fortios.ips.Sensor
Explore with Pulumi AI
Configure IPS sensor.
Create Sensor Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new Sensor(name: string, args?: SensorArgs, opts?: CustomResourceOptions);
@overload
def Sensor(resource_name: str,
args: Optional[SensorArgs] = None,
opts: Optional[ResourceOptions] = None)
@overload
def Sensor(resource_name: str,
opts: Optional[ResourceOptions] = None,
block_malicious_url: Optional[str] = None,
comment: Optional[str] = None,
dynamic_sort_subtable: Optional[str] = None,
entries: Optional[Sequence[SensorEntryArgs]] = None,
extended_log: Optional[str] = None,
filters: Optional[Sequence[SensorFilterArgs]] = None,
get_all_tables: Optional[str] = None,
name: Optional[str] = None,
overrides: Optional[Sequence[SensorOverrideArgs]] = None,
replacemsg_group: Optional[str] = None,
scan_botnet_connections: Optional[str] = None,
vdomparam: Optional[str] = None)
func NewSensor(ctx *Context, name string, args *SensorArgs, opts ...ResourceOption) (*Sensor, error)
public Sensor(string name, SensorArgs? args = null, CustomResourceOptions? opts = null)
public Sensor(String name, SensorArgs args)
public Sensor(String name, SensorArgs args, CustomResourceOptions options)
type: fortios:ips:Sensor
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args SensorArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args SensorArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args SensorArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args SensorArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args SensorArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var fortiosSensorResource = new Fortios.Ips.Sensor("fortiosSensorResource", new()
{
BlockMaliciousUrl = "string",
Comment = "string",
DynamicSortSubtable = "string",
Entries = new[]
{
new Fortios.Ips.Inputs.SensorEntryArgs
{
Action = "string",
Application = "string",
Cves = new[]
{
new Fortios.Ips.Inputs.SensorEntryCfeArgs
{
CveEntry = "string",
},
},
DefaultAction = "string",
DefaultStatus = "string",
ExemptIps = new[]
{
new Fortios.Ips.Inputs.SensorEntryExemptIpArgs
{
DstIp = "string",
Id = 0,
SrcIp = "string",
},
},
Id = 0,
LastModified = "string",
Location = "string",
Log = "string",
LogAttackContext = "string",
LogPacket = "string",
Os = "string",
Protocol = "string",
Quarantine = "string",
QuarantineExpiry = "string",
QuarantineLog = "string",
RateCount = 0,
RateDuration = 0,
RateMode = "string",
RateTrack = "string",
Rules = new[]
{
new Fortios.Ips.Inputs.SensorEntryRuleArgs
{
Id = 0,
},
},
Severity = "string",
Status = "string",
VulnTypes = new[]
{
new Fortios.Ips.Inputs.SensorEntryVulnTypeArgs
{
Id = 0,
},
},
},
},
ExtendedLog = "string",
Filters = new[]
{
new Fortios.Ips.Inputs.SensorFilterArgs
{
Action = "string",
Application = "string",
Location = "string",
Log = "string",
LogPacket = "string",
Name = "string",
Os = "string",
Protocol = "string",
Quarantine = "string",
QuarantineExpiry = 0,
QuarantineLog = "string",
Severity = "string",
Status = "string",
},
},
GetAllTables = "string",
Name = "string",
Overrides = new[]
{
new Fortios.Ips.Inputs.SensorOverrideArgs
{
Action = "string",
ExemptIps = new[]
{
new Fortios.Ips.Inputs.SensorOverrideExemptIpArgs
{
DstIp = "string",
Id = 0,
SrcIp = "string",
},
},
Log = "string",
LogPacket = "string",
Quarantine = "string",
QuarantineExpiry = 0,
QuarantineLog = "string",
RuleId = 0,
Status = "string",
},
},
ReplacemsgGroup = "string",
ScanBotnetConnections = "string",
Vdomparam = "string",
});
example, err := ips.NewSensor(ctx, "fortiosSensorResource", &ips.SensorArgs{
BlockMaliciousUrl: pulumi.String("string"),
Comment: pulumi.String("string"),
DynamicSortSubtable: pulumi.String("string"),
Entries: ips.SensorEntryArray{
&ips.SensorEntryArgs{
Action: pulumi.String("string"),
Application: pulumi.String("string"),
Cves: ips.SensorEntryCfeArray{
&ips.SensorEntryCfeArgs{
CveEntry: pulumi.String("string"),
},
},
DefaultAction: pulumi.String("string"),
DefaultStatus: pulumi.String("string"),
ExemptIps: ips.SensorEntryExemptIpArray{
&ips.SensorEntryExemptIpArgs{
DstIp: pulumi.String("string"),
Id: pulumi.Int(0),
SrcIp: pulumi.String("string"),
},
},
Id: pulumi.Int(0),
LastModified: pulumi.String("string"),
Location: pulumi.String("string"),
Log: pulumi.String("string"),
LogAttackContext: pulumi.String("string"),
LogPacket: pulumi.String("string"),
Os: pulumi.String("string"),
Protocol: pulumi.String("string"),
Quarantine: pulumi.String("string"),
QuarantineExpiry: pulumi.String("string"),
QuarantineLog: pulumi.String("string"),
RateCount: pulumi.Int(0),
RateDuration: pulumi.Int(0),
RateMode: pulumi.String("string"),
RateTrack: pulumi.String("string"),
Rules: ips.SensorEntryRuleArray{
&ips.SensorEntryRuleArgs{
Id: pulumi.Int(0),
},
},
Severity: pulumi.String("string"),
Status: pulumi.String("string"),
VulnTypes: ips.SensorEntryVulnTypeArray{
&ips.SensorEntryVulnTypeArgs{
Id: pulumi.Int(0),
},
},
},
},
ExtendedLog: pulumi.String("string"),
Filters: ips.SensorFilterArray{
&ips.SensorFilterArgs{
Action: pulumi.String("string"),
Application: pulumi.String("string"),
Location: pulumi.String("string"),
Log: pulumi.String("string"),
LogPacket: pulumi.String("string"),
Name: pulumi.String("string"),
Os: pulumi.String("string"),
Protocol: pulumi.String("string"),
Quarantine: pulumi.String("string"),
QuarantineExpiry: pulumi.Int(0),
QuarantineLog: pulumi.String("string"),
Severity: pulumi.String("string"),
Status: pulumi.String("string"),
},
},
GetAllTables: pulumi.String("string"),
Name: pulumi.String("string"),
Overrides: ips.SensorOverrideArray{
&ips.SensorOverrideArgs{
Action: pulumi.String("string"),
ExemptIps: ips.SensorOverrideExemptIpArray{
&ips.SensorOverrideExemptIpArgs{
DstIp: pulumi.String("string"),
Id: pulumi.Int(0),
SrcIp: pulumi.String("string"),
},
},
Log: pulumi.String("string"),
LogPacket: pulumi.String("string"),
Quarantine: pulumi.String("string"),
QuarantineExpiry: pulumi.Int(0),
QuarantineLog: pulumi.String("string"),
RuleId: pulumi.Int(0),
Status: pulumi.String("string"),
},
},
ReplacemsgGroup: pulumi.String("string"),
ScanBotnetConnections: pulumi.String("string"),
Vdomparam: pulumi.String("string"),
})
var fortiosSensorResource = new Sensor("fortiosSensorResource", SensorArgs.builder()
.blockMaliciousUrl("string")
.comment("string")
.dynamicSortSubtable("string")
.entries(SensorEntryArgs.builder()
.action("string")
.application("string")
.cves(SensorEntryCfeArgs.builder()
.cveEntry("string")
.build())
.defaultAction("string")
.defaultStatus("string")
.exemptIps(SensorEntryExemptIpArgs.builder()
.dstIp("string")
.id(0)
.srcIp("string")
.build())
.id(0)
.lastModified("string")
.location("string")
.log("string")
.logAttackContext("string")
.logPacket("string")
.os("string")
.protocol("string")
.quarantine("string")
.quarantineExpiry("string")
.quarantineLog("string")
.rateCount(0)
.rateDuration(0)
.rateMode("string")
.rateTrack("string")
.rules(SensorEntryRuleArgs.builder()
.id(0)
.build())
.severity("string")
.status("string")
.vulnTypes(SensorEntryVulnTypeArgs.builder()
.id(0)
.build())
.build())
.extendedLog("string")
.filters(SensorFilterArgs.builder()
.action("string")
.application("string")
.location("string")
.log("string")
.logPacket("string")
.name("string")
.os("string")
.protocol("string")
.quarantine("string")
.quarantineExpiry(0)
.quarantineLog("string")
.severity("string")
.status("string")
.build())
.getAllTables("string")
.name("string")
.overrides(SensorOverrideArgs.builder()
.action("string")
.exemptIps(SensorOverrideExemptIpArgs.builder()
.dstIp("string")
.id(0)
.srcIp("string")
.build())
.log("string")
.logPacket("string")
.quarantine("string")
.quarantineExpiry(0)
.quarantineLog("string")
.ruleId(0)
.status("string")
.build())
.replacemsgGroup("string")
.scanBotnetConnections("string")
.vdomparam("string")
.build());
fortios_sensor_resource = fortios.ips.Sensor("fortiosSensorResource",
block_malicious_url="string",
comment="string",
dynamic_sort_subtable="string",
entries=[fortios.ips.SensorEntryArgs(
action="string",
application="string",
cves=[fortios.ips.SensorEntryCfeArgs(
cve_entry="string",
)],
default_action="string",
default_status="string",
exempt_ips=[fortios.ips.SensorEntryExemptIpArgs(
dst_ip="string",
id=0,
src_ip="string",
)],
id=0,
last_modified="string",
location="string",
log="string",
log_attack_context="string",
log_packet="string",
os="string",
protocol="string",
quarantine="string",
quarantine_expiry="string",
quarantine_log="string",
rate_count=0,
rate_duration=0,
rate_mode="string",
rate_track="string",
rules=[fortios.ips.SensorEntryRuleArgs(
id=0,
)],
severity="string",
status="string",
vuln_types=[fortios.ips.SensorEntryVulnTypeArgs(
id=0,
)],
)],
extended_log="string",
filters=[fortios.ips.SensorFilterArgs(
action="string",
application="string",
location="string",
log="string",
log_packet="string",
name="string",
os="string",
protocol="string",
quarantine="string",
quarantine_expiry=0,
quarantine_log="string",
severity="string",
status="string",
)],
get_all_tables="string",
name="string",
overrides=[fortios.ips.SensorOverrideArgs(
action="string",
exempt_ips=[fortios.ips.SensorOverrideExemptIpArgs(
dst_ip="string",
id=0,
src_ip="string",
)],
log="string",
log_packet="string",
quarantine="string",
quarantine_expiry=0,
quarantine_log="string",
rule_id=0,
status="string",
)],
replacemsg_group="string",
scan_botnet_connections="string",
vdomparam="string")
const fortiosSensorResource = new fortios.ips.Sensor("fortiosSensorResource", {
blockMaliciousUrl: "string",
comment: "string",
dynamicSortSubtable: "string",
entries: [{
action: "string",
application: "string",
cves: [{
cveEntry: "string",
}],
defaultAction: "string",
defaultStatus: "string",
exemptIps: [{
dstIp: "string",
id: 0,
srcIp: "string",
}],
id: 0,
lastModified: "string",
location: "string",
log: "string",
logAttackContext: "string",
logPacket: "string",
os: "string",
protocol: "string",
quarantine: "string",
quarantineExpiry: "string",
quarantineLog: "string",
rateCount: 0,
rateDuration: 0,
rateMode: "string",
rateTrack: "string",
rules: [{
id: 0,
}],
severity: "string",
status: "string",
vulnTypes: [{
id: 0,
}],
}],
extendedLog: "string",
filters: [{
action: "string",
application: "string",
location: "string",
log: "string",
logPacket: "string",
name: "string",
os: "string",
protocol: "string",
quarantine: "string",
quarantineExpiry: 0,
quarantineLog: "string",
severity: "string",
status: "string",
}],
getAllTables: "string",
name: "string",
overrides: [{
action: "string",
exemptIps: [{
dstIp: "string",
id: 0,
srcIp: "string",
}],
log: "string",
logPacket: "string",
quarantine: "string",
quarantineExpiry: 0,
quarantineLog: "string",
ruleId: 0,
status: "string",
}],
replacemsgGroup: "string",
scanBotnetConnections: "string",
vdomparam: "string",
});
type: fortios:ips:Sensor
properties:
blockMaliciousUrl: string
comment: string
dynamicSortSubtable: string
entries:
- action: string
application: string
cves:
- cveEntry: string
defaultAction: string
defaultStatus: string
exemptIps:
- dstIp: string
id: 0
srcIp: string
id: 0
lastModified: string
location: string
log: string
logAttackContext: string
logPacket: string
os: string
protocol: string
quarantine: string
quarantineExpiry: string
quarantineLog: string
rateCount: 0
rateDuration: 0
rateMode: string
rateTrack: string
rules:
- id: 0
severity: string
status: string
vulnTypes:
- id: 0
extendedLog: string
filters:
- action: string
application: string
location: string
log: string
logPacket: string
name: string
os: string
protocol: string
quarantine: string
quarantineExpiry: 0
quarantineLog: string
severity: string
status: string
getAllTables: string
name: string
overrides:
- action: string
exemptIps:
- dstIp: string
id: 0
srcIp: string
log: string
logPacket: string
quarantine: string
quarantineExpiry: 0
quarantineLog: string
ruleId: 0
status: string
replacemsgGroup: string
scanBotnetConnections: string
vdomparam: string
Sensor Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The Sensor resource accepts the following input properties:
- Block
Malicious stringUrl - Enable/disable malicious URL blocking. Valid values:
disable
,enable
. - Comment string
- Comment.
- Dynamic
Sort stringSubtable - Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- Entries
List<Pulumiverse.
Fortios. Ips. Inputs. Sensor Entry> - IPS sensor filter. The structure of
entries
block is documented below. - Extended
Log string - Enable/disable extended logging. Valid values:
enable
,disable
. - Filters
List<Pulumiverse.
Fortios. Ips. Inputs. Sensor Filter> - IPS sensor filter. The structure of
filter
block is documented below. - Get
All stringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- Name string
- Sensor name.
- Overrides
List<Pulumiverse.
Fortios. Ips. Inputs. Sensor Override> - IPS override rule. The structure of
override
block is documented below. - Replacemsg
Group string - Replacement message group.
- Scan
Botnet stringConnections - Block or monitor connections to Botnet servers, or disable Botnet scanning. Valid values:
disable
,block
,monitor
. - Vdomparam string
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- Block
Malicious stringUrl - Enable/disable malicious URL blocking. Valid values:
disable
,enable
. - Comment string
- Comment.
- Dynamic
Sort stringSubtable - Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- Entries
[]Sensor
Entry Args - IPS sensor filter. The structure of
entries
block is documented below. - Extended
Log string - Enable/disable extended logging. Valid values:
enable
,disable
. - Filters
[]Sensor
Filter Args - IPS sensor filter. The structure of
filter
block is documented below. - Get
All stringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- Name string
- Sensor name.
- Overrides
[]Sensor
Override Args - IPS override rule. The structure of
override
block is documented below. - Replacemsg
Group string - Replacement message group.
- Scan
Botnet stringConnections - Block or monitor connections to Botnet servers, or disable Botnet scanning. Valid values:
disable
,block
,monitor
. - Vdomparam string
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- block
Malicious StringUrl - Enable/disable malicious URL blocking. Valid values:
disable
,enable
. - comment String
- Comment.
- dynamic
Sort StringSubtable - Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- entries
List<Sensor
Entry> - IPS sensor filter. The structure of
entries
block is documented below. - extended
Log String - Enable/disable extended logging. Valid values:
enable
,disable
. - filters
List<Sensor
Filter> - IPS sensor filter. The structure of
filter
block is documented below. - get
All StringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- name String
- Sensor name.
- overrides
List<Sensor
Override> - IPS override rule. The structure of
override
block is documented below. - replacemsg
Group String - Replacement message group.
- scan
Botnet StringConnections - Block or monitor connections to Botnet servers, or disable Botnet scanning. Valid values:
disable
,block
,monitor
. - vdomparam String
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- block
Malicious stringUrl - Enable/disable malicious URL blocking. Valid values:
disable
,enable
. - comment string
- Comment.
- dynamic
Sort stringSubtable - Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- entries
Sensor
Entry[] - IPS sensor filter. The structure of
entries
block is documented below. - extended
Log string - Enable/disable extended logging. Valid values:
enable
,disable
. - filters
Sensor
Filter[] - IPS sensor filter. The structure of
filter
block is documented below. - get
All stringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- name string
- Sensor name.
- overrides
Sensor
Override[] - IPS override rule. The structure of
override
block is documented below. - replacemsg
Group string - Replacement message group.
- scan
Botnet stringConnections - Block or monitor connections to Botnet servers, or disable Botnet scanning. Valid values:
disable
,block
,monitor
. - vdomparam string
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- block_
malicious_ strurl - Enable/disable malicious URL blocking. Valid values:
disable
,enable
. - comment str
- Comment.
- dynamic_
sort_ strsubtable - Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- entries
Sequence[Sensor
Entry Args] - IPS sensor filter. The structure of
entries
block is documented below. - extended_
log str - Enable/disable extended logging. Valid values:
enable
,disable
. - filters
Sequence[Sensor
Filter Args] - IPS sensor filter. The structure of
filter
block is documented below. - get_
all_ strtables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- name str
- Sensor name.
- overrides
Sequence[Sensor
Override Args] - IPS override rule. The structure of
override
block is documented below. - replacemsg_
group str - Replacement message group.
- scan_
botnet_ strconnections - Block or monitor connections to Botnet servers, or disable Botnet scanning. Valid values:
disable
,block
,monitor
. - vdomparam str
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- block
Malicious StringUrl - Enable/disable malicious URL blocking. Valid values:
disable
,enable
. - comment String
- Comment.
- dynamic
Sort StringSubtable - Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- entries List<Property Map>
- IPS sensor filter. The structure of
entries
block is documented below. - extended
Log String - Enable/disable extended logging. Valid values:
enable
,disable
. - filters List<Property Map>
- IPS sensor filter. The structure of
filter
block is documented below. - get
All StringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- name String
- Sensor name.
- overrides List<Property Map>
- IPS override rule. The structure of
override
block is documented below. - replacemsg
Group String - Replacement message group.
- scan
Botnet StringConnections - Block or monitor connections to Botnet servers, or disable Botnet scanning. Valid values:
disable
,block
,monitor
. - vdomparam String
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
Outputs
All input properties are implicitly available as output properties. Additionally, the Sensor resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing Sensor Resource
Get an existing Sensor resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: SensorState, opts?: CustomResourceOptions): Sensor
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
block_malicious_url: Optional[str] = None,
comment: Optional[str] = None,
dynamic_sort_subtable: Optional[str] = None,
entries: Optional[Sequence[SensorEntryArgs]] = None,
extended_log: Optional[str] = None,
filters: Optional[Sequence[SensorFilterArgs]] = None,
get_all_tables: Optional[str] = None,
name: Optional[str] = None,
overrides: Optional[Sequence[SensorOverrideArgs]] = None,
replacemsg_group: Optional[str] = None,
scan_botnet_connections: Optional[str] = None,
vdomparam: Optional[str] = None) -> Sensor
func GetSensor(ctx *Context, name string, id IDInput, state *SensorState, opts ...ResourceOption) (*Sensor, error)
public static Sensor Get(string name, Input<string> id, SensorState? state, CustomResourceOptions? opts = null)
public static Sensor get(String name, Output<String> id, SensorState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Block
Malicious stringUrl - Enable/disable malicious URL blocking. Valid values:
disable
,enable
. - Comment string
- Comment.
- Dynamic
Sort stringSubtable - Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- Entries
List<Pulumiverse.
Fortios. Ips. Inputs. Sensor Entry> - IPS sensor filter. The structure of
entries
block is documented below. - Extended
Log string - Enable/disable extended logging. Valid values:
enable
,disable
. - Filters
List<Pulumiverse.
Fortios. Ips. Inputs. Sensor Filter> - IPS sensor filter. The structure of
filter
block is documented below. - Get
All stringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- Name string
- Sensor name.
- Overrides
List<Pulumiverse.
Fortios. Ips. Inputs. Sensor Override> - IPS override rule. The structure of
override
block is documented below. - Replacemsg
Group string - Replacement message group.
- Scan
Botnet stringConnections - Block or monitor connections to Botnet servers, or disable Botnet scanning. Valid values:
disable
,block
,monitor
. - Vdomparam string
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- Block
Malicious stringUrl - Enable/disable malicious URL blocking. Valid values:
disable
,enable
. - Comment string
- Comment.
- Dynamic
Sort stringSubtable - Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- Entries
[]Sensor
Entry Args - IPS sensor filter. The structure of
entries
block is documented below. - Extended
Log string - Enable/disable extended logging. Valid values:
enable
,disable
. - Filters
[]Sensor
Filter Args - IPS sensor filter. The structure of
filter
block is documented below. - Get
All stringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- Name string
- Sensor name.
- Overrides
[]Sensor
Override Args - IPS override rule. The structure of
override
block is documented below. - Replacemsg
Group string - Replacement message group.
- Scan
Botnet stringConnections - Block or monitor connections to Botnet servers, or disable Botnet scanning. Valid values:
disable
,block
,monitor
. - Vdomparam string
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- block
Malicious StringUrl - Enable/disable malicious URL blocking. Valid values:
disable
,enable
. - comment String
- Comment.
- dynamic
Sort StringSubtable - Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- entries
List<Sensor
Entry> - IPS sensor filter. The structure of
entries
block is documented below. - extended
Log String - Enable/disable extended logging. Valid values:
enable
,disable
. - filters
List<Sensor
Filter> - IPS sensor filter. The structure of
filter
block is documented below. - get
All StringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- name String
- Sensor name.
- overrides
List<Sensor
Override> - IPS override rule. The structure of
override
block is documented below. - replacemsg
Group String - Replacement message group.
- scan
Botnet StringConnections - Block or monitor connections to Botnet servers, or disable Botnet scanning. Valid values:
disable
,block
,monitor
. - vdomparam String
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- block
Malicious stringUrl - Enable/disable malicious URL blocking. Valid values:
disable
,enable
. - comment string
- Comment.
- dynamic
Sort stringSubtable - Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- entries
Sensor
Entry[] - IPS sensor filter. The structure of
entries
block is documented below. - extended
Log string - Enable/disable extended logging. Valid values:
enable
,disable
. - filters
Sensor
Filter[] - IPS sensor filter. The structure of
filter
block is documented below. - get
All stringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- name string
- Sensor name.
- overrides
Sensor
Override[] - IPS override rule. The structure of
override
block is documented below. - replacemsg
Group string - Replacement message group.
- scan
Botnet stringConnections - Block or monitor connections to Botnet servers, or disable Botnet scanning. Valid values:
disable
,block
,monitor
. - vdomparam string
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- block_
malicious_ strurl - Enable/disable malicious URL blocking. Valid values:
disable
,enable
. - comment str
- Comment.
- dynamic_
sort_ strsubtable - Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- entries
Sequence[Sensor
Entry Args] - IPS sensor filter. The structure of
entries
block is documented below. - extended_
log str - Enable/disable extended logging. Valid values:
enable
,disable
. - filters
Sequence[Sensor
Filter Args] - IPS sensor filter. The structure of
filter
block is documented below. - get_
all_ strtables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- name str
- Sensor name.
- overrides
Sequence[Sensor
Override Args] - IPS override rule. The structure of
override
block is documented below. - replacemsg_
group str - Replacement message group.
- scan_
botnet_ strconnections - Block or monitor connections to Botnet servers, or disable Botnet scanning. Valid values:
disable
,block
,monitor
. - vdomparam str
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
- block
Malicious StringUrl - Enable/disable malicious URL blocking. Valid values:
disable
,enable
. - comment String
- Comment.
- dynamic
Sort StringSubtable - Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
- entries List<Property Map>
- IPS sensor filter. The structure of
entries
block is documented below. - extended
Log String - Enable/disable extended logging. Valid values:
enable
,disable
. - filters List<Property Map>
- IPS sensor filter. The structure of
filter
block is documented below. - get
All StringTables - Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwise, conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
- name String
- Sensor name.
- overrides List<Property Map>
- IPS override rule. The structure of
override
block is documented below. - replacemsg
Group String - Replacement message group.
- scan
Botnet StringConnections - Block or monitor connections to Botnet servers, or disable Botnet scanning. Valid values:
disable
,block
,monitor
. - vdomparam String
- Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
Supporting Types
SensorEntry, SensorEntryArgs
- Action string
- Action taken with traffic in which signatures are detected. Valid values:
pass
,block
,reset
,default
. - Application string
- Applications to be protected. set application ? lists available applications. all includes all applications. other includes all unlisted applications.
- Cves
List<Pulumiverse.
Fortios. Ips. Inputs. Sensor Entry Cfe> - List of CVE IDs of the signatures to add to the sensor The structure of
cve
block is documented below. - Default
Action string - Signature default action filter. Valid values:
all
,pass
,block
. - Default
Status string - Signature default status filter. Valid values:
all
,enable
,disable
. - Exempt
Ips List<Pulumiverse.Fortios. Ips. Inputs. Sensor Entry Exempt Ip> - Traffic from selected source or destination IP addresses is exempt from this signature. The structure of
exempt_ip
block is documented below. - Id int
- Rule ID in IPS database (0 - 4294967295).
- Last
Modified string - Filter by signature last modified date. Formats: before , after , between .
- Location string
- Protect client or server traffic.
- Log string
- Enable/disable logging of signatures included in filter. Valid values:
disable
,enable
. - Log
Attack stringContext - Enable/disable logging of attack context: URL buffer, header buffer, body buffer, packet buffer. Valid values:
disable
,enable
. - Log
Packet string - Enable/disable packet logging. Enable to save the packet that triggers the filter. You can download the packets in pcap format for diagnostic use. Valid values:
disable
,enable
. - Os string
- Operating systems to be protected. all includes all operating systems. other includes all unlisted operating systems.
- Protocol string
- Protocols to be examined. set protocol ? lists available protocols. all includes all protocols. other includes all unlisted protocols.
- Quarantine string
- Quarantine method. Valid values:
none
,attacker
. - Quarantine
Expiry string - Duration of quarantine. (Format ###d##h##m, minimum 1m, maximum 364d23h59m, default = 5m). Requires quarantine set to attacker.
- Quarantine
Log string - Enable/disable quarantine logging. Valid values:
disable
,enable
. - Rate
Count int - Count of the rate.
- Rate
Duration int - Duration (sec) of the rate.
- Rate
Mode string - Rate limit mode. Valid values:
periodical
,continuous
. - Rate
Track string - Track the packet protocol field. Valid values:
none
,src-ip
,dest-ip
,dhcp-client-mac
,dns-domain
. - Rules
List<Pulumiverse.
Fortios. Ips. Inputs. Sensor Entry Rule> - Identifies the predefined or custom IPS signatures to add to the sensor. The structure of
rule
block is documented below. - Severity string
- Relative severity of the signature, from info to critical. Log messages generated by the signature include the severity.
- Status string
- Status of the signatures included in filter. default enables the filter and only use filters with default status of enable. Filters with default status of disable will not be used. Valid values:
disable
,enable
,default
. - Vuln
Types List<Pulumiverse.Fortios. Ips. Inputs. Sensor Entry Vuln Type> - List of signature vulnerability types to filter by. The structure of
vuln_type
block is documented below.
- Action string
- Action taken with traffic in which signatures are detected. Valid values:
pass
,block
,reset
,default
. - Application string
- Applications to be protected. set application ? lists available applications. all includes all applications. other includes all unlisted applications.
- Cves
[]Sensor
Entry Cfe - List of CVE IDs of the signatures to add to the sensor The structure of
cve
block is documented below. - Default
Action string - Signature default action filter. Valid values:
all
,pass
,block
. - Default
Status string - Signature default status filter. Valid values:
all
,enable
,disable
. - Exempt
Ips []SensorEntry Exempt Ip - Traffic from selected source or destination IP addresses is exempt from this signature. The structure of
exempt_ip
block is documented below. - Id int
- Rule ID in IPS database (0 - 4294967295).
- Last
Modified string - Filter by signature last modified date. Formats: before , after , between .
- Location string
- Protect client or server traffic.
- Log string
- Enable/disable logging of signatures included in filter. Valid values:
disable
,enable
. - Log
Attack stringContext - Enable/disable logging of attack context: URL buffer, header buffer, body buffer, packet buffer. Valid values:
disable
,enable
. - Log
Packet string - Enable/disable packet logging. Enable to save the packet that triggers the filter. You can download the packets in pcap format for diagnostic use. Valid values:
disable
,enable
. - Os string
- Operating systems to be protected. all includes all operating systems. other includes all unlisted operating systems.
- Protocol string
- Protocols to be examined. set protocol ? lists available protocols. all includes all protocols. other includes all unlisted protocols.
- Quarantine string
- Quarantine method. Valid values:
none
,attacker
. - Quarantine
Expiry string - Duration of quarantine. (Format ###d##h##m, minimum 1m, maximum 364d23h59m, default = 5m). Requires quarantine set to attacker.
- Quarantine
Log string - Enable/disable quarantine logging. Valid values:
disable
,enable
. - Rate
Count int - Count of the rate.
- Rate
Duration int - Duration (sec) of the rate.
- Rate
Mode string - Rate limit mode. Valid values:
periodical
,continuous
. - Rate
Track string - Track the packet protocol field. Valid values:
none
,src-ip
,dest-ip
,dhcp-client-mac
,dns-domain
. - Rules
[]Sensor
Entry Rule - Identifies the predefined or custom IPS signatures to add to the sensor. The structure of
rule
block is documented below. - Severity string
- Relative severity of the signature, from info to critical. Log messages generated by the signature include the severity.
- Status string
- Status of the signatures included in filter. default enables the filter and only use filters with default status of enable. Filters with default status of disable will not be used. Valid values:
disable
,enable
,default
. - Vuln
Types []SensorEntry Vuln Type - List of signature vulnerability types to filter by. The structure of
vuln_type
block is documented below.
- action String
- Action taken with traffic in which signatures are detected. Valid values:
pass
,block
,reset
,default
. - application String
- Applications to be protected. set application ? lists available applications. all includes all applications. other includes all unlisted applications.
- cves
List<Sensor
Entry Cfe> - List of CVE IDs of the signatures to add to the sensor The structure of
cve
block is documented below. - default
Action String - Signature default action filter. Valid values:
all
,pass
,block
. - default
Status String - Signature default status filter. Valid values:
all
,enable
,disable
. - exempt
Ips List<SensorEntry Exempt Ip> - Traffic from selected source or destination IP addresses is exempt from this signature. The structure of
exempt_ip
block is documented below. - id Integer
- Rule ID in IPS database (0 - 4294967295).
- last
Modified String - Filter by signature last modified date. Formats: before , after , between .
- location String
- Protect client or server traffic.
- log String
- Enable/disable logging of signatures included in filter. Valid values:
disable
,enable
. - log
Attack StringContext - Enable/disable logging of attack context: URL buffer, header buffer, body buffer, packet buffer. Valid values:
disable
,enable
. - log
Packet String - Enable/disable packet logging. Enable to save the packet that triggers the filter. You can download the packets in pcap format for diagnostic use. Valid values:
disable
,enable
. - os String
- Operating systems to be protected. all includes all operating systems. other includes all unlisted operating systems.
- protocol String
- Protocols to be examined. set protocol ? lists available protocols. all includes all protocols. other includes all unlisted protocols.
- quarantine String
- Quarantine method. Valid values:
none
,attacker
. - quarantine
Expiry String - Duration of quarantine. (Format ###d##h##m, minimum 1m, maximum 364d23h59m, default = 5m). Requires quarantine set to attacker.
- quarantine
Log String - Enable/disable quarantine logging. Valid values:
disable
,enable
. - rate
Count Integer - Count of the rate.
- rate
Duration Integer - Duration (sec) of the rate.
- rate
Mode String - Rate limit mode. Valid values:
periodical
,continuous
. - rate
Track String - Track the packet protocol field. Valid values:
none
,src-ip
,dest-ip
,dhcp-client-mac
,dns-domain
. - rules
List<Sensor
Entry Rule> - Identifies the predefined or custom IPS signatures to add to the sensor. The structure of
rule
block is documented below. - severity String
- Relative severity of the signature, from info to critical. Log messages generated by the signature include the severity.
- status String
- Status of the signatures included in filter. default enables the filter and only use filters with default status of enable. Filters with default status of disable will not be used. Valid values:
disable
,enable
,default
. - vuln
Types List<SensorEntry Vuln Type> - List of signature vulnerability types to filter by. The structure of
vuln_type
block is documented below.
- action string
- Action taken with traffic in which signatures are detected. Valid values:
pass
,block
,reset
,default
. - application string
- Applications to be protected. set application ? lists available applications. all includes all applications. other includes all unlisted applications.
- cves
Sensor
Entry Cfe[] - List of CVE IDs of the signatures to add to the sensor The structure of
cve
block is documented below. - default
Action string - Signature default action filter. Valid values:
all
,pass
,block
. - default
Status string - Signature default status filter. Valid values:
all
,enable
,disable
. - exempt
Ips SensorEntry Exempt Ip[] - Traffic from selected source or destination IP addresses is exempt from this signature. The structure of
exempt_ip
block is documented below. - id number
- Rule ID in IPS database (0 - 4294967295).
- last
Modified string - Filter by signature last modified date. Formats: before , after , between .
- location string
- Protect client or server traffic.
- log string
- Enable/disable logging of signatures included in filter. Valid values:
disable
,enable
. - log
Attack stringContext - Enable/disable logging of attack context: URL buffer, header buffer, body buffer, packet buffer. Valid values:
disable
,enable
. - log
Packet string - Enable/disable packet logging. Enable to save the packet that triggers the filter. You can download the packets in pcap format for diagnostic use. Valid values:
disable
,enable
. - os string
- Operating systems to be protected. all includes all operating systems. other includes all unlisted operating systems.
- protocol string
- Protocols to be examined. set protocol ? lists available protocols. all includes all protocols. other includes all unlisted protocols.
- quarantine string
- Quarantine method. Valid values:
none
,attacker
. - quarantine
Expiry string - Duration of quarantine. (Format ###d##h##m, minimum 1m, maximum 364d23h59m, default = 5m). Requires quarantine set to attacker.
- quarantine
Log string - Enable/disable quarantine logging. Valid values:
disable
,enable
. - rate
Count number - Count of the rate.
- rate
Duration number - Duration (sec) of the rate.
- rate
Mode string - Rate limit mode. Valid values:
periodical
,continuous
. - rate
Track string - Track the packet protocol field. Valid values:
none
,src-ip
,dest-ip
,dhcp-client-mac
,dns-domain
. - rules
Sensor
Entry Rule[] - Identifies the predefined or custom IPS signatures to add to the sensor. The structure of
rule
block is documented below. - severity string
- Relative severity of the signature, from info to critical. Log messages generated by the signature include the severity.
- status string
- Status of the signatures included in filter. default enables the filter and only use filters with default status of enable. Filters with default status of disable will not be used. Valid values:
disable
,enable
,default
. - vuln
Types SensorEntry Vuln Type[] - List of signature vulnerability types to filter by. The structure of
vuln_type
block is documented below.
- action str
- Action taken with traffic in which signatures are detected. Valid values:
pass
,block
,reset
,default
. - application str
- Applications to be protected. set application ? lists available applications. all includes all applications. other includes all unlisted applications.
- cves
Sequence[Sensor
Entry Cfe] - List of CVE IDs of the signatures to add to the sensor The structure of
cve
block is documented below. - default_
action str - Signature default action filter. Valid values:
all
,pass
,block
. - default_
status str - Signature default status filter. Valid values:
all
,enable
,disable
. - exempt_
ips Sequence[SensorEntry Exempt Ip] - Traffic from selected source or destination IP addresses is exempt from this signature. The structure of
exempt_ip
block is documented below. - id int
- Rule ID in IPS database (0 - 4294967295).
- last_
modified str - Filter by signature last modified date. Formats: before , after , between .
- location str
- Protect client or server traffic.
- log str
- Enable/disable logging of signatures included in filter. Valid values:
disable
,enable
. - log_
attack_ strcontext - Enable/disable logging of attack context: URL buffer, header buffer, body buffer, packet buffer. Valid values:
disable
,enable
. - log_
packet str - Enable/disable packet logging. Enable to save the packet that triggers the filter. You can download the packets in pcap format for diagnostic use. Valid values:
disable
,enable
. - os str
- Operating systems to be protected. all includes all operating systems. other includes all unlisted operating systems.
- protocol str
- Protocols to be examined. set protocol ? lists available protocols. all includes all protocols. other includes all unlisted protocols.
- quarantine str
- Quarantine method. Valid values:
none
,attacker
. - quarantine_
expiry str - Duration of quarantine. (Format ###d##h##m, minimum 1m, maximum 364d23h59m, default = 5m). Requires quarantine set to attacker.
- quarantine_
log str - Enable/disable quarantine logging. Valid values:
disable
,enable
. - rate_
count int - Count of the rate.
- rate_
duration int - Duration (sec) of the rate.
- rate_
mode str - Rate limit mode. Valid values:
periodical
,continuous
. - rate_
track str - Track the packet protocol field. Valid values:
none
,src-ip
,dest-ip
,dhcp-client-mac
,dns-domain
. - rules
Sequence[Sensor
Entry Rule] - Identifies the predefined or custom IPS signatures to add to the sensor. The structure of
rule
block is documented below. - severity str
- Relative severity of the signature, from info to critical. Log messages generated by the signature include the severity.
- status str
- Status of the signatures included in filter. default enables the filter and only use filters with default status of enable. Filters with default status of disable will not be used. Valid values:
disable
,enable
,default
. - vuln_
types Sequence[SensorEntry Vuln Type] - List of signature vulnerability types to filter by. The structure of
vuln_type
block is documented below.
- action String
- Action taken with traffic in which signatures are detected. Valid values:
pass
,block
,reset
,default
. - application String
- Applications to be protected. set application ? lists available applications. all includes all applications. other includes all unlisted applications.
- cves List<Property Map>
- List of CVE IDs of the signatures to add to the sensor The structure of
cve
block is documented below. - default
Action String - Signature default action filter. Valid values:
all
,pass
,block
. - default
Status String - Signature default status filter. Valid values:
all
,enable
,disable
. - exempt
Ips List<Property Map> - Traffic from selected source or destination IP addresses is exempt from this signature. The structure of
exempt_ip
block is documented below. - id Number
- Rule ID in IPS database (0 - 4294967295).
- last
Modified String - Filter by signature last modified date. Formats: before , after , between .
- location String
- Protect client or server traffic.
- log String
- Enable/disable logging of signatures included in filter. Valid values:
disable
,enable
. - log
Attack StringContext - Enable/disable logging of attack context: URL buffer, header buffer, body buffer, packet buffer. Valid values:
disable
,enable
. - log
Packet String - Enable/disable packet logging. Enable to save the packet that triggers the filter. You can download the packets in pcap format for diagnostic use. Valid values:
disable
,enable
. - os String
- Operating systems to be protected. all includes all operating systems. other includes all unlisted operating systems.
- protocol String
- Protocols to be examined. set protocol ? lists available protocols. all includes all protocols. other includes all unlisted protocols.
- quarantine String
- Quarantine method. Valid values:
none
,attacker
. - quarantine
Expiry String - Duration of quarantine. (Format ###d##h##m, minimum 1m, maximum 364d23h59m, default = 5m). Requires quarantine set to attacker.
- quarantine
Log String - Enable/disable quarantine logging. Valid values:
disable
,enable
. - rate
Count Number - Count of the rate.
- rate
Duration Number - Duration (sec) of the rate.
- rate
Mode String - Rate limit mode. Valid values:
periodical
,continuous
. - rate
Track String - Track the packet protocol field. Valid values:
none
,src-ip
,dest-ip
,dhcp-client-mac
,dns-domain
. - rules List<Property Map>
- Identifies the predefined or custom IPS signatures to add to the sensor. The structure of
rule
block is documented below. - severity String
- Relative severity of the signature, from info to critical. Log messages generated by the signature include the severity.
- status String
- Status of the signatures included in filter. default enables the filter and only use filters with default status of enable. Filters with default status of disable will not be used. Valid values:
disable
,enable
,default
. - vuln
Types List<Property Map> - List of signature vulnerability types to filter by. The structure of
vuln_type
block is documented below.
SensorEntryCfe, SensorEntryCfeArgs
- Cve
Entry string - CVE IDs or CVE wildcards.
- Cve
Entry string - CVE IDs or CVE wildcards.
- cve
Entry String - CVE IDs or CVE wildcards.
- cve
Entry string - CVE IDs or CVE wildcards.
- cve_
entry str - CVE IDs or CVE wildcards.
- cve
Entry String - CVE IDs or CVE wildcards.
SensorEntryExemptIp, SensorEntryExemptIpArgs
SensorEntryRule, SensorEntryRuleArgs
- Id int
- Rule IPS.
- Id int
- Rule IPS.
- id Integer
- Rule IPS.
- id number
- Rule IPS.
- id int
- Rule IPS.
- id Number
- Rule IPS.
SensorEntryVulnType, SensorEntryVulnTypeArgs
- Id int
- Vulnerability type ID.
- Id int
- Vulnerability type ID.
- id Integer
- Vulnerability type ID.
- id number
- Vulnerability type ID.
- id int
- Vulnerability type ID.
- id Number
- Vulnerability type ID.
SensorFilter, SensorFilterArgs
- Action string
- Action of selected rules. Valid values:
pass
,block
,reset
,default
. - Application string
- Vulnerable application filter.
- Location string
- Vulnerability location filter.
- Log string
- Enable/disable logging of selected rules. Valid values:
disable
,enable
. - Log
Packet string - Enable/disable packet logging of selected rules. Valid values:
disable
,enable
. - Name string
- Filter name.
- Os string
- Vulnerable OS filter.
- Protocol string
- Vulnerable protocol filter.
- Quarantine string
- Quarantine IP or interface. Valid values:
none
,attacker
. - Quarantine
Expiry int - Duration of quarantine in minute.
- Quarantine
Log string - Enable/disable logging of selected quarantine. Valid values:
disable
,enable
. - Severity string
- Vulnerability severity filter.
- Status string
- Selected rules status. Valid values:
disable
,enable
,default
.
- Action string
- Action of selected rules. Valid values:
pass
,block
,reset
,default
. - Application string
- Vulnerable application filter.
- Location string
- Vulnerability location filter.
- Log string
- Enable/disable logging of selected rules. Valid values:
disable
,enable
. - Log
Packet string - Enable/disable packet logging of selected rules. Valid values:
disable
,enable
. - Name string
- Filter name.
- Os string
- Vulnerable OS filter.
- Protocol string
- Vulnerable protocol filter.
- Quarantine string
- Quarantine IP or interface. Valid values:
none
,attacker
. - Quarantine
Expiry int - Duration of quarantine in minute.
- Quarantine
Log string - Enable/disable logging of selected quarantine. Valid values:
disable
,enable
. - Severity string
- Vulnerability severity filter.
- Status string
- Selected rules status. Valid values:
disable
,enable
,default
.
- action String
- Action of selected rules. Valid values:
pass
,block
,reset
,default
. - application String
- Vulnerable application filter.
- location String
- Vulnerability location filter.
- log String
- Enable/disable logging of selected rules. Valid values:
disable
,enable
. - log
Packet String - Enable/disable packet logging of selected rules. Valid values:
disable
,enable
. - name String
- Filter name.
- os String
- Vulnerable OS filter.
- protocol String
- Vulnerable protocol filter.
- quarantine String
- Quarantine IP or interface. Valid values:
none
,attacker
. - quarantine
Expiry Integer - Duration of quarantine in minute.
- quarantine
Log String - Enable/disable logging of selected quarantine. Valid values:
disable
,enable
. - severity String
- Vulnerability severity filter.
- status String
- Selected rules status. Valid values:
disable
,enable
,default
.
- action string
- Action of selected rules. Valid values:
pass
,block
,reset
,default
. - application string
- Vulnerable application filter.
- location string
- Vulnerability location filter.
- log string
- Enable/disable logging of selected rules. Valid values:
disable
,enable
. - log
Packet string - Enable/disable packet logging of selected rules. Valid values:
disable
,enable
. - name string
- Filter name.
- os string
- Vulnerable OS filter.
- protocol string
- Vulnerable protocol filter.
- quarantine string
- Quarantine IP or interface. Valid values:
none
,attacker
. - quarantine
Expiry number - Duration of quarantine in minute.
- quarantine
Log string - Enable/disable logging of selected quarantine. Valid values:
disable
,enable
. - severity string
- Vulnerability severity filter.
- status string
- Selected rules status. Valid values:
disable
,enable
,default
.
- action str
- Action of selected rules. Valid values:
pass
,block
,reset
,default
. - application str
- Vulnerable application filter.
- location str
- Vulnerability location filter.
- log str
- Enable/disable logging of selected rules. Valid values:
disable
,enable
. - log_
packet str - Enable/disable packet logging of selected rules. Valid values:
disable
,enable
. - name str
- Filter name.
- os str
- Vulnerable OS filter.
- protocol str
- Vulnerable protocol filter.
- quarantine str
- Quarantine IP or interface. Valid values:
none
,attacker
. - quarantine_
expiry int - Duration of quarantine in minute.
- quarantine_
log str - Enable/disable logging of selected quarantine. Valid values:
disable
,enable
. - severity str
- Vulnerability severity filter.
- status str
- Selected rules status. Valid values:
disable
,enable
,default
.
- action String
- Action of selected rules. Valid values:
pass
,block
,reset
,default
. - application String
- Vulnerable application filter.
- location String
- Vulnerability location filter.
- log String
- Enable/disable logging of selected rules. Valid values:
disable
,enable
. - log
Packet String - Enable/disable packet logging of selected rules. Valid values:
disable
,enable
. - name String
- Filter name.
- os String
- Vulnerable OS filter.
- protocol String
- Vulnerable protocol filter.
- quarantine String
- Quarantine IP or interface. Valid values:
none
,attacker
. - quarantine
Expiry Number - Duration of quarantine in minute.
- quarantine
Log String - Enable/disable logging of selected quarantine. Valid values:
disable
,enable
. - severity String
- Vulnerability severity filter.
- status String
- Selected rules status. Valid values:
disable
,enable
,default
.
SensorOverride, SensorOverrideArgs
- Action string
- Action of override rule. Valid values:
pass
,block
,reset
. - Exempt
Ips List<Pulumiverse.Fortios. Ips. Inputs. Sensor Override Exempt Ip> - Exempted IP. The structure of
exempt_ip
block is documented below. - Log string
- Enable/disable logging. Valid values:
disable
,enable
. - Log
Packet string - Enable/disable packet logging. Valid values:
disable
,enable
. - Quarantine string
- Quarantine IP or interface. Valid values:
none
,attacker
. - Quarantine
Expiry int - Duration of quarantine in minute.
- Quarantine
Log string - Enable/disable logging of selected quarantine. Valid values:
disable
,enable
. - Rule
Id int - Override rule ID.
- Status string
- Enable/disable status of override rule. Valid values:
disable
,enable
.
- Action string
- Action of override rule. Valid values:
pass
,block
,reset
. - Exempt
Ips []SensorOverride Exempt Ip - Exempted IP. The structure of
exempt_ip
block is documented below. - Log string
- Enable/disable logging. Valid values:
disable
,enable
. - Log
Packet string - Enable/disable packet logging. Valid values:
disable
,enable
. - Quarantine string
- Quarantine IP or interface. Valid values:
none
,attacker
. - Quarantine
Expiry int - Duration of quarantine in minute.
- Quarantine
Log string - Enable/disable logging of selected quarantine. Valid values:
disable
,enable
. - Rule
Id int - Override rule ID.
- Status string
- Enable/disable status of override rule. Valid values:
disable
,enable
.
- action String
- Action of override rule. Valid values:
pass
,block
,reset
. - exempt
Ips List<SensorOverride Exempt Ip> - Exempted IP. The structure of
exempt_ip
block is documented below. - log String
- Enable/disable logging. Valid values:
disable
,enable
. - log
Packet String - Enable/disable packet logging. Valid values:
disable
,enable
. - quarantine String
- Quarantine IP or interface. Valid values:
none
,attacker
. - quarantine
Expiry Integer - Duration of quarantine in minute.
- quarantine
Log String - Enable/disable logging of selected quarantine. Valid values:
disable
,enable
. - rule
Id Integer - Override rule ID.
- status String
- Enable/disable status of override rule. Valid values:
disable
,enable
.
- action string
- Action of override rule. Valid values:
pass
,block
,reset
. - exempt
Ips SensorOverride Exempt Ip[] - Exempted IP. The structure of
exempt_ip
block is documented below. - log string
- Enable/disable logging. Valid values:
disable
,enable
. - log
Packet string - Enable/disable packet logging. Valid values:
disable
,enable
. - quarantine string
- Quarantine IP or interface. Valid values:
none
,attacker
. - quarantine
Expiry number - Duration of quarantine in minute.
- quarantine
Log string - Enable/disable logging of selected quarantine. Valid values:
disable
,enable
. - rule
Id number - Override rule ID.
- status string
- Enable/disable status of override rule. Valid values:
disable
,enable
.
- action str
- Action of override rule. Valid values:
pass
,block
,reset
. - exempt_
ips Sequence[SensorOverride Exempt Ip] - Exempted IP. The structure of
exempt_ip
block is documented below. - log str
- Enable/disable logging. Valid values:
disable
,enable
. - log_
packet str - Enable/disable packet logging. Valid values:
disable
,enable
. - quarantine str
- Quarantine IP or interface. Valid values:
none
,attacker
. - quarantine_
expiry int - Duration of quarantine in minute.
- quarantine_
log str - Enable/disable logging of selected quarantine. Valid values:
disable
,enable
. - rule_
id int - Override rule ID.
- status str
- Enable/disable status of override rule. Valid values:
disable
,enable
.
- action String
- Action of override rule. Valid values:
pass
,block
,reset
. - exempt
Ips List<Property Map> - Exempted IP. The structure of
exempt_ip
block is documented below. - log String
- Enable/disable logging. Valid values:
disable
,enable
. - log
Packet String - Enable/disable packet logging. Valid values:
disable
,enable
. - quarantine String
- Quarantine IP or interface. Valid values:
none
,attacker
. - quarantine
Expiry Number - Duration of quarantine in minute.
- quarantine
Log String - Enable/disable logging of selected quarantine. Valid values:
disable
,enable
. - rule
Id Number - Override rule ID.
- status String
- Enable/disable status of override rule. Valid values:
disable
,enable
.
SensorOverrideExemptIp, SensorOverrideExemptIpArgs
Import
Ips Sensor can be imported using any of these accepted formats:
$ pulumi import fortios:ips/sensor:Sensor labelname {{name}}
If you do not want to import arguments of block:
$ export “FORTIOS_IMPORT_TABLE”=“false”
$ pulumi import fortios:ips/sensor:Sensor labelname {{name}}
$ unset “FORTIOS_IMPORT_TABLE”
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- fortios pulumiverse/pulumi-fortios
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
fortios
Terraform Provider.