Download full document:

si_ip_reputation

Configuration for AF IP Reputation Report resource.

(click to see Operations)

Properties

(click to see Operations)

NameData TypePermissionsDescription
source_ip_address<String>Read-writesource_ip_address.
Maximum length = 255
__count<Double>Read-writecount..
violation_type<String>Read-writeViolation Type.
Maximum length = 255
iprep_category<String>Read-writeCategory of the IPREP.
Maximum length = 255
violation_action<String>Read-writeViolation Action.
Maximum length = 255
name<String>Read-writeAppName.
Maximum length = 255
rpt_sample_time<Double>Read-writeReport Sample time..
iprep_reputation_score<Double>Read-writeReputation Score of IP.
total_attacks<Double>Read-writetotal attacks..
attack_category<String>Read-writeAttack Category.
Maximum length = 255
iprep_severity<String>Read-writeSeverity.
Maximum length = 255
iprep_attack_time<Double>Read-writeTime of Attack.
iprep_http_method<String>Read-writeHTTP Req method.
Maximum length = 255
iprep_app_threat_index<Double>Read-writeApp Threat Index.

Operations

(click to see Properties)

GET (ALL)

Some options that you can use for each operations:

  • Getting warnings in response:NITRO allows you to get warnings in an operation by specifying the "warning" query parameter as "yes". For example, to get warnings while connecting to the NetScaler appliance, the URL is as follows:

    http://<netscaler-ip-address>/nitro/v1/config/login?warning=yes

    If any, the warnings are displayed in the response payload with the HTTP code "209 X-NITRO-WARNING".

  • Authenticated access for individual NITRO operations:NITRO allows you to logon to the NetScaler appliance to perform individual operations. You can use this option instead of creating a NITRO session (using the login object) and then using that session to perform all operations,

    To do this, you must specify the username and password in the request header of the NITRO request as follows:

    X-NITRO-USER:<username>

    X-NITRO-PASS:<password>

    Note: In such cases, make sure that the request header DOES not include the following:

    Cookie:NITRO_AUTH_TOKEN=<tokenvalue>

Note:

Mandatory parameters are marked in red and placeholder content is marked in <green>.

get (all)

URL: https://<MGMT-IP>/nitro/v1/config/si_ip_reputation

HTTP Method: null

Response Payload:

{ "errorcode": 0, "message": "Done", "severity": ;ltString_value>, "si_ip_reputation":[{
"source_ip_address":<String_value>,
"__count":<Double_value>,
"violation_type":<String_value>,
"iprep_category":<String_value>,
"violation_action":<String_value>,
"name":<String_value>,
"rpt_sample_time":<Double_value>,
"iprep_reputation_score":<Double_value>,
"total_attacks":<Double_value>,
"attack_category":<String_value>,
"si_device_ip_address":<String_value>,
"iprep_severity":<String_value>,
"iprep_attack_time":<Double_value>,
"iprep_http_method":<String_value>,
"iprep_app_threat_index":<Double_value>}]}