
export interface ForwardingProfileRegionalAndCustomProxyProxy2 {
|
|
4931
|
+
/**
|
|
4932
|
+
* Fqdn of the secondary (backup) proxy server used for failover scenarios
|
|
4933
|
+
*/
|
|
4934
|
+
fqdn?: string;
|
|
4935
|
+
/**
|
|
4936
|
+
* Geographic or network location identifier for the secondary proxy server
|
|
4937
|
+
*/
|
|
4938
|
+
location?: string;
|
|
4939
|
+
/**
|
|
4940
|
+
* port number for secondary proxy
|
|
4941
|
+
*/
|
|
4942
|
+
port?: number;
|
|
4943
|
+
}
|
|
4944
|
+
export interface ForwardingProfileType {
|
|
4945
|
+
/**
|
|
4946
|
+
* Global Protect proxy-based forwarding configuration
|
|
4947
|
+
*/
|
|
4948
|
+
globalProtectProxy?: outputs.ForwardingProfileTypeGlobalProtectProxy;
|
|
4949
|
+
/**
|
|
4950
|
+
* PAC file based forwarding configuration
|
|
4951
|
+
*
|
|
4952
|
+
* > ℹ️ **Note:** You must specify exactly one of `globalProtectProxy`, `pacFile`, and `ztnaAgent`.
|
|
4953
|
+
*/
|
|
4954
|
+
pacFile?: outputs.ForwardingProfileTypePacFile;
|
|
4955
|
+
/**
|
|
4956
|
+
* ZTNA agent-based forwarding configuration
|
|
4957
|
+
*
|
|
4958
|
+
* > ℹ️ **Note:** You must specify exactly one of `globalProtectProxy`, `pacFile`, and `ztnaAgent`.
|
|
4959
|
+
*/
|
|
4960
|
+
ztnaAgent?: outputs.ForwardingProfileTypeZtnaAgent;
|
|
4961
|
+
}
|
|
4962
|
+
export interface ForwardingProfileTypeGlobalProtectProxy {
|
|
4963
|
+
/**
|
|
4964
|
+
* Basic block rule configuration for PAC file and GlobalProtect proxy profiles
|
|
4965
|
+
*/
|
|
4966
|
+
blockRule?: outputs.ForwardingProfileTypeGlobalProtectProxyBlockRule;
|
|
4967
|
+
/**
|
|
4968
|
+
* List of GlobalProtect proxy-based forwarding rules
|
|
4969
|
+
*/
|
|
4970
|
+
forwardingRules?: outputs.ForwardingProfileTypeGlobalProtectProxyForwardingRule[];
|
|
4971
|
+
/**
|
|
4972
|
+
* User uploaded PAC file for Global Protect proxy-based forwarding configuration
|
|
4973
|
+
*/
|
|
4974
|
+
pacUpload: boolean;
|
|
4975
|
+
}
|
|
4976
|
+
export interface ForwardingProfileTypeGlobalProtectProxyBlockRule {
|
|
4977
|
+
/**
|
|
4978
|
+
* TCP traffic allowlist configuration
|
|
4979
|
+
*/
|
|
4980
|
+
allowTcp?: outputs.ForwardingProfileTypeGlobalProtectProxyBlockRuleAllowTcp;
|
|
4981
|
+
/**
|
|
4982
|
+
* UDP traffic allowlist configuration with location and destination support
|
|
4983
|
+
*/
|
|
4984
|
+
allowUdp?: outputs.ForwardingProfileTypeGlobalProtectProxyBlockRuleAllowUdp;
|
|
4985
|
+
/**
|
|
4986
|
+
* Enable block rule
|
|
4987
|
+
*/
|
|
4988
|
+
enable?: boolean;
|
|
4989
|
+
}
|
|
4990
|
+
export interface ForwardingProfileTypeGlobalProtectProxyBlockRuleAllowTcp {
|
|
4991
|
+
/**
|
|
4992
|
+
* Enable locations for allow-tcp
|
|
4993
|
+
*/
|
|
4994
|
+
enableLocations?: boolean;
|
|
4995
|
+
/**
|
|
4996
|
+
* List of user locations allowed for TCP traffic
|
|
4997
|
+
*/
|
|
4998
|
+
locations?: string[];
|
|
4999
|
+
}
|
|
5000
|
+
export interface ForwardingProfileTypeGlobalProtectProxyBlockRuleAllowUdp {
|
|
5001
|
+
/**
|
|
5002
|
+
* Destination addresses or networks allowed for UDP traffic
|
|
5003
|
+
*/
|
|
5004
|
+
destinations?: string;
|
|
5005
|
+
/**
|
|
5006
|
+
* Enable destinations for allow-udp
|
|
5007
|
+
*/
|
|
5008
|
+
enableDestinations?: boolean;
|
|
5009
|
+
/**
|
|
5010
|
+
* Enable locations for allow-udp
|
|
5011
|
+
*/
|
|
5012
|
+
enableLocations?: boolean;
|
|
5013
|
+
/**
|
|
5014
|
+
* List of user locations allowed for UDP traffic
|
|
5015
|
+
*/
|
|
5016
|
+
locations?: string[];
|
|
5017
|
+
}
|
|
5018
|
+
export interface ForwardingProfileTypeGlobalProtectProxyForwardingRule {
|
|
5019
|
+
/**
|
|
5020
|
+
* Connectivity method for this forwarding rule (e.g. direct)
|
|
5021
|
+
*/
|
|
5022
|
+
connectivity: string;
|
|
5023
|
+
/**
|
|
5024
|
+
* Destination scope this forwarding rule applies to
|
|
5025
|
+
*/
|
|
5026
|
+
destinations: string;
|
|
5027
|
+
/**
|
|
5028
|
+
* Enable a basic forwarding rule
|
|
5029
|
+
*/
|
|
5030
|
+
enabled: boolean;
|
|
5031
|
+
/**
|
|
5032
|
+
* Basic forwarding rule name as an alphanumeric string [ 0-9a-zA-Z._ -]
|
|
5033
|
+
*/
|
|
5034
|
+
name: string;
|
|
5035
|
+
/**
|
|
5036
|
+
* User location scope this rule applies to
|
|
5037
|
+
*/
|
|
5038
|
+
userLocations: string;
|
|
5039
|
+
}
|
|
5040
|
+
export interface ForwardingProfileTypePacFile {
|
|
5041
|
+
/**
|
|
5042
|
+
* Basic block rule configuration for PAC file and GlobalProtect proxy profiles
|
|
5043
|
+
*/
|
|
5044
|
+
blockRule?: outputs.ForwardingProfileTypePacFileBlockRule;
|
|
5045
|
+
/**
|
|
5046
|
+
* List of PAC file-based forwarding rules
|
|
5047
|
+
*/
|
|
5048
|
+
forwardingRules?: outputs.ForwardingProfileTypePacFileForwardingRule[];
|
|
5049
|
+
/**
|
|
5050
|
+
* User upload PAC file for PAC file based forwarding configuration
|
|
5051
|
+
*/
|
|
5052
|
+
pacUpload: boolean;
|
|
5053
|
+
}
|
|
5054
|
+
export interface ForwardingProfileTypePacFileBlockRule {
|
|
5055
|
+
/**
|
|
5056
|
+
* TCP traffic allowlist configuration
|
|
5057
|
+
*/
|
|
5058
|
+
allowTcp?: outputs.ForwardingProfileTypePacFileBlockRuleAllowTcp;
|
|
5059
|
+
/**
|
|
5060
|
+
* UDP traffic allowlist configuration with location and destination support
|
|
5061
|
+
*/
|
|
5062
|
+
allowUdp?: outputs.ForwardingProfileTypePacFileBlockRuleAllowUdp;
|
|
5063
|
+
/**
|
|
5064
|
+
* Enable block rule
|
|
5065
|
+
*/
|
|
5066
|
+
enable?: boolean;
|
|
5067
|
+
}
|
|
5068
|
+
export interface ForwardingProfileTypePacFileBlockRuleAllowTcp {
|
|
5069
|
+
/**
|
|
5070
|
+
* Enable locations for allow-tcp
|
|
5071
|
+
*/
|
|
5072
|
+
enableLocations?: boolean;
|
|
5073
|
+
/**
|
|
5074
|
+
* List of user locations allowed for TCP traffic
|
|
5075
|
+
*/
|
|
5076
|
+
locations?: string[];
|
|
5077
|
+
}
|
|
5078
|
+
export interface ForwardingProfileTypePacFileBlockRuleAllowUdp {
|
|
5079
|
+
/**
|
|
5080
|
+
* Destination addresses or networks allowed for UDP traffic
|
|
5081
|
+
*/
|
|
5082
|
+
destinations?: string;
|
|
5083
|
+
/**
|
|
5084
|
+
* Enable destinations for allow-udp
|
|
5085
|
+
*/
|
|
5086
|
+
enableDestinations?: boolean;
|
|
5087
|
+
/**
|
|
5088
|
+
* Enable locations for allow-udp
|
|
5089
|
+
*/
|
|
5090
|
+
enableLocations?: boolean;
|
|
5091
|
+
/**
|
|
5092
|
+
* List of user locations allowed for UDP traffic
|
|
5093
|
+
*/
|
|
5094
|
+
locations?: string[];
|
|
5095
|
+
}
|
|
5096
|
+
export interface ForwardingProfileTypePacFileForwardingRule {
|
|
5097
|
+
/**
|
|
5098
|
+
* Connectivity method for this forwarding rule (e.g. direct)
|
|
5099
|
+
*/
|
|
5100
|
+
connectivity: string;
|
|
5101
|
+
/**
|
|
5102
|
+
* Destination scope this forwarding rule applies to
|
|
5103
|
+
*/
|
|
5104
|
+
destinations: string;
|
|
5105
|
+
/**
|
|
5106
|
+
* Enable a basic forwarding rule
|
|
5107
|
+
*/
|
|
5108
|
+
enabled: boolean;
|
|
5109
|
+
/**
|
|
5110
|
+
* Basic forwarding rule name as an alphanumeric string [ 0-9a-zA-Z._ -]
|
|
5111
|
+
*/
|
|
5112
|
+
name: string;
|
|
5113
|
+
/**
|
|
5114
|
+
* User location scope this rule applies to
|
|
5115
|
+
*/
|
|
5116
|
+
userLocations: string;
|
|
5117
|
+
}
|
|
5118
|
+
export interface ForwardingProfileTypeZtnaAgent {
|
|
5119
|
+
/**
|
|
5120
|
+
* ZTNA block rule configuration
|
|
5121
|
+
*/
|
|
5122
|
+
blockRule?: outputs.ForwardingProfileTypeZtnaAgentBlockRule;
|
|
5123
|
+
/**
|
|
5124
|
+
* List of ZTNA agent-based forwarding rules
|
|
5125
|
+
*/
|
|
5126
|
+
forwardingRules?: outputs.ForwardingProfileTypeZtnaAgentForwardingRule[];
|
|
5127
|
+
/**
|
|
5128
|
+
* User uploaded PAC file for a ZTNA agent-based forwarding configuration
|
|
5129
|
+
*/
|
|
5130
|
+
pacUpload: boolean;
|
|
5131
|
+
}
|
|
5132
|
+
export interface ForwardingProfileTypeZtnaAgentBlockRule {
|
|
5133
|
+
/**
|
|
5134
|
+
* Allow ICMP for troubleshooting
|
|
5135
|
+
*/
|
|
5136
|
+
allowIcmpForTroubleshooting: boolean;
|
|
5137
|
+
/**
|
|
5138
|
+
* Block all other unmatched outbound connections
|
|
5139
|
+
*/
|
|
5140
|
+
blockAllOtherUnmatchedOutboundConnections: boolean;
|
|
5141
|
+
/**
|
|
5142
|
+
* Block inbound access when connected to tunnel
|
|
5143
|
+
*/
|
|
5144
|
+
blockInboundAccessWhenConnectedToTunnel: boolean;
|
|
5145
|
+
/**
|
|
5146
|
+
* Block Non-TCP Non UDP based traffic when connected to tunnel
|
|
5147
|
+
*/
|
|
5148
|
+
blockNonTcpNonUdpTrafficWhenConnectedToTunnel: boolean;
|
|
5149
|
+
/**
|
|
5150
|
+
* Block outbound LAN access when connected to tunnel
|
|
5151
|
+
*/
|
|
5152
|
+
blockOutboundLanAccessWhenConnectedToTunnel: boolean;
|
|
5153
|
+
/**
|
|
5154
|
+
* Enforce FQDN DNS resolution via tunnel DNS servers
|
|
5155
|
+
*/
|
|
5156
|
+
enforcerFqdnDnsResolutionViaDnsServers: boolean;
|
|
5157
|
+
/**
|
|
5158
|
+
* Resolve All FQDNs using DNS servers assigned by the tunnel (Windows Only)
|
|
5159
|
+
*/
|
|
5160
|
+
resolveAllFqdnsUsingDnsServersAssignedByTheTunnel: boolean;
|
|
5161
|
+
}
|
|
5162
|
+
export interface ForwardingProfileTypeZtnaAgentForwardingRule {
|
|
5163
|
+
/**
|
|
5164
|
+
* Connectivity method for this ZTNA forwarding rule (e.g. direct)
|
|
5165
|
+
*/
|
|
5166
|
+
connectivity: string;
|
|
5167
|
+
/**
|
|
5168
|
+
* Destination scope this ZTNA forwarding rule applies to
|
|
5169
|
+
*/
|
|
5170
|
+
destinations: string;
|
|
5171
|
+
/**
|
|
5172
|
+
* Enable a forwarding rule ztna
|
|
5173
|
+
*/
|
|
5174
|
+
enabled: boolean;
|
|
5175
|
+
/**
|
|
5176
|
+
* Forwarding rule ZTNA name as an alphanumeric string [ 0-9a-zA-Z._ -]
|
|
5177
|
+
*/
|
|
5178
|
+
name: string;
|
|
5179
|
+
/**
|
|
5180
|
+
* Source applications this ZTNA rule applies to
|
|
5181
|
+
*/
|
|
5182
|
+
sourceApplications: string;
|
|
5183
|
+
/**
|
|
5184
|
+
* Type of traffic this ZTNA rule applies to (dns, network, or both)
|
|
5185
|
+
*/
|
|
5186
|
+
trafficType: string;
|
|
5187
|
+
/**
|
|
5188
|
+
* User location scope this ZTNA rule applies to
|
|
5189
|
+
*/
|
|
5190
|
+
userLocations: string;
|
|
5191
|
+
}
|
|
5192
|
+
export interface ForwardingProfileUserLocationInternalHostDetection {
|
|
5193
|
+
/**
|
|
5194
|
+
* user location fqdn
|
|
5195
|
+
*/
|
|
5196
|
+
fqdn: string;
|
|
5197
|
+
/**
|
|
5198
|
+
* user location ip address
|
|
5199
|
+
*/
|
|
5200
|
+
ipAddress: string;
|
|
5201
|
+
}
|
|
4876
5202
|
export interface GeneralSettingGeneral {
|
|
4877
5203
|
/**
|
|
4878
5204
|
* Force admins to acknowledge login banner
|
|
@@ -13277,6 +13603,256 @@ export interface GetDecryptionRuleTypeSslInboundInspection {
|
|
|
13277
13603
|
*/
|
|
13278
13604
|
certificates: string[];
|
|
13279
13605
|
}
|
|
13606
|
+
export interface GetDeviceAvailableLicensess {
|
|
13607
|
+
/**
|
|
13608
|
+
* Authcode
|
|
13609
|
+
*/
|
|
13610
|
+
authcode: string;
|
|
13611
|
+
/**
|
|
13612
|
+
* Expires
|
|
13613
|
+
*/
|
|
13614
|
+
expires: string;
|
|
13615
|
+
/**
|
|
13616
|
+
* Feature
|
|
13617
|
+
*/
|
|
13618
|
+
feature: string;
|
|
13619
|
+
/**
|
|
13620
|
+
* Issued
|
|
13621
|
+
*/
|
|
13622
|
+
issued: string;
|
|
13623
|
+
}
|
|
13624
|
+
export interface GetDeviceInstalledLicense {
|
|
13625
|
+
/**
|
|
13626
|
+
* Authcode
|
|
13627
|
+
*/
|
|
13628
|
+
authcode: string;
|
|
13629
|
+
/**
|
|
13630
|
+
* Expired
|
|
13631
|
+
*/
|
|
13632
|
+
expired: string;
|
|
13633
|
+
/**
|
|
13634
|
+
* Expires
|
|
13635
|
+
*/
|
|
13636
|
+
expires: string;
|
|
13637
|
+
/**
|
|
13638
|
+
* Feature
|
|
13639
|
+
*/
|
|
13640
|
+
feature: string;
|
|
13641
|
+
/**
|
|
13642
|
+
* Issued
|
|
13643
|
+
*/
|
|
13644
|
+
issued: string;
|
|
13645
|
+
}
|
|
13646
|
+
export interface GetDeviceListData {
|
|
13647
|
+
/**
|
|
13648
|
+
* Anti virus version
|
|
13649
|
+
*/
|
|
13650
|
+
antiVirusVersion: string;
|
|
13651
|
+
/**
|
|
13652
|
+
* App release date
|
|
13653
|
+
*/
|
|
13654
|
+
appReleaseDate: string;
|
|
13655
|
+
/**
|
|
13656
|
+
* App version
|
|
13657
|
+
*/
|
|
13658
|
+
appVersion: string;
|
|
13659
|
+
/**
|
|
13660
|
+
* Av release date
|
|
13661
|
+
*/
|
|
13662
|
+
avReleaseDate: string;
|
|
13663
|
+
/**
|
|
13664
|
+
* Available licensess
|
|
13665
|
+
*/
|
|
13666
|
+
availableLicensesses: outputs.GetDeviceListDataAvailableLicensess[];
|
|
13667
|
+
/**
|
|
13668
|
+
* Connected since
|
|
13669
|
+
*/
|
|
13670
|
+
connectedSince: string;
|
|
13671
|
+
/**
|
|
13672
|
+
* The description of the device
|
|
13673
|
+
*/
|
|
13674
|
+
description: string;
|
|
13675
|
+
/**
|
|
13676
|
+
* Dev cert detail
|
|
13677
|
+
*/
|
|
13678
|
+
devCertDetail: string;
|
|
13679
|
+
/**
|
|
13680
|
+
* Dev cert expiry date
|
|
13681
|
+
*/
|
|
13682
|
+
devCertExpiryDate: string;
|
|
13683
|
+
/**
|
|
13684
|
+
* The display name of the device
|
|
13685
|
+
*/
|
|
13686
|
+
displayName: string;
|
|
13687
|
+
/**
|
|
13688
|
+
* The product family of the device
|
|
13689
|
+
*/
|
|
13690
|
+
family: string;
|
|
13691
|
+
/**
|
|
13692
|
+
* The folder containing the device
|
|
13693
|
+
*/
|
|
13694
|
+
folder: string;
|
|
13695
|
+
/**
|
|
13696
|
+
* Gp client verion
|
|
13697
|
+
*/
|
|
13698
|
+
gpClientVerion: string;
|
|
13699
|
+
/**
|
|
13700
|
+
* Gp data version
|
|
13701
|
+
*/
|
|
13702
|
+
gpDataVersion: string;
|
|
13703
|
+
/**
|
|
13704
|
+
* Ha peer serial
|
|
13705
|
+
*/
|
|
13706
|
+
haPeerSerial: string;
|
|
13707
|
+
/**
|
|
13708
|
+
* Ha peer state
|
|
13709
|
+
*/
|
|
13710
|
+
haPeerState: string;
|
|
13711
|
+
/**
|
|
13712
|
+
* Ha state
|
|
13713
|
+
*/
|
|
13714
|
+
haState: string;
|
|
13715
|
+
/**
|
|
13716
|
+
* The hostname of the device
|
|
13717
|
+
*/
|
|
13718
|
+
hostname: string;
|
|
13719
|
+
/**
|
|
13720
|
+
* The UUID of the device
|
|
13721
|
+
*/
|
|
13722
|
+
id: string;
|
|
13723
|
+
/**
|
|
13724
|
+
* Installed licenses
|
|
13725
|
+
*/
|
|
13726
|
+
installedLicenses: outputs.GetDeviceListDataInstalledLicense[];
|
|
13727
|
+
/**
|
|
13728
|
+
* Iot release date
|
|
13729
|
+
*/
|
|
13730
|
+
iotReleaseDate: string;
|
|
13731
|
+
/**
|
|
13732
|
+
* Iot version
|
|
13733
|
+
*/
|
|
13734
|
+
iotVersion: string;
|
|
13735
|
+
/**
|
|
13736
|
+
* The IPv4 address of the device
|
|
13737
|
+
*/
|
|
13738
|
+
ipAddress: string;
|
|
13739
|
+
/**
|
|
13740
|
+
* Ip v6 address
|
|
13741
|
+
*/
|
|
13742
|
+
ipV6Address: string;
|
|
13743
|
+
/**
|
|
13744
|
+
* Is connected
|
|
13745
|
+
*/
|
|
13746
|
+
isConnected: boolean;
|
|
13747
|
+
/**
|
|
13748
|
+
* Labels assigned to the device
|
|
13749
|
+
*/
|
|
13750
|
+
labels: string[];
|
|
13751
|
+
/**
|
|
13752
|
+
* License match
|
|
13753
|
+
*/
|
|
13754
|
+
licenseMatch: boolean;
|
|
13755
|
+
/**
|
|
13756
|
+
* Log db version
|
|
13757
|
+
*/
|
|
13758
|
+
logDbVersion: string;
|
|
13759
|
+
/**
|
|
13760
|
+
* The MAC address of the device
|
|
13761
|
+
*/
|
|
13762
|
+
macAddress: string;
|
|
13763
|
+
/**
|
|
13764
|
+
* The model of the device
|
|
13765
|
+
*/
|
|
13766
|
+
model: string;
|
|
13767
|
+
/**
|
|
13768
|
+
* The name of the device
|
|
13769
|
+
*/
|
|
13770
|
+
name: string;
|
|
13771
|
+
/**
|
|
13772
|
+
* Snippets associated with the device
|
|
13773
|
+
*/
|
|
13774
|
+
snippets: string[];
|
|
13775
|
+
/**
|
|
13776
|
+
* Software version
|
|
13777
|
+
*/
|
|
13778
|
+
softwareVersion: string;
|
|
13779
|
+
/**
|
|
13780
|
+
* The Terraform ID.
|
|
13781
|
+
*/
|
|
13782
|
+
tfid: string;
|
|
13783
|
+
/**
|
|
13784
|
+
* Threat release date
|
|
13785
|
+
*/
|
|
13786
|
+
threatReleaseDate: string;
|
|
13787
|
+
/**
|
|
13788
|
+
* Threat version
|
|
13789
|
+
*/
|
|
13790
|
+
threatVersion: string;
|
|
13791
|
+
/**
|
|
13792
|
+
* Uptime
|
|
13793
|
+
*/
|
|
13794
|
+
uptime: string;
|
|
13795
|
+
/**
|
|
13796
|
+
* Url db type
|
|
13797
|
+
*/
|
|
13798
|
+
urlDbType: string;
|
|
13799
|
+
/**
|
|
13800
|
+
* Url db ver
|
|
13801
|
+
*/
|
|
13802
|
+
urlDbVer: string;
|
|
13803
|
+
/**
|
|
13804
|
+
* Vm state
|
|
13805
|
+
*/
|
|
13806
|
+
vmState: string;
|
|
13807
|
+
/**
|
|
13808
|
+
* Wf release date
|
|
13809
|
+
*/
|
|
13810
|
+
wfReleaseDate: string;
|
|
13811
|
+
/**
|
|
13812
|
+
* Wf ver
|
|
13813
|
+
*/
|
|
13814
|
+
wfVer: string;
|
|
13815
|
+
}
|
|
13816
|
+
export interface GetDeviceListDataAvailableLicensess {
|
|
13817
|
+
/**
|
|
13818
|
+
* Authcode
|
|
13819
|
+
*/
|
|
13820
|
+
authcode: string;
|
|
13821
|
+
/**
|
|
13822
|
+
* Expires
|
|
13823
|
+
*/
|
|
13824
|
+
expires: string;
|
|
13825
|
+
/**
|
|
13826
|
+
* Feature
|
|
13827
|
+
*/
|
|
13828
|
+
feature: string;
|
|
13829
|
+
/**
|
|
13830
|
+
* Issued
|
|
13831
|
+
*/
|
|
13832
|
+
issued: string;
|
|
13833
|
+
}
|
|
13834
|
+
export interface GetDeviceListDataInstalledLicense {
|
|
13835
|
+
/**
|
|
13836
|
+
* Authcode
|
|
13837
|
+
*/
|
|
13838
|
+
authcode: string;
|
|
13839
|
+
/**
|
|
13840
|
+
* Expired
|
|
13841
|
+
*/
|
|
13842
|
+
expired: string;
|
|
13843
|
+
/**
|
|
13844
|
+
* Expires
|
|
13845
|
+
*/
|
|
13846
|
+
expires: string;
|
|
13847
|
+
/**
|
|
13848
|
+
* Feature
|
|
13849
|
+
*/
|
|
13850
|
+
feature: string;
|
|
13851
|
+
/**
|
|
13852
|
+
* Issued
|
|
13853
|
+
*/
|
|
13854
|
+
issued: string;
|
|
13855
|
+
}
|
|
13280
13856
|
export interface GetDeviceRedistributionCollectorListData {
|
|
13281
13857
|
/**
|
|
13282
13858
|
* The device in which the resource is defined
|
|
@@ -16715,6 +17291,824 @@ export interface GetFolderListData {
|
|
|
16715
17291
|
*/
|
|
16716
17292
|
tfid: string;
|
|
16717
17293
|
}
|
|
17294
|
+
export interface GetForwardingProfileDestinationFqdn {
|
|
17295
|
+
/**
|
|
17296
|
+
* alphanumeric string [*0-9a-zA-Z._-] and at most one $ by the end
|
|
17297
|
+
*/
|
|
17298
|
+
name: string;
|
|
17299
|
+
/**
|
|
17300
|
+
* Port number for fqdn based destination
|
|
17301
|
+
*/
|
|
17302
|
+
port: number;
|
|
17303
|
+
}
|
|
17304
|
+
export interface GetForwardingProfileDestinationIpAddress {
|
|
17305
|
+
/**
|
|
17306
|
+
* IP address with wildcards and CIDR notation support
|
|
17307
|
+
*/
|
|
17308
|
+
name: string;
|
|
17309
|
+
/**
|
|
17310
|
+
* Port number for IP address based destination
|
|
17311
|
+
*/
|
|
17312
|
+
port: number;
|
|
17313
|
+
}
|
|
17314
|
+
export interface GetForwardingProfileDestinationListData {
|
|
17315
|
+
/**
|
|
17316
|
+
* description of the destination
|
|
17317
|
+
*/
|
|
17318
|
+
description: string;
|
|
17319
|
+
/**
|
|
17320
|
+
* The folder in which the resource is defined
|
|
17321
|
+
*/
|
|
17322
|
+
folder: string;
|
|
17323
|
+
/**
|
|
17324
|
+
* List of FQDN based destination entries
|
|
17325
|
+
*/
|
|
17326
|
+
fqdns: outputs.GetForwardingProfileDestinationListDataFqdn[];
|
|
17327
|
+
/**
|
|
17328
|
+
* The UUID of the destination
|
|
17329
|
+
*/
|
|
17330
|
+
id: string;
|
|
17331
|
+
/**
|
|
17332
|
+
* List of IP address based destination entries
|
|
17333
|
+
*/
|
|
17334
|
+
ipAddresses: outputs.GetForwardingProfileDestinationListDataIpAddress[];
|
|
17335
|
+
/**
|
|
17336
|
+
* alphanumeric string [ 0-9a-zA-Z._ -]
|
|
17337
|
+
*/
|
|
17338
|
+
name: string;
|
|
17339
|
+
/**
|
|
17340
|
+
* The Terraform ID.
|
|
17341
|
+
*/
|
|
17342
|
+
tfid: string;
|
|
17343
|
+
}
|
|
17344
|
+
export interface GetForwardingProfileDestinationListDataFqdn {
|
|
17345
|
+
/**
|
|
17346
|
+
* alphanumeric string [*0-9a-zA-Z._-] and at most one $ by the end
|
|
17347
|
+
*/
|
|
17348
|
+
name: string;
|
|
17349
|
+
/**
|
|
17350
|
+
* Port number for fqdn based destination
|
|
17351
|
+
*/
|
|
17352
|
+
port: number;
|
|
17353
|
+
}
|
|
17354
|
+
export interface GetForwardingProfileDestinationListDataIpAddress {
|
|
17355
|
+
/**
|
|
17356
|
+
* IP address with wildcards and CIDR notation support
|
|
17357
|
+
*/
|
|
17358
|
+
name: string;
|
|
17359
|
+
/**
|
|
17360
|
+
* Port number for IP address based destination
|
|
17361
|
+
*/
|
|
17362
|
+
port: number;
|
|
17363
|
+
}
|
|
17364
|
+
export interface GetForwardingProfileListData {
|
|
17365
|
+
/**
|
|
17366
|
+
* Enable forwarding rule for forwarding profile
|
|
17367
|
+
*/
|
|
17368
|
+
definitionMethod: string;
|
|
17369
|
+
/**
|
|
17370
|
+
* Forwarding profile description
|
|
17371
|
+
*/
|
|
17372
|
+
description: string;
|
|
17373
|
+
/**
|
|
17374
|
+
* The folder in which the resource is defined
|
|
17375
|
+
*/
|
|
17376
|
+
folder: string;
|
|
17377
|
+
/**
|
|
17378
|
+
* The UUID of the forwarding profile
|
|
17379
|
+
*/
|
|
17380
|
+
id: string;
|
|
17381
|
+
/**
|
|
17382
|
+
* forwarding profile name as an alphanumeric string [ 0-9a-zA-Z._ -]
|
|
17383
|
+
*/
|
|
17384
|
+
name: string;
|
|
17385
|
+
/**
|
|
17386
|
+
* The Terraform ID.
|
|
17387
|
+
*/
|
|
17388
|
+
tfid: string;
|
|
17389
|
+
/**
|
|
17390
|
+
* Forwarding profile type configuration (PAC file, GlobalProtect proxy, or ZTNA agent)
|
|
17391
|
+
*/
|
|
17392
|
+
type: outputs.GetForwardingProfileListDataType;
|
|
17393
|
+
}
|
|
17394
|
+
export interface GetForwardingProfileListDataType {
|
|
17395
|
+
/**
|
|
17396
|
+
* Global Protect proxy-based forwarding configuration
|
|
17397
|
+
*/
|
|
17398
|
+
globalProtectProxy: outputs.GetForwardingProfileListDataTypeGlobalProtectProxy;
|
|
17399
|
+
/**
|
|
17400
|
+
* PAC file based forwarding configuration
|
|
17401
|
+
*
|
|
17402
|
+
* > ℹ️ **Note:** You must specify exactly one of `globalProtectProxy`, `pacFile`, and `ztnaAgent`.
|
|
17403
|
+
*/
|
|
17404
|
+
pacFile: outputs.GetForwardingProfileListDataTypePacFile;
|
|
17405
|
+
/**
|
|
17406
|
+
* ZTNA agent-based forwarding configuration
|
|
17407
|
+
*
|
|
17408
|
+
* > ℹ️ **Note:** You must specify exactly one of `globalProtectProxy`, `pacFile`, and `ztnaAgent`.
|
|
17409
|
+
*/
|
|
17410
|
+
ztnaAgent: outputs.GetForwardingProfileListDataTypeZtnaAgent;
|
|
17411
|
+
}
|
|
17412
|
+
export interface GetForwardingProfileListDataTypeGlobalProtectProxy {
|
|
17413
|
+
/**
|
|
17414
|
+
* Basic block rule configuration for PAC file and GlobalProtect proxy profiles
|
|
17415
|
+
*/
|
|
17416
|
+
blockRule: outputs.GetForwardingProfileListDataTypeGlobalProtectProxyBlockRule;
|
|
17417
|
+
/**
|
|
17418
|
+
* List of GlobalProtect proxy-based forwarding rules
|
|
17419
|
+
*/
|
|
17420
|
+
forwardingRules: outputs.GetForwardingProfileListDataTypeGlobalProtectProxyForwardingRule[];
|
|
17421
|
+
/**
|
|
17422
|
+
* User uploaded PAC file for Global Protect proxy-based forwarding configuration
|
|
17423
|
+
*/
|
|
17424
|
+
pacUpload: boolean;
|
|
17425
|
+
}
|
|
17426
|
+
export interface GetForwardingProfileListDataTypeGlobalProtectProxyBlockRule {
|
|
17427
|
+
/**
|
|
17428
|
+
* TCP traffic allowlist configuration
|
|
17429
|
+
*/
|
|
17430
|
+
allowTcp: outputs.GetForwardingProfileListDataTypeGlobalProtectProxyBlockRuleAllowTcp;
|
|
17431
|
+
/**
|
|
17432
|
+
* UDP traffic allowlist configuration with location and destination support
|
|
17433
|
+
*/
|
|
17434
|
+
allowUdp: outputs.GetForwardingProfileListDataTypeGlobalProtectProxyBlockRuleAllowUdp;
|
|
17435
|
+
/**
|
|
17436
|
+
* Enable block rule
|
|
17437
|
+
*/
|
|
17438
|
+
enable: boolean;
|
|
17439
|
+
}
|
|
17440
|
+
export interface GetForwardingProfileListDataTypeGlobalProtectProxyBlockRuleAllowTcp {
|
|
17441
|
+
/**
|
|
17442
|
+
* Enable locations for allow-tcp
|
|
17443
|
+
*/
|
|
17444
|
+
enableLocations: boolean;
|
|
17445
|
+
/**
|
|
17446
|
+
* List of user locations allowed for TCP traffic
|
|
17447
|
+
*/
|
|
17448
|
+
locations: string[];
|
|
17449
|
+
}
|
|
17450
|
+
export interface GetForwardingProfileListDataTypeGlobalProtectProxyBlockRuleAllowUdp {
|
|
17451
|
+
/**
|
|
17452
|
+
* Destination addresses or networks allowed for UDP traffic
|
|
17453
|
+
*/
|
|
17454
|
+
destinations: string;
|
|
17455
|
+
/**
|
|
17456
|
+
* Enable destinations for allow-udp
|
|
17457
|
+
*/
|
|
17458
|
+
enableDestinations: boolean;
|
|
17459
|
+
/**
|
|
17460
|
+
* Enable locations for allow-udp
|
|
17461
|
+
*/
|
|
17462
|
+
enableLocations: boolean;
|
|
17463
|
+
/**
|
|
17464
|
+
* List of user locations allowed for UDP traffic
|
|
17465
|
+
*/
|
|
17466
|
+
locations: string[];
|
|
17467
|
+
}
|
|
17468
|
+
export interface GetForwardingProfileListDataTypeGlobalProtectProxyForwardingRule {
|
|
17469
|
+
/**
|
|
17470
|
+
* Connectivity method for this forwarding rule (e.g. direct)
|
|
17471
|
+
*/
|
|
17472
|
+
connectivity: string;
|
|
17473
|
+
/**
|
|
17474
|
+
* Destination scope this forwarding rule applies to
|
|
17475
|
+
*/
|
|
17476
|
+
destinations: string;
|
|
17477
|
+
/**
|
|
17478
|
+
* Enable a basic forwarding rule
|
|
17479
|
+
*/
|
|
17480
|
+
enabled: boolean;
|
|
17481
|
+
/**
|
|
17482
|
+
* Basic forwarding rule name as an alphanumeric string [ 0-9a-zA-Z._ -]
|
|
17483
|
+
*/
|
|
17484
|
+
name: string;
|
|
17485
|
+
/**
|
|
17486
|
+
* User location scope this rule applies to
|
|
17487
|
+
*/
|
|
17488
|
+
userLocations: string;
|
|
17489
|
+
}
|
|
17490
|
+
export interface GetForwardingProfileListDataTypePacFile {
|
|
17491
|
+
/**
|
|
17492
|
+
* Basic block rule configuration for PAC file and GlobalProtect proxy profiles
|
|
17493
|
+
*/
|
|
17494
|
+
blockRule: outputs.GetForwardingProfileListDataTypePacFileBlockRule;
|
|
17495
|
+
/**
|
|
17496
|
+
* List of PAC file-based forwarding rules
|
|
17497
|
+
*/
|
|
17498
|
+
forwardingRules: outputs.GetForwardingProfileListDataTypePacFileForwardingRule[];
|
|
17499
|
+
/**
|
|
17500
|
+
* User upload PAC file for PAC file based forwarding configuration
|
|
17501
|
+
*/
|
|
17502
|
+
pacUpload: boolean;
|
|
17503
|
+
}
|
|
17504
|
+
export interface GetForwardingProfileListDataTypePacFileBlockRule {
|
|
17505
|
+
/**
|
|
17506
|
+
* TCP traffic allowlist configuration
|
|
17507
|
+
*/
|
|
17508
|
+
allowTcp: outputs.GetForwardingProfileListDataTypePacFileBlockRuleAllowTcp;
|
|
17509
|
+
/**
|
|
17510
|
+
* UDP traffic allowlist configuration with location and destination support
|
|
17511
|
+
*/
|
|
17512
|
+
allowUdp: outputs.GetForwardingProfileListDataTypePacFileBlockRuleAllowUdp;
|
|
17513
|
+
/**
|
|
17514
|
+
* Enable block rule
|
|
17515
|
+
*/
|
|
17516
|
+
enable: boolean;
|
|
17517
|
+
}
|
|
17518
|
+
export interface GetForwardingProfileListDataTypePacFileBlockRuleAllowTcp {
|
|
17519
|
+
/**
|
|
17520
|
+
* Enable locations for allow-tcp
|
|
17521
|
+
*/
|
|
17522
|
+
enableLocations: boolean;
|
|
17523
|
+
/**
|
|
17524
|
+
* List of user locations allowed for TCP traffic
|
|
17525
|
+
*/
|
|
17526
|
+
locations: string[];
|
|
17527
|
+
}
|
|
17528
|
+
export interface GetForwardingProfileListDataTypePacFileBlockRuleAllowUdp {
|
|
17529
|
+
/**
|
|
17530
|
+
* Destination addresses or networks allowed for UDP traffic
|
|
17531
|
+
*/
|
|
17532
|
+
destinations: string;
|
|
17533
|
+
/**
|
|
17534
|
+
* Enable destinations for allow-udp
|
|
17535
|
+
*/
|
|
17536
|
+
enableDestinations: boolean;
|
|
17537
|
+
/**
|
|
17538
|
+
* Enable locations for allow-udp
|
|
17539
|
+
*/
|
|
17540
|
+
enableLocations: boolean;
|
|
17541
|
+
/**
|
|
17542
|
+
* List of user locations allowed for UDP traffic
|
|
17543
|
+
*/
|
|
17544
|
+
locations: string[];
|
|
17545
|
+
}
|
|
17546
|
+
export interface GetForwardingProfileListDataTypePacFileForwardingRule {
|
|
17547
|
+
/**
|
|
17548
|
+
* Connectivity method for this forwarding rule (e.g. direct)
|
|
17549
|
+
*/
|
|
17550
|
+
connectivity: string;
|
|
17551
|
+
/**
|
|
17552
|
+
* Destination scope this forwarding rule applies to
|
|
17553
|
+
*/
|
|
17554
|
+
destinations: string;
|
|
17555
|
+
/**
|
|
17556
|
+
* Enable a basic forwarding rule
|
|
17557
|
+
*/
|
|
17558
|
+
enabled: boolean;
|
|
17559
|
+
/**
|
|
17560
|
+
* Basic forwarding rule name as an alphanumeric string [ 0-9a-zA-Z._ -]
|
|
17561
|
+
*/
|
|
17562
|
+
name: string;
|
|
17563
|
+
/**
|
|
17564
|
+
* User location scope this rule applies to
|
|
17565
|
+
*/
|
|
17566
|
+
userLocations: string;
|
|
17567
|
+
}
|
|
17568
|
+
export interface GetForwardingProfileListDataTypeZtnaAgent {
|
|
17569
|
+
/**
|
|
17570
|
+
* ZTNA block rule configuration
|
|
17571
|
+
*/
|
|
17572
|
+
blockRule: outputs.GetForwardingProfileListDataTypeZtnaAgentBlockRule;
|
|
17573
|
+
/**
|
|
17574
|
+
* List of ZTNA agent-based forwarding rules
|
|
17575
|
+
*/
|
|
17576
|
+
forwardingRules: outputs.GetForwardingProfileListDataTypeZtnaAgentForwardingRule[];
|
|
17577
|
+
/**
|
|
17578
|
+
* User uploaded PAC file for a ZTNA agent-based forwarding configuration
|
|
17579
|
+
*/
|
|
17580
|
+
pacUpload: boolean;
|
|
17581
|
+
}
|
|
17582
|
+
export interface GetForwardingProfileListDataTypeZtnaAgentBlockRule {
|
|
17583
|
+
/**
|
|
17584
|
+
* Allow ICMP for troubleshooting
|
|
17585
|
+
*/
|
|
17586
|
+
allowIcmpForTroubleshooting: boolean;
|
|
17587
|
+
/**
|
|
17588
|
+
* Block all other unmatched outbound connections
|
|
17589
|
+
*/
|
|
17590
|
+
blockAllOtherUnmatchedOutboundConnections: boolean;
|
|
17591
|
+
/**
|
|
17592
|
+
* Block inbound access when connected to tunnel
|
|
17593
|
+
*/
|
|
17594
|
+
blockInboundAccessWhenConnectedToTunnel: boolean;
|
|
17595
|
+
/**
|
|
17596
|
+
* Block Non-TCP Non UDP based traffic when connected to tunnel
|
|
17597
|
+
*/
|
|
17598
|
+
blockNonTcpNonUdpTrafficWhenConnectedToTunnel: boolean;
|
|
17599
|
+
/**
|
|
17600
|
+
* Block outbound LAN access when connected to tunnel
|
|
17601
|
+
*/
|
|
17602
|
+
blockOutboundLanAccessWhenConnectedToTunnel: boolean;
|
|
17603
|
+
/**
|
|
17604
|
+
* Enforce FQDN DNS resolution via tunnel DNS servers
|
|
17605
|
+
*/
|
|
17606
|
+
enforcerFqdnDnsResolutionViaDnsServers: boolean;
|
|
17607
|
+
/**
|
|
17608
|
+
* Resolve All FQDNs using DNS servers assigned by the tunnel (Windows Only)
|
|
17609
|
+
*/
|
|
17610
|
+
resolveAllFqdnsUsingDnsServersAssignedByTheTunnel: boolean;
|
|
17611
|
+
}
|
|
17612
|
+
export interface GetForwardingProfileListDataTypeZtnaAgentForwardingRule {
|
|
17613
|
+
/**
|
|
17614
|
+
* Connectivity method for this ZTNA forwarding rule (e.g. direct)
|
|
17615
|
+
*/
|
|
17616
|
+
connectivity: string;
|
|
17617
|
+
/**
|
|
17618
|
+
* Destination scope this ZTNA forwarding rule applies to
|
|
17619
|
+
*/
|
|
17620
|
+
destinations: string;
|
|
17621
|
+
/**
|
|
17622
|
+
* Enable a forwarding rule ztna
|
|
17623
|
+
*/
|
|
17624
|
+
enabled: boolean;
|
|
17625
|
+
/**
|
|
17626
|
+
* Forwarding rule ZTNA name as an alphanumeric string [ 0-9a-zA-Z._ -]
|
|
17627
|
+
*/
|
|
17628
|
+
name: string;
|
|
17629
|
+
/**
|
|
17630
|
+
* Source applications this ZTNA rule applies to
|
|
17631
|
+
*/
|
|
17632
|
+
sourceApplications: string;
|
|
17633
|
+
/**
|
|
17634
|
+
* Type of traffic this ZTNA rule applies to (dns, network, or both)
|
|
17635
|
+
*/
|
|
17636
|
+
trafficType: string;
|
|
17637
|
+
/**
|
|
17638
|
+
* User location scope this ZTNA rule applies to
|
|
17639
|
+
*/
|
|
17640
|
+
userLocations: string;
|
|
17641
|
+
}
|
|
17642
|
+
export interface GetForwardingProfileRegionalAndCustomProxyConnectivityPreference {
|
|
17643
|
+
/**
|
|
17644
|
+
* Indicates whether this connectivity method is enabled for use in the proxy configuration
|
|
17645
|
+
*/
|
|
17646
|
+
enabled: boolean;
|
|
17647
|
+
/**
|
|
17648
|
+
* Connectivity method type - 'tunnel' for VPN tunnels, 'proxy' for HTTP/HTTPS proxies, 'adns' for authenticated DNS, 'masque' for MASQUE protocol
|
|
17649
|
+
*/
|
|
17650
|
+
name: string;
|
|
17651
|
+
}
|
|
17652
|
+
export interface GetForwardingProfileRegionalAndCustomProxyListData {
|
|
17653
|
+
/**
|
|
17654
|
+
* List of connectivity methods and their enablement status for establishing proxy connections
|
|
17655
|
+
*/
|
|
17656
|
+
connectivityPreferences: outputs.GetForwardingProfileRegionalAndCustomProxyListDataConnectivityPreference[];
|
|
17657
|
+
/**
|
|
17658
|
+
* regional and custom proxy configuration description
|
|
17659
|
+
*/
|
|
17660
|
+
description: string;
|
|
17661
|
+
/**
|
|
17662
|
+
* Behavior when proxy connection fails - 'fail-open' allows direct internet access, 'fail-safe' blocks traffic until proxy is restored
|
|
17663
|
+
*/
|
|
17664
|
+
fallbackOption: string;
|
|
17665
|
+
/**
|
|
17666
|
+
* The folder in which the resource is defined
|
|
17667
|
+
*/
|
|
17668
|
+
folder: string;
|
|
17669
|
+
/**
|
|
17670
|
+
* The UUID of the regional and custom proxy
|
|
17671
|
+
*/
|
|
17672
|
+
id: string;
|
|
17673
|
+
/**
|
|
17674
|
+
* Strategy for selecting Prisma Access location - 'best-available-pa-location' automatically selects optimal location, 'specific-pa-location' uses predefined locations
|
|
17675
|
+
*/
|
|
17676
|
+
locationPreference: string;
|
|
17677
|
+
/**
|
|
17678
|
+
* alphanumeric string [ 0-9a-zA-Z ._-]
|
|
17679
|
+
*/
|
|
17680
|
+
name: string;
|
|
17681
|
+
/**
|
|
17682
|
+
* Select Prisma Access location Americas, Europe and Asia-Pacific.
|
|
17683
|
+
*/
|
|
17684
|
+
prismaAccessLocations: outputs.GetForwardingProfileRegionalAndCustomProxyListDataPrismaAccessLocation[];
|
|
17685
|
+
/**
|
|
17686
|
+
* primary regional and custom proxy
|
|
17687
|
+
*/
|
|
17688
|
+
proxy1: outputs.GetForwardingProfileRegionalAndCustomProxyListDataProxy1;
|
|
17689
|
+
/**
|
|
17690
|
+
* secondary regional and custom proxy
|
|
17691
|
+
*/
|
|
17692
|
+
proxy2: outputs.GetForwardingProfileRegionalAndCustomProxyListDataProxy2;
|
|
17693
|
+
/**
|
|
17694
|
+
* The Terraform ID.
|
|
17695
|
+
*/
|
|
17696
|
+
tfid: string;
|
|
17697
|
+
/**
|
|
17698
|
+
* Proxy configuration type - 'gp-and-pac' for GlobalProtect and PAC file forwarding, 'ztna-agent' for ZTNA agent forwarding
|
|
17699
|
+
*/
|
|
17700
|
+
type: string;
|
|
17701
|
+
}
|
|
17702
|
+
export interface GetForwardingProfileRegionalAndCustomProxyListDataConnectivityPreference {
|
|
17703
|
+
/**
|
|
17704
|
+
* Indicates whether this connectivity method is enabled for use in the proxy configuration
|
|
17705
|
+
*/
|
|
17706
|
+
enabled: boolean;
|
|
17707
|
+
/**
|
|
17708
|
+
* Connectivity method type - 'tunnel' for VPN tunnels, 'proxy' for HTTP/HTTPS proxies, 'adns' for authenticated DNS, 'masque' for MASQUE protocol
|
|
17709
|
+
*/
|
|
17710
|
+
name: string;
|
|
17711
|
+
}
|
|
17712
|
+
export interface GetForwardingProfileRegionalAndCustomProxyListDataPrismaAccessLocation {
|
|
17713
|
+
/**
|
|
17714
|
+
* Add list of locations separated by space, in that region
|
|
17715
|
+
*/
|
|
17716
|
+
locations: string[];
|
|
17717
|
+
/**
|
|
17718
|
+
* One of the region from 'americas', 'europe', 'apac'
|
|
17719
|
+
*/
|
|
17720
|
+
name: string;
|
|
17721
|
+
}
|
|
17722
|
+
export interface GetForwardingProfileRegionalAndCustomProxyListDataProxy1 {
|
|
17723
|
+
/**
|
|
17724
|
+
* fqdn of the primary proxy server (supports wildcards and alphanumeric characters with dots, hyphens, and underscores)
|
|
17725
|
+
*/
|
|
17726
|
+
fqdn: string;
|
|
17727
|
+
/**
|
|
17728
|
+
* Geographic or network location identifier for the primary proxy server
|
|
17729
|
+
*/
|
|
17730
|
+
location: string;
|
|
17731
|
+
/**
|
|
17732
|
+
* port number for primary proxy
|
|
17733
|
+
*/
|
|
17734
|
+
port: number;
|
|
17735
|
+
}
|
|
17736
|
+
export interface GetForwardingProfileRegionalAndCustomProxyListDataProxy2 {
|
|
17737
|
+
/**
|
|
17738
|
+
* Fqdn of the secondary (backup) proxy server used for failover scenarios
|
|
17739
|
+
*/
|
|
17740
|
+
fqdn: string;
|
|
17741
|
+
/**
|
|
17742
|
+
* Geographic or network location identifier for the secondary proxy server
|
|
17743
|
+
*/
|
|
17744
|
+
location: string;
|
|
17745
|
+
/**
|
|
17746
|
+
* port number for secondary proxy
|
|
17747
|
+
*/
|
|
17748
|
+
port: number;
|
|
17749
|
+
}
|
|
17750
|
+
export interface GetForwardingProfileRegionalAndCustomProxyPrismaAccessLocation {
|
|
17751
|
+
/**
|
|
17752
|
+
* Add list of locations separated by space, in that region
|
|
17753
|
+
*/
|
|
17754
|
+
locations: string[];
|
|
17755
|
+
/**
|
|
17756
|
+
* One of the region from 'americas', 'europe', 'apac'
|
|
17757
|
+
*/
|
|
17758
|
+
name: string;
|
|
17759
|
+
}
|
|
17760
|
+
export interface GetForwardingProfileRegionalAndCustomProxyProxy1 {
|
|
17761
|
+
/**
|
|
17762
|
+
* fqdn of the primary proxy server (supports wildcards and alphanumeric characters with dots, hyphens, and underscores)
|
|
17763
|
+
*/
|
|
17764
|
+
fqdn: string;
|
|
17765
|
+
/**
|
|
17766
|
+
* Geographic or network location identifier for the primary proxy server
|
|
17767
|
+
*/
|
|
17768
|
+
location: string;
|
|
17769
|
+
/**
|
|
17770
|
+
* port number for primary proxy
|
|
17771
|
+
*/
|
|
17772
|
+
port: number;
|
|
17773
|
+
}
|
|
17774
|
+
export interface GetForwardingProfileRegionalAndCustomProxyProxy2 {
|
|
17775
|
+
/**
|
|
17776
|
+
* Fqdn of the secondary (backup) proxy server used for failover scenarios
|
|
17777
|
+
*/
|
|
17778
|
+
fqdn: string;
|
|
17779
|
+
/**
|
|
17780
|
+
* Geographic or network location identifier for the secondary proxy server
|
|
17781
|
+
*/
|
|
17782
|
+
location: string;
|
|
17783
|
+
/**
|
|
17784
|
+
* port number for secondary proxy
|
|
17785
|
+
*/
|
|
17786
|
+
port: number;
|
|
17787
|
+
}
|
|
17788
|
+
export interface GetForwardingProfileSourceApplicationListData {
|
|
17789
|
+
/**
|
|
17790
|
+
* List of application names to be included in this source application profile
|
|
17791
|
+
*/
|
|
17792
|
+
applications: string[];
|
|
17793
|
+
/**
|
|
17794
|
+
* fowarding profile source application description
|
|
17795
|
+
*/
|
|
17796
|
+
description: string;
|
|
17797
|
+
/**
|
|
17798
|
+
* The folder in which the resource is defined
|
|
17799
|
+
*/
|
|
17800
|
+
folder: string;
|
|
17801
|
+
/**
|
|
17802
|
+
* The id of the source application
|
|
17803
|
+
*/
|
|
17804
|
+
id: string;
|
|
17805
|
+
/**
|
|
17806
|
+
* The unique name identifying the source application. Must be alphanumeric with allowed characters [0-9a-zA-Z._-]
|
|
17807
|
+
*/
|
|
17808
|
+
name: string;
|
|
17809
|
+
/**
|
|
17810
|
+
* The Terraform ID.
|
|
17811
|
+
*/
|
|
17812
|
+
tfid: string;
|
|
17813
|
+
}
|
|
17814
|
+
export interface GetForwardingProfileType {
|
|
17815
|
+
/**
|
|
17816
|
+
* Global Protect proxy-based forwarding configuration
|
|
17817
|
+
*/
|
|
17818
|
+
globalProtectProxy: outputs.GetForwardingProfileTypeGlobalProtectProxy;
|
|
17819
|
+
/**
|
|
17820
|
+
* PAC file based forwarding configuration
|
|
17821
|
+
*
|
|
17822
|
+
* > ℹ️ **Note:** You must specify exactly one of `globalProtectProxy`, `pacFile`, and `ztnaAgent`.
|
|
17823
|
+
*/
|
|
17824
|
+
pacFile: outputs.GetForwardingProfileTypePacFile;
|
|
17825
|
+
/**
|
|
17826
|
+
* ZTNA agent-based forwarding configuration
|
|
17827
|
+
*
|
|
17828
|
+
* > ℹ️ **Note:** You must specify exactly one of `globalProtectProxy`, `pacFile`, and `ztnaAgent`.
|
|
17829
|
+
*/
|
|
17830
|
+
ztnaAgent: outputs.GetForwardingProfileTypeZtnaAgent;
|
|
17831
|
+
}
|
|
17832
|
+
export interface GetForwardingProfileTypeGlobalProtectProxy {
|
|
17833
|
+
/**
|
|
17834
|
+
* Basic block rule configuration for PAC file and GlobalProtect proxy profiles
|
|
17835
|
+
*/
|
|
17836
|
+
blockRule: outputs.GetForwardingProfileTypeGlobalProtectProxyBlockRule;
|
|
17837
|
+
/**
|
|
17838
|
+
* List of GlobalProtect proxy-based forwarding rules
|
|
17839
|
+
*/
|
|
17840
|
+
forwardingRules: outputs.GetForwardingProfileTypeGlobalProtectProxyForwardingRule[];
|
|
17841
|
+
/**
|
|
17842
|
+
* User uploaded PAC file for Global Protect proxy-based forwarding configuration
|
|
17843
|
+
*/
|
|
17844
|
+
pacUpload: boolean;
|
|
17845
|
+
}
|
|
17846
|
+
export interface GetForwardingProfileTypeGlobalProtectProxyBlockRule {
|
|
17847
|
+
/**
|
|
17848
|
+
* TCP traffic allowlist configuration
|
|
17849
|
+
*/
|
|
17850
|
+
allowTcp: outputs.GetForwardingProfileTypeGlobalProtectProxyBlockRuleAllowTcp;
|
|
17851
|
+
/**
|
|
17852
|
+
* UDP traffic allowlist configuration with location and destination support
|
|
17853
|
+
*/
|
|
17854
|
+
allowUdp: outputs.GetForwardingProfileTypeGlobalProtectProxyBlockRuleAllowUdp;
|
|
17855
|
+
/**
|
|
17856
|
+
* Enable block rule
|
|
17857
|
+
*/
|
|
17858
|
+
enable: boolean;
|
|
17859
|
+
}
|
|
17860
|
+
export interface GetForwardingProfileTypeGlobalProtectProxyBlockRuleAllowTcp {
|
|
17861
|
+
/**
|
|
17862
|
+
* Enable locations for allow-tcp
|
|
17863
|
+
*/
|
|
17864
|
+
enableLocations: boolean;
|
|
17865
|
+
/**
|
|
17866
|
+
* List of user locations allowed for TCP traffic
|
|
17867
|
+
*/
|
|
17868
|
+
locations: string[];
|
|
17869
|
+
}
|
|
17870
|
+
export interface GetForwardingProfileTypeGlobalProtectProxyBlockRuleAllowUdp {
|
|
17871
|
+
/**
|
|
17872
|
+
* Destination addresses or networks allowed for UDP traffic
|
|
17873
|
+
*/
|
|
17874
|
+
destinations: string;
|
|
17875
|
+
/**
|
|
17876
|
+
* Enable destinations for allow-udp
|
|
17877
|
+
*/
|
|
17878
|
+
enableDestinations: boolean;
|
|
17879
|
+
/**
|
|
17880
|
+
* Enable locations for allow-udp
|
|
17881
|
+
*/
|
|
17882
|
+
enableLocations: boolean;
|
|
17883
|
+
/**
|
|
17884
|
+
* List of user locations allowed for UDP traffic
|
|
17885
|
+
*/
|
|
17886
|
+
locations: string[];
|
|
17887
|
+
}
|
|
17888
|
+
export interface GetForwardingProfileTypeGlobalProtectProxyForwardingRule {
|
|
17889
|
+
/**
|
|
17890
|
+
* Connectivity method for this forwarding rule (e.g. direct)
|
|
17891
|
+
*/
|
|
17892
|
+
connectivity: string;
|
|
17893
|
+
/**
|
|
17894
|
+
* Destination scope this forwarding rule applies to
|
|
17895
|
+
*/
|
|
17896
|
+
destinations: string;
|
|
17897
|
+
/**
|
|
17898
|
+
* Enable a basic forwarding rule
|
|
17899
|
+
*/
|
|
17900
|
+
enabled: boolean;
|
|
17901
|
+
/**
|
|
17902
|
+
* Basic forwarding rule name as an alphanumeric string [ 0-9a-zA-Z._ -]
|
|
17903
|
+
*/
|
|
17904
|
+
name: string;
|
|
17905
|
+
/**
|
|
17906
|
+
* User location scope this rule applies to
|
|
17907
|
+
*/
|
|
17908
|
+
userLocations: string;
|
|
17909
|
+
}
|
|
17910
|
+
export interface GetForwardingProfileTypePacFile {
|
|
17911
|
+
/**
|
|
17912
|
+
* Basic block rule configuration for PAC file and GlobalProtect proxy profiles
|
|
17913
|
+
*/
|
|
17914
|
+
blockRule: outputs.GetForwardingProfileTypePacFileBlockRule;
|
|
17915
|
+
/**
|
|
17916
|
+
* List of PAC file-based forwarding rules
|
|
17917
|
+
*/
|
|
17918
|
+
forwardingRules: outputs.GetForwardingProfileTypePacFileForwardingRule[];
|
|
17919
|
+
/**
|
|
17920
|
+
* User upload PAC file for PAC file based forwarding configuration
|
|
17921
|
+
*/
|
|
17922
|
+
pacUpload: boolean;
|
|
17923
|
+
}
|
|
17924
|
+
export interface GetForwardingProfileTypePacFileBlockRule {
|
|
17925
|
+
/**
|
|
17926
|
+
* TCP traffic allowlist configuration
|
|
17927
|
+
*/
|
|
17928
|
+
allowTcp: outputs.GetForwardingProfileTypePacFileBlockRuleAllowTcp;
|
|
17929
|
+
/**
|
|
17930
|
+
* UDP traffic allowlist configuration with location and destination support
|
|
17931
|
+
*/
|
|
17932
|
+
allowUdp: outputs.GetForwardingProfileTypePacFileBlockRuleAllowUdp;
|
|
17933
|
+
/**
|
|
17934
|
+
* Enable block rule
|
|
17935
|
+
*/
|
|
17936
|
+
enable: boolean;
|
|
17937
|
+
}
|
|
17938
|
+
export interface GetForwardingProfileTypePacFileBlockRuleAllowTcp {
|
|
17939
|
+
/**
|
|
17940
|
+
* Enable locations for allow-tcp
|
|
17941
|
+
*/
|
|
17942
|
+
enableLocations: boolean;
|
|
17943
|
+
/**
|
|
17944
|
+
* List of user locations allowed for TCP traffic
|
|
17945
|
+
*/
|
|
17946
|
+
locations: string[];
|
|
17947
|
+
}
|
|
17948
|
+
export interface GetForwardingProfileTypePacFileBlockRuleAllowUdp {
|
|
17949
|
+
/**
|
|
17950
|
+
* Destination addresses or networks allowed for UDP traffic
|
|
17951
|
+
*/
|
|
17952
|
+
destinations: string;
|
|
17953
|
+
/**
|
|
17954
|
+
* Enable destinations for allow-udp
|
|
17955
|
+
*/
|
|
17956
|
+
enableDestinations: boolean;
|
|
17957
|
+
/**
|
|
17958
|
+
* Enable locations for allow-udp
|
|
17959
|
+
*/
|
|
17960
|
+
enableLocations: boolean;
|
|
17961
|
+
/**
|
|
17962
|
+
* List of user locations allowed for UDP traffic
|
|
17963
|
+
*/
|
|
17964
|
+
locations: string[];
|
|
17965
|
+
}
|
|
17966
|
+
export interface GetForwardingProfileTypePacFileForwardingRule {
|
|
17967
|
+
/**
|
|
17968
|
+
* Connectivity method for this forwarding rule (e.g. direct)
|
|
17969
|
+
*/
|
|
17970
|
+
connectivity: string;
|
|
17971
|
+
/**
|
|
17972
|
+
* Destination scope this forwarding rule applies to
|
|
17973
|
+
*/
|
|
17974
|
+
destinations: string;
|
|
17975
|
+
/**
|
|
17976
|
+
* Enable a basic forwarding rule
|
|
17977
|
+
*/
|
|
17978
|
+
enabled: boolean;
|
|
17979
|
+
/**
|
|
17980
|
+
* Basic forwarding rule name as an alphanumeric string [ 0-9a-zA-Z._ -]
|
|
17981
|
+
*/
|
|
17982
|
+
name: string;
|
|
17983
|
+
/**
|
|
17984
|
+
* User location scope this rule applies to
|
|
17985
|
+
*/
|
|
17986
|
+
userLocations: string;
|
|
17987
|
+
}
|
|
17988
|
+
export interface GetForwardingProfileTypeZtnaAgent {
|
|
17989
|
+
/**
|
|
17990
|
+
* ZTNA block rule configuration
|
|
17991
|
+
*/
|
|
17992
|
+
blockRule: outputs.GetForwardingProfileTypeZtnaAgentBlockRule;
|
|
17993
|
+
/**
|
|
17994
|
+
* List of ZTNA agent-based forwarding rules
|
|
17995
|
+
*/
|
|
17996
|
+
forwardingRules: outputs.GetForwardingProfileTypeZtnaAgentForwardingRule[];
|
|
17997
|
+
/**
|
|
17998
|
+
* User uploaded PAC file for a ZTNA agent-based forwarding configuration
|
|
17999
|
+
*/
|
|
18000
|
+
pacUpload: boolean;
|
|
18001
|
+
}
|
|
18002
|
+
export interface GetForwardingProfileTypeZtnaAgentBlockRule {
|
|
18003
|
+
/**
|
|
18004
|
+
* Allow ICMP for troubleshooting
|
|
18005
|
+
*/
|
|
18006
|
+
allowIcmpForTroubleshooting: boolean;
|
|
18007
|
+
/**
|
|
18008
|
+
* Block all other unmatched outbound connections
|
|
18009
|
+
*/
|
|
18010
|
+
blockAllOtherUnmatchedOutboundConnections: boolean;
|
|
18011
|
+
/**
|
|
18012
|
+
* Block inbound access when connected to tunnel
|
|
18013
|
+
*/
|
|
18014
|
+
blockInboundAccessWhenConnectedToTunnel: boolean;
|
|
18015
|
+
/**
|
|
18016
|
+
* Block Non-TCP Non UDP based traffic when connected to tunnel
|
|
18017
|
+
*/
|
|
18018
|
+
blockNonTcpNonUdpTrafficWhenConnectedToTunnel: boolean;
|
|
18019
|
+
/**
|
|
18020
|
+
* Block outbound LAN access when connected to tunnel
|
|
18021
|
+
*/
|
|
18022
|
+
blockOutboundLanAccessWhenConnectedToTunnel: boolean;
|
|
18023
|
+
/**
|
|
18024
|
+
* Enforce FQDN DNS resolution via tunnel DNS servers
|
|
18025
|
+
*/
|
|
18026
|
+
enforcerFqdnDnsResolutionViaDnsServers: boolean;
|
|
18027
|
+
/**
|
|
18028
|
+
* Resolve All FQDNs using DNS servers assigned by the tunnel (Windows Only)
|
|
18029
|
+
*/
|
|
18030
|
+
resolveAllFqdnsUsingDnsServersAssignedByTheTunnel: boolean;
|
|
18031
|
+
}
|
|
18032
|
+
export interface GetForwardingProfileTypeZtnaAgentForwardingRule {
|
|
18033
|
+
/**
|
|
18034
|
+
* Connectivity method for this ZTNA forwarding rule (e.g. direct)
|
|
18035
|
+
*/
|
|
18036
|
+
connectivity: string;
|
|
18037
|
+
/**
|
|
18038
|
+
* Destination scope this ZTNA forwarding rule applies to
|
|
18039
|
+
*/
|
|
18040
|
+
destinations: string;
|
|
18041
|
+
/**
|
|
18042
|
+
* Enable a forwarding rule ztna
|
|
18043
|
+
*/
|
|
18044
|
+
enabled: boolean;
|
|
18045
|
+
/**
|
|
18046
|
+
* Forwarding rule ZTNA name as an alphanumeric string [ 0-9a-zA-Z._ -]
|
|
18047
|
+
*/
|
|
18048
|
+
name: string;
|
|
18049
|
+
/**
|
|
18050
|
+
* Source applications this ZTNA rule applies to
|
|
18051
|
+
*/
|
|
18052
|
+
sourceApplications: string;
|
|
18053
|
+
/**
|
|
18054
|
+
* Type of traffic this ZTNA rule applies to (dns, network, or both)
|
|
18055
|
+
*/
|
|
18056
|
+
trafficType: string;
|
|
18057
|
+
/**
|
|
18058
|
+
* User location scope this ZTNA rule applies to
|
|
18059
|
+
*/
|
|
18060
|
+
userLocations: string;
|
|
18061
|
+
}
|
|
18062
|
+
export interface GetForwardingProfileUserLocationInternalHostDetection {
|
|
18063
|
+
/**
|
|
18064
|
+
* user location fqdn
|
|
18065
|
+
*/
|
|
18066
|
+
fqdn: string;
|
|
18067
|
+
/**
|
|
18068
|
+
* user location ip address
|
|
18069
|
+
*/
|
|
18070
|
+
ipAddress: string;
|
|
18071
|
+
}
|
|
18072
|
+
export interface GetForwardingProfileUserLocationListData {
|
|
18073
|
+
/**
|
|
18074
|
+
* Description of the user location
|
|
18075
|
+
*/
|
|
18076
|
+
description: string;
|
|
18077
|
+
/**
|
|
18078
|
+
* The folder in which the resource is defined
|
|
18079
|
+
*/
|
|
18080
|
+
folder: string;
|
|
18081
|
+
/**
|
|
18082
|
+
* The UUID of the user location
|
|
18083
|
+
*/
|
|
18084
|
+
id: string;
|
|
18085
|
+
/**
|
|
18086
|
+
* Configuration for detecting internal hosts using IP address and FQDN
|
|
18087
|
+
*/
|
|
18088
|
+
internalHostDetection: outputs.GetForwardingProfileUserLocationListDataInternalHostDetection;
|
|
18089
|
+
/**
|
|
18090
|
+
* List of IP addresses that define the user location
|
|
18091
|
+
*/
|
|
18092
|
+
ipAddresses: string[];
|
|
18093
|
+
/**
|
|
18094
|
+
* alphanumeric string [ 0-9a-zA-Z._-]
|
|
18095
|
+
*/
|
|
18096
|
+
name: string;
|
|
18097
|
+
/**
|
|
18098
|
+
* The Terraform ID.
|
|
18099
|
+
*/
|
|
18100
|
+
tfid: string;
|
|
18101
|
+
}
|
|
18102
|
+
export interface GetForwardingProfileUserLocationListDataInternalHostDetection {
|
|
18103
|
+
/**
|
|
18104
|
+
* user location fqdn
|
|
18105
|
+
*/
|
|
18106
|
+
fqdn: string;
|
|
18107
|
+
/**
|
|
18108
|
+
* user location ip address
|
|
18109
|
+
*/
|
|
18110
|
+
ipAddress: string;
|
|
18111
|
+
}
|
|
16718
18112
|
export interface GetGeneralSettingGeneral {
|
|
16719
18113
|
/**
|
|
16720
18114
|
* Force admins to acknowledge login banner
|
|
@@ -35902,6 +37296,10 @@ export interface GetSecurityRuleAllowUrlCategoryFileControl {
|
|
|
35902
37296
|
upload: string;
|
|
35903
37297
|
}
|
|
35904
37298
|
export interface GetSecurityRuleAllowWebApplication {
|
|
37299
|
+
/**
|
|
37300
|
+
* App id
|
|
37301
|
+
*/
|
|
37302
|
+
appId: string;
|
|
35905
37303
|
/**
|
|
35906
37304
|
* Application function
|
|
35907
37305
|
*/
|
|
@@ -36220,6 +37618,10 @@ export interface GetSecurityRuleListDataAllowUrlCategoryFileControl {
|
|
|
36220
37618
|
upload: string;
|
|
36221
37619
|
}
|
|
36222
37620
|
export interface GetSecurityRuleListDataAllowWebApplication {
|
|
37621
|
+
/**
|
|
37622
|
+
* App id
|
|
37623
|
+
*/
|
|
37624
|
+
appId: string;
|
|
36223
37625
|
/**
|
|
36224
37626
|
* Application function
|
|
36225
37627
|
*/
|
|
@@ -36400,6 +37802,10 @@ export interface GetServiceConnectionBgpPeer {
|
|
|
36400
37802
|
* Peer ipv6 address
|
|
36401
37803
|
*/
|
|
36402
37804
|
peerIpv6Address: string;
|
|
37805
|
+
/**
|
|
37806
|
+
* Same peer IP address for SC
|
|
37807
|
+
*/
|
|
37808
|
+
sameAsPrimary: boolean;
|
|
36403
37809
|
/**
|
|
36404
37810
|
* Secret
|
|
36405
37811
|
*/
|
|
@@ -36490,6 +37896,10 @@ export interface GetServiceConnectionListData {
|
|
|
36490
37896
|
* Region
|
|
36491
37897
|
*/
|
|
36492
37898
|
region: string;
|
|
37899
|
+
/**
|
|
37900
|
+
* Region tag
|
|
37901
|
+
*/
|
|
37902
|
+
regionTag: string;
|
|
36493
37903
|
/**
|
|
36494
37904
|
* Secondary ipsec tunnel
|
|
36495
37905
|
*/
|
|
@@ -36524,6 +37934,10 @@ export interface GetServiceConnectionListDataBgpPeer {
|
|
|
36524
37934
|
* Peer ipv6 address
|
|
36525
37935
|
*/
|
|
36526
37936
|
peerIpv6Address: string;
|
|
37937
|
+
/**
|
|
37938
|
+
* Same peer IP address for SC
|
|
37939
|
+
*/
|
|
37940
|
+
sameAsPrimary: boolean;
|
|
36527
37941
|
/**
|
|
36528
37942
|
* Secret
|
|
36529
37943
|
*/
|
|
@@ -49939,7 +51353,7 @@ export interface MfaServerMfaVendorTypeOktaAdaptiveV1 {
|
|
|
49939
51353
|
/**
|
|
49940
51354
|
* Okta timeout (seconds)
|
|
49941
51355
|
*/
|
|
49942
|
-
oktaTimeout:
|
|
51356
|
+
oktaTimeout: string;
|
|
49943
51357
|
/**
|
|
49944
51358
|
* Okta API token
|
|
49945
51359
|
*/
|
|
@@ -51176,6 +52590,10 @@ export interface SecurityRuleAllowUrlCategoryFileControl {
|
|
|
51176
52590
|
upload?: string;
|
|
51177
52591
|
}
|
|
51178
52592
|
export interface SecurityRuleAllowWebApplication {
|
|
52593
|
+
/**
|
|
52594
|
+
* App id
|
|
52595
|
+
*/
|
|
52596
|
+
appId: string;
|
|
51179
52597
|
/**
|
|
51180
52598
|
* Application function
|
|
51181
52599
|
*/
|
|
@@ -51330,6 +52748,10 @@ export interface ServiceConnectionBgpPeer {
|
|
|
51330
52748
|
* Peer ipv6 address
|
|
51331
52749
|
*/
|
|
51332
52750
|
peerIpv6Address?: string;
|
|
52751
|
+
/**
|
|
52752
|
+
* Same peer IP address for SC
|
|
52753
|
+
*/
|
|
52754
|
+
sameAsPrimary?: boolean;
|
|
51333
52755
|
/**
|
|
51334
52756
|
* Secret
|
|
51335
52757
|
*/
|