catocli 2.0.5__py3-none-any.whl → 2.1.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of catocli might be problematic. Click here for more details.
- catocli/Utils/clidriver.py +32 -4
- catocli/Utils/version_checker.py +1 -1
- catocli/__init__.py +1 -1
- catocli/parsers/custom/export_sites/export_sites.py +18 -1
- catocli/parsers/custom/import_rules_to_tf/import_rules_to_tf.py +13 -2
- catocli/parsers/custom/import_sites_to_tf/__init__.py +3 -1
- catocli/parsers/custom/import_sites_to_tf/import_sites_to_tf.py +79 -6
- catocli/parsers/custom_private/__init__.py +134 -0
- catocli/parsers/mutation_accountManagement/__init__.py +13 -0
- catocli/parsers/mutation_accountManagement_disableAccount/README.md +16 -0
- catocli/parsers/mutation_groups/README.md +7 -0
- catocli/parsers/mutation_groups/__init__.py +48 -0
- catocli/parsers/mutation_groups_createGroup/README.md +18 -0
- catocli/parsers/mutation_groups_deleteGroup/README.md +18 -0
- catocli/parsers/mutation_groups_updateGroup/README.md +18 -0
- catocli/parsers/mutation_site/__init__.py +104 -0
- catocli/parsers/mutation_site_assignSiteBwLicense/README.md +17 -0
- catocli/parsers/mutation_site_removeSecondaryAwsVSocket/README.md +17 -0
- catocli/parsers/mutation_site_removeSecondaryAzureVSocket/README.md +17 -0
- catocli/parsers/mutation_site_removeSiteBwLicense/README.md +17 -0
- catocli/parsers/mutation_site_replaceSiteBwLicense/README.md +17 -0
- catocli/parsers/mutation_site_updateSecondaryAwsVSocket/README.md +17 -0
- catocli/parsers/mutation_site_updateSecondaryAzureVSocket/README.md +17 -0
- catocli/parsers/mutation_site_updateSiteBwLicense/README.md +17 -0
- catocli/parsers/mutation_site_updateSiteGeneralDetails/README.md +1 -1
- catocli/parsers/mutation_sites/__init__.py +104 -0
- catocli/parsers/mutation_sites_assignSiteBwLicense/README.md +17 -0
- catocli/parsers/mutation_sites_removeSecondaryAwsVSocket/README.md +17 -0
- catocli/parsers/mutation_sites_removeSecondaryAzureVSocket/README.md +17 -0
- catocli/parsers/mutation_sites_removeSiteBwLicense/README.md +17 -0
- catocli/parsers/mutation_sites_replaceSiteBwLicense/README.md +17 -0
- catocli/parsers/mutation_sites_updateSecondaryAwsVSocket/README.md +17 -0
- catocli/parsers/mutation_sites_updateSecondaryAzureVSocket/README.md +17 -0
- catocli/parsers/mutation_sites_updateSiteBwLicense/README.md +17 -0
- catocli/parsers/mutation_sites_updateSiteGeneralDetails/README.md +1 -1
- catocli/parsers/parserApiClient.py +444 -9
- catocli/parsers/query_eventsFeed/README.md +1 -1
- catocli/parsers/query_groups/README.md +7 -0
- catocli/parsers/query_groups/__init__.py +54 -0
- catocli/parsers/query_groups_group/README.md +7 -0
- catocli/parsers/query_groups_groupList/README.md +18 -0
- catocli/parsers/query_groups_group_members/README.md +18 -0
- catocli/parsers/query_groups_whereUsed/README.md +17 -0
- catocli/parsers/query_popLocations/README.md +17 -0
- catocli/parsers/query_popLocations/__init__.py +16 -0
- catocli/parsers/query_site/__init__.py +26 -0
- catocli/parsers/query_site_secondaryAwsVSocket/README.md +17 -0
- catocli/parsers/query_site_secondaryAzureVSocket/README.md +17 -0
- catocli/parsers/query_socketPortMetrics/README.md +23 -0
- catocli/parsers/query_socketPortMetrics/__init__.py +16 -0
- catocli/parsers/query_socketPortMetricsTimeSeries/README.md +24 -0
- catocli/parsers/query_socketPortMetricsTimeSeries/__init__.py +16 -0
- {catocli-2.0.5.dist-info → catocli-2.1.1.dist-info}/METADATA +3 -2
- {catocli-2.0.5.dist-info → catocli-2.1.1.dist-info}/RECORD +253 -300
- {catocli-2.0.5.dist-info → catocli-2.1.1.dist-info}/WHEEL +1 -1
- {catocli-2.0.5.dist-info → catocli-2.1.1.dist-info}/top_level.txt +0 -2
- graphql_client/api/call_api.py +20 -2
- models/mutation.accountManagement.addAccount.json +97 -0
- models/mutation.accountManagement.disableAccount.json +545 -0
- models/mutation.accountManagement.removeAccount.json +102 -3
- models/mutation.accountManagement.updateAccount.json +97 -0
- models/mutation.admin.addAdmin.json +6 -9
- models/mutation.container.delete.json +2 -2
- models/mutation.container.fqdn.addValues.json +3 -3
- models/mutation.container.fqdn.createFromFile.json +3 -3
- models/mutation.container.fqdn.removeValues.json +3 -3
- models/mutation.container.fqdn.updateFromFile.json +3 -3
- models/mutation.container.ipAddressRange.addValues.json +3 -3
- models/mutation.container.ipAddressRange.createFromFile.json +3 -3
- models/mutation.container.ipAddressRange.removeValues.json +3 -3
- models/mutation.container.ipAddressRange.updateFromFile.json +3 -3
- models/mutation.groups.createGroup.json +3178 -0
- models/mutation.groups.deleteGroup.json +2758 -0
- models/mutation.groups.updateGroup.json +4429 -0
- models/mutation.hardware.updateHardwareShipping.json +30 -10
- models/mutation.policy.appTenantRestriction.addRule.json +33 -33
- models/mutation.policy.appTenantRestriction.addSection.json +4 -4
- models/mutation.policy.appTenantRestriction.createPolicyRevision.json +33 -33
- models/mutation.policy.appTenantRestriction.discardPolicyRevision.json +33 -33
- models/mutation.policy.appTenantRestriction.moveRule.json +27 -27
- models/mutation.policy.appTenantRestriction.moveSection.json +4 -4
- models/mutation.policy.appTenantRestriction.publishPolicyRevision.json +33 -33
- models/mutation.policy.appTenantRestriction.removeRule.json +27 -27
- models/mutation.policy.appTenantRestriction.removeSection.json +4 -4
- models/mutation.policy.appTenantRestriction.updatePolicy.json +33 -33
- models/mutation.policy.appTenantRestriction.updateRule.json +33 -33
- models/mutation.policy.appTenantRestriction.updateSection.json +4 -4
- models/mutation.policy.dynamicIpAllocation.addRule.json +12 -12
- models/mutation.policy.dynamicIpAllocation.addSection.json +4 -4
- models/mutation.policy.dynamicIpAllocation.createPolicyRevision.json +18 -18
- models/mutation.policy.dynamicIpAllocation.discardPolicyRevision.json +18 -18
- models/mutation.policy.dynamicIpAllocation.moveRule.json +12 -12
- models/mutation.policy.dynamicIpAllocation.moveSection.json +4 -4
- models/mutation.policy.dynamicIpAllocation.publishPolicyRevision.json +18 -18
- models/mutation.policy.dynamicIpAllocation.removeRule.json +12 -12
- models/mutation.policy.dynamicIpAllocation.removeSection.json +4 -4
- models/mutation.policy.dynamicIpAllocation.updatePolicy.json +18 -18
- models/mutation.policy.dynamicIpAllocation.updateRule.json +12 -12
- models/mutation.policy.dynamicIpAllocation.updateSection.json +4 -4
- models/mutation.policy.internetFirewall.addRule.json +141 -141
- models/mutation.policy.internetFirewall.addSection.json +4 -4
- models/mutation.policy.internetFirewall.createPolicyRevision.json +102 -102
- models/mutation.policy.internetFirewall.discardPolicyRevision.json +102 -102
- models/mutation.policy.internetFirewall.moveRule.json +96 -96
- models/mutation.policy.internetFirewall.moveSection.json +4 -4
- models/mutation.policy.internetFirewall.publishPolicyRevision.json +102 -102
- models/mutation.policy.internetFirewall.removeRule.json +96 -96
- models/mutation.policy.internetFirewall.removeSection.json +4 -4
- models/mutation.policy.internetFirewall.updatePolicy.json +102 -102
- models/mutation.policy.internetFirewall.updateRule.json +141 -141
- models/mutation.policy.internetFirewall.updateSection.json +4 -4
- models/mutation.policy.remotePortFwd.addRule.json +21 -21
- models/mutation.policy.remotePortFwd.addSection.json +4 -4
- models/mutation.policy.remotePortFwd.createPolicyRevision.json +24 -24
- models/mutation.policy.remotePortFwd.discardPolicyRevision.json +24 -24
- models/mutation.policy.remotePortFwd.moveRule.json +18 -18
- models/mutation.policy.remotePortFwd.moveSection.json +4 -4
- models/mutation.policy.remotePortFwd.publishPolicyRevision.json +24 -24
- models/mutation.policy.remotePortFwd.removeRule.json +18 -18
- models/mutation.policy.remotePortFwd.removeSection.json +4 -4
- models/mutation.policy.remotePortFwd.updatePolicy.json +24 -24
- models/mutation.policy.remotePortFwd.updateRule.json +21 -21
- models/mutation.policy.remotePortFwd.updateSection.json +4 -4
- models/mutation.policy.socketLan.addRule.json +97 -97
- models/mutation.policy.socketLan.addSection.json +4 -4
- models/mutation.policy.socketLan.createPolicyRevision.json +91 -91
- models/mutation.policy.socketLan.discardPolicyRevision.json +91 -91
- models/mutation.policy.socketLan.moveRule.json +85 -85
- models/mutation.policy.socketLan.moveSection.json +4 -4
- models/mutation.policy.socketLan.publishPolicyRevision.json +91 -91
- models/mutation.policy.socketLan.removeRule.json +85 -85
- models/mutation.policy.socketLan.removeSection.json +4 -4
- models/mutation.policy.socketLan.updatePolicy.json +91 -91
- models/mutation.policy.socketLan.updateRule.json +97 -97
- models/mutation.policy.socketLan.updateSection.json +4 -4
- models/mutation.policy.terminalServer.addRule.json +7 -7
- models/mutation.policy.terminalServer.addSection.json +4 -4
- models/mutation.policy.terminalServer.createPolicyRevision.json +13 -13
- models/mutation.policy.terminalServer.discardPolicyRevision.json +13 -13
- models/mutation.policy.terminalServer.moveRule.json +7 -7
- models/mutation.policy.terminalServer.moveSection.json +4 -4
- models/mutation.policy.terminalServer.publishPolicyRevision.json +13 -13
- models/mutation.policy.terminalServer.removeRule.json +7 -7
- models/mutation.policy.terminalServer.removeSection.json +4 -4
- models/mutation.policy.terminalServer.updatePolicy.json +13 -13
- models/mutation.policy.terminalServer.updateRule.json +7 -7
- models/mutation.policy.terminalServer.updateSection.json +4 -4
- models/mutation.policy.wanFirewall.addRule.json +157 -157
- models/mutation.policy.wanFirewall.addSection.json +4 -4
- models/mutation.policy.wanFirewall.createPolicyRevision.json +121 -121
- models/mutation.policy.wanFirewall.discardPolicyRevision.json +121 -121
- models/mutation.policy.wanFirewall.moveRule.json +115 -115
- models/mutation.policy.wanFirewall.moveSection.json +4 -4
- models/mutation.policy.wanFirewall.publishPolicyRevision.json +121 -121
- models/mutation.policy.wanFirewall.removeRule.json +115 -115
- models/mutation.policy.wanFirewall.removeSection.json +4 -4
- models/mutation.policy.wanFirewall.updatePolicy.json +121 -121
- models/mutation.policy.wanFirewall.updateRule.json +157 -157
- models/mutation.policy.wanFirewall.updateSection.json +4 -4
- models/mutation.policy.wanNetwork.addRule.json +103 -103
- models/mutation.policy.wanNetwork.addSection.json +4 -4
- models/mutation.policy.wanNetwork.createPolicyRevision.json +97 -97
- models/mutation.policy.wanNetwork.discardPolicyRevision.json +97 -97
- models/mutation.policy.wanNetwork.moveRule.json +91 -91
- models/mutation.policy.wanNetwork.moveSection.json +4 -4
- models/mutation.policy.wanNetwork.publishPolicyRevision.json +97 -97
- models/mutation.policy.wanNetwork.removeRule.json +91 -91
- models/mutation.policy.wanNetwork.removeSection.json +4 -4
- models/mutation.policy.wanNetwork.updatePolicy.json +97 -97
- models/mutation.policy.wanNetwork.updateRule.json +103 -103
- models/mutation.policy.wanNetwork.updateSection.json +4 -4
- models/mutation.site.addBgpPeer.json +10 -10
- models/mutation.site.addIpsecIkeV2SiteTunnels.json +2 -2
- models/mutation.site.addSocketAddOnCard.json +2 -2
- models/mutation.site.assignSiteBwLicense.json +12879 -0
- models/mutation.site.removeBgpPeer.json +10 -10
- models/mutation.site.removeIpsecIkeV2SiteTunnels.json +2 -2
- models/mutation.site.removeSecondaryAwsVSocket.json +375 -0
- models/mutation.site.removeSecondaryAzureVSocket.json +354 -0
- models/mutation.site.removeSiteBwLicense.json +12822 -0
- models/mutation.site.removeSocketAddOnCard.json +2 -2
- models/mutation.site.replaceSiteBwLicense.json +12939 -0
- models/mutation.site.startSiteUpgrade.json +36 -15
- models/mutation.site.updateBgpPeer.json +10 -10
- models/mutation.site.updateIpsecIkeV2SiteTunnels.json +2 -2
- models/mutation.site.updateSecondaryAwsVSocket.json +643 -0
- models/mutation.site.updateSecondaryAzureVSocket.json +565 -0
- models/mutation.site.updateSiteBwLicense.json +12882 -0
- models/mutation.site.updateSiteGeneralDetails.json +724 -1
- models/mutation.sites.addBgpPeer.json +10 -10
- models/mutation.sites.addIpsecIkeV2SiteTunnels.json +2 -2
- models/mutation.sites.addSocketAddOnCard.json +2 -2
- models/mutation.sites.assignSiteBwLicense.json +12879 -0
- models/mutation.sites.removeBgpPeer.json +10 -10
- models/mutation.sites.removeIpsecIkeV2SiteTunnels.json +2 -2
- models/mutation.sites.removeSecondaryAwsVSocket.json +375 -0
- models/mutation.sites.removeSecondaryAzureVSocket.json +354 -0
- models/mutation.sites.removeSiteBwLicense.json +12822 -0
- models/mutation.sites.removeSocketAddOnCard.json +2 -2
- models/mutation.sites.replaceSiteBwLicense.json +12939 -0
- models/mutation.sites.startSiteUpgrade.json +36 -15
- models/mutation.sites.updateBgpPeer.json +10 -10
- models/mutation.sites.updateIpsecIkeV2SiteTunnels.json +2 -2
- models/mutation.sites.updateSecondaryAwsVSocket.json +643 -0
- models/mutation.sites.updateSecondaryAzureVSocket.json +565 -0
- models/mutation.sites.updateSiteBwLicense.json +12882 -0
- models/mutation.sites.updateSiteGeneralDetails.json +724 -1
- models/mutation.xdr.addStoryComment.json +1 -1
- models/mutation.xdr.analystFeedback.json +84 -84
- models/mutation.xdr.deleteStoryComment.json +1 -1
- models/query.accountManagement.json +97 -0
- models/query.accountMetrics.json +45 -45
- models/query.accountSnapshot.json +30 -30
- models/query.admin.json +6 -6
- models/query.admins.json +13 -13
- models/query.appStats.json +915 -867
- models/query.appStatsTimeSeries.json +692 -656
- models/query.auditFeed.json +6 -6
- models/query.catalogs.json +52 -52
- models/query.container.json +16 -16
- models/query.devices.json +20 -93
- models/query.entityLookup.json +2 -2
- models/query.events.json +288 -384
- models/query.eventsFeed.json +73 -97
- models/query.eventsTimeSeries.json +219 -291
- models/query.groups.group.members.json +3058 -0
- models/query.groups.groupList.json +6474 -0
- models/query.groups.whereUsed.json +697 -0
- models/query.hardware.json +27 -7
- models/query.hardwareManagement.json +8 -8
- models/query.licensing.json +3487 -1324
- models/query.policy.appTenantRestriction.policy.json +32 -32
- models/query.policy.dynamicIpAllocation.policy.json +18 -18
- models/query.policy.internetFirewall.policy.json +93 -93
- models/query.policy.remotePortFwd.policy.json +23 -23
- models/query.policy.socketLan.policy.json +88 -88
- models/query.policy.terminalServer.policy.json +13 -13
- models/query.policy.wanFirewall.policy.json +111 -111
- models/query.policy.wanNetwork.policy.json +97 -97
- models/query.popLocations.json +2878 -0
- models/query.sandbox.json +5 -5
- models/query.site.bgpPeer.json +4 -4
- models/query.site.bgpPeerList.json +10 -10
- models/query.site.secondaryAwsVSocket.json +340 -0
- models/query.site.secondaryAzureVSocket.json +319 -0
- models/query.site.siteBgpStatus.json +2 -2
- models/query.socketPortMetrics.json +2410 -0
- models/query.socketPortMetricsTimeSeries.json +2361 -0
- models/query.xdr.stories.json +104 -104
- models/query.xdr.story.json +93 -93
- schema/catolib.py +43 -16
- build/lib/catocli/Utils/clidriver.py +0 -268
- build/lib/catocli/Utils/profile_manager.py +0 -188
- build/lib/catocli/Utils/version_checker.py +0 -192
- build/lib/catocli/__init__.py +0 -2
- build/lib/catocli/__main__.py +0 -12
- build/lib/catocli/parsers/configure/__init__.py +0 -115
- build/lib/catocli/parsers/configure/configure.py +0 -307
- build/lib/catocli/parsers/custom/__init__.py +0 -57
- build/lib/catocli/parsers/custom/customLib.py +0 -561
- build/lib/catocli/parsers/custom/export_rules/__init__.py +0 -42
- build/lib/catocli/parsers/custom/export_rules/export_rules.py +0 -234
- build/lib/catocli/parsers/custom/export_sites/__init__.py +0 -21
- build/lib/catocli/parsers/custom/export_sites/export_sites.py +0 -372
- build/lib/catocli/parsers/custom/import_rules_to_tf/__init__.py +0 -58
- build/lib/catocli/parsers/custom/import_rules_to_tf/import_rules_to_tf.py +0 -451
- build/lib/catocli/parsers/custom/import_sites_to_tf/__init__.py +0 -45
- build/lib/catocli/parsers/custom/import_sites_to_tf/import_sites_to_tf.py +0 -891
- build/lib/catocli/parsers/mutation_accountManagement/__init__.py +0 -48
- build/lib/catocli/parsers/mutation_admin/__init__.py +0 -48
- build/lib/catocli/parsers/mutation_container/__init__.py +0 -138
- build/lib/catocli/parsers/mutation_hardware/__init__.py +0 -22
- build/lib/catocli/parsers/mutation_policy/__init__.py +0 -1305
- build/lib/catocli/parsers/mutation_sandbox/__init__.py +0 -35
- build/lib/catocli/parsers/mutation_site/__init__.py +0 -373
- build/lib/catocli/parsers/mutation_sites/__init__.py +0 -373
- build/lib/catocli/parsers/mutation_xdr/__init__.py +0 -48
- build/lib/catocli/parsers/parserApiClient.py +0 -513
- build/lib/catocli/parsers/query_accountBySubdomain/__init__.py +0 -16
- build/lib/catocli/parsers/query_accountManagement/__init__.py +0 -16
- build/lib/catocli/parsers/query_accountMetrics/__init__.py +0 -16
- build/lib/catocli/parsers/query_accountRoles/__init__.py +0 -16
- build/lib/catocli/parsers/query_accountSnapshot/__init__.py +0 -16
- build/lib/catocli/parsers/query_admin/__init__.py +0 -16
- build/lib/catocli/parsers/query_admins/__init__.py +0 -16
- build/lib/catocli/parsers/query_appStats/__init__.py +0 -16
- build/lib/catocli/parsers/query_appStatsTimeSeries/__init__.py +0 -16
- build/lib/catocli/parsers/query_auditFeed/__init__.py +0 -16
- build/lib/catocli/parsers/query_catalogs/__init__.py +0 -16
- build/lib/catocli/parsers/query_container/__init__.py +0 -16
- build/lib/catocli/parsers/query_devices/__init__.py +0 -16
- build/lib/catocli/parsers/query_entityLookup/__init__.py +0 -16
- build/lib/catocli/parsers/query_events/__init__.py +0 -16
- build/lib/catocli/parsers/query_eventsFeed/__init__.py +0 -16
- build/lib/catocli/parsers/query_eventsTimeSeries/__init__.py +0 -16
- build/lib/catocli/parsers/query_hardware/__init__.py +0 -16
- build/lib/catocli/parsers/query_hardwareManagement/__init__.py +0 -16
- build/lib/catocli/parsers/query_licensing/__init__.py +0 -16
- build/lib/catocli/parsers/query_policy/__init__.py +0 -161
- build/lib/catocli/parsers/query_sandbox/__init__.py +0 -16
- build/lib/catocli/parsers/query_site/__init__.py +0 -100
- build/lib/catocli/parsers/query_siteLocation/__init__.py +0 -13
- build/lib/catocli/parsers/query_subDomains/__init__.py +0 -16
- build/lib/catocli/parsers/query_xdr/__init__.py +0 -35
- build/lib/catocli/parsers/raw/__init__.py +0 -12
- build/lib/graphql_client/__init__.py +0 -11
- build/lib/graphql_client/api/__init__.py +0 -3
- build/lib/graphql_client/api/call_api.py +0 -84
- build/lib/graphql_client/api_client.py +0 -192
- build/lib/graphql_client/api_client_types.py +0 -409
- build/lib/graphql_client/configuration.py +0 -232
- build/lib/graphql_client/models/__init__.py +0 -13
- build/lib/graphql_client/models/no_schema.py +0 -71
- build/lib/schema/catolib.py +0 -1141
- build/lib/schema/importSchema.py +0 -60
- build/lib/schema/remove_policyid.py +0 -89
- build/lib/schema/remove_policyid_mutations.py +0 -89
- build/lib/scripts/catolib.py +0 -62
- build/lib/scripts/export_if_rules_to_json.py +0 -188
- build/lib/scripts/export_wf_rules_to_json.py +0 -111
- build/lib/scripts/import_wf_rules_to_tfstate.py +0 -331
- build/lib/vendor/certifi/__init__.py +0 -4
- build/lib/vendor/certifi/__main__.py +0 -12
- build/lib/vendor/certifi/core.py +0 -114
- build/lib/vendor/certifi/py.typed +0 -0
- build/lib/vendor/six.py +0 -998
- build/lib/vendor/urllib3/__init__.py +0 -211
- build/lib/vendor/urllib3/_base_connection.py +0 -172
- build/lib/vendor/urllib3/_collections.py +0 -483
- build/lib/vendor/urllib3/_request_methods.py +0 -278
- build/lib/vendor/urllib3/_version.py +0 -16
- build/lib/vendor/urllib3/connection.py +0 -1033
- build/lib/vendor/urllib3/connectionpool.py +0 -1182
- build/lib/vendor/urllib3/contrib/__init__.py +0 -0
- build/lib/vendor/urllib3/contrib/emscripten/__init__.py +0 -18
- build/lib/vendor/urllib3/contrib/emscripten/connection.py +0 -254
- build/lib/vendor/urllib3/contrib/emscripten/fetch.py +0 -418
- build/lib/vendor/urllib3/contrib/emscripten/request.py +0 -22
- build/lib/vendor/urllib3/contrib/emscripten/response.py +0 -285
- build/lib/vendor/urllib3/contrib/pyopenssl.py +0 -552
- build/lib/vendor/urllib3/contrib/socks.py +0 -228
- build/lib/vendor/urllib3/exceptions.py +0 -321
- build/lib/vendor/urllib3/fields.py +0 -341
- build/lib/vendor/urllib3/filepost.py +0 -89
- build/lib/vendor/urllib3/http2/__init__.py +0 -53
- build/lib/vendor/urllib3/http2/connection.py +0 -356
- build/lib/vendor/urllib3/http2/probe.py +0 -87
- build/lib/vendor/urllib3/poolmanager.py +0 -637
- build/lib/vendor/urllib3/py.typed +0 -2
- build/lib/vendor/urllib3/response.py +0 -1265
- build/lib/vendor/urllib3/util/__init__.py +0 -42
- build/lib/vendor/urllib3/util/connection.py +0 -137
- build/lib/vendor/urllib3/util/proxy.py +0 -43
- build/lib/vendor/urllib3/util/request.py +0 -256
- build/lib/vendor/urllib3/util/response.py +0 -101
- build/lib/vendor/urllib3/util/retry.py +0 -533
- build/lib/vendor/urllib3/util/ssl_.py +0 -513
- build/lib/vendor/urllib3/util/ssl_match_hostname.py +0 -159
- build/lib/vendor/urllib3/util/ssltransport.py +0 -276
- build/lib/vendor/urllib3/util/timeout.py +0 -275
- build/lib/vendor/urllib3/util/url.py +0 -471
- build/lib/vendor/urllib3/util/util.py +0 -42
- build/lib/vendor/urllib3/util/wait.py +0 -124
- {catocli-2.0.5.dist-info → catocli-2.1.1.dist-info}/entry_points.txt +0 -0
- {catocli-2.0.5.dist-info → catocli-2.1.1.dist-info/licenses}/LICENSE +0 -0
|
@@ -378,7 +378,7 @@
|
|
|
378
378
|
},
|
|
379
379
|
"country": {
|
|
380
380
|
"defaultValue": "[]",
|
|
381
|
-
"description": "Source country traffic matching criteria.\nLogical
|
|
381
|
+
"description": "Source country traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
382
382
|
"id_str": "addRule___input___rule___country",
|
|
383
383
|
"name": "country",
|
|
384
384
|
"path": "addRule.input.rule.country",
|
|
@@ -492,7 +492,7 @@
|
|
|
492
492
|
},
|
|
493
493
|
"destination": {
|
|
494
494
|
"defaultValue": "{application: [], customApp: [], appCategory: [], customCategory: [], sanctionedAppsCategory: [], country: [], domain: [], fqdn: [], ip: [], subnet: [], ipRange: [], globalIpRange: [], remoteAsn: [], containers: {fqdnContainer: [], ipAddressRangeContainer: []}}",
|
|
495
|
-
"description": "Destination traffic matching criteria.\nLogical
|
|
495
|
+
"description": "Destination traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
496
496
|
"id_str": "addRule___input___rule___destination",
|
|
497
497
|
"name": "destination",
|
|
498
498
|
"path": "addRule.input.rule.destination",
|
|
@@ -727,7 +727,7 @@
|
|
|
727
727
|
"inputFields": {
|
|
728
728
|
"by": {
|
|
729
729
|
"defaultValue": "ID",
|
|
730
|
-
"description": "Defines the object identification method
|
|
730
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
731
731
|
"id_str": "addRule___input___rule___destination___containers___fqdnContainer___by",
|
|
732
732
|
"name": "by",
|
|
733
733
|
"path": "addRule.input.rule.destination.containers.fqdnContainer.by",
|
|
@@ -822,7 +822,7 @@
|
|
|
822
822
|
"inputFields": {
|
|
823
823
|
"by": {
|
|
824
824
|
"defaultValue": "ID",
|
|
825
|
-
"description": "Defines the object identification method
|
|
825
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
826
826
|
"id_str": "addRule___input___rule___destination___containers___ipAddressRangeContainer___by",
|
|
827
827
|
"name": "by",
|
|
828
828
|
"path": "addRule.input.rule.destination.containers.ipAddressRangeContainer.by",
|
|
@@ -1108,7 +1108,7 @@
|
|
|
1108
1108
|
},
|
|
1109
1109
|
"customCategory": {
|
|
1110
1110
|
"defaultValue": "[]",
|
|
1111
|
-
"description": "Custom Categories
|
|
1111
|
+
"description": "Custom Categories \u2013 Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
|
|
1112
1112
|
"id_str": "addRule___input___rule___destination___customCategory",
|
|
1113
1113
|
"name": "customCategory",
|
|
1114
1114
|
"path": "addRule.input.rule.destination.customCategory",
|
|
@@ -1585,7 +1585,7 @@
|
|
|
1585
1585
|
},
|
|
1586
1586
|
"device": {
|
|
1587
1587
|
"defaultValue": "[]",
|
|
1588
|
-
"description": "Source Device Profile traffic matching criteria.\nLogical
|
|
1588
|
+
"description": "Source Device Profile traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
1589
1589
|
"id_str": "addRule___input___rule___device",
|
|
1590
1590
|
"name": "device",
|
|
1591
1591
|
"path": "addRule.input.rule.device",
|
|
@@ -1837,7 +1837,7 @@
|
|
|
1837
1837
|
},
|
|
1838
1838
|
"deviceOS": {
|
|
1839
1839
|
"defaultValue": "[]",
|
|
1840
|
-
"description": "Source device Operating System traffic matching criteria.\nLogical
|
|
1840
|
+
"description": "Source device Operating System traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
1841
1841
|
"id_str": "addRule___input___rule___deviceOS",
|
|
1842
1842
|
"name": "deviceOS",
|
|
1843
1843
|
"path": "addRule.input.rule.deviceOS",
|
|
@@ -2319,7 +2319,7 @@
|
|
|
2319
2319
|
"inputFields": {
|
|
2320
2320
|
"by": {
|
|
2321
2321
|
"defaultValue": "ID",
|
|
2322
|
-
"description": "Defines the object identification method
|
|
2322
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
2323
2323
|
"id_str": "addRule___input___rule___exceptions___destination___containers___fqdnContainer___by",
|
|
2324
2324
|
"name": "by",
|
|
2325
2325
|
"path": "addRule.input.rule.exceptions.destination.containers.fqdnContainer.by",
|
|
@@ -2414,7 +2414,7 @@
|
|
|
2414
2414
|
"inputFields": {
|
|
2415
2415
|
"by": {
|
|
2416
2416
|
"defaultValue": "ID",
|
|
2417
|
-
"description": "Defines the object identification method
|
|
2417
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
2418
2418
|
"id_str": "addRule___input___rule___exceptions___destination___containers___ipAddressRangeContainer___by",
|
|
2419
2419
|
"name": "by",
|
|
2420
2420
|
"path": "addRule.input.rule.exceptions.destination.containers.ipAddressRangeContainer.by",
|
|
@@ -2700,7 +2700,7 @@
|
|
|
2700
2700
|
},
|
|
2701
2701
|
"customCategory": {
|
|
2702
2702
|
"defaultValue": "[]",
|
|
2703
|
-
"description": "Custom Categories
|
|
2703
|
+
"description": "Custom Categories \u2013 Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
|
|
2704
2704
|
"id_str": "addRule___input___rule___exceptions___destination___customCategory",
|
|
2705
2705
|
"name": "customCategory",
|
|
2706
2706
|
"path": "addRule.input.rule.exceptions.destination.customCategory",
|
|
@@ -3855,7 +3855,7 @@
|
|
|
3855
3855
|
"inputFields": {
|
|
3856
3856
|
"by": {
|
|
3857
3857
|
"defaultValue": "ID",
|
|
3858
|
-
"description": "Defines the object identification method
|
|
3858
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
3859
3859
|
"id_str": "addRule___input___rule___exceptions___source___floatingSubnet___by",
|
|
3860
3860
|
"name": "by",
|
|
3861
3861
|
"path": "addRule.input.rule.exceptions.source.floatingSubnet.by",
|
|
@@ -5253,7 +5253,7 @@
|
|
|
5253
5253
|
},
|
|
5254
5254
|
"service": {
|
|
5255
5255
|
"defaultValue": "{standard: [], custom: []}",
|
|
5256
|
-
"description": "Destination service traffic matching criteria.\nLogical
|
|
5256
|
+
"description": "Destination service traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
5257
5257
|
"id_str": "addRule___input___rule___service",
|
|
5258
5258
|
"name": "service",
|
|
5259
5259
|
"path": "addRule.input.rule.service",
|
|
@@ -5561,7 +5561,7 @@
|
|
|
5561
5561
|
},
|
|
5562
5562
|
"source": {
|
|
5563
5563
|
"defaultValue": "{ip: [], host: [], site: [], subnet: [], ipRange: [], globalIpRange: [], networkInterface: [], siteNetworkSubnet: [], floatingSubnet: [], user: [], usersGroup: [], group: [], systemGroup: []}",
|
|
5564
|
-
"description": "Source traffic matching criteria.\nLogical
|
|
5564
|
+
"description": "Source traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
5565
5565
|
"id_str": "addRule___input___rule___source",
|
|
5566
5566
|
"name": "source",
|
|
5567
5567
|
"path": "addRule.input.rule.source",
|
|
@@ -5591,7 +5591,7 @@
|
|
|
5591
5591
|
"inputFields": {
|
|
5592
5592
|
"by": {
|
|
5593
5593
|
"defaultValue": "ID",
|
|
5594
|
-
"description": "Defines the object identification method
|
|
5594
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
5595
5595
|
"id_str": "addRule___input___rule___source___floatingSubnet___by",
|
|
5596
5596
|
"name": "by",
|
|
5597
5597
|
"path": "addRule.input.rule.source.floatingSubnet.by",
|
|
@@ -6685,7 +6685,7 @@
|
|
|
6685
6685
|
"inputFields": {
|
|
6686
6686
|
"enabled": {
|
|
6687
6687
|
"defaultValue": "false",
|
|
6688
|
-
"description": "TRUE
|
|
6688
|
+
"description": "TRUE \u2013 send alerts when the rule is matched, FALSE \u2013 don\u2019t send alerts when the rule is matched",
|
|
6689
6689
|
"id_str": "addRule___input___rule___tracking___alert___enabled",
|
|
6690
6690
|
"name": "enabled",
|
|
6691
6691
|
"path": "addRule.input.rule.tracking.alert.enabled",
|
|
@@ -7743,7 +7743,7 @@
|
|
|
7743
7743
|
},
|
|
7744
7744
|
"country": {
|
|
7745
7745
|
"defaultValue": "[]",
|
|
7746
|
-
"description": "Source country traffic matching criteria.\nLogical
|
|
7746
|
+
"description": "Source country traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
7747
7747
|
"id_str": "addRule___input___rule___country",
|
|
7748
7748
|
"name": "country",
|
|
7749
7749
|
"path": "addRule.input.rule.country",
|
|
@@ -7857,7 +7857,7 @@
|
|
|
7857
7857
|
},
|
|
7858
7858
|
"destination": {
|
|
7859
7859
|
"defaultValue": "{application: [], customApp: [], appCategory: [], customCategory: [], sanctionedAppsCategory: [], country: [], domain: [], fqdn: [], ip: [], subnet: [], ipRange: [], globalIpRange: [], remoteAsn: [], containers: {fqdnContainer: [], ipAddressRangeContainer: []}}",
|
|
7860
|
-
"description": "Destination traffic matching criteria.\nLogical
|
|
7860
|
+
"description": "Destination traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
7861
7861
|
"id_str": "addRule___input___rule___destination",
|
|
7862
7862
|
"name": "destination",
|
|
7863
7863
|
"path": "addRule.input.rule.destination",
|
|
@@ -8092,7 +8092,7 @@
|
|
|
8092
8092
|
"inputFields": {
|
|
8093
8093
|
"by": {
|
|
8094
8094
|
"defaultValue": "ID",
|
|
8095
|
-
"description": "Defines the object identification method
|
|
8095
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
8096
8096
|
"id_str": "addRule___input___rule___destination___containers___fqdnContainer___by",
|
|
8097
8097
|
"name": "by",
|
|
8098
8098
|
"path": "addRule.input.rule.destination.containers.fqdnContainer.by",
|
|
@@ -8187,7 +8187,7 @@
|
|
|
8187
8187
|
"inputFields": {
|
|
8188
8188
|
"by": {
|
|
8189
8189
|
"defaultValue": "ID",
|
|
8190
|
-
"description": "Defines the object identification method
|
|
8190
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
8191
8191
|
"id_str": "addRule___input___rule___destination___containers___ipAddressRangeContainer___by",
|
|
8192
8192
|
"name": "by",
|
|
8193
8193
|
"path": "addRule.input.rule.destination.containers.ipAddressRangeContainer.by",
|
|
@@ -8473,7 +8473,7 @@
|
|
|
8473
8473
|
},
|
|
8474
8474
|
"customCategory": {
|
|
8475
8475
|
"defaultValue": "[]",
|
|
8476
|
-
"description": "Custom Categories
|
|
8476
|
+
"description": "Custom Categories \u2013 Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
|
|
8477
8477
|
"id_str": "addRule___input___rule___destination___customCategory",
|
|
8478
8478
|
"name": "customCategory",
|
|
8479
8479
|
"path": "addRule.input.rule.destination.customCategory",
|
|
@@ -8950,7 +8950,7 @@
|
|
|
8950
8950
|
},
|
|
8951
8951
|
"device": {
|
|
8952
8952
|
"defaultValue": "[]",
|
|
8953
|
-
"description": "Source Device Profile traffic matching criteria.\nLogical
|
|
8953
|
+
"description": "Source Device Profile traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
8954
8954
|
"id_str": "addRule___input___rule___device",
|
|
8955
8955
|
"name": "device",
|
|
8956
8956
|
"path": "addRule.input.rule.device",
|
|
@@ -9202,7 +9202,7 @@
|
|
|
9202
9202
|
},
|
|
9203
9203
|
"deviceOS": {
|
|
9204
9204
|
"defaultValue": "[]",
|
|
9205
|
-
"description": "Source device Operating System traffic matching criteria.\nLogical
|
|
9205
|
+
"description": "Source device Operating System traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
9206
9206
|
"id_str": "addRule___input___rule___deviceOS",
|
|
9207
9207
|
"name": "deviceOS",
|
|
9208
9208
|
"path": "addRule.input.rule.deviceOS",
|
|
@@ -9684,7 +9684,7 @@
|
|
|
9684
9684
|
"inputFields": {
|
|
9685
9685
|
"by": {
|
|
9686
9686
|
"defaultValue": "ID",
|
|
9687
|
-
"description": "Defines the object identification method
|
|
9687
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
9688
9688
|
"id_str": "addRule___input___rule___exceptions___destination___containers___fqdnContainer___by",
|
|
9689
9689
|
"name": "by",
|
|
9690
9690
|
"path": "addRule.input.rule.exceptions.destination.containers.fqdnContainer.by",
|
|
@@ -9779,7 +9779,7 @@
|
|
|
9779
9779
|
"inputFields": {
|
|
9780
9780
|
"by": {
|
|
9781
9781
|
"defaultValue": "ID",
|
|
9782
|
-
"description": "Defines the object identification method
|
|
9782
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
9783
9783
|
"id_str": "addRule___input___rule___exceptions___destination___containers___ipAddressRangeContainer___by",
|
|
9784
9784
|
"name": "by",
|
|
9785
9785
|
"path": "addRule.input.rule.exceptions.destination.containers.ipAddressRangeContainer.by",
|
|
@@ -10065,7 +10065,7 @@
|
|
|
10065
10065
|
},
|
|
10066
10066
|
"customCategory": {
|
|
10067
10067
|
"defaultValue": "[]",
|
|
10068
|
-
"description": "Custom Categories
|
|
10068
|
+
"description": "Custom Categories \u2013 Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
|
|
10069
10069
|
"id_str": "addRule___input___rule___exceptions___destination___customCategory",
|
|
10070
10070
|
"name": "customCategory",
|
|
10071
10071
|
"path": "addRule.input.rule.exceptions.destination.customCategory",
|
|
@@ -11220,7 +11220,7 @@
|
|
|
11220
11220
|
"inputFields": {
|
|
11221
11221
|
"by": {
|
|
11222
11222
|
"defaultValue": "ID",
|
|
11223
|
-
"description": "Defines the object identification method
|
|
11223
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
11224
11224
|
"id_str": "addRule___input___rule___exceptions___source___floatingSubnet___by",
|
|
11225
11225
|
"name": "by",
|
|
11226
11226
|
"path": "addRule.input.rule.exceptions.source.floatingSubnet.by",
|
|
@@ -12618,7 +12618,7 @@
|
|
|
12618
12618
|
},
|
|
12619
12619
|
"service": {
|
|
12620
12620
|
"defaultValue": "{standard: [], custom: []}",
|
|
12621
|
-
"description": "Destination service traffic matching criteria.\nLogical
|
|
12621
|
+
"description": "Destination service traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
12622
12622
|
"id_str": "addRule___input___rule___service",
|
|
12623
12623
|
"name": "service",
|
|
12624
12624
|
"path": "addRule.input.rule.service",
|
|
@@ -12926,7 +12926,7 @@
|
|
|
12926
12926
|
},
|
|
12927
12927
|
"source": {
|
|
12928
12928
|
"defaultValue": "{ip: [], host: [], site: [], subnet: [], ipRange: [], globalIpRange: [], networkInterface: [], siteNetworkSubnet: [], floatingSubnet: [], user: [], usersGroup: [], group: [], systemGroup: []}",
|
|
12929
|
-
"description": "Source traffic matching criteria.\nLogical
|
|
12929
|
+
"description": "Source traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
12930
12930
|
"id_str": "addRule___input___rule___source",
|
|
12931
12931
|
"name": "source",
|
|
12932
12932
|
"path": "addRule.input.rule.source",
|
|
@@ -12956,7 +12956,7 @@
|
|
|
12956
12956
|
"inputFields": {
|
|
12957
12957
|
"by": {
|
|
12958
12958
|
"defaultValue": "ID",
|
|
12959
|
-
"description": "Defines the object identification method
|
|
12959
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
12960
12960
|
"id_str": "addRule___input___rule___source___floatingSubnet___by",
|
|
12961
12961
|
"name": "by",
|
|
12962
12962
|
"path": "addRule.input.rule.source.floatingSubnet.by",
|
|
@@ -14050,7 +14050,7 @@
|
|
|
14050
14050
|
"inputFields": {
|
|
14051
14051
|
"enabled": {
|
|
14052
14052
|
"defaultValue": "false",
|
|
14053
|
-
"description": "TRUE
|
|
14053
|
+
"description": "TRUE \u2013 send alerts when the rule is matched, FALSE \u2013 don\u2019t send alerts when the rule is matched",
|
|
14054
14054
|
"id_str": "addRule___input___rule___tracking___alert___enabled",
|
|
14055
14055
|
"name": "enabled",
|
|
14056
14056
|
"path": "addRule.input.rule.tracking.alert.enabled",
|
|
@@ -15058,7 +15058,7 @@
|
|
|
15058
15058
|
},
|
|
15059
15059
|
"country": {
|
|
15060
15060
|
"defaultValue": "[]",
|
|
15061
|
-
"description": "Source country traffic matching criteria.\nLogical
|
|
15061
|
+
"description": "Source country traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
15062
15062
|
"id_str": "addRule___input___rule___country",
|
|
15063
15063
|
"name": "country",
|
|
15064
15064
|
"path": "addRule.input.rule.country",
|
|
@@ -15172,7 +15172,7 @@
|
|
|
15172
15172
|
},
|
|
15173
15173
|
"destination": {
|
|
15174
15174
|
"defaultValue": "{application: [], customApp: [], appCategory: [], customCategory: [], sanctionedAppsCategory: [], country: [], domain: [], fqdn: [], ip: [], subnet: [], ipRange: [], globalIpRange: [], remoteAsn: [], containers: {fqdnContainer: [], ipAddressRangeContainer: []}}",
|
|
15175
|
-
"description": "Destination traffic matching criteria.\nLogical
|
|
15175
|
+
"description": "Destination traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
15176
15176
|
"id_str": "addRule___input___rule___destination",
|
|
15177
15177
|
"name": "destination",
|
|
15178
15178
|
"path": "addRule.input.rule.destination",
|
|
@@ -15407,7 +15407,7 @@
|
|
|
15407
15407
|
"inputFields": {
|
|
15408
15408
|
"by": {
|
|
15409
15409
|
"defaultValue": "ID",
|
|
15410
|
-
"description": "Defines the object identification method
|
|
15410
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
15411
15411
|
"id_str": "addRule___input___rule___destination___containers___fqdnContainer___by",
|
|
15412
15412
|
"name": "by",
|
|
15413
15413
|
"path": "addRule.input.rule.destination.containers.fqdnContainer.by",
|
|
@@ -15502,7 +15502,7 @@
|
|
|
15502
15502
|
"inputFields": {
|
|
15503
15503
|
"by": {
|
|
15504
15504
|
"defaultValue": "ID",
|
|
15505
|
-
"description": "Defines the object identification method
|
|
15505
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
15506
15506
|
"id_str": "addRule___input___rule___destination___containers___ipAddressRangeContainer___by",
|
|
15507
15507
|
"name": "by",
|
|
15508
15508
|
"path": "addRule.input.rule.destination.containers.ipAddressRangeContainer.by",
|
|
@@ -15788,7 +15788,7 @@
|
|
|
15788
15788
|
},
|
|
15789
15789
|
"customCategory": {
|
|
15790
15790
|
"defaultValue": "[]",
|
|
15791
|
-
"description": "Custom Categories
|
|
15791
|
+
"description": "Custom Categories \u2013 Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
|
|
15792
15792
|
"id_str": "addRule___input___rule___destination___customCategory",
|
|
15793
15793
|
"name": "customCategory",
|
|
15794
15794
|
"path": "addRule.input.rule.destination.customCategory",
|
|
@@ -16265,7 +16265,7 @@
|
|
|
16265
16265
|
},
|
|
16266
16266
|
"device": {
|
|
16267
16267
|
"defaultValue": "[]",
|
|
16268
|
-
"description": "Source Device Profile traffic matching criteria.\nLogical
|
|
16268
|
+
"description": "Source Device Profile traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
16269
16269
|
"id_str": "addRule___input___rule___device",
|
|
16270
16270
|
"name": "device",
|
|
16271
16271
|
"path": "addRule.input.rule.device",
|
|
@@ -16517,7 +16517,7 @@
|
|
|
16517
16517
|
},
|
|
16518
16518
|
"deviceOS": {
|
|
16519
16519
|
"defaultValue": "[]",
|
|
16520
|
-
"description": "Source device Operating System traffic matching criteria.\nLogical
|
|
16520
|
+
"description": "Source device Operating System traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
16521
16521
|
"id_str": "addRule___input___rule___deviceOS",
|
|
16522
16522
|
"name": "deviceOS",
|
|
16523
16523
|
"path": "addRule.input.rule.deviceOS",
|
|
@@ -16999,7 +16999,7 @@
|
|
|
16999
16999
|
"inputFields": {
|
|
17000
17000
|
"by": {
|
|
17001
17001
|
"defaultValue": "ID",
|
|
17002
|
-
"description": "Defines the object identification method
|
|
17002
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
17003
17003
|
"id_str": "addRule___input___rule___exceptions___destination___containers___fqdnContainer___by",
|
|
17004
17004
|
"name": "by",
|
|
17005
17005
|
"path": "addRule.input.rule.exceptions.destination.containers.fqdnContainer.by",
|
|
@@ -17094,7 +17094,7 @@
|
|
|
17094
17094
|
"inputFields": {
|
|
17095
17095
|
"by": {
|
|
17096
17096
|
"defaultValue": "ID",
|
|
17097
|
-
"description": "Defines the object identification method
|
|
17097
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
17098
17098
|
"id_str": "addRule___input___rule___exceptions___destination___containers___ipAddressRangeContainer___by",
|
|
17099
17099
|
"name": "by",
|
|
17100
17100
|
"path": "addRule.input.rule.exceptions.destination.containers.ipAddressRangeContainer.by",
|
|
@@ -17380,7 +17380,7 @@
|
|
|
17380
17380
|
},
|
|
17381
17381
|
"customCategory": {
|
|
17382
17382
|
"defaultValue": "[]",
|
|
17383
|
-
"description": "Custom Categories
|
|
17383
|
+
"description": "Custom Categories \u2013 Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
|
|
17384
17384
|
"id_str": "addRule___input___rule___exceptions___destination___customCategory",
|
|
17385
17385
|
"name": "customCategory",
|
|
17386
17386
|
"path": "addRule.input.rule.exceptions.destination.customCategory",
|
|
@@ -18535,7 +18535,7 @@
|
|
|
18535
18535
|
"inputFields": {
|
|
18536
18536
|
"by": {
|
|
18537
18537
|
"defaultValue": "ID",
|
|
18538
|
-
"description": "Defines the object identification method
|
|
18538
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
18539
18539
|
"id_str": "addRule___input___rule___exceptions___source___floatingSubnet___by",
|
|
18540
18540
|
"name": "by",
|
|
18541
18541
|
"path": "addRule.input.rule.exceptions.source.floatingSubnet.by",
|
|
@@ -19933,7 +19933,7 @@
|
|
|
19933
19933
|
},
|
|
19934
19934
|
"service": {
|
|
19935
19935
|
"defaultValue": "{standard: [], custom: []}",
|
|
19936
|
-
"description": "Destination service traffic matching criteria.\nLogical
|
|
19936
|
+
"description": "Destination service traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
19937
19937
|
"id_str": "addRule___input___rule___service",
|
|
19938
19938
|
"name": "service",
|
|
19939
19939
|
"path": "addRule.input.rule.service",
|
|
@@ -20241,7 +20241,7 @@
|
|
|
20241
20241
|
},
|
|
20242
20242
|
"source": {
|
|
20243
20243
|
"defaultValue": "{ip: [], host: [], site: [], subnet: [], ipRange: [], globalIpRange: [], networkInterface: [], siteNetworkSubnet: [], floatingSubnet: [], user: [], usersGroup: [], group: [], systemGroup: []}",
|
|
20244
|
-
"description": "Source traffic matching criteria.\nLogical
|
|
20244
|
+
"description": "Source traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
20245
20245
|
"id_str": "addRule___input___rule___source",
|
|
20246
20246
|
"name": "source",
|
|
20247
20247
|
"path": "addRule.input.rule.source",
|
|
@@ -20271,7 +20271,7 @@
|
|
|
20271
20271
|
"inputFields": {
|
|
20272
20272
|
"by": {
|
|
20273
20273
|
"defaultValue": "ID",
|
|
20274
|
-
"description": "Defines the object identification method
|
|
20274
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
20275
20275
|
"id_str": "addRule___input___rule___source___floatingSubnet___by",
|
|
20276
20276
|
"name": "by",
|
|
20277
20277
|
"path": "addRule.input.rule.source.floatingSubnet.by",
|
|
@@ -21365,7 +21365,7 @@
|
|
|
21365
21365
|
"inputFields": {
|
|
21366
21366
|
"enabled": {
|
|
21367
21367
|
"defaultValue": "false",
|
|
21368
|
-
"description": "TRUE
|
|
21368
|
+
"description": "TRUE \u2013 send alerts when the rule is matched, FALSE \u2013 don\u2019t send alerts when the rule is matched",
|
|
21369
21369
|
"id_str": "addRule___input___rule___tracking___alert___enabled",
|
|
21370
21370
|
"name": "enabled",
|
|
21371
21371
|
"path": "addRule.input.rule.tracking.alert.enabled",
|
|
@@ -21852,7 +21852,7 @@
|
|
|
21852
21852
|
"enumValues": null,
|
|
21853
21853
|
"fields": {
|
|
21854
21854
|
"errors": {
|
|
21855
|
-
"alias": "
|
|
21855
|
+
"alias": "errorsInternetFirewallRuleMutationPayload: errors",
|
|
21856
21856
|
"args": {},
|
|
21857
21857
|
"deprecationReason": null,
|
|
21858
21858
|
"description": null,
|
|
@@ -21865,7 +21865,7 @@
|
|
|
21865
21865
|
"responseStr": "errors:$policyMutationError ",
|
|
21866
21866
|
"type": {
|
|
21867
21867
|
"definition": {
|
|
21868
|
-
"description": "The `PolicyMutationError` enum defines various error messages related to policy publishing in the policy platform service.\n\n## Policy Errors\n\n### `ConcurrentPolicyPublish`\n- **Error Message:** \"Another policy is currently publishing\"\n\n### `PolicyRevisionMismatch`\n- **Error Message:** \"Revision is not owned by the admin\"\n\n### `PolicyRevisionNotFound`\n- **Error Message:** \"Revision was not found\"\n\n### `PolicyInvalidEntity`\n- **Error Message:** \"Invalid entity\"\n\n### `DuplicateRuleName`\n- **Error Message:** \"Rule with the same name already exists\"\n\n### `DuplicateSectionName`\n- **Error Message:** \"Section with the same name already exists\"\n\n### `PolicyFailure`\n- **Error Message:** \"Can
|
|
21868
|
+
"description": "The `PolicyMutationError` enum defines various error messages related to policy publishing in the policy platform service.\n\n## Policy Errors\n\n### `ConcurrentPolicyPublish`\n- **Error Message:** \"Another policy is currently publishing\"\n\n### `PolicyRevisionMismatch`\n- **Error Message:** \"Revision is not owned by the admin\"\n\n### `PolicyRevisionNotFound`\n- **Error Message:** \"Revision was not found\"\n\n### `PolicyInvalidEntity`\n- **Error Message:** \"Invalid entity\"\n\n### `DuplicateRuleName`\n- **Error Message:** \"Rule with the same name already exists\"\n\n### `DuplicateSectionName`\n- **Error Message:** \"Section with the same name already exists\"\n\n### `PolicyFailure`\n- **Error Message:** \"Can\u2019t publish policy due to an internal error. Please try again in a few minutes\"\n\n\n## Rule Errors\n\n### `ruleIsLocked`\n- **Error Message:** \"Rule is locked by another revision\"\n\n### `ruleWasRemoved`\n- **Error Message:** \"Rule was already removed\"\n\n### `ruleNotExist`\n- **Error Message:** \"Rule does not exist\"\n\n### `ruleSectionNotExist`\n- **Error Message:** \"Section does not exist\"\n\n### `ruleSectionIsLocked`\n- **Error Message:** \"Section is locked by another revision\"\n\n### `rulePositionInvalid`\n- **Error Message:** \"Rule position is invalid\"\n\n### `ruleNameIsEmpty`\n- **Error Message:** \"Rule name can't be empty\"\n\n### `ruleNameAlreadyExists`\n- **Error Message:** \"Rule with the same name already exists\"\n\n### `ruleSystemModification`\n- **Error Message:** \"Can't modify a system rule\"\n\n### `ruleSystemMove`\n- **Error Message:** \"Can't add a rule above the system rules\"\n\n### `ruleHasInvalidEntity`\n- **Error Message:** \"Rule has an invalid entity\"\n\n### `failedValidatingRule`\n- **Error Message:** \"Something went wrong, couldn't validate rule\"\n\n\n## Section Errors\n\n### `sectionIsLocked`\n- **Error Message:** \"Section is locked by another revision\"\n\n### `sectionSystemMove`\n- **Error Message:** \"Section with system rules cannot be moved or removed\"\n\n### `sectionNotExist`\n- **Error Message:** \"Section does not exist\"\n\n### `sectionPositionInvalid`\n- **Error Message:** \"Section position is invalid\"",
|
|
21869
21869
|
"enumValues": null,
|
|
21870
21870
|
"fields": {
|
|
21871
21871
|
"errorCode": {
|
|
@@ -21928,7 +21928,7 @@
|
|
|
21928
21928
|
"varName": "policyMutationError"
|
|
21929
21929
|
},
|
|
21930
21930
|
"rule": {
|
|
21931
|
-
"alias": "
|
|
21931
|
+
"alias": "ruleInternetFirewallRuleMutationPayload: rule",
|
|
21932
21932
|
"args": {},
|
|
21933
21933
|
"deprecationReason": null,
|
|
21934
21934
|
"description": null,
|
|
@@ -22113,7 +22113,7 @@
|
|
|
22113
22113
|
"enumValues": null,
|
|
22114
22114
|
"fields": {
|
|
22115
22115
|
"action": {
|
|
22116
|
-
"alias": "
|
|
22116
|
+
"alias": "actionInternetFirewallRule: action",
|
|
22117
22117
|
"args": {},
|
|
22118
22118
|
"deprecationReason": null,
|
|
22119
22119
|
"description": "The action applied by the Internet Firewall if the rule is matched",
|
|
@@ -22171,7 +22171,7 @@
|
|
|
22171
22171
|
"varName": "action"
|
|
22172
22172
|
},
|
|
22173
22173
|
"activePeriod": {
|
|
22174
|
-
"alias": "
|
|
22174
|
+
"alias": "activePeriodInternetFirewallRule: activePeriod",
|
|
22175
22175
|
"args": {},
|
|
22176
22176
|
"deprecationReason": null,
|
|
22177
22177
|
"description": "The time period during which the rule is active, outside this period, the rule is inactive",
|
|
@@ -22287,7 +22287,7 @@
|
|
|
22287
22287
|
"varName": "policyRuleActivePeriod"
|
|
22288
22288
|
},
|
|
22289
22289
|
"connectionOrigin": {
|
|
22290
|
-
"alias": "
|
|
22290
|
+
"alias": "connectionOriginInternetFirewallRule: connectionOrigin",
|
|
22291
22291
|
"args": {},
|
|
22292
22292
|
"deprecationReason": null,
|
|
22293
22293
|
"description": "Connection origin of the traffic",
|
|
@@ -22339,10 +22339,10 @@
|
|
|
22339
22339
|
"varName": "connectionOrigin"
|
|
22340
22340
|
},
|
|
22341
22341
|
"country": {
|
|
22342
|
-
"alias": "
|
|
22342
|
+
"alias": "countryInternetFirewallRule: country",
|
|
22343
22343
|
"args": {},
|
|
22344
22344
|
"deprecationReason": null,
|
|
22345
|
-
"description": "Source country traffic matching criteria.\nLogical
|
|
22345
|
+
"description": "Source country traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
22346
22346
|
"id_str": "internetFirewall___addRule___rule___rule___country",
|
|
22347
22347
|
"isDeprecated": false,
|
|
22348
22348
|
"name": "country",
|
|
@@ -22438,10 +22438,10 @@
|
|
|
22438
22438
|
"varName": "description"
|
|
22439
22439
|
},
|
|
22440
22440
|
"destination": {
|
|
22441
|
-
"alias": "
|
|
22441
|
+
"alias": "destinationInternetFirewallRule: destination",
|
|
22442
22442
|
"args": {},
|
|
22443
22443
|
"deprecationReason": null,
|
|
22444
|
-
"description": "Destination traffic matching criteria.\nLogical
|
|
22444
|
+
"description": "Destination traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
22445
22445
|
"id_str": "internetFirewall___addRule___rule___rule___destination",
|
|
22446
22446
|
"isDeprecated": false,
|
|
22447
22447
|
"name": "destination",
|
|
@@ -22455,7 +22455,7 @@
|
|
|
22455
22455
|
"enumValues": null,
|
|
22456
22456
|
"fields": {
|
|
22457
22457
|
"appCategory": {
|
|
22458
|
-
"alias": "
|
|
22458
|
+
"alias": "appCategoryInternetFirewallDestination: appCategory",
|
|
22459
22459
|
"args": {},
|
|
22460
22460
|
"deprecationReason": null,
|
|
22461
22461
|
"description": "Cato category of applications which are dynamically updated by Cato",
|
|
@@ -22533,7 +22533,7 @@
|
|
|
22533
22533
|
"varName": "applicationCategoryRef"
|
|
22534
22534
|
},
|
|
22535
22535
|
"application": {
|
|
22536
|
-
"alias": "
|
|
22536
|
+
"alias": "applicationInternetFirewallDestination: application",
|
|
22537
22537
|
"args": {},
|
|
22538
22538
|
"deprecationReason": null,
|
|
22539
22539
|
"description": "Applications for the rule (pre-defined)",
|
|
@@ -22611,7 +22611,7 @@
|
|
|
22611
22611
|
"varName": "applicationRef"
|
|
22612
22612
|
},
|
|
22613
22613
|
"containers": {
|
|
22614
|
-
"alias": "
|
|
22614
|
+
"alias": "containersInternetFirewallDestination: containers",
|
|
22615
22615
|
"args": {},
|
|
22616
22616
|
"deprecationReason": null,
|
|
22617
22617
|
"description": null,
|
|
@@ -22628,7 +22628,7 @@
|
|
|
22628
22628
|
"enumValues": null,
|
|
22629
22629
|
"fields": {
|
|
22630
22630
|
"fqdnContainer": {
|
|
22631
|
-
"alias": "
|
|
22631
|
+
"alias": "fqdnContainerInternetFirewallContainer: fqdnContainer",
|
|
22632
22632
|
"args": {},
|
|
22633
22633
|
"deprecationReason": null,
|
|
22634
22634
|
"description": null,
|
|
@@ -22706,7 +22706,7 @@
|
|
|
22706
22706
|
"varName": "fqdnContainerRef"
|
|
22707
22707
|
},
|
|
22708
22708
|
"ipAddressRangeContainer": {
|
|
22709
|
-
"alias": "
|
|
22709
|
+
"alias": "ipAddressRangeContainerInternetFirewallContainer: ipAddressRangeContainer",
|
|
22710
22710
|
"args": {},
|
|
22711
22711
|
"deprecationReason": null,
|
|
22712
22712
|
"description": null,
|
|
@@ -22801,7 +22801,7 @@
|
|
|
22801
22801
|
"varName": "internetFirewallContainer"
|
|
22802
22802
|
},
|
|
22803
22803
|
"country": {
|
|
22804
|
-
"alias": "
|
|
22804
|
+
"alias": "countryInternetFirewallDestination: country",
|
|
22805
22805
|
"args": {},
|
|
22806
22806
|
"deprecationReason": null,
|
|
22807
22807
|
"description": "Countries",
|
|
@@ -22879,7 +22879,7 @@
|
|
|
22879
22879
|
"varName": "countryRef"
|
|
22880
22880
|
},
|
|
22881
22881
|
"customApp": {
|
|
22882
|
-
"alias": "
|
|
22882
|
+
"alias": "customAppInternetFirewallDestination: customApp",
|
|
22883
22883
|
"args": {},
|
|
22884
22884
|
"deprecationReason": null,
|
|
22885
22885
|
"description": "Custom (user-defined) applications",
|
|
@@ -22957,10 +22957,10 @@
|
|
|
22957
22957
|
"varName": "customApplicationRef"
|
|
22958
22958
|
},
|
|
22959
22959
|
"customCategory": {
|
|
22960
|
-
"alias": "
|
|
22960
|
+
"alias": "customCategoryInternetFirewallDestination: customCategory",
|
|
22961
22961
|
"args": {},
|
|
22962
22962
|
"deprecationReason": null,
|
|
22963
|
-
"description": "Custom Categories
|
|
22963
|
+
"description": "Custom Categories \u2013 Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
|
|
22964
22964
|
"id_str": "internetFirewall___addRule___rule___rule___destination___customCategory",
|
|
22965
22965
|
"isDeprecated": false,
|
|
22966
22966
|
"name": "customCategory",
|
|
@@ -23081,7 +23081,7 @@
|
|
|
23081
23081
|
"varName": "fqdn"
|
|
23082
23082
|
},
|
|
23083
23083
|
"globalIpRange": {
|
|
23084
|
-
"alias": "
|
|
23084
|
+
"alias": "globalIpRangeInternetFirewallDestination: globalIpRange",
|
|
23085
23085
|
"args": {},
|
|
23086
23086
|
"deprecationReason": null,
|
|
23087
23087
|
"description": "Globally defined IP range, IP and subnet objects",
|
|
@@ -23182,7 +23182,7 @@
|
|
|
23182
23182
|
"varName": "ip"
|
|
23183
23183
|
},
|
|
23184
23184
|
"ipRange": {
|
|
23185
|
-
"alias": "
|
|
23185
|
+
"alias": "ipRangeInternetFirewallDestination: ipRange",
|
|
23186
23186
|
"args": {},
|
|
23187
23187
|
"deprecationReason": null,
|
|
23188
23188
|
"description": "A range of IPs. Every IP within the range will be matched",
|
|
@@ -23283,7 +23283,7 @@
|
|
|
23283
23283
|
"varName": "remoteAsn"
|
|
23284
23284
|
},
|
|
23285
23285
|
"sanctionedAppsCategory": {
|
|
23286
|
-
"alias": "
|
|
23286
|
+
"alias": "sanctionedAppsCategoryInternetFirewallDestination: sanctionedAppsCategory",
|
|
23287
23287
|
"args": {},
|
|
23288
23288
|
"deprecationReason": null,
|
|
23289
23289
|
"description": "Sanctioned Cloud Applications - apps that are approved and generally represent an understood and acceptable level of risk in your organization.",
|
|
@@ -23401,10 +23401,10 @@
|
|
|
23401
23401
|
"varName": "internetFirewallDestination"
|
|
23402
23402
|
},
|
|
23403
23403
|
"device": {
|
|
23404
|
-
"alias": "
|
|
23404
|
+
"alias": "deviceInternetFirewallRule: device",
|
|
23405
23405
|
"args": {},
|
|
23406
23406
|
"deprecationReason": null,
|
|
23407
|
-
"description": "Source Device Profile traffic matching criteria.\nLogical
|
|
23407
|
+
"description": "Source Device Profile traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
23408
23408
|
"id_str": "internetFirewall___addRule___rule___rule___device",
|
|
23409
23409
|
"isDeprecated": false,
|
|
23410
23410
|
"name": "device",
|
|
@@ -23479,7 +23479,7 @@
|
|
|
23479
23479
|
"varName": "deviceProfileRef"
|
|
23480
23480
|
},
|
|
23481
23481
|
"deviceAttributes": {
|
|
23482
|
-
"alias": "
|
|
23482
|
+
"alias": "deviceAttributesInternetFirewallRule: deviceAttributes",
|
|
23483
23483
|
"args": {},
|
|
23484
23484
|
"deprecationReason": null,
|
|
23485
23485
|
"description": "Additional device attributes such as category, type, model, and manufacturer.\nLogical 'OR' is applied within the criteria set.\nLogical 'AND' is applied between criteria sets.",
|
|
@@ -23651,10 +23651,10 @@
|
|
|
23651
23651
|
"varName": "deviceAttributes"
|
|
23652
23652
|
},
|
|
23653
23653
|
"deviceOS": {
|
|
23654
|
-
"alias": "
|
|
23654
|
+
"alias": "deviceOSInternetFirewallRule: deviceOS",
|
|
23655
23655
|
"args": {},
|
|
23656
23656
|
"deprecationReason": null,
|
|
23657
|
-
"description": "Source device Operating System traffic matching criteria.\nLogical
|
|
23657
|
+
"description": "Source device Operating System traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
23658
23658
|
"id_str": "internetFirewall___addRule___rule___rule___deviceOS",
|
|
23659
23659
|
"isDeprecated": false,
|
|
23660
23660
|
"name": "deviceOS",
|
|
@@ -23744,7 +23744,7 @@
|
|
|
23744
23744
|
"varName": "enabled"
|
|
23745
23745
|
},
|
|
23746
23746
|
"exceptions": {
|
|
23747
|
-
"alias": "
|
|
23747
|
+
"alias": "exceptionsInternetFirewallRule: exceptions",
|
|
23748
23748
|
"args": {},
|
|
23749
23749
|
"deprecationReason": null,
|
|
23750
23750
|
"description": "The set of exceptions for the rule.\nExceptions define when the rule will be ignored and the firewall evaluation will continue with the lower priority rules.",
|
|
@@ -23761,7 +23761,7 @@
|
|
|
23761
23761
|
"enumValues": null,
|
|
23762
23762
|
"fields": {
|
|
23763
23763
|
"connectionOrigin": {
|
|
23764
|
-
"alias": "
|
|
23764
|
+
"alias": "connectionOriginInternetFirewallRuleException: connectionOrigin",
|
|
23765
23765
|
"args": {},
|
|
23766
23766
|
"deprecationReason": null,
|
|
23767
23767
|
"description": "Connection origin matching criteria for the exception.",
|
|
@@ -23813,7 +23813,7 @@
|
|
|
23813
23813
|
"varName": "connectionOrigin"
|
|
23814
23814
|
},
|
|
23815
23815
|
"country": {
|
|
23816
|
-
"alias": "
|
|
23816
|
+
"alias": "countryInternetFirewallRuleException: country",
|
|
23817
23817
|
"args": {},
|
|
23818
23818
|
"deprecationReason": null,
|
|
23819
23819
|
"description": "Source country matching criteria for the exception.",
|
|
@@ -23891,7 +23891,7 @@
|
|
|
23891
23891
|
"varName": "countryRef"
|
|
23892
23892
|
},
|
|
23893
23893
|
"destination": {
|
|
23894
|
-
"alias": "
|
|
23894
|
+
"alias": "destinationInternetFirewallRuleException: destination",
|
|
23895
23895
|
"args": {},
|
|
23896
23896
|
"deprecationReason": null,
|
|
23897
23897
|
"description": "Destination matching criteria for the exception.",
|
|
@@ -23908,7 +23908,7 @@
|
|
|
23908
23908
|
"enumValues": null,
|
|
23909
23909
|
"fields": {
|
|
23910
23910
|
"appCategory": {
|
|
23911
|
-
"alias": "
|
|
23911
|
+
"alias": "appCategoryInternetFirewallDestination: appCategory",
|
|
23912
23912
|
"args": {},
|
|
23913
23913
|
"deprecationReason": null,
|
|
23914
23914
|
"description": "Cato category of applications which are dynamically updated by Cato",
|
|
@@ -23986,7 +23986,7 @@
|
|
|
23986
23986
|
"varName": "applicationCategoryRef"
|
|
23987
23987
|
},
|
|
23988
23988
|
"application": {
|
|
23989
|
-
"alias": "
|
|
23989
|
+
"alias": "applicationInternetFirewallDestination: application",
|
|
23990
23990
|
"args": {},
|
|
23991
23991
|
"deprecationReason": null,
|
|
23992
23992
|
"description": "Applications for the rule (pre-defined)",
|
|
@@ -24064,7 +24064,7 @@
|
|
|
24064
24064
|
"varName": "applicationRef"
|
|
24065
24065
|
},
|
|
24066
24066
|
"containers": {
|
|
24067
|
-
"alias": "
|
|
24067
|
+
"alias": "containersInternetFirewallDestination: containers",
|
|
24068
24068
|
"args": {},
|
|
24069
24069
|
"deprecationReason": null,
|
|
24070
24070
|
"description": null,
|
|
@@ -24081,7 +24081,7 @@
|
|
|
24081
24081
|
"enumValues": null,
|
|
24082
24082
|
"fields": {
|
|
24083
24083
|
"fqdnContainer": {
|
|
24084
|
-
"alias": "
|
|
24084
|
+
"alias": "fqdnContainerInternetFirewallContainer: fqdnContainer",
|
|
24085
24085
|
"args": {},
|
|
24086
24086
|
"deprecationReason": null,
|
|
24087
24087
|
"description": null,
|
|
@@ -24159,7 +24159,7 @@
|
|
|
24159
24159
|
"varName": "fqdnContainerRef"
|
|
24160
24160
|
},
|
|
24161
24161
|
"ipAddressRangeContainer": {
|
|
24162
|
-
"alias": "
|
|
24162
|
+
"alias": "ipAddressRangeContainerInternetFirewallContainer: ipAddressRangeContainer",
|
|
24163
24163
|
"args": {},
|
|
24164
24164
|
"deprecationReason": null,
|
|
24165
24165
|
"description": null,
|
|
@@ -24254,7 +24254,7 @@
|
|
|
24254
24254
|
"varName": "internetFirewallContainer"
|
|
24255
24255
|
},
|
|
24256
24256
|
"country": {
|
|
24257
|
-
"alias": "
|
|
24257
|
+
"alias": "countryInternetFirewallDestination: country",
|
|
24258
24258
|
"args": {},
|
|
24259
24259
|
"deprecationReason": null,
|
|
24260
24260
|
"description": "Countries",
|
|
@@ -24332,7 +24332,7 @@
|
|
|
24332
24332
|
"varName": "countryRef"
|
|
24333
24333
|
},
|
|
24334
24334
|
"customApp": {
|
|
24335
|
-
"alias": "
|
|
24335
|
+
"alias": "customAppInternetFirewallDestination: customApp",
|
|
24336
24336
|
"args": {},
|
|
24337
24337
|
"deprecationReason": null,
|
|
24338
24338
|
"description": "Custom (user-defined) applications",
|
|
@@ -24410,10 +24410,10 @@
|
|
|
24410
24410
|
"varName": "customApplicationRef"
|
|
24411
24411
|
},
|
|
24412
24412
|
"customCategory": {
|
|
24413
|
-
"alias": "
|
|
24413
|
+
"alias": "customCategoryInternetFirewallDestination: customCategory",
|
|
24414
24414
|
"args": {},
|
|
24415
24415
|
"deprecationReason": null,
|
|
24416
|
-
"description": "Custom Categories
|
|
24416
|
+
"description": "Custom Categories \u2013 Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
|
|
24417
24417
|
"id_str": "internetFirewall___addRule___rule___rule___exceptions___destination___customCategory",
|
|
24418
24418
|
"isDeprecated": false,
|
|
24419
24419
|
"name": "customCategory",
|
|
@@ -24534,7 +24534,7 @@
|
|
|
24534
24534
|
"varName": "fqdn"
|
|
24535
24535
|
},
|
|
24536
24536
|
"globalIpRange": {
|
|
24537
|
-
"alias": "
|
|
24537
|
+
"alias": "globalIpRangeInternetFirewallDestination: globalIpRange",
|
|
24538
24538
|
"args": {},
|
|
24539
24539
|
"deprecationReason": null,
|
|
24540
24540
|
"description": "Globally defined IP range, IP and subnet objects",
|
|
@@ -24635,7 +24635,7 @@
|
|
|
24635
24635
|
"varName": "ip"
|
|
24636
24636
|
},
|
|
24637
24637
|
"ipRange": {
|
|
24638
|
-
"alias": "
|
|
24638
|
+
"alias": "ipRangeInternetFirewallDestination: ipRange",
|
|
24639
24639
|
"args": {},
|
|
24640
24640
|
"deprecationReason": null,
|
|
24641
24641
|
"description": "A range of IPs. Every IP within the range will be matched",
|
|
@@ -24736,7 +24736,7 @@
|
|
|
24736
24736
|
"varName": "remoteAsn"
|
|
24737
24737
|
},
|
|
24738
24738
|
"sanctionedAppsCategory": {
|
|
24739
|
-
"alias": "
|
|
24739
|
+
"alias": "sanctionedAppsCategoryInternetFirewallDestination: sanctionedAppsCategory",
|
|
24740
24740
|
"args": {},
|
|
24741
24741
|
"deprecationReason": null,
|
|
24742
24742
|
"description": "Sanctioned Cloud Applications - apps that are approved and generally represent an understood and acceptable level of risk in your organization.",
|
|
@@ -24854,7 +24854,7 @@
|
|
|
24854
24854
|
"varName": "internetFirewallDestination"
|
|
24855
24855
|
},
|
|
24856
24856
|
"device": {
|
|
24857
|
-
"alias": "
|
|
24857
|
+
"alias": "deviceInternetFirewallRuleException: device",
|
|
24858
24858
|
"args": {},
|
|
24859
24859
|
"deprecationReason": null,
|
|
24860
24860
|
"description": "Source Device Profile matching criteria for the exception.",
|
|
@@ -24932,7 +24932,7 @@
|
|
|
24932
24932
|
"varName": "deviceProfileRef"
|
|
24933
24933
|
},
|
|
24934
24934
|
"deviceAttributes": {
|
|
24935
|
-
"alias": "
|
|
24935
|
+
"alias": "deviceAttributesInternetFirewallRuleException: deviceAttributes",
|
|
24936
24936
|
"args": {},
|
|
24937
24937
|
"deprecationReason": null,
|
|
24938
24938
|
"description": "Source Device Attributes matching criteria for the exception.",
|
|
@@ -25104,7 +25104,7 @@
|
|
|
25104
25104
|
"varName": "deviceAttributes"
|
|
25105
25105
|
},
|
|
25106
25106
|
"deviceOS": {
|
|
25107
|
-
"alias": "
|
|
25107
|
+
"alias": "deviceOSInternetFirewallRuleException: deviceOS",
|
|
25108
25108
|
"args": {},
|
|
25109
25109
|
"deprecationReason": null,
|
|
25110
25110
|
"description": "Source device OS matching criteria for the exception.",
|
|
@@ -25197,7 +25197,7 @@
|
|
|
25197
25197
|
"varName": "name"
|
|
25198
25198
|
},
|
|
25199
25199
|
"service": {
|
|
25200
|
-
"alias": "
|
|
25200
|
+
"alias": "serviceInternetFirewallRuleException: service",
|
|
25201
25201
|
"args": {},
|
|
25202
25202
|
"deprecationReason": null,
|
|
25203
25203
|
"description": "Destination service matching criteria for the exception.",
|
|
@@ -25214,7 +25214,7 @@
|
|
|
25214
25214
|
"enumValues": null,
|
|
25215
25215
|
"fields": {
|
|
25216
25216
|
"custom": {
|
|
25217
|
-
"alias": "
|
|
25217
|
+
"alias": "customInternetFirewallServiceType: custom",
|
|
25218
25218
|
"args": {},
|
|
25219
25219
|
"deprecationReason": null,
|
|
25220
25220
|
"description": null,
|
|
@@ -25253,7 +25253,7 @@
|
|
|
25253
25253
|
"varName": "port"
|
|
25254
25254
|
},
|
|
25255
25255
|
"portRange": {
|
|
25256
|
-
"alias": "
|
|
25256
|
+
"alias": "portRangeCustomService: portRange",
|
|
25257
25257
|
"args": {},
|
|
25258
25258
|
"deprecationReason": null,
|
|
25259
25259
|
"description": null,
|
|
@@ -25328,7 +25328,7 @@
|
|
|
25328
25328
|
"varName": "portRange"
|
|
25329
25329
|
},
|
|
25330
25330
|
"protocol": {
|
|
25331
|
-
"alias": "
|
|
25331
|
+
"alias": "protocolCustomService: protocol",
|
|
25332
25332
|
"args": {},
|
|
25333
25333
|
"deprecationReason": null,
|
|
25334
25334
|
"description": null,
|
|
@@ -25411,7 +25411,7 @@
|
|
|
25411
25411
|
"varName": "customService"
|
|
25412
25412
|
},
|
|
25413
25413
|
"standard": {
|
|
25414
|
-
"alias": "
|
|
25414
|
+
"alias": "standardInternetFirewallServiceType: standard",
|
|
25415
25415
|
"args": {},
|
|
25416
25416
|
"deprecationReason": null,
|
|
25417
25417
|
"description": null,
|
|
@@ -25506,7 +25506,7 @@
|
|
|
25506
25506
|
"varName": "internetFirewallServiceType"
|
|
25507
25507
|
},
|
|
25508
25508
|
"source": {
|
|
25509
|
-
"alias": "
|
|
25509
|
+
"alias": "sourceInternetFirewallRuleException: source",
|
|
25510
25510
|
"args": {},
|
|
25511
25511
|
"deprecationReason": null,
|
|
25512
25512
|
"description": "Source traffic matching criteria for the exception.",
|
|
@@ -25523,7 +25523,7 @@
|
|
|
25523
25523
|
"enumValues": null,
|
|
25524
25524
|
"fields": {
|
|
25525
25525
|
"floatingSubnet": {
|
|
25526
|
-
"alias": "
|
|
25526
|
+
"alias": "floatingSubnetInternetFirewallSource: floatingSubnet",
|
|
25527
25527
|
"args": {},
|
|
25528
25528
|
"deprecationReason": null,
|
|
25529
25529
|
"description": "Floating Subnets (ie. Floating Ranges) are used to identify traffic exactly matched to the route advertised by BGP. They are not associated with a specific site. This is useful in scenarios such as active-standby high availability routed via BGP.",
|
|
@@ -25601,7 +25601,7 @@
|
|
|
25601
25601
|
"varName": "floatingSubnetRef"
|
|
25602
25602
|
},
|
|
25603
25603
|
"globalIpRange": {
|
|
25604
|
-
"alias": "
|
|
25604
|
+
"alias": "globalIpRangeInternetFirewallSource: globalIpRange",
|
|
25605
25605
|
"args": {},
|
|
25606
25606
|
"deprecationReason": null,
|
|
25607
25607
|
"description": "Globally defined IP range, IP and subnet objects",
|
|
@@ -25679,7 +25679,7 @@
|
|
|
25679
25679
|
"varName": "globalIpRangeRef"
|
|
25680
25680
|
},
|
|
25681
25681
|
"group": {
|
|
25682
|
-
"alias": "
|
|
25682
|
+
"alias": "groupInternetFirewallSource: group",
|
|
25683
25683
|
"args": {},
|
|
25684
25684
|
"deprecationReason": null,
|
|
25685
25685
|
"description": "Groups defined for your account",
|
|
@@ -25757,7 +25757,7 @@
|
|
|
25757
25757
|
"varName": "groupRef"
|
|
25758
25758
|
},
|
|
25759
25759
|
"host": {
|
|
25760
|
-
"alias": "
|
|
25760
|
+
"alias": "hostInternetFirewallSource: host",
|
|
25761
25761
|
"args": {},
|
|
25762
25762
|
"deprecationReason": null,
|
|
25763
25763
|
"description": "Hosts and servers defined for your account",
|
|
@@ -25858,7 +25858,7 @@
|
|
|
25858
25858
|
"varName": "ip"
|
|
25859
25859
|
},
|
|
25860
25860
|
"ipRange": {
|
|
25861
|
-
"alias": "
|
|
25861
|
+
"alias": "ipRangeInternetFirewallSource: ipRange",
|
|
25862
25862
|
"args": {},
|
|
25863
25863
|
"deprecationReason": null,
|
|
25864
25864
|
"description": "Multiple separate IP addresses or an IP range",
|
|
@@ -25936,7 +25936,7 @@
|
|
|
25936
25936
|
"varName": "ipAddressRange"
|
|
25937
25937
|
},
|
|
25938
25938
|
"networkInterface": {
|
|
25939
|
-
"alias": "
|
|
25939
|
+
"alias": "networkInterfaceInternetFirewallSource: networkInterface",
|
|
25940
25940
|
"args": {},
|
|
25941
25941
|
"deprecationReason": null,
|
|
25942
25942
|
"description": "Network range defined for a site",
|
|
@@ -26014,7 +26014,7 @@
|
|
|
26014
26014
|
"varName": "networkInterfaceRef"
|
|
26015
26015
|
},
|
|
26016
26016
|
"site": {
|
|
26017
|
-
"alias": "
|
|
26017
|
+
"alias": "siteInternetFirewallSource: site",
|
|
26018
26018
|
"args": {},
|
|
26019
26019
|
"deprecationReason": null,
|
|
26020
26020
|
"description": "Site defined for the account",
|
|
@@ -26092,7 +26092,7 @@
|
|
|
26092
26092
|
"varName": "siteRef"
|
|
26093
26093
|
},
|
|
26094
26094
|
"siteNetworkSubnet": {
|
|
26095
|
-
"alias": "
|
|
26095
|
+
"alias": "siteNetworkSubnetInternetFirewallSource: siteNetworkSubnet",
|
|
26096
26096
|
"args": {},
|
|
26097
26097
|
"deprecationReason": null,
|
|
26098
26098
|
"description": "GlobalRange + InterfaceSubnet",
|
|
@@ -26193,7 +26193,7 @@
|
|
|
26193
26193
|
"varName": "subnet"
|
|
26194
26194
|
},
|
|
26195
26195
|
"systemGroup": {
|
|
26196
|
-
"alias": "
|
|
26196
|
+
"alias": "systemGroupInternetFirewallSource: systemGroup",
|
|
26197
26197
|
"args": {},
|
|
26198
26198
|
"deprecationReason": null,
|
|
26199
26199
|
"description": "Predefined Cato groups",
|
|
@@ -26271,7 +26271,7 @@
|
|
|
26271
26271
|
"varName": "systemGroupRef"
|
|
26272
26272
|
},
|
|
26273
26273
|
"user": {
|
|
26274
|
-
"alias": "
|
|
26274
|
+
"alias": "userInternetFirewallSource: user",
|
|
26275
26275
|
"args": {},
|
|
26276
26276
|
"deprecationReason": null,
|
|
26277
26277
|
"description": "Individual users defined for the account",
|
|
@@ -26349,7 +26349,7 @@
|
|
|
26349
26349
|
"varName": "userRef"
|
|
26350
26350
|
},
|
|
26351
26351
|
"usersGroup": {
|
|
26352
|
-
"alias": "
|
|
26352
|
+
"alias": "usersGroupInternetFirewallSource: usersGroup",
|
|
26353
26353
|
"args": {},
|
|
26354
26354
|
"deprecationReason": null,
|
|
26355
26355
|
"description": "Group of users",
|
|
@@ -26526,7 +26526,7 @@
|
|
|
26526
26526
|
"varName": "name"
|
|
26527
26527
|
},
|
|
26528
26528
|
"schedule": {
|
|
26529
|
-
"alias": "
|
|
26529
|
+
"alias": "scheduleInternetFirewallRule: schedule",
|
|
26530
26530
|
"args": {},
|
|
26531
26531
|
"deprecationReason": null,
|
|
26532
26532
|
"description": "The time period specifying when the rule is enabled, otherwise it is disabled.",
|
|
@@ -26543,7 +26543,7 @@
|
|
|
26543
26543
|
"enumValues": null,
|
|
26544
26544
|
"fields": {
|
|
26545
26545
|
"activeOn": {
|
|
26546
|
-
"alias": "
|
|
26546
|
+
"alias": "activeOnPolicySchedule: activeOn",
|
|
26547
26547
|
"args": {},
|
|
26548
26548
|
"deprecationReason": null,
|
|
26549
26549
|
"description": null,
|
|
@@ -26601,7 +26601,7 @@
|
|
|
26601
26601
|
"varName": "activeOn"
|
|
26602
26602
|
},
|
|
26603
26603
|
"customRecurring": {
|
|
26604
|
-
"alias": "
|
|
26604
|
+
"alias": "customRecurringPolicySchedule: customRecurring",
|
|
26605
26605
|
"args": {},
|
|
26606
26606
|
"deprecationReason": null,
|
|
26607
26607
|
"description": null,
|
|
@@ -26753,7 +26753,7 @@
|
|
|
26753
26753
|
"varName": "policyCustomRecurring"
|
|
26754
26754
|
},
|
|
26755
26755
|
"customTimeframe": {
|
|
26756
|
-
"alias": "
|
|
26756
|
+
"alias": "customTimeframePolicySchedule: customTimeframe",
|
|
26757
26757
|
"args": {},
|
|
26758
26758
|
"deprecationReason": null,
|
|
26759
26759
|
"description": null,
|
|
@@ -26845,7 +26845,7 @@
|
|
|
26845
26845
|
"varName": "policySchedule"
|
|
26846
26846
|
},
|
|
26847
26847
|
"section": {
|
|
26848
|
-
"alias": "
|
|
26848
|
+
"alias": "sectionInternetFirewallRule: section",
|
|
26849
26849
|
"args": {},
|
|
26850
26850
|
"deprecationReason": null,
|
|
26851
26851
|
"description": "Policy section where the rule is located",
|
|
@@ -26921,10 +26921,10 @@
|
|
|
26921
26921
|
"varName": "policySectionInfo"
|
|
26922
26922
|
},
|
|
26923
26923
|
"service": {
|
|
26924
|
-
"alias": "
|
|
26924
|
+
"alias": "serviceInternetFirewallRule: service",
|
|
26925
26925
|
"args": {},
|
|
26926
26926
|
"deprecationReason": null,
|
|
26927
|
-
"description": "Destination service traffic matching criteria.\nLogical
|
|
26927
|
+
"description": "Destination service traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
26928
26928
|
"id_str": "internetFirewall___addRule___rule___rule___service",
|
|
26929
26929
|
"isDeprecated": false,
|
|
26930
26930
|
"name": "service",
|
|
@@ -26938,7 +26938,7 @@
|
|
|
26938
26938
|
"enumValues": null,
|
|
26939
26939
|
"fields": {
|
|
26940
26940
|
"custom": {
|
|
26941
|
-
"alias": "
|
|
26941
|
+
"alias": "customInternetFirewallServiceType: custom",
|
|
26942
26942
|
"args": {},
|
|
26943
26943
|
"deprecationReason": null,
|
|
26944
26944
|
"description": null,
|
|
@@ -26977,7 +26977,7 @@
|
|
|
26977
26977
|
"varName": "port"
|
|
26978
26978
|
},
|
|
26979
26979
|
"portRange": {
|
|
26980
|
-
"alias": "
|
|
26980
|
+
"alias": "portRangeCustomService: portRange",
|
|
26981
26981
|
"args": {},
|
|
26982
26982
|
"deprecationReason": null,
|
|
26983
26983
|
"description": null,
|
|
@@ -27052,7 +27052,7 @@
|
|
|
27052
27052
|
"varName": "portRange"
|
|
27053
27053
|
},
|
|
27054
27054
|
"protocol": {
|
|
27055
|
-
"alias": "
|
|
27055
|
+
"alias": "protocolCustomService: protocol",
|
|
27056
27056
|
"args": {},
|
|
27057
27057
|
"deprecationReason": null,
|
|
27058
27058
|
"description": null,
|
|
@@ -27135,7 +27135,7 @@
|
|
|
27135
27135
|
"varName": "customService"
|
|
27136
27136
|
},
|
|
27137
27137
|
"standard": {
|
|
27138
|
-
"alias": "
|
|
27138
|
+
"alias": "standardInternetFirewallServiceType: standard",
|
|
27139
27139
|
"args": {},
|
|
27140
27140
|
"deprecationReason": null,
|
|
27141
27141
|
"description": null,
|
|
@@ -27230,10 +27230,10 @@
|
|
|
27230
27230
|
"varName": "internetFirewallServiceType"
|
|
27231
27231
|
},
|
|
27232
27232
|
"source": {
|
|
27233
|
-
"alias": "
|
|
27233
|
+
"alias": "sourceInternetFirewallRule: source",
|
|
27234
27234
|
"args": {},
|
|
27235
27235
|
"deprecationReason": null,
|
|
27236
|
-
"description": "Source traffic matching criteria.\nLogical
|
|
27236
|
+
"description": "Source traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
27237
27237
|
"id_str": "internetFirewall___addRule___rule___rule___source",
|
|
27238
27238
|
"isDeprecated": false,
|
|
27239
27239
|
"name": "source",
|
|
@@ -27247,7 +27247,7 @@
|
|
|
27247
27247
|
"enumValues": null,
|
|
27248
27248
|
"fields": {
|
|
27249
27249
|
"floatingSubnet": {
|
|
27250
|
-
"alias": "
|
|
27250
|
+
"alias": "floatingSubnetInternetFirewallSource: floatingSubnet",
|
|
27251
27251
|
"args": {},
|
|
27252
27252
|
"deprecationReason": null,
|
|
27253
27253
|
"description": "Floating Subnets (ie. Floating Ranges) are used to identify traffic exactly matched to the route advertised by BGP. They are not associated with a specific site. This is useful in scenarios such as active-standby high availability routed via BGP.",
|
|
@@ -27325,7 +27325,7 @@
|
|
|
27325
27325
|
"varName": "floatingSubnetRef"
|
|
27326
27326
|
},
|
|
27327
27327
|
"globalIpRange": {
|
|
27328
|
-
"alias": "
|
|
27328
|
+
"alias": "globalIpRangeInternetFirewallSource: globalIpRange",
|
|
27329
27329
|
"args": {},
|
|
27330
27330
|
"deprecationReason": null,
|
|
27331
27331
|
"description": "Globally defined IP range, IP and subnet objects",
|
|
@@ -27403,7 +27403,7 @@
|
|
|
27403
27403
|
"varName": "globalIpRangeRef"
|
|
27404
27404
|
},
|
|
27405
27405
|
"group": {
|
|
27406
|
-
"alias": "
|
|
27406
|
+
"alias": "groupInternetFirewallSource: group",
|
|
27407
27407
|
"args": {},
|
|
27408
27408
|
"deprecationReason": null,
|
|
27409
27409
|
"description": "Groups defined for your account",
|
|
@@ -27481,7 +27481,7 @@
|
|
|
27481
27481
|
"varName": "groupRef"
|
|
27482
27482
|
},
|
|
27483
27483
|
"host": {
|
|
27484
|
-
"alias": "
|
|
27484
|
+
"alias": "hostInternetFirewallSource: host",
|
|
27485
27485
|
"args": {},
|
|
27486
27486
|
"deprecationReason": null,
|
|
27487
27487
|
"description": "Hosts and servers defined for your account",
|
|
@@ -27582,7 +27582,7 @@
|
|
|
27582
27582
|
"varName": "ip"
|
|
27583
27583
|
},
|
|
27584
27584
|
"ipRange": {
|
|
27585
|
-
"alias": "
|
|
27585
|
+
"alias": "ipRangeInternetFirewallSource: ipRange",
|
|
27586
27586
|
"args": {},
|
|
27587
27587
|
"deprecationReason": null,
|
|
27588
27588
|
"description": "Multiple separate IP addresses or an IP range",
|
|
@@ -27660,7 +27660,7 @@
|
|
|
27660
27660
|
"varName": "ipAddressRange"
|
|
27661
27661
|
},
|
|
27662
27662
|
"networkInterface": {
|
|
27663
|
-
"alias": "
|
|
27663
|
+
"alias": "networkInterfaceInternetFirewallSource: networkInterface",
|
|
27664
27664
|
"args": {},
|
|
27665
27665
|
"deprecationReason": null,
|
|
27666
27666
|
"description": "Network range defined for a site",
|
|
@@ -27738,7 +27738,7 @@
|
|
|
27738
27738
|
"varName": "networkInterfaceRef"
|
|
27739
27739
|
},
|
|
27740
27740
|
"site": {
|
|
27741
|
-
"alias": "
|
|
27741
|
+
"alias": "siteInternetFirewallSource: site",
|
|
27742
27742
|
"args": {},
|
|
27743
27743
|
"deprecationReason": null,
|
|
27744
27744
|
"description": "Site defined for the account",
|
|
@@ -27816,7 +27816,7 @@
|
|
|
27816
27816
|
"varName": "siteRef"
|
|
27817
27817
|
},
|
|
27818
27818
|
"siteNetworkSubnet": {
|
|
27819
|
-
"alias": "
|
|
27819
|
+
"alias": "siteNetworkSubnetInternetFirewallSource: siteNetworkSubnet",
|
|
27820
27820
|
"args": {},
|
|
27821
27821
|
"deprecationReason": null,
|
|
27822
27822
|
"description": "GlobalRange + InterfaceSubnet",
|
|
@@ -27917,7 +27917,7 @@
|
|
|
27917
27917
|
"varName": "subnet"
|
|
27918
27918
|
},
|
|
27919
27919
|
"systemGroup": {
|
|
27920
|
-
"alias": "
|
|
27920
|
+
"alias": "systemGroupInternetFirewallSource: systemGroup",
|
|
27921
27921
|
"args": {},
|
|
27922
27922
|
"deprecationReason": null,
|
|
27923
27923
|
"description": "Predefined Cato groups",
|
|
@@ -27995,7 +27995,7 @@
|
|
|
27995
27995
|
"varName": "systemGroupRef"
|
|
27996
27996
|
},
|
|
27997
27997
|
"user": {
|
|
27998
|
-
"alias": "
|
|
27998
|
+
"alias": "userInternetFirewallSource: user",
|
|
27999
27999
|
"args": {},
|
|
28000
28000
|
"deprecationReason": null,
|
|
28001
28001
|
"description": "Individual users defined for the account",
|
|
@@ -28073,7 +28073,7 @@
|
|
|
28073
28073
|
"varName": "userRef"
|
|
28074
28074
|
},
|
|
28075
28075
|
"usersGroup": {
|
|
28076
|
-
"alias": "
|
|
28076
|
+
"alias": "usersGroupInternetFirewallSource: usersGroup",
|
|
28077
28077
|
"args": {},
|
|
28078
28078
|
"deprecationReason": null,
|
|
28079
28079
|
"description": "Group of users",
|
|
@@ -28168,7 +28168,7 @@
|
|
|
28168
28168
|
"varName": "internetFirewallSource"
|
|
28169
28169
|
},
|
|
28170
28170
|
"tracking": {
|
|
28171
|
-
"alias": "
|
|
28171
|
+
"alias": "trackingInternetFirewallRule: tracking",
|
|
28172
28172
|
"args": {},
|
|
28173
28173
|
"deprecationReason": null,
|
|
28174
28174
|
"description": "Tracking information when the rule is matched, such as events and notifications",
|
|
@@ -28185,7 +28185,7 @@
|
|
|
28185
28185
|
"enumValues": null,
|
|
28186
28186
|
"fields": {
|
|
28187
28187
|
"alert": {
|
|
28188
|
-
"alias": "
|
|
28188
|
+
"alias": "alertPolicyTracking: alert",
|
|
28189
28189
|
"args": {},
|
|
28190
28190
|
"deprecationReason": null,
|
|
28191
28191
|
"description": null,
|
|
@@ -28204,7 +28204,7 @@
|
|
|
28204
28204
|
"enabled": {
|
|
28205
28205
|
"args": {},
|
|
28206
28206
|
"deprecationReason": null,
|
|
28207
|
-
"description": "TRUE
|
|
28207
|
+
"description": "TRUE \u2013 send alerts when the rule is matched, FALSE \u2013 don\u2019t send alerts when the rule is matched",
|
|
28208
28208
|
"id_str": "internetFirewall___addRule___rule___rule___tracking___alert___enabled",
|
|
28209
28209
|
"isDeprecated": false,
|
|
28210
28210
|
"name": "enabled",
|
|
@@ -28223,7 +28223,7 @@
|
|
|
28223
28223
|
"varName": "enabled"
|
|
28224
28224
|
},
|
|
28225
28225
|
"frequency": {
|
|
28226
|
-
"alias": "
|
|
28226
|
+
"alias": "frequencyPolicyRuleTrackingAlert: frequency",
|
|
28227
28227
|
"args": {},
|
|
28228
28228
|
"deprecationReason": null,
|
|
28229
28229
|
"description": "Returns data for the alert frequency",
|
|
@@ -28281,7 +28281,7 @@
|
|
|
28281
28281
|
"varName": "frequency"
|
|
28282
28282
|
},
|
|
28283
28283
|
"mailingList": {
|
|
28284
|
-
"alias": "
|
|
28284
|
+
"alias": "mailingListPolicyRuleTrackingAlert: mailingList",
|
|
28285
28285
|
"args": {},
|
|
28286
28286
|
"deprecationReason": null,
|
|
28287
28287
|
"description": "Returns data for the Mailing List that receives the alert",
|
|
@@ -28359,7 +28359,7 @@
|
|
|
28359
28359
|
"varName": "subscriptionMailingListRef"
|
|
28360
28360
|
},
|
|
28361
28361
|
"subscriptionGroup": {
|
|
28362
|
-
"alias": "
|
|
28362
|
+
"alias": "subscriptionGroupPolicyRuleTrackingAlert: subscriptionGroup",
|
|
28363
28363
|
"args": {},
|
|
28364
28364
|
"deprecationReason": null,
|
|
28365
28365
|
"description": "Returns data for the Subscription Group that receives the alert",
|
|
@@ -28437,7 +28437,7 @@
|
|
|
28437
28437
|
"varName": "subscriptionGroupRef"
|
|
28438
28438
|
},
|
|
28439
28439
|
"webhook": {
|
|
28440
|
-
"alias": "
|
|
28440
|
+
"alias": "webhookPolicyRuleTrackingAlert: webhook",
|
|
28441
28441
|
"args": {},
|
|
28442
28442
|
"deprecationReason": null,
|
|
28443
28443
|
"description": "Returns data for the Webhook that receives the alert",
|
|
@@ -28532,7 +28532,7 @@
|
|
|
28532
28532
|
"varName": "policyRuleTrackingAlert"
|
|
28533
28533
|
},
|
|
28534
28534
|
"event": {
|
|
28535
|
-
"alias": "
|
|
28535
|
+
"alias": "eventPolicyTracking: event",
|
|
28536
28536
|
"args": {},
|
|
28537
28537
|
"deprecationReason": null,
|
|
28538
28538
|
"description": null,
|
|
@@ -28637,7 +28637,7 @@
|
|
|
28637
28637
|
"varName": "internetFirewallRulePayload"
|
|
28638
28638
|
},
|
|
28639
28639
|
"status": {
|
|
28640
|
-
"alias": "
|
|
28640
|
+
"alias": "statusInternetFirewallRuleMutationPayload: status",
|
|
28641
28641
|
"args": {},
|
|
28642
28642
|
"deprecationReason": null,
|
|
28643
28643
|
"description": null,
|