fortimanager.ObjectFirewallProfileprotocoloptionsCifs
Explore with Pulumi AI
Configure CIFS protocol options.
This resource is a sub resource for variable
cifs
of resourcefortimanager.ObjectFirewallProfileprotocoloptions
. Conflict and overwrite may occur if use both of them. The following variables have sub resource. Avoid using them together, otherwise conflicts and overwrites may occur.
file_filter
:fortimanager_object_firewall_profileprotocoloptions_cifs_filefilter
server_keytab
:fortimanager.ObjectFirewallProfileprotocoloptionsCifsServerkeytab
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as fortimanager from "@pulumi/fortimanager";
const trnameObjectFirewallProfileprotocoloptions = new fortimanager.ObjectFirewallProfileprotocoloptions("trnameObjectFirewallProfileprotocoloptions", {});
const trnameObjectFirewallProfileprotocoloptionsCifs = new fortimanager.ObjectFirewallProfileprotocoloptionsCifs("trnameObjectFirewallProfileprotocoloptionsCifs", {
profileProtocolOptions: trnameObjectFirewallProfileprotocoloptions.name,
options: ["oversize"],
oversizeLimit: 200,
ports: [445],
}, {
dependsOn: [trnameObjectFirewallProfileprotocoloptions],
});
import pulumi
import pulumi_fortimanager as fortimanager
trname_object_firewall_profileprotocoloptions = fortimanager.ObjectFirewallProfileprotocoloptions("trnameObjectFirewallProfileprotocoloptions")
trname_object_firewall_profileprotocoloptions_cifs = fortimanager.ObjectFirewallProfileprotocoloptionsCifs("trnameObjectFirewallProfileprotocoloptionsCifs",
profile_protocol_options=trname_object_firewall_profileprotocoloptions.name,
options=["oversize"],
oversize_limit=200,
ports=[445],
opts = pulumi.ResourceOptions(depends_on=[trname_object_firewall_profileprotocoloptions]))
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/fortimanager/fortimanager"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
trnameObjectFirewallProfileprotocoloptions, err := fortimanager.NewObjectFirewallProfileprotocoloptions(ctx, "trnameObjectFirewallProfileprotocoloptions", nil)
if err != nil {
return err
}
_, err = fortimanager.NewObjectFirewallProfileprotocoloptionsCifs(ctx, "trnameObjectFirewallProfileprotocoloptionsCifs", &fortimanager.ObjectFirewallProfileprotocoloptionsCifsArgs{
ProfileProtocolOptions: trnameObjectFirewallProfileprotocoloptions.Name,
Options: pulumi.StringArray{
pulumi.String("oversize"),
},
OversizeLimit: pulumi.Float64(200),
Ports: pulumi.Float64Array{
pulumi.Float64(445),
},
}, pulumi.DependsOn([]pulumi.Resource{
trnameObjectFirewallProfileprotocoloptions,
}))
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Fortimanager = Pulumi.Fortimanager;
return await Deployment.RunAsync(() =>
{
var trnameObjectFirewallProfileprotocoloptions = new Fortimanager.ObjectFirewallProfileprotocoloptions("trnameObjectFirewallProfileprotocoloptions");
var trnameObjectFirewallProfileprotocoloptionsCifs = new Fortimanager.ObjectFirewallProfileprotocoloptionsCifs("trnameObjectFirewallProfileprotocoloptionsCifs", new()
{
ProfileProtocolOptions = trnameObjectFirewallProfileprotocoloptions.Name,
Options = new[]
{
"oversize",
},
OversizeLimit = 200,
Ports = new[]
{
445,
},
}, new CustomResourceOptions
{
DependsOn =
{
trnameObjectFirewallProfileprotocoloptions,
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.fortimanager.ObjectFirewallProfileprotocoloptions;
import com.pulumi.fortimanager.ObjectFirewallProfileprotocoloptionsCifs;
import com.pulumi.fortimanager.ObjectFirewallProfileprotocoloptionsCifsArgs;
import com.pulumi.resources.CustomResourceOptions;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var trnameObjectFirewallProfileprotocoloptions = new ObjectFirewallProfileprotocoloptions("trnameObjectFirewallProfileprotocoloptions");
var trnameObjectFirewallProfileprotocoloptionsCifs = new ObjectFirewallProfileprotocoloptionsCifs("trnameObjectFirewallProfileprotocoloptionsCifs", ObjectFirewallProfileprotocoloptionsCifsArgs.builder()
.profileProtocolOptions(trnameObjectFirewallProfileprotocoloptions.name())
.options("oversize")
.oversizeLimit(200)
.ports(445)
.build(), CustomResourceOptions.builder()
.dependsOn(trnameObjectFirewallProfileprotocoloptions)
.build());
}
}
resources:
trnameObjectFirewallProfileprotocoloptionsCifs:
type: fortimanager:ObjectFirewallProfileprotocoloptionsCifs
properties:
profileProtocolOptions: ${trnameObjectFirewallProfileprotocoloptions.name}
options:
- oversize
oversizeLimit: 200
ports:
- 445
options:
dependsOn:
- ${trnameObjectFirewallProfileprotocoloptions}
trnameObjectFirewallProfileprotocoloptions:
type: fortimanager:ObjectFirewallProfileprotocoloptions
Create ObjectFirewallProfileprotocoloptionsCifs Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new ObjectFirewallProfileprotocoloptionsCifs(name: string, args: ObjectFirewallProfileprotocoloptionsCifsArgs, opts?: CustomResourceOptions);
@overload
def ObjectFirewallProfileprotocoloptionsCifs(resource_name: str,
args: ObjectFirewallProfileprotocoloptionsCifsInitArgs,
opts: Optional[ResourceOptions] = None)
@overload
def ObjectFirewallProfileprotocoloptionsCifs(resource_name: str,
opts: Optional[ResourceOptions] = None,
profile_protocol_options: Optional[str] = None,
scopetype: Optional[str] = None,
uncompressed_oversize_limit: Optional[float] = None,
scan_bzip2: Optional[str] = None,
object_firewall_profileprotocoloptions_cifs_id: Optional[str] = None,
options: Optional[Sequence[str]] = None,
oversize_limit: Optional[float] = None,
ports: Optional[Sequence[float]] = None,
domain_controller: Optional[str] = None,
file_filter: Optional[ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs] = None,
dynamic_sort_subtable: Optional[str] = None,
server_keytabs: Optional[Sequence[ObjectFirewallProfileprotocoloptionsCifsServerKeytabArgs]] = None,
server_credential_type: Optional[str] = None,
status: Optional[str] = None,
tcp_window_maximum: Optional[float] = None,
tcp_window_minimum: Optional[float] = None,
tcp_window_size: Optional[float] = None,
tcp_window_type: Optional[str] = None,
uncompressed_nest_limit: Optional[float] = None,
adom: Optional[str] = None)
func NewObjectFirewallProfileprotocoloptionsCifs(ctx *Context, name string, args ObjectFirewallProfileprotocoloptionsCifsArgs, opts ...ResourceOption) (*ObjectFirewallProfileprotocoloptionsCifs, error)
public ObjectFirewallProfileprotocoloptionsCifs(string name, ObjectFirewallProfileprotocoloptionsCifsArgs args, CustomResourceOptions? opts = null)
public ObjectFirewallProfileprotocoloptionsCifs(String name, ObjectFirewallProfileprotocoloptionsCifsArgs args)
public ObjectFirewallProfileprotocoloptionsCifs(String name, ObjectFirewallProfileprotocoloptionsCifsArgs args, CustomResourceOptions options)
type: fortimanager:ObjectFirewallProfileprotocoloptionsCifs
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args ObjectFirewallProfileprotocoloptionsCifsArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args ObjectFirewallProfileprotocoloptionsCifsInitArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args ObjectFirewallProfileprotocoloptionsCifsArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args ObjectFirewallProfileprotocoloptionsCifsArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args ObjectFirewallProfileprotocoloptionsCifsArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var objectFirewallProfileprotocoloptionsCifsResource = new Fortimanager.ObjectFirewallProfileprotocoloptionsCifs("objectFirewallProfileprotocoloptionsCifsResource", new()
{
ProfileProtocolOptions = "string",
Scopetype = "string",
UncompressedOversizeLimit = 0,
ScanBzip2 = "string",
ObjectFirewallProfileprotocoloptionsCifsId = "string",
Options = new[]
{
"string",
},
OversizeLimit = 0,
Ports = new[]
{
0,
},
DomainController = "string",
FileFilter = new Fortimanager.Inputs.ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs
{
Entries = new[]
{
new Fortimanager.Inputs.ObjectFirewallProfileprotocoloptionsCifsFileFilterEntryArgs
{
Action = "string",
Comment = "string",
Direction = "string",
FileTypes = new[]
{
"string",
},
Filter = "string",
Protocols = new[]
{
"string",
},
},
},
Log = "string",
Status = "string",
},
DynamicSortSubtable = "string",
ServerKeytabs = new[]
{
new Fortimanager.Inputs.ObjectFirewallProfileprotocoloptionsCifsServerKeytabArgs
{
Keytab = "string",
Passwords = new[]
{
"string",
},
Principal = "string",
},
},
ServerCredentialType = "string",
Status = "string",
TcpWindowMaximum = 0,
TcpWindowMinimum = 0,
TcpWindowSize = 0,
TcpWindowType = "string",
UncompressedNestLimit = 0,
Adom = "string",
});
example, err := fortimanager.NewObjectFirewallProfileprotocoloptionsCifs(ctx, "objectFirewallProfileprotocoloptionsCifsResource", &fortimanager.ObjectFirewallProfileprotocoloptionsCifsArgs{
ProfileProtocolOptions: pulumi.String("string"),
Scopetype: pulumi.String("string"),
UncompressedOversizeLimit: pulumi.Float64(0),
ScanBzip2: pulumi.String("string"),
ObjectFirewallProfileprotocoloptionsCifsId: pulumi.String("string"),
Options: pulumi.StringArray{
pulumi.String("string"),
},
OversizeLimit: pulumi.Float64(0),
Ports: pulumi.Float64Array{
pulumi.Float64(0),
},
DomainController: pulumi.String("string"),
FileFilter: &.ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs{
Entries: .ObjectFirewallProfileprotocoloptionsCifsFileFilterEntryArray{
&.ObjectFirewallProfileprotocoloptionsCifsFileFilterEntryArgs{
Action: pulumi.String("string"),
Comment: pulumi.String("string"),
Direction: pulumi.String("string"),
FileTypes: pulumi.StringArray{
pulumi.String("string"),
},
Filter: pulumi.String("string"),
Protocols: pulumi.StringArray{
pulumi.String("string"),
},
},
},
Log: pulumi.String("string"),
Status: pulumi.String("string"),
},
DynamicSortSubtable: pulumi.String("string"),
ServerKeytabs: .ObjectFirewallProfileprotocoloptionsCifsServerKeytabTypeArray{
&.ObjectFirewallProfileprotocoloptionsCifsServerKeytabTypeArgs{
Keytab: pulumi.String("string"),
Passwords: pulumi.StringArray{
pulumi.String("string"),
},
Principal: pulumi.String("string"),
},
},
ServerCredentialType: pulumi.String("string"),
Status: pulumi.String("string"),
TcpWindowMaximum: pulumi.Float64(0),
TcpWindowMinimum: pulumi.Float64(0),
TcpWindowSize: pulumi.Float64(0),
TcpWindowType: pulumi.String("string"),
UncompressedNestLimit: pulumi.Float64(0),
Adom: pulumi.String("string"),
})
var objectFirewallProfileprotocoloptionsCifsResource = new ObjectFirewallProfileprotocoloptionsCifs("objectFirewallProfileprotocoloptionsCifsResource", ObjectFirewallProfileprotocoloptionsCifsArgs.builder()
.profileProtocolOptions("string")
.scopetype("string")
.uncompressedOversizeLimit(0)
.scanBzip2("string")
.objectFirewallProfileprotocoloptionsCifsId("string")
.options("string")
.oversizeLimit(0)
.ports(0)
.domainController("string")
.fileFilter(ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs.builder()
.entries(ObjectFirewallProfileprotocoloptionsCifsFileFilterEntryArgs.builder()
.action("string")
.comment("string")
.direction("string")
.fileTypes("string")
.filter("string")
.protocols("string")
.build())
.log("string")
.status("string")
.build())
.dynamicSortSubtable("string")
.serverKeytabs(ObjectFirewallProfileprotocoloptionsCifsServerKeytabArgs.builder()
.keytab("string")
.passwords("string")
.principal("string")
.build())
.serverCredentialType("string")
.status("string")
.tcpWindowMaximum(0)
.tcpWindowMinimum(0)
.tcpWindowSize(0)
.tcpWindowType("string")
.uncompressedNestLimit(0)
.adom("string")
.build());
object_firewall_profileprotocoloptions_cifs_resource = fortimanager.ObjectFirewallProfileprotocoloptionsCifs("objectFirewallProfileprotocoloptionsCifsResource",
profile_protocol_options="string",
scopetype="string",
uncompressed_oversize_limit=0,
scan_bzip2="string",
object_firewall_profileprotocoloptions_cifs_id="string",
options=["string"],
oversize_limit=0,
ports=[0],
domain_controller="string",
file_filter={
"entries": [{
"action": "string",
"comment": "string",
"direction": "string",
"file_types": ["string"],
"filter": "string",
"protocols": ["string"],
}],
"log": "string",
"status": "string",
},
dynamic_sort_subtable="string",
server_keytabs=[{
"keytab": "string",
"passwords": ["string"],
"principal": "string",
}],
server_credential_type="string",
status="string",
tcp_window_maximum=0,
tcp_window_minimum=0,
tcp_window_size=0,
tcp_window_type="string",
uncompressed_nest_limit=0,
adom="string")
const objectFirewallProfileprotocoloptionsCifsResource = new fortimanager.ObjectFirewallProfileprotocoloptionsCifs("objectFirewallProfileprotocoloptionsCifsResource", {
profileProtocolOptions: "string",
scopetype: "string",
uncompressedOversizeLimit: 0,
scanBzip2: "string",
objectFirewallProfileprotocoloptionsCifsId: "string",
options: ["string"],
oversizeLimit: 0,
ports: [0],
domainController: "string",
fileFilter: {
entries: [{
action: "string",
comment: "string",
direction: "string",
fileTypes: ["string"],
filter: "string",
protocols: ["string"],
}],
log: "string",
status: "string",
},
dynamicSortSubtable: "string",
serverKeytabs: [{
keytab: "string",
passwords: ["string"],
principal: "string",
}],
serverCredentialType: "string",
status: "string",
tcpWindowMaximum: 0,
tcpWindowMinimum: 0,
tcpWindowSize: 0,
tcpWindowType: "string",
uncompressedNestLimit: 0,
adom: "string",
});
type: fortimanager:ObjectFirewallProfileprotocoloptionsCifs
properties:
adom: string
domainController: string
dynamicSortSubtable: string
fileFilter:
entries:
- action: string
comment: string
direction: string
fileTypes:
- string
filter: string
protocols:
- string
log: string
status: string
objectFirewallProfileprotocoloptionsCifsId: string
options:
- string
oversizeLimit: 0
ports:
- 0
profileProtocolOptions: string
scanBzip2: string
scopetype: string
serverCredentialType: string
serverKeytabs:
- keytab: string
passwords:
- string
principal: string
status: string
tcpWindowMaximum: 0
tcpWindowMinimum: 0
tcpWindowSize: 0
tcpWindowType: string
uncompressedNestLimit: 0
uncompressedOversizeLimit: 0
ObjectFirewallProfileprotocoloptionsCifs Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The ObjectFirewallProfileprotocoloptionsCifs resource accepts the following input properties:
- Profile
Protocol stringOptions - Profile Protocol Options.
- Adom string
- Adom. This value is valid only when the
scopetype
isadom
, otherwise the value of adom in the provider will be inherited. - Domain
Controller string - Domain for which to decrypt CIFS traffic.
- Dynamic
Sort stringSubtable - true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
- File
Filter ObjectFirewall Profileprotocoloptions Cifs File Filter - File-Filter. The structure of
file_filter
block is documented below. - Object
Firewall stringProfileprotocoloptions Cifs Id - an identifier for the resource.
- Options List<string>
- One or more options that can be applied to the session. Valid values:
oversize
. - Oversize
Limit double - Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
- Ports List<double>
- Ports to scan for content (1 - 65535, default = 445).
- Scan
Bzip2 string - Enable/disable scanning of BZip2 compressed files. Valid values:
disable
,enable
. - Scopetype string
- The scope of application of the resource. Valid values:
inherit
,adom
,global
. Theinherit
means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value isinherit
. - Server
Credential stringType - CIFS server credential type. Valid values:
none
,credential-replication
,credential-keytab
. - Server
Keytabs List<ObjectFirewall Profileprotocoloptions Cifs Server Keytab> - Server-Keytab. The structure of
server_keytab
block is documented below. - Status string
- Enable/disable the active status of scanning for this protocol. Valid values:
disable
,enable
. - Tcp
Window doubleMaximum - Maximum dynamic TCP window size (default = 8MB).
- Tcp
Window doubleMinimum - Minimum dynamic TCP window size (default = 128KB).
- Tcp
Window doubleSize - Set TCP static window size (default = 256KB).
- Tcp
Window stringType - Specify type of TCP window to use for this protocol. Valid values:
system
,static
,dynamic
. - Uncompressed
Nest doubleLimit - Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
- Uncompressed
Oversize doubleLimit - Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
- Profile
Protocol stringOptions - Profile Protocol Options.
- Adom string
- Adom. This value is valid only when the
scopetype
isadom
, otherwise the value of adom in the provider will be inherited. - Domain
Controller string - Domain for which to decrypt CIFS traffic.
- Dynamic
Sort stringSubtable - true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
- File
Filter ObjectFirewall Profileprotocoloptions Cifs File Filter Args - File-Filter. The structure of
file_filter
block is documented below. - Object
Firewall stringProfileprotocoloptions Cifs Id - an identifier for the resource.
- Options []string
- One or more options that can be applied to the session. Valid values:
oversize
. - Oversize
Limit float64 - Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
- Ports []float64
- Ports to scan for content (1 - 65535, default = 445).
- Scan
Bzip2 string - Enable/disable scanning of BZip2 compressed files. Valid values:
disable
,enable
. - Scopetype string
- The scope of application of the resource. Valid values:
inherit
,adom
,global
. Theinherit
means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value isinherit
. - Server
Credential stringType - CIFS server credential type. Valid values:
none
,credential-replication
,credential-keytab
. - Server
Keytabs []ObjectFirewall Profileprotocoloptions Cifs Server Keytab Type Args - Server-Keytab. The structure of
server_keytab
block is documented below. - Status string
- Enable/disable the active status of scanning for this protocol. Valid values:
disable
,enable
. - Tcp
Window float64Maximum - Maximum dynamic TCP window size (default = 8MB).
- Tcp
Window float64Minimum - Minimum dynamic TCP window size (default = 128KB).
- Tcp
Window float64Size - Set TCP static window size (default = 256KB).
- Tcp
Window stringType - Specify type of TCP window to use for this protocol. Valid values:
system
,static
,dynamic
. - Uncompressed
Nest float64Limit - Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
- Uncompressed
Oversize float64Limit - Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
- profile
Protocol StringOptions - Profile Protocol Options.
- adom String
- Adom. This value is valid only when the
scopetype
isadom
, otherwise the value of adom in the provider will be inherited. - domain
Controller String - Domain for which to decrypt CIFS traffic.
- dynamic
Sort StringSubtable - true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
- file
Filter ObjectFirewall Profileprotocoloptions Cifs File Filter - File-Filter. The structure of
file_filter
block is documented below. - object
Firewall StringProfileprotocoloptions Cifs Id - an identifier for the resource.
- options List<String>
- One or more options that can be applied to the session. Valid values:
oversize
. - oversize
Limit Double - Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
- ports List<Double>
- Ports to scan for content (1 - 65535, default = 445).
- scan
Bzip2 String - Enable/disable scanning of BZip2 compressed files. Valid values:
disable
,enable
. - scopetype String
- The scope of application of the resource. Valid values:
inherit
,adom
,global
. Theinherit
means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value isinherit
. - server
Credential StringType - CIFS server credential type. Valid values:
none
,credential-replication
,credential-keytab
. - server
Keytabs List<ObjectFirewall Profileprotocoloptions Cifs Server Keytab> - Server-Keytab. The structure of
server_keytab
block is documented below. - status String
- Enable/disable the active status of scanning for this protocol. Valid values:
disable
,enable
. - tcp
Window DoubleMaximum - Maximum dynamic TCP window size (default = 8MB).
- tcp
Window DoubleMinimum - Minimum dynamic TCP window size (default = 128KB).
- tcp
Window DoubleSize - Set TCP static window size (default = 256KB).
- tcp
Window StringType - Specify type of TCP window to use for this protocol. Valid values:
system
,static
,dynamic
. - uncompressed
Nest DoubleLimit - Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
- uncompressed
Oversize DoubleLimit - Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
- profile
Protocol stringOptions - Profile Protocol Options.
- adom string
- Adom. This value is valid only when the
scopetype
isadom
, otherwise the value of adom in the provider will be inherited. - domain
Controller string - Domain for which to decrypt CIFS traffic.
- dynamic
Sort stringSubtable - true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
- file
Filter ObjectFirewall Profileprotocoloptions Cifs File Filter - File-Filter. The structure of
file_filter
block is documented below. - object
Firewall stringProfileprotocoloptions Cifs Id - an identifier for the resource.
- options string[]
- One or more options that can be applied to the session. Valid values:
oversize
. - oversize
Limit number - Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
- ports number[]
- Ports to scan for content (1 - 65535, default = 445).
- scan
Bzip2 string - Enable/disable scanning of BZip2 compressed files. Valid values:
disable
,enable
. - scopetype string
- The scope of application of the resource. Valid values:
inherit
,adom
,global
. Theinherit
means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value isinherit
. - server
Credential stringType - CIFS server credential type. Valid values:
none
,credential-replication
,credential-keytab
. - server
Keytabs ObjectFirewall Profileprotocoloptions Cifs Server Keytab[] - Server-Keytab. The structure of
server_keytab
block is documented below. - status string
- Enable/disable the active status of scanning for this protocol. Valid values:
disable
,enable
. - tcp
Window numberMaximum - Maximum dynamic TCP window size (default = 8MB).
- tcp
Window numberMinimum - Minimum dynamic TCP window size (default = 128KB).
- tcp
Window numberSize - Set TCP static window size (default = 256KB).
- tcp
Window stringType - Specify type of TCP window to use for this protocol. Valid values:
system
,static
,dynamic
. - uncompressed
Nest numberLimit - Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
- uncompressed
Oversize numberLimit - Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
- profile_
protocol_ stroptions - Profile Protocol Options.
- adom str
- Adom. This value is valid only when the
scopetype
isadom
, otherwise the value of adom in the provider will be inherited. - domain_
controller str - Domain for which to decrypt CIFS traffic.
- dynamic_
sort_ strsubtable - true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
- file_
filter ObjectFirewall Profileprotocoloptions Cifs File Filter Args - File-Filter. The structure of
file_filter
block is documented below. - object_
firewall_ strprofileprotocoloptions_ cifs_ id - an identifier for the resource.
- options Sequence[str]
- One or more options that can be applied to the session. Valid values:
oversize
. - oversize_
limit float - Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
- ports Sequence[float]
- Ports to scan for content (1 - 65535, default = 445).
- scan_
bzip2 str - Enable/disable scanning of BZip2 compressed files. Valid values:
disable
,enable
. - scopetype str
- The scope of application of the resource. Valid values:
inherit
,adom
,global
. Theinherit
means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value isinherit
. - server_
credential_ strtype - CIFS server credential type. Valid values:
none
,credential-replication
,credential-keytab
. - server_
keytabs Sequence[ObjectFirewall Profileprotocoloptions Cifs Server Keytab Args] - Server-Keytab. The structure of
server_keytab
block is documented below. - status str
- Enable/disable the active status of scanning for this protocol. Valid values:
disable
,enable
. - tcp_
window_ floatmaximum - Maximum dynamic TCP window size (default = 8MB).
- tcp_
window_ floatminimum - Minimum dynamic TCP window size (default = 128KB).
- tcp_
window_ floatsize - Set TCP static window size (default = 256KB).
- tcp_
window_ strtype - Specify type of TCP window to use for this protocol. Valid values:
system
,static
,dynamic
. - uncompressed_
nest_ floatlimit - Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
- uncompressed_
oversize_ floatlimit - Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
- profile
Protocol StringOptions - Profile Protocol Options.
- adom String
- Adom. This value is valid only when the
scopetype
isadom
, otherwise the value of adom in the provider will be inherited. - domain
Controller String - Domain for which to decrypt CIFS traffic.
- dynamic
Sort StringSubtable - true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
- file
Filter Property Map - File-Filter. The structure of
file_filter
block is documented below. - object
Firewall StringProfileprotocoloptions Cifs Id - an identifier for the resource.
- options List<String>
- One or more options that can be applied to the session. Valid values:
oversize
. - oversize
Limit Number - Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
- ports List<Number>
- Ports to scan for content (1 - 65535, default = 445).
- scan
Bzip2 String - Enable/disable scanning of BZip2 compressed files. Valid values:
disable
,enable
. - scopetype String
- The scope of application of the resource. Valid values:
inherit
,adom
,global
. Theinherit
means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value isinherit
. - server
Credential StringType - CIFS server credential type. Valid values:
none
,credential-replication
,credential-keytab
. - server
Keytabs List<Property Map> - Server-Keytab. The structure of
server_keytab
block is documented below. - status String
- Enable/disable the active status of scanning for this protocol. Valid values:
disable
,enable
. - tcp
Window NumberMaximum - Maximum dynamic TCP window size (default = 8MB).
- tcp
Window NumberMinimum - Minimum dynamic TCP window size (default = 128KB).
- tcp
Window NumberSize - Set TCP static window size (default = 256KB).
- tcp
Window StringType - Specify type of TCP window to use for this protocol. Valid values:
system
,static
,dynamic
. - uncompressed
Nest NumberLimit - Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
- uncompressed
Oversize NumberLimit - Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
Outputs
All input properties are implicitly available as output properties. Additionally, the ObjectFirewallProfileprotocoloptionsCifs resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing ObjectFirewallProfileprotocoloptionsCifs Resource
Get an existing ObjectFirewallProfileprotocoloptionsCifs resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: ObjectFirewallProfileprotocoloptionsCifsState, opts?: CustomResourceOptions): ObjectFirewallProfileprotocoloptionsCifs
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
adom: Optional[str] = None,
domain_controller: Optional[str] = None,
dynamic_sort_subtable: Optional[str] = None,
file_filter: Optional[ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs] = None,
object_firewall_profileprotocoloptions_cifs_id: Optional[str] = None,
options: Optional[Sequence[str]] = None,
oversize_limit: Optional[float] = None,
ports: Optional[Sequence[float]] = None,
profile_protocol_options: Optional[str] = None,
scan_bzip2: Optional[str] = None,
scopetype: Optional[str] = None,
server_credential_type: Optional[str] = None,
server_keytabs: Optional[Sequence[ObjectFirewallProfileprotocoloptionsCifsServerKeytabArgs]] = None,
status: Optional[str] = None,
tcp_window_maximum: Optional[float] = None,
tcp_window_minimum: Optional[float] = None,
tcp_window_size: Optional[float] = None,
tcp_window_type: Optional[str] = None,
uncompressed_nest_limit: Optional[float] = None,
uncompressed_oversize_limit: Optional[float] = None) -> ObjectFirewallProfileprotocoloptionsCifs
func GetObjectFirewallProfileprotocoloptionsCifs(ctx *Context, name string, id IDInput, state *ObjectFirewallProfileprotocoloptionsCifsState, opts ...ResourceOption) (*ObjectFirewallProfileprotocoloptionsCifs, error)
public static ObjectFirewallProfileprotocoloptionsCifs Get(string name, Input<string> id, ObjectFirewallProfileprotocoloptionsCifsState? state, CustomResourceOptions? opts = null)
public static ObjectFirewallProfileprotocoloptionsCifs get(String name, Output<String> id, ObjectFirewallProfileprotocoloptionsCifsState state, CustomResourceOptions options)
resources: _: type: fortimanager:ObjectFirewallProfileprotocoloptionsCifs get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Adom string
- Adom. This value is valid only when the
scopetype
isadom
, otherwise the value of adom in the provider will be inherited. - Domain
Controller string - Domain for which to decrypt CIFS traffic.
- Dynamic
Sort stringSubtable - true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
- File
Filter ObjectFirewall Profileprotocoloptions Cifs File Filter - File-Filter. The structure of
file_filter
block is documented below. - Object
Firewall stringProfileprotocoloptions Cifs Id - an identifier for the resource.
- Options List<string>
- One or more options that can be applied to the session. Valid values:
oversize
. - Oversize
Limit double - Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
- Ports List<double>
- Ports to scan for content (1 - 65535, default = 445).
- Profile
Protocol stringOptions - Profile Protocol Options.
- Scan
Bzip2 string - Enable/disable scanning of BZip2 compressed files. Valid values:
disable
,enable
. - Scopetype string
- The scope of application of the resource. Valid values:
inherit
,adom
,global
. Theinherit
means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value isinherit
. - Server
Credential stringType - CIFS server credential type. Valid values:
none
,credential-replication
,credential-keytab
. - Server
Keytabs List<ObjectFirewall Profileprotocoloptions Cifs Server Keytab> - Server-Keytab. The structure of
server_keytab
block is documented below. - Status string
- Enable/disable the active status of scanning for this protocol. Valid values:
disable
,enable
. - Tcp
Window doubleMaximum - Maximum dynamic TCP window size (default = 8MB).
- Tcp
Window doubleMinimum - Minimum dynamic TCP window size (default = 128KB).
- Tcp
Window doubleSize - Set TCP static window size (default = 256KB).
- Tcp
Window stringType - Specify type of TCP window to use for this protocol. Valid values:
system
,static
,dynamic
. - Uncompressed
Nest doubleLimit - Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
- Uncompressed
Oversize doubleLimit - Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
- Adom string
- Adom. This value is valid only when the
scopetype
isadom
, otherwise the value of adom in the provider will be inherited. - Domain
Controller string - Domain for which to decrypt CIFS traffic.
- Dynamic
Sort stringSubtable - true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
- File
Filter ObjectFirewall Profileprotocoloptions Cifs File Filter Args - File-Filter. The structure of
file_filter
block is documented below. - Object
Firewall stringProfileprotocoloptions Cifs Id - an identifier for the resource.
- Options []string
- One or more options that can be applied to the session. Valid values:
oversize
. - Oversize
Limit float64 - Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
- Ports []float64
- Ports to scan for content (1 - 65535, default = 445).
- Profile
Protocol stringOptions - Profile Protocol Options.
- Scan
Bzip2 string - Enable/disable scanning of BZip2 compressed files. Valid values:
disable
,enable
. - Scopetype string
- The scope of application of the resource. Valid values:
inherit
,adom
,global
. Theinherit
means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value isinherit
. - Server
Credential stringType - CIFS server credential type. Valid values:
none
,credential-replication
,credential-keytab
. - Server
Keytabs []ObjectFirewall Profileprotocoloptions Cifs Server Keytab Type Args - Server-Keytab. The structure of
server_keytab
block is documented below. - Status string
- Enable/disable the active status of scanning for this protocol. Valid values:
disable
,enable
. - Tcp
Window float64Maximum - Maximum dynamic TCP window size (default = 8MB).
- Tcp
Window float64Minimum - Minimum dynamic TCP window size (default = 128KB).
- Tcp
Window float64Size - Set TCP static window size (default = 256KB).
- Tcp
Window stringType - Specify type of TCP window to use for this protocol. Valid values:
system
,static
,dynamic
. - Uncompressed
Nest float64Limit - Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
- Uncompressed
Oversize float64Limit - Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
- adom String
- Adom. This value is valid only when the
scopetype
isadom
, otherwise the value of adom in the provider will be inherited. - domain
Controller String - Domain for which to decrypt CIFS traffic.
- dynamic
Sort StringSubtable - true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
- file
Filter ObjectFirewall Profileprotocoloptions Cifs File Filter - File-Filter. The structure of
file_filter
block is documented below. - object
Firewall StringProfileprotocoloptions Cifs Id - an identifier for the resource.
- options List<String>
- One or more options that can be applied to the session. Valid values:
oversize
. - oversize
Limit Double - Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
- ports List<Double>
- Ports to scan for content (1 - 65535, default = 445).
- profile
Protocol StringOptions - Profile Protocol Options.
- scan
Bzip2 String - Enable/disable scanning of BZip2 compressed files. Valid values:
disable
,enable
. - scopetype String
- The scope of application of the resource. Valid values:
inherit
,adom
,global
. Theinherit
means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value isinherit
. - server
Credential StringType - CIFS server credential type. Valid values:
none
,credential-replication
,credential-keytab
. - server
Keytabs List<ObjectFirewall Profileprotocoloptions Cifs Server Keytab> - Server-Keytab. The structure of
server_keytab
block is documented below. - status String
- Enable/disable the active status of scanning for this protocol. Valid values:
disable
,enable
. - tcp
Window DoubleMaximum - Maximum dynamic TCP window size (default = 8MB).
- tcp
Window DoubleMinimum - Minimum dynamic TCP window size (default = 128KB).
- tcp
Window DoubleSize - Set TCP static window size (default = 256KB).
- tcp
Window StringType - Specify type of TCP window to use for this protocol. Valid values:
system
,static
,dynamic
. - uncompressed
Nest DoubleLimit - Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
- uncompressed
Oversize DoubleLimit - Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
- adom string
- Adom. This value is valid only when the
scopetype
isadom
, otherwise the value of adom in the provider will be inherited. - domain
Controller string - Domain for which to decrypt CIFS traffic.
- dynamic
Sort stringSubtable - true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
- file
Filter ObjectFirewall Profileprotocoloptions Cifs File Filter - File-Filter. The structure of
file_filter
block is documented below. - object
Firewall stringProfileprotocoloptions Cifs Id - an identifier for the resource.
- options string[]
- One or more options that can be applied to the session. Valid values:
oversize
. - oversize
Limit number - Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
- ports number[]
- Ports to scan for content (1 - 65535, default = 445).
- profile
Protocol stringOptions - Profile Protocol Options.
- scan
Bzip2 string - Enable/disable scanning of BZip2 compressed files. Valid values:
disable
,enable
. - scopetype string
- The scope of application of the resource. Valid values:
inherit
,adom
,global
. Theinherit
means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value isinherit
. - server
Credential stringType - CIFS server credential type. Valid values:
none
,credential-replication
,credential-keytab
. - server
Keytabs ObjectFirewall Profileprotocoloptions Cifs Server Keytab[] - Server-Keytab. The structure of
server_keytab
block is documented below. - status string
- Enable/disable the active status of scanning for this protocol. Valid values:
disable
,enable
. - tcp
Window numberMaximum - Maximum dynamic TCP window size (default = 8MB).
- tcp
Window numberMinimum - Minimum dynamic TCP window size (default = 128KB).
- tcp
Window numberSize - Set TCP static window size (default = 256KB).
- tcp
Window stringType - Specify type of TCP window to use for this protocol. Valid values:
system
,static
,dynamic
. - uncompressed
Nest numberLimit - Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
- uncompressed
Oversize numberLimit - Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
- adom str
- Adom. This value is valid only when the
scopetype
isadom
, otherwise the value of adom in the provider will be inherited. - domain_
controller str - Domain for which to decrypt CIFS traffic.
- dynamic_
sort_ strsubtable - true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
- file_
filter ObjectFirewall Profileprotocoloptions Cifs File Filter Args - File-Filter. The structure of
file_filter
block is documented below. - object_
firewall_ strprofileprotocoloptions_ cifs_ id - an identifier for the resource.
- options Sequence[str]
- One or more options that can be applied to the session. Valid values:
oversize
. - oversize_
limit float - Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
- ports Sequence[float]
- Ports to scan for content (1 - 65535, default = 445).
- profile_
protocol_ stroptions - Profile Protocol Options.
- scan_
bzip2 str - Enable/disable scanning of BZip2 compressed files. Valid values:
disable
,enable
. - scopetype str
- The scope of application of the resource. Valid values:
inherit
,adom
,global
. Theinherit
means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value isinherit
. - server_
credential_ strtype - CIFS server credential type. Valid values:
none
,credential-replication
,credential-keytab
. - server_
keytabs Sequence[ObjectFirewall Profileprotocoloptions Cifs Server Keytab Args] - Server-Keytab. The structure of
server_keytab
block is documented below. - status str
- Enable/disable the active status of scanning for this protocol. Valid values:
disable
,enable
. - tcp_
window_ floatmaximum - Maximum dynamic TCP window size (default = 8MB).
- tcp_
window_ floatminimum - Minimum dynamic TCP window size (default = 128KB).
- tcp_
window_ floatsize - Set TCP static window size (default = 256KB).
- tcp_
window_ strtype - Specify type of TCP window to use for this protocol. Valid values:
system
,static
,dynamic
. - uncompressed_
nest_ floatlimit - Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
- uncompressed_
oversize_ floatlimit - Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
- adom String
- Adom. This value is valid only when the
scopetype
isadom
, otherwise the value of adom in the provider will be inherited. - domain
Controller String - Domain for which to decrypt CIFS traffic.
- dynamic
Sort StringSubtable - true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
- file
Filter Property Map - File-Filter. The structure of
file_filter
block is documented below. - object
Firewall StringProfileprotocoloptions Cifs Id - an identifier for the resource.
- options List<String>
- One or more options that can be applied to the session. Valid values:
oversize
. - oversize
Limit Number - Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
- ports List<Number>
- Ports to scan for content (1 - 65535, default = 445).
- profile
Protocol StringOptions - Profile Protocol Options.
- scan
Bzip2 String - Enable/disable scanning of BZip2 compressed files. Valid values:
disable
,enable
. - scopetype String
- The scope of application of the resource. Valid values:
inherit
,adom
,global
. Theinherit
means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value isinherit
. - server
Credential StringType - CIFS server credential type. Valid values:
none
,credential-replication
,credential-keytab
. - server
Keytabs List<Property Map> - Server-Keytab. The structure of
server_keytab
block is documented below. - status String
- Enable/disable the active status of scanning for this protocol. Valid values:
disable
,enable
. - tcp
Window NumberMaximum - Maximum dynamic TCP window size (default = 8MB).
- tcp
Window NumberMinimum - Minimum dynamic TCP window size (default = 128KB).
- tcp
Window NumberSize - Set TCP static window size (default = 256KB).
- tcp
Window StringType - Specify type of TCP window to use for this protocol. Valid values:
system
,static
,dynamic
. - uncompressed
Nest NumberLimit - Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
- uncompressed
Oversize NumberLimit - Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
Supporting Types
ObjectFirewallProfileprotocoloptionsCifsFileFilter, ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs
- Entries
List<Object
Firewall Profileprotocoloptions Cifs File Filter Entry> - Entries. The structure of
entries
block is documented below. - Log string
- Enable/disable file filter logging. Valid values:
disable
,enable
. - Status string
- Enable/disable file filter. Valid values:
disable
,enable
.
- Entries
[]Object
Firewall Profileprotocoloptions Cifs File Filter Entry - Entries. The structure of
entries
block is documented below. - Log string
- Enable/disable file filter logging. Valid values:
disable
,enable
. - Status string
- Enable/disable file filter. Valid values:
disable
,enable
.
- entries
List<Object
Firewall Profileprotocoloptions Cifs File Filter Entry> - Entries. The structure of
entries
block is documented below. - log String
- Enable/disable file filter logging. Valid values:
disable
,enable
. - status String
- Enable/disable file filter. Valid values:
disable
,enable
.
- entries
Object
Firewall Profileprotocoloptions Cifs File Filter Entry[] - Entries. The structure of
entries
block is documented below. - log string
- Enable/disable file filter logging. Valid values:
disable
,enable
. - status string
- Enable/disable file filter. Valid values:
disable
,enable
.
- entries
Sequence[Object
Firewall Profileprotocoloptions Cifs File Filter Entry] - Entries. The structure of
entries
block is documented below. - log str
- Enable/disable file filter logging. Valid values:
disable
,enable
. - status str
- Enable/disable file filter. Valid values:
disable
,enable
.
- entries List<Property Map>
- Entries. The structure of
entries
block is documented below. - log String
- Enable/disable file filter logging. Valid values:
disable
,enable
. - status String
- Enable/disable file filter. Valid values:
disable
,enable
.
ObjectFirewallProfileprotocoloptionsCifsFileFilterEntry, ObjectFirewallProfileprotocoloptionsCifsFileFilterEntryArgs
- Action string
- Action taken for matched file. Valid values:
log
,block
. - Comment string
- Comment.
- Direction string
- Match files transmitted in the session's originating or reply direction. Valid values:
any
,incoming
,outgoing
. - File
Types List<string> - Select file type.
- Filter string
- Add a file filter.
- Protocols List<string>
- Protocols to apply with. Valid values:
cifs
.
- Action string
- Action taken for matched file. Valid values:
log
,block
. - Comment string
- Comment.
- Direction string
- Match files transmitted in the session's originating or reply direction. Valid values:
any
,incoming
,outgoing
. - File
Types []string - Select file type.
- Filter string
- Add a file filter.
- Protocols []string
- Protocols to apply with. Valid values:
cifs
.
- action String
- Action taken for matched file. Valid values:
log
,block
. - comment String
- Comment.
- direction String
- Match files transmitted in the session's originating or reply direction. Valid values:
any
,incoming
,outgoing
. - file
Types List<String> - Select file type.
- filter String
- Add a file filter.
- protocols List<String>
- Protocols to apply with. Valid values:
cifs
.
- action string
- Action taken for matched file. Valid values:
log
,block
. - comment string
- Comment.
- direction string
- Match files transmitted in the session's originating or reply direction. Valid values:
any
,incoming
,outgoing
. - file
Types string[] - Select file type.
- filter string
- Add a file filter.
- protocols string[]
- Protocols to apply with. Valid values:
cifs
.
- action str
- Action taken for matched file. Valid values:
log
,block
. - comment str
- Comment.
- direction str
- Match files transmitted in the session's originating or reply direction. Valid values:
any
,incoming
,outgoing
. - file_
types Sequence[str] - Select file type.
- filter str
- Add a file filter.
- protocols Sequence[str]
- Protocols to apply with. Valid values:
cifs
.
- action String
- Action taken for matched file. Valid values:
log
,block
. - comment String
- Comment.
- direction String
- Match files transmitted in the session's originating or reply direction. Valid values:
any
,incoming
,outgoing
. - file
Types List<String> - Select file type.
- filter String
- Add a file filter.
- protocols List<String>
- Protocols to apply with. Valid values:
cifs
.
ObjectFirewallProfileprotocoloptionsCifsServerKeytab, ObjectFirewallProfileprotocoloptionsCifsServerKeytabArgs
Import
ObjectFirewall ProfileProtocolOptionsCifs can be imported using any of these accepted formats:
Set import_options = [“profile_protocol_options=YOUR_VALUE”] in the provider section.
$ export “FORTIMANAGER_IMPORT_TABLE”=“true”
$ pulumi import fortimanager:index/objectFirewallProfileprotocoloptionsCifs:ObjectFirewallProfileprotocoloptionsCifs labelname ObjectFirewallProfileProtocolOptionsCifs
$ unset “FORTIMANAGER_IMPORT_TABLE”
-> Hint: The scopetype and adom for import will directly inherit the scopetype and adom configuration of the provider.
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- fortimanager fortinetdev/terraform-provider-fortimanager
- License
- Notes
- This Pulumi package is based on the
fortimanager
Terraform Provider.