nuingressauditaclentrytemplate¶
-
nuingressauditaclentrytemplate.NUIngressAuditACLEntryTemplate(bambou.nurest_object.NUMetaRESTObject,):
Security Policy Entries defines what action to take for a particular type of traffic, based on its origin and its destination, its protocol, EtherType, eventual ports, DSCP value and other information.
Attributes¶
acl_template_name
: The name of the parent Template for this acl entryicmp_code
: The ICMP Code when protocol selected is ICMP.icmp_type
: The ICMP Type when protocol selected is ICMP.ipv6_address_override
: Overrides source IPv6 for Ingress.dscp
(Mandatory): DSCP match condition to be set in the rule. It is either * or from 0-63last_updated_by
: ID of the user who last updated the object.last_updated_date
: Time stamp when this object was last updated.action
: The action of the ACL entry is only TRANSPARENT.address_override
: Overrides source IP for Ingress.web_filter_id
: ID of web filter category or web domain name entity usedweb_filter_stats_logging_enabled
: Indicates if web filter statistics logging is enabled for this particular templateweb_filter_type
: Indicates type of web filter being setreputation_score
: Web Domain Reputation Score. Valid values are LOW_RISK, MEDIUM_RISK and HIGH_RISK. Applicable when webFilterType is WEB_DOMAIN_REPUTATION.description
: Description of the ACL entrydestination_port
: The destination port to be matched if protocol is UDP or TCP. Value should be either * or single port number or a port rangenetwork_entity_type
: Indicates whether the Network Entity of ACL Entry was derived from a L2/L3 Domain template or instance. Possible Values: ENTERPRISENETWORK, NETWORKMACROGROUP, PGEXPRESSION, PGEXPRESSIONTEMPLATE, POLICYGROUP, POLICYGROUPTEMPLATE, PUBLICNETWORK, SAASAPPLICATIONGROUP, SUBNET, SUBNETTEMPLATE, ZONE, ZONETEMPLATE.network_id
: The ID of the destination endpoint (Subnet/Zone/Macro/MacroGroup/PolicyGroup/PolicyGroupExpression)network_type
: Type of the destination endpoint (Subnet/Zone/Macro/MacroGroup/PolicyGroup/PolicyGroupExpression)mirror_destination_group_id
: ID of the associated Mirror Destination Group.mirror_destination_id
: Destination ID of the mirror destination object.flow_logging_enabled
: Is flow logging enabled for this particular templateembedded_metadata
: Metadata objects associated with this entity. This will contain a list of Metadata objects if the API request is made using the special flag to enable the embedded Metadata feature. Only a maximum of Metadata objects is returned based on the value set in the system configuration.enterprise_name
: The name of the enterprise for the domains parententity_scope
: Specify if scope of entity is Data center or Enterprise levellocation_entity_type
: Indicates whether the Location Entity of ACL Entry was derived from a L2/L3 Domain template or instance. Possible Values: ENTERPRISENETWORK, NETWORKMACROGROUP, PGEXPRESSION, PGEXPRESSIONTEMPLATE, POLICYGROUP, POLICYGROUPTEMPLATE, PUBLICNETWORK, REDIRECTIONTARGET, REDIRECTIONTARGETTEMPLATE, SUBNET, SUBNETTEMPLATE, ZONE, ZONETEMPLATE.location_id
: The ID of the source endpoint (Subnet/Zone/VportTag/PortGroup/PolicyGroupExpression)location_type
(Mandatory): Type of the source endpoint (Subnet/Zone/VportTag/PortGroup/PolicyGroupExpression)policy_state
: State of the policy.domain_name
: The name of the domain/domain template for the aclTemplateNames parentsource_port
: Source port to be matched if protocol is UDP or TCP. Value can be either * or single port number or a port rangecreation_date
: Time stamp when this object was created.priority
: The priority of the ACL entry that determines the order of entriesprotocol
: Protocol number that must be matchedassociated_l7_application_signature_id
: The UUID of the associated L7 Application signatureassociated_live_entity_id
: In the draft mode, the ACL entry refers to this LiveEntity. In non-drafted mode, this is null.associated_live_template_id
: In the draft mode, the ACL entity refers to this live entity parent. In non-drafted mode, this is nullassociated_traffic_type
: This property reflects the type of traffic in case an ACL entry is created using an Service or Service Group. In case a protocol and port are specified for the ACL entry, this property has to be empty (null). Supported values are L4_SERVICE, L4_SERVICE_GROUP and empty.associated_traffic_type_id
: If a traffic type is specified as Service or Service Group, then the associated Id of Service / Service Group should be specifed hereassociated_virtual_firewall_rule_id
: The ID of the Virtual Firewall Rule, if this was derived as part of the Virtual Firewall Rule creationstateful
: True means that this ACL entry is stateful, so there will be a corresponding rule that will be created by OVS in the network. False means that there is no corresponding rule created by OVS in the network.stats_id
: The statsID that is created in the VSD and identifies this ACL Template Entry. This is auto-generated by VSDstats_logging_enabled
: Indicates if stats logging is enabled for this particular templateether_type
(Mandatory): Ether type of the packet to be matched. etherType can be * or a valid hexadecimal valueoverlay_mirror_destination_id
: ID of the overlay mirror destinationowner
: Identifies the user that has created this object.external_id
: External object ID. Used for integration with third party systems
Children¶
class | fetcher |
nupermission.NUPermission | permissions |
numetadata.NUMetadata | metadatas |
nuglobalmetadata.NUGlobalMetadata | global_metadatas |
nustatistics.NUStatistics | statistics |