1. Packages
  2. Fortimanager Provider
  3. API Docs
  4. ObjectFirewallProfileprotocoloptionsCifs
fortimanager 1.13.0 published on Thursday, Mar 13, 2025 by fortinetdev

fortimanager.ObjectFirewallProfileprotocoloptionsCifs

Explore with Pulumi AI

fortimanager logo
fortimanager 1.13.0 published on Thursday, Mar 13, 2025 by fortinetdev

    Configure CIFS protocol options.

    This resource is a sub resource for variable cifs of resource fortimanager.ObjectFirewallProfileprotocoloptions. Conflict and overwrite may occur if use both of them. The following variables have sub resource. Avoid using them together, otherwise conflicts and overwrites may occur.

    • file_filter: fortimanager_object_firewall_profileprotocoloptions_cifs_filefilter
    • server_keytab: fortimanager.ObjectFirewallProfileprotocoloptionsCifsServerkeytab

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as fortimanager from "@pulumi/fortimanager";
    
    const trnameObjectFirewallProfileprotocoloptions = new fortimanager.ObjectFirewallProfileprotocoloptions("trnameObjectFirewallProfileprotocoloptions", {});
    const trnameObjectFirewallProfileprotocoloptionsCifs = new fortimanager.ObjectFirewallProfileprotocoloptionsCifs("trnameObjectFirewallProfileprotocoloptionsCifs", {
        profileProtocolOptions: trnameObjectFirewallProfileprotocoloptions.name,
        options: ["oversize"],
        oversizeLimit: 200,
        ports: [445],
    }, {
        dependsOn: [trnameObjectFirewallProfileprotocoloptions],
    });
    
    import pulumi
    import pulumi_fortimanager as fortimanager
    
    trname_object_firewall_profileprotocoloptions = fortimanager.ObjectFirewallProfileprotocoloptions("trnameObjectFirewallProfileprotocoloptions")
    trname_object_firewall_profileprotocoloptions_cifs = fortimanager.ObjectFirewallProfileprotocoloptionsCifs("trnameObjectFirewallProfileprotocoloptionsCifs",
        profile_protocol_options=trname_object_firewall_profileprotocoloptions.name,
        options=["oversize"],
        oversize_limit=200,
        ports=[445],
        opts = pulumi.ResourceOptions(depends_on=[trname_object_firewall_profileprotocoloptions]))
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/fortimanager/fortimanager"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		trnameObjectFirewallProfileprotocoloptions, err := fortimanager.NewObjectFirewallProfileprotocoloptions(ctx, "trnameObjectFirewallProfileprotocoloptions", nil)
    		if err != nil {
    			return err
    		}
    		_, err = fortimanager.NewObjectFirewallProfileprotocoloptionsCifs(ctx, "trnameObjectFirewallProfileprotocoloptionsCifs", &fortimanager.ObjectFirewallProfileprotocoloptionsCifsArgs{
    			ProfileProtocolOptions: trnameObjectFirewallProfileprotocoloptions.Name,
    			Options: pulumi.StringArray{
    				pulumi.String("oversize"),
    			},
    			OversizeLimit: pulumi.Float64(200),
    			Ports: pulumi.Float64Array{
    				pulumi.Float64(445),
    			},
    		}, pulumi.DependsOn([]pulumi.Resource{
    			trnameObjectFirewallProfileprotocoloptions,
    		}))
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Fortimanager = Pulumi.Fortimanager;
    
    return await Deployment.RunAsync(() => 
    {
        var trnameObjectFirewallProfileprotocoloptions = new Fortimanager.ObjectFirewallProfileprotocoloptions("trnameObjectFirewallProfileprotocoloptions");
    
        var trnameObjectFirewallProfileprotocoloptionsCifs = new Fortimanager.ObjectFirewallProfileprotocoloptionsCifs("trnameObjectFirewallProfileprotocoloptionsCifs", new()
        {
            ProfileProtocolOptions = trnameObjectFirewallProfileprotocoloptions.Name,
            Options = new[]
            {
                "oversize",
            },
            OversizeLimit = 200,
            Ports = new[]
            {
                445,
            },
        }, new CustomResourceOptions
        {
            DependsOn =
            {
                trnameObjectFirewallProfileprotocoloptions,
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.fortimanager.ObjectFirewallProfileprotocoloptions;
    import com.pulumi.fortimanager.ObjectFirewallProfileprotocoloptionsCifs;
    import com.pulumi.fortimanager.ObjectFirewallProfileprotocoloptionsCifsArgs;
    import com.pulumi.resources.CustomResourceOptions;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var trnameObjectFirewallProfileprotocoloptions = new ObjectFirewallProfileprotocoloptions("trnameObjectFirewallProfileprotocoloptions");
    
            var trnameObjectFirewallProfileprotocoloptionsCifs = new ObjectFirewallProfileprotocoloptionsCifs("trnameObjectFirewallProfileprotocoloptionsCifs", ObjectFirewallProfileprotocoloptionsCifsArgs.builder()
                .profileProtocolOptions(trnameObjectFirewallProfileprotocoloptions.name())
                .options("oversize")
                .oversizeLimit(200)
                .ports(445)
                .build(), CustomResourceOptions.builder()
                    .dependsOn(trnameObjectFirewallProfileprotocoloptions)
                    .build());
    
        }
    }
    
    resources:
      trnameObjectFirewallProfileprotocoloptionsCifs:
        type: fortimanager:ObjectFirewallProfileprotocoloptionsCifs
        properties:
          profileProtocolOptions: ${trnameObjectFirewallProfileprotocoloptions.name}
          options:
            - oversize
          oversizeLimit: 200
          ports:
            - 445
        options:
          dependsOn:
            - ${trnameObjectFirewallProfileprotocoloptions}
      trnameObjectFirewallProfileprotocoloptions:
        type: fortimanager:ObjectFirewallProfileprotocoloptions
    

    Create ObjectFirewallProfileprotocoloptionsCifs Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new ObjectFirewallProfileprotocoloptionsCifs(name: string, args: ObjectFirewallProfileprotocoloptionsCifsArgs, opts?: CustomResourceOptions);
    @overload
    def ObjectFirewallProfileprotocoloptionsCifs(resource_name: str,
                                                 args: ObjectFirewallProfileprotocoloptionsCifsInitArgs,
                                                 opts: Optional[ResourceOptions] = None)
    
    @overload
    def ObjectFirewallProfileprotocoloptionsCifs(resource_name: str,
                                                 opts: Optional[ResourceOptions] = None,
                                                 profile_protocol_options: Optional[str] = None,
                                                 scopetype: Optional[str] = None,
                                                 uncompressed_oversize_limit: Optional[float] = None,
                                                 scan_bzip2: Optional[str] = None,
                                                 object_firewall_profileprotocoloptions_cifs_id: Optional[str] = None,
                                                 options: Optional[Sequence[str]] = None,
                                                 oversize_limit: Optional[float] = None,
                                                 ports: Optional[Sequence[float]] = None,
                                                 domain_controller: Optional[str] = None,
                                                 file_filter: Optional[ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs] = None,
                                                 dynamic_sort_subtable: Optional[str] = None,
                                                 server_keytabs: Optional[Sequence[ObjectFirewallProfileprotocoloptionsCifsServerKeytabArgs]] = None,
                                                 server_credential_type: Optional[str] = None,
                                                 status: Optional[str] = None,
                                                 tcp_window_maximum: Optional[float] = None,
                                                 tcp_window_minimum: Optional[float] = None,
                                                 tcp_window_size: Optional[float] = None,
                                                 tcp_window_type: Optional[str] = None,
                                                 uncompressed_nest_limit: Optional[float] = None,
                                                 adom: Optional[str] = None)
    func NewObjectFirewallProfileprotocoloptionsCifs(ctx *Context, name string, args ObjectFirewallProfileprotocoloptionsCifsArgs, opts ...ResourceOption) (*ObjectFirewallProfileprotocoloptionsCifs, error)
    public ObjectFirewallProfileprotocoloptionsCifs(string name, ObjectFirewallProfileprotocoloptionsCifsArgs args, CustomResourceOptions? opts = null)
    public ObjectFirewallProfileprotocoloptionsCifs(String name, ObjectFirewallProfileprotocoloptionsCifsArgs args)
    public ObjectFirewallProfileprotocoloptionsCifs(String name, ObjectFirewallProfileprotocoloptionsCifsArgs args, CustomResourceOptions options)
    
    type: fortimanager:ObjectFirewallProfileprotocoloptionsCifs
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args ObjectFirewallProfileprotocoloptionsCifsArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args ObjectFirewallProfileprotocoloptionsCifsInitArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args ObjectFirewallProfileprotocoloptionsCifsArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args ObjectFirewallProfileprotocoloptionsCifsArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args ObjectFirewallProfileprotocoloptionsCifsArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var objectFirewallProfileprotocoloptionsCifsResource = new Fortimanager.ObjectFirewallProfileprotocoloptionsCifs("objectFirewallProfileprotocoloptionsCifsResource", new()
    {
        ProfileProtocolOptions = "string",
        Scopetype = "string",
        UncompressedOversizeLimit = 0,
        ScanBzip2 = "string",
        ObjectFirewallProfileprotocoloptionsCifsId = "string",
        Options = new[]
        {
            "string",
        },
        OversizeLimit = 0,
        Ports = new[]
        {
            0,
        },
        DomainController = "string",
        FileFilter = new Fortimanager.Inputs.ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs
        {
            Entries = new[]
            {
                new Fortimanager.Inputs.ObjectFirewallProfileprotocoloptionsCifsFileFilterEntryArgs
                {
                    Action = "string",
                    Comment = "string",
                    Direction = "string",
                    FileTypes = new[]
                    {
                        "string",
                    },
                    Filter = "string",
                    Protocols = new[]
                    {
                        "string",
                    },
                },
            },
            Log = "string",
            Status = "string",
        },
        DynamicSortSubtable = "string",
        ServerKeytabs = new[]
        {
            new Fortimanager.Inputs.ObjectFirewallProfileprotocoloptionsCifsServerKeytabArgs
            {
                Keytab = "string",
                Passwords = new[]
                {
                    "string",
                },
                Principal = "string",
            },
        },
        ServerCredentialType = "string",
        Status = "string",
        TcpWindowMaximum = 0,
        TcpWindowMinimum = 0,
        TcpWindowSize = 0,
        TcpWindowType = "string",
        UncompressedNestLimit = 0,
        Adom = "string",
    });
    
    example, err := fortimanager.NewObjectFirewallProfileprotocoloptionsCifs(ctx, "objectFirewallProfileprotocoloptionsCifsResource", &fortimanager.ObjectFirewallProfileprotocoloptionsCifsArgs{
    ProfileProtocolOptions: pulumi.String("string"),
    Scopetype: pulumi.String("string"),
    UncompressedOversizeLimit: pulumi.Float64(0),
    ScanBzip2: pulumi.String("string"),
    ObjectFirewallProfileprotocoloptionsCifsId: pulumi.String("string"),
    Options: pulumi.StringArray{
    pulumi.String("string"),
    },
    OversizeLimit: pulumi.Float64(0),
    Ports: pulumi.Float64Array{
    pulumi.Float64(0),
    },
    DomainController: pulumi.String("string"),
    FileFilter: &.ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs{
    Entries: .ObjectFirewallProfileprotocoloptionsCifsFileFilterEntryArray{
    &.ObjectFirewallProfileprotocoloptionsCifsFileFilterEntryArgs{
    Action: pulumi.String("string"),
    Comment: pulumi.String("string"),
    Direction: pulumi.String("string"),
    FileTypes: pulumi.StringArray{
    pulumi.String("string"),
    },
    Filter: pulumi.String("string"),
    Protocols: pulumi.StringArray{
    pulumi.String("string"),
    },
    },
    },
    Log: pulumi.String("string"),
    Status: pulumi.String("string"),
    },
    DynamicSortSubtable: pulumi.String("string"),
    ServerKeytabs: .ObjectFirewallProfileprotocoloptionsCifsServerKeytabTypeArray{
    &.ObjectFirewallProfileprotocoloptionsCifsServerKeytabTypeArgs{
    Keytab: pulumi.String("string"),
    Passwords: pulumi.StringArray{
    pulumi.String("string"),
    },
    Principal: pulumi.String("string"),
    },
    },
    ServerCredentialType: pulumi.String("string"),
    Status: pulumi.String("string"),
    TcpWindowMaximum: pulumi.Float64(0),
    TcpWindowMinimum: pulumi.Float64(0),
    TcpWindowSize: pulumi.Float64(0),
    TcpWindowType: pulumi.String("string"),
    UncompressedNestLimit: pulumi.Float64(0),
    Adom: pulumi.String("string"),
    })
    
    var objectFirewallProfileprotocoloptionsCifsResource = new ObjectFirewallProfileprotocoloptionsCifs("objectFirewallProfileprotocoloptionsCifsResource", ObjectFirewallProfileprotocoloptionsCifsArgs.builder()
        .profileProtocolOptions("string")
        .scopetype("string")
        .uncompressedOversizeLimit(0)
        .scanBzip2("string")
        .objectFirewallProfileprotocoloptionsCifsId("string")
        .options("string")
        .oversizeLimit(0)
        .ports(0)
        .domainController("string")
        .fileFilter(ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs.builder()
            .entries(ObjectFirewallProfileprotocoloptionsCifsFileFilterEntryArgs.builder()
                .action("string")
                .comment("string")
                .direction("string")
                .fileTypes("string")
                .filter("string")
                .protocols("string")
                .build())
            .log("string")
            .status("string")
            .build())
        .dynamicSortSubtable("string")
        .serverKeytabs(ObjectFirewallProfileprotocoloptionsCifsServerKeytabArgs.builder()
            .keytab("string")
            .passwords("string")
            .principal("string")
            .build())
        .serverCredentialType("string")
        .status("string")
        .tcpWindowMaximum(0)
        .tcpWindowMinimum(0)
        .tcpWindowSize(0)
        .tcpWindowType("string")
        .uncompressedNestLimit(0)
        .adom("string")
        .build());
    
    object_firewall_profileprotocoloptions_cifs_resource = fortimanager.ObjectFirewallProfileprotocoloptionsCifs("objectFirewallProfileprotocoloptionsCifsResource",
        profile_protocol_options="string",
        scopetype="string",
        uncompressed_oversize_limit=0,
        scan_bzip2="string",
        object_firewall_profileprotocoloptions_cifs_id="string",
        options=["string"],
        oversize_limit=0,
        ports=[0],
        domain_controller="string",
        file_filter={
            "entries": [{
                "action": "string",
                "comment": "string",
                "direction": "string",
                "file_types": ["string"],
                "filter": "string",
                "protocols": ["string"],
            }],
            "log": "string",
            "status": "string",
        },
        dynamic_sort_subtable="string",
        server_keytabs=[{
            "keytab": "string",
            "passwords": ["string"],
            "principal": "string",
        }],
        server_credential_type="string",
        status="string",
        tcp_window_maximum=0,
        tcp_window_minimum=0,
        tcp_window_size=0,
        tcp_window_type="string",
        uncompressed_nest_limit=0,
        adom="string")
    
    const objectFirewallProfileprotocoloptionsCifsResource = new fortimanager.ObjectFirewallProfileprotocoloptionsCifs("objectFirewallProfileprotocoloptionsCifsResource", {
        profileProtocolOptions: "string",
        scopetype: "string",
        uncompressedOversizeLimit: 0,
        scanBzip2: "string",
        objectFirewallProfileprotocoloptionsCifsId: "string",
        options: ["string"],
        oversizeLimit: 0,
        ports: [0],
        domainController: "string",
        fileFilter: {
            entries: [{
                action: "string",
                comment: "string",
                direction: "string",
                fileTypes: ["string"],
                filter: "string",
                protocols: ["string"],
            }],
            log: "string",
            status: "string",
        },
        dynamicSortSubtable: "string",
        serverKeytabs: [{
            keytab: "string",
            passwords: ["string"],
            principal: "string",
        }],
        serverCredentialType: "string",
        status: "string",
        tcpWindowMaximum: 0,
        tcpWindowMinimum: 0,
        tcpWindowSize: 0,
        tcpWindowType: "string",
        uncompressedNestLimit: 0,
        adom: "string",
    });
    
    type: fortimanager:ObjectFirewallProfileprotocoloptionsCifs
    properties:
        adom: string
        domainController: string
        dynamicSortSubtable: string
        fileFilter:
            entries:
                - action: string
                  comment: string
                  direction: string
                  fileTypes:
                    - string
                  filter: string
                  protocols:
                    - string
            log: string
            status: string
        objectFirewallProfileprotocoloptionsCifsId: string
        options:
            - string
        oversizeLimit: 0
        ports:
            - 0
        profileProtocolOptions: string
        scanBzip2: string
        scopetype: string
        serverCredentialType: string
        serverKeytabs:
            - keytab: string
              passwords:
                - string
              principal: string
        status: string
        tcpWindowMaximum: 0
        tcpWindowMinimum: 0
        tcpWindowSize: 0
        tcpWindowType: string
        uncompressedNestLimit: 0
        uncompressedOversizeLimit: 0
    

    ObjectFirewallProfileprotocoloptionsCifs Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The ObjectFirewallProfileprotocoloptionsCifs resource accepts the following input properties:

    ProfileProtocolOptions string
    Profile Protocol Options.
    Adom string
    Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
    DomainController string
    Domain for which to decrypt CIFS traffic.
    DynamicSortSubtable string
    true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
    FileFilter ObjectFirewallProfileprotocoloptionsCifsFileFilter
    File-Filter. The structure of file_filter block is documented below.
    ObjectFirewallProfileprotocoloptionsCifsId string
    an identifier for the resource.
    Options List<string>
    One or more options that can be applied to the session. Valid values: oversize.
    OversizeLimit double
    Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
    Ports List<double>
    Ports to scan for content (1 - 65535, default = 445).
    ScanBzip2 string
    Enable/disable scanning of BZip2 compressed files. Valid values: disable, enable.
    Scopetype string
    The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
    ServerCredentialType string
    CIFS server credential type. Valid values: none, credential-replication, credential-keytab.
    ServerKeytabs List<ObjectFirewallProfileprotocoloptionsCifsServerKeytab>
    Server-Keytab. The structure of server_keytab block is documented below.
    Status string
    Enable/disable the active status of scanning for this protocol. Valid values: disable, enable.
    TcpWindowMaximum double
    Maximum dynamic TCP window size (default = 8MB).
    TcpWindowMinimum double
    Minimum dynamic TCP window size (default = 128KB).
    TcpWindowSize double
    Set TCP static window size (default = 256KB).
    TcpWindowType string
    Specify type of TCP window to use for this protocol. Valid values: system, static, dynamic.
    UncompressedNestLimit double
    Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
    UncompressedOversizeLimit double
    Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
    ProfileProtocolOptions string
    Profile Protocol Options.
    Adom string
    Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
    DomainController string
    Domain for which to decrypt CIFS traffic.
    DynamicSortSubtable string
    true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
    FileFilter ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs
    File-Filter. The structure of file_filter block is documented below.
    ObjectFirewallProfileprotocoloptionsCifsId string
    an identifier for the resource.
    Options []string
    One or more options that can be applied to the session. Valid values: oversize.
    OversizeLimit float64
    Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
    Ports []float64
    Ports to scan for content (1 - 65535, default = 445).
    ScanBzip2 string
    Enable/disable scanning of BZip2 compressed files. Valid values: disable, enable.
    Scopetype string
    The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
    ServerCredentialType string
    CIFS server credential type. Valid values: none, credential-replication, credential-keytab.
    ServerKeytabs []ObjectFirewallProfileprotocoloptionsCifsServerKeytabTypeArgs
    Server-Keytab. The structure of server_keytab block is documented below.
    Status string
    Enable/disable the active status of scanning for this protocol. Valid values: disable, enable.
    TcpWindowMaximum float64
    Maximum dynamic TCP window size (default = 8MB).
    TcpWindowMinimum float64
    Minimum dynamic TCP window size (default = 128KB).
    TcpWindowSize float64
    Set TCP static window size (default = 256KB).
    TcpWindowType string
    Specify type of TCP window to use for this protocol. Valid values: system, static, dynamic.
    UncompressedNestLimit float64
    Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
    UncompressedOversizeLimit float64
    Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
    profileProtocolOptions String
    Profile Protocol Options.
    adom String
    Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
    domainController String
    Domain for which to decrypt CIFS traffic.
    dynamicSortSubtable String
    true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
    fileFilter ObjectFirewallProfileprotocoloptionsCifsFileFilter
    File-Filter. The structure of file_filter block is documented below.
    objectFirewallProfileprotocoloptionsCifsId String
    an identifier for the resource.
    options List<String>
    One or more options that can be applied to the session. Valid values: oversize.
    oversizeLimit Double
    Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
    ports List<Double>
    Ports to scan for content (1 - 65535, default = 445).
    scanBzip2 String
    Enable/disable scanning of BZip2 compressed files. Valid values: disable, enable.
    scopetype String
    The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
    serverCredentialType String
    CIFS server credential type. Valid values: none, credential-replication, credential-keytab.
    serverKeytabs List<ObjectFirewallProfileprotocoloptionsCifsServerKeytab>
    Server-Keytab. The structure of server_keytab block is documented below.
    status String
    Enable/disable the active status of scanning for this protocol. Valid values: disable, enable.
    tcpWindowMaximum Double
    Maximum dynamic TCP window size (default = 8MB).
    tcpWindowMinimum Double
    Minimum dynamic TCP window size (default = 128KB).
    tcpWindowSize Double
    Set TCP static window size (default = 256KB).
    tcpWindowType String
    Specify type of TCP window to use for this protocol. Valid values: system, static, dynamic.
    uncompressedNestLimit Double
    Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
    uncompressedOversizeLimit Double
    Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
    profileProtocolOptions string
    Profile Protocol Options.
    adom string
    Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
    domainController string
    Domain for which to decrypt CIFS traffic.
    dynamicSortSubtable string
    true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
    fileFilter ObjectFirewallProfileprotocoloptionsCifsFileFilter
    File-Filter. The structure of file_filter block is documented below.
    objectFirewallProfileprotocoloptionsCifsId string
    an identifier for the resource.
    options string[]
    One or more options that can be applied to the session. Valid values: oversize.
    oversizeLimit number
    Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
    ports number[]
    Ports to scan for content (1 - 65535, default = 445).
    scanBzip2 string
    Enable/disable scanning of BZip2 compressed files. Valid values: disable, enable.
    scopetype string
    The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
    serverCredentialType string
    CIFS server credential type. Valid values: none, credential-replication, credential-keytab.
    serverKeytabs ObjectFirewallProfileprotocoloptionsCifsServerKeytab[]
    Server-Keytab. The structure of server_keytab block is documented below.
    status string
    Enable/disable the active status of scanning for this protocol. Valid values: disable, enable.
    tcpWindowMaximum number
    Maximum dynamic TCP window size (default = 8MB).
    tcpWindowMinimum number
    Minimum dynamic TCP window size (default = 128KB).
    tcpWindowSize number
    Set TCP static window size (default = 256KB).
    tcpWindowType string
    Specify type of TCP window to use for this protocol. Valid values: system, static, dynamic.
    uncompressedNestLimit number
    Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
    uncompressedOversizeLimit number
    Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
    profile_protocol_options str
    Profile Protocol Options.
    adom str
    Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
    domain_controller str
    Domain for which to decrypt CIFS traffic.
    dynamic_sort_subtable str
    true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
    file_filter ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs
    File-Filter. The structure of file_filter block is documented below.
    object_firewall_profileprotocoloptions_cifs_id str
    an identifier for the resource.
    options Sequence[str]
    One or more options that can be applied to the session. Valid values: oversize.
    oversize_limit float
    Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
    ports Sequence[float]
    Ports to scan for content (1 - 65535, default = 445).
    scan_bzip2 str
    Enable/disable scanning of BZip2 compressed files. Valid values: disable, enable.
    scopetype str
    The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
    server_credential_type str
    CIFS server credential type. Valid values: none, credential-replication, credential-keytab.
    server_keytabs Sequence[ObjectFirewallProfileprotocoloptionsCifsServerKeytabArgs]
    Server-Keytab. The structure of server_keytab block is documented below.
    status str
    Enable/disable the active status of scanning for this protocol. Valid values: disable, enable.
    tcp_window_maximum float
    Maximum dynamic TCP window size (default = 8MB).
    tcp_window_minimum float
    Minimum dynamic TCP window size (default = 128KB).
    tcp_window_size float
    Set TCP static window size (default = 256KB).
    tcp_window_type str
    Specify type of TCP window to use for this protocol. Valid values: system, static, dynamic.
    uncompressed_nest_limit float
    Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
    uncompressed_oversize_limit float
    Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
    profileProtocolOptions String
    Profile Protocol Options.
    adom String
    Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
    domainController String
    Domain for which to decrypt CIFS traffic.
    dynamicSortSubtable String
    true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
    fileFilter Property Map
    File-Filter. The structure of file_filter block is documented below.
    objectFirewallProfileprotocoloptionsCifsId String
    an identifier for the resource.
    options List<String>
    One or more options that can be applied to the session. Valid values: oversize.
    oversizeLimit Number
    Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
    ports List<Number>
    Ports to scan for content (1 - 65535, default = 445).
    scanBzip2 String
    Enable/disable scanning of BZip2 compressed files. Valid values: disable, enable.
    scopetype String
    The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
    serverCredentialType String
    CIFS server credential type. Valid values: none, credential-replication, credential-keytab.
    serverKeytabs List<Property Map>
    Server-Keytab. The structure of server_keytab block is documented below.
    status String
    Enable/disable the active status of scanning for this protocol. Valid values: disable, enable.
    tcpWindowMaximum Number
    Maximum dynamic TCP window size (default = 8MB).
    tcpWindowMinimum Number
    Minimum dynamic TCP window size (default = 128KB).
    tcpWindowSize Number
    Set TCP static window size (default = 256KB).
    tcpWindowType String
    Specify type of TCP window to use for this protocol. Valid values: system, static, dynamic.
    uncompressedNestLimit Number
    Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
    uncompressedOversizeLimit Number
    Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).

    Outputs

    All input properties are implicitly available as output properties. Additionally, the ObjectFirewallProfileprotocoloptionsCifs resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing ObjectFirewallProfileprotocoloptionsCifs Resource

    Get an existing ObjectFirewallProfileprotocoloptionsCifs resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: ObjectFirewallProfileprotocoloptionsCifsState, opts?: CustomResourceOptions): ObjectFirewallProfileprotocoloptionsCifs
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            adom: Optional[str] = None,
            domain_controller: Optional[str] = None,
            dynamic_sort_subtable: Optional[str] = None,
            file_filter: Optional[ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs] = None,
            object_firewall_profileprotocoloptions_cifs_id: Optional[str] = None,
            options: Optional[Sequence[str]] = None,
            oversize_limit: Optional[float] = None,
            ports: Optional[Sequence[float]] = None,
            profile_protocol_options: Optional[str] = None,
            scan_bzip2: Optional[str] = None,
            scopetype: Optional[str] = None,
            server_credential_type: Optional[str] = None,
            server_keytabs: Optional[Sequence[ObjectFirewallProfileprotocoloptionsCifsServerKeytabArgs]] = None,
            status: Optional[str] = None,
            tcp_window_maximum: Optional[float] = None,
            tcp_window_minimum: Optional[float] = None,
            tcp_window_size: Optional[float] = None,
            tcp_window_type: Optional[str] = None,
            uncompressed_nest_limit: Optional[float] = None,
            uncompressed_oversize_limit: Optional[float] = None) -> ObjectFirewallProfileprotocoloptionsCifs
    func GetObjectFirewallProfileprotocoloptionsCifs(ctx *Context, name string, id IDInput, state *ObjectFirewallProfileprotocoloptionsCifsState, opts ...ResourceOption) (*ObjectFirewallProfileprotocoloptionsCifs, error)
    public static ObjectFirewallProfileprotocoloptionsCifs Get(string name, Input<string> id, ObjectFirewallProfileprotocoloptionsCifsState? state, CustomResourceOptions? opts = null)
    public static ObjectFirewallProfileprotocoloptionsCifs get(String name, Output<String> id, ObjectFirewallProfileprotocoloptionsCifsState state, CustomResourceOptions options)
    resources:  _:    type: fortimanager:ObjectFirewallProfileprotocoloptionsCifs    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    Adom string
    Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
    DomainController string
    Domain for which to decrypt CIFS traffic.
    DynamicSortSubtable string
    true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
    FileFilter ObjectFirewallProfileprotocoloptionsCifsFileFilter
    File-Filter. The structure of file_filter block is documented below.
    ObjectFirewallProfileprotocoloptionsCifsId string
    an identifier for the resource.
    Options List<string>
    One or more options that can be applied to the session. Valid values: oversize.
    OversizeLimit double
    Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
    Ports List<double>
    Ports to scan for content (1 - 65535, default = 445).
    ProfileProtocolOptions string
    Profile Protocol Options.
    ScanBzip2 string
    Enable/disable scanning of BZip2 compressed files. Valid values: disable, enable.
    Scopetype string
    The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
    ServerCredentialType string
    CIFS server credential type. Valid values: none, credential-replication, credential-keytab.
    ServerKeytabs List<ObjectFirewallProfileprotocoloptionsCifsServerKeytab>
    Server-Keytab. The structure of server_keytab block is documented below.
    Status string
    Enable/disable the active status of scanning for this protocol. Valid values: disable, enable.
    TcpWindowMaximum double
    Maximum dynamic TCP window size (default = 8MB).
    TcpWindowMinimum double
    Minimum dynamic TCP window size (default = 128KB).
    TcpWindowSize double
    Set TCP static window size (default = 256KB).
    TcpWindowType string
    Specify type of TCP window to use for this protocol. Valid values: system, static, dynamic.
    UncompressedNestLimit double
    Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
    UncompressedOversizeLimit double
    Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
    Adom string
    Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
    DomainController string
    Domain for which to decrypt CIFS traffic.
    DynamicSortSubtable string
    true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
    FileFilter ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs
    File-Filter. The structure of file_filter block is documented below.
    ObjectFirewallProfileprotocoloptionsCifsId string
    an identifier for the resource.
    Options []string
    One or more options that can be applied to the session. Valid values: oversize.
    OversizeLimit float64
    Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
    Ports []float64
    Ports to scan for content (1 - 65535, default = 445).
    ProfileProtocolOptions string
    Profile Protocol Options.
    ScanBzip2 string
    Enable/disable scanning of BZip2 compressed files. Valid values: disable, enable.
    Scopetype string
    The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
    ServerCredentialType string
    CIFS server credential type. Valid values: none, credential-replication, credential-keytab.
    ServerKeytabs []ObjectFirewallProfileprotocoloptionsCifsServerKeytabTypeArgs
    Server-Keytab. The structure of server_keytab block is documented below.
    Status string
    Enable/disable the active status of scanning for this protocol. Valid values: disable, enable.
    TcpWindowMaximum float64
    Maximum dynamic TCP window size (default = 8MB).
    TcpWindowMinimum float64
    Minimum dynamic TCP window size (default = 128KB).
    TcpWindowSize float64
    Set TCP static window size (default = 256KB).
    TcpWindowType string
    Specify type of TCP window to use for this protocol. Valid values: system, static, dynamic.
    UncompressedNestLimit float64
    Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
    UncompressedOversizeLimit float64
    Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
    adom String
    Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
    domainController String
    Domain for which to decrypt CIFS traffic.
    dynamicSortSubtable String
    true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
    fileFilter ObjectFirewallProfileprotocoloptionsCifsFileFilter
    File-Filter. The structure of file_filter block is documented below.
    objectFirewallProfileprotocoloptionsCifsId String
    an identifier for the resource.
    options List<String>
    One or more options that can be applied to the session. Valid values: oversize.
    oversizeLimit Double
    Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
    ports List<Double>
    Ports to scan for content (1 - 65535, default = 445).
    profileProtocolOptions String
    Profile Protocol Options.
    scanBzip2 String
    Enable/disable scanning of BZip2 compressed files. Valid values: disable, enable.
    scopetype String
    The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
    serverCredentialType String
    CIFS server credential type. Valid values: none, credential-replication, credential-keytab.
    serverKeytabs List<ObjectFirewallProfileprotocoloptionsCifsServerKeytab>
    Server-Keytab. The structure of server_keytab block is documented below.
    status String
    Enable/disable the active status of scanning for this protocol. Valid values: disable, enable.
    tcpWindowMaximum Double
    Maximum dynamic TCP window size (default = 8MB).
    tcpWindowMinimum Double
    Minimum dynamic TCP window size (default = 128KB).
    tcpWindowSize Double
    Set TCP static window size (default = 256KB).
    tcpWindowType String
    Specify type of TCP window to use for this protocol. Valid values: system, static, dynamic.
    uncompressedNestLimit Double
    Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
    uncompressedOversizeLimit Double
    Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
    adom string
    Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
    domainController string
    Domain for which to decrypt CIFS traffic.
    dynamicSortSubtable string
    true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
    fileFilter ObjectFirewallProfileprotocoloptionsCifsFileFilter
    File-Filter. The structure of file_filter block is documented below.
    objectFirewallProfileprotocoloptionsCifsId string
    an identifier for the resource.
    options string[]
    One or more options that can be applied to the session. Valid values: oversize.
    oversizeLimit number
    Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
    ports number[]
    Ports to scan for content (1 - 65535, default = 445).
    profileProtocolOptions string
    Profile Protocol Options.
    scanBzip2 string
    Enable/disable scanning of BZip2 compressed files. Valid values: disable, enable.
    scopetype string
    The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
    serverCredentialType string
    CIFS server credential type. Valid values: none, credential-replication, credential-keytab.
    serverKeytabs ObjectFirewallProfileprotocoloptionsCifsServerKeytab[]
    Server-Keytab. The structure of server_keytab block is documented below.
    status string
    Enable/disable the active status of scanning for this protocol. Valid values: disable, enable.
    tcpWindowMaximum number
    Maximum dynamic TCP window size (default = 8MB).
    tcpWindowMinimum number
    Minimum dynamic TCP window size (default = 128KB).
    tcpWindowSize number
    Set TCP static window size (default = 256KB).
    tcpWindowType string
    Specify type of TCP window to use for this protocol. Valid values: system, static, dynamic.
    uncompressedNestLimit number
    Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
    uncompressedOversizeLimit number
    Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
    adom str
    Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
    domain_controller str
    Domain for which to decrypt CIFS traffic.
    dynamic_sort_subtable str
    true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
    file_filter ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs
    File-Filter. The structure of file_filter block is documented below.
    object_firewall_profileprotocoloptions_cifs_id str
    an identifier for the resource.
    options Sequence[str]
    One or more options that can be applied to the session. Valid values: oversize.
    oversize_limit float
    Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
    ports Sequence[float]
    Ports to scan for content (1 - 65535, default = 445).
    profile_protocol_options str
    Profile Protocol Options.
    scan_bzip2 str
    Enable/disable scanning of BZip2 compressed files. Valid values: disable, enable.
    scopetype str
    The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
    server_credential_type str
    CIFS server credential type. Valid values: none, credential-replication, credential-keytab.
    server_keytabs Sequence[ObjectFirewallProfileprotocoloptionsCifsServerKeytabArgs]
    Server-Keytab. The structure of server_keytab block is documented below.
    status str
    Enable/disable the active status of scanning for this protocol. Valid values: disable, enable.
    tcp_window_maximum float
    Maximum dynamic TCP window size (default = 8MB).
    tcp_window_minimum float
    Minimum dynamic TCP window size (default = 128KB).
    tcp_window_size float
    Set TCP static window size (default = 256KB).
    tcp_window_type str
    Specify type of TCP window to use for this protocol. Valid values: system, static, dynamic.
    uncompressed_nest_limit float
    Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
    uncompressed_oversize_limit float
    Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).
    adom String
    Adom. This value is valid only when the scopetype is adom, otherwise the value of adom in the provider will be inherited.
    domainController String
    Domain for which to decrypt CIFS traffic.
    dynamicSortSubtable String
    true or false, set this parameter to true when using dynamic for_each + toset to configure and sort sub-tables, please do not set this parameter when configuring static sub-tables.
    fileFilter Property Map
    File-Filter. The structure of file_filter block is documented below.
    objectFirewallProfileprotocoloptionsCifsId String
    an identifier for the resource.
    options List<String>
    One or more options that can be applied to the session. Valid values: oversize.
    oversizeLimit Number
    Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10).
    ports List<Number>
    Ports to scan for content (1 - 65535, default = 445).
    profileProtocolOptions String
    Profile Protocol Options.
    scanBzip2 String
    Enable/disable scanning of BZip2 compressed files. Valid values: disable, enable.
    scopetype String
    The scope of application of the resource. Valid values: inherit, adom, global. The inherit means that the scopetype of the provider will be inherited, and adom will also be inherited. The default value is inherit.
    serverCredentialType String
    CIFS server credential type. Valid values: none, credential-replication, credential-keytab.
    serverKeytabs List<Property Map>
    Server-Keytab. The structure of server_keytab block is documented below.
    status String
    Enable/disable the active status of scanning for this protocol. Valid values: disable, enable.
    tcpWindowMaximum Number
    Maximum dynamic TCP window size (default = 8MB).
    tcpWindowMinimum Number
    Minimum dynamic TCP window size (default = 128KB).
    tcpWindowSize Number
    Set TCP static window size (default = 256KB).
    tcpWindowType String
    Specify type of TCP window to use for this protocol. Valid values: system, static, dynamic.
    uncompressedNestLimit Number
    Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12).
    uncompressedOversizeLimit Number
    Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10).

    Supporting Types

    ObjectFirewallProfileprotocoloptionsCifsFileFilter, ObjectFirewallProfileprotocoloptionsCifsFileFilterArgs

    Entries List<ObjectFirewallProfileprotocoloptionsCifsFileFilterEntry>
    Entries. The structure of entries block is documented below.
    Log string
    Enable/disable file filter logging. Valid values: disable, enable.
    Status string
    Enable/disable file filter. Valid values: disable, enable.
    Entries []ObjectFirewallProfileprotocoloptionsCifsFileFilterEntry
    Entries. The structure of entries block is documented below.
    Log string
    Enable/disable file filter logging. Valid values: disable, enable.
    Status string
    Enable/disable file filter. Valid values: disable, enable.
    entries List<ObjectFirewallProfileprotocoloptionsCifsFileFilterEntry>
    Entries. The structure of entries block is documented below.
    log String
    Enable/disable file filter logging. Valid values: disable, enable.
    status String
    Enable/disable file filter. Valid values: disable, enable.
    entries ObjectFirewallProfileprotocoloptionsCifsFileFilterEntry[]
    Entries. The structure of entries block is documented below.
    log string
    Enable/disable file filter logging. Valid values: disable, enable.
    status string
    Enable/disable file filter. Valid values: disable, enable.
    entries Sequence[ObjectFirewallProfileprotocoloptionsCifsFileFilterEntry]
    Entries. The structure of entries block is documented below.
    log str
    Enable/disable file filter logging. Valid values: disable, enable.
    status str
    Enable/disable file filter. Valid values: disable, enable.
    entries List<Property Map>
    Entries. The structure of entries block is documented below.
    log String
    Enable/disable file filter logging. Valid values: disable, enable.
    status String
    Enable/disable file filter. Valid values: disable, enable.

    ObjectFirewallProfileprotocoloptionsCifsFileFilterEntry, ObjectFirewallProfileprotocoloptionsCifsFileFilterEntryArgs

    Action string
    Action taken for matched file. Valid values: log, block.
    Comment string
    Comment.
    Direction string
    Match files transmitted in the session's originating or reply direction. Valid values: any, incoming, outgoing.
    FileTypes List<string>
    Select file type.
    Filter string
    Add a file filter.
    Protocols List<string>
    Protocols to apply with. Valid values: cifs.
    Action string
    Action taken for matched file. Valid values: log, block.
    Comment string
    Comment.
    Direction string
    Match files transmitted in the session's originating or reply direction. Valid values: any, incoming, outgoing.
    FileTypes []string
    Select file type.
    Filter string
    Add a file filter.
    Protocols []string
    Protocols to apply with. Valid values: cifs.
    action String
    Action taken for matched file. Valid values: log, block.
    comment String
    Comment.
    direction String
    Match files transmitted in the session's originating or reply direction. Valid values: any, incoming, outgoing.
    fileTypes List<String>
    Select file type.
    filter String
    Add a file filter.
    protocols List<String>
    Protocols to apply with. Valid values: cifs.
    action string
    Action taken for matched file. Valid values: log, block.
    comment string
    Comment.
    direction string
    Match files transmitted in the session's originating or reply direction. Valid values: any, incoming, outgoing.
    fileTypes string[]
    Select file type.
    filter string
    Add a file filter.
    protocols string[]
    Protocols to apply with. Valid values: cifs.
    action str
    Action taken for matched file. Valid values: log, block.
    comment str
    Comment.
    direction str
    Match files transmitted in the session's originating or reply direction. Valid values: any, incoming, outgoing.
    file_types Sequence[str]
    Select file type.
    filter str
    Add a file filter.
    protocols Sequence[str]
    Protocols to apply with. Valid values: cifs.
    action String
    Action taken for matched file. Valid values: log, block.
    comment String
    Comment.
    direction String
    Match files transmitted in the session's originating or reply direction. Valid values: any, incoming, outgoing.
    fileTypes List<String>
    Select file type.
    filter String
    Add a file filter.
    protocols List<String>
    Protocols to apply with. Valid values: cifs.

    ObjectFirewallProfileprotocoloptionsCifsServerKeytab, ObjectFirewallProfileprotocoloptionsCifsServerKeytabArgs

    Keytab string
    Base64 encoded keytab file containing credential of the server.
    Passwords List<string>
    Password for keytab.
    Principal string
    Service principal. For example, "host/cifsserver.example.com@example.com".
    Keytab string
    Base64 encoded keytab file containing credential of the server.
    Passwords []string
    Password for keytab.
    Principal string
    Service principal. For example, "host/cifsserver.example.com@example.com".
    keytab String
    Base64 encoded keytab file containing credential of the server.
    passwords List<String>
    Password for keytab.
    principal String
    Service principal. For example, "host/cifsserver.example.com@example.com".
    keytab string
    Base64 encoded keytab file containing credential of the server.
    passwords string[]
    Password for keytab.
    principal string
    Service principal. For example, "host/cifsserver.example.com@example.com".
    keytab str
    Base64 encoded keytab file containing credential of the server.
    passwords Sequence[str]
    Password for keytab.
    principal str
    Service principal. For example, "host/cifsserver.example.com@example.com".
    keytab String
    Base64 encoded keytab file containing credential of the server.
    passwords List<String>
    Password for keytab.
    principal String
    Service principal. For example, "host/cifsserver.example.com@example.com".

    Import

    ObjectFirewall ProfileProtocolOptionsCifs can be imported using any of these accepted formats:

    Set import_options = [“profile_protocol_options=YOUR_VALUE”] in the provider section.

    $ export “FORTIMANAGER_IMPORT_TABLE”=“true”

    $ pulumi import fortimanager:index/objectFirewallProfileprotocoloptionsCifs:ObjectFirewallProfileprotocoloptionsCifs labelname ObjectFirewallProfileProtocolOptionsCifs
    

    $ unset “FORTIMANAGER_IMPORT_TABLE”

    -> Hint: The scopetype and adom for import will directly inherit the scopetype and adom configuration of the provider.

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    fortimanager fortinetdev/terraform-provider-fortimanager
    License
    Notes
    This Pulumi package is based on the fortimanager Terraform Provider.
    fortimanager logo
    fortimanager 1.13.0 published on Thursday, Mar 13, 2025 by fortinetdev