1. Packages
  2. Fortimanager Provider
  3. API Docs
  4. ObjectIpsSensorEntries
fortimanager 1.13.0 published on Thursday, Mar 13, 2025 by fortinetdev

fortimanager.ObjectIpsSensorEntries

Explore with Pulumi AI

fortimanager logo
fortimanager 1.13.0 published on Thursday, Mar 13, 2025 by fortinetdev

    IPS sensor filter.

    This resource is a sub resource for variable entries of resource fortimanager.ObjectIpsSensor. Conflict and overwrite may occur if use both of them. The following variables have sub resource. Avoid using them together, otherwise conflicts and overwrites may occur.

    • exempt_ip: fortimanager.ObjectIpsSensorEntriesExemptip

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as fortimanager from "@pulumi/fortimanager";
    
    const trnameObjectIpsSensor = new fortimanager.ObjectIpsSensor("trnameObjectIpsSensor", {});
    const trnameObjectIpsSensorEntries = new fortimanager.ObjectIpsSensorEntries("trnameObjectIpsSensorEntries", {
        sensor: trnameObjectIpsSensor.name,
        applications: ["all"],
        locations: ["all"],
        fosid: 23,
        log: "enable",
    }, {
        dependsOn: [trnameObjectIpsSensor],
    });
    
    import pulumi
    import pulumi_fortimanager as fortimanager
    
    trname_object_ips_sensor = fortimanager.ObjectIpsSensor("trnameObjectIpsSensor")
    trname_object_ips_sensor_entries = fortimanager.ObjectIpsSensorEntries("trnameObjectIpsSensorEntries",
        sensor=trname_object_ips_sensor.name,
        applications=["all"],
        locations=["all"],
        fosid=23,
        log="enable",
        opts = pulumi.ResourceOptions(depends_on=[trname_object_ips_sensor]))
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/fortimanager/fortimanager"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		trnameObjectIpsSensor, err := fortimanager.NewObjectIpsSensor(ctx, "trnameObjectIpsSensor", nil)
    		if err != nil {
    			return err
    		}
    		_, err = fortimanager.NewObjectIpsSensorEntries(ctx, "trnameObjectIpsSensorEntries", &fortimanager.ObjectIpsSensorEntriesArgs{
    			Sensor: trnameObjectIpsSensor.Name,
    			Applications: pulumi.StringArray{
    				pulumi.String("all"),
    			},
    			Locations: pulumi.StringArray{
    				pulumi.String("all"),
    			},
    			Fosid: pulumi.Float64(23),
    			Log:   pulumi.String("enable"),
    		}, pulumi.DependsOn([]pulumi.Resource{
    			trnameObjectIpsSensor,
    		}))
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Fortimanager = Pulumi.Fortimanager;
    
    return await Deployment.RunAsync(() => 
    {
        var trnameObjectIpsSensor = new Fortimanager.ObjectIpsSensor("trnameObjectIpsSensor");
    
        var trnameObjectIpsSensorEntries = new Fortimanager.ObjectIpsSensorEntries("trnameObjectIpsSensorEntries", new()
        {
            Sensor = trnameObjectIpsSensor.Name,
            Applications = new[]
            {
                "all",
            },
            Locations = new[]
            {
                "all",
            },
            Fosid = 23,
            Log = "enable",
        }, new CustomResourceOptions
        {
            DependsOn =
            {
                trnameObjectIpsSensor,
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.fortimanager.ObjectIpsSensor;
    import com.pulumi.fortimanager.ObjectIpsSensorEntries;
    import com.pulumi.fortimanager.ObjectIpsSensorEntriesArgs;
    import com.pulumi.resources.CustomResourceOptions;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var trnameObjectIpsSensor = new ObjectIpsSensor("trnameObjectIpsSensor");
    
            var trnameObjectIpsSensorEntries = new ObjectIpsSensorEntries("trnameObjectIpsSensorEntries", ObjectIpsSensorEntriesArgs.builder()
                .sensor(trnameObjectIpsSensor.name())
                .applications("all")
                .locations("all")
                .fosid(23)
                .log("enable")
                .build(), CustomResourceOptions.builder()
                    .dependsOn(trnameObjectIpsSensor)
                    .build());
    
        }
    }
    
    resources:
      trnameObjectIpsSensorEntries:
        type: fortimanager:ObjectIpsSensorEntries
        properties:
          sensor: ${trnameObjectIpsSensor.name}
          applications:
            - all
          locations:
            - all
          fosid: 23
          log: enable
        options:
          dependsOn:
            - ${trnameObjectIpsSensor}
      trnameObjectIpsSensor:
        type: fortimanager:ObjectIpsSensor
    

    Create ObjectIpsSensorEntries Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new ObjectIpsSensorEntries(name: string, args: ObjectIpsSensorEntriesArgs, opts?: CustomResourceOptions);
    @overload
    def ObjectIpsSensorEntries(resource_name: str,
                               args: ObjectIpsSensorEntriesArgs,
                               opts: Optional[ResourceOptions] = None)
    
    @overload
    def ObjectIpsSensorEntries(resource_name: str,
                               opts: Optional[ResourceOptions] = None,
                               sensor: Optional[str] = None,
                               object_ips_sensor_entries_id: Optional[str] = None,
                               default_status: Optional[str] = None,
                               os: Optional[Sequence[str]] = None,
                               default_action: Optional[str] = None,
                               protocols: Optional[Sequence[str]] = None,
                               dynamic_sort_subtable: Optional[str] = None,
                               exempt_ips: Optional[Sequence[ObjectIpsSensorEntriesExemptIpArgs]] = None,
                               fosid: Optional[float] = None,
                               last_modified: Optional[str] = None,
                               locations: Optional[Sequence[str]] = None,
                               log: Optional[str] = None,
                               quarantine: Optional[str] = None,
                               log_packet: Optional[str] = None,
                               action: Optional[str] = None,
                               cves: Optional[Sequence[str]] = None,
                               applications: Optional[Sequence[str]] = None,
                               log_attack_context: Optional[str] = None,
                               quarantine_expiry: Optional[str] = None,
                               quarantine_log: Optional[str] = None,
                               rate_count: Optional[float] = None,
                               rate_duration: Optional[float] = None,
                               rate_mode: Optional[str] = None,
                               rate_track: Optional[str] = None,
                               rule: Optional[str] = None,
                               scopetype: Optional[str] = None,
                               adom: Optional[str] = None,
                               severities: Optional[Sequence[str]] = None,
                               status: Optional[str] = None,
                               vuln_types: Optional[Sequence[float]] = None)
    func NewObjectIpsSensorEntries(ctx *Context, name string, args ObjectIpsSensorEntriesArgs, opts ...ResourceOption) (*ObjectIpsSensorEntries, error)
    public ObjectIpsSensorEntries(string name, ObjectIpsSensorEntriesArgs args, CustomResourceOptions? opts = null)
    public ObjectIpsSensorEntries(String name, ObjectIpsSensorEntriesArgs args)
    public ObjectIpsSensorEntries(String name, ObjectIpsSensorEntriesArgs args, CustomResourceOptions options)
    
    type: fortimanager:ObjectIpsSensorEntries
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args ObjectIpsSensorEntriesArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args ObjectIpsSensorEntriesArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args ObjectIpsSensorEntriesArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args ObjectIpsSensorEntriesArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args ObjectIpsSensorEntriesArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var objectIpsSensorEntriesResource = new Fortimanager.ObjectIpsSensorEntries("objectIpsSensorEntriesResource", new()
    {
        Sensor = "string",
        ObjectIpsSensorEntriesId = "string",
        DefaultStatus = "string",
        Os = new[]
        {
            "string",
        },
        DefaultAction = "string",
        Protocols = new[]
        {
            "string",
        },
        DynamicSortSubtable = "string",
        ExemptIps = new[]
        {
            new Fortimanager.Inputs.ObjectIpsSensorEntriesExemptIpArgs
            {
                DstIp = "string",
                Id = 0,
                SrcIp = "string",
            },
        },
        Fosid = 0,
        LastModified = "string",
        Locations = new[]
        {
            "string",
        },
        Log = "string",
        Quarantine = "string",
        LogPacket = "string",
        Action = "string",
        Cves = new[]
        {
            "string",
        },
        Applications = new[]
        {
            "string",
        },
        LogAttackContext = "string",
        QuarantineExpiry = "string",
        QuarantineLog = "string",
        RateCount = 0,
        RateDuration = 0,
        RateMode = "string",
        RateTrack = "string",
        Rule = "string",
        Scopetype = "string",
        Adom = "string",
        Severities = new[]
        {
            "string",
        },
        Status = "string",
        VulnTypes = new[]
        {
            0,
        },
    });
    
    example, err := fortimanager.NewObjectIpsSensorEntries(ctx, "objectIpsSensorEntriesResource", &fortimanager.ObjectIpsSensorEntriesArgs{
    Sensor: pulumi.String("string"),
    ObjectIpsSensorEntriesId: pulumi.String("string"),
    DefaultStatus: pulumi.String("string"),
    Os: pulumi.StringArray{
    pulumi.String("string"),
    },
    DefaultAction: pulumi.String("string"),
    Protocols: pulumi.StringArray{
    pulumi.String("string"),
    },
    DynamicSortSubtable: pulumi.String("string"),
    ExemptIps: .ObjectIpsSensorEntriesExemptIpTypeArray{
    &.ObjectIpsSensorEntriesExemptIpTypeArgs{
    DstIp: pulumi.String("string"),
    Id: pulumi.Float64(0),
    SrcIp: pulumi.String("string"),
    },
    },
    Fosid: pulumi.Float64(0),
    LastModified: pulumi.String("string"),
    Locations: pulumi.StringArray{
    pulumi.String("string"),
    },
    Log: pulumi.String("string"),
    Quarantine: pulumi.String("string"),
    LogPacket: pulumi.String("string"),
    Action: pulumi.String("string"),
    Cves: pulumi.StringArray{
    pulumi.String("string"),
    },
    Applications: pulumi.StringArray{
    pulumi.String("string"),
    },
    LogAttackContext: pulumi.String("string"),
    QuarantineExpiry: pulumi.String("string"),
    QuarantineLog: pulumi.String("string"),
    RateCount: pulumi.Float64(0),
    RateDuration: pulumi.Float64(0),
    RateMode: pulumi.String("string"),
    RateTrack: pulumi.String("string"),
    Rule: pulumi.String("string"),
    Scopetype: pulumi.String("string"),
    Adom: pulumi.String("string"),
    Severities: pulumi.StringArray{
    pulumi.String("string"),
    },
    Status: pulumi.String("string"),
    VulnTypes: pulumi.Float64Array{
    pulumi.Float64(0),
    },
    })
    
    var objectIpsSensorEntriesResource = new ObjectIpsSensorEntries("objectIpsSensorEntriesResource", ObjectIpsSensorEntriesArgs.builder()
        .sensor("string")
        .objectIpsSensorEntriesId("string")
        .defaultStatus("string")
        .os("string")
        .defaultAction("string")
        .protocols("string")
        .dynamicSortSubtable("string")
        .exemptIps(ObjectIpsSensorEntriesExemptIpArgs.builder()
            .dstIp("string")
            .id(0)
            .srcIp("string")
            .build())
        .fosid(0)
        .lastModified("string")
        .locations("string")
        .log("string")
        .quarantine("string")
        .logPacket("string")
        .action("string")
        .cves("string")
        .applications("string")
        .logAttackContext("string")
        .quarantineExpiry("string")
        .quarantineLog("string")
        .rateCount(0)
        .rateDuration(0)
        .rateMode("string")
        .rateTrack("string")
        .rule("string")
        .scopetype("string")
        .adom("string")
        .severities("string")
        .status("string")
        .vulnTypes(0)
        .build());
    
    object_ips_sensor_entries_resource = fortimanager.ObjectIpsSensorEntries("objectIpsSensorEntriesResource",
        sensor="string",
        object_ips_sensor_entries_id="string",
        default_status="string",
        os=["string"],
        default_action="string",
        protocols=["string"],
        dynamic_sort_subtable="string",
        exempt_ips=[{
            "dst_ip": "string",
            "id": 0,
            "src_ip": "string",
        }],
        fosid=0,
        last_modified="string",
        locations=["string"],
        log="string",
        quarantine="string",
        log_packet="string",
        action="string",
        cves=["string"],
        applications=["string"],
        log_attack_context="string",
        quarantine_expiry="string",
        quarantine_log="string",
        rate_count=0,
        rate_duration=0,
        rate_mode="string",
        rate_track="string",
        rule="string",
        scopetype="string",
        adom="string",
        severities=["string"],
        status="string",
        vuln_types=[0])
    
    const objectIpsSensorEntriesResource = new fortimanager.ObjectIpsSensorEntries("objectIpsSensorEntriesResource", {
        sensor: "string",
        objectIpsSensorEntriesId: "string",
        defaultStatus: "string",
        os: ["string"],
        defaultAction: "string",
        protocols: ["string"],
        dynamicSortSubtable: "string",
        exemptIps: [{
            dstIp: "string",
            id: 0,
            srcIp: "string",
        }],
        fosid: 0,
        lastModified: "string",
        locations: ["string"],
        log: "string",
        quarantine: "string",
        logPacket: "string",
        action: "string",
        cves: ["string"],
        applications: ["string"],
        logAttackContext: "string",
        quarantineExpiry: "string",
        quarantineLog: "string",
        rateCount: 0,
        rateDuration: 0,
        rateMode: "string",
        rateTrack: "string",
        rule: "string",
        scopetype: "string",
        adom: "string",
        severities: ["string"],
        status: "string",
        vulnTypes: [0],
    });
    
    type: fortimanager:ObjectIpsSensorEntries
    properties:
        action: string
        adom: string
        applications:
            - string
        cves:
            - string
        defaultAction: string
        defaultStatus: string
        dynamicSortSubtable: string
        exemptIps:
            - dstIp: string
              id: 0
              srcIp: string
        fosid: 0
        lastModified: string
        locations:
            - string
        log: string
        logAttackContext: string
        logPacket: string
        objectIpsSensorEntriesId: string
        os:
            - string
        protocols:
            - string
        quarantine: string
        quarantineExpiry: string
        quarantineLog: string
        rateCount: 0
        rateDuration: 0
        rateMode: string
        rateTrack: string
        rule: string
        scopetype: string
        sensor: string
        severities:
            - string
        status: string
        vulnTypes:
            - 0
    

    ObjectIpsSensorEntries Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The ObjectIpsSensorEntries resource accepts the following input properties:

    Sensor string
    Sensor.
    Action string
    Action taken with traffic in which signatures are detected. Valid values: pass, block, reset, default.
    Adom string
    Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
    Applications List<string>
    Applications to be protected. set application ? lists available applications. all includes all applications. other includes all unlisted applications.
    Cves List<string>
    List of CVE IDs of the signatures to add to the sensor
    DefaultAction string
    Signature default action filter. Valid values: block, pass, all, drop.
    DefaultStatus string
    Signature default status filter. Valid values: disable, enable, all.
    DynamicSortSubtable string
    true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
    ExemptIps List<ObjectIpsSensorEntriesExemptIp>
    Exempt-Ip. The structure of exempt_ip block is documented below.
    Fosid double
    Rule ID in IPS database (0 - 4294967295).
    LastModified string
    Filter by signature last modified date. Formats: before <date>, after <date>, between <start-date> <end-date>.
    Locations List<string>
    Protect client or server traffic.
    Log string
    Enable/disable logging of signatures included in filter. Valid values: disable, enable.
    LogAttackContext string
    Enable/disable logging of attack context: URL buffer, header buffer, body buffer, packet buffer. Valid values: disable, enable.
    LogPacket string
    Enable/disable packet logging. Enable to save the packet that triggers the filter. You can download the packets in pcap format for diagnostic use. Valid values: disable, enable.
    ObjectIpsSensorEntriesId string
    an identifier for the resource with format {{fosid}}.
    Os List<string>
    Operating systems to be protected. all includes all operating systems. other includes all unlisted operating systems.
    Protocols List<string>
    Protocols to be examined. set protocol ? lists available protocols. all includes all protocols. other includes all unlisted protocols.
    Quarantine string
    Quarantine method. Valid values: none, attacker, both, interface.
    QuarantineExpiry string
    Duration of quarantine. (Format ###d##h##m, minimum 1m, maximum 364d23h59m, default = 5m). Requires quarantine set to attacker.
    QuarantineLog string
    Enable/disable quarantine logging. Valid values: disable, enable.
    RateCount double
    Count of the rate.
    RateDuration double
    Duration (sec) of the rate.
    RateMode string
    Rate limit mode. Valid values: periodical, continuous.
    RateTrack string
    Track the packet protocol field. Valid values: none, src-ip, dest-ip, dhcp-client-mac, dns-domain.
    Rule string
    Identifies the predefined or custom IPS signatures to add to the sensor.
    Scopetype string
    The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
    Severities List<string>
    Relative severity of the signature, from info to critical. Log messages generated by the signature include the severity.
    Status string
    Status of the signatures included in filter. default enables the filter and only use filters with default status of enable. Filters with default status of disable will not be used. Valid values: disable, enable, default.
    VulnTypes List<double>
    List of signature vulnerability types to filter by.
    Sensor string
    Sensor.
    Action string
    Action taken with traffic in which signatures are detected. Valid values: pass, block, reset, default.
    Adom string
    Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
    Applications []string
    Applications to be protected. set application ? lists available applications. all includes all applications. other includes all unlisted applications.
    Cves []string
    List of CVE IDs of the signatures to add to the sensor
    DefaultAction string
    Signature default action filter. Valid values: block, pass, all, drop.
    DefaultStatus string
    Signature default status filter. Valid values: disable, enable, all.
    DynamicSortSubtable string
    true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
    ExemptIps []ObjectIpsSensorEntriesExemptIpTypeArgs
    Exempt-Ip. The structure of exempt_ip block is documented below.
    Fosid float64
    Rule ID in IPS database (0 - 4294967295).
    LastModified string
    Filter by signature last modified date. Formats: before <date>, after <date>, between <start-date> <end-date>.
    Locations []string
    Protect client or server traffic.
    Log string
    Enable/disable logging of signatures included in filter. Valid values: disable, enable.
    LogAttackContext string
    Enable/disable logging of attack context: URL buffer, header buffer, body buffer, packet buffer. Valid values: disable, enable.
    LogPacket string
    Enable/disable packet logging. Enable to save the packet that triggers the filter. You can download the packets in pcap format for diagnostic use. Valid values: disable, enable.
    ObjectIpsSensorEntriesId string
    an identifier for the resource with format {{fosid}}.
    Os []string
    Operating systems to be protected. all includes all operating systems. other includes all unlisted operating systems.
    Protocols []string
    Protocols to be examined. set protocol ? lists available protocols. all includes all protocols. other includes all unlisted protocols.
    Quarantine string
    Quarantine method. Valid values: none, attacker, both, interface.
    QuarantineExpiry string
    Duration of quarantine. (Format ###d##h##m, minimum 1m, maximum 364d23h59m, default = 5m). Requires quarantine set to attacker.
    QuarantineLog string
    Enable/disable quarantine logging. Valid values: disable, enable.
    RateCount float64
    Count of the rate.
    RateDuration float64
    Duration (sec) of the rate.
    RateMode string
    Rate limit mode. Valid values: periodical, continuous.
    RateTrack string
    Track the packet protocol field. Valid values: none, src-ip, dest-ip, dhcp-client-mac, dns-domain.
    Rule string
    Identifies the predefined or custom IPS signatures to add to the sensor.
    Scopetype string
    The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
    Severities []string
    Relative severity of the signature, from info to critical. Log messages generated by the signature include the severity.
    Status string
    Status of the signatures included in filter. default enables the filter and only use filters with default status of enable. Filters with default status of disable will not be used. Valid values: disable, enable, default.
    VulnTypes []float64
    List of signature vulnerability types to filter by.
    sensor String
    Sensor.
    action String
    Action taken with traffic in which signatures are detected. Valid values: pass, block, reset, default.
    adom String
    Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
    applications List<String>
    Applications to be protected. set application ? lists available applications. all includes all applications. other includes all unlisted applications.
    cves List<String>
    List of CVE IDs of the signatures to add to the sensor
    defaultAction String
    Signature default action filter. Valid values: block, pass, all, drop.
    defaultStatus String
    Signature default status filter. Valid values: disable, enable, all.
    dynamicSortSubtable String
    true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
    exemptIps List<ObjectIpsSensorEntriesExemptIp>
    Exempt-Ip. The structure of exempt_ip block is documented below.
    fosid Double
    Rule ID in IPS database (0 - 4294967295).
    lastModified String
    Filter by signature last modified date. Formats: before <date>, after <date>, between <start-date> <end-date>.
    locations List<String>
    Protect client or server traffic.
    log String
    Enable/disable logging of signatures included in filter. Valid values: disable, enable.
    logAttackContext String
    Enable/disable logging of attack context: URL buffer, header buffer, body buffer, packet buffer. Valid values: disable, enable.
    logPacket String
    Enable/disable packet logging. Enable to save the packet that triggers the filter. You can download the packets in pcap format for diagnostic use. Valid values: disable, enable.
    objectIpsSensorEntriesId String
    an identifier for the resource with format {{fosid}}.
    os List<String>
    Operating systems to be protected. all includes all operating systems. other includes all unlisted operating systems.
    protocols List<String>
    Protocols to be examined. set protocol ? lists available protocols. all includes all protocols. other includes all unlisted protocols.
    quarantine String
    Quarantine method. Valid values: none, attacker, both, interface.
    quarantineExpiry String
    Duration of quarantine. (Format ###d##h##m, minimum 1m, maximum 364d23h59m, default = 5m). Requires quarantine set to attacker.
    quarantineLog String
    Enable/disable quarantine logging. Valid values: disable, enable.
    rateCount Double
    Count of the rate.
    rateDuration Double
    Duration (sec) of the rate.
    rateMode String
    Rate limit mode. Valid values: periodical, continuous.
    rateTrack String
    Track the packet protocol field. Valid values: none, src-ip, dest-ip, dhcp-client-mac, dns-domain.
    rule String
    Identifies the predefined or custom IPS signatures to add to the sensor.
    scopetype String
    The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
    severities List<String>
    Relative severity of the signature, from info to critical. Log messages generated by the signature include the severity.
    status String
    Status of the signatures included in filter. default enables the filter and only use filters with default status of enable. Filters with default status of disable will not be used. Valid values: disable, enable, default.
    vulnTypes List<Double>
    List of signature vulnerability types to filter by.
    sensor string
    Sensor.
    action string
    Action taken with traffic in which signatures are detected. Valid values: pass, block, reset, default.
    adom string
    Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
    applications string[]
    Applications to be protected. set application ? lists available applications. all includes all applications. other includes all unlisted applications.
    cves string[]
    List of CVE IDs of the signatures to add to the sensor
    defaultAction string
    Signature default action filter. Valid values: block, pass, all, drop.
    defaultStatus string
    Signature default status filter. Valid values: disable, enable, all.
    dynamicSortSubtable string
    true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
    exemptIps ObjectIpsSensorEntriesExemptIp[]
    Exempt-Ip. The structure of exempt_ip block is documented below.
    fosid number
    Rule ID in IPS database (0 - 4294967295).
    lastModified string
    Filter by signature last modified date. Formats: before <date>, after <date>, between <start-date> <end-date>.
    locations string[]
    Protect client or server traffic.
    log string
    Enable/disable logging of signatures included in filter. Valid values: disable, enable.
    logAttackContext string
    Enable/disable logging of attack context: URL buffer, header buffer, body buffer, packet buffer. Valid values: disable, enable.
    logPacket string
    Enable/disable packet logging. Enable to save the packet that triggers the filter. You can download the packets in pcap format for diagnostic use. Valid values: disable, enable.
    objectIpsSensorEntriesId string
    an identifier for the resource with format {{fosid}}.
    os string[]
    Operating systems to be protected. all includes all operating systems. other includes all unlisted operating systems.
    protocols string[]
    Protocols to be examined. set protocol ? lists available protocols. all includes all protocols. other includes all unlisted protocols.
    quarantine string
    Quarantine method. Valid values: none, attacker, both, interface.
    quarantineExpiry string
    Duration of quarantine. (Format ###d##h##m, minimum 1m, maximum 364d23h59m, default = 5m). Requires quarantine set to attacker.
    quarantineLog string
    Enable/disable quarantine logging. Valid values: disable, enable.
    rateCount number
    Count of the rate.
    rateDuration number
    Duration (sec) of the rate.
    rateMode string
    Rate limit mode. Valid values: periodical, continuous.
    rateTrack string
    Track the packet protocol field. Valid values: none, src-ip, dest-ip, dhcp-client-mac, dns-domain.
    rule string
    Identifies the predefined or custom IPS signatures to add to the sensor.
    scopetype string
    The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
    severities string[]
    Relative severity of the signature, from info to critical. Log messages generated by the signature include the severity.
    status string
    Status of the signatures included in filter. default enables the filter and only use filters with default status of enable. Filters with default status of disable will not be used. Valid values: disable, enable, default.
    vulnTypes number[]
    List of signature vulnerability types to filter by.
    sensor str
    Sensor.
    action str
    Action taken with traffic in which signatures are detected. Valid values: pass, block, reset, default.
    adom str
    Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
    applications Sequence[str]
    Applications to be protected. set application ? lists available applications. all includes all applications. other includes all unlisted applications.
    cves Sequence[str]
    List of CVE IDs of the signatures to add to the sensor
    default_action str
    Signature default action filter. Valid values: block, pass, all, drop.
    default_status str
    Signature default status filter. Valid values: disable, enable, all.
    dynamic_sort_subtable str
    true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
    exempt_ips Sequence[ObjectIpsSensorEntriesExemptIpArgs]
    Exempt-Ip. The structure of exempt_ip block is documented below.
    fosid float
    Rule ID in IPS database (0 - 4294967295).
    last_modified str
    Filter by signature last modified date. Formats: before <date>, after <date>, between <start-date> <end-date>.
    locations Sequence[str]
    Protect client or server traffic.
    log str
    Enable/disable logging of signatures included in filter. Valid values: disable, enable.
    log_attack_context str
    Enable/disable logging of attack context: URL buffer, header buffer, body buffer, packet buffer. Valid values: disable, enable.
    log_packet str
    Enable/disable packet logging. Enable to save the packet that triggers the filter. You can download the packets in pcap format for diagnostic use. Valid values: disable, enable.
    object_ips_sensor_entries_id str
    an identifier for the resource with format {{fosid}}.
    os Sequence[str]
    Operating systems to be protected. all includes all operating systems. other includes all unlisted operating systems.
    protocols Sequence[str]
    Protocols to be examined. set protocol ? lists available protocols. all includes all protocols. other includes all unlisted protocols.
    quarantine str
    Quarantine method. Valid values: none, attacker, both, interface.
    quarantine_expiry str
    Duration of quarantine. (Format ###d##h##m, minimum 1m, maximum 364d23h59m, default = 5m). Requires quarantine set to attacker.
    quarantine_log str
    Enable/disable quarantine logging. Valid values: disable, enable.
    rate_count float
    Count of the rate.
    rate_duration float
    Duration (sec) of the rate.
    rate_mode str
    Rate limit mode. Valid values: periodical, continuous.
    rate_track str
    Track the packet protocol field. Valid values: none, src-ip, dest-ip, dhcp-client-mac, dns-domain.
    rule str
    Identifies the predefined or custom IPS signatures to add to the sensor.
    scopetype str
    The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
    severities Sequence[str]
    Relative severity of the signature, from info to critical. Log messages generated by the signature include the severity.
    status str
    Status of the signatures included in filter. default enables the filter and only use filters with default status of enable. Filters with default status of disable will not be used. Valid values: disable, enable, default.
    vuln_types Sequence[float]
    List of signature vulnerability types to filter by.
    sensor String
    Sensor.
    action String
    Action taken with traffic in which signatures are detected. Valid values: pass, block, reset, default.
    adom String
    Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
    applications List<String>
    Applications to be protected. set application ? lists available applications. all includes all applications. other includes all unlisted applications.
    cves List<String>
    List of CVE IDs of the signatures to add to the sensor
    defaultAction String
    Signature default action filter. Valid values: block, pass, all, drop.
    defaultStatus String
    Signature default status filter. Valid values: disable, enable, all.
    dynamicSortSubtable String
    true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
    exemptIps List<Property Map>
    Exempt-Ip. The structure of exempt_ip block is documented below.
    fosid Number
    Rule ID in IPS database (0 - 4294967295).
    lastModified String
    Filter by signature last modified date. Formats: before <date>, after <date>, between <start-date> <end-date>.
    locations List<String>
    Protect client or server traffic.
    log String
    Enable/disable logging of signatures included in filter. Valid values: disable, enable.
    logAttackContext String
    Enable/disable logging of attack context: URL buffer, header buffer, body buffer, packet buffer. Valid values: disable, enable.
    logPacket String
    Enable/disable packet logging. Enable to save the packet that triggers the filter. You can download the packets in pcap format for diagnostic use. Valid values: disable, enable.
    objectIpsSensorEntriesId String
    an identifier for the resource with format {{fosid}}.
    os List<String>
    Operating systems to be protected. all includes all operating systems. other includes all unlisted operating systems.
    protocols List<String>
    Protocols to be examined. set protocol ? lists available protocols. all includes all protocols. other includes all unlisted protocols.
    quarantine String
    Quarantine method. Valid values: none, attacker, both, interface.
    quarantineExpiry String
    Duration of quarantine. (Format ###d##h##m, minimum 1m, maximum 364d23h59m, default = 5m). Requires quarantine set to attacker.
    quarantineLog String
    Enable/disable quarantine logging. Valid values: disable, enable.
    rateCount Number
    Count of the rate.
    rateDuration Number
    Duration (sec) of the rate.
    rateMode String
    Rate limit mode. Valid values: periodical, continuous.
    rateTrack String
    Track the packet protocol field. Valid values: none, src-ip, dest-ip, dhcp-client-mac, dns-domain.
    rule String
    Identifies the predefined or custom IPS signatures to add to the sensor.
    scopetype String
    The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
    severities List<String>
    Relative severity of the signature, from info to critical. Log messages generated by the signature include the severity.
    status String
    Status of the signatures included in filter. default enables the filter and only use filters with default status of enable. Filters with default status of disable will not be used. Valid values: disable, enable, default.
    vulnTypes List<Number>
    List of signature vulnerability types to filter by.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the ObjectIpsSensorEntries resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing ObjectIpsSensorEntries Resource

    Get an existing ObjectIpsSensorEntries resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: ObjectIpsSensorEntriesState, opts?: CustomResourceOptions): ObjectIpsSensorEntries
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            action: Optional[str] = None,
            adom: Optional[str] = None,
            applications: Optional[Sequence[str]] = None,
            cves: Optional[Sequence[str]] = None,
            default_action: Optional[str] = None,
            default_status: Optional[str] = None,
            dynamic_sort_subtable: Optional[str] = None,
            exempt_ips: Optional[Sequence[ObjectIpsSensorEntriesExemptIpArgs]] = None,
            fosid: Optional[float] = None,
            last_modified: Optional[str] = None,
            locations: Optional[Sequence[str]] = None,
            log: Optional[str] = None,
            log_attack_context: Optional[str] = None,
            log_packet: Optional[str] = None,
            object_ips_sensor_entries_id: Optional[str] = None,
            os: Optional[Sequence[str]] = None,
            protocols: Optional[Sequence[str]] = None,
            quarantine: Optional[str] = None,
            quarantine_expiry: Optional[str] = None,
            quarantine_log: Optional[str] = None,
            rate_count: Optional[float] = None,
            rate_duration: Optional[float] = None,
            rate_mode: Optional[str] = None,
            rate_track: Optional[str] = None,
            rule: Optional[str] = None,
            scopetype: Optional[str] = None,
            sensor: Optional[str] = None,
            severities: Optional[Sequence[str]] = None,
            status: Optional[str] = None,
            vuln_types: Optional[Sequence[float]] = None) -> ObjectIpsSensorEntries
    func GetObjectIpsSensorEntries(ctx *Context, name string, id IDInput, state *ObjectIpsSensorEntriesState, opts ...ResourceOption) (*ObjectIpsSensorEntries, error)
    public static ObjectIpsSensorEntries Get(string name, Input<string> id, ObjectIpsSensorEntriesState? state, CustomResourceOptions? opts = null)
    public static ObjectIpsSensorEntries get(String name, Output<String> id, ObjectIpsSensorEntriesState state, CustomResourceOptions options)
    resources:  _:    type: fortimanager:ObjectIpsSensorEntries    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    Action string
    Action taken with traffic in which signatures are detected. Valid values: pass, block, reset, default.
    Adom string
    Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
    Applications List<string>
    Applications to be protected. set application ? lists available applications. all includes all applications. other includes all unlisted applications.
    Cves List<string>
    List of CVE IDs of the signatures to add to the sensor
    DefaultAction string
    Signature default action filter. Valid values: block, pass, all, drop.
    DefaultStatus string
    Signature default status filter. Valid values: disable, enable, all.
    DynamicSortSubtable string
    true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
    ExemptIps List<ObjectIpsSensorEntriesExemptIp>
    Exempt-Ip. The structure of exempt_ip block is documented below.
    Fosid double
    Rule ID in IPS database (0 - 4294967295).
    LastModified string
    Filter by signature last modified date. Formats: before <date>, after <date>, between <start-date> <end-date>.
    Locations List<string>
    Protect client or server traffic.
    Log string
    Enable/disable logging of signatures included in filter. Valid values: disable, enable.
    LogAttackContext string
    Enable/disable logging of attack context: URL buffer, header buffer, body buffer, packet buffer. Valid values: disable, enable.
    LogPacket string
    Enable/disable packet logging. Enable to save the packet that triggers the filter. You can download the packets in pcap format for diagnostic use. Valid values: disable, enable.
    ObjectIpsSensorEntriesId string
    an identifier for the resource with format {{fosid}}.
    Os List<string>
    Operating systems to be protected. all includes all operating systems. other includes all unlisted operating systems.
    Protocols List<string>
    Protocols to be examined. set protocol ? lists available protocols. all includes all protocols. other includes all unlisted protocols.
    Quarantine string
    Quarantine method. Valid values: none, attacker, both, interface.
    QuarantineExpiry string
    Duration of quarantine. (Format ###d##h##m, minimum 1m, maximum 364d23h59m, default = 5m). Requires quarantine set to attacker.
    QuarantineLog string
    Enable/disable quarantine logging. Valid values: disable, enable.
    RateCount double
    Count of the rate.
    RateDuration double
    Duration (sec) of the rate.
    RateMode string
    Rate limit mode. Valid values: periodical, continuous.
    RateTrack string
    Track the packet protocol field. Valid values: none, src-ip, dest-ip, dhcp-client-mac, dns-domain.
    Rule string
    Identifies the predefined or custom IPS signatures to add to the sensor.
    Scopetype string
    The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
    Sensor string
    Sensor.
    Severities List<string>
    Relative severity of the signature, from info to critical. Log messages generated by the signature include the severity.
    Status string
    Status of the signatures included in filter. default enables the filter and only use filters with default status of enable. Filters with default status of disable will not be used. Valid values: disable, enable, default.
    VulnTypes List<double>
    List of signature vulnerability types to filter by.
    Action string
    Action taken with traffic in which signatures are detected. Valid values: pass, block, reset, default.
    Adom string
    Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
    Applications []string
    Applications to be protected. set application ? lists available applications. all includes all applications. other includes all unlisted applications.
    Cves []string
    List of CVE IDs of the signatures to add to the sensor
    DefaultAction string
    Signature default action filter. Valid values: block, pass, all, drop.
    DefaultStatus string
    Signature default status filter. Valid values: disable, enable, all.
    DynamicSortSubtable string
    true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
    ExemptIps []ObjectIpsSensorEntriesExemptIpTypeArgs
    Exempt-Ip. The structure of exempt_ip block is documented below.
    Fosid float64
    Rule ID in IPS database (0 - 4294967295).
    LastModified string
    Filter by signature last modified date. Formats: before <date>, after <date>, between <start-date> <end-date>.
    Locations []string
    Protect client or server traffic.
    Log string
    Enable/disable logging of signatures included in filter. Valid values: disable, enable.
    LogAttackContext string
    Enable/disable logging of attack context: URL buffer, header buffer, body buffer, packet buffer. Valid values: disable, enable.
    LogPacket string
    Enable/disable packet logging. Enable to save the packet that triggers the filter. You can download the packets in pcap format for diagnostic use. Valid values: disable, enable.
    ObjectIpsSensorEntriesId string
    an identifier for the resource with format {{fosid}}.
    Os []string
    Operating systems to be protected. all includes all operating systems. other includes all unlisted operating systems.
    Protocols []string
    Protocols to be examined. set protocol ? lists available protocols. all includes all protocols. other includes all unlisted protocols.
    Quarantine string
    Quarantine method. Valid values: none, attacker, both, interface.
    QuarantineExpiry string
    Duration of quarantine. (Format ###d##h##m, minimum 1m, maximum 364d23h59m, default = 5m). Requires quarantine set to attacker.
    QuarantineLog string
    Enable/disable quarantine logging. Valid values: disable, enable.
    RateCount float64
    Count of the rate.
    RateDuration float64
    Duration (sec) of the rate.
    RateMode string
    Rate limit mode. Valid values: periodical, continuous.
    RateTrack string
    Track the packet protocol field. Valid values: none, src-ip, dest-ip, dhcp-client-mac, dns-domain.
    Rule string
    Identifies the predefined or custom IPS signatures to add to the sensor.
    Scopetype string
    The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
    Sensor string
    Sensor.
    Severities []string
    Relative severity of the signature, from info to critical. Log messages generated by the signature include the severity.
    Status string
    Status of the signatures included in filter. default enables the filter and only use filters with default status of enable. Filters with default status of disable will not be used. Valid values: disable, enable, default.
    VulnTypes []float64
    List of signature vulnerability types to filter by.
    action String
    Action taken with traffic in which signatures are detected. Valid values: pass, block, reset, default.
    adom String
    Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
    applications List<String>
    Applications to be protected. set application ? lists available applications. all includes all applications. other includes all unlisted applications.
    cves List<String>
    List of CVE IDs of the signatures to add to the sensor
    defaultAction String
    Signature default action filter. Valid values: block, pass, all, drop.
    defaultStatus String
    Signature default status filter. Valid values: disable, enable, all.
    dynamicSortSubtable String
    true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
    exemptIps List<ObjectIpsSensorEntriesExemptIp>
    Exempt-Ip. The structure of exempt_ip block is documented below.
    fosid Double
    Rule ID in IPS database (0 - 4294967295).
    lastModified String
    Filter by signature last modified date. Formats: before <date>, after <date>, between <start-date> <end-date>.
    locations List<String>
    Protect client or server traffic.
    log String
    Enable/disable logging of signatures included in filter. Valid values: disable, enable.
    logAttackContext String
    Enable/disable logging of attack context: URL buffer, header buffer, body buffer, packet buffer. Valid values: disable, enable.
    logPacket String
    Enable/disable packet logging. Enable to save the packet that triggers the filter. You can download the packets in pcap format for diagnostic use. Valid values: disable, enable.
    objectIpsSensorEntriesId String
    an identifier for the resource with format {{fosid}}.
    os List<String>
    Operating systems to be protected. all includes all operating systems. other includes all unlisted operating systems.
    protocols List<String>
    Protocols to be examined. set protocol ? lists available protocols. all includes all protocols. other includes all unlisted protocols.
    quarantine String
    Quarantine method. Valid values: none, attacker, both, interface.
    quarantineExpiry String
    Duration of quarantine. (Format ###d##h##m, minimum 1m, maximum 364d23h59m, default = 5m). Requires quarantine set to attacker.
    quarantineLog String
    Enable/disable quarantine logging. Valid values: disable, enable.
    rateCount Double
    Count of the rate.
    rateDuration Double
    Duration (sec) of the rate.
    rateMode String
    Rate limit mode. Valid values: periodical, continuous.
    rateTrack String
    Track the packet protocol field. Valid values: none, src-ip, dest-ip, dhcp-client-mac, dns-domain.
    rule String
    Identifies the predefined or custom IPS signatures to add to the sensor.
    scopetype String
    The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
    sensor String
    Sensor.
    severities List<String>
    Relative severity of the signature, from info to critical. Log messages generated by the signature include the severity.
    status String
    Status of the signatures included in filter. default enables the filter and only use filters with default status of enable. Filters with default status of disable will not be used. Valid values: disable, enable, default.
    vulnTypes List<Double>
    List of signature vulnerability types to filter by.
    action string
    Action taken with traffic in which signatures are detected. Valid values: pass, block, reset, default.
    adom string
    Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
    applications string[]
    Applications to be protected. set application ? lists available applications. all includes all applications. other includes all unlisted applications.
    cves string[]
    List of CVE IDs of the signatures to add to the sensor
    defaultAction string
    Signature default action filter. Valid values: block, pass, all, drop.
    defaultStatus string
    Signature default status filter. Valid values: disable, enable, all.
    dynamicSortSubtable string
    true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
    exemptIps ObjectIpsSensorEntriesExemptIp[]
    Exempt-Ip. The structure of exempt_ip block is documented below.
    fosid number
    Rule ID in IPS database (0 - 4294967295).
    lastModified string
    Filter by signature last modified date. Formats: before <date>, after <date>, between <start-date> <end-date>.
    locations string[]
    Protect client or server traffic.
    log string
    Enable/disable logging of signatures included in filter. Valid values: disable, enable.
    logAttackContext string
    Enable/disable logging of attack context: URL buffer, header buffer, body buffer, packet buffer. Valid values: disable, enable.
    logPacket string
    Enable/disable packet logging. Enable to save the packet that triggers the filter. You can download the packets in pcap format for diagnostic use. Valid values: disable, enable.
    objectIpsSensorEntriesId string
    an identifier for the resource with format {{fosid}}.
    os string[]
    Operating systems to be protected. all includes all operating systems. other includes all unlisted operating systems.
    protocols string[]
    Protocols to be examined. set protocol ? lists available protocols. all includes all protocols. other includes all unlisted protocols.
    quarantine string
    Quarantine method. Valid values: none, attacker, both, interface.
    quarantineExpiry string
    Duration of quarantine. (Format ###d##h##m, minimum 1m, maximum 364d23h59m, default = 5m). Requires quarantine set to attacker.
    quarantineLog string
    Enable/disable quarantine logging. Valid values: disable, enable.
    rateCount number
    Count of the rate.
    rateDuration number
    Duration (sec) of the rate.
    rateMode string
    Rate limit mode. Valid values: periodical, continuous.
    rateTrack string
    Track the packet protocol field. Valid values: none, src-ip, dest-ip, dhcp-client-mac, dns-domain.
    rule string
    Identifies the predefined or custom IPS signatures to add to the sensor.
    scopetype string
    The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
    sensor string
    Sensor.
    severities string[]
    Relative severity of the signature, from info to critical. Log messages generated by the signature include the severity.
    status string
    Status of the signatures included in filter. default enables the filter and only use filters with default status of enable. Filters with default status of disable will not be used. Valid values: disable, enable, default.
    vulnTypes number[]
    List of signature vulnerability types to filter by.
    action str
    Action taken with traffic in which signatures are detected. Valid values: pass, block, reset, default.
    adom str
    Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
    applications Sequence[str]
    Applications to be protected. set application ? lists available applications. all includes all applications. other includes all unlisted applications.
    cves Sequence[str]
    List of CVE IDs of the signatures to add to the sensor
    default_action str
    Signature default action filter. Valid values: block, pass, all, drop.
    default_status str
    Signature default status filter. Valid values: disable, enable, all.
    dynamic_sort_subtable str
    true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
    exempt_ips Sequence[ObjectIpsSensorEntriesExemptIpArgs]
    Exempt-Ip. The structure of exempt_ip block is documented below.
    fosid float
    Rule ID in IPS database (0 - 4294967295).
    last_modified str
    Filter by signature last modified date. Formats: before <date>, after <date>, between <start-date> <end-date>.
    locations Sequence[str]
    Protect client or server traffic.
    log str
    Enable/disable logging of signatures included in filter. Valid values: disable, enable.
    log_attack_context str
    Enable/disable logging of attack context: URL buffer, header buffer, body buffer, packet buffer. Valid values: disable, enable.
    log_packet str
    Enable/disable packet logging. Enable to save the packet that triggers the filter. You can download the packets in pcap format for diagnostic use. Valid values: disable, enable.
    object_ips_sensor_entries_id str
    an identifier for the resource with format {{fosid}}.
    os Sequence[str]
    Operating systems to be protected. all includes all operating systems. other includes all unlisted operating systems.
    protocols Sequence[str]
    Protocols to be examined. set protocol ? lists available protocols. all includes all protocols. other includes all unlisted protocols.
    quarantine str
    Quarantine method. Valid values: none, attacker, both, interface.
    quarantine_expiry str
    Duration of quarantine. (Format ###d##h##m, minimum 1m, maximum 364d23h59m, default = 5m). Requires quarantine set to attacker.
    quarantine_log str
    Enable/disable quarantine logging. Valid values: disable, enable.
    rate_count float
    Count of the rate.
    rate_duration float
    Duration (sec) of the rate.
    rate_mode str
    Rate limit mode. Valid values: periodical, continuous.
    rate_track str
    Track the packet protocol field. Valid values: none, src-ip, dest-ip, dhcp-client-mac, dns-domain.
    rule str
    Identifies the predefined or custom IPS signatures to add to the sensor.
    scopetype str
    The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
    sensor str
    Sensor.
    severities Sequence[str]
    Relative severity of the signature, from info to critical. Log messages generated by the signature include the severity.
    status str
    Status of the signatures included in filter. default enables the filter and only use filters with default status of enable. Filters with default status of disable will not be used. Valid values: disable, enable, default.
    vuln_types Sequence[float]
    List of signature vulnerability types to filter by.
    action String
    Action taken with traffic in which signatures are detected. Valid values: pass, block, reset, default.
    adom String
    Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
    applications List<String>
    Applications to be protected. set application ? lists available applications. all includes all applications. other includes all unlisted applications.
    cves List<String>
    List of CVE IDs of the signatures to add to the sensor
    defaultAction String
    Signature default action filter. Valid values: block, pass, all, drop.
    defaultStatus String
    Signature default status filter. Valid values: disable, enable, all.
    dynamicSortSubtable String
    true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
    exemptIps List<Property Map>
    Exempt-Ip. The structure of exempt_ip block is documented below.
    fosid Number
    Rule ID in IPS database (0 - 4294967295).
    lastModified String
    Filter by signature last modified date. Formats: before <date>, after <date>, between <start-date> <end-date>.
    locations List<String>
    Protect client or server traffic.
    log String
    Enable/disable logging of signatures included in filter. Valid values: disable, enable.
    logAttackContext String
    Enable/disable logging of attack context: URL buffer, header buffer, body buffer, packet buffer. Valid values: disable, enable.
    logPacket String
    Enable/disable packet logging. Enable to save the packet that triggers the filter. You can download the packets in pcap format for diagnostic use. Valid values: disable, enable.
    objectIpsSensorEntriesId String
    an identifier for the resource with format {{fosid}}.
    os List<String>
    Operating systems to be protected. all includes all operating systems. other includes all unlisted operating systems.
    protocols List<String>
    Protocols to be examined. set protocol ? lists available protocols. all includes all protocols. other includes all unlisted protocols.
    quarantine String
    Quarantine method. Valid values: none, attacker, both, interface.
    quarantineExpiry String
    Duration of quarantine. (Format ###d##h##m, minimum 1m, maximum 364d23h59m, default = 5m). Requires quarantine set to attacker.
    quarantineLog String
    Enable/disable quarantine logging. Valid values: disable, enable.
    rateCount Number
    Count of the rate.
    rateDuration Number
    Duration (sec) of the rate.
    rateMode String
    Rate limit mode. Valid values: periodical, continuous.
    rateTrack String
    Track the packet protocol field. Valid values: none, src-ip, dest-ip, dhcp-client-mac, dns-domain.
    rule String
    Identifies the predefined or custom IPS signatures to add to the sensor.
    scopetype String
    The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
    sensor String
    Sensor.
    severities List<String>
    Relative severity of the signature, from info to critical. Log messages generated by the signature include the severity.
    status String
    Status of the signatures included in filter. default enables the filter and only use filters with default status of enable. Filters with default status of disable will not be used. Valid values: disable, enable, default.
    vulnTypes List<Number>
    List of signature vulnerability types to filter by.

    Supporting Types

    ObjectIpsSensorEntriesExemptIp, ObjectIpsSensorEntriesExemptIpArgs

    DstIp string
    Destination IP address and netmask.
    Id double
    Exempt IP ID.
    SrcIp string
    Source IP address and netmask.
    DstIp string
    Destination IP address and netmask.
    Id float64
    Exempt IP ID.
    SrcIp string
    Source IP address and netmask.
    dstIp String
    Destination IP address and netmask.
    id Double
    Exempt IP ID.
    srcIp String
    Source IP address and netmask.
    dstIp string
    Destination IP address and netmask.
    id number
    Exempt IP ID.
    srcIp string
    Source IP address and netmask.
    dst_ip str
    Destination IP address and netmask.
    id float
    Exempt IP ID.
    src_ip str
    Source IP address and netmask.
    dstIp String
    Destination IP address and netmask.
    id Number
    Exempt IP ID.
    srcIp String
    Source IP address and netmask.

    Import

    ObjectIps SensorEntries can be imported using any of these accepted formats:

    Set import_options = [“sensor=YOUR_VALUE”] in the provider section.

    $ export “FORTIMANAGER_IMPORT_TABLE”=“true”

    $ pulumi import fortimanager:index/objectIpsSensorEntries:ObjectIpsSensorEntries labelname {{fosid}}
    

    $ unset “FORTIMANAGER_IMPORT_TABLE”

    -> Hint: The scopetype and adom for import will directly inherit the scopetype and adom configuration of the provider.

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    fortimanager fortinetdev/terraform-provider-fortimanager
    License
    Notes
    This Pulumi package is based on the fortimanager Terraform Provider.
    fortimanager logo
    fortimanager 1.13.0 published on Thursday, Mar 13, 2025 by fortinetdev