si_ip_reputation
Configuration for AF IP Reputation Report resource.
(click to see Operations)
Properties
(click to see Operations)
Name | Data Type | Permissions | Description |
---|---|---|---|
source_ip_address | <String> | Read-write | source_ip_address. Maximum length = 255 |
__count | <Double> | Read-write | count.. |
violation_type | <String> | Read-write | Violation Type. Maximum length = 255 |
iprep_category | <String> | Read-write | Category of the IPREP. Maximum length = 255 |
violation_action | <String> | Read-write | Violation Action. Maximum length = 255 |
name | <String> | Read-write | AppName. Maximum length = 255 |
rpt_sample_time | <Double> | Read-write | Report Sample time.. |
iprep_reputation_score | <Double> | Read-write | Reputation Score of IP. |
total_attacks | <Double> | Read-write | total attacks.. |
attack_category | <String> | Read-write | Attack Category. Maximum length = 255 |
iprep_severity | <String> | Read-write | Severity. Maximum length = 255 |
iprep_attack_time | <Double> | Read-write | Time of Attack. |
iprep_http_method | <String> | Read-write | HTTP Req method. Maximum length = 255 |
iprep_app_threat_index | <Double> | Read-write | App Threat Index. |
Operations
(click to see Properties)
Some options that you can use for each operations:
Getting warnings in response:NITRO allows you to get warnings in an operation by specifying the "warning" query parameter as "yes". For example, to get warnings while connecting to the NetScaler appliance, the URL is as follows:
http://<netscaler-ip-address>/nitro/v1/config/login?warning=yes
If any, the warnings are displayed in the response payload with the HTTP code "209 X-NITRO-WARNING".
Authenticated access for individual NITRO operations:NITRO allows you to logon to the NetScaler appliance to perform individual operations. You can use this option instead of creating a NITRO session (using the login object) and then using that session to perform all operations,
To do this, you must specify the username and password in the request header of the NITRO request as follows:
X-NITRO-USER:<username>
X-NITRO-PASS:<password>
Note: In such cases, make sure that the request header DOES not include the following:
Cookie:NITRO_AUTH_TOKEN=<tokenvalue>
Note:
Mandatory parameters are marked in red and placeholder content is marked in <green>.
get (all)
URL: https://<MGMT-IP>/nitro/v1/config/si_ip_reputation
HTTP Method: null
Response Payload:
{ "errorcode": 0, "message": "Done", "severity": ;ltString_value>, "si_ip_reputation":[{ "source_ip_address":<String_value>, "__count":<Double_value>, "violation_type":<String_value>, "iprep_category":<String_value>, "violation_action":<String_value>, "name":<String_value>, "rpt_sample_time":<Double_value>, "iprep_reputation_score":<Double_value>, "total_attacks":<Double_value>, "attack_category":<String_value>, "si_device_ip_address":<String_value>, "iprep_severity":<String_value>, "iprep_attack_time":<Double_value>, "iprep_http_method":<String_value>, "iprep_app_threat_index":<Double_value>}]}