fortimanager.ObjectFirewallProfileprotocoloptionsCifs
Explore with Pulumi AI
Configure CIFS protocol options.
This resource is a sub resource for variable
cifsof resourcefortimanager.ObjectFirewallProfileprotocoloptions. Conflict and overwrite may occur if use both of them. The following variables have sub resource. Avoid using them together, otherwise conflicts and overwrites may occur.
file_filter:fortimanager_object_firewall_profileprotocoloptions_cifs_filefilter
server_keytab:fortimanager.ObjectFirewallProfileprotocoloptionsCifsServerkeytab
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as fortimanager from "@pulumi/fortimanager";
const trnameObjectFirewallProfileprotocoloptions = new fortimanager.ObjectFirewallProfileprotocoloptions("trnameObjectFirewallProfileprotocoloptions", {});
const trnameObjectFirewallProfileprotocoloptionsCifs = new fortimanager.ObjectFirewallProfileprotocoloptionsCifs("trnameObjectFirewallProfileprotocoloptionsCifs", {
    profileProtocolOptions: trnameObjectFirewallProfileprotocoloptions.name,
    options: ["oversize"],
    oversizeLimit: 200,
    ports: [445],
}, {
    dependsOn: [trnameObjectFirewallProfileprotocoloptions],
});
import pulumi
import pulumi_fortimanager as fortimanager
trname_object_firewall_profileprotocoloptions = fortimanager.ObjectFirewallProfileprotocoloptions("trnameObjectFirewallProfileprotocoloptions")
trname_object_firewall_profileprotocoloptions_cifs = fortimanager.ObjectFirewallProfileprotocoloptionsCifs("trnameObjectFirewallProfileprotocoloptionsCifs",
    profile_protocol_options=trname_object_firewall_profileprotocoloptions.name,
    options=["oversize"],
    oversize_limit=200,
    ports=[445],
    opts = pulumi.ResourceOptions(depends_on=[trname_object_firewall_profileprotocoloptions]))
package main
import (
	"github.com/pulumi/pulumi-terraform-provider/sdks/go/fortimanager/fortimanager"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		trnameObjectFirewallProfileprotocoloptions, err := fortimanager.NewObjectFirewallProfileprotocoloptions(ctx, "trnameObjectFirewallProfileprotocoloptions", nil)
		if err != nil {
			return err
		}
		_, err = fortimanager.NewObjectFirewallProfileprotocoloptionsCifs(ctx, "trnameObjectFirewallProfileprotocoloptionsCifs", &fortimanager.ObjectFirewallProfileprotocoloptionsCifsArgs{
			ProfileProtocolOptions: trnameObjectFirewallProfileprotocoloptions.Name,
			Options: pulumi.StringArray{
				pulumi.String("oversize"),
			},
			OversizeLimit: pulumi.Float64(200),
			Ports: pulumi.Float64Array{
				pulumi.Float64(445),
			},
		}, pulumi.DependsOn([]pulumi.Resource{
			trnameObjectFirewallProfileprotocoloptions,
		}))
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Fortimanager = Pulumi.Fortimanager;
return await Deployment.RunAsync(() => 
{
    var trnameObjectFirewallProfileprotocoloptions = new Fortimanager.ObjectFirewallProfileprotocoloptions("trnameObjectFirewallProfileprotocoloptions");
    var trnameObjectFirewallProfileprotocoloptionsCifs = new Fortimanager.ObjectFirewallProfileprotocoloptionsCifs("trnameObjectFirewallProfileprotocoloptionsCifs", new()
    {
        ProfileProtocolOptions = trnameObjectFirewallProfileprotocoloptions.Name,
        Options = new[]
        {
            "oversize",
        },
        OversizeLimit = 200,
        Ports = new[]
        {
            445,
        },
    }, new CustomResourceOptions
    {
        DependsOn =
        {
            trnameObjectFirewallProfileprotocoloptions,
        },
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.fortimanager.ObjectFirewallProfileprotocoloptions;
import com.pulumi.fortimanager.ObjectFirewallProfileprotocoloptionsCifs;
import com.pulumi.fortimanager.ObjectFirewallProfileprotocoloptionsCifsArgs;
import com.pulumi.resources.CustomResourceOptions;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        var trnameObjectFirewallProfileprotocoloptions = new ObjectFirewallProfileprotocoloptions("trnameObjectFirewallProfileprotocoloptions");
        var trnameObjectFirewallProfileprotocoloptionsCifs = new ObjectFirewallProfileprotocoloptionsCifs("trnameObjectFirewallProfileprotocoloptionsCifs", ObjectFirewallProfileprotocoloptionsCifsArgs.builder()
            .profileProtocolOptions(trnameObjectFirewallProfileprotocoloptions.name())
            .options("oversize")
            .oversizeLimit(200)
            .ports(445)
            .build(), CustomResourceOptions.builder()
                .dependsOn(trnameObjectFirewallProfileprotocoloptions)
                .build());
    }
}
resources:
  trnameObjectFirewallProfileprotocoloptionsCifs:
    type: fortimanager:ObjectFirewallProfileprotocoloptionsCifs
    properties:
      profileProtocolOptions: ${trnameObjectFirewallProfileprotocoloptions.name}
      options:
        - oversize
      oversizeLimit: 200
      ports:
        - 445
    options:
      dependsOn:
        - ${trnameObjectFirewallProfileprotocoloptions}
  trnameObjectFirewallProfileprotocoloptions:
    type: fortimanager:ObjectFirewallProfileprotocoloptions
Create ObjectFirewallProfileprotocoloptionsCifs Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new ObjectFirewallProfileprotocoloptionsCifs(name: string, args: ObjectFirewallProfileprotocoloptionsCifsArgs, opts?: CustomResourceOptions);@overload
def ObjectFirewallProfileprotocoloptionsCifs(resource_name: str,
                                             args: ObjectFirewallProfileprotocoloptionsCifsInitArgs,
                                             opts: Optional[ResourceOptions] = None)
@overload
def ObjectFirewallProfileprotocoloptionsCifs(resource_name: str,
                                             opts: Optional[ResourceOptions] = None,
                                             profile_protocol_options: Optional[str] = None,
                                             scopetype: Optional[str] = None,
                                             uncompressed_oversize_limit: Optional[float] = None,
                                             scan_bzip2: Optional[str] = None,
                                             object_firewall_profileprotocoloptions_cifs_id: Optional[str] = None,
                                             options: Optional[Sequence[str]] = None,
                                             oversize_limit: Optional[float] = None,
                                             ports: Optional[Sequence[float]] = None,
                                             domain_controller: Optional[str] = None,
                                             file_filter: Optional[ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs] = None,
                                             dynamic_sort_subtable: Optional[str] = None,
                                             server_keytabs: Optional[Sequence[ObjectFirewallProfileprotocoloptionsCifsServerKeytabArgs]] = None,
                                             server_credential_type: Optional[str] = None,
                                             status: Optional[str] = None,
                                             tcp_window_maximum: Optional[float] = None,
                                             tcp_window_minimum: Optional[float] = None,
                                             tcp_window_size: Optional[float] = None,
                                             tcp_window_type: Optional[str] = None,
                                             uncompressed_nest_limit: Optional[float] = None,
                                             adom: Optional[str] = None)func NewObjectFirewallProfileprotocoloptionsCifs(ctx *Context, name string, args ObjectFirewallProfileprotocoloptionsCifsArgs, opts ...ResourceOption) (*ObjectFirewallProfileprotocoloptionsCifs, error)public ObjectFirewallProfileprotocoloptionsCifs(string name, ObjectFirewallProfileprotocoloptionsCifsArgs args, CustomResourceOptions? opts = null)
public ObjectFirewallProfileprotocoloptionsCifs(String name, ObjectFirewallProfileprotocoloptionsCifsArgs args)
public ObjectFirewallProfileprotocoloptionsCifs(String name, ObjectFirewallProfileprotocoloptionsCifsArgs args, CustomResourceOptions options)
type: fortimanager:ObjectFirewallProfileprotocoloptionsCifs
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args ObjectFirewallProfileprotocoloptionsCifsArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args ObjectFirewallProfileprotocoloptionsCifsInitArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args ObjectFirewallProfileprotocoloptionsCifsArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args ObjectFirewallProfileprotocoloptionsCifsArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args ObjectFirewallProfileprotocoloptionsCifsArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var objectFirewallProfileprotocoloptionsCifsResource = new Fortimanager.ObjectFirewallProfileprotocoloptionsCifs("objectFirewallProfileprotocoloptionsCifsResource", new()
{
    ProfileProtocolOptions = "string",
    Scopetype = "string",
    UncompressedOversizeLimit = 0,
    ScanBzip2 = "string",
    ObjectFirewallProfileprotocoloptionsCifsId = "string",
    Options = new[]
    {
        "string",
    },
    OversizeLimit = 0,
    Ports = new[]
    {
        0,
    },
    DomainController = "string",
    FileFilter = new Fortimanager.Inputs.ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs
    {
        Entries = new[]
        {
            new Fortimanager.Inputs.ObjectFirewallProfileprotocoloptionsCifsFileFilterEntryArgs
            {
                Action = "string",
                Comment = "string",
                Direction = "string",
                FileTypes = new[]
                {
                    "string",
                },
                Filter = "string",
                Protocols = new[]
                {
                    "string",
                },
            },
        },
        Log = "string",
        Status = "string",
    },
    DynamicSortSubtable = "string",
    ServerKeytabs = new[]
    {
        new Fortimanager.Inputs.ObjectFirewallProfileprotocoloptionsCifsServerKeytabArgs
        {
            Keytab = "string",
            Passwords = new[]
            {
                "string",
            },
            Principal = "string",
        },
    },
    ServerCredentialType = "string",
    Status = "string",
    TcpWindowMaximum = 0,
    TcpWindowMinimum = 0,
    TcpWindowSize = 0,
    TcpWindowType = "string",
    UncompressedNestLimit = 0,
    Adom = "string",
});
example, err := fortimanager.NewObjectFirewallProfileprotocoloptionsCifs(ctx, "objectFirewallProfileprotocoloptionsCifsResource", &fortimanager.ObjectFirewallProfileprotocoloptionsCifsArgs{
ProfileProtocolOptions: pulumi.String("string"),
Scopetype: pulumi.String("string"),
UncompressedOversizeLimit: pulumi.Float64(0),
ScanBzip2: pulumi.String("string"),
ObjectFirewallProfileprotocoloptionsCifsId: pulumi.String("string"),
Options: pulumi.StringArray{
pulumi.String("string"),
},
OversizeLimit: pulumi.Float64(0),
Ports: pulumi.Float64Array{
pulumi.Float64(0),
},
DomainController: pulumi.String("string"),
FileFilter: &.ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs{
Entries: .ObjectFirewallProfileprotocoloptionsCifsFileFilterEntryArray{
&.ObjectFirewallProfileprotocoloptionsCifsFileFilterEntryArgs{
Action: pulumi.String("string"),
Comment: pulumi.String("string"),
Direction: pulumi.String("string"),
FileTypes: pulumi.StringArray{
pulumi.String("string"),
},
Filter: pulumi.String("string"),
Protocols: pulumi.StringArray{
pulumi.String("string"),
},
},
},
Log: pulumi.String("string"),
Status: pulumi.String("string"),
},
DynamicSortSubtable: pulumi.String("string"),
ServerKeytabs: .ObjectFirewallProfileprotocoloptionsCifsServerKeytabTypeArray{
&.ObjectFirewallProfileprotocoloptionsCifsServerKeytabTypeArgs{
Keytab: pulumi.String("string"),
Passwords: pulumi.StringArray{
pulumi.String("string"),
},
Principal: pulumi.String("string"),
},
},
ServerCredentialType: pulumi.String("string"),
Status: pulumi.String("string"),
TcpWindowMaximum: pulumi.Float64(0),
TcpWindowMinimum: pulumi.Float64(0),
TcpWindowSize: pulumi.Float64(0),
TcpWindowType: pulumi.String("string"),
UncompressedNestLimit: pulumi.Float64(0),
Adom: pulumi.String("string"),
})
var objectFirewallProfileprotocoloptionsCifsResource = new ObjectFirewallProfileprotocoloptionsCifs("objectFirewallProfileprotocoloptionsCifsResource", ObjectFirewallProfileprotocoloptionsCifsArgs.builder()
    .profileProtocolOptions("string")
    .scopetype("string")
    .uncompressedOversizeLimit(0)
    .scanBzip2("string")
    .objectFirewallProfileprotocoloptionsCifsId("string")
    .options("string")
    .oversizeLimit(0)
    .ports(0)
    .domainController("string")
    .fileFilter(ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs.builder()
        .entries(ObjectFirewallProfileprotocoloptionsCifsFileFilterEntryArgs.builder()
            .action("string")
            .comment("string")
            .direction("string")
            .fileTypes("string")
            .filter("string")
            .protocols("string")
            .build())
        .log("string")
        .status("string")
        .build())
    .dynamicSortSubtable("string")
    .serverKeytabs(ObjectFirewallProfileprotocoloptionsCifsServerKeytabArgs.builder()
        .keytab("string")
        .passwords("string")
        .principal("string")
        .build())
    .serverCredentialType("string")
    .status("string")
    .tcpWindowMaximum(0)
    .tcpWindowMinimum(0)
    .tcpWindowSize(0)
    .tcpWindowType("string")
    .uncompressedNestLimit(0)
    .adom("string")
    .build());
object_firewall_profileprotocoloptions_cifs_resource = fortimanager.ObjectFirewallProfileprotocoloptionsCifs("objectFirewallProfileprotocoloptionsCifsResource",
    profile_protocol_options="string",
    scopetype="string",
    uncompressed_oversize_limit=0,
    scan_bzip2="string",
    object_firewall_profileprotocoloptions_cifs_id="string",
    options=["string"],
    oversize_limit=0,
    ports=[0],
    domain_controller="string",
    file_filter={
        "entries": [{
            "action": "string",
            "comment": "string",
            "direction": "string",
            "file_types": ["string"],
            "filter": "string",
            "protocols": ["string"],
        }],
        "log": "string",
        "status": "string",
    },
    dynamic_sort_subtable="string",
    server_keytabs=[{
        "keytab": "string",
        "passwords": ["string"],
        "principal": "string",
    }],
    server_credential_type="string",
    status="string",
    tcp_window_maximum=0,
    tcp_window_minimum=0,
    tcp_window_size=0,
    tcp_window_type="string",
    uncompressed_nest_limit=0,
    adom="string")
const objectFirewallProfileprotocoloptionsCifsResource = new fortimanager.ObjectFirewallProfileprotocoloptionsCifs("objectFirewallProfileprotocoloptionsCifsResource", {
    profileProtocolOptions: "string",
    scopetype: "string",
    uncompressedOversizeLimit: 0,
    scanBzip2: "string",
    objectFirewallProfileprotocoloptionsCifsId: "string",
    options: ["string"],
    oversizeLimit: 0,
    ports: [0],
    domainController: "string",
    fileFilter: {
        entries: [{
            action: "string",
            comment: "string",
            direction: "string",
            fileTypes: ["string"],
            filter: "string",
            protocols: ["string"],
        }],
        log: "string",
        status: "string",
    },
    dynamicSortSubtable: "string",
    serverKeytabs: [{
        keytab: "string",
        passwords: ["string"],
        principal: "string",
    }],
    serverCredentialType: "string",
    status: "string",
    tcpWindowMaximum: 0,
    tcpWindowMinimum: 0,
    tcpWindowSize: 0,
    tcpWindowType: "string",
    uncompressedNestLimit: 0,
    adom: "string",
});
type: fortimanager:ObjectFirewallProfileprotocoloptionsCifs
properties:
    adom: string
    domainController: string
    dynamicSortSubtable: string
    fileFilter:
        entries:
            - action: string
              comment: string
              direction: string
              fileTypes:
                - string
              filter: string
              protocols:
                - string
        log: string
        status: string
    objectFirewallProfileprotocoloptionsCifsId: string
    options:
        - string
    oversizeLimit: 0
    ports:
        - 0
    profileProtocolOptions: string
    scanBzip2: string
    scopetype: string
    serverCredentialType: string
    serverKeytabs:
        - keytab: string
          passwords:
            - string
          principal: string
    status: string
    tcpWindowMaximum: 0
    tcpWindowMinimum: 0
    tcpWindowSize: 0
    tcpWindowType: string
    uncompressedNestLimit: 0
    uncompressedOversizeLimit: 0
ObjectFirewallProfileprotocoloptionsCifs Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The ObjectFirewallProfileprotocoloptionsCifs resource accepts the following input properties:
- ProfileProtocol stringOptions 
- Profile Protocol Options.
- Adom string
- Adom. This value is valid only when the scopetypeisadom, otherwise the value of adom in the provider will be inherited.
- DomainController string
- Domain for which to decrypt CIFS traffic.
- DynamicSort stringSubtable 
- true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
- FileFilter ObjectFirewall Profileprotocoloptions Cifs File Filter 
- File-Filter. The structure of file_filterblock is documented below.
- ObjectFirewall stringProfileprotocoloptions Cifs Id 
- an identifier for the resource.
- Options List<string>
- One or more options that can be applied to the session. Valid values: oversize.
- OversizeLimit double
- Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
- Ports List<double>
- Ports to scan for content (1 - 65535, default = 445).
- ScanBzip2 string
- Enable/disable scanning of BZip2 compressed files. Valid values: disable,enable.
- Scopetype string
- The scope of application of the resource. Valid values: inherit,adom,global. Theinheritmeans that the scopetype of the provider will be inherited, and adom will also be inherited. The default value isinherit.
- ServerCredential stringType 
- CIFS server credential type. Valid values: none,credential-replication,credential-keytab.
- ServerKeytabs List<ObjectFirewall Profileprotocoloptions Cifs Server Keytab> 
- Server-Keytab. The structure of server_keytabblock is documented below.
- Status string
- Enable/disable the active status of scanning for this protocol. Valid values: disable,enable.
- TcpWindow doubleMaximum 
- Maximum dynamic TCP window size (default = 8MB).
- TcpWindow doubleMinimum 
- Minimum dynamic TCP window size (default = 128KB).
- TcpWindow doubleSize 
- Set TCP static window size (default = 256KB).
- TcpWindow stringType 
- Specify type of TCP window to use for this protocol. Valid values: system,static,dynamic.
- UncompressedNest doubleLimit 
- Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
- UncompressedOversize doubleLimit 
- Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
- ProfileProtocol stringOptions 
- Profile Protocol Options.
- Adom string
- Adom. This value is valid only when the scopetypeisadom, otherwise the value of adom in the provider will be inherited.
- DomainController string
- Domain for which to decrypt CIFS traffic.
- DynamicSort stringSubtable 
- true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
- FileFilter ObjectFirewall Profileprotocoloptions Cifs File Filter Args 
- File-Filter. The structure of file_filterblock is documented below.
- ObjectFirewall stringProfileprotocoloptions Cifs Id 
- an identifier for the resource.
- Options []string
- One or more options that can be applied to the session. Valid values: oversize.
- OversizeLimit float64
- Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
- Ports []float64
- Ports to scan for content (1 - 65535, default = 445).
- ScanBzip2 string
- Enable/disable scanning of BZip2 compressed files. Valid values: disable,enable.
- Scopetype string
- The scope of application of the resource. Valid values: inherit,adom,global. Theinheritmeans that the scopetype of the provider will be inherited, and adom will also be inherited. The default value isinherit.
- ServerCredential stringType 
- CIFS server credential type. Valid values: none,credential-replication,credential-keytab.
- ServerKeytabs []ObjectFirewall Profileprotocoloptions Cifs Server Keytab Type Args 
- Server-Keytab. The structure of server_keytabblock is documented below.
- Status string
- Enable/disable the active status of scanning for this protocol. Valid values: disable,enable.
- TcpWindow float64Maximum 
- Maximum dynamic TCP window size (default = 8MB).
- TcpWindow float64Minimum 
- Minimum dynamic TCP window size (default = 128KB).
- TcpWindow float64Size 
- Set TCP static window size (default = 256KB).
- TcpWindow stringType 
- Specify type of TCP window to use for this protocol. Valid values: system,static,dynamic.
- UncompressedNest float64Limit 
- Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
- UncompressedOversize float64Limit 
- Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
- profileProtocol StringOptions 
- Profile Protocol Options.
- adom String
- Adom. This value is valid only when the scopetypeisadom, otherwise the value of adom in the provider will be inherited.
- domainController String
- Domain for which to decrypt CIFS traffic.
- dynamicSort StringSubtable 
- true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
- fileFilter ObjectFirewall Profileprotocoloptions Cifs File Filter 
- File-Filter. The structure of file_filterblock is documented below.
- objectFirewall StringProfileprotocoloptions Cifs Id 
- an identifier for the resource.
- options List<String>
- One or more options that can be applied to the session. Valid values: oversize.
- oversizeLimit Double
- Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
- ports List<Double>
- Ports to scan for content (1 - 65535, default = 445).
- scanBzip2 String
- Enable/disable scanning of BZip2 compressed files. Valid values: disable,enable.
- scopetype String
- The scope of application of the resource. Valid values: inherit,adom,global. Theinheritmeans that the scopetype of the provider will be inherited, and adom will also be inherited. The default value isinherit.
- serverCredential StringType 
- CIFS server credential type. Valid values: none,credential-replication,credential-keytab.
- serverKeytabs List<ObjectFirewall Profileprotocoloptions Cifs Server Keytab> 
- Server-Keytab. The structure of server_keytabblock is documented below.
- status String
- Enable/disable the active status of scanning for this protocol. Valid values: disable,enable.
- tcpWindow DoubleMaximum 
- Maximum dynamic TCP window size (default = 8MB).
- tcpWindow DoubleMinimum 
- Minimum dynamic TCP window size (default = 128KB).
- tcpWindow DoubleSize 
- Set TCP static window size (default = 256KB).
- tcpWindow StringType 
- Specify type of TCP window to use for this protocol. Valid values: system,static,dynamic.
- uncompressedNest DoubleLimit 
- Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
- uncompressedOversize DoubleLimit 
- Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
- profileProtocol stringOptions 
- Profile Protocol Options.
- adom string
- Adom. This value is valid only when the scopetypeisadom, otherwise the value of adom in the provider will be inherited.
- domainController string
- Domain for which to decrypt CIFS traffic.
- dynamicSort stringSubtable 
- true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
- fileFilter ObjectFirewall Profileprotocoloptions Cifs File Filter 
- File-Filter. The structure of file_filterblock is documented below.
- objectFirewall stringProfileprotocoloptions Cifs Id 
- an identifier for the resource.
- options string[]
- One or more options that can be applied to the session. Valid values: oversize.
- oversizeLimit number
- Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
- ports number[]
- Ports to scan for content (1 - 65535, default = 445).
- scanBzip2 string
- Enable/disable scanning of BZip2 compressed files. Valid values: disable,enable.
- scopetype string
- The scope of application of the resource. Valid values: inherit,adom,global. Theinheritmeans that the scopetype of the provider will be inherited, and adom will also be inherited. The default value isinherit.
- serverCredential stringType 
- CIFS server credential type. Valid values: none,credential-replication,credential-keytab.
- serverKeytabs ObjectFirewall Profileprotocoloptions Cifs Server Keytab[] 
- Server-Keytab. The structure of server_keytabblock is documented below.
- status string
- Enable/disable the active status of scanning for this protocol. Valid values: disable,enable.
- tcpWindow numberMaximum 
- Maximum dynamic TCP window size (default = 8MB).
- tcpWindow numberMinimum 
- Minimum dynamic TCP window size (default = 128KB).
- tcpWindow numberSize 
- Set TCP static window size (default = 256KB).
- tcpWindow stringType 
- Specify type of TCP window to use for this protocol. Valid values: system,static,dynamic.
- uncompressedNest numberLimit 
- Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
- uncompressedOversize numberLimit 
- Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
- profile_protocol_ stroptions 
- Profile Protocol Options.
- adom str
- Adom. This value is valid only when the scopetypeisadom, otherwise the value of adom in the provider will be inherited.
- domain_controller str
- Domain for which to decrypt CIFS traffic.
- dynamic_sort_ strsubtable 
- true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
- file_filter ObjectFirewall Profileprotocoloptions Cifs File Filter Args 
- File-Filter. The structure of file_filterblock is documented below.
- object_firewall_ strprofileprotocoloptions_ cifs_ id 
- an identifier for the resource.
- options Sequence[str]
- One or more options that can be applied to the session. Valid values: oversize.
- oversize_limit float
- Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
- ports Sequence[float]
- Ports to scan for content (1 - 65535, default = 445).
- scan_bzip2 str
- Enable/disable scanning of BZip2 compressed files. Valid values: disable,enable.
- scopetype str
- The scope of application of the resource. Valid values: inherit,adom,global. Theinheritmeans that the scopetype of the provider will be inherited, and adom will also be inherited. The default value isinherit.
- server_credential_ strtype 
- CIFS server credential type. Valid values: none,credential-replication,credential-keytab.
- server_keytabs Sequence[ObjectFirewall Profileprotocoloptions Cifs Server Keytab Args] 
- Server-Keytab. The structure of server_keytabblock is documented below.
- status str
- Enable/disable the active status of scanning for this protocol. Valid values: disable,enable.
- tcp_window_ floatmaximum 
- Maximum dynamic TCP window size (default = 8MB).
- tcp_window_ floatminimum 
- Minimum dynamic TCP window size (default = 128KB).
- tcp_window_ floatsize 
- Set TCP static window size (default = 256KB).
- tcp_window_ strtype 
- Specify type of TCP window to use for this protocol. Valid values: system,static,dynamic.
- uncompressed_nest_ floatlimit 
- Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
- uncompressed_oversize_ floatlimit 
- Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
- profileProtocol StringOptions 
- Profile Protocol Options.
- adom String
- Adom. This value is valid only when the scopetypeisadom, otherwise the value of adom in the provider will be inherited.
- domainController String
- Domain for which to decrypt CIFS traffic.
- dynamicSort StringSubtable 
- true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
- fileFilter Property Map
- File-Filter. The structure of file_filterblock is documented below.
- objectFirewall StringProfileprotocoloptions Cifs Id 
- an identifier for the resource.
- options List<String>
- One or more options that can be applied to the session. Valid values: oversize.
- oversizeLimit Number
- Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
- ports List<Number>
- Ports to scan for content (1 - 65535, default = 445).
- scanBzip2 String
- Enable/disable scanning of BZip2 compressed files. Valid values: disable,enable.
- scopetype String
- The scope of application of the resource. Valid values: inherit,adom,global. Theinheritmeans that the scopetype of the provider will be inherited, and adom will also be inherited. The default value isinherit.
- serverCredential StringType 
- CIFS server credential type. Valid values: none,credential-replication,credential-keytab.
- serverKeytabs List<Property Map>
- Server-Keytab. The structure of server_keytabblock is documented below.
- status String
- Enable/disable the active status of scanning for this protocol. Valid values: disable,enable.
- tcpWindow NumberMaximum 
- Maximum dynamic TCP window size (default = 8MB).
- tcpWindow NumberMinimum 
- Minimum dynamic TCP window size (default = 128KB).
- tcpWindow NumberSize 
- Set TCP static window size (default = 256KB).
- tcpWindow StringType 
- Specify type of TCP window to use for this protocol. Valid values: system,static,dynamic.
- uncompressedNest NumberLimit 
- Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
- uncompressedOversize NumberLimit 
- Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
Outputs
All input properties are implicitly available as output properties. Additionally, the ObjectFirewallProfileprotocoloptionsCifs resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing ObjectFirewallProfileprotocoloptionsCifs Resource
Get an existing ObjectFirewallProfileprotocoloptionsCifs resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: ObjectFirewallProfileprotocoloptionsCifsState, opts?: CustomResourceOptions): ObjectFirewallProfileprotocoloptionsCifs@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        adom: Optional[str] = None,
        domain_controller: Optional[str] = None,
        dynamic_sort_subtable: Optional[str] = None,
        file_filter: Optional[ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs] = None,
        object_firewall_profileprotocoloptions_cifs_id: Optional[str] = None,
        options: Optional[Sequence[str]] = None,
        oversize_limit: Optional[float] = None,
        ports: Optional[Sequence[float]] = None,
        profile_protocol_options: Optional[str] = None,
        scan_bzip2: Optional[str] = None,
        scopetype: Optional[str] = None,
        server_credential_type: Optional[str] = None,
        server_keytabs: Optional[Sequence[ObjectFirewallProfileprotocoloptionsCifsServerKeytabArgs]] = None,
        status: Optional[str] = None,
        tcp_window_maximum: Optional[float] = None,
        tcp_window_minimum: Optional[float] = None,
        tcp_window_size: Optional[float] = None,
        tcp_window_type: Optional[str] = None,
        uncompressed_nest_limit: Optional[float] = None,
        uncompressed_oversize_limit: Optional[float] = None) -> ObjectFirewallProfileprotocoloptionsCifsfunc GetObjectFirewallProfileprotocoloptionsCifs(ctx *Context, name string, id IDInput, state *ObjectFirewallProfileprotocoloptionsCifsState, opts ...ResourceOption) (*ObjectFirewallProfileprotocoloptionsCifs, error)public static ObjectFirewallProfileprotocoloptionsCifs Get(string name, Input<string> id, ObjectFirewallProfileprotocoloptionsCifsState? state, CustomResourceOptions? opts = null)public static ObjectFirewallProfileprotocoloptionsCifs get(String name, Output<String> id, ObjectFirewallProfileprotocoloptionsCifsState state, CustomResourceOptions options)resources:  _:    type: fortimanager:ObjectFirewallProfileprotocoloptionsCifs    get:      id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Adom string
- Adom. This value is valid only when the scopetypeisadom, otherwise the value of adom in the provider will be inherited.
- DomainController string
- Domain for which to decrypt CIFS traffic.
- DynamicSort stringSubtable 
- true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
- FileFilter ObjectFirewall Profileprotocoloptions Cifs File Filter 
- File-Filter. The structure of file_filterblock is documented below.
- ObjectFirewall stringProfileprotocoloptions Cifs Id 
- an identifier for the resource.
- Options List<string>
- One or more options that can be applied to the session. Valid values: oversize.
- OversizeLimit double
- Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
- Ports List<double>
- Ports to scan for content (1 - 65535, default = 445).
- ProfileProtocol stringOptions 
- Profile Protocol Options.
- ScanBzip2 string
- Enable/disable scanning of BZip2 compressed files. Valid values: disable,enable.
- Scopetype string
- The scope of application of the resource. Valid values: inherit,adom,global. Theinheritmeans that the scopetype of the provider will be inherited, and adom will also be inherited. The default value isinherit.
- ServerCredential stringType 
- CIFS server credential type. Valid values: none,credential-replication,credential-keytab.
- ServerKeytabs List<ObjectFirewall Profileprotocoloptions Cifs Server Keytab> 
- Server-Keytab. The structure of server_keytabblock is documented below.
- Status string
- Enable/disable the active status of scanning for this protocol. Valid values: disable,enable.
- TcpWindow doubleMaximum 
- Maximum dynamic TCP window size (default = 8MB).
- TcpWindow doubleMinimum 
- Minimum dynamic TCP window size (default = 128KB).
- TcpWindow doubleSize 
- Set TCP static window size (default = 256KB).
- TcpWindow stringType 
- Specify type of TCP window to use for this protocol. Valid values: system,static,dynamic.
- UncompressedNest doubleLimit 
- Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
- UncompressedOversize doubleLimit 
- Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
- Adom string
- Adom. This value is valid only when the scopetypeisadom, otherwise the value of adom in the provider will be inherited.
- DomainController string
- Domain for which to decrypt CIFS traffic.
- DynamicSort stringSubtable 
- true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
- FileFilter ObjectFirewall Profileprotocoloptions Cifs File Filter Args 
- File-Filter. The structure of file_filterblock is documented below.
- ObjectFirewall stringProfileprotocoloptions Cifs Id 
- an identifier for the resource.
- Options []string
- One or more options that can be applied to the session. Valid values: oversize.
- OversizeLimit float64
- Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
- Ports []float64
- Ports to scan for content (1 - 65535, default = 445).
- ProfileProtocol stringOptions 
- Profile Protocol Options.
- ScanBzip2 string
- Enable/disable scanning of BZip2 compressed files. Valid values: disable,enable.
- Scopetype string
- The scope of application of the resource. Valid values: inherit,adom,global. Theinheritmeans that the scopetype of the provider will be inherited, and adom will also be inherited. The default value isinherit.
- ServerCredential stringType 
- CIFS server credential type. Valid values: none,credential-replication,credential-keytab.
- ServerKeytabs []ObjectFirewall Profileprotocoloptions Cifs Server Keytab Type Args 
- Server-Keytab. The structure of server_keytabblock is documented below.
- Status string
- Enable/disable the active status of scanning for this protocol. Valid values: disable,enable.
- TcpWindow float64Maximum 
- Maximum dynamic TCP window size (default = 8MB).
- TcpWindow float64Minimum 
- Minimum dynamic TCP window size (default = 128KB).
- TcpWindow float64Size 
- Set TCP static window size (default = 256KB).
- TcpWindow stringType 
- Specify type of TCP window to use for this protocol. Valid values: system,static,dynamic.
- UncompressedNest float64Limit 
- Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
- UncompressedOversize float64Limit 
- Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
- adom String
- Adom. This value is valid only when the scopetypeisadom, otherwise the value of adom in the provider will be inherited.
- domainController String
- Domain for which to decrypt CIFS traffic.
- dynamicSort StringSubtable 
- true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
- fileFilter ObjectFirewall Profileprotocoloptions Cifs File Filter 
- File-Filter. The structure of file_filterblock is documented below.
- objectFirewall StringProfileprotocoloptions Cifs Id 
- an identifier for the resource.
- options List<String>
- One or more options that can be applied to the session. Valid values: oversize.
- oversizeLimit Double
- Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
- ports List<Double>
- Ports to scan for content (1 - 65535, default = 445).
- profileProtocol StringOptions 
- Profile Protocol Options.
- scanBzip2 String
- Enable/disable scanning of BZip2 compressed files. Valid values: disable,enable.
- scopetype String
- The scope of application of the resource. Valid values: inherit,adom,global. Theinheritmeans that the scopetype of the provider will be inherited, and adom will also be inherited. The default value isinherit.
- serverCredential StringType 
- CIFS server credential type. Valid values: none,credential-replication,credential-keytab.
- serverKeytabs List<ObjectFirewall Profileprotocoloptions Cifs Server Keytab> 
- Server-Keytab. The structure of server_keytabblock is documented below.
- status String
- Enable/disable the active status of scanning for this protocol. Valid values: disable,enable.
- tcpWindow DoubleMaximum 
- Maximum dynamic TCP window size (default = 8MB).
- tcpWindow DoubleMinimum 
- Minimum dynamic TCP window size (default = 128KB).
- tcpWindow DoubleSize 
- Set TCP static window size (default = 256KB).
- tcpWindow StringType 
- Specify type of TCP window to use for this protocol. Valid values: system,static,dynamic.
- uncompressedNest DoubleLimit 
- Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
- uncompressedOversize DoubleLimit 
- Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
- adom string
- Adom. This value is valid only when the scopetypeisadom, otherwise the value of adom in the provider will be inherited.
- domainController string
- Domain for which to decrypt CIFS traffic.
- dynamicSort stringSubtable 
- true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
- fileFilter ObjectFirewall Profileprotocoloptions Cifs File Filter 
- File-Filter. The structure of file_filterblock is documented below.
- objectFirewall stringProfileprotocoloptions Cifs Id 
- an identifier for the resource.
- options string[]
- One or more options that can be applied to the session. Valid values: oversize.
- oversizeLimit number
- Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
- ports number[]
- Ports to scan for content (1 - 65535, default = 445).
- profileProtocol stringOptions 
- Profile Protocol Options.
- scanBzip2 string
- Enable/disable scanning of BZip2 compressed files. Valid values: disable,enable.
- scopetype string
- The scope of application of the resource. Valid values: inherit,adom,global. Theinheritmeans that the scopetype of the provider will be inherited, and adom will also be inherited. The default value isinherit.
- serverCredential stringType 
- CIFS server credential type. Valid values: none,credential-replication,credential-keytab.
- serverKeytabs ObjectFirewall Profileprotocoloptions Cifs Server Keytab[] 
- Server-Keytab. The structure of server_keytabblock is documented below.
- status string
- Enable/disable the active status of scanning for this protocol. Valid values: disable,enable.
- tcpWindow numberMaximum 
- Maximum dynamic TCP window size (default = 8MB).
- tcpWindow numberMinimum 
- Minimum dynamic TCP window size (default = 128KB).
- tcpWindow numberSize 
- Set TCP static window size (default = 256KB).
- tcpWindow stringType 
- Specify type of TCP window to use for this protocol. Valid values: system,static,dynamic.
- uncompressedNest numberLimit 
- Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
- uncompressedOversize numberLimit 
- Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
- adom str
- Adom. This value is valid only when the scopetypeisadom, otherwise the value of adom in the provider will be inherited.
- domain_controller str
- Domain for which to decrypt CIFS traffic.
- dynamic_sort_ strsubtable 
- true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
- file_filter ObjectFirewall Profileprotocoloptions Cifs File Filter Args 
- File-Filter. The structure of file_filterblock is documented below.
- object_firewall_ strprofileprotocoloptions_ cifs_ id 
- an identifier for the resource.
- options Sequence[str]
- One or more options that can be applied to the session. Valid values: oversize.
- oversize_limit float
- Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
- ports Sequence[float]
- Ports to scan for content (1 - 65535, default = 445).
- profile_protocol_ stroptions 
- Profile Protocol Options.
- scan_bzip2 str
- Enable/disable scanning of BZip2 compressed files. Valid values: disable,enable.
- scopetype str
- The scope of application of the resource. Valid values: inherit,adom,global. Theinheritmeans that the scopetype of the provider will be inherited, and adom will also be inherited. The default value isinherit.
- server_credential_ strtype 
- CIFS server credential type. Valid values: none,credential-replication,credential-keytab.
- server_keytabs Sequence[ObjectFirewall Profileprotocoloptions Cifs Server Keytab Args] 
- Server-Keytab. The structure of server_keytabblock is documented below.
- status str
- Enable/disable the active status of scanning for this protocol. Valid values: disable,enable.
- tcp_window_ floatmaximum 
- Maximum dynamic TCP window size (default = 8MB).
- tcp_window_ floatminimum 
- Minimum dynamic TCP window size (default = 128KB).
- tcp_window_ floatsize 
- Set TCP static window size (default = 256KB).
- tcp_window_ strtype 
- Specify type of TCP window to use for this protocol. Valid values: system,static,dynamic.
- uncompressed_nest_ floatlimit 
- Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
- uncompressed_oversize_ floatlimit 
- Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
- adom String
- Adom. This value is valid only when the scopetypeisadom, otherwise the value of adom in the provider will be inherited.
- domainController String
- Domain for which to decrypt CIFS traffic.
- dynamicSort StringSubtable 
- true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
- fileFilter Property Map
- File-Filter. The structure of file_filterblock is documented below.
- objectFirewall StringProfileprotocoloptions Cifs Id 
- an identifier for the resource.
- options List<String>
- One or more options that can be applied to the session. Valid values: oversize.
- oversizeLimit Number
- Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
- ports List<Number>
- Ports to scan for content (1 - 65535, default = 445).
- profileProtocol StringOptions 
- Profile Protocol Options.
- scanBzip2 String
- Enable/disable scanning of BZip2 compressed files. Valid values: disable,enable.
- scopetype String
- The scope of application of the resource. Valid values: inherit,adom,global. Theinheritmeans that the scopetype of the provider will be inherited, and adom will also be inherited. The default value isinherit.
- serverCredential StringType 
- CIFS server credential type. Valid values: none,credential-replication,credential-keytab.
- serverKeytabs List<Property Map>
- Server-Keytab. The structure of server_keytabblock is documented below.
- status String
- Enable/disable the active status of scanning for this protocol. Valid values: disable,enable.
- tcpWindow NumberMaximum 
- Maximum dynamic TCP window size (default = 8MB).
- tcpWindow NumberMinimum 
- Minimum dynamic TCP window size (default = 128KB).
- tcpWindow NumberSize 
- Set TCP static window size (default = 256KB).
- tcpWindow StringType 
- Specify type of TCP window to use for this protocol. Valid values: system,static,dynamic.
- uncompressedNest NumberLimit 
- Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
- uncompressedOversize NumberLimit 
- Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
Supporting Types
ObjectFirewallProfileprotocoloptionsCifsFileFilter, ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs            
- Entries
List<ObjectFirewall Profileprotocoloptions Cifs File Filter Entry> 
- Entries. The structure of entriesblock is documented below.
- Log string
- Enable/disable file filter logging. Valid values: disable,enable.
- Status string
- Enable/disable file filter. Valid values: disable,enable.
- Entries
[]ObjectFirewall Profileprotocoloptions Cifs File Filter Entry 
- Entries. The structure of entriesblock is documented below.
- Log string
- Enable/disable file filter logging. Valid values: disable,enable.
- Status string
- Enable/disable file filter. Valid values: disable,enable.
- entries
List<ObjectFirewall Profileprotocoloptions Cifs File Filter Entry> 
- Entries. The structure of entriesblock is documented below.
- log String
- Enable/disable file filter logging. Valid values: disable,enable.
- status String
- Enable/disable file filter. Valid values: disable,enable.
- entries
ObjectFirewall Profileprotocoloptions Cifs File Filter Entry[] 
- Entries. The structure of entriesblock is documented below.
- log string
- Enable/disable file filter logging. Valid values: disable,enable.
- status string
- Enable/disable file filter. Valid values: disable,enable.
- entries
Sequence[ObjectFirewall Profileprotocoloptions Cifs File Filter Entry] 
- Entries. The structure of entriesblock is documented below.
- log str
- Enable/disable file filter logging. Valid values: disable,enable.
- status str
- Enable/disable file filter. Valid values: disable,enable.
- entries List<Property Map>
- Entries. The structure of entriesblock is documented below.
- log String
- Enable/disable file filter logging. Valid values: disable,enable.
- status String
- Enable/disable file filter. Valid values: disable,enable.
ObjectFirewallProfileprotocoloptionsCifsFileFilterEntry, ObjectFirewallProfileprotocoloptionsCifsFileFilterEntryArgs              
- Action string
- Action taken for matched file. Valid values: log,block.
- Comment string
- Comment.
- Direction string
- Match files transmitted in the session's originating or reply direction. Valid values: any,incoming,outgoing.
- FileTypes List<string>
- Select file type.
- Filter string
- Add a file filter.
- Protocols List<string>
- Protocols to apply with. Valid values: cifs.
- Action string
- Action taken for matched file. Valid values: log,block.
- Comment string
- Comment.
- Direction string
- Match files transmitted in the session's originating or reply direction. Valid values: any,incoming,outgoing.
- FileTypes []string
- Select file type.
- Filter string
- Add a file filter.
- Protocols []string
- Protocols to apply with. Valid values: cifs.
- action String
- Action taken for matched file. Valid values: log,block.
- comment String
- Comment.
- direction String
- Match files transmitted in the session's originating or reply direction. Valid values: any,incoming,outgoing.
- fileTypes List<String>
- Select file type.
- filter String
- Add a file filter.
- protocols List<String>
- Protocols to apply with. Valid values: cifs.
- action string
- Action taken for matched file. Valid values: log,block.
- comment string
- Comment.
- direction string
- Match files transmitted in the session's originating or reply direction. Valid values: any,incoming,outgoing.
- fileTypes string[]
- Select file type.
- filter string
- Add a file filter.
- protocols string[]
- Protocols to apply with. Valid values: cifs.
- action str
- Action taken for matched file. Valid values: log,block.
- comment str
- Comment.
- direction str
- Match files transmitted in the session's originating or reply direction. Valid values: any,incoming,outgoing.
- file_types Sequence[str]
- Select file type.
- filter str
- Add a file filter.
- protocols Sequence[str]
- Protocols to apply with. Valid values: cifs.
- action String
- Action taken for matched file. Valid values: log,block.
- comment String
- Comment.
- direction String
- Match files transmitted in the session's originating or reply direction. Valid values: any,incoming,outgoing.
- fileTypes List<String>
- Select file type.
- filter String
- Add a file filter.
- protocols List<String>
- Protocols to apply with. Valid values: cifs.
ObjectFirewallProfileprotocoloptionsCifsServerKeytab, ObjectFirewallProfileprotocoloptionsCifsServerKeytabArgs            
Import
ObjectFirewall ProfileProtocolOptionsCifs can be imported using any of these accepted formats:
Set import_options = [“profile_protocol_options=YOUR_VALUE”] in the provider section.
$ export “FORTIMANAGER_IMPORT_TABLE”=“true”
$ pulumi import fortimanager:index/objectFirewallProfileprotocoloptionsCifs:ObjectFirewallProfileprotocoloptionsCifs labelname ObjectFirewallProfileProtocolOptionsCifs
$ unset “FORTIMANAGER_IMPORT_TABLE”
-> Hint: The scopetype and adom for import will directly inherit the scopetype and adom configuration of the provider.
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- fortimanager fortinetdev/terraform-provider-fortimanager
- License
- Notes
- This Pulumi package is based on the fortimanagerTerraform Provider.