NSX-T Data Center Global Manager REST API
Associated URIs:
API Description | API Path |
---|---|
List all DNS security profilesList all DNS security profiles |
GET /global-manager/api/v1/global-infra/dns-security-profiles
|
Delete DNS security profileDelete DNS security profile |
DELETE /global-manager/api/v1/global-infra/dns-security-profiles/{profile-id}
|
Read the DNS Forwarder for the given tier-0 instanceRead the DNS Forwarder for the given tier-0 instance |
GET /global-manager/api/v1/global-infra/dns-security-profiles/{profile-id}
|
Create or update DNS security profileCreate or update DNS security profile |
PATCH /global-manager/api/v1/global-infra/dns-security-profiles/{profile-id}
|
Create or update DNS security profileCreate or update DNS security profile |
PUT /global-manager/api/v1/global-infra/dns-security-profiles/{profile-id}
|
List gateway policiesList all gateway policies for specified Domain. |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/gateway-policies
|
Delete GatewayPolicyDelete GatewayPolicy |
DELETE /global-manager/api/v1/global-infra/domains/{domain-id}/gateway-policies/{gateway-policy-id}
|
Read gateway policyRead gateway policy for a domain. |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/gateway-policies/{gateway-policy-id}
|
Update gateway policyUpdate the gateway policy for a domain. This is a full replace. All the rules are replaced. Performance Note: If you want to edit several rules in a gateway policy use this API. It will perform better than several individual rule APIs. Just pass all the rules which you wish to edit as embedded rules to it. |
PATCH /global-manager/api/v1/global-infra/domains/{domain-id}/gateway-policies/{gateway-policy-id}
|
Revise the positioning of gateway policyThis is used to set a precedence of a gateway policy w.r.t others. |
POST /global-manager/api/v1/global-infra/domains/{domain-id}/gateway-policies/{gateway-policy-id}?action=revise
|
Update gateway policyUpdate the gateway policy for a domain. This is a full replace. All the rules are replaced. Performance Note: If you want to edit several rules in a gateway policy, use this API. It will perform better than several individual rule APIs. Just pass all the rules which you wish to edit as embedded rules to it. |
PUT /global-manager/api/v1/global-infra/domains/{domain-id}/gateway-policies/{gateway-policy-id}
|
List rulesList rules |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/gateway-policies/{gateway-policy-id}/rules
|
Delete ruleDelete rule |
DELETE /global-manager/api/v1/global-infra/domains/{domain-id}/gateway-policies/{gateway-policy-id}/rules/{rule-id}
|
Read ruleRead rule |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/gateway-policies/{gateway-policy-id}/rules/{rule-id}
|
Update gateway ruleUpdate the gateway rule. Create new rule if a rule with the rule-id is not already present. Performance Note: If you want to edit several rules in a gateway policy, prefer below mentioned API for optimal performance. Pass all the rules which you wish to edit as embedded rules to it. Use this API - PATCH (or PUT) /infra/domains/<domain-id>/gateway-policies/<gateway-policy-id> Concurrency Note: Concurrent firewall rule creation is not supported under the same Gateway Policy. |
PATCH /global-manager/api/v1/global-infra/domains/{domain-id}/gateway-policies/{gateway-policy-id}/rules/{rule-id}
|
Revise the positioning of gateway ruleThis is used to re-order a gateway rule within a gateway policy. |
POST /global-manager/api/v1/global-infra/domains/{domain-id}/gateway-policies/{gateway-policy-id}/rules/{rule-id}?action=revise
|
Update gateway ruleUpdate the gateway rule. Create new rule if a rule with the rule-id is not already present. Performance Note: If you want to edit several rules in a gateway policy, prefer below mentioned API for optimal performance. Pass all the rules which you wish to edit as embedded rules to it. Use this API - PATCH (or PUT) /infra/domains/<domain-id>/gateway-policies/<gateway-policy-id> Concurrency Note: Concurrent firewall rule creation is not supported under the same Gateway Policy. |
PUT /global-manager/api/v1/global-infra/domains/{domain-id}/gateway-policies/{gateway-policy-id}/rules/{rule-id}
|
Get gateway rule statisticsGet statistics of a gateway rule. - no enforcement point path specified: Stats will be evaluated on each enforcement. point. - {enforcement_point_path}: Stats are evaluated only on the given enforcement point. |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/gateway-policies/{gateway-policy-id}/rules/{rule-id}/statistics
|
Get gateway policy statisticsGet statistics of a gateay policy. - no enforcement point path specified: Stats will be evaluated on each enforcement. point. - {enforcement_point_path}: Stats are evaluated only on the given enforcement point. |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/gateway-policies/{gateway-policy-id}/statistics
|
Get DNS security profile binding mapAPI will get DNS security profile binding map |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/groups/{group-id}/dns-security-profile-binding-maps
|
Delete DNS security profile binding mapAPI will delete DNS security profile binding map |
DELETE /global-manager/api/v1/global-infra/domains/{domain-id}/groups/{group-id}/dns-security-profile-binding-maps/{dns-security-profile-binding-map-id}
|
Get DNS security profile binding mapAPI will get DNS security profile binding map |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/groups/{group-id}/dns-security-profile-binding-maps/{dns-security-profile-binding-map-id}
|
Create or update DNS security profile binding mapAPI will create or update DNS security profile binding map |
PATCH /global-manager/api/v1/global-infra/domains/{domain-id}/groups/{group-id}/dns-security-profile-binding-maps/{dns-security-profile-binding-map-id}
|
Update DNS security profile binding mapAPI will update DNS security profile binding map |
PUT /global-manager/api/v1/global-infra/domains/{domain-id}/groups/{group-id}/dns-security-profile-binding-maps/{dns-security-profile-binding-map-id}
|
List Firewall Flood Protection Profile Binding MapsAPI will list all Firewall Flood Protection Profile Binding Maps in current group id. |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/groups/{group-id}/firewall-flood-protection-profile-binding-maps
|
Delete Firewall Flood Protection Profile BindingAPI will delete Firewall Flood Protection Profile Binding |
DELETE /global-manager/api/v1/global-infra/domains/{domain-id}/groups/{group-id}/firewall-flood-protection-profile-binding-maps/{firewall-flood-protection-profile-binding-map-id}
|
Get Firewall Flood Protection Profile Binding MapAPI will get Firewall Flood Protection Profile Binding Map |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/groups/{group-id}/firewall-flood-protection-profile-binding-maps/{firewall-flood-protection-profile-binding-map-id}
|
Create or update Firewall Flood Protection Profile Binding MapAPI will create or update Firewall Flood Protection profile binding map |
PATCH /global-manager/api/v1/global-infra/domains/{domain-id}/groups/{group-id}/firewall-flood-protection-profile-binding-maps/{firewall-flood-protection-profile-binding-map-id}
|
Update Firewall Flood Protection Profile Binding MapAPI will update Firewall Flood Protection Profile Binding Map |
PUT /global-manager/api/v1/global-infra/domains/{domain-id}/groups/{group-id}/firewall-flood-protection-profile-binding-maps/{firewall-flood-protection-profile-binding-map-id}
|
List Firewall Session Timer Profile Binding MapsAPI will list all Firewall Session Timer Profile Binding Maps in current group id. |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/groups/{group-id}/firewall-session-timer-profile-binding-maps
|
Delete Firewall Session Timer Profile BindingAPI will delete Firewall Session Timer Profile Binding |
DELETE /global-manager/api/v1/global-infra/domains/{domain-id}/groups/{group-id}/firewall-session-timer-profile-binding-maps/{firewall-session-timer-profile-binding-map-id}
|
Get Firewall Session Timer Profile Binding MapAPI will get Firewall Session Timer Profile Binding Map |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/groups/{group-id}/firewall-session-timer-profile-binding-maps/{firewall-session-timer-profile-binding-map-id}
|
Create or update Firewall Session Timer Profile Binding MapAPI will create or update Firewall Session Timer profile binding map |
PATCH /global-manager/api/v1/global-infra/domains/{domain-id}/groups/{group-id}/firewall-session-timer-profile-binding-maps/{firewall-session-timer-profile-binding-map-id}
|
Update Firewall Session Timer Profile Binding MapAPI will update Firewall Session Timer Profile Binding Map |
PUT /global-manager/api/v1/global-infra/domains/{domain-id}/groups/{group-id}/firewall-session-timer-profile-binding-maps/{firewall-session-timer-profile-binding-map-id}
|
List IDS gateway policiesList all IDS gateway policies for specified Domain. |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/intrusion-service-gateway-policies
|
Delete IDS GatewayPolicyDelete IDS GatewayPolicy |
DELETE /global-manager/api/v1/global-infra/domains/{domain-id}/intrusion-service-gateway-policies/{policy-id}
|
Read IDS gateway policyRead IDS gateway policy for a domain. |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/intrusion-service-gateway-policies/{policy-id}
|
Update IDS gateway policyUpdate the IDS gateway policy for a domain. |
PATCH /global-manager/api/v1/global-infra/domains/{domain-id}/intrusion-service-gateway-policies/{policy-id}
|
Revise the positioning of IDS gateway policyThis is used to set a precedence of a IDS gateway policy w.r.t others. |
POST /global-manager/api/v1/global-infra/domains/{domain-id}/intrusion-service-gateway-policies/{policy-id}?action=revise
|
Update IDS gateway policyUpdate the IDS gateway policy for a domain. |
PUT /global-manager/api/v1/global-infra/domains/{domain-id}/intrusion-service-gateway-policies/{policy-id}
|
List IDS Gateway rulesList IDS Gateway rules |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/intrusion-service-gateway-policies/{policy-id}/rules
|
Delete IDS Gateway ruleDelete IDS Gateway rule |
DELETE /global-manager/api/v1/global-infra/domains/{domain-id}/intrusion-service-gateway-policies/{policy-id}/rules/{rule-id}
|
Read IDS ruleRead IDS rule |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/intrusion-service-gateway-policies/{policy-id}/rules/{rule-id}
|
Update IDS gateway ruleUpdate the gateway rule. |
PATCH /global-manager/api/v1/global-infra/domains/{domain-id}/intrusion-service-gateway-policies/{policy-id}/rules/{rule-id}
|
Revise the positioning of IDS gateway ruleThis is used to re-order a IDS gateway rule within a IDS gateway policy. |
POST /global-manager/api/v1/global-infra/domains/{domain-id}/intrusion-service-gateway-policies/{policy-id}/rules/{rule-id}?action=revise
|
Create or Update IDS gateway ruleCreate or Update the IDS gateway rule. |
PUT /global-manager/api/v1/global-infra/domains/{domain-id}/intrusion-service-gateway-policies/{policy-id}/rules/{rule-id}
|
Get IDS gateway rule statisticsGet statistics of a IDS gateway rule. - no enforcement point path specified: Stats will be evaluated on each enforcement. point. - {enforcement_point_path}: Stats are evaluated only on the given enforcement point. |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/intrusion-service-gateway-policies/{policy-id}/rules/{rule-id}/statistics
|
Get IDS gateway policy statisticsGet statistics of a IDS gateway policy. - no enforcement point path specified: Stats will be evaluated on each enforcement. point. - {enforcement_point_path}: Stats are evaluated only on the given enforcement point. |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/intrusion-service-gateway-policies/{policy-id}/statistics
|
List IDS security policiesList intrusion detection system security policies. |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/intrusion-service-policies
|
Get IDS-IPS rule statisticsGet statistics of a IDS-IPS rule. - no enforcement point path specified: Stats will be evaluated on each enforcement point. - {enforcement_point_path}: Stats are evaluated only on the given enforcement point. |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/intrusion-service-policies/{ids-policy-id}/rules/{rule-id}/statistics
|
Get IDS security policy statisticsGet statistics of a IDS security policy. - no enforcement point path specified: Stats will be evaluated on each enforcement point. - {enforcement_point_path}: Stats are evaluated only on the given enforcement point. |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/intrusion-service-policies/{ids-policy-id}/statistics
|
Delete IDS security policyDelete intrusion detection system security policy. |
DELETE /global-manager/api/v1/global-infra/domains/{domain-id}/intrusion-service-policies/{policy-id}
|
Get IDS security policy.Read intrusion detection system security policy. |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/intrusion-service-policies/{policy-id}
|
Patch IDS security policyPatch intrusion detection system security policy for a domain. |
PATCH /global-manager/api/v1/global-infra/domains/{domain-id}/intrusion-service-policies/{policy-id}
|
Revise the positioning of IDS security policiesThis is used to set a precedence of a security policy w.r.t others. |
POST /global-manager/api/v1/global-infra/domains/{domain-id}/intrusion-service-policies/{policy-id}?action=revise
|
create or update IDS security policyUpdate intrusion detection system security policy for a domain. |
PUT /global-manager/api/v1/global-infra/domains/{domain-id}/intrusion-service-policies/{policy-id}
|
List IDS rulesList intrusion detection rules. |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/intrusion-service-policies/{policy-id}/rules
|
Delete IDS ruleDelete intrusion detection rule. |
DELETE /global-manager/api/v1/global-infra/domains/{domain-id}/intrusion-service-policies/{policy-id}/rules/{rule-id}
|
Get IDS rule.Read intrusion detection rule |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/intrusion-service-policies/{policy-id}/rules/{rule-id}
|
Patch IDS rulePatch intrusion detection system rule. |
PATCH /global-manager/api/v1/global-infra/domains/{domain-id}/intrusion-service-policies/{policy-id}/rules/{rule-id}
|
Revise the positioning of IDS ruleThis is used to re-order a rule within a security policy. |
POST /global-manager/api/v1/global-infra/domains/{domain-id}/intrusion-service-policies/{policy-id}/rules/{rule-id}?action=revise
|
create or update IDS ruleUpdate intrusion detection system rule. |
PUT /global-manager/api/v1/global-infra/domains/{domain-id}/intrusion-service-policies/{policy-id}/rules/{rule-id}
|
List security policiesList all security policies for a domain. |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/security-policies
|
Deletes a security policy from this domainDeletes the security policy along with all the rules |
DELETE /global-manager/api/v1/global-infra/domains/{domain-id}/security-policies/{security-policy-id}
|
Read security policyRead security policy for a domain. |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/security-policies/{security-policy-id}
|
Patch security policyPatch the security policy for a domain. If a security policy for the given security-policy-id is not present, the object will get created and if it is present it will be updated. This is a full replace. Performance Note: If you want to edit several rules in a security policy use this API. It will perform better than several individual rule APIs. Just pass all the rules which you wish to edit as embedded rules to it. |
PATCH /global-manager/api/v1/global-infra/domains/{domain-id}/security-policies/{security-policy-id}
|
Revise the positioning of security policiesThis is used to set a precedence of a security policy w.r.t others. |
POST /global-manager/api/v1/global-infra/domains/{domain-id}/security-policies/{security-policy-id}?action=revise
|
Create or Update security policyCreate or Update the security policy for a domain. This is a full replace. All the rules are replaced. Performance Note: If you want to edit several rules in a security policy, use this API. It will perform better than several individual rule APIs. Just pass all the rules which you wish to edit as embedded rules to it. |
PUT /global-manager/api/v1/global-infra/domains/{domain-id}/security-policies/{security-policy-id}
|
List rulesList rules |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/security-policies/{security-policy-id}/rules
|
Delete ruleDelete rule |
DELETE /global-manager/api/v1/global-infra/domains/{domain-id}/security-policies/{security-policy-id}/rules/{rule-id}
|
Read ruleRead rule |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/security-policies/{security-policy-id}/rules/{rule-id}
|
Patch a rulePatch the rule. If Rule corresponding to the the given rule-id is not present, the object will get created and if it is present it will be updated. This is a full replace. Performance Note: If you want to edit several rules in a security policy, prefer below mentioned API for optimal performance. Pass all the rules which you wish to edit as embedded rules to it. Use this API - PATCH (or PUT) /infra/domains/<domain-id>/security-policies/<security-policy-id> |
PATCH /global-manager/api/v1/global-infra/domains/{domain-id}/security-policies/{security-policy-id}/rules/{rule-id}
|
Revise the positioning of ruleThis is used to re-order a rule within a security policy. |
POST /global-manager/api/v1/global-infra/domains/{domain-id}/security-policies/{security-policy-id}/rules/{rule-id}?action=revise
|
Create or update a ruleUpdate the rule. Create new rule if a rule with the rule-id is not already present. Performance Note: If you wish to edit several rules in a security policy, prefer below mentioned API for optimal performance. Pass all the rules which you wish to edit as embedded rules to it. Use this API - PATCH (or PUT) /infra/domains/<domain-id>/security-policies/<security-policy-id> |
PUT /global-manager/api/v1/global-infra/domains/{domain-id}/security-policies/{security-policy-id}/rules/{rule-id}
|
Get rule statisticsGet statistics of a rule. - no enforcement point path specified: Stats will be evaluated on each enforcement point. - {enforcement_point_path}: Stats are evaluated only on the given enforcement point. |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/security-policies/{security-policy-id}/rules/{rule-id}/statistics
|
Get security policy statisticsGet statistics of a security policy. - no enforcement point path specified: Stats will be evaluated on each enforcement point. - {enforcement_point_path}: Stats are evaluated only on the given enforcement point. |
GET /global-manager/api/v1/global-infra/domains/{domain-id}/security-policies/{security-policy-id}/statistics
|
List Firewall Flood Protection Profile Binding Maps for all domainsAPI will list all Firewall Flood Protection Profile Binding Maps across all domains. This API returns the binding maps order by the sequence number. |
GET /global-manager/api/v1/global-infra/domains/firewall-flood-protection-profile-binding-maps
|
List Firewall Session Timer Profile Binding Maps for all domainsAPI will list all Firewall Session Timer Profile Binding Maps across all domains. This API returns the binding maps order by the sequence number. |
GET /global-manager/api/v1/global-infra/domains/firewall-session-timer-profile-binding-maps
|
List policy draftsList policy drafts. |
GET /global-manager/api/v1/global-infra/drafts
|
Delete a manual draftDelete a manual draft. |
DELETE /global-manager/api/v1/global-infra/drafts/{draft-id}
|
Read draftRead a draft for a given draft identifier. |
GET /global-manager/api/v1/global-infra/drafts/{draft-id}
|
Patch a manual draftCreate a new manual draft if the specified draft id does not correspond to an existing draft. Update the manual draft otherwise. Auto draft can not be updated. |
PATCH /global-manager/api/v1/global-infra/drafts/{draft-id}
|
Publish a draftRead a draft and publish it by applying changes onto current configuration. If there are additional changes on top of draft configuration, pass it as a request body, in form of Infra object. Otherwise, if there are no additional changes, then pass empty Infra object as a request body. |
POST /global-manager/api/v1/global-infra/drafts/{draft-id}?action=publish
|
Create or update a manual draftCreate a new manual draft if the specified draft id does not correspond to an existing draft. Update the manual draft otherwise. Auto draft can not be updated. |
PUT /global-manager/api/v1/global-infra/drafts/{draft-id}
|
Get an aggregated configuration for the draftGet an aggregated configuration that will get applied onto current configuration during publish of this draft. The response is a hierarchical payload containing the aggregated configuration differences from the latest auto draft till the specified draft. |
GET /global-manager/api/v1/global-infra/drafts/{draft-id}/aggregated
|
Get paginated aggregated configuration for the draftGet a paginated aggregated configuration of a given draft. This aggregated configuration is the differnece between the current published firewall configuration and a firewall configuration stored in a given draft. For an initial API call, if request_id is present in a response, then this is a paginated aggregated configuration of a given draft, containing all the security policies from the aggregated configuration. Using this request_id, more granular aggregated configuration, at security policy level, can be fetched from subsequent API calls. Absence of request_id suggests that whole aggregated configuration has been returned as a response to initial API call, as the size of aggregated configuration is not big enough to need pagination. |
GET /global-manager/api/v1/global-infra/drafts/{draft-id}/aggregated_with_pagination
|
Get a preview of a configuration after publish of a draftGet a preview of a configuration which will be present after publish of a specified draft. The response essentially is a hierarchical payload containing the configuration, which will be in active after a specified draft gets published onto current configuration. |
GET /global-manager/api/v1/global-infra/drafts/{draft-id}/complete
|
Test a directory domain event log server connectivityThis API tests a event log server connectivity before the actual domain or event log server is configured. If the connectivity is good, the response will be HTTP status 200. Otherwise the response will be HTTP status 200 and a corresponding error message will be returned. Note - Query param 'enforcement_point_path' would be honoured only in case of Global manager. |
POST /global-manager/api/v1/global-infra/firewall-identity-store-event-log-servers/status
|
Test a directory domain LDAP server connectivityThis API tests a LDAP server connectivity before the actual domain or LDAP server is configured. If the connectivity is good, the response will be HTTP status 200. Otherwise the response will be HTTP status 500 and corresponding error message will be returned. |
POST /global-manager/api/v1/global-infra/firewall-identity-store-ldap-server
|
Test a LDAP server connection for directory domainThe API tests a LDAP server connection for an already configured domain. If the connection is successful, the response will be HTTP status 200. Otherwise the response will be HTTP status 500 and corresponding error message will be returned. |
POST /global-manager/api/v1/global-infra/firewall-identity-stores/{firewall-identity-store-id}/ldap-servers/{ldap-server-id}
|
Fetch all organization units for a Firewall Identity Store. |
GET /global-manager/api/v1/global-infra/firewall-identity-stores/{firewall-identity-store-id}/org-units
|
Get Firewall identity store sync statistics for the given identifier |
GET /global-manager/api/v1/global-infra/firewall-identity-stores/{firewall-identity-store-id}/sync-stats
|
IP Reputation feed configuration.API to retrieve the current IP Reputation feed configuration. |
GET /global-manager/api/v1/global-infra/firewall-ip-reputation-feed
|
IP reputation feed actions.This API can be used to activate or deactivate auto-download of IP reputation feed, it can also be used to trigger download of IP reputation feed when required. Once auto-download is activated, IP reputation feed will be downloaded at regular intervals of 720 mins(12 hrs). Auto-download of IP reputation feed can be activated using the action 'enable_auto_download', to deactivate use action 'disable_auto_download' and to trigger a download use action 'download'. For Global Manager, the only action that is supported is action=download. The enforcement_point_path of the site where the feed is to be downloaded should be provided along with the action |
POST /global-manager/api/v1/global-infra/firewall-ip-reputation-feed
|
API return the last feed download status on LM from NTICS.NSX downloads the IP reputation feed from NTICS periodically and in realtime on user request. The API return the status of last feed download from NTICS on a given site. |
GET /global-manager/api/v1/global-infra/firewall-ip-reputation-feed/download/status
|
Get PolicyFirewallSchedulersGet all PolicyFirewallSchedulers |
GET /global-manager/api/v1/global-infra/firewall-schedulers
|
Delete Policy Firewall SchedulerDeletes the specified PolicyFirewallScheduler. If scheduler is consumed in a security policy, it won't get deleted. |
DELETE /global-manager/api/v1/global-infra/firewall-schedulers/{firewall-scheduler-id}
|
Get PolicyFirewallSchedulerGet a PolicyFirewallScheduler by id |
GET /global-manager/api/v1/global-infra/firewall-schedulers/{firewall-scheduler-id}
|
Create or Update PolicyFirewallSchedulerCreates/Updates a PolicyFirewallScheduler, which can be set at security policy. Note that at least one property out of "days", "start_date", "time_interval", "end_date" is required if "recurring" field is true. Also "start_time" and "end_time" should not be present. And if "recurring" field is false then "start_date" and "end_date" is mandatory, "start_time" and "end_time" is optional. Also the fields "days" and "time_interval" should not be present. |
PATCH /global-manager/api/v1/global-infra/firewall-schedulers/{firewall-scheduler-id}
|
Create or Update PolicyFirewallSchedulerUpdates a PolicyFirewallScheduler, which can be set at security policy. Note that at least one property out of "days", "start_date", "time_interval", "end_date" is required if "recurring" field is true. Also "start_time" and "end_time" should not be present. And if "recurring" field is false then "start_date" and "end_date" is mandatory, "start_time" and "end_time" is optional. Also the fields "days" and "time_interval" should not be present. |
PUT /global-manager/api/v1/global-infra/firewall-schedulers/{firewall-scheduler-id}
|
List Firewall Session Timer ProfilesAPI will list all Firewall Session Timer Profiles |
GET /global-manager/api/v1/global-infra/firewall-session-timer-profiles
|
Delete Firewall Session Timer ProfileAPI will delete Firewall Session Timer Profile |
DELETE /global-manager/api/v1/global-infra/firewall-session-timer-profiles/{firewall-session-timer-profile-id}
|
Get Firewall Session Timer ProfileAPI will get Firewall Session Timer Profile |
GET /global-manager/api/v1/global-infra/firewall-session-timer-profiles/{firewall-session-timer-profile-id}
|
Create or update Firewall Session Timer ProfileAPI will create/update Firewall Session Timer Profile |
PATCH /global-manager/api/v1/global-infra/firewall-session-timer-profiles/{firewall-session-timer-profile-id}
|
Update Firewall Session Timer ProfileAPI will update Firewall Session Timer Profile |
PUT /global-manager/api/v1/global-infra/firewall-session-timer-profiles/{firewall-session-timer-profile-id}
|
Get policies filtered based on the given criteriaGet the list of policies filtered based on the given criteria. |
GET /global-manager/api/v1/global-infra/firewall/policies
|
Get rules filtered based on the given criteriaGet the list of rules of given parent path of policy/section, filtered based on the given criteria. Parent path is mandatory. |
GET /global-manager/api/v1/global-infra/firewall/rules
|
List Flood Protection ProfilesAPI will list all Flood Protection Profiles |
GET /global-manager/api/v1/global-infra/flood-protection-profiles
|
Delete Flood Protection ProfileAPI will delete Flood Protection Profile |
DELETE /global-manager/api/v1/global-infra/flood-protection-profiles/{flood-protection-profile-id}
|
Get Flood Protection ProfileAPI will get Flood Protection Profile |
GET /global-manager/api/v1/global-infra/flood-protection-profiles/{flood-protection-profile-id}
|
Create or update Flood Protection ProfileAPI will create/update Flood Protection Profile |
PATCH /global-manager/api/v1/global-infra/flood-protection-profiles/{flood-protection-profile-id}
|
Update Firewall Flood Protection ProfileAPI will update Firewall Flood Protection Profile |
PUT /global-manager/api/v1/global-infra/flood-protection-profiles/{flood-protection-profile-id}
|
List Flood Protection ProfilesAPI will list all Flood Protection Profiles bindings. |
GET /global-manager/api/v1/global-infra/flood-protection-profiles/{flood-protection-profile-id}/bindings
|
Get Geo IP Setting ConfigurationAPI to retrieve the current Geo IP Setting Configuration. |
GET /global-manager/api/v1/global-infra/geo-ip/setting
|
Patch Geo IP Setting ConfigurationThis API can be used to activate or deactivate auto-download of Geo IP Bundle. Once auto-download is activated, Geo IP Bundle will be downloaded at regular intervals of 720 minutes (12 hrs). |
PATCH /global-manager/api/v1/global-infra/geo-ip/setting
|
Update Geo IP Setting ConfigurationThis API can be used to activate or deactivate auto-download of Geo IP Bundle. Once auto-download is activated, Geo IP Bundle will be downloaded at regular intervals of 720 minutes (12 hrs). |
PUT /global-manager/api/v1/global-infra/geo-ip/setting
|
List all firewall identity storesList all firewall identity stores |
GET /global-manager/api/v1/global-infra/identity-firewall-stores
|
Delete firewall identity storeIf the firewall identity store is removed, it will stop the identity store synchronization. User will not be able to define new IDFW rules |
DELETE /global-manager/api/v1/global-infra/identity-firewall-stores/{identity-firewall-store-id}
|
Read firewall identity storeReturn a firewall identity store based on the store identifier |
GET /global-manager/api/v1/global-infra/identity-firewall-stores/{identity-firewall-store-id}
|
Create or update a firewall identity storeIf a firewall identity store with the firewall-identity-store-id is not already present, create a new firewall identity store. If it already exists, update the firewall identity store with specified attributes. |
PATCH /global-manager/api/v1/global-infra/identity-firewall-stores/{identity-firewall-store-id}
|
Create or update a firewall identity storeIf a firewall identity store with the firewall-identity-store-id is not already present, create a new firewall identity store. If it already exists, replace the firewall identity store instance with the new object. |
PUT /global-manager/api/v1/global-infra/identity-firewall-stores/{identity-firewall-store-id}
|
Delete a Event Log server for Firewall Identity store |
DELETE /global-manager/api/v1/global-infra/identity-firewall-stores/{identity-firewall-store-id}/event-log-servers/{event-log-server-id}
|
Get a specific Event Log server for a given Firewall Identity store |
GET /global-manager/api/v1/global-infra/identity-firewall-stores/{identity-firewall-store-id}/event-log-servers/{event-log-server-id}
|
Update a event log server for Firewall Identity store |
PUT /global-manager/api/v1/global-infra/identity-firewall-stores/{identity-firewall-store-id}/event-log-servers/{event-log-server-id}
|
List all configured domain LDAP servers |
GET /global-manager/api/v1/global-infra/identity-firewall-stores/{identity-firewall-store-id}/ldap-servers
|
Delete a LDAP server for Firewall Identity store |
DELETE /global-manager/api/v1/global-infra/identity-firewall-stores/{identity-firewall-store-id}/ldap-servers/{ldap-server-id}
|
Get a specific LDAP server for a given Firewall Identity store |
GET /global-manager/api/v1/global-infra/identity-firewall-stores/{identity-firewall-store-id}/ldap-servers/{ldap-server-id}
|
Create a LDAP server for Firewall Identity storeMore than one LDAP server can be created and only one LDAP server is used to synchronize directory objects. If more than one LDAP server is configured, NSX will try all the servers until it is able to successfully connect to one. |
PATCH /global-manager/api/v1/global-infra/identity-firewall-stores/{identity-firewall-store-id}/ldap-servers/{ldap-server-id}
|
Update a LDAP server for Firewall Identity store |
PUT /global-manager/api/v1/global-infra/identity-firewall-stores/{identity-firewall-store-id}/ldap-servers/{ldap-server-id}
|
Import K8s network policies to DFW Security PoliciesThis is used to import a set of K8s network policies into DFW security policies |
POST /global-manager/api/v1/global-infra/import-k8s-np-to-dfw
|
It returns the exclusion IP list present in the default malicious groupQuerying the API on GM with a valid enforcement point path, the API will return the list of exclusion IPs from the default malicious IP group of the site represented by the enforcement point path. In the absence of an enforcement point path, the API returns the exclusion IPs present in the global default malicious IP group of GM. Querying the API on LM, the api will return a list of exclusion IP addresses present in the local default malicious ip group. The API will not consider the IP addresses present in the user created malicious group. |
GET /global-manager/api/v1/global-infra/ip-reputation-exclusion-list
|
List IP reputation site mapping for all sites.List IP reputation site mapping details. |
GET /global-manager/api/v1/global-infra/ip-reputation-site-mappings
|
Delete IP Reputation site mapping on GMDelete IP Reputation site mapping from GM. On deletion of the site mapping for a given site, site specific local default malicious security policies/rules will be enabled and the global ip reputation default security policies will be removed from the site. |
DELETE /global-manager/api/v1/global-infra/ip-reputation-site-mappings/{mapping-id}
|
Read IP reputation site mapping on GM.Read IP reputation site mapping details for a given site. |
GET /global-manager/api/v1/global-infra/ip-reputation-site-mappings/{mapping-id}
|
Patch IP Reputation site mapping on GMCreate IP reputation site mapping for a specific site. IP reputation site mapping provides a way for the user to control the management of IP reputation based security policies from GM. Creation of site mapping for a site results in disabling IP reputation default security policies on sites. Post creation of the site mapping the global default security policies from GM gets pushed to the site. |
PATCH /global-manager/api/v1/global-infra/ip-reputation-site-mappings/{mapping-id}
|
Create or update IP Reputation site mapping on GMCreate IP reputation site mapping for a specific site. IP reputation site mapping provides a way for the user to control the management of IP reputation based security policies from GM. Creation of site mapping for a site results in disabling IP reputation default security policies on sites. Post creation of the site mapping the global default security policies from GM gets pushed to the site. |
PUT /global-manager/api/v1/global-infra/ip-reputation-site-mappings/{mapping-id}
|
List Session Timer ProfilesAPI will list all Session Timer Profiles bindings. |
GET /global-manager/api/v1/global-infra/session-timer-profiles/{session-timer-profile-id}/bindings
|
List Firewall CPU Memory Thresholds Profile Binding MapsAPI will list all Firewall CPU Memory Thresholds Profile Binding Maps. |
GET /global-manager/api/v1/global-infra/settings/firewall/cpu-mem-thresholds-profile-binding-maps
|
Delete Firewall CPU Memory Thresholds Profile BindingAPI will delete Firewall CPU Memory Thresholds Profile Binding. |
DELETE /global-manager/api/v1/global-infra/settings/firewall/cpu-mem-thresholds-profile-binding-maps/{cpu-mem-thresholds-profile-binding-map-id}
|
List all CPU and memory thresholds profilesList all CPU and memory thresholds profiles. |
GET /global-manager/api/v1/global-infra/settings/firewall/cpu-mem-thresholds-profiles
|
Delete CPU and memory thresholds profileDelete CPU and memory thresholds profile. |
DELETE /global-manager/api/v1/global-infra/settings/firewall/cpu-mem-thresholds-profiles/{profile-id}
|
Read the CPU and memory thresholds profileRead the CPU and memory thresholds profile. |
GET /global-manager/api/v1/global-infra/settings/firewall/cpu-mem-thresholds-profiles/{profile-id}
|
Create or update CPU and memory thresholds profileCreate or update CPU and memory thresholds profile. |
PATCH /global-manager/api/v1/global-infra/settings/firewall/cpu-mem-thresholds-profiles/{profile-id}
|
Create or update CPU and memory thresholds profileCreate or update CPU and memory thresholds profile. |
PUT /global-manager/api/v1/global-infra/settings/firewall/cpu-mem-thresholds-profiles/{profile-id}
|
Get the information of export taskGet the information of the latest export task. |
GET /global-manager/api/v1/global-infra/settings/firewall/export
|
Download exported fileDownload the exported file generated from the last export task. The request should have proper headers set to download the file. Please add the below two headers, if it is not already present Accept application/json, text/plain, */* Accept-Encoding gzip, deflate, br |
GET /global-manager/api/v1/global-infra/settings/firewall/export?action=download
|
Invoke export taskInvoke export task. There can be only one export task run at any point of time. Hence invocation of another export task will be discarded, when there exist an already running export task. Exported configuration will be in a CSV format. This CSV file will be zipped into a ZIP file, that can be downloaded after the completion of export task. |
POST /global-manager/api/v1/global-infra/settings/firewall/export
|
Cancel a running export taskThis operation cancels an export task. Task needs to be in running state. |
POST /global-manager/api/v1/global-infra/settings/firewall/export?action=cancel
|
Get the list of gateway firewall dependent servicesGet the list of gateway firewall dependent services |
GET /global-manager/api/v1/global-infra/settings/firewall/gateway/dependent-services
|
Get all IDFW Group VM details for a given GroupGet all Identity Firewall Group VM details for a given Group. |
GET /global-manager/api/v1/global-infra/settings/firewall/idfw/group-vm-details
|
Get IDFW system statistics dataIt will get IDFW system statistics data. |
GET /global-manager/api/v1/global-infra/settings/firewall/idfw/system-stats
|
Get user session dataIt will get user session data. |
GET /global-manager/api/v1/global-infra/settings/firewall/idfw/user-session-data
|
Get IDFW user login events for a given VMIt will get IDFW user login events for a given VM (all active plus up to 5 most recent archived entries). |
GET /global-manager/api/v1/global-infra/settings/firewall/idfw/vm-stats/{vm-id}
|
Get the information of import taskGet the information of the latest import task. |
GET /global-manager/api/v1/global-infra/settings/firewall/import
|
Invoke import taskInvoke import task. There can be only one import task run at any point of time. Hence invocation of another import task will be discarded, when there exist an already running import task. |
POST /global-manager/api/v1/global-infra/settings/firewall/import
|
Cancel a running import taskThis operation cancels an import task. Task needs to be in running state. |
POST /global-manager/api/v1/global-infra/settings/firewall/import?action=cancel
|
Get dfw firewall configurationGet the current dfw firewall configurations. |
GET /global-manager/api/v1/global-infra/settings/firewall/security
|
Update dfw firewall configurationUpdate dfw firewall related configurations. Turning off distributed services ("enable_firewall": false) will turn off Distributed Firewall, Identity Firewall, Distributed Intrusion Detection and Prevention Service, Distributed Load Balancer. |
PATCH /global-manager/api/v1/global-infra/settings/firewall/security
|
Update dfw firewall configurationUpdate dfw firewall related configurations. Turning off distributed services ("enable_firewall": false) will turn off Distributed Firewall, Identity Firewall, Distributed Intrusion Detection and Prevention Service, Distributed Load Balancer. |
PUT /global-manager/api/v1/global-infra/settings/firewall/security
|
Get the list of distributed firewall dependent servicesGet the list of distributed firewall dependent services |
GET /global-manager/api/v1/global-infra/settings/firewall/security/dependent-services
|
Read security policy exclude listRead exclude list for firewall |
GET /global-manager/api/v1/global-infra/settings/firewall/security/exclude-list
|
Read security policy exclude list including system and user excluded membersRead security policy exclude list including system and user excluded members. |
GET /global-manager/api/v1/global-infra/settings/firewall/security/exclude-list?system_owned=true
|
Patch exclusion list for security policyPatch exclusion list for security policy. |
PATCH /global-manager/api/v1/global-infra/settings/firewall/security/exclude-list
|
Filter the firewall exclude listFilter the firewall exclude list by the given object, to check whether the object is a member of this exclude list. |
POST /global-manager/api/v1/global-infra/settings/firewall/security/exclude-list?action=filter
|
Create or update exclusion list for security policyUpdate the exclusion list for security policy |
PUT /global-manager/api/v1/global-infra/settings/firewall/security/exclude-list
|
Get Global IDS system settingsIntrusion detection system settings for GM. |
GET /global-manager/api/v1/global-infra/settings/firewall/security/global-intrusion-services
|
Patch Global Intrusion detection system settingsIntrusion detection system settings for GM. |
PATCH /global-manager/api/v1/global-infra/settings/firewall/security/global-intrusion-services
|
Update Global Intrusion detection system settingsIntrusion detection system settings for GM. |
PUT /global-manager/api/v1/global-infra/settings/firewall/security/global-intrusion-services
|
Get the list of gateways where an intrusion event was detectedGet the list of gateways where an intrusion event matching a signature was detected. |
POST /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/affected-ips
|
Get the list of the users affected for that signatureGet the list of the users affected pertaining to a specific signature. |
POST /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/affected-users
|
Get the list of the VMs affected for that signatureGet the list of the VMs affected pertaining to a specific signature. |
POST /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/affected-vms
|
List IDS cluster configsList intrusion detection system cluster configs. |
GET /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/cluster-configs
|
Read IDS cluster config.Read intrusion detection system cluster config |
GET /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/cluster-configs/{cluster-config-id}
|
List Global IDS signaturesList global intrusion detection signatures. |
GET /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/gsm/global-signatures
|
Delete Global IDS signatureDelete global intrusion detection signature. |
DELETE /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/gsm/global-signatures/{signature-id}
|
Get Global IDS signature.Read global intrusion detection signature |
GET /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/gsm/global-signatures/{signature-id}
|
Patch Global IDS SignaturePatch global intrusion detection system signature. |
PATCH /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/gsm/global-signatures/{signature-id}
|
create or update Global IDS SignatureUpdate global intrusion detection signature. |
PUT /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/gsm/global-signatures/{signature-id}
|
Get the list of the IDS events that are detected, grouped by signature id.Get the list of the IDS events that are detected with the total number of intrusions detected, their severity and the time they occurred, grouped by signature id. |
POST /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/ids-events
|
Get the summary of the intrusions that were detected.Get the summary of all the intrusions that are detected grouped by signature with details including signature name, id, severity, attack type, protocol, first and recent occurence, and affected users and VMs. The following filter criteria are supported: attack target, attack type, gateway name, IP address, product affected, signature ID and VM name. |
POST /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/ids-summary
|
List IDS PCAP file metadataList IDS PCAP file metadata. |
GET /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/pcaps
|
Download exported pcap fileDownload the exported pcap file generated from the export IdsPcapFile api. The request should have proper headers set to download the file. Please add the below two headers, if it is not already present Accept application/json, text/plain, */* Accept-Encoding gzip, deflate, br |
GET /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/pcaps/{file-name}/download
|
Delete the IDS Pcap FileDelete IDS Pcap file entry from corfu and from file system. |
DELETE /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/pcaps/{id}
|
Request the IDS Pcap File DownloadTrigger the process to collect all pcap files of all the pcap_ids mentioned in request payload. |
POST /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/pcaps/export
(Experimental)
|
This routine will list IDS profilesThis routine will list all IDS profiles present in system. |
GET /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/profiles
|
This routine will Delete existing IDS profileThis routine will delete IDS profile for provided profile id |
DELETE /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/profiles/{profile-id}
|
This routine will get existing IDS Profile .This routine will read intrusion detection profile for provided profile id |
GET /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/profiles/{profile-id}
|
This routine will create IDS profile.User can provide Profile Severity, Criteria and Override the Signature in the request |
PATCH /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/profiles/{profile-id}
|
This routine will create or update IDS profileThis routine will create or update IDS profile. User can provide Profile Severity, Criteria and can also Override the Signature in the request |
PUT /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/profiles/{profile-id}
|
Get IDS profile signatures.Get all the IDS signatures attached to the Profile. |
GET /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/profiles/{profile-id}/effective-signatures
(Experimental)
|
Get IDS signature versionsIntrusion detection system signature versions. |
GET /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/signature-versions
|
Upload and replace IDS signatures bundleUpload and replace IDS signatures bundle |
POST /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/signature-versions
|
Delete the IDS Signature Version along with signaturesDelete the IDS Sgnature version along with signatures on GM . |
DELETE /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/signature-versions/{version-id}
|
Get IDS signature versionIntrusion detection system signature version. |
GET /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/signature-versions/{version-id}
|
List IDS signaturesList intrusion detection system signatures. |
GET /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/signature-versions/{version-id}/signatures
|
Download and update IDS signaturesTrigger the process to Download and update the IDS signatures manually. |
POST /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/signatures?action=update_signatures
|
Upload IDS signatures bundleUpload IDS signatures bundle |
POST /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/signatures?action=upload_signatures
|
Get auto-update errors for airgapped sites.Get errors occurred during auto-update/update-now on airgapped sites. |
GET /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/signatures/airgapped-auto-update-errors
|
Get IDS signature statusIntrusion detection system signatures status. |
GET /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/signatures/status
|
List IDS signature version site mappings on GMList signature version site mappings on GM. |
GET /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/site-version-mappings
|
List IDS signature version site mappings on GMList signature version site mappings on GM. |
POST /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/site-version-mappings
|
Delete IDS signature version site mapping on GMDelete IDS signature version site mapping on GM. |
DELETE /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/site-version-mappings/{mapping-id}
|
Read IDS signature version site mapping on GMRead IDS signature version site mapping on GM |
GET /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/site-version-mappings/{mapping-id}
|
Patch IDS signature version site mapping on GMPatch IDS signature version site mapping on GM |
PATCH /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/site-version-mappings/{mapping-id}
|
Create or update IDS signature version site mapping on GMCreate or update IDS signature version site mapping on GM |
PUT /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/site-version-mappings/{mapping-id}
|
Reset IDS-IPS rule statisticsSets IDS-IPS rule statistics counter to zero. - no enforcement point path specified: Reset of stats will be executed for each enforcement point. - {enforcement_point_path}: Reset of stats will be executed only for the given enforcement point. |
POST /global-manager/api/v1/global-infra/settings/firewall/security/intrusion-services/stats?action=reset
|
Reset firewall rule statisticsSets firewall rule statistics counter to zero. This operation is supported for given category, for example: DFW i.e. for all layer3 firewall (transport nodes only) rules or EDGE i.e. for all layer3 edge firewall (edge nodes only) rules. - no enforcement point path specified: On global manager, it is mandatory to give an enforcement point path. On local manager, reset of stats will be executed for each enforcement point. - {enforcement_point_path}: Reset of stats will be executed only for the given enforcement point. |
POST /global-manager/api/v1/global-infra/settings/firewall/stats?action=reset
|
Get list of gateway policies with rules that belong to the specific Tier-0 logical router.Get filtered view of gateway rules associated with the Tier-0. The gateay policies are returned in the order of category and precedence. |
GET /global-manager/api/v1/global-infra/tier-0s/{tier-0-id}/gateway-firewall
|
Get list of gateway policies with rules that belong to the specific Tier-0 LocalServices.Get filtered view of Gateway Firewall rules associated with the Tier-0 Locale Services. The gateway policies are returned in the order of category and sequence number. |
GET /global-manager/api/v1/global-infra/tier-0s/{tier-0-id}/locale-services/{locale-services-id}/gateway-firewall
|
Delete security configAPI has been deprecated as the delete of Tier0SecurityConfig is linked with the deletion of T0. To remove a particular feature from T0SecurityConfig please use PUT/PATCH. |
DELETE /global-manager/api/v1/global-infra/tier-0s/{tier-0-id}/security-config
(Deprecated)
|
Read Security FeatureRead Security Feature. |
GET /global-manager/api/v1/global-infra/tier-0s/{tier-0-id}/security-config
|
Create or Update security configurationCreate a T0 security configuration if it is not already present, otherwise update the security configuration. |
PATCH /global-manager/api/v1/global-infra/tier-0s/{tier-0-id}/security-config
|
Create or Update security configurationCreate or update security configuration. |
PUT /global-manager/api/v1/global-infra/tier-0s/{tier-0-id}/security-config
|
Delete Flood Protection Profile Binding for Tier-0 Logical RouterAPI will delete Flood Protection Profile Binding for Tier-0 Logical Router. |
DELETE /global-manager/api/v1/global-infra/tier-0s/{tier0-id}/flood-protection-profile-bindings/{flood-protection-profile-binding-id}
|
Get Flood Protection Profile Binding Map for Tier-0 Logical RouterAPI will get Flood Protection Profile Binding Map for Tier-0 Logical Router. |
GET /global-manager/api/v1/global-infra/tier-0s/{tier0-id}/flood-protection-profile-bindings/{flood-protection-profile-binding-id}
|
Create or update Flood Protection Profile Binding Map for Tier-0 Logical RouterAPI will create or update Flood Protection profile binding map for Tier-0 Logical Router. |
PATCH /global-manager/api/v1/global-infra/tier-0s/{tier0-id}/flood-protection-profile-bindings/{flood-protection-profile-binding-id}
|
Create or update Flood Protection Profile Binding Map for Tier-0 Logical RouterAPI will create or update Flood Protection profile binding map for Tier-0 Logical Router. |
PUT /global-manager/api/v1/global-infra/tier-0s/{tier0-id}/flood-protection-profile-bindings/{flood-protection-profile-binding-id}
|
Delete Flood Protection Profile Binding for Tier-0 Logical Router LocaleServicesAPI will delete Flood Protection Profile Binding for Tier-0 Logical Router LocaleServices. |
DELETE /global-manager/api/v1/global-infra/tier-0s/{tier0-id}/locale-services/{locale-services-id}/flood-protection-profile-bindings/{flood-protection-profile-binding-id}
|
Get Flood Protection Profile Binding Map for Tier-0 Logical Router LocaleServicesAPI will get Flood Protection Profile Binding Map for Tier-0 Logical Router LocaleServices. |
GET /global-manager/api/v1/global-infra/tier-0s/{tier0-id}/locale-services/{locale-services-id}/flood-protection-profile-bindings/{flood-protection-profile-binding-id}
|
Create or update Flood Protection Profile Binding Map for Tier-0 Logical Router LocaleServicesAPI will create or update Flood Protection profile binding map for Tier-0 Logical Router LocaleServices. |
PATCH /global-manager/api/v1/global-infra/tier-0s/{tier0-id}/locale-services/{locale-services-id}/flood-protection-profile-bindings/{flood-protection-profile-binding-id}
|
Create or update Flood Protection Profile Binding Map for Tier-0 Logical Router LocaleServicesAPI will create or update Flood Protection profile binding map for Tier-0 Logical Router LocaleServices. |
PUT /global-manager/api/v1/global-infra/tier-0s/{tier0-id}/locale-services/{locale-services-id}/flood-protection-profile-bindings/{flood-protection-profile-binding-id}
|
Delete Session Timer Profile Binding for Tier-0 Logical Router LocaleServicesAPI will delete Session Timer Profile Binding for Tier-0 Logical Router LocaleServices. |
DELETE /global-manager/api/v1/global-infra/tier-0s/{tier0-id}/locale-services/{locale-services-id}/session-timer-profile-bindings/{session-timer-profile-binding-id}
|
Get Session Timer Profile Binding Map for Tier-0 Logical Router LocaleServicesAPI will get Session Timer Profile Binding Map for Tier-0 Logical Router LocaleServices. |
GET /global-manager/api/v1/global-infra/tier-0s/{tier0-id}/locale-services/{locale-services-id}/session-timer-profile-bindings/{session-timer-profile-binding-id}
|
Create or update Session Timer Profile Binding Map for Tier-0 Logical Router LocaleServicesAPI will create or update Session Timer profile binding map for Tier-0 Logical Router LocaleServices. |
PATCH /global-manager/api/v1/global-infra/tier-0s/{tier0-id}/locale-services/{locale-services-id}/session-timer-profile-bindings/{session-timer-profile-binding-id}
|
Create or update Session Timer Profile Binding Map for Tier-0 Logical Router LocaleServicesAPI will create or update Session Timer profile binding map for Tier-0 Logical Router LocaleServices. |
PUT /global-manager/api/v1/global-infra/tier-0s/{tier0-id}/locale-services/{locale-services-id}/session-timer-profile-bindings/{session-timer-profile-binding-id}
|
Delete Session Timer Profile Binding for Tier-0 Logical RouterAPI will delete Session Timer Profile Binding for Tier-0 Logical Router. |
DELETE /global-manager/api/v1/global-infra/tier-0s/{tier0-id}/session-timer-profile-bindings/{session-timer-profile-binding-id}
|
Get Session Timer Profile Binding Map for Tier-0 Logical RouterAPI will get Session Timer Profile Binding Map for Tier-0 Logical Router. |
GET /global-manager/api/v1/global-infra/tier-0s/{tier0-id}/session-timer-profile-bindings/{session-timer-profile-binding-id}
|
Create or update Session Timer Profile Binding Map for Tier-0 Logical RouterAPI will create or update Session Timer profile binding map for Tier-0 Logical Router. |
PATCH /global-manager/api/v1/global-infra/tier-0s/{tier0-id}/session-timer-profile-bindings/{session-timer-profile-binding-id}
|
Create or update Session Timer Profile Binding Map for Tier-0 Logical RouterAPI will create or update Session Timer profile binding map for Tier-0 Logical Router. |
PUT /global-manager/api/v1/global-infra/tier-0s/{tier0-id}/session-timer-profile-bindings/{session-timer-profile-binding-id}
|
Get list of gateway policies with rules that belong to the specific Tier-1.Get filtered view of Gateway Firewall rules associated with the Tier-1. The gateway policies are returned in the order of category and sequence number. |
GET /global-manager/api/v1/global-infra/tier-1s/{tier-1-id}/gateway-firewall
|
Get list of gateway policies with rules that belong to the specific Tier-1 LocalServices.Get filtered view of Gateway Firewall rules associated with the Tier-1 Locale Services. The gateway policies are returned in the order of category and sequence number. |
GET /global-manager/api/v1/global-infra/tier-1s/{tier-1-id}/locale-services/{locale-services-id}/gateway-firewall
|
Read Security FeatureRead Security Feature. |
GET /global-manager/api/v1/global-infra/tier-1s/{tier-1-id}/security-config
|
Create or Update security configurationCreate a security configuration if it is not already present, otherwise update the security configuration. |
PATCH /global-manager/api/v1/global-infra/tier-1s/{tier-1-id}/security-config
|
Create or Update security configurationCreate or update security configuration. |
PUT /global-manager/api/v1/global-infra/tier-1s/{tier-1-id}/security-config
|
Delete Flood Protection Profile Binding for Tier-1 Logical RouterAPI will delete Flood Protection Profile Binding for Tier-1 Logical Router. |
DELETE /global-manager/api/v1/global-infra/tier-1s/{tier1-id}/flood-protection-profile-bindings/{flood-protection-profile-binding-id}
|
Get Flood Protection Profile Binding Map for Tier-1 Logical RouterAPI will get Flood Protection Profile Binding Map for Tier-1 Logical Router. |
GET /global-manager/api/v1/global-infra/tier-1s/{tier1-id}/flood-protection-profile-bindings/{flood-protection-profile-binding-id}
|
Create or update Flood Protection Profile Binding Map for Tier-1 Logical RouterAPI will create or update Flood Protection profile binding map for Tier-1 Logical Router. |
PATCH /global-manager/api/v1/global-infra/tier-1s/{tier1-id}/flood-protection-profile-bindings/{flood-protection-profile-binding-id}
|
Create or update Flood Protection Profile Binding Map for Tier-1 Logical RouterAPI will create or update Flood Protection profile binding map for Tier-1 Logical Router. |
PUT /global-manager/api/v1/global-infra/tier-1s/{tier1-id}/flood-protection-profile-bindings/{flood-protection-profile-binding-id}
|
Delete Flood Protection Profile Binding for Tier-1 Logical Router LocaleServicesAPI will delete Flood Protection Profile Binding for Tier-1 Logical Router LocaleServices. |
DELETE /global-manager/api/v1/global-infra/tier-1s/{tier1-id}/locale-services/{locale-services-id}/flood-protection-profile-bindings/{flood-protection-profile-binding-id}
|
Get Flood Protection Profile Binding Map for Tier-1 Logical Router LocaleServicesAPI will get Flood Protection Profile Binding Map for Tier-1 Logical Router LocaleServices. |
GET /global-manager/api/v1/global-infra/tier-1s/{tier1-id}/locale-services/{locale-services-id}/flood-protection-profile-bindings/{flood-protection-profile-binding-id}
|
Create or update Flood Protection Profile Binding Map for Tier-1 Logical Router LocaleServicesAPI will create or update Flood Protection profile binding map for Tier-1 Logical Router LocaleServices. |
PATCH /global-manager/api/v1/global-infra/tier-1s/{tier1-id}/locale-services/{locale-services-id}/flood-protection-profile-bindings/{flood-protection-profile-binding-id}
|
Create or update Flood Protection Profile Binding Map for Tier-1 Logical Router LocaleServicesAPI will create or update Flood Protection profile binding map for Tier-1 Logical Router LocaleServices. |
PUT /global-manager/api/v1/global-infra/tier-1s/{tier1-id}/locale-services/{locale-services-id}/flood-protection-profile-bindings/{flood-protection-profile-binding-id}
|
Delete Session Timer Profile Binding for Tier-1 Logical Router LocaleServicesAPI will delete Session Timer Profile Binding for Tier-1 Logical Router LocaleServices. |
DELETE /global-manager/api/v1/global-infra/tier-1s/{tier1-id}/locale-services/{locale-services-id}/session-timer-profile-bindings/{session-timer-profile-binding-id}
|
Get Session Timer Profile Binding Map for Tier-1 Logical Router LocaleServicesAPI will get Session Timer Profile Binding Map for Tier-1 Logical Router LocaleServices. |
GET /global-manager/api/v1/global-infra/tier-1s/{tier1-id}/locale-services/{locale-services-id}/session-timer-profile-bindings/{session-timer-profile-binding-id}
|
Create or update Session Timer Profile Binding Map for Tier-1 Logical Router LocaleServicesAPI will create or update Session Timer profile binding map for Tier-1 Logical Router LocaleServices. |
PATCH /global-manager/api/v1/global-infra/tier-1s/{tier1-id}/locale-services/{locale-services-id}/session-timer-profile-bindings/{session-timer-profile-binding-id}
|
Create or update Session Timer Profile Binding Map for Tier-1 Logical Router LocaleServicesAPI will create or update Session Timer profile binding map for Tier-1 Logical Router LocaleServices. |
PUT /global-manager/api/v1/global-infra/tier-1s/{tier1-id}/locale-services/{locale-services-id}/session-timer-profile-bindings/{session-timer-profile-binding-id}
|
Delete Session Timer Profile Binding for Tier-1 Logical RouterAPI will delete Session Timer Profile Binding for Tier-1 Logical Router. |
DELETE /global-manager/api/v1/global-infra/tier-1s/{tier1-id}/session-timer-profile-bindings/{session-timer-profile-binding-id}
|
Get Session Timer Profile Binding Map for Tier-1 Logical RouterAPI will get Session Timer Profile Binding Map for Tier-1 Logical Router. |
GET /global-manager/api/v1/global-infra/tier-1s/{tier1-id}/session-timer-profile-bindings/{session-timer-profile-binding-id}
|
Create or update Session Timer Profile Binding Map for Tier-1 Logical RouterAPI will create or update Session Timer profile binding map for Tier-1 Logical Router. |
PATCH /global-manager/api/v1/global-infra/tier-1s/{tier1-id}/session-timer-profile-bindings/{session-timer-profile-binding-id}
|
Create or update Session Timer Profile Binding Map for Tier-1 Logical RouterAPI will create or update Session Timer profile binding map for Tier-1 Logical Router. |
PUT /global-manager/api/v1/global-infra/tier-1s/{tier1-id}/session-timer-profile-bindings/{session-timer-profile-binding-id}
|
Additional
Links