@pulumi/scm 1.0.5 → 1.0.6

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (111) hide show
  1. package/forwardingProfile.d.ts +294 -0
  2. package/forwardingProfile.js +247 -0
  3. package/forwardingProfile.js.map +1 -0
  4. package/forwardingProfileDestination.d.ts +190 -0
  5. package/forwardingProfileDestination.js +143 -0
  6. package/forwardingProfileDestination.js.map +1 -0
  7. package/forwardingProfileRegionalAndCustomProxy.d.ts +289 -0
  8. package/forwardingProfileRegionalAndCustomProxy.js +192 -0
  9. package/forwardingProfileRegionalAndCustomProxy.js.map +1 -0
  10. package/forwardingProfileSourceApplication.d.ts +161 -0
  11. package/forwardingProfileSourceApplication.js +129 -0
  12. package/forwardingProfileSourceApplication.js.map +1 -0
  13. package/forwardingProfileUserLocation.d.ts +172 -0
  14. package/forwardingProfileUserLocation.js +125 -0
  15. package/forwardingProfileUserLocation.js.map +1 -0
  16. package/getAddressGroupList.d.ts +4 -4
  17. package/getAddressGroupList.js +4 -4
  18. package/getAddressList.d.ts +4 -4
  19. package/getAddressList.js +4 -4
  20. package/getAggregateInterfaceList.d.ts +2 -2
  21. package/getAggregateInterfaceList.js +2 -2
  22. package/getApplicationGroupList.d.ts +4 -4
  23. package/getApplicationGroupList.js +4 -4
  24. package/getBgpAuthProfileList.d.ts +2 -2
  25. package/getBgpAuthProfileList.js +2 -2
  26. package/getBgpRedistributionProfileList.d.ts +2 -2
  27. package/getBgpRedistributionProfileList.js +2 -2
  28. package/getBgpRouteMapList.d.ts +2 -2
  29. package/getBgpRouteMapList.js +2 -2
  30. package/getConfigMatchListList.d.ts +2 -2
  31. package/getConfigMatchListList.js +2 -2
  32. package/getDevice.d.ts +267 -0
  33. package/getDevice.js +82 -0
  34. package/getDevice.js.map +1 -0
  35. package/getDeviceList.d.ts +171 -0
  36. package/getDeviceList.js +88 -0
  37. package/getDeviceList.js.map +1 -0
  38. package/getDynamicUserGroupList.d.ts +4 -4
  39. package/getDynamicUserGroupList.js +4 -4
  40. package/getEthernetInterfaceList.d.ts +2 -2
  41. package/getEthernetInterfaceList.js +2 -2
  42. package/getForwardingProfile.d.ts +137 -0
  43. package/getForwardingProfile.js +92 -0
  44. package/getForwardingProfile.js.map +1 -0
  45. package/getForwardingProfileDestination.d.ts +127 -0
  46. package/getForwardingProfileDestination.js +82 -0
  47. package/getForwardingProfileDestination.js.map +1 -0
  48. package/getForwardingProfileDestinationList.d.ts +163 -0
  49. package/getForwardingProfileDestinationList.js +90 -0
  50. package/getForwardingProfileDestinationList.js.map +1 -0
  51. package/getForwardingProfileList.d.ts +163 -0
  52. package/getForwardingProfileList.js +90 -0
  53. package/getForwardingProfileList.js.map +1 -0
  54. package/getForwardingProfileRegionalAndCustomProxy.d.ts +157 -0
  55. package/getForwardingProfileRegionalAndCustomProxy.js +92 -0
  56. package/getForwardingProfileRegionalAndCustomProxy.js.map +1 -0
  57. package/getForwardingProfileRegionalAndCustomProxyList.d.ts +163 -0
  58. package/getForwardingProfileRegionalAndCustomProxyList.js +90 -0
  59. package/getForwardingProfileRegionalAndCustomProxyList.js.map +1 -0
  60. package/getForwardingProfileSourceApplication.d.ts +98 -0
  61. package/getForwardingProfileSourceApplication.js +58 -0
  62. package/getForwardingProfileSourceApplication.js.map +1 -0
  63. package/getForwardingProfileSourceApplicationList.d.ts +113 -0
  64. package/getForwardingProfileSourceApplicationList.js +40 -0
  65. package/getForwardingProfileSourceApplicationList.js.map +1 -0
  66. package/getForwardingProfileUserLocation.d.ts +127 -0
  67. package/getForwardingProfileUserLocation.js +82 -0
  68. package/getForwardingProfileUserLocation.js.map +1 -0
  69. package/getForwardingProfileUserLocationList.d.ts +163 -0
  70. package/getForwardingProfileUserLocationList.js +90 -0
  71. package/getForwardingProfileUserLocationList.js.map +1 -0
  72. package/getGlobalprotectMatchListList.d.ts +2 -2
  73. package/getGlobalprotectMatchListList.js +2 -2
  74. package/getHipmatchMatchListList.d.ts +2 -2
  75. package/getHipmatchMatchListList.js +2 -2
  76. package/getIptagMatchListList.d.ts +2 -2
  77. package/getIptagMatchListList.js +2 -2
  78. package/getLayer2SubinterfaceList.d.ts +2 -2
  79. package/getLayer2SubinterfaceList.js +2 -2
  80. package/getLayer3SubinterfaceList.d.ts +2 -2
  81. package/getLayer3SubinterfaceList.js +2 -2
  82. package/getLogicalRouterList.d.ts +2 -2
  83. package/getLogicalRouterList.js +2 -2
  84. package/getLoopbackInterfaceList.d.ts +2 -2
  85. package/getLoopbackInterfaceList.js +2 -2
  86. package/getServiceConnection.d.ts +4 -0
  87. package/getServiceConnection.js.map +1 -1
  88. package/getServiceList.d.ts +2 -2
  89. package/getServiceList.js +2 -2
  90. package/getSystemMatchListList.d.ts +2 -2
  91. package/getSystemMatchListList.js +2 -2
  92. package/getTunnelInterfaceList.d.ts +2 -2
  93. package/getTunnelInterfaceList.js +2 -2
  94. package/getUseridMatchListList.d.ts +2 -2
  95. package/getUseridMatchListList.js +2 -2
  96. package/getVlanInterfaceList.d.ts +2 -2
  97. package/getVlanInterfaceList.js +2 -2
  98. package/getZoneList.d.ts +2 -2
  99. package/getZoneList.js +2 -2
  100. package/index.d.ts +51 -0
  101. package/index.js +74 -13
  102. package/index.js.map +1 -1
  103. package/package.json +2 -2
  104. package/securityRule.d.ts +27 -0
  105. package/securityRule.js +27 -0
  106. package/securityRule.js.map +1 -1
  107. package/serviceConnection.d.ts +12 -0
  108. package/serviceConnection.js +2 -0
  109. package/serviceConnection.js.map +1 -1
  110. package/types/input.d.ts +335 -1
  111. package/types/output.d.ts +1423 -1
package/types/output.d.ts CHANGED
@@ -4873,6 +4873,332 @@ export interface FileBlockingProfileRule {
4873
4873
  */
4874
4874
  name: string;
4875
4875
  }
4876
+ export interface ForwardingProfileDestinationFqdn {
4877
+ /**
4878
+ * alphanumeric string [*0-9a-zA-Z._-] and at most one $ by the end
4879
+ */
4880
+ name: string;
4881
+ /**
4882
+ * Port number for fqdn based destination
4883
+ */
4884
+ port?: number;
4885
+ }
4886
+ export interface ForwardingProfileDestinationIpAddress {
4887
+ /**
4888
+ * IP address with wildcards and CIDR notation support
4889
+ */
4890
+ name: string;
4891
+ /**
4892
+ * Port number for IP address based destination
4893
+ */
4894
+ port?: number;
4895
+ }
4896
+ export interface ForwardingProfileRegionalAndCustomProxyConnectivityPreference {
4897
+ /**
4898
+ * Indicates whether this connectivity method is enabled for use in the proxy configuration
4899
+ */
4900
+ enabled: boolean;
4901
+ /**
4902
+ * Connectivity method type - 'tunnel' for VPN tunnels, 'proxy' for HTTP/HTTPS proxies, 'adns' for authenticated DNS, 'masque' for MASQUE protocol
4903
+ */
4904
+ name: string;
4905
+ }
4906
+ export interface ForwardingProfileRegionalAndCustomProxyPrismaAccessLocation {
4907
+ /**
4908
+ * Add list of locations separated by space, in that region
4909
+ */
4910
+ locations?: string[];
4911
+ /**
4912
+ * One of the region from 'americas', 'europe', 'apac'
4913
+ */
4914
+ name: string;
4915
+ }
4916
+ export interface ForwardingProfileRegionalAndCustomProxyProxy1 {
4917
+ /**
4918
+ * fqdn of the primary proxy server (supports wildcards and alphanumeric characters with dots, hyphens, and underscores)
4919
+ */
4920
+ fqdn?: string;
4921
+ /**
4922
+ * Geographic or network location identifier for the primary proxy server
4923
+ */
4924
+ location?: string;
4925
+ /**
4926
+ * port number for primary proxy
4927
+ */
4928
+ port?: number;
4929
+ }
4930
+ export interface ForwardingProfileRegionalAndCustomProxyProxy2 {
4931
+ /**
4932
+ * Fqdn of the secondary (backup) proxy server used for failover scenarios
4933
+ */
4934
+ fqdn?: string;
4935
+ /**
4936
+ * Geographic or network location identifier for the secondary proxy server
4937
+ */
4938
+ location?: string;
4939
+ /**
4940
+ * port number for secondary proxy
4941
+ */
4942
+ port?: number;
4943
+ }
4944
+ export interface ForwardingProfileType {
4945
+ /**
4946
+ * Global Protect proxy-based forwarding configuration
4947
+ */
4948
+ globalProtectProxy?: outputs.ForwardingProfileTypeGlobalProtectProxy;
4949
+ /**
4950
+ * PAC file based forwarding configuration
4951
+ *
4952
+ * > ℹ️ **Note:** You must specify exactly one of `globalProtectProxy`, `pacFile`, and `ztnaAgent`.
4953
+ */
4954
+ pacFile?: outputs.ForwardingProfileTypePacFile;
4955
+ /**
4956
+ * ZTNA agent-based forwarding configuration
4957
+ *
4958
+ * > ℹ️ **Note:** You must specify exactly one of `globalProtectProxy`, `pacFile`, and `ztnaAgent`.
4959
+ */
4960
+ ztnaAgent?: outputs.ForwardingProfileTypeZtnaAgent;
4961
+ }
4962
+ export interface ForwardingProfileTypeGlobalProtectProxy {
4963
+ /**
4964
+ * Basic block rule configuration for PAC file and GlobalProtect proxy profiles
4965
+ */
4966
+ blockRule?: outputs.ForwardingProfileTypeGlobalProtectProxyBlockRule;
4967
+ /**
4968
+ * List of GlobalProtect proxy-based forwarding rules
4969
+ */
4970
+ forwardingRules?: outputs.ForwardingProfileTypeGlobalProtectProxyForwardingRule[];
4971
+ /**
4972
+ * User uploaded PAC file for Global Protect proxy-based forwarding configuration
4973
+ */
4974
+ pacUpload: boolean;
4975
+ }
4976
+ export interface ForwardingProfileTypeGlobalProtectProxyBlockRule {
4977
+ /**
4978
+ * TCP traffic allowlist configuration
4979
+ */
4980
+ allowTcp?: outputs.ForwardingProfileTypeGlobalProtectProxyBlockRuleAllowTcp;
4981
+ /**
4982
+ * UDP traffic allowlist configuration with location and destination support
4983
+ */
4984
+ allowUdp?: outputs.ForwardingProfileTypeGlobalProtectProxyBlockRuleAllowUdp;
4985
+ /**
4986
+ * Enable block rule
4987
+ */
4988
+ enable?: boolean;
4989
+ }
4990
+ export interface ForwardingProfileTypeGlobalProtectProxyBlockRuleAllowTcp {
4991
+ /**
4992
+ * Enable locations for allow-tcp
4993
+ */
4994
+ enableLocations?: boolean;
4995
+ /**
4996
+ * List of user locations allowed for TCP traffic
4997
+ */
4998
+ locations?: string[];
4999
+ }
5000
+ export interface ForwardingProfileTypeGlobalProtectProxyBlockRuleAllowUdp {
5001
+ /**
5002
+ * Destination addresses or networks allowed for UDP traffic
5003
+ */
5004
+ destinations?: string;
5005
+ /**
5006
+ * Enable destinations for allow-udp
5007
+ */
5008
+ enableDestinations?: boolean;
5009
+ /**
5010
+ * Enable locations for allow-udp
5011
+ */
5012
+ enableLocations?: boolean;
5013
+ /**
5014
+ * List of user locations allowed for UDP traffic
5015
+ */
5016
+ locations?: string[];
5017
+ }
5018
+ export interface ForwardingProfileTypeGlobalProtectProxyForwardingRule {
5019
+ /**
5020
+ * Connectivity method for this forwarding rule (e.g. direct)
5021
+ */
5022
+ connectivity: string;
5023
+ /**
5024
+ * Destination scope this forwarding rule applies to
5025
+ */
5026
+ destinations: string;
5027
+ /**
5028
+ * Enable a basic forwarding rule
5029
+ */
5030
+ enabled: boolean;
5031
+ /**
5032
+ * Basic forwarding rule name as an alphanumeric string [ 0-9a-zA-Z._ -]
5033
+ */
5034
+ name: string;
5035
+ /**
5036
+ * User location scope this rule applies to
5037
+ */
5038
+ userLocations: string;
5039
+ }
5040
+ export interface ForwardingProfileTypePacFile {
5041
+ /**
5042
+ * Basic block rule configuration for PAC file and GlobalProtect proxy profiles
5043
+ */
5044
+ blockRule?: outputs.ForwardingProfileTypePacFileBlockRule;
5045
+ /**
5046
+ * List of PAC file-based forwarding rules
5047
+ */
5048
+ forwardingRules?: outputs.ForwardingProfileTypePacFileForwardingRule[];
5049
+ /**
5050
+ * User upload PAC file for PAC file based forwarding configuration
5051
+ */
5052
+ pacUpload: boolean;
5053
+ }
5054
+ export interface ForwardingProfileTypePacFileBlockRule {
5055
+ /**
5056
+ * TCP traffic allowlist configuration
5057
+ */
5058
+ allowTcp?: outputs.ForwardingProfileTypePacFileBlockRuleAllowTcp;
5059
+ /**
5060
+ * UDP traffic allowlist configuration with location and destination support
5061
+ */
5062
+ allowUdp?: outputs.ForwardingProfileTypePacFileBlockRuleAllowUdp;
5063
+ /**
5064
+ * Enable block rule
5065
+ */
5066
+ enable?: boolean;
5067
+ }
5068
+ export interface ForwardingProfileTypePacFileBlockRuleAllowTcp {
5069
+ /**
5070
+ * Enable locations for allow-tcp
5071
+ */
5072
+ enableLocations?: boolean;
5073
+ /**
5074
+ * List of user locations allowed for TCP traffic
5075
+ */
5076
+ locations?: string[];
5077
+ }
5078
+ export interface ForwardingProfileTypePacFileBlockRuleAllowUdp {
5079
+ /**
5080
+ * Destination addresses or networks allowed for UDP traffic
5081
+ */
5082
+ destinations?: string;
5083
+ /**
5084
+ * Enable destinations for allow-udp
5085
+ */
5086
+ enableDestinations?: boolean;
5087
+ /**
5088
+ * Enable locations for allow-udp
5089
+ */
5090
+ enableLocations?: boolean;
5091
+ /**
5092
+ * List of user locations allowed for UDP traffic
5093
+ */
5094
+ locations?: string[];
5095
+ }
5096
+ export interface ForwardingProfileTypePacFileForwardingRule {
5097
+ /**
5098
+ * Connectivity method for this forwarding rule (e.g. direct)
5099
+ */
5100
+ connectivity: string;
5101
+ /**
5102
+ * Destination scope this forwarding rule applies to
5103
+ */
5104
+ destinations: string;
5105
+ /**
5106
+ * Enable a basic forwarding rule
5107
+ */
5108
+ enabled: boolean;
5109
+ /**
5110
+ * Basic forwarding rule name as an alphanumeric string [ 0-9a-zA-Z._ -]
5111
+ */
5112
+ name: string;
5113
+ /**
5114
+ * User location scope this rule applies to
5115
+ */
5116
+ userLocations: string;
5117
+ }
5118
+ export interface ForwardingProfileTypeZtnaAgent {
5119
+ /**
5120
+ * ZTNA block rule configuration
5121
+ */
5122
+ blockRule?: outputs.ForwardingProfileTypeZtnaAgentBlockRule;
5123
+ /**
5124
+ * List of ZTNA agent-based forwarding rules
5125
+ */
5126
+ forwardingRules?: outputs.ForwardingProfileTypeZtnaAgentForwardingRule[];
5127
+ /**
5128
+ * User uploaded PAC file for a ZTNA agent-based forwarding configuration
5129
+ */
5130
+ pacUpload: boolean;
5131
+ }
5132
+ export interface ForwardingProfileTypeZtnaAgentBlockRule {
5133
+ /**
5134
+ * Allow ICMP for troubleshooting
5135
+ */
5136
+ allowIcmpForTroubleshooting: boolean;
5137
+ /**
5138
+ * Block all other unmatched outbound connections
5139
+ */
5140
+ blockAllOtherUnmatchedOutboundConnections: boolean;
5141
+ /**
5142
+ * Block inbound access when connected to tunnel
5143
+ */
5144
+ blockInboundAccessWhenConnectedToTunnel: boolean;
5145
+ /**
5146
+ * Block Non-TCP Non UDP based traffic when connected to tunnel
5147
+ */
5148
+ blockNonTcpNonUdpTrafficWhenConnectedToTunnel: boolean;
5149
+ /**
5150
+ * Block outbound LAN access when connected to tunnel
5151
+ */
5152
+ blockOutboundLanAccessWhenConnectedToTunnel: boolean;
5153
+ /**
5154
+ * Enforce FQDN DNS resolution via tunnel DNS servers
5155
+ */
5156
+ enforcerFqdnDnsResolutionViaDnsServers: boolean;
5157
+ /**
5158
+ * Resolve All FQDNs using DNS servers assigned by the tunnel (Windows Only)
5159
+ */
5160
+ resolveAllFqdnsUsingDnsServersAssignedByTheTunnel: boolean;
5161
+ }
5162
+ export interface ForwardingProfileTypeZtnaAgentForwardingRule {
5163
+ /**
5164
+ * Connectivity method for this ZTNA forwarding rule (e.g. direct)
5165
+ */
5166
+ connectivity: string;
5167
+ /**
5168
+ * Destination scope this ZTNA forwarding rule applies to
5169
+ */
5170
+ destinations: string;
5171
+ /**
5172
+ * Enable a forwarding rule ztna
5173
+ */
5174
+ enabled: boolean;
5175
+ /**
5176
+ * Forwarding rule ZTNA name as an alphanumeric string [ 0-9a-zA-Z._ -]
5177
+ */
5178
+ name: string;
5179
+ /**
5180
+ * Source applications this ZTNA rule applies to
5181
+ */
5182
+ sourceApplications: string;
5183
+ /**
5184
+ * Type of traffic this ZTNA rule applies to (dns, network, or both)
5185
+ */
5186
+ trafficType: string;
5187
+ /**
5188
+ * User location scope this ZTNA rule applies to
5189
+ */
5190
+ userLocations: string;
5191
+ }
5192
+ export interface ForwardingProfileUserLocationInternalHostDetection {
5193
+ /**
5194
+ * user location fqdn
5195
+ */
5196
+ fqdn: string;
5197
+ /**
5198
+ * user location ip address
5199
+ */
5200
+ ipAddress: string;
5201
+ }
4876
5202
  export interface GeneralSettingGeneral {
4877
5203
  /**
4878
5204
  * Force admins to acknowledge login banner
@@ -13277,6 +13603,256 @@ export interface GetDecryptionRuleTypeSslInboundInspection {
13277
13603
  */
13278
13604
  certificates: string[];
13279
13605
  }
13606
+ export interface GetDeviceAvailableLicensess {
13607
+ /**
13608
+ * Authcode
13609
+ */
13610
+ authcode: string;
13611
+ /**
13612
+ * Expires
13613
+ */
13614
+ expires: string;
13615
+ /**
13616
+ * Feature
13617
+ */
13618
+ feature: string;
13619
+ /**
13620
+ * Issued
13621
+ */
13622
+ issued: string;
13623
+ }
13624
+ export interface GetDeviceInstalledLicense {
13625
+ /**
13626
+ * Authcode
13627
+ */
13628
+ authcode: string;
13629
+ /**
13630
+ * Expired
13631
+ */
13632
+ expired: string;
13633
+ /**
13634
+ * Expires
13635
+ */
13636
+ expires: string;
13637
+ /**
13638
+ * Feature
13639
+ */
13640
+ feature: string;
13641
+ /**
13642
+ * Issued
13643
+ */
13644
+ issued: string;
13645
+ }
13646
+ export interface GetDeviceListData {
13647
+ /**
13648
+ * Anti virus version
13649
+ */
13650
+ antiVirusVersion: string;
13651
+ /**
13652
+ * App release date
13653
+ */
13654
+ appReleaseDate: string;
13655
+ /**
13656
+ * App version
13657
+ */
13658
+ appVersion: string;
13659
+ /**
13660
+ * Av release date
13661
+ */
13662
+ avReleaseDate: string;
13663
+ /**
13664
+ * Available licensess
13665
+ */
13666
+ availableLicensesses: outputs.GetDeviceListDataAvailableLicensess[];
13667
+ /**
13668
+ * Connected since
13669
+ */
13670
+ connectedSince: string;
13671
+ /**
13672
+ * The description of the device
13673
+ */
13674
+ description: string;
13675
+ /**
13676
+ * Dev cert detail
13677
+ */
13678
+ devCertDetail: string;
13679
+ /**
13680
+ * Dev cert expiry date
13681
+ */
13682
+ devCertExpiryDate: string;
13683
+ /**
13684
+ * The display name of the device
13685
+ */
13686
+ displayName: string;
13687
+ /**
13688
+ * The product family of the device
13689
+ */
13690
+ family: string;
13691
+ /**
13692
+ * The folder containing the device
13693
+ */
13694
+ folder: string;
13695
+ /**
13696
+ * Gp client verion
13697
+ */
13698
+ gpClientVerion: string;
13699
+ /**
13700
+ * Gp data version
13701
+ */
13702
+ gpDataVersion: string;
13703
+ /**
13704
+ * Ha peer serial
13705
+ */
13706
+ haPeerSerial: string;
13707
+ /**
13708
+ * Ha peer state
13709
+ */
13710
+ haPeerState: string;
13711
+ /**
13712
+ * Ha state
13713
+ */
13714
+ haState: string;
13715
+ /**
13716
+ * The hostname of the device
13717
+ */
13718
+ hostname: string;
13719
+ /**
13720
+ * The UUID of the device
13721
+ */
13722
+ id: string;
13723
+ /**
13724
+ * Installed licenses
13725
+ */
13726
+ installedLicenses: outputs.GetDeviceListDataInstalledLicense[];
13727
+ /**
13728
+ * Iot release date
13729
+ */
13730
+ iotReleaseDate: string;
13731
+ /**
13732
+ * Iot version
13733
+ */
13734
+ iotVersion: string;
13735
+ /**
13736
+ * The IPv4 address of the device
13737
+ */
13738
+ ipAddress: string;
13739
+ /**
13740
+ * Ip v6 address
13741
+ */
13742
+ ipV6Address: string;
13743
+ /**
13744
+ * Is connected
13745
+ */
13746
+ isConnected: boolean;
13747
+ /**
13748
+ * Labels assigned to the device
13749
+ */
13750
+ labels: string[];
13751
+ /**
13752
+ * License match
13753
+ */
13754
+ licenseMatch: boolean;
13755
+ /**
13756
+ * Log db version
13757
+ */
13758
+ logDbVersion: string;
13759
+ /**
13760
+ * The MAC address of the device
13761
+ */
13762
+ macAddress: string;
13763
+ /**
13764
+ * The model of the device
13765
+ */
13766
+ model: string;
13767
+ /**
13768
+ * The name of the device
13769
+ */
13770
+ name: string;
13771
+ /**
13772
+ * Snippets associated with the device
13773
+ */
13774
+ snippets: string[];
13775
+ /**
13776
+ * Software version
13777
+ */
13778
+ softwareVersion: string;
13779
+ /**
13780
+ * The Terraform ID.
13781
+ */
13782
+ tfid: string;
13783
+ /**
13784
+ * Threat release date
13785
+ */
13786
+ threatReleaseDate: string;
13787
+ /**
13788
+ * Threat version
13789
+ */
13790
+ threatVersion: string;
13791
+ /**
13792
+ * Uptime
13793
+ */
13794
+ uptime: string;
13795
+ /**
13796
+ * Url db type
13797
+ */
13798
+ urlDbType: string;
13799
+ /**
13800
+ * Url db ver
13801
+ */
13802
+ urlDbVer: string;
13803
+ /**
13804
+ * Vm state
13805
+ */
13806
+ vmState: string;
13807
+ /**
13808
+ * Wf release date
13809
+ */
13810
+ wfReleaseDate: string;
13811
+ /**
13812
+ * Wf ver
13813
+ */
13814
+ wfVer: string;
13815
+ }
13816
+ export interface GetDeviceListDataAvailableLicensess {
13817
+ /**
13818
+ * Authcode
13819
+ */
13820
+ authcode: string;
13821
+ /**
13822
+ * Expires
13823
+ */
13824
+ expires: string;
13825
+ /**
13826
+ * Feature
13827
+ */
13828
+ feature: string;
13829
+ /**
13830
+ * Issued
13831
+ */
13832
+ issued: string;
13833
+ }
13834
+ export interface GetDeviceListDataInstalledLicense {
13835
+ /**
13836
+ * Authcode
13837
+ */
13838
+ authcode: string;
13839
+ /**
13840
+ * Expired
13841
+ */
13842
+ expired: string;
13843
+ /**
13844
+ * Expires
13845
+ */
13846
+ expires: string;
13847
+ /**
13848
+ * Feature
13849
+ */
13850
+ feature: string;
13851
+ /**
13852
+ * Issued
13853
+ */
13854
+ issued: string;
13855
+ }
13280
13856
  export interface GetDeviceRedistributionCollectorListData {
13281
13857
  /**
13282
13858
  * The device in which the resource is defined
@@ -16715,6 +17291,824 @@ export interface GetFolderListData {
16715
17291
  */
16716
17292
  tfid: string;
16717
17293
  }
17294
+ export interface GetForwardingProfileDestinationFqdn {
17295
+ /**
17296
+ * alphanumeric string [*0-9a-zA-Z._-] and at most one $ by the end
17297
+ */
17298
+ name: string;
17299
+ /**
17300
+ * Port number for fqdn based destination
17301
+ */
17302
+ port: number;
17303
+ }
17304
+ export interface GetForwardingProfileDestinationIpAddress {
17305
+ /**
17306
+ * IP address with wildcards and CIDR notation support
17307
+ */
17308
+ name: string;
17309
+ /**
17310
+ * Port number for IP address based destination
17311
+ */
17312
+ port: number;
17313
+ }
17314
+ export interface GetForwardingProfileDestinationListData {
17315
+ /**
17316
+ * description of the destination
17317
+ */
17318
+ description: string;
17319
+ /**
17320
+ * The folder in which the resource is defined
17321
+ */
17322
+ folder: string;
17323
+ /**
17324
+ * List of FQDN based destination entries
17325
+ */
17326
+ fqdns: outputs.GetForwardingProfileDestinationListDataFqdn[];
17327
+ /**
17328
+ * The UUID of the destination
17329
+ */
17330
+ id: string;
17331
+ /**
17332
+ * List of IP address based destination entries
17333
+ */
17334
+ ipAddresses: outputs.GetForwardingProfileDestinationListDataIpAddress[];
17335
+ /**
17336
+ * alphanumeric string [ 0-9a-zA-Z._ -]
17337
+ */
17338
+ name: string;
17339
+ /**
17340
+ * The Terraform ID.
17341
+ */
17342
+ tfid: string;
17343
+ }
17344
+ export interface GetForwardingProfileDestinationListDataFqdn {
17345
+ /**
17346
+ * alphanumeric string [*0-9a-zA-Z._-] and at most one $ by the end
17347
+ */
17348
+ name: string;
17349
+ /**
17350
+ * Port number for fqdn based destination
17351
+ */
17352
+ port: number;
17353
+ }
17354
+ export interface GetForwardingProfileDestinationListDataIpAddress {
17355
+ /**
17356
+ * IP address with wildcards and CIDR notation support
17357
+ */
17358
+ name: string;
17359
+ /**
17360
+ * Port number for IP address based destination
17361
+ */
17362
+ port: number;
17363
+ }
17364
+ export interface GetForwardingProfileListData {
17365
+ /**
17366
+ * Enable forwarding rule for forwarding profile
17367
+ */
17368
+ definitionMethod: string;
17369
+ /**
17370
+ * Forwarding profile description
17371
+ */
17372
+ description: string;
17373
+ /**
17374
+ * The folder in which the resource is defined
17375
+ */
17376
+ folder: string;
17377
+ /**
17378
+ * The UUID of the forwarding profile
17379
+ */
17380
+ id: string;
17381
+ /**
17382
+ * forwarding profile name as an alphanumeric string [ 0-9a-zA-Z._ -]
17383
+ */
17384
+ name: string;
17385
+ /**
17386
+ * The Terraform ID.
17387
+ */
17388
+ tfid: string;
17389
+ /**
17390
+ * Forwarding profile type configuration (PAC file, GlobalProtect proxy, or ZTNA agent)
17391
+ */
17392
+ type: outputs.GetForwardingProfileListDataType;
17393
+ }
17394
+ export interface GetForwardingProfileListDataType {
17395
+ /**
17396
+ * Global Protect proxy-based forwarding configuration
17397
+ */
17398
+ globalProtectProxy: outputs.GetForwardingProfileListDataTypeGlobalProtectProxy;
17399
+ /**
17400
+ * PAC file based forwarding configuration
17401
+ *
17402
+ * > ℹ️ **Note:** You must specify exactly one of `globalProtectProxy`, `pacFile`, and `ztnaAgent`.
17403
+ */
17404
+ pacFile: outputs.GetForwardingProfileListDataTypePacFile;
17405
+ /**
17406
+ * ZTNA agent-based forwarding configuration
17407
+ *
17408
+ * > ℹ️ **Note:** You must specify exactly one of `globalProtectProxy`, `pacFile`, and `ztnaAgent`.
17409
+ */
17410
+ ztnaAgent: outputs.GetForwardingProfileListDataTypeZtnaAgent;
17411
+ }
17412
+ export interface GetForwardingProfileListDataTypeGlobalProtectProxy {
17413
+ /**
17414
+ * Basic block rule configuration for PAC file and GlobalProtect proxy profiles
17415
+ */
17416
+ blockRule: outputs.GetForwardingProfileListDataTypeGlobalProtectProxyBlockRule;
17417
+ /**
17418
+ * List of GlobalProtect proxy-based forwarding rules
17419
+ */
17420
+ forwardingRules: outputs.GetForwardingProfileListDataTypeGlobalProtectProxyForwardingRule[];
17421
+ /**
17422
+ * User uploaded PAC file for Global Protect proxy-based forwarding configuration
17423
+ */
17424
+ pacUpload: boolean;
17425
+ }
17426
+ export interface GetForwardingProfileListDataTypeGlobalProtectProxyBlockRule {
17427
+ /**
17428
+ * TCP traffic allowlist configuration
17429
+ */
17430
+ allowTcp: outputs.GetForwardingProfileListDataTypeGlobalProtectProxyBlockRuleAllowTcp;
17431
+ /**
17432
+ * UDP traffic allowlist configuration with location and destination support
17433
+ */
17434
+ allowUdp: outputs.GetForwardingProfileListDataTypeGlobalProtectProxyBlockRuleAllowUdp;
17435
+ /**
17436
+ * Enable block rule
17437
+ */
17438
+ enable: boolean;
17439
+ }
17440
+ export interface GetForwardingProfileListDataTypeGlobalProtectProxyBlockRuleAllowTcp {
17441
+ /**
17442
+ * Enable locations for allow-tcp
17443
+ */
17444
+ enableLocations: boolean;
17445
+ /**
17446
+ * List of user locations allowed for TCP traffic
17447
+ */
17448
+ locations: string[];
17449
+ }
17450
+ export interface GetForwardingProfileListDataTypeGlobalProtectProxyBlockRuleAllowUdp {
17451
+ /**
17452
+ * Destination addresses or networks allowed for UDP traffic
17453
+ */
17454
+ destinations: string;
17455
+ /**
17456
+ * Enable destinations for allow-udp
17457
+ */
17458
+ enableDestinations: boolean;
17459
+ /**
17460
+ * Enable locations for allow-udp
17461
+ */
17462
+ enableLocations: boolean;
17463
+ /**
17464
+ * List of user locations allowed for UDP traffic
17465
+ */
17466
+ locations: string[];
17467
+ }
17468
+ export interface GetForwardingProfileListDataTypeGlobalProtectProxyForwardingRule {
17469
+ /**
17470
+ * Connectivity method for this forwarding rule (e.g. direct)
17471
+ */
17472
+ connectivity: string;
17473
+ /**
17474
+ * Destination scope this forwarding rule applies to
17475
+ */
17476
+ destinations: string;
17477
+ /**
17478
+ * Enable a basic forwarding rule
17479
+ */
17480
+ enabled: boolean;
17481
+ /**
17482
+ * Basic forwarding rule name as an alphanumeric string [ 0-9a-zA-Z._ -]
17483
+ */
17484
+ name: string;
17485
+ /**
17486
+ * User location scope this rule applies to
17487
+ */
17488
+ userLocations: string;
17489
+ }
17490
+ export interface GetForwardingProfileListDataTypePacFile {
17491
+ /**
17492
+ * Basic block rule configuration for PAC file and GlobalProtect proxy profiles
17493
+ */
17494
+ blockRule: outputs.GetForwardingProfileListDataTypePacFileBlockRule;
17495
+ /**
17496
+ * List of PAC file-based forwarding rules
17497
+ */
17498
+ forwardingRules: outputs.GetForwardingProfileListDataTypePacFileForwardingRule[];
17499
+ /**
17500
+ * User upload PAC file for PAC file based forwarding configuration
17501
+ */
17502
+ pacUpload: boolean;
17503
+ }
17504
+ export interface GetForwardingProfileListDataTypePacFileBlockRule {
17505
+ /**
17506
+ * TCP traffic allowlist configuration
17507
+ */
17508
+ allowTcp: outputs.GetForwardingProfileListDataTypePacFileBlockRuleAllowTcp;
17509
+ /**
17510
+ * UDP traffic allowlist configuration with location and destination support
17511
+ */
17512
+ allowUdp: outputs.GetForwardingProfileListDataTypePacFileBlockRuleAllowUdp;
17513
+ /**
17514
+ * Enable block rule
17515
+ */
17516
+ enable: boolean;
17517
+ }
17518
+ export interface GetForwardingProfileListDataTypePacFileBlockRuleAllowTcp {
17519
+ /**
17520
+ * Enable locations for allow-tcp
17521
+ */
17522
+ enableLocations: boolean;
17523
+ /**
17524
+ * List of user locations allowed for TCP traffic
17525
+ */
17526
+ locations: string[];
17527
+ }
17528
+ export interface GetForwardingProfileListDataTypePacFileBlockRuleAllowUdp {
17529
+ /**
17530
+ * Destination addresses or networks allowed for UDP traffic
17531
+ */
17532
+ destinations: string;
17533
+ /**
17534
+ * Enable destinations for allow-udp
17535
+ */
17536
+ enableDestinations: boolean;
17537
+ /**
17538
+ * Enable locations for allow-udp
17539
+ */
17540
+ enableLocations: boolean;
17541
+ /**
17542
+ * List of user locations allowed for UDP traffic
17543
+ */
17544
+ locations: string[];
17545
+ }
17546
+ export interface GetForwardingProfileListDataTypePacFileForwardingRule {
17547
+ /**
17548
+ * Connectivity method for this forwarding rule (e.g. direct)
17549
+ */
17550
+ connectivity: string;
17551
+ /**
17552
+ * Destination scope this forwarding rule applies to
17553
+ */
17554
+ destinations: string;
17555
+ /**
17556
+ * Enable a basic forwarding rule
17557
+ */
17558
+ enabled: boolean;
17559
+ /**
17560
+ * Basic forwarding rule name as an alphanumeric string [ 0-9a-zA-Z._ -]
17561
+ */
17562
+ name: string;
17563
+ /**
17564
+ * User location scope this rule applies to
17565
+ */
17566
+ userLocations: string;
17567
+ }
17568
+ export interface GetForwardingProfileListDataTypeZtnaAgent {
17569
+ /**
17570
+ * ZTNA block rule configuration
17571
+ */
17572
+ blockRule: outputs.GetForwardingProfileListDataTypeZtnaAgentBlockRule;
17573
+ /**
17574
+ * List of ZTNA agent-based forwarding rules
17575
+ */
17576
+ forwardingRules: outputs.GetForwardingProfileListDataTypeZtnaAgentForwardingRule[];
17577
+ /**
17578
+ * User uploaded PAC file for a ZTNA agent-based forwarding configuration
17579
+ */
17580
+ pacUpload: boolean;
17581
+ }
17582
+ export interface GetForwardingProfileListDataTypeZtnaAgentBlockRule {
17583
+ /**
17584
+ * Allow ICMP for troubleshooting
17585
+ */
17586
+ allowIcmpForTroubleshooting: boolean;
17587
+ /**
17588
+ * Block all other unmatched outbound connections
17589
+ */
17590
+ blockAllOtherUnmatchedOutboundConnections: boolean;
17591
+ /**
17592
+ * Block inbound access when connected to tunnel
17593
+ */
17594
+ blockInboundAccessWhenConnectedToTunnel: boolean;
17595
+ /**
17596
+ * Block Non-TCP Non UDP based traffic when connected to tunnel
17597
+ */
17598
+ blockNonTcpNonUdpTrafficWhenConnectedToTunnel: boolean;
17599
+ /**
17600
+ * Block outbound LAN access when connected to tunnel
17601
+ */
17602
+ blockOutboundLanAccessWhenConnectedToTunnel: boolean;
17603
+ /**
17604
+ * Enforce FQDN DNS resolution via tunnel DNS servers
17605
+ */
17606
+ enforcerFqdnDnsResolutionViaDnsServers: boolean;
17607
+ /**
17608
+ * Resolve All FQDNs using DNS servers assigned by the tunnel (Windows Only)
17609
+ */
17610
+ resolveAllFqdnsUsingDnsServersAssignedByTheTunnel: boolean;
17611
+ }
17612
+ export interface GetForwardingProfileListDataTypeZtnaAgentForwardingRule {
17613
+ /**
17614
+ * Connectivity method for this ZTNA forwarding rule (e.g. direct)
17615
+ */
17616
+ connectivity: string;
17617
+ /**
17618
+ * Destination scope this ZTNA forwarding rule applies to
17619
+ */
17620
+ destinations: string;
17621
+ /**
17622
+ * Enable a forwarding rule ztna
17623
+ */
17624
+ enabled: boolean;
17625
+ /**
17626
+ * Forwarding rule ZTNA name as an alphanumeric string [ 0-9a-zA-Z._ -]
17627
+ */
17628
+ name: string;
17629
+ /**
17630
+ * Source applications this ZTNA rule applies to
17631
+ */
17632
+ sourceApplications: string;
17633
+ /**
17634
+ * Type of traffic this ZTNA rule applies to (dns, network, or both)
17635
+ */
17636
+ trafficType: string;
17637
+ /**
17638
+ * User location scope this ZTNA rule applies to
17639
+ */
17640
+ userLocations: string;
17641
+ }
17642
+ export interface GetForwardingProfileRegionalAndCustomProxyConnectivityPreference {
17643
+ /**
17644
+ * Indicates whether this connectivity method is enabled for use in the proxy configuration
17645
+ */
17646
+ enabled: boolean;
17647
+ /**
17648
+ * Connectivity method type - 'tunnel' for VPN tunnels, 'proxy' for HTTP/HTTPS proxies, 'adns' for authenticated DNS, 'masque' for MASQUE protocol
17649
+ */
17650
+ name: string;
17651
+ }
17652
+ export interface GetForwardingProfileRegionalAndCustomProxyListData {
17653
+ /**
17654
+ * List of connectivity methods and their enablement status for establishing proxy connections
17655
+ */
17656
+ connectivityPreferences: outputs.GetForwardingProfileRegionalAndCustomProxyListDataConnectivityPreference[];
17657
+ /**
17658
+ * regional and custom proxy configuration description
17659
+ */
17660
+ description: string;
17661
+ /**
17662
+ * Behavior when proxy connection fails - 'fail-open' allows direct internet access, 'fail-safe' blocks traffic until proxy is restored
17663
+ */
17664
+ fallbackOption: string;
17665
+ /**
17666
+ * The folder in which the resource is defined
17667
+ */
17668
+ folder: string;
17669
+ /**
17670
+ * The UUID of the regional and custom proxy
17671
+ */
17672
+ id: string;
17673
+ /**
17674
+ * Strategy for selecting Prisma Access location - 'best-available-pa-location' automatically selects optimal location, 'specific-pa-location' uses predefined locations
17675
+ */
17676
+ locationPreference: string;
17677
+ /**
17678
+ * alphanumeric string [ 0-9a-zA-Z ._-]
17679
+ */
17680
+ name: string;
17681
+ /**
17682
+ * Select Prisma Access location Americas, Europe and Asia-Pacific.
17683
+ */
17684
+ prismaAccessLocations: outputs.GetForwardingProfileRegionalAndCustomProxyListDataPrismaAccessLocation[];
17685
+ /**
17686
+ * primary regional and custom proxy
17687
+ */
17688
+ proxy1: outputs.GetForwardingProfileRegionalAndCustomProxyListDataProxy1;
17689
+ /**
17690
+ * secondary regional and custom proxy
17691
+ */
17692
+ proxy2: outputs.GetForwardingProfileRegionalAndCustomProxyListDataProxy2;
17693
+ /**
17694
+ * The Terraform ID.
17695
+ */
17696
+ tfid: string;
17697
+ /**
17698
+ * Proxy configuration type - 'gp-and-pac' for GlobalProtect and PAC file forwarding, 'ztna-agent' for ZTNA agent forwarding
17699
+ */
17700
+ type: string;
17701
+ }
17702
+ export interface GetForwardingProfileRegionalAndCustomProxyListDataConnectivityPreference {
17703
+ /**
17704
+ * Indicates whether this connectivity method is enabled for use in the proxy configuration
17705
+ */
17706
+ enabled: boolean;
17707
+ /**
17708
+ * Connectivity method type - 'tunnel' for VPN tunnels, 'proxy' for HTTP/HTTPS proxies, 'adns' for authenticated DNS, 'masque' for MASQUE protocol
17709
+ */
17710
+ name: string;
17711
+ }
17712
+ export interface GetForwardingProfileRegionalAndCustomProxyListDataPrismaAccessLocation {
17713
+ /**
17714
+ * Add list of locations separated by space, in that region
17715
+ */
17716
+ locations: string[];
17717
+ /**
17718
+ * One of the region from 'americas', 'europe', 'apac'
17719
+ */
17720
+ name: string;
17721
+ }
17722
+ export interface GetForwardingProfileRegionalAndCustomProxyListDataProxy1 {
17723
+ /**
17724
+ * fqdn of the primary proxy server (supports wildcards and alphanumeric characters with dots, hyphens, and underscores)
17725
+ */
17726
+ fqdn: string;
17727
+ /**
17728
+ * Geographic or network location identifier for the primary proxy server
17729
+ */
17730
+ location: string;
17731
+ /**
17732
+ * port number for primary proxy
17733
+ */
17734
+ port: number;
17735
+ }
17736
+ export interface GetForwardingProfileRegionalAndCustomProxyListDataProxy2 {
17737
+ /**
17738
+ * Fqdn of the secondary (backup) proxy server used for failover scenarios
17739
+ */
17740
+ fqdn: string;
17741
+ /**
17742
+ * Geographic or network location identifier for the secondary proxy server
17743
+ */
17744
+ location: string;
17745
+ /**
17746
+ * port number for secondary proxy
17747
+ */
17748
+ port: number;
17749
+ }
17750
+ export interface GetForwardingProfileRegionalAndCustomProxyPrismaAccessLocation {
17751
+ /**
17752
+ * Add list of locations separated by space, in that region
17753
+ */
17754
+ locations: string[];
17755
+ /**
17756
+ * One of the region from 'americas', 'europe', 'apac'
17757
+ */
17758
+ name: string;
17759
+ }
17760
+ export interface GetForwardingProfileRegionalAndCustomProxyProxy1 {
17761
+ /**
17762
+ * fqdn of the primary proxy server (supports wildcards and alphanumeric characters with dots, hyphens, and underscores)
17763
+ */
17764
+ fqdn: string;
17765
+ /**
17766
+ * Geographic or network location identifier for the primary proxy server
17767
+ */
17768
+ location: string;
17769
+ /**
17770
+ * port number for primary proxy
17771
+ */
17772
+ port: number;
17773
+ }
17774
+ export interface GetForwardingProfileRegionalAndCustomProxyProxy2 {
17775
+ /**
17776
+ * Fqdn of the secondary (backup) proxy server used for failover scenarios
17777
+ */
17778
+ fqdn: string;
17779
+ /**
17780
+ * Geographic or network location identifier for the secondary proxy server
17781
+ */
17782
+ location: string;
17783
+ /**
17784
+ * port number for secondary proxy
17785
+ */
17786
+ port: number;
17787
+ }
17788
+ export interface GetForwardingProfileSourceApplicationListData {
17789
+ /**
17790
+ * List of application names to be included in this source application profile
17791
+ */
17792
+ applications: string[];
17793
+ /**
17794
+ * fowarding profile source application description
17795
+ */
17796
+ description: string;
17797
+ /**
17798
+ * The folder in which the resource is defined
17799
+ */
17800
+ folder: string;
17801
+ /**
17802
+ * The id of the source application
17803
+ */
17804
+ id: string;
17805
+ /**
17806
+ * The unique name identifying the source application. Must be alphanumeric with allowed characters [0-9a-zA-Z._-]
17807
+ */
17808
+ name: string;
17809
+ /**
17810
+ * The Terraform ID.
17811
+ */
17812
+ tfid: string;
17813
+ }
17814
+ export interface GetForwardingProfileType {
17815
+ /**
17816
+ * Global Protect proxy-based forwarding configuration
17817
+ */
17818
+ globalProtectProxy: outputs.GetForwardingProfileTypeGlobalProtectProxy;
17819
+ /**
17820
+ * PAC file based forwarding configuration
17821
+ *
17822
+ * > ℹ️ **Note:** You must specify exactly one of `globalProtectProxy`, `pacFile`, and `ztnaAgent`.
17823
+ */
17824
+ pacFile: outputs.GetForwardingProfileTypePacFile;
17825
+ /**
17826
+ * ZTNA agent-based forwarding configuration
17827
+ *
17828
+ * > ℹ️ **Note:** You must specify exactly one of `globalProtectProxy`, `pacFile`, and `ztnaAgent`.
17829
+ */
17830
+ ztnaAgent: outputs.GetForwardingProfileTypeZtnaAgent;
17831
+ }
17832
+ export interface GetForwardingProfileTypeGlobalProtectProxy {
17833
+ /**
17834
+ * Basic block rule configuration for PAC file and GlobalProtect proxy profiles
17835
+ */
17836
+ blockRule: outputs.GetForwardingProfileTypeGlobalProtectProxyBlockRule;
17837
+ /**
17838
+ * List of GlobalProtect proxy-based forwarding rules
17839
+ */
17840
+ forwardingRules: outputs.GetForwardingProfileTypeGlobalProtectProxyForwardingRule[];
17841
+ /**
17842
+ * User uploaded PAC file for Global Protect proxy-based forwarding configuration
17843
+ */
17844
+ pacUpload: boolean;
17845
+ }
17846
+ export interface GetForwardingProfileTypeGlobalProtectProxyBlockRule {
17847
+ /**
17848
+ * TCP traffic allowlist configuration
17849
+ */
17850
+ allowTcp: outputs.GetForwardingProfileTypeGlobalProtectProxyBlockRuleAllowTcp;
17851
+ /**
17852
+ * UDP traffic allowlist configuration with location and destination support
17853
+ */
17854
+ allowUdp: outputs.GetForwardingProfileTypeGlobalProtectProxyBlockRuleAllowUdp;
17855
+ /**
17856
+ * Enable block rule
17857
+ */
17858
+ enable: boolean;
17859
+ }
17860
+ export interface GetForwardingProfileTypeGlobalProtectProxyBlockRuleAllowTcp {
17861
+ /**
17862
+ * Enable locations for allow-tcp
17863
+ */
17864
+ enableLocations: boolean;
17865
+ /**
17866
+ * List of user locations allowed for TCP traffic
17867
+ */
17868
+ locations: string[];
17869
+ }
17870
+ export interface GetForwardingProfileTypeGlobalProtectProxyBlockRuleAllowUdp {
17871
+ /**
17872
+ * Destination addresses or networks allowed for UDP traffic
17873
+ */
17874
+ destinations: string;
17875
+ /**
17876
+ * Enable destinations for allow-udp
17877
+ */
17878
+ enableDestinations: boolean;
17879
+ /**
17880
+ * Enable locations for allow-udp
17881
+ */
17882
+ enableLocations: boolean;
17883
+ /**
17884
+ * List of user locations allowed for UDP traffic
17885
+ */
17886
+ locations: string[];
17887
+ }
17888
+ export interface GetForwardingProfileTypeGlobalProtectProxyForwardingRule {
17889
+ /**
17890
+ * Connectivity method for this forwarding rule (e.g. direct)
17891
+ */
17892
+ connectivity: string;
17893
+ /**
17894
+ * Destination scope this forwarding rule applies to
17895
+ */
17896
+ destinations: string;
17897
+ /**
17898
+ * Enable a basic forwarding rule
17899
+ */
17900
+ enabled: boolean;
17901
+ /**
17902
+ * Basic forwarding rule name as an alphanumeric string [ 0-9a-zA-Z._ -]
17903
+ */
17904
+ name: string;
17905
+ /**
17906
+ * User location scope this rule applies to
17907
+ */
17908
+ userLocations: string;
17909
+ }
17910
+ export interface GetForwardingProfileTypePacFile {
17911
+ /**
17912
+ * Basic block rule configuration for PAC file and GlobalProtect proxy profiles
17913
+ */
17914
+ blockRule: outputs.GetForwardingProfileTypePacFileBlockRule;
17915
+ /**
17916
+ * List of PAC file-based forwarding rules
17917
+ */
17918
+ forwardingRules: outputs.GetForwardingProfileTypePacFileForwardingRule[];
17919
+ /**
17920
+ * User upload PAC file for PAC file based forwarding configuration
17921
+ */
17922
+ pacUpload: boolean;
17923
+ }
17924
+ export interface GetForwardingProfileTypePacFileBlockRule {
17925
+ /**
17926
+ * TCP traffic allowlist configuration
17927
+ */
17928
+ allowTcp: outputs.GetForwardingProfileTypePacFileBlockRuleAllowTcp;
17929
+ /**
17930
+ * UDP traffic allowlist configuration with location and destination support
17931
+ */
17932
+ allowUdp: outputs.GetForwardingProfileTypePacFileBlockRuleAllowUdp;
17933
+ /**
17934
+ * Enable block rule
17935
+ */
17936
+ enable: boolean;
17937
+ }
17938
+ export interface GetForwardingProfileTypePacFileBlockRuleAllowTcp {
17939
+ /**
17940
+ * Enable locations for allow-tcp
17941
+ */
17942
+ enableLocations: boolean;
17943
+ /**
17944
+ * List of user locations allowed for TCP traffic
17945
+ */
17946
+ locations: string[];
17947
+ }
17948
+ export interface GetForwardingProfileTypePacFileBlockRuleAllowUdp {
17949
+ /**
17950
+ * Destination addresses or networks allowed for UDP traffic
17951
+ */
17952
+ destinations: string;
17953
+ /**
17954
+ * Enable destinations for allow-udp
17955
+ */
17956
+ enableDestinations: boolean;
17957
+ /**
17958
+ * Enable locations for allow-udp
17959
+ */
17960
+ enableLocations: boolean;
17961
+ /**
17962
+ * List of user locations allowed for UDP traffic
17963
+ */
17964
+ locations: string[];
17965
+ }
17966
+ export interface GetForwardingProfileTypePacFileForwardingRule {
17967
+ /**
17968
+ * Connectivity method for this forwarding rule (e.g. direct)
17969
+ */
17970
+ connectivity: string;
17971
+ /**
17972
+ * Destination scope this forwarding rule applies to
17973
+ */
17974
+ destinations: string;
17975
+ /**
17976
+ * Enable a basic forwarding rule
17977
+ */
17978
+ enabled: boolean;
17979
+ /**
17980
+ * Basic forwarding rule name as an alphanumeric string [ 0-9a-zA-Z._ -]
17981
+ */
17982
+ name: string;
17983
+ /**
17984
+ * User location scope this rule applies to
17985
+ */
17986
+ userLocations: string;
17987
+ }
17988
+ export interface GetForwardingProfileTypeZtnaAgent {
17989
+ /**
17990
+ * ZTNA block rule configuration
17991
+ */
17992
+ blockRule: outputs.GetForwardingProfileTypeZtnaAgentBlockRule;
17993
+ /**
17994
+ * List of ZTNA agent-based forwarding rules
17995
+ */
17996
+ forwardingRules: outputs.GetForwardingProfileTypeZtnaAgentForwardingRule[];
17997
+ /**
17998
+ * User uploaded PAC file for a ZTNA agent-based forwarding configuration
17999
+ */
18000
+ pacUpload: boolean;
18001
+ }
18002
+ export interface GetForwardingProfileTypeZtnaAgentBlockRule {
18003
+ /**
18004
+ * Allow ICMP for troubleshooting
18005
+ */
18006
+ allowIcmpForTroubleshooting: boolean;
18007
+ /**
18008
+ * Block all other unmatched outbound connections
18009
+ */
18010
+ blockAllOtherUnmatchedOutboundConnections: boolean;
18011
+ /**
18012
+ * Block inbound access when connected to tunnel
18013
+ */
18014
+ blockInboundAccessWhenConnectedToTunnel: boolean;
18015
+ /**
18016
+ * Block Non-TCP Non UDP based traffic when connected to tunnel
18017
+ */
18018
+ blockNonTcpNonUdpTrafficWhenConnectedToTunnel: boolean;
18019
+ /**
18020
+ * Block outbound LAN access when connected to tunnel
18021
+ */
18022
+ blockOutboundLanAccessWhenConnectedToTunnel: boolean;
18023
+ /**
18024
+ * Enforce FQDN DNS resolution via tunnel DNS servers
18025
+ */
18026
+ enforcerFqdnDnsResolutionViaDnsServers: boolean;
18027
+ /**
18028
+ * Resolve All FQDNs using DNS servers assigned by the tunnel (Windows Only)
18029
+ */
18030
+ resolveAllFqdnsUsingDnsServersAssignedByTheTunnel: boolean;
18031
+ }
18032
+ export interface GetForwardingProfileTypeZtnaAgentForwardingRule {
18033
+ /**
18034
+ * Connectivity method for this ZTNA forwarding rule (e.g. direct)
18035
+ */
18036
+ connectivity: string;
18037
+ /**
18038
+ * Destination scope this ZTNA forwarding rule applies to
18039
+ */
18040
+ destinations: string;
18041
+ /**
18042
+ * Enable a forwarding rule ztna
18043
+ */
18044
+ enabled: boolean;
18045
+ /**
18046
+ * Forwarding rule ZTNA name as an alphanumeric string [ 0-9a-zA-Z._ -]
18047
+ */
18048
+ name: string;
18049
+ /**
18050
+ * Source applications this ZTNA rule applies to
18051
+ */
18052
+ sourceApplications: string;
18053
+ /**
18054
+ * Type of traffic this ZTNA rule applies to (dns, network, or both)
18055
+ */
18056
+ trafficType: string;
18057
+ /**
18058
+ * User location scope this ZTNA rule applies to
18059
+ */
18060
+ userLocations: string;
18061
+ }
18062
+ export interface GetForwardingProfileUserLocationInternalHostDetection {
18063
+ /**
18064
+ * user location fqdn
18065
+ */
18066
+ fqdn: string;
18067
+ /**
18068
+ * user location ip address
18069
+ */
18070
+ ipAddress: string;
18071
+ }
18072
+ export interface GetForwardingProfileUserLocationListData {
18073
+ /**
18074
+ * Description of the user location
18075
+ */
18076
+ description: string;
18077
+ /**
18078
+ * The folder in which the resource is defined
18079
+ */
18080
+ folder: string;
18081
+ /**
18082
+ * The UUID of the user location
18083
+ */
18084
+ id: string;
18085
+ /**
18086
+ * Configuration for detecting internal hosts using IP address and FQDN
18087
+ */
18088
+ internalHostDetection: outputs.GetForwardingProfileUserLocationListDataInternalHostDetection;
18089
+ /**
18090
+ * List of IP addresses that define the user location
18091
+ */
18092
+ ipAddresses: string[];
18093
+ /**
18094
+ * alphanumeric string [ 0-9a-zA-Z._-]
18095
+ */
18096
+ name: string;
18097
+ /**
18098
+ * The Terraform ID.
18099
+ */
18100
+ tfid: string;
18101
+ }
18102
+ export interface GetForwardingProfileUserLocationListDataInternalHostDetection {
18103
+ /**
18104
+ * user location fqdn
18105
+ */
18106
+ fqdn: string;
18107
+ /**
18108
+ * user location ip address
18109
+ */
18110
+ ipAddress: string;
18111
+ }
16718
18112
  export interface GetGeneralSettingGeneral {
16719
18113
  /**
16720
18114
  * Force admins to acknowledge login banner
@@ -35902,6 +37296,10 @@ export interface GetSecurityRuleAllowUrlCategoryFileControl {
35902
37296
  upload: string;
35903
37297
  }
35904
37298
  export interface GetSecurityRuleAllowWebApplication {
37299
+ /**
37300
+ * App id
37301
+ */
37302
+ appId: string;
35905
37303
  /**
35906
37304
  * Application function
35907
37305
  */
@@ -36220,6 +37618,10 @@ export interface GetSecurityRuleListDataAllowUrlCategoryFileControl {
36220
37618
  upload: string;
36221
37619
  }
36222
37620
  export interface GetSecurityRuleListDataAllowWebApplication {
37621
+ /**
37622
+ * App id
37623
+ */
37624
+ appId: string;
36223
37625
  /**
36224
37626
  * Application function
36225
37627
  */
@@ -36400,6 +37802,10 @@ export interface GetServiceConnectionBgpPeer {
36400
37802
  * Peer ipv6 address
36401
37803
  */
36402
37804
  peerIpv6Address: string;
37805
+ /**
37806
+ * Same peer IP address for SC
37807
+ */
37808
+ sameAsPrimary: boolean;
36403
37809
  /**
36404
37810
  * Secret
36405
37811
  */
@@ -36490,6 +37896,10 @@ export interface GetServiceConnectionListData {
36490
37896
  * Region
36491
37897
  */
36492
37898
  region: string;
37899
+ /**
37900
+ * Region tag
37901
+ */
37902
+ regionTag: string;
36493
37903
  /**
36494
37904
  * Secondary ipsec tunnel
36495
37905
  */
@@ -36524,6 +37934,10 @@ export interface GetServiceConnectionListDataBgpPeer {
36524
37934
  * Peer ipv6 address
36525
37935
  */
36526
37936
  peerIpv6Address: string;
37937
+ /**
37938
+ * Same peer IP address for SC
37939
+ */
37940
+ sameAsPrimary: boolean;
36527
37941
  /**
36528
37942
  * Secret
36529
37943
  */
@@ -49939,7 +51353,7 @@ export interface MfaServerMfaVendorTypeOktaAdaptiveV1 {
49939
51353
  /**
49940
51354
  * Okta timeout (seconds)
49941
51355
  */
49942
- oktaTimeout: number;
51356
+ oktaTimeout: string;
49943
51357
  /**
49944
51358
  * Okta API token
49945
51359
  */
@@ -51176,6 +52590,10 @@ export interface SecurityRuleAllowUrlCategoryFileControl {
51176
52590
  upload?: string;
51177
52591
  }
51178
52592
  export interface SecurityRuleAllowWebApplication {
52593
+ /**
52594
+ * App id
52595
+ */
52596
+ appId: string;
51179
52597
  /**
51180
52598
  * Application function
51181
52599
  */
@@ -51330,6 +52748,10 @@ export interface ServiceConnectionBgpPeer {
51330
52748
  * Peer ipv6 address
51331
52749
  */
51332
52750
  peerIpv6Address?: string;
52751
+ /**
52752
+ * Same peer IP address for SC
52753
+ */
52754
+ sameAsPrimary?: boolean;
51333
52755
  /**
51334
52756
  * Secret
51335
52757
  */