1. Packages
  2. Fortimanager Provider
  3. API Docs
  4. ObjectFirewallProfileprotocoloptionsCifs
fortimanager 1.13.0 published on Thursday, Mar 13, 2025 by fortinetdev

fortimanager.ObjectFirewallProfileprotocoloptionsCifs

Explore with Pulumi AI

Configure CIFS protocol options.

This resource is a sub resource for variable cifs of resource fortimanager.ObjectFirewallProfileprotocoloptions. Conflict and overwrite may occur if use both of them. The following variables have sub resource. Avoid using them together, otherwise conflicts and overwrites may occur.

  • file_filter: fortimanager_object_firewall_profileprotocoloptions_cifs_filefilter
  • server_keytab: fortimanager.ObjectFirewallProfileprotocoloptionsCifsServerkeytab

Example Usage

import * as pulumi from "@pulumi/pulumi";
import * as fortimanager from "@pulumi/fortimanager";

const trnameObjectFirewallProfileprotocoloptions = new fortimanager.ObjectFirewallProfileprotocoloptions("trnameObjectFirewallProfileprotocoloptions", {});
const trnameObjectFirewallProfileprotocoloptionsCifs = new fortimanager.ObjectFirewallProfileprotocoloptionsCifs("trnameObjectFirewallProfileprotocoloptionsCifs", {
    profileProtocolOptions: trnameObjectFirewallProfileprotocoloptions.name,
    options: ["oversize"],
    oversizeLimit: 200,
    ports: [445],
}, {
    dependsOn: [trnameObjectFirewallProfileprotocoloptions],
});
Copy
import pulumi
import pulumi_fortimanager as fortimanager

trname_object_firewall_profileprotocoloptions = fortimanager.ObjectFirewallProfileprotocoloptions("trnameObjectFirewallProfileprotocoloptions")
trname_object_firewall_profileprotocoloptions_cifs = fortimanager.ObjectFirewallProfileprotocoloptionsCifs("trnameObjectFirewallProfileprotocoloptionsCifs",
    profile_protocol_options=trname_object_firewall_profileprotocoloptions.name,
    options=["oversize"],
    oversize_limit=200,
    ports=[445],
    opts = pulumi.ResourceOptions(depends_on=[trname_object_firewall_profileprotocoloptions]))
Copy
package main

import (
	"github.com/pulumi/pulumi-terraform-provider/sdks/go/fortimanager/fortimanager"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)

func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		trnameObjectFirewallProfileprotocoloptions, err := fortimanager.NewObjectFirewallProfileprotocoloptions(ctx, "trnameObjectFirewallProfileprotocoloptions", nil)
		if err != nil {
			return err
		}
		_, err = fortimanager.NewObjectFirewallProfileprotocoloptionsCifs(ctx, "trnameObjectFirewallProfileprotocoloptionsCifs", &fortimanager.ObjectFirewallProfileprotocoloptionsCifsArgs{
			ProfileProtocolOptions: trnameObjectFirewallProfileprotocoloptions.Name,
			Options: pulumi.StringArray{
				pulumi.String("oversize"),
			},
			OversizeLimit: pulumi.Float64(200),
			Ports: pulumi.Float64Array{
				pulumi.Float64(445),
			},
		}, pulumi.DependsOn([]pulumi.Resource{
			trnameObjectFirewallProfileprotocoloptions,
		}))
		if err != nil {
			return err
		}
		return nil
	})
}
Copy
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Fortimanager = Pulumi.Fortimanager;

return await Deployment.RunAsync(() => 
{
    var trnameObjectFirewallProfileprotocoloptions = new Fortimanager.ObjectFirewallProfileprotocoloptions("trnameObjectFirewallProfileprotocoloptions");

    var trnameObjectFirewallProfileprotocoloptionsCifs = new Fortimanager.ObjectFirewallProfileprotocoloptionsCifs("trnameObjectFirewallProfileprotocoloptionsCifs", new()
    {
        ProfileProtocolOptions = trnameObjectFirewallProfileprotocoloptions.Name,
        Options = new[]
        {
            "oversize",
        },
        OversizeLimit = 200,
        Ports = new[]
        {
            445,
        },
    }, new CustomResourceOptions
    {
        DependsOn =
        {
            trnameObjectFirewallProfileprotocoloptions,
        },
    });

});
Copy
package generated_program;

import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.fortimanager.ObjectFirewallProfileprotocoloptions;
import com.pulumi.fortimanager.ObjectFirewallProfileprotocoloptionsCifs;
import com.pulumi.fortimanager.ObjectFirewallProfileprotocoloptionsCifsArgs;
import com.pulumi.resources.CustomResourceOptions;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;

public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }

    public static void stack(Context ctx) {
        var trnameObjectFirewallProfileprotocoloptions = new ObjectFirewallProfileprotocoloptions("trnameObjectFirewallProfileprotocoloptions");

        var trnameObjectFirewallProfileprotocoloptionsCifs = new ObjectFirewallProfileprotocoloptionsCifs("trnameObjectFirewallProfileprotocoloptionsCifs", ObjectFirewallProfileprotocoloptionsCifsArgs.builder()
            .profileProtocolOptions(trnameObjectFirewallProfileprotocoloptions.name())
            .options("oversize")
            .oversizeLimit(200)
            .ports(445)
            .build(), CustomResourceOptions.builder()
                .dependsOn(trnameObjectFirewallProfileprotocoloptions)
                .build());

    }
}
Copy
resources:
  trnameObjectFirewallProfileprotocoloptionsCifs:
    type: fortimanager:ObjectFirewallProfileprotocoloptionsCifs
    properties:
      profileProtocolOptions: ${trnameObjectFirewallProfileprotocoloptions.name}
      options:
        - oversize
      oversizeLimit: 200
      ports:
        - 445
    options:
      dependsOn:
        - ${trnameObjectFirewallProfileprotocoloptions}
  trnameObjectFirewallProfileprotocoloptions:
    type: fortimanager:ObjectFirewallProfileprotocoloptions
Copy

Create ObjectFirewallProfileprotocoloptionsCifs Resource

Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

Constructor syntax

new ObjectFirewallProfileprotocoloptionsCifs(name: string, args: ObjectFirewallProfileprotocoloptionsCifsArgs, opts?: CustomResourceOptions);
@overload
def ObjectFirewallProfileprotocoloptionsCifs(resource_name: str,
                                             args: ObjectFirewallProfileprotocoloptionsCifsInitArgs,
                                             opts: Optional[ResourceOptions] = None)

@overload
def ObjectFirewallProfileprotocoloptionsCifs(resource_name: str,
                                             opts: Optional[ResourceOptions] = None,
                                             profile_protocol_options: Optional[str] = None,
                                             scopetype: Optional[str] = None,
                                             uncompressed_oversize_limit: Optional[float] = None,
                                             scan_bzip2: Optional[str] = None,
                                             object_firewall_profileprotocoloptions_cifs_id: Optional[str] = None,
                                             options: Optional[Sequence[str]] = None,
                                             oversize_limit: Optional[float] = None,
                                             ports: Optional[Sequence[float]] = None,
                                             domain_controller: Optional[str] = None,
                                             file_filter: Optional[ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs] = None,
                                             dynamic_sort_subtable: Optional[str] = None,
                                             server_keytabs: Optional[Sequence[ObjectFirewallProfileprotocoloptionsCifsServerKeytabArgs]] = None,
                                             server_credential_type: Optional[str] = None,
                                             status: Optional[str] = None,
                                             tcp_window_maximum: Optional[float] = None,
                                             tcp_window_minimum: Optional[float] = None,
                                             tcp_window_size: Optional[float] = None,
                                             tcp_window_type: Optional[str] = None,
                                             uncompressed_nest_limit: Optional[float] = None,
                                             adom: Optional[str] = None)
func NewObjectFirewallProfileprotocoloptionsCifs(ctx *Context, name string, args ObjectFirewallProfileprotocoloptionsCifsArgs, opts ...ResourceOption) (*ObjectFirewallProfileprotocoloptionsCifs, error)
public ObjectFirewallProfileprotocoloptionsCifs(string name, ObjectFirewallProfileprotocoloptionsCifsArgs args, CustomResourceOptions? opts = null)
public ObjectFirewallProfileprotocoloptionsCifs(String name, ObjectFirewallProfileprotocoloptionsCifsArgs args)
public ObjectFirewallProfileprotocoloptionsCifs(String name, ObjectFirewallProfileprotocoloptionsCifsArgs args, CustomResourceOptions options)
type: fortimanager:ObjectFirewallProfileprotocoloptionsCifs
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.

Parameters

name This property is required. string
The unique name of the resource.
args This property is required. ObjectFirewallProfileprotocoloptionsCifsArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
resource_name This property is required. str
The unique name of the resource.
args This property is required. ObjectFirewallProfileprotocoloptionsCifsInitArgs
The arguments to resource properties.
opts ResourceOptions
Bag of options to control resource's behavior.
ctx Context
Context object for the current deployment.
name This property is required. string
The unique name of the resource.
args This property is required. ObjectFirewallProfileprotocoloptionsCifsArgs
The arguments to resource properties.
opts ResourceOption
Bag of options to control resource's behavior.
name This property is required. string
The unique name of the resource.
args This property is required. ObjectFirewallProfileprotocoloptionsCifsArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
name This property is required. String
The unique name of the resource.
args This property is required. ObjectFirewallProfileprotocoloptionsCifsArgs
The arguments to resource properties.
options CustomResourceOptions
Bag of options to control resource's behavior.

Constructor example

The following reference example uses placeholder values for all input properties.

var objectFirewallProfileprotocoloptionsCifsResource = new Fortimanager.ObjectFirewallProfileprotocoloptionsCifs("objectFirewallProfileprotocoloptionsCifsResource", new()
{
    ProfileProtocolOptions = "string",
    Scopetype = "string",
    UncompressedOversizeLimit = 0,
    ScanBzip2 = "string",
    ObjectFirewallProfileprotocoloptionsCifsId = "string",
    Options = new[]
    {
        "string",
    },
    OversizeLimit = 0,
    Ports = new[]
    {
        0,
    },
    DomainController = "string",
    FileFilter = new Fortimanager.Inputs.ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs
    {
        Entries = new[]
        {
            new Fortimanager.Inputs.ObjectFirewallProfileprotocoloptionsCifsFileFilterEntryArgs
            {
                Action = "string",
                Comment = "string",
                Direction = "string",
                FileTypes = new[]
                {
                    "string",
                },
                Filter = "string",
                Protocols = new[]
                {
                    "string",
                },
            },
        },
        Log = "string",
        Status = "string",
    },
    DynamicSortSubtable = "string",
    ServerKeytabs = new[]
    {
        new Fortimanager.Inputs.ObjectFirewallProfileprotocoloptionsCifsServerKeytabArgs
        {
            Keytab = "string",
            Passwords = new[]
            {
                "string",
            },
            Principal = "string",
        },
    },
    ServerCredentialType = "string",
    Status = "string",
    TcpWindowMaximum = 0,
    TcpWindowMinimum = 0,
    TcpWindowSize = 0,
    TcpWindowType = "string",
    UncompressedNestLimit = 0,
    Adom = "string",
});
Copy
example, err := fortimanager.NewObjectFirewallProfileprotocoloptionsCifs(ctx, "objectFirewallProfileprotocoloptionsCifsResource", &fortimanager.ObjectFirewallProfileprotocoloptionsCifsArgs{
ProfileProtocolOptions: pulumi.String("string"),
Scopetype: pulumi.String("string"),
UncompressedOversizeLimit: pulumi.Float64(0),
ScanBzip2: pulumi.String("string"),
ObjectFirewallProfileprotocoloptionsCifsId: pulumi.String("string"),
Options: pulumi.StringArray{
pulumi.String("string"),
},
OversizeLimit: pulumi.Float64(0),
Ports: pulumi.Float64Array{
pulumi.Float64(0),
},
DomainController: pulumi.String("string"),
FileFilter: &.ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs{
Entries: .ObjectFirewallProfileprotocoloptionsCifsFileFilterEntryArray{
&.ObjectFirewallProfileprotocoloptionsCifsFileFilterEntryArgs{
Action: pulumi.String("string"),
Comment: pulumi.String("string"),
Direction: pulumi.String("string"),
FileTypes: pulumi.StringArray{
pulumi.String("string"),
},
Filter: pulumi.String("string"),
Protocols: pulumi.StringArray{
pulumi.String("string"),
},
},
},
Log: pulumi.String("string"),
Status: pulumi.String("string"),
},
DynamicSortSubtable: pulumi.String("string"),
ServerKeytabs: .ObjectFirewallProfileprotocoloptionsCifsServerKeytabTypeArray{
&.ObjectFirewallProfileprotocoloptionsCifsServerKeytabTypeArgs{
Keytab: pulumi.String("string"),
Passwords: pulumi.StringArray{
pulumi.String("string"),
},
Principal: pulumi.String("string"),
},
},
ServerCredentialType: pulumi.String("string"),
Status: pulumi.String("string"),
TcpWindowMaximum: pulumi.Float64(0),
TcpWindowMinimum: pulumi.Float64(0),
TcpWindowSize: pulumi.Float64(0),
TcpWindowType: pulumi.String("string"),
UncompressedNestLimit: pulumi.Float64(0),
Adom: pulumi.String("string"),
})
Copy
var objectFirewallProfileprotocoloptionsCifsResource = new ObjectFirewallProfileprotocoloptionsCifs("objectFirewallProfileprotocoloptionsCifsResource", ObjectFirewallProfileprotocoloptionsCifsArgs.builder()
    .profileProtocolOptions("string")
    .scopetype("string")
    .uncompressedOversizeLimit(0)
    .scanBzip2("string")
    .objectFirewallProfileprotocoloptionsCifsId("string")
    .options("string")
    .oversizeLimit(0)
    .ports(0)
    .domainController("string")
    .fileFilter(ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs.builder()
        .entries(ObjectFirewallProfileprotocoloptionsCifsFileFilterEntryArgs.builder()
            .action("string")
            .comment("string")
            .direction("string")
            .fileTypes("string")
            .filter("string")
            .protocols("string")
            .build())
        .log("string")
        .status("string")
        .build())
    .dynamicSortSubtable("string")
    .serverKeytabs(ObjectFirewallProfileprotocoloptionsCifsServerKeytabArgs.builder()
        .keytab("string")
        .passwords("string")
        .principal("string")
        .build())
    .serverCredentialType("string")
    .status("string")
    .tcpWindowMaximum(0)
    .tcpWindowMinimum(0)
    .tcpWindowSize(0)
    .tcpWindowType("string")
    .uncompressedNestLimit(0)
    .adom("string")
    .build());
Copy
object_firewall_profileprotocoloptions_cifs_resource = fortimanager.ObjectFirewallProfileprotocoloptionsCifs("objectFirewallProfileprotocoloptionsCifsResource",
    profile_protocol_options="string",
    scopetype="string",
    uncompressed_oversize_limit=0,
    scan_bzip2="string",
    object_firewall_profileprotocoloptions_cifs_id="string",
    options=["string"],
    oversize_limit=0,
    ports=[0],
    domain_controller="string",
    file_filter={
        "entries": [{
            "action": "string",
            "comment": "string",
            "direction": "string",
            "file_types": ["string"],
            "filter": "string",
            "protocols": ["string"],
        }],
        "log": "string",
        "status": "string",
    },
    dynamic_sort_subtable="string",
    server_keytabs=[{
        "keytab": "string",
        "passwords": ["string"],
        "principal": "string",
    }],
    server_credential_type="string",
    status="string",
    tcp_window_maximum=0,
    tcp_window_minimum=0,
    tcp_window_size=0,
    tcp_window_type="string",
    uncompressed_nest_limit=0,
    adom="string")
Copy
const objectFirewallProfileprotocoloptionsCifsResource = new fortimanager.ObjectFirewallProfileprotocoloptionsCifs("objectFirewallProfileprotocoloptionsCifsResource", {
    profileProtocolOptions: "string",
    scopetype: "string",
    uncompressedOversizeLimit: 0,
    scanBzip2: "string",
    objectFirewallProfileprotocoloptionsCifsId: "string",
    options: ["string"],
    oversizeLimit: 0,
    ports: [0],
    domainController: "string",
    fileFilter: {
        entries: [{
            action: "string",
            comment: "string",
            direction: "string",
            fileTypes: ["string"],
            filter: "string",
            protocols: ["string"],
        }],
        log: "string",
        status: "string",
    },
    dynamicSortSubtable: "string",
    serverKeytabs: [{
        keytab: "string",
        passwords: ["string"],
        principal: "string",
    }],
    serverCredentialType: "string",
    status: "string",
    tcpWindowMaximum: 0,
    tcpWindowMinimum: 0,
    tcpWindowSize: 0,
    tcpWindowType: "string",
    uncompressedNestLimit: 0,
    adom: "string",
});
Copy
type: fortimanager:ObjectFirewallProfileprotocoloptionsCifs
properties:
    adom: string
    domainController: string
    dynamicSortSubtable: string
    fileFilter:
        entries:
            - action: string
              comment: string
              direction: string
              fileTypes:
                - string
              filter: string
              protocols:
                - string
        log: string
        status: string
    objectFirewallProfileprotocoloptionsCifsId: string
    options:
        - string
    oversizeLimit: 0
    ports:
        - 0
    profileProtocolOptions: string
    scanBzip2: string
    scopetype: string
    serverCredentialType: string
    serverKeytabs:
        - keytab: string
          passwords:
            - string
          principal: string
    status: string
    tcpWindowMaximum: 0
    tcpWindowMinimum: 0
    tcpWindowSize: 0
    tcpWindowType: string
    uncompressedNestLimit: 0
    uncompressedOversizeLimit: 0
Copy

ObjectFirewallProfileprotocoloptionsCifs Resource Properties

To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

Inputs

In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

The ObjectFirewallProfileprotocoloptionsCifs resource accepts the following input properties:

ProfileProtocolOptions This property is required. string
Profile Protocol Options.
Adom string
Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
DomainController string
Domain for which to decrypt CIFS traffic.
DynamicSortSubtable string
true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
FileFilter ObjectFirewallProfileprotocoloptionsCifsFileFilter
File-Filter. The structure of file_filter block is documented below.
ObjectFirewallProfileprotocoloptionsCifsId string
an identifier for the resource.
Options List<string>
One or more options that can be applied to the session. Valid values: oversize.
OversizeLimit double
Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
Ports List<double>
Ports to scan for content (1 - 65535, default = 445).
ScanBzip2 string
Enable/disable scanning of BZip2 compressed files. Valid values: disable, enable.
Scopetype string
The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
ServerCredentialType string
CIFS server credential type. Valid values: none, credential-replication, credential-keytab.
ServerKeytabs List<ObjectFirewallProfileprotocoloptionsCifsServerKeytab>
Server-Keytab. The structure of server_keytab block is documented below.
Status string
Enable/disable the active status of scanning for this protocol. Valid values: disable, enable.
TcpWindowMaximum double
Maximum dynamic TCP window size (default = 8MB).
TcpWindowMinimum double
Minimum dynamic TCP window size (default = 128KB).
TcpWindowSize double
Set TCP static window size (default = 256KB).
TcpWindowType string
Specify type of TCP window to use for this protocol. Valid values: system, static, dynamic.
UncompressedNestLimit double
Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
UncompressedOversizeLimit double
Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
ProfileProtocolOptions This property is required. string
Profile Protocol Options.
Adom string
Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
DomainController string
Domain for which to decrypt CIFS traffic.
DynamicSortSubtable string
true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
FileFilter ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs
File-Filter. The structure of file_filter block is documented below.
ObjectFirewallProfileprotocoloptionsCifsId string
an identifier for the resource.
Options []string
One or more options that can be applied to the session. Valid values: oversize.
OversizeLimit float64
Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
Ports []float64
Ports to scan for content (1 - 65535, default = 445).
ScanBzip2 string
Enable/disable scanning of BZip2 compressed files. Valid values: disable, enable.
Scopetype string
The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
ServerCredentialType string
CIFS server credential type. Valid values: none, credential-replication, credential-keytab.
ServerKeytabs []ObjectFirewallProfileprotocoloptionsCifsServerKeytabTypeArgs
Server-Keytab. The structure of server_keytab block is documented below.
Status string
Enable/disable the active status of scanning for this protocol. Valid values: disable, enable.
TcpWindowMaximum float64
Maximum dynamic TCP window size (default = 8MB).
TcpWindowMinimum float64
Minimum dynamic TCP window size (default = 128KB).
TcpWindowSize float64
Set TCP static window size (default = 256KB).
TcpWindowType string
Specify type of TCP window to use for this protocol. Valid values: system, static, dynamic.
UncompressedNestLimit float64
Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
UncompressedOversizeLimit float64
Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
profileProtocolOptions This property is required. String
Profile Protocol Options.
adom String
Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
domainController String
Domain for which to decrypt CIFS traffic.
dynamicSortSubtable String
true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
fileFilter ObjectFirewallProfileprotocoloptionsCifsFileFilter
File-Filter. The structure of file_filter block is documented below.
objectFirewallProfileprotocoloptionsCifsId String
an identifier for the resource.
options List<String>
One or more options that can be applied to the session. Valid values: oversize.
oversizeLimit Double
Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
ports List<Double>
Ports to scan for content (1 - 65535, default = 445).
scanBzip2 String
Enable/disable scanning of BZip2 compressed files. Valid values: disable, enable.
scopetype String
The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
serverCredentialType String
CIFS server credential type. Valid values: none, credential-replication, credential-keytab.
serverKeytabs List<ObjectFirewallProfileprotocoloptionsCifsServerKeytab>
Server-Keytab. The structure of server_keytab block is documented below.
status String
Enable/disable the active status of scanning for this protocol. Valid values: disable, enable.
tcpWindowMaximum Double
Maximum dynamic TCP window size (default = 8MB).
tcpWindowMinimum Double
Minimum dynamic TCP window size (default = 128KB).
tcpWindowSize Double
Set TCP static window size (default = 256KB).
tcpWindowType String
Specify type of TCP window to use for this protocol. Valid values: system, static, dynamic.
uncompressedNestLimit Double
Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
uncompressedOversizeLimit Double
Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
profileProtocolOptions This property is required. string
Profile Protocol Options.
adom string
Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
domainController string
Domain for which to decrypt CIFS traffic.
dynamicSortSubtable string
true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
fileFilter ObjectFirewallProfileprotocoloptionsCifsFileFilter
File-Filter. The structure of file_filter block is documented below.
objectFirewallProfileprotocoloptionsCifsId string
an identifier for the resource.
options string[]
One or more options that can be applied to the session. Valid values: oversize.
oversizeLimit number
Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
ports number[]
Ports to scan for content (1 - 65535, default = 445).
scanBzip2 string
Enable/disable scanning of BZip2 compressed files. Valid values: disable, enable.
scopetype string
The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
serverCredentialType string
CIFS server credential type. Valid values: none, credential-replication, credential-keytab.
serverKeytabs ObjectFirewallProfileprotocoloptionsCifsServerKeytab[]
Server-Keytab. The structure of server_keytab block is documented below.
status string
Enable/disable the active status of scanning for this protocol. Valid values: disable, enable.
tcpWindowMaximum number
Maximum dynamic TCP window size (default = 8MB).
tcpWindowMinimum number
Minimum dynamic TCP window size (default = 128KB).
tcpWindowSize number
Set TCP static window size (default = 256KB).
tcpWindowType string
Specify type of TCP window to use for this protocol. Valid values: system, static, dynamic.
uncompressedNestLimit number
Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
uncompressedOversizeLimit number
Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
profile_protocol_options This property is required. str
Profile Protocol Options.
adom str
Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
domain_controller str
Domain for which to decrypt CIFS traffic.
dynamic_sort_subtable str
true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
file_filter ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs
File-Filter. The structure of file_filter block is documented below.
object_firewall_profileprotocoloptions_cifs_id str
an identifier for the resource.
options Sequence[str]
One or more options that can be applied to the session. Valid values: oversize.
oversize_limit float
Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
ports Sequence[float]
Ports to scan for content (1 - 65535, default = 445).
scan_bzip2 str
Enable/disable scanning of BZip2 compressed files. Valid values: disable, enable.
scopetype str
The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
server_credential_type str
CIFS server credential type. Valid values: none, credential-replication, credential-keytab.
server_keytabs Sequence[ObjectFirewallProfileprotocoloptionsCifsServerKeytabArgs]
Server-Keytab. The structure of server_keytab block is documented below.
status str
Enable/disable the active status of scanning for this protocol. Valid values: disable, enable.
tcp_window_maximum float
Maximum dynamic TCP window size (default = 8MB).
tcp_window_minimum float
Minimum dynamic TCP window size (default = 128KB).
tcp_window_size float
Set TCP static window size (default = 256KB).
tcp_window_type str
Specify type of TCP window to use for this protocol. Valid values: system, static, dynamic.
uncompressed_nest_limit float
Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
uncompressed_oversize_limit float
Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
profileProtocolOptions This property is required. String
Profile Protocol Options.
adom String
Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
domainController String
Domain for which to decrypt CIFS traffic.
dynamicSortSubtable String
true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
fileFilter Property Map
File-Filter. The structure of file_filter block is documented below.
objectFirewallProfileprotocoloptionsCifsId String
an identifier for the resource.
options List<String>
One or more options that can be applied to the session. Valid values: oversize.
oversizeLimit Number
Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
ports List<Number>
Ports to scan for content (1 - 65535, default = 445).
scanBzip2 String
Enable/disable scanning of BZip2 compressed files. Valid values: disable, enable.
scopetype String
The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
serverCredentialType String
CIFS server credential type. Valid values: none, credential-replication, credential-keytab.
serverKeytabs List<Property Map>
Server-Keytab. The structure of server_keytab block is documented below.
status String
Enable/disable the active status of scanning for this protocol. Valid values: disable, enable.
tcpWindowMaximum Number
Maximum dynamic TCP window size (default = 8MB).
tcpWindowMinimum Number
Minimum dynamic TCP window size (default = 128KB).
tcpWindowSize Number
Set TCP static window size (default = 256KB).
tcpWindowType String
Specify type of TCP window to use for this protocol. Valid values: system, static, dynamic.
uncompressedNestLimit Number
Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
uncompressedOversizeLimit Number
Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).

Outputs

All input properties are implicitly available as output properties. Additionally, the ObjectFirewallProfileprotocoloptionsCifs resource produces the following output properties:

Id string
The provider-assigned unique ID for this managed resource.
Id string
The provider-assigned unique ID for this managed resource.
id String
The provider-assigned unique ID for this managed resource.
id string
The provider-assigned unique ID for this managed resource.
id str
The provider-assigned unique ID for this managed resource.
id String
The provider-assigned unique ID for this managed resource.

Look up Existing ObjectFirewallProfileprotocoloptionsCifs Resource

Get an existing ObjectFirewallProfileprotocoloptionsCifs resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

public static get(name: string, id: Input<ID>, state?: ObjectFirewallProfileprotocoloptionsCifsState, opts?: CustomResourceOptions): ObjectFirewallProfileprotocoloptionsCifs
@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        adom: Optional[str] = None,
        domain_controller: Optional[str] = None,
        dynamic_sort_subtable: Optional[str] = None,
        file_filter: Optional[ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs] = None,
        object_firewall_profileprotocoloptions_cifs_id: Optional[str] = None,
        options: Optional[Sequence[str]] = None,
        oversize_limit: Optional[float] = None,
        ports: Optional[Sequence[float]] = None,
        profile_protocol_options: Optional[str] = None,
        scan_bzip2: Optional[str] = None,
        scopetype: Optional[str] = None,
        server_credential_type: Optional[str] = None,
        server_keytabs: Optional[Sequence[ObjectFirewallProfileprotocoloptionsCifsServerKeytabArgs]] = None,
        status: Optional[str] = None,
        tcp_window_maximum: Optional[float] = None,
        tcp_window_minimum: Optional[float] = None,
        tcp_window_size: Optional[float] = None,
        tcp_window_type: Optional[str] = None,
        uncompressed_nest_limit: Optional[float] = None,
        uncompressed_oversize_limit: Optional[float] = None) -> ObjectFirewallProfileprotocoloptionsCifs
func GetObjectFirewallProfileprotocoloptionsCifs(ctx *Context, name string, id IDInput, state *ObjectFirewallProfileprotocoloptionsCifsState, opts ...ResourceOption) (*ObjectFirewallProfileprotocoloptionsCifs, error)
public static ObjectFirewallProfileprotocoloptionsCifs Get(string name, Input<string> id, ObjectFirewallProfileprotocoloptionsCifsState? state, CustomResourceOptions? opts = null)
public static ObjectFirewallProfileprotocoloptionsCifs get(String name, Output<String> id, ObjectFirewallProfileprotocoloptionsCifsState state, CustomResourceOptions options)
resources:  _:    type: fortimanager:ObjectFirewallProfileprotocoloptionsCifs    get:      id: ${id}
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
resource_name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
The following state arguments are supported:
Adom string
Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
DomainController string
Domain for which to decrypt CIFS traffic.
DynamicSortSubtable string
true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
FileFilter ObjectFirewallProfileprotocoloptionsCifsFileFilter
File-Filter. The structure of file_filter block is documented below.
ObjectFirewallProfileprotocoloptionsCifsId string
an identifier for the resource.
Options List<string>
One or more options that can be applied to the session. Valid values: oversize.
OversizeLimit double
Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
Ports List<double>
Ports to scan for content (1 - 65535, default = 445).
ProfileProtocolOptions string
Profile Protocol Options.
ScanBzip2 string
Enable/disable scanning of BZip2 compressed files. Valid values: disable, enable.
Scopetype string
The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
ServerCredentialType string
CIFS server credential type. Valid values: none, credential-replication, credential-keytab.
ServerKeytabs List<ObjectFirewallProfileprotocoloptionsCifsServerKeytab>
Server-Keytab. The structure of server_keytab block is documented below.
Status string
Enable/disable the active status of scanning for this protocol. Valid values: disable, enable.
TcpWindowMaximum double
Maximum dynamic TCP window size (default = 8MB).
TcpWindowMinimum double
Minimum dynamic TCP window size (default = 128KB).
TcpWindowSize double
Set TCP static window size (default = 256KB).
TcpWindowType string
Specify type of TCP window to use for this protocol. Valid values: system, static, dynamic.
UncompressedNestLimit double
Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
UncompressedOversizeLimit double
Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
Adom string
Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
DomainController string
Domain for which to decrypt CIFS traffic.
DynamicSortSubtable string
true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
FileFilter ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs
File-Filter. The structure of file_filter block is documented below.
ObjectFirewallProfileprotocoloptionsCifsId string
an identifier for the resource.
Options []string
One or more options that can be applied to the session. Valid values: oversize.
OversizeLimit float64
Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
Ports []float64
Ports to scan for content (1 - 65535, default = 445).
ProfileProtocolOptions string
Profile Protocol Options.
ScanBzip2 string
Enable/disable scanning of BZip2 compressed files. Valid values: disable, enable.
Scopetype string
The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
ServerCredentialType string
CIFS server credential type. Valid values: none, credential-replication, credential-keytab.
ServerKeytabs []ObjectFirewallProfileprotocoloptionsCifsServerKeytabTypeArgs
Server-Keytab. The structure of server_keytab block is documented below.
Status string
Enable/disable the active status of scanning for this protocol. Valid values: disable, enable.
TcpWindowMaximum float64
Maximum dynamic TCP window size (default = 8MB).
TcpWindowMinimum float64
Minimum dynamic TCP window size (default = 128KB).
TcpWindowSize float64
Set TCP static window size (default = 256KB).
TcpWindowType string
Specify type of TCP window to use for this protocol. Valid values: system, static, dynamic.
UncompressedNestLimit float64
Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
UncompressedOversizeLimit float64
Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
adom String
Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
domainController String
Domain for which to decrypt CIFS traffic.
dynamicSortSubtable String
true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
fileFilter ObjectFirewallProfileprotocoloptionsCifsFileFilter
File-Filter. The structure of file_filter block is documented below.
objectFirewallProfileprotocoloptionsCifsId String
an identifier for the resource.
options List<String>
One or more options that can be applied to the session. Valid values: oversize.
oversizeLimit Double
Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
ports List<Double>
Ports to scan for content (1 - 65535, default = 445).
profileProtocolOptions String
Profile Protocol Options.
scanBzip2 String
Enable/disable scanning of BZip2 compressed files. Valid values: disable, enable.
scopetype String
The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
serverCredentialType String
CIFS server credential type. Valid values: none, credential-replication, credential-keytab.
serverKeytabs List<ObjectFirewallProfileprotocoloptionsCifsServerKeytab>
Server-Keytab. The structure of server_keytab block is documented below.
status String
Enable/disable the active status of scanning for this protocol. Valid values: disable, enable.
tcpWindowMaximum Double
Maximum dynamic TCP window size (default = 8MB).
tcpWindowMinimum Double
Minimum dynamic TCP window size (default = 128KB).
tcpWindowSize Double
Set TCP static window size (default = 256KB).
tcpWindowType String
Specify type of TCP window to use for this protocol. Valid values: system, static, dynamic.
uncompressedNestLimit Double
Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
uncompressedOversizeLimit Double
Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
adom string
Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
domainController string
Domain for which to decrypt CIFS traffic.
dynamicSortSubtable string
true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
fileFilter ObjectFirewallProfileprotocoloptionsCifsFileFilter
File-Filter. The structure of file_filter block is documented below.
objectFirewallProfileprotocoloptionsCifsId string
an identifier for the resource.
options string[]
One or more options that can be applied to the session. Valid values: oversize.
oversizeLimit number
Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
ports number[]
Ports to scan for content (1 - 65535, default = 445).
profileProtocolOptions string
Profile Protocol Options.
scanBzip2 string
Enable/disable scanning of BZip2 compressed files. Valid values: disable, enable.
scopetype string
The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
serverCredentialType string
CIFS server credential type. Valid values: none, credential-replication, credential-keytab.
serverKeytabs ObjectFirewallProfileprotocoloptionsCifsServerKeytab[]
Server-Keytab. The structure of server_keytab block is documented below.
status string
Enable/disable the active status of scanning for this protocol. Valid values: disable, enable.
tcpWindowMaximum number
Maximum dynamic TCP window size (default = 8MB).
tcpWindowMinimum number
Minimum dynamic TCP window size (default = 128KB).
tcpWindowSize number
Set TCP static window size (default = 256KB).
tcpWindowType string
Specify type of TCP window to use for this protocol. Valid values: system, static, dynamic.
uncompressedNestLimit number
Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
uncompressedOversizeLimit number
Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
adom str
Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
domain_controller str
Domain for which to decrypt CIFS traffic.
dynamic_sort_subtable str
true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
file_filter ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs
File-Filter. The structure of file_filter block is documented below.
object_firewall_profileprotocoloptions_cifs_id str
an identifier for the resource.
options Sequence[str]
One or more options that can be applied to the session. Valid values: oversize.
oversize_limit float
Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
ports Sequence[float]
Ports to scan for content (1 - 65535, default = 445).
profile_protocol_options str
Profile Protocol Options.
scan_bzip2 str
Enable/disable scanning of BZip2 compressed files. Valid values: disable, enable.
scopetype str
The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
server_credential_type str
CIFS server credential type. Valid values: none, credential-replication, credential-keytab.
server_keytabs Sequence[ObjectFirewallProfileprotocoloptionsCifsServerKeytabArgs]
Server-Keytab. The structure of server_keytab block is documented below.
status str
Enable/disable the active status of scanning for this protocol. Valid values: disable, enable.
tcp_window_maximum float
Maximum dynamic TCP window size (default = 8MB).
tcp_window_minimum float
Minimum dynamic TCP window size (default = 128KB).
tcp_window_size float
Set TCP static window size (default = 256KB).
tcp_window_type str
Specify type of TCP window to use for this protocol. Valid values: system, static, dynamic.
uncompressed_nest_limit float
Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
uncompressed_oversize_limit float
Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
adom String
Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
domainController String
Domain for which to decrypt CIFS traffic.
dynamicSortSubtable String
true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
fileFilter Property Map
File-Filter. The structure of file_filter block is documented below.
objectFirewallProfileprotocoloptionsCifsId String
an identifier for the resource.
options List<String>
One or more options that can be applied to the session. Valid values: oversize.
oversizeLimit Number
Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
ports List<Number>
Ports to scan for content (1 - 65535, default = 445).
profileProtocolOptions String
Profile Protocol Options.
scanBzip2 String
Enable/disable scanning of BZip2 compressed files. Valid values: disable, enable.
scopetype String
The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
serverCredentialType String
CIFS server credential type. Valid values: none, credential-replication, credential-keytab.
serverKeytabs List<Property Map>
Server-Keytab. The structure of server_keytab block is documented below.
status String
Enable/disable the active status of scanning for this protocol. Valid values: disable, enable.
tcpWindowMaximum Number
Maximum dynamic TCP window size (default = 8MB).
tcpWindowMinimum Number
Minimum dynamic TCP window size (default = 128KB).
tcpWindowSize Number
Set TCP static window size (default = 256KB).
tcpWindowType String
Specify type of TCP window to use for this protocol. Valid values: system, static, dynamic.
uncompressedNestLimit Number
Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
uncompressedOversizeLimit Number
Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).

Supporting Types

ObjectFirewallProfileprotocoloptionsCifsFileFilter
, ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs

Entries List<ObjectFirewallProfileprotocoloptionsCifsFileFilterEntry>
Entries. The structure of entries block is documented below.
Log string
Enable/disable file filter logging. Valid values: disable, enable.
Status string
Enable/disable file filter. Valid values: disable, enable.
Entries []ObjectFirewallProfileprotocoloptionsCifsFileFilterEntry
Entries. The structure of entries block is documented below.
Log string
Enable/disable file filter logging. Valid values: disable, enable.
Status string
Enable/disable file filter. Valid values: disable, enable.
entries List<ObjectFirewallProfileprotocoloptionsCifsFileFilterEntry>
Entries. The structure of entries block is documented below.
log String
Enable/disable file filter logging. Valid values: disable, enable.
status String
Enable/disable file filter. Valid values: disable, enable.
entries ObjectFirewallProfileprotocoloptionsCifsFileFilterEntry[]
Entries. The structure of entries block is documented below.
log string
Enable/disable file filter logging. Valid values: disable, enable.
status string
Enable/disable file filter. Valid values: disable, enable.
entries Sequence[ObjectFirewallProfileprotocoloptionsCifsFileFilterEntry]
Entries. The structure of entries block is documented below.
log str
Enable/disable file filter logging. Valid values: disable, enable.
status str
Enable/disable file filter. Valid values: disable, enable.
entries List<Property Map>
Entries. The structure of entries block is documented below.
log String
Enable/disable file filter logging. Valid values: disable, enable.
status String
Enable/disable file filter. Valid values: disable, enable.

ObjectFirewallProfileprotocoloptionsCifsFileFilterEntry
, ObjectFirewallProfileprotocoloptionsCifsFileFilterEntryArgs

Action string
Action taken for matched file. Valid values: log, block.
Comment string
Comment.
Direction string
Match files transmitted in the session's originating or reply direction. Valid values: any, incoming, outgoing.
FileTypes List<string>
Select file type.
Filter string
Add a file filter.
Protocols List<string>
Protocols to apply with. Valid values: cifs.
Action string
Action taken for matched file. Valid values: log, block.
Comment string
Comment.
Direction string
Match files transmitted in the session's originating or reply direction. Valid values: any, incoming, outgoing.
FileTypes []string
Select file type.
Filter string
Add a file filter.
Protocols []string
Protocols to apply with. Valid values: cifs.
action String
Action taken for matched file. Valid values: log, block.
comment String
Comment.
direction String
Match files transmitted in the session's originating or reply direction. Valid values: any, incoming, outgoing.
fileTypes List<String>
Select file type.
filter String
Add a file filter.
protocols List<String>
Protocols to apply with. Valid values: cifs.
action string
Action taken for matched file. Valid values: log, block.
comment string
Comment.
direction string
Match files transmitted in the session's originating or reply direction. Valid values: any, incoming, outgoing.
fileTypes string[]
Select file type.
filter string
Add a file filter.
protocols string[]
Protocols to apply with. Valid values: cifs.
action str
Action taken for matched file. Valid values: log, block.
comment str
Comment.
direction str
Match files transmitted in the session's originating or reply direction. Valid values: any, incoming, outgoing.
file_types Sequence[str]
Select file type.
filter str
Add a file filter.
protocols Sequence[str]
Protocols to apply with. Valid values: cifs.
action String
Action taken for matched file. Valid values: log, block.
comment String
Comment.
direction String
Match files transmitted in the session's originating or reply direction. Valid values: any, incoming, outgoing.
fileTypes List<String>
Select file type.
filter String
Add a file filter.
protocols List<String>
Protocols to apply with. Valid values: cifs.

ObjectFirewallProfileprotocoloptionsCifsServerKeytab
, ObjectFirewallProfileprotocoloptionsCifsServerKeytabArgs

Keytab string
Base64 encoded keytab file containing credential of the server.
Passwords List<string>
Password for keytab.
Principal string
Service principal. For example, "host/cifsserver.example.com@example.com".
Keytab string
Base64 encoded keytab file containing credential of the server.
Passwords []string
Password for keytab.
Principal string
Service principal. For example, "host/cifsserver.example.com@example.com".
keytab String
Base64 encoded keytab file containing credential of the server.
passwords List<String>
Password for keytab.
principal String
Service principal. For example, "host/cifsserver.example.com@example.com".
keytab string
Base64 encoded keytab file containing credential of the server.
passwords string[]
Password for keytab.
principal string
Service principal. For example, "host/cifsserver.example.com@example.com".
keytab str
Base64 encoded keytab file containing credential of the server.
passwords Sequence[str]
Password for keytab.
principal str
Service principal. For example, "host/cifsserver.example.com@example.com".
keytab String
Base64 encoded keytab file containing credential of the server.
passwords List<String>
Password for keytab.
principal String
Service principal. For example, "host/cifsserver.example.com@example.com".

Import

ObjectFirewall ProfileProtocolOptionsCifs can be imported using any of these accepted formats:

Set import_options = [“profile_protocol_options=YOUR_VALUE”] in the provider section.

$ export “FORTIMANAGER_IMPORT_TABLE”=“true”

$ pulumi import fortimanager:index/objectFirewallProfileprotocoloptionsCifs:ObjectFirewallProfileprotocoloptionsCifs labelname ObjectFirewallProfileProtocolOptionsCifs
Copy

$ unset “FORTIMANAGER_IMPORT_TABLE”

-> Hint: The scopetype and adom for import will directly inherit the scopetype and adom configuration of the provider.

To learn more about importing existing cloud resources, see Importing resources.

Package Details

Repository
fortimanager fortinetdev/terraform-provider-fortimanager
License
Notes
This Pulumi package is based on the fortimanager Terraform Provider.