scc-firewall-manager-sdk 1.13.665__py3-none-any.whl → 1.13.667__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of scc-firewall-manager-sdk might be problematic. Click here for more details.

Files changed (31) hide show
  1. scc_firewall_manager_sdk/__init__.py +23 -1
  2. scc_firewall_manager_sdk/api/__init__.py +1 -0
  3. scc_firewall_manager_sdk/api/asa_interfaces_api.py +6565 -0
  4. scc_firewall_manager_sdk/api_client.py +1 -1
  5. scc_firewall_manager_sdk/configuration.py +1 -1
  6. scc_firewall_manager_sdk/models/__init__.py +21 -0
  7. scc_firewall_manager_sdk/models/asa_interface.py +184 -0
  8. scc_firewall_manager_sdk/models/asa_interface_page.py +102 -0
  9. scc_firewall_manager_sdk/models/duplex_type.py +39 -0
  10. scc_firewall_manager_sdk/models/ether_channel_interface_create_input.py +132 -0
  11. scc_firewall_manager_sdk/models/ether_channel_interface_patch_input.py +130 -0
  12. scc_firewall_manager_sdk/models/interface_ip_address.py +94 -0
  13. scc_firewall_manager_sdk/models/interface_ipv4_address.py +95 -0
  14. scc_firewall_manager_sdk/models/interface_ipv6_address.py +109 -0
  15. scc_firewall_manager_sdk/models/interface_mode.py +39 -0
  16. scc_firewall_manager_sdk/models/interface_runtime_data.py +101 -0
  17. scc_firewall_manager_sdk/models/interface_type.py +41 -0
  18. scc_firewall_manager_sdk/models/ip_type.py +39 -0
  19. scc_firewall_manager_sdk/models/link_state.py +38 -0
  20. scc_firewall_manager_sdk/models/physical_interface_patch_input.py +125 -0
  21. scc_firewall_manager_sdk/models/speed_type.py +41 -0
  22. scc_firewall_manager_sdk/models/sub_interface_create_input.py +130 -0
  23. scc_firewall_manager_sdk/models/sub_interface_patch_input.py +116 -0
  24. scc_firewall_manager_sdk/models/switch_port_config.py +94 -0
  25. scc_firewall_manager_sdk/models/vlan_id_range.py +90 -0
  26. scc_firewall_manager_sdk/models/vlan_interface_create_input.py +120 -0
  27. scc_firewall_manager_sdk/models/vlan_interface_patch_input.py +118 -0
  28. {scc_firewall_manager_sdk-1.13.665.dist-info → scc_firewall_manager_sdk-1.13.667.dist-info}/METADATA +1 -1
  29. {scc_firewall_manager_sdk-1.13.665.dist-info → scc_firewall_manager_sdk-1.13.667.dist-info}/RECORD +31 -9
  30. {scc_firewall_manager_sdk-1.13.665.dist-info → scc_firewall_manager_sdk-1.13.667.dist-info}/WHEEL +0 -0
  31. {scc_firewall_manager_sdk-1.13.665.dist-info → scc_firewall_manager_sdk-1.13.667.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,120 @@
1
+ # coding: utf-8
2
+
3
+ """
4
+ Cisco Security Cloud Control Firewall Manager API
5
+
6
+ Use the documentation to explore the endpoints Security Cloud Control Firewall Manager has to offer
7
+
8
+ The version of the OpenAPI document: 1.13.0
9
+ Contact: cdo.tac@cisco.com
10
+ Generated by OpenAPI Generator (https://openapi-generator.tech)
11
+
12
+ Do not edit the class manually.
13
+ """ # noqa: E501
14
+
15
+
16
+ from __future__ import annotations
17
+ import pprint
18
+ import re # noqa: F401
19
+ import json
20
+
21
+ from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictInt, StrictStr
22
+ from typing import Any, ClassVar, Dict, List, Optional
23
+ from scc_firewall_manager_sdk.models.interface_ipv4_address import InterfaceIpv4Address
24
+ from scc_firewall_manager_sdk.models.interface_ipv6_address import InterfaceIpv6Address
25
+ from typing import Optional, Set
26
+ from typing_extensions import Self
27
+
28
+ class VlanInterfaceCreateInput(BaseModel):
29
+ """
30
+ VlanInterfaceCreateInput
31
+ """ # noqa: E501
32
+ description: Optional[StrictStr] = Field(default=None, description="The description of the interface.")
33
+ enabled: Optional[StrictBool] = Field(default=None, description="Indicates whether the interface is enabled.")
34
+ ipv4: Optional[InterfaceIpv4Address] = None
35
+ ipv6: Optional[InterfaceIpv6Address] = None
36
+ mac_address: Optional[StrictStr] = Field(default=None, description="The interface Media Access Control (MAC) address, a unique hardware identifier assigned to each physical interface. it is used for Layer 2 communication within a network segment.", alias="macAddress")
37
+ management_only: Optional[StrictBool] = Field(default=None, description="Indicates whether the interface is exclusively used for management traffic and does not carry regular user or data traffic", alias="managementOnly")
38
+ member_interfaces: Optional[List[StrictStr]] = Field(default=None, description="The set of unique identifiers, represented as UUIDs, of the member interfaces that are part of the vlan group.", alias="memberInterfaces")
39
+ monitor_interface: Optional[StrictBool] = Field(default=None, description="Indicates if the interface is actively monitored for checking its operational status and health as part of an HA setup. It helps determine if the interface is functioning correctly and whether a failover to a standby device should be triggered in case of failure.", alias="monitorInterface")
40
+ mtu: Optional[StrictInt] = Field(default=None, description="The interface MTU (Maximum Transmission Unit), the largest size, in bytes, of a packet or frame that can be sent over a network interface without needing to be fragmented. It defines the maximum payload size that the interface can handle in a single transmission.")
41
+ name: Optional[StrictStr] = Field(default=None, description="The logical name of the interface. Interface names are unique in the scope of the device.")
42
+ security_level: Optional[StrictInt] = Field(default=None, description="Indicates the interface trust level, ranging from 0 (lowest) to 100 (highest).", alias="securityLevel")
43
+ standby_mac_address: Optional[StrictStr] = Field(default=None, description="The standby interface Media Access Control (MAC) address, for use in a high-availability (HA) pair.", alias="standbyMacAddress")
44
+ vlan_id: Optional[StrictInt] = Field(default=None, description="The unique identifier of the VLAN associated with the VLAN interface. Range is 1 - 4070.", alias="vlanId")
45
+ __properties: ClassVar[List[str]] = ["description", "enabled", "ipv4", "ipv6", "macAddress", "managementOnly", "memberInterfaces", "monitorInterface", "mtu", "name", "securityLevel", "standbyMacAddress", "vlanId"]
46
+
47
+ model_config = ConfigDict(
48
+ populate_by_name=True,
49
+ validate_assignment=True,
50
+ protected_namespaces=(),
51
+ )
52
+
53
+
54
+ def to_str(self) -> str:
55
+ """Returns the string representation of the model using alias"""
56
+ return pprint.pformat(self.model_dump(by_alias=True))
57
+
58
+ def to_json(self) -> str:
59
+ """Returns the JSON representation of the model using alias"""
60
+ # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead
61
+ return json.dumps(self.to_dict())
62
+
63
+ @classmethod
64
+ def from_json(cls, json_str: str) -> Optional[Self]:
65
+ """Create an instance of VlanInterfaceCreateInput from a JSON string"""
66
+ return cls.from_dict(json.loads(json_str))
67
+
68
+ def to_dict(self) -> Dict[str, Any]:
69
+ """Return the dictionary representation of the model using alias.
70
+
71
+ This has the following differences from calling pydantic's
72
+ `self.model_dump(by_alias=True)`:
73
+
74
+ * `None` is only added to the output dict for nullable fields that
75
+ were set at model initialization. Other fields with value `None`
76
+ are ignored.
77
+ """
78
+ excluded_fields: Set[str] = set([
79
+ ])
80
+
81
+ _dict = self.model_dump(
82
+ by_alias=True,
83
+ exclude=excluded_fields,
84
+ exclude_none=True,
85
+ )
86
+ # override the default output from pydantic by calling `to_dict()` of ipv4
87
+ if self.ipv4:
88
+ _dict['ipv4'] = self.ipv4.to_dict()
89
+ # override the default output from pydantic by calling `to_dict()` of ipv6
90
+ if self.ipv6:
91
+ _dict['ipv6'] = self.ipv6.to_dict()
92
+ return _dict
93
+
94
+ @classmethod
95
+ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]:
96
+ """Create an instance of VlanInterfaceCreateInput from a dict"""
97
+ if obj is None:
98
+ return None
99
+
100
+ if not isinstance(obj, dict):
101
+ return cls.model_validate(obj)
102
+
103
+ _obj = cls.model_validate({
104
+ "description": obj.get("description"),
105
+ "enabled": obj.get("enabled"),
106
+ "ipv4": InterfaceIpv4Address.from_dict(obj["ipv4"]) if obj.get("ipv4") is not None else None,
107
+ "ipv6": InterfaceIpv6Address.from_dict(obj["ipv6"]) if obj.get("ipv6") is not None else None,
108
+ "macAddress": obj.get("macAddress"),
109
+ "managementOnly": obj.get("managementOnly"),
110
+ "memberInterfaces": obj.get("memberInterfaces"),
111
+ "monitorInterface": obj.get("monitorInterface"),
112
+ "mtu": obj.get("mtu"),
113
+ "name": obj.get("name"),
114
+ "securityLevel": obj.get("securityLevel"),
115
+ "standbyMacAddress": obj.get("standbyMacAddress"),
116
+ "vlanId": obj.get("vlanId")
117
+ })
118
+ return _obj
119
+
120
+
@@ -0,0 +1,118 @@
1
+ # coding: utf-8
2
+
3
+ """
4
+ Cisco Security Cloud Control Firewall Manager API
5
+
6
+ Use the documentation to explore the endpoints Security Cloud Control Firewall Manager has to offer
7
+
8
+ The version of the OpenAPI document: 1.13.0
9
+ Contact: cdo.tac@cisco.com
10
+ Generated by OpenAPI Generator (https://openapi-generator.tech)
11
+
12
+ Do not edit the class manually.
13
+ """ # noqa: E501
14
+
15
+
16
+ from __future__ import annotations
17
+ import pprint
18
+ import re # noqa: F401
19
+ import json
20
+
21
+ from pydantic import BaseModel, ConfigDict, Field, StrictBool, StrictInt, StrictStr
22
+ from typing import Any, ClassVar, Dict, List, Optional
23
+ from scc_firewall_manager_sdk.models.interface_ipv4_address import InterfaceIpv4Address
24
+ from scc_firewall_manager_sdk.models.interface_ipv6_address import InterfaceIpv6Address
25
+ from typing import Optional, Set
26
+ from typing_extensions import Self
27
+
28
+ class VlanInterfacePatchInput(BaseModel):
29
+ """
30
+ VlanInterfacePatchInput
31
+ """ # noqa: E501
32
+ description: Optional[StrictStr] = Field(default=None, description="The description of the interface.")
33
+ enabled: Optional[StrictBool] = Field(default=None, description="Indicates whether the interface is enabled.")
34
+ ipv4: Optional[InterfaceIpv4Address] = None
35
+ ipv6: Optional[InterfaceIpv6Address] = None
36
+ mac_address: Optional[StrictStr] = Field(default=None, description="The interface Media Access Control (MAC) address, a unique hardware identifier assigned to each physical interface. it is used for Layer 2 communication within a network segment.", alias="macAddress")
37
+ management_only: Optional[StrictBool] = Field(default=None, description="Indicates whether the interface is exclusively used for management traffic and does not carry regular user or data traffic", alias="managementOnly")
38
+ member_interfaces: Optional[List[StrictStr]] = Field(default=None, description="The set of unique identifiers, represented as UUIDs, of the member interfaces that are part of the vlan group.", alias="memberInterfaces")
39
+ monitor_interface: Optional[StrictBool] = Field(default=None, description="Indicates if the interface is actively monitored for checking its operational status and health as part of an HA setup. It helps determine if the interface is functioning correctly and whether a failover to a standby device should be triggered in case of failure.", alias="monitorInterface")
40
+ mtu: Optional[StrictInt] = Field(default=None, description="The interface MTU (Maximum Transmission Unit), the largest size, in bytes, of a packet or frame that can be sent over a network interface without needing to be fragmented. It defines the maximum payload size that the interface can handle in a single transmission.")
41
+ name: Optional[StrictStr] = Field(default=None, description="The logical name of the interface. Interface names are unique in the scope of the device.")
42
+ security_level: Optional[StrictInt] = Field(default=None, description="Indicates the interface trust level, ranging from 0 (lowest) to 100 (highest).", alias="securityLevel")
43
+ standby_mac_address: Optional[StrictStr] = Field(default=None, description="The standby interface Media Access Control (MAC) address, for use in a high-availability (HA) pair.", alias="standbyMacAddress")
44
+ __properties: ClassVar[List[str]] = ["description", "enabled", "ipv4", "ipv6", "macAddress", "managementOnly", "memberInterfaces", "monitorInterface", "mtu", "name", "securityLevel", "standbyMacAddress"]
45
+
46
+ model_config = ConfigDict(
47
+ populate_by_name=True,
48
+ validate_assignment=True,
49
+ protected_namespaces=(),
50
+ )
51
+
52
+
53
+ def to_str(self) -> str:
54
+ """Returns the string representation of the model using alias"""
55
+ return pprint.pformat(self.model_dump(by_alias=True))
56
+
57
+ def to_json(self) -> str:
58
+ """Returns the JSON representation of the model using alias"""
59
+ # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead
60
+ return json.dumps(self.to_dict())
61
+
62
+ @classmethod
63
+ def from_json(cls, json_str: str) -> Optional[Self]:
64
+ """Create an instance of VlanInterfacePatchInput from a JSON string"""
65
+ return cls.from_dict(json.loads(json_str))
66
+
67
+ def to_dict(self) -> Dict[str, Any]:
68
+ """Return the dictionary representation of the model using alias.
69
+
70
+ This has the following differences from calling pydantic's
71
+ `self.model_dump(by_alias=True)`:
72
+
73
+ * `None` is only added to the output dict for nullable fields that
74
+ were set at model initialization. Other fields with value `None`
75
+ are ignored.
76
+ """
77
+ excluded_fields: Set[str] = set([
78
+ ])
79
+
80
+ _dict = self.model_dump(
81
+ by_alias=True,
82
+ exclude=excluded_fields,
83
+ exclude_none=True,
84
+ )
85
+ # override the default output from pydantic by calling `to_dict()` of ipv4
86
+ if self.ipv4:
87
+ _dict['ipv4'] = self.ipv4.to_dict()
88
+ # override the default output from pydantic by calling `to_dict()` of ipv6
89
+ if self.ipv6:
90
+ _dict['ipv6'] = self.ipv6.to_dict()
91
+ return _dict
92
+
93
+ @classmethod
94
+ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]:
95
+ """Create an instance of VlanInterfacePatchInput from a dict"""
96
+ if obj is None:
97
+ return None
98
+
99
+ if not isinstance(obj, dict):
100
+ return cls.model_validate(obj)
101
+
102
+ _obj = cls.model_validate({
103
+ "description": obj.get("description"),
104
+ "enabled": obj.get("enabled"),
105
+ "ipv4": InterfaceIpv4Address.from_dict(obj["ipv4"]) if obj.get("ipv4") is not None else None,
106
+ "ipv6": InterfaceIpv6Address.from_dict(obj["ipv6"]) if obj.get("ipv6") is not None else None,
107
+ "macAddress": obj.get("macAddress"),
108
+ "managementOnly": obj.get("managementOnly"),
109
+ "memberInterfaces": obj.get("memberInterfaces"),
110
+ "monitorInterface": obj.get("monitorInterface"),
111
+ "mtu": obj.get("mtu"),
112
+ "name": obj.get("name"),
113
+ "securityLevel": obj.get("securityLevel"),
114
+ "standbyMacAddress": obj.get("standbyMacAddress")
115
+ })
116
+ return _obj
117
+
118
+
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: scc-firewall-manager-sdk
3
- Version: 1.13.665
3
+ Version: 1.13.667
4
4
  Summary: Cisco Security Cloud Control Firewall Manager API
5
5
  Home-page:
6
6
  Author: Cisco Security Cloud Control TAC
@@ -1,14 +1,15 @@
1
- scc_firewall_manager_sdk/__init__.py,sha256=MUXGpEx__pPWrfKbbUz9__L-izgxP9qdA7vWdz5G2M4,18641
2
- scc_firewall_manager_sdk/api_client.py,sha256=24F3QpEuDRsiVLiMY1nVleTfahGWiUCsTuP3eXBQSFM,25921
1
+ scc_firewall_manager_sdk/__init__.py,sha256=Er9bwl9yR1XiS9ivAs0-MT3LIhmcoywKcpCCRBuf-O4,20478
2
+ scc_firewall_manager_sdk/api_client.py,sha256=Wp1rJk-KMSNkSwt3ZGlhTEAKyBxXFPy_oeeimFp23Y0,25921
3
3
  scc_firewall_manager_sdk/api_response.py,sha256=eMxw1mpmJcoGZ3gs9z6jM4oYoZ10Gjk333s9sKxGv7s,652
4
- scc_firewall_manager_sdk/configuration.py,sha256=_6WlFZiSrPqvMGkN0POC3oD9p_i2VQl9OLiM98sQBTs,15993
4
+ scc_firewall_manager_sdk/configuration.py,sha256=i7v_5AJrV_46JP3ZLkvWQD9dfERZjhbubGmGnJPlgd4,15993
5
5
  scc_firewall_manager_sdk/exceptions.py,sha256=J4sPW_b1AGNUeRyPnnDlVtb1b8kOKgDO6cCzCf1wDYg,6039
6
6
  scc_firewall_manager_sdk/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
7
7
  scc_firewall_manager_sdk/rest.py,sha256=fAq2gQ-7Y88YdlSxyPNV1I3fctDBTEU0DrBJapzVrNY,9309
8
- scc_firewall_manager_sdk/api/__init__.py,sha256=JLfUIs9ZXkZ7GrNdssxqGaY5MOeDxFwevSj0mZqPfMM,1516
8
+ scc_firewall_manager_sdk/api/__init__.py,sha256=3ZQM438scTcj5--NONtwx5OkFtG8MQN2jZObh890hmI,1593
9
9
  scc_firewall_manager_sdk/api/access_groups_api.py,sha256=CEykKYEoxyrknH-tyUBH6dtDrJCYl-3TLDeHS-TekVA,60379
10
10
  scc_firewall_manager_sdk/api/ai_assistant_api.py,sha256=jspBnwvd6jkHoBhElAQjt7CQtD2ld0KCYM012Jb0ul8,60316
11
11
  scc_firewall_manager_sdk/api/asa_access_rules_api.py,sha256=lAeLVkfooP5OMbImORu4kaRjjC-2_6XdoXp7kpfA7nQ,60329
12
+ scc_firewall_manager_sdk/api/asa_interfaces_api.py,sha256=8bSpl0GdCNeNT6WgdVRfV0O7VCT5W_yqoQBULzfTlXg,296112
12
13
  scc_firewall_manager_sdk/api/audit_logs_api.py,sha256=37jQklNeuI06XtILKhYx7sBYTfehW0xEvJi5x9GZ30Q,20506
13
14
  scc_firewall_manager_sdk/api/change_requests_api.py,sha256=CdfJmFTYUoCJiTucRyze5xIBopTD4CSB2Cyea2V_UB4,48560
14
15
  scc_firewall_manager_sdk/api/changelogs_api.py,sha256=uPlM1uCK_WcqQiixpiHaEMoiEnf_MInb_10tuA6Kx8U,30875
@@ -26,7 +27,7 @@ scc_firewall_manager_sdk/api/search_api.py,sha256=V7waQrZ2Jz_xylLONUL_s3JF8Hj63C
26
27
  scc_firewall_manager_sdk/api/tenant_management_api.py,sha256=dHMPKC1JBw1nLbGtHTsEpJRMHXAWmxbmGLDDOwANC0s,55069
27
28
  scc_firewall_manager_sdk/api/transactions_api.py,sha256=5fVQMXzyMghn9Z3yiXgXbaE3eTwSC6ZC9vVJvESIb-A,12287
28
29
  scc_firewall_manager_sdk/api/users_api.py,sha256=CO7rDpDlmwgh7dWNjYPDXghhhJZP3EhsC2nKe-JMbdo,191609
29
- scc_firewall_manager_sdk/models/__init__.py,sha256=k7jvDCxztfdft2mkIrGfntnAO-jIPZehbJEEMByjcSw,16536
30
+ scc_firewall_manager_sdk/models/__init__.py,sha256=0KP1SPzF2MQrImjVQ7sRukMjz1CGhDjOWWzcnsYNlIo,18296
30
31
  scc_firewall_manager_sdk/models/access_group.py,sha256=eJVEMhIO65w2BNCcdIptHC6GtplLMGhpqgeci3MINc8,4583
31
32
  scc_firewall_manager_sdk/models/access_group_create_input.py,sha256=mJdIwaxeDnqlvG5fyLo95BzoER97sF2inU99r2VoIbo,3930
32
33
  scc_firewall_manager_sdk/models/access_group_page.py,sha256=5x8WJxs6-oGuqdp3weEw4Y2dET5v5h46gQ8umryJOZg,3725
@@ -51,6 +52,8 @@ scc_firewall_manager_sdk/models/asa_config.py,sha256=WLpmmsAEm6yqEmcFq7fiZWx_mED
51
52
  scc_firewall_manager_sdk/models/asa_create_or_update_input.py,sha256=9nFsQQ1FmuU_pRr773UtQ0Puui7NBW1-tABtF2OoEgQ,4680
52
53
  scc_firewall_manager_sdk/models/asa_failover_mate.py,sha256=uGxGY0QgQG8mPX4PvI7WU17cfuTqkYS3DlOYcn-g9sI,3499
53
54
  scc_firewall_manager_sdk/models/asa_failover_mode.py,sha256=r5SXdE-y6iGqWECbQbsmLCtkBVW-CYr6QBVDgOT3boA,871
55
+ scc_firewall_manager_sdk/models/asa_interface.py,sha256=NwJd4EprHGJfloi3S6ixJjmNEsYiANDmso-59KKNqmc,12239
56
+ scc_firewall_manager_sdk/models/asa_interface_page.py,sha256=ZaHYH96amB_Wc8u2ellbeN6yeHZcOhACS5Al5qp5TKc,3733
54
57
  scc_firewall_manager_sdk/models/audit_log.py,sha256=hei8LZg5sH3Oe2i8o9sYRvU2U-tHJt4J5zfW3C2tvds,4307
55
58
  scc_firewall_manager_sdk/models/audit_log_page.py,sha256=JGhUfYq2eXn3cu-Ts4IwJadJiywcYvt9QCUYnwyWHnk,3701
56
59
  scc_firewall_manager_sdk/models/authentication_error.py,sha256=LmWl8MoVS9OBbYaMnSGjIxdN8HOFjijGJusp4YxAGLw,2908
@@ -105,9 +108,12 @@ scc_firewall_manager_sdk/models/devices_patch_input.py,sha256=M2CPF1oUKTF_HLzEz4
105
108
  scc_firewall_manager_sdk/models/disk_health_metrics.py,sha256=8I-zKX9YZR5yo_1T_S_lEsOzjRLeJDVjQ3HlfJvvhKc,2947
106
109
  scc_firewall_manager_sdk/models/domain_settings.py,sha256=E1ZzpTa3EkS02wnsEAEjhvMz_QaNLekcZzgpXnin2ic,3852
107
110
  scc_firewall_manager_sdk/models/duo_admin_panel_create_or_update_input.py,sha256=lGhpdfRiYljP8bZsYPuOefVn1fRGw8sJ0uOd4ncf6iQ,3828
111
+ scc_firewall_manager_sdk/models/duplex_type.py,sha256=ohYS8Sf7kZdZY1Wr2_G9WlRUOAYX1pYHnf74nVHIoRo,820
108
112
  scc_firewall_manager_sdk/models/duplicate_group_dto.py,sha256=80hfmSnUoQJ4C6z_uw51ck6tuMZ6eD1Kr5Y76RjerAc,2960
109
113
  scc_firewall_manager_sdk/models/entity.py,sha256=UuPWIWQeHDn2za0TeT456WG904jYOeG9oRMgDt-DkhI,3443
110
114
  scc_firewall_manager_sdk/models/entity_type.py,sha256=jRoUXRD4Kkix9JngA3Y2dI0zB5yKgiAPQT64cAvqm0I,1450
115
+ scc_firewall_manager_sdk/models/ether_channel_interface_create_input.py,sha256=6HOlCRuYptg8Rd6UIxHQ2dpRXBLekYYAX3NreGSYVk8,7081
116
+ scc_firewall_manager_sdk/models/ether_channel_interface_patch_input.py,sha256=UGcnQtnRmE681tFyicd5kbZfNGBids97SxKzZfhkDMc,6826
111
117
  scc_firewall_manager_sdk/models/event.py,sha256=Du3SPVn7n28Duo_UFztsezhc4Uui8QfvgmSrqAHdOUs,4548
112
118
  scc_firewall_manager_sdk/models/fmc_access_policy_reference.py,sha256=xbcerPurdS-l2PtWlY51EdVSi5Eg3VQqddW0ZMhUoYY,2892
113
119
  scc_firewall_manager_sdk/models/fmc_device_record.py,sha256=a_DRTZ1U1YHI16tj_tf5qWLH5dSf7UE_lb0QT4CugKc,2841
@@ -132,13 +138,21 @@ scc_firewall_manager_sdk/models/ha_node.py,sha256=artlA1Nhe0Sa5ohCVWYo8glywrqmi5
132
138
  scc_firewall_manager_sdk/models/icmp4_value.py,sha256=I2L3G43XWn7In8lq3Cslgtbh6-2Sa2XMK9gP8S9vK90,6134
133
139
  scc_firewall_manager_sdk/models/icmp6_value.py,sha256=HEhnouEGXSdplk5wyJZ0Z9bWMdO5H63BMsxxGbVFzfc,6452
134
140
  scc_firewall_manager_sdk/models/interface_health_metrics.py,sha256=1_41-Kb6hOoAgqdJ19bUKpN1NRpDKPJQ7UMey_favuY,7435
141
+ scc_firewall_manager_sdk/models/interface_ip_address.py,sha256=LkbLcZP8unX7SOC5OqISNMmBbl4vGZYWwN4KwpTt6Do,4117
142
+ scc_firewall_manager_sdk/models/interface_ipv4_address.py,sha256=6Nn9zGQRMQp_LOrzOtWVChzjx9s1o2Gqv6NnGufgkSE,3160
143
+ scc_firewall_manager_sdk/models/interface_ipv6_address.py,sha256=JARd5ITTytp81ZkLwsF5XqITI-SrkCL7_JI0YbOPqIk,4661
144
+ scc_firewall_manager_sdk/models/interface_mode.py,sha256=STmII8flFtuWChs1ZeTqUgR6zh_5Yg-7T2_AvTqmSRA,851
145
+ scc_firewall_manager_sdk/models/interface_runtime_data.py,sha256=FVMQq66FucWZgs4oIukW41QtoLa7YvH8XUcTZab5RU4,3937
146
+ scc_firewall_manager_sdk/models/interface_type.py,sha256=sRNC2-DnIsDV8oefdYdI6GYyowfj6Hi2yl6DA70ttGM,1009
135
147
  scc_firewall_manager_sdk/models/inventory.py,sha256=Jy9W-R0CM1VHrD21umzWpaDHHeF_iRBNt54c25Vmi7Q,4192
136
148
  scc_firewall_manager_sdk/models/ios_create_or_update_input.py,sha256=zJd24vD4ZaPXrNa2iT_T6OnhJapGhvI2FlTdDwE4sAg,4401
149
+ scc_firewall_manager_sdk/models/ip_type.py,sha256=8INrkyNPHpQBGGA_Q1gsRc0eVcp_2UoeB1YohzzTrt0,814
137
150
  scc_firewall_manager_sdk/models/issues_count.py,sha256=sD25x0f6QdbiERsirU2dbO-9yDklWx-hH5jTgUFLor4,3218
138
151
  scc_firewall_manager_sdk/models/issues_dto.py,sha256=YwKSTVxuLdKNYJghreHQrB-115myum_M_GZM1AM-JSI,2834
139
152
  scc_firewall_manager_sdk/models/json_web_key.py,sha256=CQzr0PqKBYNs9_A358woBfwW_ZMy8uIveKaFPSQC2W8,3363
140
153
  scc_firewall_manager_sdk/models/jwk_set.py,sha256=ztEevTe_puqJUPQRUQS4Cy1Zz-ZQxGm6TPL1R3Qr16I,3030
141
154
  scc_firewall_manager_sdk/models/labels.py,sha256=AbNrj-z_-i8aMC1eE0fEZxQqXIgsyrtFm6IFVNos06A,3034
155
+ scc_firewall_manager_sdk/models/link_state.py,sha256=NTXe50fPXlYuKf6qgsAvNrHqcO2hn2k9bOXf8JxgqsI,795
142
156
  scc_firewall_manager_sdk/models/list_object_response.py,sha256=sOckFVlkvZnYpvBCN1z-7SEcT3to_JImPWHgJn29N5I,3835
143
157
  scc_firewall_manager_sdk/models/location.py,sha256=mng5mOwCNcPWaNDzXoAK2UWrpcll_q33EOlZTIV0C7s,3014
144
158
  scc_firewall_manager_sdk/models/log_settings.py,sha256=2wCe8rt2PC8alo3DeFKutiwnCtgxk1hgv0FYfazCfkI,2733
@@ -176,6 +190,7 @@ scc_firewall_manager_sdk/models/object_response.py,sha256=VlU4WupB1TSDMRh0H-YGS5
176
190
  scc_firewall_manager_sdk/models/on_prem_fmc_info.py,sha256=-aYflAgZJ7dy1NP532lkfxxcc1YDvrhup-uscXkUejE,3056
177
191
  scc_firewall_manager_sdk/models/os.py,sha256=P2xaPqB1OTdOTSB_XqYDx5q7TmNVaXryo-Dmhjqa9Ps,2804
178
192
  scc_firewall_manager_sdk/models/override.py,sha256=tKerFYSXu9LTO-2xXsENN5Au5errzMhUVnaFAldst8s,3099
193
+ scc_firewall_manager_sdk/models/physical_interface_patch_input.py,sha256=FoJiGDejuHAvcHRKmEc1-KF3le8D95njaBaYtoiu7_0,6493
179
194
  scc_firewall_manager_sdk/models/policy.py,sha256=-rE2oBcMsq2Hm16fUzg0IeLf3kQv7MhlQdcmW6au60w,2816
180
195
  scc_firewall_manager_sdk/models/ports_value.py,sha256=n3jWZ-u5UIj-xuWOe3TYyc06hE-NnhmiVpahbGFd4NE,2640
181
196
  scc_firewall_manager_sdk/models/protocol_content.py,sha256=7jrMsz0DEeFyv4Cw033ACvuoOxNSJurAgJnXN3X3eBo,4032
@@ -202,13 +217,17 @@ scc_firewall_manager_sdk/models/source_destination_ports_value.py,sha256=pmw54Q_
202
217
  scc_firewall_manager_sdk/models/source_dynamic_object_content.py,sha256=w_uZDJaZQicPeCD1xSnLB19AWiZw5aIaJpUqwhnBigA,4062
203
218
  scc_firewall_manager_sdk/models/source_network_content.py,sha256=6cgdUYc5ayek5fMp9qOnnBwzbOCb8NOntOu66jAV7Ik,4037
204
219
  scc_firewall_manager_sdk/models/source_port_content.py,sha256=_XSd3pX7ZUDuwlnnCXH9CUXh4gMbnqp86piO-pf9z4E,4025
220
+ scc_firewall_manager_sdk/models/speed_type.py,sha256=VU8nGCrrWjLmuZWSeiN9kMegx54035vvMmESX8LaaLg,881
205
221
  scc_firewall_manager_sdk/models/sse_device_data.py,sha256=pA6SQj9nA09dGDNGZDb5kTzcPDLlUwErXB2wLQuOmhA,3162
206
222
  scc_firewall_manager_sdk/models/staged.py,sha256=3J3hcI7Y8OKShyyI3bPHRW3cSYjJ4dj-mdLmjeGfBNI,3617
207
223
  scc_firewall_manager_sdk/models/state_machine_details.py,sha256=hqrhtRRBL6H814FXI3SRqgX784j5qVM3qlrrasV8tH8,3091
208
224
  scc_firewall_manager_sdk/models/state_machine_error.py,sha256=xHa84YH6CjRGJIxG2SXRfBYCiPDPf5bBAkDZv-zNtBc,2964
209
225
  scc_firewall_manager_sdk/models/status.py,sha256=DO7Cf3pc7KwZQ2lKKnUnHu7n4xpYIPqeM2egeabadvM,898
210
226
  scc_firewall_manager_sdk/models/status_info.py,sha256=7eakXxMmEsKYtDnYeSForYTXP0AKOHFocpnnyPlSLLo,2622
227
+ scc_firewall_manager_sdk/models/sub_interface_create_input.py,sha256=EbqxLNGfPchRaYp7chtXCUOKWxCqH0UYon9AMdhY99g,7467
228
+ scc_firewall_manager_sdk/models/sub_interface_patch_input.py,sha256=yisT9FOUAEx9EJv5HYIIl60RkWVPIGYbKq-8heYqBWs,5902
211
229
  scc_firewall_manager_sdk/models/summary.py,sha256=c0-DsJ63f8XF3CDamgz0rIRTY0-0kOJq_n1JgQ4aYgg,2798
230
+ scc_firewall_manager_sdk/models/switch_port_config.py,sha256=OWy094P6c0ze6Tp25wuO0vPXYIfioyX4nn5X3YS0bhw,3825
212
231
  scc_firewall_manager_sdk/models/target.py,sha256=_X6s7aX8fff4aVgj7lTQKVIi28rowu49LLU5jKRc1OU,3657
213
232
  scc_firewall_manager_sdk/models/targets_request.py,sha256=WZhGqO0hbkEW4AJnR09J5ADNTSWg9IP3aJP-3sb155M,2711
214
233
  scc_firewall_manager_sdk/models/tenant.py,sha256=R8HCsGSyg7lBXL_q1Z8XUr4yDi5xNp-yotZxLxQLanw,4167
@@ -226,9 +245,12 @@ scc_firewall_manager_sdk/models/user_create_or_update_input.py,sha256=Qi97TYCikg
226
245
  scc_firewall_manager_sdk/models/user_input.py,sha256=ipY5vjEUdUUqCYdiB7tR1og4jKPnbBpGchbR9jBhXhU,3756
227
246
  scc_firewall_manager_sdk/models/user_page.py,sha256=zagv0LVHfNn_VR0EMHB_ZiQ6oWA9keAq-pFBuLQVoqA,3668
228
247
  scc_firewall_manager_sdk/models/user_role.py,sha256=WVus0z7L_INfk_jkrQpm41fFh8coK1rfQhxrS2IcUsQ,1104
248
+ scc_firewall_manager_sdk/models/vlan_id_range.py,sha256=WUipEewFzcugw8eYgmhFN9VrjgEfyQ_MPKVrVul9Xew,2636
249
+ scc_firewall_manager_sdk/models/vlan_interface_create_input.py,sha256=Vi0t29qVtftW_bk6ku8ach3VLT_6R9KXPQ3YF56vy8U,6440
250
+ scc_firewall_manager_sdk/models/vlan_interface_patch_input.py,sha256=uQmBUgV0DEXVY_9PLvLj7JA1_oPlNYvue-MLwAnKlPY,6210
229
251
  scc_firewall_manager_sdk/models/ztp_onboarding_input.py,sha256=o6f4KOotVYPH06y4Gm9EhnddZIPlymWT31x8gfnbVt0,5326
230
252
  scc_firewall_manager_sdk/models/ztp_onboarding_template_configuration.py,sha256=d7_s7YPs0uQBiX201HJwMc9WR_vSmQpMfAskmRrx2bM,4808
231
- scc_firewall_manager_sdk-1.13.665.dist-info/METADATA,sha256=zXwh_Z_wUYw-RuURiRRlCW9zONpYB5B7D2WmbNG8VL4,596
232
- scc_firewall_manager_sdk-1.13.665.dist-info/WHEEL,sha256=2wepM1nk4DS4eFpYrW1TTqPcoGNfHhhO_i5m4cOimbo,92
233
- scc_firewall_manager_sdk-1.13.665.dist-info/top_level.txt,sha256=_g9WfFWGagKs6ULdfhEt8e7RXknpcp9_jA9ubIL4U3I,25
234
- scc_firewall_manager_sdk-1.13.665.dist-info/RECORD,,
253
+ scc_firewall_manager_sdk-1.13.667.dist-info/METADATA,sha256=iCv6wiCzgW33FLgxxxvGoFc9OD0kH0NT-a_4UDQ2xYE,596
254
+ scc_firewall_manager_sdk-1.13.667.dist-info/WHEEL,sha256=2wepM1nk4DS4eFpYrW1TTqPcoGNfHhhO_i5m4cOimbo,92
255
+ scc_firewall_manager_sdk-1.13.667.dist-info/top_level.txt,sha256=_g9WfFWGagKs6ULdfhEt8e7RXknpcp9_jA9ubIL4U3I,25
256
+ scc_firewall_manager_sdk-1.13.667.dist-info/RECORD,,