Download full document:

si_sig_violation

Configuration for AF Safety Device Report table resource.

(click to see Operations)

Properties

(click to see Operations)

NameData TypePermissionsDescription
__count<Double>Read-writecount..
violation_action<String>Read-writeviolation_action.
Maximum length = 255
name<String>Read-writesig category name.
Maximum length = 255
violation_threat_index<Double>Read-writeviolation_threat_index..
total_attacks<Double>Read-writetotal attacks..
attack_category<String>Read-writeattack_category.
Maximum length = 255
threat_index<Double>Read-writethreat_index.
violation_name<String>Read-writeviolation_name.
Maximum length = 255
transformed_flags<Double>Read-writetransformed_flags..
id<String>Read-writeId is AppName.
Maximum length = 255
si_app_unit_name<String>Read-writeAppName.
Maximum length = 255
block_flags<Double>Read-writeblock_flags..
severity<Double>Read-writeseverity..
violation_value<String>Read-writeviolation_value.
Maximum length = 255
not_blocked_flags<Double>Read-writetotal attacks..

Operations

(click to see Properties)

GET (ALL)

Some options that you can use for each operations:

  • Getting warnings in response:NITRO allows you to get warnings in an operation by specifying the "warning" query parameter as "yes". For example, to get warnings while connecting to the NetScaler appliance, the URL is as follows:

    http://<netscaler-ip-address>/nitro/v1/config/login?warning=yes

    If any, the warnings are displayed in the response payload with the HTTP code "209 X-NITRO-WARNING".

  • Authenticated access for individual NITRO operations:NITRO allows you to logon to the NetScaler appliance to perform individual operations. You can use this option instead of creating a NITRO session (using the login object) and then using that session to perform all operations,

    To do this, you must specify the username and password in the request header of the NITRO request as follows:

    X-NITRO-USER:<username>

    X-NITRO-PASS:<password>

    Note: In such cases, make sure that the request header DOES not include the following:

    Cookie:NITRO_AUTH_TOKEN=<tokenvalue>

Note:

Mandatory parameters are marked in red and placeholder content is marked in <green>.

get (all)

URL: https://<MGMT-IP>/nitro/v1/config/si_sig_violation

HTTP Method: null

Response Payload:

{ "errorcode": 0, "message": "Done", "severity": ;ltString_value>, "si_sig_violation":[{
"__count":<Double_value>,
"violation_action":<String_value>,
"name":<String_value>,
"violation_threat_index":<Double_value>,
"total_attacks":<Double_value>,
"attack_category":<String_value>,
"threat_index":<Double_value>,
"si_device_ip_address":<String_value>,
"violation_name":<String_value>,
"transformed_flags":<Double_value>,
"id":<String_value>,
"si_app_unit_name":<String_value>,
"block_flags":<Double_value>,
"severity":<Double_value>,
"violation_value":<String_value>,
"not_blocked_flags":<Double_value>}]}