a10_threat_intel_threat_list

Synopsis

Threat Categories for malicious IPs

Parameters

Parameters

Choices/Defaults

Comment

state

str/required

[‘noop’, ‘present’, ‘absent’]

State of the object to be created.

ansible_host

str/required

Host for AXAPI authentication

ansible_username

str/required

Username for AXAPI authentication

ansible_password

str/required

Password for AXAPI authentication

ansible_port

int/required

Port for AXAPI authentication

a10_device_context_id

int

[‘1-8’]

Device ID for aVCS configuration

a10_partition

str

Destination/target partition for object/command

name

str/required

Threat category List name

ntype

str

‘webroot’= Configure Webroot threat categories;

all_categories

bool

Enable all categories

spam_sources

bool

IP’s tunneling spam messages through a proxy, anomalous SMTP activities, and forum spam activities

windows_exploits

bool

IP’s associated with malware, shell code, rootkits, worms or viruses

web_attacks

bool

IP’s associated with cross site scripting, iFrame injection, SQL injection, cross domain injection, or domain password brute fo

botnets

bool

Botnet C&C channels, and infected zombie machines controlled by Bot master

scanners

bool

IP’s associated with probes, host scan, domain scan, and password brute force attack

dos_attacks

bool

IP’s participating in DOS, DDOS, anomalous sync flood, and anomalous traffic detection

reputation

bool

IP addresses currently known to be infected with malware

phishing

bool

IP addresses hosting phishing sites, ad click fraud or gaming fraud

proxy

bool

IP addresses providing proxy services

mobile_threats

bool

IP’s associated with mobile threats

tor_proxy

bool

IP’s providing tor proxy services

uuid

str

uuid of the object

user_tag

str

Customized tag

sampling_enable

list

Field sampling_enable

counters1

str

‘all’= all; ‘spam-sources’= Hits for spam sources; ‘windows-exploits’= Hits for windows exploits; ‘web-attacks’= Hits for web attacks; ‘botnets’= Hits for botnets; ‘scanners’= Hits for scanners; ‘dos-attacks’= Hits for dos attacks; ‘reputation’= Hits for reputation; ‘phishing’= Hits for phishing; ‘proxy’= Hits for proxy; ‘mobile-threats’= Hits for mobile threats; ‘tor-proxy’= Hits for tor-proxy; ‘total-hits’= Total hits for threat-list;

stats

dict

Field stats

spam_sources

str

Hits for spam sources

windows_exploits

str

Hits for windows exploits

web_attacks

str

Hits for web attacks

botnets

str

Hits for botnets

scanners

str

Hits for scanners

dos_attacks

str

Hits for dos attacks

reputation

str

Hits for reputation

phishing

str

Hits for phishing

proxy

str

Hits for proxy

mobile_threats

str

Hits for mobile threats

tor_proxy

str

Hits for tor-proxy

total_hits

str

Total hits for threat-list

name

str

Threat category List name

Examples


Return Values

modified_values (changed, dict, )

Values modified (or potential changes if using check_mode) as a result of task operation

axapi_calls (always, list, )

Sequential list of AXAPI calls made by the task

endpoint (, str, [‘/axapi/v3/slb/virtual_server’, ‘/axapi/v3/file/ssl-cert’])

The AXAPI endpoint being accessed.

http_method (, str, [‘POST’, ‘GET’])

HTTP method being used by the primary task to interact with the AXAPI endpoint.

request_body (, complex, )

Params used to query the AXAPI

response_body (, complex, )

Response from the AXAPI

Status

  • This module is not guaranteed to have a backwards compatible interface. [preview]

  • This module is maintained by community.

Authors

  • A10 Networks