catocli 2.0.5__py3-none-any.whl → 2.1.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of catocli might be problematic. Click here for more details.
- catocli/Utils/clidriver.py +32 -4
- catocli/Utils/version_checker.py +1 -1
- catocli/__init__.py +1 -1
- catocli/parsers/custom/export_sites/export_sites.py +18 -1
- catocli/parsers/custom/import_rules_to_tf/import_rules_to_tf.py +13 -2
- catocli/parsers/custom/import_sites_to_tf/__init__.py +3 -1
- catocli/parsers/custom/import_sites_to_tf/import_sites_to_tf.py +79 -6
- catocli/parsers/custom_private/__init__.py +134 -0
- catocli/parsers/mutation_accountManagement/__init__.py +13 -0
- catocli/parsers/mutation_accountManagement_disableAccount/README.md +16 -0
- catocli/parsers/mutation_groups/README.md +7 -0
- catocli/parsers/mutation_groups/__init__.py +48 -0
- catocli/parsers/mutation_groups_createGroup/README.md +18 -0
- catocli/parsers/mutation_groups_deleteGroup/README.md +18 -0
- catocli/parsers/mutation_groups_updateGroup/README.md +18 -0
- catocli/parsers/mutation_site/__init__.py +104 -0
- catocli/parsers/mutation_site_assignSiteBwLicense/README.md +17 -0
- catocli/parsers/mutation_site_removeSecondaryAwsVSocket/README.md +17 -0
- catocli/parsers/mutation_site_removeSecondaryAzureVSocket/README.md +17 -0
- catocli/parsers/mutation_site_removeSiteBwLicense/README.md +17 -0
- catocli/parsers/mutation_site_replaceSiteBwLicense/README.md +17 -0
- catocli/parsers/mutation_site_updateSecondaryAwsVSocket/README.md +17 -0
- catocli/parsers/mutation_site_updateSecondaryAzureVSocket/README.md +17 -0
- catocli/parsers/mutation_site_updateSiteBwLicense/README.md +17 -0
- catocli/parsers/mutation_site_updateSiteGeneralDetails/README.md +1 -1
- catocli/parsers/mutation_sites/__init__.py +104 -0
- catocli/parsers/mutation_sites_assignSiteBwLicense/README.md +17 -0
- catocli/parsers/mutation_sites_removeSecondaryAwsVSocket/README.md +17 -0
- catocli/parsers/mutation_sites_removeSecondaryAzureVSocket/README.md +17 -0
- catocli/parsers/mutation_sites_removeSiteBwLicense/README.md +17 -0
- catocli/parsers/mutation_sites_replaceSiteBwLicense/README.md +17 -0
- catocli/parsers/mutation_sites_updateSecondaryAwsVSocket/README.md +17 -0
- catocli/parsers/mutation_sites_updateSecondaryAzureVSocket/README.md +17 -0
- catocli/parsers/mutation_sites_updateSiteBwLicense/README.md +17 -0
- catocli/parsers/mutation_sites_updateSiteGeneralDetails/README.md +1 -1
- catocli/parsers/parserApiClient.py +444 -9
- catocli/parsers/query_eventsFeed/README.md +1 -1
- catocli/parsers/query_groups/README.md +7 -0
- catocli/parsers/query_groups/__init__.py +54 -0
- catocli/parsers/query_groups_group/README.md +7 -0
- catocli/parsers/query_groups_groupList/README.md +18 -0
- catocli/parsers/query_groups_group_members/README.md +18 -0
- catocli/parsers/query_groups_whereUsed/README.md +17 -0
- catocli/parsers/query_popLocations/README.md +17 -0
- catocli/parsers/query_popLocations/__init__.py +16 -0
- catocli/parsers/query_site/__init__.py +26 -0
- catocli/parsers/query_site_secondaryAwsVSocket/README.md +17 -0
- catocli/parsers/query_site_secondaryAzureVSocket/README.md +17 -0
- catocli/parsers/query_socketPortMetrics/README.md +23 -0
- catocli/parsers/query_socketPortMetrics/__init__.py +16 -0
- catocli/parsers/query_socketPortMetricsTimeSeries/README.md +24 -0
- catocli/parsers/query_socketPortMetricsTimeSeries/__init__.py +16 -0
- {catocli-2.0.5.dist-info → catocli-2.1.1.dist-info}/METADATA +3 -2
- {catocli-2.0.5.dist-info → catocli-2.1.1.dist-info}/RECORD +253 -300
- {catocli-2.0.5.dist-info → catocli-2.1.1.dist-info}/WHEEL +1 -1
- {catocli-2.0.5.dist-info → catocli-2.1.1.dist-info}/top_level.txt +0 -2
- graphql_client/api/call_api.py +20 -2
- models/mutation.accountManagement.addAccount.json +97 -0
- models/mutation.accountManagement.disableAccount.json +545 -0
- models/mutation.accountManagement.removeAccount.json +102 -3
- models/mutation.accountManagement.updateAccount.json +97 -0
- models/mutation.admin.addAdmin.json +6 -9
- models/mutation.container.delete.json +2 -2
- models/mutation.container.fqdn.addValues.json +3 -3
- models/mutation.container.fqdn.createFromFile.json +3 -3
- models/mutation.container.fqdn.removeValues.json +3 -3
- models/mutation.container.fqdn.updateFromFile.json +3 -3
- models/mutation.container.ipAddressRange.addValues.json +3 -3
- models/mutation.container.ipAddressRange.createFromFile.json +3 -3
- models/mutation.container.ipAddressRange.removeValues.json +3 -3
- models/mutation.container.ipAddressRange.updateFromFile.json +3 -3
- models/mutation.groups.createGroup.json +3178 -0
- models/mutation.groups.deleteGroup.json +2758 -0
- models/mutation.groups.updateGroup.json +4429 -0
- models/mutation.hardware.updateHardwareShipping.json +30 -10
- models/mutation.policy.appTenantRestriction.addRule.json +33 -33
- models/mutation.policy.appTenantRestriction.addSection.json +4 -4
- models/mutation.policy.appTenantRestriction.createPolicyRevision.json +33 -33
- models/mutation.policy.appTenantRestriction.discardPolicyRevision.json +33 -33
- models/mutation.policy.appTenantRestriction.moveRule.json +27 -27
- models/mutation.policy.appTenantRestriction.moveSection.json +4 -4
- models/mutation.policy.appTenantRestriction.publishPolicyRevision.json +33 -33
- models/mutation.policy.appTenantRestriction.removeRule.json +27 -27
- models/mutation.policy.appTenantRestriction.removeSection.json +4 -4
- models/mutation.policy.appTenantRestriction.updatePolicy.json +33 -33
- models/mutation.policy.appTenantRestriction.updateRule.json +33 -33
- models/mutation.policy.appTenantRestriction.updateSection.json +4 -4
- models/mutation.policy.dynamicIpAllocation.addRule.json +12 -12
- models/mutation.policy.dynamicIpAllocation.addSection.json +4 -4
- models/mutation.policy.dynamicIpAllocation.createPolicyRevision.json +18 -18
- models/mutation.policy.dynamicIpAllocation.discardPolicyRevision.json +18 -18
- models/mutation.policy.dynamicIpAllocation.moveRule.json +12 -12
- models/mutation.policy.dynamicIpAllocation.moveSection.json +4 -4
- models/mutation.policy.dynamicIpAllocation.publishPolicyRevision.json +18 -18
- models/mutation.policy.dynamicIpAllocation.removeRule.json +12 -12
- models/mutation.policy.dynamicIpAllocation.removeSection.json +4 -4
- models/mutation.policy.dynamicIpAllocation.updatePolicy.json +18 -18
- models/mutation.policy.dynamicIpAllocation.updateRule.json +12 -12
- models/mutation.policy.dynamicIpAllocation.updateSection.json +4 -4
- models/mutation.policy.internetFirewall.addRule.json +141 -141
- models/mutation.policy.internetFirewall.addSection.json +4 -4
- models/mutation.policy.internetFirewall.createPolicyRevision.json +102 -102
- models/mutation.policy.internetFirewall.discardPolicyRevision.json +102 -102
- models/mutation.policy.internetFirewall.moveRule.json +96 -96
- models/mutation.policy.internetFirewall.moveSection.json +4 -4
- models/mutation.policy.internetFirewall.publishPolicyRevision.json +102 -102
- models/mutation.policy.internetFirewall.removeRule.json +96 -96
- models/mutation.policy.internetFirewall.removeSection.json +4 -4
- models/mutation.policy.internetFirewall.updatePolicy.json +102 -102
- models/mutation.policy.internetFirewall.updateRule.json +141 -141
- models/mutation.policy.internetFirewall.updateSection.json +4 -4
- models/mutation.policy.remotePortFwd.addRule.json +21 -21
- models/mutation.policy.remotePortFwd.addSection.json +4 -4
- models/mutation.policy.remotePortFwd.createPolicyRevision.json +24 -24
- models/mutation.policy.remotePortFwd.discardPolicyRevision.json +24 -24
- models/mutation.policy.remotePortFwd.moveRule.json +18 -18
- models/mutation.policy.remotePortFwd.moveSection.json +4 -4
- models/mutation.policy.remotePortFwd.publishPolicyRevision.json +24 -24
- models/mutation.policy.remotePortFwd.removeRule.json +18 -18
- models/mutation.policy.remotePortFwd.removeSection.json +4 -4
- models/mutation.policy.remotePortFwd.updatePolicy.json +24 -24
- models/mutation.policy.remotePortFwd.updateRule.json +21 -21
- models/mutation.policy.remotePortFwd.updateSection.json +4 -4
- models/mutation.policy.socketLan.addRule.json +97 -97
- models/mutation.policy.socketLan.addSection.json +4 -4
- models/mutation.policy.socketLan.createPolicyRevision.json +91 -91
- models/mutation.policy.socketLan.discardPolicyRevision.json +91 -91
- models/mutation.policy.socketLan.moveRule.json +85 -85
- models/mutation.policy.socketLan.moveSection.json +4 -4
- models/mutation.policy.socketLan.publishPolicyRevision.json +91 -91
- models/mutation.policy.socketLan.removeRule.json +85 -85
- models/mutation.policy.socketLan.removeSection.json +4 -4
- models/mutation.policy.socketLan.updatePolicy.json +91 -91
- models/mutation.policy.socketLan.updateRule.json +97 -97
- models/mutation.policy.socketLan.updateSection.json +4 -4
- models/mutation.policy.terminalServer.addRule.json +7 -7
- models/mutation.policy.terminalServer.addSection.json +4 -4
- models/mutation.policy.terminalServer.createPolicyRevision.json +13 -13
- models/mutation.policy.terminalServer.discardPolicyRevision.json +13 -13
- models/mutation.policy.terminalServer.moveRule.json +7 -7
- models/mutation.policy.terminalServer.moveSection.json +4 -4
- models/mutation.policy.terminalServer.publishPolicyRevision.json +13 -13
- models/mutation.policy.terminalServer.removeRule.json +7 -7
- models/mutation.policy.terminalServer.removeSection.json +4 -4
- models/mutation.policy.terminalServer.updatePolicy.json +13 -13
- models/mutation.policy.terminalServer.updateRule.json +7 -7
- models/mutation.policy.terminalServer.updateSection.json +4 -4
- models/mutation.policy.wanFirewall.addRule.json +157 -157
- models/mutation.policy.wanFirewall.addSection.json +4 -4
- models/mutation.policy.wanFirewall.createPolicyRevision.json +121 -121
- models/mutation.policy.wanFirewall.discardPolicyRevision.json +121 -121
- models/mutation.policy.wanFirewall.moveRule.json +115 -115
- models/mutation.policy.wanFirewall.moveSection.json +4 -4
- models/mutation.policy.wanFirewall.publishPolicyRevision.json +121 -121
- models/mutation.policy.wanFirewall.removeRule.json +115 -115
- models/mutation.policy.wanFirewall.removeSection.json +4 -4
- models/mutation.policy.wanFirewall.updatePolicy.json +121 -121
- models/mutation.policy.wanFirewall.updateRule.json +157 -157
- models/mutation.policy.wanFirewall.updateSection.json +4 -4
- models/mutation.policy.wanNetwork.addRule.json +103 -103
- models/mutation.policy.wanNetwork.addSection.json +4 -4
- models/mutation.policy.wanNetwork.createPolicyRevision.json +97 -97
- models/mutation.policy.wanNetwork.discardPolicyRevision.json +97 -97
- models/mutation.policy.wanNetwork.moveRule.json +91 -91
- models/mutation.policy.wanNetwork.moveSection.json +4 -4
- models/mutation.policy.wanNetwork.publishPolicyRevision.json +97 -97
- models/mutation.policy.wanNetwork.removeRule.json +91 -91
- models/mutation.policy.wanNetwork.removeSection.json +4 -4
- models/mutation.policy.wanNetwork.updatePolicy.json +97 -97
- models/mutation.policy.wanNetwork.updateRule.json +103 -103
- models/mutation.policy.wanNetwork.updateSection.json +4 -4
- models/mutation.site.addBgpPeer.json +10 -10
- models/mutation.site.addIpsecIkeV2SiteTunnels.json +2 -2
- models/mutation.site.addSocketAddOnCard.json +2 -2
- models/mutation.site.assignSiteBwLicense.json +12879 -0
- models/mutation.site.removeBgpPeer.json +10 -10
- models/mutation.site.removeIpsecIkeV2SiteTunnels.json +2 -2
- models/mutation.site.removeSecondaryAwsVSocket.json +375 -0
- models/mutation.site.removeSecondaryAzureVSocket.json +354 -0
- models/mutation.site.removeSiteBwLicense.json +12822 -0
- models/mutation.site.removeSocketAddOnCard.json +2 -2
- models/mutation.site.replaceSiteBwLicense.json +12939 -0
- models/mutation.site.startSiteUpgrade.json +36 -15
- models/mutation.site.updateBgpPeer.json +10 -10
- models/mutation.site.updateIpsecIkeV2SiteTunnels.json +2 -2
- models/mutation.site.updateSecondaryAwsVSocket.json +643 -0
- models/mutation.site.updateSecondaryAzureVSocket.json +565 -0
- models/mutation.site.updateSiteBwLicense.json +12882 -0
- models/mutation.site.updateSiteGeneralDetails.json +724 -1
- models/mutation.sites.addBgpPeer.json +10 -10
- models/mutation.sites.addIpsecIkeV2SiteTunnels.json +2 -2
- models/mutation.sites.addSocketAddOnCard.json +2 -2
- models/mutation.sites.assignSiteBwLicense.json +12879 -0
- models/mutation.sites.removeBgpPeer.json +10 -10
- models/mutation.sites.removeIpsecIkeV2SiteTunnels.json +2 -2
- models/mutation.sites.removeSecondaryAwsVSocket.json +375 -0
- models/mutation.sites.removeSecondaryAzureVSocket.json +354 -0
- models/mutation.sites.removeSiteBwLicense.json +12822 -0
- models/mutation.sites.removeSocketAddOnCard.json +2 -2
- models/mutation.sites.replaceSiteBwLicense.json +12939 -0
- models/mutation.sites.startSiteUpgrade.json +36 -15
- models/mutation.sites.updateBgpPeer.json +10 -10
- models/mutation.sites.updateIpsecIkeV2SiteTunnels.json +2 -2
- models/mutation.sites.updateSecondaryAwsVSocket.json +643 -0
- models/mutation.sites.updateSecondaryAzureVSocket.json +565 -0
- models/mutation.sites.updateSiteBwLicense.json +12882 -0
- models/mutation.sites.updateSiteGeneralDetails.json +724 -1
- models/mutation.xdr.addStoryComment.json +1 -1
- models/mutation.xdr.analystFeedback.json +84 -84
- models/mutation.xdr.deleteStoryComment.json +1 -1
- models/query.accountManagement.json +97 -0
- models/query.accountMetrics.json +45 -45
- models/query.accountSnapshot.json +30 -30
- models/query.admin.json +6 -6
- models/query.admins.json +13 -13
- models/query.appStats.json +915 -867
- models/query.appStatsTimeSeries.json +692 -656
- models/query.auditFeed.json +6 -6
- models/query.catalogs.json +52 -52
- models/query.container.json +16 -16
- models/query.devices.json +20 -93
- models/query.entityLookup.json +2 -2
- models/query.events.json +288 -384
- models/query.eventsFeed.json +73 -97
- models/query.eventsTimeSeries.json +219 -291
- models/query.groups.group.members.json +3058 -0
- models/query.groups.groupList.json +6474 -0
- models/query.groups.whereUsed.json +697 -0
- models/query.hardware.json +27 -7
- models/query.hardwareManagement.json +8 -8
- models/query.licensing.json +3487 -1324
- models/query.policy.appTenantRestriction.policy.json +32 -32
- models/query.policy.dynamicIpAllocation.policy.json +18 -18
- models/query.policy.internetFirewall.policy.json +93 -93
- models/query.policy.remotePortFwd.policy.json +23 -23
- models/query.policy.socketLan.policy.json +88 -88
- models/query.policy.terminalServer.policy.json +13 -13
- models/query.policy.wanFirewall.policy.json +111 -111
- models/query.policy.wanNetwork.policy.json +97 -97
- models/query.popLocations.json +2878 -0
- models/query.sandbox.json +5 -5
- models/query.site.bgpPeer.json +4 -4
- models/query.site.bgpPeerList.json +10 -10
- models/query.site.secondaryAwsVSocket.json +340 -0
- models/query.site.secondaryAzureVSocket.json +319 -0
- models/query.site.siteBgpStatus.json +2 -2
- models/query.socketPortMetrics.json +2410 -0
- models/query.socketPortMetricsTimeSeries.json +2361 -0
- models/query.xdr.stories.json +104 -104
- models/query.xdr.story.json +93 -93
- schema/catolib.py +43 -16
- build/lib/catocli/Utils/clidriver.py +0 -268
- build/lib/catocli/Utils/profile_manager.py +0 -188
- build/lib/catocli/Utils/version_checker.py +0 -192
- build/lib/catocli/__init__.py +0 -2
- build/lib/catocli/__main__.py +0 -12
- build/lib/catocli/parsers/configure/__init__.py +0 -115
- build/lib/catocli/parsers/configure/configure.py +0 -307
- build/lib/catocli/parsers/custom/__init__.py +0 -57
- build/lib/catocli/parsers/custom/customLib.py +0 -561
- build/lib/catocli/parsers/custom/export_rules/__init__.py +0 -42
- build/lib/catocli/parsers/custom/export_rules/export_rules.py +0 -234
- build/lib/catocli/parsers/custom/export_sites/__init__.py +0 -21
- build/lib/catocli/parsers/custom/export_sites/export_sites.py +0 -372
- build/lib/catocli/parsers/custom/import_rules_to_tf/__init__.py +0 -58
- build/lib/catocli/parsers/custom/import_rules_to_tf/import_rules_to_tf.py +0 -451
- build/lib/catocli/parsers/custom/import_sites_to_tf/__init__.py +0 -45
- build/lib/catocli/parsers/custom/import_sites_to_tf/import_sites_to_tf.py +0 -891
- build/lib/catocli/parsers/mutation_accountManagement/__init__.py +0 -48
- build/lib/catocli/parsers/mutation_admin/__init__.py +0 -48
- build/lib/catocli/parsers/mutation_container/__init__.py +0 -138
- build/lib/catocli/parsers/mutation_hardware/__init__.py +0 -22
- build/lib/catocli/parsers/mutation_policy/__init__.py +0 -1305
- build/lib/catocli/parsers/mutation_sandbox/__init__.py +0 -35
- build/lib/catocli/parsers/mutation_site/__init__.py +0 -373
- build/lib/catocli/parsers/mutation_sites/__init__.py +0 -373
- build/lib/catocli/parsers/mutation_xdr/__init__.py +0 -48
- build/lib/catocli/parsers/parserApiClient.py +0 -513
- build/lib/catocli/parsers/query_accountBySubdomain/__init__.py +0 -16
- build/lib/catocli/parsers/query_accountManagement/__init__.py +0 -16
- build/lib/catocli/parsers/query_accountMetrics/__init__.py +0 -16
- build/lib/catocli/parsers/query_accountRoles/__init__.py +0 -16
- build/lib/catocli/parsers/query_accountSnapshot/__init__.py +0 -16
- build/lib/catocli/parsers/query_admin/__init__.py +0 -16
- build/lib/catocli/parsers/query_admins/__init__.py +0 -16
- build/lib/catocli/parsers/query_appStats/__init__.py +0 -16
- build/lib/catocli/parsers/query_appStatsTimeSeries/__init__.py +0 -16
- build/lib/catocli/parsers/query_auditFeed/__init__.py +0 -16
- build/lib/catocli/parsers/query_catalogs/__init__.py +0 -16
- build/lib/catocli/parsers/query_container/__init__.py +0 -16
- build/lib/catocli/parsers/query_devices/__init__.py +0 -16
- build/lib/catocli/parsers/query_entityLookup/__init__.py +0 -16
- build/lib/catocli/parsers/query_events/__init__.py +0 -16
- build/lib/catocli/parsers/query_eventsFeed/__init__.py +0 -16
- build/lib/catocli/parsers/query_eventsTimeSeries/__init__.py +0 -16
- build/lib/catocli/parsers/query_hardware/__init__.py +0 -16
- build/lib/catocli/parsers/query_hardwareManagement/__init__.py +0 -16
- build/lib/catocli/parsers/query_licensing/__init__.py +0 -16
- build/lib/catocli/parsers/query_policy/__init__.py +0 -161
- build/lib/catocli/parsers/query_sandbox/__init__.py +0 -16
- build/lib/catocli/parsers/query_site/__init__.py +0 -100
- build/lib/catocli/parsers/query_siteLocation/__init__.py +0 -13
- build/lib/catocli/parsers/query_subDomains/__init__.py +0 -16
- build/lib/catocli/parsers/query_xdr/__init__.py +0 -35
- build/lib/catocli/parsers/raw/__init__.py +0 -12
- build/lib/graphql_client/__init__.py +0 -11
- build/lib/graphql_client/api/__init__.py +0 -3
- build/lib/graphql_client/api/call_api.py +0 -84
- build/lib/graphql_client/api_client.py +0 -192
- build/lib/graphql_client/api_client_types.py +0 -409
- build/lib/graphql_client/configuration.py +0 -232
- build/lib/graphql_client/models/__init__.py +0 -13
- build/lib/graphql_client/models/no_schema.py +0 -71
- build/lib/schema/catolib.py +0 -1141
- build/lib/schema/importSchema.py +0 -60
- build/lib/schema/remove_policyid.py +0 -89
- build/lib/schema/remove_policyid_mutations.py +0 -89
- build/lib/scripts/catolib.py +0 -62
- build/lib/scripts/export_if_rules_to_json.py +0 -188
- build/lib/scripts/export_wf_rules_to_json.py +0 -111
- build/lib/scripts/import_wf_rules_to_tfstate.py +0 -331
- build/lib/vendor/certifi/__init__.py +0 -4
- build/lib/vendor/certifi/__main__.py +0 -12
- build/lib/vendor/certifi/core.py +0 -114
- build/lib/vendor/certifi/py.typed +0 -0
- build/lib/vendor/six.py +0 -998
- build/lib/vendor/urllib3/__init__.py +0 -211
- build/lib/vendor/urllib3/_base_connection.py +0 -172
- build/lib/vendor/urllib3/_collections.py +0 -483
- build/lib/vendor/urllib3/_request_methods.py +0 -278
- build/lib/vendor/urllib3/_version.py +0 -16
- build/lib/vendor/urllib3/connection.py +0 -1033
- build/lib/vendor/urllib3/connectionpool.py +0 -1182
- build/lib/vendor/urllib3/contrib/__init__.py +0 -0
- build/lib/vendor/urllib3/contrib/emscripten/__init__.py +0 -18
- build/lib/vendor/urllib3/contrib/emscripten/connection.py +0 -254
- build/lib/vendor/urllib3/contrib/emscripten/fetch.py +0 -418
- build/lib/vendor/urllib3/contrib/emscripten/request.py +0 -22
- build/lib/vendor/urllib3/contrib/emscripten/response.py +0 -285
- build/lib/vendor/urllib3/contrib/pyopenssl.py +0 -552
- build/lib/vendor/urllib3/contrib/socks.py +0 -228
- build/lib/vendor/urllib3/exceptions.py +0 -321
- build/lib/vendor/urllib3/fields.py +0 -341
- build/lib/vendor/urllib3/filepost.py +0 -89
- build/lib/vendor/urllib3/http2/__init__.py +0 -53
- build/lib/vendor/urllib3/http2/connection.py +0 -356
- build/lib/vendor/urllib3/http2/probe.py +0 -87
- build/lib/vendor/urllib3/poolmanager.py +0 -637
- build/lib/vendor/urllib3/py.typed +0 -2
- build/lib/vendor/urllib3/response.py +0 -1265
- build/lib/vendor/urllib3/util/__init__.py +0 -42
- build/lib/vendor/urllib3/util/connection.py +0 -137
- build/lib/vendor/urllib3/util/proxy.py +0 -43
- build/lib/vendor/urllib3/util/request.py +0 -256
- build/lib/vendor/urllib3/util/response.py +0 -101
- build/lib/vendor/urllib3/util/retry.py +0 -533
- build/lib/vendor/urllib3/util/ssl_.py +0 -513
- build/lib/vendor/urllib3/util/ssl_match_hostname.py +0 -159
- build/lib/vendor/urllib3/util/ssltransport.py +0 -276
- build/lib/vendor/urllib3/util/timeout.py +0 -275
- build/lib/vendor/urllib3/util/url.py +0 -471
- build/lib/vendor/urllib3/util/util.py +0 -42
- build/lib/vendor/urllib3/util/wait.py +0 -124
- {catocli-2.0.5.dist-info → catocli-2.1.1.dist-info}/entry_points.txt +0 -0
- {catocli-2.0.5.dist-info → catocli-2.1.1.dist-info/licenses}/LICENSE +0 -0
|
@@ -323,7 +323,7 @@
|
|
|
323
323
|
},
|
|
324
324
|
"application": {
|
|
325
325
|
"defaultValue": "{application: [], appCategory: [], customApp: [], customCategory: [], sanctionedAppsCategory: [], domain: [], fqdn: [], ip: [], subnet: [], ipRange: [], globalIpRange: []}",
|
|
326
|
-
"description": "Application traffic matching criteria.\nLogical
|
|
326
|
+
"description": "Application traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
327
327
|
"id_str": "addRule___input___rule___application",
|
|
328
328
|
"name": "application",
|
|
329
329
|
"path": "addRule.input.rule.application",
|
|
@@ -623,7 +623,7 @@
|
|
|
623
623
|
},
|
|
624
624
|
"customCategory": {
|
|
625
625
|
"defaultValue": "[]",
|
|
626
|
-
"description": "Custom Categories
|
|
626
|
+
"description": "Custom Categories \u2013 Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
|
|
627
627
|
"id_str": "addRule___input___rule___application___customCategory",
|
|
628
628
|
"name": "customCategory",
|
|
629
629
|
"path": "addRule.input.rule.application.customCategory",
|
|
@@ -1128,7 +1128,7 @@
|
|
|
1128
1128
|
},
|
|
1129
1129
|
"country": {
|
|
1130
1130
|
"defaultValue": "[]",
|
|
1131
|
-
"description": "Source country traffic matching criteria.\nLogical
|
|
1131
|
+
"description": "Source country traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
1132
1132
|
"id_str": "addRule___input___rule___country",
|
|
1133
1133
|
"name": "country",
|
|
1134
1134
|
"path": "addRule.input.rule.country",
|
|
@@ -1242,7 +1242,7 @@
|
|
|
1242
1242
|
},
|
|
1243
1243
|
"destination": {
|
|
1244
1244
|
"defaultValue": "{host: [], site: [], subnet: [], ip: [], ipRange: [], globalIpRange: [], networkInterface: [], siteNetworkSubnet: [], floatingSubnet: [], user: [], usersGroup: [], group: [], systemGroup: []}",
|
|
1245
|
-
"description": "Destination traffic matching criteria.\nLogical
|
|
1245
|
+
"description": "Destination traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
1246
1246
|
"id_str": "addRule___input___rule___destination",
|
|
1247
1247
|
"name": "destination",
|
|
1248
1248
|
"path": "addRule.input.rule.destination",
|
|
@@ -1272,7 +1272,7 @@
|
|
|
1272
1272
|
"inputFields": {
|
|
1273
1273
|
"by": {
|
|
1274
1274
|
"defaultValue": "ID",
|
|
1275
|
-
"description": "Defines the object identification method
|
|
1275
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
1276
1276
|
"id_str": "addRule___input___rule___destination___floatingSubnet___by",
|
|
1277
1277
|
"name": "by",
|
|
1278
1278
|
"path": "addRule.input.rule.destination.floatingSubnet.by",
|
|
@@ -2336,7 +2336,7 @@
|
|
|
2336
2336
|
},
|
|
2337
2337
|
"device": {
|
|
2338
2338
|
"defaultValue": "[]",
|
|
2339
|
-
"description": "Source Device Profile traffic matching criteria.\nLogical
|
|
2339
|
+
"description": "Source Device Profile traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
2340
2340
|
"id_str": "addRule___input___rule___device",
|
|
2341
2341
|
"name": "device",
|
|
2342
2342
|
"path": "addRule.input.rule.device",
|
|
@@ -2588,7 +2588,7 @@
|
|
|
2588
2588
|
},
|
|
2589
2589
|
"deviceOS": {
|
|
2590
2590
|
"defaultValue": "[]",
|
|
2591
|
-
"description": "Source device Operating System traffic matching criteria.\nLogical
|
|
2591
|
+
"description": "Source device Operating System traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
2592
2592
|
"id_str": "addRule___input___rule___deviceOS",
|
|
2593
2593
|
"name": "deviceOS",
|
|
2594
2594
|
"path": "addRule.input.rule.deviceOS",
|
|
@@ -3034,7 +3034,7 @@
|
|
|
3034
3034
|
},
|
|
3035
3035
|
"customCategory": {
|
|
3036
3036
|
"defaultValue": "[]",
|
|
3037
|
-
"description": "Custom Categories
|
|
3037
|
+
"description": "Custom Categories \u2013 Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
|
|
3038
3038
|
"id_str": "addRule___input___rule___exceptions___application___customCategory",
|
|
3039
3039
|
"name": "customCategory",
|
|
3040
3040
|
"path": "addRule.input.rule.exceptions.application.customCategory",
|
|
@@ -3664,7 +3664,7 @@
|
|
|
3664
3664
|
"inputFields": {
|
|
3665
3665
|
"by": {
|
|
3666
3666
|
"defaultValue": "ID",
|
|
3667
|
-
"description": "Defines the object identification method
|
|
3667
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
3668
3668
|
"id_str": "addRule___input___rule___exceptions___destination___floatingSubnet___by",
|
|
3669
3669
|
"name": "by",
|
|
3670
3670
|
"path": "addRule.input.rule.exceptions.destination.floatingSubnet.by",
|
|
@@ -5449,7 +5449,7 @@
|
|
|
5449
5449
|
"inputFields": {
|
|
5450
5450
|
"by": {
|
|
5451
5451
|
"defaultValue": "ID",
|
|
5452
|
-
"description": "Defines the object identification method
|
|
5452
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
5453
5453
|
"id_str": "addRule___input___rule___exceptions___source___floatingSubnet___by",
|
|
5454
5454
|
"name": "by",
|
|
5455
5455
|
"path": "addRule.input.rule.exceptions.source.floatingSubnet.by",
|
|
@@ -6847,7 +6847,7 @@
|
|
|
6847
6847
|
},
|
|
6848
6848
|
"service": {
|
|
6849
6849
|
"defaultValue": "{standard: [], custom: []}",
|
|
6850
|
-
"description": "Destination service traffic matching criteria.\nLogical
|
|
6850
|
+
"description": "Destination service traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
6851
6851
|
"id_str": "addRule___input___rule___service",
|
|
6852
6852
|
"name": "service",
|
|
6853
6853
|
"path": "addRule.input.rule.service",
|
|
@@ -7155,7 +7155,7 @@
|
|
|
7155
7155
|
},
|
|
7156
7156
|
"source": {
|
|
7157
7157
|
"defaultValue": "{host: [], site: [], subnet: [], ip: [], ipRange: [], globalIpRange: [], networkInterface: [], siteNetworkSubnet: [], floatingSubnet: [], user: [], usersGroup: [], group: [], systemGroup: []}",
|
|
7158
|
-
"description": "Source traffic matching criteria.\nLogical
|
|
7158
|
+
"description": "Source traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
7159
7159
|
"id_str": "addRule___input___rule___source",
|
|
7160
7160
|
"name": "source",
|
|
7161
7161
|
"path": "addRule.input.rule.source",
|
|
@@ -7185,7 +7185,7 @@
|
|
|
7185
7185
|
"inputFields": {
|
|
7186
7186
|
"by": {
|
|
7187
7187
|
"defaultValue": "ID",
|
|
7188
|
-
"description": "Defines the object identification method
|
|
7188
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
7189
7189
|
"id_str": "addRule___input___rule___source___floatingSubnet___by",
|
|
7190
7190
|
"name": "by",
|
|
7191
7191
|
"path": "addRule.input.rule.source.floatingSubnet.by",
|
|
@@ -8279,7 +8279,7 @@
|
|
|
8279
8279
|
"inputFields": {
|
|
8280
8280
|
"enabled": {
|
|
8281
8281
|
"defaultValue": "false",
|
|
8282
|
-
"description": "TRUE
|
|
8282
|
+
"description": "TRUE \u2013 send alerts when the rule is matched, FALSE \u2013 don\u2019t send alerts when the rule is matched",
|
|
8283
8283
|
"id_str": "addRule___input___rule___tracking___alert___enabled",
|
|
8284
8284
|
"name": "enabled",
|
|
8285
8285
|
"path": "addRule.input.rule.tracking.alert.enabled",
|
|
@@ -9279,7 +9279,7 @@
|
|
|
9279
9279
|
},
|
|
9280
9280
|
"application": {
|
|
9281
9281
|
"defaultValue": "{application: [], appCategory: [], customApp: [], customCategory: [], sanctionedAppsCategory: [], domain: [], fqdn: [], ip: [], subnet: [], ipRange: [], globalIpRange: []}",
|
|
9282
|
-
"description": "Application traffic matching criteria.\nLogical
|
|
9282
|
+
"description": "Application traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
9283
9283
|
"id_str": "addRule___input___rule___application",
|
|
9284
9284
|
"name": "application",
|
|
9285
9285
|
"path": "addRule.input.rule.application",
|
|
@@ -9579,7 +9579,7 @@
|
|
|
9579
9579
|
},
|
|
9580
9580
|
"customCategory": {
|
|
9581
9581
|
"defaultValue": "[]",
|
|
9582
|
-
"description": "Custom Categories
|
|
9582
|
+
"description": "Custom Categories \u2013 Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
|
|
9583
9583
|
"id_str": "addRule___input___rule___application___customCategory",
|
|
9584
9584
|
"name": "customCategory",
|
|
9585
9585
|
"path": "addRule.input.rule.application.customCategory",
|
|
@@ -10084,7 +10084,7 @@
|
|
|
10084
10084
|
},
|
|
10085
10085
|
"country": {
|
|
10086
10086
|
"defaultValue": "[]",
|
|
10087
|
-
"description": "Source country traffic matching criteria.\nLogical
|
|
10087
|
+
"description": "Source country traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
10088
10088
|
"id_str": "addRule___input___rule___country",
|
|
10089
10089
|
"name": "country",
|
|
10090
10090
|
"path": "addRule.input.rule.country",
|
|
@@ -10198,7 +10198,7 @@
|
|
|
10198
10198
|
},
|
|
10199
10199
|
"destination": {
|
|
10200
10200
|
"defaultValue": "{host: [], site: [], subnet: [], ip: [], ipRange: [], globalIpRange: [], networkInterface: [], siteNetworkSubnet: [], floatingSubnet: [], user: [], usersGroup: [], group: [], systemGroup: []}",
|
|
10201
|
-
"description": "Destination traffic matching criteria.\nLogical
|
|
10201
|
+
"description": "Destination traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
10202
10202
|
"id_str": "addRule___input___rule___destination",
|
|
10203
10203
|
"name": "destination",
|
|
10204
10204
|
"path": "addRule.input.rule.destination",
|
|
@@ -10228,7 +10228,7 @@
|
|
|
10228
10228
|
"inputFields": {
|
|
10229
10229
|
"by": {
|
|
10230
10230
|
"defaultValue": "ID",
|
|
10231
|
-
"description": "Defines the object identification method
|
|
10231
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
10232
10232
|
"id_str": "addRule___input___rule___destination___floatingSubnet___by",
|
|
10233
10233
|
"name": "by",
|
|
10234
10234
|
"path": "addRule.input.rule.destination.floatingSubnet.by",
|
|
@@ -11292,7 +11292,7 @@
|
|
|
11292
11292
|
},
|
|
11293
11293
|
"device": {
|
|
11294
11294
|
"defaultValue": "[]",
|
|
11295
|
-
"description": "Source Device Profile traffic matching criteria.\nLogical
|
|
11295
|
+
"description": "Source Device Profile traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
11296
11296
|
"id_str": "addRule___input___rule___device",
|
|
11297
11297
|
"name": "device",
|
|
11298
11298
|
"path": "addRule.input.rule.device",
|
|
@@ -11544,7 +11544,7 @@
|
|
|
11544
11544
|
},
|
|
11545
11545
|
"deviceOS": {
|
|
11546
11546
|
"defaultValue": "[]",
|
|
11547
|
-
"description": "Source device Operating System traffic matching criteria.\nLogical
|
|
11547
|
+
"description": "Source device Operating System traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
11548
11548
|
"id_str": "addRule___input___rule___deviceOS",
|
|
11549
11549
|
"name": "deviceOS",
|
|
11550
11550
|
"path": "addRule.input.rule.deviceOS",
|
|
@@ -11990,7 +11990,7 @@
|
|
|
11990
11990
|
},
|
|
11991
11991
|
"customCategory": {
|
|
11992
11992
|
"defaultValue": "[]",
|
|
11993
|
-
"description": "Custom Categories
|
|
11993
|
+
"description": "Custom Categories \u2013 Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
|
|
11994
11994
|
"id_str": "addRule___input___rule___exceptions___application___customCategory",
|
|
11995
11995
|
"name": "customCategory",
|
|
11996
11996
|
"path": "addRule.input.rule.exceptions.application.customCategory",
|
|
@@ -12620,7 +12620,7 @@
|
|
|
12620
12620
|
"inputFields": {
|
|
12621
12621
|
"by": {
|
|
12622
12622
|
"defaultValue": "ID",
|
|
12623
|
-
"description": "Defines the object identification method
|
|
12623
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
12624
12624
|
"id_str": "addRule___input___rule___exceptions___destination___floatingSubnet___by",
|
|
12625
12625
|
"name": "by",
|
|
12626
12626
|
"path": "addRule.input.rule.exceptions.destination.floatingSubnet.by",
|
|
@@ -14405,7 +14405,7 @@
|
|
|
14405
14405
|
"inputFields": {
|
|
14406
14406
|
"by": {
|
|
14407
14407
|
"defaultValue": "ID",
|
|
14408
|
-
"description": "Defines the object identification method
|
|
14408
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
14409
14409
|
"id_str": "addRule___input___rule___exceptions___source___floatingSubnet___by",
|
|
14410
14410
|
"name": "by",
|
|
14411
14411
|
"path": "addRule.input.rule.exceptions.source.floatingSubnet.by",
|
|
@@ -15803,7 +15803,7 @@
|
|
|
15803
15803
|
},
|
|
15804
15804
|
"service": {
|
|
15805
15805
|
"defaultValue": "{standard: [], custom: []}",
|
|
15806
|
-
"description": "Destination service traffic matching criteria.\nLogical
|
|
15806
|
+
"description": "Destination service traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
15807
15807
|
"id_str": "addRule___input___rule___service",
|
|
15808
15808
|
"name": "service",
|
|
15809
15809
|
"path": "addRule.input.rule.service",
|
|
@@ -16111,7 +16111,7 @@
|
|
|
16111
16111
|
},
|
|
16112
16112
|
"source": {
|
|
16113
16113
|
"defaultValue": "{host: [], site: [], subnet: [], ip: [], ipRange: [], globalIpRange: [], networkInterface: [], siteNetworkSubnet: [], floatingSubnet: [], user: [], usersGroup: [], group: [], systemGroup: []}",
|
|
16114
|
-
"description": "Source traffic matching criteria.\nLogical
|
|
16114
|
+
"description": "Source traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
16115
16115
|
"id_str": "addRule___input___rule___source",
|
|
16116
16116
|
"name": "source",
|
|
16117
16117
|
"path": "addRule.input.rule.source",
|
|
@@ -16141,7 +16141,7 @@
|
|
|
16141
16141
|
"inputFields": {
|
|
16142
16142
|
"by": {
|
|
16143
16143
|
"defaultValue": "ID",
|
|
16144
|
-
"description": "Defines the object identification method
|
|
16144
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
16145
16145
|
"id_str": "addRule___input___rule___source___floatingSubnet___by",
|
|
16146
16146
|
"name": "by",
|
|
16147
16147
|
"path": "addRule.input.rule.source.floatingSubnet.by",
|
|
@@ -17235,7 +17235,7 @@
|
|
|
17235
17235
|
"inputFields": {
|
|
17236
17236
|
"enabled": {
|
|
17237
17237
|
"defaultValue": "false",
|
|
17238
|
-
"description": "TRUE
|
|
17238
|
+
"description": "TRUE \u2013 send alerts when the rule is matched, FALSE \u2013 don\u2019t send alerts when the rule is matched",
|
|
17239
17239
|
"id_str": "addRule___input___rule___tracking___alert___enabled",
|
|
17240
17240
|
"name": "enabled",
|
|
17241
17241
|
"path": "addRule.input.rule.tracking.alert.enabled",
|
|
@@ -18188,7 +18188,7 @@
|
|
|
18188
18188
|
},
|
|
18189
18189
|
"application": {
|
|
18190
18190
|
"defaultValue": "{application: [], appCategory: [], customApp: [], customCategory: [], sanctionedAppsCategory: [], domain: [], fqdn: [], ip: [], subnet: [], ipRange: [], globalIpRange: []}",
|
|
18191
|
-
"description": "Application traffic matching criteria.\nLogical
|
|
18191
|
+
"description": "Application traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
18192
18192
|
"id_str": "addRule___input___rule___application",
|
|
18193
18193
|
"name": "application",
|
|
18194
18194
|
"path": "addRule.input.rule.application",
|
|
@@ -18488,7 +18488,7 @@
|
|
|
18488
18488
|
},
|
|
18489
18489
|
"customCategory": {
|
|
18490
18490
|
"defaultValue": "[]",
|
|
18491
|
-
"description": "Custom Categories
|
|
18491
|
+
"description": "Custom Categories \u2013 Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
|
|
18492
18492
|
"id_str": "addRule___input___rule___application___customCategory",
|
|
18493
18493
|
"name": "customCategory",
|
|
18494
18494
|
"path": "addRule.input.rule.application.customCategory",
|
|
@@ -18993,7 +18993,7 @@
|
|
|
18993
18993
|
},
|
|
18994
18994
|
"country": {
|
|
18995
18995
|
"defaultValue": "[]",
|
|
18996
|
-
"description": "Source country traffic matching criteria.\nLogical
|
|
18996
|
+
"description": "Source country traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
18997
18997
|
"id_str": "addRule___input___rule___country",
|
|
18998
18998
|
"name": "country",
|
|
18999
18999
|
"path": "addRule.input.rule.country",
|
|
@@ -19107,7 +19107,7 @@
|
|
|
19107
19107
|
},
|
|
19108
19108
|
"destination": {
|
|
19109
19109
|
"defaultValue": "{host: [], site: [], subnet: [], ip: [], ipRange: [], globalIpRange: [], networkInterface: [], siteNetworkSubnet: [], floatingSubnet: [], user: [], usersGroup: [], group: [], systemGroup: []}",
|
|
19110
|
-
"description": "Destination traffic matching criteria.\nLogical
|
|
19110
|
+
"description": "Destination traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
19111
19111
|
"id_str": "addRule___input___rule___destination",
|
|
19112
19112
|
"name": "destination",
|
|
19113
19113
|
"path": "addRule.input.rule.destination",
|
|
@@ -19137,7 +19137,7 @@
|
|
|
19137
19137
|
"inputFields": {
|
|
19138
19138
|
"by": {
|
|
19139
19139
|
"defaultValue": "ID",
|
|
19140
|
-
"description": "Defines the object identification method
|
|
19140
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
19141
19141
|
"id_str": "addRule___input___rule___destination___floatingSubnet___by",
|
|
19142
19142
|
"name": "by",
|
|
19143
19143
|
"path": "addRule.input.rule.destination.floatingSubnet.by",
|
|
@@ -20201,7 +20201,7 @@
|
|
|
20201
20201
|
},
|
|
20202
20202
|
"device": {
|
|
20203
20203
|
"defaultValue": "[]",
|
|
20204
|
-
"description": "Source Device Profile traffic matching criteria.\nLogical
|
|
20204
|
+
"description": "Source Device Profile traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
20205
20205
|
"id_str": "addRule___input___rule___device",
|
|
20206
20206
|
"name": "device",
|
|
20207
20207
|
"path": "addRule.input.rule.device",
|
|
@@ -20453,7 +20453,7 @@
|
|
|
20453
20453
|
},
|
|
20454
20454
|
"deviceOS": {
|
|
20455
20455
|
"defaultValue": "[]",
|
|
20456
|
-
"description": "Source device Operating System traffic matching criteria.\nLogical
|
|
20456
|
+
"description": "Source device Operating System traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
20457
20457
|
"id_str": "addRule___input___rule___deviceOS",
|
|
20458
20458
|
"name": "deviceOS",
|
|
20459
20459
|
"path": "addRule.input.rule.deviceOS",
|
|
@@ -20899,7 +20899,7 @@
|
|
|
20899
20899
|
},
|
|
20900
20900
|
"customCategory": {
|
|
20901
20901
|
"defaultValue": "[]",
|
|
20902
|
-
"description": "Custom Categories
|
|
20902
|
+
"description": "Custom Categories \u2013 Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
|
|
20903
20903
|
"id_str": "addRule___input___rule___exceptions___application___customCategory",
|
|
20904
20904
|
"name": "customCategory",
|
|
20905
20905
|
"path": "addRule.input.rule.exceptions.application.customCategory",
|
|
@@ -21529,7 +21529,7 @@
|
|
|
21529
21529
|
"inputFields": {
|
|
21530
21530
|
"by": {
|
|
21531
21531
|
"defaultValue": "ID",
|
|
21532
|
-
"description": "Defines the object identification method
|
|
21532
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
21533
21533
|
"id_str": "addRule___input___rule___exceptions___destination___floatingSubnet___by",
|
|
21534
21534
|
"name": "by",
|
|
21535
21535
|
"path": "addRule.input.rule.exceptions.destination.floatingSubnet.by",
|
|
@@ -23314,7 +23314,7 @@
|
|
|
23314
23314
|
"inputFields": {
|
|
23315
23315
|
"by": {
|
|
23316
23316
|
"defaultValue": "ID",
|
|
23317
|
-
"description": "Defines the object identification method
|
|
23317
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
23318
23318
|
"id_str": "addRule___input___rule___exceptions___source___floatingSubnet___by",
|
|
23319
23319
|
"name": "by",
|
|
23320
23320
|
"path": "addRule.input.rule.exceptions.source.floatingSubnet.by",
|
|
@@ -24712,7 +24712,7 @@
|
|
|
24712
24712
|
},
|
|
24713
24713
|
"service": {
|
|
24714
24714
|
"defaultValue": "{standard: [], custom: []}",
|
|
24715
|
-
"description": "Destination service traffic matching criteria.\nLogical
|
|
24715
|
+
"description": "Destination service traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
24716
24716
|
"id_str": "addRule___input___rule___service",
|
|
24717
24717
|
"name": "service",
|
|
24718
24718
|
"path": "addRule.input.rule.service",
|
|
@@ -25020,7 +25020,7 @@
|
|
|
25020
25020
|
},
|
|
25021
25021
|
"source": {
|
|
25022
25022
|
"defaultValue": "{host: [], site: [], subnet: [], ip: [], ipRange: [], globalIpRange: [], networkInterface: [], siteNetworkSubnet: [], floatingSubnet: [], user: [], usersGroup: [], group: [], systemGroup: []}",
|
|
25023
|
-
"description": "Source traffic matching criteria.\nLogical
|
|
25023
|
+
"description": "Source traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
25024
25024
|
"id_str": "addRule___input___rule___source",
|
|
25025
25025
|
"name": "source",
|
|
25026
25026
|
"path": "addRule.input.rule.source",
|
|
@@ -25050,7 +25050,7 @@
|
|
|
25050
25050
|
"inputFields": {
|
|
25051
25051
|
"by": {
|
|
25052
25052
|
"defaultValue": "ID",
|
|
25053
|
-
"description": "Defines the object identification method
|
|
25053
|
+
"description": "Defines the object identification method \u2013 by ID (default) or by name",
|
|
25054
25054
|
"id_str": "addRule___input___rule___source___floatingSubnet___by",
|
|
25055
25055
|
"name": "by",
|
|
25056
25056
|
"path": "addRule.input.rule.source.floatingSubnet.by",
|
|
@@ -26144,7 +26144,7 @@
|
|
|
26144
26144
|
"inputFields": {
|
|
26145
26145
|
"enabled": {
|
|
26146
26146
|
"defaultValue": "false",
|
|
26147
|
-
"description": "TRUE
|
|
26147
|
+
"description": "TRUE \u2013 send alerts when the rule is matched, FALSE \u2013 don\u2019t send alerts when the rule is matched",
|
|
26148
26148
|
"id_str": "addRule___input___rule___tracking___alert___enabled",
|
|
26149
26149
|
"name": "enabled",
|
|
26150
26150
|
"path": "addRule.input.rule.tracking.alert.enabled",
|
|
@@ -26631,7 +26631,7 @@
|
|
|
26631
26631
|
"enumValues": null,
|
|
26632
26632
|
"fields": {
|
|
26633
26633
|
"errors": {
|
|
26634
|
-
"alias": "
|
|
26634
|
+
"alias": "errorsWanFirewallRuleMutationPayload: errors",
|
|
26635
26635
|
"args": {},
|
|
26636
26636
|
"deprecationReason": null,
|
|
26637
26637
|
"description": null,
|
|
@@ -26644,7 +26644,7 @@
|
|
|
26644
26644
|
"responseStr": "errors:$policyMutationError ",
|
|
26645
26645
|
"type": {
|
|
26646
26646
|
"definition": {
|
|
26647
|
-
"description": "The `PolicyMutationError` enum defines various error messages related to policy publishing in the policy platform service.\n\n## Policy Errors\n\n### `ConcurrentPolicyPublish`\n- **Error Message:** \"Another policy is currently publishing\"\n\n### `PolicyRevisionMismatch`\n- **Error Message:** \"Revision is not owned by the admin\"\n\n### `PolicyRevisionNotFound`\n- **Error Message:** \"Revision was not found\"\n\n### `PolicyInvalidEntity`\n- **Error Message:** \"Invalid entity\"\n\n### `DuplicateRuleName`\n- **Error Message:** \"Rule with the same name already exists\"\n\n### `DuplicateSectionName`\n- **Error Message:** \"Section with the same name already exists\"\n\n### `PolicyFailure`\n- **Error Message:** \"Can
|
|
26647
|
+
"description": "The `PolicyMutationError` enum defines various error messages related to policy publishing in the policy platform service.\n\n## Policy Errors\n\n### `ConcurrentPolicyPublish`\n- **Error Message:** \"Another policy is currently publishing\"\n\n### `PolicyRevisionMismatch`\n- **Error Message:** \"Revision is not owned by the admin\"\n\n### `PolicyRevisionNotFound`\n- **Error Message:** \"Revision was not found\"\n\n### `PolicyInvalidEntity`\n- **Error Message:** \"Invalid entity\"\n\n### `DuplicateRuleName`\n- **Error Message:** \"Rule with the same name already exists\"\n\n### `DuplicateSectionName`\n- **Error Message:** \"Section with the same name already exists\"\n\n### `PolicyFailure`\n- **Error Message:** \"Can\u2019t publish policy due to an internal error. Please try again in a few minutes\"\n\n\n## Rule Errors\n\n### `ruleIsLocked`\n- **Error Message:** \"Rule is locked by another revision\"\n\n### `ruleWasRemoved`\n- **Error Message:** \"Rule was already removed\"\n\n### `ruleNotExist`\n- **Error Message:** \"Rule does not exist\"\n\n### `ruleSectionNotExist`\n- **Error Message:** \"Section does not exist\"\n\n### `ruleSectionIsLocked`\n- **Error Message:** \"Section is locked by another revision\"\n\n### `rulePositionInvalid`\n- **Error Message:** \"Rule position is invalid\"\n\n### `ruleNameIsEmpty`\n- **Error Message:** \"Rule name can't be empty\"\n\n### `ruleNameAlreadyExists`\n- **Error Message:** \"Rule with the same name already exists\"\n\n### `ruleSystemModification`\n- **Error Message:** \"Can't modify a system rule\"\n\n### `ruleSystemMove`\n- **Error Message:** \"Can't add a rule above the system rules\"\n\n### `ruleHasInvalidEntity`\n- **Error Message:** \"Rule has an invalid entity\"\n\n### `failedValidatingRule`\n- **Error Message:** \"Something went wrong, couldn't validate rule\"\n\n\n## Section Errors\n\n### `sectionIsLocked`\n- **Error Message:** \"Section is locked by another revision\"\n\n### `sectionSystemMove`\n- **Error Message:** \"Section with system rules cannot be moved or removed\"\n\n### `sectionNotExist`\n- **Error Message:** \"Section does not exist\"\n\n### `sectionPositionInvalid`\n- **Error Message:** \"Section position is invalid\"",
|
|
26648
26648
|
"enumValues": null,
|
|
26649
26649
|
"fields": {
|
|
26650
26650
|
"errorCode": {
|
|
@@ -26707,7 +26707,7 @@
|
|
|
26707
26707
|
"varName": "policyMutationError"
|
|
26708
26708
|
},
|
|
26709
26709
|
"rule": {
|
|
26710
|
-
"alias": "
|
|
26710
|
+
"alias": "ruleWanFirewallRuleMutationPayload: rule",
|
|
26711
26711
|
"args": {},
|
|
26712
26712
|
"deprecationReason": null,
|
|
26713
26713
|
"description": null,
|
|
@@ -26892,7 +26892,7 @@
|
|
|
26892
26892
|
"enumValues": null,
|
|
26893
26893
|
"fields": {
|
|
26894
26894
|
"action": {
|
|
26895
|
-
"alias": "
|
|
26895
|
+
"alias": "actionWanFirewallRule: action",
|
|
26896
26896
|
"args": {},
|
|
26897
26897
|
"deprecationReason": null,
|
|
26898
26898
|
"description": "The action applied by the Internet Firewall if the rule is matched",
|
|
@@ -26944,7 +26944,7 @@
|
|
|
26944
26944
|
"varName": "action"
|
|
26945
26945
|
},
|
|
26946
26946
|
"activePeriod": {
|
|
26947
|
-
"alias": "
|
|
26947
|
+
"alias": "activePeriodWanFirewallRule: activePeriod",
|
|
26948
26948
|
"args": {},
|
|
26949
26949
|
"deprecationReason": null,
|
|
26950
26950
|
"description": "The time period during which the rule is active, outside this period, the rule is inactive",
|
|
@@ -27060,10 +27060,10 @@
|
|
|
27060
27060
|
"varName": "policyRuleActivePeriod"
|
|
27061
27061
|
},
|
|
27062
27062
|
"application": {
|
|
27063
|
-
"alias": "
|
|
27063
|
+
"alias": "applicationWanFirewallRule: application",
|
|
27064
27064
|
"args": {},
|
|
27065
27065
|
"deprecationReason": null,
|
|
27066
|
-
"description": "Application traffic matching criteria.\nLogical
|
|
27066
|
+
"description": "Application traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
27067
27067
|
"id_str": "wanFirewall___addRule___rule___rule___application",
|
|
27068
27068
|
"isDeprecated": false,
|
|
27069
27069
|
"name": "application",
|
|
@@ -27077,7 +27077,7 @@
|
|
|
27077
27077
|
"enumValues": null,
|
|
27078
27078
|
"fields": {
|
|
27079
27079
|
"appCategory": {
|
|
27080
|
-
"alias": "
|
|
27080
|
+
"alias": "appCategoryWanFirewallApplication: appCategory",
|
|
27081
27081
|
"args": {},
|
|
27082
27082
|
"deprecationReason": null,
|
|
27083
27083
|
"description": "Cato category of applications which are dynamically updated by Cato",
|
|
@@ -27155,7 +27155,7 @@
|
|
|
27155
27155
|
"varName": "applicationCategoryRef"
|
|
27156
27156
|
},
|
|
27157
27157
|
"application": {
|
|
27158
|
-
"alias": "
|
|
27158
|
+
"alias": "applicationWanFirewallApplication: application",
|
|
27159
27159
|
"args": {},
|
|
27160
27160
|
"deprecationReason": null,
|
|
27161
27161
|
"description": "Applications for the rule (pre-defined)",
|
|
@@ -27233,7 +27233,7 @@
|
|
|
27233
27233
|
"varName": "applicationRef"
|
|
27234
27234
|
},
|
|
27235
27235
|
"customApp": {
|
|
27236
|
-
"alias": "
|
|
27236
|
+
"alias": "customAppWanFirewallApplication: customApp",
|
|
27237
27237
|
"args": {},
|
|
27238
27238
|
"deprecationReason": null,
|
|
27239
27239
|
"description": "Custom (user-defined) applications",
|
|
@@ -27311,10 +27311,10 @@
|
|
|
27311
27311
|
"varName": "customApplicationRef"
|
|
27312
27312
|
},
|
|
27313
27313
|
"customCategory": {
|
|
27314
|
-
"alias": "
|
|
27314
|
+
"alias": "customCategoryWanFirewallApplication: customCategory",
|
|
27315
27315
|
"args": {},
|
|
27316
27316
|
"deprecationReason": null,
|
|
27317
|
-
"description": "Custom Categories
|
|
27317
|
+
"description": "Custom Categories \u2013 Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
|
|
27318
27318
|
"id_str": "wanFirewall___addRule___rule___rule___application___customCategory",
|
|
27319
27319
|
"isDeprecated": false,
|
|
27320
27320
|
"name": "customCategory",
|
|
@@ -27435,7 +27435,7 @@
|
|
|
27435
27435
|
"varName": "fqdn"
|
|
27436
27436
|
},
|
|
27437
27437
|
"globalIpRange": {
|
|
27438
|
-
"alias": "
|
|
27438
|
+
"alias": "globalIpRangeWanFirewallApplication: globalIpRange",
|
|
27439
27439
|
"args": {},
|
|
27440
27440
|
"deprecationReason": null,
|
|
27441
27441
|
"description": "Globally defined IP range, IP and subnet objects",
|
|
@@ -27536,7 +27536,7 @@
|
|
|
27536
27536
|
"varName": "ip"
|
|
27537
27537
|
},
|
|
27538
27538
|
"ipRange": {
|
|
27539
|
-
"alias": "
|
|
27539
|
+
"alias": "ipRangeWanFirewallApplication: ipRange",
|
|
27540
27540
|
"args": {},
|
|
27541
27541
|
"deprecationReason": null,
|
|
27542
27542
|
"description": "A range of IPs. Every IP within the range will be matched",
|
|
@@ -27614,7 +27614,7 @@
|
|
|
27614
27614
|
"varName": "ipAddressRange"
|
|
27615
27615
|
},
|
|
27616
27616
|
"sanctionedAppsCategory": {
|
|
27617
|
-
"alias": "
|
|
27617
|
+
"alias": "sanctionedAppsCategoryWanFirewallApplication: sanctionedAppsCategory",
|
|
27618
27618
|
"args": {},
|
|
27619
27619
|
"deprecationReason": null,
|
|
27620
27620
|
"description": "Sanctioned Cloud Applications - apps that are approved and generally represent an understood and acceptable level of risk in your organization.",
|
|
@@ -27732,7 +27732,7 @@
|
|
|
27732
27732
|
"varName": "wanFirewallApplication"
|
|
27733
27733
|
},
|
|
27734
27734
|
"connectionOrigin": {
|
|
27735
|
-
"alias": "
|
|
27735
|
+
"alias": "connectionOriginWanFirewallRule: connectionOrigin",
|
|
27736
27736
|
"args": {},
|
|
27737
27737
|
"deprecationReason": null,
|
|
27738
27738
|
"description": "Connection origin of the traffic",
|
|
@@ -27784,10 +27784,10 @@
|
|
|
27784
27784
|
"varName": "connectionOrigin"
|
|
27785
27785
|
},
|
|
27786
27786
|
"country": {
|
|
27787
|
-
"alias": "
|
|
27787
|
+
"alias": "countryWanFirewallRule: country",
|
|
27788
27788
|
"args": {},
|
|
27789
27789
|
"deprecationReason": null,
|
|
27790
|
-
"description": "Source country traffic matching criteria.\nLogical
|
|
27790
|
+
"description": "Source country traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
27791
27791
|
"id_str": "wanFirewall___addRule___rule___rule___country",
|
|
27792
27792
|
"isDeprecated": false,
|
|
27793
27793
|
"name": "country",
|
|
@@ -27883,10 +27883,10 @@
|
|
|
27883
27883
|
"varName": "description"
|
|
27884
27884
|
},
|
|
27885
27885
|
"destination": {
|
|
27886
|
-
"alias": "
|
|
27886
|
+
"alias": "destinationWanFirewallRule: destination",
|
|
27887
27887
|
"args": {},
|
|
27888
27888
|
"deprecationReason": null,
|
|
27889
|
-
"description": "Destination traffic matching criteria.\nLogical
|
|
27889
|
+
"description": "Destination traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
27890
27890
|
"id_str": "wanFirewall___addRule___rule___rule___destination",
|
|
27891
27891
|
"isDeprecated": false,
|
|
27892
27892
|
"name": "destination",
|
|
@@ -27900,7 +27900,7 @@
|
|
|
27900
27900
|
"enumValues": null,
|
|
27901
27901
|
"fields": {
|
|
27902
27902
|
"floatingSubnet": {
|
|
27903
|
-
"alias": "
|
|
27903
|
+
"alias": "floatingSubnetWanFirewallDestination: floatingSubnet",
|
|
27904
27904
|
"args": {},
|
|
27905
27905
|
"deprecationReason": null,
|
|
27906
27906
|
"description": "Floating Subnets (ie. Floating Ranges) are used to identify traffic exactly matched to the route advertised by BGP.\nThey are not associated with a specific site.\nThis is useful in scenarios such as active-standby high availability routed via BGP.",
|
|
@@ -27978,7 +27978,7 @@
|
|
|
27978
27978
|
"varName": "floatingSubnetRef"
|
|
27979
27979
|
},
|
|
27980
27980
|
"globalIpRange": {
|
|
27981
|
-
"alias": "
|
|
27981
|
+
"alias": "globalIpRangeWanFirewallDestination: globalIpRange",
|
|
27982
27982
|
"args": {},
|
|
27983
27983
|
"deprecationReason": null,
|
|
27984
27984
|
"description": "Globally defined IP range, IP and subnet objects",
|
|
@@ -28056,7 +28056,7 @@
|
|
|
28056
28056
|
"varName": "globalIpRangeRef"
|
|
28057
28057
|
},
|
|
28058
28058
|
"group": {
|
|
28059
|
-
"alias": "
|
|
28059
|
+
"alias": "groupWanFirewallDestination: group",
|
|
28060
28060
|
"args": {},
|
|
28061
28061
|
"deprecationReason": null,
|
|
28062
28062
|
"description": "Groups defined for your account",
|
|
@@ -28134,7 +28134,7 @@
|
|
|
28134
28134
|
"varName": "groupRef"
|
|
28135
28135
|
},
|
|
28136
28136
|
"host": {
|
|
28137
|
-
"alias": "
|
|
28137
|
+
"alias": "hostWanFirewallDestination: host",
|
|
28138
28138
|
"args": {},
|
|
28139
28139
|
"deprecationReason": null,
|
|
28140
28140
|
"description": "Hosts and servers defined for your account",
|
|
@@ -28235,7 +28235,7 @@
|
|
|
28235
28235
|
"varName": "ip"
|
|
28236
28236
|
},
|
|
28237
28237
|
"ipRange": {
|
|
28238
|
-
"alias": "
|
|
28238
|
+
"alias": "ipRangeWanFirewallDestination: ipRange",
|
|
28239
28239
|
"args": {},
|
|
28240
28240
|
"deprecationReason": null,
|
|
28241
28241
|
"description": "Multiple separate IP addresses or an IP range",
|
|
@@ -28313,7 +28313,7 @@
|
|
|
28313
28313
|
"varName": "ipAddressRange"
|
|
28314
28314
|
},
|
|
28315
28315
|
"networkInterface": {
|
|
28316
|
-
"alias": "
|
|
28316
|
+
"alias": "networkInterfaceWanFirewallDestination: networkInterface",
|
|
28317
28317
|
"args": {},
|
|
28318
28318
|
"deprecationReason": null,
|
|
28319
28319
|
"description": "Network range defined for a site",
|
|
@@ -28391,7 +28391,7 @@
|
|
|
28391
28391
|
"varName": "networkInterfaceRef"
|
|
28392
28392
|
},
|
|
28393
28393
|
"site": {
|
|
28394
|
-
"alias": "
|
|
28394
|
+
"alias": "siteWanFirewallDestination: site",
|
|
28395
28395
|
"args": {},
|
|
28396
28396
|
"deprecationReason": null,
|
|
28397
28397
|
"description": "Site defined for the account",
|
|
@@ -28469,7 +28469,7 @@
|
|
|
28469
28469
|
"varName": "siteRef"
|
|
28470
28470
|
},
|
|
28471
28471
|
"siteNetworkSubnet": {
|
|
28472
|
-
"alias": "
|
|
28472
|
+
"alias": "siteNetworkSubnetWanFirewallDestination: siteNetworkSubnet",
|
|
28473
28473
|
"args": {},
|
|
28474
28474
|
"deprecationReason": null,
|
|
28475
28475
|
"description": "GlobalRange + InterfaceSubnet",
|
|
@@ -28570,7 +28570,7 @@
|
|
|
28570
28570
|
"varName": "subnet"
|
|
28571
28571
|
},
|
|
28572
28572
|
"systemGroup": {
|
|
28573
|
-
"alias": "
|
|
28573
|
+
"alias": "systemGroupWanFirewallDestination: systemGroup",
|
|
28574
28574
|
"args": {},
|
|
28575
28575
|
"deprecationReason": null,
|
|
28576
28576
|
"description": "Predefined Cato groups",
|
|
@@ -28648,7 +28648,7 @@
|
|
|
28648
28648
|
"varName": "systemGroupRef"
|
|
28649
28649
|
},
|
|
28650
28650
|
"user": {
|
|
28651
|
-
"alias": "
|
|
28651
|
+
"alias": "userWanFirewallDestination: user",
|
|
28652
28652
|
"args": {},
|
|
28653
28653
|
"deprecationReason": null,
|
|
28654
28654
|
"description": "Individual users defined for the account",
|
|
@@ -28726,7 +28726,7 @@
|
|
|
28726
28726
|
"varName": "userRef"
|
|
28727
28727
|
},
|
|
28728
28728
|
"usersGroup": {
|
|
28729
|
-
"alias": "
|
|
28729
|
+
"alias": "usersGroupWanFirewallDestination: usersGroup",
|
|
28730
28730
|
"args": {},
|
|
28731
28731
|
"deprecationReason": null,
|
|
28732
28732
|
"description": "Group of users",
|
|
@@ -28821,10 +28821,10 @@
|
|
|
28821
28821
|
"varName": "wanFirewallDestination"
|
|
28822
28822
|
},
|
|
28823
28823
|
"device": {
|
|
28824
|
-
"alias": "
|
|
28824
|
+
"alias": "deviceWanFirewallRule: device",
|
|
28825
28825
|
"args": {},
|
|
28826
28826
|
"deprecationReason": null,
|
|
28827
|
-
"description": "Source Device Profile traffic matching criteria.\nLogical
|
|
28827
|
+
"description": "Source Device Profile traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
28828
28828
|
"id_str": "wanFirewall___addRule___rule___rule___device",
|
|
28829
28829
|
"isDeprecated": false,
|
|
28830
28830
|
"name": "device",
|
|
@@ -28899,7 +28899,7 @@
|
|
|
28899
28899
|
"varName": "deviceProfileRef"
|
|
28900
28900
|
},
|
|
28901
28901
|
"deviceAttributes": {
|
|
28902
|
-
"alias": "
|
|
28902
|
+
"alias": "deviceAttributesWanFirewallRule: deviceAttributes",
|
|
28903
28903
|
"args": {},
|
|
28904
28904
|
"deprecationReason": null,
|
|
28905
28905
|
"description": "Additional device attributes such as category, type, model, and manufacturer.\nLogical 'OR' is applied within the criteria set.\nLogical 'AND' is applied between criteria sets.",
|
|
@@ -29071,10 +29071,10 @@
|
|
|
29071
29071
|
"varName": "deviceAttributes"
|
|
29072
29072
|
},
|
|
29073
29073
|
"deviceOS": {
|
|
29074
|
-
"alias": "
|
|
29074
|
+
"alias": "deviceOSWanFirewallRule: deviceOS",
|
|
29075
29075
|
"args": {},
|
|
29076
29076
|
"deprecationReason": null,
|
|
29077
|
-
"description": "Source device Operating System traffic matching criteria.\nLogical
|
|
29077
|
+
"description": "Source device Operating System traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
29078
29078
|
"id_str": "wanFirewall___addRule___rule___rule___deviceOS",
|
|
29079
29079
|
"isDeprecated": false,
|
|
29080
29080
|
"name": "deviceOS",
|
|
@@ -29143,7 +29143,7 @@
|
|
|
29143
29143
|
"varName": "deviceOS"
|
|
29144
29144
|
},
|
|
29145
29145
|
"direction": {
|
|
29146
|
-
"alias": "
|
|
29146
|
+
"alias": "directionWanFirewallRule: direction",
|
|
29147
29147
|
"args": {},
|
|
29148
29148
|
"deprecationReason": null,
|
|
29149
29149
|
"description": null,
|
|
@@ -29210,7 +29210,7 @@
|
|
|
29210
29210
|
"varName": "enabled"
|
|
29211
29211
|
},
|
|
29212
29212
|
"exceptions": {
|
|
29213
|
-
"alias": "
|
|
29213
|
+
"alias": "exceptionsWanFirewallRule: exceptions",
|
|
29214
29214
|
"args": {},
|
|
29215
29215
|
"deprecationReason": null,
|
|
29216
29216
|
"description": "The set of exceptions for the rule.\nExceptions define when the rule will be ignored and the firewall evaluation will continue with the lower priority rules.",
|
|
@@ -29227,7 +29227,7 @@
|
|
|
29227
29227
|
"enumValues": null,
|
|
29228
29228
|
"fields": {
|
|
29229
29229
|
"application": {
|
|
29230
|
-
"alias": "
|
|
29230
|
+
"alias": "applicationWanFirewallRuleException: application",
|
|
29231
29231
|
"args": {},
|
|
29232
29232
|
"deprecationReason": null,
|
|
29233
29233
|
"description": "Application matching criteria for the exception.",
|
|
@@ -29244,7 +29244,7 @@
|
|
|
29244
29244
|
"enumValues": null,
|
|
29245
29245
|
"fields": {
|
|
29246
29246
|
"appCategory": {
|
|
29247
|
-
"alias": "
|
|
29247
|
+
"alias": "appCategoryWanFirewallApplication: appCategory",
|
|
29248
29248
|
"args": {},
|
|
29249
29249
|
"deprecationReason": null,
|
|
29250
29250
|
"description": "Cato category of applications which are dynamically updated by Cato",
|
|
@@ -29322,7 +29322,7 @@
|
|
|
29322
29322
|
"varName": "applicationCategoryRef"
|
|
29323
29323
|
},
|
|
29324
29324
|
"application": {
|
|
29325
|
-
"alias": "
|
|
29325
|
+
"alias": "applicationWanFirewallApplication: application",
|
|
29326
29326
|
"args": {},
|
|
29327
29327
|
"deprecationReason": null,
|
|
29328
29328
|
"description": "Applications for the rule (pre-defined)",
|
|
@@ -29400,7 +29400,7 @@
|
|
|
29400
29400
|
"varName": "applicationRef"
|
|
29401
29401
|
},
|
|
29402
29402
|
"customApp": {
|
|
29403
|
-
"alias": "
|
|
29403
|
+
"alias": "customAppWanFirewallApplication: customApp",
|
|
29404
29404
|
"args": {},
|
|
29405
29405
|
"deprecationReason": null,
|
|
29406
29406
|
"description": "Custom (user-defined) applications",
|
|
@@ -29478,10 +29478,10 @@
|
|
|
29478
29478
|
"varName": "customApplicationRef"
|
|
29479
29479
|
},
|
|
29480
29480
|
"customCategory": {
|
|
29481
|
-
"alias": "
|
|
29481
|
+
"alias": "customCategoryWanFirewallApplication: customCategory",
|
|
29482
29482
|
"args": {},
|
|
29483
29483
|
"deprecationReason": null,
|
|
29484
|
-
"description": "Custom Categories
|
|
29484
|
+
"description": "Custom Categories \u2013 Groups of objects such as predefined and custom applications, predefined and custom services, domains, FQDNs etc.",
|
|
29485
29485
|
"id_str": "wanFirewall___addRule___rule___rule___exceptions___application___customCategory",
|
|
29486
29486
|
"isDeprecated": false,
|
|
29487
29487
|
"name": "customCategory",
|
|
@@ -29602,7 +29602,7 @@
|
|
|
29602
29602
|
"varName": "fqdn"
|
|
29603
29603
|
},
|
|
29604
29604
|
"globalIpRange": {
|
|
29605
|
-
"alias": "
|
|
29605
|
+
"alias": "globalIpRangeWanFirewallApplication: globalIpRange",
|
|
29606
29606
|
"args": {},
|
|
29607
29607
|
"deprecationReason": null,
|
|
29608
29608
|
"description": "Globally defined IP range, IP and subnet objects",
|
|
@@ -29703,7 +29703,7 @@
|
|
|
29703
29703
|
"varName": "ip"
|
|
29704
29704
|
},
|
|
29705
29705
|
"ipRange": {
|
|
29706
|
-
"alias": "
|
|
29706
|
+
"alias": "ipRangeWanFirewallApplication: ipRange",
|
|
29707
29707
|
"args": {},
|
|
29708
29708
|
"deprecationReason": null,
|
|
29709
29709
|
"description": "A range of IPs. Every IP within the range will be matched",
|
|
@@ -29781,7 +29781,7 @@
|
|
|
29781
29781
|
"varName": "ipAddressRange"
|
|
29782
29782
|
},
|
|
29783
29783
|
"sanctionedAppsCategory": {
|
|
29784
|
-
"alias": "
|
|
29784
|
+
"alias": "sanctionedAppsCategoryWanFirewallApplication: sanctionedAppsCategory",
|
|
29785
29785
|
"args": {},
|
|
29786
29786
|
"deprecationReason": null,
|
|
29787
29787
|
"description": "Sanctioned Cloud Applications - apps that are approved and generally represent an understood and acceptable level of risk in your organization.",
|
|
@@ -29899,7 +29899,7 @@
|
|
|
29899
29899
|
"varName": "wanFirewallApplication"
|
|
29900
29900
|
},
|
|
29901
29901
|
"connectionOrigin": {
|
|
29902
|
-
"alias": "
|
|
29902
|
+
"alias": "connectionOriginWanFirewallRuleException: connectionOrigin",
|
|
29903
29903
|
"args": {},
|
|
29904
29904
|
"deprecationReason": null,
|
|
29905
29905
|
"description": "Connection origin matching criteria for the exception.",
|
|
@@ -29951,7 +29951,7 @@
|
|
|
29951
29951
|
"varName": "connectionOrigin"
|
|
29952
29952
|
},
|
|
29953
29953
|
"country": {
|
|
29954
|
-
"alias": "
|
|
29954
|
+
"alias": "countryWanFirewallRuleException: country",
|
|
29955
29955
|
"args": {},
|
|
29956
29956
|
"deprecationReason": null,
|
|
29957
29957
|
"description": "Source country matching criteria for the exception.",
|
|
@@ -30029,7 +30029,7 @@
|
|
|
30029
30029
|
"varName": "countryRef"
|
|
30030
30030
|
},
|
|
30031
30031
|
"destination": {
|
|
30032
|
-
"alias": "
|
|
30032
|
+
"alias": "destinationWanFirewallRuleException: destination",
|
|
30033
30033
|
"args": {},
|
|
30034
30034
|
"deprecationReason": null,
|
|
30035
30035
|
"description": "Destination matching criteria for the exception.",
|
|
@@ -30046,7 +30046,7 @@
|
|
|
30046
30046
|
"enumValues": null,
|
|
30047
30047
|
"fields": {
|
|
30048
30048
|
"floatingSubnet": {
|
|
30049
|
-
"alias": "
|
|
30049
|
+
"alias": "floatingSubnetWanFirewallDestination: floatingSubnet",
|
|
30050
30050
|
"args": {},
|
|
30051
30051
|
"deprecationReason": null,
|
|
30052
30052
|
"description": "Floating Subnets (ie. Floating Ranges) are used to identify traffic exactly matched to the route advertised by BGP.\nThey are not associated with a specific site.\nThis is useful in scenarios such as active-standby high availability routed via BGP.",
|
|
@@ -30124,7 +30124,7 @@
|
|
|
30124
30124
|
"varName": "floatingSubnetRef"
|
|
30125
30125
|
},
|
|
30126
30126
|
"globalIpRange": {
|
|
30127
|
-
"alias": "
|
|
30127
|
+
"alias": "globalIpRangeWanFirewallDestination: globalIpRange",
|
|
30128
30128
|
"args": {},
|
|
30129
30129
|
"deprecationReason": null,
|
|
30130
30130
|
"description": "Globally defined IP range, IP and subnet objects",
|
|
@@ -30202,7 +30202,7 @@
|
|
|
30202
30202
|
"varName": "globalIpRangeRef"
|
|
30203
30203
|
},
|
|
30204
30204
|
"group": {
|
|
30205
|
-
"alias": "
|
|
30205
|
+
"alias": "groupWanFirewallDestination: group",
|
|
30206
30206
|
"args": {},
|
|
30207
30207
|
"deprecationReason": null,
|
|
30208
30208
|
"description": "Groups defined for your account",
|
|
@@ -30280,7 +30280,7 @@
|
|
|
30280
30280
|
"varName": "groupRef"
|
|
30281
30281
|
},
|
|
30282
30282
|
"host": {
|
|
30283
|
-
"alias": "
|
|
30283
|
+
"alias": "hostWanFirewallDestination: host",
|
|
30284
30284
|
"args": {},
|
|
30285
30285
|
"deprecationReason": null,
|
|
30286
30286
|
"description": "Hosts and servers defined for your account",
|
|
@@ -30381,7 +30381,7 @@
|
|
|
30381
30381
|
"varName": "ip"
|
|
30382
30382
|
},
|
|
30383
30383
|
"ipRange": {
|
|
30384
|
-
"alias": "
|
|
30384
|
+
"alias": "ipRangeWanFirewallDestination: ipRange",
|
|
30385
30385
|
"args": {},
|
|
30386
30386
|
"deprecationReason": null,
|
|
30387
30387
|
"description": "Multiple separate IP addresses or an IP range",
|
|
@@ -30459,7 +30459,7 @@
|
|
|
30459
30459
|
"varName": "ipAddressRange"
|
|
30460
30460
|
},
|
|
30461
30461
|
"networkInterface": {
|
|
30462
|
-
"alias": "
|
|
30462
|
+
"alias": "networkInterfaceWanFirewallDestination: networkInterface",
|
|
30463
30463
|
"args": {},
|
|
30464
30464
|
"deprecationReason": null,
|
|
30465
30465
|
"description": "Network range defined for a site",
|
|
@@ -30537,7 +30537,7 @@
|
|
|
30537
30537
|
"varName": "networkInterfaceRef"
|
|
30538
30538
|
},
|
|
30539
30539
|
"site": {
|
|
30540
|
-
"alias": "
|
|
30540
|
+
"alias": "siteWanFirewallDestination: site",
|
|
30541
30541
|
"args": {},
|
|
30542
30542
|
"deprecationReason": null,
|
|
30543
30543
|
"description": "Site defined for the account",
|
|
@@ -30615,7 +30615,7 @@
|
|
|
30615
30615
|
"varName": "siteRef"
|
|
30616
30616
|
},
|
|
30617
30617
|
"siteNetworkSubnet": {
|
|
30618
|
-
"alias": "
|
|
30618
|
+
"alias": "siteNetworkSubnetWanFirewallDestination: siteNetworkSubnet",
|
|
30619
30619
|
"args": {},
|
|
30620
30620
|
"deprecationReason": null,
|
|
30621
30621
|
"description": "GlobalRange + InterfaceSubnet",
|
|
@@ -30716,7 +30716,7 @@
|
|
|
30716
30716
|
"varName": "subnet"
|
|
30717
30717
|
},
|
|
30718
30718
|
"systemGroup": {
|
|
30719
|
-
"alias": "
|
|
30719
|
+
"alias": "systemGroupWanFirewallDestination: systemGroup",
|
|
30720
30720
|
"args": {},
|
|
30721
30721
|
"deprecationReason": null,
|
|
30722
30722
|
"description": "Predefined Cato groups",
|
|
@@ -30794,7 +30794,7 @@
|
|
|
30794
30794
|
"varName": "systemGroupRef"
|
|
30795
30795
|
},
|
|
30796
30796
|
"user": {
|
|
30797
|
-
"alias": "
|
|
30797
|
+
"alias": "userWanFirewallDestination: user",
|
|
30798
30798
|
"args": {},
|
|
30799
30799
|
"deprecationReason": null,
|
|
30800
30800
|
"description": "Individual users defined for the account",
|
|
@@ -30872,7 +30872,7 @@
|
|
|
30872
30872
|
"varName": "userRef"
|
|
30873
30873
|
},
|
|
30874
30874
|
"usersGroup": {
|
|
30875
|
-
"alias": "
|
|
30875
|
+
"alias": "usersGroupWanFirewallDestination: usersGroup",
|
|
30876
30876
|
"args": {},
|
|
30877
30877
|
"deprecationReason": null,
|
|
30878
30878
|
"description": "Group of users",
|
|
@@ -30967,7 +30967,7 @@
|
|
|
30967
30967
|
"varName": "wanFirewallDestination"
|
|
30968
30968
|
},
|
|
30969
30969
|
"device": {
|
|
30970
|
-
"alias": "
|
|
30970
|
+
"alias": "deviceWanFirewallRuleException: device",
|
|
30971
30971
|
"args": {},
|
|
30972
30972
|
"deprecationReason": null,
|
|
30973
30973
|
"description": "Source Device Profile matching criteria for the exception.",
|
|
@@ -31045,7 +31045,7 @@
|
|
|
31045
31045
|
"varName": "deviceProfileRef"
|
|
31046
31046
|
},
|
|
31047
31047
|
"deviceAttributes": {
|
|
31048
|
-
"alias": "
|
|
31048
|
+
"alias": "deviceAttributesWanFirewallRuleException: deviceAttributes",
|
|
31049
31049
|
"args": {},
|
|
31050
31050
|
"deprecationReason": null,
|
|
31051
31051
|
"description": "Source Device Attributes matching criteria for the exception.",
|
|
@@ -31217,7 +31217,7 @@
|
|
|
31217
31217
|
"varName": "deviceAttributes"
|
|
31218
31218
|
},
|
|
31219
31219
|
"deviceOS": {
|
|
31220
|
-
"alias": "
|
|
31220
|
+
"alias": "deviceOSWanFirewallRuleException: deviceOS",
|
|
31221
31221
|
"args": {},
|
|
31222
31222
|
"deprecationReason": null,
|
|
31223
31223
|
"description": "Source device OS matching criteria for the exception.",
|
|
@@ -31289,7 +31289,7 @@
|
|
|
31289
31289
|
"varName": "deviceOS"
|
|
31290
31290
|
},
|
|
31291
31291
|
"direction": {
|
|
31292
|
-
"alias": "
|
|
31292
|
+
"alias": "directionWanFirewallRuleException: direction",
|
|
31293
31293
|
"args": {},
|
|
31294
31294
|
"deprecationReason": null,
|
|
31295
31295
|
"description": "Direction origin matching criteria for the exception",
|
|
@@ -31356,7 +31356,7 @@
|
|
|
31356
31356
|
"varName": "name"
|
|
31357
31357
|
},
|
|
31358
31358
|
"service": {
|
|
31359
|
-
"alias": "
|
|
31359
|
+
"alias": "serviceWanFirewallRuleException: service",
|
|
31360
31360
|
"args": {},
|
|
31361
31361
|
"deprecationReason": null,
|
|
31362
31362
|
"description": "Destination service matching criteria for the exception.",
|
|
@@ -31373,7 +31373,7 @@
|
|
|
31373
31373
|
"enumValues": null,
|
|
31374
31374
|
"fields": {
|
|
31375
31375
|
"custom": {
|
|
31376
|
-
"alias": "
|
|
31376
|
+
"alias": "customWanFirewallServiceType: custom",
|
|
31377
31377
|
"args": {},
|
|
31378
31378
|
"deprecationReason": null,
|
|
31379
31379
|
"description": null,
|
|
@@ -31412,7 +31412,7 @@
|
|
|
31412
31412
|
"varName": "port"
|
|
31413
31413
|
},
|
|
31414
31414
|
"portRange": {
|
|
31415
|
-
"alias": "
|
|
31415
|
+
"alias": "portRangeCustomService: portRange",
|
|
31416
31416
|
"args": {},
|
|
31417
31417
|
"deprecationReason": null,
|
|
31418
31418
|
"description": null,
|
|
@@ -31487,7 +31487,7 @@
|
|
|
31487
31487
|
"varName": "portRange"
|
|
31488
31488
|
},
|
|
31489
31489
|
"protocol": {
|
|
31490
|
-
"alias": "
|
|
31490
|
+
"alias": "protocolCustomService: protocol",
|
|
31491
31491
|
"args": {},
|
|
31492
31492
|
"deprecationReason": null,
|
|
31493
31493
|
"description": null,
|
|
@@ -31570,7 +31570,7 @@
|
|
|
31570
31570
|
"varName": "customService"
|
|
31571
31571
|
},
|
|
31572
31572
|
"standard": {
|
|
31573
|
-
"alias": "
|
|
31573
|
+
"alias": "standardWanFirewallServiceType: standard",
|
|
31574
31574
|
"args": {},
|
|
31575
31575
|
"deprecationReason": null,
|
|
31576
31576
|
"description": null,
|
|
@@ -31665,7 +31665,7 @@
|
|
|
31665
31665
|
"varName": "wanFirewallServiceType"
|
|
31666
31666
|
},
|
|
31667
31667
|
"source": {
|
|
31668
|
-
"alias": "
|
|
31668
|
+
"alias": "sourceWanFirewallRuleException: source",
|
|
31669
31669
|
"args": {},
|
|
31670
31670
|
"deprecationReason": null,
|
|
31671
31671
|
"description": "Source matching criteria for the exception.",
|
|
@@ -31682,7 +31682,7 @@
|
|
|
31682
31682
|
"enumValues": null,
|
|
31683
31683
|
"fields": {
|
|
31684
31684
|
"floatingSubnet": {
|
|
31685
|
-
"alias": "
|
|
31685
|
+
"alias": "floatingSubnetWanFirewallSource: floatingSubnet",
|
|
31686
31686
|
"args": {},
|
|
31687
31687
|
"deprecationReason": null,
|
|
31688
31688
|
"description": "Floating Subnets (ie. Floating Ranges) are used to identify traffic exactly matched to the route advertised by BGP.\nThey are not associated with a specific site.\nThis is useful in scenarios such as active-standby high availability routed via BGP.",
|
|
@@ -31760,7 +31760,7 @@
|
|
|
31760
31760
|
"varName": "floatingSubnetRef"
|
|
31761
31761
|
},
|
|
31762
31762
|
"globalIpRange": {
|
|
31763
|
-
"alias": "
|
|
31763
|
+
"alias": "globalIpRangeWanFirewallSource: globalIpRange",
|
|
31764
31764
|
"args": {},
|
|
31765
31765
|
"deprecationReason": null,
|
|
31766
31766
|
"description": "Globally defined IP range, IP and subnet objects",
|
|
@@ -31838,7 +31838,7 @@
|
|
|
31838
31838
|
"varName": "globalIpRangeRef"
|
|
31839
31839
|
},
|
|
31840
31840
|
"group": {
|
|
31841
|
-
"alias": "
|
|
31841
|
+
"alias": "groupWanFirewallSource: group",
|
|
31842
31842
|
"args": {},
|
|
31843
31843
|
"deprecationReason": null,
|
|
31844
31844
|
"description": "Groups defined for your account",
|
|
@@ -31916,7 +31916,7 @@
|
|
|
31916
31916
|
"varName": "groupRef"
|
|
31917
31917
|
},
|
|
31918
31918
|
"host": {
|
|
31919
|
-
"alias": "
|
|
31919
|
+
"alias": "hostWanFirewallSource: host",
|
|
31920
31920
|
"args": {},
|
|
31921
31921
|
"deprecationReason": null,
|
|
31922
31922
|
"description": "Hosts and servers defined for your account",
|
|
@@ -32017,7 +32017,7 @@
|
|
|
32017
32017
|
"varName": "ip"
|
|
32018
32018
|
},
|
|
32019
32019
|
"ipRange": {
|
|
32020
|
-
"alias": "
|
|
32020
|
+
"alias": "ipRangeWanFirewallSource: ipRange",
|
|
32021
32021
|
"args": {},
|
|
32022
32022
|
"deprecationReason": null,
|
|
32023
32023
|
"description": "Multiple separate IP addresses or an IP range",
|
|
@@ -32095,7 +32095,7 @@
|
|
|
32095
32095
|
"varName": "ipAddressRange"
|
|
32096
32096
|
},
|
|
32097
32097
|
"networkInterface": {
|
|
32098
|
-
"alias": "
|
|
32098
|
+
"alias": "networkInterfaceWanFirewallSource: networkInterface",
|
|
32099
32099
|
"args": {},
|
|
32100
32100
|
"deprecationReason": null,
|
|
32101
32101
|
"description": "Network range defined for a site",
|
|
@@ -32173,7 +32173,7 @@
|
|
|
32173
32173
|
"varName": "networkInterfaceRef"
|
|
32174
32174
|
},
|
|
32175
32175
|
"site": {
|
|
32176
|
-
"alias": "
|
|
32176
|
+
"alias": "siteWanFirewallSource: site",
|
|
32177
32177
|
"args": {},
|
|
32178
32178
|
"deprecationReason": null,
|
|
32179
32179
|
"description": "Site defined for the account",
|
|
@@ -32251,7 +32251,7 @@
|
|
|
32251
32251
|
"varName": "siteRef"
|
|
32252
32252
|
},
|
|
32253
32253
|
"siteNetworkSubnet": {
|
|
32254
|
-
"alias": "
|
|
32254
|
+
"alias": "siteNetworkSubnetWanFirewallSource: siteNetworkSubnet",
|
|
32255
32255
|
"args": {},
|
|
32256
32256
|
"deprecationReason": null,
|
|
32257
32257
|
"description": "GlobalRange + InterfaceSubnet",
|
|
@@ -32352,7 +32352,7 @@
|
|
|
32352
32352
|
"varName": "subnet"
|
|
32353
32353
|
},
|
|
32354
32354
|
"systemGroup": {
|
|
32355
|
-
"alias": "
|
|
32355
|
+
"alias": "systemGroupWanFirewallSource: systemGroup",
|
|
32356
32356
|
"args": {},
|
|
32357
32357
|
"deprecationReason": null,
|
|
32358
32358
|
"description": "Predefined Cato groups",
|
|
@@ -32430,7 +32430,7 @@
|
|
|
32430
32430
|
"varName": "systemGroupRef"
|
|
32431
32431
|
},
|
|
32432
32432
|
"user": {
|
|
32433
|
-
"alias": "
|
|
32433
|
+
"alias": "userWanFirewallSource: user",
|
|
32434
32434
|
"args": {},
|
|
32435
32435
|
"deprecationReason": null,
|
|
32436
32436
|
"description": "Individual users defined for the account",
|
|
@@ -32508,7 +32508,7 @@
|
|
|
32508
32508
|
"varName": "userRef"
|
|
32509
32509
|
},
|
|
32510
32510
|
"usersGroup": {
|
|
32511
|
-
"alias": "
|
|
32511
|
+
"alias": "usersGroupWanFirewallSource: usersGroup",
|
|
32512
32512
|
"args": {},
|
|
32513
32513
|
"deprecationReason": null,
|
|
32514
32514
|
"description": "Group of users",
|
|
@@ -32685,7 +32685,7 @@
|
|
|
32685
32685
|
"varName": "name"
|
|
32686
32686
|
},
|
|
32687
32687
|
"schedule": {
|
|
32688
|
-
"alias": "
|
|
32688
|
+
"alias": "scheduleWanFirewallRule: schedule",
|
|
32689
32689
|
"args": {},
|
|
32690
32690
|
"deprecationReason": null,
|
|
32691
32691
|
"description": "The time period specifying when the rule is enabled, otherwise it is disabled.",
|
|
@@ -32702,7 +32702,7 @@
|
|
|
32702
32702
|
"enumValues": null,
|
|
32703
32703
|
"fields": {
|
|
32704
32704
|
"activeOn": {
|
|
32705
|
-
"alias": "
|
|
32705
|
+
"alias": "activeOnPolicySchedule: activeOn",
|
|
32706
32706
|
"args": {},
|
|
32707
32707
|
"deprecationReason": null,
|
|
32708
32708
|
"description": null,
|
|
@@ -32760,7 +32760,7 @@
|
|
|
32760
32760
|
"varName": "activeOn"
|
|
32761
32761
|
},
|
|
32762
32762
|
"customRecurring": {
|
|
32763
|
-
"alias": "
|
|
32763
|
+
"alias": "customRecurringPolicySchedule: customRecurring",
|
|
32764
32764
|
"args": {},
|
|
32765
32765
|
"deprecationReason": null,
|
|
32766
32766
|
"description": null,
|
|
@@ -32912,7 +32912,7 @@
|
|
|
32912
32912
|
"varName": "policyCustomRecurring"
|
|
32913
32913
|
},
|
|
32914
32914
|
"customTimeframe": {
|
|
32915
|
-
"alias": "
|
|
32915
|
+
"alias": "customTimeframePolicySchedule: customTimeframe",
|
|
32916
32916
|
"args": {},
|
|
32917
32917
|
"deprecationReason": null,
|
|
32918
32918
|
"description": null,
|
|
@@ -33004,7 +33004,7 @@
|
|
|
33004
33004
|
"varName": "policySchedule"
|
|
33005
33005
|
},
|
|
33006
33006
|
"section": {
|
|
33007
|
-
"alias": "
|
|
33007
|
+
"alias": "sectionWanFirewallRule: section",
|
|
33008
33008
|
"args": {},
|
|
33009
33009
|
"deprecationReason": null,
|
|
33010
33010
|
"description": "Policy section where the rule is located",
|
|
@@ -33080,10 +33080,10 @@
|
|
|
33080
33080
|
"varName": "policySectionInfo"
|
|
33081
33081
|
},
|
|
33082
33082
|
"service": {
|
|
33083
|
-
"alias": "
|
|
33083
|
+
"alias": "serviceWanFirewallRule: service",
|
|
33084
33084
|
"args": {},
|
|
33085
33085
|
"deprecationReason": null,
|
|
33086
|
-
"description": "Destination service traffic matching criteria.\nLogical
|
|
33086
|
+
"description": "Destination service traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
33087
33087
|
"id_str": "wanFirewall___addRule___rule___rule___service",
|
|
33088
33088
|
"isDeprecated": false,
|
|
33089
33089
|
"name": "service",
|
|
@@ -33097,7 +33097,7 @@
|
|
|
33097
33097
|
"enumValues": null,
|
|
33098
33098
|
"fields": {
|
|
33099
33099
|
"custom": {
|
|
33100
|
-
"alias": "
|
|
33100
|
+
"alias": "customWanFirewallServiceType: custom",
|
|
33101
33101
|
"args": {},
|
|
33102
33102
|
"deprecationReason": null,
|
|
33103
33103
|
"description": null,
|
|
@@ -33136,7 +33136,7 @@
|
|
|
33136
33136
|
"varName": "port"
|
|
33137
33137
|
},
|
|
33138
33138
|
"portRange": {
|
|
33139
|
-
"alias": "
|
|
33139
|
+
"alias": "portRangeCustomService: portRange",
|
|
33140
33140
|
"args": {},
|
|
33141
33141
|
"deprecationReason": null,
|
|
33142
33142
|
"description": null,
|
|
@@ -33211,7 +33211,7 @@
|
|
|
33211
33211
|
"varName": "portRange"
|
|
33212
33212
|
},
|
|
33213
33213
|
"protocol": {
|
|
33214
|
-
"alias": "
|
|
33214
|
+
"alias": "protocolCustomService: protocol",
|
|
33215
33215
|
"args": {},
|
|
33216
33216
|
"deprecationReason": null,
|
|
33217
33217
|
"description": null,
|
|
@@ -33294,7 +33294,7 @@
|
|
|
33294
33294
|
"varName": "customService"
|
|
33295
33295
|
},
|
|
33296
33296
|
"standard": {
|
|
33297
|
-
"alias": "
|
|
33297
|
+
"alias": "standardWanFirewallServiceType: standard",
|
|
33298
33298
|
"args": {},
|
|
33299
33299
|
"deprecationReason": null,
|
|
33300
33300
|
"description": null,
|
|
@@ -33389,10 +33389,10 @@
|
|
|
33389
33389
|
"varName": "wanFirewallServiceType"
|
|
33390
33390
|
},
|
|
33391
33391
|
"source": {
|
|
33392
|
-
"alias": "
|
|
33392
|
+
"alias": "sourceWanFirewallRule: source",
|
|
33393
33393
|
"args": {},
|
|
33394
33394
|
"deprecationReason": null,
|
|
33395
|
-
"description": "Source traffic matching criteria.\nLogical
|
|
33395
|
+
"description": "Source traffic matching criteria.\nLogical \u2018OR\u2019 is applied within the criteria set.\nLogical \u2018AND\u2019 is applied between criteria sets.",
|
|
33396
33396
|
"id_str": "wanFirewall___addRule___rule___rule___source",
|
|
33397
33397
|
"isDeprecated": false,
|
|
33398
33398
|
"name": "source",
|
|
@@ -33406,7 +33406,7 @@
|
|
|
33406
33406
|
"enumValues": null,
|
|
33407
33407
|
"fields": {
|
|
33408
33408
|
"floatingSubnet": {
|
|
33409
|
-
"alias": "
|
|
33409
|
+
"alias": "floatingSubnetWanFirewallSource: floatingSubnet",
|
|
33410
33410
|
"args": {},
|
|
33411
33411
|
"deprecationReason": null,
|
|
33412
33412
|
"description": "Floating Subnets (ie. Floating Ranges) are used to identify traffic exactly matched to the route advertised by BGP.\nThey are not associated with a specific site.\nThis is useful in scenarios such as active-standby high availability routed via BGP.",
|
|
@@ -33484,7 +33484,7 @@
|
|
|
33484
33484
|
"varName": "floatingSubnetRef"
|
|
33485
33485
|
},
|
|
33486
33486
|
"globalIpRange": {
|
|
33487
|
-
"alias": "
|
|
33487
|
+
"alias": "globalIpRangeWanFirewallSource: globalIpRange",
|
|
33488
33488
|
"args": {},
|
|
33489
33489
|
"deprecationReason": null,
|
|
33490
33490
|
"description": "Globally defined IP range, IP and subnet objects",
|
|
@@ -33562,7 +33562,7 @@
|
|
|
33562
33562
|
"varName": "globalIpRangeRef"
|
|
33563
33563
|
},
|
|
33564
33564
|
"group": {
|
|
33565
|
-
"alias": "
|
|
33565
|
+
"alias": "groupWanFirewallSource: group",
|
|
33566
33566
|
"args": {},
|
|
33567
33567
|
"deprecationReason": null,
|
|
33568
33568
|
"description": "Groups defined for your account",
|
|
@@ -33640,7 +33640,7 @@
|
|
|
33640
33640
|
"varName": "groupRef"
|
|
33641
33641
|
},
|
|
33642
33642
|
"host": {
|
|
33643
|
-
"alias": "
|
|
33643
|
+
"alias": "hostWanFirewallSource: host",
|
|
33644
33644
|
"args": {},
|
|
33645
33645
|
"deprecationReason": null,
|
|
33646
33646
|
"description": "Hosts and servers defined for your account",
|
|
@@ -33741,7 +33741,7 @@
|
|
|
33741
33741
|
"varName": "ip"
|
|
33742
33742
|
},
|
|
33743
33743
|
"ipRange": {
|
|
33744
|
-
"alias": "
|
|
33744
|
+
"alias": "ipRangeWanFirewallSource: ipRange",
|
|
33745
33745
|
"args": {},
|
|
33746
33746
|
"deprecationReason": null,
|
|
33747
33747
|
"description": "Multiple separate IP addresses or an IP range",
|
|
@@ -33819,7 +33819,7 @@
|
|
|
33819
33819
|
"varName": "ipAddressRange"
|
|
33820
33820
|
},
|
|
33821
33821
|
"networkInterface": {
|
|
33822
|
-
"alias": "
|
|
33822
|
+
"alias": "networkInterfaceWanFirewallSource: networkInterface",
|
|
33823
33823
|
"args": {},
|
|
33824
33824
|
"deprecationReason": null,
|
|
33825
33825
|
"description": "Network range defined for a site",
|
|
@@ -33897,7 +33897,7 @@
|
|
|
33897
33897
|
"varName": "networkInterfaceRef"
|
|
33898
33898
|
},
|
|
33899
33899
|
"site": {
|
|
33900
|
-
"alias": "
|
|
33900
|
+
"alias": "siteWanFirewallSource: site",
|
|
33901
33901
|
"args": {},
|
|
33902
33902
|
"deprecationReason": null,
|
|
33903
33903
|
"description": "Site defined for the account",
|
|
@@ -33975,7 +33975,7 @@
|
|
|
33975
33975
|
"varName": "siteRef"
|
|
33976
33976
|
},
|
|
33977
33977
|
"siteNetworkSubnet": {
|
|
33978
|
-
"alias": "
|
|
33978
|
+
"alias": "siteNetworkSubnetWanFirewallSource: siteNetworkSubnet",
|
|
33979
33979
|
"args": {},
|
|
33980
33980
|
"deprecationReason": null,
|
|
33981
33981
|
"description": "GlobalRange + InterfaceSubnet",
|
|
@@ -34076,7 +34076,7 @@
|
|
|
34076
34076
|
"varName": "subnet"
|
|
34077
34077
|
},
|
|
34078
34078
|
"systemGroup": {
|
|
34079
|
-
"alias": "
|
|
34079
|
+
"alias": "systemGroupWanFirewallSource: systemGroup",
|
|
34080
34080
|
"args": {},
|
|
34081
34081
|
"deprecationReason": null,
|
|
34082
34082
|
"description": "Predefined Cato groups",
|
|
@@ -34154,7 +34154,7 @@
|
|
|
34154
34154
|
"varName": "systemGroupRef"
|
|
34155
34155
|
},
|
|
34156
34156
|
"user": {
|
|
34157
|
-
"alias": "
|
|
34157
|
+
"alias": "userWanFirewallSource: user",
|
|
34158
34158
|
"args": {},
|
|
34159
34159
|
"deprecationReason": null,
|
|
34160
34160
|
"description": "Individual users defined for the account",
|
|
@@ -34232,7 +34232,7 @@
|
|
|
34232
34232
|
"varName": "userRef"
|
|
34233
34233
|
},
|
|
34234
34234
|
"usersGroup": {
|
|
34235
|
-
"alias": "
|
|
34235
|
+
"alias": "usersGroupWanFirewallSource: usersGroup",
|
|
34236
34236
|
"args": {},
|
|
34237
34237
|
"deprecationReason": null,
|
|
34238
34238
|
"description": "Group of users",
|
|
@@ -34327,7 +34327,7 @@
|
|
|
34327
34327
|
"varName": "wanFirewallSource"
|
|
34328
34328
|
},
|
|
34329
34329
|
"tracking": {
|
|
34330
|
-
"alias": "
|
|
34330
|
+
"alias": "trackingWanFirewallRule: tracking",
|
|
34331
34331
|
"args": {},
|
|
34332
34332
|
"deprecationReason": null,
|
|
34333
34333
|
"description": "Tracking information when the rule is matched, such as events and notifications",
|
|
@@ -34344,7 +34344,7 @@
|
|
|
34344
34344
|
"enumValues": null,
|
|
34345
34345
|
"fields": {
|
|
34346
34346
|
"alert": {
|
|
34347
|
-
"alias": "
|
|
34347
|
+
"alias": "alertPolicyTracking: alert",
|
|
34348
34348
|
"args": {},
|
|
34349
34349
|
"deprecationReason": null,
|
|
34350
34350
|
"description": null,
|
|
@@ -34363,7 +34363,7 @@
|
|
|
34363
34363
|
"enabled": {
|
|
34364
34364
|
"args": {},
|
|
34365
34365
|
"deprecationReason": null,
|
|
34366
|
-
"description": "TRUE
|
|
34366
|
+
"description": "TRUE \u2013 send alerts when the rule is matched, FALSE \u2013 don\u2019t send alerts when the rule is matched",
|
|
34367
34367
|
"id_str": "wanFirewall___addRule___rule___rule___tracking___alert___enabled",
|
|
34368
34368
|
"isDeprecated": false,
|
|
34369
34369
|
"name": "enabled",
|
|
@@ -34382,7 +34382,7 @@
|
|
|
34382
34382
|
"varName": "enabled"
|
|
34383
34383
|
},
|
|
34384
34384
|
"frequency": {
|
|
34385
|
-
"alias": "
|
|
34385
|
+
"alias": "frequencyPolicyRuleTrackingAlert: frequency",
|
|
34386
34386
|
"args": {},
|
|
34387
34387
|
"deprecationReason": null,
|
|
34388
34388
|
"description": "Returns data for the alert frequency",
|
|
@@ -34440,7 +34440,7 @@
|
|
|
34440
34440
|
"varName": "frequency"
|
|
34441
34441
|
},
|
|
34442
34442
|
"mailingList": {
|
|
34443
|
-
"alias": "
|
|
34443
|
+
"alias": "mailingListPolicyRuleTrackingAlert: mailingList",
|
|
34444
34444
|
"args": {},
|
|
34445
34445
|
"deprecationReason": null,
|
|
34446
34446
|
"description": "Returns data for the Mailing List that receives the alert",
|
|
@@ -34518,7 +34518,7 @@
|
|
|
34518
34518
|
"varName": "subscriptionMailingListRef"
|
|
34519
34519
|
},
|
|
34520
34520
|
"subscriptionGroup": {
|
|
34521
|
-
"alias": "
|
|
34521
|
+
"alias": "subscriptionGroupPolicyRuleTrackingAlert: subscriptionGroup",
|
|
34522
34522
|
"args": {},
|
|
34523
34523
|
"deprecationReason": null,
|
|
34524
34524
|
"description": "Returns data for the Subscription Group that receives the alert",
|
|
@@ -34596,7 +34596,7 @@
|
|
|
34596
34596
|
"varName": "subscriptionGroupRef"
|
|
34597
34597
|
},
|
|
34598
34598
|
"webhook": {
|
|
34599
|
-
"alias": "
|
|
34599
|
+
"alias": "webhookPolicyRuleTrackingAlert: webhook",
|
|
34600
34600
|
"args": {},
|
|
34601
34601
|
"deprecationReason": null,
|
|
34602
34602
|
"description": "Returns data for the Webhook that receives the alert",
|
|
@@ -34691,7 +34691,7 @@
|
|
|
34691
34691
|
"varName": "policyRuleTrackingAlert"
|
|
34692
34692
|
},
|
|
34693
34693
|
"event": {
|
|
34694
|
-
"alias": "
|
|
34694
|
+
"alias": "eventPolicyTracking: event",
|
|
34695
34695
|
"args": {},
|
|
34696
34696
|
"deprecationReason": null,
|
|
34697
34697
|
"description": null,
|
|
@@ -34796,7 +34796,7 @@
|
|
|
34796
34796
|
"varName": "wanFirewallRulePayload"
|
|
34797
34797
|
},
|
|
34798
34798
|
"status": {
|
|
34799
|
-
"alias": "
|
|
34799
|
+
"alias": "statusWanFirewallRuleMutationPayload: status",
|
|
34800
34800
|
"args": {},
|
|
34801
34801
|
"deprecationReason": null,
|
|
34802
34802
|
"description": null,
|