nuegressauditacltemplate¶
-
nuegressauditacltemplate.NUEgressAuditACLTemplate(bambou.nurest_object.NUMetaRESTObject,):
An egress audit policy is a set of rules defining how network traffic is monitored and mirrored from a domain for Audit purposes
Attributes¶
name
(Mandatory): The name of the entitylast_updated_by
: ID of the user who last updated the object.last_updated_date
: Time stamp when this object was last updated.active
: If enabled, it means that this ACL or QOS entry is activedefault_allow_ip
: If enabled a default ACL of Allow All is added as the last entry in the list of ACL entriesdefault_allow_non_ip
: If enabled, non ip traffic will be droppeddefault_install_acl_implicit_rules
: If enabled, implicit rule will allow intra domain traffic by defaultdescription
: A description of the entityembedded_metadata
: Metadata objects associated with this entity. This will contain a list of Metadata objects if the API request is made using the special flag to enable the embedded Metadata feature. Only a maximum of Metadata objects is returned based on the value set in the system configuration.entity_scope
: Specify if scope of entity is Data center or Enterprise levelpolicy_state
: Nonecreation_date
: Time stamp when this object was created.priority
: The priority of the ACL entry that determines the order of entriespriority_type
: Possible values: TOP_AUDIT. This will be the top most of the egres ACL stackassociated_live_entity_id
: In the draft mode, the ACL entry refers to this LiveEntity. In non-drafted mode, this is null.associated_virtual_firewall_policy_id
: The ID of the Virtual Firewall Policy, if this was created as part of the Virtual Firewall Policy creationauto_generate_priority
: This option only affects how the children ACL entry priorities of this template/policy are generated when the priority is not specified. If ‘false’, the priority is generated by incrementing the current highest ACL Entry priority by 100. If ‘true’, a random priority will be generated, which is advised when creating many entries concurrently without specifying the priority. This will cause the new child ACL entry to get a random, non-predictable, priority. Therefore it is advised to only enable this when allow rules are being created. If any type of ACL entry order is required, keep this value to ‘false’ and use your own defined priorities, this will make sure there is a clear set of priorities and how traffic is validated against the ACL entries.owner
: Identifies the user that has created this object.external_id
: External object ID. Used for integration with third party systems
Children¶
class | fetcher |
nupermission.NUPermission | permissions |
numetadata.NUMetadata | metadatas |
nuegressauditaclentrytemplate.NUEgressAuditACLEntryTemplate | egress_audit_acl_entry_templates |
nuglobalmetadata.NUGlobalMetadata | global_metadatas |