a10_slb_template_policy_forward_policy¶
Parameters¶
Parameters |
Choices/Defaults |
Comment |
|
---|---|---|---|
state str/required |
[‘noop’, ‘present’, ‘absent’] |
State of the object to be created. |
|
ansible_host str/required |
Host for AXAPI authentication |
||
ansible_username str/required |
Username for AXAPI authentication |
||
ansible_password str/required |
Password for AXAPI authentication |
||
ansible_port int/required |
Port for AXAPI authentication |
||
a10_device_context_id int |
[‘1-8’] |
Device ID for aVCS configuration |
|
a10_partition str |
Destination/target partition for object/command |
||
policy_name str/required |
Key to identify parent object |
||
no_client_conn_reuse bool |
Inspects only first request of a connection |
||
acos_event_log bool |
Enable acos event logging |
||
local_logging bool |
Enable local logging |
||
require_web_category bool |
Wait for web category to be resolved before taking proxy decision |
||
filtering list |
Field filtering |
||
ssli_url_filtering str |
‘bypassed-sni-disable’= Disable SNI filtering for bypassed URL’s(enabled by default); ‘intercepted-sni-enable’= Enable SNI filtering for intercepted URL’s(disabled by default); ‘intercepted-http-disable’= Disable HTTP(host/URL) filtering for intercepted URL’s(enabled by default); ‘no-sni-allow’= Allow connection if SNI filtering is enabled and SNI header is not present(Drop by default); |
||
san_filtering list |
Field san_filtering |
||
ssli_url_filtering_san str |
‘enable-san’= Enable SAN filtering(disabled by default); ‘bypassed-san- disable’= Disable SAN filtering for bypassed URL’s(enabled by default); ‘intercepted-san-enable’= Enable SAN filtering for intercepted URL’s(disabled by default); ‘no-san-allow’= Allow connection if SAN filtering is enabled and SAN field is not present(Drop by default); |
||
uuid str |
uuid of the object |
||
action_list list |
Field action_list |
||
name str |
Action policy name |
||
action1 str |
‘forward-to-internet’= Forward request to Internet; ‘forward-to-service-group’= Forward request to service group; ‘forward-to-proxy’= Forward request to HTTP proxy server; ‘drop’= Drop request; |
||
fake_sg str |
service group to forward the packets to Internet |
||
real_sg str |
service group to forward the packets |
||
forward_snat str |
Source NAT pool or pool group |
||
fall_back str |
Fallback service group for Internet |
||
fall_back_snat str |
Source NAT pool or pool group for fallback server |
||
log bool |
enable logging |
||
drop_response_code int |
Specify response code for drop action |
||
drop_message str |
drop-message sent to the client as webpage(html tags are included and quotation marks are required for white spaces) |
||
drop_redirect_url str |
Specify URL to which client request is redirected upon being dropped |
||
http_status_code str |
‘301’= Moved permanently; ‘302’= Found; |
||
uuid str |
uuid of the object |
||
user_tag str |
Customized tag |
||
sampling_enable list |
Field sampling_enable |
||
source_list list |
Field source_list |
||
name str |
source destination match rule name |
||
match_class_list str |
Class List Name |
||
match_any bool |
Match any source |
||
match_authorize_policy str |
Authorize-policy for user and group based policy |
||
priority int |
Priority of the source(higher the number higher the priority, default 0) |
||
uuid str |
uuid of the object |
||
user_tag str |
Customized tag |
||
sampling_enable list |
Field sampling_enable |
||
destination dict |
Field destination |