content
stringlengths
7
1.05M
fixed_cases
stringlengths
1
1.28M
# Generated from 'Events.h' nullEvent = 0 mouseDown = 1 mouseUp = 2 keyDown = 3 keyUp = 4 autoKey = 5 updateEvt = 6 diskEvt = 7 activateEvt = 8 osEvt = 15 kHighLevelEvent = 23 mDownMask = 1 << mouseDown mUpMask = 1 << mouseUp keyDownMask = 1 << keyDown keyUpMask = 1 << keyUp autoKeyMask = 1 << autoKey updateMask = 1 << updateEvt diskMask = 1 << diskEvt activMask = 1 << activateEvt highLevelEventMask = 0x0400 osMask = 1 << osEvt everyEvent = 0xFFFF charCodeMask = 0x000000FF keyCodeMask = 0x0000FF00 adbAddrMask = 0x00FF0000 # osEvtMessageMask = (unsigned long)0xFF000000 mouseMovedMessage = 0x00FA suspendResumeMessage = 0x0001 resumeFlag = 1 convertClipboardFlag = 2 activeFlagBit = 0 btnStateBit = 7 cmdKeyBit = 8 shiftKeyBit = 9 alphaLockBit = 10 optionKeyBit = 11 controlKeyBit = 12 rightShiftKeyBit = 13 rightOptionKeyBit = 14 rightControlKeyBit = 15 activeFlag = 1 << activeFlagBit btnState = 1 << btnStateBit cmdKey = 1 << cmdKeyBit shiftKey = 1 << shiftKeyBit alphaLock = 1 << alphaLockBit optionKey = 1 << optionKeyBit controlKey = 1 << controlKeyBit rightShiftKey = 1 << rightShiftKeyBit rightOptionKey = 1 << rightOptionKeyBit rightControlKey = 1 << rightControlKeyBit kNullCharCode = 0 kHomeCharCode = 1 kEnterCharCode = 3 kEndCharCode = 4 kHelpCharCode = 5 kBellCharCode = 7 kBackspaceCharCode = 8 kTabCharCode = 9 kLineFeedCharCode = 10 kVerticalTabCharCode = 11 kPageUpCharCode = 11 kFormFeedCharCode = 12 kPageDownCharCode = 12 kReturnCharCode = 13 kFunctionKeyCharCode = 16 kEscapeCharCode = 27 kClearCharCode = 27 kLeftArrowCharCode = 28 kRightArrowCharCode = 29 kUpArrowCharCode = 30 kDownArrowCharCode = 31 kDeleteCharCode = 127 kNonBreakingSpaceCharCode = 202 networkEvt = 10 driverEvt = 11 app1Evt = 12 app2Evt = 13 app3Evt = 14 app4Evt = 15 networkMask = 0x0400 driverMask = 0x0800 app1Mask = 0x1000 app2Mask = 0x2000 app3Mask = 0x4000 app4Mask = 0x8000
null_event = 0 mouse_down = 1 mouse_up = 2 key_down = 3 key_up = 4 auto_key = 5 update_evt = 6 disk_evt = 7 activate_evt = 8 os_evt = 15 k_high_level_event = 23 m_down_mask = 1 << mouseDown m_up_mask = 1 << mouseUp key_down_mask = 1 << keyDown key_up_mask = 1 << keyUp auto_key_mask = 1 << autoKey update_mask = 1 << updateEvt disk_mask = 1 << diskEvt activ_mask = 1 << activateEvt high_level_event_mask = 1024 os_mask = 1 << osEvt every_event = 65535 char_code_mask = 255 key_code_mask = 65280 adb_addr_mask = 16711680 mouse_moved_message = 250 suspend_resume_message = 1 resume_flag = 1 convert_clipboard_flag = 2 active_flag_bit = 0 btn_state_bit = 7 cmd_key_bit = 8 shift_key_bit = 9 alpha_lock_bit = 10 option_key_bit = 11 control_key_bit = 12 right_shift_key_bit = 13 right_option_key_bit = 14 right_control_key_bit = 15 active_flag = 1 << activeFlagBit btn_state = 1 << btnStateBit cmd_key = 1 << cmdKeyBit shift_key = 1 << shiftKeyBit alpha_lock = 1 << alphaLockBit option_key = 1 << optionKeyBit control_key = 1 << controlKeyBit right_shift_key = 1 << rightShiftKeyBit right_option_key = 1 << rightOptionKeyBit right_control_key = 1 << rightControlKeyBit k_null_char_code = 0 k_home_char_code = 1 k_enter_char_code = 3 k_end_char_code = 4 k_help_char_code = 5 k_bell_char_code = 7 k_backspace_char_code = 8 k_tab_char_code = 9 k_line_feed_char_code = 10 k_vertical_tab_char_code = 11 k_page_up_char_code = 11 k_form_feed_char_code = 12 k_page_down_char_code = 12 k_return_char_code = 13 k_function_key_char_code = 16 k_escape_char_code = 27 k_clear_char_code = 27 k_left_arrow_char_code = 28 k_right_arrow_char_code = 29 k_up_arrow_char_code = 30 k_down_arrow_char_code = 31 k_delete_char_code = 127 k_non_breaking_space_char_code = 202 network_evt = 10 driver_evt = 11 app1_evt = 12 app2_evt = 13 app3_evt = 14 app4_evt = 15 network_mask = 1024 driver_mask = 2048 app1_mask = 4096 app2_mask = 8192 app3_mask = 16384 app4_mask = 32768
SOLUTIONS = '/view' STATUS = '/status' DOWNLOADS = '/download' SHARED = '/shared' GIT = '/git/<int:course_id>/<int:exercise_number>.git'
solutions = '/view' status = '/status' downloads = '/download' shared = '/shared' git = '/git/<int:course_id>/<int:exercise_number>.git'
# GATES OGORK # SPRING 2021 FINAL PROJECT # IS 3220 # PASSWORD GENERATOR # MAY 2, 2021 def reverse(app_name): # this function reverses whatever word the user inputs app_name = app_name.lower() return app_name[::-1] def a_replace(name): # this function replaces every "a" with "@" return name.replace("a", "@") def o_replace(name): # this function replaces every "o" with "0" return name.replace("o", "0") def fifth_replace(name): # this function replaces every fifth character with "#" name = list(name) name[4] = "#" name = "".join(name) return name def duplicate(name): # this function duplicates the generated password if it does not meet the users desired length duplicate = "" for letter in name: duplicate += letter return name+duplicate def password_match(name, length): # this function returns a password that matches the length requested by the user # if the length of generated pssword > desired password length, we return portion of generated password(until desired length) if len(name) > length: return name[0:length] # if length of genrated password is < desired password, we add 0 until desired length while len(name) < length: name += "0" return name def password_gen(app_name, input_length): # this function returns a password created from an app name app_name = reverse(app_name) app_name = app_name.capitalize() app_name = a_replace(app_name) app_name = o_replace(app_name) if len(app_name) < 8: app_name = duplicate(app_name) app_name = fifth_replace(app_name) if len(app_name) != input_length: app_name = password_match(app_name, input_length) return app_name print("*************************************************************************************************") print("* Welcome to Gates' password generator *") print("* This app will generate a password for you based on the input provided *") print("*************************************************************************************************") print("* *") app_name = input("* What software application is this password for? (facebook, instagram, twitter...): ") print("* *") input_length = int(input("* How long do you want your password to be? ")) print("* *") print("* Your password is: ", password_gen(app_name, input_length)) print("* *") print("* *") print("*************************************************************************************************")
def reverse(app_name): app_name = app_name.lower() return app_name[::-1] def a_replace(name): return name.replace('a', '@') def o_replace(name): return name.replace('o', '0') def fifth_replace(name): name = list(name) name[4] = '#' name = ''.join(name) return name def duplicate(name): duplicate = '' for letter in name: duplicate += letter return name + duplicate def password_match(name, length): if len(name) > length: return name[0:length] while len(name) < length: name += '0' return name def password_gen(app_name, input_length): app_name = reverse(app_name) app_name = app_name.capitalize() app_name = a_replace(app_name) app_name = o_replace(app_name) if len(app_name) < 8: app_name = duplicate(app_name) app_name = fifth_replace(app_name) if len(app_name) != input_length: app_name = password_match(app_name, input_length) return app_name print('*************************************************************************************************') print("* Welcome to Gates' password generator *") print('* This app will generate a password for you based on the input provided *') print('*************************************************************************************************') print('* *') app_name = input('* What software application is this password for? (facebook, instagram, twitter...): ') print('* *') input_length = int(input('* How long do you want your password to be? ')) print('* *') print('* Your password is: ', password_gen(app_name, input_length)) print('* *') print('* *') print('*************************************************************************************************')
#!/usr/bin/python def read_file(file, delimiter): """Reads data from a file, separated via delimiter Args: file: Path to file. delimiter: Data value separator, similar to using CSV. Returns: An array of dict records. """ f = open(file, 'r') lines = f.readlines() records = [] for line in lines: # convert to obj first record = line.strip().split(delimiter) record_obj = { 'lastName': record[0], 'firstName': record[1], 'gender': record[2], 'favoriteColor': record[3], 'dateOfBirth': record[4] } records.append(record_obj) f.close() return records def sort_records(data, sort): """ Sorts records via 3 methods: gender, birth date, and last name Args: data: Array of dict records to sort. sort: Sort method to use, one of ['gender', 'birthdate', 'lastname']. Returns: An array of sorted dict records. """ sorted_data = None # sorted by gender (females before males) then by last name ascending. # see how it maintains ordering: # https://docs.python.org/3/howto/sorting.html#sort-stability-and-complex-sorts if sort == 'gender': # sort by last name first sorted_data = sorted(data, key=lambda x: x['lastName'], reverse=True) # sort again by gender within that set sorted_data = sorted(sorted_data, key=lambda x: x['gender']) if sort == 'birthdate': # sorted by birth date, ascending sorted_data = sorted(data, key=lambda x: x['dateOfBirth'], reverse=True) if sort == 'lastname': # sorted by last name, descending sorted_data = sorted(data, key=lambda x: x['lastName']) return sorted_data def save_record(file, delimiter, data): """ Save a single record to a specified file Args: file: Path to file. delimiter: Data value separator, similar to using CSV. data: Single dict record to save. """ records = read_file(file, delimiter) # search for existing record, if found then update found = False for record in records: if (record['lastName'] == data['lastName'] and record['firstName'] == data['firstName'] and record['gender'] == data['gender'] and record['dateOfBirth'] == data['dateOfBirth']): for key in data: record[key] = data[key] found = True # otherwise if none found then append data as new record if (not found): records.append(data) # write records to file f = open(file, 'w') for record in records: f.write(f"{record['lastName']}{delimiter}{record['firstName']}{delimiter}{record['gender']}{delimiter}{record['favoriteColor']}{delimiter}{record['dateOfBirth']}\n") f.close()
def read_file(file, delimiter): """Reads data from a file, separated via delimiter Args: file: Path to file. delimiter: Data value separator, similar to using CSV. Returns: An array of dict records. """ f = open(file, 'r') lines = f.readlines() records = [] for line in lines: record = line.strip().split(delimiter) record_obj = {'lastName': record[0], 'firstName': record[1], 'gender': record[2], 'favoriteColor': record[3], 'dateOfBirth': record[4]} records.append(record_obj) f.close() return records def sort_records(data, sort): """ Sorts records via 3 methods: gender, birth date, and last name Args: data: Array of dict records to sort. sort: Sort method to use, one of ['gender', 'birthdate', 'lastname']. Returns: An array of sorted dict records. """ sorted_data = None if sort == 'gender': sorted_data = sorted(data, key=lambda x: x['lastName'], reverse=True) sorted_data = sorted(sorted_data, key=lambda x: x['gender']) if sort == 'birthdate': sorted_data = sorted(data, key=lambda x: x['dateOfBirth'], reverse=True) if sort == 'lastname': sorted_data = sorted(data, key=lambda x: x['lastName']) return sorted_data def save_record(file, delimiter, data): """ Save a single record to a specified file Args: file: Path to file. delimiter: Data value separator, similar to using CSV. data: Single dict record to save. """ records = read_file(file, delimiter) found = False for record in records: if record['lastName'] == data['lastName'] and record['firstName'] == data['firstName'] and (record['gender'] == data['gender']) and (record['dateOfBirth'] == data['dateOfBirth']): for key in data: record[key] = data[key] found = True if not found: records.append(data) f = open(file, 'w') for record in records: f.write(f"{record['lastName']}{delimiter}{record['firstName']}{delimiter}{record['gender']}{delimiter}{record['favoriteColor']}{delimiter}{record['dateOfBirth']}\n") f.close()
# Copyright (c) 2017-present, Facebook, Inc. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. ############################################################################## # mapping coco categories to cityscapes (our converted json) id # cityscapes # INFO roidb.py: 220: 1 bicycle: 7286 # INFO roidb.py: 220: 2 car: 53684 # INFO roidb.py: 220: 3 person: 35704 # INFO roidb.py: 220: 4 train: 336 # INFO roidb.py: 220: 5 truck: 964 # INFO roidb.py: 220: 6 motorcycle: 1468 # INFO roidb.py: 220: 7 bus: 758 # INFO roidb.py: 220: 8 rider: 3504 # coco (val5k) # INFO roidb.py: 220: 1 person: 21296 # INFO roidb.py: 220: 2 bicycle: 628 # INFO roidb.py: 220: 3 car: 3818 # INFO roidb.py: 220: 4 motorcycle: 732 # INFO roidb.py: 220: 5 airplane: 286 <------ irrelevant # INFO roidb.py: 220: 6 bus: 564 # INFO roidb.py: 220: 7 train: 380 # INFO roidb.py: 220: 8 truck: 828 def cityscapes_to_coco(cityscapes_id): lookup = { 0: 0, # ... background 1: 2, # bicycle 2: 3, # car 3: 1, # person 4: 7, # train 5: 8, # truck 6: 4, # motorcycle 7: 6, # bus 8: -1, # rider (-1 means rand init) } return lookup[cityscapes_id] def cityscapes_to_coco_with_rider(cityscapes_id): lookup = { 0: 0, # ... background 1: 2, # bicycle 2: 3, # car 3: 1, # person 4: 7, # train 5: 8, # truck 6: 4, # motorcycle 7: 6, # bus 8: 1, # rider ("person", *rider has human right!*) } return lookup[cityscapes_id] def cityscapes_to_coco_without_person_rider(cityscapes_id): lookup = { 0: 0, # ... background 1: 2, # bicycle 2: 3, # car 3: -1, # person (ignore) 4: 7, # train 5: 8, # truck 6: 4, # motorcycle 7: 6, # bus 8: -1, # rider (ignore) } return lookup[cityscapes_id] def cityscapes_to_coco_all_random(cityscapes_id): lookup = { 0: -1, # ... background 1: -1, # bicycle 2: -1, # car 3: -1, # person (ignore) 4: -1, # train 5: -1, # truck 6: -1, # motorcycle 7: -1, # bus 8: -1, # rider (ignore) } return lookup[cityscapes_id]
def cityscapes_to_coco(cityscapes_id): lookup = {0: 0, 1: 2, 2: 3, 3: 1, 4: 7, 5: 8, 6: 4, 7: 6, 8: -1} return lookup[cityscapes_id] def cityscapes_to_coco_with_rider(cityscapes_id): lookup = {0: 0, 1: 2, 2: 3, 3: 1, 4: 7, 5: 8, 6: 4, 7: 6, 8: 1} return lookup[cityscapes_id] def cityscapes_to_coco_without_person_rider(cityscapes_id): lookup = {0: 0, 1: 2, 2: 3, 3: -1, 4: 7, 5: 8, 6: 4, 7: 6, 8: -1} return lookup[cityscapes_id] def cityscapes_to_coco_all_random(cityscapes_id): lookup = {0: -1, 1: -1, 2: -1, 3: -1, 4: -1, 5: -1, 6: -1, 7: -1, 8: -1} return lookup[cityscapes_id]
__author__ = 'roland' NORMAL = "/_/_/_/normal" IDMAP = { # Webfinger "rp-discovery-webfinger-url": NORMAL, "rp-discovery-webfinger-acct": NORMAL, 'rp-discovery-webfinger-http-href': '/_/_/httphref/normal', 'rp-discovery-webfinger-unknown-member': '/_/_/wfunknown/normal', # Discovery "rp-discovery-openid-configuration": NORMAL, "rp-discovery-jwks_uri-keys": NORMAL, "rp-discovery-issuer-not-matching-config": "/_/_/isso/normal", # Dynamic Client Registration "rp-registration-dynamic": NORMAL, #"rp-registration-well-formed-jwk": NORMAL, #"rp-registration-uses-https-endpoints": NORMAL, # Response type and response mode "rp-response_type-code": NORMAL, "rp-response_type-id_token": NORMAL, "rp-response_type-id_token+token": NORMAL, "rp-response_type-code+id_token": NORMAL, "rp-response_type-code+token": NORMAL, "rp-response_type-code+id_token+token": NORMAL, # Response type and response mode "rp-response_mode-form_post": NORMAL, # Client Authentication "rp-token_endpoint-client_secret_basic": NORMAL, "rp-token_endpoint-client_secret_post": NORMAL, "rp-token_endpoint-client_secret_jwt": NORMAL, "rp-token_endpoint-private_key_jwt": NORMAL, # ID Token "rp-id_token-sig-rs256": "/RS256/_/_/normal", "rp-id_token-sig-hs256": "/HS256/_/_/normal", "rp-id_token-sig-es256": "/ES256/_/_/normal", "rp-id_token-bad-sig-rs256": "/RS256/_/idts/normal", "rp-id_token-bad-sig-hs256": "/HS256/_/idts/normal", "rp-id_token-bad-sig-es256": "/ES256/_/idts/normal", "rp-id_token-sig+enc": "/HS256/RSA1_5:A128CBC-HS256/_/normal", "rp-id_token-issuer-mismatch": "/_/_/issi/normal", "rp-id_token-sub": "/_/_/itsub/normal", "rp-id_token-aud": "/_/_/aud/normal", "rp-id_token-iat": "/_/_/iat/normal", #"rp-id_token-kid-absent": "/_/_/nokid1jwks/normal", #"rp-id_token-kid": "/_/_/nokidjwks/normal", "rp-id_token-bad-at_hash": "/_/_/ath/normal", "rp-id_token-bad-c_hash": "/_/_/ch/normal", "rp-id_token-kid-absent-multiple-jwks": "/_/_/nokidmuljwks/normal", "rp-id_token-kid-absent-single-jwks": "/_/_/nokid1jwk/normal", "rp-id_token-sig-none": "/none/_/_/normal", # "rp-idt-epk": "", # UserInfo Endpoint "rp-userinfo-bearer-header": NORMAL, "rp-userinfo-bearer-body": NORMAL, "rp-userinfo-bad-sub-claim": "/_/_/uisub/normal", "rp-userinfo-sig": NORMAL, "rp-userinfo-enc": NORMAL, "rp-userinfo-sig+enc": NORMAL, # nonce Request Parameter "rp-nonce-unless-code-flow": NORMAL, "rp-nonce-invalid": "/_/_/nonce/normal", # scope Request Parameter #"rp-scope-openid": "/_/_/openid/normal", "rp-scope-userinfo-claims": NORMAL, #"rp-scope-without-openid": "/_/_/openid/normal", # Key Rollover "rp-key-rotation-op-sign-key": "/_/_/rotsig/normal", "rp-key-rotation-rp-sign-key": "/_/_/updkeys/normal", "rp-key-rotation-op-enc-key": "/_/_/rotenc/normal", "rp-key-rotation-rp-enc-key": "/_/_/updkeys/normal", # request_uri Request Parameter "rp-request_uri-unsigned": NORMAL, "rp-request_uri-sig": NORMAL, "rp-request_uri-enc": NORMAL, "rp-request_uri-sig+enc": NORMAL, # Third Party Initiated Login "rp-support-3rd-party-init-login": NORMAL, # Claims Request Parameter "rp-claims_request-id_token": NORMAL, "rp-claims_request-userinfo": NORMAL, #"rp-claims_request-userinfo_claims": NORMAL, # "rp-3rd-login": "", # Claim Types "rp-claims-aggregated": "/_/_/_/aggregated", "rp-claims-distributed": "/_/_/_/distributed", # "rp-logout-init": "", # "rp-logout-received": "", # "rp-change-received": "" 'rp-self-issued': "/_/_/selfissued/normal" }
__author__ = 'roland' normal = '/_/_/_/normal' idmap = {'rp-discovery-webfinger-url': NORMAL, 'rp-discovery-webfinger-acct': NORMAL, 'rp-discovery-webfinger-http-href': '/_/_/httphref/normal', 'rp-discovery-webfinger-unknown-member': '/_/_/wfunknown/normal', 'rp-discovery-openid-configuration': NORMAL, 'rp-discovery-jwks_uri-keys': NORMAL, 'rp-discovery-issuer-not-matching-config': '/_/_/isso/normal', 'rp-registration-dynamic': NORMAL, 'rp-response_type-code': NORMAL, 'rp-response_type-id_token': NORMAL, 'rp-response_type-id_token+token': NORMAL, 'rp-response_type-code+id_token': NORMAL, 'rp-response_type-code+token': NORMAL, 'rp-response_type-code+id_token+token': NORMAL, 'rp-response_mode-form_post': NORMAL, 'rp-token_endpoint-client_secret_basic': NORMAL, 'rp-token_endpoint-client_secret_post': NORMAL, 'rp-token_endpoint-client_secret_jwt': NORMAL, 'rp-token_endpoint-private_key_jwt': NORMAL, 'rp-id_token-sig-rs256': '/RS256/_/_/normal', 'rp-id_token-sig-hs256': '/HS256/_/_/normal', 'rp-id_token-sig-es256': '/ES256/_/_/normal', 'rp-id_token-bad-sig-rs256': '/RS256/_/idts/normal', 'rp-id_token-bad-sig-hs256': '/HS256/_/idts/normal', 'rp-id_token-bad-sig-es256': '/ES256/_/idts/normal', 'rp-id_token-sig+enc': '/HS256/RSA1_5:A128CBC-HS256/_/normal', 'rp-id_token-issuer-mismatch': '/_/_/issi/normal', 'rp-id_token-sub': '/_/_/itsub/normal', 'rp-id_token-aud': '/_/_/aud/normal', 'rp-id_token-iat': '/_/_/iat/normal', 'rp-id_token-bad-at_hash': '/_/_/ath/normal', 'rp-id_token-bad-c_hash': '/_/_/ch/normal', 'rp-id_token-kid-absent-multiple-jwks': '/_/_/nokidmuljwks/normal', 'rp-id_token-kid-absent-single-jwks': '/_/_/nokid1jwk/normal', 'rp-id_token-sig-none': '/none/_/_/normal', 'rp-userinfo-bearer-header': NORMAL, 'rp-userinfo-bearer-body': NORMAL, 'rp-userinfo-bad-sub-claim': '/_/_/uisub/normal', 'rp-userinfo-sig': NORMAL, 'rp-userinfo-enc': NORMAL, 'rp-userinfo-sig+enc': NORMAL, 'rp-nonce-unless-code-flow': NORMAL, 'rp-nonce-invalid': '/_/_/nonce/normal', 'rp-scope-userinfo-claims': NORMAL, 'rp-key-rotation-op-sign-key': '/_/_/rotsig/normal', 'rp-key-rotation-rp-sign-key': '/_/_/updkeys/normal', 'rp-key-rotation-op-enc-key': '/_/_/rotenc/normal', 'rp-key-rotation-rp-enc-key': '/_/_/updkeys/normal', 'rp-request_uri-unsigned': NORMAL, 'rp-request_uri-sig': NORMAL, 'rp-request_uri-enc': NORMAL, 'rp-request_uri-sig+enc': NORMAL, 'rp-support-3rd-party-init-login': NORMAL, 'rp-claims_request-id_token': NORMAL, 'rp-claims_request-userinfo': NORMAL, 'rp-claims-aggregated': '/_/_/_/aggregated', 'rp-claims-distributed': '/_/_/_/distributed', 'rp-self-issued': '/_/_/selfissued/normal'}
lista = ['A', 'B', 'C'] for i, itens in enumerate(lista): print (i + 1, ' = ', itens) lista[-1] = 'D' lista[-2] = 'F' lista[-3] = 'M' for e, itens in enumerate(lista): print (e + 1, ' -> ', itens) lista.remove('F') for d, itens in enumerate(lista): print(d + 1, ' == ', itens) lista.extend(['B', 'C', 'A']) lista.sort() for f, itens in enumerate(lista): print(f + 1, ' === ', itens) lista.reverse() for a, itens in enumerate(lista): print(a + 1, '//', itens)
lista = ['A', 'B', 'C'] for (i, itens) in enumerate(lista): print(i + 1, ' = ', itens) lista[-1] = 'D' lista[-2] = 'F' lista[-3] = 'M' for (e, itens) in enumerate(lista): print(e + 1, ' -> ', itens) lista.remove('F') for (d, itens) in enumerate(lista): print(d + 1, ' == ', itens) lista.extend(['B', 'C', 'A']) lista.sort() for (f, itens) in enumerate(lista): print(f + 1, ' === ', itens) lista.reverse() for (a, itens) in enumerate(lista): print(a + 1, '//', itens)
"""Error classes for Pydactyl.""" class PydactylError(Exception): """Base error class.""" pass class BadRequestError(PydactylError): """Raised when a request is passed invalid parameters.""" pass class ClientConfigError(PydactylError): """Raised when a client configuration error exists.""" pass class PterodactylApiError(PydactylError): """Used to re-raise errors from the Pterodactyl API.""" pass
"""Error classes for Pydactyl.""" class Pydactylerror(Exception): """Base error class.""" pass class Badrequesterror(PydactylError): """Raised when a request is passed invalid parameters.""" pass class Clientconfigerror(PydactylError): """Raised when a client configuration error exists.""" pass class Pterodactylapierror(PydactylError): """Used to re-raise errors from the Pterodactyl API.""" pass
class Register: def __init__(self, id): self.id = id regs = [Register(i) for i in range(16)] RG0, RG1, RG2, RG3, RG4, RG5, RG6, RG7, RG8, RG9, RG10, RG11, RG12, RG13, RIP, RBANK = regs
class Register: def __init__(self, id): self.id = id regs = [register(i) for i in range(16)] (rg0, rg1, rg2, rg3, rg4, rg5, rg6, rg7, rg8, rg9, rg10, rg11, rg12, rg13, rip, rbank) = regs
oscar_number = int(input()) message = '' if oscar_number == 88: message = 'Leo finally won the Oscar! Leo is happy' elif oscar_number == 86: message = 'Not even for Wolf of Wall Street?!' elif oscar_number < 88 and oscar_number != 86: message = 'When will you give Leo an Oscar?' elif oscar_number > 88: message = 'Leo got one already!' print(message)
oscar_number = int(input()) message = '' if oscar_number == 88: message = 'Leo finally won the Oscar! Leo is happy' elif oscar_number == 86: message = 'Not even for Wolf of Wall Street?!' elif oscar_number < 88 and oscar_number != 86: message = 'When will you give Leo an Oscar?' elif oscar_number > 88: message = 'Leo got one already!' print(message)
test_cases = int(input().strip()) for t in range(1, test_cases + 1): N, M = map(int, input().strip().split()) binary = bin(M)[2:].zfill(N)[-N:] result = 'ON' if '0' in binary: result = 'OFF' print('#{} {}'.format(t, result))
test_cases = int(input().strip()) for t in range(1, test_cases + 1): (n, m) = map(int, input().strip().split()) binary = bin(M)[2:].zfill(N)[-N:] result = 'ON' if '0' in binary: result = 'OFF' print('#{} {}'.format(t, result))
# # Project Euler Math Functions # Soren Rasmussen 5/14/2015 # #!/usr/bin/python def sieveOfEratosthenes(n): primes = [0]*n output = [] for i in range(2,n): if primes[i] == 0: output.append(i) j=2*i while j < n: primes[j] = 1 j+=i return output
def sieve_of_eratosthenes(n): primes = [0] * n output = [] for i in range(2, n): if primes[i] == 0: output.append(i) j = 2 * i while j < n: primes[j] = 1 j += i return output
a=int(input()) b=int(input()) c=int(input()) d=int(input()) print((a^b)&(c|d)^((b&c)|(a^d)))
a = int(input()) b = int(input()) c = int(input()) d = int(input()) print((a ^ b) & (c | d) ^ (b & c | a ^ d))
def map(nums_list, operation): ''' Return a sequence of values obtained by applying the operation function to each number in nums_list. ''' return [operation(num) for num in nums_list] def double(num): return num * 2 def triple(num): return num * 3 nums_list = (1, 3, -10) for operation in (double, triple): print(map(nums_list, operation))
def map(nums_list, operation): """ Return a sequence of values obtained by applying the operation function to each number in nums_list. """ return [operation(num) for num in nums_list] def double(num): return num * 2 def triple(num): return num * 3 nums_list = (1, 3, -10) for operation in (double, triple): print(map(nums_list, operation))
# -*- coding: utf-8 -*- if __name__ == '__main__': crawl_name = 'maomi_china_selfie' cmd = 'scrapy crawl {0}'.format(crawl_name) # cmdline.execute(['scrapy','crawl','csgbidding']) cmdline.execute(cmd.split())
if __name__ == '__main__': crawl_name = 'maomi_china_selfie' cmd = 'scrapy crawl {0}'.format(crawl_name) cmdline.execute(cmd.split())
# -*- coding: utf-8 -*- """Model config in json format""" kaggle_config = { "dataset": { "download": False, "data_dir": "~/tensorflow_datasets", }, "data": { "class_names": ["PNEUMONIA"], "image_dimension": (224, 224, 3), "image_height": 224, "image_width": 224, "image_channel": 3, }, "train": { "train_base": False, "use_chexnet_weights": False, "augmentation": False, "batch_size": 64, "learn_rate": 0.001, "epochs": 100, "patience_learning_rate": 2, "min_learning_rate": 1e-8, "early_stopping_patience": 8 }, "test": { "batch_size": 64, "F1_threshold": 0.5, }, "model": { "pooling": "avg", } }
"""Model config in json format""" kaggle_config = {'dataset': {'download': False, 'data_dir': '~/tensorflow_datasets'}, 'data': {'class_names': ['PNEUMONIA'], 'image_dimension': (224, 224, 3), 'image_height': 224, 'image_width': 224, 'image_channel': 3}, 'train': {'train_base': False, 'use_chexnet_weights': False, 'augmentation': False, 'batch_size': 64, 'learn_rate': 0.001, 'epochs': 100, 'patience_learning_rate': 2, 'min_learning_rate': 1e-08, 'early_stopping_patience': 8}, 'test': {'batch_size': 64, 'F1_threshold': 0.5}, 'model': {'pooling': 'avg'}}
# oop/mro.simple.py class A: label = 'a' class B(A): label = 'b' class C(A): label = 'c' class D(B, C): pass d = D() print(d.label) # Hypothetically this could be either 'b' or 'c' print(d.__class__.mro()) # notice another way to get the MRO # prints: # [<class '__main__.D'>, <class '__main__.B'>, # <class '__main__.C'>, <class '__main__.A'>, <class 'object'>] """ $ python mro.simple.py b [ <class '__main__.D'>, <class '__main__.B'>, <class '__main__.C'>, <class '__main__.A'>, <class 'object'> ] """
class A: label = 'a' class B(A): label = 'b' class C(A): label = 'c' class D(B, C): pass d = d() print(d.label) print(d.__class__.mro()) "\n$ python mro.simple.py\nb\n[\n <class '__main__.D'>, <class '__main__.B'>,\n <class '__main__.C'>, <class '__main__.A'>,\n <class 'object'>\n]\n"
""" Constants for websites """ CONTENT_TYPE_PAGE = "page" CONTENT_TYPE_RESOURCE = "resource" CONTENT_TYPE_INSTRUCTOR = "instructor" CONTENT_TYPE_METADATA = "sitemetadata" CONTENT_TYPE_NAVMENU = "navmenu" COURSE_PAGE_LAYOUTS = ["instructor_insights"] COURSE_RESOURCE_LAYOUTS = ["pdf", "video"] CONTENT_FILENAME_MAX_LEN = 125 CONTENT_DIRPATH_MAX_LEN = 300 CONTENT_FILEPATH_UNIQUE_CONSTRAINT = "unique_page_content_destination" WEBSITE_SOURCE_STUDIO = "studio" WEBSITE_SOURCE_OCW_IMPORT = "ocw-import" WEBSITE_SOURCES = [WEBSITE_SOURCE_STUDIO, WEBSITE_SOURCE_OCW_IMPORT] STARTER_SOURCE_GITHUB = "github" STARTER_SOURCE_LOCAL = "local" STARTER_SOURCES = [STARTER_SOURCE_GITHUB, STARTER_SOURCE_LOCAL] WEBSITE_CONFIG_FILENAME = "ocw-studio.yml" WEBSITE_CONFIG_CONTENT_DIR_KEY = "content-dir" WEBSITE_CONFIG_DEFAULT_CONTENT_DIR = "content" WEBSITE_CONFIG_ROOT_URL_PATH_KEY = "root-url-path" WEBSITE_CONTENT_FILETYPE = "md" CONTENT_MENU_FIELD = "menu" OMNIBUS_STARTER_SLUG = "omnibus-starter" GLOBAL_ADMIN = "global_admin" GLOBAL_AUTHOR = "global_author" ADMIN_GROUP_PREFIX = "admins_website_" EDITOR_GROUP_PREFIX = "editors_website_" PERMISSION_ADD = "websites.add_website" PERMISSION_VIEW = "websites.view_website" PERMISSION_PREVIEW = "websites.preview_website" PERMISSION_EDIT = "websites.change_website" PERMISSION_PUBLISH = "websites.publish_website" PERMISSION_EDIT_CONTENT = "websites.edit_content_website" PERMISSION_COLLABORATE = "websites.add_collaborators_website" PERMISSION_CREATE_COLLECTION = "websites.add_websitecollection" PERMISSION_DELETE_COLLECTION = "websites.delete_websitecollection" PERMISSION_EDIT_COLLECTION = "websites.change_websitecollection" PERMISSION_CREATE_COLLECTION_ITEM = "websites.add_websitecollectionitem" PERMISSION_DELETE_COLLECTION_ITEM = "websites.delete_websitecollectionitem" PERMISSION_EDIT_COLLECTION_ITEM = "websites.change_websitecollectionitem" COLLECTION_PERMISSIONS = [ PERMISSION_CREATE_COLLECTION, PERMISSION_DELETE_COLLECTION, PERMISSION_EDIT_COLLECTION, PERMISSION_CREATE_COLLECTION_ITEM, PERMISSION_EDIT_COLLECTION_ITEM, PERMISSION_DELETE_COLLECTION_ITEM, ] ROLE_ADMINISTRATOR = "admin" ROLE_EDITOR = "editor" ROLE_GLOBAL = "global_admin" ROLE_OWNER = "owner" GROUP_ROLES = {ROLE_ADMINISTRATOR, ROLE_EDITOR} ROLE_GROUP_MAPPING = { ROLE_ADMINISTRATOR: ADMIN_GROUP_PREFIX, ROLE_EDITOR: EDITOR_GROUP_PREFIX, ROLE_GLOBAL: GLOBAL_ADMIN, } PERMISSIONS_GLOBAL_AUTHOR = [PERMISSION_ADD] PERMISSIONS_EDITOR = [PERMISSION_VIEW, PERMISSION_PREVIEW, PERMISSION_EDIT_CONTENT] PERMISSIONS_ADMIN = PERMISSIONS_EDITOR + [ PERMISSION_PUBLISH, PERMISSION_COLLABORATE, PERMISSION_EDIT, ] INSTRUCTORS_FIELD_NAME = "instructors" EXTERNAL_IDENTIFIER_PREFIX = "external-" RESOURCE_TYPE_VIDEO = "Video" RESOURCE_TYPE_DOCUMENT = "Document" RESOURCE_TYPE_IMAGE = "Image" RESOURCE_TYPE_OTHER = "Other" ADMIN_ONLY_CONTENT = ["sitemetadata"] PUBLISH_STATUS_SUCCEEDED = "succeeded" PUBLISH_STATUS_PENDING = "pending" PUBLISH_STATUS_ERRORED = "errored" PUBLISH_STATUS_ABORTED = "aborted" PUBLISH_STATUS_NOT_STARTED = "not-started" PUBLISH_STATUSES = [ PUBLISH_STATUS_SUCCEEDED, PUBLISH_STATUS_PENDING, PUBLISH_STATUS_ERRORED, PUBLISH_STATUS_ABORTED, PUBLISH_STATUS_NOT_STARTED, ]
""" Constants for websites """ content_type_page = 'page' content_type_resource = 'resource' content_type_instructor = 'instructor' content_type_metadata = 'sitemetadata' content_type_navmenu = 'navmenu' course_page_layouts = ['instructor_insights'] course_resource_layouts = ['pdf', 'video'] content_filename_max_len = 125 content_dirpath_max_len = 300 content_filepath_unique_constraint = 'unique_page_content_destination' website_source_studio = 'studio' website_source_ocw_import = 'ocw-import' website_sources = [WEBSITE_SOURCE_STUDIO, WEBSITE_SOURCE_OCW_IMPORT] starter_source_github = 'github' starter_source_local = 'local' starter_sources = [STARTER_SOURCE_GITHUB, STARTER_SOURCE_LOCAL] website_config_filename = 'ocw-studio.yml' website_config_content_dir_key = 'content-dir' website_config_default_content_dir = 'content' website_config_root_url_path_key = 'root-url-path' website_content_filetype = 'md' content_menu_field = 'menu' omnibus_starter_slug = 'omnibus-starter' global_admin = 'global_admin' global_author = 'global_author' admin_group_prefix = 'admins_website_' editor_group_prefix = 'editors_website_' permission_add = 'websites.add_website' permission_view = 'websites.view_website' permission_preview = 'websites.preview_website' permission_edit = 'websites.change_website' permission_publish = 'websites.publish_website' permission_edit_content = 'websites.edit_content_website' permission_collaborate = 'websites.add_collaborators_website' permission_create_collection = 'websites.add_websitecollection' permission_delete_collection = 'websites.delete_websitecollection' permission_edit_collection = 'websites.change_websitecollection' permission_create_collection_item = 'websites.add_websitecollectionitem' permission_delete_collection_item = 'websites.delete_websitecollectionitem' permission_edit_collection_item = 'websites.change_websitecollectionitem' collection_permissions = [PERMISSION_CREATE_COLLECTION, PERMISSION_DELETE_COLLECTION, PERMISSION_EDIT_COLLECTION, PERMISSION_CREATE_COLLECTION_ITEM, PERMISSION_EDIT_COLLECTION_ITEM, PERMISSION_DELETE_COLLECTION_ITEM] role_administrator = 'admin' role_editor = 'editor' role_global = 'global_admin' role_owner = 'owner' group_roles = {ROLE_ADMINISTRATOR, ROLE_EDITOR} role_group_mapping = {ROLE_ADMINISTRATOR: ADMIN_GROUP_PREFIX, ROLE_EDITOR: EDITOR_GROUP_PREFIX, ROLE_GLOBAL: GLOBAL_ADMIN} permissions_global_author = [PERMISSION_ADD] permissions_editor = [PERMISSION_VIEW, PERMISSION_PREVIEW, PERMISSION_EDIT_CONTENT] permissions_admin = PERMISSIONS_EDITOR + [PERMISSION_PUBLISH, PERMISSION_COLLABORATE, PERMISSION_EDIT] instructors_field_name = 'instructors' external_identifier_prefix = 'external-' resource_type_video = 'Video' resource_type_document = 'Document' resource_type_image = 'Image' resource_type_other = 'Other' admin_only_content = ['sitemetadata'] publish_status_succeeded = 'succeeded' publish_status_pending = 'pending' publish_status_errored = 'errored' publish_status_aborted = 'aborted' publish_status_not_started = 'not-started' publish_statuses = [PUBLISH_STATUS_SUCCEEDED, PUBLISH_STATUS_PENDING, PUBLISH_STATUS_ERRORED, PUBLISH_STATUS_ABORTED, PUBLISH_STATUS_NOT_STARTED]
class TestApplication: # Will the application start? def test_start(self, application): application.start()
class Testapplication: def test_start(self, application): application.start()
class Error(Exception): """Base class for other exceptions""" pass class ConfigNotFound(Error): """Raise when config file is required but not present""" print(f"ERROR:FileNotFound: Please provide configuration file using '-c' argument or check file path") exit(1)
class Error(Exception): """Base class for other exceptions""" pass class Confignotfound(Error): """Raise when config file is required but not present""" print(f"ERROR:FileNotFound: Please provide configuration file using '-c' argument or check file path") exit(1)
class ProviderException(Exception): pass class NoProviderException(ProviderException): def __init__(self, hostname) -> None: self.hostname = hostname def __str__(self) -> str: return "No provider for {0}".format(self.hostname)
class Providerexception(Exception): pass class Noproviderexception(ProviderException): def __init__(self, hostname) -> None: self.hostname = hostname def __str__(self) -> str: return 'No provider for {0}'.format(self.hostname)
#!/usr/bin/env python NAME = 'Alert Logic (Alert Logic)' def is_waf(self): for attack in self.attacks: r = attack(self) if r is None: return _, page = r if all(i in page for i in (b'<title>Requested URL cannot be found</title>', b'Proceed to homepage', b'Back to previous page', b'We are sorry, but the page you are looking for cannot be found', b'Reference ID:', b'The page has either been removed, renamed or is temporarily unavailable')): return True return False
name = 'Alert Logic (Alert Logic)' def is_waf(self): for attack in self.attacks: r = attack(self) if r is None: return (_, page) = r if all((i in page for i in (b'<title>Requested URL cannot be found</title>', b'Proceed to homepage', b'Back to previous page', b'We are sorry, but the page you are looking for cannot be found', b'Reference ID:', b'The page has either been removed, renamed or is temporarily unavailable'))): return True return False
load( ":common.bzl", "dart_filetypes", "filter_files", "has_dart_sources", "make_dart_context", "make_package_uri", "api_summary_extension", ) def ddc_action(ctx, dart_ctx, ddc_output, source_map_output): """ddc compile action.""" flags = [] if ctx.attr.force_ddc_compile: print("Force compile %s?" % ctx.label.name + " sounds a bit too strong for a library that is" + " not strong clean, doesn't it?") flags.append("--unsafe-force-compile") # TODO: workaround for ng2/templates until they are better typed flags.append("--unsafe-angular2-whitelist") # Specify the extension used for API summaries in Google3 flags.append("--summary-extension=%s" % api_summary_extension) inputs = [] strict_transitive_srcs = depset([]) # Specify all input summaries on the command line args for dep in dart_ctx.transitive_deps.targets.values(): if not dep.ddc.enabled: continue strict_transitive_srcs += dep.dart.srcs if has_dart_sources(dep.dart.srcs): if dep.ddc.output and dep.dart.strong_summary: inputs.append(dep.dart.strong_summary) flags += ["-s", dep.dart.strong_summary.path] else: # TODO: produce an error here instead. print("missing summary for %s" % dep.label) # Specify the output location outputs = [ddc_output] if source_map_output: outputs.append(source_map_output) flags += ["-o", ddc_output.path] # TODO: Use a standard JS module system instead of our homegrown one. # We'll need to also use the corresponding dart-sdk when we change this. flags += ["--modules", "legacy"] flags.append("--inline-source-map") flags.append("--single-out-file") input_paths = [] for f in filter_files(dart_filetypes, dart_ctx.srcs): if hasattr(ctx.attr, "web_exclude_srcs") and f in ctx.files.web_exclude_srcs: # Files that we ignore for DDC compilation. continue if f in strict_transitive_srcs: # Skip files that are already a part of a dependency. # Note: we don't emit a warning because it's unclear at this # point what we would like users to do to get rid of the issue. continue inputs.append(f) normalized_path = make_package_uri(dart_ctx, f.short_path) flags += ["--url-mapping", "%s,%s" % (normalized_path, f.path)] flags += ["--bazel-mapping", "%s,/%s" % (f.path, f.path)] input_paths.append(normalized_path) # We normalized file:/// paths, so '/' corresponds to the top of google3. flags += ["--library-root", "/"] flags += ["--module-root", ddc_output.root.path] flags += ["--no-summarize"] # Specify the input files after all flags flags += input_paths # Sends all the flags to an output file, for worker support flags_file = ctx.new_file(ctx.label.name + "_ddc_args") ctx.file_action(output = flags_file, content = "\n".join(flags)) inputs += [flags_file] flags = ["@%s" % flags_file.path] ctx.action( inputs=inputs, executable=ctx.executable._dev_compiler, arguments=flags, outputs=outputs, progress_message="Compiling %s with ddc" % ctx.label, mnemonic="DartDevCompiler", execution_requirements={"supports-workers": "1"}, ) def dart_ddc_bundle_outputs(output_dir, output_html): html = "%{name}.html" if output_html: html = output_html elif output_dir: html = "%s/%s" % (output_dir, html) prefix = _output_dir(output_dir, output_html) + "%{name}" return { "html": html, "app": "%s.js" % prefix, "package_spec": "%{name}.packages", } # Computes the output dir based on output_dir and output_html options. def _output_dir(output_dir, output_html): if output_html and output_dir: fail("Cannot use both output_dir and output_html") if output_html and "/" in output_html: output_dir = "/".join(output_html.split("/")[0:-1]) if output_dir and not output_dir.endswith("/"): output_dir = "%s/" % output_dir if not output_dir: output_dir = "" return output_dir def dart_ddc_bundle_impl(ctx): dart_ctx = make_dart_context(ctx, deps = [ctx.attr.entry_module]) inputs = [] sourcemaps = [] # Initialize map of dart srcs to packages, if checking duplicate srcs if ctx.attr.check_duplicate_srcs: dart_srcs_to_pkgs = {} for dep in dart_ctx.transitive_deps.targets.values(): if dep.ddc.enabled and has_dart_sources(dep.dart.srcs): # Collect dict of dart srcs to packages, if checking duplicate srcs # Note that we skip angular2 which is an exception to this rule for now. if (ctx.attr.check_duplicate_srcs and dep.label.package.endswith("angular2")): all_dart_srcs = [f for f in dep.dart.srcs if f.path.endswith(".dart")] for src in all_dart_srcs: label_name = "%s:%s" % (dep.label.package, dep.label.name) if src.short_path in dart_srcs_to_pkgs: dart_srcs_to_pkgs[src.short_path] += [label_name] else: dart_srcs_to_pkgs[src.short_path] = [label_name] if dep.ddc.output: inputs.append(dep.ddc.output) if dep.ddc.sourcemap: sourcemaps.append(dep.ddc.sourcemap) else: # TODO: eventually we should fail here. print("missing ddc code for %s" % dep.label) # Actually check for duplicate dart srcs, if enabled if ctx.attr.check_duplicate_srcs: for src in dart_srcs_to_pkgs: if len(dart_srcs_to_pkgs[src]) > 1: print("%s found in multiple libraries %s" % (src, dart_srcs_to_pkgs[src])) ctx.action( inputs = inputs, executable = ctx.file._ddc_concat, arguments = [ctx.outputs.app.path] + [f.path for f in inputs], outputs = [ctx.outputs.app], progress_message = "Concatenating ddc output files for %s" % ctx, mnemonic = "DartDevCompilerConcat") module = "" if ctx.attr.entry_module.label.package: module = module + ctx.attr.entry_module.label.package + "/" module = module + ctx.attr.entry_module.label.name name = ctx.label.name package = ctx.label.package library = "" if package: library = library + package + "/" library = (library + ctx.attr.entry_library).replace("/", "__") ddc_runtime_prefix = "%s." % ctx.label.name html_gen_flags = [ "--entry_module", module, "--entry_library", library, "--ddc_runtime_prefix", ddc_runtime_prefix, "--script", "%s.js" % name, "--out", ctx.outputs.html.path, ] html_gen_inputs = [] input_html = ctx.attr.input_html if input_html: input_file = ctx.files.input_html[0] html_gen_inputs.append(input_file) html_gen_flags += ["--input_html", input_file.path] if ctx.attr.include_test: html_gen_flags.append("--include_test") ctx.action( inputs = html_gen_inputs, outputs = [ctx.outputs.html], executable = ctx.file._ddc_html_generator, arguments = html_gen_flags) for f in ctx.files._ddc_support: if f.path.endswith("dart_library.js"): ddc_dart_library = f if f.path.endswith("dart_sdk.js"): ddc_dart_sdk = f if not ddc_dart_library: fail("Unable to find dart_library.js in the ddc support files. " + "Please file a bug on Chrome -> Dart -> Devtools") if not ddc_dart_sdk: fail("Unable to find dart_sdk.js in the ddc support files. " + "Please file a bug on Chrome -> Dart -> Devtools") # TODO: Do we need to prefix with workspace root? ddc_runtime_output_prefix = "%s/%s/%s%s" % ( ctx.workspace_name, ctx.label.package, _output_dir(ctx.attr.output_dir, ctx.attr.output_html), ddc_runtime_prefix) # Create a custom package spec which provides paths relative to # $RUNFILES/$BAZEL_WORKSPACE_NAME. _ddc_package_spec_action(ctx, dart_ctx, ctx.outputs.package_spec) runfiles = depset(ctx.files._ddc_support) runfiles += [ctx.outputs.package_spec] for dep in dart_ctx.transitive_deps.targets.values(): runfiles += dep.dart.srcs runfiles += dep.dart.data runfiles += [dep.dart.strong_summary] # Find the strong_summary file for the sdk for f in ctx.files._sdk_summaries: if f.path.endswith("strong.sum"): sdk_strong_summary = f break if not sdk_strong_summary: fail("unable to find sdk strong summary") for f in ctx.files._js_pkg: if f.path.endswith("js.api.ds"): pkg_js_summary = f; break if not pkg_js_summary: fail("unable to find js package summary") return struct( dart=dart_ctx, runfiles=ctx.runfiles( files=list(runfiles), root_symlinks={ "%sdart_library.js" % ddc_runtime_output_prefix: ddc_dart_library, "%sdart_sdk.js" % ddc_runtime_output_prefix: ddc_dart_sdk, "%s/third_party/dart_lang/trunk/sdk/lib/_internal/strong.sum" % ctx.workspace_name: sdk_strong_summary, "%s/third_party/dart/js/js.api.ds" % ctx.workspace_name: pkg_js_summary, } ), ) def _ddc_package_spec_action(ctx, dart_ctx, output): """Creates an action that generates a Dart package spec for the server to use. Paths are all relative to $RUNFILES/$WORKSPACE_DIR. Arguments: ctx: The rule context. dart_ctx: The Dart context. output: The output package_spec file. """ # Generate the content. content = "# Generated by Bazel\n" seen_packages = depset([]) for dc in dart_ctx.transitive_deps.targets.values(): if not dc.dart.package: continue # Don't duplicate packages if dc.dart.package in seen_packages: continue seen_packages += [dc.dart.package] lib_root = "/" if dc.dart.label.workspace_root: lib_root += dc.dart.label.workspace_root + "/" if dc.dart.label.package: lib_root += dc.dart.label.package + "/" lib_root += "lib/" content += "%s:%s\n" % (dc.dart.package, lib_root) # Emit the package spec. ctx.file_action( output=output, content=content, )
load(':common.bzl', 'dart_filetypes', 'filter_files', 'has_dart_sources', 'make_dart_context', 'make_package_uri', 'api_summary_extension') def ddc_action(ctx, dart_ctx, ddc_output, source_map_output): """ddc compile action.""" flags = [] if ctx.attr.force_ddc_compile: print('Force compile %s?' % ctx.label.name + ' sounds a bit too strong for a library that is' + " not strong clean, doesn't it?") flags.append('--unsafe-force-compile') flags.append('--unsafe-angular2-whitelist') flags.append('--summary-extension=%s' % api_summary_extension) inputs = [] strict_transitive_srcs = depset([]) for dep in dart_ctx.transitive_deps.targets.values(): if not dep.ddc.enabled: continue strict_transitive_srcs += dep.dart.srcs if has_dart_sources(dep.dart.srcs): if dep.ddc.output and dep.dart.strong_summary: inputs.append(dep.dart.strong_summary) flags += ['-s', dep.dart.strong_summary.path] else: print('missing summary for %s' % dep.label) outputs = [ddc_output] if source_map_output: outputs.append(source_map_output) flags += ['-o', ddc_output.path] flags += ['--modules', 'legacy'] flags.append('--inline-source-map') flags.append('--single-out-file') input_paths = [] for f in filter_files(dart_filetypes, dart_ctx.srcs): if hasattr(ctx.attr, 'web_exclude_srcs') and f in ctx.files.web_exclude_srcs: continue if f in strict_transitive_srcs: continue inputs.append(f) normalized_path = make_package_uri(dart_ctx, f.short_path) flags += ['--url-mapping', '%s,%s' % (normalized_path, f.path)] flags += ['--bazel-mapping', '%s,/%s' % (f.path, f.path)] input_paths.append(normalized_path) flags += ['--library-root', '/'] flags += ['--module-root', ddc_output.root.path] flags += ['--no-summarize'] flags += input_paths flags_file = ctx.new_file(ctx.label.name + '_ddc_args') ctx.file_action(output=flags_file, content='\n'.join(flags)) inputs += [flags_file] flags = ['@%s' % flags_file.path] ctx.action(inputs=inputs, executable=ctx.executable._dev_compiler, arguments=flags, outputs=outputs, progress_message='Compiling %s with ddc' % ctx.label, mnemonic='DartDevCompiler', execution_requirements={'supports-workers': '1'}) def dart_ddc_bundle_outputs(output_dir, output_html): html = '%{name}.html' if output_html: html = output_html elif output_dir: html = '%s/%s' % (output_dir, html) prefix = _output_dir(output_dir, output_html) + '%{name}' return {'html': html, 'app': '%s.js' % prefix, 'package_spec': '%{name}.packages'} def _output_dir(output_dir, output_html): if output_html and output_dir: fail('Cannot use both output_dir and output_html') if output_html and '/' in output_html: output_dir = '/'.join(output_html.split('/')[0:-1]) if output_dir and (not output_dir.endswith('/')): output_dir = '%s/' % output_dir if not output_dir: output_dir = '' return output_dir def dart_ddc_bundle_impl(ctx): dart_ctx = make_dart_context(ctx, deps=[ctx.attr.entry_module]) inputs = [] sourcemaps = [] if ctx.attr.check_duplicate_srcs: dart_srcs_to_pkgs = {} for dep in dart_ctx.transitive_deps.targets.values(): if dep.ddc.enabled and has_dart_sources(dep.dart.srcs): if ctx.attr.check_duplicate_srcs and dep.label.package.endswith('angular2'): all_dart_srcs = [f for f in dep.dart.srcs if f.path.endswith('.dart')] for src in all_dart_srcs: label_name = '%s:%s' % (dep.label.package, dep.label.name) if src.short_path in dart_srcs_to_pkgs: dart_srcs_to_pkgs[src.short_path] += [label_name] else: dart_srcs_to_pkgs[src.short_path] = [label_name] if dep.ddc.output: inputs.append(dep.ddc.output) if dep.ddc.sourcemap: sourcemaps.append(dep.ddc.sourcemap) else: print('missing ddc code for %s' % dep.label) if ctx.attr.check_duplicate_srcs: for src in dart_srcs_to_pkgs: if len(dart_srcs_to_pkgs[src]) > 1: print('%s found in multiple libraries %s' % (src, dart_srcs_to_pkgs[src])) ctx.action(inputs=inputs, executable=ctx.file._ddc_concat, arguments=[ctx.outputs.app.path] + [f.path for f in inputs], outputs=[ctx.outputs.app], progress_message='Concatenating ddc output files for %s' % ctx, mnemonic='DartDevCompilerConcat') module = '' if ctx.attr.entry_module.label.package: module = module + ctx.attr.entry_module.label.package + '/' module = module + ctx.attr.entry_module.label.name name = ctx.label.name package = ctx.label.package library = '' if package: library = library + package + '/' library = (library + ctx.attr.entry_library).replace('/', '__') ddc_runtime_prefix = '%s.' % ctx.label.name html_gen_flags = ['--entry_module', module, '--entry_library', library, '--ddc_runtime_prefix', ddc_runtime_prefix, '--script', '%s.js' % name, '--out', ctx.outputs.html.path] html_gen_inputs = [] input_html = ctx.attr.input_html if input_html: input_file = ctx.files.input_html[0] html_gen_inputs.append(input_file) html_gen_flags += ['--input_html', input_file.path] if ctx.attr.include_test: html_gen_flags.append('--include_test') ctx.action(inputs=html_gen_inputs, outputs=[ctx.outputs.html], executable=ctx.file._ddc_html_generator, arguments=html_gen_flags) for f in ctx.files._ddc_support: if f.path.endswith('dart_library.js'): ddc_dart_library = f if f.path.endswith('dart_sdk.js'): ddc_dart_sdk = f if not ddc_dart_library: fail('Unable to find dart_library.js in the ddc support files. ' + 'Please file a bug on Chrome -> Dart -> Devtools') if not ddc_dart_sdk: fail('Unable to find dart_sdk.js in the ddc support files. ' + 'Please file a bug on Chrome -> Dart -> Devtools') ddc_runtime_output_prefix = '%s/%s/%s%s' % (ctx.workspace_name, ctx.label.package, _output_dir(ctx.attr.output_dir, ctx.attr.output_html), ddc_runtime_prefix) _ddc_package_spec_action(ctx, dart_ctx, ctx.outputs.package_spec) runfiles = depset(ctx.files._ddc_support) runfiles += [ctx.outputs.package_spec] for dep in dart_ctx.transitive_deps.targets.values(): runfiles += dep.dart.srcs runfiles += dep.dart.data runfiles += [dep.dart.strong_summary] for f in ctx.files._sdk_summaries: if f.path.endswith('strong.sum'): sdk_strong_summary = f break if not sdk_strong_summary: fail('unable to find sdk strong summary') for f in ctx.files._js_pkg: if f.path.endswith('js.api.ds'): pkg_js_summary = f break if not pkg_js_summary: fail('unable to find js package summary') return struct(dart=dart_ctx, runfiles=ctx.runfiles(files=list(runfiles), root_symlinks={'%sdart_library.js' % ddc_runtime_output_prefix: ddc_dart_library, '%sdart_sdk.js' % ddc_runtime_output_prefix: ddc_dart_sdk, '%s/third_party/dart_lang/trunk/sdk/lib/_internal/strong.sum' % ctx.workspace_name: sdk_strong_summary, '%s/third_party/dart/js/js.api.ds' % ctx.workspace_name: pkg_js_summary})) def _ddc_package_spec_action(ctx, dart_ctx, output): """Creates an action that generates a Dart package spec for the server to use. Paths are all relative to $RUNFILES/$WORKSPACE_DIR. Arguments: ctx: The rule context. dart_ctx: The Dart context. output: The output package_spec file. """ content = '# Generated by Bazel\n' seen_packages = depset([]) for dc in dart_ctx.transitive_deps.targets.values(): if not dc.dart.package: continue if dc.dart.package in seen_packages: continue seen_packages += [dc.dart.package] lib_root = '/' if dc.dart.label.workspace_root: lib_root += dc.dart.label.workspace_root + '/' if dc.dart.label.package: lib_root += dc.dart.label.package + '/' lib_root += 'lib/' content += '%s:%s\n' % (dc.dart.package, lib_root) ctx.file_action(output=output, content=content)
str = "This is string example" print("Reversed string is: "+str[::-1]) ss = str.split(" ") print("Reversed words are: "+ss[0][::-1]+" "+ss[1][::-1]+" "+ss[2][::-1]+" "+ss[3][::-1]) print("Reversed letters are: "+ss[0][0:2][::-1]) print("*".join(ss)) print("Replaced by was is: "+ss[0]+" "+ss[1].replace("is","was")+" "+ss[2]+" "+ss[3]) n = float(input("Enter")) print(n)
str = 'This is string example' print('Reversed string is: ' + str[::-1]) ss = str.split(' ') print('Reversed words are: ' + ss[0][::-1] + ' ' + ss[1][::-1] + ' ' + ss[2][::-1] + ' ' + ss[3][::-1]) print('Reversed letters are: ' + ss[0][0:2][::-1]) print('*'.join(ss)) print('Replaced by was is: ' + ss[0] + ' ' + ss[1].replace('is', 'was') + ' ' + ss[2] + ' ' + ss[3]) n = float(input('Enter')) print(n)
# -*- coding: utf-8 -*- """ Statistics collector helper class for pdf2xlsx """ class StatLogger(): """ Collect statistic about the zip to xlsx process. Assembles a list containin invoice number of items. Every item is the number of entries found during the invoice parsing. It implements a simple API: new_invo(), new_entr() and __str__() A new instance contains an empty list: invo_list """ def __init__(self): self.invo_list = [] def __str__(self): return '{invo_list}'.format(**self.__dict__) def new_invo(self): """ When a new invoice was found create a new invoice log instance The current implementation is a simple list of numbers """ self.invo_list.append(0) def new_entr(self): """ When a new entry was found increase the entry counter for the current invoice. """ self.invo_list[-1] += 1
""" Statistics collector helper class for pdf2xlsx """ class Statlogger: """ Collect statistic about the zip to xlsx process. Assembles a list containin invoice number of items. Every item is the number of entries found during the invoice parsing. It implements a simple API: new_invo(), new_entr() and __str__() A new instance contains an empty list: invo_list """ def __init__(self): self.invo_list = [] def __str__(self): return '{invo_list}'.format(**self.__dict__) def new_invo(self): """ When a new invoice was found create a new invoice log instance The current implementation is a simple list of numbers """ self.invo_list.append(0) def new_entr(self): """ When a new entry was found increase the entry counter for the current invoice. """ self.invo_list[-1] += 1
# -*- coding: utf-8 -*- """ Written by Daniel M. Aukes Email: danaukes<at>gmail.com Please see LICENSE for full license. """ class NameGenerator(object): @classmethod def generate_name(cls): try: name = cls._generate_name() except AttributeError: cls._ii = 0 name = cls._generate_name() return name @classmethod def _generate_name(cls): try: typestring = cls.typestring except AttributeError: typestring = cls.__name__ typestring = typestring.lower() try: typeformat = cls.typeformat except AttributeError: typeformat = '{0}_{1:04d}' name = typeformat.format(typestring,cls._ii) cls._ii+=1 return name def __str__(self): return self.name def __repr__(self): return str(self)
""" Written by Daniel M. Aukes Email: danaukes<at>gmail.com Please see LICENSE for full license. """ class Namegenerator(object): @classmethod def generate_name(cls): try: name = cls._generate_name() except AttributeError: cls._ii = 0 name = cls._generate_name() return name @classmethod def _generate_name(cls): try: typestring = cls.typestring except AttributeError: typestring = cls.__name__ typestring = typestring.lower() try: typeformat = cls.typeformat except AttributeError: typeformat = '{0}_{1:04d}' name = typeformat.format(typestring, cls._ii) cls._ii += 1 return name def __str__(self): return self.name def __repr__(self): return str(self)
#!/usr/bin/env python """ Expression Add Operators Given a string that contains only digits 0-9 and a target value, return all possibilities to add binary operators (not unary) +, -, or * between the digits so they evaluate to the target value. Examples: "123", 6 -> ["1+2+3", "1*2*3"] "232", 8 -> ["2*3+2", "2+3*2"] "105", 5 -> ["1*0+5","10-5"] "00", 0 -> ["0+0", "0-0", "0*0"] "3456237490", 9191 -> [] https://leetcode.com/problems/expression-add-operators/ """ class Solution(object): def addOperators(self, num, target): """ :type num: str :type target: int :rtype: List[str] """ result = [] for i in range(1, len(num) + 1): if i == 1 or (i > 1 and num[0] != "0"): self.search(num[i:], num[:i], int(num[:i]), int(num[:i]), result, target) return result def search(self, numbers_left, current_path, current_value, value_to_be_processed, result, target): if not numbers_left: if current_value == target: result.append(current_path) return for i in range(1, len(numbers_left)+1): value_str = numbers_left[:i] value = int(value_str) if i == 1 or (i > 1 and numbers_left[0] != "0"): self.search(numbers_left[i:], current_path + "+" + value_str, current_value + value, value, result, target) self.search(numbers_left[i:], current_path + "-" + value_str, current_value - value, -value, result, target) self.search(numbers_left[i:], current_path + "*" + value_str, current_value - value_to_be_processed + value_to_be_processed * value, value_to_be_processed * value, result, target) solution = Solution() print(solution.addOperators("0105", 5))
""" Expression Add Operators Given a string that contains only digits 0-9 and a target value, return all possibilities to add binary operators (not unary) +, -, or * between the digits so they evaluate to the target value. Examples: "123", 6 -> ["1+2+3", "1*2*3"] "232", 8 -> ["2*3+2", "2+3*2"] "105", 5 -> ["1*0+5","10-5"] "00", 0 -> ["0+0", "0-0", "0*0"] "3456237490", 9191 -> [] https://leetcode.com/problems/expression-add-operators/ """ class Solution(object): def add_operators(self, num, target): """ :type num: str :type target: int :rtype: List[str] """ result = [] for i in range(1, len(num) + 1): if i == 1 or (i > 1 and num[0] != '0'): self.search(num[i:], num[:i], int(num[:i]), int(num[:i]), result, target) return result def search(self, numbers_left, current_path, current_value, value_to_be_processed, result, target): if not numbers_left: if current_value == target: result.append(current_path) return for i in range(1, len(numbers_left) + 1): value_str = numbers_left[:i] value = int(value_str) if i == 1 or (i > 1 and numbers_left[0] != '0'): self.search(numbers_left[i:], current_path + '+' + value_str, current_value + value, value, result, target) self.search(numbers_left[i:], current_path + '-' + value_str, current_value - value, -value, result, target) self.search(numbers_left[i:], current_path + '*' + value_str, current_value - value_to_be_processed + value_to_be_processed * value, value_to_be_processed * value, result, target) solution = solution() print(solution.addOperators('0105', 5))
class Solution: def lengthOfLastWord(self, s): s=s.split() if len(s)==0: return 0 return len(s[-1])
class Solution: def length_of_last_word(self, s): s = s.split() if len(s) == 0: return 0 return len(s[-1])
schema = { 'user': [ { 'mail_id': 'string', 'patient': [ { 'name': 'string', 'mob': 9929929922, 'address': 'string', 'stats': {...}, }, {...} ], 'reports': { 'heart': [ {'patient_id': 932003, 'time': 'datetime', 'stats': {}}, {...} ], 'diabetes': [{ 'patient_id': 392, 'time': 'datetime' }] } }, {...} ], 'suggestions': { 'heart': ['point 1', 'point 2', 'point 3'], 'diabetes': ['point 1', 'point 2', 'point 3'], } }
schema = {'user': [{'mail_id': 'string', 'patient': [{'name': 'string', 'mob': 9929929922, 'address': 'string', 'stats': {...}}, {...}], 'reports': {'heart': [{'patient_id': 932003, 'time': 'datetime', 'stats': {}}, {...}], 'diabetes': [{'patient_id': 392, 'time': 'datetime'}]}}, {...}], 'suggestions': {'heart': ['point 1', 'point 2', 'point 3'], 'diabetes': ['point 1', 'point 2', 'point 3']}}
buildcode=""" function Get-SystemTime(){ $time_mask = @() $the_time = Get-Date $time_mask += [string]$the_time.Year + "0000" $time_mask += [string]$the_time.Year + [string]$the_time.Month + "00" $time_mask += [string]$the_time.Year + [string]$the_time.Month + [string]$the_time.Day return $time_mask } """ callcode=""" $key_combos += ,(Get-SystemTime) """
buildcode = '\nfunction Get-SystemTime(){\n\t$time_mask = @()\n\t$the_time = Get-Date\n\t$time_mask += [string]$the_time.Year + "0000"\n\t$time_mask += [string]$the_time.Year + [string]$the_time.Month + "00"\n\t$time_mask += [string]$the_time.Year + [string]$the_time.Month + [string]$the_time.Day\n\treturn $time_mask\n}\n\n' callcode = '\n\t$key_combos += ,(Get-SystemTime)\n'
# parsetab.py # This file is automatically generated. Do not edit. _tabversion = '3.2' _lr_method = 'LALR' _lr_signature = '\xcc\xb5(e\x9f\xabO\r,\xe6J\x922\x85M\xb7' _lr_action_items = {'LOGOR':([6,11,12,17,20,21,22,28,32,33,35,47,48,49,50,51,80,81,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,118,122,124,129,132,135,136,],[-64,-63,-31,-61,-26,-27,-62,67,-87,-28,-32,-60,-59,-63,-62,-60,-31,67,-66,-53,-51,67,67,67,67,-33,67,67,67,-34,67,67,-35,67,67,-36,67,67,-30,67,-32,-52,-17,-50,67,]),'SHORT':([0,1,2,4,6,10,11,12,17,19,20,21,22,23,25,28,29,31,32,33,35,36,37,40,47,48,49,50,51,52,60,61,79,82,84,87,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,125,126,129,132,133,134,135,146,],[-89,5,-10,-2,-64,-5,-63,-31,-61,-11,-26,-27,-62,-9,-8,-84,-89,-4,-87,-28,-32,-6,-3,-7,-60,-59,-63,-62,-60,-68,-25,5,5,-69,5,-70,-66,-53,-51,-39,-38,-45,-41,-33,-42,-43,-47,-34,-44,-46,-35,-40,-48,-36,-49,-37,-65,-30,-67,-88,-52,-17,5,5,-50,-54,]),'RSHIFT':([6,11,12,17,20,21,22,28,32,33,35,47,48,49,50,51,80,81,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,118,122,124,129,132,135,136,],[-64,-63,-31,-61,-26,-27,-62,65,-87,-28,-32,-60,-59,-63,-62,-60,-31,65,-66,-53,-51,65,65,65,65,-33,65,65,65,-34,65,65,-35,65,65,-36,65,65,-30,65,-32,-52,-17,-50,65,]),'UNKNOWN':([0,1,2,4,6,10,11,12,17,19,20,21,22,23,25,28,29,31,32,33,35,36,37,40,47,48,49,50,51,52,60,61,79,82,84,87,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,125,126,129,132,133,134,135,146,],[-89,8,-10,-2,-64,-5,-63,-31,-61,-11,-26,-27,-62,-9,-8,-84,-89,-4,-87,-28,-32,-6,-3,-7,-60,-59,-63,-62,-60,-68,-25,8,8,-69,8,-70,-66,-53,-51,-39,-38,-45,-41,-33,-42,-43,-47,-34,-44,-46,-35,-40,-48,-36,-49,-37,-65,-30,-67,-88,-52,-17,8,8,-50,-54,]),'VOID':([0,1,2,4,6,10,11,12,17,19,20,21,22,23,25,28,29,31,32,33,35,36,37,40,47,48,49,50,51,52,60,61,79,82,84,87,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,125,126,129,132,133,134,135,146,],[-89,9,-10,-2,-64,-5,-63,-31,-61,-11,-26,-27,-62,-9,-8,-84,-89,-4,-87,-28,-32,-6,-3,-7,-60,-59,-63,-62,-60,-68,-25,9,9,-69,9,-70,-66,-53,-51,-39,-38,-45,-41,-33,-42,-43,-47,-34,-44,-46,-35,-40,-48,-36,-49,-37,-65,-30,-67,-88,-52,-17,9,9,-50,-54,]),'NE':([6,11,12,17,20,21,22,28,32,33,35,47,48,49,50,51,80,81,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,118,122,124,129,132,135,136,],[-64,-63,-31,-61,-26,-27,-62,77,-87,-28,-32,-60,-59,-63,-62,-60,-31,77,-66,-53,-51,77,77,77,77,-33,77,77,77,-34,77,77,-35,77,77,-36,77,77,-30,77,-32,-52,-17,-50,77,]),'CHAR':([0,1,2,4,6,10,11,12,17,19,20,21,22,23,25,28,29,31,32,33,35,36,37,40,47,48,49,50,51,52,60,61,79,82,84,87,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,125,126,129,132,133,134,135,146,],[-89,13,-10,-2,-64,-5,-63,-31,-61,-11,-26,-27,-62,-9,-8,-84,-89,-4,-87,-28,-32,-6,-3,-7,-60,-59,-63,-62,-60,-68,-25,13,13,-69,13,-70,-66,-53,-51,-39,-38,-45,-41,-33,-42,-43,-47,-34,-44,-46,-35,-40,-48,-36,-49,-37,-65,-30,-67,-88,-52,-17,13,13,-50,-54,]),'LOGNOT':([0,1,2,4,6,7,10,11,12,14,17,18,19,20,21,22,23,25,28,29,30,31,32,33,35,36,37,40,47,48,49,50,51,52,54,55,56,57,58,60,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,82,83,84,87,88,89,90,91,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,125,126,129,131,132,133,134,135,139,146,],[-89,14,-10,-2,-64,14,-5,-63,-31,-56,-61,-55,-11,-26,-27,-62,-9,-8,-84,-89,14,-4,-87,-28,-32,-6,-3,-7,-60,-59,-63,-62,-60,-68,-18,-19,14,-20,-21,-25,14,14,14,14,14,14,14,14,14,14,14,14,14,14,14,14,14,14,-69,14,14,-70,-66,-53,14,14,-51,-39,-38,-45,-41,-33,-42,-43,-47,-34,-44,-46,-35,-40,-48,-36,-49,-37,-65,-30,-67,-88,-52,14,-17,14,14,-50,14,-54,]),'FLOAT_CONST':([0,1,2,4,6,7,10,11,12,14,17,18,19,20,21,22,23,25,28,29,30,31,32,33,35,36,37,40,47,48,49,50,51,52,54,55,56,57,58,60,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,82,83,84,87,88,89,90,91,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,125,126,129,131,132,133,134,135,139,146,],[-89,21,-10,-2,-64,21,-5,-63,-31,-56,-61,-55,-11,-26,-27,-62,-9,-8,-84,-89,21,-4,-87,-28,-32,-6,-3,-7,-60,-59,-63,-62,-60,-68,-18,-19,21,-20,-21,-25,21,21,21,21,21,21,21,21,21,21,21,21,21,21,21,21,21,21,-69,21,21,-70,-66,-53,21,21,-51,-39,-38,-45,-41,-33,-42,-43,-47,-34,-44,-46,-35,-40,-48,-36,-49,-37,-65,-30,-67,-88,-52,21,-17,21,21,-50,21,-54,]),'LSHIFT':([6,11,12,17,20,21,22,28,32,33,35,47,48,49,50,51,80,81,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,118,122,124,129,132,135,136,],[-64,-63,-31,-61,-26,-27,-62,74,-87,-28,-32,-60,-59,-63,-62,-60,-31,74,-66,-53,-51,74,74,74,74,-33,74,74,74,-34,74,74,-35,74,74,-36,74,74,-30,74,-32,-52,-17,-50,74,]),'MINUS':([0,1,2,4,6,7,10,11,12,14,17,18,19,20,21,22,23,25,28,29,30,31,32,33,35,36,37,40,47,48,49,50,51,52,54,55,56,57,58,60,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,87,88,89,90,91,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,122,124,125,126,129,131,132,133,134,135,136,139,146,],[-89,18,-10,-2,-64,18,-5,-63,-31,-56,-61,-55,-11,-26,-27,-62,-9,-8,76,-89,18,-4,-87,-28,-32,-6,-3,-7,-60,-59,-63,-62,-60,-68,-18,-19,18,-20,-21,-25,18,18,18,18,18,18,18,18,18,18,18,18,18,18,18,18,18,18,-31,76,-69,18,18,-70,-66,-53,18,18,-51,76,76,76,76,-33,76,76,76,-34,76,76,-35,76,76,-36,76,76,-65,-30,76,-32,-67,-88,-52,18,-17,18,18,-50,76,18,-54,]),'DIVIDE':([6,11,12,17,20,21,22,28,32,33,35,47,48,49,50,51,80,81,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,118,122,124,129,132,135,136,],[-64,-63,-31,-61,-26,-27,-62,66,-87,-28,-32,-60,-59,-63,-62,-60,-31,66,-66,-53,-51,66,66,66,66,-33,66,66,66,-34,66,66,66,66,66,66,66,66,-30,66,-32,-52,-17,-50,66,]),'COMMENT':([0,1,2,4,6,10,11,12,17,19,20,21,22,23,25,28,29,31,32,33,35,36,37,40,47,48,49,50,51,52,60,79,82,87,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,125,126,129,132,135,146,],[-89,19,-10,-2,-64,-5,-63,-31,-61,-11,-26,-27,-62,-9,-8,-84,-89,-4,-87,-28,-32,-6,-3,-7,-60,-59,-63,-62,-60,-68,-25,19,-69,-70,-66,-53,-51,-39,-38,-45,-41,-33,-42,-43,-47,-34,-44,-46,-35,-40,-48,-36,-49,-37,-65,-30,-67,-88,-52,-17,-50,-54,]),'INT_CONST':([0,1,2,4,6,7,10,11,12,14,17,18,19,20,21,22,23,25,28,29,30,31,32,33,35,36,37,40,47,48,49,50,51,52,54,55,56,57,58,60,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,82,83,84,87,88,89,90,91,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,125,126,129,131,132,133,134,135,139,146,],[-89,20,-10,-2,-64,20,-5,-63,-31,-56,-61,-55,-11,-26,-27,-62,-9,-8,-84,-89,20,-4,-87,-28,-32,-6,-3,-7,-60,-59,-63,-62,-60,-68,-18,-19,20,-20,-21,-25,20,20,20,20,20,20,20,20,20,20,20,20,20,20,20,20,20,20,-69,20,20,-70,-66,-53,20,20,-51,-39,-38,-45,-41,-33,-42,-43,-47,-34,-44,-46,-35,-40,-48,-36,-49,-37,-65,-30,-67,-88,-52,20,-17,20,20,-50,20,-54,]),'LE':([6,11,12,17,20,21,22,28,32,33,35,47,48,49,50,51,80,81,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,118,122,124,129,132,135,136,],[-64,-63,-31,-61,-26,-27,-62,72,-87,-28,-32,-60,-59,-63,-62,-60,-31,72,-66,-53,-51,72,72,72,72,-33,72,72,72,-34,72,72,-35,72,72,-36,72,72,-30,72,-32,-52,-17,-50,72,]),'RPAREN':([6,12,17,20,21,32,33,35,48,49,50,51,80,84,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,118,120,121,122,123,124,129,130,132,133,134,135,137,138,140,143,144,145,],[-64,-31,-61,-26,-27,-87,-28,-32,-59,-63,-62,-60,118,-89,-66,-53,-51,-39,-38,-45,-41,-33,-42,-43,-47,-34,-44,-46,-35,-40,-48,-36,-49,-37,-30,132,-16,-14,-15,-32,-52,-71,-17,-89,-89,-50,-13,-12,142,-57,-58,-29,]),'SEMI':([6,11,12,17,20,21,26,28,32,33,34,35,44,48,49,50,51,59,88,89,92,93,94,97,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,118,119,128,129,132,135,136,],[-64,52,-31,-61,-26,-27,60,-84,-87,-28,82,-32,87,-59,-63,-62,-60,-71,-66,-53,-51,-24,-72,131,-39,-38,-45,-41,-33,-42,-43,-47,-34,-44,-46,-35,-40,-48,-36,-49,-37,-30,-22,-23,-52,-17,-50,139,]),'UNSIGNED':([0,1,2,4,6,10,11,12,17,19,20,21,22,23,25,28,29,31,32,33,35,36,37,40,47,48,49,50,51,52,60,61,79,82,84,87,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,125,126,129,132,133,134,135,146,],[-89,43,-10,-2,-64,-5,-63,-31,-61,-11,-26,-27,-62,-9,-8,-84,-89,-4,-87,-28,-32,-6,-3,-7,-60,-59,-63,-62,-60,-68,-25,43,43,-69,43,-70,-66,-53,-51,-39,-38,-45,-41,-33,-42,-43,-47,-34,-44,-46,-35,-40,-48,-36,-49,-37,-65,-30,-67,-88,-52,-17,43,43,-50,-54,]),'LONG':([0,1,2,4,6,10,11,12,17,19,20,21,22,23,25,28,29,31,32,33,35,36,37,40,47,48,49,50,51,52,60,61,79,82,84,87,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,125,126,129,132,133,134,135,146,],[-89,15,-10,-2,-64,-5,-63,-31,-61,-11,-26,-27,-62,-9,-8,-84,-89,-4,-87,-28,-32,-6,-3,-7,-60,-59,-63,-62,-60,-68,-25,15,15,-69,15,-70,-66,-53,-51,-39,-38,-45,-41,-33,-42,-43,-47,-34,-44,-46,-35,-40,-48,-36,-49,-37,-65,-30,-67,-88,-52,-17,15,15,-50,-54,]),'LT':([6,11,12,17,20,21,22,28,32,33,35,47,48,49,50,51,80,81,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,118,122,124,129,132,135,136,],[-64,-63,-31,-61,-26,-27,-62,71,-87,-28,-32,-60,-59,-63,-62,-60,-31,71,-66,-53,-51,71,71,71,71,-33,71,71,71,-34,71,71,-35,71,71,-36,71,71,-30,71,-32,-52,-17,-50,71,]),'PLUS':([6,11,12,17,20,21,22,28,32,33,35,47,48,49,50,51,80,81,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,118,122,124,129,132,135,136,],[-64,-63,-31,-61,-26,-27,-62,73,-87,-28,-32,-60,-59,-63,-62,-60,-31,73,-66,-53,-51,73,73,73,73,-33,73,73,73,-34,73,73,-35,73,73,-36,73,73,-30,73,-32,-52,-17,-50,73,]),'COMMA':([6,17,20,21,32,33,48,49,50,51,88,89,92,123,124,129,130,132,135,],[-64,-61,-26,-27,-87,-28,-59,-63,-62,-60,-66,-53,-51,133,134,-52,-71,-17,-50,]),'TIMESEQUALS':([22,32,34,47,59,89,92,95,98,99,129,130,135,],[58,-87,58,58,-71,-53,-51,58,58,58,-52,-71,-50,]),'$end':([0,1,2,3,4,6,10,11,12,17,19,20,21,22,23,25,28,31,32,33,35,36,37,40,47,48,49,50,51,52,60,82,87,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,125,126,129,132,135,146,],[-89,-1,-10,0,-2,-64,-5,-63,-31,-61,-11,-26,-27,-62,-9,-8,-84,-4,-87,-28,-32,-6,-3,-7,-60,-59,-63,-62,-60,-68,-25,-69,-70,-66,-53,-51,-39,-38,-45,-41,-33,-42,-43,-47,-34,-44,-46,-35,-40,-48,-36,-49,-37,-65,-30,-67,-88,-52,-17,-50,-54,]),'GT':([6,11,12,17,20,21,22,28,32,33,35,47,48,49,50,51,80,81,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,118,122,124,129,132,135,136,],[-64,-63,-31,-61,-26,-27,-62,64,-87,-28,-32,-60,-59,-63,-62,-60,-31,64,-66,-53,-51,64,64,64,64,-33,64,64,64,-34,64,64,-35,64,64,-36,64,64,-30,64,-32,-52,-17,-50,64,]),'RBRACE':([2,4,6,10,11,12,17,19,20,21,22,23,25,28,29,31,32,33,35,36,37,40,47,48,49,50,51,52,60,79,82,87,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,125,126,129,132,135,146,],[-10,-2,-64,-5,-63,-31,-61,-11,-26,-27,-62,-9,-8,-84,-89,-4,-87,-28,-32,-6,-3,-7,-60,-59,-63,-62,-60,-68,-25,117,-69,-70,-66,-53,-51,-39,-38,-45,-41,-33,-42,-43,-47,-34,-44,-46,-35,-40,-48,-36,-49,-37,-65,-30,-67,-88,-52,-17,-50,-54,]),'FOR':([0,1,2,4,6,10,11,12,17,19,20,21,22,23,25,28,29,31,32,33,35,36,37,40,47,48,49,50,51,52,60,79,82,87,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,125,126,129,132,135,146,],[-89,27,-10,-2,-64,-5,-63,-31,-61,-11,-26,-27,-62,-9,-8,-84,-89,-4,-87,-28,-32,-6,-3,-7,-60,-59,-63,-62,-60,-68,-25,27,-69,-70,-66,-53,-51,-39,-38,-45,-41,-33,-42,-43,-47,-34,-44,-46,-35,-40,-48,-36,-49,-37,-65,-30,-67,-88,-52,-17,-50,-54,]),'PLUSPLUS':([6,17,20,21,32,33,48,49,50,51,88,89,92,129,132,135,141,],[-64,-61,-26,-27,-87,-28,-59,-63,-62,-60,-66,-53,-51,-52,-17,-50,143,]),'EQUALS':([22,32,34,47,59,89,92,95,98,99,129,130,135,],[54,-87,54,54,-71,-53,-51,54,54,54,-52,-71,-50,]),'TIMES':([5,6,8,9,11,12,13,15,16,17,20,21,22,28,32,33,35,39,41,42,43,45,46,47,48,49,50,51,80,81,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,118,122,124,129,132,135,136,],[-77,-64,-75,-73,-63,-31,-76,-79,53,-61,-26,-27,-62,70,-87,-28,-32,-78,-80,-82,-83,-81,-74,-60,-59,-63,-62,-60,-31,70,-66,-53,-51,70,70,70,70,-33,70,70,70,-34,70,70,70,70,70,70,70,70,-30,70,-32,-52,-17,-50,70,]),'PLUSEQUALS':([22,32,34,47,59,89,92,95,98,99,129,130,135,],[55,-87,55,55,-71,-53,-51,55,55,55,-52,-71,-50,]),'GE':([6,11,12,17,20,21,22,28,32,33,35,47,48,49,50,51,80,81,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,118,122,124,129,132,135,136,],[-64,-63,-31,-61,-26,-27,-62,69,-87,-28,-32,-60,-59,-63,-62,-60,-31,69,-66,-53,-51,69,69,69,69,-33,69,69,69,-34,69,69,-35,69,69,-36,69,69,-30,69,-32,-52,-17,-50,69,]),'LPAREN':([0,1,2,4,6,10,11,12,17,19,20,21,22,23,25,27,28,29,30,31,32,33,34,35,36,37,40,47,48,49,50,51,52,54,55,56,57,58,59,60,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,82,83,84,87,88,89,90,91,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,125,126,129,131,132,133,134,135,146,],[-89,30,-10,-2,-64,-5,-63,-31,-61,-11,-26,-27,-62,-9,-8,61,-84,-89,30,-4,-87,-28,84,-32,-6,-3,-7,84,-59,-63,-62,84,-68,-18,-19,30,-20,-21,-71,-25,30,30,30,30,30,30,30,30,30,30,30,30,30,30,30,30,30,30,-69,30,30,-70,-66,-53,30,30,-51,-39,-38,-45,-41,-33,-42,-43,-47,-34,-44,-46,-35,-40,-48,-36,-49,-37,-65,-30,-67,-88,-52,30,-17,30,30,-50,-54,]),'MINUSMINUS':([6,17,20,21,32,33,48,49,50,51,88,89,92,129,132,135,141,],[-64,-61,-26,-27,-87,-28,-59,-63,-62,-60,-66,-53,-51,-52,-17,-50,144,]),'INCLUDE':([38,],[86,]),'EQ':([6,11,12,17,20,21,22,28,32,33,35,47,48,49,50,51,80,81,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,118,122,124,129,132,135,136,],[-64,-63,-31,-61,-26,-27,-62,75,-87,-28,-32,-60,-59,-63,-62,-60,-31,75,-66,-53,-51,75,75,75,75,-33,75,75,75,-34,75,75,-35,75,75,-36,75,75,-30,75,-32,-52,-17,-50,75,]),'ID':([0,1,2,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,28,29,30,31,32,33,35,36,37,39,40,41,42,43,45,46,47,48,49,50,51,52,53,54,55,56,57,58,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,82,83,84,87,88,89,90,91,92,96,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,125,126,129,131,132,133,134,135,139,146,],[-89,32,-10,-2,-77,-64,32,-75,-73,-5,-63,-31,-76,-56,-79,-85,-61,-55,-11,-26,-27,-62,-9,32,-8,-84,-89,32,-4,-87,-28,-32,-6,-3,-78,-7,-80,-82,-83,-81,-74,-60,-59,-63,-62,-60,-68,-86,-18,-19,32,-20,-21,-25,32,32,32,32,32,32,32,32,32,32,32,32,32,32,32,32,32,32,32,-69,32,32,-70,-66,-53,32,32,-51,32,-39,-38,-45,-41,-33,-42,-43,-47,-34,-44,-46,-35,-40,-48,-36,-49,-37,-65,-30,-67,-88,-52,32,-17,32,32,-50,32,-54,]),'AND':([6,11,12,17,20,21,22,28,32,33,35,47,48,49,50,51,80,81,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,118,122,124,129,132,135,136,],[-64,-63,-31,-61,-26,-27,-62,62,-87,-28,-32,-60,-59,-63,-62,-60,-31,62,-66,-53,-51,62,62,62,62,-33,62,62,62,-34,62,62,-35,62,62,-36,62,62,-30,62,-32,-52,-17,-50,62,]),'LBRACKET':([32,47,51,59,92,99,135,],[-87,90,90,90,90,90,-50,]),'LBRACE':([0,1,2,4,6,10,11,12,17,19,20,21,22,23,25,28,29,31,32,33,35,36,37,40,47,48,49,50,51,52,60,79,82,85,87,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,125,126,129,132,135,142,146,],[-89,29,-10,-2,-64,-5,-63,-31,-61,-11,-26,-27,-62,-9,-8,-84,-89,-4,-87,-28,-32,-6,-3,-7,-60,-59,-63,-62,-60,-68,-25,29,-69,29,-70,-66,-53,-51,-39,-38,-45,-41,-33,-42,-43,-47,-34,-44,-46,-35,-40,-48,-36,-49,-37,-65,-30,-67,-88,-52,-17,-50,29,-54,]),'STRING_LITERAL':([0,1,2,4,6,7,10,11,12,14,17,18,19,20,21,22,23,25,28,29,30,31,32,33,35,36,37,40,47,48,49,50,51,52,54,55,56,57,58,60,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,82,83,84,86,87,88,89,90,91,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,125,126,129,131,132,133,134,135,139,146,],[-89,33,-10,-2,-64,33,-5,-63,-31,-56,-61,-55,-11,-26,-27,-62,-9,-8,-84,-89,33,-4,-87,-28,-32,-6,-3,-7,-60,-59,-63,-62,-60,-68,-18,-19,33,-20,-21,-25,33,33,33,33,33,33,33,33,33,33,33,33,33,33,33,33,33,33,-69,33,33,126,-70,-66,-53,33,33,-51,-39,-38,-45,-41,-33,-42,-43,-47,-34,-44,-46,-35,-40,-48,-36,-49,-37,-65,-30,-67,-88,-52,33,-17,33,33,-50,33,-54,]),'PPHASH':([0,1,2,4,6,10,11,12,17,19,20,21,22,23,25,28,29,31,32,33,35,36,37,40,47,48,49,50,51,52,60,79,82,87,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,125,126,129,132,135,146,],[-89,38,-10,-2,-64,-5,-63,-31,-61,-11,-26,-27,-62,-9,-8,-84,-89,-4,-87,-28,-32,-6,-3,-7,-60,-59,-63,-62,-60,-68,-25,38,-69,-70,-66,-53,-51,-39,-38,-45,-41,-33,-42,-43,-47,-34,-44,-46,-35,-40,-48,-36,-49,-37,-65,-30,-67,-88,-52,-17,-50,-54,]),'LOGAND':([6,11,12,17,20,21,22,28,32,33,35,47,48,49,50,51,80,81,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,118,122,124,129,132,135,136,],[-64,-63,-31,-61,-26,-27,-62,68,-87,-28,-32,-60,-59,-63,-62,-60,-31,68,-66,-53,-51,68,68,68,68,-33,68,68,68,-34,68,68,-35,68,68,-36,68,68,-30,68,-32,-52,-17,-50,68,]),'INT':([0,1,2,4,6,10,11,12,17,19,20,21,22,23,25,28,29,31,32,33,35,36,37,40,47,48,49,50,51,52,60,61,79,82,84,87,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,125,126,129,132,133,134,135,146,],[-89,39,-10,-2,-64,-5,-63,-31,-61,-11,-26,-27,-62,-9,-8,-84,-89,-4,-87,-28,-32,-6,-3,-7,-60,-59,-63,-62,-60,-68,-25,39,39,-69,39,-70,-66,-53,-51,-39,-38,-45,-41,-33,-42,-43,-47,-34,-44,-46,-35,-40,-48,-36,-49,-37,-65,-30,-67,-88,-52,-17,39,39,-50,-54,]),'DOUBLE':([0,1,2,4,6,10,11,12,17,19,20,21,22,23,25,28,29,31,32,33,35,36,37,40,47,48,49,50,51,52,60,61,79,82,84,87,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,125,126,129,132,133,134,135,146,],[-89,45,-10,-2,-64,-5,-63,-31,-61,-11,-26,-27,-62,-9,-8,-84,-89,-4,-87,-28,-32,-6,-3,-7,-60,-59,-63,-62,-60,-68,-25,45,45,-69,45,-70,-66,-53,-51,-39,-38,-45,-41,-33,-42,-43,-47,-34,-44,-46,-35,-40,-48,-36,-49,-37,-65,-30,-67,-88,-52,-17,45,45,-50,-54,]),'FLOAT':([0,1,2,4,6,10,11,12,17,19,20,21,22,23,25,28,29,31,32,33,35,36,37,40,47,48,49,50,51,52,60,61,79,82,84,87,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,125,126,129,132,133,134,135,146,],[-89,41,-10,-2,-64,-5,-63,-31,-61,-11,-26,-27,-62,-9,-8,-84,-89,-4,-87,-28,-32,-6,-3,-7,-60,-59,-63,-62,-60,-68,-25,41,41,-69,41,-70,-66,-53,-51,-39,-38,-45,-41,-33,-42,-43,-47,-34,-44,-46,-35,-40,-48,-36,-49,-37,-65,-30,-67,-88,-52,-17,41,41,-50,-54,]),'SIGNED':([0,1,2,4,6,10,11,12,17,19,20,21,22,23,25,28,29,31,32,33,35,36,37,40,47,48,49,50,51,52,60,61,79,82,84,87,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,125,126,129,132,133,134,135,146,],[-89,42,-10,-2,-64,-5,-63,-31,-61,-11,-26,-27,-62,-9,-8,-84,-89,-4,-87,-28,-32,-6,-3,-7,-60,-59,-63,-62,-60,-68,-25,42,42,-69,42,-70,-66,-53,-51,-39,-38,-45,-41,-33,-42,-43,-47,-34,-44,-46,-35,-40,-48,-36,-49,-37,-65,-30,-67,-88,-52,-17,42,42,-50,-54,]),'MINUSEQUALS':([22,32,34,47,59,89,92,95,98,99,129,130,135,],[57,-87,57,57,-71,-53,-51,57,57,57,-52,-71,-50,]),'SIZE_T':([0,1,2,4,6,10,11,12,17,19,20,21,22,23,25,28,29,31,32,33,35,36,37,40,47,48,49,50,51,52,60,61,79,82,84,87,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,125,126,129,132,133,134,135,146,],[-89,46,-10,-2,-64,-5,-63,-31,-61,-11,-26,-27,-62,-9,-8,-84,-89,-4,-87,-28,-32,-6,-3,-7,-60,-59,-63,-62,-60,-68,-25,46,46,-69,46,-70,-66,-53,-51,-39,-38,-45,-41,-33,-42,-43,-47,-34,-44,-46,-35,-40,-48,-36,-49,-37,-65,-30,-67,-88,-52,-17,46,46,-50,-54,]),'RBRACKET':([6,12,17,20,21,28,32,33,35,48,49,50,51,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,118,127,129,132,135,],[-64,-31,-61,-26,-27,-84,-87,-28,-32,-59,-63,-62,-60,-66,-53,-51,-39,-38,-45,-41,-33,-42,-43,-47,-34,-44,-46,-35,-40,-48,-36,-49,-37,-30,135,-52,-17,-50,]),'OR':([6,11,12,17,20,21,22,28,32,33,35,47,48,49,50,51,80,81,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,118,122,124,129,132,135,136,],[-64,-63,-31,-61,-26,-27,-62,63,-87,-28,-32,-60,-59,-63,-62,-60,-31,63,-66,-53,-51,63,63,63,63,-33,63,63,63,-34,63,63,-35,63,63,-36,63,63,-30,63,-32,-52,-17,-50,63,]),'MOD':([6,11,12,17,20,21,22,28,32,33,35,47,48,49,50,51,80,81,88,89,92,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,118,122,124,129,132,135,136,],[-64,-63,-31,-61,-26,-27,-62,78,-87,-28,-32,-60,-59,-63,-62,-60,-31,78,-66,-53,-51,78,78,78,78,-33,78,78,78,-34,78,78,-35,78,78,-36,78,78,-30,78,-32,-52,-17,-50,78,]),} _lr_action = { } for _k, _v in _lr_action_items.items(): for _x,_y in zip(_v[0],_v[1]): if not _x in _lr_action: _lr_action[_x] = { } _lr_action[_x][_k] = _y del _lr_action_items _lr_goto_items = {'comment':([1,79,],[4,4,]),'unary_token_before':([1,7,30,56,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,83,84,90,91,131,133,134,139,],[7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,]),'constant':([1,7,30,56,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,83,84,90,91,131,133,134,139,],[17,17,17,17,17,17,17,17,17,17,17,17,17,17,17,17,17,17,17,17,17,17,17,17,17,17,17,17,17,17,]),'unary_expression':([1,7,30,56,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,83,84,90,91,131,133,134,139,],[6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,6,]),'declaration':([1,79,],[31,31,]),'unary_token_after':([141,],[145,]),'function_call':([1,7,30,56,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,83,84,90,91,131,133,134,139,],[11,49,49,49,49,49,49,49,49,49,49,49,49,49,49,49,49,49,49,49,49,11,49,49,49,49,49,49,49,49,]),'binop_expression':([1,30,56,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,83,84,90,91,131,133,134,],[12,80,12,12,12,12,12,12,12,12,12,12,12,12,12,12,12,12,12,12,12,12,12,12,12,12,12,12,]),'increment':([139,],[140,]),'native_type':([1,61,79,84,133,134,],[16,16,16,16,16,16,]),'arglist':([34,47,51,],[85,88,88,]),'arg_params':([84,133,134,],[120,137,138,]),'array_reference':([1,7,30,56,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,83,84,90,91,131,133,134,139,],[22,50,50,50,95,50,50,50,50,50,50,50,50,50,50,50,50,50,50,50,50,50,22,50,50,50,50,50,50,50,50,]),'subscript':([47,51,59,92,99,],[92,92,92,92,92,]),'include':([1,79,],[23,23,]),'type':([1,61,79,84,133,134,],[24,96,24,96,96,96,]),'empty':([0,29,84,133,134,],[2,2,121,121,121,]),'assignment_operator':([22,34,47,95,98,99,],[56,83,91,56,83,91,]),'for_loop':([1,79,],[25,25,]),'assignment_expression':([1,61,79,],[26,97,26,]),'binop':([1,30,56,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,83,84,90,91,131,133,134,],[28,81,28,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,28,28,122,28,28,136,122,122,]),'compound':([1,79,85,142,],[10,10,125,146,]),'typeid':([1,61,79,84,133,134,],[34,98,34,123,123,123,]),'term':([1,7,30,56,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,83,84,90,91,131,133,134,139,],[35,48,35,35,35,35,35,35,35,35,35,35,35,35,35,35,35,35,35,35,35,35,35,124,35,35,35,124,124,141,]),'assignment_expression_semi':([1,79,],[36,36,]),'subscript_list':([47,51,59,92,99,],[89,89,94,129,89,]),'function_declaration':([1,79,],[37,37,]),'expr':([1,56,79,83,90,91,],[40,93,40,119,127,128,]),'top_level':([0,29,],[1,79,]),'array_typeid':([1,79,],[44,44,]),'identifier':([1,7,24,30,56,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,83,84,90,91,96,131,133,134,139,],[47,51,59,51,51,99,51,51,51,51,51,51,51,51,51,51,51,51,51,51,51,51,51,47,51,51,51,51,130,51,51,51,51,]),'first':([0,],[3,]),} _lr_goto = { } for _k, _v in _lr_goto_items.items(): for _x,_y in zip(_v[0],_v[1]): if not _x in _lr_goto: _lr_goto[_x] = { } _lr_goto[_x][_k] = _y del _lr_goto_items _lr_productions = [ ("S' -> first","S'",1,None,None,None), ('first -> top_level','first',1,'p_first','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',10), ('top_level -> top_level comment','top_level',2,'p_top_level','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',16), ('top_level -> top_level function_declaration','top_level',2,'p_top_level','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',17), ('top_level -> top_level declaration','top_level',2,'p_top_level','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',18), ('top_level -> top_level compound','top_level',2,'p_top_level','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',19), ('top_level -> top_level assignment_expression_semi','top_level',2,'p_top_level','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',20), ('top_level -> top_level expr','top_level',2,'p_top_level','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',21), ('top_level -> top_level for_loop','top_level',2,'p_top_level','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',22), ('top_level -> top_level include','top_level',2,'p_top_level','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',23), ('top_level -> empty','top_level',1,'p_top_level','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',24), ('comment -> COMMENT','comment',1,'p_comment','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',33), ('arg_params -> term COMMA arg_params','arg_params',3,'p_arg_params','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',38), ('arg_params -> typeid COMMA arg_params','arg_params',3,'p_arg_params','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',39), ('arg_params -> binop','arg_params',1,'p_arg_params','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',40), ('arg_params -> typeid','arg_params',1,'p_arg_params','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',41), ('arg_params -> empty','arg_params',1,'p_arg_params','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',42), ('arglist -> LPAREN arg_params RPAREN','arglist',3,'p_arglist','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',51), ('assignment_operator -> EQUALS','assignment_operator',1,'p_assignment_operator','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',56), ('assignment_operator -> PLUSEQUALS','assignment_operator',1,'p_assignment_operator','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',57), ('assignment_operator -> MINUSEQUALS','assignment_operator',1,'p_assignment_operator','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',58), ('assignment_operator -> TIMESEQUALS','assignment_operator',1,'p_assignment_operator','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',59), ('assignment_expression -> typeid assignment_operator expr','assignment_expression',3,'p_assignment_expression','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',65), ('assignment_expression -> identifier assignment_operator expr','assignment_expression',3,'p_assignment_expression','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',66), ('assignment_expression -> array_reference assignment_operator expr','assignment_expression',3,'p_assignment_expression','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',67), ('assignment_expression_semi -> assignment_expression SEMI','assignment_expression_semi',2,'p_assignment_expression_semi','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',73), ('constant -> INT_CONST','constant',1,'p_constant','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',78), ('constant -> FLOAT_CONST','constant',1,'p_constant','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',79), ('constant -> STRING_LITERAL','constant',1,'p_constant','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',80), ('increment -> term unary_token_after','increment',2,'p_increment','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',86), ('binop -> LPAREN binop_expression RPAREN','binop',3,'p_binop','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',91), ('binop -> binop_expression','binop',1,'p_binop','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',92), ('binop_expression -> term','binop_expression',1,'p_binop_expression','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',101), ('binop_expression -> binop DIVIDE binop','binop_expression',3,'p_binop_expression','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',102), ('binop_expression -> binop TIMES binop','binop_expression',3,'p_binop_expression','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',103), ('binop_expression -> binop PLUS binop','binop_expression',3,'p_binop_expression','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',104), ('binop_expression -> binop MINUS binop','binop_expression',3,'p_binop_expression','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',105), ('binop_expression -> binop MOD binop','binop_expression',3,'p_binop_expression','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',106), ('binop_expression -> binop OR binop','binop_expression',3,'p_binop_expression','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',107), ('binop_expression -> binop AND binop','binop_expression',3,'p_binop_expression','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',108), ('binop_expression -> binop LSHIFT binop','binop_expression',3,'p_binop_expression','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',109), ('binop_expression -> binop RSHIFT binop','binop_expression',3,'p_binop_expression','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',110), ('binop_expression -> binop LOGOR binop','binop_expression',3,'p_binop_expression','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',111), ('binop_expression -> binop LOGAND binop','binop_expression',3,'p_binop_expression','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',112), ('binop_expression -> binop LT binop','binop_expression',3,'p_binop_expression','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',113), ('binop_expression -> binop GT binop','binop_expression',3,'p_binop_expression','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',114), ('binop_expression -> binop LE binop','binop_expression',3,'p_binop_expression','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',115), ('binop_expression -> binop GE binop','binop_expression',3,'p_binop_expression','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',116), ('binop_expression -> binop EQ binop','binop_expression',3,'p_binop_expression','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',117), ('binop_expression -> binop NE binop','binop_expression',3,'p_binop_expression','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',118), ('subscript -> LBRACKET expr RBRACKET','subscript',3,'p_subscript','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',129), ('subscript_list -> subscript','subscript_list',1,'p_subscript_list','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',134), ('subscript_list -> subscript subscript_list','subscript_list',2,'p_subscript_list','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',135), ('array_reference -> identifier subscript_list','array_reference',2,'p_array_reference','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',143), ('for_loop -> FOR LPAREN assignment_expression SEMI binop SEMI increment RPAREN compound','for_loop',9,'p_for_loop','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',149), ('unary_token_before -> MINUS','unary_token_before',1,'p_unary_token_before','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',155), ('unary_token_before -> LOGNOT','unary_token_before',1,'p_unary_token_before','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',156), ('unary_token_after -> PLUSPLUS','unary_token_after',1,'p_unary_token_after','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',162), ('unary_token_after -> MINUSMINUS','unary_token_after',1,'p_unary_token_after','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',163), ('unary_expression -> unary_token_before term','unary_expression',2,'p_unary_expression','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',169), ('term -> identifier','term',1,'p_term','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',174), ('term -> constant','term',1,'p_term','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',175), ('term -> array_reference','term',1,'p_term','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',176), ('term -> function_call','term',1,'p_term','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',177), ('term -> unary_expression','term',1,'p_term','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',178), ('compound -> LBRACE top_level RBRACE','compound',3,'p_compound','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',184), ('function_call -> identifier arglist','function_call',2,'p_func_call','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',189), ('function_declaration -> typeid arglist compound','function_declaration',3,'p_func_decl_1','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',199), ('function_declaration -> function_call SEMI','function_declaration',2,'p_func_decl_3','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',204), ('declaration -> typeid SEMI','declaration',2,'p_decl_1','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',209), ('declaration -> array_typeid SEMI','declaration',2,'p_decl_2','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',214), ('typeid -> type identifier','typeid',2,'p_typeid','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',219), ('array_typeid -> type identifier subscript_list','array_typeid',3,'p_array_typeid','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',224), ('native_type -> VOID','native_type',1,'p_native_type','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',229), ('native_type -> SIZE_T','native_type',1,'p_native_type','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',230), ('native_type -> UNKNOWN','native_type',1,'p_native_type','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',231), ('native_type -> CHAR','native_type',1,'p_native_type','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',232), ('native_type -> SHORT','native_type',1,'p_native_type','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',233), ('native_type -> INT','native_type',1,'p_native_type','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',234), ('native_type -> LONG','native_type',1,'p_native_type','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',235), ('native_type -> FLOAT','native_type',1,'p_native_type','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',236), ('native_type -> DOUBLE','native_type',1,'p_native_type','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',237), ('native_type -> SIGNED','native_type',1,'p_native_type','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',238), ('native_type -> UNSIGNED','native_type',1,'p_native_type','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',239), ('expr -> binop','expr',1,'p_expr','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',245), ('type -> native_type','type',1,'p_type','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',251), ('type -> native_type TIMES','type',2,'p_type','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',252), ('identifier -> ID','identifier',1,'p_identifier','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',260), ('include -> PPHASH INCLUDE STRING_LITERAL','include',3,'p_include','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',265), ('empty -> <empty>','empty',0,'p_empty','/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py',270), ]
_tabversion = '3.2' _lr_method = 'LALR' _lr_signature = '̵(e\x9f«O\r,æJ\x922\x85M·' _lr_action_items = {'LOGOR': ([6, 11, 12, 17, 20, 21, 22, 28, 32, 33, 35, 47, 48, 49, 50, 51, 80, 81, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 118, 122, 124, 129, 132, 135, 136], [-64, -63, -31, -61, -26, -27, -62, 67, -87, -28, -32, -60, -59, -63, -62, -60, -31, 67, -66, -53, -51, 67, 67, 67, 67, -33, 67, 67, 67, -34, 67, 67, -35, 67, 67, -36, 67, 67, -30, 67, -32, -52, -17, -50, 67]), 'SHORT': ([0, 1, 2, 4, 6, 10, 11, 12, 17, 19, 20, 21, 22, 23, 25, 28, 29, 31, 32, 33, 35, 36, 37, 40, 47, 48, 49, 50, 51, 52, 60, 61, 79, 82, 84, 87, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 125, 126, 129, 132, 133, 134, 135, 146], [-89, 5, -10, -2, -64, -5, -63, -31, -61, -11, -26, -27, -62, -9, -8, -84, -89, -4, -87, -28, -32, -6, -3, -7, -60, -59, -63, -62, -60, -68, -25, 5, 5, -69, 5, -70, -66, -53, -51, -39, -38, -45, -41, -33, -42, -43, -47, -34, -44, -46, -35, -40, -48, -36, -49, -37, -65, -30, -67, -88, -52, -17, 5, 5, -50, -54]), 'RSHIFT': ([6, 11, 12, 17, 20, 21, 22, 28, 32, 33, 35, 47, 48, 49, 50, 51, 80, 81, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 118, 122, 124, 129, 132, 135, 136], [-64, -63, -31, -61, -26, -27, -62, 65, -87, -28, -32, -60, -59, -63, -62, -60, -31, 65, -66, -53, -51, 65, 65, 65, 65, -33, 65, 65, 65, -34, 65, 65, -35, 65, 65, -36, 65, 65, -30, 65, -32, -52, -17, -50, 65]), 'UNKNOWN': ([0, 1, 2, 4, 6, 10, 11, 12, 17, 19, 20, 21, 22, 23, 25, 28, 29, 31, 32, 33, 35, 36, 37, 40, 47, 48, 49, 50, 51, 52, 60, 61, 79, 82, 84, 87, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 125, 126, 129, 132, 133, 134, 135, 146], [-89, 8, -10, -2, -64, -5, -63, -31, -61, -11, -26, -27, -62, -9, -8, -84, -89, -4, -87, -28, -32, -6, -3, -7, -60, -59, -63, -62, -60, -68, -25, 8, 8, -69, 8, -70, -66, -53, -51, -39, -38, -45, -41, -33, -42, -43, -47, -34, -44, -46, -35, -40, -48, -36, -49, -37, -65, -30, -67, -88, -52, -17, 8, 8, -50, -54]), 'VOID': ([0, 1, 2, 4, 6, 10, 11, 12, 17, 19, 20, 21, 22, 23, 25, 28, 29, 31, 32, 33, 35, 36, 37, 40, 47, 48, 49, 50, 51, 52, 60, 61, 79, 82, 84, 87, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 125, 126, 129, 132, 133, 134, 135, 146], [-89, 9, -10, -2, -64, -5, -63, -31, -61, -11, -26, -27, -62, -9, -8, -84, -89, -4, -87, -28, -32, -6, -3, -7, -60, -59, -63, -62, -60, -68, -25, 9, 9, -69, 9, -70, -66, -53, -51, -39, -38, -45, -41, -33, -42, -43, -47, -34, -44, -46, -35, -40, -48, -36, -49, -37, -65, -30, -67, -88, -52, -17, 9, 9, -50, -54]), 'NE': ([6, 11, 12, 17, 20, 21, 22, 28, 32, 33, 35, 47, 48, 49, 50, 51, 80, 81, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 118, 122, 124, 129, 132, 135, 136], [-64, -63, -31, -61, -26, -27, -62, 77, -87, -28, -32, -60, -59, -63, -62, -60, -31, 77, -66, -53, -51, 77, 77, 77, 77, -33, 77, 77, 77, -34, 77, 77, -35, 77, 77, -36, 77, 77, -30, 77, -32, -52, -17, -50, 77]), 'CHAR': ([0, 1, 2, 4, 6, 10, 11, 12, 17, 19, 20, 21, 22, 23, 25, 28, 29, 31, 32, 33, 35, 36, 37, 40, 47, 48, 49, 50, 51, 52, 60, 61, 79, 82, 84, 87, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 125, 126, 129, 132, 133, 134, 135, 146], [-89, 13, -10, -2, -64, -5, -63, -31, -61, -11, -26, -27, -62, -9, -8, -84, -89, -4, -87, -28, -32, -6, -3, -7, -60, -59, -63, -62, -60, -68, -25, 13, 13, -69, 13, -70, -66, -53, -51, -39, -38, -45, -41, -33, -42, -43, -47, -34, -44, -46, -35, -40, -48, -36, -49, -37, -65, -30, -67, -88, -52, -17, 13, 13, -50, -54]), 'LOGNOT': ([0, 1, 2, 4, 6, 7, 10, 11, 12, 14, 17, 18, 19, 20, 21, 22, 23, 25, 28, 29, 30, 31, 32, 33, 35, 36, 37, 40, 47, 48, 49, 50, 51, 52, 54, 55, 56, 57, 58, 60, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 82, 83, 84, 87, 88, 89, 90, 91, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 125, 126, 129, 131, 132, 133, 134, 135, 139, 146], [-89, 14, -10, -2, -64, 14, -5, -63, -31, -56, -61, -55, -11, -26, -27, -62, -9, -8, -84, -89, 14, -4, -87, -28, -32, -6, -3, -7, -60, -59, -63, -62, -60, -68, -18, -19, 14, -20, -21, -25, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, -69, 14, 14, -70, -66, -53, 14, 14, -51, -39, -38, -45, -41, -33, -42, -43, -47, -34, -44, -46, -35, -40, -48, -36, -49, -37, -65, -30, -67, -88, -52, 14, -17, 14, 14, -50, 14, -54]), 'FLOAT_CONST': ([0, 1, 2, 4, 6, 7, 10, 11, 12, 14, 17, 18, 19, 20, 21, 22, 23, 25, 28, 29, 30, 31, 32, 33, 35, 36, 37, 40, 47, 48, 49, 50, 51, 52, 54, 55, 56, 57, 58, 60, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 82, 83, 84, 87, 88, 89, 90, 91, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 125, 126, 129, 131, 132, 133, 134, 135, 139, 146], [-89, 21, -10, -2, -64, 21, -5, -63, -31, -56, -61, -55, -11, -26, -27, -62, -9, -8, -84, -89, 21, -4, -87, -28, -32, -6, -3, -7, -60, -59, -63, -62, -60, -68, -18, -19, 21, -20, -21, -25, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, -69, 21, 21, -70, -66, -53, 21, 21, -51, -39, -38, -45, -41, -33, -42, -43, -47, -34, -44, -46, -35, -40, -48, -36, -49, -37, -65, -30, -67, -88, -52, 21, -17, 21, 21, -50, 21, -54]), 'LSHIFT': ([6, 11, 12, 17, 20, 21, 22, 28, 32, 33, 35, 47, 48, 49, 50, 51, 80, 81, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 118, 122, 124, 129, 132, 135, 136], [-64, -63, -31, -61, -26, -27, -62, 74, -87, -28, -32, -60, -59, -63, -62, -60, -31, 74, -66, -53, -51, 74, 74, 74, 74, -33, 74, 74, 74, -34, 74, 74, -35, 74, 74, -36, 74, 74, -30, 74, -32, -52, -17, -50, 74]), 'MINUS': ([0, 1, 2, 4, 6, 7, 10, 11, 12, 14, 17, 18, 19, 20, 21, 22, 23, 25, 28, 29, 30, 31, 32, 33, 35, 36, 37, 40, 47, 48, 49, 50, 51, 52, 54, 55, 56, 57, 58, 60, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 87, 88, 89, 90, 91, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 122, 124, 125, 126, 129, 131, 132, 133, 134, 135, 136, 139, 146], [-89, 18, -10, -2, -64, 18, -5, -63, -31, -56, -61, -55, -11, -26, -27, -62, -9, -8, 76, -89, 18, -4, -87, -28, -32, -6, -3, -7, -60, -59, -63, -62, -60, -68, -18, -19, 18, -20, -21, -25, 18, 18, 18, 18, 18, 18, 18, 18, 18, 18, 18, 18, 18, 18, 18, 18, 18, 18, -31, 76, -69, 18, 18, -70, -66, -53, 18, 18, -51, 76, 76, 76, 76, -33, 76, 76, 76, -34, 76, 76, -35, 76, 76, -36, 76, 76, -65, -30, 76, -32, -67, -88, -52, 18, -17, 18, 18, -50, 76, 18, -54]), 'DIVIDE': ([6, 11, 12, 17, 20, 21, 22, 28, 32, 33, 35, 47, 48, 49, 50, 51, 80, 81, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 118, 122, 124, 129, 132, 135, 136], [-64, -63, -31, -61, -26, -27, -62, 66, -87, -28, -32, -60, -59, -63, -62, -60, -31, 66, -66, -53, -51, 66, 66, 66, 66, -33, 66, 66, 66, -34, 66, 66, 66, 66, 66, 66, 66, 66, -30, 66, -32, -52, -17, -50, 66]), 'COMMENT': ([0, 1, 2, 4, 6, 10, 11, 12, 17, 19, 20, 21, 22, 23, 25, 28, 29, 31, 32, 33, 35, 36, 37, 40, 47, 48, 49, 50, 51, 52, 60, 79, 82, 87, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 125, 126, 129, 132, 135, 146], [-89, 19, -10, -2, -64, -5, -63, -31, -61, -11, -26, -27, -62, -9, -8, -84, -89, -4, -87, -28, -32, -6, -3, -7, -60, -59, -63, -62, -60, -68, -25, 19, -69, -70, -66, -53, -51, -39, -38, -45, -41, -33, -42, -43, -47, -34, -44, -46, -35, -40, -48, -36, -49, -37, -65, -30, -67, -88, -52, -17, -50, -54]), 'INT_CONST': ([0, 1, 2, 4, 6, 7, 10, 11, 12, 14, 17, 18, 19, 20, 21, 22, 23, 25, 28, 29, 30, 31, 32, 33, 35, 36, 37, 40, 47, 48, 49, 50, 51, 52, 54, 55, 56, 57, 58, 60, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 82, 83, 84, 87, 88, 89, 90, 91, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 125, 126, 129, 131, 132, 133, 134, 135, 139, 146], [-89, 20, -10, -2, -64, 20, -5, -63, -31, -56, -61, -55, -11, -26, -27, -62, -9, -8, -84, -89, 20, -4, -87, -28, -32, -6, -3, -7, -60, -59, -63, -62, -60, -68, -18, -19, 20, -20, -21, -25, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, -69, 20, 20, -70, -66, -53, 20, 20, -51, -39, -38, -45, -41, -33, -42, -43, -47, -34, -44, -46, -35, -40, -48, -36, -49, -37, -65, -30, -67, -88, -52, 20, -17, 20, 20, -50, 20, -54]), 'LE': ([6, 11, 12, 17, 20, 21, 22, 28, 32, 33, 35, 47, 48, 49, 50, 51, 80, 81, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 118, 122, 124, 129, 132, 135, 136], [-64, -63, -31, -61, -26, -27, -62, 72, -87, -28, -32, -60, -59, -63, -62, -60, -31, 72, -66, -53, -51, 72, 72, 72, 72, -33, 72, 72, 72, -34, 72, 72, -35, 72, 72, -36, 72, 72, -30, 72, -32, -52, -17, -50, 72]), 'RPAREN': ([6, 12, 17, 20, 21, 32, 33, 35, 48, 49, 50, 51, 80, 84, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 118, 120, 121, 122, 123, 124, 129, 130, 132, 133, 134, 135, 137, 138, 140, 143, 144, 145], [-64, -31, -61, -26, -27, -87, -28, -32, -59, -63, -62, -60, 118, -89, -66, -53, -51, -39, -38, -45, -41, -33, -42, -43, -47, -34, -44, -46, -35, -40, -48, -36, -49, -37, -30, 132, -16, -14, -15, -32, -52, -71, -17, -89, -89, -50, -13, -12, 142, -57, -58, -29]), 'SEMI': ([6, 11, 12, 17, 20, 21, 26, 28, 32, 33, 34, 35, 44, 48, 49, 50, 51, 59, 88, 89, 92, 93, 94, 97, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 118, 119, 128, 129, 132, 135, 136], [-64, 52, -31, -61, -26, -27, 60, -84, -87, -28, 82, -32, 87, -59, -63, -62, -60, -71, -66, -53, -51, -24, -72, 131, -39, -38, -45, -41, -33, -42, -43, -47, -34, -44, -46, -35, -40, -48, -36, -49, -37, -30, -22, -23, -52, -17, -50, 139]), 'UNSIGNED': ([0, 1, 2, 4, 6, 10, 11, 12, 17, 19, 20, 21, 22, 23, 25, 28, 29, 31, 32, 33, 35, 36, 37, 40, 47, 48, 49, 50, 51, 52, 60, 61, 79, 82, 84, 87, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 125, 126, 129, 132, 133, 134, 135, 146], [-89, 43, -10, -2, -64, -5, -63, -31, -61, -11, -26, -27, -62, -9, -8, -84, -89, -4, -87, -28, -32, -6, -3, -7, -60, -59, -63, -62, -60, -68, -25, 43, 43, -69, 43, -70, -66, -53, -51, -39, -38, -45, -41, -33, -42, -43, -47, -34, -44, -46, -35, -40, -48, -36, -49, -37, -65, -30, -67, -88, -52, -17, 43, 43, -50, -54]), 'LONG': ([0, 1, 2, 4, 6, 10, 11, 12, 17, 19, 20, 21, 22, 23, 25, 28, 29, 31, 32, 33, 35, 36, 37, 40, 47, 48, 49, 50, 51, 52, 60, 61, 79, 82, 84, 87, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 125, 126, 129, 132, 133, 134, 135, 146], [-89, 15, -10, -2, -64, -5, -63, -31, -61, -11, -26, -27, -62, -9, -8, -84, -89, -4, -87, -28, -32, -6, -3, -7, -60, -59, -63, -62, -60, -68, -25, 15, 15, -69, 15, -70, -66, -53, -51, -39, -38, -45, -41, -33, -42, -43, -47, -34, -44, -46, -35, -40, -48, -36, -49, -37, -65, -30, -67, -88, -52, -17, 15, 15, -50, -54]), 'LT': ([6, 11, 12, 17, 20, 21, 22, 28, 32, 33, 35, 47, 48, 49, 50, 51, 80, 81, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 118, 122, 124, 129, 132, 135, 136], [-64, -63, -31, -61, -26, -27, -62, 71, -87, -28, -32, -60, -59, -63, -62, -60, -31, 71, -66, -53, -51, 71, 71, 71, 71, -33, 71, 71, 71, -34, 71, 71, -35, 71, 71, -36, 71, 71, -30, 71, -32, -52, -17, -50, 71]), 'PLUS': ([6, 11, 12, 17, 20, 21, 22, 28, 32, 33, 35, 47, 48, 49, 50, 51, 80, 81, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 118, 122, 124, 129, 132, 135, 136], [-64, -63, -31, -61, -26, -27, -62, 73, -87, -28, -32, -60, -59, -63, -62, -60, -31, 73, -66, -53, -51, 73, 73, 73, 73, -33, 73, 73, 73, -34, 73, 73, -35, 73, 73, -36, 73, 73, -30, 73, -32, -52, -17, -50, 73]), 'COMMA': ([6, 17, 20, 21, 32, 33, 48, 49, 50, 51, 88, 89, 92, 123, 124, 129, 130, 132, 135], [-64, -61, -26, -27, -87, -28, -59, -63, -62, -60, -66, -53, -51, 133, 134, -52, -71, -17, -50]), 'TIMESEQUALS': ([22, 32, 34, 47, 59, 89, 92, 95, 98, 99, 129, 130, 135], [58, -87, 58, 58, -71, -53, -51, 58, 58, 58, -52, -71, -50]), '$end': ([0, 1, 2, 3, 4, 6, 10, 11, 12, 17, 19, 20, 21, 22, 23, 25, 28, 31, 32, 33, 35, 36, 37, 40, 47, 48, 49, 50, 51, 52, 60, 82, 87, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 125, 126, 129, 132, 135, 146], [-89, -1, -10, 0, -2, -64, -5, -63, -31, -61, -11, -26, -27, -62, -9, -8, -84, -4, -87, -28, -32, -6, -3, -7, -60, -59, -63, -62, -60, -68, -25, -69, -70, -66, -53, -51, -39, -38, -45, -41, -33, -42, -43, -47, -34, -44, -46, -35, -40, -48, -36, -49, -37, -65, -30, -67, -88, -52, -17, -50, -54]), 'GT': ([6, 11, 12, 17, 20, 21, 22, 28, 32, 33, 35, 47, 48, 49, 50, 51, 80, 81, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 118, 122, 124, 129, 132, 135, 136], [-64, -63, -31, -61, -26, -27, -62, 64, -87, -28, -32, -60, -59, -63, -62, -60, -31, 64, -66, -53, -51, 64, 64, 64, 64, -33, 64, 64, 64, -34, 64, 64, -35, 64, 64, -36, 64, 64, -30, 64, -32, -52, -17, -50, 64]), 'RBRACE': ([2, 4, 6, 10, 11, 12, 17, 19, 20, 21, 22, 23, 25, 28, 29, 31, 32, 33, 35, 36, 37, 40, 47, 48, 49, 50, 51, 52, 60, 79, 82, 87, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 125, 126, 129, 132, 135, 146], [-10, -2, -64, -5, -63, -31, -61, -11, -26, -27, -62, -9, -8, -84, -89, -4, -87, -28, -32, -6, -3, -7, -60, -59, -63, -62, -60, -68, -25, 117, -69, -70, -66, -53, -51, -39, -38, -45, -41, -33, -42, -43, -47, -34, -44, -46, -35, -40, -48, -36, -49, -37, -65, -30, -67, -88, -52, -17, -50, -54]), 'FOR': ([0, 1, 2, 4, 6, 10, 11, 12, 17, 19, 20, 21, 22, 23, 25, 28, 29, 31, 32, 33, 35, 36, 37, 40, 47, 48, 49, 50, 51, 52, 60, 79, 82, 87, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 125, 126, 129, 132, 135, 146], [-89, 27, -10, -2, -64, -5, -63, -31, -61, -11, -26, -27, -62, -9, -8, -84, -89, -4, -87, -28, -32, -6, -3, -7, -60, -59, -63, -62, -60, -68, -25, 27, -69, -70, -66, -53, -51, -39, -38, -45, -41, -33, -42, -43, -47, -34, -44, -46, -35, -40, -48, -36, -49, -37, -65, -30, -67, -88, -52, -17, -50, -54]), 'PLUSPLUS': ([6, 17, 20, 21, 32, 33, 48, 49, 50, 51, 88, 89, 92, 129, 132, 135, 141], [-64, -61, -26, -27, -87, -28, -59, -63, -62, -60, -66, -53, -51, -52, -17, -50, 143]), 'EQUALS': ([22, 32, 34, 47, 59, 89, 92, 95, 98, 99, 129, 130, 135], [54, -87, 54, 54, -71, -53, -51, 54, 54, 54, -52, -71, -50]), 'TIMES': ([5, 6, 8, 9, 11, 12, 13, 15, 16, 17, 20, 21, 22, 28, 32, 33, 35, 39, 41, 42, 43, 45, 46, 47, 48, 49, 50, 51, 80, 81, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 118, 122, 124, 129, 132, 135, 136], [-77, -64, -75, -73, -63, -31, -76, -79, 53, -61, -26, -27, -62, 70, -87, -28, -32, -78, -80, -82, -83, -81, -74, -60, -59, -63, -62, -60, -31, 70, -66, -53, -51, 70, 70, 70, 70, -33, 70, 70, 70, -34, 70, 70, 70, 70, 70, 70, 70, 70, -30, 70, -32, -52, -17, -50, 70]), 'PLUSEQUALS': ([22, 32, 34, 47, 59, 89, 92, 95, 98, 99, 129, 130, 135], [55, -87, 55, 55, -71, -53, -51, 55, 55, 55, -52, -71, -50]), 'GE': ([6, 11, 12, 17, 20, 21, 22, 28, 32, 33, 35, 47, 48, 49, 50, 51, 80, 81, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 118, 122, 124, 129, 132, 135, 136], [-64, -63, -31, -61, -26, -27, -62, 69, -87, -28, -32, -60, -59, -63, -62, -60, -31, 69, -66, -53, -51, 69, 69, 69, 69, -33, 69, 69, 69, -34, 69, 69, -35, 69, 69, -36, 69, 69, -30, 69, -32, -52, -17, -50, 69]), 'LPAREN': ([0, 1, 2, 4, 6, 10, 11, 12, 17, 19, 20, 21, 22, 23, 25, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 40, 47, 48, 49, 50, 51, 52, 54, 55, 56, 57, 58, 59, 60, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 82, 83, 84, 87, 88, 89, 90, 91, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 125, 126, 129, 131, 132, 133, 134, 135, 146], [-89, 30, -10, -2, -64, -5, -63, -31, -61, -11, -26, -27, -62, -9, -8, 61, -84, -89, 30, -4, -87, -28, 84, -32, -6, -3, -7, 84, -59, -63, -62, 84, -68, -18, -19, 30, -20, -21, -71, -25, 30, 30, 30, 30, 30, 30, 30, 30, 30, 30, 30, 30, 30, 30, 30, 30, 30, 30, -69, 30, 30, -70, -66, -53, 30, 30, -51, -39, -38, -45, -41, -33, -42, -43, -47, -34, -44, -46, -35, -40, -48, -36, -49, -37, -65, -30, -67, -88, -52, 30, -17, 30, 30, -50, -54]), 'MINUSMINUS': ([6, 17, 20, 21, 32, 33, 48, 49, 50, 51, 88, 89, 92, 129, 132, 135, 141], [-64, -61, -26, -27, -87, -28, -59, -63, -62, -60, -66, -53, -51, -52, -17, -50, 144]), 'INCLUDE': ([38], [86]), 'EQ': ([6, 11, 12, 17, 20, 21, 22, 28, 32, 33, 35, 47, 48, 49, 50, 51, 80, 81, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 118, 122, 124, 129, 132, 135, 136], [-64, -63, -31, -61, -26, -27, -62, 75, -87, -28, -32, -60, -59, -63, -62, -60, -31, 75, -66, -53, -51, 75, 75, 75, 75, -33, 75, 75, 75, -34, 75, 75, -35, 75, 75, -36, 75, 75, -30, 75, -32, -52, -17, -50, 75]), 'ID': ([0, 1, 2, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 28, 29, 30, 31, 32, 33, 35, 36, 37, 39, 40, 41, 42, 43, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 82, 83, 84, 87, 88, 89, 90, 91, 92, 96, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 125, 126, 129, 131, 132, 133, 134, 135, 139, 146], [-89, 32, -10, -2, -77, -64, 32, -75, -73, -5, -63, -31, -76, -56, -79, -85, -61, -55, -11, -26, -27, -62, -9, 32, -8, -84, -89, 32, -4, -87, -28, -32, -6, -3, -78, -7, -80, -82, -83, -81, -74, -60, -59, -63, -62, -60, -68, -86, -18, -19, 32, -20, -21, -25, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, 32, -69, 32, 32, -70, -66, -53, 32, 32, -51, 32, -39, -38, -45, -41, -33, -42, -43, -47, -34, -44, -46, -35, -40, -48, -36, -49, -37, -65, -30, -67, -88, -52, 32, -17, 32, 32, -50, 32, -54]), 'AND': ([6, 11, 12, 17, 20, 21, 22, 28, 32, 33, 35, 47, 48, 49, 50, 51, 80, 81, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 118, 122, 124, 129, 132, 135, 136], [-64, -63, -31, -61, -26, -27, -62, 62, -87, -28, -32, -60, -59, -63, -62, -60, -31, 62, -66, -53, -51, 62, 62, 62, 62, -33, 62, 62, 62, -34, 62, 62, -35, 62, 62, -36, 62, 62, -30, 62, -32, -52, -17, -50, 62]), 'LBRACKET': ([32, 47, 51, 59, 92, 99, 135], [-87, 90, 90, 90, 90, 90, -50]), 'LBRACE': ([0, 1, 2, 4, 6, 10, 11, 12, 17, 19, 20, 21, 22, 23, 25, 28, 29, 31, 32, 33, 35, 36, 37, 40, 47, 48, 49, 50, 51, 52, 60, 79, 82, 85, 87, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 125, 126, 129, 132, 135, 142, 146], [-89, 29, -10, -2, -64, -5, -63, -31, -61, -11, -26, -27, -62, -9, -8, -84, -89, -4, -87, -28, -32, -6, -3, -7, -60, -59, -63, -62, -60, -68, -25, 29, -69, 29, -70, -66, -53, -51, -39, -38, -45, -41, -33, -42, -43, -47, -34, -44, -46, -35, -40, -48, -36, -49, -37, -65, -30, -67, -88, -52, -17, -50, 29, -54]), 'STRING_LITERAL': ([0, 1, 2, 4, 6, 7, 10, 11, 12, 14, 17, 18, 19, 20, 21, 22, 23, 25, 28, 29, 30, 31, 32, 33, 35, 36, 37, 40, 47, 48, 49, 50, 51, 52, 54, 55, 56, 57, 58, 60, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 82, 83, 84, 86, 87, 88, 89, 90, 91, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 125, 126, 129, 131, 132, 133, 134, 135, 139, 146], [-89, 33, -10, -2, -64, 33, -5, -63, -31, -56, -61, -55, -11, -26, -27, -62, -9, -8, -84, -89, 33, -4, -87, -28, -32, -6, -3, -7, -60, -59, -63, -62, -60, -68, -18, -19, 33, -20, -21, -25, 33, 33, 33, 33, 33, 33, 33, 33, 33, 33, 33, 33, 33, 33, 33, 33, 33, 33, -69, 33, 33, 126, -70, -66, -53, 33, 33, -51, -39, -38, -45, -41, -33, -42, -43, -47, -34, -44, -46, -35, -40, -48, -36, -49, -37, -65, -30, -67, -88, -52, 33, -17, 33, 33, -50, 33, -54]), 'PPHASH': ([0, 1, 2, 4, 6, 10, 11, 12, 17, 19, 20, 21, 22, 23, 25, 28, 29, 31, 32, 33, 35, 36, 37, 40, 47, 48, 49, 50, 51, 52, 60, 79, 82, 87, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 125, 126, 129, 132, 135, 146], [-89, 38, -10, -2, -64, -5, -63, -31, -61, -11, -26, -27, -62, -9, -8, -84, -89, -4, -87, -28, -32, -6, -3, -7, -60, -59, -63, -62, -60, -68, -25, 38, -69, -70, -66, -53, -51, -39, -38, -45, -41, -33, -42, -43, -47, -34, -44, -46, -35, -40, -48, -36, -49, -37, -65, -30, -67, -88, -52, -17, -50, -54]), 'LOGAND': ([6, 11, 12, 17, 20, 21, 22, 28, 32, 33, 35, 47, 48, 49, 50, 51, 80, 81, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 118, 122, 124, 129, 132, 135, 136], [-64, -63, -31, -61, -26, -27, -62, 68, -87, -28, -32, -60, -59, -63, -62, -60, -31, 68, -66, -53, -51, 68, 68, 68, 68, -33, 68, 68, 68, -34, 68, 68, -35, 68, 68, -36, 68, 68, -30, 68, -32, -52, -17, -50, 68]), 'INT': ([0, 1, 2, 4, 6, 10, 11, 12, 17, 19, 20, 21, 22, 23, 25, 28, 29, 31, 32, 33, 35, 36, 37, 40, 47, 48, 49, 50, 51, 52, 60, 61, 79, 82, 84, 87, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 125, 126, 129, 132, 133, 134, 135, 146], [-89, 39, -10, -2, -64, -5, -63, -31, -61, -11, -26, -27, -62, -9, -8, -84, -89, -4, -87, -28, -32, -6, -3, -7, -60, -59, -63, -62, -60, -68, -25, 39, 39, -69, 39, -70, -66, -53, -51, -39, -38, -45, -41, -33, -42, -43, -47, -34, -44, -46, -35, -40, -48, -36, -49, -37, -65, -30, -67, -88, -52, -17, 39, 39, -50, -54]), 'DOUBLE': ([0, 1, 2, 4, 6, 10, 11, 12, 17, 19, 20, 21, 22, 23, 25, 28, 29, 31, 32, 33, 35, 36, 37, 40, 47, 48, 49, 50, 51, 52, 60, 61, 79, 82, 84, 87, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 125, 126, 129, 132, 133, 134, 135, 146], [-89, 45, -10, -2, -64, -5, -63, -31, -61, -11, -26, -27, -62, -9, -8, -84, -89, -4, -87, -28, -32, -6, -3, -7, -60, -59, -63, -62, -60, -68, -25, 45, 45, -69, 45, -70, -66, -53, -51, -39, -38, -45, -41, -33, -42, -43, -47, -34, -44, -46, -35, -40, -48, -36, -49, -37, -65, -30, -67, -88, -52, -17, 45, 45, -50, -54]), 'FLOAT': ([0, 1, 2, 4, 6, 10, 11, 12, 17, 19, 20, 21, 22, 23, 25, 28, 29, 31, 32, 33, 35, 36, 37, 40, 47, 48, 49, 50, 51, 52, 60, 61, 79, 82, 84, 87, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 125, 126, 129, 132, 133, 134, 135, 146], [-89, 41, -10, -2, -64, -5, -63, -31, -61, -11, -26, -27, -62, -9, -8, -84, -89, -4, -87, -28, -32, -6, -3, -7, -60, -59, -63, -62, -60, -68, -25, 41, 41, -69, 41, -70, -66, -53, -51, -39, -38, -45, -41, -33, -42, -43, -47, -34, -44, -46, -35, -40, -48, -36, -49, -37, -65, -30, -67, -88, -52, -17, 41, 41, -50, -54]), 'SIGNED': ([0, 1, 2, 4, 6, 10, 11, 12, 17, 19, 20, 21, 22, 23, 25, 28, 29, 31, 32, 33, 35, 36, 37, 40, 47, 48, 49, 50, 51, 52, 60, 61, 79, 82, 84, 87, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 125, 126, 129, 132, 133, 134, 135, 146], [-89, 42, -10, -2, -64, -5, -63, -31, -61, -11, -26, -27, -62, -9, -8, -84, -89, -4, -87, -28, -32, -6, -3, -7, -60, -59, -63, -62, -60, -68, -25, 42, 42, -69, 42, -70, -66, -53, -51, -39, -38, -45, -41, -33, -42, -43, -47, -34, -44, -46, -35, -40, -48, -36, -49, -37, -65, -30, -67, -88, -52, -17, 42, 42, -50, -54]), 'MINUSEQUALS': ([22, 32, 34, 47, 59, 89, 92, 95, 98, 99, 129, 130, 135], [57, -87, 57, 57, -71, -53, -51, 57, 57, 57, -52, -71, -50]), 'SIZE_T': ([0, 1, 2, 4, 6, 10, 11, 12, 17, 19, 20, 21, 22, 23, 25, 28, 29, 31, 32, 33, 35, 36, 37, 40, 47, 48, 49, 50, 51, 52, 60, 61, 79, 82, 84, 87, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 125, 126, 129, 132, 133, 134, 135, 146], [-89, 46, -10, -2, -64, -5, -63, -31, -61, -11, -26, -27, -62, -9, -8, -84, -89, -4, -87, -28, -32, -6, -3, -7, -60, -59, -63, -62, -60, -68, -25, 46, 46, -69, 46, -70, -66, -53, -51, -39, -38, -45, -41, -33, -42, -43, -47, -34, -44, -46, -35, -40, -48, -36, -49, -37, -65, -30, -67, -88, -52, -17, 46, 46, -50, -54]), 'RBRACKET': ([6, 12, 17, 20, 21, 28, 32, 33, 35, 48, 49, 50, 51, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 118, 127, 129, 132, 135], [-64, -31, -61, -26, -27, -84, -87, -28, -32, -59, -63, -62, -60, -66, -53, -51, -39, -38, -45, -41, -33, -42, -43, -47, -34, -44, -46, -35, -40, -48, -36, -49, -37, -30, 135, -52, -17, -50]), 'OR': ([6, 11, 12, 17, 20, 21, 22, 28, 32, 33, 35, 47, 48, 49, 50, 51, 80, 81, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 118, 122, 124, 129, 132, 135, 136], [-64, -63, -31, -61, -26, -27, -62, 63, -87, -28, -32, -60, -59, -63, -62, -60, -31, 63, -66, -53, -51, 63, 63, 63, 63, -33, 63, 63, 63, -34, 63, 63, -35, 63, 63, -36, 63, 63, -30, 63, -32, -52, -17, -50, 63]), 'MOD': ([6, 11, 12, 17, 20, 21, 22, 28, 32, 33, 35, 47, 48, 49, 50, 51, 80, 81, 88, 89, 92, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 118, 122, 124, 129, 132, 135, 136], [-64, -63, -31, -61, -26, -27, -62, 78, -87, -28, -32, -60, -59, -63, -62, -60, -31, 78, -66, -53, -51, 78, 78, 78, 78, -33, 78, 78, 78, -34, 78, 78, -35, 78, 78, -36, 78, 78, -30, 78, -32, -52, -17, -50, 78])} _lr_action = {} for (_k, _v) in _lr_action_items.items(): for (_x, _y) in zip(_v[0], _v[1]): if not _x in _lr_action: _lr_action[_x] = {} _lr_action[_x][_k] = _y del _lr_action_items _lr_goto_items = {'comment': ([1, 79], [4, 4]), 'unary_token_before': ([1, 7, 30, 56, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 83, 84, 90, 91, 131, 133, 134, 139], [7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7, 7]), 'constant': ([1, 7, 30, 56, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 83, 84, 90, 91, 131, 133, 134, 139], [17, 17, 17, 17, 17, 17, 17, 17, 17, 17, 17, 17, 17, 17, 17, 17, 17, 17, 17, 17, 17, 17, 17, 17, 17, 17, 17, 17, 17, 17]), 'unary_expression': ([1, 7, 30, 56, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 83, 84, 90, 91, 131, 133, 134, 139], [6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6, 6]), 'declaration': ([1, 79], [31, 31]), 'unary_token_after': ([141], [145]), 'function_call': ([1, 7, 30, 56, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 83, 84, 90, 91, 131, 133, 134, 139], [11, 49, 49, 49, 49, 49, 49, 49, 49, 49, 49, 49, 49, 49, 49, 49, 49, 49, 49, 49, 49, 11, 49, 49, 49, 49, 49, 49, 49, 49]), 'binop_expression': ([1, 30, 56, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 83, 84, 90, 91, 131, 133, 134], [12, 80, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12]), 'increment': ([139], [140]), 'native_type': ([1, 61, 79, 84, 133, 134], [16, 16, 16, 16, 16, 16]), 'arglist': ([34, 47, 51], [85, 88, 88]), 'arg_params': ([84, 133, 134], [120, 137, 138]), 'array_reference': ([1, 7, 30, 56, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 83, 84, 90, 91, 131, 133, 134, 139], [22, 50, 50, 50, 95, 50, 50, 50, 50, 50, 50, 50, 50, 50, 50, 50, 50, 50, 50, 50, 50, 50, 22, 50, 50, 50, 50, 50, 50, 50, 50]), 'subscript': ([47, 51, 59, 92, 99], [92, 92, 92, 92, 92]), 'include': ([1, 79], [23, 23]), 'type': ([1, 61, 79, 84, 133, 134], [24, 96, 24, 96, 96, 96]), 'empty': ([0, 29, 84, 133, 134], [2, 2, 121, 121, 121]), 'assignment_operator': ([22, 34, 47, 95, 98, 99], [56, 83, 91, 56, 83, 91]), 'for_loop': ([1, 79], [25, 25]), 'assignment_expression': ([1, 61, 79], [26, 97, 26]), 'binop': ([1, 30, 56, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 83, 84, 90, 91, 131, 133, 134], [28, 81, 28, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 28, 28, 122, 28, 28, 136, 122, 122]), 'compound': ([1, 79, 85, 142], [10, 10, 125, 146]), 'typeid': ([1, 61, 79, 84, 133, 134], [34, 98, 34, 123, 123, 123]), 'term': ([1, 7, 30, 56, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 83, 84, 90, 91, 131, 133, 134, 139], [35, 48, 35, 35, 35, 35, 35, 35, 35, 35, 35, 35, 35, 35, 35, 35, 35, 35, 35, 35, 35, 35, 35, 124, 35, 35, 35, 124, 124, 141]), 'assignment_expression_semi': ([1, 79], [36, 36]), 'subscript_list': ([47, 51, 59, 92, 99], [89, 89, 94, 129, 89]), 'function_declaration': ([1, 79], [37, 37]), 'expr': ([1, 56, 79, 83, 90, 91], [40, 93, 40, 119, 127, 128]), 'top_level': ([0, 29], [1, 79]), 'array_typeid': ([1, 79], [44, 44]), 'identifier': ([1, 7, 24, 30, 56, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 83, 84, 90, 91, 96, 131, 133, 134, 139], [47, 51, 59, 51, 51, 99, 51, 51, 51, 51, 51, 51, 51, 51, 51, 51, 51, 51, 51, 51, 51, 51, 51, 47, 51, 51, 51, 51, 130, 51, 51, 51, 51]), 'first': ([0], [3])} _lr_goto = {} for (_k, _v) in _lr_goto_items.items(): for (_x, _y) in zip(_v[0], _v[1]): if not _x in _lr_goto: _lr_goto[_x] = {} _lr_goto[_x][_k] = _y del _lr_goto_items _lr_productions = [("S' -> first", "S'", 1, None, None, None), ('first -> top_level', 'first', 1, 'p_first', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 10), ('top_level -> top_level comment', 'top_level', 2, 'p_top_level', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 16), ('top_level -> top_level function_declaration', 'top_level', 2, 'p_top_level', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 17), ('top_level -> top_level declaration', 'top_level', 2, 'p_top_level', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 18), ('top_level -> top_level compound', 'top_level', 2, 'p_top_level', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 19), ('top_level -> top_level assignment_expression_semi', 'top_level', 2, 'p_top_level', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 20), ('top_level -> top_level expr', 'top_level', 2, 'p_top_level', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 21), ('top_level -> top_level for_loop', 'top_level', 2, 'p_top_level', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 22), ('top_level -> top_level include', 'top_level', 2, 'p_top_level', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 23), ('top_level -> empty', 'top_level', 1, 'p_top_level', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 24), ('comment -> COMMENT', 'comment', 1, 'p_comment', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 33), ('arg_params -> term COMMA arg_params', 'arg_params', 3, 'p_arg_params', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 38), ('arg_params -> typeid COMMA arg_params', 'arg_params', 3, 'p_arg_params', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 39), ('arg_params -> binop', 'arg_params', 1, 'p_arg_params', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 40), ('arg_params -> typeid', 'arg_params', 1, 'p_arg_params', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 41), ('arg_params -> empty', 'arg_params', 1, 'p_arg_params', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 42), ('arglist -> LPAREN arg_params RPAREN', 'arglist', 3, 'p_arglist', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 51), ('assignment_operator -> EQUALS', 'assignment_operator', 1, 'p_assignment_operator', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 56), ('assignment_operator -> PLUSEQUALS', 'assignment_operator', 1, 'p_assignment_operator', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 57), ('assignment_operator -> MINUSEQUALS', 'assignment_operator', 1, 'p_assignment_operator', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 58), ('assignment_operator -> TIMESEQUALS', 'assignment_operator', 1, 'p_assignment_operator', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 59), ('assignment_expression -> typeid assignment_operator expr', 'assignment_expression', 3, 'p_assignment_expression', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 65), ('assignment_expression -> identifier assignment_operator expr', 'assignment_expression', 3, 'p_assignment_expression', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 66), ('assignment_expression -> array_reference assignment_operator expr', 'assignment_expression', 3, 'p_assignment_expression', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 67), ('assignment_expression_semi -> assignment_expression SEMI', 'assignment_expression_semi', 2, 'p_assignment_expression_semi', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 73), ('constant -> INT_CONST', 'constant', 1, 'p_constant', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 78), ('constant -> FLOAT_CONST', 'constant', 1, 'p_constant', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 79), ('constant -> STRING_LITERAL', 'constant', 1, 'p_constant', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 80), ('increment -> term unary_token_after', 'increment', 2, 'p_increment', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 86), ('binop -> LPAREN binop_expression RPAREN', 'binop', 3, 'p_binop', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 91), ('binop -> binop_expression', 'binop', 1, 'p_binop', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 92), ('binop_expression -> term', 'binop_expression', 1, 'p_binop_expression', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 101), ('binop_expression -> binop DIVIDE binop', 'binop_expression', 3, 'p_binop_expression', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 102), ('binop_expression -> binop TIMES binop', 'binop_expression', 3, 'p_binop_expression', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 103), ('binop_expression -> binop PLUS binop', 'binop_expression', 3, 'p_binop_expression', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 104), ('binop_expression -> binop MINUS binop', 'binop_expression', 3, 'p_binop_expression', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 105), ('binop_expression -> binop MOD binop', 'binop_expression', 3, 'p_binop_expression', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 106), ('binop_expression -> binop OR binop', 'binop_expression', 3, 'p_binop_expression', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 107), ('binop_expression -> binop AND binop', 'binop_expression', 3, 'p_binop_expression', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 108), ('binop_expression -> binop LSHIFT binop', 'binop_expression', 3, 'p_binop_expression', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 109), ('binop_expression -> binop RSHIFT binop', 'binop_expression', 3, 'p_binop_expression', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 110), ('binop_expression -> binop LOGOR binop', 'binop_expression', 3, 'p_binop_expression', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 111), ('binop_expression -> binop LOGAND binop', 'binop_expression', 3, 'p_binop_expression', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 112), ('binop_expression -> binop LT binop', 'binop_expression', 3, 'p_binop_expression', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 113), ('binop_expression -> binop GT binop', 'binop_expression', 3, 'p_binop_expression', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 114), ('binop_expression -> binop LE binop', 'binop_expression', 3, 'p_binop_expression', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 115), ('binop_expression -> binop GE binop', 'binop_expression', 3, 'p_binop_expression', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 116), ('binop_expression -> binop EQ binop', 'binop_expression', 3, 'p_binop_expression', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 117), ('binop_expression -> binop NE binop', 'binop_expression', 3, 'p_binop_expression', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 118), ('subscript -> LBRACKET expr RBRACKET', 'subscript', 3, 'p_subscript', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 129), ('subscript_list -> subscript', 'subscript_list', 1, 'p_subscript_list', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 134), ('subscript_list -> subscript subscript_list', 'subscript_list', 2, 'p_subscript_list', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 135), ('array_reference -> identifier subscript_list', 'array_reference', 2, 'p_array_reference', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 143), ('for_loop -> FOR LPAREN assignment_expression SEMI binop SEMI increment RPAREN compound', 'for_loop', 9, 'p_for_loop', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 149), ('unary_token_before -> MINUS', 'unary_token_before', 1, 'p_unary_token_before', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 155), ('unary_token_before -> LOGNOT', 'unary_token_before', 1, 'p_unary_token_before', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 156), ('unary_token_after -> PLUSPLUS', 'unary_token_after', 1, 'p_unary_token_after', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 162), ('unary_token_after -> MINUSMINUS', 'unary_token_after', 1, 'p_unary_token_after', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 163), ('unary_expression -> unary_token_before term', 'unary_expression', 2, 'p_unary_expression', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 169), ('term -> identifier', 'term', 1, 'p_term', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 174), ('term -> constant', 'term', 1, 'p_term', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 175), ('term -> array_reference', 'term', 1, 'p_term', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 176), ('term -> function_call', 'term', 1, 'p_term', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 177), ('term -> unary_expression', 'term', 1, 'p_term', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 178), ('compound -> LBRACE top_level RBRACE', 'compound', 3, 'p_compound', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 184), ('function_call -> identifier arglist', 'function_call', 2, 'p_func_call', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 189), ('function_declaration -> typeid arglist compound', 'function_declaration', 3, 'p_func_decl_1', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 199), ('function_declaration -> function_call SEMI', 'function_declaration', 2, 'p_func_decl_3', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 204), ('declaration -> typeid SEMI', 'declaration', 2, 'p_decl_1', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 209), ('declaration -> array_typeid SEMI', 'declaration', 2, 'p_decl_2', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 214), ('typeid -> type identifier', 'typeid', 2, 'p_typeid', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 219), ('array_typeid -> type identifier subscript_list', 'array_typeid', 3, 'p_array_typeid', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 224), ('native_type -> VOID', 'native_type', 1, 'p_native_type', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 229), ('native_type -> SIZE_T', 'native_type', 1, 'p_native_type', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 230), ('native_type -> UNKNOWN', 'native_type', 1, 'p_native_type', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 231), ('native_type -> CHAR', 'native_type', 1, 'p_native_type', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 232), ('native_type -> SHORT', 'native_type', 1, 'p_native_type', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 233), ('native_type -> INT', 'native_type', 1, 'p_native_type', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 234), ('native_type -> LONG', 'native_type', 1, 'p_native_type', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 235), ('native_type -> FLOAT', 'native_type', 1, 'p_native_type', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 236), ('native_type -> DOUBLE', 'native_type', 1, 'p_native_type', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 237), ('native_type -> SIGNED', 'native_type', 1, 'p_native_type', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 238), ('native_type -> UNSIGNED', 'native_type', 1, 'p_native_type', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 239), ('expr -> binop', 'expr', 1, 'p_expr', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 245), ('type -> native_type', 'type', 1, 'p_type', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 251), ('type -> native_type TIMES', 'type', 2, 'p_type', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 252), ('identifier -> ID', 'identifier', 1, 'p_identifier', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 260), ('include -> PPHASH INCLUDE STRING_LITERAL', 'include', 3, 'p_include', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 265), ('empty -> <empty>', 'empty', 0, 'p_empty', '/home/jacob/PycharmProjects/OpenTran/OpenTran/src/framework/lan/lan_parser.py', 270)]
class JobResultExample(object): IN_PROGRESS = { "status": { "state": "IN PROGRESS" }, "configuration": { "copy": { "sourceTable": { "projectId": "source_project_id", "tableId": "source_table_id$123", "datasetId": "source_dataset_id" }, "destinationTable": { "projectId": "target_project_id", "tableId": "target_table_id", "datasetId": "target_dataset_id" }, "createDisposition": "CREATE_IF_NEEDED", "writeDisposition": "WRITE_TRUNCATE" } } } DONE = { "status": { "state": "DONE" }, "statistics": { "startTime": "1511356638992", "endTime": "1511356648992" }, "configuration": { "copy": { "sourceTable": { "projectId": "source_project_id", "tableId": "source_table_id$123", "datasetId": "source_dataset_id" }, "destinationTable": { "projectId": "target_project_id", "tableId": "target_table_id", "datasetId": "target_dataset_id" }, "createDisposition": "CREATE_IF_NEEDED", "writeDisposition": "WRITE_TRUNCATE" } } } DONE_WITH_RETRY_ERRORS = { "status": { "state": "DONE", "errors": [ { "reason": "invalid", "message": "Cannot read a table without a schema" }, { "reason": "backendError", "message": "Backend error" } ], "errorResult": { "reason": "backendError", "message": "Backend error" } }, "statistics": { "startTime": "1511356638992", "endTime": "1511356648992" }, "configuration": { "copy": { "sourceTable": { "projectId": "source_project_id", "tableId": "source_table_id$123", "datasetId": "source_dataset_id" }, "destinationTable": { "projectId": "target_project_id", "tableId": "target_table_id", "datasetId": "target_dataset_id" }, "createDisposition": "CREATE_NEVER", "writeDisposition": "WRITE_TRUNCATE" } } } DONE_WITH_NOT_REPETITIVE_ERRORS = { "status": { "state": "DONE", "errors": [ { "reason": "invalid", "message": "Cannot read a table without a schema" }, { "reason": "backendError", "message": "Backend error" } ], "errorResult": { "reason": "invalid", "message": "Cannot read a table without a schema" } }, "statistics": { "startTime": "1511356638992", "endTime": "1511356648992" }, "configuration": { "copy": { "sourceTable": { "projectId": "source_project_id", "tableId": "source_table_id$123", "datasetId": "source_dataset_id" }, "destinationTable": { "projectId": "target_project_id", "tableId": "target_table_id", "datasetId": "target_dataset_id" }, "createDisposition": "CREATE_IF_NEEDED", "writeDisposition": "WRITE_TRUNCATE" } } }
class Jobresultexample(object): in_progress = {'status': {'state': 'IN PROGRESS'}, 'configuration': {'copy': {'sourceTable': {'projectId': 'source_project_id', 'tableId': 'source_table_id$123', 'datasetId': 'source_dataset_id'}, 'destinationTable': {'projectId': 'target_project_id', 'tableId': 'target_table_id', 'datasetId': 'target_dataset_id'}, 'createDisposition': 'CREATE_IF_NEEDED', 'writeDisposition': 'WRITE_TRUNCATE'}}} done = {'status': {'state': 'DONE'}, 'statistics': {'startTime': '1511356638992', 'endTime': '1511356648992'}, 'configuration': {'copy': {'sourceTable': {'projectId': 'source_project_id', 'tableId': 'source_table_id$123', 'datasetId': 'source_dataset_id'}, 'destinationTable': {'projectId': 'target_project_id', 'tableId': 'target_table_id', 'datasetId': 'target_dataset_id'}, 'createDisposition': 'CREATE_IF_NEEDED', 'writeDisposition': 'WRITE_TRUNCATE'}}} done_with_retry_errors = {'status': {'state': 'DONE', 'errors': [{'reason': 'invalid', 'message': 'Cannot read a table without a schema'}, {'reason': 'backendError', 'message': 'Backend error'}], 'errorResult': {'reason': 'backendError', 'message': 'Backend error'}}, 'statistics': {'startTime': '1511356638992', 'endTime': '1511356648992'}, 'configuration': {'copy': {'sourceTable': {'projectId': 'source_project_id', 'tableId': 'source_table_id$123', 'datasetId': 'source_dataset_id'}, 'destinationTable': {'projectId': 'target_project_id', 'tableId': 'target_table_id', 'datasetId': 'target_dataset_id'}, 'createDisposition': 'CREATE_NEVER', 'writeDisposition': 'WRITE_TRUNCATE'}}} done_with_not_repetitive_errors = {'status': {'state': 'DONE', 'errors': [{'reason': 'invalid', 'message': 'Cannot read a table without a schema'}, {'reason': 'backendError', 'message': 'Backend error'}], 'errorResult': {'reason': 'invalid', 'message': 'Cannot read a table without a schema'}}, 'statistics': {'startTime': '1511356638992', 'endTime': '1511356648992'}, 'configuration': {'copy': {'sourceTable': {'projectId': 'source_project_id', 'tableId': 'source_table_id$123', 'datasetId': 'source_dataset_id'}, 'destinationTable': {'projectId': 'target_project_id', 'tableId': 'target_table_id', 'datasetId': 'target_dataset_id'}, 'createDisposition': 'CREATE_IF_NEEDED', 'writeDisposition': 'WRITE_TRUNCATE'}}}
mongo = { 'server': '127.0.0.1', 'database': 'geodigger', 'collection': 'data', } email = { 'server': '', 'username': '', 'address': '', 'password': '', } ui = { 'tmp': '/tmp/geodiggerui', }
mongo = {'server': '127.0.0.1', 'database': 'geodigger', 'collection': 'data'} email = {'server': '', 'username': '', 'address': '', 'password': ''} ui = {'tmp': '/tmp/geodiggerui'}
#Conditions sur les nombres pairs et impairs a = int(input("saisir nombre : ")) if a%2 == 0: print("le nombre est pair") else: print("le nombre est impair")
a = int(input('saisir nombre : ')) if a % 2 == 0: print('le nombre est pair') else: print('le nombre est impair')
myBag = 'shiny gold' rules = [] midBags = set() midBags.add(myBag) #i've the feeling that never attended an algo class is making this too much fucking difficult #pradella i'm ready def part2(string): numberTemp = 1 if string == myBag: numberTemp = 0 for line in rules: outerBag, innerBags = line.split(' bags contain ') innerBags = innerBags.replace(', ', '.').replace('bags', '').replace('bag', '').split('.')[:-1] if outerBag == string: for idk in innerBags: if idk != 'no other ': #print(idk) idk = idk[:-1] print(idk) numberTemp += int(idk[0])*int(part2(idk[2:])) return(numberTemp) def part1(rules): bags = set() bags.add(myBag) bagsTemp = bags.union() #during the iteration you can't change while True: check = False for bag in bags: for line in rules: outerBag, innerBags = line.split(' bags contain ') if bag in innerBags: bagsTemp.add(outerBag) if len(bags) == len(bagsTemp):break bags = bags.union(bagsTemp) bags.remove(myBag) print(len(bags)) with open('marcomole00/7/input.txt') as file: rules = file.read().split('\n') part1(rules) #print(midBags) print(part2(myBag))
my_bag = 'shiny gold' rules = [] mid_bags = set() midBags.add(myBag) def part2(string): number_temp = 1 if string == myBag: number_temp = 0 for line in rules: (outer_bag, inner_bags) = line.split(' bags contain ') inner_bags = innerBags.replace(', ', '.').replace('bags', '').replace('bag', '').split('.')[:-1] if outerBag == string: for idk in innerBags: if idk != 'no other ': idk = idk[:-1] print(idk) number_temp += int(idk[0]) * int(part2(idk[2:])) return numberTemp def part1(rules): bags = set() bags.add(myBag) bags_temp = bags.union() while True: check = False for bag in bags: for line in rules: (outer_bag, inner_bags) = line.split(' bags contain ') if bag in innerBags: bagsTemp.add(outerBag) if len(bags) == len(bagsTemp): break bags = bags.union(bagsTemp) bags.remove(myBag) print(len(bags)) with open('marcomole00/7/input.txt') as file: rules = file.read().split('\n') part1(rules) print(part2(myBag))
s = input() a = 2 b = a + a x = 1 y = x print(y) if not ((s)): print('bar')
s = input() a = 2 b = a + a x = 1 y = x print(y) if not s: print('bar')
# coding:utf-8 ''' @Copyright:LintCode @Author: lilsweetcaligula @Problem: http://www.lintcode.com/problem/reverse-words-in-a-string @Language: Python @Datetime: 17-02-15 15:03 ''' class Solution: # @param s : A string # @return : A string def reverseWords(self, s): return ' '.join(reversed(s.split()))
""" @Copyright:LintCode @Author: lilsweetcaligula @Problem: http://www.lintcode.com/problem/reverse-words-in-a-string @Language: Python @Datetime: 17-02-15 15:03 """ class Solution: def reverse_words(self, s): return ' '.join(reversed(s.split()))
class DBRouter(object): """ A router to control all database operations on models in the auth application. """ radiusmodels = ( 'freeradius' ) def db_for_read(self, model, **hints): """ Attempts to read radius models go to radius """ if model._meta.app_label in self.radiusmodels: return 'radius' return None def db_for_write(self, model, **hints): """ Attempts to write radius models go to radius """ if model._meta.app_label in self.radiusmodels: return 'radius' return None def allow_relation(self, obj1, obj2, **hints): """ Allow relations if a model in the radiusmodels is involved. """ if obj1._meta.app_label in self.radiusmodels or \ obj2._meta.app_label in self.radiusmodels: return True return None def allow_migrate(self, db, app_label, model=None, **hints): """ Make sure the radius models only appears in the 'radius' database. """ if app_label in self.radiusmodels: return db == 'radius' return None
class Dbrouter(object): """ A router to control all database operations on models in the auth application. """ radiusmodels = 'freeradius' def db_for_read(self, model, **hints): """ Attempts to read radius models go to radius """ if model._meta.app_label in self.radiusmodels: return 'radius' return None def db_for_write(self, model, **hints): """ Attempts to write radius models go to radius """ if model._meta.app_label in self.radiusmodels: return 'radius' return None def allow_relation(self, obj1, obj2, **hints): """ Allow relations if a model in the radiusmodels is involved. """ if obj1._meta.app_label in self.radiusmodels or obj2._meta.app_label in self.radiusmodels: return True return None def allow_migrate(self, db, app_label, model=None, **hints): """ Make sure the radius models only appears in the 'radius' database. """ if app_label in self.radiusmodels: return db == 'radius' return None
# -*- coding: utf-8 -*- """ Created on Tue Feb 15 22:58:31 2022 @author: ACER """ class clientes: def __init__(self,nombre): self.nombre=nombre def showCliente(self): print("show el clientes ", self.nombre)
""" Created on Tue Feb 15 22:58:31 2022 @author: ACER """ class Clientes: def __init__(self, nombre): self.nombre = nombre def show_cliente(self): print('show el clientes ', self.nombre)
dict={11:"th",12:"th",13:"th",1:"st",2:"nd",3:"rd"} def number_to_ordinal(n): if n>10: check=int(str(n)[-2:]) temp=dict.get(check%10, "th") return f"{n}{dict[check]}" if check in dict else f"{n}{temp}" else: temp=dict.get(n%10, "th") return f"{n}{temp}" if n else "0"
dict = {11: 'th', 12: 'th', 13: 'th', 1: 'st', 2: 'nd', 3: 'rd'} def number_to_ordinal(n): if n > 10: check = int(str(n)[-2:]) temp = dict.get(check % 10, 'th') return f'{n}{dict[check]}' if check in dict else f'{n}{temp}' else: temp = dict.get(n % 10, 'th') return f'{n}{temp}' if n else '0'
#quiz game def check_guess(guess, answer): global score still_guessing = True attempt = 0 while still_guessing and attempt < 3: if guess.lower() == answer.lower(): print("Correct Answer") score = score + 1 still_guessing = False else: if attempt < 2: guess = input("Sorry Wrong Answer, try again") attempt = attempt + 1 if attempt == 3: print("The Correct answer is ",answer ) score = 0 print("Guess the Animal") guess1 = input("Which bear lives at the North Pole? ") check_guess(guess1, "polar bear") guess2 = input("Which is the fastest land animal? ") check_guess(guess2, "Cheetah") guess3 = input("Which is the larget animal? ") check_guess(guess3, "Blue Whale") print("Your Score is "+ str(score))
def check_guess(guess, answer): global score still_guessing = True attempt = 0 while still_guessing and attempt < 3: if guess.lower() == answer.lower(): print('Correct Answer') score = score + 1 still_guessing = False else: if attempt < 2: guess = input('Sorry Wrong Answer, try again') attempt = attempt + 1 if attempt == 3: print('The Correct answer is ', answer) score = 0 print('Guess the Animal') guess1 = input('Which bear lives at the North Pole? ') check_guess(guess1, 'polar bear') guess2 = input('Which is the fastest land animal? ') check_guess(guess2, 'Cheetah') guess3 = input('Which is the larget animal? ') check_guess(guess3, 'Blue Whale') print('Your Score is ' + str(score))
# # PySNMP MIB module HIPATH-WIRELESS-HWC-MIB (http://snmplabs.com/pysmi) # ASN.1 source file:///Users/davwang4/Dev/mibs.snmplabs.com/asn1/HIPATH-WIRELESS-HWC-MIB # Produced by pysmi-0.3.4 at Wed May 1 13:30:43 2019 # On host DAVWANG4-M-1475 platform Darwin version 18.5.0 by user davwang4 # Using Python version 3.7.3 (default, Mar 27 2019, 09:23:15) # OctetString, Integer, ObjectIdentifier = mibBuilder.importSymbols("ASN1", "OctetString", "Integer", "ObjectIdentifier") NamedValues, = mibBuilder.importSymbols("ASN1-ENUMERATION", "NamedValues") ConstraintsUnion, ConstraintsIntersection, ValueSizeConstraint, ValueRangeConstraint, SingleValueConstraint = mibBuilder.importSymbols("ASN1-REFINEMENT", "ConstraintsUnion", "ConstraintsIntersection", "ValueSizeConstraint", "ValueRangeConstraint", "SingleValueConstraint") hiPathWirelessModules, hiPathWirelessMgmt = mibBuilder.importSymbols("HIPATH-WIRELESS-SMI", "hiPathWirelessModules", "hiPathWirelessMgmt") WEPKeytype, = mibBuilder.importSymbols("IEEE802dot11-MIB", "WEPKeytype") ifIndex, InterfaceIndex = mibBuilder.importSymbols("IF-MIB", "ifIndex", "InterfaceIndex") Ipv6Address, = mibBuilder.importSymbols("IPV6-TC", "Ipv6Address") ObjectGroup, ModuleCompliance, NotificationGroup = mibBuilder.importSymbols("SNMPv2-CONF", "ObjectGroup", "ModuleCompliance", "NotificationGroup") iso, MibIdentifier, NotificationType, ModuleIdentity, TimeTicks, MibScalar, MibTable, MibTableRow, MibTableColumn, Unsigned32, Bits, ObjectIdentity, Gauge32, Integer32, Counter64, IpAddress, Counter32 = mibBuilder.importSymbols("SNMPv2-SMI", "iso", "MibIdentifier", "NotificationType", "ModuleIdentity", "TimeTicks", "MibScalar", "MibTable", "MibTableRow", "MibTableColumn", "Unsigned32", "Bits", "ObjectIdentity", "Gauge32", "Integer32", "Counter64", "IpAddress", "Counter32") TruthValue, DisplayString, MacAddress, RowStatus, TextualConvention = mibBuilder.importSymbols("SNMPv2-TC", "TruthValue", "DisplayString", "MacAddress", "RowStatus", "TextualConvention") hiPathWirelessControllerMib = ModuleIdentity((1, 3, 6, 1, 4, 1, 4329, 15, 5, 2)) hiPathWirelessControllerMib.setRevisions(('2016-04-13 13:55', '2016-03-09 16:41', '2015-10-06 17:31', '2015-06-12 12:05', '2015-03-17 10:31', '2014-11-28 17:31', '2014-06-17 15:29', '2014-04-16 14:29', '2014-01-27 14:29', '2013-11-18 10:29', '2013-08-28 11:17', '2013-08-01 15:55', '2013-07-12 16:50', '2013-04-18 15:55', '2012-10-18 11:50', '2012-09-27 11:10', '2012-09-10 14:10', '2012-02-13 19:33', '2011-08-17 14:18', '2011-06-13 13:10', '2011-04-29 16:06', '2011-01-13 13:25', '2010-04-29 17:44', '2010-04-08 16:45', '2010-02-23 15:17', '2009-08-18 12:00', '2009-07-23 12:47', '2009-04-23 17:14', '2009-01-19 13:49', '2008-08-13 14:31', '2007-11-26 16:15', '2007-08-11 16:15', '2007-01-15 13:38', '2005-10-28 13:12',)) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): if mibBuilder.loadTexts: hiPathWirelessControllerMib.setRevisionsDescriptions((' - Added wlanAppVisibility to wlanTable.', ' - Added stationIPv6Address1, stationIPv6Address2, and stationIPv6Address3 to stationEventAlarm. - Added apTotalStationsAInOctets, apTotalStationsAOutOctets, apTotalStationsBInOctets, apTotalStationsBOutOctets, apTotalStationsGInOctets, apTotalStationsGOutOctets, apTotalStationsN50InOctets, apTotalStationsN50OutOctets, apTotalStationsN24InOctets, apTotalStationsN24OutOctets, apTotalStationsACInOctets, and apTotalStationsACOutOctets to apStatsTable.', ' - Modified the description of stationEventTimeStamp. - Added more access points (APs) to apPlatforms. - Deprecated topoWireStatTable. - Added topoCompleteStatTable. - Added applyMacAddressFormat to authenticationAdvanced. - Added radiusMacAddressFormatOption to vnsGlobalSetting.', ' - Modified the description of topoStatTable. - Modified the description of apPerformanceReportByRadioTable.', ' - Added wlanRadioManagement11k, wlanBeaconReport, QuietIE, wlanMirrorN, and wlanNetFlow to wlanTable. - Added wlanPrivfastTransition, and wlanPrivManagementFrameProtection to wlanPrivTable. - Added topologyIsGroup, topologyGroupMembers, and topologyMemberId to topologyTable. - Added netflowAndMirrorN Object. It contains netflowDestinationIP, netflowInterval, mirrorFirstN, and mirrorL2Ports. - Added fastTransition(13) to muDot11ConnectionCapability. - Added clearAccessRejectMsg and accessRejectMsgTable. - Added vnsQoSWirelessUseAdmControlBestEffort, and vnsQoSWirelessUseAdmControlBackground to vnsQoSTable. - Added maxBestEffortBWforReassociation, maxBestEffortBWforAssociation, maxBackgroundBWforReassociation, and maxBackgroundBWforAssociation to wirelessQoS. - Added radacctStartOnIPAddr and clientServiceTypeLogin to authenticationAdvanced. - Added apPerformanceReportByRadioTable. - Added apPerformanceReportbyRadioAndWlanTable. - Added apChannelUtilizationTable. - Added apAccessibilityTable. - Added apNeighboursTable.', '- Added topoWireStatTable.', '- Added firewallFriendlyExCP(7) to wlanAuthType. - Added firewallFriendlyExCP(7) to wlanCPAuthType. - Added wlanCPIdentity, wlanCPCustomSpecificURL and wlanCPSelectionOption to wlanCPTable. - Added wlanAuthRadiusOperatorNameSpace, wlanAuthRadiusOperatorName and wlanAuthMACBasedAuthReAuthOnAreaRoam to wlanAuthTable. - Added radiusExtnsSettingTable. - Added authenticationAdvanced. - Added areaChange(12) to stationEventType.', '- Added apLogManagement Objects. - Added apMaintenanceCycle Objects. - Deprecated wlanCPExtTosValue from wlanCPTable. - Deprecated apSSHAccess from apTable. - Added apSSHConnection to apTable. - Added na(3) to apTelnetAccess.', '- Added apRadioAttenuation to apRadioAntennaTable. - Added apRadioStatusTable. - Added apRadioProtocol to apRadioTable. - Deprecated apRadioType from apRadioTable.', '- stationsByProtocol was modified to add stationsByProtocolUnavailable, stationsByProtocolError and stationsByProtocolAC. - Added muDot11ConnectionCapability to muTable. - deprecated muConnectionCapability from muTable. - Added ac(6) to muConnectionProtoco. - Added apInterfaceMTU, apEffectiveTunnelMTU and apTotalStationsAC to apStatsTable. - Added dot11ac(11) and dot11cStrict(12) to apRadioType. - Added wlanAuthRadiusAcctAfterMacBaseAuthorization and wlanAuthRadiusTimeoutRole to wlanAuthTable. - Added wlanPrivWPAversion to wlanPrivTable. - Added jumboFrames to physicalPortObjects. - Added apRegister to apEventId.', '- apTable was modified to add apIPMulticastAssembly.', ' - Added wlanCPUseHTTPSforConnection to wlanCPTable. - Added wlanRadiusServerTable. - Added inSrvScanGrpDetectRogueAP and inSrvScanGrpListeningPort to inServiceScanGroupTable. - Added dedicatedScanGrpDetectRogueAP and dedicatedScanGrpListeningPort to dedicatedScanGroupTable. - Added clientAutologinOption to vnsGlobalSetting. - Added licenseMode, licenseLocalAP, licenseForeignAP, licenseLocalRadarAP and licenseForeignRadarAP to licensingInformation. - Added sysCPUType to systemObjects. - Added adHocModeDevice(6) and rogueAP(7) to dedicatedScanGrpCounterMeasures and inServiceScanGroupTable .', '- Added AccessPoint reigisteration event notification.', '- Added radiusFastFailoverEventsTable. - Addes dhcpRelayListenersTable. - topologyTable was modified to add new topologyDynamicEgress value.. - Added apRadioAntennaTable. - Added stationSessionNotifications trap. - scanGroupAPAssignmentTable was modified to add scanGroupAPAssignControllerIPAddress and scanGroupAPAssignFordwardingService. - scanAPTable was modified to add scanAPProfileName and scanAPProfileType. - Added dedicatedScanGroupTable. - apStatsTable was modified to add apInvalidPolicyCount. - apTable was modified to add apSecureDataTunnelType - uncategorizedAPTable was modified to add uncategorizedAPSSID and deprecate uncategorizedAPDescption.', 'Description changes for object groups: uncategorizedAPGroup, authorizedAPGroup and prohibitedAPGroup.', '- Added radiusStrictMode - Enhance description field of a few variables', "Added support: - widsWips: Configuration and statistic infromation about intrusion detection and prevention. - Controller dashboard information was added under 'dashboard', that includes some controler statistics and lincensing information - wlanSecurityReportTable was created to report on the status of weak WLAN configuration - apAntennaTable was added to provide AP antenna information - MU access list: creating MU access list using set of MAC addresses. - muACLTable is deprecated and replaced by muAccessListTable. - apTable was modified with added new field: apMICErrorWarning", 'Added support: - siteTable: main table to create any site. - sitePolicyTable: The table for assigning policies to a site. - siteCosTable: The table for retrieving assigned CoS to a site. - siteAPTable: Table for assinging APs to a site. - siteWlanTable: Table for assinging WLANs to a site. All tables above can collectively be used to configure a site or retrieve its configuration values. apTable was modified with new value for show its site membership. - WlanAuthTable::wlanAuthReplaceCalledStationIDWithZone was added. - WlanCpTable::wlanCPGuestMaxConcurrentSession was added. - TopologyTable was modified with additional new elements. - apTable was modified with new AP attributes. - muTable::muBSSIDMac was added. - loadGroupTable: more elements were added to this table. - loadGroupTable::loadGroupLoadControl was deprecated and was replaced with two new fields each representing one radio.', 'muTable was modified to show its association to WLAN by including WLAN ID into muTable.', 'secureConnection: This object was added to support weak cipher configuration. VSN related fields were modified: -- vnsFilterRuleDirection, vnsFilterRuleProtocol, vnsFilterRuleEtherType. muTable was modified with added fields: -- muTopologyName, muPolicyName, muDefaultCoS, muConnectionProtocol, muConnectionCapability. More added for configuration of MU Access List: - muACLType, muACLTable. apStatsTable was modified with more new elements: - apTotalStationsA, apTotalStationsB, apTotalStationsG,apTotalStationsN50, apTotalStationsN24.', 'Added layer two physical tables: - layerTwoPortTable Following tables are deprecated due to changes in EWC: - physicalPortsTable - phyDHCPRangeTable HWC (HiPath Wireless Controller) has been replaced with EWC (Enterasys Wireless Controller).', 'Added more tables to reflect WLAN configuration. Detailed WLAN configuration are reflected in new tables: - wlanPrivTable (WLAN privacy configuration) - wlanAuthTable (WLAN authentication configuration) - wlanRadiusTable (RADIUS assignment for each WLAN) - wlanCPTable (WLAN captive portal configuration) - wlanServiceType field was modifed to support mesh. Acess point related changes are: - apStaticMTUSize to apTable - apRadioNumber to apRadioTable - apRadioType to apRadioTable Global advanced filtering mode were added: advancedFilteringMode Following item were not applicable to HWC captive portal anymore and are deprecated: - cpLoginLabel - cpPasswordLabel - cpHeaderURL - cpFooterURL - cpMessage Access point load balancing group are reflected in new tables: - loadGroupTable (load group configuration) - loadGrpRadiosTable (radio assignment to loadGroupTable) - loadGrpWlanTable (WLAN assignment to loadGroupTable) ', 'HWC release 7.31: Enhancement are in the area of: - availability: HWC availability support - vnManagerObjects: Mobility enhancement related to MU counters - tunnelStatsTable: Mobility tunnel stats enhancement such as MU counters - AP stats enhancement in apStatsTable - apRegistration: AP registration and administration configuration fields - topologyTable: Advanced topology configuration fields are added to this table. - topoStatTable: topoStatFrameChkSeqErrors and topoStatFrameTooLongErrors added - WLAN scalars added: wlanMaxEntries, wlanNumEntries, wlanTableNextAvailableIndex - wlanTable: Table of WLAN configuration - wlanStatsTable: WLAN statistics such as clients counts, RADIUS request counts, RAIDUS failed or rejected counters. ', 'Obsoleted following items: - vnsAssignmentMode - vnsParentIfIndex - vnsRateControlProfTable - vnsWDSStatTable - vnsStatTable. These stats are reflected under topology - vnsExceptionStatTable. These stats are reflected under topology.', 'New changes include: - Topology configuratioin - Statistics about topoloy - Exception stat about topology.', 'Added version of the image for sensors.', 'Added SLP status field to VNS configuration table (vnsConfigTable).', 'Added information about sensor management.', 'Added new fields for VNS such as vnsEabled. Added AP filter for ACL list for Access Points', 'Added DNS entries. Aded DAS values Added RADIUS server information', 'DHCP information related to the Controller was added to the MIB.', 'Modified apTable with additional fields.', 'Added WDS VNS.', 'Initial version.',)) if mibBuilder.loadTexts: hiPathWirelessControllerMib.setLastUpdated('201604131355Z') if mibBuilder.loadTexts: hiPathWirelessControllerMib.setOrganization('Chantry Networks Inc.') if mibBuilder.loadTexts: hiPathWirelessControllerMib.setContactInfo('Chantry Networks, Inc. 55 Commerce Valley Drive (W), Suite 400 Thornhill, Ontario L3T 7V9, Canada Phone: 1-289-695-3182 Fax: 1 289-695-3299') if mibBuilder.loadTexts: hiPathWirelessControllerMib.setDescription('The access controller MIB') class LogEventSeverity(TextualConvention, Integer32): description = 'The log event severities used in the access controller.' status = 'current' subtypeSpec = Integer32.subtypeSpec + ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4, 5)) namedValues = NamedValues(("critical", 1), ("major", 2), ("minor", 3), ("information", 4), ("trace", 5)) class HundredthOfGauge64(TextualConvention, Counter64): description = 'This textual convention represents a hundredth of a 64-bit gauge number.' status = 'current' displayHint = 'd-2' class HundredthOfGauge32(TextualConvention, Gauge32): description = 'This textual convention represents a hundredth of a gauge number.' status = 'current' displayHint = 'd-2' class HundredthOfInt32(TextualConvention, Integer32): description = 'This textual convention represents a hundredth of an integer number.' status = 'current' displayHint = 'd-2' hiPathWirelessController = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2)) systemObjects = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1)) sysSoftwareVersion = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 1), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: sysSoftwareVersion.setStatus('current') if mibBuilder.loadTexts: sysSoftwareVersion.setDescription('System software version.') sysLogLevel = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 2), LogEventSeverity()).setMaxAccess("readwrite") if mibBuilder.loadTexts: sysLogLevel.setStatus('current') if mibBuilder.loadTexts: sysLogLevel.setDescription('Sets the level of events which are written to the system log.') sysSerialNo = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 3), OctetString().subtype(subtypeSpec=ValueSizeConstraint(0, 64))).setMaxAccess("readonly") if mibBuilder.loadTexts: sysSerialNo.setStatus('current') if mibBuilder.loadTexts: sysSerialNo.setDescription('System serial number.') sysLogSupport = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 4)) hiPathWirelessAppLogFacility = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 4, 1), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3, 4, 5, 6))).clone(namedValues=NamedValues(("local0", 0), ("local1", 1), ("local2", 2), ("local3", 3), ("local4", 4), ("local5", 5), ("local6", 6)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: hiPathWirelessAppLogFacility.setStatus('current') if mibBuilder.loadTexts: hiPathWirelessAppLogFacility.setDescription('The application log facility level for syslog.') serviceLogFacility = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 4, 2), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3, 4, 5, 6))).clone(namedValues=NamedValues(("local0", 0), ("local1", 1), ("local2", 2), ("local3", 3), ("local4", 4), ("local5", 5), ("local6", 6)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: serviceLogFacility.setStatus('current') if mibBuilder.loadTexts: serviceLogFacility.setDescription('The service log facility level for syslog.') includeAllServiceMessages = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 4, 3), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: includeAllServiceMessages.setStatus('current') if mibBuilder.loadTexts: includeAllServiceMessages.setDescription('Indicates if DHCP messages should also be forwarded to syslog.') sysLogServersTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 4, 4), ) if mibBuilder.loadTexts: sysLogServersTable.setStatus('current') if mibBuilder.loadTexts: sysLogServersTable.setDescription('Table of syslog servers to forward logging messages.') sysLogServersEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 4, 4, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "sysLogServerIndex")) if mibBuilder.loadTexts: sysLogServersEntry.setStatus('current') if mibBuilder.loadTexts: sysLogServersEntry.setDescription('Configuration information for an external syslog server.') sysLogServerIndex = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 4, 4, 1, 1), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 2147483647))).setMaxAccess("readwrite") if mibBuilder.loadTexts: sysLogServerIndex.setStatus('current') if mibBuilder.loadTexts: sysLogServerIndex.setDescription('Table index for the syslog server.') sysLogServerEnabled = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 4, 4, 1, 2), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: sysLogServerEnabled.setStatus('current') if mibBuilder.loadTexts: sysLogServerEnabled.setDescription('Indicates if messages are to be sent to the syslog server.') sysLogServerIP = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 4, 4, 1, 3), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: sysLogServerIP.setStatus('current') if mibBuilder.loadTexts: sysLogServerIP.setDescription('syslog server IP address.') sysLogServerPort = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 4, 4, 1, 4), Integer32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: sysLogServerPort.setStatus('current') if mibBuilder.loadTexts: sysLogServerPort.setDescription('syslog server port number.') sysLogServerRowStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 4, 4, 1, 5), RowStatus()).setMaxAccess("readwrite") if mibBuilder.loadTexts: sysLogServerRowStatus.setStatus('current') if mibBuilder.loadTexts: sysLogServerRowStatus.setDescription('RowStatus for operating on syslogServersTable.') sysCPUType = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 5), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: sysCPUType.setStatus('current') if mibBuilder.loadTexts: sysCPUType.setDescription("Wireless controller's CPU type") apLogManagement = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 6)) apLogCollectionEnable = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 6, 1), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apLogCollectionEnable.setStatus('current') if mibBuilder.loadTexts: apLogCollectionEnable.setDescription('If this field is set to true, then the AP log collection feature is enabled.') apLogFrequency = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 6, 2), Integer32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apLogFrequency.setStatus('current') if mibBuilder.loadTexts: apLogFrequency.setDescription('Number of log collections performed daily. The number must be one of the following 1, 2, 4, 6.') apLogDestination = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 6, 3), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2))).clone(namedValues=NamedValues(("local", 0), ("flash", 1), ("remote", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: apLogDestination.setStatus('current') if mibBuilder.loadTexts: apLogDestination.setDescription('Destination where the log file will be stored. If the local flash is not mounted, then you can not select 1. 0 : local memory. 1 : flash. 2 : remote location. ') apLogFTProtocol = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 6, 4), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("ftp", 0), ("scp", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: apLogFTProtocol.setStatus('current') if mibBuilder.loadTexts: apLogFTProtocol.setDescription('File transfer protocol. This field has meaning only when apLogDestination is set to remote(2). 0 : ftp. 1 : scp.') apLogServerIP = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 6, 5), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apLogServerIP.setStatus('current') if mibBuilder.loadTexts: apLogServerIP.setDescription('The IP address of the remote server. This field has meaning only when apLogDestination is set to remote(2).') apLogUserId = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 6, 6), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apLogUserId.setStatus('current') if mibBuilder.loadTexts: apLogUserId.setDescription('The user ID that is used for access to the remote server. This field has meaning only when apLogDestination is set to remote(2).') apLogPassword = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 6, 7), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apLogPassword.setStatus('current') if mibBuilder.loadTexts: apLogPassword.setDescription('The user password that is used for access to the remote server. This field has meaning only when apLogDestination is set to remote(2). This field can only be viewed in SNMPv3 mode with privacy.') apLogDirectory = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 6, 8), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apLogDirectory.setStatus('current') if mibBuilder.loadTexts: apLogDirectory.setDescription('The directory of the remote server. This field has meaning only when apLogDestination is set to remote(2).') apLogSelectedAPsTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 6, 9), ) if mibBuilder.loadTexts: apLogSelectedAPsTable.setStatus('current') if mibBuilder.loadTexts: apLogSelectedAPsTable.setDescription('Table containing a list of APs for which log collection is supported.') apLogSelectedAPsEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 6, 9, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "apSerialNo")) if mibBuilder.loadTexts: apLogSelectedAPsEntry.setStatus('current') if mibBuilder.loadTexts: apLogSelectedAPsEntry.setDescription('Configuration information of an AP which supports the AP log feature.') apSerialNo = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 6, 9, 1, 1), OctetString().subtype(subtypeSpec=ValueSizeConstraint(16, 16)).setFixedLength(16)) if mibBuilder.loadTexts: apSerialNo.setStatus('current') if mibBuilder.loadTexts: apSerialNo.setDescription("Table index for the apLogSelectedAPs. The AP's serial number serves as the index.") select = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 6, 9, 1, 2), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: select.setStatus('current') if mibBuilder.loadTexts: select.setDescription('Indicates whether logs are collected from the AP.') apLogQuickSelectedOption = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 6, 10), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3, 4, 5, 6))).clone(namedValues=NamedValues(("unknown", 0), ("addAll", 1), ("addAllLocal", 2), ("addAllForeign", 3), ("removeAll", 4), ("removeAllLocal", 5), ("removeAllForeign", 6)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: apLogQuickSelectedOption.setStatus('current') if mibBuilder.loadTexts: apLogQuickSelectedOption.setDescription("This is a quick select option for the user to perform the AP's bulk selection. This field is write-only and read access returns unknown(0) value. 0 : unknown. 1 : add all APs. 2 : add all local APs. 3 : add all foreign APs. 4 : remove all APs. 5 : remove all local APs. 6 : remove all foreign APs.") apLogFileUtility = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7)) apLogFileUtilityLimit = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7, 1), Unsigned32().subtype(subtypeSpec=ValueRangeConstraint(0, 4294967295))).setMaxAccess("readonly") if mibBuilder.loadTexts: apLogFileUtilityLimit.setStatus('current') if mibBuilder.loadTexts: apLogFileUtilityLimit.setDescription('The maximum number of AP log file copy requests that can be held in the apLogFileCopyTable. A value of 0 indicates no configured limit.') apLogFileUtilityCurrent = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7, 2), Gauge32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apLogFileUtilityCurrent.setStatus('current') if mibBuilder.loadTexts: apLogFileUtilityCurrent.setDescription('The number of AP log file copy requests currently in the apLogFileCopyTable.') apLogFileCopyTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7, 5), ) if mibBuilder.loadTexts: apLogFileCopyTable.setStatus('current') if mibBuilder.loadTexts: apLogFileCopyTable.setDescription('List of AP log file copy requests.') apLogFileCopyEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7, 5, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "apLogFileCopyIndex")) if mibBuilder.loadTexts: apLogFileCopyEntry.setStatus('current') if mibBuilder.loadTexts: apLogFileCopyEntry.setDescription('An entry describing the AP log file copy request.') apLogFileCopyIndex = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7, 5, 1, 1), Unsigned32().subtype(subtypeSpec=ValueRangeConstraint(1, 4294967295))) if mibBuilder.loadTexts: apLogFileCopyIndex.setStatus('current') if mibBuilder.loadTexts: apLogFileCopyIndex.setDescription('The index for this AP log file copy request.') apLogFileCopyDestination = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7, 5, 1, 2), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("flash", 1), ("remoteServer", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: apLogFileCopyDestination.setStatus('current') if mibBuilder.loadTexts: apLogFileCopyDestination.setDescription('Destination where the log file will be copied. If the local flash is not mounted, then you can not select 1. 1 : copy the local AP log file to flash. 2 : copy the local AP log file to remote server. ') apLogFileCopyProtocol = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7, 5, 1, 3), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("ftp", 0), ("scp", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: apLogFileCopyProtocol.setStatus('current') if mibBuilder.loadTexts: apLogFileCopyProtocol.setDescription('File transfer protocol to be used to copy the log file. 0 : ftp. 1 : scp.') apLogFileCopyServerIP = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7, 5, 1, 4), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apLogFileCopyServerIP.setStatus('current') if mibBuilder.loadTexts: apLogFileCopyServerIP.setDescription('The IP address of the remote server.') apLogFileCopyUserID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7, 5, 1, 5), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apLogFileCopyUserID.setStatus('current') if mibBuilder.loadTexts: apLogFileCopyUserID.setDescription('The user ID that is used for access to the remote server.') apLogFileCopyPassword = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7, 5, 1, 6), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apLogFileCopyPassword.setStatus('current') if mibBuilder.loadTexts: apLogFileCopyPassword.setDescription('The user password that is used for access to the remote server. This field can only be viewed in SNMPv3 mode with privacy.') apLogFileCopyServerDirectory = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7, 5, 1, 7), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apLogFileCopyServerDirectory.setStatus('current') if mibBuilder.loadTexts: apLogFileCopyServerDirectory.setDescription('The directory on the remote server.') apLogFileCopyOperation = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7, 5, 1, 8), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1))).clone(namedValues=NamedValues(("start", 1)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: apLogFileCopyOperation.setStatus('current') if mibBuilder.loadTexts: apLogFileCopyOperation.setDescription('If this field is set to 1, then the controller will start to perform the copy action.') apLogFileCopyOperationStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7, 5, 1, 9), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4, 5))).clone(namedValues=NamedValues(("inactive", 1), ("pending", 2), ("running", 3), ("success", 4), ("failure", 5)))).setMaxAccess("readonly") if mibBuilder.loadTexts: apLogFileCopyOperationStatus.setStatus('current') if mibBuilder.loadTexts: apLogFileCopyOperationStatus.setDescription('The operational state of the AP log file copy request. inactive - Indicates that the RowStatus of this conceptual row is not in the `active` state. pending - Indicates that the AP log file copy described by this row is ready to run and waiting in a queue. running - Indicates that the AP log file copy described by this row is running. success - Indicates that the AP log file copy described by this row has successfully run to completion. failure - Indicates that the AP log file copy described by this row has failed to run to completion.') apLogFileCopyRowStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7, 5, 1, 10), RowStatus()).setMaxAccess("readcreate") if mibBuilder.loadTexts: apLogFileCopyRowStatus.setStatus('current') if mibBuilder.loadTexts: apLogFileCopyRowStatus.setDescription('Row status variable for row operations on the apLogFileCopyTable.') dnsObjects = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 2)) primaryDNS = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 2, 1), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: primaryDNS.setStatus('current') if mibBuilder.loadTexts: primaryDNS.setDescription('Primary DNS address configured in the Controller.') secondaryDNS = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 2, 2), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: secondaryDNS.setStatus('current') if mibBuilder.loadTexts: secondaryDNS.setDescription('Secondary DNS address configured in the Controller.') tertiaryDNS = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 2, 3), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: tertiaryDNS.setStatus('current') if mibBuilder.loadTexts: tertiaryDNS.setDescription('Third DNS address configured in the Controller.') mgmtPortObjects = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 3)) mgmtPortIfIndex = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 3, 1), Integer32()).setMaxAccess("readonly") if mibBuilder.loadTexts: mgmtPortIfIndex.setStatus('current') if mibBuilder.loadTexts: mgmtPortIfIndex.setDescription('ifIndex of the management port.') mgmtPortHostname = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 3, 2), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: mgmtPortHostname.setStatus('current') if mibBuilder.loadTexts: mgmtPortHostname.setDescription('Hostname of the management port.') mgmtPortDomain = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 3, 5), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: mgmtPortDomain.setStatus('current') if mibBuilder.loadTexts: mgmtPortDomain.setDescription('Domain of the management port.') physicalPortObjects = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4)) physicalPortCount = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 1), Integer32()).setMaxAccess("readonly") if mibBuilder.loadTexts: physicalPortCount.setStatus('current') if mibBuilder.loadTexts: physicalPortCount.setDescription('Number of rows in routerPortsTable.') physicalPortsTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2), ) if mibBuilder.loadTexts: physicalPortsTable.setStatus('deprecated') if mibBuilder.loadTexts: physicalPortsTable.setDescription('Table of router ports on the controller.') physicalPortsEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1), ).setIndexNames((0, "IF-MIB", "ifIndex")) if mibBuilder.loadTexts: physicalPortsEntry.setStatus('deprecated') if mibBuilder.loadTexts: physicalPortsEntry.setDescription('An entry in routerPortsTable.') portMgmtTrafficEnable = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 1), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: portMgmtTrafficEnable.setStatus('deprecated') if mibBuilder.loadTexts: portMgmtTrafficEnable.setDescription('Determines whether controller management network traffic is allowed over this interface.') portDuplexMode = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 2), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3))).clone(namedValues=NamedValues(("full", 1), ("half", 2), ("auto", 3)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: portDuplexMode.setStatus('deprecated') if mibBuilder.loadTexts: portDuplexMode.setDescription('Duplex mode for the esa ports.') portFunction = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 3), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3))).clone(namedValues=NamedValues(("router", 1), ("host", 2), ("thirdPartyAP", 3)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: portFunction.setStatus('deprecated') if mibBuilder.loadTexts: portFunction.setDescription('Specifies the behavior of the EWC physical ports.') portEnabled = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 4), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("enabled", 1), ("disabled", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: portEnabled.setStatus('deprecated') if mibBuilder.loadTexts: portEnabled.setDescription('If enabled, the interface administratively is enabled.') portName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 5), OctetString()).setMaxAccess("readonly") if mibBuilder.loadTexts: portName.setStatus('deprecated') if mibBuilder.loadTexts: portName.setDescription('A textual string containing information about the port.') portIpAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 6), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: portIpAddress.setStatus('deprecated') if mibBuilder.loadTexts: portIpAddress.setDescription('The IP address of this port.') portMask = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 7), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: portMask.setStatus('deprecated') if mibBuilder.loadTexts: portMask.setDescription('The subnet mask associated with the IP address of this port.') portMacAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 8), MacAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: portMacAddress.setStatus('deprecated') if mibBuilder.loadTexts: portMacAddress.setDescription("Port's MAC address.") portVlanID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 9), Integer32().subtype(subtypeSpec=ValueRangeConstraint(-1, 4094)).clone(-1)).setMaxAccess("readwrite") if mibBuilder.loadTexts: portVlanID.setStatus('deprecated') if mibBuilder.loadTexts: portVlanID.setDescription('External VLAN tag for the physical port for trasmitted and received packets. Value ranges: (-1) it is not tagged, zero(0) means reserved, 1-4094 tag value.') portDHCPEnable = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 10), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: portDHCPEnable.setStatus('deprecated') if mibBuilder.loadTexts: portDHCPEnable.setDescription('If enabled, the controller is configured as default DHCP server for AP.') portDHCPGateway = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 11), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: portDHCPGateway.setStatus('deprecated') if mibBuilder.loadTexts: portDHCPGateway.setDescription('Gateway address to be supplied to the wireless clients if controller is configured as default DHCP server for AP.') portDHCPDomain = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 12), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: portDHCPDomain.setStatus('deprecated') if mibBuilder.loadTexts: portDHCPDomain.setDescription('Domain name to be supplied to the wireless clients if controller is configured as default DHCP server for AP.') portDHCPDefaultLease = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 13), Integer32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: portDHCPDefaultLease.setStatus('deprecated') if mibBuilder.loadTexts: portDHCPDefaultLease.setDescription('Default DHCP lease time in seconds to be supplied to the wireless clients if controller is configured as default DHCP server for AP.') portDHCPMaxLease = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 14), Integer32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: portDHCPMaxLease.setStatus('deprecated') if mibBuilder.loadTexts: portDHCPMaxLease.setDescription('Maximum DHCP lease time in seconds to be supplied to the wireless clients if controller is configured as default DHCP server for AP.') portDHCPDnsServers = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 15), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: portDHCPDnsServers.setStatus('deprecated') if mibBuilder.loadTexts: portDHCPDnsServers.setDescription('List of DNSs to be supplied to the wireless clients if controller is configured as default DHCP server for AP.') portDHCPWins = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 16), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: portDHCPWins.setStatus('deprecated') if mibBuilder.loadTexts: portDHCPWins.setDescription('List of WINSs to be supplied to the wireless clients if controller is configured as default DHCP server for AP.') physicalPortsInternalVlanID = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 3), Integer32().subtype(subtypeSpec=ValueRangeConstraint(-1, 4094)).clone(1)).setMaxAccess("readwrite") if mibBuilder.loadTexts: physicalPortsInternalVlanID.setStatus('current') if mibBuilder.loadTexts: physicalPortsInternalVlanID.setDescription('Internal VLAN tag to be used for physical ports for which the exernal VLAN tag have not been configured. Value ranges: (-1) it is not tagged, zero(0) means reserved, 1-4094 tag value.') physicalFlash = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 4), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("mounted", 1), ("unmounted", 2)))).setMaxAccess("readonly") if mibBuilder.loadTexts: physicalFlash.setStatus('current') if mibBuilder.loadTexts: physicalFlash.setDescription('Flash drive status.') phyDHCPRangeTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 5), ) if mibBuilder.loadTexts: phyDHCPRangeTable.setStatus('deprecated') if mibBuilder.loadTexts: phyDHCPRangeTable.setDescription('phyDHCPRangeTable contains the IP address ranges that DHCP will serve to clients associated with physical ports.') phyDHCPRangeEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 5, 1), ).setIndexNames((0, "IF-MIB", "ifIndex"), (0, "HIPATH-WIRELESS-HWC-MIB", "phyDHCPRangeIndex")) if mibBuilder.loadTexts: phyDHCPRangeEntry.setStatus('deprecated') if mibBuilder.loadTexts: phyDHCPRangeEntry.setDescription('Configuration information for a DHCP range.') phyDHCPRangeIndex = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 5, 1, 1), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 2147483647))).setMaxAccess("readwrite") if mibBuilder.loadTexts: phyDHCPRangeIndex.setStatus('deprecated') if mibBuilder.loadTexts: phyDHCPRangeIndex.setDescription('Index for the DHCP row element.') phyDHCPRangeStart = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 5, 1, 2), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: phyDHCPRangeStart.setStatus('deprecated') if mibBuilder.loadTexts: phyDHCPRangeStart.setDescription('First IP address in the range.') phyDHCPRangeEnd = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 5, 1, 3), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: phyDHCPRangeEnd.setStatus('deprecated') if mibBuilder.loadTexts: phyDHCPRangeEnd.setDescription('Last IP address in the range.') phyDHCPRangeType = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 5, 1, 4), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("inclusion", 1), ("exclusion", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: phyDHCPRangeType.setStatus('deprecated') if mibBuilder.loadTexts: phyDHCPRangeType.setDescription('Determines whether addresses in the specified range will be included, or excluded by the DHCP server.') phyDHCPRangeStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 5, 1, 5), RowStatus()).setMaxAccess("readwrite") if mibBuilder.loadTexts: phyDHCPRangeStatus.setStatus('deprecated') if mibBuilder.loadTexts: phyDHCPRangeStatus.setDescription('Row status variable for row operations on the phyDHCPRangeTable') layerTwoPortTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 6), ) if mibBuilder.loadTexts: layerTwoPortTable.setStatus('current') if mibBuilder.loadTexts: layerTwoPortTable.setDescription('This table contains all layer two ports.') layerTwoPortEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 6, 1), ).setIndexNames((0, "IF-MIB", "ifIndex")) if mibBuilder.loadTexts: layerTwoPortEntry.setStatus('current') if mibBuilder.loadTexts: layerTwoPortEntry.setDescription('Entry for a layer two port.') layerTwoPortName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 6, 1, 1), DisplayString().subtype(subtypeSpec=ValueSizeConstraint(1, 32))).setMaxAccess("readonly") if mibBuilder.loadTexts: layerTwoPortName.setStatus('current') if mibBuilder.loadTexts: layerTwoPortName.setDescription('Text string identifying the port within the controller.') layerTwoPortMgmtState = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 6, 1, 2), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disabled", 0), ("enabled", 1))).clone('enabled')).setMaxAccess("readwrite") if mibBuilder.loadTexts: layerTwoPortMgmtState.setStatus('current') if mibBuilder.loadTexts: layerTwoPortMgmtState.setDescription('This value indicates administrator state of the port. ') layerTwoPortMacAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 6, 1, 3), MacAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: layerTwoPortMacAddress.setStatus('current') if mibBuilder.loadTexts: layerTwoPortMacAddress.setDescription("Port's MAC address.") jumboFrames = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 7), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disabled", 0), ("enabled", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: jumboFrames.setStatus('current') if mibBuilder.loadTexts: jumboFrames.setDescription('Enables support for frames up to 1800 bytes long. jumboFrames support only applies to the controller and compatible APs.') vnManagerObjects = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 5)) vnRole = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 5, 1), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3))).clone(namedValues=NamedValues(("none", 1), ("vnMgr", 2), ("vnAgent", 3)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnRole.setStatus('current') if mibBuilder.loadTexts: vnRole.setDescription('Specifies the role of this EWC in inter-EWC mobility. None indicates that mobile units cannot roam to or from this EWC. In any EWC cluster, only one EWC should be specified as vnMgr, all others should be have vnRole = vnAgent.') vnIfIndex = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 5, 2), Integer32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnIfIndex.setStatus('current') if mibBuilder.loadTexts: vnIfIndex.setDescription('ifIndex of the physical port where inter-EWC tunnels terminate. This field has meaning if vnRole is not none(1)') vnHeartbeatInterval = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 5, 3), Integer32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnHeartbeatInterval.setStatus('current') if mibBuilder.loadTexts: vnHeartbeatInterval.setDescription('The time interval between inter-EWC polling messages. This field has meaning if vnRole is not none(1)') vnLocalClients = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 5, 4), Counter32()).setMaxAccess("readonly") if mibBuilder.loadTexts: vnLocalClients.setStatus('current') if mibBuilder.loadTexts: vnLocalClients.setDescription('Number of locally associated clients to this controller that is considered to be their home controller in the mobility zone, which this controller is part of.') vnForeignClients = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 5, 5), Counter32()).setMaxAccess("readonly") if mibBuilder.loadTexts: vnForeignClients.setStatus('current') if mibBuilder.loadTexts: vnForeignClients.setDescription('Number of clients that have registered with another controller in the mobility zone, which this controller is part of, and currently have roamed to this controller.') vnTotalClients = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 5, 6), Counter32()).setMaxAccess("readonly") if mibBuilder.loadTexts: vnTotalClients.setStatus('current') if mibBuilder.loadTexts: vnTotalClients.setDescription('Number of local and foreign clients on this controller in the Mobility zone.') ntpObjects = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 6)) ntpEnabled = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 6, 1), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ntpEnabled.setStatus('current') if mibBuilder.loadTexts: ntpEnabled.setDescription('Enable or disables support for the Network Time Protocol (NTP).') ntpTimezone = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 6, 2), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ntpTimezone.setStatus('current') if mibBuilder.loadTexts: ntpTimezone.setDescription('Specifies the time zone where this EWC resides.') ntpTimeServer1 = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 6, 3), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ntpTimeServer1.setStatus('current') if mibBuilder.loadTexts: ntpTimeServer1.setDescription('Primary NTP server.') ntpTimeServer2 = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 6, 4), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ntpTimeServer2.setStatus('current') if mibBuilder.loadTexts: ntpTimeServer2.setDescription('Secondary NTP server.') ntpTimeServer3 = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 6, 5), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ntpTimeServer3.setStatus('current') if mibBuilder.loadTexts: ntpTimeServer3.setDescription('Tertiary NTP server.') ntpServerEnabled = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 6, 6), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: ntpServerEnabled.setStatus('current') if mibBuilder.loadTexts: ntpServerEnabled.setDescription('Enable or disables support for controller as NTP server.') controllerStats = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7)) tunnelsTxRxBytes = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 1), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: tunnelsTxRxBytes.setStatus('current') if mibBuilder.loadTexts: tunnelsTxRxBytes.setDescription('Sum of transmitted and received bytes over all existing tunnels.') tunnelCount = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 6), Integer32()).setMaxAccess("readonly") if mibBuilder.loadTexts: tunnelCount.setStatus('current') if mibBuilder.loadTexts: tunnelCount.setDescription('Number of connections to other WirelessController controllers.') tunnelStatsTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 7), ) if mibBuilder.loadTexts: tunnelStatsTable.setStatus('current') if mibBuilder.loadTexts: tunnelStatsTable.setDescription('tunnelStatsTable contains a list of the IP tunnels connected to this EWC for use in inter-EWC mobility.') tunnelStatsEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 7, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "tunnelStartIP"), (0, "HIPATH-WIRELESS-HWC-MIB", "tunnelEndIP")) if mibBuilder.loadTexts: tunnelStatsEntry.setStatus('current') if mibBuilder.loadTexts: tunnelStatsEntry.setDescription('Statistics for a mobility tunnel.') tunnelStartIP = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 7, 1, 1), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: tunnelStartIP.setStatus('current') if mibBuilder.loadTexts: tunnelStartIP.setDescription('IP address for the start of the tunnel.') tunnelStartHWC = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 7, 1, 2), OctetString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: tunnelStartHWC.setStatus('current') if mibBuilder.loadTexts: tunnelStartHWC.setDescription('Name of the access controller for the start of the tunnel.') tunnelEndIP = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 7, 1, 3), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: tunnelEndIP.setStatus('current') if mibBuilder.loadTexts: tunnelEndIP.setDescription('IP address for the end of the tunnel.') tunnelEndHWC = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 7, 1, 4), OctetString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: tunnelEndHWC.setStatus('current') if mibBuilder.loadTexts: tunnelEndHWC.setDescription('Name of the access controller for the end of the tunnel.') tunnelStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 7, 1, 5), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("disconnected", 1), ("connected", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: tunnelStatus.setStatus('current') if mibBuilder.loadTexts: tunnelStatus.setDescription('Indicates if the mobility tunnel is up or down.') tunnelStatsTxBytes = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 7, 1, 6), Counter32()).setMaxAccess("readonly") if mibBuilder.loadTexts: tunnelStatsTxBytes.setStatus('current') if mibBuilder.loadTexts: tunnelStatsTxBytes.setDescription('Number of bytes have been transmitted from the controller at the start of the tunnel to the controller on the other end of the tunnel.') tunnelStatsRxBytes = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 7, 1, 7), Counter32()).setMaxAccess("readonly") if mibBuilder.loadTexts: tunnelStatsRxBytes.setStatus('current') if mibBuilder.loadTexts: tunnelStatsRxBytes.setDescription('Number of bytes have been received by the controller at the end of the tunnel from the controller at the start of the tunnel.') tunnelStatsTxRxBytes = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 7, 1, 8), Counter32()).setMaxAccess("readonly") if mibBuilder.loadTexts: tunnelStatsTxRxBytes.setStatus('current') if mibBuilder.loadTexts: tunnelStatsTxRxBytes.setDescription('Sum of transmitted and received bytes over this tunnel.') clearAccessRejectMsg = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 8), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1))).clone(namedValues=NamedValues(("clear", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: clearAccessRejectMsg.setStatus('current') if mibBuilder.loadTexts: clearAccessRejectMsg.setDescription('Set this OID to one to erase the contents of the accessRejectMessage table. The OID always returns 0 when read.') accessRejectMsgTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 9), ) if mibBuilder.loadTexts: accessRejectMsgTable.setStatus('current') if mibBuilder.loadTexts: accessRejectMsgTable.setDescription('This table lists each of the reply messages returned in RADIUS Access-Reject messages and for each reply message, a count of the number of times it has been received.') accessRejectMsgEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 9, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "armIndex")) if mibBuilder.loadTexts: accessRejectMsgEntry.setStatus('current') if mibBuilder.loadTexts: accessRejectMsgEntry.setDescription('One entry consisting of a unique Access-Reject Reply-Message (accessRejectReplyMessage) and count of this message.') armIndex = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 9, 1, 1), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 100))) if mibBuilder.loadTexts: armIndex.setStatus('current') if mibBuilder.loadTexts: armIndex.setDescription('A number uniquely identifying each conceptual row in the accessRejectMsgTable. ') armCount = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 9, 1, 2), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: armCount.setStatus('current') if mibBuilder.loadTexts: armCount.setDescription('Count of the number of times the controller has received an Access-Reject response from a RADIUS server that contained the associated armReplyMessage.') armReplyMessage = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 9, 1, 3), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: armReplyMessage.setStatus('current') if mibBuilder.loadTexts: armReplyMessage.setDescription('A reply message attribute received by the controller from a RADIUS server in an Access-Reject message.') availability = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 8)) availabilityStatus = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 8, 1), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("standalone", 0), ("paired", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: availabilityStatus.setStatus('current') if mibBuilder.loadTexts: availabilityStatus.setDescription('This field can be used to enable or disable availability. If it is set to paired(1), then availability is enabled on this controller, otherwise it is considered that the controller operates in stand-alone mode. All other availability fields have no meaning if this field is set to standalone(0).') pairIPAddress = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 8, 2), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: pairIPAddress.setStatus('current') if mibBuilder.loadTexts: pairIPAddress.setDescription('IP address of paired controller in availability pairing mode.') hwcAvailabilityRank = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 8, 3), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2))).clone(namedValues=NamedValues(("notConfigured", 0), ("secondary", 1), ("primary", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: hwcAvailabilityRank.setStatus('current') if mibBuilder.loadTexts: hwcAvailabilityRank.setDescription('Rank of controller in Availability pairing mode. This is legacy field and applies to releases before 5.x and in current releases it is used for reporting only.') fastFailover = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 8, 4), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disabled", 0), ("enabled", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: fastFailover.setStatus('current') if mibBuilder.loadTexts: fastFailover.setDescription('Enables or disables fast failover when controller operates in Availability pairing mode.') detectLinkFailure = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 8, 5), Unsigned32().subtype(subtypeSpec=ValueRangeConstraint(2, 30)).clone(10)).setUnits('seconds').setMaxAccess("readwrite") if mibBuilder.loadTexts: detectLinkFailure.setStatus('current') if mibBuilder.loadTexts: detectLinkFailure.setDescription('Time to detect link failure between two controllers in availability pairing. The value can be set to values between 2-30 seconds') synchronizeSystemConfig = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 8, 6), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: synchronizeSystemConfig.setStatus('current') if mibBuilder.loadTexts: synchronizeSystemConfig.setDescription('If this flag is set to enabled then system configuration is synchronized between paired controllers operating in Availabilty pairing mode.') synchronizeGuestPort = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 8, 7), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: synchronizeGuestPort.setStatus('current') if mibBuilder.loadTexts: synchronizeGuestPort.setDescription('If this flag is set to enabled then Guest Portal user accounts are synchronized between paired controllers operating in Availabilty pairing mode.') secureConnection = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 9)) weakCipherEnable = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 9, 1), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disable", 0), ("enable", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: weakCipherEnable.setStatus('current') if mibBuilder.loadTexts: weakCipherEnable.setDescription('By default usage of weak cipher is enabled on EWC. Weak cipher can be disabled using this field. ') dashboard = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10)) licensingInformation = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 1)) licenseRegulatoryDomain = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 1, 1), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: licenseRegulatoryDomain.setStatus('current') if mibBuilder.loadTexts: licenseRegulatoryDomain.setDescription('Regulatory domain that this wireless controller system has been licensed for to operate.') licenseType = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 1, 2), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("permanent", 1), ("temporary", 2)))).setMaxAccess("readonly") if mibBuilder.loadTexts: licenseType.setStatus('current') if mibBuilder.loadTexts: licenseType.setDescription('Type of license for the controller. Temporary lincese allows controller to operate within defined number of days after which a permanent license is required for the operation of the controller system.') licenseDaysRemaining = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 1, 3), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: licenseDaysRemaining.setStatus('current') if mibBuilder.loadTexts: licenseDaysRemaining.setDescription('Number of days is left for the temporary license to expire. This value has meaning if the license type is temporary(1).') licenseAvailableAP = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 1, 4), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: licenseAvailableAP.setStatus('current') if mibBuilder.loadTexts: licenseAvailableAP.setDescription('If licenseMode is standAlone, this is the maximum number of APs that can be active on the controller without violating the licensing agreement. If licenseMode is availabilityPaired, this is the maximum number of APs that can be active on both members of the availability pair without violating the licensing agreement.') licenseInServiceRadarAP = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 1, 5), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: licenseInServiceRadarAP.setStatus('current') if mibBuilder.loadTexts: licenseInServiceRadarAP.setDescription('If licenseMode is standalone this is the maximum number of APs that can be active on this controller and can operate as Guardians or in-service Radar APs without violating the licensing agreement. If licenseMode is availabilityPaired, this is the maximum number of APs that can be active on both members of the availability pair and can operate as Guardians or in-service Radar APs without violating the licensing agreement.') licenseMode = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 1, 6), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("standAlone", 1), ("availabilityPaired", 2)))).setMaxAccess("readonly") if mibBuilder.loadTexts: licenseMode.setStatus('current') if mibBuilder.loadTexts: licenseMode.setDescription('License mode determines how to interpret the license capacity OIDs. licenseMode is standalone if the controller is not part of an availability pair. licenseMode is availabilityPaired if the controller is part of an availability pair.') licenseLocalAP = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 1, 7), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: licenseLocalAP.setStatus('current') if mibBuilder.loadTexts: licenseLocalAP.setDescription('The total number of AP capacity licenses installed on this controller. ') licenseForeignAP = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 1, 8), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: licenseForeignAP.setStatus('current') if mibBuilder.loadTexts: licenseForeignAP.setDescription("The total number of AP capacity licenses installed on this controller's availability partner.") licenseLocalRadarAP = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 1, 9), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: licenseLocalRadarAP.setStatus('current') if mibBuilder.loadTexts: licenseLocalRadarAP.setDescription('The total number of AP Radar capacity licenses installed on this controller.') licenseForeignRadarAP = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 1, 10), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: licenseForeignRadarAP.setStatus('current') if mibBuilder.loadTexts: licenseForeignRadarAP.setDescription("The total number of AP Radar capacity licenses installed on this controller's availability partner. ") stationsByProtocol = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 2)) stationsByProtocolA = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 2, 1), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: stationsByProtocolA.setStatus('current') if mibBuilder.loadTexts: stationsByProtocolA.setDescription('Number of stations using 802.11a mode to access the network.') stationsByProtocolB = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 2, 2), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: stationsByProtocolB.setStatus('current') if mibBuilder.loadTexts: stationsByProtocolB.setDescription('Number of stations using 802.11b mode to access the network.') stationsByProtocolG = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 2, 3), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: stationsByProtocolG.setStatus('current') if mibBuilder.loadTexts: stationsByProtocolG.setDescription('Number of stations using 802.11b mode to access the network.') stationsByProtocolN24 = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 2, 4), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: stationsByProtocolN24.setStatus('current') if mibBuilder.loadTexts: stationsByProtocolN24.setDescription('Number of stations using 802.11n mode with frequency of 2.4Gig to access the network.') stationsByProtocolN5 = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 2, 5), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: stationsByProtocolN5.setStatus('current') if mibBuilder.loadTexts: stationsByProtocolN5.setDescription('Number of stations using 802.11n mode with frequency of 5Gig to access the network.') stationsByProtocolUnavailable = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 2, 6), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: stationsByProtocolUnavailable.setStatus('current') if mibBuilder.loadTexts: stationsByProtocolUnavailable.setDescription('The total number of stations with sessions on this controller for which the 802.11 protocol type (a, b, g, n, ac) for which the protocol could not be determined.') stationsByProtocolError = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 2, 7), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: stationsByProtocolError.setStatus('current') if mibBuilder.loadTexts: stationsByProtocolError.setDescription("The total number of stations with sessions on this controller for which an AP reported an invalid (out of range) value as the station's 802.11 protocol type.") stationsByProtocolAC = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 2, 8), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: stationsByProtocolAC.setStatus('current') if mibBuilder.loadTexts: stationsByProtocolAC.setDescription('Number of stations using 802.11ac mode to access the network.') apByChannelTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 3), ) if mibBuilder.loadTexts: apByChannelTable.setStatus('current') if mibBuilder.loadTexts: apByChannelTable.setDescription('List of aggregated access points that are operating on a specific wireless channels.') apByChannelEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 3, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "apByChannelNumber")) if mibBuilder.loadTexts: apByChannelEntry.setStatus('current') if mibBuilder.loadTexts: apByChannelEntry.setDescription('An entry in this table for one wireless channel and aggregated access point on that channel.') apByChannelNumber = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 3, 1, 1), Unsigned32()) if mibBuilder.loadTexts: apByChannelNumber.setStatus('current') if mibBuilder.loadTexts: apByChannelNumber.setDescription("The channel on which a set of access points are presently operating. If this number is 0, this means the AP is in Guardian mode or the AP's radios are turned off.") apByChannelAPs = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 3, 1, 2), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apByChannelAPs.setStatus('current') if mibBuilder.loadTexts: apByChannelAPs.setDescription('Total number of the access point on the channel that this row is indexed on.') virtualNetworks = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3)) vnsConfigObjects = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1)) vnsCount = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 1), Integer32()).setMaxAccess("readonly") if mibBuilder.loadTexts: vnsCount.setStatus('current') if mibBuilder.loadTexts: vnsCount.setDescription('Number of VNSes defined in vnsConfigTable.') vnsConfigTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2), ) if mibBuilder.loadTexts: vnsConfigTable.setStatus('current') if mibBuilder.loadTexts: vnsConfigTable.setDescription('Contains definitions of the Virtual Network Segments defined on this WirelessController.') vnsConfigEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "vnsIfIndex")) if mibBuilder.loadTexts: vnsConfigEntry.setStatus('current') if mibBuilder.loadTexts: vnsConfigEntry.setDescription('Configuration elements for a specific Virtual Network Segment.') vnsDescription = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 1), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsDescription.setStatus('current') if mibBuilder.loadTexts: vnsDescription.setDescription('Textual description of the VNS.') vnsAssignmentMode = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 2), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("ssid", 1), ("aaa", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsAssignmentMode.setStatus('obsolete') if mibBuilder.loadTexts: vnsAssignmentMode.setDescription('Determines the method by which mobile units are assigned an address within this VNS. If vnsAssignmentMode = ssid, any client with an SSID matching the VNS will be assigned an address from this VNS. If vnsAssignmentMode == aaa, then address assignment is not completed until after the user is authenticated.') vnsMUSessionTimeout = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 3), Integer32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsMUSessionTimeout.setStatus('current') if mibBuilder.loadTexts: vnsMUSessionTimeout.setDescription('Client session idle time out, in seconds.') vnsAllowMulticast = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 4), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsAllowMulticast.setStatus('current') if mibBuilder.loadTexts: vnsAllowMulticast.setDescription('When true, allows IP multicast packets to be broadcast to the clients on this VNS.') vnsSSID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 5), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsSSID.setStatus('current') if mibBuilder.loadTexts: vnsSSID.setDescription('Service Set Identifier (i.e. Network Name) that will be configured on the AccessPoints associated with this VNS.') vnsDomain = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 6), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsDomain.setStatus('current') if mibBuilder.loadTexts: vnsDomain.setDescription('Domain name to be supplied to the wireless clients if internal DHCP address assignment.') vnsDNSServers = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 7), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsDNSServers.setStatus('current') if mibBuilder.loadTexts: vnsDNSServers.setDescription('List of DNSs to be supplied to the wireless clients if internal DHCP address assignment.') vnsWINSServers = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 8), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsWINSServers.setStatus('current') if mibBuilder.loadTexts: vnsWINSServers.setDescription('List of WINSs to be supplied to the wireless clients if internal DHCP address assignment.') vnsAuthModel = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 9), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3))).clone(namedValues=NamedValues(("none", 1), ("captivePortal", 2), ("dot1X", 3)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsAuthModel.setStatus('current') if mibBuilder.loadTexts: vnsAuthModel.setDescription('vnsAuthModel specifies the authentication method used for clients in the VNS. None indicates that the VNS is open, and no authentication is required. vnsAuthModel=captivePortal may only be specified for a VNS with vnsAssignmentMode=ssid. Likewise, vnsAuthModel=dot1X may only be specified for a VNS with vnsAssignmentMode=aaa.') vnsParentIfIndex = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 10), Integer32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsParentIfIndex.setStatus('obsolete') if mibBuilder.loadTexts: vnsParentIfIndex.setDescription('Specifies the ifIndex of the parent VNS, if this VNS is a child. If this is a top level VNS, vnsParentIfIndex will return null or 0.') vnsMgmtTrafficEnable = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 11), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsMgmtTrafficEnable.setStatus('current') if mibBuilder.loadTexts: vnsMgmtTrafficEnable.setDescription('Specifies whether clients in the VNS have access to EWC management elements.') vnsUseDHCPRelay = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 12), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2))).clone(namedValues=NamedValues(("none", 0), ("dhcpRelay", 1), ("localDhcp", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsUseDHCPRelay.setStatus('current') if mibBuilder.loadTexts: vnsUseDHCPRelay.setDescription('This variable indicates what type of DHCP is used for the VNS. none(0): No DHCP server on the VNS. dhcpRelay(1): Uses DHCP relay to reach the DHCP server. localDhcp(2): Uses local DHCP server on the controler.') vns3rdPartyAP = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 13), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vns3rdPartyAP.setStatus('current') if mibBuilder.loadTexts: vns3rdPartyAP.setDescription('When true, specifies that the VNS contains 3rd party access points. Only one such VNS may be defined for a WirelessController.') vnsStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 14), RowStatus()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsStatus.setStatus('current') if mibBuilder.loadTexts: vnsStatus.setDescription('RowStatus variable for performing row operations on vnsConfigTable.') vnsMode = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 15), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4, 5))).clone(namedValues=NamedValues(("routed", 1), ("bridgeAtController", 2), ("bridgeAtAP", 3), ("wds", 4), ("thirdParty", 5))).clone('routed')).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsMode.setStatus('current') if mibBuilder.loadTexts: vnsMode.setDescription('Type of traffic for this VNS. routed(1): The traffic is routed at the controller. bridgeAtController(2): Traffic is bridged at controller. bridgeAtAP(3): Traffic is bridged at Access Points. wds(4): Wireless Distributed System (WDS) type of VNS. If VNS is type of wds(4), then only vnsSupressSSID, vnsDescription and vnsSSID has meaning.') vnsVlanID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 16), Integer32().subtype(subtypeSpec=ValueRangeConstraint(-1, 4094)).clone(-1)).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsVlanID.setStatus('current') if mibBuilder.loadTexts: vnsVlanID.setDescription('VLAN tag for the packets trasmitted to/from of the VNS. This value has meaning if vnsMode is bridgeAtController(2) or bridgeAtAP(3). If vnsMode = bridgeAtController(2), tagging is done at controller. If vnsMode = bridgeAtAP(3), tagging is done at Access Point. Value ranges: (-1) it is not tagged, zero(0) means reserved, 1-4094 tag value.') vnsInterfaceName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 17), OctetString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsInterfaceName.setStatus('current') if mibBuilder.loadTexts: vnsInterfaceName.setDescription('Physical interface to be used in the controller for trasmitting/receiving packets for the VNS. This value has meaning if vnsMode is bridgeAtController(2).') vnsMgmIpAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 18), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsMgmIpAddress.setStatus('current') if mibBuilder.loadTexts: vnsMgmIpAddress.setDescription('IP address of the management port associated to this VNS. This value has meaning if vnsMode is bridgeAtController(2).') vnsSuppressSSID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 19), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsSuppressSSID.setStatus('current') if mibBuilder.loadTexts: vnsSuppressSSID.setDescription('If set to true, this prevents this SSID from appearing in the beacon message.') vnsEnable11hSupport = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 20), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsEnable11hSupport.setStatus('current') if mibBuilder.loadTexts: vnsEnable11hSupport.setDescription('If true, enables 802.11h support.') vnsApplyPowerBackOff = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 21), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsApplyPowerBackOff.setStatus('current') if mibBuilder.loadTexts: vnsApplyPowerBackOff.setDescription('Indicates whether the AP will direct 802.11h-enabled clients to apply the same power back-off setting that the AP is using') vnsProcessClientIEReq = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 22), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsProcessClientIEReq.setStatus('current') if mibBuilder.loadTexts: vnsProcessClientIEReq.setDescription('If true, enables support for 802.11d client information request.') vnsDLSSupportEnable = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 23), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsDLSSupportEnable.setStatus('current') if mibBuilder.loadTexts: vnsDLSSupportEnable.setDescription('If true, enables support for DLS Support. This value has meaning only if vnsUseDHCPRelay is selected as localDhcp(2) and vnsMode is select as either routed(1) or bridgeAtController(2).') vnsDLSAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 24), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsDLSAddress.setStatus('current') if mibBuilder.loadTexts: vnsDLSAddress.setDescription('DNS IP Address for DLS associated to this VNS. It could be IP address or Name') vnsDLSPort = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 25), Integer32().clone(18443)).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsDLSPort.setStatus('current') if mibBuilder.loadTexts: vnsDLSPort.setDescription('DNS Port for DLS associated to this VNS.') vnsRateControlProfile = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 26), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsRateControlProfile.setStatus('current') if mibBuilder.loadTexts: vnsRateControlProfile.setDescription('The Rate Control Profile that is referenced by this VNS.') vnsSessionAvailabilityEnable = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 27), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsSessionAvailabilityEnable.setStatus('current') if mibBuilder.loadTexts: vnsSessionAvailabilityEnable.setDescription('To indicate if Session Availability feature is enabled.') vnsEnabled = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 28), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disabled", 0), ("enabled", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsEnabled.setStatus('current') if mibBuilder.loadTexts: vnsEnabled.setDescription('VNS status of being enabled or disabled.') vnsStrictSubnetAdherence = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 29), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disabled", 0), ("enabled", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsStrictSubnetAdherence.setStatus('current') if mibBuilder.loadTexts: vnsStrictSubnetAdherence.setDescription('Subnet adherence verification status for the VNS. Controller only learns devices whose address is within range of VNS segment definition. Disabling this field causes to not enforce validation. Doing so, may expose the controller to in-advertent Learning DoS attacks. ') vnsSLPEnabled = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 30), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disabled", 0), ("enabled", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsSLPEnabled.setStatus('current') if mibBuilder.loadTexts: vnsSLPEnabled.setDescription('Status of SLP flag on Bridge at Controller type VNS. This field does not have any meaning for other types of VNS.') vnsConfigWLANID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 31), Unsigned32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsConfigWLANID.setStatus('current') if mibBuilder.loadTexts: vnsConfigWLANID.setDescription('Creation of VNS requires existing of a free WLAN. One WLAN can only be used in one VNS only. This ID identifies the WLAN that is used for creation of VNS that is identified by this row.') vnsDHCPRangeTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 3), ) if mibBuilder.loadTexts: vnsDHCPRangeTable.setStatus('current') if mibBuilder.loadTexts: vnsDHCPRangeTable.setDescription('vnsDHCPRangeTable contains the IP address ranges that DHCP will serve to clients associated with this VNS.') vnsDHCPRangeEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 3, 1), ).setIndexNames((0, "IF-MIB", "ifIndex"), (0, "HIPATH-WIRELESS-HWC-MIB", "vnsDHCPRangeIndex")) if mibBuilder.loadTexts: vnsDHCPRangeEntry.setStatus('current') if mibBuilder.loadTexts: vnsDHCPRangeEntry.setDescription('Configuration information for a DHCP range.') vnsDHCPRangeIndex = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 3, 1, 1), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 2147483647))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsDHCPRangeIndex.setStatus('current') if mibBuilder.loadTexts: vnsDHCPRangeIndex.setDescription('Index for the DHCP row element.') vnsDHCPRangeStart = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 3, 1, 2), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsDHCPRangeStart.setStatus('current') if mibBuilder.loadTexts: vnsDHCPRangeStart.setDescription('First IP address in the range.') vnsDHCPRangeEnd = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 3, 1, 3), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsDHCPRangeEnd.setStatus('current') if mibBuilder.loadTexts: vnsDHCPRangeEnd.setDescription('Last IP address in the range.') vnsDHCPRangeType = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 3, 1, 4), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("inclusion", 1), ("exclusion", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsDHCPRangeType.setStatus('current') if mibBuilder.loadTexts: vnsDHCPRangeType.setDescription('Determines whether addresses in the specified range will be included, or excluded by the DHCP server.') vnsDHCPRangeStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 3, 1, 5), RowStatus()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsDHCPRangeStatus.setStatus('current') if mibBuilder.loadTexts: vnsDHCPRangeStatus.setDescription('Row status variable for row operations on the vnsDHCPRangeTable') vnsCaptivePortalTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4), ) if mibBuilder.loadTexts: vnsCaptivePortalTable.setStatus('current') if mibBuilder.loadTexts: vnsCaptivePortalTable.setDescription('Details of the Captive Portal login page for VNSes that have vnsAssignment=ssid and vnsAuthModel=captivePortal.') vnsCaptivePortalEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1), ).setIndexNames((0, "IF-MIB", "ifIndex")) if mibBuilder.loadTexts: vnsCaptivePortalEntry.setStatus('current') if mibBuilder.loadTexts: vnsCaptivePortalEntry.setDescription('Captive Portal Information for the VNS.') cpURL = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1, 1), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpURL.setStatus('current') if mibBuilder.loadTexts: cpURL.setDescription('Redirect URL of the Captive Portal login page.') cpLoginLabel = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1, 2), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpLoginLabel.setStatus('deprecated') if mibBuilder.loadTexts: cpLoginLabel.setDescription('Label that appears in front of the login field on the Captive Portal login page.') cpPasswordLabel = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1, 3), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpPasswordLabel.setStatus('deprecated') if mibBuilder.loadTexts: cpPasswordLabel.setDescription('Label that appears in front of the password field on the Captive Portal login page.') cpHeaderURL = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1, 4), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpHeaderURL.setStatus('deprecated') if mibBuilder.loadTexts: cpHeaderURL.setDescription('URL of the Captive Portal header.') cpFooterURL = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1, 5), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpFooterURL.setStatus('deprecated') if mibBuilder.loadTexts: cpFooterURL.setDescription('URL of the Captive Portal footer.') cpMessage = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1, 6), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpMessage.setStatus('deprecated') if mibBuilder.loadTexts: cpMessage.setDescription('A welcome message, or set of instructions that is to appear on the Captive Portal login page.') cpReplaceGatewayWithFQDN = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1, 7), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpReplaceGatewayWithFQDN.setStatus('current') if mibBuilder.loadTexts: cpReplaceGatewayWithFQDN.setDescription('Fully Qualified Domain Name (FQDN) to be used as the gateway IP address.') cpDefaultRedirectionURL = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1, 8), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpDefaultRedirectionURL.setStatus('current') if mibBuilder.loadTexts: cpDefaultRedirectionURL.setDescription('Default Redirect URL of the Captive Portal login page.') cpConnectionIP = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1, 9), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpConnectionIP.setStatus('current') if mibBuilder.loadTexts: cpConnectionIP.setDescription('IP address of the Controller interface for Captive Portal.') cpConnectionPort = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1, 10), Integer32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpConnectionPort.setStatus('current') if mibBuilder.loadTexts: cpConnectionPort.setDescription('Port number on the cpConnectionIP interface.') cpSharedSecret = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1, 11), OctetString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpSharedSecret.setStatus('current') if mibBuilder.loadTexts: cpSharedSecret.setDescription('Secret Key to be used to encrypt the information passed between the Controller and the external web server. It is the password common to both Controller and the external web server.') cpLogOff = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1, 12), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("off", 0), ("on", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpLogOff.setStatus('current') if mibBuilder.loadTexts: cpLogOff.setDescription('Toggles the display of logoff popup screen, allowing users to control their logoff.') cpStatusCheck = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1, 13), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("off", 0), ("on", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpStatusCheck.setStatus('current') if mibBuilder.loadTexts: cpStatusCheck.setDescription('Toggles the display of popup window with session statistics for users to monitor their usage and time left in session.') cpType = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1, 14), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 4, 5))).clone(namedValues=NamedValues(("none", 1), ("internal", 2), ("external", 4), ("guestPortal", 5)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: cpType.setStatus('current') if mibBuilder.loadTexts: cpType.setDescription('Type of captive portal is enabled for the selected VNS. none(1) = no captive portal configured or type is unknown. internal(2) = internal captive portal. external(4) = external captive portal. guestPortal (5) = open host captive portal.') vnsRadiusServerTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 5), ) if mibBuilder.loadTexts: vnsRadiusServerTable.setStatus('current') if mibBuilder.loadTexts: vnsRadiusServerTable.setDescription('List of RADIUS servers to be utilized for authentication in the VNS.') vnsRadiusServerEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 5, 1), ).setIndexNames((0, "IF-MIB", "ifIndex"), (0, "HIPATH-WIRELESS-HWC-MIB", "vnsRadiusServerName")) if mibBuilder.loadTexts: vnsRadiusServerEntry.setStatus('current') if mibBuilder.loadTexts: vnsRadiusServerEntry.setDescription('Configuration information for a RADIUS server.') vnsRadiusServerName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 5, 1, 1), DisplayString().subtype(subtypeSpec=ValueSizeConstraint(0, 64))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsRadiusServerName.setStatus('current') if mibBuilder.loadTexts: vnsRadiusServerName.setDescription('Name of the RADIUS server.') vnsRadiusServerPort = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 5, 1, 2), Integer32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsRadiusServerPort.setStatus('current') if mibBuilder.loadTexts: vnsRadiusServerPort.setDescription('Port number for the RADIUS server.') vnsRadiusServerRetries = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 5, 1, 3), Integer32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsRadiusServerRetries.setStatus('current') if mibBuilder.loadTexts: vnsRadiusServerRetries.setDescription('Number of retries for a RADIUS authentication request.') vnsRadiusServerTimeout = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 5, 1, 4), Integer32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsRadiusServerTimeout.setStatus('current') if mibBuilder.loadTexts: vnsRadiusServerTimeout.setDescription('Delay between requests.') vnsRadiusServerSharedSecret = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 5, 1, 5), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsRadiusServerSharedSecret.setStatus('current') if mibBuilder.loadTexts: vnsRadiusServerSharedSecret.setDescription('Shared secret to be used between the NAS and RADIUS server.') vnsRadiusServerNASIdentifier = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 5, 1, 6), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsRadiusServerNASIdentifier.setStatus('current') if mibBuilder.loadTexts: vnsRadiusServerNASIdentifier.setDescription('NAS identifier to be included in RADIUS request.') vnsRadiusServerAuthType = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 5, 1, 7), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3, 4))).clone(namedValues=NamedValues(("pap", 0), ("chap", 1), ("msChap", 2), ("msChapV2", 3), ("notApplicable", 4)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsRadiusServerAuthType.setStatus('current') if mibBuilder.loadTexts: vnsRadiusServerAuthType.setDescription('Challenge mechanism for the request.') vnsRadiusServerRowStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 5, 1, 8), RowStatus()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsRadiusServerRowStatus.setStatus('current') if mibBuilder.loadTexts: vnsRadiusServerRowStatus.setDescription('RowStatus value for manipulating vnsRADIUSServerTable.') vnsRadiusServerNasAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 5, 1, 9), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsRadiusServerNasAddress.setStatus('current') if mibBuilder.loadTexts: vnsRadiusServerNasAddress.setDescription('NAS address to be included in RADIUS request.') vnsFilterIDTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 6), ) if mibBuilder.loadTexts: vnsFilterIDTable.setStatus('current') if mibBuilder.loadTexts: vnsFilterIDTable.setDescription('Table of names filters for a VNS.') vnsFilterIDEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 6, 1), ).setIndexNames((0, "IF-MIB", "ifIndex"), (0, "HIPATH-WIRELESS-HWC-MIB", "vnsFilterID")) if mibBuilder.loadTexts: vnsFilterIDEntry.setStatus('current') if mibBuilder.loadTexts: vnsFilterIDEntry.setDescription('Name of a specific filter in the VNS.') vnsFilterID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 6, 1, 1), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsFilterID.setStatus('current') if mibBuilder.loadTexts: vnsFilterID.setDescription('Filter names.') vnsFilterIDStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 6, 1, 2), RowStatus()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsFilterIDStatus.setStatus('current') if mibBuilder.loadTexts: vnsFilterIDStatus.setDescription('RowStatus for operating on vnsFilterIDTable.') vnsFilterRuleTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 7), ) if mibBuilder.loadTexts: vnsFilterRuleTable.setStatus('current') if mibBuilder.loadTexts: vnsFilterRuleTable.setDescription('Table containing specific filters for a named filter.') vnsFilterRuleEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 7, 1), ).setIndexNames((0, "IF-MIB", "ifIndex"), (0, "HIPATH-WIRELESS-HWC-MIB", "vnsFilterID"), (0, "HIPATH-WIRELESS-HWC-MIB", "vnsFilterRuleOrder")) if mibBuilder.loadTexts: vnsFilterRuleEntry.setStatus('current') if mibBuilder.loadTexts: vnsFilterRuleEntry.setDescription('Filter elements for an individual VNS filter.') vnsFilterRuleOrder = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 7, 1, 1), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 65532))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsFilterRuleOrder.setStatus('current') if mibBuilder.loadTexts: vnsFilterRuleOrder.setDescription('Position of the filter in the filter list.') vnsFilterRuleDirection = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 7, 1, 2), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3))).clone(namedValues=NamedValues(("none", 0), ("in", 1), ("out", 2), ("both", 3)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsFilterRuleDirection.setStatus('current') if mibBuilder.loadTexts: vnsFilterRuleDirection.setDescription('Traffic direction defined by the rule.') vnsFilterRuleAction = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 7, 1, 3), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("allow", 1), ("disallow", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsFilterRuleAction.setStatus('current') if mibBuilder.loadTexts: vnsFilterRuleAction.setDescription('Allow or deny traffic for the filter.') vnsFilterRuleIPAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 7, 1, 4), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsFilterRuleIPAddress.setStatus('current') if mibBuilder.loadTexts: vnsFilterRuleIPAddress.setDescription('IP address to apply the filter.') vnsFilterRulePortLow = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 7, 1, 5), Integer32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsFilterRulePortLow.setStatus('current') if mibBuilder.loadTexts: vnsFilterRulePortLow.setDescription('Low port number for the filter.') vnsFilterRulePortHigh = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 7, 1, 6), Integer32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsFilterRulePortHigh.setStatus('current') if mibBuilder.loadTexts: vnsFilterRulePortHigh.setDescription('High port number for the filter.') vnsFilterRuleProtocol = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 7, 1, 7), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3, 4, 5, 6))).clone(namedValues=NamedValues(("none", 0), ("notApplicable", 1), ("tcp", 2), ("udp", 3), ("icmp", 4), ("ipsecESP", 5), ("ipsecAH", 6)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsFilterRuleProtocol.setStatus('current') if mibBuilder.loadTexts: vnsFilterRuleProtocol.setDescription('Specific protocol to filter.') vnsFilterRuleEtherType = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 7, 1, 8), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3))).clone(namedValues=NamedValues(("none", 0), ("ip", 1), ("arp", 2), ("rarp", 3)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsFilterRuleEtherType.setStatus('current') if mibBuilder.loadTexts: vnsFilterRuleEtherType.setDescription('Specific ethertype to filter.') vnsFilterRuleStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 7, 1, 9), RowStatus()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsFilterRuleStatus.setStatus('current') if mibBuilder.loadTexts: vnsFilterRuleStatus.setDescription('RowStatus value for the vnsFilterRuleTable.') vnsPrivacyTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 8), ) if mibBuilder.loadTexts: vnsPrivacyTable.setStatus('current') if mibBuilder.loadTexts: vnsPrivacyTable.setDescription('Table of privacy settings for the VNS.') vnsPrivacyEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 8, 1), ).setIndexNames((0, "IF-MIB", "ifIndex")) if mibBuilder.loadTexts: vnsPrivacyEntry.setStatus('current') if mibBuilder.loadTexts: vnsPrivacyEntry.setDescription('Configuration values for a specific privacy setting.') vnsPrivWEPKeyType = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 8, 1, 1), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4, 5))).clone(namedValues=NamedValues(("none", 1), ("wepstatic", 2), ("wpapsk", 3), ("dynamic", 4), ("wpa", 5)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsPrivWEPKeyType.setStatus('current') if mibBuilder.loadTexts: vnsPrivWEPKeyType.setDescription('Type of key in use. none(1) = not cofigured, wepstatic(2) = static WEP, wpapsk(3) = WPA Pre-Shared Key, dynamic(4) = dynamically assigned, wpa(5) = WPA.') vnsPrivDynamicRekeyFrequency = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 8, 1, 2), Integer32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsPrivDynamicRekeyFrequency.setStatus('current') if mibBuilder.loadTexts: vnsPrivDynamicRekeyFrequency.setDescription('Dynamic WEP re-keying frequency, in seconds. Setting this value to 0 disables rekeying. This value is only meaningful if vnsPrivWEPKeyType = wpapsk(3). For any other values of vnsPrivWEPKeyType, reading or setting this value will return an unsuccessful status and will return a value of null or zero.') vnsPrivWEPKeyLength = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 8, 1, 3), Integer32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsPrivWEPKeyLength.setStatus('current') if mibBuilder.loadTexts: vnsPrivWEPKeyLength.setDescription('WEP key length, 64, 128, or 152 bits. If vnsPrivWEPKeyType is none, reading or setting this value will return an unsuccessful status and will return a value of null or zero.') vnsPrivWPA1Enabled = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 8, 1, 4), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsPrivWPA1Enabled.setStatus('current') if mibBuilder.loadTexts: vnsPrivWPA1Enabled.setDescription('Enables WPA.1 (Wi-Fi Protected Access).') vnsPrivUseSharedKey = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 8, 1, 5), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsPrivUseSharedKey.setStatus('current') if mibBuilder.loadTexts: vnsPrivUseSharedKey.setDescription('Enables the use of WPA shared key for this VNS.') vnsPrivWPASharedKey = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 8, 1, 6), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsPrivWPASharedKey.setStatus('current') if mibBuilder.loadTexts: vnsPrivWPASharedKey.setDescription('The value of the WPA shared key for this VNS. This value is logically WRITE ONLY. Attempts to read this value shall return unsuccessful status and values of null or zero.') vnsPrivWPA2Enabled = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 8, 1, 7), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsPrivWPA2Enabled.setStatus('current') if mibBuilder.loadTexts: vnsPrivWPA2Enabled.setDescription('When true, WPA v.2 support is enabled.') vnsWEPKeyTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 9), ) if mibBuilder.loadTexts: vnsWEPKeyTable.setStatus('current') if mibBuilder.loadTexts: vnsWEPKeyTable.setDescription('Table of WEP key entries for a static WEP definition.') vnsWEPKeyEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 9, 1), ).setIndexNames((0, "IF-MIB", "ifIndex"), (0, "HIPATH-WIRELESS-HWC-MIB", "vnsWEPKeyIndex")) if mibBuilder.loadTexts: vnsWEPKeyEntry.setStatus('current') if mibBuilder.loadTexts: vnsWEPKeyEntry.setDescription('WEP key for a single entry in the table.') vnsWEPKeyIndex = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 9, 1, 1), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 4))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsWEPKeyIndex.setStatus('current') if mibBuilder.loadTexts: vnsWEPKeyIndex.setDescription('Table index for the WEP key.') vnsWEPKeyValue = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 9, 1, 2), WEPKeytype()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsWEPKeyValue.setStatus('current') if mibBuilder.loadTexts: vnsWEPKeyValue.setDescription('Value of a WEP key for this VNS. This value is logically WRITE ONLY. Attempts to read this value shall return unsuccessful status and values of null or zero.') vns3rdPartyAPTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 10), ) if mibBuilder.loadTexts: vns3rdPartyAPTable.setStatus('current') if mibBuilder.loadTexts: vns3rdPartyAPTable.setDescription('Contains a list of 3rd Party access points for the EWC.') vns3rdPartyAPEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 10, 1), ).setIndexNames((0, "IF-MIB", "ifIndex"), (0, "HIPATH-WIRELESS-HWC-MIB", "apMacAddress")) if mibBuilder.loadTexts: vns3rdPartyAPEntry.setStatus('current') if mibBuilder.loadTexts: vns3rdPartyAPEntry.setDescription('Configuration information for a 3rd party access point.') apMacAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 10, 1, 1), MacAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apMacAddress.setStatus('current') if mibBuilder.loadTexts: apMacAddress.setDescription('Ethernet MAC address of the 3rd party access point.') apIpAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 10, 1, 2), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apIpAddress.setStatus('current') if mibBuilder.loadTexts: apIpAddress.setDescription('IP address of the 3rd party access point.') vnsQoSTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11), ) if mibBuilder.loadTexts: vnsQoSTable.setStatus('current') if mibBuilder.loadTexts: vnsQoSTable.setDescription('This table contains list of per-VNS QoS related configuration.') vnsQoSEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "vnsIfIndex")) if mibBuilder.loadTexts: vnsQoSEntry.setStatus('current') if mibBuilder.loadTexts: vnsQoSEntry.setDescription('An entry related to QoS configuration for the VNS indexed by vnsIfIndex.') vnsQoSWirelessLegacyFlag = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 1), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("enabled", 1), ("disabled", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsQoSWirelessLegacyFlag.setStatus('current') if mibBuilder.loadTexts: vnsQoSWirelessLegacyFlag.setDescription('This variable is used to enable/disable legacy QoS feature.') vnsQoSWirelessWMMFlag = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 2), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("enabled", 1), ("disabled", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsQoSWirelessWMMFlag.setStatus('current') if mibBuilder.loadTexts: vnsQoSWirelessWMMFlag.setDescription('This variable is used to enable/disable WMM feature.') vnsQoSWireless80211eFlag = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 3), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("enabled", 1), ("disabled", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsQoSWireless80211eFlag.setStatus('current') if mibBuilder.loadTexts: vnsQoSWireless80211eFlag.setDescription('This variable is used to enable/disable 802.11e feature.') vnsQoSWirelessTurboVoiceFlag = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 4), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("enabled", 1), ("disabled", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsQoSWirelessTurboVoiceFlag.setStatus('current') if mibBuilder.loadTexts: vnsQoSWirelessTurboVoiceFlag.setDescription('This variable is used to enable/disable turbo feature.') vnsQoSPriorityOverrideFlag = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 5), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("enabled", 1), ("disabled", 2))).clone('disabled')).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsQoSPriorityOverrideFlag.setStatus('current') if mibBuilder.loadTexts: vnsQoSPriorityOverrideFlag.setDescription('Enable/disable the use of DSCP to override Servic Class (SC) value.') vnsQoSPriorityOverrideSC = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 6), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3, 4, 5, 6, 7))).clone(namedValues=NamedValues(("background", 0), ("bestEffort", 1), ("bronze", 2), ("silver", 3), ("gold", 4), ("platinum", 5), ("premiumVoice", 6), ("networkControl", 7))).clone('background')).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsQoSPriorityOverrideSC.setStatus('current') if mibBuilder.loadTexts: vnsQoSPriorityOverrideSC.setDescription('Service class (SC) of the override value. This field has a meaning if vnsQoSPriorityOverrideFlag is enabled.') vnsQoSPriorityOverrideDSCP = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 7), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 63))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsQoSPriorityOverrideDSCP.setStatus('current') if mibBuilder.loadTexts: vnsQoSPriorityOverrideDSCP.setDescription('DSCP override value to be used for the service class. This field has a meaning if vnsQoSPriorityOverrideFlag is enabled.') vnsQoSClassificationServiceClass = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 8), OctetString().subtype(subtypeSpec=ValueSizeConstraint(0, 64))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsQoSClassificationServiceClass.setStatus('current') if mibBuilder.loadTexts: vnsQoSClassificationServiceClass.setDescription('Service Class value for the DSCP code. This field is 64-bytes long. Each byte represents mapping between DSCP and Service Class. Position of each byte in the array represents DSCP code and the content of each byte represents the service class value for that DSCP code. For example, second byte represents DSCP code 1 and its value represents SC value. Value for each byte is equivalent to either of: background = 0, bestEffort = 1, bronze = 2, silver = 3, gold = 4, platinum = 5, premiumVoice = 6, networkControl = 7') vnsQoSWirelessEnableUAPSD = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 9), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("enabled", 1), ("disabled", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsQoSWirelessEnableUAPSD.setStatus('current') if mibBuilder.loadTexts: vnsQoSWirelessEnableUAPSD.setDescription('This variable is used to enable/disable U-APSD feature.') vnsQoSWirelessUseAdmControlVoice = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 10), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("enabled", 1), ("disabled", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsQoSWirelessUseAdmControlVoice.setStatus('current') if mibBuilder.loadTexts: vnsQoSWirelessUseAdmControlVoice.setDescription('If enabled, admission control for voice traffic is used.') vnsQoSWirelessUseAdmControlVideo = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 11), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("enabled", 1), ("disabled", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsQoSWirelessUseAdmControlVideo.setStatus('current') if mibBuilder.loadTexts: vnsQoSWirelessUseAdmControlVideo.setDescription('If enabled, admission control for vedio traffic is used. This field has a meaning if vnsQoSUseGlobalAdmVoice is enabled.') vnsQoSWirelessULPolicerAction = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 12), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("doNothing", 0), ("sendDELTStoClient", 1))).clone('doNothing')).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsQoSWirelessULPolicerAction.setStatus('current') if mibBuilder.loadTexts: vnsQoSWirelessULPolicerAction.setDescription('If doNothing is selected, no action is taken. This is default value. If sendDELTStoClient is selected, AP will send DELTS if a client is abusing in uplink. This field has a meaning only if admission control is enabled for VO or VI.') vnsQoSWirelessDLPolicerAction = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 13), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2))).clone(namedValues=NamedValues(("doNothing", 0), ("downgrade", 1), ("drop", 2))).clone('doNothing')).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsQoSWirelessDLPolicerAction.setStatus('current') if mibBuilder.loadTexts: vnsQoSWirelessDLPolicerAction.setDescription('If doNothing is selected, no action is taken. This is default value. If downgrade is selected, AP will downgrade all traffic to the highest AC that does not require CAC in downlink. If drop is selected, AP will drop client if it observes a client that is illegally using an AC that has CAC mandatory in downlink. This field has a meaning only if admission control is enabled for VO or VI.') vnsQoSWirelessUseAdmControlBestEffort = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 14), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disabled", 0), ("enabled", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsQoSWirelessUseAdmControlBestEffort.setStatus('current') if mibBuilder.loadTexts: vnsQoSWirelessUseAdmControlBestEffort.setDescription('If enabled, admission control for video traffic is set to Best Effort. This field has a meaning if vnsQoSUseGlobalAdmVoice is enabled.') vnsQoSWirelessUseAdmControlBackground = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 15), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disabled", 0), ("enabled", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsQoSWirelessUseAdmControlBackground.setStatus('current') if mibBuilder.loadTexts: vnsQoSWirelessUseAdmControlBackground.setDescription('If enabled, admission control for video traffic is set to Background. This field has a meaning if vnsQoSUseGlobalAdmVoice is enabled.') vnsWDSRFTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 12), ) if mibBuilder.loadTexts: vnsWDSRFTable.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSRFTable.setDescription('ontains definitions of the Wireless Distirbution System (WDS) VNS defined on this Controller.') vnsWDSRFEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 12, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "vnsIfIndex"), (0, "HIPATH-WIRELESS-HWC-MIB", "apIndex")) if mibBuilder.loadTexts: vnsWDSRFEntry.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSRFEntry.setDescription('Configuration elements for a specific WDS VNS.') vnsWDSRFAPName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 12, 1, 1), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsWDSRFAPName.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSRFAPName.setDescription('AP name.') vnsWDSRFbgService = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 12, 1, 2), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3, 4))).clone(namedValues=NamedValues(("notAvailable", 0), ("none", 1), ("child", 2), ("parent", 3), ("both", 4)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsWDSRFbgService.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSRFbgService.setDescription('Type of service offered by this radio.') vnsWDSRFaService = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 12, 1, 3), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3, 4))).clone(namedValues=NamedValues(("notAvailable", 0), ("none", 1), ("child", 2), ("parent", 3), ("both", 4)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsWDSRFaService.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSRFaService.setDescription('Type of service offered by this radio.') vnsWDSRFPreferredParent = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 12, 1, 4), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsWDSRFPreferredParent.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSRFPreferredParent.setDescription('Desired preferred parent.') vnsWDSRFBackupParent = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 12, 1, 5), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsWDSRFBackupParent.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSRFBackupParent.setDescription('Desired backup parent.') vnsWDSRFBridge = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 12, 1, 6), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("bridged", 1), ("notBridged", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsWDSRFBridge.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSRFBridge.setDescription('WDS bridge status.') vnsRateControlProfTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 13), ) if mibBuilder.loadTexts: vnsRateControlProfTable.setStatus('obsolete') if mibBuilder.loadTexts: vnsRateControlProfTable.setDescription('Table of Rate Control Profiles.') vnsRateControlProfEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 13, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "vnsRateControlProfInd")) if mibBuilder.loadTexts: vnsRateControlProfEntry.setStatus('obsolete') if mibBuilder.loadTexts: vnsRateControlProfEntry.setDescription('Name of a specific Rate Control Profile.') vnsRateControlProfInd = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 13, 1, 1), Unsigned32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsRateControlProfInd.setStatus('obsolete') if mibBuilder.loadTexts: vnsRateControlProfInd.setDescription('A monotonically increasing integer which acts as index of entries within the named Rate Control Profiles.') vnsRateControlProfName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 13, 1, 2), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsRateControlProfName.setStatus('obsolete') if mibBuilder.loadTexts: vnsRateControlProfName.setDescription('Rate Control Profile Name.') vnsRateControlCIR = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 13, 1, 3), Unsigned32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsRateControlCIR.setStatus('obsolete') if mibBuilder.loadTexts: vnsRateControlCIR.setDescription('Rate Control Average Rate (CIR) in kbps.') vnsRateControlCBS = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 13, 1, 4), Unsigned32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsRateControlCBS.setStatus('obsolete') if mibBuilder.loadTexts: vnsRateControlCBS.setDescription('Rate Control Burst Size (CBS) in bytes.') vnsAPFilterTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 14), ) if mibBuilder.loadTexts: vnsAPFilterTable.setStatus('current') if mibBuilder.loadTexts: vnsAPFilterTable.setDescription('Filters applied to Access Points via VNS settings and assignments.') vnsAPFilterEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 14, 1), ).setIndexNames((0, "IF-MIB", "ifIndex"), (0, "HIPATH-WIRELESS-HWC-MIB", "vnsFilterID"), (0, "HIPATH-WIRELESS-HWC-MIB", "vnsAPFilterRuleOrder")) if mibBuilder.loadTexts: vnsAPFilterEntry.setStatus('current') if mibBuilder.loadTexts: vnsAPFilterEntry.setDescription('An entry containing filters definition for Access Points assigned to VNS that is identified by VNS index.') vnsAPFilterRuleOrder = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 14, 1, 1), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 65535))).setMaxAccess("readcreate") if mibBuilder.loadTexts: vnsAPFilterRuleOrder.setStatus('current') if mibBuilder.loadTexts: vnsAPFilterRuleOrder.setDescription('Position of the filter in the filter list.') vnsAPFilterRuleDirection = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 14, 1, 2), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3))).clone(namedValues=NamedValues(("in", 1), ("out", 2), ("both", 3)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: vnsAPFilterRuleDirection.setStatus('current') if mibBuilder.loadTexts: vnsAPFilterRuleDirection.setDescription('Traffic direction related to the filter rule.') vnsAPFilterAction = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 14, 1, 3), Integer32()).setMaxAccess("readcreate") if mibBuilder.loadTexts: vnsAPFilterAction.setStatus('current') if mibBuilder.loadTexts: vnsAPFilterAction.setDescription('Allow or deny traffic for the filter.') vnsAPFilterIPAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 14, 1, 4), IpAddress()).setMaxAccess("readcreate") if mibBuilder.loadTexts: vnsAPFilterIPAddress.setStatus('current') if mibBuilder.loadTexts: vnsAPFilterIPAddress.setDescription('IP address applied to the filter.') vnsAPFilterMask = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 14, 1, 5), IpAddress()).setMaxAccess("readcreate") if mibBuilder.loadTexts: vnsAPFilterMask.setStatus('current') if mibBuilder.loadTexts: vnsAPFilterMask.setDescription('The mask, number of bits set to one in the mask, applied to filter IP address.') vnsAPFilterPortLow = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 14, 1, 6), Integer32()).setMaxAccess("readcreate") if mibBuilder.loadTexts: vnsAPFilterPortLow.setStatus('current') if mibBuilder.loadTexts: vnsAPFilterPortLow.setDescription('Low port number for the filter.') vnsAPFilterPortHigh = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 14, 1, 7), Integer32()).setMaxAccess("readcreate") if mibBuilder.loadTexts: vnsAPFilterPortHigh.setStatus('current') if mibBuilder.loadTexts: vnsAPFilterPortHigh.setDescription('High port number for the filter.') vnsAPFilterProtocol = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 14, 1, 8), Integer32()).setMaxAccess("readcreate") if mibBuilder.loadTexts: vnsAPFilterProtocol.setStatus('current') if mibBuilder.loadTexts: vnsAPFilterProtocol.setDescription('Specific protocol for the filter.') vnsAPFilterEtherType = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 14, 1, 9), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3))).clone(namedValues=NamedValues(("ip", 1), ("arp", 2), ("rarp", 3)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: vnsAPFilterEtherType.setStatus('current') if mibBuilder.loadTexts: vnsAPFilterEtherType.setDescription('Specific ethertype to the filter.') vnsAPFilterRowStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 14, 1, 10), Integer32()).setMaxAccess("readcreate") if mibBuilder.loadTexts: vnsAPFilterRowStatus.setStatus('current') if mibBuilder.loadTexts: vnsAPFilterRowStatus.setDescription('RowStatus value for this table entry.') vnsStatsObjects = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2)) activeVNSSessionCount = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 1), Integer32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: activeVNSSessionCount.setStatus('current') if mibBuilder.loadTexts: activeVNSSessionCount.setDescription('Number of active VNSs.') vnsStatTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 2), ) if mibBuilder.loadTexts: vnsStatTable.setStatus('obsolete') if mibBuilder.loadTexts: vnsStatTable.setDescription('Description.') vnsStatEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 2, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "vnsIfIndex")) if mibBuilder.loadTexts: vnsStatEntry.setStatus('obsolete') if mibBuilder.loadTexts: vnsStatEntry.setDescription('Description.') vnsStatName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 2, 1, 1), OctetString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsStatName.setStatus('obsolete') if mibBuilder.loadTexts: vnsStatName.setDescription('Name of the VNS.') vnsStatTxPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 2, 1, 2), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: vnsStatTxPkts.setStatus('obsolete') if mibBuilder.loadTexts: vnsStatTxPkts.setDescription('Trasmitted packets.') vnsStatRxPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 2, 1, 3), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: vnsStatRxPkts.setStatus('obsolete') if mibBuilder.loadTexts: vnsStatRxPkts.setDescription('Received packtes.') vnsStatTxOctects = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 2, 1, 4), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: vnsStatTxOctects.setStatus('obsolete') if mibBuilder.loadTexts: vnsStatTxOctects.setDescription('Trasmitted octects.') vnsStatRxOctects = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 2, 1, 5), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: vnsStatRxOctects.setStatus('obsolete') if mibBuilder.loadTexts: vnsStatRxOctects.setDescription('Received octets.') vnsStatMulticastTxPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 2, 1, 6), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: vnsStatMulticastTxPkts.setStatus('obsolete') if mibBuilder.loadTexts: vnsStatMulticastTxPkts.setDescription('Multicast trasmitted packets.') vnsStatMulticastRxPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 2, 1, 7), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: vnsStatMulticastRxPkts.setStatus('obsolete') if mibBuilder.loadTexts: vnsStatMulticastRxPkts.setDescription('Multicast received packets.') vnsStatBroadcastTxPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 2, 1, 8), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: vnsStatBroadcastTxPkts.setStatus('obsolete') if mibBuilder.loadTexts: vnsStatBroadcastTxPkts.setDescription('Broadcast trasmitted packets.') vnsStatBroadcastRxPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 2, 1, 9), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: vnsStatBroadcastRxPkts.setStatus('obsolete') if mibBuilder.loadTexts: vnsStatBroadcastRxPkts.setDescription('Broadcast received packets.') vnsStatRadiusTotRequests = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 2, 1, 10), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: vnsStatRadiusTotRequests.setStatus('obsolete') if mibBuilder.loadTexts: vnsStatRadiusTotRequests.setDescription('Total requests sent to radius server.') vnsStatRadiusReqFailed = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 2, 1, 11), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: vnsStatRadiusReqFailed.setStatus('obsolete') if mibBuilder.loadTexts: vnsStatRadiusReqFailed.setDescription('Requests that failed to be processed by radius server.') vnsStatRadiusReqRejected = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 2, 1, 12), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: vnsStatRadiusReqRejected.setStatus('obsolete') if mibBuilder.loadTexts: vnsStatRadiusReqRejected.setDescription('Requests that have been rejected by radius server.') vnsExceptionStatTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 3), ) if mibBuilder.loadTexts: vnsExceptionStatTable.setStatus('obsolete') if mibBuilder.loadTexts: vnsExceptionStatTable.setDescription('Description.') vnsExceptionStatEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 3, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "vnsIfIndex"), (0, "HIPATH-WIRELESS-HWC-MIB", "vnsExceptionFiterName")) if mibBuilder.loadTexts: vnsExceptionStatEntry.setStatus('obsolete') if mibBuilder.loadTexts: vnsExceptionStatEntry.setDescription('Description.') vnsExceptionFiterName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 3, 1, 1), OctetString().subtype(subtypeSpec=ValueSizeConstraint(1, 64))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsExceptionFiterName.setStatus('obsolete') if mibBuilder.loadTexts: vnsExceptionFiterName.setDescription('Filter name.') vnsExceptionStatPktsDenied = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 3, 1, 2), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: vnsExceptionStatPktsDenied.setStatus('obsolete') if mibBuilder.loadTexts: vnsExceptionStatPktsDenied.setDescription('Total packets that are denied by defined filters.') vnsExceptionStatPktsAllowed = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 3, 1, 3), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: vnsExceptionStatPktsAllowed.setStatus('obsolete') if mibBuilder.loadTexts: vnsExceptionStatPktsAllowed.setDescription('Total packets that are allowed by defined filters.') vnsWDSStatTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 4), ) if mibBuilder.loadTexts: vnsWDSStatTable.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSStatTable.setDescription('Description.') vnsWDSStatEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 4, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "vnsIfIndex"), (0, "HIPATH-WIRELESS-HWC-MIB", "apIndex")) if mibBuilder.loadTexts: vnsWDSStatEntry.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSStatEntry.setDescription('Description.') vnsWDSStatAPName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 4, 1, 1), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsWDSStatAPName.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSStatAPName.setDescription('AP name serving WDS VNS.') vnsWDSStatAPRole = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 4, 1, 2), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(-1, 0, 1, 2, 3))).clone(namedValues=NamedValues(("unknown", -1), ("none", 0), ("satellite", 1), ("root", 2), ("repeater", 3)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsWDSStatAPRole.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSStatAPRole.setDescription('Role of the AP in WDS tree. All the statistics and configuration information in this table has no meaning if the role is unknown(-1).') vnsWDSStatAPRadio = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 4, 1, 3), DisplayString().subtype(subtypeSpec=ValueSizeConstraint(0, 15))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsWDSStatAPRadio.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSStatAPRadio.setDescription("Radio and freq on which uplink WDS is established, N/A if connected over etherent (value are 'a:<freq>', 'b/g:<freq>', or 'N/A') ") vnsWDSStatAPParent = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 4, 1, 4), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsWDSStatAPParent.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSStatAPParent.setDescription('AP Name of the parent AP.') vnsWDSStatSSID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 4, 1, 5), DisplayString().subtype(subtypeSpec=ValueSizeConstraint(0, 32))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsWDSStatSSID.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSStatSSID.setDescription('SSID of the WDS VNS where parent WDS link is established.') vnsWDSStatRxFrame = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 4, 1, 6), Counter64()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsWDSStatRxFrame.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSStatRxFrame.setDescription('Received frames from the parent AP.') vnsWDSStatTxFrame = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 4, 1, 7), Counter64()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsWDSStatTxFrame.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSStatTxFrame.setDescription('Transmitted frames to the parent AP.') vnsWDSStatRxError = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 4, 1, 8), Counter64()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsWDSStatRxError.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSStatRxError.setDescription('Received frames in error from the parent AP.') vnsWDSStatTxError = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 4, 1, 9), Counter64()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsWDSStatTxError.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSStatTxError.setDescription('Transmitted frames in error to the parent AP.') vnsWDSStatRxRSSI = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 4, 1, 10), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 64))).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsWDSStatRxRSSI.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSStatRxRSSI.setDescription('Average Received Signal Strength Indicator (RSSI).') vnsWDSStatRxRate = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 4, 1, 11), Counter64()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsWDSStatRxRate.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSStatRxRate.setDescription('Average receive rate.') vnsWDSStatTxRate = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 4, 1, 12), Counter64()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsWDSStatTxRate.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSStatTxRate.setDescription('Average transmission rate.') vnsGlobalSetting = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3)) wirelessQoS = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 1)) maxVoiceBWforReassociation = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 1, 1), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 100)).clone(80)).setMaxAccess("readwrite") if mibBuilder.loadTexts: maxVoiceBWforReassociation.setStatus('current') if mibBuilder.loadTexts: maxVoiceBWforReassociation.setDescription('Maximum voice bandwidth to be used for re-association.') maxVoiceBWforAssociation = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 1, 2), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 100)).clone(60)).setMaxAccess("readwrite") if mibBuilder.loadTexts: maxVoiceBWforAssociation.setStatus('current') if mibBuilder.loadTexts: maxVoiceBWforAssociation.setDescription('Maximum voice bandwidth to be used for association.') maxVideoBWforReassociation = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 1, 3), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 100)).clone(60)).setMaxAccess("readwrite") if mibBuilder.loadTexts: maxVideoBWforReassociation.setStatus('current') if mibBuilder.loadTexts: maxVideoBWforReassociation.setDescription('Maximum video bandwidth to be used for re-association.') maxVideoBWforAssociation = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 1, 4), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 100)).clone(40)).setMaxAccess("readwrite") if mibBuilder.loadTexts: maxVideoBWforAssociation.setStatus('current') if mibBuilder.loadTexts: maxVideoBWforAssociation.setDescription('Maximum video bandwidth to be used for association.') maxBestEffortBWforReassociation = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 1, 5), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 100)).clone(40)).setMaxAccess("readwrite") if mibBuilder.loadTexts: maxBestEffortBWforReassociation.setStatus('current') if mibBuilder.loadTexts: maxBestEffortBWforReassociation.setDescription('Maximum best effort bandwidth to be used for reassociation.') maxBestEffortBWforAssociation = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 1, 6), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 100)).clone(30)).setMaxAccess("readwrite") if mibBuilder.loadTexts: maxBestEffortBWforAssociation.setStatus('current') if mibBuilder.loadTexts: maxBestEffortBWforAssociation.setDescription('Maximum best effort bandwidth to be used for association.') maxBackgroundBWforReassociation = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 1, 7), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 100)).clone(30)).setMaxAccess("readwrite") if mibBuilder.loadTexts: maxBackgroundBWforReassociation.setStatus('current') if mibBuilder.loadTexts: maxBackgroundBWforReassociation.setDescription('Maximum background bandwidth to be used for reassociation. ') maxBackgroundBWforAssociation = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 1, 8), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 100)).clone(20)).setMaxAccess("readwrite") if mibBuilder.loadTexts: maxBackgroundBWforAssociation.setStatus('current') if mibBuilder.loadTexts: maxBackgroundBWforAssociation.setDescription('Maximum background bandwidth to be used for association. ') radiusInfo = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 2)) externalRadiusServerTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 2, 2), ) if mibBuilder.loadTexts: externalRadiusServerTable.setStatus('obsolete') if mibBuilder.loadTexts: externalRadiusServerTable.setDescription('Table of external RADIUS servers available for authentication services.') externalRadiusServerEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 2, 2, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "externalRadiusServerName")) if mibBuilder.loadTexts: externalRadiusServerEntry.setStatus('obsolete') if mibBuilder.loadTexts: externalRadiusServerEntry.setDescription('Configuration information about the RADIUS server entry.') externalRadiusServerName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 2, 2, 1, 1), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: externalRadiusServerName.setStatus('obsolete') if mibBuilder.loadTexts: externalRadiusServerName.setDescription('RADIUS server name.') externalRadiusServerAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 2, 2, 1, 2), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: externalRadiusServerAddress.setStatus('obsolete') if mibBuilder.loadTexts: externalRadiusServerAddress.setDescription('RADIUS server address, it can be either string or IP address.') externalRadiusServerSharedSecret = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 2, 2, 1, 3), OctetString().subtype(subtypeSpec=ValueSizeConstraint(0, 64))).setMaxAccess("readwrite") if mibBuilder.loadTexts: externalRadiusServerSharedSecret.setStatus('obsolete') if mibBuilder.loadTexts: externalRadiusServerSharedSecret.setDescription('Shared secret between Radius and the client.') externalRadiusServerRowStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 2, 2, 1, 4), RowStatus()).setMaxAccess("readwrite") if mibBuilder.loadTexts: externalRadiusServerRowStatus.setStatus('obsolete') if mibBuilder.loadTexts: externalRadiusServerRowStatus.setDescription('Row Status for the entry.') dasInfo = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 3)) dasPort = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 3, 1), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1024, 65535)).clone(3799)).setMaxAccess("readwrite") if mibBuilder.loadTexts: dasPort.setStatus('current') if mibBuilder.loadTexts: dasPort.setDescription('Dynamic Authorization Server (DAS) port. ') dasReplayInterval = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 3, 2), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 1000)).clone(300)).setUnits('seconds').setMaxAccess("readwrite") if mibBuilder.loadTexts: dasReplayInterval.setStatus('current') if mibBuilder.loadTexts: dasReplayInterval.setDescription('The time window for message timeliness and replay protection for DAS packets. Packets should be dropped that their time generation is outside of this specified interval. Value zero indicates that the timeliness checking will be performed.') advancedFilteringMode = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 4), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disabled", 0), ("enabled", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: advancedFilteringMode.setStatus('current') if mibBuilder.loadTexts: advancedFilteringMode.setDescription("Value of 'enabled(1)' means EWC is operating in advanced filtering configuration mode. Value of 'disabled(0)' means EWC is operating in mode that is compatible with releases prior to 7.41. This field can only be set to 'enabled(1)' and after setting it to that value, the only way to undo that is by resetting the database.") radiusStrictMode = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 5), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("strictModeDisabled", 0), ("strictModeEnabled", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: radiusStrictMode.setStatus('current') if mibBuilder.loadTexts: radiusStrictMode.setDescription('If this variable set to true, then assignment of RADIUS server(s) to WLAN are automatic during WLAN creation, otherwise, assignment of RADIUS server(s) to WLAN must be done manually. ') radiusFastFailoverEvents = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 6)) radiusFastFailoverEventsTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 6, 1), ) if mibBuilder.loadTexts: radiusFastFailoverEventsTable.setStatus('current') if mibBuilder.loadTexts: radiusFastFailoverEventsTable.setDescription('Table in which to configure which RADIUS servers will be sent interim accounting reports for stations when a fast failover incident occurs ') radiusFastFailoverEventsEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 6, 1, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "radiusFFOEid")) if mibBuilder.loadTexts: radiusFastFailoverEventsEntry.setStatus('current') if mibBuilder.loadTexts: radiusFastFailoverEventsEntry.setDescription('An entry for each radius server.') radiusFFOEid = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 6, 1, 1, 1), DisplayString().subtype(subtypeSpec=ValueSizeConstraint(1, 64))) if mibBuilder.loadTexts: radiusFFOEid.setStatus('current') if mibBuilder.loadTexts: radiusFFOEid.setDescription('The IP address or hostname of configured radius server. If the hostname is created from GUI/CLI and the size is bigger than 64 characters, snmp will display the first 64 characters only. ') fastFailoverEvents = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 6, 1, 1, 2), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("fastFailoverEventsDisabled", 0), ("fastFailoverEventsEnabled", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: fastFailoverEvents.setStatus('current') if mibBuilder.loadTexts: fastFailoverEvents.setDescription('If true, send an interim accounting record to the RADIUS server for each affected station when a fast failover event occurs. This field can be modified when controller is operated in availablity paired mode and fast failover is enabled ') dhcpRelayListeners = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 7)) dhcpRelayListenersMaxEntries = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 7, 1), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: dhcpRelayListenersMaxEntries.setStatus('current') if mibBuilder.loadTexts: dhcpRelayListenersMaxEntries.setDescription('Maximum number of servers to which DHCP messages are relayed .') dhcpRelayListenersNumEntries = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 7, 2), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: dhcpRelayListenersNumEntries.setStatus('current') if mibBuilder.loadTexts: dhcpRelayListenersNumEntries.setDescription('The current number of entries in the dhcpRelayListenersTable.') dhcpRelayListenersNextIndex = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 7, 3), Integer32()).setMaxAccess("readonly") if mibBuilder.loadTexts: dhcpRelayListenersNextIndex.setStatus('current') if mibBuilder.loadTexts: dhcpRelayListenersNextIndex.setDescription('This object indicates numerically lowest available index within this entity, which may be used for the value of index in the creation of new entry in dhcpRelayListenersTable. An index is considered available if the index falls within the range of 1 to dhcpRelayListenersMaxEntries and it is not being used to index an existing entry in the dhcpRelayListenersTable contained this entity. This value should only be used as guideline for the management application and there is no requirement on the management application to create entries based upon this index value. Value of zero indicates there is no more room for new dhcpRelayListenersTable creation.') dhcpRelayListenersTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 7, 4), ) if mibBuilder.loadTexts: dhcpRelayListenersTable.setStatus('current') if mibBuilder.loadTexts: dhcpRelayListenersTable.setDescription('A list of servers to which DHCP messages are relayed but from which no responses are expected. ') dhcpRelayListenersEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 7, 4, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "dhcpRelayListenersID")) if mibBuilder.loadTexts: dhcpRelayListenersEntry.setStatus('current') if mibBuilder.loadTexts: dhcpRelayListenersEntry.setDescription('An entry for each dhcpRelayListeners.') dhcpRelayListenersID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 7, 4, 1, 1), Unsigned32()) if mibBuilder.loadTexts: dhcpRelayListenersID.setStatus('current') if mibBuilder.loadTexts: dhcpRelayListenersID.setDescription("The id corresponds to the 'server number' in the controller GUI and CLI.") dhcpRelayListenersRowStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 7, 4, 1, 2), RowStatus()).setMaxAccess("readcreate") if mibBuilder.loadTexts: dhcpRelayListenersRowStatus.setStatus('current') if mibBuilder.loadTexts: dhcpRelayListenersRowStatus.setDescription('This object allows dynamic creation and deletion of entries within dhcpRelayListenersTable as well as activation and deactivation of these entries. For row creation, EWC only supports creatAndWait. ') destinationName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 7, 4, 1, 3), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: destinationName.setStatus('current') if mibBuilder.loadTexts: destinationName.setDescription('Text string uniquely identifying NAC Server Name. Allowable characters for this field are from the set of A-Z, a-z, -_!#$, 0-9, and space. max len is 63 chars Howerver, it is recommended to avoid leading and trailing spaces.') destinationIP = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 7, 4, 1, 4), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: destinationIP.setStatus('current') if mibBuilder.loadTexts: destinationIP.setDescription('IPv4 address to which DHCP messages are relayed.') clientAutologinOption = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 8), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2))).clone(namedValues=NamedValues(("hide", 0), ("redirect", 1), ("drop", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: clientAutologinOption.setStatus('current') if mibBuilder.loadTexts: clientAutologinOption.setDescription('Many devices such as those made by Apple(R) implement an autologin feature that prompts the user to login as soon as the device detects the presence of a Captive Portal. This feature sometimes causes problems for users who actually interact with the captive portal. hide(0) - Hide the captive portal from Autologin detector. redirect(1) - Redirect detection messages to the Captive Portal. This option is to allow client autologin to detect the captive portal & prompt the user to login. This may cause post-authentication redirection to fail. drop(2) - Drop detection messages.') authenticationAdvanced = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 9)) includeServiceType = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 9, 1), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disable", 0), ("enable", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: includeServiceType.setStatus('current') if mibBuilder.loadTexts: includeServiceType.setDescription(' Include the Service-Type attribute in client access request messages when this field is set to enable(1). ') clientMessageDelayTime = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 9, 2), Integer32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: clientMessageDelayTime.setStatus('current') if mibBuilder.loadTexts: clientMessageDelayTime.setDescription('This field specifies how long, in seconds, the notice Web page is displayed to the client when the topology changes as a result of a role change. The notice Web page indicates that authentication was successful and that the user must close all browser windows and then restart the browser for access to the network. Currently this is supported for Internal Captive Portal, Guest Portal, and Guest Splash. ') radiusAccounting = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 9, 3), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disable", 0), ("enable", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: radiusAccounting.setStatus('current') if mibBuilder.loadTexts: radiusAccounting.setDescription('This field enables or disables RADIUS accounting. Disabling RADIUS accounting overrides the RADIUS accounting settings of individual WLAN Services. Enabling RADIUS accounting activates RADIUS accounting only in WLAN Services specifically configured to perform it.') serverUsageModel = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 9, 4), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("roundRobin", 0), ("primaryBackup", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: serverUsageModel.setStatus('current') if mibBuilder.loadTexts: serverUsageModel.setDescription('This field specifies RADIUS server failover behavior when the primary server goes down. When the primary server is down the controller moves on to the secondary or tertiary configured RADIUS Servers. If this field is set to primaryBackup(1), then the controller starts polling the primary RADIUS server to see if it is up. When the primary RADIUS server comes back, the controller automatically starts sending new access requests to the primary RADIUS server but pending requests continue with backup RADIUS server. The administrator can select between the two strategies, i.e. the existing roundRobin(0) or new primaryBackup(1). This only applies to Authentication, not to Accounting.') radacctStartOnIPAddr = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 9, 5), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disable", 0), ("enable", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: radacctStartOnIPAddr.setStatus('current') if mibBuilder.loadTexts: radacctStartOnIPAddr.setDescription("When this OID is set to disabled (0) the controller sends a RADIUS accounting start message as soon as it receives an Access-Accept for the user from a RADIUS server. When this OID is set to enabled(1) the controller defers sending the RADIUS accounting start message until an Access-Accept for the client is received and the client's IP address is known.") clientServiceTypeLogin = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 9, 6), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disable", 0), ("enable", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: clientServiceTypeLogin.setStatus('current') if mibBuilder.loadTexts: clientServiceTypeLogin.setDescription("When this OID is set to enabled(1) the controller sets the Service-Type attribute of a station's Access-Request to 'Login'. When this OID is set to disabled(0) the controller sets the Service-Type attribute of a station's Access-Request to 'Framed'. By default this OID is set to 'disabled'. You cannot use RADIUS servers to authenticate administrators for local server access when this OID is set to 'enabled'.") applyMacAddressFormat = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 9, 7), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disable", 0), ("enable", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: applyMacAddressFormat.setStatus('current') if mibBuilder.loadTexts: applyMacAddressFormat.setDescription('When this OID is set to enabled(1), the controller uses MAC-Based Authentication MAC address format (refer to radiusMacAddressFormatOption) for user authentication and accounting via RADIUS.') radiusExtnsSetting = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 10)) radiusExtnsSettingTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 10, 1), ) if mibBuilder.loadTexts: radiusExtnsSettingTable.setStatus('current') if mibBuilder.loadTexts: radiusExtnsSettingTable.setDescription('List of RADIUS servers that will be used. ') radiusExtnsSettingEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 10, 1, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "radiusExtnsIndex")) if mibBuilder.loadTexts: radiusExtnsSettingEntry.setStatus('current') if mibBuilder.loadTexts: radiusExtnsSettingEntry.setDescription('An entry for each RADIUS server.') radiusExtnsIndex = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 10, 1, 1, 1), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 2147483647))) if mibBuilder.loadTexts: radiusExtnsIndex.setStatus('current') if mibBuilder.loadTexts: radiusExtnsIndex.setDescription('A number uniquely identifying each conceptual row in the radiusExtnsSettingTable. This value also equivalent to etsysRadiusAuthServerIndex of enterasys-radius-auth-client-mib.txt file.') pollingMechanism = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 10, 1, 1, 2), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("authorizeAsActualUser", 0), ("useRFC5997StatusServerRequest", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: pollingMechanism.setStatus('current') if mibBuilder.loadTexts: pollingMechanism.setDescription("This field specifies the method to determine the health of the RADIUS server. If set to useRFC5997StatusServerRequest(1), RFC 5997 Status-Server packets will be sent to the primary server to determine it's health. If set to authorizeAsActualUser(0), access-request messages for a specified user account will be sent to the primary server to determine it's health.") serverPollingInterval = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 10, 1, 1, 3), Integer32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: serverPollingInterval.setStatus('current') if mibBuilder.loadTexts: serverPollingInterval.setDescription('Interval in seconds for the controller to poll the primary server.') netflowAndMirrorN = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 11)) netflowDestinationIP = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 11, 1), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: netflowDestinationIP.setStatus('current') if mibBuilder.loadTexts: netflowDestinationIP.setDescription('The IP address for the Purview engine that will receive netflow records.') netflowInterval = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 11, 2), Integer32().subtype(subtypeSpec=ValueRangeConstraint(30, 360)).clone(60)).setMaxAccess("readwrite") if mibBuilder.loadTexts: netflowInterval.setStatus('current') if mibBuilder.loadTexts: netflowInterval.setDescription('The netflow record sending interval.') mirrorFirstN = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 11, 3), Integer32().clone(15)).setMaxAccess("readwrite") if mibBuilder.loadTexts: mirrorFirstN.setStatus('current') if mibBuilder.loadTexts: mirrorFirstN.setDescription('If non-zero, the first N packets of a particular flow will be mirrored. If 0, all packets will be mirrored.') mirrorL2Ports = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 11, 4), OctetString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: mirrorL2Ports.setStatus('current') if mibBuilder.loadTexts: mirrorL2Ports.setDescription('Configure the mirror port(s) on the controller. The default value is None. Only l2ports will be allowed to be selected and only when not referred to elsewhere (lag, topologies). The most significant bit of the most significant octet represents the first esa port (esa0). The second most significant bit of the most significant octet represents the second esa port (esa1) and so on.') radiusMacAddressFormatOption = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 12), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4, 5, 6, 7, 9, 10, 11, 12))).clone(namedValues=NamedValues(("option1", 1), ("option2", 2), ("option3", 3), ("option4", 4), ("option5", 5), ("option6", 6), ("option7", 7), ("option8", 9), ("option10", 10), ("option11", 11), ("option12", 12)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: radiusMacAddressFormatOption.setStatus('current') if mibBuilder.loadTexts: radiusMacAddressFormatOption.setDescription('The controller allows configuring different kinds of Mac address format in RADIUS messages. option1: mac address format as XXXXXXXXXXXX option2: mac address format as XX:XX:XX:XX:XX:XX option3: mac address format as XX-XX-XX-XX-XX-XX option4: mac address format as XXXX.XXXX.XXXX option5: mac address format as XXXXXX-XXXXXX option6: mac address format as XX XX XX XX XX XX option7: mac address format as xxxxxxxxxxxx option8: mac address format as xx:xx:xx:xx:xx:xx option9: mac address format as xx-xx-xx-xx-xx-xx option10: mac address format as xxxx.xxxx.xxxx option11: mac address format as xxxxxx-xxxxxx option12: mac address format as xx xx xx xx xx xx') wlan = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4)) wlanMaxEntries = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 1), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: wlanMaxEntries.setStatus('current') if mibBuilder.loadTexts: wlanMaxEntries.setDescription('Maximum number of WLAN supported by the device.') wlanNumEntries = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 2), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: wlanNumEntries.setStatus('current') if mibBuilder.loadTexts: wlanNumEntries.setDescription('The current number of entries in the wlanTable.') wlanTableNextAvailableIndex = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 3), Integer32()).setMaxAccess("readonly") if mibBuilder.loadTexts: wlanTableNextAvailableIndex.setStatus('current') if mibBuilder.loadTexts: wlanTableNextAvailableIndex.setDescription('This object indicates numerically lowest available index within this entity, which may be used for the value of index in the creation of new entry in wlanTable. An index is considered available if the index falls within the range of 1 to wlanMaxEntries and it is not being used to index an existing entry in the wlanTable contained this entity. This value should only be used as guideline for the management application and there is no requirement on the management application to create entries based upon this index value. Value of zero indicates there is no more room for new wlanTable creation.') wlanTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4), ) if mibBuilder.loadTexts: wlanTable.setStatus('current') if mibBuilder.loadTexts: wlanTable.setDescription('Table of configured WLAN. ') wlanEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "wlanID")) if mibBuilder.loadTexts: wlanEntry.setStatus('current') if mibBuilder.loadTexts: wlanEntry.setDescription('An entry for each WLAN.') wlanID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 1), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: wlanID.setStatus('current') if mibBuilder.loadTexts: wlanID.setDescription('Unique internal ID associated with WLAN.') wlanRowStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 2), RowStatus()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRowStatus.setStatus('current') if mibBuilder.loadTexts: wlanRowStatus.setDescription("This object allows dynamic creation and deletion of entries within wlanTable as well as activation and deactivation of these entries. For row creation, EWC only supports creatAndWait. WLAN name must be set before making the row active and persistent. Any WLAN that is associated to a VNS cannot be deleted unless it is first disassociated from VNS before being deleted. Any inactive entry will not be persistent and it will be lost during controller's restart.") wlanServiceType = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 3), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 3, 4, 5, 6))).clone(namedValues=NamedValues(("standard", 0), ("wds", 3), ("thirdParty", 4), ("remote", 5), ("mesh", 6))).clone('standard')).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanServiceType.setStatus('current') if mibBuilder.loadTexts: wlanServiceType.setDescription('Service type of WLAN.') wlanName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 4), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanName.setStatus('current') if mibBuilder.loadTexts: wlanName.setDescription('Text string uniquely identifying WLAN within EWC. Allowable characters for this field are from the set of A-Z, a-z, -!#$:, 0-9, and space. Howerver, it is recommended to avoid leading and trailing spaces.') wlanSSID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 5), DisplayString().subtype(subtypeSpec=ValueSizeConstraint(1, 32))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanSSID.setStatus('current') if mibBuilder.loadTexts: wlanSSID.setDescription('SSID (broadcast string) associated with WLAN. Allowable characters for this field are from the set of A-Z, a-z, _-.@, 0-9, and space. Howerver, it is recommendedto avoid leading and trailing spaces.') wlanSynchronize = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 6), TruthValue().clone(1)).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanSynchronize.setStatus('current') if mibBuilder.loadTexts: wlanSynchronize.setDescription('If it is set to true, then WLAN will be replicated to peer controller if availability is configured and enabled.') wlanEnabled = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 7), TruthValue().clone(1)).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanEnabled.setStatus('current') if mibBuilder.loadTexts: wlanEnabled.setDescription('This field is used to enable or disable this WLAN. If WLAN is disabled, then no traffic will be passed on behalf of this WLAN.') wlanDefaultTopologyID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 8), Integer32().subtype(subtypeSpec=ConstraintsUnion(ValueRangeConstraint(-1, -1), ValueRangeConstraint(0, 65535), ))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanDefaultTopologyID.setStatus('current') if mibBuilder.loadTexts: wlanDefaultTopologyID.setDescription('The ID of topology from topologyTable associated to this WLAN. Topology ID of -1 means no default topology is associated to this WLAN. Physical topologies cannot be assigned to WLAN. The default topology indicates which topology to use for this WLAN if there is no topology associated with VNS via policy assignment.') wlanSessionTimeout = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 9), Unsigned32()).setUnits('minute').setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanSessionTimeout.setStatus('current') if mibBuilder.loadTexts: wlanSessionTimeout.setDescription('MU session that is associated to this WLAN will be terminated after elapse of this number of minutes from the start of its current session.') wlanIdleTimeoutPreAuth = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 10), Unsigned32().clone(5)).setUnits('minute').setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanIdleTimeoutPreAuth.setStatus('current') if mibBuilder.loadTexts: wlanIdleTimeoutPreAuth.setDescription('Elapse time between association and authentication after which MU session will be terminated if the user is idle this amount of time without being authenticated.') wlanIdleSessionPostAuth = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 11), Unsigned32().clone(30)).setUnits('minute').setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanIdleSessionPostAuth.setStatus('current') if mibBuilder.loadTexts: wlanIdleSessionPostAuth.setDescription('MU session that is associated to this WLAN will be terminated if the user is idle this amount of time after being authenticated.') wlanSupressSSID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 12), TruthValue().clone(2)).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanSupressSSID.setStatus('current') if mibBuilder.loadTexts: wlanSupressSSID.setDescription('If it is set to true then broadcast string (SSID) for this WLAN will not be broadcasted over the air.') wlanDot11hSupport = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 13), TruthValue().clone(2)).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanDot11hSupport.setStatus('current') if mibBuilder.loadTexts: wlanDot11hSupport.setDescription('If it is set to true then dot11h support is enabled for clients associated to this WLAN.') wlanDot11hClientPowerReduction = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 14), TruthValue().clone(2)).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanDot11hClientPowerReduction.setStatus('current') if mibBuilder.loadTexts: wlanDot11hClientPowerReduction.setDescription('If it is set to true then apply power reduction to dot11h clients associated to this WLAN. This field has meaning if wlanDot11hSupport is enabled (set to true).') wlanProcessClientIE = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 15), TruthValue().clone(2)).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanProcessClientIE.setStatus('current') if mibBuilder.loadTexts: wlanProcessClientIE.setDescription('If it is set to true then clients that are associated to this WLAN their IE requests will be processed.') wlanEngerySaveMode = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 16), TruthValue().clone(2)).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanEngerySaveMode.setStatus('current') if mibBuilder.loadTexts: wlanEngerySaveMode.setDescription('If it is set to true then engergy saving mode is enabled.') wlanBlockMuToMuTraffic = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 17), TruthValue().clone(2)).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanBlockMuToMuTraffic.setStatus('current') if mibBuilder.loadTexts: wlanBlockMuToMuTraffic.setDescription('If it is set to true then two MU associated to this WLAN cannot communicate with each other.') wlanRemoteable = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 18), TruthValue().clone(2)).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRemoteable.setStatus('current') if mibBuilder.loadTexts: wlanRemoteable.setDescription('If it is set to true then this WLAN can be used as remote WLAN within mobility zone that this controller is partaking.') wlanVNSID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 19), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: wlanVNSID.setStatus('current') if mibBuilder.loadTexts: wlanVNSID.setDescription('The ID of the VNS that uses this WLAN. WLAN can be created but not used in any VNS, in that case alue of zero indicates WLAN has not been used in any VNS. The value of this field set during VNS creation no during the WLAN creation. ') wlanRadioManagement11k = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 20), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disable", 0), ("enable", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadioManagement11k.setStatus('current') if mibBuilder.loadTexts: wlanRadioManagement11k.setDescription('When this bit is set to enable, the Radio Management (802.11k) feature is enabled on those APs who have this wlan configuration and 802.11k capability. ') wlanBeaconReport = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 21), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disable", 0), ("enable", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanBeaconReport.setStatus('current') if mibBuilder.loadTexts: wlanBeaconReport.setDescription('Enable/disable AP to send out beacon report. This field is configurable only if wlanRadioManagement11k is set to enable(1).') wlanQuietIE = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 22), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disable", 0), ("enable", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanQuietIE.setStatus('current') if mibBuilder.loadTexts: wlanQuietIE.setDescription('Enable/disable AP to advertise a Quiet Element. This field is configurable only if wlanRadioManagement11k is set to enable(1).') wlanMirrorN = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 23), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2))).clone(namedValues=NamedValues(("prohibited", 0), ("bothDirection", 1), ("rxDirectionOnly", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanMirrorN.setStatus('current') if mibBuilder.loadTexts: wlanMirrorN.setDescription("prohibited(0): Mirroring is prohibited. bothDirection(1) : Both direction packets will be mirrored. rxDirectionOnly(2): Only receive direction packets will be mirrored. Note: This will only take effect when the user's runtime current Roles's MirrorN action is None. ") wlanNetFlow = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 24), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disable", 0), ("enable", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanNetFlow.setStatus('current') if mibBuilder.loadTexts: wlanNetFlow.setDescription('Enable/disable netflow on this WLAN service.') wlanAppVisibility = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 25), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("enable", 1), ("disable", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanAppVisibility.setStatus('current') if mibBuilder.loadTexts: wlanAppVisibility.setDescription('Enable/disable both application visibility and control for this WLAN service.') wlanStatsTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 5), ) if mibBuilder.loadTexts: wlanStatsTable.setStatus('current') if mibBuilder.loadTexts: wlanStatsTable.setDescription('Stats related to WLAN (RFS) created on EWC.') wlanStatsEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 5, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "wlanStatsID")) if mibBuilder.loadTexts: wlanStatsEntry.setStatus('current') if mibBuilder.loadTexts: wlanStatsEntry.setDescription('An entery for each existing WLAN on EWC.') wlanStatsID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 5, 1, 1), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: wlanStatsID.setStatus('current') if mibBuilder.loadTexts: wlanStatsID.setDescription('Unique internal ID associated with WLAN.') wlanStatsAssociatedClients = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 5, 1, 2), Counter32()).setMaxAccess("readonly") if mibBuilder.loadTexts: wlanStatsAssociatedClients.setStatus('current') if mibBuilder.loadTexts: wlanStatsAssociatedClients.setDescription('Number of clients that are currently associated to this WLAN. ') wlanStatsRadiusTotRequests = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 5, 1, 3), Counter32()).setMaxAccess("readonly") if mibBuilder.loadTexts: wlanStatsRadiusTotRequests.setStatus('current') if mibBuilder.loadTexts: wlanStatsRadiusTotRequests.setDescription("Number of requests that were sent to RADIUS servers associated to this WLAN on behalf of MUs' requests using SSID associated to the WLAN for association, authentication or authorization to this WLAN.") wlanStatsRadiusReqFailed = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 5, 1, 4), Counter32()).setMaxAccess("readonly") if mibBuilder.loadTexts: wlanStatsRadiusReqFailed.setStatus('current') if mibBuilder.loadTexts: wlanStatsRadiusReqFailed.setDescription("Number of requests that were sent to RADIUS servers associated to this WLAN on behalf of MUs' requests for association, authentication or authorization to this WLAN but failed to be processed by RADIUS servers.") wlanStatsRadiusReqRejected = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 5, 1, 5), Counter32()).setMaxAccess("readonly") if mibBuilder.loadTexts: wlanStatsRadiusReqRejected.setStatus('current') if mibBuilder.loadTexts: wlanStatsRadiusReqRejected.setDescription("Number of requests that were sent to RADIUS servers associated to this WLAN on behalf of MUs' requests for association, authentication or authorization to this WLAN but rejected to be processed by RADIUS servers.") wlanPrivTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6), ) if mibBuilder.loadTexts: wlanPrivTable.setStatus('current') if mibBuilder.loadTexts: wlanPrivTable.setDescription('This table contains configuration of privacy settings for all configured WLAN on EWC. For each of the configured WLAN on the controller one entry is added to this table. Addition/deletion of entries in this table are automatic depending on the addition or deletion of entries in wlanTable table.') wlanPrivEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "wlanID")) if mibBuilder.loadTexts: wlanPrivEntry.setStatus('current') if mibBuilder.loadTexts: wlanPrivEntry.setDescription('An entry in wlanPrivTable for each configured WLAN on EWC. Each entry is indexed with corresponding wlan ID of wlanTable. The writable fields in this table can be modified depending on the corresponding wlanTable.') wlanPrivPrivacyType = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1, 1), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3, 4))).clone(namedValues=NamedValues(("none", 0), ("staticWEP", 1), ("dynamicWEP", 2), ("wpa", 3), ("wpaPSK", 4)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanPrivPrivacyType.setStatus('current') if mibBuilder.loadTexts: wlanPrivPrivacyType.setDescription('Type of privacy applied to the corresponding configured WLAN. Configuration of the other fields in this table depends on the value of this field, e.g. if this field is set to none(0), then no other field in this table are settable. ') wlanPrivWEPKeyIndex = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1, 2), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 4))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanPrivWEPKeyIndex.setStatus('current') if mibBuilder.loadTexts: wlanPrivWEPKeyIndex.setDescription('Index of configured WEP. This field is required if and only if privacy type is staticWEP(1).') wlanPrivWEPKeyLength = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1, 3), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3))).clone(namedValues=NamedValues(("sixtyFourBits", 1), ("oneHundred28Bits", 2), ("oneHundred52Bits", 3)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanPrivWEPKeyLength.setStatus('current') if mibBuilder.loadTexts: wlanPrivWEPKeyLength.setDescription('Key legnth for the configured WEP key. This field is required if and only if privacy type is staticWEP(1).') wlanPrivWEPKey = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1, 4), DisplayString().subtype(subtypeSpec=ValueSizeConstraint(8, 19))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanPrivWEPKey.setStatus('current') if mibBuilder.loadTexts: wlanPrivWEPKey.setDescription('The configured WEP key length must match the wlanPrivWEPKeyLength field. Any key with length longer or shorter than that length will be rejected. This field is required if and only if privacy type is staticWEP(1). This key can only be viewed in SNMPv3 mode with privacy.') wlanPrivWPAv1EncryptionType = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1, 5), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2))).clone(namedValues=NamedValues(("undefined", 0), ("tkipOnly", 1), ("auto", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanPrivWPAv1EncryptionType.setStatus('current') if mibBuilder.loadTexts: wlanPrivWPAv1EncryptionType.setDescription('The type of encryption used for WPA version 1 associations. This OID is undefined unless wlanPrivPrivacyType is wpa (3) or wpaPSK (4) and wlanPrivWPAversion is set to wpaV1 (1) or wpaV1andV2 (3).') wlanPrivWPAv2EncryptionType = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1, 6), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 2, 3))).clone(namedValues=NamedValues(("undefined", 0), ("auto", 2), ("aesOnly", 3)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanPrivWPAv2EncryptionType.setStatus('current') if mibBuilder.loadTexts: wlanPrivWPAv2EncryptionType.setDescription('The type of encryption used for WPA version 2 associations. This OID is undefined unless wlanPrivPrivacyType is wpa (3) or wpaPSK (4) and wlanPrivWPAversion is set to wpaV2 (2) or wpaV1 and V2 (3).') wlanPrivKeyManagement = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1, 7), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3))).clone(namedValues=NamedValues(("none", 0), ("opportunisticKey", 1), ("preAuthentication", 2), ("both", 3)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanPrivKeyManagement.setStatus('current') if mibBuilder.loadTexts: wlanPrivKeyManagement.setDescription('Key management option available for the WPA2. This field has meaning if privacy type is WPA with WPA2 option enabled. This field can be modified only if wlanPrivPrivacyType is set to wpa(3) and wlanPrivWPAversion set to wpaV2(2) or wpaV1andV2(3). .') wlanPrivBroadcastRekeying = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1, 8), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanPrivBroadcastRekeying.setStatus('current') if mibBuilder.loadTexts: wlanPrivBroadcastRekeying.setDescription('Broadcast rekeying if this value is set to true. This field can be modified only if wlanPrivPrivacyType is set to wpa(3) or wpaPSK(4).') wlanPrivRekeyInterval = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1, 9), Unsigned32().subtype(subtypeSpec=ValueRangeConstraint(30, 86400)).clone(3600)).setUnits('seconds').setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanPrivRekeyInterval.setStatus('current') if mibBuilder.loadTexts: wlanPrivRekeyInterval.setDescription('Interval in seconds for requesting rekeying. This field has meaning if privacy type is WPA and broadcast rekeying is enabled (wlanPrivBroadcastRekeying is set to true). This field can be modified only if wlanPrivBroadcastRekeying is set to true.') wlanPrivGroupKPSR = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1, 10), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanPrivGroupKPSR.setStatus('current') if mibBuilder.loadTexts: wlanPrivGroupKPSR.setDescription('Group Key Power Save Retry (GKPSR) value for the WPA type of privacy. This field can be modified only if wlanPrivPrivacyType is set to wpa(3) or wpaPSK(4).') wlanPrivWPAPSK = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1, 11), OctetString().subtype(subtypeSpec=ValueSizeConstraint(8, 63))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanPrivWPAPSK.setStatus('current') if mibBuilder.loadTexts: wlanPrivWPAPSK.setDescription('WPA-PSK shared key. This field has meaning if and only if WLAN privacy type is set to WPA-PSK. Input type can be either HEX formatted string or ASCII string. In case of HEX string, it must be 64 octets from set of hex characters. In case of ASCII string, the length is limited between 8 to 63 octets. This key can only be viewed in SNMPv3 mode with privacy. This field can be modified only if wlanPrivPrivacyType is set to wpaPSK(4).') wlanPrivWPAversion = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1, 12), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3))).clone(namedValues=NamedValues(("wpaNone", 0), ("wpaV1", 1), ("wpaV2", 2), ("wpaV1andV2", 3)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanPrivWPAversion.setStatus('current') if mibBuilder.loadTexts: wlanPrivWPAversion.setDescription('Type of wpa version selected. This field can be modified only if wlanPrivPrivacyType is set to wpa(3) or wpaPSK(4). Note: wpa version v1 only is not allowed. 0 - no wpa version selected. 1 - wpa version v1 selected. 2 - wpa version v2 selected. 3 - both wpa version v1 and v2 selected.') wlanPrivfastTransition = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1, 13), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disable", 0), ("enable", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanPrivfastTransition.setStatus('current') if mibBuilder.loadTexts: wlanPrivfastTransition.setDescription('When this field is set to enable(1), the 802.11r (fast transition) is enabled. This field can be modified only if wlanPrivPrivacyType is set to wpa(2).') wlanPrivManagementFrameProtection = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1, 14), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2))).clone(namedValues=NamedValues(("disable", 0), ("enable", 1), ("require", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanPrivManagementFrameProtection.setStatus('current') if mibBuilder.loadTexts: wlanPrivManagementFrameProtection.setDescription('Disable(0) : The AP will not encrypt any management frames. Enable(1): The AP will encrypt management frames for clients who also support this feature. If the clients do not support this feature, they are still able to connect to the AP but with no management frames encryption. Require(2): The AP will only allow clients who have the PMF feature to connect. Supported management frames will be encrypted to 802.11w standards. Clients who do not support this feature will not be able to associate. ') wlanAuthTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7), ) if mibBuilder.loadTexts: wlanAuthTable.setStatus('current') if mibBuilder.loadTexts: wlanAuthTable.setDescription('This table contains configuration of authentication settings for all configured WLAN on EWC. For each of the configured WLAN on the controller one entry is added to this table. Addition/deletion of entries in this table are automatic depending on the addition/deletion of entries in wlanTable table.') wlanAuthEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "wlanID")) if mibBuilder.loadTexts: wlanAuthEntry.setStatus('current') if mibBuilder.loadTexts: wlanAuthEntry.setDescription('An entry in wlanAuthTable for each configured WLAN on EWC. Each entry is indexed with corresponding wlan ID of wlanTable. The writable fields in this table can be modified depending on the corresponding wlanTable. Note: All the fields in this table except wlanAuthType and wlanAuthCollectAcctInformation have meaning if MAC-based authentication filed (wlanAuthMacBasedAuth) is set to true. ') wlanAuthType = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 1), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4, 5, 6, 7))).clone(namedValues=NamedValues(("disabled", 1), ("internalCP", 2), ("dot1x", 3), ("externalCP", 4), ("easyGuestCP", 5), ("guestSplash", 6), ("firewallFriendlyExCP", 7)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanAuthType.setStatus('current') if mibBuilder.loadTexts: wlanAuthType.setDescription('The type of authentication applied to stations attempting to associate to a BSSID belonging to this WLAN Service. If the dot1x type is selected, then this WLAN must have privacy. When the dot1x or internalCP is selected, the controller must have a RADIUS server, and SNMP will auto assign one RADIUS server to this WLAN if the user did not assign one.') wlanAuthMacBasedAuth = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 2), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanAuthMacBasedAuth.setStatus('current') if mibBuilder.loadTexts: wlanAuthMacBasedAuth.setDescription('MAC based authorization is enabled if this field is set to true. When this field set to true, SNMP will auto configure one RADIUS server to enable MAC authorization. ') wlanAuthMACBasedAuthOnRoam = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 3), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanAuthMACBasedAuthOnRoam.setStatus('current') if mibBuilder.loadTexts: wlanAuthMACBasedAuthOnRoam.setDescription('If it is set to true, the client will be forced to go through MAC based authorization when the client roamed. This field has meaning only when wlanAuthMacBasedAuth is set to true. This field can be modified only when wlanAuthMacBasedAuth is set to true. ') wlanAuthAutoAuthAuthorizedUser = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 4), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanAuthAutoAuthAuthorizedUser.setStatus('current') if mibBuilder.loadTexts: wlanAuthAutoAuthAuthorizedUser.setDescription('All authorized users will be considered authenticated automatically. This field has meaning only when wlanAuthMacBasedAuth is set to true. This field can be modified only when wlanAuthMacBasedAuth is set to true.') wlanAuthAllowUnauthorizedUser = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 5), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanAuthAllowUnauthorizedUser.setStatus('current') if mibBuilder.loadTexts: wlanAuthAllowUnauthorizedUser.setDescription('Unauthorized users will be allowed if this field is set to true.This field has meaning only when wlanAuthMacBasedAuth is set to true. This field can be modified only when wlanAuthMacBasedAuth is set to true.') wlanAuthRadiusIncludeAP = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 6), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanAuthRadiusIncludeAP.setStatus('current') if mibBuilder.loadTexts: wlanAuthRadiusIncludeAP.setDescription('AP serial number will be included in RADIUS request packet as VSA if this field is set to true.') wlanAuthRadiusIncludeVNS = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 7), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanAuthRadiusIncludeVNS.setStatus('current') if mibBuilder.loadTexts: wlanAuthRadiusIncludeVNS.setDescription('VNS name will be included in RADIUS request packet as VSA if this field is set to true.') wlanAuthRadiusIncludeSSID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 8), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanAuthRadiusIncludeSSID.setStatus('current') if mibBuilder.loadTexts: wlanAuthRadiusIncludeSSID.setDescription('WLAN SSID will be included in RADIUS request packet as VSA if this field is set to true.') wlanAuthRadiusIncludePolicy = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 9), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanAuthRadiusIncludePolicy.setStatus('current') if mibBuilder.loadTexts: wlanAuthRadiusIncludePolicy.setDescription('Policy name will be included in RADIUS request packet as VSA if this field is set to true.') wlanAuthRadiusIncludeTopology = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 10), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanAuthRadiusIncludeTopology.setStatus('current') if mibBuilder.loadTexts: wlanAuthRadiusIncludeTopology.setDescription('Topology name will be included in RADIUS request packet as VSA if this field is set to true.') wlanAuthRadiusIncludeIngressRC = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 11), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanAuthRadiusIncludeIngressRC.setStatus('current') if mibBuilder.loadTexts: wlanAuthRadiusIncludeIngressRC.setDescription('Ingress rate control name will be included in RADIUS request packet as VSA if this field is set to true.') wlanAuthRadiusIncludeEgressRC = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 12), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanAuthRadiusIncludeEgressRC.setStatus('current') if mibBuilder.loadTexts: wlanAuthRadiusIncludeEgressRC.setDescription('Egress rate control name will be included in RADIUS request packet as VSA if this field is set to true.') wlanAuthCollectAcctInformation = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 13), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanAuthCollectAcctInformation.setStatus('current') if mibBuilder.loadTexts: wlanAuthCollectAcctInformation.setDescription('Accounting information is collected for clients if this field is set to true.') wlanAuthReplaceCalledStationIDWithZone = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 14), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanAuthReplaceCalledStationIDWithZone.setStatus('current') if mibBuilder.loadTexts: wlanAuthReplaceCalledStationIDWithZone.setDescription('Replace called station ID with Zone if this field is set to true.') wlanAuthRadiusAcctAfterMacBaseAuthorization = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 15), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanAuthRadiusAcctAfterMacBaseAuthorization.setStatus('current') if mibBuilder.loadTexts: wlanAuthRadiusAcctAfterMacBaseAuthorization.setDescription('RADIUS accounting begins after MAC-based authorization completes if this field is set to true. This field has meaning only when wlanAuthMacBasedAuth is set to true. This field can be modified only when wlanAuthMacBasedAuth is set to true.') wlanAuthRadiusTimeoutRole = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 16), Integer32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanAuthRadiusTimeoutRole.setStatus('current') if mibBuilder.loadTexts: wlanAuthRadiusTimeoutRole.setDescription("Apply this role to clients when the RADIUS server timed out. '-1' is treat like access reject. Any other number is the Role ID. This field has meaning only when wlanAuthMacBasedAuth is set to true. This field can be modified only when wlanAuthMacBasedAuth is set to true.") wlanAuthRadiusOperatorNameSpace = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 17), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(-1, 48, 49, 50, 51))).clone(namedValues=NamedValues(("disabled", -1), ("tadig", 48), ("realm", 49), ("e212", 50), ("icc", 51)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanAuthRadiusOperatorNameSpace.setStatus('current') if mibBuilder.loadTexts: wlanAuthRadiusOperatorNameSpace.setDescription('wlanAuthRadiusOperatorNameSpace is the Namespace ID as defined in RFC 5580. The value within this field contains the operator namespace identifier. The Namespace ID value is encoded in ASCII and has the following values. -1 : disabled. 48 : TADIG. 49 : REALM. 50 : E212. 51 : ICC. ') wlanAuthRadiusOperatorName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 18), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanAuthRadiusOperatorName.setStatus('current') if mibBuilder.loadTexts: wlanAuthRadiusOperatorName.setDescription('RADIUS accounting message will include this string when the wlanAuthRadiusOperatorNameSpace is not set to -1.') wlanAuthMACBasedAuthReAuthOnAreaRoam = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 19), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanAuthMACBasedAuthReAuthOnAreaRoam.setStatus('current') if mibBuilder.loadTexts: wlanAuthMACBasedAuthReAuthOnAreaRoam.setDescription('If this field is set to true, the client will be forced to go through MAC based authorization when the client roams to another area. This field has meaning and can be modified only when wlanAuthMacBasedAuth is set to true. ') wlanRadiusTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 8), ) if mibBuilder.loadTexts: wlanRadiusTable.setStatus('current') if mibBuilder.loadTexts: wlanRadiusTable.setDescription('This table contains configuration of RADIUS settings for all configured WLAN on EWC. For each of the configured WLAN on the controller there may exist one or more entries of RADIUS server(s) serving the WLAN. Addition/deletion of entries in this table are automatic depending on the addition/deletion of entries in wlanTable table.') wlanRadiusEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 8, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "wlanID"), (0, "HIPATH-WIRELESS-HWC-MIB", "wlanRadiusIndex")) if mibBuilder.loadTexts: wlanRadiusEntry.setStatus('current') if mibBuilder.loadTexts: wlanRadiusEntry.setDescription('An entry in wlanRadiusTable for each RADIUS server used by the WLAN indexed by wlanID.') wlanRadiusIndex = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 8, 1, 1), Unsigned32()) if mibBuilder.loadTexts: wlanRadiusIndex.setStatus('current') if mibBuilder.loadTexts: wlanRadiusIndex.setDescription('Internally generated index and it has no external meaning.') wlanRadiusName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 8, 1, 2), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusName.setStatus('current') if mibBuilder.loadTexts: wlanRadiusName.setDescription('Name of the RADIUS server associated to this entry.') wlanRadiusUsage = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 8, 1, 3), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3))).clone(namedValues=NamedValues(("auth", 1), ("mac", 2), ("acc", 3)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusUsage.setStatus('current') if mibBuilder.loadTexts: wlanRadiusUsage.setDescription('Usage type associated to this entry for authentication.') wlanRadiusPriority = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 8, 1, 4), Integer32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusPriority.setStatus('current') if mibBuilder.loadTexts: wlanRadiusPriority.setDescription('Priority associated to this entry for authentication. RADIUS servers are contacted for authentication requests in the order of their priority defined in this field. The highest priority servers (priorities with lower numerical values have higher priority order) are consulted first for any authentication request.') wlanRadiusPort = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 8, 1, 5), Unsigned32().clone(1812)).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusPort.setStatus('current') if mibBuilder.loadTexts: wlanRadiusPort.setDescription('The RADIUS authentication requests should be sent to this authentication port.') wlanRadiusRetries = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 8, 1, 6), Unsigned32().subtype(subtypeSpec=ValueRangeConstraint(1, 32)).clone(3)).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusRetries.setStatus('current') if mibBuilder.loadTexts: wlanRadiusRetries.setDescription('Maximum number of retries attempted for an specific authentication request.') wlanRadiusTimeout = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 8, 1, 7), Unsigned32().subtype(subtypeSpec=ValueRangeConstraint(1, 360)).clone(5)).setUnits('seconds').setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusTimeout.setStatus('current') if mibBuilder.loadTexts: wlanRadiusTimeout.setDescription('Number of seconds to wait for a response from authentication server for each request sent to the server before considering the request as failure.') wlanRadiusNASUseVnsIP = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 8, 1, 8), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusNASUseVnsIP.setStatus('current') if mibBuilder.loadTexts: wlanRadiusNASUseVnsIP.setDescription('If this value is set to true, then VNS IP address associated to the WLAN indexed by wlanID to this entry is used as NAS IP address. Otherwise NAS IP address should be configured manually.') wlanRadiusNASIP = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 8, 1, 9), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusNASIP.setStatus('current') if mibBuilder.loadTexts: wlanRadiusNASIP.setDescription('NAS IP associated to this RADIUS server. Configuration of this field is directly affected by the value of wlanRadiusNASUseVnsIP.') wlanRadiusNASIDUseVNSName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 8, 1, 10), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusNASIDUseVNSName.setStatus('current') if mibBuilder.loadTexts: wlanRadiusNASIDUseVNSName.setDescription('If this value is set to true, then use VNS name associated to the WLAN indexed by wlanID for this entry as NAS ID. Otherwise NAS ID should be configured manually.') wlanRadiusNASID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 8, 1, 11), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusNASID.setStatus('current') if mibBuilder.loadTexts: wlanRadiusNASID.setDescription('NAS ID associated to this RADIUS server. Configuration of this field is directly affected by the value of wlanRadiusNASIDUseVNSName.') wlanRadiusAuthType = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 8, 1, 12), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3))).clone(namedValues=NamedValues(("pap", 0), ("chap", 1), ("mschap", 2), ("mschap2", 3))).clone('pap')).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusAuthType.setStatus('current') if mibBuilder.loadTexts: wlanRadiusAuthType.setDescription('Authentication type used for this WLAN when using this RADIUS server to authenticate users.') wlanCPTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9), ) if mibBuilder.loadTexts: wlanCPTable.setStatus('current') if mibBuilder.loadTexts: wlanCPTable.setDescription('This table contains configuration of Captive Portal settings for all configured WLAN on EWC. For each of the configured WLAN on the controller one entry is added to this table. Addition/deletion of entries in this table are automatic depending on the addition/deletion of entries in wlanTable table. This table can be accessed using SNMPv3 on behalf of users with privacy.') wlanCPEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "wlanID")) if mibBuilder.loadTexts: wlanCPEntry.setStatus('current') if mibBuilder.loadTexts: wlanCPEntry.setDescription("An entry in wlanCPTable for each configured WLAN on EWC. Each entry is indexed with corresponding wlan ID of wlanTable. The writable fields in this table can be modified depending on the corresponding wlanTable and type of CP assigned to the WLAN. If the authentication type is 'disabled(0)' for the WLAN, then all other entries in this table have no meaning.") wlanCPAuthType = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 1), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4, 5, 6, 7))).clone(namedValues=NamedValues(("disabled", 1), ("internalCP", 2), ("dot1x", 3), ("externalCP", 4), ("easyGuestCP", 5), ("guestSplash", 6), ("firewallFriendlyExCP", 7)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanCPAuthType.setStatus('current') if mibBuilder.loadTexts: wlanCPAuthType.setDescription('Type of authentication applied to MU requesting association using SSID associated to this WLAN.') wlanCP802HttpRedirect = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 2), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanCP802HttpRedirect.setStatus('current') if mibBuilder.loadTexts: wlanCP802HttpRedirect.setDescription("If it is set to true, then CP will be redirected to configured CP. This value has meaning only for CP of the type 'dot1x(3)'.") wlanCPExtConnection = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 3), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanCPExtConnection.setStatus('current') if mibBuilder.loadTexts: wlanCPExtConnection.setDescription('IP address of the interface for this CP.') wlanCPExtPort = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 4), Unsigned32().subtype(subtypeSpec=ValueRangeConstraint(32768, 65535))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanCPExtPort.setStatus('current') if mibBuilder.loadTexts: wlanCPExtPort.setDescription('The port associated to the CP IP address.') wlanCPExtEnableHttps = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 5), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanCPExtEnableHttps.setStatus('current') if mibBuilder.loadTexts: wlanCPExtEnableHttps.setDescription('HTTPS support is enabled if this field is set to true.') wlanCPExtEncryption = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 6), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2))).clone(namedValues=NamedValues(("none", 0), ("legacy", 1), ("aes", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanCPExtEncryption.setStatus('current') if mibBuilder.loadTexts: wlanCPExtEncryption.setDescription('Type of encryption for the CP.') wlanCPExtSharedSecret = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 7), OctetString().subtype(subtypeSpec=ValueSizeConstraint(16, 64))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanCPExtSharedSecret.setStatus('current') if mibBuilder.loadTexts: wlanCPExtSharedSecret.setDescription('Shared secret used for this captive portal.') wlanCPExtTosOverride = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 8), TruthValue().clone('false')).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanCPExtTosOverride.setStatus('current') if mibBuilder.loadTexts: wlanCPExtTosOverride.setDescription('Override ToS of NAC server usage only.') wlanCPExtTosValue = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 9), Unsigned32().subtype(subtypeSpec=ValueRangeConstraint(0, 255))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanCPExtTosValue.setStatus('deprecated') if mibBuilder.loadTexts: wlanCPExtTosValue.setDescription('ToS value for NAC server only.') wlanCPExtAddIPtoURL = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 10), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanCPExtAddIPtoURL.setStatus('current') if mibBuilder.loadTexts: wlanCPExtAddIPtoURL.setDescription('If this value is set to true, then add EWC IP address and port number to the redirection URL.') wlanCPIntLogoffButton = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 11), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanCPIntLogoffButton.setStatus('current') if mibBuilder.loadTexts: wlanCPIntLogoffButton.setDescription("If set to true provide 'Logoff' button to the user in CP page.") wlanCPIntStatusCheckButton = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 12), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanCPIntStatusCheckButton.setStatus('current') if mibBuilder.loadTexts: wlanCPIntStatusCheckButton.setDescription("If set to true provide 'Status Check' button to the user in CP page.") wlanCPReplaceIPwithFQDN = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 13), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanCPReplaceIPwithFQDN.setStatus('current') if mibBuilder.loadTexts: wlanCPReplaceIPwithFQDN.setDescription('Replace CP gateway IP address with FQDN.') wlanCPSendLoginTo = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 14), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2))).clone(namedValues=NamedValues(("originalDestination", 0), ("cpSessionPage", 1), ("customURL", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanCPSendLoginTo.setStatus('current') if mibBuilder.loadTexts: wlanCPSendLoginTo.setDescription('This field indicates to what URL the successful login session must be redirected. This field qualifies wlanCPRedirectURL.') wlanCPRedirectURL = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 15), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanCPRedirectURL.setStatus('current') if mibBuilder.loadTexts: wlanCPRedirectURL.setDescription('Text string identifying default redirection URL.') wlanCPGuestAccLifetime = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 16), Unsigned32()).setUnits('days').setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanCPGuestAccLifetime.setStatus('current') if mibBuilder.loadTexts: wlanCPGuestAccLifetime.setDescription('This value indicates for how many days the guest account is valid. Value of zero indicates that there is no limit for the guest account.') wlanCPGuestAllowedLifetimeAcct = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 17), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanCPGuestAllowedLifetimeAcct.setStatus('current') if mibBuilder.loadTexts: wlanCPGuestAllowedLifetimeAcct.setDescription('If this value is set to true, then guest admin can obtain lifetime account.') wlanCPGuestSessionLifetime = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 18), Unsigned32()).setUnits('hours').setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanCPGuestSessionLifetime.setStatus('current') if mibBuilder.loadTexts: wlanCPGuestSessionLifetime.setDescription('The guess account session using this CP cannot last longer than this number of hours. Value of zero means there is no limit for the session.') wlanCPGuestIDPrefix = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 19), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanCPGuestIDPrefix.setStatus('current') if mibBuilder.loadTexts: wlanCPGuestIDPrefix.setDescription('The prefix used for guest portal user ID label.') wlanCPGuestMinPassLength = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 20), Unsigned32().subtype(subtypeSpec=ValueRangeConstraint(1, 32)).clone(8)).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanCPGuestMinPassLength.setStatus('current') if mibBuilder.loadTexts: wlanCPGuestMinPassLength.setDescription('Minimum password length for the guest user account associated to this WLAN.') wlanCPGuestMaxConcurrentSession = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 21), Unsigned32().subtype(subtypeSpec=ValueRangeConstraint(0, 10)).clone(8)).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanCPGuestMaxConcurrentSession.setStatus('current') if mibBuilder.loadTexts: wlanCPGuestMaxConcurrentSession.setDescription('Maximum number of the guest users can use this set of credentials to access this concurrent session.') wlanCPUseHTTPSforConnection = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 22), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanCPUseHTTPSforConnection.setStatus('current') if mibBuilder.loadTexts: wlanCPUseHTTPSforConnection.setDescription('When this value set to true, use HTTPS for user connection. It has meaning only when wlanCPAuthType is set to internalCP(2) or easyGuestCP(5) or guestSplash(6) ') wlanCPIdentity = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 23), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanCPIdentity.setStatus('current') if mibBuilder.loadTexts: wlanCPIdentity.setDescription('wlanCPIdentity is used to identify the EWC to the external captive portal server (ECP) and the ECP to the EWC.') wlanCPCustomSpecificURL = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 24), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanCPCustomSpecificURL.setStatus('current') if mibBuilder.loadTexts: wlanCPCustomSpecificURL.setDescription('After a user successfully logs in, the user will be redirected to the URL as defined in the wlanCPCustomSpecificURL.') wlanCPSelectionOption = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 25), Bits().clone(namedValues=NamedValues(("addEWCPortAndIP", 0), ("apNameAndSerial", 1), ("associatedBSSID", 2), ("vnsName", 3), ("userMacAddress", 4), ("currentlyAssignedRole", 5), ("containmentVLAN", 6), ("timeStamp", 7), ("signature", 8), ("ssid", 9)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanCPSelectionOption.setStatus('current') if mibBuilder.loadTexts: wlanCPSelectionOption.setDescription('Append the above parameter(s) to the EWC captive portal redirection URL if one or more of the bits are set. ') wlanUnsecuredWlanCounts = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 10), Counter32()).setMaxAccess("readonly") if mibBuilder.loadTexts: wlanUnsecuredWlanCounts.setStatus('current') if mibBuilder.loadTexts: wlanUnsecuredWlanCounts.setDescription('Total number of WLAN with security issues. The details of security issues can be found in wlanSecurityReportTable.') wlanSecurityReportTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 11), ) if mibBuilder.loadTexts: wlanSecurityReportTable.setStatus('current') if mibBuilder.loadTexts: wlanSecurityReportTable.setDescription('This table contains the weak configuration settings for all configured WLAN on EWC. For each of the configured WLAN on the controller there exist one entry in this table. Addition/deletion of entries in this table are automatic depending on the addition or deletion of entries in wlanTable table. This table can be accessed using SNMPv3 on behalf of users with privacy.') wlanSecurityReportEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 11, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "wlanID")) if mibBuilder.loadTexts: wlanSecurityReportEntry.setStatus('current') if mibBuilder.loadTexts: wlanSecurityReportEntry.setDescription('An entry in wlanSecurityReportTable for each configured WLAN on EWC. Each entry is indexed with corresponding wlan ID of wlanTable.') wlanSecurityReportFlag = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 11, 1, 1), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("unsecureSetting", 1), ("secureSetting", 2)))).setMaxAccess("readonly") if mibBuilder.loadTexts: wlanSecurityReportFlag.setStatus('current') if mibBuilder.loadTexts: wlanSecurityReportFlag.setDescription('Value of secureSetting(2) indicates that WLAN has secure configuration.') wlanSecurityReportUnsecureType = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 11, 1, 2), Bits().clone(namedValues=NamedValues(("open", 0), ("wep", 1), ("tkip", 2), ("defaultSsid", 3), ("hotspotSsid", 4), ("rainbowSsid", 5), ("dictionaryWordKey", 6), ("dictionaryWordSubstring", 7), ("passwordTooShort", 8)))).setMaxAccess("readonly") if mibBuilder.loadTexts: wlanSecurityReportUnsecureType.setStatus('current') if mibBuilder.loadTexts: wlanSecurityReportUnsecureType.setDescription('bit 0: by setting this bit means this WLAN does not use any kind of encryption bit 1: by setting this bit means this WLAN uses weak WEP encryption bit 2: by setting this bit means this WLAN uses weak tkip encryption bit 3: by setting this bit means this WLAN uses default SSID bit 4: by setting this bit means this WLAN uses HotSpot SSID bit 5: by setting this bit means this WLAN uses Rainbow SSID bit 6: by setting this bit means this WLAN uses dictionary word as an encryption key bit 7: by setting this bit means this WLAN uses dictionary word in an encryption key string bit 8: by setting this bit means this WLAN uses a short password key') wlanSecurityReportNotes = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 11, 1, 3), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: wlanSecurityReportNotes.setStatus('current') if mibBuilder.loadTexts: wlanSecurityReportNotes.setDescription('Textual description of any security issues related to the WLAN is reflected in this field.') wlanRadiusServerTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12), ) if mibBuilder.loadTexts: wlanRadiusServerTable.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerTable.setDescription('This table contains configuration of RADIUS Servers settings for all configured WLANs on the Wireless Controller. For each of the configured WLANs on the controller there may exist one or more entries of RADIUS server(s) serving the WLAN. Addition/deletion of entries in this table are automatic depending on the addition/deletion of entries in wlanTable table.') wlanRadiusServerEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "wlanID"), (0, "HIPATH-WIRELESS-HWC-MIB", "radiusId")) if mibBuilder.loadTexts: wlanRadiusServerEntry.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerEntry.setDescription("An entry in wlanRadiusServerTable for each RADIUS server used by the WLAN indexed by wlanID and radiusId. The radiusId is the controller's internal radius server index.") radiusId = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 1), Unsigned32()) if mibBuilder.loadTexts: radiusId.setStatus('current') if mibBuilder.loadTexts: radiusId.setDescription("Controller's internal RADIUS index.") wlanRadiusServerName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 2), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: wlanRadiusServerName.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerName.setDescription('Name of the RADIUS server.') wlanRadiusServerUse = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 3), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("notUse", 0), ("use", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusServerUse.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerUse.setDescription('use : This means that this WLAN service indexed by wlanID uses this RADIUS server which it is indexed by the radiusId. ') wlanRadiusServerUsage = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 4), Bits().clone(namedValues=NamedValues(("auth", 0), ("mac", 1), ("acct", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusServerUsage.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerUsage.setDescription('bit 0: By setting this bit, this RADIUS server is used for authentication. This bit has meaning only when wlanAuthType is set to internalCP(2), dot1x(3), or externalCP(4). bit 1: By setting this bit, this RADIUS server is used for MAC-based authentication. This bit has meaning only when wlanAuthMacBasedAuth is set to true. bit 2: By setting this bit, this RADIUS server is used for accounting. This bit has meaning only when wlanAuthType is set to internalCP(2), dot1x(3), or externalCP(4).') wlanRadiusServerAuthUseVNSIPAddr = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 5), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusServerAuthUseVNSIPAddr.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerAuthUseVNSIPAddr.setDescription("When this value set to true, use the VNS's IP address as NAS IP address during the authentication.") wlanRadiusServerAuthNASIP = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 6), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusServerAuthNASIP.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerAuthNASIP.setDescription("Use this IP address as the NAS IP addresss during the authentication. The default IP address is the VNS IP address. This field has meaning only when the wlanRadiusServerUsage's bit 0 is set. ") wlanRadiusServerAuthUseVNSName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 7), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusServerAuthUseVNSName.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerAuthUseVNSName.setDescription("When this value set to true, use the VNS's name as the NAS identifier during the authentication.") wlanRadiusServerAuthNASId = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 8), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusServerAuthNASId.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerAuthNASId.setDescription("Use this name as the NAS identifier during the authentication. The default name is the VNS name. This field has meaning only when the wlanRadiusServerUsage's bit 0 is set.") wlanRadiusServerAuthAuthType = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 9), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3, 4))).clone(namedValues=NamedValues(("pap", 0), ("chap", 1), ("mschap", 2), ("mschap2", 3), ("eap", 4)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusServerAuthAuthType.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerAuthAuthType.setDescription("Authentication type. This field has meaning only when the wlanRadiusServerUsage's bit 0 is set.") wlanRadiusServerAcctUseVNSIPAddr = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 10), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusServerAcctUseVNSIPAddr.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerAcctUseVNSIPAddr.setDescription("When this value set to true, use the VNS's IP address as NAS IP address during the accounting.") wlanRadiusServerAcctNASIP = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 11), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusServerAcctNASIP.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerAcctNASIP.setDescription("Use this IP address as the NAS IP addresss during the accounting. The default IP address is the VNS IP address. This field has meaning only when the wlanRadiusServerUsage's bit 2 is set.") wlanRadiusServerAcctUseVNSName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 12), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusServerAcctUseVNSName.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerAcctUseVNSName.setDescription("When this value set to true, use the VNS's name as the NAS identifier during the accounting.") wlanRadiusServerAcctNASId = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 13), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusServerAcctNASId.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerAcctNASId.setDescription("Use this name as the NAS identifier during the accounting. The default name is the VNS name. This field has meaning only when the wlanRadiusServerUsage's bit 2 is set.") wlanRadiusServerAcctSIAR = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 14), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusServerAcctSIAR.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerAcctSIAR.setDescription("If this value is set to true, then the controller sends interrim accounting records for fast failover events. This field has meaning only when the wlanRadiusServerUsage's bit 2 is set.") wlanRadiusServerMacUseVNSIPAddr = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 15), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusServerMacUseVNSIPAddr.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerMacUseVNSIPAddr.setDescription("When this value set to true, use the VNS's IP address as NAS IP address during the MAC based authentication.") wlanRadiusServerMacNASIP = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 16), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusServerMacNASIP.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerMacNASIP.setDescription("Use this IP address as the NAS IP addresss during the MAC based authentication. The default IP address is the VNS IP address. This field has meaning only when the wlanRadiusServerUsage's bit 1 is set.") wlanRadiusServerMacUseVNSName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 17), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusServerMacUseVNSName.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerMacUseVNSName.setDescription("When this value set to true, use the VNS's name as the NAS identifier during the MAC based authentication.") wlanRadiusServerMacNASId = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 18), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusServerMacNASId.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerMacNASId.setDescription("Use this name as the NAS identifier during the MAC based authentication. The default name is the VNS name. This field has meaning only when the wlanRadiusServerUsage's bit 1 is set.") wlanRadiusServerMacAuthType = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 19), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3))).clone(namedValues=NamedValues(("pap", 0), ("chap", 1), ("mschap", 2), ("mschap2", 3)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusServerMacAuthType.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerMacAuthType.setDescription("Authentication type. This field has meaning only when the wlanRadiusServerUsage's bit 1 is set.") wlanRadiusServerMacPW = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 20), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: wlanRadiusServerMacPW.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerMacPW.setDescription("The password is used for MAC based authentication. This field has meaning only when the wlanRadiusServerUsage's bit 1 is set.") topology = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4)) topologyConfig = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1)) topologyTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1), ) if mibBuilder.loadTexts: topologyTable.setStatus('current') if mibBuilder.loadTexts: topologyTable.setDescription('List of topologies configured on EWC.') topologyEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "topologyID")) if mibBuilder.loadTexts: topologyEntry.setStatus('current') if mibBuilder.loadTexts: topologyEntry.setDescription('Configuration information about a topology in topology table. EWC supports different types of topologies, therefore, for complete configuration of a topology not all fields are necessary to be defined or have meaning. Definition of each field in this table specifies topolog-specific characteristics of the field and its relevance.') topologyID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 1), Unsigned32()) if mibBuilder.loadTexts: topologyID.setStatus('current') if mibBuilder.loadTexts: topologyID.setDescription('Unique internal identifier of the topology. This item is generated internally by EWC and has no external meaning.') topologyName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 2), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: topologyName.setStatus('current') if mibBuilder.loadTexts: topologyName.setDescription('Name associated with topology. This name must be unique within EWC. Allowable characters for this field are from the set of A-Z, a-z, -!#$:, 0-9, and space. Howerver, it is recommended to avoid leading and trailing spaces.') topologyMode = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 3), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(-1, 0, 1, 2, 4, 5, 6))).clone(namedValues=NamedValues(("undefined", -1), ("routed", 0), ("bridgedAtAP", 1), ("bridgedAtAC", 2), ("thirdPartyAP", 4), ("physical", 5), ("management", 6)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: topologyMode.setStatus('current') if mibBuilder.loadTexts: topologyMode.setDescription('Type of this topology. This field implies the meaning and necessity of other attributes associated to the topology.') topologyTagged = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 4), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("tagged", 1), ("untagged", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: topologyTagged.setStatus('current') if mibBuilder.loadTexts: topologyTagged.setDescription('If topology is tagged, then a VLAN ID must be assigned to the topology. Meaning associated to this field is topology specific: - For Admin topology (management port) is always untagged - Ror routed topology has no meaning and always untagged - For all other topologies this field is configurable.') topologyVlanID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 5), Integer32().subtype(subtypeSpec=ConstraintsUnion(ValueRangeConstraint(-1, -1), ValueRangeConstraint(1, 4095), )).clone(-1)).setMaxAccess("readwrite") if mibBuilder.loadTexts: topologyVlanID.setStatus('current') if mibBuilder.loadTexts: topologyVlanID.setDescription('VLAN ID assigned to a tagged topology. For untagged topology this field has no meaning and it is set to -1.') topologyEgressPort = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 6), OctetString().subtype(subtypeSpec=ValueSizeConstraint(0, 12))).setMaxAccess("readwrite") if mibBuilder.loadTexts: topologyEgressPort.setStatus('current') if mibBuilder.loadTexts: topologyEgressPort.setDescription('Egress port associated to this topology if it is tagged and VLANID defined for the topology. This field is represented as octect string: The most significant bit of most significant octet represent first physical port (lowest number port) and second most significant bit of most significant octet represent second physical port and so on. Meaning associated to this field is topology specific: - For Admin topology (management port) this field has no meaning. - Ror routed topology this field has no meaning - For all other topologies: physical, bridge at controller, and bridge at AP topologies this field is configurable.') topologyLayer3 = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 7), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: topologyLayer3.setStatus('current') if mibBuilder.loadTexts: topologyLayer3.setDescription('If set to true, then topology has layer three persence. Any topology with layer three presence must have IP address and gateway assigned to it. Meaning associated to this field is topology specific: - For Admin topology (management port) it is always set to true. - Ror bridge at AP this field has no meaning and it is set to false. - For routed and physical topologies it is always set to true. - For bridge at controller type of topology this field is configurable.') topologyIPAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 8), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: topologyIPAddress.setStatus('current') if mibBuilder.loadTexts: topologyIPAddress.setDescription('IP address assigned to the topology as its interface. Meaning associated to this field is topology specific: - This field has meaning if topology has layer three presence. - Ror bridge at AP this field has no meaning and set 0.0.0.0.') topologyIPMask = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 9), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: topologyIPMask.setStatus('current') if mibBuilder.loadTexts: topologyIPMask.setDescription("Mask for topology's IP address. This field is only applicable to those topologies that have IP address assigned to them, otherwise it is set either to 255.255.255.255 or 0.0.0.0.") topologyMTUsize = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 10), Unsigned32().clone(1436)).setMaxAccess("readwrite") if mibBuilder.loadTexts: topologyMTUsize.setStatus('current') if mibBuilder.loadTexts: topologyMTUsize.setDescription('Default MTU size for the topology. This field is only configurable for a topologies that has layer three presence.') topologyGateway = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 11), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: topologyGateway.setStatus('current') if mibBuilder.loadTexts: topologyGateway.setDescription('Gateway associated to this topology. This field has meaning for a topology that has layer three presence.') topologyDHCPUsage = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 12), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2))).clone(namedValues=NamedValues(("none", 0), ("useRelay", 1), ("localServer", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: topologyDHCPUsage.setStatus('current') if mibBuilder.loadTexts: topologyDHCPUsage.setDescription('The type of DHCP to be used for IP address assignment to associated MU. This field has meaning only if the topology has layer three persense. Meaning associated to this field is topology specific: - For Admin topology (management port) has no meaning. - Ror bridge at AP this field has no meaning. - For all other topologies that their layer three presence is enabled this field is configurable.') topologyAPRegistration = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 13), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: topologyAPRegistration.setStatus('current') if mibBuilder.loadTexts: topologyAPRegistration.setDescription('If set to true, then AP registration can be achieved using via this topology. Meaning associated to this field is topology specific: - Always false for Admin (management port) and routed topologies - Always false and has no meaning for bridge at AP topology. - For physical and bridge at controller type topologies that have layer three presence this field can be set to either true or false.') topologyManagementTraffic = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 14), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: topologyManagementTraffic.setStatus('current') if mibBuilder.loadTexts: topologyManagementTraffic.setDescription('If set to true, then management data traffic is allowed on this topology. Meaning associated to this field is topology specific: - Always true for Admin topology (management port) - Has no meaning for bridge at AP type topologies - For all other topologies that have layer three presence this field can be set to either true or false.') topologySynchronize = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 15), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: topologySynchronize.setStatus('current') if mibBuilder.loadTexts: topologySynchronize.setDescription('If set to true, then topology must be synchronized with peer controller in availability mode operation. Meaning associated to this field is topology specific: - Always false for Admin topology (management port) - Has no meaning for topologies associated to physical ports. - For all other topologies: bridge at controller, routed and bridge at AP type topologies this field can be set to either true or false.') topologySyncGateway = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 16), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: topologySyncGateway.setStatus('current') if mibBuilder.loadTexts: topologySyncGateway.setDescription('Gateway associated to synchronized topology. This field has meaning for those topologies that their topologySynchornize field is set to true.') topologySyncMask = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 17), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: topologySyncMask.setStatus('current') if mibBuilder.loadTexts: topologySyncMask.setDescription('Mask of synchronized gateway IP address. This field has meaning for those topologies that their topologySynchornize field is set to true.') topologySyncIPStart = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 18), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: topologySyncIPStart.setStatus('current') if mibBuilder.loadTexts: topologySyncIPStart.setDescription('Range of IP addresses assigned to remote synchronized topology. This IP address represents starting IP address. This field has meaning for those topologies that their topologySynchornize field is set to true.') topologySyncIPEnd = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 19), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: topologySyncIPEnd.setStatus('current') if mibBuilder.loadTexts: topologySyncIPEnd.setDescription('Range of IP addresses assigned to remote synchronized topology. This IP address represents ending IP address. This field has meaning for those topologies that their topologySynchornize field is set to true.') topologyStaticIPv6Address = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 20), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: topologyStaticIPv6Address.setStatus('current') if mibBuilder.loadTexts: topologyStaticIPv6Address.setDescription('Statically configured IPv6 address assigned to the admin port.') topologyLinkLocalIPv6Address = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 21), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: topologyLinkLocalIPv6Address.setStatus('current') if mibBuilder.loadTexts: topologyLinkLocalIPv6Address.setDescription('Automatically generated link-local IPv6 address assigned to the admin port.') topologyPreFixLength = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 22), Unsigned32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: topologyPreFixLength.setStatus('current') if mibBuilder.loadTexts: topologyPreFixLength.setDescription('The prfix length of the statically configured IPv6 address of the topology.') topologyIPv6Gateway = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 23), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: topologyIPv6Gateway.setStatus('current') if mibBuilder.loadTexts: topologyIPv6Gateway.setDescription('The gateway of IPv6 address that is associated to the admin topology.') topologyDynamicEgress = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 24), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disable", 0), ("enable", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: topologyDynamicEgress.setStatus('current') if mibBuilder.loadTexts: topologyDynamicEgress.setDescription('Enable/disable dynamic egress for this topology. Dynamic egress allows a station to receive from this VLAN if it can send to this VLAN.') topologyIsGroup = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 25), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("no", 0), ("yes", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: topologyIsGroup.setStatus('current') if mibBuilder.loadTexts: topologyIsGroup.setDescription('When this flag is yes, this means the topology is created as a group topology.') topologyGroupMembers = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 26), OctetString().subtype(subtypeSpec=ValueSizeConstraint(0, 12))).setMaxAccess("readwrite") if mibBuilder.loadTexts: topologyGroupMembers.setStatus('current') if mibBuilder.loadTexts: topologyGroupMembers.setDescription('This field specifies the topologies for this group. This field has meaning only when topologyIsGroup is set to 1. This field is represented as octect string. The most significant bit of the most significant octet of the octet string represents the first topology with topologyID = 0 and second most significant bit of the most significant octet represents the second topology with topologyID = 1 and so on.') topologyMemberId = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 27), Integer32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: topologyMemberId.setStatus('current') if mibBuilder.loadTexts: topologyMemberId.setDescription(' -1 : Means this topology is not a member of a group topology. valid topology ID : Means this topology is a member of a configured group topology that has this group topology ID.') topologyStat = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2)) topoStatTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 1), ) if mibBuilder.loadTexts: topoStatTable.setStatus('current') if mibBuilder.loadTexts: topoStatTable.setDescription('Statistics describing traffic transmitted or received for a single topology. This is the traffic on the topology that is coming from or going to destinations on the wired network.') topoStatEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 1, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "topologyID")) if mibBuilder.loadTexts: topoStatEntry.setStatus('current') if mibBuilder.loadTexts: topoStatEntry.setDescription('Statistic related an entry in topology table.') topoStatName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 1, 1, 1), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoStatName.setStatus('current') if mibBuilder.loadTexts: topoStatName.setDescription('Topology name.') topoStatTxPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 1, 1, 2), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoStatTxPkts.setStatus('current') if mibBuilder.loadTexts: topoStatTxPkts.setDescription('Number of packets transmitted to the wired network on the topology/vlan.') topoStatRxPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 1, 1, 3), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoStatRxPkts.setStatus('current') if mibBuilder.loadTexts: topoStatRxPkts.setDescription('Number of packets received from the wired network on the topology/vlan.') topoStatTxOctets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 1, 1, 4), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoStatTxOctets.setStatus('current') if mibBuilder.loadTexts: topoStatTxOctets.setDescription('Number of octets transmitted in frames to the wired network on the topology/vlan.') topoStatRxOctets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 1, 1, 5), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoStatRxOctets.setStatus('current') if mibBuilder.loadTexts: topoStatRxOctets.setDescription('Number of octets received in frames from the wired network on the topology/vlan.') topoStatMulticastTxPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 1, 1, 6), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoStatMulticastTxPkts.setStatus('current') if mibBuilder.loadTexts: topoStatMulticastTxPkts.setDescription('Number of multicast frames transmitted to the wired network on the topology/vlan.') topoStatMulticastRxPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 1, 1, 7), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoStatMulticastRxPkts.setStatus('current') if mibBuilder.loadTexts: topoStatMulticastRxPkts.setDescription('Number of multicast frames received from the wired network on the topology/vlan.') topoStatBroadcastTxPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 1, 1, 8), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoStatBroadcastTxPkts.setStatus('current') if mibBuilder.loadTexts: topoStatBroadcastTxPkts.setDescription('Number of broadcast frames transmitted to the wired network on the topology/vlan.') topoStatBroadcastRxPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 1, 1, 9), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoStatBroadcastRxPkts.setStatus('current') if mibBuilder.loadTexts: topoStatBroadcastRxPkts.setDescription('Number of broadcast frames received from the wired network on the topology/vlan.') topoStatFrameChkSeqErrors = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 1, 1, 10), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoStatFrameChkSeqErrors.setStatus('current') if mibBuilder.loadTexts: topoStatFrameChkSeqErrors.setDescription('Number of frames with checksum errors received from the wired network on the topology/vlan.') topoStatFrameTooLongErrors = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 1, 1, 11), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoStatFrameTooLongErrors.setStatus('current') if mibBuilder.loadTexts: topoStatFrameTooLongErrors.setDescription('Number of oversized frames received from the wired network on the topology/vlan.') topoExceptionStatTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 2), ) if mibBuilder.loadTexts: topoExceptionStatTable.setStatus('current') if mibBuilder.loadTexts: topoExceptionStatTable.setDescription('The table contains list of exception-specific filters statistics for configured topologies in EWC.') topoExceptionStatEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 2, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "topologyID")) if mibBuilder.loadTexts: topoExceptionStatEntry.setStatus('current') if mibBuilder.loadTexts: topoExceptionStatEntry.setDescription('An entry in topology exception statistic table.') topoExceptionFiterName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 2, 1, 1), OctetString().subtype(subtypeSpec=ValueSizeConstraint(1, 64))).setMaxAccess("readwrite") if mibBuilder.loadTexts: topoExceptionFiterName.setStatus('current') if mibBuilder.loadTexts: topoExceptionFiterName.setDescription('Exception filter name.') topoExceptionStatPktsDenied = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 2, 1, 2), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoExceptionStatPktsDenied.setStatus('current') if mibBuilder.loadTexts: topoExceptionStatPktsDenied.setDescription("Number of packets that were denied by defined filters since device's last restart.") topoExceptionStatPktsAllowed = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 2, 1, 3), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoExceptionStatPktsAllowed.setStatus('current') if mibBuilder.loadTexts: topoExceptionStatPktsAllowed.setDescription("Number packets that were allowed by defined filters since device's last restart.") topoWireStatTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 3), ) if mibBuilder.loadTexts: topoWireStatTable.setStatus('deprecated') if mibBuilder.loadTexts: topoWireStatTable.setDescription('The table contains statistics describing traffic transmitted or received unencapsulated (i.e. not wrapped in WASSP) for each topology') topoWireStatEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 3, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "topologyID")) if mibBuilder.loadTexts: topoWireStatEntry.setStatus('deprecated') if mibBuilder.loadTexts: topoWireStatEntry.setDescription("Statistics describing traffic transmitted or received unencapsulated (i.e. not wrapped in WASSP) for a single topology. This is the traffic on the topology that is coming from or going to destinations on the wired network other than to the controller's APs.") topoWireStatName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 3, 1, 1), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoWireStatName.setStatus('deprecated') if mibBuilder.loadTexts: topoWireStatName.setDescription('Topology name.') topoWireStatTxPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 3, 1, 2), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoWireStatTxPkts.setStatus('deprecated') if mibBuilder.loadTexts: topoWireStatTxPkts.setDescription('Number of packets transmitted unencapsulated to the wired network on the topology/vlan.') topoWireStatRxPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 3, 1, 3), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoWireStatRxPkts.setStatus('deprecated') if mibBuilder.loadTexts: topoWireStatRxPkts.setDescription('Number of packets received unencapsulated from the wired network on the topology/vlan.') topoWireStatTxOctets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 3, 1, 4), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoWireStatTxOctets.setStatus('deprecated') if mibBuilder.loadTexts: topoWireStatTxOctets.setDescription('Number of octets transmitted in unencapsulated frames to the wired network on the topology/vlan.') topoWireStatRxOctets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 3, 1, 5), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoWireStatRxOctets.setStatus('deprecated') if mibBuilder.loadTexts: topoWireStatRxOctets.setDescription('Number of octets received in unencapsulated frames to the wired network on the topology/vlan.') topoWireStatMulticastTxPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 3, 1, 6), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoWireStatMulticastTxPkts.setStatus('deprecated') if mibBuilder.loadTexts: topoWireStatMulticastTxPkts.setDescription('Number of multicast frames transmitted unencapsulated to the wired network on the topology/vlan.') topoWireStatMulticastRxPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 3, 1, 7), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoWireStatMulticastRxPkts.setStatus('deprecated') if mibBuilder.loadTexts: topoWireStatMulticastRxPkts.setDescription('Number of multicast frames received unencapsulated from the wired network on the topology/vlan.') topoWireStatBroadcastTxPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 3, 1, 8), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoWireStatBroadcastTxPkts.setStatus('deprecated') if mibBuilder.loadTexts: topoWireStatBroadcastTxPkts.setDescription('Number of broadcast frames transmitted unencapsulated to the wired network on the topology/vlan.') topoWireStatBroadcastRxPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 3, 1, 9), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoWireStatBroadcastRxPkts.setStatus('deprecated') if mibBuilder.loadTexts: topoWireStatBroadcastRxPkts.setDescription('Number of broadcast frames received unencapsulated from the wired network on the topology/vlan.') topoWireStatFrameChkSeqErrors = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 3, 1, 10), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoWireStatFrameChkSeqErrors.setStatus('deprecated') if mibBuilder.loadTexts: topoWireStatFrameChkSeqErrors.setDescription('Number of unencapsulated frames with checksum errors received from the wired network on the topology/vlan.') topoWireStatFrameTooLongErrors = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 3, 1, 11), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoWireStatFrameTooLongErrors.setStatus('deprecated') if mibBuilder.loadTexts: topoWireStatFrameTooLongErrors.setDescription('Number of unencapsulated frames with length longer than permitted received from the wired network on the topology/vlan.') topoCompleteStatTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 4), ) if mibBuilder.loadTexts: topoCompleteStatTable.setStatus('current') if mibBuilder.loadTexts: topoCompleteStatTable.setDescription('The table contains statistics describing traffic transmitted and received for each topology on both the wired side and the wireless side.') topoCompleteStatEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 4, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "topologyID")) if mibBuilder.loadTexts: topoCompleteStatEntry.setStatus('current') if mibBuilder.loadTexts: topoCompleteStatEntry.setDescription('Statistics describing traffic transmitted and received on a single topology on both the wired side and the wireless side.') topoCompleteStatName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 4, 1, 1), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoCompleteStatName.setStatus('current') if mibBuilder.loadTexts: topoCompleteStatName.setDescription('Topology name.') topoCompleteStatTxPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 4, 1, 2), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoCompleteStatTxPkts.setStatus('current') if mibBuilder.loadTexts: topoCompleteStatTxPkts.setDescription('Number of packets transmitted to the wired and wireless networks on the topology/vlan.') topoCompleteStatRxPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 4, 1, 3), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoCompleteStatRxPkts.setStatus('current') if mibBuilder.loadTexts: topoCompleteStatRxPkts.setDescription('Number of packets received from the wired and wireless networks on the topology/vlan.') topoCompleteStatTxOctets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 4, 1, 4), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoCompleteStatTxOctets.setStatus('current') if mibBuilder.loadTexts: topoCompleteStatTxOctets.setDescription('Number of octets transmitted in frames to the wired and wireless networks on the topology/vlan.') topoCompleteStatRxOctets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 4, 1, 5), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoCompleteStatRxOctets.setStatus('current') if mibBuilder.loadTexts: topoCompleteStatRxOctets.setDescription('Number of octets received in frames from the wired and wireless networks on the topology/vlan.') topoCompleteStatMulticastTxPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 4, 1, 6), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoCompleteStatMulticastTxPkts.setStatus('current') if mibBuilder.loadTexts: topoCompleteStatMulticastTxPkts.setDescription('Number of multicast frames transmitted to the wired and wireless networks on the topology/vlan.') topoCompleteStatMulticastRxPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 4, 1, 7), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoCompleteStatMulticastRxPkts.setStatus('current') if mibBuilder.loadTexts: topoCompleteStatMulticastRxPkts.setDescription('Number of multicast frames received from the wired and wireless networks on the topology/vlan.') topoCompleteStatBroadcastTxPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 4, 1, 8), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoCompleteStatBroadcastTxPkts.setStatus('current') if mibBuilder.loadTexts: topoCompleteStatBroadcastTxPkts.setDescription('Number of broadcast frames transmitted to the wired and wireless networks on the topology/vlan.') topoCompleteStatBroadcastRxPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 4, 1, 9), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoCompleteStatBroadcastRxPkts.setStatus('current') if mibBuilder.loadTexts: topoCompleteStatBroadcastRxPkts.setDescription('Number of broadcast frames received from the wired and wireless networks on the topology/vlan.') topoCompleteStatFrameChkSeqErrors = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 4, 1, 10), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoCompleteStatFrameChkSeqErrors.setStatus('current') if mibBuilder.loadTexts: topoCompleteStatFrameChkSeqErrors.setDescription('Number of frames with checksum errors received from the wired and wireless networks on the topology/vlan.') topoCompleteStatFrameTooLongErrors = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 4, 1, 11), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: topoCompleteStatFrameTooLongErrors.setStatus('current') if mibBuilder.loadTexts: topoCompleteStatFrameTooLongErrors.setDescription('Number of oversized frames received from the wired and wireless networks on the topology/vlan.') accessPoints = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5)) apConfigObjects = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1)) apCount = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 1), Integer32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apCount.setStatus('current') if mibBuilder.loadTexts: apCount.setDescription('The count of currently configured AccessPoints associated with this WirelessController.') apTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2), ) if mibBuilder.loadTexts: apTable.setStatus('current') if mibBuilder.loadTexts: apTable.setDescription('Contains a list of all configured APs associated with the Wireless Controller.') apEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "apIndex")) if mibBuilder.loadTexts: apEntry.setStatus('current') if mibBuilder.loadTexts: apEntry.setDescription('Configuration information for an access point.') apIndex = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 1), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 2147483647))).setMaxAccess("readwrite") if mibBuilder.loadTexts: apIndex.setStatus('current') if mibBuilder.loadTexts: apIndex.setDescription('Table index for the access point.') apName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 2), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apName.setStatus('current') if mibBuilder.loadTexts: apName.setDescription("Access Point's name.") apDesc = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 3), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apDesc.setStatus('current') if mibBuilder.loadTexts: apDesc.setDescription('Text description of the AP.') apSerialNumber = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 4), OctetString().subtype(subtypeSpec=ValueSizeConstraint(16, 16)).setFixedLength(16)).setMaxAccess("readonly") if mibBuilder.loadTexts: apSerialNumber.setStatus('current') if mibBuilder.loadTexts: apSerialNumber.setDescription('16-character serial number of the AccessPoint.') apPortifIndex = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 5), InterfaceIndex()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apPortifIndex.setStatus('current') if mibBuilder.loadTexts: apPortifIndex.setDescription('ifIndex of the physical port to which this AP is assigned.') apWiredIfIndex = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 6), InterfaceIndex()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apWiredIfIndex.setStatus('current') if mibBuilder.loadTexts: apWiredIfIndex.setDescription('ifIndex of the wired interface on the AP.') apSoftwareVersion = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 7), OctetString()).setMaxAccess("readonly") if mibBuilder.loadTexts: apSoftwareVersion.setStatus('current') if mibBuilder.loadTexts: apSoftwareVersion.setDescription('Software version currently installed on the AP.') apSpecific = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 8), ObjectIdentifier()).setMaxAccess("readonly") if mibBuilder.loadTexts: apSpecific.setStatus('current') if mibBuilder.loadTexts: apSpecific.setDescription('A link back to the OID under the hiPathWirelessProducts branch that identifies the specific version of this AP.') apBroadcastDisassociate = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 9), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apBroadcastDisassociate.setStatus('current') if mibBuilder.loadTexts: apBroadcastDisassociate.setDescription('True indicates that the AP should broadcast disassociation requests, False indicates unicast.') apRowStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 10), RowStatus()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apRowStatus.setStatus('current') if mibBuilder.loadTexts: apRowStatus.setDescription('RowStatus for the apTable.') apVlanID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 11), Integer32().clone(-1)).setMaxAccess("readwrite") if mibBuilder.loadTexts: apVlanID.setStatus('current') if mibBuilder.loadTexts: apVlanID.setDescription('VLAN tag for the packets trasmitted to/from Access Point. Value ranges: (-1) it is not tagged, zero(0) means reserved, 1-4094 tag value.') apIpAssignmentType = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 12), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("dhcp", 1), ("static", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: apIpAssignmentType.setStatus('current') if mibBuilder.loadTexts: apIpAssignmentType.setDescription('IP address assignment type, dhcp(1) = uses DHCP to obtain IP address, static(2) = static IP address is assigned to the access point.') apIfMAC = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 13), MacAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: apIfMAC.setStatus('current') if mibBuilder.loadTexts: apIfMAC.setDescription("Acess Point's wired interface MAC address.") apIPAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 14), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apIPAddress.setStatus('current') if mibBuilder.loadTexts: apIPAddress.setDescription("Access Point's wired interface IP address.") apHwVersion = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 17), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apHwVersion.setStatus('current') if mibBuilder.loadTexts: apHwVersion.setDescription("Text description of Access Point's hardware version.") apSwVersion = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 18), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apSwVersion.setStatus('current') if mibBuilder.loadTexts: apSwVersion.setDescription("Text description of Access Point's major software version.") apEnvironment = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 19), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("indoor", 1), ("outdoor", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: apEnvironment.setStatus('current') if mibBuilder.loadTexts: apEnvironment.setDescription("Access Point's environment.") apHome = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 20), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("local", 1), ("foreign", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: apHome.setStatus('current') if mibBuilder.loadTexts: apHome.setDescription('Local session is created when access point registers directly with the controller. Foreign session is mirrored session created via availability feature.') apRole = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 21), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3))).clone(namedValues=NamedValues(("accessPoint", 1), ("sensor", 2), ("guardian", 3)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: apRole.setStatus('current') if mibBuilder.loadTexts: apRole.setDescription('Indicates whether Access Point is a traffic fordwarder, sensor or guardian') apState = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 22), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("active", 1), ("inactive", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: apState.setStatus('current') if mibBuilder.loadTexts: apState.setDescription('Active means that access point has registered with this controller at some point of time and still has active connection with this controller. This variable has meaning in the context of the controller that query is done. Inactive mean access point has lost the connection with this controller.') apStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 23), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("approved", 1), ("pending", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: apStatus.setStatus('current') if mibBuilder.loadTexts: apStatus.setDescription('Registration state for the access point at the time of query, approved(1) means the registration was completed, pending(2) means access point has registered but waiting manual approval from admin.') apPollTimeout = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 24), Gauge32().subtype(subtypeSpec=ValueRangeConstraint(3, 3600))).setMaxAccess("readwrite") if mibBuilder.loadTexts: apPollTimeout.setStatus('current') if mibBuilder.loadTexts: apPollTimeout.setDescription("Duration after which the access point's connection to controller is considered has been lost if polling fails. ") apPollInterval = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 25), Gauge32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apPollInterval.setStatus('current') if mibBuilder.loadTexts: apPollInterval.setDescription('Interval between each poll sent to the controller.') apTelnetAccess = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 26), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3))).clone(namedValues=NamedValues(("enabled", 1), ("disabled", 2), ("na", 3)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: apTelnetAccess.setStatus('current') if mibBuilder.loadTexts: apTelnetAccess.setDescription('Indicates whether telnet access is enabled/disabled. This value only applys to AP26xx, W788, W786 and AP4102x APs. 1 : Enabled. 2 : Disabled. 3 : Telnet is not supported.') apMaintainClientSession = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 27), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apMaintainClientSession.setStatus('current') if mibBuilder.loadTexts: apMaintainClientSession.setDescription("If true, Access Point maintains client's session in the event of poll failure.") apRestartServiceContAbsent = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 28), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apRestartServiceContAbsent.setStatus('current') if mibBuilder.loadTexts: apRestartServiceContAbsent.setDescription('If true, Access Point restarts the service in the absence of controller.') apHostname = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 29), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: apHostname.setStatus('current') if mibBuilder.loadTexts: apHostname.setDescription('Hostname assigned to Access Point.') apLocation = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 30), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apLocation.setStatus('current') if mibBuilder.loadTexts: apLocation.setDescription('Text identifying location of the access point.') apStaticMTUsize = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 31), Unsigned32().subtype(subtypeSpec=ValueRangeConstraint(600, 1500)).clone(1500)).setMaxAccess("readwrite") if mibBuilder.loadTexts: apStaticMTUsize.setStatus('current') if mibBuilder.loadTexts: apStaticMTUsize.setDescription('Configured MTU size for the access point. Access point will use the lower value of MTU size between statically configured MTU size and dynamically learned MTU size.') apSiteID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 32), Integer32().clone(-1)).setMaxAccess("readwrite") if mibBuilder.loadTexts: apSiteID.setStatus('current') if mibBuilder.loadTexts: apSiteID.setDescription('The site ID, as defined in siteTable, that this AP is member of. The value of -1 indicates that AP is not member of any site.') apZone = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 33), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apZone.setStatus('current') if mibBuilder.loadTexts: apZone.setDescription('The Zone to which the Access Point belongs. ') apLLDP = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 34), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apLLDP.setStatus('current') if mibBuilder.loadTexts: apLLDP.setDescription('Enable or disable broadcasting of LLDP information by the wireless AP.') apSSHAccess = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 35), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apSSHAccess.setStatus('deprecated') if mibBuilder.loadTexts: apSSHAccess.setDescription('Enable or Disable SSH access to the Wireless AP. This value only applys to AP36xx, AP37xx, W788C and W786C APs.') apLEDMode = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 36), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3))).clone(namedValues=NamedValues(("off", 0), ("wdsSignalStrength", 1), ("identify", 2), ("normal", 3)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: apLEDMode.setStatus('current') if mibBuilder.loadTexts: apLEDMode.setDescription("LED status field for the Access Point. off(0): LED is set to off for the AP. wdsSignalStrength(1): LED conveys the strength of the singal, for the details please refer to user manual. indentify(2): Can be used to lacate the AP by making AP to flashing LED repeatedly. normal(3): This indicates AP's normal operational mode.") apLocationbasedService = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 37), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apLocationbasedService.setStatus('current') if mibBuilder.loadTexts: apLocationbasedService.setDescription('Enable or disable the AeroScout or Ekahau location-based service for the Wireless AP.') apSecureTunnel = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 38), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apSecureTunnel.setStatus('current') if mibBuilder.loadTexts: apSecureTunnel.setDescription('Enable or disable Secure Tunnel between Ap and Controller') apEncryptCntTraffic = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 39), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apEncryptCntTraffic.setStatus('current') if mibBuilder.loadTexts: apEncryptCntTraffic.setDescription('Enable or disable encrypt of control traffic between AP & Controller. This value has meaning only if apSecureTunnel is enabled.') apMICErrorWarning = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 40), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apMICErrorWarning.setStatus('current') if mibBuilder.loadTexts: apMICErrorWarning.setDescription('Enable or disable MIC error warning generation.') apSecureDataTunnelType = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 41), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3))).clone(namedValues=NamedValues(("disable", 0), ("encryptControlTraffic", 1), ("encryptControlDataTraffic", 2), ("debugMode", 3)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: apSecureDataTunnelType.setStatus('current') if mibBuilder.loadTexts: apSecureDataTunnelType.setDescription('secure data tunnel status between controller and acesss point. disable(0): disable encryption of control and data traffic between AP & Controller. encryptControlTraffic(1): encrypt control traffic between AP & Controller. encryptControlDataTraffic(2): encrypt control and data traffic between AP & Controller. debugMode(3): preserve keys without encryption.') apIPMulticastAssembly = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 42), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apIPMulticastAssembly.setStatus('current') if mibBuilder.loadTexts: apIPMulticastAssembly.setDescription('Enable or disable fragmentation/reassembly of the IP Multicast frames transmitted over the tunnel between AP and Controller. When set to true, an IP Multicast frame larger than the tunnel MTU will be fragmented when it is placed into the WASSP tunnel and reassembled on the receiving end of the tunnel before being forwarded to the clients.') apSSHConnection = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 43), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3))).clone(namedValues=NamedValues(("enabled", 1), ("disabled", 2), ("na", 3)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: apSSHConnection.setStatus('current') if mibBuilder.loadTexts: apSSHConnection.setDescription('Enable or Disable SSH access to the Wireless AP. This value only applys to AP36xx, AP37xx, W788C and W786C APs. 1 : Enabled. 2 : Disabled. 3 : SSH is not supported.') apRadioTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 3), ) if mibBuilder.loadTexts: apRadioTable.setStatus('current') if mibBuilder.loadTexts: apRadioTable.setDescription('Table access point radio configuration information.') apRadioEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 3, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "apIndex"), (0, "IF-MIB", "ifIndex")) if mibBuilder.loadTexts: apRadioEntry.setStatus('current') if mibBuilder.loadTexts: apRadioEntry.setDescription('Configuration information for a radio on the access point.') apRadioFrequency = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 3, 1, 1), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("freq50GHz", 1), ("freq24GHz", 2)))).setMaxAccess("readonly") if mibBuilder.loadTexts: apRadioFrequency.setStatus('current') if mibBuilder.loadTexts: apRadioFrequency.setDescription('The frequency of the radio as supported by the hardware. Supported frequencies are either of 2.5Ghz or 5.0Ghz.') apRadioNumber = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 3, 1, 2), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apRadioNumber.setStatus('current') if mibBuilder.loadTexts: apRadioNumber.setDescription('Access point radios are numbered from 1 in increasing order. This numbering is limited in the context of AP. This field returns the radio number of the AP indexed by apIndex.') apRadioType = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 3, 1, 3), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12))).clone(namedValues=NamedValues(("off", 0), ("dot11a", 1), ("dot11an", 2), ("dot11anStrict", 3), ("dot11b", 4), ("dot11g", 5), ("dot11bg", 6), ("dot11gn", 7), ("dot11bgn", 8), ("dot11gnStrict", 9), ("dot11j", 10), ("dot11anc", 11), ("dot11cStrict", 12)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: apRadioType.setStatus('deprecated') if mibBuilder.loadTexts: apRadioType.setDescription('Indicates the type of radio (a, a/n, a/c, n-strict, c-strict, b, g, b/g, or b/g/n) as it is configured.') apRadioProtocol = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 3, 1, 4), Bits().clone(namedValues=NamedValues(("dot1124b", 0), ("dot1124g", 1), ("dot1124n", 2), ("dot1150a", 3), ("dot1150ac", 4), ("dot1150j", 5), ("dot1150n", 6)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: apRadioProtocol.setStatus('current') if mibBuilder.loadTexts: apRadioProtocol.setDescription('Enumerates the possible types of 802.11 radio protocols.') radioVNSTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 4), ) if mibBuilder.loadTexts: radioVNSTable.setStatus('current') if mibBuilder.loadTexts: radioVNSTable.setDescription('Table of VNSs the radio is participating in.') radioVNSEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 4, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "radioIfIndex"), (0, "HIPATH-WIRELESS-HWC-MIB", "vnsIfIndex")) if mibBuilder.loadTexts: radioVNSEntry.setStatus('current') if mibBuilder.loadTexts: radioVNSEntry.setDescription('Information for a single VNS entry.') radioIfIndex = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 4, 1, 1), InterfaceIndex()).setMaxAccess("readwrite") if mibBuilder.loadTexts: radioIfIndex.setStatus('current') if mibBuilder.loadTexts: radioIfIndex.setDescription('Radio participating in the VNS.') vnsIfIndex = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 4, 1, 2), InterfaceIndex()).setMaxAccess("readwrite") if mibBuilder.loadTexts: vnsIfIndex.setStatus('current') if mibBuilder.loadTexts: vnsIfIndex.setDescription('ifIndex for the VNS the radio is participating.') radioVNSRowStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 4, 1, 3), RowStatus()).setMaxAccess("readwrite") if mibBuilder.loadTexts: radioVNSRowStatus.setStatus('current') if mibBuilder.loadTexts: radioVNSRowStatus.setDescription('RowStatus for the radioVNSTable.') apFastFailoverEnable = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 5), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apFastFailoverEnable.setStatus('current') if mibBuilder.loadTexts: apFastFailoverEnable.setDescription('True indicates that Fast Failover feature is enabled at AP.') apLinkTimeout = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 6), Integer32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apLinkTimeout.setStatus('current') if mibBuilder.loadTexts: apLinkTimeout.setDescription('Time to deteck link failure. The value is in 1-30 seconds.') apAntennaTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 7), ) if mibBuilder.loadTexts: apAntennaTable.setStatus('current') if mibBuilder.loadTexts: apAntennaTable.setDescription('Contains a list of antennas configured for each AP associated with the Wireless Controller. All elements in this table are predefined and read-only.') apAntennaEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 7, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "apIndex"), (0, "HIPATH-WIRELESS-HWC-MIB", "apAntennaIndex")) if mibBuilder.loadTexts: apAntennaEntry.setStatus('current') if mibBuilder.loadTexts: apAntennaEntry.setDescription('An entry in this table identifying attributes of one antenna for an AP.') apAntennaIndex = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 7, 1, 1), Unsigned32()) if mibBuilder.loadTexts: apAntennaIndex.setStatus('current') if mibBuilder.loadTexts: apAntennaIndex.setDescription('Index of an antenna inside an AP.') apAntennanName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 7, 1, 2), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: apAntennanName.setStatus('current') if mibBuilder.loadTexts: apAntennanName.setDescription('Textual description identifying the antenna.') apAntennaType = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 7, 1, 3), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apAntennaType.setStatus('current') if mibBuilder.loadTexts: apAntennaType.setDescription('Textual description of antenna type selected for that antenna.') apRadioAntennaTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 8), ) if mibBuilder.loadTexts: apRadioAntennaTable.setStatus('current') if mibBuilder.loadTexts: apRadioAntennaTable.setDescription('Contains a list of Radio configured for each AP associated with the Wireless Controller. All elements in this table are predefined and read-only.') apRadioAntennaEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 8, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "apIndex"), (0, "IF-MIB", "ifIndex")) if mibBuilder.loadTexts: apRadioAntennaEntry.setStatus('current') if mibBuilder.loadTexts: apRadioAntennaEntry.setDescription('An entry in this table identifying attributes of one radio for an AP.') apRadioAntennaType = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 8, 1, 3), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: apRadioAntennaType.setStatus('current') if mibBuilder.loadTexts: apRadioAntennaType.setDescription('Textual description of antenna type selected for that radio.') apRadioAntennaModel = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 8, 1, 4), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apRadioAntennaModel.setStatus('current') if mibBuilder.loadTexts: apRadioAntennaModel.setDescription('Antenna type. 0 indicates internal antenna. 1 indicates no antenna. Other value indicates specific external antenna type. ') apRadioAttenuation = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 8, 1, 5), Integer32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apRadioAttenuation.setStatus('current') if mibBuilder.loadTexts: apRadioAttenuation.setDescription('Cumulative attenuation (in dB) of all components (cables, attenuators) between the radio port and the antenna. A professional installer must configure this value so it does not violate country regulations and must verify that it reflects the actual installed components. If this field value is set to -1, then this radio does not support the attenuation configuration.') apStatsObjects = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2)) apActiveCount = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 1), Integer32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apActiveCount.setStatus('current') if mibBuilder.loadTexts: apActiveCount.setDescription('The count of active AccessPoints associated with this WirelessController.') apStatsTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2), ) if mibBuilder.loadTexts: apStatsTable.setStatus('current') if mibBuilder.loadTexts: apStatsTable.setDescription('Table of statistics for the access points.') apStatsEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "apIndex")) if mibBuilder.loadTexts: apStatsEntry.setStatus('current') if mibBuilder.loadTexts: apStatsEntry.setDescription('Statistics for an access point.') apInUcastPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 1), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apInUcastPkts.setStatus('current') if mibBuilder.loadTexts: apInUcastPkts.setDescription('Number of unicast packets from wireless-to-wired network.') apInNUcastPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 2), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apInNUcastPkts.setStatus('current') if mibBuilder.loadTexts: apInNUcastPkts.setDescription('Number of non-unicast packets from wireless-to-wired network.') apInOctets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 3), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apInOctets.setStatus('current') if mibBuilder.loadTexts: apInOctets.setDescription('Number of octets from wireless-to-wired network.') apInErrors = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 4), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apInErrors.setStatus('current') if mibBuilder.loadTexts: apInErrors.setDescription('Number of error packets from wireless-to-wired network.') apInDiscards = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 5), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apInDiscards.setStatus('current') if mibBuilder.loadTexts: apInDiscards.setDescription('Number of discarded packets from wireless-to-wired network.') apOutUcastPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 6), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apOutUcastPkts.setStatus('current') if mibBuilder.loadTexts: apOutUcastPkts.setDescription('Number of unicast packets from wired-to-wireless network.') apOutNUcastPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 7), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apOutNUcastPkts.setStatus('current') if mibBuilder.loadTexts: apOutNUcastPkts.setDescription('Number of non-unicast packets from wired-to-wireless network.') apOutOctets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 8), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apOutOctets.setStatus('current') if mibBuilder.loadTexts: apOutOctets.setDescription('Number of octets from wired-to-wireless network.') apOutErrors = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 9), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apOutErrors.setStatus('current') if mibBuilder.loadTexts: apOutErrors.setDescription('Number of error packets from wired-to-wireless network.') apOutDiscards = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 10), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apOutDiscards.setStatus('current') if mibBuilder.loadTexts: apOutDiscards.setDescription('Number of discarded packets from wired-to-wireless network.') apUpTime = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 11), TimeTicks()).setMaxAccess("readonly") if mibBuilder.loadTexts: apUpTime.setStatus('current') if mibBuilder.loadTexts: apUpTime.setDescription('The time (in hundredths of a second) since the management portion of the access point was last re-initialized.') apCredentialType = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 12), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3))).clone(namedValues=NamedValues(("none", 0), ("tls", 1), ("peap", 2), ("all", 3)))).setMaxAccess("readonly") if mibBuilder.loadTexts: apCredentialType.setStatus('current') if mibBuilder.loadTexts: apCredentialType.setDescription('Supported certificate type used by AP for commnuication. none(0) = not supported, TLS(1) = Trasport Layer Security (TLS), PEAP(2) = Protected Extensible Authentication Protocol, all(2) = supports all supported EAP.') apCertificateExpiry = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 13), TimeTicks()).setMaxAccess("readonly") if mibBuilder.loadTexts: apCertificateExpiry.setStatus('current') if mibBuilder.loadTexts: apCertificateExpiry.setDescription('The number of timeticks from January, 1st, 1970 to the date when the certificate expires (issued certificate no longer is valid).') apStatsMuCounts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 14), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apStatsMuCounts.setStatus('current') if mibBuilder.loadTexts: apStatsMuCounts.setDescription('Number of MUs currently associated with this AP.') apStatsSessionDuration = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 15), TimeTicks()).setMaxAccess("readonly") if mibBuilder.loadTexts: apStatsSessionDuration.setStatus('current') if mibBuilder.loadTexts: apStatsSessionDuration.setDescription("Elapse time since the access point's session has started.") apTotalStationsA = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 16), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apTotalStationsA.setStatus('current') if mibBuilder.loadTexts: apTotalStationsA.setDescription("Number of MUs that are currently associated to this AP using dot11 connection mode 'a'.") apTotalStationsB = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 17), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apTotalStationsB.setStatus('current') if mibBuilder.loadTexts: apTotalStationsB.setDescription("Number of MUs that are currently associated to this AP using dot11 connection mode 'b'.") apTotalStationsG = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 18), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apTotalStationsG.setStatus('current') if mibBuilder.loadTexts: apTotalStationsG.setDescription("Number of MUs that are currently associated to this AP using dot11 connection mode 'g'.") apTotalStationsN50 = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 19), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apTotalStationsN50.setStatus('current') if mibBuilder.loadTexts: apTotalStationsN50.setDescription("Number of MUs that are currently associated to this AP using dot11 connection mode 'n 5.0 Ghz'.") apTotalStationsN24 = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 20), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apTotalStationsN24.setStatus('current') if mibBuilder.loadTexts: apTotalStationsN24.setDescription("Number of MUs that are currently associated to this AP using dot11 connection mode 'n 2.4 Ghz'.") apInvalidPolicyCount = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 21), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apInvalidPolicyCount.setStatus('current') if mibBuilder.loadTexts: apInvalidPolicyCount.setDescription('Number of invalid role has been assigned to the AP') apInterfaceMTU = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 22), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apInterfaceMTU.setStatus('current') if mibBuilder.loadTexts: apInterfaceMTU.setDescription("The AP's configured ethernet interface MTU size in bytes. ") apEffectiveTunnelMTU = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 23), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apEffectiveTunnelMTU.setStatus('current') if mibBuilder.loadTexts: apEffectiveTunnelMTU.setDescription('The AP Effective Tunnel MTU determines the maximum length of the frames that can be tunnelled without fragmentation, after subtracting the tunnel headers (WASSP and IPSEC). The AP Effective Tunnel MTU is determined for each AP tunnel as minimum between the Static MTU (configurable) and Dynamic MTU (learned from the ICMP path discovery).') apTotalStationsAC = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 24), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apTotalStationsAC.setStatus('current') if mibBuilder.loadTexts: apTotalStationsAC.setDescription('Number of MUs that are currently associated to this AP using dot11ac connection mode.') apTotalStationsAInOctets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 25), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apTotalStationsAInOctets.setStatus('current') if mibBuilder.loadTexts: apTotalStationsAInOctets.setDescription('Number of octets from client to AP for clients using protocol 802.11a.') apTotalStationsAOutOctets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 26), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apTotalStationsAOutOctets.setStatus('current') if mibBuilder.loadTexts: apTotalStationsAOutOctets.setDescription('Number of octets from AP to client for clients using protocol 802.11a.') apTotalStationsBInOctets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 27), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apTotalStationsBInOctets.setStatus('current') if mibBuilder.loadTexts: apTotalStationsBInOctets.setDescription('Number of octets from client to AP for clients using protocol 802.11b.') apTotalStationsBOutOctets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 28), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apTotalStationsBOutOctets.setStatus('current') if mibBuilder.loadTexts: apTotalStationsBOutOctets.setDescription('Number of octets from AP to client for clients using protocol 802.11b.') apTotalStationsGInOctets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 29), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apTotalStationsGInOctets.setStatus('current') if mibBuilder.loadTexts: apTotalStationsGInOctets.setDescription('Number of octets from client to AP for clients using protocol 802.11g.') apTotalStationsGOutOctets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 30), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apTotalStationsGOutOctets.setStatus('current') if mibBuilder.loadTexts: apTotalStationsGOutOctets.setDescription('Number of octets from AP to client for clients using protocol 802.11g.') apTotalStationsN50InOctets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 31), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apTotalStationsN50InOctets.setStatus('current') if mibBuilder.loadTexts: apTotalStationsN50InOctets.setDescription('Number of octets from client to AP for clients using protocol 802.11n (5Ghz).') apTotalStationsN50OutOctets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 32), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apTotalStationsN50OutOctets.setStatus('current') if mibBuilder.loadTexts: apTotalStationsN50OutOctets.setDescription('Number of octets from AP to client for clients using protocol 802.11n (5Ghz).') apTotalStationsN24InOctets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 33), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apTotalStationsN24InOctets.setStatus('current') if mibBuilder.loadTexts: apTotalStationsN24InOctets.setDescription('Number of octets from client to AP for clients using protocol 802.11n (2.4Ghz).') apTotalStationsN24OutOctets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 34), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apTotalStationsN24OutOctets.setStatus('current') if mibBuilder.loadTexts: apTotalStationsN24OutOctets.setDescription('Number of octets from AP to client for clients using protocol 802.11n (2.4Ghz).') apTotalStationsACInOctets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 35), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apTotalStationsACInOctets.setStatus('current') if mibBuilder.loadTexts: apTotalStationsACInOctets.setDescription('Number of octets from client to AP for clients using protocol 802.11ac.') apTotalStationsACOutOctets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 36), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apTotalStationsACOutOctets.setStatus('current') if mibBuilder.loadTexts: apTotalStationsACOutOctets.setDescription('Number of octets from AP to client for clients using protocol 802.11ac.') apRegistrationRequests = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 3), Counter32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apRegistrationRequests.setStatus('current') if mibBuilder.loadTexts: apRegistrationRequests.setDescription('Total registration request have been received by all access points since last reboot.') apRadioStatusTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 4), ) if mibBuilder.loadTexts: apRadioStatusTable.setStatus('current') if mibBuilder.loadTexts: apRadioStatusTable.setDescription('Table of radio configuration attributes that the AP can change dynamically. It contains one entry for each radio of each active AP.') apRadioStatusEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 4, 1), ).setIndexNames((0, "IF-MIB", "ifIndex")) if mibBuilder.loadTexts: apRadioStatusEntry.setStatus('current') if mibBuilder.loadTexts: apRadioStatusEntry.setDescription('The configuration attributes of one AP radio that the AP can change dynamically.') apRadioStatusChannel = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 4, 1, 1), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apRadioStatusChannel.setStatus('current') if mibBuilder.loadTexts: apRadioStatusChannel.setDescription('The lowest 20 MHz channel of the 20/40/80 MHz wide channel on which the radio is operating. This can be different from the administratively configured channel as a result of the AP complying with regulatory requirements like DFS or adapting to the RF environment (e.g. DCS). If this field value is set to 0, then this means this radio is off or this AP is in Guardian mode.') apRadioStatusChannelWidth = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 4, 1, 2), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 4))).clone(namedValues=NamedValues(("width20Mhz", 1), ("width40Mhz", 2), ("width80Mhz", 4)))).setMaxAccess("readonly") if mibBuilder.loadTexts: apRadioStatusChannelWidth.setStatus('current') if mibBuilder.loadTexts: apRadioStatusChannelWidth.setDescription("Maximum width of the channel being served by the AP's radio. The AP may select a different channel width from the administratively configured width in order to comply with regulatory requirements and the current RF environment.") apRadioStatusChannelOffset = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 4, 1, 3), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apRadioStatusChannelOffset.setStatus('current') if mibBuilder.loadTexts: apRadioStatusChannelOffset.setDescription('This is the offset (in 20 MHz channels) of the primary channel from the lowest 20 MHz channel within an aggregated channel. The offset can be 0 if the primary channel is the same as the lowest channel or it can be 1,2 or 3 depending on the aggregate channel width. The AP may select a different channel width from the administratively configured width in order to comply with regulatory requirements and the current RF environment.') apPerformanceReportByRadioTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5), ) if mibBuilder.loadTexts: apPerformanceReportByRadioTable.setStatus('current') if mibBuilder.loadTexts: apPerformanceReportByRadioTable.setDescription('Table of AP performance statistics by radio that the AP can change dynamically. It contains one entry for each radio of each active AP.') apPerformanceReportByRadioEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "apIndex"), (0, "HIPATH-WIRELESS-HWC-MIB", "apRadioIndex")) if mibBuilder.loadTexts: apPerformanceReportByRadioEntry.setStatus('current') if mibBuilder.loadTexts: apPerformanceReportByRadioEntry.setDescription('The AP radio performance statistics of one AP radio.') apRadioIndex = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 1), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 2))) if mibBuilder.loadTexts: apRadioIndex.setStatus('current') if mibBuilder.loadTexts: apRadioIndex.setDescription('Index of an radio inside an AP.') apPerfRadioPrevPeakChannelUtilization = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 2), Gauge32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfRadioPrevPeakChannelUtilization.setStatus('current') if mibBuilder.loadTexts: apPerfRadioPrevPeakChannelUtilization.setDescription('Peak channel utilization in % from last 15 minute interval.') apPerfRadioCurPeakChannelUtilization = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 3), Gauge32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfRadioCurPeakChannelUtilization.setStatus('current') if mibBuilder.loadTexts: apPerfRadioCurPeakChannelUtilization.setDescription('Peak channel utilization in % of current 15 minute interval.') apPerfRadioAverageChannelUtilization = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 4), HundredthOfGauge32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfRadioAverageChannelUtilization.setStatus('current') if mibBuilder.loadTexts: apPerfRadioAverageChannelUtilization.setDescription('Running average of channel utilization in hundredth of a %.') apPerfRadioCurrentChannelUtilization = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 5), Gauge32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfRadioCurrentChannelUtilization.setStatus('current') if mibBuilder.loadTexts: apPerfRadioCurrentChannelUtilization.setDescription('Channel utilization in % from latest statistics from AP.') apPerfRadioPrevPeakRSS = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 6), Gauge32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfRadioPrevPeakRSS.setStatus('current') if mibBuilder.loadTexts: apPerfRadioPrevPeakRSS.setDescription('Peak RSS in dBm from last 15 minute interval. Value of -100 means this field is not available.') apPerfRadioCurPeakRSS = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 7), Gauge32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfRadioCurPeakRSS.setStatus('current') if mibBuilder.loadTexts: apPerfRadioCurPeakRSS.setDescription('Peak RSS in dBm of current 15 minute interval. Value of -100 means this field is not available.') apPerfRadioAverageRSS = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 8), HundredthOfInt32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfRadioAverageRSS.setStatus('current') if mibBuilder.loadTexts: apPerfRadioAverageRSS.setDescription('Running average of RSS in hundredth of a dBm. Value of -10000 means this field is not available.') apPerfRadioCurrentRSS = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 9), Gauge32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfRadioCurrentRSS.setStatus('current') if mibBuilder.loadTexts: apPerfRadioCurrentRSS.setDescription('RSS in dBm from latest statistics from AP. Value of -100 means this field is not available.') apPerfRadioPrevPeakSNR = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 10), Gauge32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfRadioPrevPeakSNR.setStatus('current') if mibBuilder.loadTexts: apPerfRadioPrevPeakSNR.setDescription('Peak SNR in dB from last 15 minute interval. Value of -100 means this field is not available.') apPerfRadioCurPeakSNR = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 11), Gauge32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfRadioCurPeakSNR.setStatus('current') if mibBuilder.loadTexts: apPerfRadioCurPeakSNR.setDescription('Peak SNR in dB of current 15 minute interval. Value of -100 means this field is not available.') apPerfRadioAverageSNR = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 12), HundredthOfInt32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfRadioAverageSNR.setStatus('current') if mibBuilder.loadTexts: apPerfRadioAverageSNR.setDescription('Running average of SNR in hundredth of a dB. Value of -10000 means this field is not available.') apPerfRadioCurrentSNR = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 13), Gauge32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfRadioCurrentSNR.setStatus('current') if mibBuilder.loadTexts: apPerfRadioCurrentSNR.setDescription('SNR in dB from latest statistics from AP. Value of -100 means this field is not available.') apPerfRadioPrevPeakPktRetx = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 14), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfRadioPrevPeakPktRetx.setStatus('current') if mibBuilder.loadTexts: apPerfRadioPrevPeakPktRetx.setDescription('Peak packet retransmissions in hundredth of pps from last 15 minute interval.') apPerfRadioCurPeakPktRetx = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 15), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfRadioCurPeakPktRetx.setStatus('current') if mibBuilder.loadTexts: apPerfRadioCurPeakPktRetx.setDescription('Peak packet retransmissions in hundredth of pps of current 15 minute interval.') apPerfRadioAveragePktRetx = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 16), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfRadioAveragePktRetx.setStatus('current') if mibBuilder.loadTexts: apPerfRadioAveragePktRetx.setDescription('Running average of packet retransmissions in hundredth of pps.') apPerfRadioCurrentPktRetx = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 17), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfRadioCurrentPktRetx.setStatus('current') if mibBuilder.loadTexts: apPerfRadioCurrentPktRetx.setDescription('Packet retransmissions in hundredth of pps from latest statistics from AP.') apPerfRadioPktRetx = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 18), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfRadioPktRetx.setStatus('current') if mibBuilder.loadTexts: apPerfRadioPktRetx.setDescription('Running counter of number of packet retransmissions.') apAccessibilityTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6), ) if mibBuilder.loadTexts: apAccessibilityTable.setStatus('current') if mibBuilder.loadTexts: apAccessibilityTable.setDescription('A table showing the rate of associations, reassociations and deauthentications/dissassociations from each AP radio. The table contains one row per radio per active AP.') apAccessibilityEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "apIndex"), (0, "HIPATH-WIRELESS-HWC-MIB", "apRadioIndex")) if mibBuilder.loadTexts: apAccessibilityEntry.setStatus('current') if mibBuilder.loadTexts: apAccessibilityEntry.setDescription('The accessibility statistics of one AP radio.') apAccPrevPeakAssocReqRx = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 1), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apAccPrevPeakAssocReqRx.setStatus('current') if mibBuilder.loadTexts: apAccPrevPeakAssocReqRx.setDescription('Peak number of association requests in hundredth of requests per second received by AP from last 15 minute interval.') apAccCurPeakAssocReqRx = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 2), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apAccCurPeakAssocReqRx.setStatus('current') if mibBuilder.loadTexts: apAccCurPeakAssocReqRx.setDescription('Peak number of association requests in hundredth of requests per second received by AP of current 15 minute interval.') apAccAverageAssocReqRx = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 3), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apAccAverageAssocReqRx.setStatus('current') if mibBuilder.loadTexts: apAccAverageAssocReqRx.setDescription('Running average of association requests in hundredth of requests per second received by an AP radio.') apAccCurrentAssocReqRx = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 4), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apAccCurrentAssocReqRx.setStatus('current') if mibBuilder.loadTexts: apAccCurrentAssocReqRx.setDescription('Association requests in hundredth of requests per second from latest statistics from AP.') apAccAssocReqRx = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 5), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apAccAssocReqRx.setStatus('current') if mibBuilder.loadTexts: apAccAssocReqRx.setDescription('Running counter of association requests.') apAccPrevPeakReassocReqRx = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 6), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apAccPrevPeakReassocReqRx.setStatus('current') if mibBuilder.loadTexts: apAccPrevPeakReassocReqRx.setDescription('Peak number of re-association requests in hundredth of requests per second received by an AP radio from last 15 minute interval.') apAccCurPeakReassocReqRx = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 7), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apAccCurPeakReassocReqRx.setStatus('current') if mibBuilder.loadTexts: apAccCurPeakReassocReqRx.setDescription('Peak number of re-association requests in hundredth of requests per second received by an AP radio of current 15 minute interval.') apAccAverageReassocReqRx = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 8), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apAccAverageReassocReqRx.setStatus('current') if mibBuilder.loadTexts: apAccAverageReassocReqRx.setDescription('Running average of re-association requests in hundredth of requests per second received by an AP radio.') apAccCurrentReassocReqRx = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 9), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apAccCurrentReassocReqRx.setStatus('current') if mibBuilder.loadTexts: apAccCurrentReassocReqRx.setDescription('Re-association requests in hundredth of requests per second received by an AP radio from latest statistics from AP.') apAccReassocReqRx = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 10), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apAccReassocReqRx.setStatus('current') if mibBuilder.loadTexts: apAccReassocReqRx.setDescription('Running counter of re-association requests received by an AP radio.') apAccPrevPeakDisassocDeauthReqTx = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 11), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apAccPrevPeakDisassocDeauthReqTx.setStatus('current') if mibBuilder.loadTexts: apAccPrevPeakDisassocDeauthReqTx.setDescription('Peak number of disassociation/deauthentication requests in hundredth of requests per second transmitted by an AP radio from last 15 minute interval.') apAccCurPeakDisassocDeauthReqTx = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 12), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apAccCurPeakDisassocDeauthReqTx.setStatus('current') if mibBuilder.loadTexts: apAccCurPeakDisassocDeauthReqTx.setDescription('Peak number of disassociation/deauthentication requests in hundredth of requests per second transmitted by an AP radio of current 15 minute interval.') apAccAverageDisassocDeauthReqTx = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 13), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apAccAverageDisassocDeauthReqTx.setStatus('current') if mibBuilder.loadTexts: apAccAverageDisassocDeauthReqTx.setDescription('Running average of disassociation/deauthentication requests in hundredth of requests per second transmitted by an AP radio.') apAccCurrentDisassocDeauthReqTx = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 14), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apAccCurrentDisassocDeauthReqTx.setStatus('current') if mibBuilder.loadTexts: apAccCurrentDisassocDeauthReqTx.setDescription('Disassociation/deauthentication requests in hundredth of requests per second transmitted by an AP radio from latest statistics from AP.') apAccDisassocDeauthReqTx = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 15), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apAccDisassocDeauthReqTx.setStatus('current') if mibBuilder.loadTexts: apAccDisassocDeauthReqTx.setDescription('Running counter of disassociation/deauthentication requests transmitted by an AP radio.') apAccPrevPeakDisassocDeauthReqRx = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 16), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apAccPrevPeakDisassocDeauthReqRx.setStatus('current') if mibBuilder.loadTexts: apAccPrevPeakDisassocDeauthReqRx.setDescription('Peak number of disassociation/deauthentication requests in hundredth of requests per second received by an AP radio from last 15 minute interval.') apAccCurPeakDisassocDeauthReqRx = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 17), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apAccCurPeakDisassocDeauthReqRx.setStatus('current') if mibBuilder.loadTexts: apAccCurPeakDisassocDeauthReqRx.setDescription('Peak number of disassociation/deauthentication requests in hundredth of requests per second received by an AP radio of current 15 minute interval.') apAccAverageDisassocDeauthReqRx = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 18), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apAccAverageDisassocDeauthReqRx.setStatus('current') if mibBuilder.loadTexts: apAccAverageDisassocDeauthReqRx.setDescription('Running average of disassociation/deauthentication requests in hundredth of requests per second received by an AP radio.') apAccCurrentDisassocDeauthReqRx = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 19), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apAccCurrentDisassocDeauthReqRx.setStatus('current') if mibBuilder.loadTexts: apAccCurrentDisassocDeauthReqRx.setDescription('Disassociation/deauthentication requests in hundredth of requests per second received by an AP radio from latest statistics from AP.') apAccDisassocDeauthReqRx = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 20), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apAccDisassocDeauthReqRx.setStatus('current') if mibBuilder.loadTexts: apAccDisassocDeauthReqRx.setDescription('Running counter of disassociation/deauthentication requests received by an AP radio.') apPerformanceReportbyRadioAndWlanTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7), ) if mibBuilder.loadTexts: apPerformanceReportbyRadioAndWlanTable.setStatus('current') if mibBuilder.loadTexts: apPerformanceReportbyRadioAndWlanTable.setDescription('Table of AP performance statistics by AP, AP radio and WLAN. ') apPerformanceReportbyRadioAndWlanEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "apIndex"), (0, "HIPATH-WIRELESS-HWC-MIB", "apRadioIndex"), (0, "HIPATH-WIRELESS-HWC-MIB", "wlanID")) if mibBuilder.loadTexts: apPerformanceReportbyRadioAndWlanEntry.setStatus('current') if mibBuilder.loadTexts: apPerformanceReportbyRadioAndWlanEntry.setDescription('The AP performance statistics of one AP radio and WLAN.') apPerfWlanPrevPeakClientsPerSec = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 1), Gauge32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfWlanPrevPeakClientsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanPrevPeakClientsPerSec.setDescription('Peak clients per second from last 15 minute interval.') apPerfWlanCurPeakClientsPerSec = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 2), Gauge32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfWlanCurPeakClientsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanCurPeakClientsPerSec.setDescription('Peak clients per second of current 15 minute interval.') apPerfWlanAverageClientsPerSec = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 3), HundredthOfGauge32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfWlanAverageClientsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanAverageClientsPerSec.setDescription('Running average of clients in hundredth of clients per second.') apPerfWlanCurrentClientsPerSec = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 4), Gauge32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfWlanCurrentClientsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanCurrentClientsPerSec.setDescription('Clients per second from latest statistics from AP.') apPerfWlanPrevPeakULOctetsPerSec = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 5), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfWlanPrevPeakULOctetsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanPrevPeakULOctetsPerSec.setDescription('Peak uplink octets in hundredth of octets per second from last 15 minute interval.') apPerfWlanCurPeakULOctetsPerSec = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 6), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfWlanCurPeakULOctetsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanCurPeakULOctetsPerSec.setDescription('Peak uplink octets in hundredth of octets per second of current 15 minute interval.') apPerfWlanAverageULOctetsPerSec = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 7), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfWlanAverageULOctetsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanAverageULOctetsPerSec.setDescription('Running average of uplink hundredth of octets per second.') apPerfWlanCurrentULOctetsPerSec = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 8), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfWlanCurrentULOctetsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanCurrentULOctetsPerSec.setDescription('Uplink octets in hundredth of octets per second from latest statistics from AP.') apPerfWlanULOctets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 9), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfWlanULOctets.setStatus('current') if mibBuilder.loadTexts: apPerfWlanULOctets.setDescription('Running counter of uplink octets per second.') apPerfWlanPrevPeakULPktsPerSec = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 10), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfWlanPrevPeakULPktsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanPrevPeakULPktsPerSec.setDescription('Peak uplink packets in hundredth of packets per second from last 15 minute interval.') apPerfWlanCurPeakULPktsPerSec = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 11), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfWlanCurPeakULPktsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanCurPeakULPktsPerSec.setDescription('Peak uplink packets in hundredth of packets per second of current 15 minute interval.') apPerfWlanAverageULPktsPerSec = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 12), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfWlanAverageULPktsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanAverageULPktsPerSec.setDescription('Running average of uplink packets in hundredth of packets per second.') apPerfWlanCurrentULPktsPerSec = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 13), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfWlanCurrentULPktsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanCurrentULPktsPerSec.setDescription('Uplink packets in hundredth of packets per second from latest statistics from AP.') apPerfWlanULPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 14), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfWlanULPkts.setStatus('current') if mibBuilder.loadTexts: apPerfWlanULPkts.setDescription('Running counter of uplink packets per second.') apPerfWlanPrevPeakDLOctetsPerSec = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 15), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfWlanPrevPeakDLOctetsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanPrevPeakDLOctetsPerSec.setDescription('Peak downlink octets in hundredth of octets per second from last 15 minute interval.') apPerfWlanCurPeakDLOctetsPerSec = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 16), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfWlanCurPeakDLOctetsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanCurPeakDLOctetsPerSec.setDescription('Peak downlink octets in hundredth of octets per second of current 15 minute interval.') apPerfWlanAverageDLOctetsPerSec = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 17), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfWlanAverageDLOctetsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanAverageDLOctetsPerSec.setDescription('Running average of downlink octets in hundredth of octets per second.') apPerfWlanCurrentDLOctetsPerSec = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 18), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfWlanCurrentDLOctetsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanCurrentDLOctetsPerSec.setDescription('Downlink octets in hundredth octets per second from latest statistics from AP.') apPerfWlanDLOctets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 19), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfWlanDLOctets.setStatus('current') if mibBuilder.loadTexts: apPerfWlanDLOctets.setDescription('Running counter of downlink octets per second.') apPerfWlanPrevPeakDLPktsPerSec = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 20), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfWlanPrevPeakDLPktsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanPrevPeakDLPktsPerSec.setDescription('Peak downlink packets in hundredth of packets per second from last 15 minute interval.') apPerfWlanCurPeakDLPktsPerSec = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 21), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfWlanCurPeakDLPktsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanCurPeakDLPktsPerSec.setDescription('Peak downlink packets in hundredth of packets per second of current 15 minute interval.') apPerfWlanAverageDLPktsPerSec = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 22), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfWlanAverageDLPktsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanAverageDLPktsPerSec.setDescription('Running average of downlink packets in hundredth of packets per second.') apPerfWlanCurrentDLPktsPerSec = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 23), HundredthOfGauge64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfWlanCurrentDLPktsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanCurrentDLPktsPerSec.setDescription('Downlink packets in hundredth of packets per second from latest statistics from AP.') apPerfWlanDLPkts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 24), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: apPerfWlanDLPkts.setStatus('current') if mibBuilder.loadTexts: apPerfWlanDLPkts.setDescription('Running counter of downlink packets per second.') apChannelUtilizationTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 8), ) if mibBuilder.loadTexts: apChannelUtilizationTable.setStatus('current') if mibBuilder.loadTexts: apChannelUtilizationTable.setDescription('Table of AP utilization by channel that the AP can change dynamically. It contains one entry for each radio and channel of each active AP.') apChannelUtilizationEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 8, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "apIndex"), (0, "HIPATH-WIRELESS-HWC-MIB", "apRadioIndex"), (0, "HIPATH-WIRELESS-HWC-MIB", "channel")) if mibBuilder.loadTexts: apChannelUtilizationEntry.setStatus('current') if mibBuilder.loadTexts: apChannelUtilizationEntry.setDescription('The AP performance statistics of one AP radio and channel.') channel = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 8, 1, 1), Unsigned32()) if mibBuilder.loadTexts: channel.setStatus('current') if mibBuilder.loadTexts: channel.setDescription('Channel on which utilization is measured.') apChnlUtilPrevPeakUtilization = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 8, 1, 2), Gauge32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apChnlUtilPrevPeakUtilization.setStatus('current') if mibBuilder.loadTexts: apChnlUtilPrevPeakUtilization.setDescription('Peak channel utilization in % from last 15 minute interval.') apChnlUtilCurPeakUtilization = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 8, 1, 3), Gauge32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apChnlUtilCurPeakUtilization.setStatus('current') if mibBuilder.loadTexts: apChnlUtilCurPeakUtilization.setDescription('Peak channel utilization in % of current 15 minute interval.') apChnlUtilAverageUtilization = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 8, 1, 4), HundredthOfGauge32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apChnlUtilAverageUtilization.setStatus('current') if mibBuilder.loadTexts: apChnlUtilAverageUtilization.setDescription('Running average of channel utilization in hundredth of %.') apChnlUtilCurrentUtilization = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 8, 1, 5), Gauge32()).setMaxAccess("readonly") if mibBuilder.loadTexts: apChnlUtilCurrentUtilization.setStatus('current') if mibBuilder.loadTexts: apChnlUtilCurrentUtilization.setDescription('Channel utilization in % from latest statistics from AP.') apNeighboursTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 9), ) if mibBuilder.loadTexts: apNeighboursTable.setStatus('current') if mibBuilder.loadTexts: apNeighboursTable.setDescription('A table showing the BSSID, RSS, operating radio channel and detailed information of a nearby AP. The table contains one row per nearby AP per radio per active AP.') apNeighboursEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 9, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "apIndex"), (0, "IF-MIB", "ifIndex"), (0, "HIPATH-WIRELESS-HWC-MIB", "nearbyApIndex")) if mibBuilder.loadTexts: apNeighboursEntry.setStatus('current') if mibBuilder.loadTexts: apNeighboursEntry.setDescription('The configuration attributes of one nearby AP.') nearbyApIndex = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 9, 1, 1), Unsigned32()) if mibBuilder.loadTexts: nearbyApIndex.setStatus('current') if mibBuilder.loadTexts: nearbyApIndex.setDescription('Nearby AP index.') nearbyApInfo = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 9, 1, 2), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: nearbyApInfo.setStatus('current') if mibBuilder.loadTexts: nearbyApInfo.setDescription('Detailed information of a nearby AP. ') nearbyApBSSID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 9, 1, 3), OctetString().subtype(subtypeSpec=ValueSizeConstraint(17, 17)).setFixedLength(17)).setMaxAccess("readonly") if mibBuilder.loadTexts: nearbyApBSSID.setStatus('current') if mibBuilder.loadTexts: nearbyApBSSID.setDescription('The BSSID of a nearby AP. ') nearbyApChannel = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 9, 1, 4), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: nearbyApChannel.setStatus('current') if mibBuilder.loadTexts: nearbyApChannel.setDescription('The operating radio channel of a nearby AP. ') nearbyApRSS = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 9, 1, 5), Integer32()).setMaxAccess("readonly") if mibBuilder.loadTexts: nearbyApRSS.setStatus('current') if mibBuilder.loadTexts: nearbyApRSS.setDescription('The Received Signal Strength of a nearby AP. ') sensorManagement = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 3)) tftpSever = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 3, 1), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: tftpSever.setStatus('current') if mibBuilder.loadTexts: tftpSever.setDescription('TFTP server that sensor image resides.') imagePath26xx = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 3, 2), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: imagePath26xx.setStatus('current') if mibBuilder.loadTexts: imagePath26xx.setDescription('Path of sensor image on TFTP server.') imagePath36xx = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 3, 3), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: imagePath36xx.setStatus('current') if mibBuilder.loadTexts: imagePath36xx.setDescription('Path of sensor image on TFTP server.') imageVersionOfap26xx = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 3, 4), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: imageVersionOfap26xx.setStatus('current') if mibBuilder.loadTexts: imageVersionOfap26xx.setDescription("Sensor's software version.") imageVersionOfngap36xx = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 3, 5), DisplayString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: imageVersionOfngap36xx.setStatus('current') if mibBuilder.loadTexts: imageVersionOfngap36xx.setDescription("Sensor's softerware version for Next Generation Access Point.") apRegistration = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 4)) apRegSecurityMode = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 4, 1), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("allowAll", 1), ("allowApprovedOnes", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: apRegSecurityMode.setStatus('current') if mibBuilder.loadTexts: apRegSecurityMode.setDescription("Indicates registration mode for an AP. If allowAll(1), then all wireless APs are allowed to register to the controlloer, otherwise only approved APs in 'Approved AP' list are allowed to register to the controller.") apRegDiscoveryRetries = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 4, 2), Unsigned32().subtype(subtypeSpec=ValueRangeConstraint(1, 255)).clone(3)).setMaxAccess("readwrite") if mibBuilder.loadTexts: apRegDiscoveryRetries.setStatus('current') if mibBuilder.loadTexts: apRegDiscoveryRetries.setDescription('Number of retries for discovery requests from an access point to controller. After these number of retries, the access point will start over again after some arbitrary delays.') apRegDiscoveryInterval = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 4, 3), Unsigned32().subtype(subtypeSpec=ValueRangeConstraint(1, 10)).clone(3)).setUnits('seconds').setMaxAccess("readwrite") if mibBuilder.loadTexts: apRegDiscoveryInterval.setStatus('current') if mibBuilder.loadTexts: apRegDiscoveryInterval.setDescription('Interval between two consecutive discovery requests from the same access point.') apRegTelnetPassword = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 4, 4), OctetString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apRegTelnetPassword.setStatus('current') if mibBuilder.loadTexts: apRegTelnetPassword.setDescription('Password used to access an AP via telnet. This field is write-only and read access returns empty string.') apRegSSHPassword = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 4, 5), OctetString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apRegSSHPassword.setStatus('current') if mibBuilder.loadTexts: apRegSSHPassword.setDescription('SSH password used to access an access point. This field is write-only and read access returns empty string.') apRegUseClusterEncryption = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 4, 6), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apRegUseClusterEncryption.setStatus('current') if mibBuilder.loadTexts: apRegUseClusterEncryption.setDescription('If this field set to true, then all APs in the cluster use cluster encryption.') apRegClusterSharedSecret = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 4, 7), OctetString()).setMaxAccess("readwrite") if mibBuilder.loadTexts: apRegClusterSharedSecret.setStatus('current') if mibBuilder.loadTexts: apRegClusterSharedSecret.setDescription('Password for cluster encryption. This field is write-only and read access returns empty string.') loadBalancing = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5)) loadGroupTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 1), ) if mibBuilder.loadTexts: loadGroupTable.setStatus('current') if mibBuilder.loadTexts: loadGroupTable.setDescription('Table of configured load groups for access points. A set of access points can be grouped together and they are identified by unique name. An access point can only be assigned to one group.') loadGroupEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 1, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "loadGroupID")) if mibBuilder.loadTexts: loadGroupEntry.setStatus('current') if mibBuilder.loadTexts: loadGroupEntry.setDescription('An entry containing definition of a load group. There exists two types of load group: client-balancing-group and radio-balancing-group.') loadGroupID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 1, 1, 1), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: loadGroupID.setStatus('current') if mibBuilder.loadTexts: loadGroupID.setDescription('Internally generated ID for a group and cannot be changed externally.') loadGroupName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 1, 1, 2), DisplayString().subtype(subtypeSpec=ValueSizeConstraint(1, 32))).setMaxAccess("readwrite") if mibBuilder.loadTexts: loadGroupName.setStatus('current') if mibBuilder.loadTexts: loadGroupName.setDescription('Unique name assigned to the group.') loadGroupType = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 1, 1, 3), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("clientBalancing", 0), ("radioBalancing", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: loadGroupType.setStatus('current') if mibBuilder.loadTexts: loadGroupType.setDescription('Type of load balancing this group supports.') loadGroupBandPreference = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 1, 1, 4), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disabled", 0), ("enabled", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: loadGroupBandPreference.setStatus('current') if mibBuilder.loadTexts: loadGroupBandPreference.setDescription('Band preference is enabled for this group if this field is set to true and group type is set to radioBalancing(1).') loadGroupLoadControl = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 1, 1, 5), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disabled", 0), ("enabled", 1))).clone('disabled')).setMaxAccess("readwrite") if mibBuilder.loadTexts: loadGroupLoadControl.setStatus('deprecated') if mibBuilder.loadTexts: loadGroupLoadControl.setDescription('Load balancing is enabled for this group if this field is set to true and group type is set to radioBalancing(1).') loadGroupClientCountRadio1 = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 1, 1, 6), Unsigned32().subtype(subtypeSpec=ConstraintsUnion(ValueRangeConstraint(5, 60), ValueRangeConstraint(121, 121), )).clone(121)).setMaxAccess("readwrite") if mibBuilder.loadTexts: loadGroupClientCountRadio1.setStatus('current') if mibBuilder.loadTexts: loadGroupClientCountRadio1.setDescription('Maximum number of client on this radio. This field is only applicable to a group with radioBalancing(1) type.') loadGroupClientCountRadio2 = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 1, 1, 7), Unsigned32().subtype(subtypeSpec=ConstraintsUnion(ValueRangeConstraint(5, 60), ValueRangeConstraint(121, 121), )).clone(121)).setMaxAccess("readwrite") if mibBuilder.loadTexts: loadGroupClientCountRadio2.setStatus('current') if mibBuilder.loadTexts: loadGroupClientCountRadio2.setDescription('Maximum number of client on this radio. This field is only applicable to a group with radioBalancing(1) type.') loadGroupLoadControlEnableR1 = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 1, 1, 8), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disabled", 0), ("enabled", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: loadGroupLoadControlEnableR1.setStatus('current') if mibBuilder.loadTexts: loadGroupLoadControlEnableR1.setDescription('If it is enabled then load control is applicable to radio #1 of all access points that are assigned to this load group. This field has meaning only for the load group that is of radioBalancing(1) type. ') loadGroupLoadControlEnableR2 = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 1, 1, 9), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disabled", 0), ("enabled", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: loadGroupLoadControlEnableR2.setStatus('current') if mibBuilder.loadTexts: loadGroupLoadControlEnableR2.setDescription('If it is enabled then load control is applicable to radio #2 of all access points that are assigned to this load group. This field has meaning only for the load group that is of radioBalancing(1) type.') loadGroupLoadControlStrictLimitR1 = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 1, 1, 10), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disabled", 0), ("enabled", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: loadGroupLoadControlStrictLimitR1.setStatus('current') if mibBuilder.loadTexts: loadGroupLoadControlStrictLimitR1.setDescription('If it is enabled then strict limit for load control is applicable to radio #1 of all access points that are assigned to this load group. This field has meaning only for the load group that is of radioBalancing(1) type.') loadGroupLoadControlStrictLimitR2 = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 1, 1, 11), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disabled", 0), ("enabled", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: loadGroupLoadControlStrictLimitR2.setStatus('current') if mibBuilder.loadTexts: loadGroupLoadControlStrictLimitR2.setDescription('If it is enabled then strict limit for load control is applicable to radio #2 of all access points that are assigned to this load group. This field has meaning only for the load group that is of radioBalancing(1) type.') loadGrpRadiosTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 2), ) if mibBuilder.loadTexts: loadGrpRadiosTable.setStatus('current') if mibBuilder.loadTexts: loadGrpRadiosTable.setDescription('Table of radio assignment to defined load groups. ') loadGrpRadiosEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 2, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "loadGroupID"), (0, "HIPATH-WIRELESS-HWC-MIB", "apIndex")) if mibBuilder.loadTexts: loadGrpRadiosEntry.setStatus('current') if mibBuilder.loadTexts: loadGrpRadiosEntry.setDescription('Any entry defining radio assignment of AP, identified by apIndex, to a load group identified by loadGroupID.') loadGrpRadiosRadio1 = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 2, 1, 2), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2))).clone(namedValues=NamedValues(("notApplicable", 0), ("assigned", 1), ("unassigned", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: loadGrpRadiosRadio1.setStatus('current') if mibBuilder.loadTexts: loadGrpRadiosRadio1.setDescription("If this field is set to 'assigned(1)', then the radio of the AP identified by the apIndex is a member of the load balancing group identified by the loadBlanaceID. For radio blanacing group, either all or none of the radios of a specific AP (indentified by apIndex) are assigned to the load balancing group.") loadGrpRadiosRadio2 = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 2, 1, 3), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2))).clone(namedValues=NamedValues(("notApplicable", 0), ("assigned", 1), ("unassigned", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: loadGrpRadiosRadio2.setStatus('current') if mibBuilder.loadTexts: loadGrpRadiosRadio2.setDescription("If this field is set to 'assigned(2)', then the radio of the AP identified by the apIndex is a member of the load balancing group identified by the loadBlanaceID. For radio blanacing group, either all or none of the radios of a specific AP (indentified by apIndex) are assigned to the load balancing group.") loadGrpWlanTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 3), ) if mibBuilder.loadTexts: loadGrpWlanTable.setStatus('current') if mibBuilder.loadTexts: loadGrpWlanTable.setDescription('Table of WLAN assignment to defined load groups. ') loadGrpWlanEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 3, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "loadGroupID"), (0, "HIPATH-WIRELESS-HWC-MIB", "wlanID")) if mibBuilder.loadTexts: loadGrpWlanEntry.setStatus('current') if mibBuilder.loadTexts: loadGrpWlanEntry.setDescription('An entry defining WLAN, identified by wlanID, assignment to a load group identified by loadGroupID.') loadGrpWlanAssigned = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 3, 1, 1), TruthValue()).setMaxAccess("readwrite") if mibBuilder.loadTexts: loadGrpWlanAssigned.setStatus('current') if mibBuilder.loadTexts: loadGrpWlanAssigned.setDescription('Assignement of WLAN, identified with wlanID, to the load balancing group identified bye loadGroupID.') apMaintenanceCycle = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 6)) schedule = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 6, 1), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3))).clone(namedValues=NamedValues(("never", 0), ("daily", 1), ("weekly", 2), ("monthly", 3)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: schedule.setStatus('current') if mibBuilder.loadTexts: schedule.setDescription('AP maintenance schedule options. 0 : never perform the maintenance action. 1 : perform the maintenance action every day. 2 : perform the maintenance action every week. 3 : perform the maintenance action every month.') startHour = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 6, 2), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 23))).setMaxAccess("readwrite") if mibBuilder.loadTexts: startHour.setStatus('current') if mibBuilder.loadTexts: startHour.setDescription('Maintenance action starts at this hour of the day. ') startMinute = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 6, 3), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 59))).setMaxAccess("readwrite") if mibBuilder.loadTexts: startMinute.setStatus('current') if mibBuilder.loadTexts: startMinute.setDescription('Maintenance action starts at this minute of the hour. ') duration = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 6, 4), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 23))).setMaxAccess("readwrite") if mibBuilder.loadTexts: duration.setStatus('current') if mibBuilder.loadTexts: duration.setDescription('Duration of the AP maintenance cycle (how often maintenance is done) in hours. ') recurrenceDaily = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 6, 5), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2))).clone(namedValues=NamedValues(("everyDay", 0), ("everyWeekday", 1), ("everyWeekend", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: recurrenceDaily.setStatus('current') if mibBuilder.loadTexts: recurrenceDaily.setDescription('This field has meaning only when the maintenance schedule option is set to daily(1). Below is the recurrence option. 0 : every day. 1 : every weekday. 2 : every weekend.') recurrenceWeekly = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 6, 6), Bits().clone(namedValues=NamedValues(("sunday", 0), ("monday", 1), ("tuesday", 2), ("wednesday", 3), ("thursday", 4), ("friday", 5), ("saturday", 6)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: recurrenceWeekly.setStatus('current') if mibBuilder.loadTexts: recurrenceWeekly.setDescription('This field has meaning only when the maintenance schedule option is set to weekly(2). Below are the recurrence options. BIT 0 : Sunday. BIT 1 : Monday. BIT 2 : Tuesday. BIT 3 : Wednesday. BIT 4 : Thursday. BIT 5 : Friday. BIT 6 : Saturday.') recurrenceMonthly = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 6, 7), Bits().clone(namedValues=NamedValues(("first", 0), ("second", 1), ("third", 2), ("fourth", 3), ("fifth", 4), ("sunday", 5), ("monday", 6), ("tuesday", 7), ("wednesday", 8), ("thursday", 9), ("friday", 10), ("saturday", 11)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: recurrenceMonthly.setStatus('current') if mibBuilder.loadTexts: recurrenceMonthly.setDescription('This field has meaning only when the maintenance schedule option is set to monthly(3). Below are the recurrence options. BIT 0 : the first week of the month. BIT 1 : the second week of the month. BIT 2 : the third week of the month. BIT 3 : the fourth week of the month. BIT 4 : the fifth week of the month. BIT 5 : sunday of the week. BIT 6 : monday of the week. BIT 7 : tuesday of the week. BIT 8 : wednesday of the week. BIT 9 : thursday of the week. BIT 10 : friday of the week. BIT 11 : saturday of the week.') apPlatforms = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 6, 8), Bits().clone(namedValues=NamedValues(("ap2600", 0), ("ap2605", 1), ("ap2650", 2), ("ap4102", 3), ("w786", 4), ("ap3705", 5), ("ap3710", 6), ("ap3715", 7), ("ap3765", 8), ("ap3767", 9), ("ap3801", 10), ("ap3805", 11), ("ap3825", 12), ("ap3865", 13), ("ap3935", 14), ("ap3965", 15), ("w78xc", 16), ("w78xcsfp", 17)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: apPlatforms.setStatus('current') if mibBuilder.loadTexts: apPlatforms.setDescription('Select which models of the AP platforms to perform the maintenance. BIT 0 : AP2600 platform. BIT 1 : AP2605 platform. BIT 2 : AP2650 platform. BIT 3 : AP4102 platform. BIT 4 : W786 platform. BIT 5 : AP3705 platform. BIT 6 : AP3710 platform. BIT 7 : AP3715 platform. BIT 8 : AP3765 platform. BIT 9 : AP3767 platform. BIT 10 : AP3801 platform. BIT 11 : AP3805 platform. BIT 12 : AP3825 platform. BIT 13 : AP3865 platform. BIT 14 : AP3935 platform. BIT 15 : AP3965 platform. BIT 16 : W78XC platform. BIT 17 : W78XCSFP platform.') mobileUnits = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6)) mobileUnitCount = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 1), Integer32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: mobileUnitCount.setStatus('current') if mibBuilder.loadTexts: mobileUnitCount.setDescription('Number of clients associated with the controller.') muTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2), ) if mibBuilder.loadTexts: muTable.setStatus('current') if mibBuilder.loadTexts: muTable.setDescription('Table of information for clients associated with the EWC.') muEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "muMACAddress")) if mibBuilder.loadTexts: muEntry.setStatus('current') if mibBuilder.loadTexts: muEntry.setDescription('Information for a client associated with the EWC.') muMACAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 1), MacAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: muMACAddress.setStatus('current') if mibBuilder.loadTexts: muMACAddress.setDescription('Client MAC address.') muIPAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 2), IpAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: muIPAddress.setStatus('current') if mibBuilder.loadTexts: muIPAddress.setDescription('Client IP Address.') muUser = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 3), OctetString()).setMaxAccess("readonly") if mibBuilder.loadTexts: muUser.setStatus('current') if mibBuilder.loadTexts: muUser.setDescription('Client login name.') muState = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 4), TruthValue()).setMaxAccess("readonly") if mibBuilder.loadTexts: muState.setStatus('current') if mibBuilder.loadTexts: muState.setDescription('True if the client is authenticated.') muAPSerialNo = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 5), OctetString()).setMaxAccess("readonly") if mibBuilder.loadTexts: muAPSerialNo.setStatus('current') if mibBuilder.loadTexts: muAPSerialNo.setDescription('Serial Number of the Access Point the client is associated with.') muVnsSSID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 6), OctetString()).setMaxAccess("readonly") if mibBuilder.loadTexts: muVnsSSID.setStatus('current') if mibBuilder.loadTexts: muVnsSSID.setDescription('SSID of the VNS the client is associated with.') muTxPackets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 7), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: muTxPackets.setStatus('current') if mibBuilder.loadTexts: muTxPackets.setDescription('Number of packets trasmitted to the client.') muRxPackets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 8), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: muRxPackets.setStatus('current') if mibBuilder.loadTexts: muRxPackets.setDescription('Number of packets received from the client.') muTxOctets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 9), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: muTxOctets.setStatus('current') if mibBuilder.loadTexts: muTxOctets.setDescription('Number of octets transmitted to the client.') muRxOctets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 10), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: muRxOctets.setStatus('current') if mibBuilder.loadTexts: muRxOctets.setDescription('Number of octets received from the client.') muDuration = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 11), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: muDuration.setStatus('current') if mibBuilder.loadTexts: muDuration.setDescription('Time client has been associated with the EWC.') muAPName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 12), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: muAPName.setStatus('current') if mibBuilder.loadTexts: muAPName.setDescription('Name of the Access Point the client is associated with.') muTopologyName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 13), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: muTopologyName.setStatus('current') if mibBuilder.loadTexts: muTopologyName.setDescription('Topology name that the MU is associated with.') muPolicyName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 14), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: muPolicyName.setStatus('current') if mibBuilder.loadTexts: muPolicyName.setDescription('The name of the policy that provides filter for this MU.') muDefaultCoS = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 15), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: muDefaultCoS.setStatus('current') if mibBuilder.loadTexts: muDefaultCoS.setDescription('The CoS that is applied to the current traffic if the defined rule for the current traffic has not specifically defined any CoS.') muConnectionProtocol = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 16), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3, 4, 5, 6))).clone(namedValues=NamedValues(("unknown", 0), ("a", 1), ("g", 2), ("b", 3), ("n50", 4), ("n24", 5), ("ac", 6)))).setMaxAccess("readonly") if mibBuilder.loadTexts: muConnectionProtocol.setStatus('current') if mibBuilder.loadTexts: muConnectionProtocol.setDescription('The MU is using this connection protocol for current connection. Symbols notation: n50 = an = n5.0Ghz, n24 = bgn = n2.4Ghz') muConnectionCapability = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 17), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3, 4, 5))).clone(namedValues=NamedValues(("unknown", 0), ("a", 1), ("bg", 2), ("abg", 3), ("an", 4), ("bgn", 5)))).setMaxAccess("readonly") if mibBuilder.loadTexts: muConnectionCapability.setStatus('deprecated') if mibBuilder.loadTexts: muConnectionCapability.setDescription('This field indicates what are the MU connection capability.') muWLANID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 18), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: muWLANID.setStatus('current') if mibBuilder.loadTexts: muWLANID.setDescription('ID of the WLAN that the MU is associated with.') muBSSIDMac = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 19), MacAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: muBSSIDMac.setStatus('current') if mibBuilder.loadTexts: muBSSIDMac.setDescription('Client BSSID MAC address.') muDot11ConnectionCapability = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 20), Bits().clone(namedValues=NamedValues(("dot1150", 0), ("dot1124", 1), ("wpaV1", 2), ("wpaV2", 3), ("oneStream", 4), ("twoStream", 5), ("threeSteam", 6), ("uapsdVoice", 7), ("uapsdVideo", 8), ("uapsdBackground", 9), ("uapsdBesteffort", 10), ("wmm", 11), ("greenfield", 12), ("fastTransition", 13)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: muDot11ConnectionCapability.setStatus('current') if mibBuilder.loadTexts: muDot11ConnectionCapability.setDescription('This field indicates what are the MU connection capabilities. bit 0 : If this bit is set, the client is capable to tx/rx on A radio. bit 1 : If this bit is set, the client is capable to tx/rx on BG radio. bit 2 : If this bit is set, the client is capable of wpaV1 privacy. bit 3 : If this bit is set, the client is capable of wpaV2 privacy. bit 4 : If this bit is set, the client is capable to comunicate with 1 data stream. bit 5 : If this bit is set, the client is capable to comunicate with 2 data streams. bit 6 : If this bit is set, the client is capable to comunicate with 3 data streams. bit 7 : If this bit is set, the client is capable of Unscheduled automatic power-save delivery (U-APSD) benefits. The voice client can synchronize the transmission and reception of voice frames with the AP. bit 8 : If this bit is set, the client is capable of Unscheduled automatic power-save delivery (U-APSD) benefits. The video client can synchronize the transmission and reception of video frames with the AP. bit 9 : If this bit is set, the client is capable of Unscheduled automatic power-save delivery (U-APSD) benefits. The client can synchronize the transmission and reception in background queue. bit 10 : If this bit is set, the client is capable of Unscheduled automatic power-save delivery (U-APSD) benefits. The client can synchronize the transmission and reception in best effort queue. bit 11 : If this bit is set, the client is capable of Wi-Fi Multimedia(WMM) power save. bit 12 : If this bit is set, the client is capable of 802.11n Greenfield mode. bit 13 : If this bit is set, the client is on fast-transition mode.') muTSPECTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3), ) if mibBuilder.loadTexts: muTSPECTable.setStatus('current') if mibBuilder.loadTexts: muTSPECTable.setDescription('Table of information for Admission Control Statistics by active client.') muTSPECEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "apIndex"), (0, "HIPATH-WIRELESS-HWC-MIB", "muMACAddress"), (0, "HIPATH-WIRELESS-HWC-MIB", "tspecAC"), (0, "HIPATH-WIRELESS-HWC-MIB", "tspecDirection")) if mibBuilder.loadTexts: muTSPECEntry.setStatus('current') if mibBuilder.loadTexts: muTSPECEntry.setDescription('Information for Admission Control Statistics by active client.') tspecMuMACAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 1), MacAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: tspecMuMACAddress.setStatus('current') if mibBuilder.loadTexts: tspecMuMACAddress.setDescription('Client MAC address.') tspecAC = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 2), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3, 4, 5))).clone(namedValues=NamedValues(("be", 0), ("bk", 1), ("vi", 2), ("vo", 3), ("tvo", 4), ("nwme", 5)))).setMaxAccess("readonly") if mibBuilder.loadTexts: tspecAC.setStatus('current') if mibBuilder.loadTexts: tspecAC.setDescription('Access Category, such as Best Effort, Background, Voice, Video, and Reserved.') tspecDirection = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 3), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3))).clone(namedValues=NamedValues(("uplink", 0), ("dnlink", 1), ("reserved", 2), ("bidir", 3)))).setMaxAccess("readonly") if mibBuilder.loadTexts: tspecDirection.setStatus('current') if mibBuilder.loadTexts: tspecDirection.setDescription('Traffic direction, such as uplink direction, downlink direction.') tspecApSerialNumber = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 4), OctetString()).setMaxAccess("readonly") if mibBuilder.loadTexts: tspecApSerialNumber.setStatus('current') if mibBuilder.loadTexts: tspecApSerialNumber.setDescription('16-character serial number of the AccessPoint.') tspecMuIPAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 5), IpAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: tspecMuIPAddress.setStatus('current') if mibBuilder.loadTexts: tspecMuIPAddress.setDescription('Client IP Address.') tspecBssMac = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 6), MacAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: tspecBssMac.setStatus('current') if mibBuilder.loadTexts: tspecBssMac.setDescription('Access Point BSSID.') tspecSsid = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 7), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: tspecSsid.setStatus('current') if mibBuilder.loadTexts: tspecSsid.setDescription('VNS SSID.') tspecMDR = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 8), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: tspecMDR.setStatus('current') if mibBuilder.loadTexts: tspecMDR.setDescription('Mean Data Rate (bytes per second).') tspecNMS = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 9), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: tspecNMS.setStatus('current') if mibBuilder.loadTexts: tspecNMS.setDescription('Nominal MSDU size (bytes).') tspecSBA = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 10), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: tspecSBA.setStatus('current') if mibBuilder.loadTexts: tspecSBA.setDescription('Surplus Bandwidth Allowance.') tspecDlRate = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 11), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: tspecDlRate.setStatus('current') if mibBuilder.loadTexts: tspecDlRate.setDescription('Downlink Rate (bytes per second).') tspecUlRate = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 12), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: tspecUlRate.setStatus('current') if mibBuilder.loadTexts: tspecUlRate.setDescription('Uplink Rate (bytes per second).') tspecDlViolations = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 13), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: tspecDlViolations.setStatus('current') if mibBuilder.loadTexts: tspecDlViolations.setDescription('Downlink Violations (bytes per second).') tspecUlViolations = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 14), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: tspecUlViolations.setStatus('current') if mibBuilder.loadTexts: tspecUlViolations.setDescription('Uplink Violations (bytes per second).') tspecProtocol = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 15), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3, 4, 5))).clone(namedValues=NamedValues(("proto80211a", 1), ("proto80211g", 2), ("proto80211b", 3), ("proto80211an", 4), ("proto80211bgn", 5)))).setMaxAccess("readonly") if mibBuilder.loadTexts: tspecProtocol.setStatus('current') if mibBuilder.loadTexts: tspecProtocol.setDescription('802.11 radio protocol.') muACLType = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 4), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("blacklist", 1), ("whitelist", 2))).clone(1)).setMaxAccess("readwrite") if mibBuilder.loadTexts: muACLType.setStatus('current') if mibBuilder.loadTexts: muACLType.setDescription('MUs can access EWC by sending association request and providing proper credentials. However, EWC allows creation of a master list of a blacklist or a whitelist group to control such access. There can exist only a blacklist or a whitelist (mutually exclusive) at any time. The list of MUs belonging to such a list is populated in muACLTable. The muACLTable content can be interpreted in conjunction with this field as follows: - blacklist(1): MUs listed in muACLTable cannot access EWC resources. - whitelist(2): Only MUs listed in muACLTable can access EWC resources.') muACLTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 5), ) if mibBuilder.loadTexts: muACLTable.setStatus('current') if mibBuilder.loadTexts: muACLTable.setDescription("Semantics of this list is directly related to muACLType. Access Control List(ACL) is list of MUs and their access rights. An MU can either belong to 'Blacklist', in that case its association request is denied, or it can belong to 'Whitelist', in that case it is allowed to associate to EWC provided having proper credentials.") muACLEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 5, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "muACLMACAddress")) if mibBuilder.loadTexts: muACLEntry.setStatus('current') if mibBuilder.loadTexts: muACLEntry.setDescription('An entry about an MU and its ACL.') muACLMACAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 5, 1, 1), MacAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: muACLMACAddress.setStatus('current') if mibBuilder.loadTexts: muACLMACAddress.setDescription('MAC address of MU.') muACLRowStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 5, 1, 2), RowStatus()).setMaxAccess("readcreate") if mibBuilder.loadTexts: muACLRowStatus.setStatus('current') if mibBuilder.loadTexts: muACLRowStatus.setDescription('An MU can either be added or removed to this list, therefore, allowed set values for this field are: createAndGo, destroy.') muAccessListTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 6), ) if mibBuilder.loadTexts: muAccessListTable.setStatus('current') if mibBuilder.loadTexts: muAccessListTable.setDescription("Semantics of this list is directly related to muACLType. Access List Control(ACL) list of MUs and their access rights. An MU can either belong to 'Blacklist', in that case its association request is denied, or it can belong to 'Whitelist', in that case it is allowed to associate to EWC provided having proper credentials.") muAccessListEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 6, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "muAccessListMACAddress")) if mibBuilder.loadTexts: muAccessListEntry.setStatus('current') if mibBuilder.loadTexts: muAccessListEntry.setDescription('An entry about about an MU and its ACL.') muAccessListMACAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 6, 1, 1), MacAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: muAccessListMACAddress.setStatus('current') if mibBuilder.loadTexts: muAccessListMACAddress.setDescription('MAC address of MU.') muAccessListBitmaskLength = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 6, 1, 2), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(24, 36, 48))).clone(namedValues=NamedValues(("bits24", 24), ("bits36", 36), ("bits48", 48)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: muAccessListBitmaskLength.setStatus('current') if mibBuilder.loadTexts: muAccessListBitmaskLength.setDescription('Length of bitmask associated to the MAC address in the entry.') muAccessListRowStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 6, 1, 3), RowStatus()).setMaxAccess("readcreate") if mibBuilder.loadTexts: muAccessListRowStatus.setStatus('current') if mibBuilder.loadTexts: muAccessListRowStatus.setDescription('An MU can either be added or removed to this list, therefore, allowed set values for this field are: createAndGo, destroy.') associations = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 7)) assocCount = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 7, 1), Integer32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: assocCount.setStatus('current') if mibBuilder.loadTexts: assocCount.setDescription('Total number of current client associations to the access point.') assocTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 7, 2), ) if mibBuilder.loadTexts: assocTable.setStatus('current') if mibBuilder.loadTexts: assocTable.setDescription('Table of information about clients associated with the access point.') assocEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 7, 2, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "assocMUMacAddress"), (0, "HIPATH-WIRELESS-HWC-MIB", "apIndex"), (0, "HIPATH-WIRELESS-HWC-MIB", "assocStartSysUpTime")) if mibBuilder.loadTexts: assocEntry.setStatus('current') if mibBuilder.loadTexts: assocEntry.setDescription('Information for a single client in the association table.') assocMUMacAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 7, 2, 1, 1), MacAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: assocMUMacAddress.setStatus('current') if mibBuilder.loadTexts: assocMUMacAddress.setDescription('MAC address of the client.') assocStartSysUpTime = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 7, 2, 1, 2), TimeTicks()).setMaxAccess("readonly") if mibBuilder.loadTexts: assocStartSysUpTime.setStatus('current') if mibBuilder.loadTexts: assocStartSysUpTime.setDescription('The system uptime that client became associated with the access point.') assocTxPackets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 7, 2, 1, 3), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: assocTxPackets.setStatus('current') if mibBuilder.loadTexts: assocTxPackets.setDescription('Nubmer of tx packets to the client.') assocRxPackets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 7, 2, 1, 4), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: assocRxPackets.setStatus('current') if mibBuilder.loadTexts: assocRxPackets.setDescription('Number of received packets from the client.') assocTxOctets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 7, 2, 1, 5), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: assocTxOctets.setStatus('current') if mibBuilder.loadTexts: assocTxOctets.setDescription('Number of octets sent to the client.') assocRxOctets = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 7, 2, 1, 6), Counter64()).setMaxAccess("readonly") if mibBuilder.loadTexts: assocRxOctets.setStatus('current') if mibBuilder.loadTexts: assocRxOctets.setDescription('Number of octets received from the client.') assocDuration = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 7, 2, 1, 7), Integer32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: assocDuration.setStatus('current') if mibBuilder.loadTexts: assocDuration.setDescription('Length of time since last association.') assocVnsIfIndex = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 7, 2, 1, 8), InterfaceIndex()).setMaxAccess("readonly") if mibBuilder.loadTexts: assocVnsIfIndex.setStatus('current') if mibBuilder.loadTexts: assocVnsIfIndex.setDescription('Index of VNS to which the MU is associated with.') protocols = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 8)) wassp = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 8, 1)) logNotifications = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 9)) logEventSeverityThreshold = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 9, 1), LogEventSeverity()).setMaxAccess("readwrite") if mibBuilder.loadTexts: logEventSeverityThreshold.setStatus('current') if mibBuilder.loadTexts: logEventSeverityThreshold.setDescription("Specifies the minimum level at which the SNMP agent will send notifications for log events. I.e., setting this value to 'major' will send notifcations for critical and major log events. Setting the threshold to minor will trap critical, major, and minor events.") logEventSeverity = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 9, 3), LogEventSeverity()).setMaxAccess("readonly") if mibBuilder.loadTexts: logEventSeverity.setStatus('current') if mibBuilder.loadTexts: logEventSeverity.setDescription('Contains the severity of the most recently trapped hiPathWirelessLogAlarm notification.') logEventComponent = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 9, 4), OctetString()).setMaxAccess("readonly") if mibBuilder.loadTexts: logEventComponent.setStatus('current') if mibBuilder.loadTexts: logEventComponent.setDescription('Contains the component which sent the most recently trapped hiPathWirelessLogAlarm notification.') logEventDescription = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 9, 5), OctetString()).setMaxAccess("readonly") if mibBuilder.loadTexts: logEventDescription.setStatus('current') if mibBuilder.loadTexts: logEventDescription.setDescription('Contains the description of the most recently trapped hiPathWirelessLogAlarm.') hiPathWirelessLogAlarm = NotificationType((1, 3, 6, 1, 4, 1, 4329, 15, 3, 9, 6)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "logEventSeverity"), ("HIPATH-WIRELESS-HWC-MIB", "logEventComponent"), ("HIPATH-WIRELESS-HWC-MIB", "logEventDescription")) if mibBuilder.loadTexts: hiPathWirelessLogAlarm.setStatus('current') if mibBuilder.loadTexts: hiPathWirelessLogAlarm.setDescription('Components of an alarm.') sites = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10)) siteMaxEntries = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 1), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: siteMaxEntries.setStatus('current') if mibBuilder.loadTexts: siteMaxEntries.setDescription('The maximum number of entries allowed in the siteTable. This value is platform dependent.') siteNumEntries = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 2), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: siteNumEntries.setStatus('current') if mibBuilder.loadTexts: siteNumEntries.setDescription('The current number of entries in the siteTable.') siteTableNextAvailableIndex = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 3), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: siteTableNextAvailableIndex.setStatus('current') if mibBuilder.loadTexts: siteTableNextAvailableIndex.setDescription('This object indicates the numerically lowest available index within this entity, which may be used for the value of siteID in the creation of a new entry in the siteTable. An index is considered available if the index value falls within the range of 1 to siteMaxEntries value and is not being used to index an existing entry in the siteTable contained within this entity. This value should only be considered a guideline for management creation of siteEntries, there is no requirement on management to create entries based upon this index value.') siteTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4), ) if mibBuilder.loadTexts: siteTable.setStatus('current') if mibBuilder.loadTexts: siteTable.setDescription('A site is a logical entity that is constituted by collection of APs, CoS rules, policies, Radius server, WLAN, etc. A site is identified by a unique name. ') siteEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "siteID")) if mibBuilder.loadTexts: siteEntry.setStatus('current') if mibBuilder.loadTexts: siteEntry.setDescription('Definition of a site.') siteID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 1), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: siteID.setStatus('current') if mibBuilder.loadTexts: siteID.setDescription('An unique ID, identifying the site in the context of the controller. The site ID can be an integer value from 1 to the maximum number of APs supported by the EWC.') siteRowStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 2), RowStatus()).setMaxAccess("readcreate") if mibBuilder.loadTexts: siteRowStatus.setStatus('current') if mibBuilder.loadTexts: siteRowStatus.setDescription('Row status for the entry.') siteName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 3), DisplayString().subtype(subtypeSpec=ValueSizeConstraint(1, 64))).setMaxAccess("readcreate") if mibBuilder.loadTexts: siteName.setStatus('current') if mibBuilder.loadTexts: siteName.setDescription('Textual description to identify the site in the context of the controller.') siteLocalRadiusAuthentication = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 4), TruthValue()).setMaxAccess("readcreate") if mibBuilder.loadTexts: siteLocalRadiusAuthentication.setStatus('current') if mibBuilder.loadTexts: siteLocalRadiusAuthentication.setDescription('If this value is set to true, then the RADIUS client is on APs, otherwise the RADIUS client is on controller.') siteDefaultDNSServer = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 5), DisplayString().subtype(subtypeSpec=ValueSizeConstraint(0, 64))).setMaxAccess("readcreate") if mibBuilder.loadTexts: siteDefaultDNSServer.setStatus('current') if mibBuilder.loadTexts: siteDefaultDNSServer.setDescription('If the APs associated to the site uses DHCP, and DHCP server does not assign DNS server, then this entry will be used for that purpose. Otherwise, if AP is configured with static IP address, then this entry will be used for that purpose.') siteEnableSecureTunnel = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 6), TruthValue()).setMaxAccess("readcreate") if mibBuilder.loadTexts: siteEnableSecureTunnel.setStatus('current') if mibBuilder.loadTexts: siteEnableSecureTunnel.setDescription('If set to true secure communication key sent to APs to be used to encrypt the traffic between APs within the site and the traffic between controller and APs. However, the encryption itself does not take place unless siteEncryptCommAPtoController and/or siteEncryptCommBetweenAPs set to true.') siteEncryptCommAPtoController = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 7), TruthValue()).setMaxAccess("readcreate") if mibBuilder.loadTexts: siteEncryptCommAPtoController.setStatus('current') if mibBuilder.loadTexts: siteEncryptCommAPtoController.setDescription('If set to true, communication between APs within the site and the controller are encrypted using defined encyption. For details about encryption type, please refer to user manual.') siteEncryptCommBetweenAPs = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 8), TruthValue()).setMaxAccess("readcreate") if mibBuilder.loadTexts: siteEncryptCommBetweenAPs.setStatus('current') if mibBuilder.loadTexts: siteEncryptCommBetweenAPs.setDescription('If set to true, communication between APs within the site are encrypted using defined encyption. For details about encryption type, please refer to user manual.') siteBandPreferenceEnable = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 9), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disable", 0), ("enable", 1)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: siteBandPreferenceEnable.setStatus('current') if mibBuilder.loadTexts: siteBandPreferenceEnable.setDescription('Enabling/disabling band preference for the site and associated APs. By enabling band preference 11a-capable clients can be moved to 11a radio and relieve the congestion on the 11g radio. Band preference provides radio load balancing between 11g and 11a radios.') siteLoadControlEnableR1 = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 10), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disable", 0), ("enable", 1)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: siteLoadControlEnableR1.setStatus('current') if mibBuilder.loadTexts: siteLoadControlEnableR1.setDescription('Enabling/disabling load control for the site for this radio. Load control manages the number of clients on the Radio #1 by disallowing additional clients on the radio above the configured radio limit.') siteLoadControlEnableR2 = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 11), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disable", 0), ("enable", 1)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: siteLoadControlEnableR2.setStatus('current') if mibBuilder.loadTexts: siteLoadControlEnableR2.setDescription('Enabling/disabling load control for the site for this radio. Load control manages the number of clients on the Radio #2 by disallowing additional clients on the radio above the configured radio limit.') siteMaxClientR1 = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 12), Unsigned32().subtype(subtypeSpec=ValueRangeConstraint(0, 99))).setMaxAccess("readcreate") if mibBuilder.loadTexts: siteMaxClientR1.setStatus('current') if mibBuilder.loadTexts: siteMaxClientR1.setDescription('Maximum number of clients that are allowed to be associated to this radio (radio #1). If the Load Control is not enabled then the maximum for this radio uses default value.') siteMaxClientR2 = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 13), Unsigned32().subtype(subtypeSpec=ValueRangeConstraint(0, 99))).setMaxAccess("readcreate") if mibBuilder.loadTexts: siteMaxClientR2.setStatus('current') if mibBuilder.loadTexts: siteMaxClientR2.setDescription('Maximum number of clients that are allowed to be associated to this radio (radio #2). If the Load Control is not enabled then the maximum for this radio uses default value.') siteStrictLimitEnableR1 = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 14), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disable", 0), ("enable", 1)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: siteStrictLimitEnableR1.setStatus('current') if mibBuilder.loadTexts: siteStrictLimitEnableR1.setDescription('Enabling/disabling strict limit of load control for this radio that is assigned to the site. Eanbleing strict limit enforces configured client limit for the radio (radio #1) in any circumstances. Otherwise if this field is disabled then the restriction may not be enforced in all circumstances.') siteStrictLimitEnableR2 = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 15), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disable", 0), ("enable", 1)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: siteStrictLimitEnableR2.setStatus('current') if mibBuilder.loadTexts: siteStrictLimitEnableR2.setDescription('Enabling/disabling strict limit of load control for this radio that is assigned to the site. Eanbleing strict limit enforces configured client limit for the radio (radio #2) in any circumstances. Otherwise if this field is disabled then the restriction may not be enforced in all circumstances.') siteReplaceStnIDwithSiteName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 16), TruthValue()).setMaxAccess("readcreate") if mibBuilder.loadTexts: siteReplaceStnIDwithSiteName.setStatus('current') if mibBuilder.loadTexts: siteReplaceStnIDwithSiteName.setDescription('If this value is set to true, then the called station ID will be replaced with the site name.') sitePolicyTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 5), ) if mibBuilder.loadTexts: sitePolicyTable.setStatus('current') if mibBuilder.loadTexts: sitePolicyTable.setDescription('Each site can have zero or more policies assigned to it. All policies associated to a site are pushed to the all APs belonging to the site. This table defines the assignment of various policies to various sites.') sitePolicyEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 5, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "siteID"), (0, "HIPATH-WIRELESS-HWC-MIB", "sitePolicyID")) if mibBuilder.loadTexts: sitePolicyEntry.setStatus('current') if mibBuilder.loadTexts: sitePolicyEntry.setDescription('An entry defining assignment of a policy, identified by sitePolicyID, to a site, identified by siteID.') sitePolicyID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 5, 1, 1), Unsigned32()) if mibBuilder.loadTexts: sitePolicyID.setStatus('current') if mibBuilder.loadTexts: sitePolicyID.setDescription('The policy index, as defined ENTERASYS-POLICY-PROFILE-MIB::etsysPolicyProfileIndex.') sitePolicyMember = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 5, 1, 2), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("notMember", 0), ("isMember", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: sitePolicyMember.setStatus('current') if mibBuilder.loadTexts: sitePolicyMember.setDescription('Indicates whether the policy associated with this row is a member of the zone identified by zoneID.') siteCosTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 6), ) if mibBuilder.loadTexts: siteCosTable.setStatus('current') if mibBuilder.loadTexts: siteCosTable.setDescription('Each site can have zero or more CoS assigned to it. All CoS associated to a site are pushed to the all APs belonging to the site. This table defines the assignment of various CoS to various sites.') siteCosEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 6, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "siteID"), (0, "HIPATH-WIRELESS-HWC-MIB", "siteCoSID")) if mibBuilder.loadTexts: siteCosEntry.setStatus('current') if mibBuilder.loadTexts: siteCosEntry.setDescription('An entry defining assignment of a CoS, identified by siteCoSID, to a site, identified by siteID.') siteCoSID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 6, 1, 1), Unsigned32()) if mibBuilder.loadTexts: siteCoSID.setStatus('current') if mibBuilder.loadTexts: siteCoSID.setDescription('The CoS index, as defined in ENTERASYS-POLICY-PROFILE-MIB::etsysCosIndex.') siteCoSMember = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 6, 1, 2), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("notMember", 0), ("isMember", 1)))).setMaxAccess("readonly") if mibBuilder.loadTexts: siteCoSMember.setStatus('current') if mibBuilder.loadTexts: siteCoSMember.setDescription('Indicates whether the CoS associated with this row is a member of the site identified by siteID.') siteAPTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 7), ) if mibBuilder.loadTexts: siteAPTable.setStatus('current') if mibBuilder.loadTexts: siteAPTable.setDescription('A site can have zero or more Access Points(AP) assigned to it. This table defines the assignment of various APs to various sites.') siteAPEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 7, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "siteID"), (0, "HIPATH-WIRELESS-HWC-MIB", "apIndex")) if mibBuilder.loadTexts: siteAPEntry.setStatus('current') if mibBuilder.loadTexts: siteAPEntry.setDescription('An entry defining assignment of an AP, identified by apIndex, to a site, identified by siteID.') siteAPMember = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 7, 1, 1), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("notMember", 0), ("isMember", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: siteAPMember.setStatus('current') if mibBuilder.loadTexts: siteAPMember.setDescription('Indicates whether the AP associated with this row is a member of the site identified by siteID.') siteWlanTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 8), ) if mibBuilder.loadTexts: siteWlanTable.setStatus('current') if mibBuilder.loadTexts: siteWlanTable.setDescription('A site can have zero or more WLAN assigned to it. All WLANs that are associated with a site are pushed to the all APs belonging to the site. This table defines the assignment of various WLANs to various sites.') siteWlanEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 8, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "siteID"), (0, "HIPATH-WIRELESS-HWC-MIB", "wlanID"), (0, "HIPATH-WIRELESS-HWC-MIB", "siteWlanApRadioIndex")) if mibBuilder.loadTexts: siteWlanEntry.setStatus('current') if mibBuilder.loadTexts: siteWlanEntry.setDescription('An entry defining assignment of a WLAN identified by siteWlanID, to a site, identified by siteID.') siteWlanApRadioIndex = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 8, 1, 1), Integer32().subtype(subtypeSpec=ValueRangeConstraint(1, 2))) if mibBuilder.loadTexts: siteWlanApRadioIndex.setStatus('current') if mibBuilder.loadTexts: siteWlanApRadioIndex.setDescription('Description.') siteWlanApRadioAssigned = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 8, 1, 2), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("notAssigned", 0), ("assigned", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: siteWlanApRadioAssigned.setStatus('current') if mibBuilder.loadTexts: siteWlanApRadioAssigned.setDescription('Description.') widsWips = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11)) mitigatorAnalysisEngine = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 1), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disable", 0), ("enable", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: mitigatorAnalysisEngine.setStatus('current') if mibBuilder.loadTexts: mitigatorAnalysisEngine.setDescription('Mitigator analysis engine can be enabled/disabled using this variable. All mitigator related objects, objects defined in widsWips subtree, can only be accessed using SNMPv3 provided this variable is set to enable(1) on behalf of users with privacy.') scanGroupMaxEntries = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 2), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: scanGroupMaxEntries.setStatus('current') if mibBuilder.loadTexts: scanGroupMaxEntries.setDescription('Maximum number of scan groups that can be created on the device.') scanGroupsCurrentEntries = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 3), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: scanGroupsCurrentEntries.setStatus('current') if mibBuilder.loadTexts: scanGroupsCurrentEntries.setDescription('Number of scan groups currently have been created on the device.') activeThreatsCounts = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 4), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: activeThreatsCounts.setStatus('current') if mibBuilder.loadTexts: activeThreatsCounts.setDescription('Number of currently active threats that have been detected.') friendlyAPCounts = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 5), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: friendlyAPCounts.setStatus('current') if mibBuilder.loadTexts: friendlyAPCounts.setDescription('Number of friendly access points that have been discovered at this point.') uncategorizedAPCounts = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 6), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: uncategorizedAPCounts.setStatus('current') if mibBuilder.loadTexts: uncategorizedAPCounts.setDescription('Number of uncategorized access points that have been discovered. This value refers to current number not the historical value.') widsWipsEngineTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 11), ) if mibBuilder.loadTexts: widsWipsEngineTable.setStatus('current') if mibBuilder.loadTexts: widsWipsEngineTable.setDescription('Table of Mitigators defined on set of controllers each identified by widsWipsEngineControllerIPAddress. ') widsWipsEngineEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 11, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "widsWipsEngineControllerIPAddress")) if mibBuilder.loadTexts: widsWipsEngineEntry.setStatus('current') if mibBuilder.loadTexts: widsWipsEngineEntry.setDescription('One entry in this table identifying a mitigator engine in a defined controller identified by IP address, widsWipsEngineControllerIPAddress.') widsWipsEngineRowStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 11, 1, 1), RowStatus()).setMaxAccess("readcreate") if mibBuilder.loadTexts: widsWipsEngineRowStatus.setStatus('current') if mibBuilder.loadTexts: widsWipsEngineRowStatus.setDescription('RowStatus for creation/deletion of mitigator engine row.') widsWipsEngineControllerIPAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 11, 1, 2), IpAddress()).setMaxAccess("readcreate") if mibBuilder.loadTexts: widsWipsEngineControllerIPAddress.setStatus('current') if mibBuilder.loadTexts: widsWipsEngineControllerIPAddress.setDescription('Ip address of the controller that the defined mitigator in this row will run on.') widsWipsEnginePollInterval = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 11, 1, 3), Integer32().subtype(subtypeSpec=ValueRangeConstraint(3, 60))).setMaxAccess("readcreate") if mibBuilder.loadTexts: widsWipsEnginePollInterval.setStatus('current') if mibBuilder.loadTexts: widsWipsEnginePollInterval.setDescription('Poll interval in seconds between successive keep alive messages between this controller and the mitigator engine to monitor status of mitigator engine. ') widsWipsEnginePollRetry = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 11, 1, 4), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 20))).setMaxAccess("readcreate") if mibBuilder.loadTexts: widsWipsEnginePollRetry.setStatus('current') if mibBuilder.loadTexts: widsWipsEnginePollRetry.setDescription('Number of consecutive retries of failed contact to a mitigator agent before declaring mitigator engine dead. ') inServiceScanGroupTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 12), ) if mibBuilder.loadTexts: inServiceScanGroupTable.setStatus('current') if mibBuilder.loadTexts: inServiceScanGroupTable.setDescription('In service scan group enables the subsystem simultaneously scan for threats and performs wireless bridging based on 37xx-based APs. The threats are discovered and identified in the deployment environment and then classified for further actions. ') inServiceScanGroupEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 12, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "scanGroupProfileID")) if mibBuilder.loadTexts: inServiceScanGroupEntry.setStatus('current') if mibBuilder.loadTexts: inServiceScanGroupEntry.setDescription('An entry in this table that defines attributes of a in-service scan group.') scanGroupProfileID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 12, 1, 1), Unsigned32()) if mibBuilder.loadTexts: scanGroupProfileID.setStatus('current') if mibBuilder.loadTexts: scanGroupProfileID.setDescription('A internally unique identifier for a scan group. Each scan group is indexed by this value.') inSrvScanGrpName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 12, 1, 2), DisplayString().subtype(subtypeSpec=ValueSizeConstraint(1, 255))).setMaxAccess("readcreate") if mibBuilder.loadTexts: inSrvScanGrpName.setStatus('current') if mibBuilder.loadTexts: inSrvScanGrpName.setDescription('Textual description identifying the scan group.') inSrvScanGrpSecurityThreats = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 12, 1, 3), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disable", 0), ("enable", 1)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: inSrvScanGrpSecurityThreats.setStatus('current') if mibBuilder.loadTexts: inSrvScanGrpSecurityThreats.setDescription('Enable/disable security engine to scan for threats.') inSrvScanGrpMaxConcurrentAttacksPerAP = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 12, 1, 4), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 6))).setMaxAccess("readcreate") if mibBuilder.loadTexts: inSrvScanGrpMaxConcurrentAttacksPerAP.setStatus('current') if mibBuilder.loadTexts: inSrvScanGrpMaxConcurrentAttacksPerAP.setDescription('Max number of concurrent attacks per AP') inSrvScanGrpCounterMeasuresType = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 12, 1, 5), Bits().clone(namedValues=NamedValues(("externalHoneypotAPs", 0), ("roamingToFriendlyAPs", 1), ("internalHoneypotAPs", 2), ("spoofedAPs", 3), ("dropFloodAttack", 4), ("removeDosAttack", 5), ("adHocModeDevice", 6), ("rogueAP", 7)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: inSrvScanGrpCounterMeasuresType.setStatus('current') if mibBuilder.loadTexts: inSrvScanGrpCounterMeasuresType.setDescription('bit 0: Setting this bit prevents authorized stations from roaming to external honeypot APs. bit 1: Setting this bit prevents authorized stations from roaming to friendly APs. bit 2: Setting this bit prevents any station from using an internal honeypot AP. bit 3: Setting this bit prevents any station from using a spoofed AP. bit 4: Setting this bit drops frames in a controlled fashion during a flood attack. bit 5: Setting this bit removes network access from clients originating DoS attacks. bit 6: Setting this bit prevents any station from using an ad hoc mode device. bit 7: Setting this bit prevents any station from using a rogue AP.') inSrvScanGrpScan2400MHzSelection = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 12, 1, 6), Bits().clone(namedValues=NamedValues(("frequency2412MHz", 0), ("frequency2417MHz", 1), ("frequency2422MHz", 2), ("frequency2427MHz", 3), ("frequency2432MHz", 4), ("frequency2437MHz", 5), ("frequency2442MHz", 6), ("frequency2447MHz", 7), ("frequency2452MHz", 8), ("frequency2457MHz", 9), ("frequency2462MHz", 10), ("frequency2467MHz", 11), ("frequency2472MHz", 12), ("frequency2484MHz", 13)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: inSrvScanGrpScan2400MHzSelection.setStatus('current') if mibBuilder.loadTexts: inSrvScanGrpScan2400MHzSelection.setDescription('bit 0: by setting this bit scanning is performed on 2412 MHz frequency channel bit 1: by setting this bit scanning is performed on 2417 MHz frequency channel bit 2: by setting this bit scanning is performed on 2422 MHz frequency channel bit 3: by setting this bit scanning is performed on 2427 MHz frequency channel bit 4: by setting this bit scanning is performed on 2432 MHz frequency channel bit 5: by setting this bit scanning is performed on 2437 MHz frequency channel bit 6: by setting this bit scanning is performed on 2442 MHz frequency channel bit 7: by setting this bit scanning is performed on 2447 MHz frequency channel bit 8: by setting this bit scanning is performed on 2452 MHz frequency channel bit 9: by setting this bit scanning is performed on 2457 MHz frequency channel bit 10: by setting this bit scanning is performed on 2462 MHz frequency channel bit 11: by setting this bit scanning is performed on 2467 MHz frequency channel bit 12: by setting this bit scanning is performed on 2472 MHz frequency channel bit 13: by setting this bit scanning is performed on 2484 MHz frequency channel') inSrvScanGrpScan5GHzSelection = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 12, 1, 7), Bits().clone(namedValues=NamedValues(("frequency5040MHz", 0), ("frequency5060MHz", 1), ("frequency5080MHz", 2), ("frequency5180MHz", 3), ("frequency5200MHz", 4), ("frequency5220MHz", 5), ("frequency5240MHz", 6), ("frequency5260MHz", 7), ("frequency5280MHz", 8), ("frequency5300MHz", 9), ("frequency5320MHz", 10), ("frequency5500MHz", 11), ("frequency5520MHz", 12), ("frequency5540MHz", 13), ("frequency5560MHz", 14), ("frequency5580MHz", 15), ("frequency5600MHz", 16), ("frequency5620MHz", 17), ("frequency5640MHz", 18), ("frequency5660MHz", 19), ("frequency5680MHz", 20), ("frequency5700MHz", 21), ("frequency5745MHz", 22), ("frequency5765MHz", 23), ("frequency5785MHz", 24), ("frequency5805MHz", 25), ("frequency5825MHz", 26), ("frequency4920MHz", 27), ("frequency4940MHz", 28), ("frequency4960MHz", 29), ("frequency4980MHz", 30)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: inSrvScanGrpScan5GHzSelection.setStatus('current') if mibBuilder.loadTexts: inSrvScanGrpScan5GHzSelection.setDescription('bit 0: by setting this bit scanning is performed on 5040 MHz frequency channel bit 1: by setting this bit scanning is performed on 5060 MHz frequency channel bit 2: by setting this bit scanning is performed on 5080 MHz frequency channel bit 3: by setting this bit scanning is performed on 5180 MHz frequency channel bit 4: by setting this bit scanning is performed on 5200 MHz frequency channel bit 5: by setting this bit scanning is performed on 5220 MHz frequency channel bit 6: by setting this bit scanning is performed on 5240 MHz frequency channel bit 7: by setting this bit scanning is performed on 5260 MHz frequency channel bit 8: by setting this bit scanning is performed on 5280 MHz frequency channel bit 9: by setting this bit scanning is performed on 5300 MHz frequency channel bit 10: by setting this bit scanning is performed on 5320 MHz frequency channel bit 11: by setting this bit scanning is performed on 5500 MHz frequency channel bit 12: by setting this bit scanning is performed on 5520 MHz frequency channel bit 13: by setting this bit scanning is performed on 5540 MHz frequency channel bit 14: by setting this bit scanning is performed on 5560 MHz frequency channel bit 15: by setting this bit scanning is performed on 5580 MHz frequency channel bit 16: by setting this bit scanning is performed on 5600 MHz frequency channel bit 17: by setting this bit scanning is performed on 5620 MHz frequency channel bit 18: by setting this bit scanning is performed on 5640 MHz frequency channel bit 19: by setting this bit scanning is performed on 5660 MHz frequency channel bit 20: by setting this bit scanning is performed on 5680 MHz frequency channel bit 21: by setting this bit scanning is performed on 5700 MHz frequency channel bit 22: by setting this bit scanning is performed on 5745 MHz frequency channel bit 23: by setting this bit scanning is performed on 5765 MHz frequency channel bit 24: by setting this bit scanning is performed on 5785 MHz frequency channel bit 25: by setting this bit scanning is performed on 5805 MHz frequency channel bit 26: by setting this bit scanning is performed on 5825 MHz frequency channel bit 27: by setting this bit scanning is performed on 4920 MHz frequency channel bit 28: by setting this bit scanning is performed on 4940 MHz frequency channel bit 29: by setting this bit scanning is performed on 4960 MHz frequency channel bit 30: by setting this bit scanning is performed on 4980 MHz frequency channel') inSrvScanGrpblockAdHocClientsPeriod = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 12, 1, 8), Integer32()).setMaxAccess("readcreate") if mibBuilder.loadTexts: inSrvScanGrpblockAdHocClientsPeriod.setStatus('current') if mibBuilder.loadTexts: inSrvScanGrpblockAdHocClientsPeriod.setDescription('Number of seconds removing network access to the clients that are in ad hoc mode.') inSrvScanGrpClassifySourceIF = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 12, 1, 9), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disable", 0), ("enable", 1)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: inSrvScanGrpClassifySourceIF.setStatus('current') if mibBuilder.loadTexts: inSrvScanGrpClassifySourceIF.setDescription('This variable allows to enable/disable classify sources of interference') inSrvScanGrpRowStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 12, 1, 10), RowStatus()).setMaxAccess("readcreate") if mibBuilder.loadTexts: inSrvScanGrpRowStatus.setStatus('current') if mibBuilder.loadTexts: inSrvScanGrpRowStatus.setDescription('RowStatus field for creation/deletion or changing row status.') inSrvScanGrpDetectRogueAP = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 12, 1, 11), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disable", 0), ("enable", 1)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: inSrvScanGrpDetectRogueAP.setStatus('current') if mibBuilder.loadTexts: inSrvScanGrpDetectRogueAP.setDescription('This enables/disables rogue AP detection.') inSrvScanGrpListeningPort = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 12, 1, 12), Integer32()).setMaxAccess("readwrite") if mibBuilder.loadTexts: inSrvScanGrpListeningPort.setStatus('current') if mibBuilder.loadTexts: inSrvScanGrpListeningPort.setDescription('This OID represents the UDP port number that APs are to listen on while performing rogue AP detection. It has meaning only when inSrvScanGrpDetectRogueAP is enabled.') outOfServiceScanGroupTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 13), ) if mibBuilder.loadTexts: outOfServiceScanGroupTable.setStatus('current') if mibBuilder.loadTexts: outOfServiceScanGroupTable.setDescription('Out of service scan group is used to collect and classify various wireless identifiers that are discovered in the deployment environment. Legacy APs (26xx-based, 36xx-based) can participate in this subsystem if they are configured for out-of-service scanning. The new APs, based on 37xx architecture, can also participate in this subsystem.') outOfServiceScanGroupEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 13, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "scanGroupProfileID")) if mibBuilder.loadTexts: outOfServiceScanGroupEntry.setStatus('current') if mibBuilder.loadTexts: outOfServiceScanGroupEntry.setDescription('An entry in this table that defines attributes of a out-of-service scan group.') outOfSrvScanGrpName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 13, 1, 1), DisplayString().subtype(subtypeSpec=ValueSizeConstraint(1, 255))).setMaxAccess("readcreate") if mibBuilder.loadTexts: outOfSrvScanGrpName.setStatus('current') if mibBuilder.loadTexts: outOfSrvScanGrpName.setDescription('Human readable textual description identifying scan group.') outOfSrvScanGrpRadio = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 13, 1, 2), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3))).clone(namedValues=NamedValues(("radio1", 1), ("radio2", 2), ("both", 3)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: outOfSrvScanGrpRadio.setStatus('current') if mibBuilder.loadTexts: outOfSrvScanGrpRadio.setDescription('Radio selection for the scan group. Selected radio will be used in sacn group.') outOfSrvScanGrpChannelList = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 13, 1, 3), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 999))).clone(namedValues=NamedValues(("allChannel", 0), ("currentChannel", 999)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: outOfSrvScanGrpChannelList.setStatus('current') if mibBuilder.loadTexts: outOfSrvScanGrpChannelList.setDescription('Identifying the channel(s) which will be used for the defined scan group.') outOfSrvScanGrpScanType = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 13, 1, 4), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("active", 0), ("passive", 1)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: outOfSrvScanGrpScanType.setStatus('current') if mibBuilder.loadTexts: outOfSrvScanGrpScanType.setDescription('This field allows to select the type of scanning, active/passive, this scan group will be executing.') outOfSrvScanGrpChannelDwellTime = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 13, 1, 5), Integer32().subtype(subtypeSpec=ValueRangeConstraint(200, 500))).setMaxAccess("readcreate") if mibBuilder.loadTexts: outOfSrvScanGrpChannelDwellTime.setStatus('current') if mibBuilder.loadTexts: outOfSrvScanGrpChannelDwellTime.setDescription('Dwell time in mili-second for performing scanning.') outOfSrvScanGrpScanTimeInterval = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 13, 1, 6), Integer32().subtype(subtypeSpec=ValueRangeConstraint(10, 120))).setMaxAccess("readcreate") if mibBuilder.loadTexts: outOfSrvScanGrpScanTimeInterval.setStatus('current') if mibBuilder.loadTexts: outOfSrvScanGrpScanTimeInterval.setDescription('Time interval between two sucssive scanning performed for this scan group.') outOfSrvScanGrpSecurityScan = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 13, 1, 7), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disable", 0), ("enable", 1)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: outOfSrvScanGrpSecurityScan.setStatus('current') if mibBuilder.loadTexts: outOfSrvScanGrpSecurityScan.setDescription('This field allows to enable/disable security Scan.') outOfSrvScanGrpScanActivity = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 13, 1, 8), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("stop", 0), ("start", 1)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: outOfSrvScanGrpScanActivity.setStatus('current') if mibBuilder.loadTexts: outOfSrvScanGrpScanActivity.setDescription('Scaning can be started or stopped using this field.') outOfSrvScanGrpScanRowStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 13, 1, 9), Integer32()).setMaxAccess("readcreate") if mibBuilder.loadTexts: outOfSrvScanGrpScanRowStatus.setStatus('current') if mibBuilder.loadTexts: outOfSrvScanGrpScanRowStatus.setDescription('RowStatus field for the entry.') scanGroupAPAssignmentTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 14), ) if mibBuilder.loadTexts: scanGroupAPAssignmentTable.setStatus('current') if mibBuilder.loadTexts: scanGroupAPAssignmentTable.setDescription('The list of APs that have been assigned to a particular scan group, which could include in-service and out-of-service scanning groups.') scanGroupAPAssignmentEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 14, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "scanGroupProfileID"), (0, "HIPATH-WIRELESS-HWC-MIB", "scanGroupAPAssignApSerial"), (0, "HIPATH-WIRELESS-HWC-MIB", "widsWipsEngineControllerIPAddress")) if mibBuilder.loadTexts: scanGroupAPAssignmentEntry.setStatus('current') if mibBuilder.loadTexts: scanGroupAPAssignmentEntry.setDescription('An entry in this table defining an AP assignment to a group, identified by scanGroupProfileID.') scanGroupAPAssignApSerial = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 14, 1, 1), OctetString().subtype(subtypeSpec=ValueSizeConstraint(16, 16)).setFixedLength(16)).setMaxAccess("readonly") if mibBuilder.loadTexts: scanGroupAPAssignApSerial.setStatus('current') if mibBuilder.loadTexts: scanGroupAPAssignApSerial.setDescription('Unique string of characters, a 16-character long, serial number of an access point.') scanGroupAPAssignGroupName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 14, 1, 2), DisplayString().subtype(subtypeSpec=ValueSizeConstraint(1, 255))).setMaxAccess("readonly") if mibBuilder.loadTexts: scanGroupAPAssignGroupName.setStatus('current') if mibBuilder.loadTexts: scanGroupAPAssignGroupName.setDescription('Human readable textual description identifying scan group.') scanGroupAPAssignName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 14, 1, 3), DisplayString().subtype(subtypeSpec=ValueSizeConstraint(1, 255))).setMaxAccess("readonly") if mibBuilder.loadTexts: scanGroupAPAssignName.setStatus('current') if mibBuilder.loadTexts: scanGroupAPAssignName.setDescription('Access Point (AP) name associated to this scan group.') scanGroupAPAssignRadio1 = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 14, 1, 4), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3, 4, 8, 16, 18, 19, 20, 32, 34, 35, 36))).clone(namedValues=NamedValues(("off", 0), ("b", 1), ("g", 2), ("bg", 3), ("a", 4), ("j", 8), ("n", 16), ("gn", 18), ("bgn", 19), ("an", 20), ("nStrict", 32), ("gnStrict", 34), ("bgnStrict", 35), ("anStrict", 36)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: scanGroupAPAssignRadio1.setStatus('current') if mibBuilder.loadTexts: scanGroupAPAssignRadio1.setDescription('This field allows the radio #1 of the AP to be turned on/off. this field has meaning only the AP assigned to legacy (outOfScan) scan profile') scanGroupAPAssignRadio2 = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 14, 1, 5), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3, 4, 8, 16, 18, 19, 20, 32, 34, 35, 36))).clone(namedValues=NamedValues(("off", 0), ("b", 1), ("g", 2), ("bg", 3), ("a", 4), ("j", 8), ("n", 16), ("gn", 18), ("bgn", 19), ("an", 20), ("nStrict", 32), ("gnStrict", 34), ("bgnStrict", 35), ("anStrict", 36)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: scanGroupAPAssignRadio2.setStatus('current') if mibBuilder.loadTexts: scanGroupAPAssignRadio2.setDescription('This field allows the radio #2 of the AP to be turned on/off. this field has meaning only the AP assigned to legacy (outOfScan) scan profile') scanGroupAPAssignInactiveAP = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 14, 1, 6), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("inactive", 0), ("active", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: scanGroupAPAssignInactiveAP.setStatus('current') if mibBuilder.loadTexts: scanGroupAPAssignInactiveAP.setDescription('This field allows to set the AP as active/inactive in scanning activities.') scanGroupAPAssignAllowScanning = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 14, 1, 7), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("notAllow", 0), ("allow", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: scanGroupAPAssignAllowScanning.setStatus('current') if mibBuilder.loadTexts: scanGroupAPAssignAllowScanning.setDescription('Setting scanning to active/inactive using this AP.') scanGroupAPAssignAllowSpectrumAnalysis = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 14, 1, 8), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("notAllow", 0), ("allow", 1)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: scanGroupAPAssignAllowSpectrumAnalysis.setStatus('current') if mibBuilder.loadTexts: scanGroupAPAssignAllowSpectrumAnalysis.setDescription('Setting spectrum analysis to active/inactive using this AP.') scanGroupAPAssignControllerIPAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 14, 1, 9), IpAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: scanGroupAPAssignControllerIPAddress.setStatus('current') if mibBuilder.loadTexts: scanGroupAPAssignControllerIPAddress.setDescription('The IP address of the controller to which the AP is connected currently.') scanGroupAPAssignFordwardingService = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 14, 1, 10), Bits().clone(namedValues=NamedValues(("assignedToSite", 0), ("assignedToLoadGroup", 1), ("assignedToWlanService", 2)))).setMaxAccess("readonly") if mibBuilder.loadTexts: scanGroupAPAssignFordwardingService.setStatus('current') if mibBuilder.loadTexts: scanGroupAPAssignFordwardingService.setDescription('This OID lists the types of forwarding services that each Guardian is assigned to. A Guardian will revert to providing these services when it is removed from the Guardian role. The meanings of the individual flags are: bit 0: Set if this AP is a member of a site. bit 1: Set if this AP is assigned to a load group. bit 2: Set if this AP is assigned to at least one WLAN service. This OID is only relevant to APs in the Guardian role.') scanAPTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 15), ) if mibBuilder.loadTexts: scanAPTable.setStatus('current') if mibBuilder.loadTexts: scanAPTable.setDescription('Table of sacn APs on each collector. This table can be viewed only in v3 mode when the mitigator analys engine is enabled.') scanAPEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 15, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "scanAPControllerIPAddress"), (0, "HIPATH-WIRELESS-HWC-MIB", "scanAPSerialNumber")) if mibBuilder.loadTexts: scanAPEntry.setStatus('current') if mibBuilder.loadTexts: scanAPEntry.setDescription('An entry in this table identifying one access point.') scanAPControllerIPAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 15, 1, 1), IpAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: scanAPControllerIPAddress.setStatus('current') if mibBuilder.loadTexts: scanAPControllerIPAddress.setDescription('IP address of the controller on which the scanning executed.') scanAPSerialNumber = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 15, 1, 2), OctetString().subtype(subtypeSpec=ValueSizeConstraint(16, 16)).setFixedLength(16)).setMaxAccess("readonly") if mibBuilder.loadTexts: scanAPSerialNumber.setStatus('current') if mibBuilder.loadTexts: scanAPSerialNumber.setDescription('Serial number of the access point, 16-character human readable text, that is assigned to this group.') scanAPAcessPointName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 15, 1, 3), DisplayString().subtype(subtypeSpec=ValueSizeConstraint(1, 255))).setMaxAccess("readcreate") if mibBuilder.loadTexts: scanAPAcessPointName.setStatus('current') if mibBuilder.loadTexts: scanAPAcessPointName.setDescription('Name of the access point belonging to this group.') scanAPRowStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 15, 1, 4), RowStatus()).setMaxAccess("readcreate") if mibBuilder.loadTexts: scanAPRowStatus.setStatus('current') if mibBuilder.loadTexts: scanAPRowStatus.setDescription('Row status for the entry.') scanAPProfileName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 15, 1, 5), DisplayString().subtype(subtypeSpec=ValueSizeConstraint(1, 255))).setMaxAccess("readcreate") if mibBuilder.loadTexts: scanAPProfileName.setStatus('current') if mibBuilder.loadTexts: scanAPProfileName.setDescription('Name of the scan profile to which this access point is assigned.') scanAPProfileType = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 15, 1, 6), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2, 3))).clone(namedValues=NamedValues(("inServiceScan", 1), ("guardianScan", 2), ("outOfServiceScan", 3)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: scanAPProfileType.setStatus('current') if mibBuilder.loadTexts: scanAPProfileType.setDescription('inServiceScan(1): access point is performed In service Scan. guardianScan(2): access point is performed Guardian Scan. outOfServiceScan(3): access point is performed out of service Scan(Legacy Scan).') friendlyAPTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 16), ) if mibBuilder.loadTexts: friendlyAPTable.setStatus('current') if mibBuilder.loadTexts: friendlyAPTable.setDescription('List of Access Points that have been categorized as not being any threat to the wireless network that is managed by EWC. This table can be viewed only in v3 mode when the mitigator analys engine is enabled.') friendlyAPEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 16, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "friendlyAPMacAddress")) if mibBuilder.loadTexts: friendlyAPEntry.setStatus('current') if mibBuilder.loadTexts: friendlyAPEntry.setDescription('An entry in this table identifying an access points and some of its attributes.') friendlyAPMacAddress = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 16, 1, 1), MacAddress()).setMaxAccess("readwrite") if mibBuilder.loadTexts: friendlyAPMacAddress.setStatus('current') if mibBuilder.loadTexts: friendlyAPMacAddress.setDescription('Ethernet MAC address of the access point.') friendlyAPSSID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 16, 1, 2), DisplayString().subtype(subtypeSpec=ValueSizeConstraint(1, 32))).setMaxAccess("readwrite") if mibBuilder.loadTexts: friendlyAPSSID.setStatus('current') if mibBuilder.loadTexts: friendlyAPSSID.setDescription('SSID broadcasted by the access point.') friendlyAPDescription = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 16, 1, 3), DisplayString().subtype(subtypeSpec=ValueSizeConstraint(1, 255))).setMaxAccess("readwrite") if mibBuilder.loadTexts: friendlyAPDescription.setStatus('current') if mibBuilder.loadTexts: friendlyAPDescription.setDescription('Textual description that is used to identify the access point.') friendlyAPManufacturer = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 16, 1, 4), DisplayString().subtype(subtypeSpec=ValueSizeConstraint(1, 255))).setMaxAccess("readonly") if mibBuilder.loadTexts: friendlyAPManufacturer.setStatus('current') if mibBuilder.loadTexts: friendlyAPManufacturer.setDescription('Textual description identifying the access point manufacturer.') uncategorizedAPTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 17), ) if mibBuilder.loadTexts: uncategorizedAPTable.setStatus('current') if mibBuilder.loadTexts: uncategorizedAPTable.setDescription('List of APs that have not been categorized either as friendly, threat or authorized.') uncategorizedAPEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 17, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "uncategorizedAPMAC")) if mibBuilder.loadTexts: uncategorizedAPEntry.setStatus('current') if mibBuilder.loadTexts: uncategorizedAPEntry.setDescription('An entry about an AP in this table.') uncategorizedAPMAC = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 17, 1, 1), MacAddress()) if mibBuilder.loadTexts: uncategorizedAPMAC.setStatus('current') if mibBuilder.loadTexts: uncategorizedAPMAC.setDescription('MAC address of access point.') uncategorizedAPDescption = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 17, 1, 2), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: uncategorizedAPDescption.setStatus('current') if mibBuilder.loadTexts: uncategorizedAPDescption.setDescription('Textual description of access point.') uncategorizedAPManufacturer = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 17, 1, 3), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: uncategorizedAPManufacturer.setStatus('current') if mibBuilder.loadTexts: uncategorizedAPManufacturer.setDescription('Access point manufacturer.') uncategorizedAPClassify = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 17, 1, 4), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3, 4, 5))).clone(namedValues=NamedValues(("noAction", 0), ("clasifyAsAuthorized", 1), ("classifyAsFriendlyAP", 2), ("clasifyAsThreatForReport", 3), ("clasifyAsInternalHoneypotThreat", 4), ("clasifyAsExternalHoneypotThreat", 5)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: uncategorizedAPClassify.setStatus('current') if mibBuilder.loadTexts: uncategorizedAPClassify.setDescription('By setting this field, access point can be reclassified and moved to different group.') uncategorizedAPSSID = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 17, 1, 5), DisplayString().subtype(subtypeSpec=ValueSizeConstraint(1, 32))).setMaxAccess("readonly") if mibBuilder.loadTexts: uncategorizedAPSSID.setStatus('current') if mibBuilder.loadTexts: uncategorizedAPSSID.setDescription('SSID broadcasted by the access point.') authorizedAPTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 18), ) if mibBuilder.loadTexts: authorizedAPTable.setStatus('current') if mibBuilder.loadTexts: authorizedAPTable.setDescription('List of authorized access point.') authorizedAPEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 18, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "authorizedAPMAC")) if mibBuilder.loadTexts: authorizedAPEntry.setStatus('current') if mibBuilder.loadTexts: authorizedAPEntry.setDescription('An entry in this table describing an authorized AP.') authorizedAPMAC = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 18, 1, 1), MacAddress()) if mibBuilder.loadTexts: authorizedAPMAC.setStatus('current') if mibBuilder.loadTexts: authorizedAPMAC.setDescription('MAC address of access point.') authorizedAPDescription = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 18, 1, 2), DisplayString()).setMaxAccess("readcreate") if mibBuilder.loadTexts: authorizedAPDescription.setStatus('current') if mibBuilder.loadTexts: authorizedAPDescription.setDescription('Discription of the access point.') authorizedAPManufacturer = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 18, 1, 3), DisplayString()).setMaxAccess("readcreate") if mibBuilder.loadTexts: authorizedAPManufacturer.setStatus('current') if mibBuilder.loadTexts: authorizedAPManufacturer.setDescription("Access point's manufacturer. This field is cannot be set and it is deduced by MAC addressed.") authorizedAPClassify = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 18, 1, 4), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("noAction", 0), ("classifyAsFriendlyAP", 1)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: authorizedAPClassify.setStatus('current') if mibBuilder.loadTexts: authorizedAPClassify.setDescription('By setting this field, access point can be reclassified and moved to different group.') authorizedAPRowStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 18, 1, 5), RowStatus()).setMaxAccess("readcreate") if mibBuilder.loadTexts: authorizedAPRowStatus.setStatus('current') if mibBuilder.loadTexts: authorizedAPRowStatus.setDescription("Action permitted are 'delete/add' row.") prohibitedAPTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 19), ) if mibBuilder.loadTexts: prohibitedAPTable.setStatus('current') if mibBuilder.loadTexts: prohibitedAPTable.setDescription('List of prohibited access points.') prohibitedAPEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 19, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "prohibitedAPMAC")) if mibBuilder.loadTexts: prohibitedAPEntry.setStatus('current') if mibBuilder.loadTexts: prohibitedAPEntry.setDescription('An entry in this table describing an access point.') prohibitedAPMAC = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 19, 1, 1), MacAddress()) if mibBuilder.loadTexts: prohibitedAPMAC.setStatus('current') if mibBuilder.loadTexts: prohibitedAPMAC.setDescription('MAC address of access point.') prohibitedAPCategory = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 19, 1, 2), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 65529, 65530, 65531, 65532, 65533, 65534))).clone(namedValues=NamedValues(("notAvailable", 0), ("reportPresenceOnly", 65529), ("externalHoneyPot", 65530), ("internalHoneyPot", 65531), ("friendly", 65532), ("perauthorized", 65533), ("authorized", 65534)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: prohibitedAPCategory.setStatus('current') if mibBuilder.loadTexts: prohibitedAPCategory.setDescription('The category the access point in this row belongs to.') prohibitedAPDescription = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 19, 1, 3), DisplayString()).setMaxAccess("readcreate") if mibBuilder.loadTexts: prohibitedAPDescription.setStatus('current') if mibBuilder.loadTexts: prohibitedAPDescription.setDescription('Description of the access point.') prohibitedAPManufacturer = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 19, 1, 4), DisplayString()).setMaxAccess("readcreate") if mibBuilder.loadTexts: prohibitedAPManufacturer.setStatus('current') if mibBuilder.loadTexts: prohibitedAPManufacturer.setDescription("Access point's manufacturer. This field is cannot be set and it is deduced by MAC addressed.") prohibitedAPClassify = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 19, 1, 5), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("classifyAsFriendlyAP", 1), ("noAction", 2)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: prohibitedAPClassify.setStatus('current') if mibBuilder.loadTexts: prohibitedAPClassify.setDescription('By setting this field, access point can be reclassified and moved to different group.') prohibitedAPRowStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 19, 1, 6), RowStatus()).setMaxAccess("readcreate") if mibBuilder.loadTexts: prohibitedAPRowStatus.setStatus('current') if mibBuilder.loadTexts: prohibitedAPRowStatus.setDescription("Action permitted are 'delete/add' row.") dedicatedScanGroupTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 20), ) if mibBuilder.loadTexts: dedicatedScanGroupTable.setStatus('current') if mibBuilder.loadTexts: dedicatedScanGroupTable.setDescription('dedicated scan group enables the subsystem full time scan for threats based on 37xx-based APs. The threats are discovered and identified in the deployment environment and then classified for further actions. ') dedicatedScanGroupEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 20, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "scanGroupProfileID")) if mibBuilder.loadTexts: dedicatedScanGroupEntry.setStatus('current') if mibBuilder.loadTexts: dedicatedScanGroupEntry.setDescription('An entry in this table that defines attributes of a dedicated scan group.') dedicatedScanGrpName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 20, 1, 1), DisplayString().subtype(subtypeSpec=ValueSizeConstraint(1, 255))).setMaxAccess("readcreate") if mibBuilder.loadTexts: dedicatedScanGrpName.setStatus('current') if mibBuilder.loadTexts: dedicatedScanGrpName.setDescription('Textual description identifying the scan group.') dedicatedScanGrpSecurityThreats = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 20, 1, 2), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disable", 0), ("enable", 1)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: dedicatedScanGrpSecurityThreats.setStatus('current') if mibBuilder.loadTexts: dedicatedScanGrpSecurityThreats.setDescription('Enable/disable security engine to scan for threats.') dedicatedScanGrpMaxConcurrentAttacksPerAP = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 20, 1, 3), Integer32().subtype(subtypeSpec=ValueRangeConstraint(0, 6))).setMaxAccess("readcreate") if mibBuilder.loadTexts: dedicatedScanGrpMaxConcurrentAttacksPerAP.setStatus('current') if mibBuilder.loadTexts: dedicatedScanGrpMaxConcurrentAttacksPerAP.setDescription('Max number of concurrent attacks per AP') dedicatedScanGrpCounterMeasures = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 20, 1, 4), Bits().clone(namedValues=NamedValues(("externalHoneypotAPs", 0), ("roamingToFriendlyAPs", 1), ("internalHoneypotAPs", 2), ("spoofedAPs", 3), ("dropFloodAttack", 4), ("removeDosAttack", 5), ("adHocModeDevice", 6), ("rogueAP", 7)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: dedicatedScanGrpCounterMeasures.setStatus('current') if mibBuilder.loadTexts: dedicatedScanGrpCounterMeasures.setDescription('bit 0: Setting this bit prevents authorized stations from roaming to external honeypot APs. bit 1: Setting this bit prevents authorized stations from roaming to friendly APs. bit 2: Setting this bit prevents any station from using an internal honeypot AP. bit 3: Setting this bit prevents any station from using a spoofed AP. bit 4: Setting this bit drops frames in a controlled fashion during a flood attack. bit 5: Setting this bit removes network access from clients originating DoS attacks. bit 6: Setting this bit prevents any station from using an ad hoc mode device. bit 7: Setting this bit prevents any station from using a rogue AP.') dedicatedScanGrpScan2400MHzFreq = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 20, 1, 5), Bits().clone(namedValues=NamedValues(("frequency2412MHz", 0), ("frequency2417MHz", 1), ("frequency2422MHz", 2), ("frequency2427MHz", 3), ("frequency2432MHz", 4), ("frequency2437MHz", 5), ("frequency2442MHz", 6), ("frequency2447MHz", 7), ("frequency2452MHz", 8), ("frequency2457MHz", 9), ("frequency2462MHz", 10), ("frequency2467MHz", 11), ("frequency2472MHz", 12), ("frequency2484MHz", 13)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: dedicatedScanGrpScan2400MHzFreq.setStatus('current') if mibBuilder.loadTexts: dedicatedScanGrpScan2400MHzFreq.setDescription('bit 0: by setting this bit scanning is performed on 2412 MHz frequency channel bit 1: by setting this bit scanning is performed on 2417 MHz frequency channel bit 2: by setting this bit scanning is performed on 2422 MHz frequency channel bit 3: by setting this bit scanning is performed on 2427 MHz frequency channel bit 4: by setting this bit scanning is performed on 2432 MHz frequency channel bit 5: by setting this bit scanning is performed on 2437 MHz frequency channel bit 6: by setting this bit scanning is performed on 2442 MHz frequency channel bit 7: by setting this bit scanning is performed on 2447 MHz frequency channel bit 8: by setting this bit scanning is performed on 2452 MHz frequency channel bit 9: by setting this bit scanning is performed on 2457 MHz frequency channel bit 10: by setting this bit scanning is performed on 2462 MHz frequency channel bit 11: by setting this bit scanning is performed on 2467 MHz frequency channel bit 12: by setting this bit scanning is performed on 2472 MHz frequency channel bit 13: by setting this bit scanning is performed on 2484 MHz frequency channel') dedicatedScanGrpScan5GHzFreq = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 20, 1, 6), Bits().clone(namedValues=NamedValues(("frequency5040MHz", 0), ("frequency5060MHz", 1), ("frequency5080MHz", 2), ("frequency5180MHz", 3), ("frequency5200MHz", 4), ("frequency5220MHz", 5), ("frequency5240MHz", 6), ("frequency5260MHz", 7), ("frequency5280MHz", 8), ("frequency5300MHz", 9), ("frequency5320MHz", 10), ("frequency5500MHz", 11), ("frequency5520MHz", 12), ("frequency5540MHz", 13), ("frequency5560MHz", 14), ("frequency5580MHz", 15), ("frequency5600MHz", 16), ("frequency5620MHz", 17), ("frequency5640MHz", 18), ("frequency5660MHz", 19), ("frequency5680MHz", 20), ("frequency5700MHz", 21), ("frequency5745MHz", 22), ("frequency5765MHz", 23), ("frequency5785MHz", 24), ("frequency5805MHz", 25), ("frequency5825MHz", 26), ("frequency4920MHz", 27), ("frequency4940MHz", 28), ("frequency4960MHz", 29), ("frequency4980MHz", 30)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: dedicatedScanGrpScan5GHzFreq.setStatus('current') if mibBuilder.loadTexts: dedicatedScanGrpScan5GHzFreq.setDescription('bit 0: by setting this bit scanning is performed on 5040 MHz frequency channel bit 1: by setting this bit scanning is performed on 5060 MHz frequency channel bit 2: by setting this bit scanning is performed on 5080 MHz frequency channel bit 3: by setting this bit scanning is performed on 5180 MHz frequency channel bit 4: by setting this bit scanning is performed on 5200 MHz frequency channel bit 5: by setting this bit scanning is performed on 5220 MHz frequency channel bit 6: by setting this bit scanning is performed on 5240 MHz frequency channel bit 7: by setting this bit scanning is performed on 5260 MHz frequency channel bit 8: by setting this bit scanning is performed on 5280 MHz frequency channel bit 9: by setting this bit scanning is performed on 5300 MHz frequency channel bit 10: by setting this bit scanning is performed on 5320 MHz frequency channel bit 11: by setting this bit scanning is performed on 5500 MHz frequency channel bit 12: by setting this bit scanning is performed on 5520 MHz frequency channel bit 13: by setting this bit scanning is performed on 5540 MHz frequency channel bit 14: by setting this bit scanning is performed on 5560 MHz frequency channel bit 15: by setting this bit scanning is performed on 5580 MHz frequency channel bit 16: by setting this bit scanning is performed on 5600 MHz frequency channel bit 17: by setting this bit scanning is performed on 5620 MHz frequency channel bit 18: by setting this bit scanning is performed on 5640 MHz frequency channel bit 19: by setting this bit scanning is performed on 5660 MHz frequency channel bit 20: by setting this bit scanning is performed on 5680 MHz frequency channel bit 21: by setting this bit scanning is performed on 5700 MHz frequency channel bit 22: by setting this bit scanning is performed on 5745 MHz frequency channel bit 23: by setting this bit scanning is performed on 5765 MHz frequency channel bit 24: by setting this bit scanning is performed on 5785 MHz frequency channel bit 25: by setting this bit scanning is performed on 5805 MHz frequency channel bit 26: by setting this bit scanning is performed on 5825 MHz frequency channel bit 27: by setting this bit scanning is performed on 4920 MHz frequency channel bit 28: by setting this bit scanning is performed on 4940 MHz frequency channel bit 29: by setting this bit scanning is performed on 4960 MHz frequency channel bit 30: by setting this bit scanning is performed on 4980 MHz frequency channel') dedicatedScanGrpBlockAdHocPeriod = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 20, 1, 7), Integer32()).setMaxAccess("readcreate") if mibBuilder.loadTexts: dedicatedScanGrpBlockAdHocPeriod.setStatus('current') if mibBuilder.loadTexts: dedicatedScanGrpBlockAdHocPeriod.setDescription('Number of seconds removing network access to the clients that are in ad hoc mode.') dedicatedScanGrpClassifySourceIF = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 20, 1, 8), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disable", 0), ("enable", 1)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: dedicatedScanGrpClassifySourceIF.setStatus('current') if mibBuilder.loadTexts: dedicatedScanGrpClassifySourceIF.setDescription('This variable allows to enable/disable classify sources of interference') dedicatedScanGrpRowStatus = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 20, 1, 9), RowStatus()).setMaxAccess("readcreate") if mibBuilder.loadTexts: dedicatedScanGrpRowStatus.setStatus('current') if mibBuilder.loadTexts: dedicatedScanGrpRowStatus.setDescription('RowStatus field for creation/deletion or changing row status.') dedicatedScanGrpDetectRogueAP = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 20, 1, 10), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1))).clone(namedValues=NamedValues(("disable", 0), ("enable", 1)))).setMaxAccess("readcreate") if mibBuilder.loadTexts: dedicatedScanGrpDetectRogueAP.setStatus('current') if mibBuilder.loadTexts: dedicatedScanGrpDetectRogueAP.setDescription('This enables/disables rogue AP detection.') dedicatedScanGrpListeningPort = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 20, 1, 11), Integer32()).setMaxAccess("readcreate") if mibBuilder.loadTexts: dedicatedScanGrpListeningPort.setStatus('current') if mibBuilder.loadTexts: dedicatedScanGrpListeningPort.setDescription('This variable has meaning only when dedicatedScanGrpDetectRogueAP is enabled. The port number is the port for listening for rogue AP detection.') widsWipsReport = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30)) activeThreatTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 1), ) if mibBuilder.loadTexts: activeThreatTable.setStatus('current') if mibBuilder.loadTexts: activeThreatTable.setDescription('List of active threats that have been discovered to this point of time.') activeThreatEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 1, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "activeThreatIndex")) if mibBuilder.loadTexts: activeThreatEntry.setStatus('current') if mibBuilder.loadTexts: activeThreatEntry.setDescription('An entry in this table describing an idividual threat charactersitics and attributes.') activeThreatIndex = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 1, 1, 1), Unsigned32()) if mibBuilder.loadTexts: activeThreatIndex.setStatus('current') if mibBuilder.loadTexts: activeThreatIndex.setDescription('Internally generated number without any significat meaning except used as indexing in this table.') activeThreatCategory = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 1, 1, 2), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: activeThreatCategory.setStatus('current') if mibBuilder.loadTexts: activeThreatCategory.setDescription('Textual description describing the type of the threat.') activeThreatDeviceMAC = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 1, 1, 3), MacAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: activeThreatDeviceMAC.setStatus('current') if mibBuilder.loadTexts: activeThreatDeviceMAC.setDescription('MAC address of the device that the threat appears to be originated.') activeThreatDateTime = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 1, 1, 4), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: activeThreatDateTime.setStatus('current') if mibBuilder.loadTexts: activeThreatDateTime.setDescription('Date and time the threat was discovered. ') activeThreatCounterMeasure = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 1, 1, 5), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 4, 8))).clone(namedValues=NamedValues(("noCounterMeasure", 0), ("rateLimit", 1), ("preventUse", 2), ("preventRoaming", 4), ("blacklisted", 8)))).setMaxAccess("readonly") if mibBuilder.loadTexts: activeThreatCounterMeasure.setStatus('current') if mibBuilder.loadTexts: activeThreatCounterMeasure.setDescription('Counter measure has been taken to tackle the threat.') activeThreatAPName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 1, 1, 6), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: activeThreatAPName.setStatus('current') if mibBuilder.loadTexts: activeThreatAPName.setDescription('Name of the access point.') activeThreatRSS = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 1, 1, 7), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: activeThreatRSS.setStatus('current') if mibBuilder.loadTexts: activeThreatRSS.setDescription('Signal strength of the device considered to be a threat.') activeThreatExtraDetails = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 1, 1, 8), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: activeThreatExtraDetails.setStatus('current') if mibBuilder.loadTexts: activeThreatExtraDetails.setDescription('Extra comments related to the threat.') activeThreatThreat = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 1, 1, 9), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: activeThreatThreat.setStatus('current') if mibBuilder.loadTexts: activeThreatThreat.setDescription('Textual description of the threat.') countermeasureAPTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 2), ) if mibBuilder.loadTexts: countermeasureAPTable.setStatus('current') if mibBuilder.loadTexts: countermeasureAPTable.setDescription('List of APs engaged in countermeasure activities to thwart coming threats.') countermeasureAPEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 2, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "countermeasureAPSerial"), (0, "HIPATH-WIRELESS-HWC-MIB", "countermeasureAPThreatIndex")) if mibBuilder.loadTexts: countermeasureAPEntry.setStatus('current') if mibBuilder.loadTexts: countermeasureAPEntry.setDescription('An entry in this table identifying an AP engaged in countermeasure activities.') countermeasureAPThreatIndex = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 2, 1, 1), Unsigned32()) if mibBuilder.loadTexts: countermeasureAPThreatIndex.setStatus('current') if mibBuilder.loadTexts: countermeasureAPThreatIndex.setDescription('Internally generated index of the access point taking part in countermeasure.') countermeasureAPSerial = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 2, 1, 2), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: countermeasureAPSerial.setStatus('current') if mibBuilder.loadTexts: countermeasureAPSerial.setDescription('Serial number of the access point taking part in countermeasure.') countermeasureAPName = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 2, 1, 3), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: countermeasureAPName.setStatus('current') if mibBuilder.loadTexts: countermeasureAPName.setDescription('Name of the access point taking part in countermeasure.') countermeasureAPThreatCategory = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 2, 1, 4), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: countermeasureAPThreatCategory.setStatus('current') if mibBuilder.loadTexts: countermeasureAPThreatCategory.setDescription('Textual description of the threat category that countermeasure action is aimed at.') countermeasureAPCountermeasure = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 2, 1, 5), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: countermeasureAPCountermeasure.setStatus('current') if mibBuilder.loadTexts: countermeasureAPCountermeasure.setDescription('Countermeasure has been taken to thwart the threat.') countermeasureAPTime = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 2, 1, 6), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: countermeasureAPTime.setStatus('current') if mibBuilder.loadTexts: countermeasureAPTime.setDescription('The time that the countermeasure has started.') blacklistedClientTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 3), ) if mibBuilder.loadTexts: blacklistedClientTable.setStatus('current') if mibBuilder.loadTexts: blacklistedClientTable.setDescription('List of clients that have been blacklisted due to preceived threats they may pose to the safe functioning of the operating network.') blacklistedClientEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 3, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "blacklistedClientMAC")) if mibBuilder.loadTexts: blacklistedClientEntry.setStatus('current') if mibBuilder.loadTexts: blacklistedClientEntry.setDescription('An entry in this table pertaining information about the MU that has been blacklisted.') blacklistedClientMAC = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 3, 1, 1), MacAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: blacklistedClientMAC.setStatus('current') if mibBuilder.loadTexts: blacklistedClientMAC.setDescription('MAC address of the client.') blacklistedClientStatTime = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 3, 1, 2), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: blacklistedClientStatTime.setStatus('current') if mibBuilder.loadTexts: blacklistedClientStatTime.setDescription('The time blacklisting started.') blacklistedClientEndTime = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 3, 1, 3), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: blacklistedClientEndTime.setStatus('current') if mibBuilder.loadTexts: blacklistedClientEndTime.setDescription('The time blacklisting ends.') blacklistedClientReason = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 3, 1, 4), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: blacklistedClientReason.setStatus('current') if mibBuilder.loadTexts: blacklistedClientReason.setDescription('Reason for blacklisting the client.') threatSummaryTable = MibTable((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 4), ) if mibBuilder.loadTexts: threatSummaryTable.setStatus('current') if mibBuilder.loadTexts: threatSummaryTable.setDescription('Summary of all threats that have been detected in the network by wireless controller system.') threatSummaryEntry = MibTableRow((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 4, 1), ).setIndexNames((0, "HIPATH-WIRELESS-HWC-MIB", "threatSummaryIndex")) if mibBuilder.loadTexts: threatSummaryEntry.setStatus('current') if mibBuilder.loadTexts: threatSummaryEntry.setDescription('An entry summarizing statistics about a category of a threat.') threatSummaryIndex = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 4, 1, 1), Unsigned32()) if mibBuilder.loadTexts: threatSummaryIndex.setStatus('current') if mibBuilder.loadTexts: threatSummaryIndex.setDescription('Internally generated index.') threatSummaryCategory = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 4, 1, 2), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: threatSummaryCategory.setStatus('current') if mibBuilder.loadTexts: threatSummaryCategory.setDescription('Textul description identifying the category of a threat.') threatSummaryActiveThreat = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 4, 1, 3), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: threatSummaryActiveThreat.setStatus('current') if mibBuilder.loadTexts: threatSummaryActiveThreat.setDescription('Counts of threats that are currently active.') threatSummaryHistoricalCounts = MibTableColumn((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 4, 1, 4), Unsigned32()).setMaxAccess("readonly") if mibBuilder.loadTexts: threatSummaryHistoricalCounts.setStatus('current') if mibBuilder.loadTexts: threatSummaryHistoricalCounts.setDescription('Historical counts of such threat that were detected in the past by the wireless controller system.') apNotifications = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 19)) apEventId = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 19, 1), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(1, 2))).clone(namedValues=NamedValues(("apPollTimeout", 1), ("apRegister", 2)))).setMaxAccess("readwrite") if mibBuilder.loadTexts: apEventId.setStatus('current') if mibBuilder.loadTexts: apEventId.setDescription('Identifies event associated with AP or AP tunnel: apPollTimeout - an event triggered when the AP disconnects from the controller. apRegister - an event triggered when the AP connects to the controller.') apEventDescription = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 19, 2), OctetString()).setMaxAccess("readonly") if mibBuilder.loadTexts: apEventDescription.setStatus('current') if mibBuilder.loadTexts: apEventDescription.setDescription('Contains the description of the most recently triggered event.') apEventAPSerialNumber = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 19, 3), OctetString().subtype(subtypeSpec=ValueSizeConstraint(16, 16)).setFixedLength(16)).setMaxAccess("readonly") if mibBuilder.loadTexts: apEventAPSerialNumber.setStatus('current') if mibBuilder.loadTexts: apEventAPSerialNumber.setDescription('16-character serial number of the AP.') apTunnelAlarm = NotificationType((1, 3, 6, 1, 4, 1, 4329, 15, 3, 19, 4)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "apEventId"), ("HIPATH-WIRELESS-HWC-MIB", "apEventDescription"), ("HIPATH-WIRELESS-HWC-MIB", "apEventAPSerialNumber")) if mibBuilder.loadTexts: apTunnelAlarm.setStatus('current') if mibBuilder.loadTexts: apTunnelAlarm.setDescription('alarm associated with AP and AP interface.') stationSessionNotifications = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20)) stationEventType = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20, 1), Integer32().subtype(subtypeSpec=ConstraintsUnion(SingleValueConstraint(0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12))).clone(namedValues=NamedValues(("registration", 0), ("deRegistration", 1), ("stateChange", 2), ("registrationFailed", 3), ("roam", 4), ("mbaTimeout", 5), ("mbaAccepted", 6), ("mbaRejected", 7), ("authorizationChanged", 8), ("authentication", 9), ("authenticationFailed", 10), ("locationUpdate", 11), ("areaChange", 12)))).setMaxAccess("readonly") if mibBuilder.loadTexts: stationEventType.setStatus('current') if mibBuilder.loadTexts: stationEventType.setDescription('station event type include: registration(0): MU registration. deRegistration(1): MU de-registration. stateChange(2): MU state changed. registrationFailed(3): MU registration failure. roam(4): MU roam. mbaTimeout(5): MU MAC-Based-Authentication time out. mbaAccepted(6): MU MAC-Based-Authentication accepted. mbaRejected(7): MU MAC-Based-Authentication rejected. authorizationChanged(8): MU authorization changed. authentication(9): MU authentication. authenticationFailed(10): MU authentication failure. locationUpdate(11): MU location updated. areaChange(12): MU roamed to other area.') stationMacAddress = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20, 2), MacAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: stationMacAddress.setStatus('current') if mibBuilder.loadTexts: stationMacAddress.setDescription('MAC address of the station that is the subject of this event report.') stationIPAddress = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20, 3), IpAddress()).setMaxAccess("readonly") if mibBuilder.loadTexts: stationIPAddress.setStatus('current') if mibBuilder.loadTexts: stationIPAddress.setDescription('IP address of the station that is the subject of this event report.') stationAPName = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20, 4), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: stationAPName.setStatus('current') if mibBuilder.loadTexts: stationAPName.setDescription('name of the AP which station associated with') stationAPSSID = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20, 5), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: stationAPSSID.setStatus('current') if mibBuilder.loadTexts: stationAPSSID.setDescription('SSID broadcasted by the access point which station connected to') stationDetailEvent = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20, 6), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: stationDetailEvent.setStatus('current') if mibBuilder.loadTexts: stationDetailEvent.setDescription('detail description of the station event') stationRoamedAPName = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20, 7), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: stationRoamedAPName.setStatus('current') if mibBuilder.loadTexts: stationRoamedAPName.setDescription('name of the access point which station roamed from') stationName = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20, 8), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: stationName.setStatus('current') if mibBuilder.loadTexts: stationName.setDescription('name of station') stationBSSID = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20, 9), DisplayString()).setMaxAccess("readonly") if mibBuilder.loadTexts: stationBSSID.setStatus('current') if mibBuilder.loadTexts: stationBSSID.setDescription('the Mac address of the radio which station connect to') stationEventTimeStamp = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20, 10), TimeTicks()).setMaxAccess("readonly") if mibBuilder.loadTexts: stationEventTimeStamp.setStatus('current') if mibBuilder.loadTexts: stationEventTimeStamp.setDescription('The duration in hundredths of a second from the network agent start time to the time of generation of the station event.') stationEventAlarm = NotificationType((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20, 11)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "stationEventType"), ("HIPATH-WIRELESS-HWC-MIB", "stationMacAddress"), ("HIPATH-WIRELESS-HWC-MIB", "stationIPAddress"), ("HIPATH-WIRELESS-HWC-MIB", "stationAPName"), ("HIPATH-WIRELESS-HWC-MIB", "stationAPSSID"), ("HIPATH-WIRELESS-HWC-MIB", "stationDetailEvent"), ("HIPATH-WIRELESS-HWC-MIB", "stationRoamedAPName"), ("HIPATH-WIRELESS-HWC-MIB", "stationName"), ("HIPATH-WIRELESS-HWC-MIB", "stationBSSID"), ("HIPATH-WIRELESS-HWC-MIB", "stationEventTimeStamp"), ("HIPATH-WIRELESS-HWC-MIB", "stationIPv6Address1"), ("HIPATH-WIRELESS-HWC-MIB", "stationIPv6Address2"), ("HIPATH-WIRELESS-HWC-MIB", "stationIPv6Address3")) if mibBuilder.loadTexts: stationEventAlarm.setStatus('current') if mibBuilder.loadTexts: stationEventAlarm.setDescription('A trap describing a significant event that happened to a station during a session on the network. A controller can sees hundreds or even thousands of these events every second.') stationIPv6Address1 = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20, 12), Ipv6Address()).setMaxAccess("readonly") if mibBuilder.loadTexts: stationIPv6Address1.setStatus('current') if mibBuilder.loadTexts: stationIPv6Address1.setDescription('One of the IPv6 addresses of the station that is the subject of this event report.') stationIPv6Address2 = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20, 13), Ipv6Address()).setMaxAccess("readonly") if mibBuilder.loadTexts: stationIPv6Address2.setStatus('current') if mibBuilder.loadTexts: stationIPv6Address2.setDescription('One of the IPv6 addresses of the station that is the subject of this event report.') stationIPv6Address3 = MibScalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20, 14), Ipv6Address()).setMaxAccess("readonly") if mibBuilder.loadTexts: stationIPv6Address3.setStatus('current') if mibBuilder.loadTexts: stationIPv6Address3.setDescription('One of the IPv6 addresses of the station that is the subject of this event report.') hiPathWirelessHWCConformance = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30)) hiPathWirelessHWCModule = ModuleCompliance((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 1)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "hiPathWirelessHWCGroup"), ("HIPATH-WIRELESS-HWC-MIB", "layerTwoPortGroup"), ("HIPATH-WIRELESS-HWC-MIB", "muGroup"), ("HIPATH-WIRELESS-HWC-MIB", "apStatsGroup"), ("HIPATH-WIRELESS-HWC-MIB", "muACLGroup"), ("HIPATH-WIRELESS-HWC-MIB", "siteGroup"), ("HIPATH-WIRELESS-HWC-MIB", "sitePolicyGroup"), ("HIPATH-WIRELESS-HWC-MIB", "siteCosGroup"), ("HIPATH-WIRELESS-HWC-MIB", "siteAPGroup"), ("HIPATH-WIRELESS-HWC-MIB", "siteWlanGroup"), ("HIPATH-WIRELESS-HWC-MIB", "apGroup"), ("HIPATH-WIRELESS-HWC-MIB", "wlanGroup"), ("HIPATH-WIRELESS-HWC-MIB", "wlanStatsGroup"), ("HIPATH-WIRELESS-HWC-MIB", "topologyGroup"), ("HIPATH-WIRELESS-HWC-MIB", "topologyStatGroup"), ("HIPATH-WIRELESS-HWC-MIB", "loadGroup"), ("HIPATH-WIRELESS-HWC-MIB", "outOfServiceScanGroup"), ("HIPATH-WIRELESS-HWC-MIB", "widsWipsEngineGroup"), ("HIPATH-WIRELESS-HWC-MIB", "widsWipsObjectsGroup"), ("HIPATH-WIRELESS-HWC-MIB", "scanGroupAPAssignmentGroup"), ("HIPATH-WIRELESS-HWC-MIB", "inServiceScanGroup"), ("HIPATH-WIRELESS-HWC-MIB", "wlanSecurityReportGroup"), ("HIPATH-WIRELESS-HWC-MIB", "friendlyAPGroup"), ("HIPATH-WIRELESS-HWC-MIB", "scanAPGroup"), ("HIPATH-WIRELESS-HWC-MIB", "activeThreatGroup"), ("HIPATH-WIRELESS-HWC-MIB", "muAccessListGroup"), ("HIPATH-WIRELESS-HWC-MIB", "apAntennaGroup"), ("HIPATH-WIRELESS-HWC-MIB", "threatSummaryGroup"), ("HIPATH-WIRELESS-HWC-MIB", "blaclistedClientGroup"), ("HIPATH-WIRELESS-HWC-MIB", "countermeasureAPGroup"), ("HIPATH-WIRELESS-HWC-MIB", "apByChannelGroup"), ("HIPATH-WIRELESS-HWC-MIB", "stationsByProtocolGroup"), ("HIPATH-WIRELESS-HWC-MIB", "licensingInformationGroup"), ("HIPATH-WIRELESS-HWC-MIB", "dedicatedScanGroup"), ("HIPATH-WIRELESS-HWC-MIB", "prohibitedAPGroup"), ("HIPATH-WIRELESS-HWC-MIB", "authorizedAPGroup"), ("HIPATH-WIRELESS-HWC-MIB", "uncategorizedAPGroup"), ("HIPATH-WIRELESS-HWC-MIB", "radiusFastFailoverEventsGroup"), ("HIPATH-WIRELESS-HWC-MIB", "dhcpRelayListenersGroup"), ("HIPATH-WIRELESS-HWC-MIB", "apRadioAntennaGroup"), ("HIPATH-WIRELESS-HWC-MIB", "authenticationAdvancedGroup"), ("HIPATH-WIRELESS-HWC-MIB", "radiusExtnsSettingGroup")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): hiPathWirelessHWCModule = hiPathWirelessHWCModule.setStatus('current') if mibBuilder.loadTexts: hiPathWirelessHWCModule.setDescription('Conformance definition for the EWC MIB.') hiPathWirelessHWCGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 2)) for _hiPathWirelessHWCGroup_obj in [[("HIPATH-WIRELESS-HWC-MIB", "sysSoftwareVersion"), ("HIPATH-WIRELESS-HWC-MIB", "sysCPUType"), ("HIPATH-WIRELESS-HWC-MIB", "sysLogLevel"), ("HIPATH-WIRELESS-HWC-MIB", "logEventSeverityThreshold"), ("HIPATH-WIRELESS-HWC-MIB", "logEventSeverity"), ("HIPATH-WIRELESS-HWC-MIB", "logEventComponent"), ("HIPATH-WIRELESS-HWC-MIB", "apLogCollectionEnable"), ("HIPATH-WIRELESS-HWC-MIB", "apLogFrequency"), ("HIPATH-WIRELESS-HWC-MIB", "apLogDestination"), ("HIPATH-WIRELESS-HWC-MIB", "apLogUserId"), ("HIPATH-WIRELESS-HWC-MIB", "apLogServerIP"), ("HIPATH-WIRELESS-HWC-MIB", "apLogDirectory"), ("HIPATH-WIRELESS-HWC-MIB", "apLogPassword"), ("HIPATH-WIRELESS-HWC-MIB", "apLogFTProtocol"), ("HIPATH-WIRELESS-HWC-MIB", "select"), ("HIPATH-WIRELESS-HWC-MIB", "apLogQuickSelectedOption"), ("HIPATH-WIRELESS-HWC-MIB", "apLogFileCopyDestination"), ("HIPATH-WIRELESS-HWC-MIB", "apLogFileCopyProtocol"), ("HIPATH-WIRELESS-HWC-MIB", "apLogFileCopyServerIP"), ("HIPATH-WIRELESS-HWC-MIB", "apLogFileCopyUserID"), ("HIPATH-WIRELESS-HWC-MIB", "apLogFileCopyPassword"), ("HIPATH-WIRELESS-HWC-MIB", "apLogFileCopyServerDirectory"), ("HIPATH-WIRELESS-HWC-MIB", "apLogFileCopyOperation"), ("HIPATH-WIRELESS-HWC-MIB", "apLogFileCopyOperationStatus"), ("HIPATH-WIRELESS-HWC-MIB", "apLogFileCopyRowStatus"), ("HIPATH-WIRELESS-HWC-MIB", "apLogFileUtilityLimit"), ("HIPATH-WIRELESS-HWC-MIB", "apLogFileUtilityCurrent"), ("HIPATH-WIRELESS-HWC-MIB", "logEventDescription"), ("HIPATH-WIRELESS-HWC-MIB", "apEventId"), ("HIPATH-WIRELESS-HWC-MIB", "apEventDescription"), ("HIPATH-WIRELESS-HWC-MIB", "apEventAPSerialNumber"), ("HIPATH-WIRELESS-HWC-MIB", "assocTxPackets"), ("HIPATH-WIRELESS-HWC-MIB", "assocRxPackets"), ("HIPATH-WIRELESS-HWC-MIB", "assocTxOctets"), ("HIPATH-WIRELESS-HWC-MIB", "assocRxOctets"), ("HIPATH-WIRELESS-HWC-MIB", "assocDuration"), ("HIPATH-WIRELESS-HWC-MIB", "assocCount"), ("HIPATH-WIRELESS-HWC-MIB", "assocMUMacAddress"), ("HIPATH-WIRELESS-HWC-MIB", "assocStartSysUpTime"), ("HIPATH-WIRELESS-HWC-MIB", "mobileUnitCount"), ("HIPATH-WIRELESS-HWC-MIB", "vnsIfIndex"), ("HIPATH-WIRELESS-HWC-MIB", "radioVNSRowStatus"), ("HIPATH-WIRELESS-HWC-MIB", "radioIfIndex"), ("HIPATH-WIRELESS-HWC-MIB", "vnsFilterRulePortLow"), ("HIPATH-WIRELESS-HWC-MIB", "vnsFilterRulePortHigh"), ("HIPATH-WIRELESS-HWC-MIB", "cpURL"), ("HIPATH-WIRELESS-HWC-MIB", "vnsDHCPRangeIndex"), ("HIPATH-WIRELESS-HWC-MIB", "vns3rdPartyAP"), ("HIPATH-WIRELESS-HWC-MIB", "vnsUseDHCPRelay"), ("HIPATH-WIRELESS-HWC-MIB", "vnsMgmtTrafficEnable"), ("HIPATH-WIRELESS-HWC-MIB", "vnsAuthModel"), ("HIPATH-WIRELESS-HWC-MIB", "physicalPortCount"), ("HIPATH-WIRELESS-HWC-MIB", "mgmtPortIfIndex"), ("HIPATH-WIRELESS-HWC-MIB", "mgmtPortHostname"), ("HIPATH-WIRELESS-HWC-MIB", "mgmtPortDomain"), ("HIPATH-WIRELESS-HWC-MIB", "vnRole"), ("HIPATH-WIRELESS-HWC-MIB", "vnIfIndex"), ("HIPATH-WIRELESS-HWC-MIB", "vnHeartbeatInterval"), ("HIPATH-WIRELESS-HWC-MIB", "ntpEnabled"), ("HIPATH-WIRELESS-HWC-MIB", "ntpTimezone"), ("HIPATH-WIRELESS-HWC-MIB", "ntpTimeServer1"), ("HIPATH-WIRELESS-HWC-MIB", "ntpTimeServer2"), ("HIPATH-WIRELESS-HWC-MIB", "ntpTimeServer3"), ("HIPATH-WIRELESS-HWC-MIB", "tunnelCount"), ("HIPATH-WIRELESS-HWC-MIB", "vnsCount"), ("HIPATH-WIRELESS-HWC-MIB", "vnsDescription"), ("HIPATH-WIRELESS-HWC-MIB", "vnsMUSessionTimeout"), ("HIPATH-WIRELESS-HWC-MIB", "vnsAllowMulticast"), ("HIPATH-WIRELESS-HWC-MIB", "vnsSSID"), ("HIPATH-WIRELESS-HWC-MIB", "vnsDomain"), ("HIPATH-WIRELESS-HWC-MIB", "vnsDNSServers"), ("HIPATH-WIRELESS-HWC-MIB", "vnsWINSServers"), ("HIPATH-WIRELESS-HWC-MIB", "vnsStatus"), ("HIPATH-WIRELESS-HWC-MIB", "vnsDHCPRangeStart"), ("HIPATH-WIRELESS-HWC-MIB", "vnsDHCPRangeEnd"), ("HIPATH-WIRELESS-HWC-MIB", "vnsDHCPRangeType"), ("HIPATH-WIRELESS-HWC-MIB", "vnsDHCPRangeStatus"), ("HIPATH-WIRELESS-HWC-MIB", "vnsRadiusServerPort"), ("HIPATH-WIRELESS-HWC-MIB", "vnsRadiusServerRetries"), ("HIPATH-WIRELESS-HWC-MIB", "vnsRadiusServerTimeout"), ("HIPATH-WIRELESS-HWC-MIB", "vnsRadiusServerSharedSecret"), ("HIPATH-WIRELESS-HWC-MIB", "vnsRadiusServerNASIdentifier"), ("HIPATH-WIRELESS-HWC-MIB", "vnsRadiusServerAuthType"), ("HIPATH-WIRELESS-HWC-MIB", "vnsRadiusServerRowStatus"), ("HIPATH-WIRELESS-HWC-MIB", "vnsFilterID"), ("HIPATH-WIRELESS-HWC-MIB", "vnsFilterIDStatus"), ("HIPATH-WIRELESS-HWC-MIB", "vnsFilterRuleOrder"), ("HIPATH-WIRELESS-HWC-MIB", "vnsFilterRuleDirection"), ("HIPATH-WIRELESS-HWC-MIB", "vnsFilterRuleAction"), ("HIPATH-WIRELESS-HWC-MIB", "vnsFilterRuleIPAddress"), ("HIPATH-WIRELESS-HWC-MIB", "vnsFilterRuleProtocol"), ("HIPATH-WIRELESS-HWC-MIB", "vnsFilterRuleEtherType"), ("HIPATH-WIRELESS-HWC-MIB", "vnsFilterRuleStatus"), ("HIPATH-WIRELESS-HWC-MIB", "vnsPrivWEPKeyType"), ("HIPATH-WIRELESS-HWC-MIB", "vnsPrivDynamicRekeyFrequency"), ("HIPATH-WIRELESS-HWC-MIB", "vnsPrivWEPKeyLength"), ("HIPATH-WIRELESS-HWC-MIB", "vnsPrivWPA1Enabled"), ("HIPATH-WIRELESS-HWC-MIB", "vnsPrivUseSharedKey"), ("HIPATH-WIRELESS-HWC-MIB", "vnsPrivWPASharedKey"), ("HIPATH-WIRELESS-HWC-MIB", "vnsWEPKeyIndex"), ("HIPATH-WIRELESS-HWC-MIB", "vnsWEPKeyValue"), ("HIPATH-WIRELESS-HWC-MIB", "activeVNSSessionCount"), ("HIPATH-WIRELESS-HWC-MIB", "apCount"), ("HIPATH-WIRELESS-HWC-MIB", "cpReplaceGatewayWithFQDN"), ("HIPATH-WIRELESS-HWC-MIB", "cpDefaultRedirectionURL"), ("HIPATH-WIRELESS-HWC-MIB", "cpConnectionIP"), ("HIPATH-WIRELESS-HWC-MIB", "cpConnectionPort"), ("HIPATH-WIRELESS-HWC-MIB", "cpSharedSecret"), ("HIPATH-WIRELESS-HWC-MIB", "cpLogOff"), ("HIPATH-WIRELESS-HWC-MIB", "cpStatusCheck"), ("HIPATH-WIRELESS-HWC-MIB", "cpType"), ("HIPATH-WIRELESS-HWC-MIB", "apMacAddress"), ("HIPATH-WIRELESS-HWC-MIB", "serviceLogFacility"), ("HIPATH-WIRELESS-HWC-MIB", "sysLogServerIP"), ("HIPATH-WIRELESS-HWC-MIB", "sysLogServerPort"), ("HIPATH-WIRELESS-HWC-MIB", "sysLogServerRowStatus"), ("HIPATH-WIRELESS-HWC-MIB", "sysLogServerIndex"), ("HIPATH-WIRELESS-HWC-MIB", "apActiveCount"), ("HIPATH-WIRELESS-HWC-MIB", "sysLogServerEnabled"), ("HIPATH-WIRELESS-HWC-MIB", "assocVnsIfIndex"), ("HIPATH-WIRELESS-HWC-MIB", "apRadioFrequency"), ("HIPATH-WIRELESS-HWC-MIB", "includeAllServiceMessages"), ("HIPATH-WIRELESS-HWC-MIB", "tunnelStartIP"), ("HIPATH-WIRELESS-HWC-MIB", "tunnelStartHWC"), ("HIPATH-WIRELESS-HWC-MIB", "tunnelEndIP"), ("HIPATH-WIRELESS-HWC-MIB", "tunnelEndHWC"), ("HIPATH-WIRELESS-HWC-MIB", "apBroadcastDisassociate"), ("HIPATH-WIRELESS-HWC-MIB", "sysSerialNo"), ("HIPATH-WIRELESS-HWC-MIB", "vnsPrivWPA2Enabled"), ("HIPATH-WIRELESS-HWC-MIB", "tunnelStatus"), ("HIPATH-WIRELESS-HWC-MIB", "hiPathWirelessAppLogFacility"), ("HIPATH-WIRELESS-HWC-MIB", "vnsVlanID"), ("HIPATH-WIRELESS-HWC-MIB", "vnsMgmIpAddress"), ("HIPATH-WIRELESS-HWC-MIB", "maxVoiceBWforReassociation"), ("HIPATH-WIRELESS-HWC-MIB", "maxVoiceBWforAssociation"), ("HIPATH-WIRELESS-HWC-MIB", "maxVideoBWforReassociation"), ("HIPATH-WIRELESS-HWC-MIB", "maxVideoBWforAssociation"), ("HIPATH-WIRELESS-HWC-MIB", "maxBestEffortBWforReassociation"), ("HIPATH-WIRELESS-HWC-MIB", "maxBestEffortBWforAssociation"), ("HIPATH-WIRELESS-HWC-MIB", "maxBackgroundBWforReassociation"), ("HIPATH-WIRELESS-HWC-MIB", "maxBackgroundBWforAssociation"), ("HIPATH-WIRELESS-HWC-MIB", "physicalPortsInternalVlanID"), ("HIPATH-WIRELESS-HWC-MIB", "vnsMode"), ("HIPATH-WIRELESS-HWC-MIB", "vnsQoSPriorityOverrideFlag"), ("HIPATH-WIRELESS-HWC-MIB", "vnsQoSPriorityOverrideSC"), ("HIPATH-WIRELESS-HWC-MIB", "vnsQoSPriorityOverrideDSCP"), ("HIPATH-WIRELESS-HWC-MIB", "netflowDestinationIP"), ("HIPATH-WIRELESS-HWC-MIB", "netflowInterval"), ("HIPATH-WIRELESS-HWC-MIB", "mirrorFirstN"), ("HIPATH-WIRELESS-HWC-MIB", "mirrorL2Ports"), ("HIPATH-WIRELESS-HWC-MIB", "vnsQoSClassificationServiceClass"), ("HIPATH-WIRELESS-HWC-MIB", "vnsQoSWirelessLegacyFlag"), ("HIPATH-WIRELESS-HWC-MIB", "vnsQoSWirelessWMMFlag"), ("HIPATH-WIRELESS-HWC-MIB", "vnsQoSWireless80211eFlag"), ("HIPATH-WIRELESS-HWC-MIB", "vnsQoSWirelessTurboVoiceFlag"), ("HIPATH-WIRELESS-HWC-MIB", "vnsQoSWirelessEnableUAPSD"), ("HIPATH-WIRELESS-HWC-MIB", "vnsQoSWirelessUseAdmControlVoice"), ("HIPATH-WIRELESS-HWC-MIB", "vnsSuppressSSID"), ("HIPATH-WIRELESS-HWC-MIB", "vnsEnable11hSupport"), ("HIPATH-WIRELESS-HWC-MIB", "vnsApplyPowerBackOff"), ("HIPATH-WIRELESS-HWC-MIB", "vnsProcessClientIEReq"), ("HIPATH-WIRELESS-HWC-MIB", "vnsQoSWirelessUseAdmControlVideo"), ("HIPATH-WIRELESS-HWC-MIB", "vnsInterfaceName"), ("HIPATH-WIRELESS-HWC-MIB", "vnsQoSWirelessULPolicerAction"), ("HIPATH-WIRELESS-HWC-MIB", "vnsQoSWirelessDLPolicerAction"), ("HIPATH-WIRELESS-HWC-MIB", "vnsQoSWirelessUseAdmControlBestEffort"), ("HIPATH-WIRELESS-HWC-MIB", "vnsQoSWirelessUseAdmControlBackground"), ("HIPATH-WIRELESS-HWC-MIB", "tspecMuMACAddress"), ("HIPATH-WIRELESS-HWC-MIB", "tspecAC"), ("HIPATH-WIRELESS-HWC-MIB", "tspecDirection"), ("HIPATH-WIRELESS-HWC-MIB", "tspecApSerialNumber"), ("HIPATH-WIRELESS-HWC-MIB", "tspecMuIPAddress"), ("HIPATH-WIRELESS-HWC-MIB", "tspecBssMac"), ("HIPATH-WIRELESS-HWC-MIB", "tspecSsid"), ("HIPATH-WIRELESS-HWC-MIB", "tspecMDR"), ("HIPATH-WIRELESS-HWC-MIB", "tspecNMS"), ("HIPATH-WIRELESS-HWC-MIB", "tspecSBA"), ("HIPATH-WIRELESS-HWC-MIB", "tspecDlRate"), ("HIPATH-WIRELESS-HWC-MIB", "tspecUlRate"), ("HIPATH-WIRELESS-HWC-MIB", "tspecDlViolations"), ("HIPATH-WIRELESS-HWC-MIB", "tspecUlViolations"), ("HIPATH-WIRELESS-HWC-MIB", "tspecProtocol"), ("HIPATH-WIRELESS-HWC-MIB", "vnsDLSSupportEnable"), ("HIPATH-WIRELESS-HWC-MIB", "vnsDLSAddress"), ("HIPATH-WIRELESS-HWC-MIB", "vnsDLSPort"), ("HIPATH-WIRELESS-HWC-MIB", "vnsSessionAvailabilityEnable"), ("HIPATH-WIRELESS-HWC-MIB", "ntpServerEnabled"), ("HIPATH-WIRELESS-HWC-MIB", "primaryDNS"), ("HIPATH-WIRELESS-HWC-MIB", "secondaryDNS"), ("HIPATH-WIRELESS-HWC-MIB", "tertiaryDNS"), ("HIPATH-WIRELESS-HWC-MIB", "physicalFlash"), ("HIPATH-WIRELESS-HWC-MIB", "jumboFrames"), ("HIPATH-WIRELESS-HWC-MIB", "vnsRadiusServerName"), ("HIPATH-WIRELESS-HWC-MIB", "vnsRadiusServerNasAddress"), ("HIPATH-WIRELESS-HWC-MIB", "dasReplayInterval"), ("HIPATH-WIRELESS-HWC-MIB", "dasPort"), ("HIPATH-WIRELESS-HWC-MIB", "vnsEnabled"), ("HIPATH-WIRELESS-HWC-MIB", "vnsAPFilterRuleOrder"), ("HIPATH-WIRELESS-HWC-MIB", "vnsAPFilterRuleDirection"), ("HIPATH-WIRELESS-HWC-MIB", "vnsAPFilterAction"), ("HIPATH-WIRELESS-HWC-MIB", "vnsAPFilterIPAddress"), ("HIPATH-WIRELESS-HWC-MIB", "vnsAPFilterMask"), ("HIPATH-WIRELESS-HWC-MIB", "vnsAPFilterPortLow"), ("HIPATH-WIRELESS-HWC-MIB", "vnsAPFilterPortHigh"), ("HIPATH-WIRELESS-HWC-MIB", "vnsAPFilterProtocol"), ("HIPATH-WIRELESS-HWC-MIB", "vnsAPFilterEtherType"), ("HIPATH-WIRELESS-HWC-MIB", "vnsAPFilterRowStatus"), ("HIPATH-WIRELESS-HWC-MIB", "vnsStrictSubnetAdherence"), ("HIPATH-WIRELESS-HWC-MIB", "vnsSLPEnabled"), ("HIPATH-WIRELESS-HWC-MIB", "imagePath36xx"), ("HIPATH-WIRELESS-HWC-MIB", "imagePath26xx"), ("HIPATH-WIRELESS-HWC-MIB", "tftpSever"), ("HIPATH-WIRELESS-HWC-MIB", "imageVersionOfap26xx"), ("HIPATH-WIRELESS-HWC-MIB", "imageVersionOfngap36xx"), ("HIPATH-WIRELESS-HWC-MIB", "topoExceptionFiterName"), ("HIPATH-WIRELESS-HWC-MIB", "topoExceptionStatPktsDenied"), ("HIPATH-WIRELESS-HWC-MIB", "topoExceptionStatPktsAllowed"), ("HIPATH-WIRELESS-HWC-MIB", "synchronizeSystemConfig"), ("HIPATH-WIRELESS-HWC-MIB", "availabilityStatus"), ("HIPATH-WIRELESS-HWC-MIB", "pairIPAddress"), ("HIPATH-WIRELESS-HWC-MIB", "hwcAvailabilityRank"), ("HIPATH-WIRELESS-HWC-MIB", "fastFailover"), ("HIPATH-WIRELESS-HWC-MIB", "synchronizeGuestPort"), ("HIPATH-WIRELESS-HWC-MIB", "tunnelStatsTxBytes"), ("HIPATH-WIRELESS-HWC-MIB", "apRegistrationRequests"), ("HIPATH-WIRELESS-HWC-MIB", "vnForeignClients"), ("HIPATH-WIRELESS-HWC-MIB", "vnLocalClients"), ("HIPATH-WIRELESS-HWC-MIB", "apStatsSessionDuration"), ("HIPATH-WIRELESS-HWC-MIB", "detectLinkFailure"), ("HIPATH-WIRELESS-HWC-MIB", "apRegUseClusterEncryption"), ("HIPATH-WIRELESS-HWC-MIB", "apRegClusterSharedSecret"), ("HIPATH-WIRELESS-HWC-MIB", "apRegDiscoveryRetries"), ("HIPATH-WIRELESS-HWC-MIB", "apRegDiscoveryInterval"), ("HIPATH-WIRELESS-HWC-MIB", "apRegTelnetPassword"), ("HIPATH-WIRELESS-HWC-MIB", "apRegSSHPassword"), ("HIPATH-WIRELESS-HWC-MIB", "apRegSecurityMode"), ("HIPATH-WIRELESS-HWC-MIB", "vnTotalClients"), ("HIPATH-WIRELESS-HWC-MIB", "tunnelStatsRxBytes"), ("HIPATH-WIRELESS-HWC-MIB", "tunnelStatsTxRxBytes"), ("HIPATH-WIRELESS-HWC-MIB", "tunnelsTxRxBytes"), ("HIPATH-WIRELESS-HWC-MIB", "clearAccessRejectMsg"), ("HIPATH-WIRELESS-HWC-MIB", "armCount"), ("HIPATH-WIRELESS-HWC-MIB", "armReplyMessage"), ("HIPATH-WIRELESS-HWC-MIB", "apLinkTimeout"), ("HIPATH-WIRELESS-HWC-MIB", "apFastFailoverEnable"), ("HIPATH-WIRELESS-HWC-MIB", "topoStatFrameTooLongErrors"), ("HIPATH-WIRELESS-HWC-MIB", "topoStatFrameChkSeqErrors"), ("HIPATH-WIRELESS-HWC-MIB", "vnsConfigWLANID"), ("HIPATH-WIRELESS-HWC-MIB", "wlanVNSID"), ("HIPATH-WIRELESS-HWC-MIB", "wlanPrivPrivacyType"), ("HIPATH-WIRELESS-HWC-MIB", "wlanPrivWEPKeyIndex"), ("HIPATH-WIRELESS-HWC-MIB", "wlanPrivWEPKeyLength"), ("HIPATH-WIRELESS-HWC-MIB", "wlanPrivWEPKey"), ("HIPATH-WIRELESS-HWC-MIB", "wlanPrivWPAv1EncryptionType"), ("HIPATH-WIRELESS-HWC-MIB", "wlanPrivWPAv2EncryptionType")], [("HIPATH-WIRELESS-HWC-MIB", "wlanPrivKeyManagement"), ("HIPATH-WIRELESS-HWC-MIB", "wlanPrivBroadcastRekeying"), ("HIPATH-WIRELESS-HWC-MIB", "wlanPrivRekeyInterval"), ("HIPATH-WIRELESS-HWC-MIB", "wlanPrivGroupKPSR"), ("HIPATH-WIRELESS-HWC-MIB", "wlanPrivWPAPSK"), ("HIPATH-WIRELESS-HWC-MIB", "wlanPrivWPAversion"), ("HIPATH-WIRELESS-HWC-MIB", "wlanPrivfastTransition"), ("HIPATH-WIRELESS-HWC-MIB", "wlanPrivManagementFrameProtection"), ("HIPATH-WIRELESS-HWC-MIB", "wlanAuthType"), ("HIPATH-WIRELESS-HWC-MIB", "wlanAuthMacBasedAuth"), ("HIPATH-WIRELESS-HWC-MIB", "wlanAuthMACBasedAuthOnRoam"), ("HIPATH-WIRELESS-HWC-MIB", "wlanAuthAutoAuthAuthorizedUser"), ("HIPATH-WIRELESS-HWC-MIB", "wlanAuthAllowUnauthorizedUser"), ("HIPATH-WIRELESS-HWC-MIB", "wlanAuthRadiusIncludeAP"), ("HIPATH-WIRELESS-HWC-MIB", "wlanAuthRadiusIncludeVNS"), ("HIPATH-WIRELESS-HWC-MIB", "wlanAuthRadiusIncludeSSID"), ("HIPATH-WIRELESS-HWC-MIB", "wlanAuthRadiusIncludePolicy"), ("HIPATH-WIRELESS-HWC-MIB", "wlanAuthRadiusIncludeTopology"), ("HIPATH-WIRELESS-HWC-MIB", "wlanAuthRadiusIncludeIngressRC"), ("HIPATH-WIRELESS-HWC-MIB", "wlanAuthRadiusIncludeEgressRC"), ("HIPATH-WIRELESS-HWC-MIB", "wlanAuthCollectAcctInformation"), ("HIPATH-WIRELESS-HWC-MIB", "wlanAuthReplaceCalledStationIDWithZone"), ("HIPATH-WIRELESS-HWC-MIB", "wlanAuthRadiusAcctAfterMacBaseAuthorization"), ("HIPATH-WIRELESS-HWC-MIB", "wlanAuthRadiusTimeoutRole"), ("HIPATH-WIRELESS-HWC-MIB", "wlanAuthRadiusOperatorNameSpace"), ("HIPATH-WIRELESS-HWC-MIB", "wlanAuthRadiusOperatorName"), ("HIPATH-WIRELESS-HWC-MIB", "wlanAuthMACBasedAuthReAuthOnAreaRoam"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusName"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusUsage"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusPriority"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusPort"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusRetries"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusTimeout"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusNASUseVnsIP"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusNASIP"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusNASIDUseVNSName"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusNASID"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusAuthType"), ("HIPATH-WIRELESS-HWC-MIB", "wlanCPAuthType"), ("HIPATH-WIRELESS-HWC-MIB", "wlanCP802HttpRedirect"), ("HIPATH-WIRELESS-HWC-MIB", "wlanCPExtConnection"), ("HIPATH-WIRELESS-HWC-MIB", "wlanCPExtPort"), ("HIPATH-WIRELESS-HWC-MIB", "wlanCPExtEnableHttps"), ("HIPATH-WIRELESS-HWC-MIB", "wlanCPExtSharedSecret"), ("HIPATH-WIRELESS-HWC-MIB", "wlanCPExtTosOverride"), ("HIPATH-WIRELESS-HWC-MIB", "wlanCPExtTosValue"), ("HIPATH-WIRELESS-HWC-MIB", "wlanCPGuestAccLifetime"), ("HIPATH-WIRELESS-HWC-MIB", "wlanCPGuestSessionLifetime"), ("HIPATH-WIRELESS-HWC-MIB", "loadGrpRadiosRadio1"), ("HIPATH-WIRELESS-HWC-MIB", "loadGrpRadiosRadio2"), ("HIPATH-WIRELESS-HWC-MIB", "loadGrpWlanAssigned"), ("HIPATH-WIRELESS-HWC-MIB", "schedule"), ("HIPATH-WIRELESS-HWC-MIB", "startHour"), ("HIPATH-WIRELESS-HWC-MIB", "startMinute"), ("HIPATH-WIRELESS-HWC-MIB", "duration"), ("HIPATH-WIRELESS-HWC-MIB", "recurrenceDaily"), ("HIPATH-WIRELESS-HWC-MIB", "recurrenceWeekly"), ("HIPATH-WIRELESS-HWC-MIB", "recurrenceMonthly"), ("HIPATH-WIRELESS-HWC-MIB", "apPlatforms"), ("HIPATH-WIRELESS-HWC-MIB", "wlanCPIntLogoffButton"), ("HIPATH-WIRELESS-HWC-MIB", "wlanCPIntStatusCheckButton"), ("HIPATH-WIRELESS-HWC-MIB", "wlanCPRedirectURL"), ("HIPATH-WIRELESS-HWC-MIB", "apRadioProtocol"), ("HIPATH-WIRELESS-HWC-MIB", "apRadioNumber"), ("HIPATH-WIRELESS-HWC-MIB", "wlanCPReplaceIPwithFQDN"), ("HIPATH-WIRELESS-HWC-MIB", "wlanCPSendLoginTo"), ("HIPATH-WIRELESS-HWC-MIB", "wlanCPGuestAllowedLifetimeAcct"), ("HIPATH-WIRELESS-HWC-MIB", "wlanCPGuestIDPrefix"), ("HIPATH-WIRELESS-HWC-MIB", "wlanCPGuestMinPassLength"), ("HIPATH-WIRELESS-HWC-MIB", "wlanCPGuestMaxConcurrentSession"), ("HIPATH-WIRELESS-HWC-MIB", "wlanCPExtAddIPtoURL"), ("HIPATH-WIRELESS-HWC-MIB", "wlanCPUseHTTPSforConnection"), ("HIPATH-WIRELESS-HWC-MIB", "wlanCPIdentity"), ("HIPATH-WIRELESS-HWC-MIB", "wlanCPCustomSpecificURL"), ("HIPATH-WIRELESS-HWC-MIB", "wlanCPSelectionOption"), ("HIPATH-WIRELESS-HWC-MIB", "wlanCPExtEncryption"), ("HIPATH-WIRELESS-HWC-MIB", "radiusStrictMode"), ("HIPATH-WIRELESS-HWC-MIB", "advancedFilteringMode"), ("HIPATH-WIRELESS-HWC-MIB", "weakCipherEnable"), ("HIPATH-WIRELESS-HWC-MIB", "stationEventType"), ("HIPATH-WIRELESS-HWC-MIB", "stationMacAddress"), ("HIPATH-WIRELESS-HWC-MIB", "stationIPAddress"), ("HIPATH-WIRELESS-HWC-MIB", "stationAPName"), ("HIPATH-WIRELESS-HWC-MIB", "stationAPSSID"), ("HIPATH-WIRELESS-HWC-MIB", "stationDetailEvent"), ("HIPATH-WIRELESS-HWC-MIB", "stationRoamedAPName"), ("HIPATH-WIRELESS-HWC-MIB", "stationName"), ("HIPATH-WIRELESS-HWC-MIB", "stationBSSID"), ("HIPATH-WIRELESS-HWC-MIB", "stationEventTimeStamp"), ("HIPATH-WIRELESS-HWC-MIB", "stationIPv6Address1"), ("HIPATH-WIRELESS-HWC-MIB", "stationIPv6Address2"), ("HIPATH-WIRELESS-HWC-MIB", "stationIPv6Address3"), ("HIPATH-WIRELESS-HWC-MIB", "clientAutologinOption"), ("HIPATH-WIRELESS-HWC-MIB", "radiusMacAddressFormatOption"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusServerName"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusServerUse"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusServerUsage"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusServerAuthNASIP"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusServerAuthNASId"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusServerAuthAuthType"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusServerAcctNASIP"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusServerAcctNASId"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusServerAcctSIAR"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusServerMacNASIP"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusServerMacNASId"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusServerMacAuthType"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusServerMacPW"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusServerAuthUseVNSIPAddr"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusServerAuthUseVNSName"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusServerAcctUseVNSIPAddr"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusServerAcctUseVNSName"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusServerMacUseVNSIPAddr"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadiusServerMacUseVNSName")]]: if getattr(mibBuilder, 'version', 0) < (4, 4, 2): # WARNING: leading objects get lost here! hiPathWirelessHWCGroup = hiPathWirelessHWCGroup.setObjects(*_hiPathWirelessHWCGroup_obj) else: hiPathWirelessHWCGroup = hiPathWirelessHWCGroup.setObjects(*_hiPathWirelessHWCGroup_obj, **dict(append=True)) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): hiPathWirelessHWCGroup = hiPathWirelessHWCGroup.setStatus('current') if mibBuilder.loadTexts: hiPathWirelessHWCGroup.setDescription('Conformance groups.') hiPathWirelessHWCAlarms = NotificationGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 3)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "hiPathWirelessLogAlarm"), ("HIPATH-WIRELESS-HWC-MIB", "stationEventAlarm"), ("HIPATH-WIRELESS-HWC-MIB", "apTunnelAlarm")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): hiPathWirelessHWCAlarms = hiPathWirelessHWCAlarms.setStatus('current') if mibBuilder.loadTexts: hiPathWirelessHWCAlarms.setDescription('Conformance information for the alarm groups.') hiPathWirelessHWCObsolete = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 4)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "vnsWDSRFAPName"), ("HIPATH-WIRELESS-HWC-MIB", "vnsWDSRFbgService"), ("HIPATH-WIRELESS-HWC-MIB", "vnsWDSRFaService"), ("HIPATH-WIRELESS-HWC-MIB", "vnsWDSRFPreferredParent"), ("HIPATH-WIRELESS-HWC-MIB", "vnsWDSRFBackupParent"), ("HIPATH-WIRELESS-HWC-MIB", "vnsWDSRFBridge"), ("HIPATH-WIRELESS-HWC-MIB", "vnsRateControlProfInd"), ("HIPATH-WIRELESS-HWC-MIB", "vnsRateControlProfName"), ("HIPATH-WIRELESS-HWC-MIB", "vnsRateControlCIR"), ("HIPATH-WIRELESS-HWC-MIB", "vnsRateControlCBS"), ("HIPATH-WIRELESS-HWC-MIB", "vnsExceptionFiterName"), ("HIPATH-WIRELESS-HWC-MIB", "vnsExceptionStatPktsDenied"), ("HIPATH-WIRELESS-HWC-MIB", "vnsExceptionStatPktsAllowed"), ("HIPATH-WIRELESS-HWC-MIB", "vnsWDSStatAPName"), ("HIPATH-WIRELESS-HWC-MIB", "vnsWDSStatAPRole"), ("HIPATH-WIRELESS-HWC-MIB", "vnsWDSStatAPRadio"), ("HIPATH-WIRELESS-HWC-MIB", "vnsWDSStatAPParent"), ("HIPATH-WIRELESS-HWC-MIB", "vnsWDSStatSSID"), ("HIPATH-WIRELESS-HWC-MIB", "vnsWDSStatRxFrame"), ("HIPATH-WIRELESS-HWC-MIB", "vnsWDSStatTxFrame"), ("HIPATH-WIRELESS-HWC-MIB", "vnsWDSStatRxError"), ("HIPATH-WIRELESS-HWC-MIB", "vnsWDSStatTxError"), ("HIPATH-WIRELESS-HWC-MIB", "vnsWDSStatRxRSSI"), ("HIPATH-WIRELESS-HWC-MIB", "vnsWDSStatRxRate"), ("HIPATH-WIRELESS-HWC-MIB", "vnsAssignmentMode"), ("HIPATH-WIRELESS-HWC-MIB", "vnsParentIfIndex"), ("HIPATH-WIRELESS-HWC-MIB", "externalRadiusServerName"), ("HIPATH-WIRELESS-HWC-MIB", "externalRadiusServerAddress"), ("HIPATH-WIRELESS-HWC-MIB", "externalRadiusServerSharedSecret"), ("HIPATH-WIRELESS-HWC-MIB", "externalRadiusServerRowStatus"), ("HIPATH-WIRELESS-HWC-MIB", "cpLoginLabel"), ("HIPATH-WIRELESS-HWC-MIB", "cpPasswordLabel"), ("HIPATH-WIRELESS-HWC-MIB", "cpHeaderURL"), ("HIPATH-WIRELESS-HWC-MIB", "cpFooterURL"), ("HIPATH-WIRELESS-HWC-MIB", "cpMessage"), ("HIPATH-WIRELESS-HWC-MIB", "cpURL"), ("HIPATH-WIRELESS-HWC-MIB", "loadGroupLoadControl"), ("HIPATH-WIRELESS-HWC-MIB", "vnsWDSStatTxRate"), ("HIPATH-WIRELESS-HWC-MIB", "vnsRateControlProfile"), ("HIPATH-WIRELESS-HWC-MIB", "vnsStatName"), ("HIPATH-WIRELESS-HWC-MIB", "vnsStatTxPkts"), ("HIPATH-WIRELESS-HWC-MIB", "vnsStatRxPkts"), ("HIPATH-WIRELESS-HWC-MIB", "vnsStatTxOctects"), ("HIPATH-WIRELESS-HWC-MIB", "vnsStatRxOctects"), ("HIPATH-WIRELESS-HWC-MIB", "vnsStatMulticastTxPkts"), ("HIPATH-WIRELESS-HWC-MIB", "vnsStatMulticastRxPkts"), ("HIPATH-WIRELESS-HWC-MIB", "vnsStatBroadcastTxPkts"), ("HIPATH-WIRELESS-HWC-MIB", "vnsStatBroadcastRxPkts"), ("HIPATH-WIRELESS-HWC-MIB", "vnsStatRadiusTotRequests"), ("HIPATH-WIRELESS-HWC-MIB", "vnsStatRadiusReqFailed"), ("HIPATH-WIRELESS-HWC-MIB", "vnsStatRadiusReqRejected")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): hiPathWirelessHWCObsolete = hiPathWirelessHWCObsolete.setStatus('obsolete') if mibBuilder.loadTexts: hiPathWirelessHWCObsolete.setDescription('List of object that EWC does not anymore support.') wirelessEWCGroups = MibIdentifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5)) physicalPortsGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 1)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "portMgmtTrafficEnable"), ("HIPATH-WIRELESS-HWC-MIB", "portDuplexMode"), ("HIPATH-WIRELESS-HWC-MIB", "portFunction"), ("HIPATH-WIRELESS-HWC-MIB", "portName"), ("HIPATH-WIRELESS-HWC-MIB", "portIpAddress"), ("HIPATH-WIRELESS-HWC-MIB", "portMask"), ("HIPATH-WIRELESS-HWC-MIB", "portVlanID"), ("HIPATH-WIRELESS-HWC-MIB", "portDHCPEnable"), ("HIPATH-WIRELESS-HWC-MIB", "portDHCPGateway"), ("HIPATH-WIRELESS-HWC-MIB", "portDHCPDomain"), ("HIPATH-WIRELESS-HWC-MIB", "portDHCPDefaultLease"), ("HIPATH-WIRELESS-HWC-MIB", "portDHCPMaxLease"), ("HIPATH-WIRELESS-HWC-MIB", "portDHCPDnsServers"), ("HIPATH-WIRELESS-HWC-MIB", "portDHCPWins"), ("HIPATH-WIRELESS-HWC-MIB", "portEnabled"), ("HIPATH-WIRELESS-HWC-MIB", "portMacAddress")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): physicalPortsGroup = physicalPortsGroup.setStatus('deprecated') if mibBuilder.loadTexts: physicalPortsGroup.setDescription('Physical ports and their attributes. ') phyDHCPRangeGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 2)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "phyDHCPRangeIndex"), ("HIPATH-WIRELESS-HWC-MIB", "phyDHCPRangeStart"), ("HIPATH-WIRELESS-HWC-MIB", "phyDHCPRangeEnd"), ("HIPATH-WIRELESS-HWC-MIB", "phyDHCPRangeType"), ("HIPATH-WIRELESS-HWC-MIB", "phyDHCPRangeStatus")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): phyDHCPRangeGroup = phyDHCPRangeGroup.setStatus('deprecated') if mibBuilder.loadTexts: phyDHCPRangeGroup.setDescription('DHCP objects and attributes associated to physical ports. ') layerTwoPortGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 3)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "layerTwoPortName"), ("HIPATH-WIRELESS-HWC-MIB", "layerTwoPortMacAddress"), ("HIPATH-WIRELESS-HWC-MIB", "layerTwoPortMgmtState")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): layerTwoPortGroup = layerTwoPortGroup.setStatus('current') if mibBuilder.loadTexts: layerTwoPortGroup.setDescription('Collection of layer two ports objects.') muGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 4)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "muMACAddress"), ("HIPATH-WIRELESS-HWC-MIB", "muIPAddress"), ("HIPATH-WIRELESS-HWC-MIB", "muUser"), ("HIPATH-WIRELESS-HWC-MIB", "muState"), ("HIPATH-WIRELESS-HWC-MIB", "muAPSerialNo"), ("HIPATH-WIRELESS-HWC-MIB", "muVnsSSID"), ("HIPATH-WIRELESS-HWC-MIB", "muTxPackets"), ("HIPATH-WIRELESS-HWC-MIB", "muRxPackets"), ("HIPATH-WIRELESS-HWC-MIB", "muTxOctets"), ("HIPATH-WIRELESS-HWC-MIB", "muRxOctets"), ("HIPATH-WIRELESS-HWC-MIB", "muDuration"), ("HIPATH-WIRELESS-HWC-MIB", "muAPName"), ("HIPATH-WIRELESS-HWC-MIB", "muWLANID"), ("HIPATH-WIRELESS-HWC-MIB", "muConnectionProtocol"), ("HIPATH-WIRELESS-HWC-MIB", "muTopologyName"), ("HIPATH-WIRELESS-HWC-MIB", "muPolicyName"), ("HIPATH-WIRELESS-HWC-MIB", "muDefaultCoS"), ("HIPATH-WIRELESS-HWC-MIB", "muConnectionCapability"), ("HIPATH-WIRELESS-HWC-MIB", "muBSSIDMac"), ("HIPATH-WIRELESS-HWC-MIB", "muDot11ConnectionCapability")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): muGroup = muGroup.setStatus('current') if mibBuilder.loadTexts: muGroup.setDescription('MU attributes associated to EWC.') apStatsGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 5)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "apInUcastPkts"), ("HIPATH-WIRELESS-HWC-MIB", "apInNUcastPkts"), ("HIPATH-WIRELESS-HWC-MIB", "apInOctets"), ("HIPATH-WIRELESS-HWC-MIB", "apInErrors"), ("HIPATH-WIRELESS-HWC-MIB", "apInDiscards"), ("HIPATH-WIRELESS-HWC-MIB", "apOutUcastPkts"), ("HIPATH-WIRELESS-HWC-MIB", "apOutNUcastPkts"), ("HIPATH-WIRELESS-HWC-MIB", "apOutOctets"), ("HIPATH-WIRELESS-HWC-MIB", "apOutErrors"), ("HIPATH-WIRELESS-HWC-MIB", "apOutDiscards"), ("HIPATH-WIRELESS-HWC-MIB", "apUpTime"), ("HIPATH-WIRELESS-HWC-MIB", "apCredentialType"), ("HIPATH-WIRELESS-HWC-MIB", "apCertificateExpiry"), ("HIPATH-WIRELESS-HWC-MIB", "apStatsMuCounts"), ("HIPATH-WIRELESS-HWC-MIB", "apStatsSessionDuration"), ("HIPATH-WIRELESS-HWC-MIB", "apTotalStationsA"), ("HIPATH-WIRELESS-HWC-MIB", "apTotalStationsB"), ("HIPATH-WIRELESS-HWC-MIB", "apTotalStationsG"), ("HIPATH-WIRELESS-HWC-MIB", "apTotalStationsN50"), ("HIPATH-WIRELESS-HWC-MIB", "apTotalStationsN24"), ("HIPATH-WIRELESS-HWC-MIB", "apInvalidPolicyCount"), ("HIPATH-WIRELESS-HWC-MIB", "apInterfaceMTU"), ("HIPATH-WIRELESS-HWC-MIB", "apEffectiveTunnelMTU"), ("HIPATH-WIRELESS-HWC-MIB", "apTotalStationsAC"), ("HIPATH-WIRELESS-HWC-MIB", "apTotalStationsAInOctets"), ("HIPATH-WIRELESS-HWC-MIB", "apTotalStationsAOutOctets"), ("HIPATH-WIRELESS-HWC-MIB", "apTotalStationsBInOctets"), ("HIPATH-WIRELESS-HWC-MIB", "apTotalStationsBOutOctets"), ("HIPATH-WIRELESS-HWC-MIB", "apTotalStationsGInOctets"), ("HIPATH-WIRELESS-HWC-MIB", "apTotalStationsGOutOctets"), ("HIPATH-WIRELESS-HWC-MIB", "apTotalStationsN50InOctets"), ("HIPATH-WIRELESS-HWC-MIB", "apTotalStationsN50OutOctets"), ("HIPATH-WIRELESS-HWC-MIB", "apTotalStationsN24InOctets"), ("HIPATH-WIRELESS-HWC-MIB", "apTotalStationsN24OutOctets"), ("HIPATH-WIRELESS-HWC-MIB", "apTotalStationsACInOctets"), ("HIPATH-WIRELESS-HWC-MIB", "apTotalStationsACOutOctets"), ("HIPATH-WIRELESS-HWC-MIB", "apRadioStatusChannel"), ("HIPATH-WIRELESS-HWC-MIB", "apRadioStatusChannelWidth"), ("HIPATH-WIRELESS-HWC-MIB", "apRadioStatusChannelOffset"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfRadioPrevPeakChannelUtilization"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfRadioCurPeakChannelUtilization"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfRadioAverageChannelUtilization"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfRadioCurrentChannelUtilization"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfRadioPrevPeakRSS"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfRadioCurPeakRSS"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfRadioAverageRSS"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfRadioCurrentRSS"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfRadioPrevPeakSNR"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfRadioCurPeakSNR"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfRadioAverageSNR"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfRadioCurrentSNR"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfRadioPrevPeakPktRetx"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfRadioCurPeakPktRetx"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfRadioAveragePktRetx"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfRadioCurrentPktRetx"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfRadioPktRetx"), ("HIPATH-WIRELESS-HWC-MIB", "apAccPrevPeakAssocReqRx"), ("HIPATH-WIRELESS-HWC-MIB", "apAccCurPeakAssocReqRx"), ("HIPATH-WIRELESS-HWC-MIB", "apAccAverageAssocReqRx"), ("HIPATH-WIRELESS-HWC-MIB", "apAccCurrentAssocReqRx"), ("HIPATH-WIRELESS-HWC-MIB", "apAccAssocReqRx"), ("HIPATH-WIRELESS-HWC-MIB", "apAccPrevPeakReassocReqRx"), ("HIPATH-WIRELESS-HWC-MIB", "apAccCurPeakReassocReqRx"), ("HIPATH-WIRELESS-HWC-MIB", "apAccAverageReassocReqRx"), ("HIPATH-WIRELESS-HWC-MIB", "apAccCurrentReassocReqRx"), ("HIPATH-WIRELESS-HWC-MIB", "apAccReassocReqRx"), ("HIPATH-WIRELESS-HWC-MIB", "apAccPrevPeakDisassocDeauthReqTx"), ("HIPATH-WIRELESS-HWC-MIB", "apAccCurPeakDisassocDeauthReqTx"), ("HIPATH-WIRELESS-HWC-MIB", "apAccAverageDisassocDeauthReqTx"), ("HIPATH-WIRELESS-HWC-MIB", "apAccCurrentDisassocDeauthReqTx"), ("HIPATH-WIRELESS-HWC-MIB", "apAccDisassocDeauthReqTx"), ("HIPATH-WIRELESS-HWC-MIB", "apAccPrevPeakDisassocDeauthReqRx"), ("HIPATH-WIRELESS-HWC-MIB", "apAccCurPeakDisassocDeauthReqRx"), ("HIPATH-WIRELESS-HWC-MIB", "apAccAverageDisassocDeauthReqRx"), ("HIPATH-WIRELESS-HWC-MIB", "apAccCurrentDisassocDeauthReqRx"), ("HIPATH-WIRELESS-HWC-MIB", "apAccDisassocDeauthReqRx"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfWlanPrevPeakClientsPerSec"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfWlanCurPeakClientsPerSec"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfWlanAverageClientsPerSec"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfWlanCurrentClientsPerSec"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfWlanPrevPeakULOctetsPerSec"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfWlanCurPeakULOctetsPerSec"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfWlanAverageULOctetsPerSec"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfWlanCurrentULOctetsPerSec"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfWlanULOctets"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfWlanPrevPeakULPktsPerSec"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfWlanCurPeakULPktsPerSec"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfWlanAverageULPktsPerSec"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfWlanCurrentULPktsPerSec"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfWlanULPkts"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfWlanPrevPeakDLOctetsPerSec"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfWlanCurPeakDLOctetsPerSec"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfWlanAverageDLOctetsPerSec"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfWlanCurrentDLOctetsPerSec"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfWlanDLOctets"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfWlanPrevPeakDLPktsPerSec"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfWlanCurPeakDLPktsPerSec"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfWlanAverageDLPktsPerSec"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfWlanCurrentDLPktsPerSec"), ("HIPATH-WIRELESS-HWC-MIB", "apPerfWlanDLPkts"), ("HIPATH-WIRELESS-HWC-MIB", "apChnlUtilPrevPeakUtilization"), ("HIPATH-WIRELESS-HWC-MIB", "apChnlUtilCurPeakUtilization"), ("HIPATH-WIRELESS-HWC-MIB", "apChnlUtilAverageUtilization"), ("HIPATH-WIRELESS-HWC-MIB", "apChnlUtilCurrentUtilization"), ("HIPATH-WIRELESS-HWC-MIB", "nearbyApInfo"), ("HIPATH-WIRELESS-HWC-MIB", "nearbyApBSSID"), ("HIPATH-WIRELESS-HWC-MIB", "nearbyApChannel"), ("HIPATH-WIRELESS-HWC-MIB", "nearbyApRSS")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): apStatsGroup = apStatsGroup.setStatus('current') if mibBuilder.loadTexts: apStatsGroup.setDescription('Collection of objects and attributes related to AP statistics.') muACLGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 6)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "muACLRowStatus"), ("HIPATH-WIRELESS-HWC-MIB", "muACLMACAddress"), ("HIPATH-WIRELESS-HWC-MIB", "muACLType")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): muACLGroup = muACLGroup.setStatus('current') if mibBuilder.loadTexts: muACLGroup.setDescription('List of objects for creation of blacklist/whitelist.') siteGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 7)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "siteID"), ("HIPATH-WIRELESS-HWC-MIB", "siteName"), ("HIPATH-WIRELESS-HWC-MIB", "siteLocalRadiusAuthentication"), ("HIPATH-WIRELESS-HWC-MIB", "siteDefaultDNSServer"), ("HIPATH-WIRELESS-HWC-MIB", "siteMaxEntries"), ("HIPATH-WIRELESS-HWC-MIB", "siteNumEntries"), ("HIPATH-WIRELESS-HWC-MIB", "siteTableNextAvailableIndex"), ("HIPATH-WIRELESS-HWC-MIB", "siteEnableSecureTunnel"), ("HIPATH-WIRELESS-HWC-MIB", "siteReplaceStnIDwithSiteName"), ("HIPATH-WIRELESS-HWC-MIB", "siteRowStatus"), ("HIPATH-WIRELESS-HWC-MIB", "siteEncryptCommAPtoController"), ("HIPATH-WIRELESS-HWC-MIB", "siteEncryptCommBetweenAPs"), ("HIPATH-WIRELESS-HWC-MIB", "siteBandPreferenceEnable"), ("HIPATH-WIRELESS-HWC-MIB", "siteLoadControlEnableR1"), ("HIPATH-WIRELESS-HWC-MIB", "siteLoadControlEnableR2"), ("HIPATH-WIRELESS-HWC-MIB", "siteMaxClientR1"), ("HIPATH-WIRELESS-HWC-MIB", "siteMaxClientR2"), ("HIPATH-WIRELESS-HWC-MIB", "siteStrictLimitEnableR1"), ("HIPATH-WIRELESS-HWC-MIB", "siteStrictLimitEnableR2")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): siteGroup = siteGroup.setStatus('current') if mibBuilder.loadTexts: siteGroup.setDescription('A collection of objects providing Site creation and its attributes.') sitePolicyGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 8)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "sitePolicyMember")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): sitePolicyGroup = sitePolicyGroup.setStatus('current') if mibBuilder.loadTexts: sitePolicyGroup.setDescription('Objects defining the association of policies to sites.') siteCosGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 9)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "siteCoSMember")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): siteCosGroup = siteCosGroup.setStatus('current') if mibBuilder.loadTexts: siteCosGroup.setDescription('Objects defining the association of policies to sites.') siteAPGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 10)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "siteAPMember")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): siteAPGroup = siteAPGroup.setStatus('current') if mibBuilder.loadTexts: siteAPGroup.setDescription('Objects defining the association of policies to sites.') siteWlanGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 11)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "siteWlanApRadioAssigned")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): siteWlanGroup = siteWlanGroup.setStatus('current') if mibBuilder.loadTexts: siteWlanGroup.setDescription('Objects defining the association of policies to sites.') apGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 12)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "apIndex"), ("HIPATH-WIRELESS-HWC-MIB", "apName"), ("HIPATH-WIRELESS-HWC-MIB", "apDesc"), ("HIPATH-WIRELESS-HWC-MIB", "apSerialNumber"), ("HIPATH-WIRELESS-HWC-MIB", "apPortifIndex"), ("HIPATH-WIRELESS-HWC-MIB", "apWiredIfIndex"), ("HIPATH-WIRELESS-HWC-MIB", "apSoftwareVersion"), ("HIPATH-WIRELESS-HWC-MIB", "apSpecific"), ("HIPATH-WIRELESS-HWC-MIB", "apBroadcastDisassociate"), ("HIPATH-WIRELESS-HWC-MIB", "apRowStatus"), ("HIPATH-WIRELESS-HWC-MIB", "apVlanID"), ("HIPATH-WIRELESS-HWC-MIB", "apIpAssignmentType"), ("HIPATH-WIRELESS-HWC-MIB", "apIfMAC"), ("HIPATH-WIRELESS-HWC-MIB", "apHwVersion"), ("HIPATH-WIRELESS-HWC-MIB", "apSwVersion"), ("HIPATH-WIRELESS-HWC-MIB", "apEnvironment"), ("HIPATH-WIRELESS-HWC-MIB", "apHome"), ("HIPATH-WIRELESS-HWC-MIB", "apRole"), ("HIPATH-WIRELESS-HWC-MIB", "apState"), ("HIPATH-WIRELESS-HWC-MIB", "apStatus"), ("HIPATH-WIRELESS-HWC-MIB", "apPollTimeout"), ("HIPATH-WIRELESS-HWC-MIB", "apPollInterval"), ("HIPATH-WIRELESS-HWC-MIB", "apTelnetAccess"), ("HIPATH-WIRELESS-HWC-MIB", "apMaintainClientSession"), ("HIPATH-WIRELESS-HWC-MIB", "apRestartServiceContAbsent"), ("HIPATH-WIRELESS-HWC-MIB", "apHostname"), ("HIPATH-WIRELESS-HWC-MIB", "apLocation"), ("HIPATH-WIRELESS-HWC-MIB", "apStaticMTUsize"), ("HIPATH-WIRELESS-HWC-MIB", "apSiteID"), ("HIPATH-WIRELESS-HWC-MIB", "apZone"), ("HIPATH-WIRELESS-HWC-MIB", "apLLDP"), ("HIPATH-WIRELESS-HWC-MIB", "apLEDMode"), ("HIPATH-WIRELESS-HWC-MIB", "apLocationbasedService"), ("HIPATH-WIRELESS-HWC-MIB", "apSecureTunnel"), ("HIPATH-WIRELESS-HWC-MIB", "apEncryptCntTraffic"), ("HIPATH-WIRELESS-HWC-MIB", "apIpAddress"), ("HIPATH-WIRELESS-HWC-MIB", "apMICErrorWarning"), ("HIPATH-WIRELESS-HWC-MIB", "apIPAddress"), ("HIPATH-WIRELESS-HWC-MIB", "apSecureDataTunnelType"), ("HIPATH-WIRELESS-HWC-MIB", "apIPMulticastAssembly"), ("HIPATH-WIRELESS-HWC-MIB", "apSSHConnection")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): apGroup = apGroup.setStatus('current') if mibBuilder.loadTexts: apGroup.setDescription('List of objects defining configuration attributes of an AP.') wlanGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 13)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "wlanID"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRowStatus"), ("HIPATH-WIRELESS-HWC-MIB", "wlanServiceType"), ("HIPATH-WIRELESS-HWC-MIB", "wlanName"), ("HIPATH-WIRELESS-HWC-MIB", "wlanSSID"), ("HIPATH-WIRELESS-HWC-MIB", "wlanSynchronize"), ("HIPATH-WIRELESS-HWC-MIB", "wlanEnabled"), ("HIPATH-WIRELESS-HWC-MIB", "wlanDefaultTopologyID"), ("HIPATH-WIRELESS-HWC-MIB", "wlanSessionTimeout"), ("HIPATH-WIRELESS-HWC-MIB", "wlanIdleTimeoutPreAuth"), ("HIPATH-WIRELESS-HWC-MIB", "wlanIdleSessionPostAuth"), ("HIPATH-WIRELESS-HWC-MIB", "wlanSupressSSID"), ("HIPATH-WIRELESS-HWC-MIB", "wlanDot11hSupport"), ("HIPATH-WIRELESS-HWC-MIB", "wlanDot11hClientPowerReduction"), ("HIPATH-WIRELESS-HWC-MIB", "wlanProcessClientIE"), ("HIPATH-WIRELESS-HWC-MIB", "wlanEngerySaveMode"), ("HIPATH-WIRELESS-HWC-MIB", "wlanBlockMuToMuTraffic"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRemoteable"), ("HIPATH-WIRELESS-HWC-MIB", "wlanVNSID"), ("HIPATH-WIRELESS-HWC-MIB", "wlanMaxEntries"), ("HIPATH-WIRELESS-HWC-MIB", "wlanRadioManagement11k"), ("HIPATH-WIRELESS-HWC-MIB", "wlanBeaconReport"), ("HIPATH-WIRELESS-HWC-MIB", "wlanQuietIE"), ("HIPATH-WIRELESS-HWC-MIB", "wlanMirrorN"), ("HIPATH-WIRELESS-HWC-MIB", "wlanNetFlow"), ("HIPATH-WIRELESS-HWC-MIB", "wlanAppVisibility"), ("HIPATH-WIRELESS-HWC-MIB", "wlanNumEntries"), ("HIPATH-WIRELESS-HWC-MIB", "wlanTableNextAvailableIndex")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): wlanGroup = wlanGroup.setStatus('current') if mibBuilder.loadTexts: wlanGroup.setDescription('List of objects defining configuration attributes of a WLAN.') wlanStatsGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 14)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "wlanStatsAssociatedClients"), ("HIPATH-WIRELESS-HWC-MIB", "wlanStatsRadiusTotRequests"), ("HIPATH-WIRELESS-HWC-MIB", "wlanStatsRadiusReqFailed"), ("HIPATH-WIRELESS-HWC-MIB", "wlanStatsRadiusReqRejected"), ("HIPATH-WIRELESS-HWC-MIB", "wlanStatsID")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): wlanStatsGroup = wlanStatsGroup.setStatus('current') if mibBuilder.loadTexts: wlanStatsGroup.setDescription('List of objects defining configuration attributes of a WLAN.') topologyGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 15)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "topologyName"), ("HIPATH-WIRELESS-HWC-MIB", "topologyMode"), ("HIPATH-WIRELESS-HWC-MIB", "topologyTagged"), ("HIPATH-WIRELESS-HWC-MIB", "topologyVlanID"), ("HIPATH-WIRELESS-HWC-MIB", "topologyEgressPort"), ("HIPATH-WIRELESS-HWC-MIB", "topologyLayer3"), ("HIPATH-WIRELESS-HWC-MIB", "topologyIPAddress"), ("HIPATH-WIRELESS-HWC-MIB", "topologyIPMask"), ("HIPATH-WIRELESS-HWC-MIB", "topologyMTUsize"), ("HIPATH-WIRELESS-HWC-MIB", "topologyGateway"), ("HIPATH-WIRELESS-HWC-MIB", "topologyDHCPUsage"), ("HIPATH-WIRELESS-HWC-MIB", "topologyAPRegistration"), ("HIPATH-WIRELESS-HWC-MIB", "topologyManagementTraffic"), ("HIPATH-WIRELESS-HWC-MIB", "topologySynchronize"), ("HIPATH-WIRELESS-HWC-MIB", "topologySyncGateway"), ("HIPATH-WIRELESS-HWC-MIB", "topologySyncMask"), ("HIPATH-WIRELESS-HWC-MIB", "topologySyncIPStart"), ("HIPATH-WIRELESS-HWC-MIB", "topologySyncIPEnd"), ("HIPATH-WIRELESS-HWC-MIB", "topologyStaticIPv6Address"), ("HIPATH-WIRELESS-HWC-MIB", "topologyLinkLocalIPv6Address"), ("HIPATH-WIRELESS-HWC-MIB", "topologyPreFixLength"), ("HIPATH-WIRELESS-HWC-MIB", "topologyIPv6Gateway"), ("HIPATH-WIRELESS-HWC-MIB", "topologyDynamicEgress"), ("HIPATH-WIRELESS-HWC-MIB", "topologyIsGroup"), ("HIPATH-WIRELESS-HWC-MIB", "topologyGroupMembers"), ("HIPATH-WIRELESS-HWC-MIB", "topologyMemberId")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): topologyGroup = topologyGroup.setStatus('current') if mibBuilder.loadTexts: topologyGroup.setDescription('List of objects defining configuration attributes of a WLAN.') topologyStatGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 16)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "topologyName"), ("HIPATH-WIRELESS-HWC-MIB", "topoStatName"), ("HIPATH-WIRELESS-HWC-MIB", "topoStatTxPkts"), ("HIPATH-WIRELESS-HWC-MIB", "topoStatRxPkts"), ("HIPATH-WIRELESS-HWC-MIB", "topoStatTxOctets"), ("HIPATH-WIRELESS-HWC-MIB", "topoStatRxOctets"), ("HIPATH-WIRELESS-HWC-MIB", "topoStatMulticastTxPkts"), ("HIPATH-WIRELESS-HWC-MIB", "topoStatMulticastRxPkts"), ("HIPATH-WIRELESS-HWC-MIB", "topoStatBroadcastTxPkts"), ("HIPATH-WIRELESS-HWC-MIB", "topoStatBroadcastRxPkts"), ("HIPATH-WIRELESS-HWC-MIB", "topoStatFrameChkSeqErrors"), ("HIPATH-WIRELESS-HWC-MIB", "topoStatFrameTooLongErrors"), ("HIPATH-WIRELESS-HWC-MIB", "topoWireStatName"), ("HIPATH-WIRELESS-HWC-MIB", "topoWireStatTxPkts"), ("HIPATH-WIRELESS-HWC-MIB", "topoWireStatRxPkts"), ("HIPATH-WIRELESS-HWC-MIB", "topoWireStatTxOctets"), ("HIPATH-WIRELESS-HWC-MIB", "topoWireStatRxOctets"), ("HIPATH-WIRELESS-HWC-MIB", "topoWireStatMulticastTxPkts"), ("HIPATH-WIRELESS-HWC-MIB", "topoWireStatMulticastRxPkts"), ("HIPATH-WIRELESS-HWC-MIB", "topoWireStatBroadcastTxPkts"), ("HIPATH-WIRELESS-HWC-MIB", "topoWireStatBroadcastRxPkts"), ("HIPATH-WIRELESS-HWC-MIB", "topoWireStatFrameChkSeqErrors"), ("HIPATH-WIRELESS-HWC-MIB", "topoWireStatFrameTooLongErrors"), ("HIPATH-WIRELESS-HWC-MIB", "topoCompleteStatName"), ("HIPATH-WIRELESS-HWC-MIB", "topoCompleteStatTxPkts"), ("HIPATH-WIRELESS-HWC-MIB", "topoCompleteStatRxPkts"), ("HIPATH-WIRELESS-HWC-MIB", "topoCompleteStatTxOctets"), ("HIPATH-WIRELESS-HWC-MIB", "topoCompleteStatRxOctets"), ("HIPATH-WIRELESS-HWC-MIB", "topoCompleteStatMulticastTxPkts"), ("HIPATH-WIRELESS-HWC-MIB", "topoCompleteStatMulticastRxPkts"), ("HIPATH-WIRELESS-HWC-MIB", "topoCompleteStatBroadcastTxPkts"), ("HIPATH-WIRELESS-HWC-MIB", "topoCompleteStatBroadcastRxPkts"), ("HIPATH-WIRELESS-HWC-MIB", "topoCompleteStatFrameChkSeqErrors"), ("HIPATH-WIRELESS-HWC-MIB", "topoCompleteStatFrameTooLongErrors")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): topologyStatGroup = topologyStatGroup.setStatus('current') if mibBuilder.loadTexts: topologyStatGroup.setDescription('List of objects for defining topology statics. ') loadGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 17)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "loadGroupID"), ("HIPATH-WIRELESS-HWC-MIB", "loadGroupName"), ("HIPATH-WIRELESS-HWC-MIB", "loadGroupType"), ("HIPATH-WIRELESS-HWC-MIB", "loadGroupBandPreference"), ("HIPATH-WIRELESS-HWC-MIB", "loadGroupClientCountRadio1"), ("HIPATH-WIRELESS-HWC-MIB", "loadGroupClientCountRadio2"), ("HIPATH-WIRELESS-HWC-MIB", "loadGroupLoadControlEnableR1"), ("HIPATH-WIRELESS-HWC-MIB", "loadGroupLoadControlEnableR2"), ("HIPATH-WIRELESS-HWC-MIB", "loadGroupLoadControlStrictLimitR1"), ("HIPATH-WIRELESS-HWC-MIB", "loadGroupLoadControlStrictLimitR2")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): loadGroup = loadGroup.setStatus('current') if mibBuilder.loadTexts: loadGroup.setDescription('A collection of objects providing Load Group creation and its attributes.') widsWipsObjectsGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 18)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "mitigatorAnalysisEngine"), ("HIPATH-WIRELESS-HWC-MIB", "activeThreatsCounts"), ("HIPATH-WIRELESS-HWC-MIB", "uncategorizedAPCounts"), ("HIPATH-WIRELESS-HWC-MIB", "friendlyAPCounts"), ("HIPATH-WIRELESS-HWC-MIB", "scanGroupMaxEntries"), ("HIPATH-WIRELESS-HWC-MIB", "scanGroupsCurrentEntries")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): widsWipsObjectsGroup = widsWipsObjectsGroup.setStatus('current') if mibBuilder.loadTexts: widsWipsObjectsGroup.setDescription('Objects defining the state of WIDS-WIPS for the controller.') widsWipsEngineGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 19)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "widsWipsEngineRowStatus"), ("HIPATH-WIRELESS-HWC-MIB", "widsWipsEngineControllerIPAddress"), ("HIPATH-WIRELESS-HWC-MIB", "widsWipsEnginePollInterval"), ("HIPATH-WIRELESS-HWC-MIB", "widsWipsEnginePollRetry")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): widsWipsEngineGroup = widsWipsEngineGroup.setStatus('current') if mibBuilder.loadTexts: widsWipsEngineGroup.setDescription('Set of objects defining attributes of a WIDS-WIPS engine.') outOfServiceScanGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 20)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "outOfSrvScanGrpName"), ("HIPATH-WIRELESS-HWC-MIB", "outOfSrvScanGrpRadio"), ("HIPATH-WIRELESS-HWC-MIB", "outOfSrvScanGrpChannelList"), ("HIPATH-WIRELESS-HWC-MIB", "outOfSrvScanGrpScanType"), ("HIPATH-WIRELESS-HWC-MIB", "outOfSrvScanGrpChannelDwellTime"), ("HIPATH-WIRELESS-HWC-MIB", "outOfSrvScanGrpScanTimeInterval"), ("HIPATH-WIRELESS-HWC-MIB", "outOfSrvScanGrpSecurityScan"), ("HIPATH-WIRELESS-HWC-MIB", "outOfSrvScanGrpScanActivity"), ("HIPATH-WIRELESS-HWC-MIB", "outOfSrvScanGrpScanRowStatus")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): outOfServiceScanGroup = outOfServiceScanGroup.setStatus('current') if mibBuilder.loadTexts: outOfServiceScanGroup.setDescription('List of objects for defining out-of-service scan group.') inServiceScanGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 21)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "inSrvScanGrpName"), ("HIPATH-WIRELESS-HWC-MIB", "inSrvScanGrpMaxConcurrentAttacksPerAP"), ("HIPATH-WIRELESS-HWC-MIB", "inSrvScanGrpCounterMeasuresType"), ("HIPATH-WIRELESS-HWC-MIB", "inSrvScanGrpScan2400MHzSelection"), ("HIPATH-WIRELESS-HWC-MIB", "inSrvScanGrpScan5GHzSelection"), ("HIPATH-WIRELESS-HWC-MIB", "inSrvScanGrpRowStatus"), ("HIPATH-WIRELESS-HWC-MIB", "inSrvScanGrpSecurityThreats"), ("HIPATH-WIRELESS-HWC-MIB", "inSrvScanGrpblockAdHocClientsPeriod"), ("HIPATH-WIRELESS-HWC-MIB", "inSrvScanGrpClassifySourceIF"), ("HIPATH-WIRELESS-HWC-MIB", "inSrvScanGrpDetectRogueAP"), ("HIPATH-WIRELESS-HWC-MIB", "inSrvScanGrpListeningPort")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): inServiceScanGroup = inServiceScanGroup.setStatus('current') if mibBuilder.loadTexts: inServiceScanGroup.setDescription('List of objects for defining in-service scan group.') scanGroupAPAssignmentGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 22)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "scanGroupAPAssignApSerial"), ("HIPATH-WIRELESS-HWC-MIB", "scanGroupAPAssignName"), ("HIPATH-WIRELESS-HWC-MIB", "scanGroupAPAssignRadio1"), ("HIPATH-WIRELESS-HWC-MIB", "scanGroupAPAssignRadio2"), ("HIPATH-WIRELESS-HWC-MIB", "scanGroupAPAssignInactiveAP"), ("HIPATH-WIRELESS-HWC-MIB", "scanGroupAPAssignAllowScanning"), ("HIPATH-WIRELESS-HWC-MIB", "scanGroupAPAssignGroupName"), ("HIPATH-WIRELESS-HWC-MIB", "scanGroupAPAssignAllowSpectrumAnalysis"), ("HIPATH-WIRELESS-HWC-MIB", "scanGroupAPAssignControllerIPAddress"), ("HIPATH-WIRELESS-HWC-MIB", "scanGroupAPAssignFordwardingService")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): scanGroupAPAssignmentGroup = scanGroupAPAssignmentGroup.setStatus('current') if mibBuilder.loadTexts: scanGroupAPAssignmentGroup.setDescription('List of objects for assignment of AP to scan group.') scanAPGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 23)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "scanAPSerialNumber"), ("HIPATH-WIRELESS-HWC-MIB", "scanAPControllerIPAddress"), ("HIPATH-WIRELESS-HWC-MIB", "scanAPRowStatus"), ("HIPATH-WIRELESS-HWC-MIB", "scanAPAcessPointName"), ("HIPATH-WIRELESS-HWC-MIB", "scanAPProfileName"), ("HIPATH-WIRELESS-HWC-MIB", "scanAPProfileType")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): scanAPGroup = scanAPGroup.setStatus('current') if mibBuilder.loadTexts: scanAPGroup.setDescription('List of objects for defining AP scan groups in EWC.') friendlyAPGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 24)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "friendlyAPMacAddress"), ("HIPATH-WIRELESS-HWC-MIB", "friendlyAPSSID"), ("HIPATH-WIRELESS-HWC-MIB", "friendlyAPDescription"), ("HIPATH-WIRELESS-HWC-MIB", "friendlyAPManufacturer")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): friendlyAPGroup = friendlyAPGroup.setStatus('current') if mibBuilder.loadTexts: friendlyAPGroup.setDescription('List of objects defining friendly APs identified during scanning time.') wlanSecurityReportGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 25)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "wlanSecurityReportFlag"), ("HIPATH-WIRELESS-HWC-MIB", "wlanSecurityReportUnsecureType"), ("HIPATH-WIRELESS-HWC-MIB", "wlanSecurityReportNotes"), ("HIPATH-WIRELESS-HWC-MIB", "wlanUnsecuredWlanCounts")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): wlanSecurityReportGroup = wlanSecurityReportGroup.setStatus('current') if mibBuilder.loadTexts: wlanSecurityReportGroup.setDescription('Set of objects defining attributes of security group report.') apAntennaGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 26)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "apAntennanName"), ("HIPATH-WIRELESS-HWC-MIB", "apAntennaType")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): apAntennaGroup = apAntennaGroup.setStatus('current') if mibBuilder.loadTexts: apAntennaGroup.setDescription('A collection of objects defining an antenna attributes for an AP.') muAccessListGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 27)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "muAccessListMACAddress"), ("HIPATH-WIRELESS-HWC-MIB", "muAccessListBitmaskLength"), ("HIPATH-WIRELESS-HWC-MIB", "muAccessListRowStatus")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): muAccessListGroup = muAccessListGroup.setStatus('current') if mibBuilder.loadTexts: muAccessListGroup.setDescription('List of objects for creation of MU access list to block MU access, case of black list, or allow access, case of white list to wireless controller resources.') activeThreatGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 28)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "activeThreatCategory"), ("HIPATH-WIRELESS-HWC-MIB", "activeThreatDeviceMAC"), ("HIPATH-WIRELESS-HWC-MIB", "activeThreatDateTime"), ("HIPATH-WIRELESS-HWC-MIB", "activeThreatCounterMeasure"), ("HIPATH-WIRELESS-HWC-MIB", "activeThreatAPName"), ("HIPATH-WIRELESS-HWC-MIB", "activeThreatRSS"), ("HIPATH-WIRELESS-HWC-MIB", "activeThreatExtraDetails"), ("HIPATH-WIRELESS-HWC-MIB", "activeThreatThreat")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): activeThreatGroup = activeThreatGroup.setStatus('current') if mibBuilder.loadTexts: activeThreatGroup.setDescription('List of objects defining a discovered security threat.') countermeasureAPGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 29)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "countermeasureAPName"), ("HIPATH-WIRELESS-HWC-MIB", "countermeasureAPThreatCategory"), ("HIPATH-WIRELESS-HWC-MIB", "countermeasureAPCountermeasure"), ("HIPATH-WIRELESS-HWC-MIB", "countermeasureAPTime"), ("HIPATH-WIRELESS-HWC-MIB", "countermeasureAPSerial")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): countermeasureAPGroup = countermeasureAPGroup.setStatus('current') if mibBuilder.loadTexts: countermeasureAPGroup.setDescription('List of objects defining APs taking part in countermeasure activities to thwart incoming threats.') blaclistedClientGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 30)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "blacklistedClientMAC"), ("HIPATH-WIRELESS-HWC-MIB", "blacklistedClientStatTime"), ("HIPATH-WIRELESS-HWC-MIB", "blacklistedClientEndTime"), ("HIPATH-WIRELESS-HWC-MIB", "blacklistedClientReason")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): blaclistedClientGroup = blaclistedClientGroup.setStatus('current') if mibBuilder.loadTexts: blaclistedClientGroup.setDescription('List of objects identifying blacklisted clients.') threatSummaryGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 31)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "threatSummaryCategory"), ("HIPATH-WIRELESS-HWC-MIB", "threatSummaryActiveThreat"), ("HIPATH-WIRELESS-HWC-MIB", "threatSummaryHistoricalCounts")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): threatSummaryGroup = threatSummaryGroup.setStatus('current') if mibBuilder.loadTexts: threatSummaryGroup.setDescription('List of objects defining attributes of known discovered threat.') licensingInformationGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 32)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "licenseRegulatoryDomain"), ("HIPATH-WIRELESS-HWC-MIB", "licenseType"), ("HIPATH-WIRELESS-HWC-MIB", "licenseDaysRemaining"), ("HIPATH-WIRELESS-HWC-MIB", "licenseAvailableAP"), ("HIPATH-WIRELESS-HWC-MIB", "licenseInServiceRadarAP"), ("HIPATH-WIRELESS-HWC-MIB", "licenseMode"), ("HIPATH-WIRELESS-HWC-MIB", "licenseLocalAP"), ("HIPATH-WIRELESS-HWC-MIB", "licenseForeignAP"), ("HIPATH-WIRELESS-HWC-MIB", "licenseLocalRadarAP"), ("HIPATH-WIRELESS-HWC-MIB", "licenseForeignRadarAP")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): licensingInformationGroup = licensingInformationGroup.setStatus('current') if mibBuilder.loadTexts: licensingInformationGroup.setDescription('List of objects providing licensing information for the controller system.') stationsByProtocolGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 33)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "stationsByProtocolA"), ("HIPATH-WIRELESS-HWC-MIB", "stationsByProtocolB"), ("HIPATH-WIRELESS-HWC-MIB", "stationsByProtocolG"), ("HIPATH-WIRELESS-HWC-MIB", "stationsByProtocolN24"), ("HIPATH-WIRELESS-HWC-MIB", "stationsByProtocolN5"), ("HIPATH-WIRELESS-HWC-MIB", "stationsByProtocolUnavailable"), ("HIPATH-WIRELESS-HWC-MIB", "stationsByProtocolError"), ("HIPATH-WIRELESS-HWC-MIB", "stationsByProtocolAC")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): stationsByProtocolGroup = stationsByProtocolGroup.setStatus('current') if mibBuilder.loadTexts: stationsByProtocolGroup.setDescription('List of objects for aggregated MUs on a specific wireless channel.') apByChannelGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 34)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "apByChannelAPs")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): apByChannelGroup = apByChannelGroup.setStatus('current') if mibBuilder.loadTexts: apByChannelGroup.setDescription('List of objects for aggregated access points on a wireless channel.') uncategorizedAPGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 35)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "uncategorizedAPDescption"), ("HIPATH-WIRELESS-HWC-MIB", "uncategorizedAPManufacturer"), ("HIPATH-WIRELESS-HWC-MIB", "uncategorizedAPClassify"), ("HIPATH-WIRELESS-HWC-MIB", "uncategorizedAPSSID")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): uncategorizedAPGroup = uncategorizedAPGroup.setStatus('current') if mibBuilder.loadTexts: uncategorizedAPGroup.setDescription('Objects defining uncategorized access points discovered by Radar application.') authorizedAPGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 36)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "authorizedAPDescription"), ("HIPATH-WIRELESS-HWC-MIB", "authorizedAPManufacturer"), ("HIPATH-WIRELESS-HWC-MIB", "authorizedAPClassify"), ("HIPATH-WIRELESS-HWC-MIB", "authorizedAPRowStatus")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): authorizedAPGroup = authorizedAPGroup.setStatus('current') if mibBuilder.loadTexts: authorizedAPGroup.setDescription('Objects defining authorized access points discovered by Radar application.') prohibitedAPGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 37)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "prohibitedAPCategory"), ("HIPATH-WIRELESS-HWC-MIB", "prohibitedAPDescription"), ("HIPATH-WIRELESS-HWC-MIB", "prohibitedAPManufacturer"), ("HIPATH-WIRELESS-HWC-MIB", "prohibitedAPClassify"), ("HIPATH-WIRELESS-HWC-MIB", "prohibitedAPRowStatus")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): prohibitedAPGroup = prohibitedAPGroup.setStatus('current') if mibBuilder.loadTexts: prohibitedAPGroup.setDescription('Objects defining prohibited access points discovered by Radar application.') dedicatedScanGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 38)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "dedicatedScanGrpName"), ("HIPATH-WIRELESS-HWC-MIB", "dedicatedScanGrpMaxConcurrentAttacksPerAP"), ("HIPATH-WIRELESS-HWC-MIB", "dedicatedScanGrpCounterMeasures"), ("HIPATH-WIRELESS-HWC-MIB", "dedicatedScanGrpScan2400MHzFreq"), ("HIPATH-WIRELESS-HWC-MIB", "dedicatedScanGrpScan5GHzFreq"), ("HIPATH-WIRELESS-HWC-MIB", "dedicatedScanGrpRowStatus"), ("HIPATH-WIRELESS-HWC-MIB", "dedicatedScanGrpSecurityThreats"), ("HIPATH-WIRELESS-HWC-MIB", "dedicatedScanGrpBlockAdHocPeriod"), ("HIPATH-WIRELESS-HWC-MIB", "dedicatedScanGrpClassifySourceIF"), ("HIPATH-WIRELESS-HWC-MIB", "dedicatedScanGrpDetectRogueAP"), ("HIPATH-WIRELESS-HWC-MIB", "dedicatedScanGrpListeningPort")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): dedicatedScanGroup = dedicatedScanGroup.setStatus('current') if mibBuilder.loadTexts: dedicatedScanGroup.setDescription('List of objects for defining dedicated scan group.') apRadioAntennaGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 39)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "apRadioAntennaType"), ("HIPATH-WIRELESS-HWC-MIB", "apRadioAntennaModel"), ("HIPATH-WIRELESS-HWC-MIB", "apRadioAttenuation")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): apRadioAntennaGroup = apRadioAntennaGroup.setStatus('current') if mibBuilder.loadTexts: apRadioAntennaGroup.setDescription('A collection of objects defining an antenna attributes for an AP.') radiusFastFailoverEventsGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 40)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "fastFailoverEvents")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): radiusFastFailoverEventsGroup = radiusFastFailoverEventsGroup.setStatus('current') if mibBuilder.loadTexts: radiusFastFailoverEventsGroup.setDescription('List of objects for defining radius FastFailoverEvents.') dhcpRelayListenersGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 41)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "dhcpRelayListenersRowStatus"), ("HIPATH-WIRELESS-HWC-MIB", "destinationName"), ("HIPATH-WIRELESS-HWC-MIB", "destinationIP"), ("HIPATH-WIRELESS-HWC-MIB", "dhcpRelayListenersMaxEntries"), ("HIPATH-WIRELESS-HWC-MIB", "dhcpRelayListenersNextIndex"), ("HIPATH-WIRELESS-HWC-MIB", "dhcpRelayListenersNumEntries")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): dhcpRelayListenersGroup = dhcpRelayListenersGroup.setStatus('current') if mibBuilder.loadTexts: dhcpRelayListenersGroup.setDescription('List of objects for defining dhcpRelayListeners.') authenticationAdvancedGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 42)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "includeServiceType"), ("HIPATH-WIRELESS-HWC-MIB", "clientMessageDelayTime"), ("HIPATH-WIRELESS-HWC-MIB", "radiusAccounting"), ("HIPATH-WIRELESS-HWC-MIB", "serverUsageModel"), ("HIPATH-WIRELESS-HWC-MIB", "radacctStartOnIPAddr"), ("HIPATH-WIRELESS-HWC-MIB", "clientServiceTypeLogin"), ("HIPATH-WIRELESS-HWC-MIB", "applyMacAddressFormat")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): authenticationAdvancedGroup = authenticationAdvancedGroup.setStatus('current') if mibBuilder.loadTexts: authenticationAdvancedGroup.setDescription('List of objects for defining authenticationAdvanced.') radiusExtnsSettingGroup = ObjectGroup((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 43)).setObjects(("HIPATH-WIRELESS-HWC-MIB", "pollingMechanism"), ("HIPATH-WIRELESS-HWC-MIB", "serverPollingInterval")) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): radiusExtnsSettingGroup = radiusExtnsSettingGroup.setStatus('current') if mibBuilder.loadTexts: radiusExtnsSettingGroup.setDescription('List of objects for defining radiusExtnsSetting.') mibBuilder.exportSymbols("HIPATH-WIRELESS-HWC-MIB", loadGroupName=loadGroupName, stationMacAddress=stationMacAddress, licensingInformation=licensingInformation, dhcpRelayListenersTable=dhcpRelayListenersTable, apPerfWlanCurPeakClientsPerSec=apPerfWlanCurPeakClientsPerSec, apTotalStationsBInOctets=apTotalStationsBInOctets, vnsAPFilterRuleDirection=vnsAPFilterRuleDirection, wlanSSID=wlanSSID, topoExceptionStatPktsAllowed=topoExceptionStatPktsAllowed, apLogManagement=apLogManagement, apPerfRadioPrevPeakSNR=apPerfRadioPrevPeakSNR, apLogSelectedAPsEntry=apLogSelectedAPsEntry, siteStrictLimitEnableR1=siteStrictLimitEnableR1, topoStatName=topoStatName, licenseForeignRadarAP=licenseForeignRadarAP, topologyGroupMembers=topologyGroupMembers, wlanRadiusServerAcctSIAR=wlanRadiusServerAcctSIAR, apIPAddress=apIPAddress, phyDHCPRangeEnd=phyDHCPRangeEnd, apPollInterval=apPollInterval, vnsSLPEnabled=vnsSLPEnabled, scanGroupAPAssignAllowScanning=scanGroupAPAssignAllowScanning, apPerfWlanCurrentClientsPerSec=apPerfWlanCurrentClientsPerSec, vns3rdPartyAPTable=vns3rdPartyAPTable, apChannelUtilizationEntry=apChannelUtilizationEntry, wlanPrivWEPKeyLength=wlanPrivWEPKeyLength, wlanRadiusServerMacUseVNSName=wlanRadiusServerMacUseVNSName, loadGroupID=loadGroupID, cpConnectionIP=cpConnectionIP, dedicatedScanGrpSecurityThreats=dedicatedScanGrpSecurityThreats, tertiaryDNS=tertiaryDNS, topoCompleteStatName=topoCompleteStatName, vnsAPFilterPortLow=vnsAPFilterPortLow, loadGroupLoadControlEnableR1=loadGroupLoadControlEnableR1, siteLocalRadiusAuthentication=siteLocalRadiusAuthentication, wlanRadiusServerEntry=wlanRadiusServerEntry, dedicatedScanGroup=dedicatedScanGroup, vnsStatBroadcastTxPkts=vnsStatBroadcastTxPkts, topologyPreFixLength=topologyPreFixLength, mitigatorAnalysisEngine=mitigatorAnalysisEngine, wlanCPExtTosOverride=wlanCPExtTosOverride, vnsDLSPort=vnsDLSPort, stationIPAddress=stationIPAddress, vnsMgmtTrafficEnable=vnsMgmtTrafficEnable, tspecAC=tspecAC, apNotifications=apNotifications, vnsQoSWirelessULPolicerAction=vnsQoSWirelessULPolicerAction, apTotalStationsB=apTotalStationsB, wlanAuthRadiusAcctAfterMacBaseAuthorization=wlanAuthRadiusAcctAfterMacBaseAuthorization, apEventAPSerialNumber=apEventAPSerialNumber, vnsDHCPRangeEnd=vnsDHCPRangeEnd, vnsStatMulticastTxPkts=vnsStatMulticastTxPkts, loadGroupLoadControlEnableR2=loadGroupLoadControlEnableR2, muAPSerialNo=muAPSerialNo, topoStatTxOctets=topoStatTxOctets, activeThreatGroup=activeThreatGroup, wlanRadiusIndex=wlanRadiusIndex, apInNUcastPkts=apInNUcastPkts, phyDHCPRangeEntry=phyDHCPRangeEntry, cpType=cpType, netflowDestinationIP=netflowDestinationIP, apRadioAntennaTable=apRadioAntennaTable, wlanUnsecuredWlanCounts=wlanUnsecuredWlanCounts, muAccessListMACAddress=muAccessListMACAddress, topoStatBroadcastRxPkts=topoStatBroadcastRxPkts, activeThreatCategory=activeThreatCategory, wlanRadiusServerAcctUseVNSIPAddr=wlanRadiusServerAcctUseVNSIPAddr, loadGroupLoadControl=loadGroupLoadControl, dedicatedScanGrpScan5GHzFreq=dedicatedScanGrpScan5GHzFreq, loadGroupLoadControlStrictLimitR1=loadGroupLoadControlStrictLimitR1, muACLRowStatus=muACLRowStatus, dedicatedScanGrpClassifySourceIF=dedicatedScanGrpClassifySourceIF, tspecUlViolations=tspecUlViolations, dedicatedScanGroupEntry=dedicatedScanGroupEntry, stationsByProtocolN5=stationsByProtocolN5, PYSNMP_MODULE_ID=hiPathWirelessControllerMib, physicalPortsInternalVlanID=physicalPortsInternalVlanID, vnsRateControlCBS=vnsRateControlCBS, wlanStatsRadiusReqFailed=wlanStatsRadiusReqFailed, recurrenceDaily=recurrenceDaily, apAccPrevPeakReassocReqRx=apAccPrevPeakReassocReqRx, vnsStatsObjects=vnsStatsObjects, portDuplexMode=portDuplexMode, siteStrictLimitEnableR2=siteStrictLimitEnableR2, vnsWDSStatTxRate=vnsWDSStatTxRate, licenseDaysRemaining=licenseDaysRemaining, wlanPrivKeyManagement=wlanPrivKeyManagement, wlanAuthRadiusIncludeIngressRC=wlanAuthRadiusIncludeIngressRC, HundredthOfGauge64=HundredthOfGauge64, vnsStatTable=vnsStatTable, maxVideoBWforAssociation=maxVideoBWforAssociation, apPerfRadioAverageChannelUtilization=apPerfRadioAverageChannelUtilization, stationsByProtocolB=stationsByProtocolB, apMaintenanceCycle=apMaintenanceCycle, vnsFilterRuleIPAddress=vnsFilterRuleIPAddress, vnsWDSStatSSID=vnsWDSStatSSID, vnsWDSRFEntry=vnsWDSRFEntry, apPlatforms=apPlatforms, sysCPUType=sysCPUType, authorizedAPTable=authorizedAPTable, apRegSecurityMode=apRegSecurityMode, HundredthOfGauge32=HundredthOfGauge32, activeThreatIndex=activeThreatIndex, vnsQoSEntry=vnsQoSEntry, authenticationAdvanced=authenticationAdvanced, dhcpRelayListenersNextIndex=dhcpRelayListenersNextIndex, vnsAuthModel=vnsAuthModel, cpLoginLabel=cpLoginLabel, siteTable=siteTable, apCredentialType=apCredentialType, topologyMemberId=topologyMemberId, siteRowStatus=siteRowStatus, muGroup=muGroup, portDHCPDefaultLease=portDHCPDefaultLease, outOfSrvScanGrpChannelList=outOfSrvScanGrpChannelList, wlanCPReplaceIPwithFQDN=wlanCPReplaceIPwithFQDN, wlanRadiusName=wlanRadiusName, topologyVlanID=topologyVlanID, topoStatBroadcastTxPkts=topoStatBroadcastTxPkts, muPolicyName=muPolicyName, siteCoSMember=siteCoSMember, sysLogServerPort=sysLogServerPort, wlanRadiusPort=wlanRadiusPort, apWiredIfIndex=apWiredIfIndex, vnsFilterRuleStatus=vnsFilterRuleStatus, stationRoamedAPName=stationRoamedAPName, apGroup=apGroup, wlanCPIntLogoffButton=wlanCPIntLogoffButton, tspecNMS=tspecNMS, apRadioNumber=apRadioNumber, apPerfWlanDLPkts=apPerfWlanDLPkts, licenseForeignAP=licenseForeignAP, siteEnableSecureTunnel=siteEnableSecureTunnel, radiusExtnsSettingGroup=radiusExtnsSettingGroup, inSrvScanGrpDetectRogueAP=inSrvScanGrpDetectRogueAP, wlanNetFlow=wlanNetFlow, muACLType=muACLType, vnsFilterRuleEntry=vnsFilterRuleEntry, dasPort=dasPort, apAccDisassocDeauthReqRx=apAccDisassocDeauthReqRx, apAccAverageDisassocDeauthReqTx=apAccAverageDisassocDeauthReqTx, vnsExceptionStatTable=vnsExceptionStatTable, apStatsObjects=apStatsObjects, scanAPEntry=scanAPEntry, dhcpRelayListenersGroup=dhcpRelayListenersGroup, muDefaultCoS=muDefaultCoS, topologyTable=topologyTable, licenseLocalRadarAP=licenseLocalRadarAP, mobileUnitCount=mobileUnitCount, scanGroupAPAssignFordwardingService=scanGroupAPAssignFordwardingService, friendlyAPGroup=friendlyAPGroup, inSrvScanGrpSecurityThreats=inSrvScanGrpSecurityThreats, radiusInfo=radiusInfo, apTotalStationsN24=apTotalStationsN24, inServiceScanGroupTable=inServiceScanGroupTable, hiPathWirelessAppLogFacility=hiPathWirelessAppLogFacility, wlanSecurityReportTable=wlanSecurityReportTable, cpHeaderURL=cpHeaderURL, imagePath36xx=imagePath36xx, wlanCPExtEnableHttps=wlanCPExtEnableHttps, vnsFilterIDTable=vnsFilterIDTable, muConnectionCapability=muConnectionCapability, widsWipsEngineGroup=widsWipsEngineGroup, wlanAuthType=wlanAuthType, wlanRadiusNASUseVnsIP=wlanRadiusNASUseVnsIP, apAccPrevPeakAssocReqRx=apAccPrevPeakAssocReqRx, apLogFrequency=apLogFrequency, dhcpRelayListenersEntry=dhcpRelayListenersEntry, stationsByProtocolUnavailable=stationsByProtocolUnavailable, topoStatRxPkts=topoStatRxPkts, siteNumEntries=siteNumEntries, radioVNSTable=radioVNSTable, vnsWDSRFBackupParent=vnsWDSRFBackupParent, apInvalidPolicyCount=apInvalidPolicyCount, sysLogServerEnabled=sysLogServerEnabled, destinationName=destinationName, destinationIP=destinationIP, wlanProcessClientIE=wlanProcessClientIE, apTelnetAccess=apTelnetAccess, apUpTime=apUpTime, muConnectionProtocol=muConnectionProtocol, topoWireStatRxPkts=topoWireStatRxPkts, apLogFileCopyRowStatus=apLogFileCopyRowStatus, topoCompleteStatFrameChkSeqErrors=topoCompleteStatFrameChkSeqErrors, vnsWDSStatRxError=vnsWDSStatRxError, apLogUserId=apLogUserId, topologyIPMask=topologyIPMask, vnsRadiusServerNasAddress=vnsRadiusServerNasAddress, vnsFilterID=vnsFilterID, apPerfRadioCurPeakPktRetx=apPerfRadioCurPeakPktRetx, topologyIPAddress=topologyIPAddress, apLogFileCopyTable=apLogFileCopyTable, apAccCurPeakAssocReqRx=apAccCurPeakAssocReqRx, apStaticMTUsize=apStaticMTUsize, apPerformanceReportByRadioTable=apPerformanceReportByRadioTable, topoStatTable=topoStatTable, apLogFileCopyServerIP=apLogFileCopyServerIP, apHwVersion=apHwVersion, apRegTelnetPassword=apRegTelnetPassword, inSrvScanGrpblockAdHocClientsPeriod=inSrvScanGrpblockAdHocClientsPeriod, topoCompleteStatFrameTooLongErrors=topoCompleteStatFrameTooLongErrors, apPerfWlanULOctets=apPerfWlanULOctets, assocDuration=assocDuration, assocTxOctets=assocTxOctets, wlanCPSelectionOption=wlanCPSelectionOption, prohibitedAPMAC=prohibitedAPMAC, tspecBssMac=tspecBssMac, tspecMuIPAddress=tspecMuIPAddress, apRadioTable=apRadioTable, apByChannelTable=apByChannelTable, nearbyApIndex=nearbyApIndex, tunnelStatsTxBytes=tunnelStatsTxBytes, dedicatedScanGrpRowStatus=dedicatedScanGrpRowStatus, apOutDiscards=apOutDiscards, friendlyAPDescription=friendlyAPDescription, phyDHCPRangeStatus=phyDHCPRangeStatus, apFastFailoverEnable=apFastFailoverEnable, ntpObjects=ntpObjects, cpMessage=cpMessage, portIpAddress=portIpAddress, physicalPortsTable=physicalPortsTable, apTotalStationsACOutOctets=apTotalStationsACOutOctets, apAntennaGroup=apAntennaGroup, topoStatRxOctets=topoStatRxOctets, dasInfo=dasInfo, wlanCPIntStatusCheckButton=wlanCPIntStatusCheckButton, dedicatedScanGrpDetectRogueAP=dedicatedScanGrpDetectRogueAP, siteBandPreferenceEnable=siteBandPreferenceEnable, controllerStats=controllerStats, vnsQoSTable=vnsQoSTable, sitePolicyID=sitePolicyID, logEventComponent=logEventComponent, sysSoftwareVersion=sysSoftwareVersion, layerTwoPortEntry=layerTwoPortEntry, wlanSecurityReportFlag=wlanSecurityReportFlag, vnsCount=vnsCount, radiusId=radiusId, outOfSrvScanGrpSecurityScan=outOfSrvScanGrpSecurityScan, ntpTimeServer3=ntpTimeServer3, apAccPrevPeakDisassocDeauthReqRx=apAccPrevPeakDisassocDeauthReqRx, wlanAuthEntry=wlanAuthEntry, apLogFileCopyPassword=apLogFileCopyPassword, apRadioStatusEntry=apRadioStatusEntry, apPerfWlanCurPeakDLPktsPerSec=apPerfWlanCurPeakDLPktsPerSec, wlanAuthRadiusIncludeTopology=wlanAuthRadiusIncludeTopology, apRegUseClusterEncryption=apRegUseClusterEncryption, loadGroupType=loadGroupType, dhcpRelayListenersRowStatus=dhcpRelayListenersRowStatus, apInOctets=apInOctets, muTable=muTable, wlanPrivTable=wlanPrivTable, muTxOctets=muTxOctets, phyDHCPRangeType=phyDHCPRangeType, radiusFastFailoverEventsEntry=radiusFastFailoverEventsEntry) mibBuilder.exportSymbols("HIPATH-WIRELESS-HWC-MIB", layerTwoPortTable=layerTwoPortTable, topologyLinkLocalIPv6Address=topologyLinkLocalIPv6Address, widsWipsEngineEntry=widsWipsEngineEntry, topologyEntry=topologyEntry, includeAllServiceMessages=includeAllServiceMessages, apByChannelNumber=apByChannelNumber, prohibitedAPCategory=prohibitedAPCategory, muAPName=muAPName, apRadioAntennaGroup=apRadioAntennaGroup, inSrvScanGrpScan5GHzSelection=inSrvScanGrpScan5GHzSelection, sites=sites, ntpTimezone=ntpTimezone, tspecSBA=tspecSBA, siteMaxEntries=siteMaxEntries, cpSharedSecret=cpSharedSecret, wlanAuthRadiusTimeoutRole=wlanAuthRadiusTimeoutRole, stationsByProtocolN24=stationsByProtocolN24, topoWireStatFrameTooLongErrors=topoWireStatFrameTooLongErrors, topologyStatGroup=topologyStatGroup, phyDHCPRangeStart=phyDHCPRangeStart, dasReplayInterval=dasReplayInterval, topoExceptionStatPktsDenied=topoExceptionStatPktsDenied, vnsDescription=vnsDescription, activeThreatsCounts=activeThreatsCounts, stationEventType=stationEventType, wlanPrivWPAversion=wlanPrivWPAversion, hwcAvailabilityRank=hwcAvailabilityRank, vnForeignClients=vnForeignClients, vnsRadiusServerTimeout=vnsRadiusServerTimeout, apSSHConnection=apSSHConnection, vnsPrivacyTable=vnsPrivacyTable, apByChannelGroup=apByChannelGroup, wlanAuthRadiusOperatorNameSpace=wlanAuthRadiusOperatorNameSpace, vnsPrivWEPKeyType=vnsPrivWEPKeyType, vnsRadiusServerEntry=vnsRadiusServerEntry, apMacAddress=apMacAddress, apIpAddress=apIpAddress, vnsPrivDynamicRekeyFrequency=vnsPrivDynamicRekeyFrequency, topoCompleteStatBroadcastRxPkts=topoCompleteStatBroadcastRxPkts, vnsDHCPRangeEntry=vnsDHCPRangeEntry, accessRejectMsgEntry=accessRejectMsgEntry, apRegistration=apRegistration, countermeasureAPThreatIndex=countermeasureAPThreatIndex, apInErrors=apInErrors, wlanVNSID=wlanVNSID, wlanRadiusServerAuthAuthType=wlanRadiusServerAuthAuthType, stationBSSID=stationBSSID, dedicatedScanGrpBlockAdHocPeriod=dedicatedScanGrpBlockAdHocPeriod, wlanIdleTimeoutPreAuth=wlanIdleTimeoutPreAuth, vnsQoSWirelessEnableUAPSD=vnsQoSWirelessEnableUAPSD, wlanStatsID=wlanStatsID, vnsStatus=vnsStatus, wlanRadiusServerAuthUseVNSName=wlanRadiusServerAuthUseVNSName, muACLTable=muACLTable, vnsAPFilterTable=vnsAPFilterTable, topoWireStatMulticastRxPkts=topoWireStatMulticastRxPkts, inServiceScanGroupEntry=inServiceScanGroupEntry, wlanSynchronize=wlanSynchronize, apRowStatus=apRowStatus, wlanAuthRadiusIncludeAP=wlanAuthRadiusIncludeAP, sensorManagement=sensorManagement, vnsExceptionFiterName=vnsExceptionFiterName, portMgmtTrafficEnable=portMgmtTrafficEnable, ntpTimeServer1=ntpTimeServer1, vnsPrivUseSharedKey=vnsPrivUseSharedKey, wlanIdleSessionPostAuth=wlanIdleSessionPostAuth, vnsQoSWirelessUseAdmControlVoice=vnsQoSWirelessUseAdmControlVoice, physicalFlash=physicalFlash, vnsProcessClientIEReq=vnsProcessClientIEReq, apRadioAttenuation=apRadioAttenuation, countermeasureAPThreatCategory=countermeasureAPThreatCategory, stationIPv6Address2=stationIPv6Address2, wlanAuthRadiusIncludePolicy=wlanAuthRadiusIncludePolicy, dedicatedScanGroupTable=dedicatedScanGroupTable, siteWlanGroup=siteWlanGroup, mgmtPortObjects=mgmtPortObjects, apState=apState, apAccAssocReqRx=apAccAssocReqRx, virtualNetworks=virtualNetworks, apAccDisassocDeauthReqTx=apAccDisassocDeauthReqTx, wlanPrivWEPKeyIndex=wlanPrivWEPKeyIndex, apAccCurPeakDisassocDeauthReqTx=apAccCurPeakDisassocDeauthReqTx, armCount=armCount, tspecMuMACAddress=tspecMuMACAddress, wlanPrivEntry=wlanPrivEntry, loadGroup=loadGroup, apCount=apCount, wlanSecurityReportNotes=wlanSecurityReportNotes, apRadioAntennaModel=apRadioAntennaModel, uncategorizedAPDescption=uncategorizedAPDescption, vnsStatRadiusTotRequests=vnsStatRadiusTotRequests, authorizedAPGroup=authorizedAPGroup, siteMaxClientR1=siteMaxClientR1, topoExceptionFiterName=topoExceptionFiterName, tspecDirection=tspecDirection, logEventSeverity=logEventSeverity, loadGrpWlanEntry=loadGrpWlanEntry, stationDetailEvent=stationDetailEvent, maxVoiceBWforAssociation=maxVoiceBWforAssociation, wlanTableNextAvailableIndex=wlanTableNextAvailableIndex, apOutErrors=apOutErrors, muACLGroup=muACLGroup, wlanRadiusServerAuthUseVNSIPAddr=wlanRadiusServerAuthUseVNSIPAddr, topoCompleteStatTxOctets=topoCompleteStatTxOctets, portDHCPEnable=portDHCPEnable, vnsAPFilterEntry=vnsAPFilterEntry, apIfMAC=apIfMAC, vnsAssignmentMode=vnsAssignmentMode, vnsDLSAddress=vnsDLSAddress, vnsRadiusServerSharedSecret=vnsRadiusServerSharedSecret, apCertificateExpiry=apCertificateExpiry, jumboFrames=jumboFrames, vnsFilterRuleDirection=vnsFilterRuleDirection, vnsAPFilterRowStatus=vnsAPFilterRowStatus, vnManagerObjects=vnManagerObjects, weakCipherEnable=weakCipherEnable, radiusStrictMode=radiusStrictMode, wlanCPRedirectURL=wlanCPRedirectURL, assocStartSysUpTime=assocStartSysUpTime, scanGroupAPAssignAllowSpectrumAnalysis=scanGroupAPAssignAllowSpectrumAnalysis, scanAPRowStatus=scanAPRowStatus, siteAPEntry=siteAPEntry, externalRadiusServerName=externalRadiusServerName, apChnlUtilCurrentUtilization=apChnlUtilCurrentUtilization, portVlanID=portVlanID, vnsDHCPRangeStatus=vnsDHCPRangeStatus, cpPasswordLabel=cpPasswordLabel, cpReplaceGatewayWithFQDN=cpReplaceGatewayWithFQDN, apAccCurPeakReassocReqRx=apAccCurPeakReassocReqRx, assocMUMacAddress=assocMUMacAddress, authorizedAPMAC=authorizedAPMAC, apLogPassword=apLogPassword, wlanEntry=wlanEntry, dedicatedScanGrpMaxConcurrentAttacksPerAP=dedicatedScanGrpMaxConcurrentAttacksPerAP, wlanAuthRadiusOperatorName=wlanAuthRadiusOperatorName, externalRadiusServerSharedSecret=externalRadiusServerSharedSecret, vnsSessionAvailabilityEnable=vnsSessionAvailabilityEnable, apAntennaEntry=apAntennaEntry, sysLogServerIP=sysLogServerIP, wlanSecurityReportUnsecureType=wlanSecurityReportUnsecureType, apName=apName, apPortifIndex=apPortifIndex, sitePolicyGroup=sitePolicyGroup, licenseInServiceRadarAP=licenseInServiceRadarAP, apBroadcastDisassociate=apBroadcastDisassociate, vnsWDSRFAPName=vnsWDSRFAPName, cpFooterURL=cpFooterURL, wlanStatsAssociatedClients=wlanStatsAssociatedClients, hiPathWirelessHWCModule=hiPathWirelessHWCModule, muWLANID=muWLANID, vnsConfigEntry=vnsConfigEntry, apAntennanName=apAntennanName, recurrenceWeekly=recurrenceWeekly, scanGroupAPAssignmentEntry=scanGroupAPAssignmentEntry, phyDHCPRangeIndex=phyDHCPRangeIndex, armReplyMessage=armReplyMessage, vnsStatRxPkts=vnsStatRxPkts, apAccPrevPeakDisassocDeauthReqTx=apAccPrevPeakDisassocDeauthReqTx, apPerfRadioAverageSNR=apPerfRadioAverageSNR, mirrorL2Ports=mirrorL2Ports, vnsFilterRuleOrder=vnsFilterRuleOrder, vnsPrivWPA1Enabled=vnsPrivWPA1Enabled, apPerfRadioPrevPeakRSS=apPerfRadioPrevPeakRSS, tunnelEndHWC=tunnelEndHWC, wlanRadiusEntry=wlanRadiusEntry, vnsWDSStatRxFrame=vnsWDSStatRxFrame, logNotifications=logNotifications, apSecureTunnel=apSecureTunnel, activeThreatAPName=activeThreatAPName, threatSummaryActiveThreat=threatSummaryActiveThreat, vnsInterfaceName=vnsInterfaceName, vnsWDSRFTable=vnsWDSRFTable, siteCoSID=siteCoSID, vnsWDSRFbgService=vnsWDSRFbgService, siteCosTable=siteCosTable, nearbyApRSS=nearbyApRSS, wlanPrivWEPKey=wlanPrivWEPKey, licenseMode=licenseMode, licenseRegulatoryDomain=licenseRegulatoryDomain, wlanPrivPrivacyType=wlanPrivPrivacyType, apEventDescription=apEventDescription, stationsByProtocolGroup=stationsByProtocolGroup, wlanPrivRekeyInterval=wlanPrivRekeyInterval, licenseLocalAP=licenseLocalAP, maxVideoBWforReassociation=maxVideoBWforReassociation, radiusExtnsSettingTable=radiusExtnsSettingTable, wlanCPSendLoginTo=wlanCPSendLoginTo, vnsRateControlProfEntry=vnsRateControlProfEntry, apChnlUtilCurPeakUtilization=apChnlUtilCurPeakUtilization, apPerfRadioAveragePktRetx=apPerfRadioAveragePktRetx, serviceLogFacility=serviceLogFacility, hiPathWirelessControllerMib=hiPathWirelessControllerMib, vnsWDSStatRxRate=vnsWDSStatRxRate, topologyGateway=topologyGateway, apSSHAccess=apSSHAccess, prohibitedAPClassify=prohibitedAPClassify, loadGrpRadiosEntry=loadGrpRadiosEntry, loadGroupLoadControlStrictLimitR2=loadGroupLoadControlStrictLimitR2, phyDHCPRangeGroup=phyDHCPRangeGroup, vnsGlobalSetting=vnsGlobalSetting, wlanAuthAutoAuthAuthorizedUser=wlanAuthAutoAuthAuthorizedUser, siteEncryptCommBetweenAPs=siteEncryptCommBetweenAPs, apPerfRadioCurPeakSNR=apPerfRadioCurPeakSNR, assocRxPackets=assocRxPackets, widsWipsEnginePollRetry=widsWipsEnginePollRetry, vnsRadiusServerPort=vnsRadiusServerPort, apNeighboursEntry=apNeighboursEntry, muMACAddress=muMACAddress, wlanPrivfastTransition=wlanPrivfastTransition, apDesc=apDesc, channel=channel, wlanRadiusTable=wlanRadiusTable, apOutOctets=apOutOctets, vnsPrivWEPKeyLength=vnsPrivWEPKeyLength, apPerfRadioAverageRSS=apPerfRadioAverageRSS, siteWlanApRadioAssigned=siteWlanApRadioAssigned, wlanRadiusServerUsage=wlanRadiusServerUsage, muTxPackets=muTxPackets, topoWireStatFrameChkSeqErrors=topoWireStatFrameChkSeqErrors, siteCosEntry=siteCosEntry, apTunnelAlarm=apTunnelAlarm, vnsParentIfIndex=vnsParentIfIndex, tspecSsid=tspecSsid, wlanRadiusServerAuthNASId=wlanRadiusServerAuthNASId, wlanRowStatus=wlanRowStatus, wlanRadiusServerMacNASIP=wlanRadiusServerMacNASIP, wlanRadiusNASIDUseVNSName=wlanRadiusNASIDUseVNSName, nearbyApChannel=nearbyApChannel, wlanAuthRadiusIncludeEgressRC=wlanAuthRadiusIncludeEgressRC, apByChannelEntry=apByChannelEntry, vnsMgmIpAddress=vnsMgmIpAddress, vnsDHCPRangeStart=vnsDHCPRangeStart, apChannelUtilizationTable=apChannelUtilizationTable, vnTotalClients=vnTotalClients, wlanDot11hSupport=wlanDot11hSupport, apInterfaceMTU=apInterfaceMTU, hiPathWirelessLogAlarm=hiPathWirelessLogAlarm, apRadioType=apRadioType, dedicatedScanGrpListeningPort=dedicatedScanGrpListeningPort, wlanStatsTable=wlanStatsTable, vnsFilterRulePortHigh=vnsFilterRulePortHigh, vnsQoSWirelessLegacyFlag=vnsQoSWirelessLegacyFlag, wlanRadiusRetries=wlanRadiusRetries, topologySyncMask=topologySyncMask, apStatsTable=apStatsTable, outOfSrvScanGrpScanType=outOfSrvScanGrpScanType, muACLEntry=muACLEntry, imageVersionOfngap36xx=imageVersionOfngap36xx, siteDefaultDNSServer=siteDefaultDNSServer, tftpSever=tftpSever, startHour=startHour, sitePolicyTable=sitePolicyTable, wlanSupressSSID=wlanSupressSSID, topologySyncIPStart=topologySyncIPStart) mibBuilder.exportSymbols("HIPATH-WIRELESS-HWC-MIB", topologyIsGroup=topologyIsGroup, associations=associations, blacklistedClientMAC=blacklistedClientMAC, vnIfIndex=vnIfIndex, tunnelCount=tunnelCount, vnsUseDHCPRelay=vnsUseDHCPRelay, scanAPGroup=scanAPGroup, apMICErrorWarning=apMICErrorWarning, topologyStat=topologyStat, loadGroupTable=loadGroupTable, apTotalStationsA=apTotalStationsA, vnsRateControlProfInd=vnsRateControlProfInd, widsWipsEngineControllerIPAddress=widsWipsEngineControllerIPAddress, vnsQoSWirelessUseAdmControlBackground=vnsQoSWirelessUseAdmControlBackground, topoWireStatBroadcastRxPkts=topoWireStatBroadcastRxPkts, imageVersionOfap26xx=imageVersionOfap26xx, vnsWDSStatAPRadio=vnsWDSStatAPRadio, topoCompleteStatTxPkts=topoCompleteStatTxPkts, apRadioAntennaEntry=apRadioAntennaEntry, muAccessListBitmaskLength=muAccessListBitmaskLength, scanGroupsCurrentEntries=scanGroupsCurrentEntries, outOfSrvScanGrpScanRowStatus=outOfSrvScanGrpScanRowStatus, wlanAppVisibility=wlanAppVisibility, apTotalStationsBOutOctets=apTotalStationsBOutOctets, tspecProtocol=tspecProtocol, muACLMACAddress=muACLMACAddress, topoWireStatName=topoWireStatName, activeThreatDateTime=activeThreatDateTime, vnsWEPKeyValue=vnsWEPKeyValue, applyMacAddressFormat=applyMacAddressFormat, wlanCP802HttpRedirect=wlanCP802HttpRedirect, topoStatTxPkts=topoStatTxPkts, apRegDiscoveryInterval=apRegDiscoveryInterval, wlanStatsEntry=wlanStatsEntry, countermeasureAPTime=countermeasureAPTime, apRadioStatusChannel=apRadioStatusChannel, radiusMacAddressFormatOption=radiusMacAddressFormatOption, topoWireStatMulticastTxPkts=topoWireStatMulticastTxPkts, hiPathWirelessHWCObsolete=hiPathWirelessHWCObsolete, authorizedAPRowStatus=authorizedAPRowStatus, apPerfWlanPrevPeakULOctetsPerSec=apPerfWlanPrevPeakULOctetsPerSec, friendlyAPMacAddress=friendlyAPMacAddress, licenseAvailableAP=licenseAvailableAP, apPerfWlanPrevPeakDLOctetsPerSec=apPerfWlanPrevPeakDLOctetsPerSec, apLogFileCopyServerDirectory=apLogFileCopyServerDirectory, logEventSeverityThreshold=logEventSeverityThreshold, tunnelsTxRxBytes=tunnelsTxRxBytes, vnsAllowMulticast=vnsAllowMulticast, select=select, scanGroupAPAssignName=scanGroupAPAssignName, vnLocalClients=vnLocalClients, vnsSSID=vnsSSID, siteEncryptCommAPtoController=siteEncryptCommAPtoController, wlanTable=wlanTable, portMask=portMask, accessPoints=accessPoints, maxBackgroundBWforReassociation=maxBackgroundBWforReassociation, wlanEngerySaveMode=wlanEngerySaveMode, apRegistrationRequests=apRegistrationRequests, vnsRadiusServerAuthType=vnsRadiusServerAuthType, apSpecific=apSpecific, wlanRadiusServerMacNASId=wlanRadiusServerMacNASId, tunnelStatsTable=tunnelStatsTable, apPerfWlanDLOctets=apPerfWlanDLOctets, siteAPTable=siteAPTable, apEnvironment=apEnvironment, externalRadiusServerRowStatus=externalRadiusServerRowStatus, vnsWDSStatAPRole=vnsWDSStatAPRole, dhcpRelayListenersNumEntries=dhcpRelayListenersNumEntries, portDHCPWins=portDHCPWins, vnsCaptivePortalEntry=vnsCaptivePortalEntry, vnsRadiusServerTable=vnsRadiusServerTable, apLocationbasedService=apLocationbasedService, blacklistedClientStatTime=blacklistedClientStatTime, scanGroupAPAssignApSerial=scanGroupAPAssignApSerial, wlanDefaultTopologyID=wlanDefaultTopologyID, mobileUnits=mobileUnits, outOfSrvScanGrpScanActivity=outOfSrvScanGrpScanActivity, loadGrpRadiosRadio2=loadGrpRadiosRadio2, apSerialNo=apSerialNo, wlanSecurityReportEntry=wlanSecurityReportEntry, wlanCPGuestIDPrefix=wlanCPGuestIDPrefix, apPerfWlanCurPeakULOctetsPerSec=apPerfWlanCurPeakULOctetsPerSec, uncategorizedAPCounts=uncategorizedAPCounts, inServiceScanGroup=inServiceScanGroup, siteAPMember=siteAPMember, activeThreatExtraDetails=activeThreatExtraDetails, countermeasureAPName=countermeasureAPName, apAccAverageDisassocDeauthReqRx=apAccAverageDisassocDeauthReqRx, vnsStatRadiusReqFailed=vnsStatRadiusReqFailed, wlanGroup=wlanGroup, apEncryptCntTraffic=apEncryptCntTraffic, apLogDirectory=apLogDirectory, friendlyAPCounts=friendlyAPCounts, vnsWDSStatTxFrame=vnsWDSStatTxFrame, threatSummaryIndex=threatSummaryIndex, vnsDomain=vnsDomain, wlanRadiusServerAcctNASId=wlanRadiusServerAcctNASId, apPerfWlanCurPeakULPktsPerSec=apPerfWlanCurPeakULPktsPerSec, wlanID=wlanID, apPerfWlanAverageULPktsPerSec=apPerfWlanAverageULPktsPerSec, loadGrpRadiosRadio1=loadGrpRadiosRadio1, countermeasureAPSerial=countermeasureAPSerial, radiusFastFailoverEventsGroup=radiusFastFailoverEventsGroup, wlanPrivGroupKPSR=wlanPrivGroupKPSR, wlanCPGuestAccLifetime=wlanCPGuestAccLifetime, armIndex=armIndex, vnsStatMulticastRxPkts=vnsStatMulticastRxPkts, apLogFileCopyOperationStatus=apLogFileCopyOperationStatus, wlanStatsRadiusTotRequests=wlanStatsRadiusTotRequests, widsWipsEngineRowStatus=widsWipsEngineRowStatus, physicalPortCount=physicalPortCount, vnsDHCPRangeType=vnsDHCPRangeType, fastFailoverEvents=fastFailoverEvents, vnsFilterRuleAction=vnsFilterRuleAction, apTotalStationsN24OutOctets=apTotalStationsN24OutOctets, topoStatFrameChkSeqErrors=topoStatFrameChkSeqErrors, prohibitedAPEntry=prohibitedAPEntry, vnsMode=vnsMode, wlanDot11hClientPowerReduction=wlanDot11hClientPowerReduction, mgmtPortHostname=mgmtPortHostname, vnsAPFilterRuleOrder=vnsAPFilterRuleOrder, wlanAuthAllowUnauthorizedUser=wlanAuthAllowUnauthorizedUser, apPerformanceReportByRadioEntry=apPerformanceReportByRadioEntry, apLogDestination=apLogDestination, topoExceptionStatEntry=topoExceptionStatEntry, authorizedAPClassify=authorizedAPClassify, tunnelStartHWC=tunnelStartHWC, prohibitedAPRowStatus=prohibitedAPRowStatus, scanAPSerialNumber=scanAPSerialNumber, muAccessListRowStatus=muAccessListRowStatus, prohibitedAPManufacturer=prohibitedAPManufacturer, vnsIfIndex=vnsIfIndex, vnsStatRxOctects=vnsStatRxOctects, wlanRadiusServerMacUseVNSIPAddr=wlanRadiusServerMacUseVNSIPAddr, wlanRadiusServerAcctUseVNSName=wlanRadiusServerAcctUseVNSName, threatSummaryCategory=threatSummaryCategory, activeThreatDeviceMAC=activeThreatDeviceMAC, apByChannelAPs=apByChannelAPs, vns3rdPartyAP=vns3rdPartyAP, vns3rdPartyAPEntry=vns3rdPartyAPEntry, wlanAuthCollectAcctInformation=wlanAuthCollectAcctInformation, topoCompleteStatBroadcastTxPkts=topoCompleteStatBroadcastTxPkts, siteID=siteID, wlanCPExtTosValue=wlanCPExtTosValue, apPerfWlanAverageDLOctetsPerSec=apPerfWlanAverageDLOctetsPerSec, hiPathWirelessHWCGroup=hiPathWirelessHWCGroup, vnsQoSWirelessUseAdmControlBestEffort=vnsQoSWirelessUseAdmControlBestEffort, apRadioProtocol=apRadioProtocol, wlanRadiusPriority=wlanRadiusPriority, vnsExceptionStatPktsDenied=vnsExceptionStatPktsDenied, topoCompleteStatRxPkts=topoCompleteStatRxPkts, startMinute=startMinute, apPerfRadioPktRetx=apPerfRadioPktRetx, blaclistedClientGroup=blaclistedClientGroup, wlanCPTable=wlanCPTable, topologyIPv6Gateway=topologyIPv6Gateway, vnsPrivWPASharedKey=vnsPrivWPASharedKey, apPerfWlanAverageULOctetsPerSec=apPerfWlanAverageULOctetsPerSec, wlanRadiusServerAcctNASIP=wlanRadiusServerAcctNASIP, stationsByProtocolAC=stationsByProtocolAC, vnsWDSRFBridge=vnsWDSRFBridge, muUser=muUser, muDot11ConnectionCapability=muDot11ConnectionCapability, apLogFileUtility=apLogFileUtility, portDHCPDomain=portDHCPDomain, sysLogServersEntry=sysLogServersEntry, vnsQoSClassificationServiceClass=vnsQoSClassificationServiceClass, serverPollingInterval=serverPollingInterval, apSwVersion=apSwVersion, vnsStatName=vnsStatName, stationsByProtocolError=stationsByProtocolError, tunnelStatus=tunnelStatus, topoCompleteStatEntry=topoCompleteStatEntry, vnsStatTxOctects=vnsStatTxOctects, apAccCurrentDisassocDeauthReqRx=apAccCurrentDisassocDeauthReqRx, ntpEnabled=ntpEnabled, inSrvScanGrpListeningPort=inSrvScanGrpListeningPort, scanGroupAPAssignmentGroup=scanGroupAPAssignmentGroup, apIpAssignmentType=apIpAssignmentType, apTable=apTable, vnsQoSWirelessTurboVoiceFlag=vnsQoSWirelessTurboVoiceFlag, apRole=apRole, vnsApplyPowerBackOff=vnsApplyPowerBackOff, vnsWDSStatTxError=vnsWDSStatTxError, wlanCPUseHTTPSforConnection=wlanCPUseHTTPSforConnection, apRadioFrequency=apRadioFrequency, apInDiscards=apInDiscards, stationAPSSID=stationAPSSID, phyDHCPRangeTable=phyDHCPRangeTable, siteMaxClientR2=siteMaxClientR2, wlanAuthMacBasedAuth=wlanAuthMacBasedAuth, vnsPrivWPA2Enabled=vnsPrivWPA2Enabled, secureConnection=secureConnection, availability=availability, apAntennaIndex=apAntennaIndex, scanGroupAPAssignRadio1=scanGroupAPAssignRadio1, authorizedAPManufacturer=authorizedAPManufacturer, siteReplaceStnIDwithSiteName=siteReplaceStnIDwithSiteName, apStatsGroup=apStatsGroup, hiPathWirelessHWCAlarms=hiPathWirelessHWCAlarms, portDHCPMaxLease=portDHCPMaxLease, tunnelStatsRxBytes=tunnelStatsRxBytes, wlanRadiusUsage=wlanRadiusUsage, stationEventAlarm=stationEventAlarm, countermeasureAPGroup=countermeasureAPGroup, apActiveCount=apActiveCount, licensingInformationGroup=licensingInformationGroup, activeVNSSessionCount=activeVNSSessionCount, portDHCPGateway=portDHCPGateway, topoWireStatTxPkts=topoWireStatTxPkts, tspecApSerialNumber=tspecApSerialNumber, siteEntry=siteEntry, physicalPortsGroup=physicalPortsGroup, assocRxOctets=assocRxOctets, dhcpRelayListenersID=dhcpRelayListenersID, wlanCPEntry=wlanCPEntry, vnsQoSWirelessWMMFlag=vnsQoSWirelessWMMFlag, apRadioAntennaType=apRadioAntennaType, apRadioStatusTable=apRadioStatusTable, apPerfWlanAverageClientsPerSec=apPerfWlanAverageClientsPerSec, uncategorizedAPTable=uncategorizedAPTable, assocTable=assocTable, apStatsSessionDuration=apStatsSessionDuration, wlanName=wlanName, widsWipsReport=widsWipsReport, wlanAuthMACBasedAuthReAuthOnAreaRoam=wlanAuthMACBasedAuthReAuthOnAreaRoam, apPerfRadioCurrentPktRetx=apPerfRadioCurrentPktRetx, dashboard=dashboard, apAccReassocReqRx=apAccReassocReqRx, apTotalStationsN50InOctets=apTotalStationsN50InOctets, synchronizeGuestPort=synchronizeGuestPort, topologyGroup=topologyGroup, apPollTimeout=apPollTimeout, detectLinkFailure=detectLinkFailure, vnsWEPKeyIndex=vnsWEPKeyIndex, wlanAuthRadiusIncludeSSID=wlanAuthRadiusIncludeSSID, vnsQoSWirelessUseAdmControlVideo=vnsQoSWirelessUseAdmControlVideo, radioVNSRowStatus=radioVNSRowStatus, apTotalStationsN50=apTotalStationsN50, apAccessibilityTable=apAccessibilityTable, apAccessibilityEntry=apAccessibilityEntry, apPerfWlanULPkts=apPerfWlanULPkts, loadGroupClientCountRadio2=loadGroupClientCountRadio2, tunnelEndIP=tunnelEndIP, apInUcastPkts=apInUcastPkts, scanGroupAPAssignGroupName=scanGroupAPAssignGroupName, topologyLayer3=topologyLayer3, layerTwoPortMacAddress=layerTwoPortMacAddress, stationIPv6Address3=stationIPv6Address3, outOfServiceScanGroupTable=outOfServiceScanGroupTable, apTotalStationsGInOctets=apTotalStationsGInOctets, apChnlUtilAverageUtilization=apChnlUtilAverageUtilization, muRxOctets=muRxOctets) mibBuilder.exportSymbols("HIPATH-WIRELESS-HWC-MIB", wlanRadiusServerUse=wlanRadiusServerUse, siteWlanApRadioIndex=siteWlanApRadioIndex, vnsWDSStatAPParent=vnsWDSStatAPParent, maxBestEffortBWforReassociation=maxBestEffortBWforReassociation, muTSPECEntry=muTSPECEntry, muDuration=muDuration, sitePolicyEntry=sitePolicyEntry, vnsQoSPriorityOverrideDSCP=vnsQoSPriorityOverrideDSCP, inSrvScanGrpScan2400MHzSelection=inSrvScanGrpScan2400MHzSelection, imagePath26xx=imagePath26xx, siteGroup=siteGroup, physicalPortObjects=physicalPortObjects, cpConnectionPort=cpConnectionPort, maxBackgroundBWforAssociation=maxBackgroundBWforAssociation, apLLDP=apLLDP, threatSummaryGroup=threatSummaryGroup, loadGrpRadiosTable=loadGrpRadiosTable, vnsWDSStatEntry=vnsWDSStatEntry, apLogFileCopyProtocol=apLogFileCopyProtocol, stationsByProtocolA=stationsByProtocolA, maxVoiceBWforReassociation=maxVoiceBWforReassociation, wlanCPGuestAllowedLifetimeAcct=wlanCPGuestAllowedLifetimeAcct, apNeighboursTable=apNeighboursTable, apRadioStatusChannelOffset=apRadioStatusChannelOffset, apPerfRadioCurrentSNR=apPerfRadioCurrentSNR, loadGrpWlanTable=loadGrpWlanTable, mgmtPortIfIndex=mgmtPortIfIndex, topoStatEntry=topoStatEntry, portName=portName, topologySynchronize=topologySynchronize, apLogCollectionEnable=apLogCollectionEnable, vnsRateControlCIR=vnsRateControlCIR, vnsAPFilterProtocol=vnsAPFilterProtocol, advancedFilteringMode=advancedFilteringMode, apAccCurrentDisassocDeauthReqTx=apAccCurrentDisassocDeauthReqTx, wirelessQoS=wirelessQoS, radiusFastFailoverEvents=radiusFastFailoverEvents, radiusFastFailoverEventsTable=radiusFastFailoverEventsTable, topologyDHCPUsage=topologyDHCPUsage, apRadioStatusChannelWidth=apRadioStatusChannelWidth, muIPAddress=muIPAddress, inSrvScanGrpMaxConcurrentAttacksPerAP=inSrvScanGrpMaxConcurrentAttacksPerAP, loadGroupBandPreference=loadGroupBandPreference, vnsPrivacyEntry=vnsPrivacyEntry, authorizedAPEntry=authorizedAPEntry, apLogFTProtocol=apLogFTProtocol, vnsFilterRuleProtocol=vnsFilterRuleProtocol, vnsConfigWLANID=vnsConfigWLANID, netflowInterval=netflowInterval, loadBalancing=loadBalancing, wlanServiceType=wlanServiceType, topology=topology, vnsExceptionStatPktsAllowed=vnsExceptionStatPktsAllowed, muEntry=muEntry, topoCompleteStatRxOctets=topoCompleteStatRxOctets, vnsDNSServers=vnsDNSServers, outOfSrvScanGrpChannelDwellTime=outOfSrvScanGrpChannelDwellTime, vnsRadiusServerName=vnsRadiusServerName, ntpTimeServer2=ntpTimeServer2, apAccAverageAssocReqRx=apAccAverageAssocReqRx, blacklistedClientTable=blacklistedClientTable, apSoftwareVersion=apSoftwareVersion, apAccCurPeakDisassocDeauthReqRx=apAccCurPeakDisassocDeauthReqRx, vnsFilterIDEntry=vnsFilterIDEntry, apPerfWlanCurrentDLPktsPerSec=apPerfWlanCurrentDLPktsPerSec, activeThreatTable=activeThreatTable, radiusAccounting=radiusAccounting, LogEventSeverity=LogEventSeverity, apLogFileCopyOperation=apLogFileCopyOperation, apSecureDataTunnelType=apSecureDataTunnelType, topologyTagged=topologyTagged, apEventId=apEventId, siteLoadControlEnableR2=siteLoadControlEnableR2, vnsWEPKeyTable=vnsWEPKeyTable, pairIPAddress=pairIPAddress, vnsConfigObjects=vnsConfigObjects, threatSummaryHistoricalCounts=threatSummaryHistoricalCounts, apLogFileCopyIndex=apLogFileCopyIndex, scanAPTable=scanAPTable, topoStatMulticastRxPkts=topoStatMulticastRxPkts, radioVNSEntry=radioVNSEntry, radioIfIndex=radioIfIndex, externalRadiusServerEntry=externalRadiusServerEntry, apAccAverageReassocReqRx=apAccAverageReassocReqRx, wlanPrivManagementFrameProtection=wlanPrivManagementFrameProtection, apPerfWlanCurPeakDLOctetsPerSec=apPerfWlanCurPeakDLOctetsPerSec, siteCosGroup=siteCosGroup, wlanRadiusServerMacPW=wlanRadiusServerMacPW, apEntry=apEntry, vnsQoSPriorityOverrideSC=vnsQoSPriorityOverrideSC, clearAccessRejectMsg=clearAccessRejectMsg, apHome=apHome, apTotalStationsGOutOctets=apTotalStationsGOutOctets, apTotalStationsACInOctets=apTotalStationsACInOctets, siteTableNextAvailableIndex=siteTableNextAvailableIndex, topologyMode=topologyMode, wlanAuthRadiusIncludeVNS=wlanAuthRadiusIncludeVNS, topoStatMulticastTxPkts=topoStatMulticastTxPkts, apHostname=apHostname, wassp=wassp, scanGroupAPAssignRadio2=scanGroupAPAssignRadio2, vnsWDSRFaService=vnsWDSRFaService, radiusExtnsSettingEntry=radiusExtnsSettingEntry, wlanRemoteable=wlanRemoteable, externalRadiusServerAddress=externalRadiusServerAddress, stationName=stationName, tspecUlRate=tspecUlRate, uncategorizedAPClassify=uncategorizedAPClassify, apIndex=apIndex, apPerformanceReportbyRadioAndWlanTable=apPerformanceReportbyRadioAndWlanTable, wlanBlockMuToMuTraffic=wlanBlockMuToMuTraffic, wlanAuthReplaceCalledStationIDWithZone=wlanAuthReplaceCalledStationIDWithZone, apPerfWlanCurrentULPktsPerSec=apPerfWlanCurrentULPktsPerSec, sysSerialNo=sysSerialNo, widsWipsEngineTable=widsWipsEngineTable, wlan=wlan, vnsDHCPRangeIndex=vnsDHCPRangeIndex, synchronizeSystemConfig=synchronizeSystemConfig, apZone=apZone, radiusExtnsIndex=radiusExtnsIndex, scanGroupProfileID=scanGroupProfileID, prohibitedAPTable=prohibitedAPTable, wlanStatsGroup=wlanStatsGroup, apTotalStationsN50OutOctets=apTotalStationsN50OutOctets, wlanAuthMACBasedAuthOnRoam=wlanAuthMACBasedAuthOnRoam, wlanCPExtAddIPtoURL=wlanCPExtAddIPtoURL, vnsStatTxPkts=vnsStatTxPkts, muTSPECTable=muTSPECTable, vnsAPFilterAction=vnsAPFilterAction, cpURL=cpURL, wlanCPExtConnection=wlanCPExtConnection, assocVnsIfIndex=assocVnsIfIndex, outOfSrvScanGrpRadio=outOfSrvScanGrpRadio, blacklistedClientReason=blacklistedClientReason, muAccessListGroup=muAccessListGroup, vnsMUSessionTimeout=vnsMUSessionTimeout, uncategorizedAPEntry=uncategorizedAPEntry, wlanRadiusAuthType=wlanRadiusAuthType, apTotalStationsAC=apTotalStationsAC, apLogSelectedAPsTable=apLogSelectedAPsTable, threatSummaryEntry=threatSummaryEntry, wlanStatsRadiusReqRejected=wlanStatsRadiusReqRejected, vnsEnabled=vnsEnabled, activeThreatEntry=activeThreatEntry, apRegDiscoveryRetries=apRegDiscoveryRetries, wlanCPExtSharedSecret=wlanCPExtSharedSecret, radiusFFOEid=radiusFFOEid, topoWireStatTxOctets=topoWireStatTxOctets, sysLogServersTable=sysLogServersTable, apAccCurrentAssocReqRx=apAccCurrentAssocReqRx, uncategorizedAPSSID=uncategorizedAPSSID, muAccessListEntry=muAccessListEntry, dedicatedScanGrpCounterMeasures=dedicatedScanGrpCounterMeasures, topoCompleteStatMulticastRxPkts=topoCompleteStatMulticastRxPkts, layerTwoPortGroup=layerTwoPortGroup, apLogFileUtilityCurrent=apLogFileUtilityCurrent, friendlyAPEntry=friendlyAPEntry, stationIPv6Address1=stationIPv6Address1, prohibitedAPDescription=prohibitedAPDescription, wlanCPExtEncryption=wlanCPExtEncryption, availabilityStatus=availabilityStatus, countermeasureAPEntry=countermeasureAPEntry, topoExceptionStatTable=topoExceptionStatTable, vnsVlanID=vnsVlanID, apPerfRadioCurPeakRSS=apPerfRadioCurPeakRSS, mgmtPortDomain=mgmtPortDomain, apRegSSHPassword=apRegSSHPassword, vnsRadiusServerRowStatus=vnsRadiusServerRowStatus, muState=muState, tunnelStartIP=tunnelStartIP, vnsQoSPriorityOverrideFlag=vnsQoSPriorityOverrideFlag, tspecMDR=tspecMDR, apOutUcastPkts=apOutUcastPkts, ntpServerEnabled=ntpServerEnabled, radiusExtnsSetting=radiusExtnsSetting, tspecDlRate=tspecDlRate, topologySyncGateway=topologySyncGateway, apIPMulticastAssembly=apIPMulticastAssembly, vnsWDSStatAPName=vnsWDSStatAPName, assocTxPackets=assocTxPackets, outOfSrvScanGrpScanTimeInterval=outOfSrvScanGrpScanTimeInterval, vnsAPFilterEtherType=vnsAPFilterEtherType, vnsRateControlProfile=vnsRateControlProfile, hiPathWirelessHWCConformance=hiPathWirelessHWCConformance, dedicatedScanGrpName=dedicatedScanGrpName, tspecDlViolations=tspecDlViolations, muBSSIDMac=muBSSIDMac, assocCount=assocCount, topologyManagementTraffic=topologyManagementTraffic, cpLogOff=cpLogOff, accessRejectMsgTable=accessRejectMsgTable, hiPathWirelessController=hiPathWirelessController, apPerfWlanPrevPeakClientsPerSec=apPerfWlanPrevPeakClientsPerSec, apLogFileCopyUserID=apLogFileCopyUserID, apVlanID=apVlanID, scanGroupMaxEntries=scanGroupMaxEntries, wlanCPGuestSessionLifetime=wlanCPGuestSessionLifetime, vnsQoSWireless80211eFlag=vnsQoSWireless80211eFlag, widsWipsObjectsGroup=widsWipsObjectsGroup, activeThreatThreat=activeThreatThreat, apPerfWlanPrevPeakDLPktsPerSec=apPerfWlanPrevPeakDLPktsPerSec, apAntennaTable=apAntennaTable, wlanCPIdentity=wlanCPIdentity, vnsCaptivePortalTable=vnsCaptivePortalTable, vnsFilterIDStatus=vnsFilterIDStatus, clientMessageDelayTime=clientMessageDelayTime, vnsWDSStatRxRSSI=vnsWDSStatRxRSSI, vnsRateControlProfName=vnsRateControlProfName, apTotalStationsG=apTotalStationsG, apTotalStationsN24InOctets=apTotalStationsN24InOctets, inSrvScanGrpCounterMeasuresType=inSrvScanGrpCounterMeasuresType, scanAPAcessPointName=scanAPAcessPointName, vnsWDSStatTable=vnsWDSStatTable, friendlyAPManufacturer=friendlyAPManufacturer, cpDefaultRedirectionURL=cpDefaultRedirectionURL, vnsRateControlProfTable=vnsRateControlProfTable, vnsDLSSupportEnable=vnsDLSSupportEnable, wlanRadiusServerMacAuthType=wlanRadiusServerMacAuthType, topologySyncIPEnd=topologySyncIPEnd, apPerfWlanPrevPeakULPktsPerSec=apPerfWlanPrevPeakULPktsPerSec, vnsAPFilterPortHigh=vnsAPFilterPortHigh, topologyMTUsize=topologyMTUsize, protocols=protocols, recurrenceMonthly=recurrenceMonthly, clientServiceTypeLogin=clientServiceTypeLogin, inSrvScanGrpName=inSrvScanGrpName, radacctStartOnIPAddr=radacctStartOnIPAddr, siteWlanEntry=siteWlanEntry, systemObjects=systemObjects, wlanCPExtPort=wlanCPExtPort, topologyAPRegistration=topologyAPRegistration, apPerfRadioCurPeakChannelUtilization=apPerfRadioCurPeakChannelUtilization, prohibitedAPGroup=prohibitedAPGroup, vnsAPFilterIPAddress=vnsAPFilterIPAddress, topologyStaticIPv6Address=topologyStaticIPv6Address, uncategorizedAPManufacturer=uncategorizedAPManufacturer, cpStatusCheck=cpStatusCheck, apLEDMode=apLEDMode, apTotalStationsAOutOctets=apTotalStationsAOutOctets, loadGrpWlanAssigned=loadGrpWlanAssigned, stationSessionNotifications=stationSessionNotifications, vnHeartbeatInterval=vnHeartbeatInterval, layerTwoPortName=layerTwoPortName, licenseType=licenseType, topoWireStatTable=topoWireStatTable, apLogServerIP=apLogServerIP, sysLogServerRowStatus=sysLogServerRowStatus, wlanCPGuestMinPassLength=wlanCPGuestMinPassLength, loadGroupEntry=loadGroupEntry, inSrvScanGrpRowStatus=inSrvScanGrpRowStatus, activeThreatCounterMeasure=activeThreatCounterMeasure, topoCompleteStatMulticastTxPkts=topoCompleteStatMulticastTxPkts, primaryDNS=primaryDNS, tunnelStatsEntry=tunnelStatsEntry) mibBuilder.exportSymbols("HIPATH-WIRELESS-HWC-MIB", muVnsSSID=muVnsSSID, netflowAndMirrorN=netflowAndMirrorN, wlanRadiusTimeout=wlanRadiusTimeout, wlanEnabled=wlanEnabled, apLogFileCopyDestination=apLogFileCopyDestination, fastFailover=fastFailover, apPerfWlanCurrentDLOctetsPerSec=apPerfWlanCurrentDLOctetsPerSec, vnsWEPKeyEntry=vnsWEPKeyEntry, countermeasureAPTable=countermeasureAPTable, scanAPControllerIPAddress=scanAPControllerIPAddress, vnsStatBroadcastRxPkts=vnsStatBroadcastRxPkts, wlanCPAuthType=wlanCPAuthType, vnsWINSServers=vnsWINSServers, sitePolicyMember=sitePolicyMember, wlanSecurityReportGroup=wlanSecurityReportGroup, vnsRadiusServerRetries=vnsRadiusServerRetries, wlanCPCustomSpecificURL=wlanCPCustomSpecificURL, vnsFilterRuleTable=vnsFilterRuleTable, vnsConfigTable=vnsConfigTable, topologyName=topologyName, assocEntry=assocEntry, tunnelStatsTxRxBytes=tunnelStatsTxRxBytes, topologyID=topologyID, nearbyApInfo=nearbyApInfo, inSrvScanGrpClassifySourceIF=inSrvScanGrpClassifySourceIF, wlanAuthTable=wlanAuthTable, apRestartServiceContAbsent=apRestartServiceContAbsent, stationEventTimeStamp=stationEventTimeStamp, wlanRadiusServerName=wlanRadiusServerName, includeServiceType=includeServiceType, topoWireStatEntry=topoWireStatEntry, nearbyApBSSID=nearbyApBSSID, vnsStatRadiusReqRejected=vnsStatRadiusReqRejected, authenticationAdvancedGroup=authenticationAdvancedGroup, portMacAddress=portMacAddress, stationAPName=stationAPName, apPerfRadioCurrentChannelUtilization=apPerfRadioCurrentChannelUtilization, wlanMaxEntries=wlanMaxEntries, friendlyAPTable=friendlyAPTable, portEnabled=portEnabled, wlanPrivWPAv2EncryptionType=wlanPrivWPAv2EncryptionType, apLinkTimeout=apLinkTimeout, scanAPProfileType=scanAPProfileType, uncategorizedAPGroup=uncategorizedAPGroup, vnsWDSRFPreferredParent=vnsWDSRFPreferredParent, layerTwoPortMgmtState=layerTwoPortMgmtState, apLocation=apLocation, widsWips=widsWips, stationsByProtocol=stationsByProtocol, scanGroupAPAssignInactiveAP=scanGroupAPAssignInactiveAP, dhcpRelayListeners=dhcpRelayListeners, siteName=siteName, wlanQuietIE=wlanQuietIE, topoWireStatBroadcastTxPkts=topoWireStatBroadcastTxPkts, wlanRadioManagement11k=wlanRadioManagement11k, apRadioEntry=apRadioEntry, countermeasureAPCountermeasure=countermeasureAPCountermeasure, siteLoadControlEnableR1=siteLoadControlEnableR1, wirelessEWCGroups=wirelessEWCGroups, blacklistedClientEndTime=blacklistedClientEndTime, wlanRadiusServerAuthNASIP=wlanRadiusServerAuthNASIP, authorizedAPDescription=authorizedAPDescription, vnsSuppressSSID=vnsSuppressSSID, topoStatFrameTooLongErrors=topoStatFrameTooLongErrors, apPerfWlanCurrentULOctetsPerSec=apPerfWlanCurrentULOctetsPerSec, apChnlUtilPrevPeakUtilization=apChnlUtilPrevPeakUtilization, maxBestEffortBWforAssociation=maxBestEffortBWforAssociation, apSerialNumber=apSerialNumber, portDHCPDnsServers=portDHCPDnsServers, serverUsageModel=serverUsageModel, apStatus=apStatus, wlanPrivWPAPSK=wlanPrivWPAPSK, scanGroupAPAssignmentTable=scanGroupAPAssignmentTable, vnsQoSWirelessDLPolicerAction=vnsQoSWirelessDLPolicerAction, wlanMirrorN=wlanMirrorN, apStatsMuCounts=apStatsMuCounts, stationsByProtocolG=stationsByProtocolG, clientAutologinOption=clientAutologinOption, vnsStrictSubnetAdherence=vnsStrictSubnetAdherence, vnsExceptionStatEntry=vnsExceptionStatEntry, vnRole=vnRole, apPerformanceReportbyRadioAndWlanEntry=apPerformanceReportbyRadioAndWlanEntry, dedicatedScanGrpScan2400MHzFreq=dedicatedScanGrpScan2400MHzFreq, wlanPrivBroadcastRekeying=wlanPrivBroadcastRekeying, duration=duration, vnsStatEntry=vnsStatEntry, vnsDHCPRangeTable=vnsDHCPRangeTable, threatSummaryTable=threatSummaryTable, apAccCurrentReassocReqRx=apAccCurrentReassocReqRx, widsWipsEnginePollInterval=widsWipsEnginePollInterval, apMaintainClientSession=apMaintainClientSession, wlanRadiusNASID=wlanRadiusNASID, vnsFilterRulePortLow=vnsFilterRulePortLow, logEventDescription=logEventDescription, topoWireStatRxOctets=topoWireStatRxOctets, outOfServiceScanGroup=outOfServiceScanGroup, apLogFileUtilityLimit=apLogFileUtilityLimit, vnsAPFilterMask=vnsAPFilterMask, apLogFileCopyEntry=apLogFileCopyEntry, sysLogServerIndex=sysLogServerIndex, wlanCPGuestMaxConcurrentSession=wlanCPGuestMaxConcurrentSession, apEffectiveTunnelMTU=apEffectiveTunnelMTU, apLogQuickSelectedOption=apLogQuickSelectedOption, externalRadiusServerTable=externalRadiusServerTable, apOutNUcastPkts=apOutNUcastPkts, apRadioIndex=apRadioIndex, schedule=schedule, muAccessListTable=muAccessListTable, outOfServiceScanGroupEntry=outOfServiceScanGroupEntry, apSiteID=apSiteID, siteWlanTable=siteWlanTable, sysLogLevel=sysLogLevel, scanGroupAPAssignControllerIPAddress=scanGroupAPAssignControllerIPAddress, wlanNumEntries=wlanNumEntries, apAntennaType=apAntennaType, vnsFilterRuleEtherType=vnsFilterRuleEtherType, apStatsEntry=apStatsEntry, apPerfRadioCurrentRSS=apPerfRadioCurrentRSS, muRxPackets=muRxPackets, dnsObjects=dnsObjects, apRegClusterSharedSecret=apRegClusterSharedSecret, apPerfRadioPrevPeakChannelUtilization=apPerfRadioPrevPeakChannelUtilization, apPerfWlanAverageDLPktsPerSec=apPerfWlanAverageDLPktsPerSec, secondaryDNS=secondaryDNS, topologyEgressPort=topologyEgressPort, mirrorFirstN=mirrorFirstN, topoCompleteStatTable=topoCompleteStatTable, uncategorizedAPMAC=uncategorizedAPMAC, wlanRadiusNASIP=wlanRadiusNASIP, activeThreatRSS=activeThreatRSS, loadGroupClientCountRadio1=loadGroupClientCountRadio1, wlanPrivWPAv1EncryptionType=wlanPrivWPAv1EncryptionType, muTopologyName=muTopologyName, wlanBeaconReport=wlanBeaconReport, friendlyAPSSID=friendlyAPSSID, topologyConfig=topologyConfig, scanAPProfileName=scanAPProfileName, siteAPGroup=siteAPGroup, physicalPortsEntry=physicalPortsEntry, portFunction=portFunction, vnsRadiusServerNASIdentifier=vnsRadiusServerNASIdentifier, topologyDynamicEgress=topologyDynamicEgress, wlanSessionTimeout=wlanSessionTimeout, dhcpRelayListenersMaxEntries=dhcpRelayListenersMaxEntries, apConfigObjects=apConfigObjects, pollingMechanism=pollingMechanism, blacklistedClientEntry=blacklistedClientEntry, sysLogSupport=sysLogSupport, apTotalStationsAInOctets=apTotalStationsAInOctets, apPerfRadioPrevPeakPktRetx=apPerfRadioPrevPeakPktRetx, wlanRadiusServerTable=wlanRadiusServerTable, outOfSrvScanGrpName=outOfSrvScanGrpName, vnsEnable11hSupport=vnsEnable11hSupport, HundredthOfInt32=HundredthOfInt32)
(octet_string, integer, object_identifier) = mibBuilder.importSymbols('ASN1', 'OctetString', 'Integer', 'ObjectIdentifier') (named_values,) = mibBuilder.importSymbols('ASN1-ENUMERATION', 'NamedValues') (constraints_union, constraints_intersection, value_size_constraint, value_range_constraint, single_value_constraint) = mibBuilder.importSymbols('ASN1-REFINEMENT', 'ConstraintsUnion', 'ConstraintsIntersection', 'ValueSizeConstraint', 'ValueRangeConstraint', 'SingleValueConstraint') (hi_path_wireless_modules, hi_path_wireless_mgmt) = mibBuilder.importSymbols('HIPATH-WIRELESS-SMI', 'hiPathWirelessModules', 'hiPathWirelessMgmt') (wep_keytype,) = mibBuilder.importSymbols('IEEE802dot11-MIB', 'WEPKeytype') (if_index, interface_index) = mibBuilder.importSymbols('IF-MIB', 'ifIndex', 'InterfaceIndex') (ipv6_address,) = mibBuilder.importSymbols('IPV6-TC', 'Ipv6Address') (object_group, module_compliance, notification_group) = mibBuilder.importSymbols('SNMPv2-CONF', 'ObjectGroup', 'ModuleCompliance', 'NotificationGroup') (iso, mib_identifier, notification_type, module_identity, time_ticks, mib_scalar, mib_table, mib_table_row, mib_table_column, unsigned32, bits, object_identity, gauge32, integer32, counter64, ip_address, counter32) = mibBuilder.importSymbols('SNMPv2-SMI', 'iso', 'MibIdentifier', 'NotificationType', 'ModuleIdentity', 'TimeTicks', 'MibScalar', 'MibTable', 'MibTableRow', 'MibTableColumn', 'Unsigned32', 'Bits', 'ObjectIdentity', 'Gauge32', 'Integer32', 'Counter64', 'IpAddress', 'Counter32') (truth_value, display_string, mac_address, row_status, textual_convention) = mibBuilder.importSymbols('SNMPv2-TC', 'TruthValue', 'DisplayString', 'MacAddress', 'RowStatus', 'TextualConvention') hi_path_wireless_controller_mib = module_identity((1, 3, 6, 1, 4, 1, 4329, 15, 5, 2)) hiPathWirelessControllerMib.setRevisions(('2016-04-13 13:55', '2016-03-09 16:41', '2015-10-06 17:31', '2015-06-12 12:05', '2015-03-17 10:31', '2014-11-28 17:31', '2014-06-17 15:29', '2014-04-16 14:29', '2014-01-27 14:29', '2013-11-18 10:29', '2013-08-28 11:17', '2013-08-01 15:55', '2013-07-12 16:50', '2013-04-18 15:55', '2012-10-18 11:50', '2012-09-27 11:10', '2012-09-10 14:10', '2012-02-13 19:33', '2011-08-17 14:18', '2011-06-13 13:10', '2011-04-29 16:06', '2011-01-13 13:25', '2010-04-29 17:44', '2010-04-08 16:45', '2010-02-23 15:17', '2009-08-18 12:00', '2009-07-23 12:47', '2009-04-23 17:14', '2009-01-19 13:49', '2008-08-13 14:31', '2007-11-26 16:15', '2007-08-11 16:15', '2007-01-15 13:38', '2005-10-28 13:12')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): if mibBuilder.loadTexts: hiPathWirelessControllerMib.setRevisionsDescriptions((' - Added wlanAppVisibility to wlanTable.', ' - Added stationIPv6Address1, stationIPv6Address2, and stationIPv6Address3 to stationEventAlarm. - Added apTotalStationsAInOctets, apTotalStationsAOutOctets, apTotalStationsBInOctets, apTotalStationsBOutOctets, apTotalStationsGInOctets, apTotalStationsGOutOctets, apTotalStationsN50InOctets, apTotalStationsN50OutOctets, apTotalStationsN24InOctets, apTotalStationsN24OutOctets, apTotalStationsACInOctets, and apTotalStationsACOutOctets to apStatsTable.', ' - Modified the description of stationEventTimeStamp. - Added more access points (APs) to apPlatforms. - Deprecated topoWireStatTable. - Added topoCompleteStatTable. - Added applyMacAddressFormat to authenticationAdvanced. - Added radiusMacAddressFormatOption to vnsGlobalSetting.', ' - Modified the description of topoStatTable. - Modified the description of apPerformanceReportByRadioTable.', ' - Added wlanRadioManagement11k, wlanBeaconReport, QuietIE, wlanMirrorN, and wlanNetFlow to wlanTable. - Added wlanPrivfastTransition, and wlanPrivManagementFrameProtection to wlanPrivTable. - Added topologyIsGroup, topologyGroupMembers, and topologyMemberId to topologyTable. - Added netflowAndMirrorN Object. It contains netflowDestinationIP, netflowInterval, mirrorFirstN, and mirrorL2Ports. - Added fastTransition(13) to muDot11ConnectionCapability. - Added clearAccessRejectMsg and accessRejectMsgTable. - Added vnsQoSWirelessUseAdmControlBestEffort, and vnsQoSWirelessUseAdmControlBackground to vnsQoSTable. - Added maxBestEffortBWforReassociation, maxBestEffortBWforAssociation, maxBackgroundBWforReassociation, and maxBackgroundBWforAssociation to wirelessQoS. - Added radacctStartOnIPAddr and clientServiceTypeLogin to authenticationAdvanced. - Added apPerformanceReportByRadioTable. - Added apPerformanceReportbyRadioAndWlanTable. - Added apChannelUtilizationTable. - Added apAccessibilityTable. - Added apNeighboursTable.', '- Added topoWireStatTable.', '- Added firewallFriendlyExCP(7) to wlanAuthType. - Added firewallFriendlyExCP(7) to wlanCPAuthType. - Added wlanCPIdentity, wlanCPCustomSpecificURL and wlanCPSelectionOption to wlanCPTable. - Added wlanAuthRadiusOperatorNameSpace, wlanAuthRadiusOperatorName and wlanAuthMACBasedAuthReAuthOnAreaRoam to wlanAuthTable. - Added radiusExtnsSettingTable. - Added authenticationAdvanced. - Added areaChange(12) to stationEventType.', '- Added apLogManagement Objects. - Added apMaintenanceCycle Objects. - Deprecated wlanCPExtTosValue from wlanCPTable. - Deprecated apSSHAccess from apTable. - Added apSSHConnection to apTable. - Added na(3) to apTelnetAccess.', '- Added apRadioAttenuation to apRadioAntennaTable. - Added apRadioStatusTable. - Added apRadioProtocol to apRadioTable. - Deprecated apRadioType from apRadioTable.', '- stationsByProtocol was modified to add stationsByProtocolUnavailable, stationsByProtocolError and stationsByProtocolAC. - Added muDot11ConnectionCapability to muTable. - deprecated muConnectionCapability from muTable. - Added ac(6) to muConnectionProtoco. - Added apInterfaceMTU, apEffectiveTunnelMTU and apTotalStationsAC to apStatsTable. - Added dot11ac(11) and dot11cStrict(12) to apRadioType. - Added wlanAuthRadiusAcctAfterMacBaseAuthorization and wlanAuthRadiusTimeoutRole to wlanAuthTable. - Added wlanPrivWPAversion to wlanPrivTable. - Added jumboFrames to physicalPortObjects. - Added apRegister to apEventId.', '- apTable was modified to add apIPMulticastAssembly.', ' - Added wlanCPUseHTTPSforConnection to wlanCPTable. - Added wlanRadiusServerTable. - Added inSrvScanGrpDetectRogueAP and inSrvScanGrpListeningPort to inServiceScanGroupTable. - Added dedicatedScanGrpDetectRogueAP and dedicatedScanGrpListeningPort to dedicatedScanGroupTable. - Added clientAutologinOption to vnsGlobalSetting. - Added licenseMode, licenseLocalAP, licenseForeignAP, licenseLocalRadarAP and licenseForeignRadarAP to licensingInformation. - Added sysCPUType to systemObjects. - Added adHocModeDevice(6) and rogueAP(7) to dedicatedScanGrpCounterMeasures and inServiceScanGroupTable .', '- Added AccessPoint reigisteration event notification.', '- Added radiusFastFailoverEventsTable. - Addes dhcpRelayListenersTable. - topologyTable was modified to add new topologyDynamicEgress value.. - Added apRadioAntennaTable. - Added stationSessionNotifications trap. - scanGroupAPAssignmentTable was modified to add scanGroupAPAssignControllerIPAddress and scanGroupAPAssignFordwardingService. - scanAPTable was modified to add scanAPProfileName and scanAPProfileType. - Added dedicatedScanGroupTable. - apStatsTable was modified to add apInvalidPolicyCount. - apTable was modified to add apSecureDataTunnelType - uncategorizedAPTable was modified to add uncategorizedAPSSID and deprecate uncategorizedAPDescption.', 'Description changes for object groups: uncategorizedAPGroup, authorizedAPGroup and prohibitedAPGroup.', '- Added radiusStrictMode - Enhance description field of a few variables', "Added support: - widsWips: Configuration and statistic infromation about intrusion detection and prevention. - Controller dashboard information was added under 'dashboard', that includes some controler statistics and lincensing information - wlanSecurityReportTable was created to report on the status of weak WLAN configuration - apAntennaTable was added to provide AP antenna information - MU access list: creating MU access list using set of MAC addresses. - muACLTable is deprecated and replaced by muAccessListTable. - apTable was modified with added new field: apMICErrorWarning", 'Added support: - siteTable: main table to create any site. - sitePolicyTable: The table for assigning policies to a site. - siteCosTable: The table for retrieving assigned CoS to a site. - siteAPTable: Table for assinging APs to a site. - siteWlanTable: Table for assinging WLANs to a site. All tables above can collectively be used to configure a site or retrieve its configuration values. apTable was modified with new value for show its site membership. - WlanAuthTable::wlanAuthReplaceCalledStationIDWithZone was added. - WlanCpTable::wlanCPGuestMaxConcurrentSession was added. - TopologyTable was modified with additional new elements. - apTable was modified with new AP attributes. - muTable::muBSSIDMac was added. - loadGroupTable: more elements were added to this table. - loadGroupTable::loadGroupLoadControl was deprecated and was replaced with two new fields each representing one radio.', 'muTable was modified to show its association to WLAN by including WLAN ID into muTable.', 'secureConnection: This object was added to support weak cipher configuration. VSN related fields were modified: -- vnsFilterRuleDirection, vnsFilterRuleProtocol, vnsFilterRuleEtherType. muTable was modified with added fields: -- muTopologyName, muPolicyName, muDefaultCoS, muConnectionProtocol, muConnectionCapability. More added for configuration of MU Access List: - muACLType, muACLTable. apStatsTable was modified with more new elements: - apTotalStationsA, apTotalStationsB, apTotalStationsG,apTotalStationsN50, apTotalStationsN24.', 'Added layer two physical tables: - layerTwoPortTable Following tables are deprecated due to changes in EWC: - physicalPortsTable - phyDHCPRangeTable HWC (HiPath Wireless Controller) has been replaced with EWC (Enterasys Wireless Controller).', 'Added more tables to reflect WLAN configuration. Detailed WLAN configuration are reflected in new tables: - wlanPrivTable (WLAN privacy configuration) - wlanAuthTable (WLAN authentication configuration) - wlanRadiusTable (RADIUS assignment for each WLAN) - wlanCPTable (WLAN captive portal configuration) - wlanServiceType field was modifed to support mesh. Acess point related changes are: - apStaticMTUSize to apTable - apRadioNumber to apRadioTable - apRadioType to apRadioTable Global advanced filtering mode were added: advancedFilteringMode Following item were not applicable to HWC captive portal anymore and are deprecated: - cpLoginLabel - cpPasswordLabel - cpHeaderURL - cpFooterURL - cpMessage Access point load balancing group are reflected in new tables: - loadGroupTable (load group configuration) - loadGrpRadiosTable (radio assignment to loadGroupTable) - loadGrpWlanTable (WLAN assignment to loadGroupTable) ', 'HWC release 7.31: Enhancement are in the area of: - availability: HWC availability support - vnManagerObjects: Mobility enhancement related to MU counters - tunnelStatsTable: Mobility tunnel stats enhancement such as MU counters - AP stats enhancement in apStatsTable - apRegistration: AP registration and administration configuration fields - topologyTable: Advanced topology configuration fields are added to this table. - topoStatTable: topoStatFrameChkSeqErrors and topoStatFrameTooLongErrors added - WLAN scalars added: wlanMaxEntries, wlanNumEntries, wlanTableNextAvailableIndex - wlanTable: Table of WLAN configuration - wlanStatsTable: WLAN statistics such as clients counts, RADIUS request counts, RAIDUS failed or rejected counters. ', 'Obsoleted following items: - vnsAssignmentMode - vnsParentIfIndex - vnsRateControlProfTable - vnsWDSStatTable - vnsStatTable. These stats are reflected under topology - vnsExceptionStatTable. These stats are reflected under topology.', 'New changes include: - Topology configuratioin - Statistics about topoloy - Exception stat about topology.', 'Added version of the image for sensors.', 'Added SLP status field to VNS configuration table (vnsConfigTable).', 'Added information about sensor management.', 'Added new fields for VNS such as vnsEabled. Added AP filter for ACL list for Access Points', 'Added DNS entries. Aded DAS values Added RADIUS server information', 'DHCP information related to the Controller was added to the MIB.', 'Modified apTable with additional fields.', 'Added WDS VNS.', 'Initial version.')) if mibBuilder.loadTexts: hiPathWirelessControllerMib.setLastUpdated('201604131355Z') if mibBuilder.loadTexts: hiPathWirelessControllerMib.setOrganization('Chantry Networks Inc.') if mibBuilder.loadTexts: hiPathWirelessControllerMib.setContactInfo('Chantry Networks, Inc. 55 Commerce Valley Drive (W), Suite 400 Thornhill, Ontario L3T 7V9, Canada Phone: 1-289-695-3182 Fax: 1 289-695-3299') if mibBuilder.loadTexts: hiPathWirelessControllerMib.setDescription('The access controller MIB') class Logeventseverity(TextualConvention, Integer32): description = 'The log event severities used in the access controller.' status = 'current' subtype_spec = Integer32.subtypeSpec + constraints_union(single_value_constraint(1, 2, 3, 4, 5)) named_values = named_values(('critical', 1), ('major', 2), ('minor', 3), ('information', 4), ('trace', 5)) class Hundredthofgauge64(TextualConvention, Counter64): description = 'This textual convention represents a hundredth of a 64-bit gauge number.' status = 'current' display_hint = 'd-2' class Hundredthofgauge32(TextualConvention, Gauge32): description = 'This textual convention represents a hundredth of a gauge number.' status = 'current' display_hint = 'd-2' class Hundredthofint32(TextualConvention, Integer32): description = 'This textual convention represents a hundredth of an integer number.' status = 'current' display_hint = 'd-2' hi_path_wireless_controller = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2)) system_objects = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1)) sys_software_version = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 1), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: sysSoftwareVersion.setStatus('current') if mibBuilder.loadTexts: sysSoftwareVersion.setDescription('System software version.') sys_log_level = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 2), log_event_severity()).setMaxAccess('readwrite') if mibBuilder.loadTexts: sysLogLevel.setStatus('current') if mibBuilder.loadTexts: sysLogLevel.setDescription('Sets the level of events which are written to the system log.') sys_serial_no = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 3), octet_string().subtype(subtypeSpec=value_size_constraint(0, 64))).setMaxAccess('readonly') if mibBuilder.loadTexts: sysSerialNo.setStatus('current') if mibBuilder.loadTexts: sysSerialNo.setDescription('System serial number.') sys_log_support = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 4)) hi_path_wireless_app_log_facility = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 4, 1), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3, 4, 5, 6))).clone(namedValues=named_values(('local0', 0), ('local1', 1), ('local2', 2), ('local3', 3), ('local4', 4), ('local5', 5), ('local6', 6)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: hiPathWirelessAppLogFacility.setStatus('current') if mibBuilder.loadTexts: hiPathWirelessAppLogFacility.setDescription('The application log facility level for syslog.') service_log_facility = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 4, 2), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3, 4, 5, 6))).clone(namedValues=named_values(('local0', 0), ('local1', 1), ('local2', 2), ('local3', 3), ('local4', 4), ('local5', 5), ('local6', 6)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: serviceLogFacility.setStatus('current') if mibBuilder.loadTexts: serviceLogFacility.setDescription('The service log facility level for syslog.') include_all_service_messages = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 4, 3), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: includeAllServiceMessages.setStatus('current') if mibBuilder.loadTexts: includeAllServiceMessages.setDescription('Indicates if DHCP messages should also be forwarded to syslog.') sys_log_servers_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 4, 4)) if mibBuilder.loadTexts: sysLogServersTable.setStatus('current') if mibBuilder.loadTexts: sysLogServersTable.setDescription('Table of syslog servers to forward logging messages.') sys_log_servers_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 4, 4, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'sysLogServerIndex')) if mibBuilder.loadTexts: sysLogServersEntry.setStatus('current') if mibBuilder.loadTexts: sysLogServersEntry.setDescription('Configuration information for an external syslog server.') sys_log_server_index = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 4, 4, 1, 1), integer32().subtype(subtypeSpec=value_range_constraint(1, 2147483647))).setMaxAccess('readwrite') if mibBuilder.loadTexts: sysLogServerIndex.setStatus('current') if mibBuilder.loadTexts: sysLogServerIndex.setDescription('Table index for the syslog server.') sys_log_server_enabled = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 4, 4, 1, 2), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: sysLogServerEnabled.setStatus('current') if mibBuilder.loadTexts: sysLogServerEnabled.setDescription('Indicates if messages are to be sent to the syslog server.') sys_log_server_ip = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 4, 4, 1, 3), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: sysLogServerIP.setStatus('current') if mibBuilder.loadTexts: sysLogServerIP.setDescription('syslog server IP address.') sys_log_server_port = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 4, 4, 1, 4), integer32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: sysLogServerPort.setStatus('current') if mibBuilder.loadTexts: sysLogServerPort.setDescription('syslog server port number.') sys_log_server_row_status = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 4, 4, 1, 5), row_status()).setMaxAccess('readwrite') if mibBuilder.loadTexts: sysLogServerRowStatus.setStatus('current') if mibBuilder.loadTexts: sysLogServerRowStatus.setDescription('RowStatus for operating on syslogServersTable.') sys_cpu_type = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 5), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: sysCPUType.setStatus('current') if mibBuilder.loadTexts: sysCPUType.setDescription("Wireless controller's CPU type") ap_log_management = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 6)) ap_log_collection_enable = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 6, 1), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apLogCollectionEnable.setStatus('current') if mibBuilder.loadTexts: apLogCollectionEnable.setDescription('If this field is set to true, then the AP log collection feature is enabled.') ap_log_frequency = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 6, 2), integer32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apLogFrequency.setStatus('current') if mibBuilder.loadTexts: apLogFrequency.setDescription('Number of log collections performed daily. The number must be one of the following 1, 2, 4, 6.') ap_log_destination = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 6, 3), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2))).clone(namedValues=named_values(('local', 0), ('flash', 1), ('remote', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: apLogDestination.setStatus('current') if mibBuilder.loadTexts: apLogDestination.setDescription('Destination where the log file will be stored. If the local flash is not mounted, then you can not select 1. 0 : local memory. 1 : flash. 2 : remote location. ') ap_log_ft_protocol = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 6, 4), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('ftp', 0), ('scp', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: apLogFTProtocol.setStatus('current') if mibBuilder.loadTexts: apLogFTProtocol.setDescription('File transfer protocol. This field has meaning only when apLogDestination is set to remote(2). 0 : ftp. 1 : scp.') ap_log_server_ip = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 6, 5), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apLogServerIP.setStatus('current') if mibBuilder.loadTexts: apLogServerIP.setDescription('The IP address of the remote server. This field has meaning only when apLogDestination is set to remote(2).') ap_log_user_id = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 6, 6), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apLogUserId.setStatus('current') if mibBuilder.loadTexts: apLogUserId.setDescription('The user ID that is used for access to the remote server. This field has meaning only when apLogDestination is set to remote(2).') ap_log_password = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 6, 7), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apLogPassword.setStatus('current') if mibBuilder.loadTexts: apLogPassword.setDescription('The user password that is used for access to the remote server. This field has meaning only when apLogDestination is set to remote(2). This field can only be viewed in SNMPv3 mode with privacy.') ap_log_directory = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 6, 8), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apLogDirectory.setStatus('current') if mibBuilder.loadTexts: apLogDirectory.setDescription('The directory of the remote server. This field has meaning only when apLogDestination is set to remote(2).') ap_log_selected_a_ps_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 6, 9)) if mibBuilder.loadTexts: apLogSelectedAPsTable.setStatus('current') if mibBuilder.loadTexts: apLogSelectedAPsTable.setDescription('Table containing a list of APs for which log collection is supported.') ap_log_selected_a_ps_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 6, 9, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'apSerialNo')) if mibBuilder.loadTexts: apLogSelectedAPsEntry.setStatus('current') if mibBuilder.loadTexts: apLogSelectedAPsEntry.setDescription('Configuration information of an AP which supports the AP log feature.') ap_serial_no = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 6, 9, 1, 1), octet_string().subtype(subtypeSpec=value_size_constraint(16, 16)).setFixedLength(16)) if mibBuilder.loadTexts: apSerialNo.setStatus('current') if mibBuilder.loadTexts: apSerialNo.setDescription("Table index for the apLogSelectedAPs. The AP's serial number serves as the index.") select = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 6, 9, 1, 2), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: select.setStatus('current') if mibBuilder.loadTexts: select.setDescription('Indicates whether logs are collected from the AP.') ap_log_quick_selected_option = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 6, 10), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3, 4, 5, 6))).clone(namedValues=named_values(('unknown', 0), ('addAll', 1), ('addAllLocal', 2), ('addAllForeign', 3), ('removeAll', 4), ('removeAllLocal', 5), ('removeAllForeign', 6)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: apLogQuickSelectedOption.setStatus('current') if mibBuilder.loadTexts: apLogQuickSelectedOption.setDescription("This is a quick select option for the user to perform the AP's bulk selection. This field is write-only and read access returns unknown(0) value. 0 : unknown. 1 : add all APs. 2 : add all local APs. 3 : add all foreign APs. 4 : remove all APs. 5 : remove all local APs. 6 : remove all foreign APs.") ap_log_file_utility = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7)) ap_log_file_utility_limit = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7, 1), unsigned32().subtype(subtypeSpec=value_range_constraint(0, 4294967295))).setMaxAccess('readonly') if mibBuilder.loadTexts: apLogFileUtilityLimit.setStatus('current') if mibBuilder.loadTexts: apLogFileUtilityLimit.setDescription('The maximum number of AP log file copy requests that can be held in the apLogFileCopyTable. A value of 0 indicates no configured limit.') ap_log_file_utility_current = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7, 2), gauge32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apLogFileUtilityCurrent.setStatus('current') if mibBuilder.loadTexts: apLogFileUtilityCurrent.setDescription('The number of AP log file copy requests currently in the apLogFileCopyTable.') ap_log_file_copy_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7, 5)) if mibBuilder.loadTexts: apLogFileCopyTable.setStatus('current') if mibBuilder.loadTexts: apLogFileCopyTable.setDescription('List of AP log file copy requests.') ap_log_file_copy_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7, 5, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'apLogFileCopyIndex')) if mibBuilder.loadTexts: apLogFileCopyEntry.setStatus('current') if mibBuilder.loadTexts: apLogFileCopyEntry.setDescription('An entry describing the AP log file copy request.') ap_log_file_copy_index = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7, 5, 1, 1), unsigned32().subtype(subtypeSpec=value_range_constraint(1, 4294967295))) if mibBuilder.loadTexts: apLogFileCopyIndex.setStatus('current') if mibBuilder.loadTexts: apLogFileCopyIndex.setDescription('The index for this AP log file copy request.') ap_log_file_copy_destination = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7, 5, 1, 2), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('flash', 1), ('remoteServer', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: apLogFileCopyDestination.setStatus('current') if mibBuilder.loadTexts: apLogFileCopyDestination.setDescription('Destination where the log file will be copied. If the local flash is not mounted, then you can not select 1. 1 : copy the local AP log file to flash. 2 : copy the local AP log file to remote server. ') ap_log_file_copy_protocol = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7, 5, 1, 3), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('ftp', 0), ('scp', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: apLogFileCopyProtocol.setStatus('current') if mibBuilder.loadTexts: apLogFileCopyProtocol.setDescription('File transfer protocol to be used to copy the log file. 0 : ftp. 1 : scp.') ap_log_file_copy_server_ip = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7, 5, 1, 4), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apLogFileCopyServerIP.setStatus('current') if mibBuilder.loadTexts: apLogFileCopyServerIP.setDescription('The IP address of the remote server.') ap_log_file_copy_user_id = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7, 5, 1, 5), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apLogFileCopyUserID.setStatus('current') if mibBuilder.loadTexts: apLogFileCopyUserID.setDescription('The user ID that is used for access to the remote server.') ap_log_file_copy_password = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7, 5, 1, 6), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apLogFileCopyPassword.setStatus('current') if mibBuilder.loadTexts: apLogFileCopyPassword.setDescription('The user password that is used for access to the remote server. This field can only be viewed in SNMPv3 mode with privacy.') ap_log_file_copy_server_directory = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7, 5, 1, 7), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apLogFileCopyServerDirectory.setStatus('current') if mibBuilder.loadTexts: apLogFileCopyServerDirectory.setDescription('The directory on the remote server.') ap_log_file_copy_operation = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7, 5, 1, 8), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1))).clone(namedValues=named_values(('start', 1)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: apLogFileCopyOperation.setStatus('current') if mibBuilder.loadTexts: apLogFileCopyOperation.setDescription('If this field is set to 1, then the controller will start to perform the copy action.') ap_log_file_copy_operation_status = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7, 5, 1, 9), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3, 4, 5))).clone(namedValues=named_values(('inactive', 1), ('pending', 2), ('running', 3), ('success', 4), ('failure', 5)))).setMaxAccess('readonly') if mibBuilder.loadTexts: apLogFileCopyOperationStatus.setStatus('current') if mibBuilder.loadTexts: apLogFileCopyOperationStatus.setDescription('The operational state of the AP log file copy request. inactive - Indicates that the RowStatus of this conceptual row is not in the `active` state. pending - Indicates that the AP log file copy described by this row is ready to run and waiting in a queue. running - Indicates that the AP log file copy described by this row is running. success - Indicates that the AP log file copy described by this row has successfully run to completion. failure - Indicates that the AP log file copy described by this row has failed to run to completion.') ap_log_file_copy_row_status = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 1, 7, 5, 1, 10), row_status()).setMaxAccess('readcreate') if mibBuilder.loadTexts: apLogFileCopyRowStatus.setStatus('current') if mibBuilder.loadTexts: apLogFileCopyRowStatus.setDescription('Row status variable for row operations on the apLogFileCopyTable.') dns_objects = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 2)) primary_dns = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 2, 1), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: primaryDNS.setStatus('current') if mibBuilder.loadTexts: primaryDNS.setDescription('Primary DNS address configured in the Controller.') secondary_dns = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 2, 2), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: secondaryDNS.setStatus('current') if mibBuilder.loadTexts: secondaryDNS.setDescription('Secondary DNS address configured in the Controller.') tertiary_dns = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 2, 3), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: tertiaryDNS.setStatus('current') if mibBuilder.loadTexts: tertiaryDNS.setDescription('Third DNS address configured in the Controller.') mgmt_port_objects = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 3)) mgmt_port_if_index = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 3, 1), integer32()).setMaxAccess('readonly') if mibBuilder.loadTexts: mgmtPortIfIndex.setStatus('current') if mibBuilder.loadTexts: mgmtPortIfIndex.setDescription('ifIndex of the management port.') mgmt_port_hostname = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 3, 2), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: mgmtPortHostname.setStatus('current') if mibBuilder.loadTexts: mgmtPortHostname.setDescription('Hostname of the management port.') mgmt_port_domain = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 3, 5), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: mgmtPortDomain.setStatus('current') if mibBuilder.loadTexts: mgmtPortDomain.setDescription('Domain of the management port.') physical_port_objects = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4)) physical_port_count = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 1), integer32()).setMaxAccess('readonly') if mibBuilder.loadTexts: physicalPortCount.setStatus('current') if mibBuilder.loadTexts: physicalPortCount.setDescription('Number of rows in routerPortsTable.') physical_ports_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2)) if mibBuilder.loadTexts: physicalPortsTable.setStatus('deprecated') if mibBuilder.loadTexts: physicalPortsTable.setDescription('Table of router ports on the controller.') physical_ports_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1)).setIndexNames((0, 'IF-MIB', 'ifIndex')) if mibBuilder.loadTexts: physicalPortsEntry.setStatus('deprecated') if mibBuilder.loadTexts: physicalPortsEntry.setDescription('An entry in routerPortsTable.') port_mgmt_traffic_enable = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 1), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: portMgmtTrafficEnable.setStatus('deprecated') if mibBuilder.loadTexts: portMgmtTrafficEnable.setDescription('Determines whether controller management network traffic is allowed over this interface.') port_duplex_mode = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 2), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3))).clone(namedValues=named_values(('full', 1), ('half', 2), ('auto', 3)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: portDuplexMode.setStatus('deprecated') if mibBuilder.loadTexts: portDuplexMode.setDescription('Duplex mode for the esa ports.') port_function = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 3), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3))).clone(namedValues=named_values(('router', 1), ('host', 2), ('thirdPartyAP', 3)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: portFunction.setStatus('deprecated') if mibBuilder.loadTexts: portFunction.setDescription('Specifies the behavior of the EWC physical ports.') port_enabled = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 4), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('enabled', 1), ('disabled', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: portEnabled.setStatus('deprecated') if mibBuilder.loadTexts: portEnabled.setDescription('If enabled, the interface administratively is enabled.') port_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 5), octet_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: portName.setStatus('deprecated') if mibBuilder.loadTexts: portName.setDescription('A textual string containing information about the port.') port_ip_address = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 6), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: portIpAddress.setStatus('deprecated') if mibBuilder.loadTexts: portIpAddress.setDescription('The IP address of this port.') port_mask = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 7), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: portMask.setStatus('deprecated') if mibBuilder.loadTexts: portMask.setDescription('The subnet mask associated with the IP address of this port.') port_mac_address = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 8), mac_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: portMacAddress.setStatus('deprecated') if mibBuilder.loadTexts: portMacAddress.setDescription("Port's MAC address.") port_vlan_id = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 9), integer32().subtype(subtypeSpec=value_range_constraint(-1, 4094)).clone(-1)).setMaxAccess('readwrite') if mibBuilder.loadTexts: portVlanID.setStatus('deprecated') if mibBuilder.loadTexts: portVlanID.setDescription('External VLAN tag for the physical port for trasmitted and received packets. Value ranges: (-1) it is not tagged, zero(0) means reserved, 1-4094 tag value.') port_dhcp_enable = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 10), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: portDHCPEnable.setStatus('deprecated') if mibBuilder.loadTexts: portDHCPEnable.setDescription('If enabled, the controller is configured as default DHCP server for AP.') port_dhcp_gateway = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 11), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: portDHCPGateway.setStatus('deprecated') if mibBuilder.loadTexts: portDHCPGateway.setDescription('Gateway address to be supplied to the wireless clients if controller is configured as default DHCP server for AP.') port_dhcp_domain = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 12), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: portDHCPDomain.setStatus('deprecated') if mibBuilder.loadTexts: portDHCPDomain.setDescription('Domain name to be supplied to the wireless clients if controller is configured as default DHCP server for AP.') port_dhcp_default_lease = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 13), integer32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: portDHCPDefaultLease.setStatus('deprecated') if mibBuilder.loadTexts: portDHCPDefaultLease.setDescription('Default DHCP lease time in seconds to be supplied to the wireless clients if controller is configured as default DHCP server for AP.') port_dhcp_max_lease = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 14), integer32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: portDHCPMaxLease.setStatus('deprecated') if mibBuilder.loadTexts: portDHCPMaxLease.setDescription('Maximum DHCP lease time in seconds to be supplied to the wireless clients if controller is configured as default DHCP server for AP.') port_dhcp_dns_servers = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 15), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: portDHCPDnsServers.setStatus('deprecated') if mibBuilder.loadTexts: portDHCPDnsServers.setDescription('List of DNSs to be supplied to the wireless clients if controller is configured as default DHCP server for AP.') port_dhcp_wins = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 2, 1, 16), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: portDHCPWins.setStatus('deprecated') if mibBuilder.loadTexts: portDHCPWins.setDescription('List of WINSs to be supplied to the wireless clients if controller is configured as default DHCP server for AP.') physical_ports_internal_vlan_id = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 3), integer32().subtype(subtypeSpec=value_range_constraint(-1, 4094)).clone(1)).setMaxAccess('readwrite') if mibBuilder.loadTexts: physicalPortsInternalVlanID.setStatus('current') if mibBuilder.loadTexts: physicalPortsInternalVlanID.setDescription('Internal VLAN tag to be used for physical ports for which the exernal VLAN tag have not been configured. Value ranges: (-1) it is not tagged, zero(0) means reserved, 1-4094 tag value.') physical_flash = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 4), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('mounted', 1), ('unmounted', 2)))).setMaxAccess('readonly') if mibBuilder.loadTexts: physicalFlash.setStatus('current') if mibBuilder.loadTexts: physicalFlash.setDescription('Flash drive status.') phy_dhcp_range_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 5)) if mibBuilder.loadTexts: phyDHCPRangeTable.setStatus('deprecated') if mibBuilder.loadTexts: phyDHCPRangeTable.setDescription('phyDHCPRangeTable contains the IP address ranges that DHCP will serve to clients associated with physical ports.') phy_dhcp_range_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 5, 1)).setIndexNames((0, 'IF-MIB', 'ifIndex'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'phyDHCPRangeIndex')) if mibBuilder.loadTexts: phyDHCPRangeEntry.setStatus('deprecated') if mibBuilder.loadTexts: phyDHCPRangeEntry.setDescription('Configuration information for a DHCP range.') phy_dhcp_range_index = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 5, 1, 1), integer32().subtype(subtypeSpec=value_range_constraint(1, 2147483647))).setMaxAccess('readwrite') if mibBuilder.loadTexts: phyDHCPRangeIndex.setStatus('deprecated') if mibBuilder.loadTexts: phyDHCPRangeIndex.setDescription('Index for the DHCP row element.') phy_dhcp_range_start = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 5, 1, 2), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: phyDHCPRangeStart.setStatus('deprecated') if mibBuilder.loadTexts: phyDHCPRangeStart.setDescription('First IP address in the range.') phy_dhcp_range_end = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 5, 1, 3), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: phyDHCPRangeEnd.setStatus('deprecated') if mibBuilder.loadTexts: phyDHCPRangeEnd.setDescription('Last IP address in the range.') phy_dhcp_range_type = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 5, 1, 4), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('inclusion', 1), ('exclusion', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: phyDHCPRangeType.setStatus('deprecated') if mibBuilder.loadTexts: phyDHCPRangeType.setDescription('Determines whether addresses in the specified range will be included, or excluded by the DHCP server.') phy_dhcp_range_status = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 5, 1, 5), row_status()).setMaxAccess('readwrite') if mibBuilder.loadTexts: phyDHCPRangeStatus.setStatus('deprecated') if mibBuilder.loadTexts: phyDHCPRangeStatus.setDescription('Row status variable for row operations on the phyDHCPRangeTable') layer_two_port_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 6)) if mibBuilder.loadTexts: layerTwoPortTable.setStatus('current') if mibBuilder.loadTexts: layerTwoPortTable.setDescription('This table contains all layer two ports.') layer_two_port_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 6, 1)).setIndexNames((0, 'IF-MIB', 'ifIndex')) if mibBuilder.loadTexts: layerTwoPortEntry.setStatus('current') if mibBuilder.loadTexts: layerTwoPortEntry.setDescription('Entry for a layer two port.') layer_two_port_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 6, 1, 1), display_string().subtype(subtypeSpec=value_size_constraint(1, 32))).setMaxAccess('readonly') if mibBuilder.loadTexts: layerTwoPortName.setStatus('current') if mibBuilder.loadTexts: layerTwoPortName.setDescription('Text string identifying the port within the controller.') layer_two_port_mgmt_state = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 6, 1, 2), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disabled', 0), ('enabled', 1))).clone('enabled')).setMaxAccess('readwrite') if mibBuilder.loadTexts: layerTwoPortMgmtState.setStatus('current') if mibBuilder.loadTexts: layerTwoPortMgmtState.setDescription('This value indicates administrator state of the port. ') layer_two_port_mac_address = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 6, 1, 3), mac_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: layerTwoPortMacAddress.setStatus('current') if mibBuilder.loadTexts: layerTwoPortMacAddress.setDescription("Port's MAC address.") jumbo_frames = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 4, 7), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disabled', 0), ('enabled', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: jumboFrames.setStatus('current') if mibBuilder.loadTexts: jumboFrames.setDescription('Enables support for frames up to 1800 bytes long. jumboFrames support only applies to the controller and compatible APs.') vn_manager_objects = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 5)) vn_role = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 5, 1), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3))).clone(namedValues=named_values(('none', 1), ('vnMgr', 2), ('vnAgent', 3)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnRole.setStatus('current') if mibBuilder.loadTexts: vnRole.setDescription('Specifies the role of this EWC in inter-EWC mobility. None indicates that mobile units cannot roam to or from this EWC. In any EWC cluster, only one EWC should be specified as vnMgr, all others should be have vnRole = vnAgent.') vn_if_index = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 5, 2), integer32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnIfIndex.setStatus('current') if mibBuilder.loadTexts: vnIfIndex.setDescription('ifIndex of the physical port where inter-EWC tunnels terminate. This field has meaning if vnRole is not none(1)') vn_heartbeat_interval = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 5, 3), integer32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnHeartbeatInterval.setStatus('current') if mibBuilder.loadTexts: vnHeartbeatInterval.setDescription('The time interval between inter-EWC polling messages. This field has meaning if vnRole is not none(1)') vn_local_clients = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 5, 4), counter32()).setMaxAccess('readonly') if mibBuilder.loadTexts: vnLocalClients.setStatus('current') if mibBuilder.loadTexts: vnLocalClients.setDescription('Number of locally associated clients to this controller that is considered to be their home controller in the mobility zone, which this controller is part of.') vn_foreign_clients = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 5, 5), counter32()).setMaxAccess('readonly') if mibBuilder.loadTexts: vnForeignClients.setStatus('current') if mibBuilder.loadTexts: vnForeignClients.setDescription('Number of clients that have registered with another controller in the mobility zone, which this controller is part of, and currently have roamed to this controller.') vn_total_clients = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 5, 6), counter32()).setMaxAccess('readonly') if mibBuilder.loadTexts: vnTotalClients.setStatus('current') if mibBuilder.loadTexts: vnTotalClients.setDescription('Number of local and foreign clients on this controller in the Mobility zone.') ntp_objects = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 6)) ntp_enabled = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 6, 1), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ntpEnabled.setStatus('current') if mibBuilder.loadTexts: ntpEnabled.setDescription('Enable or disables support for the Network Time Protocol (NTP).') ntp_timezone = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 6, 2), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ntpTimezone.setStatus('current') if mibBuilder.loadTexts: ntpTimezone.setDescription('Specifies the time zone where this EWC resides.') ntp_time_server1 = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 6, 3), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ntpTimeServer1.setStatus('current') if mibBuilder.loadTexts: ntpTimeServer1.setDescription('Primary NTP server.') ntp_time_server2 = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 6, 4), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ntpTimeServer2.setStatus('current') if mibBuilder.loadTexts: ntpTimeServer2.setDescription('Secondary NTP server.') ntp_time_server3 = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 6, 5), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ntpTimeServer3.setStatus('current') if mibBuilder.loadTexts: ntpTimeServer3.setDescription('Tertiary NTP server.') ntp_server_enabled = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 6, 6), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: ntpServerEnabled.setStatus('current') if mibBuilder.loadTexts: ntpServerEnabled.setDescription('Enable or disables support for controller as NTP server.') controller_stats = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7)) tunnels_tx_rx_bytes = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 1), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: tunnelsTxRxBytes.setStatus('current') if mibBuilder.loadTexts: tunnelsTxRxBytes.setDescription('Sum of transmitted and received bytes over all existing tunnels.') tunnel_count = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 6), integer32()).setMaxAccess('readonly') if mibBuilder.loadTexts: tunnelCount.setStatus('current') if mibBuilder.loadTexts: tunnelCount.setDescription('Number of connections to other WirelessController controllers.') tunnel_stats_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 7)) if mibBuilder.loadTexts: tunnelStatsTable.setStatus('current') if mibBuilder.loadTexts: tunnelStatsTable.setDescription('tunnelStatsTable contains a list of the IP tunnels connected to this EWC for use in inter-EWC mobility.') tunnel_stats_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 7, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'tunnelStartIP'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'tunnelEndIP')) if mibBuilder.loadTexts: tunnelStatsEntry.setStatus('current') if mibBuilder.loadTexts: tunnelStatsEntry.setDescription('Statistics for a mobility tunnel.') tunnel_start_ip = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 7, 1, 1), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: tunnelStartIP.setStatus('current') if mibBuilder.loadTexts: tunnelStartIP.setDescription('IP address for the start of the tunnel.') tunnel_start_hwc = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 7, 1, 2), octet_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: tunnelStartHWC.setStatus('current') if mibBuilder.loadTexts: tunnelStartHWC.setDescription('Name of the access controller for the start of the tunnel.') tunnel_end_ip = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 7, 1, 3), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: tunnelEndIP.setStatus('current') if mibBuilder.loadTexts: tunnelEndIP.setDescription('IP address for the end of the tunnel.') tunnel_end_hwc = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 7, 1, 4), octet_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: tunnelEndHWC.setStatus('current') if mibBuilder.loadTexts: tunnelEndHWC.setDescription('Name of the access controller for the end of the tunnel.') tunnel_status = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 7, 1, 5), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('disconnected', 1), ('connected', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: tunnelStatus.setStatus('current') if mibBuilder.loadTexts: tunnelStatus.setDescription('Indicates if the mobility tunnel is up or down.') tunnel_stats_tx_bytes = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 7, 1, 6), counter32()).setMaxAccess('readonly') if mibBuilder.loadTexts: tunnelStatsTxBytes.setStatus('current') if mibBuilder.loadTexts: tunnelStatsTxBytes.setDescription('Number of bytes have been transmitted from the controller at the start of the tunnel to the controller on the other end of the tunnel.') tunnel_stats_rx_bytes = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 7, 1, 7), counter32()).setMaxAccess('readonly') if mibBuilder.loadTexts: tunnelStatsRxBytes.setStatus('current') if mibBuilder.loadTexts: tunnelStatsRxBytes.setDescription('Number of bytes have been received by the controller at the end of the tunnel from the controller at the start of the tunnel.') tunnel_stats_tx_rx_bytes = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 7, 1, 8), counter32()).setMaxAccess('readonly') if mibBuilder.loadTexts: tunnelStatsTxRxBytes.setStatus('current') if mibBuilder.loadTexts: tunnelStatsTxRxBytes.setDescription('Sum of transmitted and received bytes over this tunnel.') clear_access_reject_msg = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 8), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1))).clone(namedValues=named_values(('clear', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: clearAccessRejectMsg.setStatus('current') if mibBuilder.loadTexts: clearAccessRejectMsg.setDescription('Set this OID to one to erase the contents of the accessRejectMessage table. The OID always returns 0 when read.') access_reject_msg_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 9)) if mibBuilder.loadTexts: accessRejectMsgTable.setStatus('current') if mibBuilder.loadTexts: accessRejectMsgTable.setDescription('This table lists each of the reply messages returned in RADIUS Access-Reject messages and for each reply message, a count of the number of times it has been received.') access_reject_msg_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 9, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'armIndex')) if mibBuilder.loadTexts: accessRejectMsgEntry.setStatus('current') if mibBuilder.loadTexts: accessRejectMsgEntry.setDescription('One entry consisting of a unique Access-Reject Reply-Message (accessRejectReplyMessage) and count of this message.') arm_index = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 9, 1, 1), integer32().subtype(subtypeSpec=value_range_constraint(1, 100))) if mibBuilder.loadTexts: armIndex.setStatus('current') if mibBuilder.loadTexts: armIndex.setDescription('A number uniquely identifying each conceptual row in the accessRejectMsgTable. ') arm_count = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 9, 1, 2), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: armCount.setStatus('current') if mibBuilder.loadTexts: armCount.setDescription('Count of the number of times the controller has received an Access-Reject response from a RADIUS server that contained the associated armReplyMessage.') arm_reply_message = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 7, 9, 1, 3), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: armReplyMessage.setStatus('current') if mibBuilder.loadTexts: armReplyMessage.setDescription('A reply message attribute received by the controller from a RADIUS server in an Access-Reject message.') availability = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 8)) availability_status = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 8, 1), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('standalone', 0), ('paired', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: availabilityStatus.setStatus('current') if mibBuilder.loadTexts: availabilityStatus.setDescription('This field can be used to enable or disable availability. If it is set to paired(1), then availability is enabled on this controller, otherwise it is considered that the controller operates in stand-alone mode. All other availability fields have no meaning if this field is set to standalone(0).') pair_ip_address = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 8, 2), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: pairIPAddress.setStatus('current') if mibBuilder.loadTexts: pairIPAddress.setDescription('IP address of paired controller in availability pairing mode.') hwc_availability_rank = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 8, 3), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2))).clone(namedValues=named_values(('notConfigured', 0), ('secondary', 1), ('primary', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: hwcAvailabilityRank.setStatus('current') if mibBuilder.loadTexts: hwcAvailabilityRank.setDescription('Rank of controller in Availability pairing mode. This is legacy field and applies to releases before 5.x and in current releases it is used for reporting only.') fast_failover = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 8, 4), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disabled', 0), ('enabled', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: fastFailover.setStatus('current') if mibBuilder.loadTexts: fastFailover.setDescription('Enables or disables fast failover when controller operates in Availability pairing mode.') detect_link_failure = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 8, 5), unsigned32().subtype(subtypeSpec=value_range_constraint(2, 30)).clone(10)).setUnits('seconds').setMaxAccess('readwrite') if mibBuilder.loadTexts: detectLinkFailure.setStatus('current') if mibBuilder.loadTexts: detectLinkFailure.setDescription('Time to detect link failure between two controllers in availability pairing. The value can be set to values between 2-30 seconds') synchronize_system_config = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 8, 6), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: synchronizeSystemConfig.setStatus('current') if mibBuilder.loadTexts: synchronizeSystemConfig.setDescription('If this flag is set to enabled then system configuration is synchronized between paired controllers operating in Availabilty pairing mode.') synchronize_guest_port = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 8, 7), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: synchronizeGuestPort.setStatus('current') if mibBuilder.loadTexts: synchronizeGuestPort.setDescription('If this flag is set to enabled then Guest Portal user accounts are synchronized between paired controllers operating in Availabilty pairing mode.') secure_connection = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 9)) weak_cipher_enable = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 9, 1), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disable', 0), ('enable', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: weakCipherEnable.setStatus('current') if mibBuilder.loadTexts: weakCipherEnable.setDescription('By default usage of weak cipher is enabled on EWC. Weak cipher can be disabled using this field. ') dashboard = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10)) licensing_information = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 1)) license_regulatory_domain = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 1, 1), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: licenseRegulatoryDomain.setStatus('current') if mibBuilder.loadTexts: licenseRegulatoryDomain.setDescription('Regulatory domain that this wireless controller system has been licensed for to operate.') license_type = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 1, 2), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('permanent', 1), ('temporary', 2)))).setMaxAccess('readonly') if mibBuilder.loadTexts: licenseType.setStatus('current') if mibBuilder.loadTexts: licenseType.setDescription('Type of license for the controller. Temporary lincese allows controller to operate within defined number of days after which a permanent license is required for the operation of the controller system.') license_days_remaining = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 1, 3), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: licenseDaysRemaining.setStatus('current') if mibBuilder.loadTexts: licenseDaysRemaining.setDescription('Number of days is left for the temporary license to expire. This value has meaning if the license type is temporary(1).') license_available_ap = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 1, 4), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: licenseAvailableAP.setStatus('current') if mibBuilder.loadTexts: licenseAvailableAP.setDescription('If licenseMode is standAlone, this is the maximum number of APs that can be active on the controller without violating the licensing agreement. If licenseMode is availabilityPaired, this is the maximum number of APs that can be active on both members of the availability pair without violating the licensing agreement.') license_in_service_radar_ap = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 1, 5), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: licenseInServiceRadarAP.setStatus('current') if mibBuilder.loadTexts: licenseInServiceRadarAP.setDescription('If licenseMode is standalone this is the maximum number of APs that can be active on this controller and can operate as Guardians or in-service Radar APs without violating the licensing agreement. If licenseMode is availabilityPaired, this is the maximum number of APs that can be active on both members of the availability pair and can operate as Guardians or in-service Radar APs without violating the licensing agreement.') license_mode = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 1, 6), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('standAlone', 1), ('availabilityPaired', 2)))).setMaxAccess('readonly') if mibBuilder.loadTexts: licenseMode.setStatus('current') if mibBuilder.loadTexts: licenseMode.setDescription('License mode determines how to interpret the license capacity OIDs. licenseMode is standalone if the controller is not part of an availability pair. licenseMode is availabilityPaired if the controller is part of an availability pair.') license_local_ap = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 1, 7), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: licenseLocalAP.setStatus('current') if mibBuilder.loadTexts: licenseLocalAP.setDescription('The total number of AP capacity licenses installed on this controller. ') license_foreign_ap = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 1, 8), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: licenseForeignAP.setStatus('current') if mibBuilder.loadTexts: licenseForeignAP.setDescription("The total number of AP capacity licenses installed on this controller's availability partner.") license_local_radar_ap = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 1, 9), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: licenseLocalRadarAP.setStatus('current') if mibBuilder.loadTexts: licenseLocalRadarAP.setDescription('The total number of AP Radar capacity licenses installed on this controller.') license_foreign_radar_ap = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 1, 10), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: licenseForeignRadarAP.setStatus('current') if mibBuilder.loadTexts: licenseForeignRadarAP.setDescription("The total number of AP Radar capacity licenses installed on this controller's availability partner. ") stations_by_protocol = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 2)) stations_by_protocol_a = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 2, 1), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: stationsByProtocolA.setStatus('current') if mibBuilder.loadTexts: stationsByProtocolA.setDescription('Number of stations using 802.11a mode to access the network.') stations_by_protocol_b = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 2, 2), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: stationsByProtocolB.setStatus('current') if mibBuilder.loadTexts: stationsByProtocolB.setDescription('Number of stations using 802.11b mode to access the network.') stations_by_protocol_g = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 2, 3), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: stationsByProtocolG.setStatus('current') if mibBuilder.loadTexts: stationsByProtocolG.setDescription('Number of stations using 802.11b mode to access the network.') stations_by_protocol_n24 = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 2, 4), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: stationsByProtocolN24.setStatus('current') if mibBuilder.loadTexts: stationsByProtocolN24.setDescription('Number of stations using 802.11n mode with frequency of 2.4Gig to access the network.') stations_by_protocol_n5 = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 2, 5), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: stationsByProtocolN5.setStatus('current') if mibBuilder.loadTexts: stationsByProtocolN5.setDescription('Number of stations using 802.11n mode with frequency of 5Gig to access the network.') stations_by_protocol_unavailable = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 2, 6), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: stationsByProtocolUnavailable.setStatus('current') if mibBuilder.loadTexts: stationsByProtocolUnavailable.setDescription('The total number of stations with sessions on this controller for which the 802.11 protocol type (a, b, g, n, ac) for which the protocol could not be determined.') stations_by_protocol_error = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 2, 7), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: stationsByProtocolError.setStatus('current') if mibBuilder.loadTexts: stationsByProtocolError.setDescription("The total number of stations with sessions on this controller for which an AP reported an invalid (out of range) value as the station's 802.11 protocol type.") stations_by_protocol_ac = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 2, 8), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: stationsByProtocolAC.setStatus('current') if mibBuilder.loadTexts: stationsByProtocolAC.setDescription('Number of stations using 802.11ac mode to access the network.') ap_by_channel_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 3)) if mibBuilder.loadTexts: apByChannelTable.setStatus('current') if mibBuilder.loadTexts: apByChannelTable.setDescription('List of aggregated access points that are operating on a specific wireless channels.') ap_by_channel_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 3, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'apByChannelNumber')) if mibBuilder.loadTexts: apByChannelEntry.setStatus('current') if mibBuilder.loadTexts: apByChannelEntry.setDescription('An entry in this table for one wireless channel and aggregated access point on that channel.') ap_by_channel_number = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 3, 1, 1), unsigned32()) if mibBuilder.loadTexts: apByChannelNumber.setStatus('current') if mibBuilder.loadTexts: apByChannelNumber.setDescription("The channel on which a set of access points are presently operating. If this number is 0, this means the AP is in Guardian mode or the AP's radios are turned off.") ap_by_channel_a_ps = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 2, 10, 3, 1, 2), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apByChannelAPs.setStatus('current') if mibBuilder.loadTexts: apByChannelAPs.setDescription('Total number of the access point on the channel that this row is indexed on.') virtual_networks = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3)) vns_config_objects = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1)) vns_count = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 1), integer32()).setMaxAccess('readonly') if mibBuilder.loadTexts: vnsCount.setStatus('current') if mibBuilder.loadTexts: vnsCount.setDescription('Number of VNSes defined in vnsConfigTable.') vns_config_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2)) if mibBuilder.loadTexts: vnsConfigTable.setStatus('current') if mibBuilder.loadTexts: vnsConfigTable.setDescription('Contains definitions of the Virtual Network Segments defined on this WirelessController.') vns_config_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'vnsIfIndex')) if mibBuilder.loadTexts: vnsConfigEntry.setStatus('current') if mibBuilder.loadTexts: vnsConfigEntry.setDescription('Configuration elements for a specific Virtual Network Segment.') vns_description = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 1), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsDescription.setStatus('current') if mibBuilder.loadTexts: vnsDescription.setDescription('Textual description of the VNS.') vns_assignment_mode = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 2), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('ssid', 1), ('aaa', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsAssignmentMode.setStatus('obsolete') if mibBuilder.loadTexts: vnsAssignmentMode.setDescription('Determines the method by which mobile units are assigned an address within this VNS. If vnsAssignmentMode = ssid, any client with an SSID matching the VNS will be assigned an address from this VNS. If vnsAssignmentMode == aaa, then address assignment is not completed until after the user is authenticated.') vns_mu_session_timeout = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 3), integer32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsMUSessionTimeout.setStatus('current') if mibBuilder.loadTexts: vnsMUSessionTimeout.setDescription('Client session idle time out, in seconds.') vns_allow_multicast = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 4), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsAllowMulticast.setStatus('current') if mibBuilder.loadTexts: vnsAllowMulticast.setDescription('When true, allows IP multicast packets to be broadcast to the clients on this VNS.') vns_ssid = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 5), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsSSID.setStatus('current') if mibBuilder.loadTexts: vnsSSID.setDescription('Service Set Identifier (i.e. Network Name) that will be configured on the AccessPoints associated with this VNS.') vns_domain = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 6), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsDomain.setStatus('current') if mibBuilder.loadTexts: vnsDomain.setDescription('Domain name to be supplied to the wireless clients if internal DHCP address assignment.') vns_dns_servers = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 7), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsDNSServers.setStatus('current') if mibBuilder.loadTexts: vnsDNSServers.setDescription('List of DNSs to be supplied to the wireless clients if internal DHCP address assignment.') vns_wins_servers = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 8), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsWINSServers.setStatus('current') if mibBuilder.loadTexts: vnsWINSServers.setDescription('List of WINSs to be supplied to the wireless clients if internal DHCP address assignment.') vns_auth_model = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 9), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3))).clone(namedValues=named_values(('none', 1), ('captivePortal', 2), ('dot1X', 3)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsAuthModel.setStatus('current') if mibBuilder.loadTexts: vnsAuthModel.setDescription('vnsAuthModel specifies the authentication method used for clients in the VNS. None indicates that the VNS is open, and no authentication is required. vnsAuthModel=captivePortal may only be specified for a VNS with vnsAssignmentMode=ssid. Likewise, vnsAuthModel=dot1X may only be specified for a VNS with vnsAssignmentMode=aaa.') vns_parent_if_index = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 10), integer32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsParentIfIndex.setStatus('obsolete') if mibBuilder.loadTexts: vnsParentIfIndex.setDescription('Specifies the ifIndex of the parent VNS, if this VNS is a child. If this is a top level VNS, vnsParentIfIndex will return null or 0.') vns_mgmt_traffic_enable = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 11), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsMgmtTrafficEnable.setStatus('current') if mibBuilder.loadTexts: vnsMgmtTrafficEnable.setDescription('Specifies whether clients in the VNS have access to EWC management elements.') vns_use_dhcp_relay = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 12), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2))).clone(namedValues=named_values(('none', 0), ('dhcpRelay', 1), ('localDhcp', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsUseDHCPRelay.setStatus('current') if mibBuilder.loadTexts: vnsUseDHCPRelay.setDescription('This variable indicates what type of DHCP is used for the VNS. none(0): No DHCP server on the VNS. dhcpRelay(1): Uses DHCP relay to reach the DHCP server. localDhcp(2): Uses local DHCP server on the controler.') vns3rd_party_ap = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 13), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vns3rdPartyAP.setStatus('current') if mibBuilder.loadTexts: vns3rdPartyAP.setDescription('When true, specifies that the VNS contains 3rd party access points. Only one such VNS may be defined for a WirelessController.') vns_status = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 14), row_status()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsStatus.setStatus('current') if mibBuilder.loadTexts: vnsStatus.setDescription('RowStatus variable for performing row operations on vnsConfigTable.') vns_mode = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 15), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3, 4, 5))).clone(namedValues=named_values(('routed', 1), ('bridgeAtController', 2), ('bridgeAtAP', 3), ('wds', 4), ('thirdParty', 5))).clone('routed')).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsMode.setStatus('current') if mibBuilder.loadTexts: vnsMode.setDescription('Type of traffic for this VNS. routed(1): The traffic is routed at the controller. bridgeAtController(2): Traffic is bridged at controller. bridgeAtAP(3): Traffic is bridged at Access Points. wds(4): Wireless Distributed System (WDS) type of VNS. If VNS is type of wds(4), then only vnsSupressSSID, vnsDescription and vnsSSID has meaning.') vns_vlan_id = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 16), integer32().subtype(subtypeSpec=value_range_constraint(-1, 4094)).clone(-1)).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsVlanID.setStatus('current') if mibBuilder.loadTexts: vnsVlanID.setDescription('VLAN tag for the packets trasmitted to/from of the VNS. This value has meaning if vnsMode is bridgeAtController(2) or bridgeAtAP(3). If vnsMode = bridgeAtController(2), tagging is done at controller. If vnsMode = bridgeAtAP(3), tagging is done at Access Point. Value ranges: (-1) it is not tagged, zero(0) means reserved, 1-4094 tag value.') vns_interface_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 17), octet_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsInterfaceName.setStatus('current') if mibBuilder.loadTexts: vnsInterfaceName.setDescription('Physical interface to be used in the controller for trasmitting/receiving packets for the VNS. This value has meaning if vnsMode is bridgeAtController(2).') vns_mgm_ip_address = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 18), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsMgmIpAddress.setStatus('current') if mibBuilder.loadTexts: vnsMgmIpAddress.setDescription('IP address of the management port associated to this VNS. This value has meaning if vnsMode is bridgeAtController(2).') vns_suppress_ssid = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 19), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsSuppressSSID.setStatus('current') if mibBuilder.loadTexts: vnsSuppressSSID.setDescription('If set to true, this prevents this SSID from appearing in the beacon message.') vns_enable11h_support = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 20), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsEnable11hSupport.setStatus('current') if mibBuilder.loadTexts: vnsEnable11hSupport.setDescription('If true, enables 802.11h support.') vns_apply_power_back_off = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 21), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsApplyPowerBackOff.setStatus('current') if mibBuilder.loadTexts: vnsApplyPowerBackOff.setDescription('Indicates whether the AP will direct 802.11h-enabled clients to apply the same power back-off setting that the AP is using') vns_process_client_ie_req = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 22), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsProcessClientIEReq.setStatus('current') if mibBuilder.loadTexts: vnsProcessClientIEReq.setDescription('If true, enables support for 802.11d client information request.') vns_dls_support_enable = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 23), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsDLSSupportEnable.setStatus('current') if mibBuilder.loadTexts: vnsDLSSupportEnable.setDescription('If true, enables support for DLS Support. This value has meaning only if vnsUseDHCPRelay is selected as localDhcp(2) and vnsMode is select as either routed(1) or bridgeAtController(2).') vns_dls_address = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 24), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsDLSAddress.setStatus('current') if mibBuilder.loadTexts: vnsDLSAddress.setDescription('DNS IP Address for DLS associated to this VNS. It could be IP address or Name') vns_dls_port = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 25), integer32().clone(18443)).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsDLSPort.setStatus('current') if mibBuilder.loadTexts: vnsDLSPort.setDescription('DNS Port for DLS associated to this VNS.') vns_rate_control_profile = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 26), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsRateControlProfile.setStatus('current') if mibBuilder.loadTexts: vnsRateControlProfile.setDescription('The Rate Control Profile that is referenced by this VNS.') vns_session_availability_enable = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 27), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsSessionAvailabilityEnable.setStatus('current') if mibBuilder.loadTexts: vnsSessionAvailabilityEnable.setDescription('To indicate if Session Availability feature is enabled.') vns_enabled = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 28), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disabled', 0), ('enabled', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsEnabled.setStatus('current') if mibBuilder.loadTexts: vnsEnabled.setDescription('VNS status of being enabled or disabled.') vns_strict_subnet_adherence = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 29), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disabled', 0), ('enabled', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsStrictSubnetAdherence.setStatus('current') if mibBuilder.loadTexts: vnsStrictSubnetAdherence.setDescription('Subnet adherence verification status for the VNS. Controller only learns devices whose address is within range of VNS segment definition. Disabling this field causes to not enforce validation. Doing so, may expose the controller to in-advertent Learning DoS attacks. ') vns_slp_enabled = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 30), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disabled', 0), ('enabled', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsSLPEnabled.setStatus('current') if mibBuilder.loadTexts: vnsSLPEnabled.setDescription('Status of SLP flag on Bridge at Controller type VNS. This field does not have any meaning for other types of VNS.') vns_config_wlanid = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 2, 1, 31), unsigned32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsConfigWLANID.setStatus('current') if mibBuilder.loadTexts: vnsConfigWLANID.setDescription('Creation of VNS requires existing of a free WLAN. One WLAN can only be used in one VNS only. This ID identifies the WLAN that is used for creation of VNS that is identified by this row.') vns_dhcp_range_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 3)) if mibBuilder.loadTexts: vnsDHCPRangeTable.setStatus('current') if mibBuilder.loadTexts: vnsDHCPRangeTable.setDescription('vnsDHCPRangeTable contains the IP address ranges that DHCP will serve to clients associated with this VNS.') vns_dhcp_range_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 3, 1)).setIndexNames((0, 'IF-MIB', 'ifIndex'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'vnsDHCPRangeIndex')) if mibBuilder.loadTexts: vnsDHCPRangeEntry.setStatus('current') if mibBuilder.loadTexts: vnsDHCPRangeEntry.setDescription('Configuration information for a DHCP range.') vns_dhcp_range_index = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 3, 1, 1), integer32().subtype(subtypeSpec=value_range_constraint(1, 2147483647))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsDHCPRangeIndex.setStatus('current') if mibBuilder.loadTexts: vnsDHCPRangeIndex.setDescription('Index for the DHCP row element.') vns_dhcp_range_start = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 3, 1, 2), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsDHCPRangeStart.setStatus('current') if mibBuilder.loadTexts: vnsDHCPRangeStart.setDescription('First IP address in the range.') vns_dhcp_range_end = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 3, 1, 3), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsDHCPRangeEnd.setStatus('current') if mibBuilder.loadTexts: vnsDHCPRangeEnd.setDescription('Last IP address in the range.') vns_dhcp_range_type = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 3, 1, 4), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('inclusion', 1), ('exclusion', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsDHCPRangeType.setStatus('current') if mibBuilder.loadTexts: vnsDHCPRangeType.setDescription('Determines whether addresses in the specified range will be included, or excluded by the DHCP server.') vns_dhcp_range_status = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 3, 1, 5), row_status()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsDHCPRangeStatus.setStatus('current') if mibBuilder.loadTexts: vnsDHCPRangeStatus.setDescription('Row status variable for row operations on the vnsDHCPRangeTable') vns_captive_portal_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4)) if mibBuilder.loadTexts: vnsCaptivePortalTable.setStatus('current') if mibBuilder.loadTexts: vnsCaptivePortalTable.setDescription('Details of the Captive Portal login page for VNSes that have vnsAssignment=ssid and vnsAuthModel=captivePortal.') vns_captive_portal_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1)).setIndexNames((0, 'IF-MIB', 'ifIndex')) if mibBuilder.loadTexts: vnsCaptivePortalEntry.setStatus('current') if mibBuilder.loadTexts: vnsCaptivePortalEntry.setDescription('Captive Portal Information for the VNS.') cp_url = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1, 1), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpURL.setStatus('current') if mibBuilder.loadTexts: cpURL.setDescription('Redirect URL of the Captive Portal login page.') cp_login_label = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1, 2), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpLoginLabel.setStatus('deprecated') if mibBuilder.loadTexts: cpLoginLabel.setDescription('Label that appears in front of the login field on the Captive Portal login page.') cp_password_label = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1, 3), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpPasswordLabel.setStatus('deprecated') if mibBuilder.loadTexts: cpPasswordLabel.setDescription('Label that appears in front of the password field on the Captive Portal login page.') cp_header_url = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1, 4), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpHeaderURL.setStatus('deprecated') if mibBuilder.loadTexts: cpHeaderURL.setDescription('URL of the Captive Portal header.') cp_footer_url = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1, 5), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpFooterURL.setStatus('deprecated') if mibBuilder.loadTexts: cpFooterURL.setDescription('URL of the Captive Portal footer.') cp_message = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1, 6), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpMessage.setStatus('deprecated') if mibBuilder.loadTexts: cpMessage.setDescription('A welcome message, or set of instructions that is to appear on the Captive Portal login page.') cp_replace_gateway_with_fqdn = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1, 7), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpReplaceGatewayWithFQDN.setStatus('current') if mibBuilder.loadTexts: cpReplaceGatewayWithFQDN.setDescription('Fully Qualified Domain Name (FQDN) to be used as the gateway IP address.') cp_default_redirection_url = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1, 8), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpDefaultRedirectionURL.setStatus('current') if mibBuilder.loadTexts: cpDefaultRedirectionURL.setDescription('Default Redirect URL of the Captive Portal login page.') cp_connection_ip = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1, 9), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpConnectionIP.setStatus('current') if mibBuilder.loadTexts: cpConnectionIP.setDescription('IP address of the Controller interface for Captive Portal.') cp_connection_port = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1, 10), integer32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpConnectionPort.setStatus('current') if mibBuilder.loadTexts: cpConnectionPort.setDescription('Port number on the cpConnectionIP interface.') cp_shared_secret = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1, 11), octet_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpSharedSecret.setStatus('current') if mibBuilder.loadTexts: cpSharedSecret.setDescription('Secret Key to be used to encrypt the information passed between the Controller and the external web server. It is the password common to both Controller and the external web server.') cp_log_off = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1, 12), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('off', 0), ('on', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpLogOff.setStatus('current') if mibBuilder.loadTexts: cpLogOff.setDescription('Toggles the display of logoff popup screen, allowing users to control their logoff.') cp_status_check = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1, 13), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('off', 0), ('on', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpStatusCheck.setStatus('current') if mibBuilder.loadTexts: cpStatusCheck.setDescription('Toggles the display of popup window with session statistics for users to monitor their usage and time left in session.') cp_type = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 4, 1, 14), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 4, 5))).clone(namedValues=named_values(('none', 1), ('internal', 2), ('external', 4), ('guestPortal', 5)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: cpType.setStatus('current') if mibBuilder.loadTexts: cpType.setDescription('Type of captive portal is enabled for the selected VNS. none(1) = no captive portal configured or type is unknown. internal(2) = internal captive portal. external(4) = external captive portal. guestPortal (5) = open host captive portal.') vns_radius_server_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 5)) if mibBuilder.loadTexts: vnsRadiusServerTable.setStatus('current') if mibBuilder.loadTexts: vnsRadiusServerTable.setDescription('List of RADIUS servers to be utilized for authentication in the VNS.') vns_radius_server_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 5, 1)).setIndexNames((0, 'IF-MIB', 'ifIndex'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'vnsRadiusServerName')) if mibBuilder.loadTexts: vnsRadiusServerEntry.setStatus('current') if mibBuilder.loadTexts: vnsRadiusServerEntry.setDescription('Configuration information for a RADIUS server.') vns_radius_server_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 5, 1, 1), display_string().subtype(subtypeSpec=value_size_constraint(0, 64))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsRadiusServerName.setStatus('current') if mibBuilder.loadTexts: vnsRadiusServerName.setDescription('Name of the RADIUS server.') vns_radius_server_port = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 5, 1, 2), integer32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsRadiusServerPort.setStatus('current') if mibBuilder.loadTexts: vnsRadiusServerPort.setDescription('Port number for the RADIUS server.') vns_radius_server_retries = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 5, 1, 3), integer32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsRadiusServerRetries.setStatus('current') if mibBuilder.loadTexts: vnsRadiusServerRetries.setDescription('Number of retries for a RADIUS authentication request.') vns_radius_server_timeout = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 5, 1, 4), integer32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsRadiusServerTimeout.setStatus('current') if mibBuilder.loadTexts: vnsRadiusServerTimeout.setDescription('Delay between requests.') vns_radius_server_shared_secret = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 5, 1, 5), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsRadiusServerSharedSecret.setStatus('current') if mibBuilder.loadTexts: vnsRadiusServerSharedSecret.setDescription('Shared secret to be used between the NAS and RADIUS server.') vns_radius_server_nas_identifier = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 5, 1, 6), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsRadiusServerNASIdentifier.setStatus('current') if mibBuilder.loadTexts: vnsRadiusServerNASIdentifier.setDescription('NAS identifier to be included in RADIUS request.') vns_radius_server_auth_type = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 5, 1, 7), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3, 4))).clone(namedValues=named_values(('pap', 0), ('chap', 1), ('msChap', 2), ('msChapV2', 3), ('notApplicable', 4)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsRadiusServerAuthType.setStatus('current') if mibBuilder.loadTexts: vnsRadiusServerAuthType.setDescription('Challenge mechanism for the request.') vns_radius_server_row_status = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 5, 1, 8), row_status()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsRadiusServerRowStatus.setStatus('current') if mibBuilder.loadTexts: vnsRadiusServerRowStatus.setDescription('RowStatus value for manipulating vnsRADIUSServerTable.') vns_radius_server_nas_address = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 5, 1, 9), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsRadiusServerNasAddress.setStatus('current') if mibBuilder.loadTexts: vnsRadiusServerNasAddress.setDescription('NAS address to be included in RADIUS request.') vns_filter_id_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 6)) if mibBuilder.loadTexts: vnsFilterIDTable.setStatus('current') if mibBuilder.loadTexts: vnsFilterIDTable.setDescription('Table of names filters for a VNS.') vns_filter_id_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 6, 1)).setIndexNames((0, 'IF-MIB', 'ifIndex'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'vnsFilterID')) if mibBuilder.loadTexts: vnsFilterIDEntry.setStatus('current') if mibBuilder.loadTexts: vnsFilterIDEntry.setDescription('Name of a specific filter in the VNS.') vns_filter_id = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 6, 1, 1), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsFilterID.setStatus('current') if mibBuilder.loadTexts: vnsFilterID.setDescription('Filter names.') vns_filter_id_status = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 6, 1, 2), row_status()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsFilterIDStatus.setStatus('current') if mibBuilder.loadTexts: vnsFilterIDStatus.setDescription('RowStatus for operating on vnsFilterIDTable.') vns_filter_rule_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 7)) if mibBuilder.loadTexts: vnsFilterRuleTable.setStatus('current') if mibBuilder.loadTexts: vnsFilterRuleTable.setDescription('Table containing specific filters for a named filter.') vns_filter_rule_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 7, 1)).setIndexNames((0, 'IF-MIB', 'ifIndex'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'vnsFilterID'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'vnsFilterRuleOrder')) if mibBuilder.loadTexts: vnsFilterRuleEntry.setStatus('current') if mibBuilder.loadTexts: vnsFilterRuleEntry.setDescription('Filter elements for an individual VNS filter.') vns_filter_rule_order = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 7, 1, 1), integer32().subtype(subtypeSpec=value_range_constraint(1, 65532))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsFilterRuleOrder.setStatus('current') if mibBuilder.loadTexts: vnsFilterRuleOrder.setDescription('Position of the filter in the filter list.') vns_filter_rule_direction = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 7, 1, 2), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3))).clone(namedValues=named_values(('none', 0), ('in', 1), ('out', 2), ('both', 3)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsFilterRuleDirection.setStatus('current') if mibBuilder.loadTexts: vnsFilterRuleDirection.setDescription('Traffic direction defined by the rule.') vns_filter_rule_action = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 7, 1, 3), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('allow', 1), ('disallow', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsFilterRuleAction.setStatus('current') if mibBuilder.loadTexts: vnsFilterRuleAction.setDescription('Allow or deny traffic for the filter.') vns_filter_rule_ip_address = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 7, 1, 4), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsFilterRuleIPAddress.setStatus('current') if mibBuilder.loadTexts: vnsFilterRuleIPAddress.setDescription('IP address to apply the filter.') vns_filter_rule_port_low = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 7, 1, 5), integer32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsFilterRulePortLow.setStatus('current') if mibBuilder.loadTexts: vnsFilterRulePortLow.setDescription('Low port number for the filter.') vns_filter_rule_port_high = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 7, 1, 6), integer32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsFilterRulePortHigh.setStatus('current') if mibBuilder.loadTexts: vnsFilterRulePortHigh.setDescription('High port number for the filter.') vns_filter_rule_protocol = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 7, 1, 7), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3, 4, 5, 6))).clone(namedValues=named_values(('none', 0), ('notApplicable', 1), ('tcp', 2), ('udp', 3), ('icmp', 4), ('ipsecESP', 5), ('ipsecAH', 6)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsFilterRuleProtocol.setStatus('current') if mibBuilder.loadTexts: vnsFilterRuleProtocol.setDescription('Specific protocol to filter.') vns_filter_rule_ether_type = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 7, 1, 8), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3))).clone(namedValues=named_values(('none', 0), ('ip', 1), ('arp', 2), ('rarp', 3)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsFilterRuleEtherType.setStatus('current') if mibBuilder.loadTexts: vnsFilterRuleEtherType.setDescription('Specific ethertype to filter.') vns_filter_rule_status = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 7, 1, 9), row_status()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsFilterRuleStatus.setStatus('current') if mibBuilder.loadTexts: vnsFilterRuleStatus.setDescription('RowStatus value for the vnsFilterRuleTable.') vns_privacy_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 8)) if mibBuilder.loadTexts: vnsPrivacyTable.setStatus('current') if mibBuilder.loadTexts: vnsPrivacyTable.setDescription('Table of privacy settings for the VNS.') vns_privacy_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 8, 1)).setIndexNames((0, 'IF-MIB', 'ifIndex')) if mibBuilder.loadTexts: vnsPrivacyEntry.setStatus('current') if mibBuilder.loadTexts: vnsPrivacyEntry.setDescription('Configuration values for a specific privacy setting.') vns_priv_wep_key_type = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 8, 1, 1), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3, 4, 5))).clone(namedValues=named_values(('none', 1), ('wepstatic', 2), ('wpapsk', 3), ('dynamic', 4), ('wpa', 5)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsPrivWEPKeyType.setStatus('current') if mibBuilder.loadTexts: vnsPrivWEPKeyType.setDescription('Type of key in use. none(1) = not cofigured, wepstatic(2) = static WEP, wpapsk(3) = WPA Pre-Shared Key, dynamic(4) = dynamically assigned, wpa(5) = WPA.') vns_priv_dynamic_rekey_frequency = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 8, 1, 2), integer32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsPrivDynamicRekeyFrequency.setStatus('current') if mibBuilder.loadTexts: vnsPrivDynamicRekeyFrequency.setDescription('Dynamic WEP re-keying frequency, in seconds. Setting this value to 0 disables rekeying. This value is only meaningful if vnsPrivWEPKeyType = wpapsk(3). For any other values of vnsPrivWEPKeyType, reading or setting this value will return an unsuccessful status and will return a value of null or zero.') vns_priv_wep_key_length = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 8, 1, 3), integer32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsPrivWEPKeyLength.setStatus('current') if mibBuilder.loadTexts: vnsPrivWEPKeyLength.setDescription('WEP key length, 64, 128, or 152 bits. If vnsPrivWEPKeyType is none, reading or setting this value will return an unsuccessful status and will return a value of null or zero.') vns_priv_wpa1_enabled = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 8, 1, 4), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsPrivWPA1Enabled.setStatus('current') if mibBuilder.loadTexts: vnsPrivWPA1Enabled.setDescription('Enables WPA.1 (Wi-Fi Protected Access).') vns_priv_use_shared_key = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 8, 1, 5), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsPrivUseSharedKey.setStatus('current') if mibBuilder.loadTexts: vnsPrivUseSharedKey.setDescription('Enables the use of WPA shared key for this VNS.') vns_priv_wpa_shared_key = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 8, 1, 6), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsPrivWPASharedKey.setStatus('current') if mibBuilder.loadTexts: vnsPrivWPASharedKey.setDescription('The value of the WPA shared key for this VNS. This value is logically WRITE ONLY. Attempts to read this value shall return unsuccessful status and values of null or zero.') vns_priv_wpa2_enabled = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 8, 1, 7), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsPrivWPA2Enabled.setStatus('current') if mibBuilder.loadTexts: vnsPrivWPA2Enabled.setDescription('When true, WPA v.2 support is enabled.') vns_wep_key_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 9)) if mibBuilder.loadTexts: vnsWEPKeyTable.setStatus('current') if mibBuilder.loadTexts: vnsWEPKeyTable.setDescription('Table of WEP key entries for a static WEP definition.') vns_wep_key_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 9, 1)).setIndexNames((0, 'IF-MIB', 'ifIndex'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'vnsWEPKeyIndex')) if mibBuilder.loadTexts: vnsWEPKeyEntry.setStatus('current') if mibBuilder.loadTexts: vnsWEPKeyEntry.setDescription('WEP key for a single entry in the table.') vns_wep_key_index = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 9, 1, 1), integer32().subtype(subtypeSpec=value_range_constraint(1, 4))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsWEPKeyIndex.setStatus('current') if mibBuilder.loadTexts: vnsWEPKeyIndex.setDescription('Table index for the WEP key.') vns_wep_key_value = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 9, 1, 2), wep_keytype()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsWEPKeyValue.setStatus('current') if mibBuilder.loadTexts: vnsWEPKeyValue.setDescription('Value of a WEP key for this VNS. This value is logically WRITE ONLY. Attempts to read this value shall return unsuccessful status and values of null or zero.') vns3rd_party_ap_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 10)) if mibBuilder.loadTexts: vns3rdPartyAPTable.setStatus('current') if mibBuilder.loadTexts: vns3rdPartyAPTable.setDescription('Contains a list of 3rd Party access points for the EWC.') vns3rd_party_ap_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 10, 1)).setIndexNames((0, 'IF-MIB', 'ifIndex'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'apMacAddress')) if mibBuilder.loadTexts: vns3rdPartyAPEntry.setStatus('current') if mibBuilder.loadTexts: vns3rdPartyAPEntry.setDescription('Configuration information for a 3rd party access point.') ap_mac_address = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 10, 1, 1), mac_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apMacAddress.setStatus('current') if mibBuilder.loadTexts: apMacAddress.setDescription('Ethernet MAC address of the 3rd party access point.') ap_ip_address = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 10, 1, 2), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apIpAddress.setStatus('current') if mibBuilder.loadTexts: apIpAddress.setDescription('IP address of the 3rd party access point.') vns_qo_s_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11)) if mibBuilder.loadTexts: vnsQoSTable.setStatus('current') if mibBuilder.loadTexts: vnsQoSTable.setDescription('This table contains list of per-VNS QoS related configuration.') vns_qo_s_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'vnsIfIndex')) if mibBuilder.loadTexts: vnsQoSEntry.setStatus('current') if mibBuilder.loadTexts: vnsQoSEntry.setDescription('An entry related to QoS configuration for the VNS indexed by vnsIfIndex.') vns_qo_s_wireless_legacy_flag = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 1), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('enabled', 1), ('disabled', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsQoSWirelessLegacyFlag.setStatus('current') if mibBuilder.loadTexts: vnsQoSWirelessLegacyFlag.setDescription('This variable is used to enable/disable legacy QoS feature.') vns_qo_s_wireless_wmm_flag = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 2), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('enabled', 1), ('disabled', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsQoSWirelessWMMFlag.setStatus('current') if mibBuilder.loadTexts: vnsQoSWirelessWMMFlag.setDescription('This variable is used to enable/disable WMM feature.') vns_qo_s_wireless80211e_flag = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 3), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('enabled', 1), ('disabled', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsQoSWireless80211eFlag.setStatus('current') if mibBuilder.loadTexts: vnsQoSWireless80211eFlag.setDescription('This variable is used to enable/disable 802.11e feature.') vns_qo_s_wireless_turbo_voice_flag = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 4), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('enabled', 1), ('disabled', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsQoSWirelessTurboVoiceFlag.setStatus('current') if mibBuilder.loadTexts: vnsQoSWirelessTurboVoiceFlag.setDescription('This variable is used to enable/disable turbo feature.') vns_qo_s_priority_override_flag = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 5), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('enabled', 1), ('disabled', 2))).clone('disabled')).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsQoSPriorityOverrideFlag.setStatus('current') if mibBuilder.loadTexts: vnsQoSPriorityOverrideFlag.setDescription('Enable/disable the use of DSCP to override Servic Class (SC) value.') vns_qo_s_priority_override_sc = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 6), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3, 4, 5, 6, 7))).clone(namedValues=named_values(('background', 0), ('bestEffort', 1), ('bronze', 2), ('silver', 3), ('gold', 4), ('platinum', 5), ('premiumVoice', 6), ('networkControl', 7))).clone('background')).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsQoSPriorityOverrideSC.setStatus('current') if mibBuilder.loadTexts: vnsQoSPriorityOverrideSC.setDescription('Service class (SC) of the override value. This field has a meaning if vnsQoSPriorityOverrideFlag is enabled.') vns_qo_s_priority_override_dscp = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 7), integer32().subtype(subtypeSpec=value_range_constraint(0, 63))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsQoSPriorityOverrideDSCP.setStatus('current') if mibBuilder.loadTexts: vnsQoSPriorityOverrideDSCP.setDescription('DSCP override value to be used for the service class. This field has a meaning if vnsQoSPriorityOverrideFlag is enabled.') vns_qo_s_classification_service_class = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 8), octet_string().subtype(subtypeSpec=value_size_constraint(0, 64))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsQoSClassificationServiceClass.setStatus('current') if mibBuilder.loadTexts: vnsQoSClassificationServiceClass.setDescription('Service Class value for the DSCP code. This field is 64-bytes long. Each byte represents mapping between DSCP and Service Class. Position of each byte in the array represents DSCP code and the content of each byte represents the service class value for that DSCP code. For example, second byte represents DSCP code 1 and its value represents SC value. Value for each byte is equivalent to either of: background = 0, bestEffort = 1, bronze = 2, silver = 3, gold = 4, platinum = 5, premiumVoice = 6, networkControl = 7') vns_qo_s_wireless_enable_uapsd = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 9), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('enabled', 1), ('disabled', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsQoSWirelessEnableUAPSD.setStatus('current') if mibBuilder.loadTexts: vnsQoSWirelessEnableUAPSD.setDescription('This variable is used to enable/disable U-APSD feature.') vns_qo_s_wireless_use_adm_control_voice = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 10), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('enabled', 1), ('disabled', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsQoSWirelessUseAdmControlVoice.setStatus('current') if mibBuilder.loadTexts: vnsQoSWirelessUseAdmControlVoice.setDescription('If enabled, admission control for voice traffic is used.') vns_qo_s_wireless_use_adm_control_video = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 11), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('enabled', 1), ('disabled', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsQoSWirelessUseAdmControlVideo.setStatus('current') if mibBuilder.loadTexts: vnsQoSWirelessUseAdmControlVideo.setDescription('If enabled, admission control for vedio traffic is used. This field has a meaning if vnsQoSUseGlobalAdmVoice is enabled.') vns_qo_s_wireless_ul_policer_action = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 12), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('doNothing', 0), ('sendDELTStoClient', 1))).clone('doNothing')).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsQoSWirelessULPolicerAction.setStatus('current') if mibBuilder.loadTexts: vnsQoSWirelessULPolicerAction.setDescription('If doNothing is selected, no action is taken. This is default value. If sendDELTStoClient is selected, AP will send DELTS if a client is abusing in uplink. This field has a meaning only if admission control is enabled for VO or VI.') vns_qo_s_wireless_dl_policer_action = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 13), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2))).clone(namedValues=named_values(('doNothing', 0), ('downgrade', 1), ('drop', 2))).clone('doNothing')).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsQoSWirelessDLPolicerAction.setStatus('current') if mibBuilder.loadTexts: vnsQoSWirelessDLPolicerAction.setDescription('If doNothing is selected, no action is taken. This is default value. If downgrade is selected, AP will downgrade all traffic to the highest AC that does not require CAC in downlink. If drop is selected, AP will drop client if it observes a client that is illegally using an AC that has CAC mandatory in downlink. This field has a meaning only if admission control is enabled for VO or VI.') vns_qo_s_wireless_use_adm_control_best_effort = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 14), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disabled', 0), ('enabled', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsQoSWirelessUseAdmControlBestEffort.setStatus('current') if mibBuilder.loadTexts: vnsQoSWirelessUseAdmControlBestEffort.setDescription('If enabled, admission control for video traffic is set to Best Effort. This field has a meaning if vnsQoSUseGlobalAdmVoice is enabled.') vns_qo_s_wireless_use_adm_control_background = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 11, 1, 15), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disabled', 0), ('enabled', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsQoSWirelessUseAdmControlBackground.setStatus('current') if mibBuilder.loadTexts: vnsQoSWirelessUseAdmControlBackground.setDescription('If enabled, admission control for video traffic is set to Background. This field has a meaning if vnsQoSUseGlobalAdmVoice is enabled.') vns_wdsrf_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 12)) if mibBuilder.loadTexts: vnsWDSRFTable.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSRFTable.setDescription('ontains definitions of the Wireless Distirbution System (WDS) VNS defined on this Controller.') vns_wdsrf_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 12, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'vnsIfIndex'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'apIndex')) if mibBuilder.loadTexts: vnsWDSRFEntry.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSRFEntry.setDescription('Configuration elements for a specific WDS VNS.') vns_wdsrfap_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 12, 1, 1), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsWDSRFAPName.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSRFAPName.setDescription('AP name.') vns_wdsr_fbg_service = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 12, 1, 2), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3, 4))).clone(namedValues=named_values(('notAvailable', 0), ('none', 1), ('child', 2), ('parent', 3), ('both', 4)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsWDSRFbgService.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSRFbgService.setDescription('Type of service offered by this radio.') vns_wdsr_fa_service = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 12, 1, 3), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3, 4))).clone(namedValues=named_values(('notAvailable', 0), ('none', 1), ('child', 2), ('parent', 3), ('both', 4)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsWDSRFaService.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSRFaService.setDescription('Type of service offered by this radio.') vns_wdsrf_preferred_parent = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 12, 1, 4), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsWDSRFPreferredParent.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSRFPreferredParent.setDescription('Desired preferred parent.') vns_wdsrf_backup_parent = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 12, 1, 5), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsWDSRFBackupParent.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSRFBackupParent.setDescription('Desired backup parent.') vns_wdsrf_bridge = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 12, 1, 6), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('bridged', 1), ('notBridged', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsWDSRFBridge.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSRFBridge.setDescription('WDS bridge status.') vns_rate_control_prof_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 13)) if mibBuilder.loadTexts: vnsRateControlProfTable.setStatus('obsolete') if mibBuilder.loadTexts: vnsRateControlProfTable.setDescription('Table of Rate Control Profiles.') vns_rate_control_prof_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 13, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'vnsRateControlProfInd')) if mibBuilder.loadTexts: vnsRateControlProfEntry.setStatus('obsolete') if mibBuilder.loadTexts: vnsRateControlProfEntry.setDescription('Name of a specific Rate Control Profile.') vns_rate_control_prof_ind = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 13, 1, 1), unsigned32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsRateControlProfInd.setStatus('obsolete') if mibBuilder.loadTexts: vnsRateControlProfInd.setDescription('A monotonically increasing integer which acts as index of entries within the named Rate Control Profiles.') vns_rate_control_prof_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 13, 1, 2), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsRateControlProfName.setStatus('obsolete') if mibBuilder.loadTexts: vnsRateControlProfName.setDescription('Rate Control Profile Name.') vns_rate_control_cir = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 13, 1, 3), unsigned32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsRateControlCIR.setStatus('obsolete') if mibBuilder.loadTexts: vnsRateControlCIR.setDescription('Rate Control Average Rate (CIR) in kbps.') vns_rate_control_cbs = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 13, 1, 4), unsigned32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsRateControlCBS.setStatus('obsolete') if mibBuilder.loadTexts: vnsRateControlCBS.setDescription('Rate Control Burst Size (CBS) in bytes.') vns_ap_filter_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 14)) if mibBuilder.loadTexts: vnsAPFilterTable.setStatus('current') if mibBuilder.loadTexts: vnsAPFilterTable.setDescription('Filters applied to Access Points via VNS settings and assignments.') vns_ap_filter_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 14, 1)).setIndexNames((0, 'IF-MIB', 'ifIndex'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'vnsFilterID'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'vnsAPFilterRuleOrder')) if mibBuilder.loadTexts: vnsAPFilterEntry.setStatus('current') if mibBuilder.loadTexts: vnsAPFilterEntry.setDescription('An entry containing filters definition for Access Points assigned to VNS that is identified by VNS index.') vns_ap_filter_rule_order = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 14, 1, 1), integer32().subtype(subtypeSpec=value_range_constraint(1, 65535))).setMaxAccess('readcreate') if mibBuilder.loadTexts: vnsAPFilterRuleOrder.setStatus('current') if mibBuilder.loadTexts: vnsAPFilterRuleOrder.setDescription('Position of the filter in the filter list.') vns_ap_filter_rule_direction = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 14, 1, 2), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3))).clone(namedValues=named_values(('in', 1), ('out', 2), ('both', 3)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: vnsAPFilterRuleDirection.setStatus('current') if mibBuilder.loadTexts: vnsAPFilterRuleDirection.setDescription('Traffic direction related to the filter rule.') vns_ap_filter_action = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 14, 1, 3), integer32()).setMaxAccess('readcreate') if mibBuilder.loadTexts: vnsAPFilterAction.setStatus('current') if mibBuilder.loadTexts: vnsAPFilterAction.setDescription('Allow or deny traffic for the filter.') vns_ap_filter_ip_address = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 14, 1, 4), ip_address()).setMaxAccess('readcreate') if mibBuilder.loadTexts: vnsAPFilterIPAddress.setStatus('current') if mibBuilder.loadTexts: vnsAPFilterIPAddress.setDescription('IP address applied to the filter.') vns_ap_filter_mask = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 14, 1, 5), ip_address()).setMaxAccess('readcreate') if mibBuilder.loadTexts: vnsAPFilterMask.setStatus('current') if mibBuilder.loadTexts: vnsAPFilterMask.setDescription('The mask, number of bits set to one in the mask, applied to filter IP address.') vns_ap_filter_port_low = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 14, 1, 6), integer32()).setMaxAccess('readcreate') if mibBuilder.loadTexts: vnsAPFilterPortLow.setStatus('current') if mibBuilder.loadTexts: vnsAPFilterPortLow.setDescription('Low port number for the filter.') vns_ap_filter_port_high = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 14, 1, 7), integer32()).setMaxAccess('readcreate') if mibBuilder.loadTexts: vnsAPFilterPortHigh.setStatus('current') if mibBuilder.loadTexts: vnsAPFilterPortHigh.setDescription('High port number for the filter.') vns_ap_filter_protocol = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 14, 1, 8), integer32()).setMaxAccess('readcreate') if mibBuilder.loadTexts: vnsAPFilterProtocol.setStatus('current') if mibBuilder.loadTexts: vnsAPFilterProtocol.setDescription('Specific protocol for the filter.') vns_ap_filter_ether_type = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 14, 1, 9), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3))).clone(namedValues=named_values(('ip', 1), ('arp', 2), ('rarp', 3)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: vnsAPFilterEtherType.setStatus('current') if mibBuilder.loadTexts: vnsAPFilterEtherType.setDescription('Specific ethertype to the filter.') vns_ap_filter_row_status = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 1, 14, 1, 10), integer32()).setMaxAccess('readcreate') if mibBuilder.loadTexts: vnsAPFilterRowStatus.setStatus('current') if mibBuilder.loadTexts: vnsAPFilterRowStatus.setDescription('RowStatus value for this table entry.') vns_stats_objects = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2)) active_vns_session_count = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 1), integer32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: activeVNSSessionCount.setStatus('current') if mibBuilder.loadTexts: activeVNSSessionCount.setDescription('Number of active VNSs.') vns_stat_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 2)) if mibBuilder.loadTexts: vnsStatTable.setStatus('obsolete') if mibBuilder.loadTexts: vnsStatTable.setDescription('Description.') vns_stat_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 2, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'vnsIfIndex')) if mibBuilder.loadTexts: vnsStatEntry.setStatus('obsolete') if mibBuilder.loadTexts: vnsStatEntry.setDescription('Description.') vns_stat_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 2, 1, 1), octet_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsStatName.setStatus('obsolete') if mibBuilder.loadTexts: vnsStatName.setDescription('Name of the VNS.') vns_stat_tx_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 2, 1, 2), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: vnsStatTxPkts.setStatus('obsolete') if mibBuilder.loadTexts: vnsStatTxPkts.setDescription('Trasmitted packets.') vns_stat_rx_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 2, 1, 3), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: vnsStatRxPkts.setStatus('obsolete') if mibBuilder.loadTexts: vnsStatRxPkts.setDescription('Received packtes.') vns_stat_tx_octects = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 2, 1, 4), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: vnsStatTxOctects.setStatus('obsolete') if mibBuilder.loadTexts: vnsStatTxOctects.setDescription('Trasmitted octects.') vns_stat_rx_octects = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 2, 1, 5), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: vnsStatRxOctects.setStatus('obsolete') if mibBuilder.loadTexts: vnsStatRxOctects.setDescription('Received octets.') vns_stat_multicast_tx_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 2, 1, 6), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: vnsStatMulticastTxPkts.setStatus('obsolete') if mibBuilder.loadTexts: vnsStatMulticastTxPkts.setDescription('Multicast trasmitted packets.') vns_stat_multicast_rx_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 2, 1, 7), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: vnsStatMulticastRxPkts.setStatus('obsolete') if mibBuilder.loadTexts: vnsStatMulticastRxPkts.setDescription('Multicast received packets.') vns_stat_broadcast_tx_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 2, 1, 8), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: vnsStatBroadcastTxPkts.setStatus('obsolete') if mibBuilder.loadTexts: vnsStatBroadcastTxPkts.setDescription('Broadcast trasmitted packets.') vns_stat_broadcast_rx_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 2, 1, 9), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: vnsStatBroadcastRxPkts.setStatus('obsolete') if mibBuilder.loadTexts: vnsStatBroadcastRxPkts.setDescription('Broadcast received packets.') vns_stat_radius_tot_requests = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 2, 1, 10), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: vnsStatRadiusTotRequests.setStatus('obsolete') if mibBuilder.loadTexts: vnsStatRadiusTotRequests.setDescription('Total requests sent to radius server.') vns_stat_radius_req_failed = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 2, 1, 11), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: vnsStatRadiusReqFailed.setStatus('obsolete') if mibBuilder.loadTexts: vnsStatRadiusReqFailed.setDescription('Requests that failed to be processed by radius server.') vns_stat_radius_req_rejected = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 2, 1, 12), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: vnsStatRadiusReqRejected.setStatus('obsolete') if mibBuilder.loadTexts: vnsStatRadiusReqRejected.setDescription('Requests that have been rejected by radius server.') vns_exception_stat_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 3)) if mibBuilder.loadTexts: vnsExceptionStatTable.setStatus('obsolete') if mibBuilder.loadTexts: vnsExceptionStatTable.setDescription('Description.') vns_exception_stat_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 3, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'vnsIfIndex'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'vnsExceptionFiterName')) if mibBuilder.loadTexts: vnsExceptionStatEntry.setStatus('obsolete') if mibBuilder.loadTexts: vnsExceptionStatEntry.setDescription('Description.') vns_exception_fiter_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 3, 1, 1), octet_string().subtype(subtypeSpec=value_size_constraint(1, 64))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsExceptionFiterName.setStatus('obsolete') if mibBuilder.loadTexts: vnsExceptionFiterName.setDescription('Filter name.') vns_exception_stat_pkts_denied = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 3, 1, 2), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: vnsExceptionStatPktsDenied.setStatus('obsolete') if mibBuilder.loadTexts: vnsExceptionStatPktsDenied.setDescription('Total packets that are denied by defined filters.') vns_exception_stat_pkts_allowed = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 3, 1, 3), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: vnsExceptionStatPktsAllowed.setStatus('obsolete') if mibBuilder.loadTexts: vnsExceptionStatPktsAllowed.setDescription('Total packets that are allowed by defined filters.') vns_wds_stat_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 4)) if mibBuilder.loadTexts: vnsWDSStatTable.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSStatTable.setDescription('Description.') vns_wds_stat_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 4, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'vnsIfIndex'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'apIndex')) if mibBuilder.loadTexts: vnsWDSStatEntry.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSStatEntry.setDescription('Description.') vns_wds_stat_ap_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 4, 1, 1), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsWDSStatAPName.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSStatAPName.setDescription('AP name serving WDS VNS.') vns_wds_stat_ap_role = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 4, 1, 2), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(-1, 0, 1, 2, 3))).clone(namedValues=named_values(('unknown', -1), ('none', 0), ('satellite', 1), ('root', 2), ('repeater', 3)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsWDSStatAPRole.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSStatAPRole.setDescription('Role of the AP in WDS tree. All the statistics and configuration information in this table has no meaning if the role is unknown(-1).') vns_wds_stat_ap_radio = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 4, 1, 3), display_string().subtype(subtypeSpec=value_size_constraint(0, 15))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsWDSStatAPRadio.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSStatAPRadio.setDescription("Radio and freq on which uplink WDS is established, N/A if connected over etherent (value are 'a:<freq>', 'b/g:<freq>', or 'N/A') ") vns_wds_stat_ap_parent = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 4, 1, 4), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsWDSStatAPParent.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSStatAPParent.setDescription('AP Name of the parent AP.') vns_wds_stat_ssid = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 4, 1, 5), display_string().subtype(subtypeSpec=value_size_constraint(0, 32))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsWDSStatSSID.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSStatSSID.setDescription('SSID of the WDS VNS where parent WDS link is established.') vns_wds_stat_rx_frame = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 4, 1, 6), counter64()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsWDSStatRxFrame.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSStatRxFrame.setDescription('Received frames from the parent AP.') vns_wds_stat_tx_frame = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 4, 1, 7), counter64()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsWDSStatTxFrame.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSStatTxFrame.setDescription('Transmitted frames to the parent AP.') vns_wds_stat_rx_error = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 4, 1, 8), counter64()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsWDSStatRxError.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSStatRxError.setDescription('Received frames in error from the parent AP.') vns_wds_stat_tx_error = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 4, 1, 9), counter64()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsWDSStatTxError.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSStatTxError.setDescription('Transmitted frames in error to the parent AP.') vns_wds_stat_rx_rssi = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 4, 1, 10), integer32().subtype(subtypeSpec=value_range_constraint(0, 64))).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsWDSStatRxRSSI.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSStatRxRSSI.setDescription('Average Received Signal Strength Indicator (RSSI).') vns_wds_stat_rx_rate = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 4, 1, 11), counter64()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsWDSStatRxRate.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSStatRxRate.setDescription('Average receive rate.') vns_wds_stat_tx_rate = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 2, 4, 1, 12), counter64()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsWDSStatTxRate.setStatus('obsolete') if mibBuilder.loadTexts: vnsWDSStatTxRate.setDescription('Average transmission rate.') vns_global_setting = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3)) wireless_qo_s = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 1)) max_voice_b_wfor_reassociation = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 1, 1), integer32().subtype(subtypeSpec=value_range_constraint(0, 100)).clone(80)).setMaxAccess('readwrite') if mibBuilder.loadTexts: maxVoiceBWforReassociation.setStatus('current') if mibBuilder.loadTexts: maxVoiceBWforReassociation.setDescription('Maximum voice bandwidth to be used for re-association.') max_voice_b_wfor_association = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 1, 2), integer32().subtype(subtypeSpec=value_range_constraint(0, 100)).clone(60)).setMaxAccess('readwrite') if mibBuilder.loadTexts: maxVoiceBWforAssociation.setStatus('current') if mibBuilder.loadTexts: maxVoiceBWforAssociation.setDescription('Maximum voice bandwidth to be used for association.') max_video_b_wfor_reassociation = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 1, 3), integer32().subtype(subtypeSpec=value_range_constraint(0, 100)).clone(60)).setMaxAccess('readwrite') if mibBuilder.loadTexts: maxVideoBWforReassociation.setStatus('current') if mibBuilder.loadTexts: maxVideoBWforReassociation.setDescription('Maximum video bandwidth to be used for re-association.') max_video_b_wfor_association = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 1, 4), integer32().subtype(subtypeSpec=value_range_constraint(0, 100)).clone(40)).setMaxAccess('readwrite') if mibBuilder.loadTexts: maxVideoBWforAssociation.setStatus('current') if mibBuilder.loadTexts: maxVideoBWforAssociation.setDescription('Maximum video bandwidth to be used for association.') max_best_effort_b_wfor_reassociation = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 1, 5), integer32().subtype(subtypeSpec=value_range_constraint(0, 100)).clone(40)).setMaxAccess('readwrite') if mibBuilder.loadTexts: maxBestEffortBWforReassociation.setStatus('current') if mibBuilder.loadTexts: maxBestEffortBWforReassociation.setDescription('Maximum best effort bandwidth to be used for reassociation.') max_best_effort_b_wfor_association = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 1, 6), integer32().subtype(subtypeSpec=value_range_constraint(0, 100)).clone(30)).setMaxAccess('readwrite') if mibBuilder.loadTexts: maxBestEffortBWforAssociation.setStatus('current') if mibBuilder.loadTexts: maxBestEffortBWforAssociation.setDescription('Maximum best effort bandwidth to be used for association.') max_background_b_wfor_reassociation = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 1, 7), integer32().subtype(subtypeSpec=value_range_constraint(0, 100)).clone(30)).setMaxAccess('readwrite') if mibBuilder.loadTexts: maxBackgroundBWforReassociation.setStatus('current') if mibBuilder.loadTexts: maxBackgroundBWforReassociation.setDescription('Maximum background bandwidth to be used for reassociation. ') max_background_b_wfor_association = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 1, 8), integer32().subtype(subtypeSpec=value_range_constraint(0, 100)).clone(20)).setMaxAccess('readwrite') if mibBuilder.loadTexts: maxBackgroundBWforAssociation.setStatus('current') if mibBuilder.loadTexts: maxBackgroundBWforAssociation.setDescription('Maximum background bandwidth to be used for association. ') radius_info = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 2)) external_radius_server_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 2, 2)) if mibBuilder.loadTexts: externalRadiusServerTable.setStatus('obsolete') if mibBuilder.loadTexts: externalRadiusServerTable.setDescription('Table of external RADIUS servers available for authentication services.') external_radius_server_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 2, 2, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'externalRadiusServerName')) if mibBuilder.loadTexts: externalRadiusServerEntry.setStatus('obsolete') if mibBuilder.loadTexts: externalRadiusServerEntry.setDescription('Configuration information about the RADIUS server entry.') external_radius_server_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 2, 2, 1, 1), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: externalRadiusServerName.setStatus('obsolete') if mibBuilder.loadTexts: externalRadiusServerName.setDescription('RADIUS server name.') external_radius_server_address = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 2, 2, 1, 2), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: externalRadiusServerAddress.setStatus('obsolete') if mibBuilder.loadTexts: externalRadiusServerAddress.setDescription('RADIUS server address, it can be either string or IP address.') external_radius_server_shared_secret = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 2, 2, 1, 3), octet_string().subtype(subtypeSpec=value_size_constraint(0, 64))).setMaxAccess('readwrite') if mibBuilder.loadTexts: externalRadiusServerSharedSecret.setStatus('obsolete') if mibBuilder.loadTexts: externalRadiusServerSharedSecret.setDescription('Shared secret between Radius and the client.') external_radius_server_row_status = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 2, 2, 1, 4), row_status()).setMaxAccess('readwrite') if mibBuilder.loadTexts: externalRadiusServerRowStatus.setStatus('obsolete') if mibBuilder.loadTexts: externalRadiusServerRowStatus.setDescription('Row Status for the entry.') das_info = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 3)) das_port = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 3, 1), integer32().subtype(subtypeSpec=value_range_constraint(1024, 65535)).clone(3799)).setMaxAccess('readwrite') if mibBuilder.loadTexts: dasPort.setStatus('current') if mibBuilder.loadTexts: dasPort.setDescription('Dynamic Authorization Server (DAS) port. ') das_replay_interval = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 3, 2), integer32().subtype(subtypeSpec=value_range_constraint(0, 1000)).clone(300)).setUnits('seconds').setMaxAccess('readwrite') if mibBuilder.loadTexts: dasReplayInterval.setStatus('current') if mibBuilder.loadTexts: dasReplayInterval.setDescription('The time window for message timeliness and replay protection for DAS packets. Packets should be dropped that their time generation is outside of this specified interval. Value zero indicates that the timeliness checking will be performed.') advanced_filtering_mode = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 4), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disabled', 0), ('enabled', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: advancedFilteringMode.setStatus('current') if mibBuilder.loadTexts: advancedFilteringMode.setDescription("Value of 'enabled(1)' means EWC is operating in advanced filtering configuration mode. Value of 'disabled(0)' means EWC is operating in mode that is compatible with releases prior to 7.41. This field can only be set to 'enabled(1)' and after setting it to that value, the only way to undo that is by resetting the database.") radius_strict_mode = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 5), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('strictModeDisabled', 0), ('strictModeEnabled', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: radiusStrictMode.setStatus('current') if mibBuilder.loadTexts: radiusStrictMode.setDescription('If this variable set to true, then assignment of RADIUS server(s) to WLAN are automatic during WLAN creation, otherwise, assignment of RADIUS server(s) to WLAN must be done manually. ') radius_fast_failover_events = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 6)) radius_fast_failover_events_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 6, 1)) if mibBuilder.loadTexts: radiusFastFailoverEventsTable.setStatus('current') if mibBuilder.loadTexts: radiusFastFailoverEventsTable.setDescription('Table in which to configure which RADIUS servers will be sent interim accounting reports for stations when a fast failover incident occurs ') radius_fast_failover_events_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 6, 1, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'radiusFFOEid')) if mibBuilder.loadTexts: radiusFastFailoverEventsEntry.setStatus('current') if mibBuilder.loadTexts: radiusFastFailoverEventsEntry.setDescription('An entry for each radius server.') radius_ffo_eid = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 6, 1, 1, 1), display_string().subtype(subtypeSpec=value_size_constraint(1, 64))) if mibBuilder.loadTexts: radiusFFOEid.setStatus('current') if mibBuilder.loadTexts: radiusFFOEid.setDescription('The IP address or hostname of configured radius server. If the hostname is created from GUI/CLI and the size is bigger than 64 characters, snmp will display the first 64 characters only. ') fast_failover_events = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 6, 1, 1, 2), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('fastFailoverEventsDisabled', 0), ('fastFailoverEventsEnabled', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: fastFailoverEvents.setStatus('current') if mibBuilder.loadTexts: fastFailoverEvents.setDescription('If true, send an interim accounting record to the RADIUS server for each affected station when a fast failover event occurs. This field can be modified when controller is operated in availablity paired mode and fast failover is enabled ') dhcp_relay_listeners = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 7)) dhcp_relay_listeners_max_entries = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 7, 1), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: dhcpRelayListenersMaxEntries.setStatus('current') if mibBuilder.loadTexts: dhcpRelayListenersMaxEntries.setDescription('Maximum number of servers to which DHCP messages are relayed .') dhcp_relay_listeners_num_entries = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 7, 2), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: dhcpRelayListenersNumEntries.setStatus('current') if mibBuilder.loadTexts: dhcpRelayListenersNumEntries.setDescription('The current number of entries in the dhcpRelayListenersTable.') dhcp_relay_listeners_next_index = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 7, 3), integer32()).setMaxAccess('readonly') if mibBuilder.loadTexts: dhcpRelayListenersNextIndex.setStatus('current') if mibBuilder.loadTexts: dhcpRelayListenersNextIndex.setDescription('This object indicates numerically lowest available index within this entity, which may be used for the value of index in the creation of new entry in dhcpRelayListenersTable. An index is considered available if the index falls within the range of 1 to dhcpRelayListenersMaxEntries and it is not being used to index an existing entry in the dhcpRelayListenersTable contained this entity. This value should only be used as guideline for the management application and there is no requirement on the management application to create entries based upon this index value. Value of zero indicates there is no more room for new dhcpRelayListenersTable creation.') dhcp_relay_listeners_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 7, 4)) if mibBuilder.loadTexts: dhcpRelayListenersTable.setStatus('current') if mibBuilder.loadTexts: dhcpRelayListenersTable.setDescription('A list of servers to which DHCP messages are relayed but from which no responses are expected. ') dhcp_relay_listeners_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 7, 4, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'dhcpRelayListenersID')) if mibBuilder.loadTexts: dhcpRelayListenersEntry.setStatus('current') if mibBuilder.loadTexts: dhcpRelayListenersEntry.setDescription('An entry for each dhcpRelayListeners.') dhcp_relay_listeners_id = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 7, 4, 1, 1), unsigned32()) if mibBuilder.loadTexts: dhcpRelayListenersID.setStatus('current') if mibBuilder.loadTexts: dhcpRelayListenersID.setDescription("The id corresponds to the 'server number' in the controller GUI and CLI.") dhcp_relay_listeners_row_status = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 7, 4, 1, 2), row_status()).setMaxAccess('readcreate') if mibBuilder.loadTexts: dhcpRelayListenersRowStatus.setStatus('current') if mibBuilder.loadTexts: dhcpRelayListenersRowStatus.setDescription('This object allows dynamic creation and deletion of entries within dhcpRelayListenersTable as well as activation and deactivation of these entries. For row creation, EWC only supports creatAndWait. ') destination_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 7, 4, 1, 3), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: destinationName.setStatus('current') if mibBuilder.loadTexts: destinationName.setDescription('Text string uniquely identifying NAC Server Name. Allowable characters for this field are from the set of A-Z, a-z, -_!#$, 0-9, and space. max len is 63 chars Howerver, it is recommended to avoid leading and trailing spaces.') destination_ip = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 7, 4, 1, 4), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: destinationIP.setStatus('current') if mibBuilder.loadTexts: destinationIP.setDescription('IPv4 address to which DHCP messages are relayed.') client_autologin_option = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 8), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2))).clone(namedValues=named_values(('hide', 0), ('redirect', 1), ('drop', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: clientAutologinOption.setStatus('current') if mibBuilder.loadTexts: clientAutologinOption.setDescription('Many devices such as those made by Apple(R) implement an autologin feature that prompts the user to login as soon as the device detects the presence of a Captive Portal. This feature sometimes causes problems for users who actually interact with the captive portal. hide(0) - Hide the captive portal from Autologin detector. redirect(1) - Redirect detection messages to the Captive Portal. This option is to allow client autologin to detect the captive portal & prompt the user to login. This may cause post-authentication redirection to fail. drop(2) - Drop detection messages.') authentication_advanced = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 9)) include_service_type = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 9, 1), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disable', 0), ('enable', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: includeServiceType.setStatus('current') if mibBuilder.loadTexts: includeServiceType.setDescription(' Include the Service-Type attribute in client access request messages when this field is set to enable(1). ') client_message_delay_time = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 9, 2), integer32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: clientMessageDelayTime.setStatus('current') if mibBuilder.loadTexts: clientMessageDelayTime.setDescription('This field specifies how long, in seconds, the notice Web page is displayed to the client when the topology changes as a result of a role change. The notice Web page indicates that authentication was successful and that the user must close all browser windows and then restart the browser for access to the network. Currently this is supported for Internal Captive Portal, Guest Portal, and Guest Splash. ') radius_accounting = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 9, 3), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disable', 0), ('enable', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: radiusAccounting.setStatus('current') if mibBuilder.loadTexts: radiusAccounting.setDescription('This field enables or disables RADIUS accounting. Disabling RADIUS accounting overrides the RADIUS accounting settings of individual WLAN Services. Enabling RADIUS accounting activates RADIUS accounting only in WLAN Services specifically configured to perform it.') server_usage_model = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 9, 4), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('roundRobin', 0), ('primaryBackup', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: serverUsageModel.setStatus('current') if mibBuilder.loadTexts: serverUsageModel.setDescription('This field specifies RADIUS server failover behavior when the primary server goes down. When the primary server is down the controller moves on to the secondary or tertiary configured RADIUS Servers. If this field is set to primaryBackup(1), then the controller starts polling the primary RADIUS server to see if it is up. When the primary RADIUS server comes back, the controller automatically starts sending new access requests to the primary RADIUS server but pending requests continue with backup RADIUS server. The administrator can select between the two strategies, i.e. the existing roundRobin(0) or new primaryBackup(1). This only applies to Authentication, not to Accounting.') radacct_start_on_ip_addr = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 9, 5), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disable', 0), ('enable', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: radacctStartOnIPAddr.setStatus('current') if mibBuilder.loadTexts: radacctStartOnIPAddr.setDescription("When this OID is set to disabled (0) the controller sends a RADIUS accounting start message as soon as it receives an Access-Accept for the user from a RADIUS server. When this OID is set to enabled(1) the controller defers sending the RADIUS accounting start message until an Access-Accept for the client is received and the client's IP address is known.") client_service_type_login = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 9, 6), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disable', 0), ('enable', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: clientServiceTypeLogin.setStatus('current') if mibBuilder.loadTexts: clientServiceTypeLogin.setDescription("When this OID is set to enabled(1) the controller sets the Service-Type attribute of a station's Access-Request to 'Login'. When this OID is set to disabled(0) the controller sets the Service-Type attribute of a station's Access-Request to 'Framed'. By default this OID is set to 'disabled'. You cannot use RADIUS servers to authenticate administrators for local server access when this OID is set to 'enabled'.") apply_mac_address_format = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 9, 7), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disable', 0), ('enable', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: applyMacAddressFormat.setStatus('current') if mibBuilder.loadTexts: applyMacAddressFormat.setDescription('When this OID is set to enabled(1), the controller uses MAC-Based Authentication MAC address format (refer to radiusMacAddressFormatOption) for user authentication and accounting via RADIUS.') radius_extns_setting = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 10)) radius_extns_setting_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 10, 1)) if mibBuilder.loadTexts: radiusExtnsSettingTable.setStatus('current') if mibBuilder.loadTexts: radiusExtnsSettingTable.setDescription('List of RADIUS servers that will be used. ') radius_extns_setting_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 10, 1, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'radiusExtnsIndex')) if mibBuilder.loadTexts: radiusExtnsSettingEntry.setStatus('current') if mibBuilder.loadTexts: radiusExtnsSettingEntry.setDescription('An entry for each RADIUS server.') radius_extns_index = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 10, 1, 1, 1), integer32().subtype(subtypeSpec=value_range_constraint(1, 2147483647))) if mibBuilder.loadTexts: radiusExtnsIndex.setStatus('current') if mibBuilder.loadTexts: radiusExtnsIndex.setDescription('A number uniquely identifying each conceptual row in the radiusExtnsSettingTable. This value also equivalent to etsysRadiusAuthServerIndex of enterasys-radius-auth-client-mib.txt file.') polling_mechanism = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 10, 1, 1, 2), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('authorizeAsActualUser', 0), ('useRFC5997StatusServerRequest', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: pollingMechanism.setStatus('current') if mibBuilder.loadTexts: pollingMechanism.setDescription("This field specifies the method to determine the health of the RADIUS server. If set to useRFC5997StatusServerRequest(1), RFC 5997 Status-Server packets will be sent to the primary server to determine it's health. If set to authorizeAsActualUser(0), access-request messages for a specified user account will be sent to the primary server to determine it's health.") server_polling_interval = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 10, 1, 1, 3), integer32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: serverPollingInterval.setStatus('current') if mibBuilder.loadTexts: serverPollingInterval.setDescription('Interval in seconds for the controller to poll the primary server.') netflow_and_mirror_n = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 11)) netflow_destination_ip = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 11, 1), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: netflowDestinationIP.setStatus('current') if mibBuilder.loadTexts: netflowDestinationIP.setDescription('The IP address for the Purview engine that will receive netflow records.') netflow_interval = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 11, 2), integer32().subtype(subtypeSpec=value_range_constraint(30, 360)).clone(60)).setMaxAccess('readwrite') if mibBuilder.loadTexts: netflowInterval.setStatus('current') if mibBuilder.loadTexts: netflowInterval.setDescription('The netflow record sending interval.') mirror_first_n = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 11, 3), integer32().clone(15)).setMaxAccess('readwrite') if mibBuilder.loadTexts: mirrorFirstN.setStatus('current') if mibBuilder.loadTexts: mirrorFirstN.setDescription('If non-zero, the first N packets of a particular flow will be mirrored. If 0, all packets will be mirrored.') mirror_l2_ports = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 11, 4), octet_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: mirrorL2Ports.setStatus('current') if mibBuilder.loadTexts: mirrorL2Ports.setDescription('Configure the mirror port(s) on the controller. The default value is None. Only l2ports will be allowed to be selected and only when not referred to elsewhere (lag, topologies). The most significant bit of the most significant octet represents the first esa port (esa0). The second most significant bit of the most significant octet represents the second esa port (esa1) and so on.') radius_mac_address_format_option = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 3, 12), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3, 4, 5, 6, 7, 9, 10, 11, 12))).clone(namedValues=named_values(('option1', 1), ('option2', 2), ('option3', 3), ('option4', 4), ('option5', 5), ('option6', 6), ('option7', 7), ('option8', 9), ('option10', 10), ('option11', 11), ('option12', 12)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: radiusMacAddressFormatOption.setStatus('current') if mibBuilder.loadTexts: radiusMacAddressFormatOption.setDescription('The controller allows configuring different kinds of Mac address format in RADIUS messages. option1: mac address format as XXXXXXXXXXXX option2: mac address format as XX:XX:XX:XX:XX:XX option3: mac address format as XX-XX-XX-XX-XX-XX option4: mac address format as XXXX.XXXX.XXXX option5: mac address format as XXXXXX-XXXXXX option6: mac address format as XX XX XX XX XX XX option7: mac address format as xxxxxxxxxxxx option8: mac address format as xx:xx:xx:xx:xx:xx option9: mac address format as xx-xx-xx-xx-xx-xx option10: mac address format as xxxx.xxxx.xxxx option11: mac address format as xxxxxx-xxxxxx option12: mac address format as xx xx xx xx xx xx') wlan = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4)) wlan_max_entries = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 1), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: wlanMaxEntries.setStatus('current') if mibBuilder.loadTexts: wlanMaxEntries.setDescription('Maximum number of WLAN supported by the device.') wlan_num_entries = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 2), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: wlanNumEntries.setStatus('current') if mibBuilder.loadTexts: wlanNumEntries.setDescription('The current number of entries in the wlanTable.') wlan_table_next_available_index = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 3), integer32()).setMaxAccess('readonly') if mibBuilder.loadTexts: wlanTableNextAvailableIndex.setStatus('current') if mibBuilder.loadTexts: wlanTableNextAvailableIndex.setDescription('This object indicates numerically lowest available index within this entity, which may be used for the value of index in the creation of new entry in wlanTable. An index is considered available if the index falls within the range of 1 to wlanMaxEntries and it is not being used to index an existing entry in the wlanTable contained this entity. This value should only be used as guideline for the management application and there is no requirement on the management application to create entries based upon this index value. Value of zero indicates there is no more room for new wlanTable creation.') wlan_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4)) if mibBuilder.loadTexts: wlanTable.setStatus('current') if mibBuilder.loadTexts: wlanTable.setDescription('Table of configured WLAN. ') wlan_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'wlanID')) if mibBuilder.loadTexts: wlanEntry.setStatus('current') if mibBuilder.loadTexts: wlanEntry.setDescription('An entry for each WLAN.') wlan_id = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 1), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: wlanID.setStatus('current') if mibBuilder.loadTexts: wlanID.setDescription('Unique internal ID associated with WLAN.') wlan_row_status = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 2), row_status()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRowStatus.setStatus('current') if mibBuilder.loadTexts: wlanRowStatus.setDescription("This object allows dynamic creation and deletion of entries within wlanTable as well as activation and deactivation of these entries. For row creation, EWC only supports creatAndWait. WLAN name must be set before making the row active and persistent. Any WLAN that is associated to a VNS cannot be deleted unless it is first disassociated from VNS before being deleted. Any inactive entry will not be persistent and it will be lost during controller's restart.") wlan_service_type = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 3), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 3, 4, 5, 6))).clone(namedValues=named_values(('standard', 0), ('wds', 3), ('thirdParty', 4), ('remote', 5), ('mesh', 6))).clone('standard')).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanServiceType.setStatus('current') if mibBuilder.loadTexts: wlanServiceType.setDescription('Service type of WLAN.') wlan_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 4), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanName.setStatus('current') if mibBuilder.loadTexts: wlanName.setDescription('Text string uniquely identifying WLAN within EWC. Allowable characters for this field are from the set of A-Z, a-z, -!#$:, 0-9, and space. Howerver, it is recommended to avoid leading and trailing spaces.') wlan_ssid = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 5), display_string().subtype(subtypeSpec=value_size_constraint(1, 32))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanSSID.setStatus('current') if mibBuilder.loadTexts: wlanSSID.setDescription('SSID (broadcast string) associated with WLAN. Allowable characters for this field are from the set of A-Z, a-z, _-.@, 0-9, and space. Howerver, it is recommendedto avoid leading and trailing spaces.') wlan_synchronize = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 6), truth_value().clone(1)).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanSynchronize.setStatus('current') if mibBuilder.loadTexts: wlanSynchronize.setDescription('If it is set to true, then WLAN will be replicated to peer controller if availability is configured and enabled.') wlan_enabled = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 7), truth_value().clone(1)).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanEnabled.setStatus('current') if mibBuilder.loadTexts: wlanEnabled.setDescription('This field is used to enable or disable this WLAN. If WLAN is disabled, then no traffic will be passed on behalf of this WLAN.') wlan_default_topology_id = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 8), integer32().subtype(subtypeSpec=constraints_union(value_range_constraint(-1, -1), value_range_constraint(0, 65535)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanDefaultTopologyID.setStatus('current') if mibBuilder.loadTexts: wlanDefaultTopologyID.setDescription('The ID of topology from topologyTable associated to this WLAN. Topology ID of -1 means no default topology is associated to this WLAN. Physical topologies cannot be assigned to WLAN. The default topology indicates which topology to use for this WLAN if there is no topology associated with VNS via policy assignment.') wlan_session_timeout = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 9), unsigned32()).setUnits('minute').setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanSessionTimeout.setStatus('current') if mibBuilder.loadTexts: wlanSessionTimeout.setDescription('MU session that is associated to this WLAN will be terminated after elapse of this number of minutes from the start of its current session.') wlan_idle_timeout_pre_auth = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 10), unsigned32().clone(5)).setUnits('minute').setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanIdleTimeoutPreAuth.setStatus('current') if mibBuilder.loadTexts: wlanIdleTimeoutPreAuth.setDescription('Elapse time between association and authentication after which MU session will be terminated if the user is idle this amount of time without being authenticated.') wlan_idle_session_post_auth = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 11), unsigned32().clone(30)).setUnits('minute').setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanIdleSessionPostAuth.setStatus('current') if mibBuilder.loadTexts: wlanIdleSessionPostAuth.setDescription('MU session that is associated to this WLAN will be terminated if the user is idle this amount of time after being authenticated.') wlan_supress_ssid = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 12), truth_value().clone(2)).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanSupressSSID.setStatus('current') if mibBuilder.loadTexts: wlanSupressSSID.setDescription('If it is set to true then broadcast string (SSID) for this WLAN will not be broadcasted over the air.') wlan_dot11h_support = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 13), truth_value().clone(2)).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanDot11hSupport.setStatus('current') if mibBuilder.loadTexts: wlanDot11hSupport.setDescription('If it is set to true then dot11h support is enabled for clients associated to this WLAN.') wlan_dot11h_client_power_reduction = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 14), truth_value().clone(2)).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanDot11hClientPowerReduction.setStatus('current') if mibBuilder.loadTexts: wlanDot11hClientPowerReduction.setDescription('If it is set to true then apply power reduction to dot11h clients associated to this WLAN. This field has meaning if wlanDot11hSupport is enabled (set to true).') wlan_process_client_ie = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 15), truth_value().clone(2)).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanProcessClientIE.setStatus('current') if mibBuilder.loadTexts: wlanProcessClientIE.setDescription('If it is set to true then clients that are associated to this WLAN their IE requests will be processed.') wlan_engery_save_mode = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 16), truth_value().clone(2)).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanEngerySaveMode.setStatus('current') if mibBuilder.loadTexts: wlanEngerySaveMode.setDescription('If it is set to true then engergy saving mode is enabled.') wlan_block_mu_to_mu_traffic = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 17), truth_value().clone(2)).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanBlockMuToMuTraffic.setStatus('current') if mibBuilder.loadTexts: wlanBlockMuToMuTraffic.setDescription('If it is set to true then two MU associated to this WLAN cannot communicate with each other.') wlan_remoteable = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 18), truth_value().clone(2)).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRemoteable.setStatus('current') if mibBuilder.loadTexts: wlanRemoteable.setDescription('If it is set to true then this WLAN can be used as remote WLAN within mobility zone that this controller is partaking.') wlan_vnsid = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 19), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: wlanVNSID.setStatus('current') if mibBuilder.loadTexts: wlanVNSID.setDescription('The ID of the VNS that uses this WLAN. WLAN can be created but not used in any VNS, in that case alue of zero indicates WLAN has not been used in any VNS. The value of this field set during VNS creation no during the WLAN creation. ') wlan_radio_management11k = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 20), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disable', 0), ('enable', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadioManagement11k.setStatus('current') if mibBuilder.loadTexts: wlanRadioManagement11k.setDescription('When this bit is set to enable, the Radio Management (802.11k) feature is enabled on those APs who have this wlan configuration and 802.11k capability. ') wlan_beacon_report = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 21), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disable', 0), ('enable', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanBeaconReport.setStatus('current') if mibBuilder.loadTexts: wlanBeaconReport.setDescription('Enable/disable AP to send out beacon report. This field is configurable only if wlanRadioManagement11k is set to enable(1).') wlan_quiet_ie = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 22), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disable', 0), ('enable', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanQuietIE.setStatus('current') if mibBuilder.loadTexts: wlanQuietIE.setDescription('Enable/disable AP to advertise a Quiet Element. This field is configurable only if wlanRadioManagement11k is set to enable(1).') wlan_mirror_n = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 23), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2))).clone(namedValues=named_values(('prohibited', 0), ('bothDirection', 1), ('rxDirectionOnly', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanMirrorN.setStatus('current') if mibBuilder.loadTexts: wlanMirrorN.setDescription("prohibited(0): Mirroring is prohibited. bothDirection(1) : Both direction packets will be mirrored. rxDirectionOnly(2): Only receive direction packets will be mirrored. Note: This will only take effect when the user's runtime current Roles's MirrorN action is None. ") wlan_net_flow = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 24), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disable', 0), ('enable', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanNetFlow.setStatus('current') if mibBuilder.loadTexts: wlanNetFlow.setDescription('Enable/disable netflow on this WLAN service.') wlan_app_visibility = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 4, 1, 25), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('enable', 1), ('disable', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanAppVisibility.setStatus('current') if mibBuilder.loadTexts: wlanAppVisibility.setDescription('Enable/disable both application visibility and control for this WLAN service.') wlan_stats_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 5)) if mibBuilder.loadTexts: wlanStatsTable.setStatus('current') if mibBuilder.loadTexts: wlanStatsTable.setDescription('Stats related to WLAN (RFS) created on EWC.') wlan_stats_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 5, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'wlanStatsID')) if mibBuilder.loadTexts: wlanStatsEntry.setStatus('current') if mibBuilder.loadTexts: wlanStatsEntry.setDescription('An entery for each existing WLAN on EWC.') wlan_stats_id = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 5, 1, 1), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: wlanStatsID.setStatus('current') if mibBuilder.loadTexts: wlanStatsID.setDescription('Unique internal ID associated with WLAN.') wlan_stats_associated_clients = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 5, 1, 2), counter32()).setMaxAccess('readonly') if mibBuilder.loadTexts: wlanStatsAssociatedClients.setStatus('current') if mibBuilder.loadTexts: wlanStatsAssociatedClients.setDescription('Number of clients that are currently associated to this WLAN. ') wlan_stats_radius_tot_requests = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 5, 1, 3), counter32()).setMaxAccess('readonly') if mibBuilder.loadTexts: wlanStatsRadiusTotRequests.setStatus('current') if mibBuilder.loadTexts: wlanStatsRadiusTotRequests.setDescription("Number of requests that were sent to RADIUS servers associated to this WLAN on behalf of MUs' requests using SSID associated to the WLAN for association, authentication or authorization to this WLAN.") wlan_stats_radius_req_failed = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 5, 1, 4), counter32()).setMaxAccess('readonly') if mibBuilder.loadTexts: wlanStatsRadiusReqFailed.setStatus('current') if mibBuilder.loadTexts: wlanStatsRadiusReqFailed.setDescription("Number of requests that were sent to RADIUS servers associated to this WLAN on behalf of MUs' requests for association, authentication or authorization to this WLAN but failed to be processed by RADIUS servers.") wlan_stats_radius_req_rejected = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 5, 1, 5), counter32()).setMaxAccess('readonly') if mibBuilder.loadTexts: wlanStatsRadiusReqRejected.setStatus('current') if mibBuilder.loadTexts: wlanStatsRadiusReqRejected.setDescription("Number of requests that were sent to RADIUS servers associated to this WLAN on behalf of MUs' requests for association, authentication or authorization to this WLAN but rejected to be processed by RADIUS servers.") wlan_priv_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6)) if mibBuilder.loadTexts: wlanPrivTable.setStatus('current') if mibBuilder.loadTexts: wlanPrivTable.setDescription('This table contains configuration of privacy settings for all configured WLAN on EWC. For each of the configured WLAN on the controller one entry is added to this table. Addition/deletion of entries in this table are automatic depending on the addition or deletion of entries in wlanTable table.') wlan_priv_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'wlanID')) if mibBuilder.loadTexts: wlanPrivEntry.setStatus('current') if mibBuilder.loadTexts: wlanPrivEntry.setDescription('An entry in wlanPrivTable for each configured WLAN on EWC. Each entry is indexed with corresponding wlan ID of wlanTable. The writable fields in this table can be modified depending on the corresponding wlanTable.') wlan_priv_privacy_type = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1, 1), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3, 4))).clone(namedValues=named_values(('none', 0), ('staticWEP', 1), ('dynamicWEP', 2), ('wpa', 3), ('wpaPSK', 4)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanPrivPrivacyType.setStatus('current') if mibBuilder.loadTexts: wlanPrivPrivacyType.setDescription('Type of privacy applied to the corresponding configured WLAN. Configuration of the other fields in this table depends on the value of this field, e.g. if this field is set to none(0), then no other field in this table are settable. ') wlan_priv_wep_key_index = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1, 2), integer32().subtype(subtypeSpec=value_range_constraint(1, 4))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanPrivWEPKeyIndex.setStatus('current') if mibBuilder.loadTexts: wlanPrivWEPKeyIndex.setDescription('Index of configured WEP. This field is required if and only if privacy type is staticWEP(1).') wlan_priv_wep_key_length = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1, 3), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3))).clone(namedValues=named_values(('sixtyFourBits', 1), ('oneHundred28Bits', 2), ('oneHundred52Bits', 3)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanPrivWEPKeyLength.setStatus('current') if mibBuilder.loadTexts: wlanPrivWEPKeyLength.setDescription('Key legnth for the configured WEP key. This field is required if and only if privacy type is staticWEP(1).') wlan_priv_wep_key = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1, 4), display_string().subtype(subtypeSpec=value_size_constraint(8, 19))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanPrivWEPKey.setStatus('current') if mibBuilder.loadTexts: wlanPrivWEPKey.setDescription('The configured WEP key length must match the wlanPrivWEPKeyLength field. Any key with length longer or shorter than that length will be rejected. This field is required if and only if privacy type is staticWEP(1). This key can only be viewed in SNMPv3 mode with privacy.') wlan_priv_wp_av1_encryption_type = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1, 5), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2))).clone(namedValues=named_values(('undefined', 0), ('tkipOnly', 1), ('auto', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanPrivWPAv1EncryptionType.setStatus('current') if mibBuilder.loadTexts: wlanPrivWPAv1EncryptionType.setDescription('The type of encryption used for WPA version 1 associations. This OID is undefined unless wlanPrivPrivacyType is wpa (3) or wpaPSK (4) and wlanPrivWPAversion is set to wpaV1 (1) or wpaV1andV2 (3).') wlan_priv_wp_av2_encryption_type = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1, 6), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 2, 3))).clone(namedValues=named_values(('undefined', 0), ('auto', 2), ('aesOnly', 3)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanPrivWPAv2EncryptionType.setStatus('current') if mibBuilder.loadTexts: wlanPrivWPAv2EncryptionType.setDescription('The type of encryption used for WPA version 2 associations. This OID is undefined unless wlanPrivPrivacyType is wpa (3) or wpaPSK (4) and wlanPrivWPAversion is set to wpaV2 (2) or wpaV1 and V2 (3).') wlan_priv_key_management = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1, 7), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3))).clone(namedValues=named_values(('none', 0), ('opportunisticKey', 1), ('preAuthentication', 2), ('both', 3)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanPrivKeyManagement.setStatus('current') if mibBuilder.loadTexts: wlanPrivKeyManagement.setDescription('Key management option available for the WPA2. This field has meaning if privacy type is WPA with WPA2 option enabled. This field can be modified only if wlanPrivPrivacyType is set to wpa(3) and wlanPrivWPAversion set to wpaV2(2) or wpaV1andV2(3). .') wlan_priv_broadcast_rekeying = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1, 8), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanPrivBroadcastRekeying.setStatus('current') if mibBuilder.loadTexts: wlanPrivBroadcastRekeying.setDescription('Broadcast rekeying if this value is set to true. This field can be modified only if wlanPrivPrivacyType is set to wpa(3) or wpaPSK(4).') wlan_priv_rekey_interval = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1, 9), unsigned32().subtype(subtypeSpec=value_range_constraint(30, 86400)).clone(3600)).setUnits('seconds').setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanPrivRekeyInterval.setStatus('current') if mibBuilder.loadTexts: wlanPrivRekeyInterval.setDescription('Interval in seconds for requesting rekeying. This field has meaning if privacy type is WPA and broadcast rekeying is enabled (wlanPrivBroadcastRekeying is set to true). This field can be modified only if wlanPrivBroadcastRekeying is set to true.') wlan_priv_group_kpsr = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1, 10), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanPrivGroupKPSR.setStatus('current') if mibBuilder.loadTexts: wlanPrivGroupKPSR.setDescription('Group Key Power Save Retry (GKPSR) value for the WPA type of privacy. This field can be modified only if wlanPrivPrivacyType is set to wpa(3) or wpaPSK(4).') wlan_priv_wpapsk = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1, 11), octet_string().subtype(subtypeSpec=value_size_constraint(8, 63))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanPrivWPAPSK.setStatus('current') if mibBuilder.loadTexts: wlanPrivWPAPSK.setDescription('WPA-PSK shared key. This field has meaning if and only if WLAN privacy type is set to WPA-PSK. Input type can be either HEX formatted string or ASCII string. In case of HEX string, it must be 64 octets from set of hex characters. In case of ASCII string, the length is limited between 8 to 63 octets. This key can only be viewed in SNMPv3 mode with privacy. This field can be modified only if wlanPrivPrivacyType is set to wpaPSK(4).') wlan_priv_wp_aversion = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1, 12), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3))).clone(namedValues=named_values(('wpaNone', 0), ('wpaV1', 1), ('wpaV2', 2), ('wpaV1andV2', 3)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanPrivWPAversion.setStatus('current') if mibBuilder.loadTexts: wlanPrivWPAversion.setDescription('Type of wpa version selected. This field can be modified only if wlanPrivPrivacyType is set to wpa(3) or wpaPSK(4). Note: wpa version v1 only is not allowed. 0 - no wpa version selected. 1 - wpa version v1 selected. 2 - wpa version v2 selected. 3 - both wpa version v1 and v2 selected.') wlan_privfast_transition = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1, 13), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disable', 0), ('enable', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanPrivfastTransition.setStatus('current') if mibBuilder.loadTexts: wlanPrivfastTransition.setDescription('When this field is set to enable(1), the 802.11r (fast transition) is enabled. This field can be modified only if wlanPrivPrivacyType is set to wpa(2).') wlan_priv_management_frame_protection = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 6, 1, 14), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2))).clone(namedValues=named_values(('disable', 0), ('enable', 1), ('require', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanPrivManagementFrameProtection.setStatus('current') if mibBuilder.loadTexts: wlanPrivManagementFrameProtection.setDescription('Disable(0) : The AP will not encrypt any management frames. Enable(1): The AP will encrypt management frames for clients who also support this feature. If the clients do not support this feature, they are still able to connect to the AP but with no management frames encryption. Require(2): The AP will only allow clients who have the PMF feature to connect. Supported management frames will be encrypted to 802.11w standards. Clients who do not support this feature will not be able to associate. ') wlan_auth_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7)) if mibBuilder.loadTexts: wlanAuthTable.setStatus('current') if mibBuilder.loadTexts: wlanAuthTable.setDescription('This table contains configuration of authentication settings for all configured WLAN on EWC. For each of the configured WLAN on the controller one entry is added to this table. Addition/deletion of entries in this table are automatic depending on the addition/deletion of entries in wlanTable table.') wlan_auth_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'wlanID')) if mibBuilder.loadTexts: wlanAuthEntry.setStatus('current') if mibBuilder.loadTexts: wlanAuthEntry.setDescription('An entry in wlanAuthTable for each configured WLAN on EWC. Each entry is indexed with corresponding wlan ID of wlanTable. The writable fields in this table can be modified depending on the corresponding wlanTable. Note: All the fields in this table except wlanAuthType and wlanAuthCollectAcctInformation have meaning if MAC-based authentication filed (wlanAuthMacBasedAuth) is set to true. ') wlan_auth_type = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 1), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3, 4, 5, 6, 7))).clone(namedValues=named_values(('disabled', 1), ('internalCP', 2), ('dot1x', 3), ('externalCP', 4), ('easyGuestCP', 5), ('guestSplash', 6), ('firewallFriendlyExCP', 7)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanAuthType.setStatus('current') if mibBuilder.loadTexts: wlanAuthType.setDescription('The type of authentication applied to stations attempting to associate to a BSSID belonging to this WLAN Service. If the dot1x type is selected, then this WLAN must have privacy. When the dot1x or internalCP is selected, the controller must have a RADIUS server, and SNMP will auto assign one RADIUS server to this WLAN if the user did not assign one.') wlan_auth_mac_based_auth = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 2), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanAuthMacBasedAuth.setStatus('current') if mibBuilder.loadTexts: wlanAuthMacBasedAuth.setDescription('MAC based authorization is enabled if this field is set to true. When this field set to true, SNMP will auto configure one RADIUS server to enable MAC authorization. ') wlan_auth_mac_based_auth_on_roam = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 3), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanAuthMACBasedAuthOnRoam.setStatus('current') if mibBuilder.loadTexts: wlanAuthMACBasedAuthOnRoam.setDescription('If it is set to true, the client will be forced to go through MAC based authorization when the client roamed. This field has meaning only when wlanAuthMacBasedAuth is set to true. This field can be modified only when wlanAuthMacBasedAuth is set to true. ') wlan_auth_auto_auth_authorized_user = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 4), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanAuthAutoAuthAuthorizedUser.setStatus('current') if mibBuilder.loadTexts: wlanAuthAutoAuthAuthorizedUser.setDescription('All authorized users will be considered authenticated automatically. This field has meaning only when wlanAuthMacBasedAuth is set to true. This field can be modified only when wlanAuthMacBasedAuth is set to true.') wlan_auth_allow_unauthorized_user = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 5), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanAuthAllowUnauthorizedUser.setStatus('current') if mibBuilder.loadTexts: wlanAuthAllowUnauthorizedUser.setDescription('Unauthorized users will be allowed if this field is set to true.This field has meaning only when wlanAuthMacBasedAuth is set to true. This field can be modified only when wlanAuthMacBasedAuth is set to true.') wlan_auth_radius_include_ap = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 6), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanAuthRadiusIncludeAP.setStatus('current') if mibBuilder.loadTexts: wlanAuthRadiusIncludeAP.setDescription('AP serial number will be included in RADIUS request packet as VSA if this field is set to true.') wlan_auth_radius_include_vns = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 7), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanAuthRadiusIncludeVNS.setStatus('current') if mibBuilder.loadTexts: wlanAuthRadiusIncludeVNS.setDescription('VNS name will be included in RADIUS request packet as VSA if this field is set to true.') wlan_auth_radius_include_ssid = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 8), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanAuthRadiusIncludeSSID.setStatus('current') if mibBuilder.loadTexts: wlanAuthRadiusIncludeSSID.setDescription('WLAN SSID will be included in RADIUS request packet as VSA if this field is set to true.') wlan_auth_radius_include_policy = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 9), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanAuthRadiusIncludePolicy.setStatus('current') if mibBuilder.loadTexts: wlanAuthRadiusIncludePolicy.setDescription('Policy name will be included in RADIUS request packet as VSA if this field is set to true.') wlan_auth_radius_include_topology = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 10), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanAuthRadiusIncludeTopology.setStatus('current') if mibBuilder.loadTexts: wlanAuthRadiusIncludeTopology.setDescription('Topology name will be included in RADIUS request packet as VSA if this field is set to true.') wlan_auth_radius_include_ingress_rc = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 11), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanAuthRadiusIncludeIngressRC.setStatus('current') if mibBuilder.loadTexts: wlanAuthRadiusIncludeIngressRC.setDescription('Ingress rate control name will be included in RADIUS request packet as VSA if this field is set to true.') wlan_auth_radius_include_egress_rc = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 12), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanAuthRadiusIncludeEgressRC.setStatus('current') if mibBuilder.loadTexts: wlanAuthRadiusIncludeEgressRC.setDescription('Egress rate control name will be included in RADIUS request packet as VSA if this field is set to true.') wlan_auth_collect_acct_information = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 13), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanAuthCollectAcctInformation.setStatus('current') if mibBuilder.loadTexts: wlanAuthCollectAcctInformation.setDescription('Accounting information is collected for clients if this field is set to true.') wlan_auth_replace_called_station_id_with_zone = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 14), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanAuthReplaceCalledStationIDWithZone.setStatus('current') if mibBuilder.loadTexts: wlanAuthReplaceCalledStationIDWithZone.setDescription('Replace called station ID with Zone if this field is set to true.') wlan_auth_radius_acct_after_mac_base_authorization = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 15), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanAuthRadiusAcctAfterMacBaseAuthorization.setStatus('current') if mibBuilder.loadTexts: wlanAuthRadiusAcctAfterMacBaseAuthorization.setDescription('RADIUS accounting begins after MAC-based authorization completes if this field is set to true. This field has meaning only when wlanAuthMacBasedAuth is set to true. This field can be modified only when wlanAuthMacBasedAuth is set to true.') wlan_auth_radius_timeout_role = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 16), integer32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanAuthRadiusTimeoutRole.setStatus('current') if mibBuilder.loadTexts: wlanAuthRadiusTimeoutRole.setDescription("Apply this role to clients when the RADIUS server timed out. '-1' is treat like access reject. Any other number is the Role ID. This field has meaning only when wlanAuthMacBasedAuth is set to true. This field can be modified only when wlanAuthMacBasedAuth is set to true.") wlan_auth_radius_operator_name_space = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 17), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(-1, 48, 49, 50, 51))).clone(namedValues=named_values(('disabled', -1), ('tadig', 48), ('realm', 49), ('e212', 50), ('icc', 51)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanAuthRadiusOperatorNameSpace.setStatus('current') if mibBuilder.loadTexts: wlanAuthRadiusOperatorNameSpace.setDescription('wlanAuthRadiusOperatorNameSpace is the Namespace ID as defined in RFC 5580. The value within this field contains the operator namespace identifier. The Namespace ID value is encoded in ASCII and has the following values. -1 : disabled. 48 : TADIG. 49 : REALM. 50 : E212. 51 : ICC. ') wlan_auth_radius_operator_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 18), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanAuthRadiusOperatorName.setStatus('current') if mibBuilder.loadTexts: wlanAuthRadiusOperatorName.setDescription('RADIUS accounting message will include this string when the wlanAuthRadiusOperatorNameSpace is not set to -1.') wlan_auth_mac_based_auth_re_auth_on_area_roam = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 7, 1, 19), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanAuthMACBasedAuthReAuthOnAreaRoam.setStatus('current') if mibBuilder.loadTexts: wlanAuthMACBasedAuthReAuthOnAreaRoam.setDescription('If this field is set to true, the client will be forced to go through MAC based authorization when the client roams to another area. This field has meaning and can be modified only when wlanAuthMacBasedAuth is set to true. ') wlan_radius_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 8)) if mibBuilder.loadTexts: wlanRadiusTable.setStatus('current') if mibBuilder.loadTexts: wlanRadiusTable.setDescription('This table contains configuration of RADIUS settings for all configured WLAN on EWC. For each of the configured WLAN on the controller there may exist one or more entries of RADIUS server(s) serving the WLAN. Addition/deletion of entries in this table are automatic depending on the addition/deletion of entries in wlanTable table.') wlan_radius_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 8, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'wlanID'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusIndex')) if mibBuilder.loadTexts: wlanRadiusEntry.setStatus('current') if mibBuilder.loadTexts: wlanRadiusEntry.setDescription('An entry in wlanRadiusTable for each RADIUS server used by the WLAN indexed by wlanID.') wlan_radius_index = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 8, 1, 1), unsigned32()) if mibBuilder.loadTexts: wlanRadiusIndex.setStatus('current') if mibBuilder.loadTexts: wlanRadiusIndex.setDescription('Internally generated index and it has no external meaning.') wlan_radius_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 8, 1, 2), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusName.setStatus('current') if mibBuilder.loadTexts: wlanRadiusName.setDescription('Name of the RADIUS server associated to this entry.') wlan_radius_usage = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 8, 1, 3), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3))).clone(namedValues=named_values(('auth', 1), ('mac', 2), ('acc', 3)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusUsage.setStatus('current') if mibBuilder.loadTexts: wlanRadiusUsage.setDescription('Usage type associated to this entry for authentication.') wlan_radius_priority = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 8, 1, 4), integer32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusPriority.setStatus('current') if mibBuilder.loadTexts: wlanRadiusPriority.setDescription('Priority associated to this entry for authentication. RADIUS servers are contacted for authentication requests in the order of their priority defined in this field. The highest priority servers (priorities with lower numerical values have higher priority order) are consulted first for any authentication request.') wlan_radius_port = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 8, 1, 5), unsigned32().clone(1812)).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusPort.setStatus('current') if mibBuilder.loadTexts: wlanRadiusPort.setDescription('The RADIUS authentication requests should be sent to this authentication port.') wlan_radius_retries = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 8, 1, 6), unsigned32().subtype(subtypeSpec=value_range_constraint(1, 32)).clone(3)).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusRetries.setStatus('current') if mibBuilder.loadTexts: wlanRadiusRetries.setDescription('Maximum number of retries attempted for an specific authentication request.') wlan_radius_timeout = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 8, 1, 7), unsigned32().subtype(subtypeSpec=value_range_constraint(1, 360)).clone(5)).setUnits('seconds').setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusTimeout.setStatus('current') if mibBuilder.loadTexts: wlanRadiusTimeout.setDescription('Number of seconds to wait for a response from authentication server for each request sent to the server before considering the request as failure.') wlan_radius_nas_use_vns_ip = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 8, 1, 8), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusNASUseVnsIP.setStatus('current') if mibBuilder.loadTexts: wlanRadiusNASUseVnsIP.setDescription('If this value is set to true, then VNS IP address associated to the WLAN indexed by wlanID to this entry is used as NAS IP address. Otherwise NAS IP address should be configured manually.') wlan_radius_nasip = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 8, 1, 9), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusNASIP.setStatus('current') if mibBuilder.loadTexts: wlanRadiusNASIP.setDescription('NAS IP associated to this RADIUS server. Configuration of this field is directly affected by the value of wlanRadiusNASUseVnsIP.') wlan_radius_nasid_use_vns_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 8, 1, 10), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusNASIDUseVNSName.setStatus('current') if mibBuilder.loadTexts: wlanRadiusNASIDUseVNSName.setDescription('If this value is set to true, then use VNS name associated to the WLAN indexed by wlanID for this entry as NAS ID. Otherwise NAS ID should be configured manually.') wlan_radius_nasid = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 8, 1, 11), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusNASID.setStatus('current') if mibBuilder.loadTexts: wlanRadiusNASID.setDescription('NAS ID associated to this RADIUS server. Configuration of this field is directly affected by the value of wlanRadiusNASIDUseVNSName.') wlan_radius_auth_type = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 8, 1, 12), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3))).clone(namedValues=named_values(('pap', 0), ('chap', 1), ('mschap', 2), ('mschap2', 3))).clone('pap')).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusAuthType.setStatus('current') if mibBuilder.loadTexts: wlanRadiusAuthType.setDescription('Authentication type used for this WLAN when using this RADIUS server to authenticate users.') wlan_cp_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9)) if mibBuilder.loadTexts: wlanCPTable.setStatus('current') if mibBuilder.loadTexts: wlanCPTable.setDescription('This table contains configuration of Captive Portal settings for all configured WLAN on EWC. For each of the configured WLAN on the controller one entry is added to this table. Addition/deletion of entries in this table are automatic depending on the addition/deletion of entries in wlanTable table. This table can be accessed using SNMPv3 on behalf of users with privacy.') wlan_cp_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'wlanID')) if mibBuilder.loadTexts: wlanCPEntry.setStatus('current') if mibBuilder.loadTexts: wlanCPEntry.setDescription("An entry in wlanCPTable for each configured WLAN on EWC. Each entry is indexed with corresponding wlan ID of wlanTable. The writable fields in this table can be modified depending on the corresponding wlanTable and type of CP assigned to the WLAN. If the authentication type is 'disabled(0)' for the WLAN, then all other entries in this table have no meaning.") wlan_cp_auth_type = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 1), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3, 4, 5, 6, 7))).clone(namedValues=named_values(('disabled', 1), ('internalCP', 2), ('dot1x', 3), ('externalCP', 4), ('easyGuestCP', 5), ('guestSplash', 6), ('firewallFriendlyExCP', 7)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanCPAuthType.setStatus('current') if mibBuilder.loadTexts: wlanCPAuthType.setDescription('Type of authentication applied to MU requesting association using SSID associated to this WLAN.') wlan_cp802_http_redirect = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 2), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanCP802HttpRedirect.setStatus('current') if mibBuilder.loadTexts: wlanCP802HttpRedirect.setDescription("If it is set to true, then CP will be redirected to configured CP. This value has meaning only for CP of the type 'dot1x(3)'.") wlan_cp_ext_connection = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 3), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanCPExtConnection.setStatus('current') if mibBuilder.loadTexts: wlanCPExtConnection.setDescription('IP address of the interface for this CP.') wlan_cp_ext_port = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 4), unsigned32().subtype(subtypeSpec=value_range_constraint(32768, 65535))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanCPExtPort.setStatus('current') if mibBuilder.loadTexts: wlanCPExtPort.setDescription('The port associated to the CP IP address.') wlan_cp_ext_enable_https = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 5), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanCPExtEnableHttps.setStatus('current') if mibBuilder.loadTexts: wlanCPExtEnableHttps.setDescription('HTTPS support is enabled if this field is set to true.') wlan_cp_ext_encryption = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 6), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2))).clone(namedValues=named_values(('none', 0), ('legacy', 1), ('aes', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanCPExtEncryption.setStatus('current') if mibBuilder.loadTexts: wlanCPExtEncryption.setDescription('Type of encryption for the CP.') wlan_cp_ext_shared_secret = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 7), octet_string().subtype(subtypeSpec=value_size_constraint(16, 64))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanCPExtSharedSecret.setStatus('current') if mibBuilder.loadTexts: wlanCPExtSharedSecret.setDescription('Shared secret used for this captive portal.') wlan_cp_ext_tos_override = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 8), truth_value().clone('false')).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanCPExtTosOverride.setStatus('current') if mibBuilder.loadTexts: wlanCPExtTosOverride.setDescription('Override ToS of NAC server usage only.') wlan_cp_ext_tos_value = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 9), unsigned32().subtype(subtypeSpec=value_range_constraint(0, 255))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanCPExtTosValue.setStatus('deprecated') if mibBuilder.loadTexts: wlanCPExtTosValue.setDescription('ToS value for NAC server only.') wlan_cp_ext_add_i_pto_url = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 10), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanCPExtAddIPtoURL.setStatus('current') if mibBuilder.loadTexts: wlanCPExtAddIPtoURL.setDescription('If this value is set to true, then add EWC IP address and port number to the redirection URL.') wlan_cp_int_logoff_button = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 11), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanCPIntLogoffButton.setStatus('current') if mibBuilder.loadTexts: wlanCPIntLogoffButton.setDescription("If set to true provide 'Logoff' button to the user in CP page.") wlan_cp_int_status_check_button = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 12), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanCPIntStatusCheckButton.setStatus('current') if mibBuilder.loadTexts: wlanCPIntStatusCheckButton.setDescription("If set to true provide 'Status Check' button to the user in CP page.") wlan_cp_replace_i_pwith_fqdn = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 13), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanCPReplaceIPwithFQDN.setStatus('current') if mibBuilder.loadTexts: wlanCPReplaceIPwithFQDN.setDescription('Replace CP gateway IP address with FQDN.') wlan_cp_send_login_to = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 14), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2))).clone(namedValues=named_values(('originalDestination', 0), ('cpSessionPage', 1), ('customURL', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanCPSendLoginTo.setStatus('current') if mibBuilder.loadTexts: wlanCPSendLoginTo.setDescription('This field indicates to what URL the successful login session must be redirected. This field qualifies wlanCPRedirectURL.') wlan_cp_redirect_url = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 15), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanCPRedirectURL.setStatus('current') if mibBuilder.loadTexts: wlanCPRedirectURL.setDescription('Text string identifying default redirection URL.') wlan_cp_guest_acc_lifetime = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 16), unsigned32()).setUnits('days').setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanCPGuestAccLifetime.setStatus('current') if mibBuilder.loadTexts: wlanCPGuestAccLifetime.setDescription('This value indicates for how many days the guest account is valid. Value of zero indicates that there is no limit for the guest account.') wlan_cp_guest_allowed_lifetime_acct = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 17), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanCPGuestAllowedLifetimeAcct.setStatus('current') if mibBuilder.loadTexts: wlanCPGuestAllowedLifetimeAcct.setDescription('If this value is set to true, then guest admin can obtain lifetime account.') wlan_cp_guest_session_lifetime = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 18), unsigned32()).setUnits('hours').setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanCPGuestSessionLifetime.setStatus('current') if mibBuilder.loadTexts: wlanCPGuestSessionLifetime.setDescription('The guess account session using this CP cannot last longer than this number of hours. Value of zero means there is no limit for the session.') wlan_cp_guest_id_prefix = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 19), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanCPGuestIDPrefix.setStatus('current') if mibBuilder.loadTexts: wlanCPGuestIDPrefix.setDescription('The prefix used for guest portal user ID label.') wlan_cp_guest_min_pass_length = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 20), unsigned32().subtype(subtypeSpec=value_range_constraint(1, 32)).clone(8)).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanCPGuestMinPassLength.setStatus('current') if mibBuilder.loadTexts: wlanCPGuestMinPassLength.setDescription('Minimum password length for the guest user account associated to this WLAN.') wlan_cp_guest_max_concurrent_session = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 21), unsigned32().subtype(subtypeSpec=value_range_constraint(0, 10)).clone(8)).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanCPGuestMaxConcurrentSession.setStatus('current') if mibBuilder.loadTexts: wlanCPGuestMaxConcurrentSession.setDescription('Maximum number of the guest users can use this set of credentials to access this concurrent session.') wlan_cp_use_http_sfor_connection = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 22), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanCPUseHTTPSforConnection.setStatus('current') if mibBuilder.loadTexts: wlanCPUseHTTPSforConnection.setDescription('When this value set to true, use HTTPS for user connection. It has meaning only when wlanCPAuthType is set to internalCP(2) or easyGuestCP(5) or guestSplash(6) ') wlan_cp_identity = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 23), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanCPIdentity.setStatus('current') if mibBuilder.loadTexts: wlanCPIdentity.setDescription('wlanCPIdentity is used to identify the EWC to the external captive portal server (ECP) and the ECP to the EWC.') wlan_cp_custom_specific_url = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 24), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanCPCustomSpecificURL.setStatus('current') if mibBuilder.loadTexts: wlanCPCustomSpecificURL.setDescription('After a user successfully logs in, the user will be redirected to the URL as defined in the wlanCPCustomSpecificURL.') wlan_cp_selection_option = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 9, 1, 25), bits().clone(namedValues=named_values(('addEWCPortAndIP', 0), ('apNameAndSerial', 1), ('associatedBSSID', 2), ('vnsName', 3), ('userMacAddress', 4), ('currentlyAssignedRole', 5), ('containmentVLAN', 6), ('timeStamp', 7), ('signature', 8), ('ssid', 9)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanCPSelectionOption.setStatus('current') if mibBuilder.loadTexts: wlanCPSelectionOption.setDescription('Append the above parameter(s) to the EWC captive portal redirection URL if one or more of the bits are set. ') wlan_unsecured_wlan_counts = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 10), counter32()).setMaxAccess('readonly') if mibBuilder.loadTexts: wlanUnsecuredWlanCounts.setStatus('current') if mibBuilder.loadTexts: wlanUnsecuredWlanCounts.setDescription('Total number of WLAN with security issues. The details of security issues can be found in wlanSecurityReportTable.') wlan_security_report_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 11)) if mibBuilder.loadTexts: wlanSecurityReportTable.setStatus('current') if mibBuilder.loadTexts: wlanSecurityReportTable.setDescription('This table contains the weak configuration settings for all configured WLAN on EWC. For each of the configured WLAN on the controller there exist one entry in this table. Addition/deletion of entries in this table are automatic depending on the addition or deletion of entries in wlanTable table. This table can be accessed using SNMPv3 on behalf of users with privacy.') wlan_security_report_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 11, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'wlanID')) if mibBuilder.loadTexts: wlanSecurityReportEntry.setStatus('current') if mibBuilder.loadTexts: wlanSecurityReportEntry.setDescription('An entry in wlanSecurityReportTable for each configured WLAN on EWC. Each entry is indexed with corresponding wlan ID of wlanTable.') wlan_security_report_flag = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 11, 1, 1), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('unsecureSetting', 1), ('secureSetting', 2)))).setMaxAccess('readonly') if mibBuilder.loadTexts: wlanSecurityReportFlag.setStatus('current') if mibBuilder.loadTexts: wlanSecurityReportFlag.setDescription('Value of secureSetting(2) indicates that WLAN has secure configuration.') wlan_security_report_unsecure_type = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 11, 1, 2), bits().clone(namedValues=named_values(('open', 0), ('wep', 1), ('tkip', 2), ('defaultSsid', 3), ('hotspotSsid', 4), ('rainbowSsid', 5), ('dictionaryWordKey', 6), ('dictionaryWordSubstring', 7), ('passwordTooShort', 8)))).setMaxAccess('readonly') if mibBuilder.loadTexts: wlanSecurityReportUnsecureType.setStatus('current') if mibBuilder.loadTexts: wlanSecurityReportUnsecureType.setDescription('bit 0: by setting this bit means this WLAN does not use any kind of encryption bit 1: by setting this bit means this WLAN uses weak WEP encryption bit 2: by setting this bit means this WLAN uses weak tkip encryption bit 3: by setting this bit means this WLAN uses default SSID bit 4: by setting this bit means this WLAN uses HotSpot SSID bit 5: by setting this bit means this WLAN uses Rainbow SSID bit 6: by setting this bit means this WLAN uses dictionary word as an encryption key bit 7: by setting this bit means this WLAN uses dictionary word in an encryption key string bit 8: by setting this bit means this WLAN uses a short password key') wlan_security_report_notes = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 11, 1, 3), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: wlanSecurityReportNotes.setStatus('current') if mibBuilder.loadTexts: wlanSecurityReportNotes.setDescription('Textual description of any security issues related to the WLAN is reflected in this field.') wlan_radius_server_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12)) if mibBuilder.loadTexts: wlanRadiusServerTable.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerTable.setDescription('This table contains configuration of RADIUS Servers settings for all configured WLANs on the Wireless Controller. For each of the configured WLANs on the controller there may exist one or more entries of RADIUS server(s) serving the WLAN. Addition/deletion of entries in this table are automatic depending on the addition/deletion of entries in wlanTable table.') wlan_radius_server_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'wlanID'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'radiusId')) if mibBuilder.loadTexts: wlanRadiusServerEntry.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerEntry.setDescription("An entry in wlanRadiusServerTable for each RADIUS server used by the WLAN indexed by wlanID and radiusId. The radiusId is the controller's internal radius server index.") radius_id = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 1), unsigned32()) if mibBuilder.loadTexts: radiusId.setStatus('current') if mibBuilder.loadTexts: radiusId.setDescription("Controller's internal RADIUS index.") wlan_radius_server_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 2), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: wlanRadiusServerName.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerName.setDescription('Name of the RADIUS server.') wlan_radius_server_use = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 3), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('notUse', 0), ('use', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusServerUse.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerUse.setDescription('use : This means that this WLAN service indexed by wlanID uses this RADIUS server which it is indexed by the radiusId. ') wlan_radius_server_usage = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 4), bits().clone(namedValues=named_values(('auth', 0), ('mac', 1), ('acct', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusServerUsage.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerUsage.setDescription('bit 0: By setting this bit, this RADIUS server is used for authentication. This bit has meaning only when wlanAuthType is set to internalCP(2), dot1x(3), or externalCP(4). bit 1: By setting this bit, this RADIUS server is used for MAC-based authentication. This bit has meaning only when wlanAuthMacBasedAuth is set to true. bit 2: By setting this bit, this RADIUS server is used for accounting. This bit has meaning only when wlanAuthType is set to internalCP(2), dot1x(3), or externalCP(4).') wlan_radius_server_auth_use_vnsip_addr = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 5), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusServerAuthUseVNSIPAddr.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerAuthUseVNSIPAddr.setDescription("When this value set to true, use the VNS's IP address as NAS IP address during the authentication.") wlan_radius_server_auth_nasip = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 6), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusServerAuthNASIP.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerAuthNASIP.setDescription("Use this IP address as the NAS IP addresss during the authentication. The default IP address is the VNS IP address. This field has meaning only when the wlanRadiusServerUsage's bit 0 is set. ") wlan_radius_server_auth_use_vns_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 7), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusServerAuthUseVNSName.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerAuthUseVNSName.setDescription("When this value set to true, use the VNS's name as the NAS identifier during the authentication.") wlan_radius_server_auth_nas_id = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 8), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusServerAuthNASId.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerAuthNASId.setDescription("Use this name as the NAS identifier during the authentication. The default name is the VNS name. This field has meaning only when the wlanRadiusServerUsage's bit 0 is set.") wlan_radius_server_auth_auth_type = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 9), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3, 4))).clone(namedValues=named_values(('pap', 0), ('chap', 1), ('mschap', 2), ('mschap2', 3), ('eap', 4)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusServerAuthAuthType.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerAuthAuthType.setDescription("Authentication type. This field has meaning only when the wlanRadiusServerUsage's bit 0 is set.") wlan_radius_server_acct_use_vnsip_addr = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 10), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusServerAcctUseVNSIPAddr.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerAcctUseVNSIPAddr.setDescription("When this value set to true, use the VNS's IP address as NAS IP address during the accounting.") wlan_radius_server_acct_nasip = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 11), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusServerAcctNASIP.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerAcctNASIP.setDescription("Use this IP address as the NAS IP addresss during the accounting. The default IP address is the VNS IP address. This field has meaning only when the wlanRadiusServerUsage's bit 2 is set.") wlan_radius_server_acct_use_vns_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 12), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusServerAcctUseVNSName.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerAcctUseVNSName.setDescription("When this value set to true, use the VNS's name as the NAS identifier during the accounting.") wlan_radius_server_acct_nas_id = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 13), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusServerAcctNASId.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerAcctNASId.setDescription("Use this name as the NAS identifier during the accounting. The default name is the VNS name. This field has meaning only when the wlanRadiusServerUsage's bit 2 is set.") wlan_radius_server_acct_siar = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 14), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusServerAcctSIAR.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerAcctSIAR.setDescription("If this value is set to true, then the controller sends interrim accounting records for fast failover events. This field has meaning only when the wlanRadiusServerUsage's bit 2 is set.") wlan_radius_server_mac_use_vnsip_addr = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 15), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusServerMacUseVNSIPAddr.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerMacUseVNSIPAddr.setDescription("When this value set to true, use the VNS's IP address as NAS IP address during the MAC based authentication.") wlan_radius_server_mac_nasip = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 16), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusServerMacNASIP.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerMacNASIP.setDescription("Use this IP address as the NAS IP addresss during the MAC based authentication. The default IP address is the VNS IP address. This field has meaning only when the wlanRadiusServerUsage's bit 1 is set.") wlan_radius_server_mac_use_vns_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 17), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusServerMacUseVNSName.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerMacUseVNSName.setDescription("When this value set to true, use the VNS's name as the NAS identifier during the MAC based authentication.") wlan_radius_server_mac_nas_id = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 18), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusServerMacNASId.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerMacNASId.setDescription("Use this name as the NAS identifier during the MAC based authentication. The default name is the VNS name. This field has meaning only when the wlanRadiusServerUsage's bit 1 is set.") wlan_radius_server_mac_auth_type = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 19), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3))).clone(namedValues=named_values(('pap', 0), ('chap', 1), ('mschap', 2), ('mschap2', 3)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusServerMacAuthType.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerMacAuthType.setDescription("Authentication type. This field has meaning only when the wlanRadiusServerUsage's bit 1 is set.") wlan_radius_server_mac_pw = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 3, 4, 12, 1, 20), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: wlanRadiusServerMacPW.setStatus('current') if mibBuilder.loadTexts: wlanRadiusServerMacPW.setDescription("The password is used for MAC based authentication. This field has meaning only when the wlanRadiusServerUsage's bit 1 is set.") topology = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4)) topology_config = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1)) topology_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1)) if mibBuilder.loadTexts: topologyTable.setStatus('current') if mibBuilder.loadTexts: topologyTable.setDescription('List of topologies configured on EWC.') topology_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'topologyID')) if mibBuilder.loadTexts: topologyEntry.setStatus('current') if mibBuilder.loadTexts: topologyEntry.setDescription('Configuration information about a topology in topology table. EWC supports different types of topologies, therefore, for complete configuration of a topology not all fields are necessary to be defined or have meaning. Definition of each field in this table specifies topolog-specific characteristics of the field and its relevance.') topology_id = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 1), unsigned32()) if mibBuilder.loadTexts: topologyID.setStatus('current') if mibBuilder.loadTexts: topologyID.setDescription('Unique internal identifier of the topology. This item is generated internally by EWC and has no external meaning.') topology_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 2), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: topologyName.setStatus('current') if mibBuilder.loadTexts: topologyName.setDescription('Name associated with topology. This name must be unique within EWC. Allowable characters for this field are from the set of A-Z, a-z, -!#$:, 0-9, and space. Howerver, it is recommended to avoid leading and trailing spaces.') topology_mode = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 3), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(-1, 0, 1, 2, 4, 5, 6))).clone(namedValues=named_values(('undefined', -1), ('routed', 0), ('bridgedAtAP', 1), ('bridgedAtAC', 2), ('thirdPartyAP', 4), ('physical', 5), ('management', 6)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: topologyMode.setStatus('current') if mibBuilder.loadTexts: topologyMode.setDescription('Type of this topology. This field implies the meaning and necessity of other attributes associated to the topology.') topology_tagged = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 4), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('tagged', 1), ('untagged', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: topologyTagged.setStatus('current') if mibBuilder.loadTexts: topologyTagged.setDescription('If topology is tagged, then a VLAN ID must be assigned to the topology. Meaning associated to this field is topology specific: - For Admin topology (management port) is always untagged - Ror routed topology has no meaning and always untagged - For all other topologies this field is configurable.') topology_vlan_id = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 5), integer32().subtype(subtypeSpec=constraints_union(value_range_constraint(-1, -1), value_range_constraint(1, 4095))).clone(-1)).setMaxAccess('readwrite') if mibBuilder.loadTexts: topologyVlanID.setStatus('current') if mibBuilder.loadTexts: topologyVlanID.setDescription('VLAN ID assigned to a tagged topology. For untagged topology this field has no meaning and it is set to -1.') topology_egress_port = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 6), octet_string().subtype(subtypeSpec=value_size_constraint(0, 12))).setMaxAccess('readwrite') if mibBuilder.loadTexts: topologyEgressPort.setStatus('current') if mibBuilder.loadTexts: topologyEgressPort.setDescription('Egress port associated to this topology if it is tagged and VLANID defined for the topology. This field is represented as octect string: The most significant bit of most significant octet represent first physical port (lowest number port) and second most significant bit of most significant octet represent second physical port and so on. Meaning associated to this field is topology specific: - For Admin topology (management port) this field has no meaning. - Ror routed topology this field has no meaning - For all other topologies: physical, bridge at controller, and bridge at AP topologies this field is configurable.') topology_layer3 = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 7), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: topologyLayer3.setStatus('current') if mibBuilder.loadTexts: topologyLayer3.setDescription('If set to true, then topology has layer three persence. Any topology with layer three presence must have IP address and gateway assigned to it. Meaning associated to this field is topology specific: - For Admin topology (management port) it is always set to true. - Ror bridge at AP this field has no meaning and it is set to false. - For routed and physical topologies it is always set to true. - For bridge at controller type of topology this field is configurable.') topology_ip_address = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 8), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: topologyIPAddress.setStatus('current') if mibBuilder.loadTexts: topologyIPAddress.setDescription('IP address assigned to the topology as its interface. Meaning associated to this field is topology specific: - This field has meaning if topology has layer three presence. - Ror bridge at AP this field has no meaning and set 0.0.0.0.') topology_ip_mask = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 9), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: topologyIPMask.setStatus('current') if mibBuilder.loadTexts: topologyIPMask.setDescription("Mask for topology's IP address. This field is only applicable to those topologies that have IP address assigned to them, otherwise it is set either to 255.255.255.255 or 0.0.0.0.") topology_mt_usize = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 10), unsigned32().clone(1436)).setMaxAccess('readwrite') if mibBuilder.loadTexts: topologyMTUsize.setStatus('current') if mibBuilder.loadTexts: topologyMTUsize.setDescription('Default MTU size for the topology. This field is only configurable for a topologies that has layer three presence.') topology_gateway = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 11), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: topologyGateway.setStatus('current') if mibBuilder.loadTexts: topologyGateway.setDescription('Gateway associated to this topology. This field has meaning for a topology that has layer three presence.') topology_dhcp_usage = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 12), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2))).clone(namedValues=named_values(('none', 0), ('useRelay', 1), ('localServer', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: topologyDHCPUsage.setStatus('current') if mibBuilder.loadTexts: topologyDHCPUsage.setDescription('The type of DHCP to be used for IP address assignment to associated MU. This field has meaning only if the topology has layer three persense. Meaning associated to this field is topology specific: - For Admin topology (management port) has no meaning. - Ror bridge at AP this field has no meaning. - For all other topologies that their layer three presence is enabled this field is configurable.') topology_ap_registration = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 13), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: topologyAPRegistration.setStatus('current') if mibBuilder.loadTexts: topologyAPRegistration.setDescription('If set to true, then AP registration can be achieved using via this topology. Meaning associated to this field is topology specific: - Always false for Admin (management port) and routed topologies - Always false and has no meaning for bridge at AP topology. - For physical and bridge at controller type topologies that have layer three presence this field can be set to either true or false.') topology_management_traffic = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 14), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: topologyManagementTraffic.setStatus('current') if mibBuilder.loadTexts: topologyManagementTraffic.setDescription('If set to true, then management data traffic is allowed on this topology. Meaning associated to this field is topology specific: - Always true for Admin topology (management port) - Has no meaning for bridge at AP type topologies - For all other topologies that have layer three presence this field can be set to either true or false.') topology_synchronize = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 15), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: topologySynchronize.setStatus('current') if mibBuilder.loadTexts: topologySynchronize.setDescription('If set to true, then topology must be synchronized with peer controller in availability mode operation. Meaning associated to this field is topology specific: - Always false for Admin topology (management port) - Has no meaning for topologies associated to physical ports. - For all other topologies: bridge at controller, routed and bridge at AP type topologies this field can be set to either true or false.') topology_sync_gateway = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 16), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: topologySyncGateway.setStatus('current') if mibBuilder.loadTexts: topologySyncGateway.setDescription('Gateway associated to synchronized topology. This field has meaning for those topologies that their topologySynchornize field is set to true.') topology_sync_mask = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 17), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: topologySyncMask.setStatus('current') if mibBuilder.loadTexts: topologySyncMask.setDescription('Mask of synchronized gateway IP address. This field has meaning for those topologies that their topologySynchornize field is set to true.') topology_sync_ip_start = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 18), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: topologySyncIPStart.setStatus('current') if mibBuilder.loadTexts: topologySyncIPStart.setDescription('Range of IP addresses assigned to remote synchronized topology. This IP address represents starting IP address. This field has meaning for those topologies that their topologySynchornize field is set to true.') topology_sync_ip_end = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 19), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: topologySyncIPEnd.setStatus('current') if mibBuilder.loadTexts: topologySyncIPEnd.setDescription('Range of IP addresses assigned to remote synchronized topology. This IP address represents ending IP address. This field has meaning for those topologies that their topologySynchornize field is set to true.') topology_static_i_pv6_address = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 20), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: topologyStaticIPv6Address.setStatus('current') if mibBuilder.loadTexts: topologyStaticIPv6Address.setDescription('Statically configured IPv6 address assigned to the admin port.') topology_link_local_i_pv6_address = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 21), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: topologyLinkLocalIPv6Address.setStatus('current') if mibBuilder.loadTexts: topologyLinkLocalIPv6Address.setDescription('Automatically generated link-local IPv6 address assigned to the admin port.') topology_pre_fix_length = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 22), unsigned32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: topologyPreFixLength.setStatus('current') if mibBuilder.loadTexts: topologyPreFixLength.setDescription('The prfix length of the statically configured IPv6 address of the topology.') topology_i_pv6_gateway = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 23), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: topologyIPv6Gateway.setStatus('current') if mibBuilder.loadTexts: topologyIPv6Gateway.setDescription('The gateway of IPv6 address that is associated to the admin topology.') topology_dynamic_egress = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 24), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disable', 0), ('enable', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: topologyDynamicEgress.setStatus('current') if mibBuilder.loadTexts: topologyDynamicEgress.setDescription('Enable/disable dynamic egress for this topology. Dynamic egress allows a station to receive from this VLAN if it can send to this VLAN.') topology_is_group = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 25), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('no', 0), ('yes', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: topologyIsGroup.setStatus('current') if mibBuilder.loadTexts: topologyIsGroup.setDescription('When this flag is yes, this means the topology is created as a group topology.') topology_group_members = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 26), octet_string().subtype(subtypeSpec=value_size_constraint(0, 12))).setMaxAccess('readwrite') if mibBuilder.loadTexts: topologyGroupMembers.setStatus('current') if mibBuilder.loadTexts: topologyGroupMembers.setDescription('This field specifies the topologies for this group. This field has meaning only when topologyIsGroup is set to 1. This field is represented as octect string. The most significant bit of the most significant octet of the octet string represents the first topology with topologyID = 0 and second most significant bit of the most significant octet represents the second topology with topologyID = 1 and so on.') topology_member_id = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 1, 1, 1, 27), integer32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: topologyMemberId.setStatus('current') if mibBuilder.loadTexts: topologyMemberId.setDescription(' -1 : Means this topology is not a member of a group topology. valid topology ID : Means this topology is a member of a configured group topology that has this group topology ID.') topology_stat = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2)) topo_stat_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 1)) if mibBuilder.loadTexts: topoStatTable.setStatus('current') if mibBuilder.loadTexts: topoStatTable.setDescription('Statistics describing traffic transmitted or received for a single topology. This is the traffic on the topology that is coming from or going to destinations on the wired network.') topo_stat_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 1, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'topologyID')) if mibBuilder.loadTexts: topoStatEntry.setStatus('current') if mibBuilder.loadTexts: topoStatEntry.setDescription('Statistic related an entry in topology table.') topo_stat_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 1, 1, 1), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoStatName.setStatus('current') if mibBuilder.loadTexts: topoStatName.setDescription('Topology name.') topo_stat_tx_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 1, 1, 2), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoStatTxPkts.setStatus('current') if mibBuilder.loadTexts: topoStatTxPkts.setDescription('Number of packets transmitted to the wired network on the topology/vlan.') topo_stat_rx_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 1, 1, 3), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoStatRxPkts.setStatus('current') if mibBuilder.loadTexts: topoStatRxPkts.setDescription('Number of packets received from the wired network on the topology/vlan.') topo_stat_tx_octets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 1, 1, 4), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoStatTxOctets.setStatus('current') if mibBuilder.loadTexts: topoStatTxOctets.setDescription('Number of octets transmitted in frames to the wired network on the topology/vlan.') topo_stat_rx_octets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 1, 1, 5), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoStatRxOctets.setStatus('current') if mibBuilder.loadTexts: topoStatRxOctets.setDescription('Number of octets received in frames from the wired network on the topology/vlan.') topo_stat_multicast_tx_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 1, 1, 6), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoStatMulticastTxPkts.setStatus('current') if mibBuilder.loadTexts: topoStatMulticastTxPkts.setDescription('Number of multicast frames transmitted to the wired network on the topology/vlan.') topo_stat_multicast_rx_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 1, 1, 7), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoStatMulticastRxPkts.setStatus('current') if mibBuilder.loadTexts: topoStatMulticastRxPkts.setDescription('Number of multicast frames received from the wired network on the topology/vlan.') topo_stat_broadcast_tx_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 1, 1, 8), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoStatBroadcastTxPkts.setStatus('current') if mibBuilder.loadTexts: topoStatBroadcastTxPkts.setDescription('Number of broadcast frames transmitted to the wired network on the topology/vlan.') topo_stat_broadcast_rx_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 1, 1, 9), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoStatBroadcastRxPkts.setStatus('current') if mibBuilder.loadTexts: topoStatBroadcastRxPkts.setDescription('Number of broadcast frames received from the wired network on the topology/vlan.') topo_stat_frame_chk_seq_errors = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 1, 1, 10), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoStatFrameChkSeqErrors.setStatus('current') if mibBuilder.loadTexts: topoStatFrameChkSeqErrors.setDescription('Number of frames with checksum errors received from the wired network on the topology/vlan.') topo_stat_frame_too_long_errors = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 1, 1, 11), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoStatFrameTooLongErrors.setStatus('current') if mibBuilder.loadTexts: topoStatFrameTooLongErrors.setDescription('Number of oversized frames received from the wired network on the topology/vlan.') topo_exception_stat_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 2)) if mibBuilder.loadTexts: topoExceptionStatTable.setStatus('current') if mibBuilder.loadTexts: topoExceptionStatTable.setDescription('The table contains list of exception-specific filters statistics for configured topologies in EWC.') topo_exception_stat_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 2, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'topologyID')) if mibBuilder.loadTexts: topoExceptionStatEntry.setStatus('current') if mibBuilder.loadTexts: topoExceptionStatEntry.setDescription('An entry in topology exception statistic table.') topo_exception_fiter_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 2, 1, 1), octet_string().subtype(subtypeSpec=value_size_constraint(1, 64))).setMaxAccess('readwrite') if mibBuilder.loadTexts: topoExceptionFiterName.setStatus('current') if mibBuilder.loadTexts: topoExceptionFiterName.setDescription('Exception filter name.') topo_exception_stat_pkts_denied = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 2, 1, 2), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoExceptionStatPktsDenied.setStatus('current') if mibBuilder.loadTexts: topoExceptionStatPktsDenied.setDescription("Number of packets that were denied by defined filters since device's last restart.") topo_exception_stat_pkts_allowed = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 2, 1, 3), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoExceptionStatPktsAllowed.setStatus('current') if mibBuilder.loadTexts: topoExceptionStatPktsAllowed.setDescription("Number packets that were allowed by defined filters since device's last restart.") topo_wire_stat_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 3)) if mibBuilder.loadTexts: topoWireStatTable.setStatus('deprecated') if mibBuilder.loadTexts: topoWireStatTable.setDescription('The table contains statistics describing traffic transmitted or received unencapsulated (i.e. not wrapped in WASSP) for each topology') topo_wire_stat_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 3, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'topologyID')) if mibBuilder.loadTexts: topoWireStatEntry.setStatus('deprecated') if mibBuilder.loadTexts: topoWireStatEntry.setDescription("Statistics describing traffic transmitted or received unencapsulated (i.e. not wrapped in WASSP) for a single topology. This is the traffic on the topology that is coming from or going to destinations on the wired network other than to the controller's APs.") topo_wire_stat_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 3, 1, 1), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoWireStatName.setStatus('deprecated') if mibBuilder.loadTexts: topoWireStatName.setDescription('Topology name.') topo_wire_stat_tx_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 3, 1, 2), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoWireStatTxPkts.setStatus('deprecated') if mibBuilder.loadTexts: topoWireStatTxPkts.setDescription('Number of packets transmitted unencapsulated to the wired network on the topology/vlan.') topo_wire_stat_rx_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 3, 1, 3), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoWireStatRxPkts.setStatus('deprecated') if mibBuilder.loadTexts: topoWireStatRxPkts.setDescription('Number of packets received unencapsulated from the wired network on the topology/vlan.') topo_wire_stat_tx_octets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 3, 1, 4), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoWireStatTxOctets.setStatus('deprecated') if mibBuilder.loadTexts: topoWireStatTxOctets.setDescription('Number of octets transmitted in unencapsulated frames to the wired network on the topology/vlan.') topo_wire_stat_rx_octets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 3, 1, 5), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoWireStatRxOctets.setStatus('deprecated') if mibBuilder.loadTexts: topoWireStatRxOctets.setDescription('Number of octets received in unencapsulated frames to the wired network on the topology/vlan.') topo_wire_stat_multicast_tx_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 3, 1, 6), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoWireStatMulticastTxPkts.setStatus('deprecated') if mibBuilder.loadTexts: topoWireStatMulticastTxPkts.setDescription('Number of multicast frames transmitted unencapsulated to the wired network on the topology/vlan.') topo_wire_stat_multicast_rx_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 3, 1, 7), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoWireStatMulticastRxPkts.setStatus('deprecated') if mibBuilder.loadTexts: topoWireStatMulticastRxPkts.setDescription('Number of multicast frames received unencapsulated from the wired network on the topology/vlan.') topo_wire_stat_broadcast_tx_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 3, 1, 8), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoWireStatBroadcastTxPkts.setStatus('deprecated') if mibBuilder.loadTexts: topoWireStatBroadcastTxPkts.setDescription('Number of broadcast frames transmitted unencapsulated to the wired network on the topology/vlan.') topo_wire_stat_broadcast_rx_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 3, 1, 9), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoWireStatBroadcastRxPkts.setStatus('deprecated') if mibBuilder.loadTexts: topoWireStatBroadcastRxPkts.setDescription('Number of broadcast frames received unencapsulated from the wired network on the topology/vlan.') topo_wire_stat_frame_chk_seq_errors = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 3, 1, 10), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoWireStatFrameChkSeqErrors.setStatus('deprecated') if mibBuilder.loadTexts: topoWireStatFrameChkSeqErrors.setDescription('Number of unencapsulated frames with checksum errors received from the wired network on the topology/vlan.') topo_wire_stat_frame_too_long_errors = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 3, 1, 11), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoWireStatFrameTooLongErrors.setStatus('deprecated') if mibBuilder.loadTexts: topoWireStatFrameTooLongErrors.setDescription('Number of unencapsulated frames with length longer than permitted received from the wired network on the topology/vlan.') topo_complete_stat_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 4)) if mibBuilder.loadTexts: topoCompleteStatTable.setStatus('current') if mibBuilder.loadTexts: topoCompleteStatTable.setDescription('The table contains statistics describing traffic transmitted and received for each topology on both the wired side and the wireless side.') topo_complete_stat_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 4, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'topologyID')) if mibBuilder.loadTexts: topoCompleteStatEntry.setStatus('current') if mibBuilder.loadTexts: topoCompleteStatEntry.setDescription('Statistics describing traffic transmitted and received on a single topology on both the wired side and the wireless side.') topo_complete_stat_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 4, 1, 1), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoCompleteStatName.setStatus('current') if mibBuilder.loadTexts: topoCompleteStatName.setDescription('Topology name.') topo_complete_stat_tx_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 4, 1, 2), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoCompleteStatTxPkts.setStatus('current') if mibBuilder.loadTexts: topoCompleteStatTxPkts.setDescription('Number of packets transmitted to the wired and wireless networks on the topology/vlan.') topo_complete_stat_rx_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 4, 1, 3), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoCompleteStatRxPkts.setStatus('current') if mibBuilder.loadTexts: topoCompleteStatRxPkts.setDescription('Number of packets received from the wired and wireless networks on the topology/vlan.') topo_complete_stat_tx_octets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 4, 1, 4), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoCompleteStatTxOctets.setStatus('current') if mibBuilder.loadTexts: topoCompleteStatTxOctets.setDescription('Number of octets transmitted in frames to the wired and wireless networks on the topology/vlan.') topo_complete_stat_rx_octets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 4, 1, 5), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoCompleteStatRxOctets.setStatus('current') if mibBuilder.loadTexts: topoCompleteStatRxOctets.setDescription('Number of octets received in frames from the wired and wireless networks on the topology/vlan.') topo_complete_stat_multicast_tx_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 4, 1, 6), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoCompleteStatMulticastTxPkts.setStatus('current') if mibBuilder.loadTexts: topoCompleteStatMulticastTxPkts.setDescription('Number of multicast frames transmitted to the wired and wireless networks on the topology/vlan.') topo_complete_stat_multicast_rx_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 4, 1, 7), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoCompleteStatMulticastRxPkts.setStatus('current') if mibBuilder.loadTexts: topoCompleteStatMulticastRxPkts.setDescription('Number of multicast frames received from the wired and wireless networks on the topology/vlan.') topo_complete_stat_broadcast_tx_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 4, 1, 8), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoCompleteStatBroadcastTxPkts.setStatus('current') if mibBuilder.loadTexts: topoCompleteStatBroadcastTxPkts.setDescription('Number of broadcast frames transmitted to the wired and wireless networks on the topology/vlan.') topo_complete_stat_broadcast_rx_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 4, 1, 9), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoCompleteStatBroadcastRxPkts.setStatus('current') if mibBuilder.loadTexts: topoCompleteStatBroadcastRxPkts.setDescription('Number of broadcast frames received from the wired and wireless networks on the topology/vlan.') topo_complete_stat_frame_chk_seq_errors = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 4, 1, 10), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoCompleteStatFrameChkSeqErrors.setStatus('current') if mibBuilder.loadTexts: topoCompleteStatFrameChkSeqErrors.setDescription('Number of frames with checksum errors received from the wired and wireless networks on the topology/vlan.') topo_complete_stat_frame_too_long_errors = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 4, 2, 4, 1, 11), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: topoCompleteStatFrameTooLongErrors.setStatus('current') if mibBuilder.loadTexts: topoCompleteStatFrameTooLongErrors.setDescription('Number of oversized frames received from the wired and wireless networks on the topology/vlan.') access_points = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5)) ap_config_objects = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1)) ap_count = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 1), integer32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apCount.setStatus('current') if mibBuilder.loadTexts: apCount.setDescription('The count of currently configured AccessPoints associated with this WirelessController.') ap_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2)) if mibBuilder.loadTexts: apTable.setStatus('current') if mibBuilder.loadTexts: apTable.setDescription('Contains a list of all configured APs associated with the Wireless Controller.') ap_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'apIndex')) if mibBuilder.loadTexts: apEntry.setStatus('current') if mibBuilder.loadTexts: apEntry.setDescription('Configuration information for an access point.') ap_index = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 1), integer32().subtype(subtypeSpec=value_range_constraint(1, 2147483647))).setMaxAccess('readwrite') if mibBuilder.loadTexts: apIndex.setStatus('current') if mibBuilder.loadTexts: apIndex.setDescription('Table index for the access point.') ap_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 2), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apName.setStatus('current') if mibBuilder.loadTexts: apName.setDescription("Access Point's name.") ap_desc = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 3), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apDesc.setStatus('current') if mibBuilder.loadTexts: apDesc.setDescription('Text description of the AP.') ap_serial_number = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 4), octet_string().subtype(subtypeSpec=value_size_constraint(16, 16)).setFixedLength(16)).setMaxAccess('readonly') if mibBuilder.loadTexts: apSerialNumber.setStatus('current') if mibBuilder.loadTexts: apSerialNumber.setDescription('16-character serial number of the AccessPoint.') ap_portif_index = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 5), interface_index()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apPortifIndex.setStatus('current') if mibBuilder.loadTexts: apPortifIndex.setDescription('ifIndex of the physical port to which this AP is assigned.') ap_wired_if_index = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 6), interface_index()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apWiredIfIndex.setStatus('current') if mibBuilder.loadTexts: apWiredIfIndex.setDescription('ifIndex of the wired interface on the AP.') ap_software_version = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 7), octet_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: apSoftwareVersion.setStatus('current') if mibBuilder.loadTexts: apSoftwareVersion.setDescription('Software version currently installed on the AP.') ap_specific = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 8), object_identifier()).setMaxAccess('readonly') if mibBuilder.loadTexts: apSpecific.setStatus('current') if mibBuilder.loadTexts: apSpecific.setDescription('A link back to the OID under the hiPathWirelessProducts branch that identifies the specific version of this AP.') ap_broadcast_disassociate = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 9), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apBroadcastDisassociate.setStatus('current') if mibBuilder.loadTexts: apBroadcastDisassociate.setDescription('True indicates that the AP should broadcast disassociation requests, False indicates unicast.') ap_row_status = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 10), row_status()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apRowStatus.setStatus('current') if mibBuilder.loadTexts: apRowStatus.setDescription('RowStatus for the apTable.') ap_vlan_id = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 11), integer32().clone(-1)).setMaxAccess('readwrite') if mibBuilder.loadTexts: apVlanID.setStatus('current') if mibBuilder.loadTexts: apVlanID.setDescription('VLAN tag for the packets trasmitted to/from Access Point. Value ranges: (-1) it is not tagged, zero(0) means reserved, 1-4094 tag value.') ap_ip_assignment_type = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 12), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('dhcp', 1), ('static', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: apIpAssignmentType.setStatus('current') if mibBuilder.loadTexts: apIpAssignmentType.setDescription('IP address assignment type, dhcp(1) = uses DHCP to obtain IP address, static(2) = static IP address is assigned to the access point.') ap_if_mac = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 13), mac_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: apIfMAC.setStatus('current') if mibBuilder.loadTexts: apIfMAC.setDescription("Acess Point's wired interface MAC address.") ap_ip_address = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 14), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apIPAddress.setStatus('current') if mibBuilder.loadTexts: apIPAddress.setDescription("Access Point's wired interface IP address.") ap_hw_version = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 17), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apHwVersion.setStatus('current') if mibBuilder.loadTexts: apHwVersion.setDescription("Text description of Access Point's hardware version.") ap_sw_version = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 18), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apSwVersion.setStatus('current') if mibBuilder.loadTexts: apSwVersion.setDescription("Text description of Access Point's major software version.") ap_environment = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 19), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('indoor', 1), ('outdoor', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: apEnvironment.setStatus('current') if mibBuilder.loadTexts: apEnvironment.setDescription("Access Point's environment.") ap_home = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 20), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('local', 1), ('foreign', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: apHome.setStatus('current') if mibBuilder.loadTexts: apHome.setDescription('Local session is created when access point registers directly with the controller. Foreign session is mirrored session created via availability feature.') ap_role = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 21), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3))).clone(namedValues=named_values(('accessPoint', 1), ('sensor', 2), ('guardian', 3)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: apRole.setStatus('current') if mibBuilder.loadTexts: apRole.setDescription('Indicates whether Access Point is a traffic fordwarder, sensor or guardian') ap_state = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 22), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('active', 1), ('inactive', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: apState.setStatus('current') if mibBuilder.loadTexts: apState.setDescription('Active means that access point has registered with this controller at some point of time and still has active connection with this controller. This variable has meaning in the context of the controller that query is done. Inactive mean access point has lost the connection with this controller.') ap_status = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 23), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('approved', 1), ('pending', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: apStatus.setStatus('current') if mibBuilder.loadTexts: apStatus.setDescription('Registration state for the access point at the time of query, approved(1) means the registration was completed, pending(2) means access point has registered but waiting manual approval from admin.') ap_poll_timeout = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 24), gauge32().subtype(subtypeSpec=value_range_constraint(3, 3600))).setMaxAccess('readwrite') if mibBuilder.loadTexts: apPollTimeout.setStatus('current') if mibBuilder.loadTexts: apPollTimeout.setDescription("Duration after which the access point's connection to controller is considered has been lost if polling fails. ") ap_poll_interval = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 25), gauge32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apPollInterval.setStatus('current') if mibBuilder.loadTexts: apPollInterval.setDescription('Interval between each poll sent to the controller.') ap_telnet_access = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 26), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3))).clone(namedValues=named_values(('enabled', 1), ('disabled', 2), ('na', 3)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: apTelnetAccess.setStatus('current') if mibBuilder.loadTexts: apTelnetAccess.setDescription('Indicates whether telnet access is enabled/disabled. This value only applys to AP26xx, W788, W786 and AP4102x APs. 1 : Enabled. 2 : Disabled. 3 : Telnet is not supported.') ap_maintain_client_session = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 27), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apMaintainClientSession.setStatus('current') if mibBuilder.loadTexts: apMaintainClientSession.setDescription("If true, Access Point maintains client's session in the event of poll failure.") ap_restart_service_cont_absent = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 28), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apRestartServiceContAbsent.setStatus('current') if mibBuilder.loadTexts: apRestartServiceContAbsent.setDescription('If true, Access Point restarts the service in the absence of controller.') ap_hostname = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 29), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: apHostname.setStatus('current') if mibBuilder.loadTexts: apHostname.setDescription('Hostname assigned to Access Point.') ap_location = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 30), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apLocation.setStatus('current') if mibBuilder.loadTexts: apLocation.setDescription('Text identifying location of the access point.') ap_static_mt_usize = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 31), unsigned32().subtype(subtypeSpec=value_range_constraint(600, 1500)).clone(1500)).setMaxAccess('readwrite') if mibBuilder.loadTexts: apStaticMTUsize.setStatus('current') if mibBuilder.loadTexts: apStaticMTUsize.setDescription('Configured MTU size for the access point. Access point will use the lower value of MTU size between statically configured MTU size and dynamically learned MTU size.') ap_site_id = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 32), integer32().clone(-1)).setMaxAccess('readwrite') if mibBuilder.loadTexts: apSiteID.setStatus('current') if mibBuilder.loadTexts: apSiteID.setDescription('The site ID, as defined in siteTable, that this AP is member of. The value of -1 indicates that AP is not member of any site.') ap_zone = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 33), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apZone.setStatus('current') if mibBuilder.loadTexts: apZone.setDescription('The Zone to which the Access Point belongs. ') ap_lldp = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 34), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apLLDP.setStatus('current') if mibBuilder.loadTexts: apLLDP.setDescription('Enable or disable broadcasting of LLDP information by the wireless AP.') ap_ssh_access = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 35), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apSSHAccess.setStatus('deprecated') if mibBuilder.loadTexts: apSSHAccess.setDescription('Enable or Disable SSH access to the Wireless AP. This value only applys to AP36xx, AP37xx, W788C and W786C APs.') ap_led_mode = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 36), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3))).clone(namedValues=named_values(('off', 0), ('wdsSignalStrength', 1), ('identify', 2), ('normal', 3)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: apLEDMode.setStatus('current') if mibBuilder.loadTexts: apLEDMode.setDescription("LED status field for the Access Point. off(0): LED is set to off for the AP. wdsSignalStrength(1): LED conveys the strength of the singal, for the details please refer to user manual. indentify(2): Can be used to lacate the AP by making AP to flashing LED repeatedly. normal(3): This indicates AP's normal operational mode.") ap_locationbased_service = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 37), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apLocationbasedService.setStatus('current') if mibBuilder.loadTexts: apLocationbasedService.setDescription('Enable or disable the AeroScout or Ekahau location-based service for the Wireless AP.') ap_secure_tunnel = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 38), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apSecureTunnel.setStatus('current') if mibBuilder.loadTexts: apSecureTunnel.setDescription('Enable or disable Secure Tunnel between Ap and Controller') ap_encrypt_cnt_traffic = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 39), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apEncryptCntTraffic.setStatus('current') if mibBuilder.loadTexts: apEncryptCntTraffic.setDescription('Enable or disable encrypt of control traffic between AP & Controller. This value has meaning only if apSecureTunnel is enabled.') ap_mic_error_warning = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 40), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apMICErrorWarning.setStatus('current') if mibBuilder.loadTexts: apMICErrorWarning.setDescription('Enable or disable MIC error warning generation.') ap_secure_data_tunnel_type = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 41), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3))).clone(namedValues=named_values(('disable', 0), ('encryptControlTraffic', 1), ('encryptControlDataTraffic', 2), ('debugMode', 3)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: apSecureDataTunnelType.setStatus('current') if mibBuilder.loadTexts: apSecureDataTunnelType.setDescription('secure data tunnel status between controller and acesss point. disable(0): disable encryption of control and data traffic between AP & Controller. encryptControlTraffic(1): encrypt control traffic between AP & Controller. encryptControlDataTraffic(2): encrypt control and data traffic between AP & Controller. debugMode(3): preserve keys without encryption.') ap_ip_multicast_assembly = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 42), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apIPMulticastAssembly.setStatus('current') if mibBuilder.loadTexts: apIPMulticastAssembly.setDescription('Enable or disable fragmentation/reassembly of the IP Multicast frames transmitted over the tunnel between AP and Controller. When set to true, an IP Multicast frame larger than the tunnel MTU will be fragmented when it is placed into the WASSP tunnel and reassembled on the receiving end of the tunnel before being forwarded to the clients.') ap_ssh_connection = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 2, 1, 43), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3))).clone(namedValues=named_values(('enabled', 1), ('disabled', 2), ('na', 3)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: apSSHConnection.setStatus('current') if mibBuilder.loadTexts: apSSHConnection.setDescription('Enable or Disable SSH access to the Wireless AP. This value only applys to AP36xx, AP37xx, W788C and W786C APs. 1 : Enabled. 2 : Disabled. 3 : SSH is not supported.') ap_radio_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 3)) if mibBuilder.loadTexts: apRadioTable.setStatus('current') if mibBuilder.loadTexts: apRadioTable.setDescription('Table access point radio configuration information.') ap_radio_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 3, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'apIndex'), (0, 'IF-MIB', 'ifIndex')) if mibBuilder.loadTexts: apRadioEntry.setStatus('current') if mibBuilder.loadTexts: apRadioEntry.setDescription('Configuration information for a radio on the access point.') ap_radio_frequency = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 3, 1, 1), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('freq50GHz', 1), ('freq24GHz', 2)))).setMaxAccess('readonly') if mibBuilder.loadTexts: apRadioFrequency.setStatus('current') if mibBuilder.loadTexts: apRadioFrequency.setDescription('The frequency of the radio as supported by the hardware. Supported frequencies are either of 2.5Ghz or 5.0Ghz.') ap_radio_number = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 3, 1, 2), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apRadioNumber.setStatus('current') if mibBuilder.loadTexts: apRadioNumber.setDescription('Access point radios are numbered from 1 in increasing order. This numbering is limited in the context of AP. This field returns the radio number of the AP indexed by apIndex.') ap_radio_type = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 3, 1, 3), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12))).clone(namedValues=named_values(('off', 0), ('dot11a', 1), ('dot11an', 2), ('dot11anStrict', 3), ('dot11b', 4), ('dot11g', 5), ('dot11bg', 6), ('dot11gn', 7), ('dot11bgn', 8), ('dot11gnStrict', 9), ('dot11j', 10), ('dot11anc', 11), ('dot11cStrict', 12)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: apRadioType.setStatus('deprecated') if mibBuilder.loadTexts: apRadioType.setDescription('Indicates the type of radio (a, a/n, a/c, n-strict, c-strict, b, g, b/g, or b/g/n) as it is configured.') ap_radio_protocol = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 3, 1, 4), bits().clone(namedValues=named_values(('dot1124b', 0), ('dot1124g', 1), ('dot1124n', 2), ('dot1150a', 3), ('dot1150ac', 4), ('dot1150j', 5), ('dot1150n', 6)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: apRadioProtocol.setStatus('current') if mibBuilder.loadTexts: apRadioProtocol.setDescription('Enumerates the possible types of 802.11 radio protocols.') radio_vns_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 4)) if mibBuilder.loadTexts: radioVNSTable.setStatus('current') if mibBuilder.loadTexts: radioVNSTable.setDescription('Table of VNSs the radio is participating in.') radio_vns_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 4, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'radioIfIndex'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'vnsIfIndex')) if mibBuilder.loadTexts: radioVNSEntry.setStatus('current') if mibBuilder.loadTexts: radioVNSEntry.setDescription('Information for a single VNS entry.') radio_if_index = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 4, 1, 1), interface_index()).setMaxAccess('readwrite') if mibBuilder.loadTexts: radioIfIndex.setStatus('current') if mibBuilder.loadTexts: radioIfIndex.setDescription('Radio participating in the VNS.') vns_if_index = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 4, 1, 2), interface_index()).setMaxAccess('readwrite') if mibBuilder.loadTexts: vnsIfIndex.setStatus('current') if mibBuilder.loadTexts: vnsIfIndex.setDescription('ifIndex for the VNS the radio is participating.') radio_vns_row_status = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 4, 1, 3), row_status()).setMaxAccess('readwrite') if mibBuilder.loadTexts: radioVNSRowStatus.setStatus('current') if mibBuilder.loadTexts: radioVNSRowStatus.setDescription('RowStatus for the radioVNSTable.') ap_fast_failover_enable = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 5), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apFastFailoverEnable.setStatus('current') if mibBuilder.loadTexts: apFastFailoverEnable.setDescription('True indicates that Fast Failover feature is enabled at AP.') ap_link_timeout = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 6), integer32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apLinkTimeout.setStatus('current') if mibBuilder.loadTexts: apLinkTimeout.setDescription('Time to deteck link failure. The value is in 1-30 seconds.') ap_antenna_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 7)) if mibBuilder.loadTexts: apAntennaTable.setStatus('current') if mibBuilder.loadTexts: apAntennaTable.setDescription('Contains a list of antennas configured for each AP associated with the Wireless Controller. All elements in this table are predefined and read-only.') ap_antenna_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 7, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'apIndex'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'apAntennaIndex')) if mibBuilder.loadTexts: apAntennaEntry.setStatus('current') if mibBuilder.loadTexts: apAntennaEntry.setDescription('An entry in this table identifying attributes of one antenna for an AP.') ap_antenna_index = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 7, 1, 1), unsigned32()) if mibBuilder.loadTexts: apAntennaIndex.setStatus('current') if mibBuilder.loadTexts: apAntennaIndex.setDescription('Index of an antenna inside an AP.') ap_antennan_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 7, 1, 2), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: apAntennanName.setStatus('current') if mibBuilder.loadTexts: apAntennanName.setDescription('Textual description identifying the antenna.') ap_antenna_type = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 7, 1, 3), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apAntennaType.setStatus('current') if mibBuilder.loadTexts: apAntennaType.setDescription('Textual description of antenna type selected for that antenna.') ap_radio_antenna_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 8)) if mibBuilder.loadTexts: apRadioAntennaTable.setStatus('current') if mibBuilder.loadTexts: apRadioAntennaTable.setDescription('Contains a list of Radio configured for each AP associated with the Wireless Controller. All elements in this table are predefined and read-only.') ap_radio_antenna_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 8, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'apIndex'), (0, 'IF-MIB', 'ifIndex')) if mibBuilder.loadTexts: apRadioAntennaEntry.setStatus('current') if mibBuilder.loadTexts: apRadioAntennaEntry.setDescription('An entry in this table identifying attributes of one radio for an AP.') ap_radio_antenna_type = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 8, 1, 3), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: apRadioAntennaType.setStatus('current') if mibBuilder.loadTexts: apRadioAntennaType.setDescription('Textual description of antenna type selected for that radio.') ap_radio_antenna_model = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 8, 1, 4), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apRadioAntennaModel.setStatus('current') if mibBuilder.loadTexts: apRadioAntennaModel.setDescription('Antenna type. 0 indicates internal antenna. 1 indicates no antenna. Other value indicates specific external antenna type. ') ap_radio_attenuation = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 1, 8, 1, 5), integer32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apRadioAttenuation.setStatus('current') if mibBuilder.loadTexts: apRadioAttenuation.setDescription('Cumulative attenuation (in dB) of all components (cables, attenuators) between the radio port and the antenna. A professional installer must configure this value so it does not violate country regulations and must verify that it reflects the actual installed components. If this field value is set to -1, then this radio does not support the attenuation configuration.') ap_stats_objects = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2)) ap_active_count = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 1), integer32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apActiveCount.setStatus('current') if mibBuilder.loadTexts: apActiveCount.setDescription('The count of active AccessPoints associated with this WirelessController.') ap_stats_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2)) if mibBuilder.loadTexts: apStatsTable.setStatus('current') if mibBuilder.loadTexts: apStatsTable.setDescription('Table of statistics for the access points.') ap_stats_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'apIndex')) if mibBuilder.loadTexts: apStatsEntry.setStatus('current') if mibBuilder.loadTexts: apStatsEntry.setDescription('Statistics for an access point.') ap_in_ucast_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 1), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apInUcastPkts.setStatus('current') if mibBuilder.loadTexts: apInUcastPkts.setDescription('Number of unicast packets from wireless-to-wired network.') ap_in_n_ucast_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 2), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apInNUcastPkts.setStatus('current') if mibBuilder.loadTexts: apInNUcastPkts.setDescription('Number of non-unicast packets from wireless-to-wired network.') ap_in_octets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 3), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apInOctets.setStatus('current') if mibBuilder.loadTexts: apInOctets.setDescription('Number of octets from wireless-to-wired network.') ap_in_errors = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 4), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apInErrors.setStatus('current') if mibBuilder.loadTexts: apInErrors.setDescription('Number of error packets from wireless-to-wired network.') ap_in_discards = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 5), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apInDiscards.setStatus('current') if mibBuilder.loadTexts: apInDiscards.setDescription('Number of discarded packets from wireless-to-wired network.') ap_out_ucast_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 6), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apOutUcastPkts.setStatus('current') if mibBuilder.loadTexts: apOutUcastPkts.setDescription('Number of unicast packets from wired-to-wireless network.') ap_out_n_ucast_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 7), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apOutNUcastPkts.setStatus('current') if mibBuilder.loadTexts: apOutNUcastPkts.setDescription('Number of non-unicast packets from wired-to-wireless network.') ap_out_octets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 8), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apOutOctets.setStatus('current') if mibBuilder.loadTexts: apOutOctets.setDescription('Number of octets from wired-to-wireless network.') ap_out_errors = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 9), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apOutErrors.setStatus('current') if mibBuilder.loadTexts: apOutErrors.setDescription('Number of error packets from wired-to-wireless network.') ap_out_discards = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 10), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apOutDiscards.setStatus('current') if mibBuilder.loadTexts: apOutDiscards.setDescription('Number of discarded packets from wired-to-wireless network.') ap_up_time = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 11), time_ticks()).setMaxAccess('readonly') if mibBuilder.loadTexts: apUpTime.setStatus('current') if mibBuilder.loadTexts: apUpTime.setDescription('The time (in hundredths of a second) since the management portion of the access point was last re-initialized.') ap_credential_type = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 12), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3))).clone(namedValues=named_values(('none', 0), ('tls', 1), ('peap', 2), ('all', 3)))).setMaxAccess('readonly') if mibBuilder.loadTexts: apCredentialType.setStatus('current') if mibBuilder.loadTexts: apCredentialType.setDescription('Supported certificate type used by AP for commnuication. none(0) = not supported, TLS(1) = Trasport Layer Security (TLS), PEAP(2) = Protected Extensible Authentication Protocol, all(2) = supports all supported EAP.') ap_certificate_expiry = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 13), time_ticks()).setMaxAccess('readonly') if mibBuilder.loadTexts: apCertificateExpiry.setStatus('current') if mibBuilder.loadTexts: apCertificateExpiry.setDescription('The number of timeticks from January, 1st, 1970 to the date when the certificate expires (issued certificate no longer is valid).') ap_stats_mu_counts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 14), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apStatsMuCounts.setStatus('current') if mibBuilder.loadTexts: apStatsMuCounts.setDescription('Number of MUs currently associated with this AP.') ap_stats_session_duration = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 15), time_ticks()).setMaxAccess('readonly') if mibBuilder.loadTexts: apStatsSessionDuration.setStatus('current') if mibBuilder.loadTexts: apStatsSessionDuration.setDescription("Elapse time since the access point's session has started.") ap_total_stations_a = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 16), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apTotalStationsA.setStatus('current') if mibBuilder.loadTexts: apTotalStationsA.setDescription("Number of MUs that are currently associated to this AP using dot11 connection mode 'a'.") ap_total_stations_b = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 17), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apTotalStationsB.setStatus('current') if mibBuilder.loadTexts: apTotalStationsB.setDescription("Number of MUs that are currently associated to this AP using dot11 connection mode 'b'.") ap_total_stations_g = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 18), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apTotalStationsG.setStatus('current') if mibBuilder.loadTexts: apTotalStationsG.setDescription("Number of MUs that are currently associated to this AP using dot11 connection mode 'g'.") ap_total_stations_n50 = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 19), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apTotalStationsN50.setStatus('current') if mibBuilder.loadTexts: apTotalStationsN50.setDescription("Number of MUs that are currently associated to this AP using dot11 connection mode 'n 5.0 Ghz'.") ap_total_stations_n24 = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 20), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apTotalStationsN24.setStatus('current') if mibBuilder.loadTexts: apTotalStationsN24.setDescription("Number of MUs that are currently associated to this AP using dot11 connection mode 'n 2.4 Ghz'.") ap_invalid_policy_count = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 21), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apInvalidPolicyCount.setStatus('current') if mibBuilder.loadTexts: apInvalidPolicyCount.setDescription('Number of invalid role has been assigned to the AP') ap_interface_mtu = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 22), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apInterfaceMTU.setStatus('current') if mibBuilder.loadTexts: apInterfaceMTU.setDescription("The AP's configured ethernet interface MTU size in bytes. ") ap_effective_tunnel_mtu = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 23), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apEffectiveTunnelMTU.setStatus('current') if mibBuilder.loadTexts: apEffectiveTunnelMTU.setDescription('The AP Effective Tunnel MTU determines the maximum length of the frames that can be tunnelled without fragmentation, after subtracting the tunnel headers (WASSP and IPSEC). The AP Effective Tunnel MTU is determined for each AP tunnel as minimum between the Static MTU (configurable) and Dynamic MTU (learned from the ICMP path discovery).') ap_total_stations_ac = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 24), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apTotalStationsAC.setStatus('current') if mibBuilder.loadTexts: apTotalStationsAC.setDescription('Number of MUs that are currently associated to this AP using dot11ac connection mode.') ap_total_stations_a_in_octets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 25), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apTotalStationsAInOctets.setStatus('current') if mibBuilder.loadTexts: apTotalStationsAInOctets.setDescription('Number of octets from client to AP for clients using protocol 802.11a.') ap_total_stations_a_out_octets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 26), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apTotalStationsAOutOctets.setStatus('current') if mibBuilder.loadTexts: apTotalStationsAOutOctets.setDescription('Number of octets from AP to client for clients using protocol 802.11a.') ap_total_stations_b_in_octets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 27), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apTotalStationsBInOctets.setStatus('current') if mibBuilder.loadTexts: apTotalStationsBInOctets.setDescription('Number of octets from client to AP for clients using protocol 802.11b.') ap_total_stations_b_out_octets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 28), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apTotalStationsBOutOctets.setStatus('current') if mibBuilder.loadTexts: apTotalStationsBOutOctets.setDescription('Number of octets from AP to client for clients using protocol 802.11b.') ap_total_stations_g_in_octets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 29), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apTotalStationsGInOctets.setStatus('current') if mibBuilder.loadTexts: apTotalStationsGInOctets.setDescription('Number of octets from client to AP for clients using protocol 802.11g.') ap_total_stations_g_out_octets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 30), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apTotalStationsGOutOctets.setStatus('current') if mibBuilder.loadTexts: apTotalStationsGOutOctets.setDescription('Number of octets from AP to client for clients using protocol 802.11g.') ap_total_stations_n50_in_octets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 31), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apTotalStationsN50InOctets.setStatus('current') if mibBuilder.loadTexts: apTotalStationsN50InOctets.setDescription('Number of octets from client to AP for clients using protocol 802.11n (5Ghz).') ap_total_stations_n50_out_octets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 32), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apTotalStationsN50OutOctets.setStatus('current') if mibBuilder.loadTexts: apTotalStationsN50OutOctets.setDescription('Number of octets from AP to client for clients using protocol 802.11n (5Ghz).') ap_total_stations_n24_in_octets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 33), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apTotalStationsN24InOctets.setStatus('current') if mibBuilder.loadTexts: apTotalStationsN24InOctets.setDescription('Number of octets from client to AP for clients using protocol 802.11n (2.4Ghz).') ap_total_stations_n24_out_octets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 34), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apTotalStationsN24OutOctets.setStatus('current') if mibBuilder.loadTexts: apTotalStationsN24OutOctets.setDescription('Number of octets from AP to client for clients using protocol 802.11n (2.4Ghz).') ap_total_stations_ac_in_octets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 35), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apTotalStationsACInOctets.setStatus('current') if mibBuilder.loadTexts: apTotalStationsACInOctets.setDescription('Number of octets from client to AP for clients using protocol 802.11ac.') ap_total_stations_ac_out_octets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 2, 1, 36), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apTotalStationsACOutOctets.setStatus('current') if mibBuilder.loadTexts: apTotalStationsACOutOctets.setDescription('Number of octets from AP to client for clients using protocol 802.11ac.') ap_registration_requests = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 3), counter32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apRegistrationRequests.setStatus('current') if mibBuilder.loadTexts: apRegistrationRequests.setDescription('Total registration request have been received by all access points since last reboot.') ap_radio_status_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 4)) if mibBuilder.loadTexts: apRadioStatusTable.setStatus('current') if mibBuilder.loadTexts: apRadioStatusTable.setDescription('Table of radio configuration attributes that the AP can change dynamically. It contains one entry for each radio of each active AP.') ap_radio_status_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 4, 1)).setIndexNames((0, 'IF-MIB', 'ifIndex')) if mibBuilder.loadTexts: apRadioStatusEntry.setStatus('current') if mibBuilder.loadTexts: apRadioStatusEntry.setDescription('The configuration attributes of one AP radio that the AP can change dynamically.') ap_radio_status_channel = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 4, 1, 1), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apRadioStatusChannel.setStatus('current') if mibBuilder.loadTexts: apRadioStatusChannel.setDescription('The lowest 20 MHz channel of the 20/40/80 MHz wide channel on which the radio is operating. This can be different from the administratively configured channel as a result of the AP complying with regulatory requirements like DFS or adapting to the RF environment (e.g. DCS). If this field value is set to 0, then this means this radio is off or this AP is in Guardian mode.') ap_radio_status_channel_width = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 4, 1, 2), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 4))).clone(namedValues=named_values(('width20Mhz', 1), ('width40Mhz', 2), ('width80Mhz', 4)))).setMaxAccess('readonly') if mibBuilder.loadTexts: apRadioStatusChannelWidth.setStatus('current') if mibBuilder.loadTexts: apRadioStatusChannelWidth.setDescription("Maximum width of the channel being served by the AP's radio. The AP may select a different channel width from the administratively configured width in order to comply with regulatory requirements and the current RF environment.") ap_radio_status_channel_offset = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 4, 1, 3), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apRadioStatusChannelOffset.setStatus('current') if mibBuilder.loadTexts: apRadioStatusChannelOffset.setDescription('This is the offset (in 20 MHz channels) of the primary channel from the lowest 20 MHz channel within an aggregated channel. The offset can be 0 if the primary channel is the same as the lowest channel or it can be 1,2 or 3 depending on the aggregate channel width. The AP may select a different channel width from the administratively configured width in order to comply with regulatory requirements and the current RF environment.') ap_performance_report_by_radio_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5)) if mibBuilder.loadTexts: apPerformanceReportByRadioTable.setStatus('current') if mibBuilder.loadTexts: apPerformanceReportByRadioTable.setDescription('Table of AP performance statistics by radio that the AP can change dynamically. It contains one entry for each radio of each active AP.') ap_performance_report_by_radio_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'apIndex'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'apRadioIndex')) if mibBuilder.loadTexts: apPerformanceReportByRadioEntry.setStatus('current') if mibBuilder.loadTexts: apPerformanceReportByRadioEntry.setDescription('The AP radio performance statistics of one AP radio.') ap_radio_index = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 1), integer32().subtype(subtypeSpec=value_range_constraint(1, 2))) if mibBuilder.loadTexts: apRadioIndex.setStatus('current') if mibBuilder.loadTexts: apRadioIndex.setDescription('Index of an radio inside an AP.') ap_perf_radio_prev_peak_channel_utilization = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 2), gauge32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfRadioPrevPeakChannelUtilization.setStatus('current') if mibBuilder.loadTexts: apPerfRadioPrevPeakChannelUtilization.setDescription('Peak channel utilization in % from last 15 minute interval.') ap_perf_radio_cur_peak_channel_utilization = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 3), gauge32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfRadioCurPeakChannelUtilization.setStatus('current') if mibBuilder.loadTexts: apPerfRadioCurPeakChannelUtilization.setDescription('Peak channel utilization in % of current 15 minute interval.') ap_perf_radio_average_channel_utilization = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 4), hundredth_of_gauge32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfRadioAverageChannelUtilization.setStatus('current') if mibBuilder.loadTexts: apPerfRadioAverageChannelUtilization.setDescription('Running average of channel utilization in hundredth of a %.') ap_perf_radio_current_channel_utilization = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 5), gauge32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfRadioCurrentChannelUtilization.setStatus('current') if mibBuilder.loadTexts: apPerfRadioCurrentChannelUtilization.setDescription('Channel utilization in % from latest statistics from AP.') ap_perf_radio_prev_peak_rss = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 6), gauge32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfRadioPrevPeakRSS.setStatus('current') if mibBuilder.loadTexts: apPerfRadioPrevPeakRSS.setDescription('Peak RSS in dBm from last 15 minute interval. Value of -100 means this field is not available.') ap_perf_radio_cur_peak_rss = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 7), gauge32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfRadioCurPeakRSS.setStatus('current') if mibBuilder.loadTexts: apPerfRadioCurPeakRSS.setDescription('Peak RSS in dBm of current 15 minute interval. Value of -100 means this field is not available.') ap_perf_radio_average_rss = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 8), hundredth_of_int32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfRadioAverageRSS.setStatus('current') if mibBuilder.loadTexts: apPerfRadioAverageRSS.setDescription('Running average of RSS in hundredth of a dBm. Value of -10000 means this field is not available.') ap_perf_radio_current_rss = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 9), gauge32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfRadioCurrentRSS.setStatus('current') if mibBuilder.loadTexts: apPerfRadioCurrentRSS.setDescription('RSS in dBm from latest statistics from AP. Value of -100 means this field is not available.') ap_perf_radio_prev_peak_snr = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 10), gauge32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfRadioPrevPeakSNR.setStatus('current') if mibBuilder.loadTexts: apPerfRadioPrevPeakSNR.setDescription('Peak SNR in dB from last 15 minute interval. Value of -100 means this field is not available.') ap_perf_radio_cur_peak_snr = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 11), gauge32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfRadioCurPeakSNR.setStatus('current') if mibBuilder.loadTexts: apPerfRadioCurPeakSNR.setDescription('Peak SNR in dB of current 15 minute interval. Value of -100 means this field is not available.') ap_perf_radio_average_snr = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 12), hundredth_of_int32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfRadioAverageSNR.setStatus('current') if mibBuilder.loadTexts: apPerfRadioAverageSNR.setDescription('Running average of SNR in hundredth of a dB. Value of -10000 means this field is not available.') ap_perf_radio_current_snr = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 13), gauge32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfRadioCurrentSNR.setStatus('current') if mibBuilder.loadTexts: apPerfRadioCurrentSNR.setDescription('SNR in dB from latest statistics from AP. Value of -100 means this field is not available.') ap_perf_radio_prev_peak_pkt_retx = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 14), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfRadioPrevPeakPktRetx.setStatus('current') if mibBuilder.loadTexts: apPerfRadioPrevPeakPktRetx.setDescription('Peak packet retransmissions in hundredth of pps from last 15 minute interval.') ap_perf_radio_cur_peak_pkt_retx = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 15), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfRadioCurPeakPktRetx.setStatus('current') if mibBuilder.loadTexts: apPerfRadioCurPeakPktRetx.setDescription('Peak packet retransmissions in hundredth of pps of current 15 minute interval.') ap_perf_radio_average_pkt_retx = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 16), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfRadioAveragePktRetx.setStatus('current') if mibBuilder.loadTexts: apPerfRadioAveragePktRetx.setDescription('Running average of packet retransmissions in hundredth of pps.') ap_perf_radio_current_pkt_retx = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 17), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfRadioCurrentPktRetx.setStatus('current') if mibBuilder.loadTexts: apPerfRadioCurrentPktRetx.setDescription('Packet retransmissions in hundredth of pps from latest statistics from AP.') ap_perf_radio_pkt_retx = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 5, 1, 18), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfRadioPktRetx.setStatus('current') if mibBuilder.loadTexts: apPerfRadioPktRetx.setDescription('Running counter of number of packet retransmissions.') ap_accessibility_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6)) if mibBuilder.loadTexts: apAccessibilityTable.setStatus('current') if mibBuilder.loadTexts: apAccessibilityTable.setDescription('A table showing the rate of associations, reassociations and deauthentications/dissassociations from each AP radio. The table contains one row per radio per active AP.') ap_accessibility_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'apIndex'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'apRadioIndex')) if mibBuilder.loadTexts: apAccessibilityEntry.setStatus('current') if mibBuilder.loadTexts: apAccessibilityEntry.setDescription('The accessibility statistics of one AP radio.') ap_acc_prev_peak_assoc_req_rx = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 1), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apAccPrevPeakAssocReqRx.setStatus('current') if mibBuilder.loadTexts: apAccPrevPeakAssocReqRx.setDescription('Peak number of association requests in hundredth of requests per second received by AP from last 15 minute interval.') ap_acc_cur_peak_assoc_req_rx = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 2), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apAccCurPeakAssocReqRx.setStatus('current') if mibBuilder.loadTexts: apAccCurPeakAssocReqRx.setDescription('Peak number of association requests in hundredth of requests per second received by AP of current 15 minute interval.') ap_acc_average_assoc_req_rx = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 3), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apAccAverageAssocReqRx.setStatus('current') if mibBuilder.loadTexts: apAccAverageAssocReqRx.setDescription('Running average of association requests in hundredth of requests per second received by an AP radio.') ap_acc_current_assoc_req_rx = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 4), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apAccCurrentAssocReqRx.setStatus('current') if mibBuilder.loadTexts: apAccCurrentAssocReqRx.setDescription('Association requests in hundredth of requests per second from latest statistics from AP.') ap_acc_assoc_req_rx = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 5), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apAccAssocReqRx.setStatus('current') if mibBuilder.loadTexts: apAccAssocReqRx.setDescription('Running counter of association requests.') ap_acc_prev_peak_reassoc_req_rx = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 6), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apAccPrevPeakReassocReqRx.setStatus('current') if mibBuilder.loadTexts: apAccPrevPeakReassocReqRx.setDescription('Peak number of re-association requests in hundredth of requests per second received by an AP radio from last 15 minute interval.') ap_acc_cur_peak_reassoc_req_rx = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 7), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apAccCurPeakReassocReqRx.setStatus('current') if mibBuilder.loadTexts: apAccCurPeakReassocReqRx.setDescription('Peak number of re-association requests in hundredth of requests per second received by an AP radio of current 15 minute interval.') ap_acc_average_reassoc_req_rx = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 8), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apAccAverageReassocReqRx.setStatus('current') if mibBuilder.loadTexts: apAccAverageReassocReqRx.setDescription('Running average of re-association requests in hundredth of requests per second received by an AP radio.') ap_acc_current_reassoc_req_rx = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 9), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apAccCurrentReassocReqRx.setStatus('current') if mibBuilder.loadTexts: apAccCurrentReassocReqRx.setDescription('Re-association requests in hundredth of requests per second received by an AP radio from latest statistics from AP.') ap_acc_reassoc_req_rx = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 10), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apAccReassocReqRx.setStatus('current') if mibBuilder.loadTexts: apAccReassocReqRx.setDescription('Running counter of re-association requests received by an AP radio.') ap_acc_prev_peak_disassoc_deauth_req_tx = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 11), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apAccPrevPeakDisassocDeauthReqTx.setStatus('current') if mibBuilder.loadTexts: apAccPrevPeakDisassocDeauthReqTx.setDescription('Peak number of disassociation/deauthentication requests in hundredth of requests per second transmitted by an AP radio from last 15 minute interval.') ap_acc_cur_peak_disassoc_deauth_req_tx = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 12), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apAccCurPeakDisassocDeauthReqTx.setStatus('current') if mibBuilder.loadTexts: apAccCurPeakDisassocDeauthReqTx.setDescription('Peak number of disassociation/deauthentication requests in hundredth of requests per second transmitted by an AP radio of current 15 minute interval.') ap_acc_average_disassoc_deauth_req_tx = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 13), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apAccAverageDisassocDeauthReqTx.setStatus('current') if mibBuilder.loadTexts: apAccAverageDisassocDeauthReqTx.setDescription('Running average of disassociation/deauthentication requests in hundredth of requests per second transmitted by an AP radio.') ap_acc_current_disassoc_deauth_req_tx = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 14), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apAccCurrentDisassocDeauthReqTx.setStatus('current') if mibBuilder.loadTexts: apAccCurrentDisassocDeauthReqTx.setDescription('Disassociation/deauthentication requests in hundredth of requests per second transmitted by an AP radio from latest statistics from AP.') ap_acc_disassoc_deauth_req_tx = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 15), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apAccDisassocDeauthReqTx.setStatus('current') if mibBuilder.loadTexts: apAccDisassocDeauthReqTx.setDescription('Running counter of disassociation/deauthentication requests transmitted by an AP radio.') ap_acc_prev_peak_disassoc_deauth_req_rx = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 16), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apAccPrevPeakDisassocDeauthReqRx.setStatus('current') if mibBuilder.loadTexts: apAccPrevPeakDisassocDeauthReqRx.setDescription('Peak number of disassociation/deauthentication requests in hundredth of requests per second received by an AP radio from last 15 minute interval.') ap_acc_cur_peak_disassoc_deauth_req_rx = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 17), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apAccCurPeakDisassocDeauthReqRx.setStatus('current') if mibBuilder.loadTexts: apAccCurPeakDisassocDeauthReqRx.setDescription('Peak number of disassociation/deauthentication requests in hundredth of requests per second received by an AP radio of current 15 minute interval.') ap_acc_average_disassoc_deauth_req_rx = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 18), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apAccAverageDisassocDeauthReqRx.setStatus('current') if mibBuilder.loadTexts: apAccAverageDisassocDeauthReqRx.setDescription('Running average of disassociation/deauthentication requests in hundredth of requests per second received by an AP radio.') ap_acc_current_disassoc_deauth_req_rx = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 19), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apAccCurrentDisassocDeauthReqRx.setStatus('current') if mibBuilder.loadTexts: apAccCurrentDisassocDeauthReqRx.setDescription('Disassociation/deauthentication requests in hundredth of requests per second received by an AP radio from latest statistics from AP.') ap_acc_disassoc_deauth_req_rx = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 6, 1, 20), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apAccDisassocDeauthReqRx.setStatus('current') if mibBuilder.loadTexts: apAccDisassocDeauthReqRx.setDescription('Running counter of disassociation/deauthentication requests received by an AP radio.') ap_performance_reportby_radio_and_wlan_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7)) if mibBuilder.loadTexts: apPerformanceReportbyRadioAndWlanTable.setStatus('current') if mibBuilder.loadTexts: apPerformanceReportbyRadioAndWlanTable.setDescription('Table of AP performance statistics by AP, AP radio and WLAN. ') ap_performance_reportby_radio_and_wlan_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'apIndex'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'apRadioIndex'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'wlanID')) if mibBuilder.loadTexts: apPerformanceReportbyRadioAndWlanEntry.setStatus('current') if mibBuilder.loadTexts: apPerformanceReportbyRadioAndWlanEntry.setDescription('The AP performance statistics of one AP radio and WLAN.') ap_perf_wlan_prev_peak_clients_per_sec = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 1), gauge32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfWlanPrevPeakClientsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanPrevPeakClientsPerSec.setDescription('Peak clients per second from last 15 minute interval.') ap_perf_wlan_cur_peak_clients_per_sec = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 2), gauge32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfWlanCurPeakClientsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanCurPeakClientsPerSec.setDescription('Peak clients per second of current 15 minute interval.') ap_perf_wlan_average_clients_per_sec = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 3), hundredth_of_gauge32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfWlanAverageClientsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanAverageClientsPerSec.setDescription('Running average of clients in hundredth of clients per second.') ap_perf_wlan_current_clients_per_sec = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 4), gauge32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfWlanCurrentClientsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanCurrentClientsPerSec.setDescription('Clients per second from latest statistics from AP.') ap_perf_wlan_prev_peak_ul_octets_per_sec = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 5), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfWlanPrevPeakULOctetsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanPrevPeakULOctetsPerSec.setDescription('Peak uplink octets in hundredth of octets per second from last 15 minute interval.') ap_perf_wlan_cur_peak_ul_octets_per_sec = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 6), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfWlanCurPeakULOctetsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanCurPeakULOctetsPerSec.setDescription('Peak uplink octets in hundredth of octets per second of current 15 minute interval.') ap_perf_wlan_average_ul_octets_per_sec = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 7), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfWlanAverageULOctetsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanAverageULOctetsPerSec.setDescription('Running average of uplink hundredth of octets per second.') ap_perf_wlan_current_ul_octets_per_sec = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 8), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfWlanCurrentULOctetsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanCurrentULOctetsPerSec.setDescription('Uplink octets in hundredth of octets per second from latest statistics from AP.') ap_perf_wlan_ul_octets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 9), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfWlanULOctets.setStatus('current') if mibBuilder.loadTexts: apPerfWlanULOctets.setDescription('Running counter of uplink octets per second.') ap_perf_wlan_prev_peak_ul_pkts_per_sec = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 10), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfWlanPrevPeakULPktsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanPrevPeakULPktsPerSec.setDescription('Peak uplink packets in hundredth of packets per second from last 15 minute interval.') ap_perf_wlan_cur_peak_ul_pkts_per_sec = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 11), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfWlanCurPeakULPktsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanCurPeakULPktsPerSec.setDescription('Peak uplink packets in hundredth of packets per second of current 15 minute interval.') ap_perf_wlan_average_ul_pkts_per_sec = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 12), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfWlanAverageULPktsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanAverageULPktsPerSec.setDescription('Running average of uplink packets in hundredth of packets per second.') ap_perf_wlan_current_ul_pkts_per_sec = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 13), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfWlanCurrentULPktsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanCurrentULPktsPerSec.setDescription('Uplink packets in hundredth of packets per second from latest statistics from AP.') ap_perf_wlan_ul_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 14), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfWlanULPkts.setStatus('current') if mibBuilder.loadTexts: apPerfWlanULPkts.setDescription('Running counter of uplink packets per second.') ap_perf_wlan_prev_peak_dl_octets_per_sec = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 15), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfWlanPrevPeakDLOctetsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanPrevPeakDLOctetsPerSec.setDescription('Peak downlink octets in hundredth of octets per second from last 15 minute interval.') ap_perf_wlan_cur_peak_dl_octets_per_sec = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 16), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfWlanCurPeakDLOctetsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanCurPeakDLOctetsPerSec.setDescription('Peak downlink octets in hundredth of octets per second of current 15 minute interval.') ap_perf_wlan_average_dl_octets_per_sec = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 17), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfWlanAverageDLOctetsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanAverageDLOctetsPerSec.setDescription('Running average of downlink octets in hundredth of octets per second.') ap_perf_wlan_current_dl_octets_per_sec = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 18), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfWlanCurrentDLOctetsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanCurrentDLOctetsPerSec.setDescription('Downlink octets in hundredth octets per second from latest statistics from AP.') ap_perf_wlan_dl_octets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 19), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfWlanDLOctets.setStatus('current') if mibBuilder.loadTexts: apPerfWlanDLOctets.setDescription('Running counter of downlink octets per second.') ap_perf_wlan_prev_peak_dl_pkts_per_sec = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 20), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfWlanPrevPeakDLPktsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanPrevPeakDLPktsPerSec.setDescription('Peak downlink packets in hundredth of packets per second from last 15 minute interval.') ap_perf_wlan_cur_peak_dl_pkts_per_sec = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 21), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfWlanCurPeakDLPktsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanCurPeakDLPktsPerSec.setDescription('Peak downlink packets in hundredth of packets per second of current 15 minute interval.') ap_perf_wlan_average_dl_pkts_per_sec = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 22), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfWlanAverageDLPktsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanAverageDLPktsPerSec.setDescription('Running average of downlink packets in hundredth of packets per second.') ap_perf_wlan_current_dl_pkts_per_sec = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 23), hundredth_of_gauge64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfWlanCurrentDLPktsPerSec.setStatus('current') if mibBuilder.loadTexts: apPerfWlanCurrentDLPktsPerSec.setDescription('Downlink packets in hundredth of packets per second from latest statistics from AP.') ap_perf_wlan_dl_pkts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 7, 1, 24), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: apPerfWlanDLPkts.setStatus('current') if mibBuilder.loadTexts: apPerfWlanDLPkts.setDescription('Running counter of downlink packets per second.') ap_channel_utilization_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 8)) if mibBuilder.loadTexts: apChannelUtilizationTable.setStatus('current') if mibBuilder.loadTexts: apChannelUtilizationTable.setDescription('Table of AP utilization by channel that the AP can change dynamically. It contains one entry for each radio and channel of each active AP.') ap_channel_utilization_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 8, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'apIndex'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'apRadioIndex'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'channel')) if mibBuilder.loadTexts: apChannelUtilizationEntry.setStatus('current') if mibBuilder.loadTexts: apChannelUtilizationEntry.setDescription('The AP performance statistics of one AP radio and channel.') channel = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 8, 1, 1), unsigned32()) if mibBuilder.loadTexts: channel.setStatus('current') if mibBuilder.loadTexts: channel.setDescription('Channel on which utilization is measured.') ap_chnl_util_prev_peak_utilization = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 8, 1, 2), gauge32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apChnlUtilPrevPeakUtilization.setStatus('current') if mibBuilder.loadTexts: apChnlUtilPrevPeakUtilization.setDescription('Peak channel utilization in % from last 15 minute interval.') ap_chnl_util_cur_peak_utilization = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 8, 1, 3), gauge32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apChnlUtilCurPeakUtilization.setStatus('current') if mibBuilder.loadTexts: apChnlUtilCurPeakUtilization.setDescription('Peak channel utilization in % of current 15 minute interval.') ap_chnl_util_average_utilization = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 8, 1, 4), hundredth_of_gauge32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apChnlUtilAverageUtilization.setStatus('current') if mibBuilder.loadTexts: apChnlUtilAverageUtilization.setDescription('Running average of channel utilization in hundredth of %.') ap_chnl_util_current_utilization = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 8, 1, 5), gauge32()).setMaxAccess('readonly') if mibBuilder.loadTexts: apChnlUtilCurrentUtilization.setStatus('current') if mibBuilder.loadTexts: apChnlUtilCurrentUtilization.setDescription('Channel utilization in % from latest statistics from AP.') ap_neighbours_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 9)) if mibBuilder.loadTexts: apNeighboursTable.setStatus('current') if mibBuilder.loadTexts: apNeighboursTable.setDescription('A table showing the BSSID, RSS, operating radio channel and detailed information of a nearby AP. The table contains one row per nearby AP per radio per active AP.') ap_neighbours_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 9, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'apIndex'), (0, 'IF-MIB', 'ifIndex'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'nearbyApIndex')) if mibBuilder.loadTexts: apNeighboursEntry.setStatus('current') if mibBuilder.loadTexts: apNeighboursEntry.setDescription('The configuration attributes of one nearby AP.') nearby_ap_index = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 9, 1, 1), unsigned32()) if mibBuilder.loadTexts: nearbyApIndex.setStatus('current') if mibBuilder.loadTexts: nearbyApIndex.setDescription('Nearby AP index.') nearby_ap_info = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 9, 1, 2), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: nearbyApInfo.setStatus('current') if mibBuilder.loadTexts: nearbyApInfo.setDescription('Detailed information of a nearby AP. ') nearby_ap_bssid = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 9, 1, 3), octet_string().subtype(subtypeSpec=value_size_constraint(17, 17)).setFixedLength(17)).setMaxAccess('readonly') if mibBuilder.loadTexts: nearbyApBSSID.setStatus('current') if mibBuilder.loadTexts: nearbyApBSSID.setDescription('The BSSID of a nearby AP. ') nearby_ap_channel = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 9, 1, 4), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: nearbyApChannel.setStatus('current') if mibBuilder.loadTexts: nearbyApChannel.setDescription('The operating radio channel of a nearby AP. ') nearby_ap_rss = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 2, 9, 1, 5), integer32()).setMaxAccess('readonly') if mibBuilder.loadTexts: nearbyApRSS.setStatus('current') if mibBuilder.loadTexts: nearbyApRSS.setDescription('The Received Signal Strength of a nearby AP. ') sensor_management = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 3)) tftp_sever = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 3, 1), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: tftpSever.setStatus('current') if mibBuilder.loadTexts: tftpSever.setDescription('TFTP server that sensor image resides.') image_path26xx = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 3, 2), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: imagePath26xx.setStatus('current') if mibBuilder.loadTexts: imagePath26xx.setDescription('Path of sensor image on TFTP server.') image_path36xx = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 3, 3), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: imagePath36xx.setStatus('current') if mibBuilder.loadTexts: imagePath36xx.setDescription('Path of sensor image on TFTP server.') image_version_ofap26xx = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 3, 4), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: imageVersionOfap26xx.setStatus('current') if mibBuilder.loadTexts: imageVersionOfap26xx.setDescription("Sensor's software version.") image_version_ofngap36xx = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 3, 5), display_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: imageVersionOfngap36xx.setStatus('current') if mibBuilder.loadTexts: imageVersionOfngap36xx.setDescription("Sensor's softerware version for Next Generation Access Point.") ap_registration = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 4)) ap_reg_security_mode = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 4, 1), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('allowAll', 1), ('allowApprovedOnes', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: apRegSecurityMode.setStatus('current') if mibBuilder.loadTexts: apRegSecurityMode.setDescription("Indicates registration mode for an AP. If allowAll(1), then all wireless APs are allowed to register to the controlloer, otherwise only approved APs in 'Approved AP' list are allowed to register to the controller.") ap_reg_discovery_retries = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 4, 2), unsigned32().subtype(subtypeSpec=value_range_constraint(1, 255)).clone(3)).setMaxAccess('readwrite') if mibBuilder.loadTexts: apRegDiscoveryRetries.setStatus('current') if mibBuilder.loadTexts: apRegDiscoveryRetries.setDescription('Number of retries for discovery requests from an access point to controller. After these number of retries, the access point will start over again after some arbitrary delays.') ap_reg_discovery_interval = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 4, 3), unsigned32().subtype(subtypeSpec=value_range_constraint(1, 10)).clone(3)).setUnits('seconds').setMaxAccess('readwrite') if mibBuilder.loadTexts: apRegDiscoveryInterval.setStatus('current') if mibBuilder.loadTexts: apRegDiscoveryInterval.setDescription('Interval between two consecutive discovery requests from the same access point.') ap_reg_telnet_password = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 4, 4), octet_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apRegTelnetPassword.setStatus('current') if mibBuilder.loadTexts: apRegTelnetPassword.setDescription('Password used to access an AP via telnet. This field is write-only and read access returns empty string.') ap_reg_ssh_password = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 4, 5), octet_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apRegSSHPassword.setStatus('current') if mibBuilder.loadTexts: apRegSSHPassword.setDescription('SSH password used to access an access point. This field is write-only and read access returns empty string.') ap_reg_use_cluster_encryption = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 4, 6), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apRegUseClusterEncryption.setStatus('current') if mibBuilder.loadTexts: apRegUseClusterEncryption.setDescription('If this field set to true, then all APs in the cluster use cluster encryption.') ap_reg_cluster_shared_secret = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 4, 7), octet_string()).setMaxAccess('readwrite') if mibBuilder.loadTexts: apRegClusterSharedSecret.setStatus('current') if mibBuilder.loadTexts: apRegClusterSharedSecret.setDescription('Password for cluster encryption. This field is write-only and read access returns empty string.') load_balancing = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5)) load_group_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 1)) if mibBuilder.loadTexts: loadGroupTable.setStatus('current') if mibBuilder.loadTexts: loadGroupTable.setDescription('Table of configured load groups for access points. A set of access points can be grouped together and they are identified by unique name. An access point can only be assigned to one group.') load_group_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 1, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'loadGroupID')) if mibBuilder.loadTexts: loadGroupEntry.setStatus('current') if mibBuilder.loadTexts: loadGroupEntry.setDescription('An entry containing definition of a load group. There exists two types of load group: client-balancing-group and radio-balancing-group.') load_group_id = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 1, 1, 1), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: loadGroupID.setStatus('current') if mibBuilder.loadTexts: loadGroupID.setDescription('Internally generated ID for a group and cannot be changed externally.') load_group_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 1, 1, 2), display_string().subtype(subtypeSpec=value_size_constraint(1, 32))).setMaxAccess('readwrite') if mibBuilder.loadTexts: loadGroupName.setStatus('current') if mibBuilder.loadTexts: loadGroupName.setDescription('Unique name assigned to the group.') load_group_type = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 1, 1, 3), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('clientBalancing', 0), ('radioBalancing', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: loadGroupType.setStatus('current') if mibBuilder.loadTexts: loadGroupType.setDescription('Type of load balancing this group supports.') load_group_band_preference = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 1, 1, 4), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disabled', 0), ('enabled', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: loadGroupBandPreference.setStatus('current') if mibBuilder.loadTexts: loadGroupBandPreference.setDescription('Band preference is enabled for this group if this field is set to true and group type is set to radioBalancing(1).') load_group_load_control = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 1, 1, 5), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disabled', 0), ('enabled', 1))).clone('disabled')).setMaxAccess('readwrite') if mibBuilder.loadTexts: loadGroupLoadControl.setStatus('deprecated') if mibBuilder.loadTexts: loadGroupLoadControl.setDescription('Load balancing is enabled for this group if this field is set to true and group type is set to radioBalancing(1).') load_group_client_count_radio1 = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 1, 1, 6), unsigned32().subtype(subtypeSpec=constraints_union(value_range_constraint(5, 60), value_range_constraint(121, 121))).clone(121)).setMaxAccess('readwrite') if mibBuilder.loadTexts: loadGroupClientCountRadio1.setStatus('current') if mibBuilder.loadTexts: loadGroupClientCountRadio1.setDescription('Maximum number of client on this radio. This field is only applicable to a group with radioBalancing(1) type.') load_group_client_count_radio2 = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 1, 1, 7), unsigned32().subtype(subtypeSpec=constraints_union(value_range_constraint(5, 60), value_range_constraint(121, 121))).clone(121)).setMaxAccess('readwrite') if mibBuilder.loadTexts: loadGroupClientCountRadio2.setStatus('current') if mibBuilder.loadTexts: loadGroupClientCountRadio2.setDescription('Maximum number of client on this radio. This field is only applicable to a group with radioBalancing(1) type.') load_group_load_control_enable_r1 = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 1, 1, 8), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disabled', 0), ('enabled', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: loadGroupLoadControlEnableR1.setStatus('current') if mibBuilder.loadTexts: loadGroupLoadControlEnableR1.setDescription('If it is enabled then load control is applicable to radio #1 of all access points that are assigned to this load group. This field has meaning only for the load group that is of radioBalancing(1) type. ') load_group_load_control_enable_r2 = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 1, 1, 9), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disabled', 0), ('enabled', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: loadGroupLoadControlEnableR2.setStatus('current') if mibBuilder.loadTexts: loadGroupLoadControlEnableR2.setDescription('If it is enabled then load control is applicable to radio #2 of all access points that are assigned to this load group. This field has meaning only for the load group that is of radioBalancing(1) type.') load_group_load_control_strict_limit_r1 = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 1, 1, 10), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disabled', 0), ('enabled', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: loadGroupLoadControlStrictLimitR1.setStatus('current') if mibBuilder.loadTexts: loadGroupLoadControlStrictLimitR1.setDescription('If it is enabled then strict limit for load control is applicable to radio #1 of all access points that are assigned to this load group. This field has meaning only for the load group that is of radioBalancing(1) type.') load_group_load_control_strict_limit_r2 = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 1, 1, 11), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disabled', 0), ('enabled', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: loadGroupLoadControlStrictLimitR2.setStatus('current') if mibBuilder.loadTexts: loadGroupLoadControlStrictLimitR2.setDescription('If it is enabled then strict limit for load control is applicable to radio #2 of all access points that are assigned to this load group. This field has meaning only for the load group that is of radioBalancing(1) type.') load_grp_radios_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 2)) if mibBuilder.loadTexts: loadGrpRadiosTable.setStatus('current') if mibBuilder.loadTexts: loadGrpRadiosTable.setDescription('Table of radio assignment to defined load groups. ') load_grp_radios_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 2, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'loadGroupID'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'apIndex')) if mibBuilder.loadTexts: loadGrpRadiosEntry.setStatus('current') if mibBuilder.loadTexts: loadGrpRadiosEntry.setDescription('Any entry defining radio assignment of AP, identified by apIndex, to a load group identified by loadGroupID.') load_grp_radios_radio1 = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 2, 1, 2), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2))).clone(namedValues=named_values(('notApplicable', 0), ('assigned', 1), ('unassigned', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: loadGrpRadiosRadio1.setStatus('current') if mibBuilder.loadTexts: loadGrpRadiosRadio1.setDescription("If this field is set to 'assigned(1)', then the radio of the AP identified by the apIndex is a member of the load balancing group identified by the loadBlanaceID. For radio blanacing group, either all or none of the radios of a specific AP (indentified by apIndex) are assigned to the load balancing group.") load_grp_radios_radio2 = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 2, 1, 3), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2))).clone(namedValues=named_values(('notApplicable', 0), ('assigned', 1), ('unassigned', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: loadGrpRadiosRadio2.setStatus('current') if mibBuilder.loadTexts: loadGrpRadiosRadio2.setDescription("If this field is set to 'assigned(2)', then the radio of the AP identified by the apIndex is a member of the load balancing group identified by the loadBlanaceID. For radio blanacing group, either all or none of the radios of a specific AP (indentified by apIndex) are assigned to the load balancing group.") load_grp_wlan_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 3)) if mibBuilder.loadTexts: loadGrpWlanTable.setStatus('current') if mibBuilder.loadTexts: loadGrpWlanTable.setDescription('Table of WLAN assignment to defined load groups. ') load_grp_wlan_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 3, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'loadGroupID'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'wlanID')) if mibBuilder.loadTexts: loadGrpWlanEntry.setStatus('current') if mibBuilder.loadTexts: loadGrpWlanEntry.setDescription('An entry defining WLAN, identified by wlanID, assignment to a load group identified by loadGroupID.') load_grp_wlan_assigned = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 5, 3, 1, 1), truth_value()).setMaxAccess('readwrite') if mibBuilder.loadTexts: loadGrpWlanAssigned.setStatus('current') if mibBuilder.loadTexts: loadGrpWlanAssigned.setDescription('Assignement of WLAN, identified with wlanID, to the load balancing group identified bye loadGroupID.') ap_maintenance_cycle = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 6)) schedule = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 6, 1), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3))).clone(namedValues=named_values(('never', 0), ('daily', 1), ('weekly', 2), ('monthly', 3)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: schedule.setStatus('current') if mibBuilder.loadTexts: schedule.setDescription('AP maintenance schedule options. 0 : never perform the maintenance action. 1 : perform the maintenance action every day. 2 : perform the maintenance action every week. 3 : perform the maintenance action every month.') start_hour = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 6, 2), integer32().subtype(subtypeSpec=value_range_constraint(0, 23))).setMaxAccess('readwrite') if mibBuilder.loadTexts: startHour.setStatus('current') if mibBuilder.loadTexts: startHour.setDescription('Maintenance action starts at this hour of the day. ') start_minute = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 6, 3), integer32().subtype(subtypeSpec=value_range_constraint(0, 59))).setMaxAccess('readwrite') if mibBuilder.loadTexts: startMinute.setStatus('current') if mibBuilder.loadTexts: startMinute.setDescription('Maintenance action starts at this minute of the hour. ') duration = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 6, 4), integer32().subtype(subtypeSpec=value_range_constraint(1, 23))).setMaxAccess('readwrite') if mibBuilder.loadTexts: duration.setStatus('current') if mibBuilder.loadTexts: duration.setDescription('Duration of the AP maintenance cycle (how often maintenance is done) in hours. ') recurrence_daily = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 6, 5), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2))).clone(namedValues=named_values(('everyDay', 0), ('everyWeekday', 1), ('everyWeekend', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: recurrenceDaily.setStatus('current') if mibBuilder.loadTexts: recurrenceDaily.setDescription('This field has meaning only when the maintenance schedule option is set to daily(1). Below is the recurrence option. 0 : every day. 1 : every weekday. 2 : every weekend.') recurrence_weekly = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 6, 6), bits().clone(namedValues=named_values(('sunday', 0), ('monday', 1), ('tuesday', 2), ('wednesday', 3), ('thursday', 4), ('friday', 5), ('saturday', 6)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: recurrenceWeekly.setStatus('current') if mibBuilder.loadTexts: recurrenceWeekly.setDescription('This field has meaning only when the maintenance schedule option is set to weekly(2). Below are the recurrence options. BIT 0 : Sunday. BIT 1 : Monday. BIT 2 : Tuesday. BIT 3 : Wednesday. BIT 4 : Thursday. BIT 5 : Friday. BIT 6 : Saturday.') recurrence_monthly = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 6, 7), bits().clone(namedValues=named_values(('first', 0), ('second', 1), ('third', 2), ('fourth', 3), ('fifth', 4), ('sunday', 5), ('monday', 6), ('tuesday', 7), ('wednesday', 8), ('thursday', 9), ('friday', 10), ('saturday', 11)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: recurrenceMonthly.setStatus('current') if mibBuilder.loadTexts: recurrenceMonthly.setDescription('This field has meaning only when the maintenance schedule option is set to monthly(3). Below are the recurrence options. BIT 0 : the first week of the month. BIT 1 : the second week of the month. BIT 2 : the third week of the month. BIT 3 : the fourth week of the month. BIT 4 : the fifth week of the month. BIT 5 : sunday of the week. BIT 6 : monday of the week. BIT 7 : tuesday of the week. BIT 8 : wednesday of the week. BIT 9 : thursday of the week. BIT 10 : friday of the week. BIT 11 : saturday of the week.') ap_platforms = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 5, 6, 8), bits().clone(namedValues=named_values(('ap2600', 0), ('ap2605', 1), ('ap2650', 2), ('ap4102', 3), ('w786', 4), ('ap3705', 5), ('ap3710', 6), ('ap3715', 7), ('ap3765', 8), ('ap3767', 9), ('ap3801', 10), ('ap3805', 11), ('ap3825', 12), ('ap3865', 13), ('ap3935', 14), ('ap3965', 15), ('w78xc', 16), ('w78xcsfp', 17)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: apPlatforms.setStatus('current') if mibBuilder.loadTexts: apPlatforms.setDescription('Select which models of the AP platforms to perform the maintenance. BIT 0 : AP2600 platform. BIT 1 : AP2605 platform. BIT 2 : AP2650 platform. BIT 3 : AP4102 platform. BIT 4 : W786 platform. BIT 5 : AP3705 platform. BIT 6 : AP3710 platform. BIT 7 : AP3715 platform. BIT 8 : AP3765 platform. BIT 9 : AP3767 platform. BIT 10 : AP3801 platform. BIT 11 : AP3805 platform. BIT 12 : AP3825 platform. BIT 13 : AP3865 platform. BIT 14 : AP3935 platform. BIT 15 : AP3965 platform. BIT 16 : W78XC platform. BIT 17 : W78XCSFP platform.') mobile_units = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6)) mobile_unit_count = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 1), integer32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: mobileUnitCount.setStatus('current') if mibBuilder.loadTexts: mobileUnitCount.setDescription('Number of clients associated with the controller.') mu_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2)) if mibBuilder.loadTexts: muTable.setStatus('current') if mibBuilder.loadTexts: muTable.setDescription('Table of information for clients associated with the EWC.') mu_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'muMACAddress')) if mibBuilder.loadTexts: muEntry.setStatus('current') if mibBuilder.loadTexts: muEntry.setDescription('Information for a client associated with the EWC.') mu_mac_address = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 1), mac_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: muMACAddress.setStatus('current') if mibBuilder.loadTexts: muMACAddress.setDescription('Client MAC address.') mu_ip_address = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 2), ip_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: muIPAddress.setStatus('current') if mibBuilder.loadTexts: muIPAddress.setDescription('Client IP Address.') mu_user = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 3), octet_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: muUser.setStatus('current') if mibBuilder.loadTexts: muUser.setDescription('Client login name.') mu_state = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 4), truth_value()).setMaxAccess('readonly') if mibBuilder.loadTexts: muState.setStatus('current') if mibBuilder.loadTexts: muState.setDescription('True if the client is authenticated.') mu_ap_serial_no = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 5), octet_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: muAPSerialNo.setStatus('current') if mibBuilder.loadTexts: muAPSerialNo.setDescription('Serial Number of the Access Point the client is associated with.') mu_vns_ssid = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 6), octet_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: muVnsSSID.setStatus('current') if mibBuilder.loadTexts: muVnsSSID.setDescription('SSID of the VNS the client is associated with.') mu_tx_packets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 7), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: muTxPackets.setStatus('current') if mibBuilder.loadTexts: muTxPackets.setDescription('Number of packets trasmitted to the client.') mu_rx_packets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 8), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: muRxPackets.setStatus('current') if mibBuilder.loadTexts: muRxPackets.setDescription('Number of packets received from the client.') mu_tx_octets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 9), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: muTxOctets.setStatus('current') if mibBuilder.loadTexts: muTxOctets.setDescription('Number of octets transmitted to the client.') mu_rx_octets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 10), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: muRxOctets.setStatus('current') if mibBuilder.loadTexts: muRxOctets.setDescription('Number of octets received from the client.') mu_duration = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 11), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: muDuration.setStatus('current') if mibBuilder.loadTexts: muDuration.setDescription('Time client has been associated with the EWC.') mu_ap_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 12), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: muAPName.setStatus('current') if mibBuilder.loadTexts: muAPName.setDescription('Name of the Access Point the client is associated with.') mu_topology_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 13), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: muTopologyName.setStatus('current') if mibBuilder.loadTexts: muTopologyName.setDescription('Topology name that the MU is associated with.') mu_policy_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 14), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: muPolicyName.setStatus('current') if mibBuilder.loadTexts: muPolicyName.setDescription('The name of the policy that provides filter for this MU.') mu_default_co_s = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 15), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: muDefaultCoS.setStatus('current') if mibBuilder.loadTexts: muDefaultCoS.setDescription('The CoS that is applied to the current traffic if the defined rule for the current traffic has not specifically defined any CoS.') mu_connection_protocol = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 16), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3, 4, 5, 6))).clone(namedValues=named_values(('unknown', 0), ('a', 1), ('g', 2), ('b', 3), ('n50', 4), ('n24', 5), ('ac', 6)))).setMaxAccess('readonly') if mibBuilder.loadTexts: muConnectionProtocol.setStatus('current') if mibBuilder.loadTexts: muConnectionProtocol.setDescription('The MU is using this connection protocol for current connection. Symbols notation: n50 = an = n5.0Ghz, n24 = bgn = n2.4Ghz') mu_connection_capability = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 17), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3, 4, 5))).clone(namedValues=named_values(('unknown', 0), ('a', 1), ('bg', 2), ('abg', 3), ('an', 4), ('bgn', 5)))).setMaxAccess('readonly') if mibBuilder.loadTexts: muConnectionCapability.setStatus('deprecated') if mibBuilder.loadTexts: muConnectionCapability.setDescription('This field indicates what are the MU connection capability.') mu_wlanid = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 18), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: muWLANID.setStatus('current') if mibBuilder.loadTexts: muWLANID.setDescription('ID of the WLAN that the MU is associated with.') mu_bssid_mac = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 19), mac_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: muBSSIDMac.setStatus('current') if mibBuilder.loadTexts: muBSSIDMac.setDescription('Client BSSID MAC address.') mu_dot11_connection_capability = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 2, 1, 20), bits().clone(namedValues=named_values(('dot1150', 0), ('dot1124', 1), ('wpaV1', 2), ('wpaV2', 3), ('oneStream', 4), ('twoStream', 5), ('threeSteam', 6), ('uapsdVoice', 7), ('uapsdVideo', 8), ('uapsdBackground', 9), ('uapsdBesteffort', 10), ('wmm', 11), ('greenfield', 12), ('fastTransition', 13)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: muDot11ConnectionCapability.setStatus('current') if mibBuilder.loadTexts: muDot11ConnectionCapability.setDescription('This field indicates what are the MU connection capabilities. bit 0 : If this bit is set, the client is capable to tx/rx on A radio. bit 1 : If this bit is set, the client is capable to tx/rx on BG radio. bit 2 : If this bit is set, the client is capable of wpaV1 privacy. bit 3 : If this bit is set, the client is capable of wpaV2 privacy. bit 4 : If this bit is set, the client is capable to comunicate with 1 data stream. bit 5 : If this bit is set, the client is capable to comunicate with 2 data streams. bit 6 : If this bit is set, the client is capable to comunicate with 3 data streams. bit 7 : If this bit is set, the client is capable of Unscheduled automatic power-save delivery (U-APSD) benefits. The voice client can synchronize the transmission and reception of voice frames with the AP. bit 8 : If this bit is set, the client is capable of Unscheduled automatic power-save delivery (U-APSD) benefits. The video client can synchronize the transmission and reception of video frames with the AP. bit 9 : If this bit is set, the client is capable of Unscheduled automatic power-save delivery (U-APSD) benefits. The client can synchronize the transmission and reception in background queue. bit 10 : If this bit is set, the client is capable of Unscheduled automatic power-save delivery (U-APSD) benefits. The client can synchronize the transmission and reception in best effort queue. bit 11 : If this bit is set, the client is capable of Wi-Fi Multimedia(WMM) power save. bit 12 : If this bit is set, the client is capable of 802.11n Greenfield mode. bit 13 : If this bit is set, the client is on fast-transition mode.') mu_tspec_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3)) if mibBuilder.loadTexts: muTSPECTable.setStatus('current') if mibBuilder.loadTexts: muTSPECTable.setDescription('Table of information for Admission Control Statistics by active client.') mu_tspec_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'apIndex'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'muMACAddress'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'tspecAC'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'tspecDirection')) if mibBuilder.loadTexts: muTSPECEntry.setStatus('current') if mibBuilder.loadTexts: muTSPECEntry.setDescription('Information for Admission Control Statistics by active client.') tspec_mu_mac_address = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 1), mac_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: tspecMuMACAddress.setStatus('current') if mibBuilder.loadTexts: tspecMuMACAddress.setDescription('Client MAC address.') tspec_ac = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 2), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3, 4, 5))).clone(namedValues=named_values(('be', 0), ('bk', 1), ('vi', 2), ('vo', 3), ('tvo', 4), ('nwme', 5)))).setMaxAccess('readonly') if mibBuilder.loadTexts: tspecAC.setStatus('current') if mibBuilder.loadTexts: tspecAC.setDescription('Access Category, such as Best Effort, Background, Voice, Video, and Reserved.') tspec_direction = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 3), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3))).clone(namedValues=named_values(('uplink', 0), ('dnlink', 1), ('reserved', 2), ('bidir', 3)))).setMaxAccess('readonly') if mibBuilder.loadTexts: tspecDirection.setStatus('current') if mibBuilder.loadTexts: tspecDirection.setDescription('Traffic direction, such as uplink direction, downlink direction.') tspec_ap_serial_number = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 4), octet_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: tspecApSerialNumber.setStatus('current') if mibBuilder.loadTexts: tspecApSerialNumber.setDescription('16-character serial number of the AccessPoint.') tspec_mu_ip_address = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 5), ip_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: tspecMuIPAddress.setStatus('current') if mibBuilder.loadTexts: tspecMuIPAddress.setDescription('Client IP Address.') tspec_bss_mac = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 6), mac_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: tspecBssMac.setStatus('current') if mibBuilder.loadTexts: tspecBssMac.setDescription('Access Point BSSID.') tspec_ssid = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 7), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: tspecSsid.setStatus('current') if mibBuilder.loadTexts: tspecSsid.setDescription('VNS SSID.') tspec_mdr = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 8), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: tspecMDR.setStatus('current') if mibBuilder.loadTexts: tspecMDR.setDescription('Mean Data Rate (bytes per second).') tspec_nms = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 9), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: tspecNMS.setStatus('current') if mibBuilder.loadTexts: tspecNMS.setDescription('Nominal MSDU size (bytes).') tspec_sba = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 10), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: tspecSBA.setStatus('current') if mibBuilder.loadTexts: tspecSBA.setDescription('Surplus Bandwidth Allowance.') tspec_dl_rate = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 11), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: tspecDlRate.setStatus('current') if mibBuilder.loadTexts: tspecDlRate.setDescription('Downlink Rate (bytes per second).') tspec_ul_rate = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 12), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: tspecUlRate.setStatus('current') if mibBuilder.loadTexts: tspecUlRate.setDescription('Uplink Rate (bytes per second).') tspec_dl_violations = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 13), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: tspecDlViolations.setStatus('current') if mibBuilder.loadTexts: tspecDlViolations.setDescription('Downlink Violations (bytes per second).') tspec_ul_violations = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 14), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: tspecUlViolations.setStatus('current') if mibBuilder.loadTexts: tspecUlViolations.setDescription('Uplink Violations (bytes per second).') tspec_protocol = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 3, 1, 15), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3, 4, 5))).clone(namedValues=named_values(('proto80211a', 1), ('proto80211g', 2), ('proto80211b', 3), ('proto80211an', 4), ('proto80211bgn', 5)))).setMaxAccess('readonly') if mibBuilder.loadTexts: tspecProtocol.setStatus('current') if mibBuilder.loadTexts: tspecProtocol.setDescription('802.11 radio protocol.') mu_acl_type = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 4), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('blacklist', 1), ('whitelist', 2))).clone(1)).setMaxAccess('readwrite') if mibBuilder.loadTexts: muACLType.setStatus('current') if mibBuilder.loadTexts: muACLType.setDescription('MUs can access EWC by sending association request and providing proper credentials. However, EWC allows creation of a master list of a blacklist or a whitelist group to control such access. There can exist only a blacklist or a whitelist (mutually exclusive) at any time. The list of MUs belonging to such a list is populated in muACLTable. The muACLTable content can be interpreted in conjunction with this field as follows: - blacklist(1): MUs listed in muACLTable cannot access EWC resources. - whitelist(2): Only MUs listed in muACLTable can access EWC resources.') mu_acl_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 5)) if mibBuilder.loadTexts: muACLTable.setStatus('current') if mibBuilder.loadTexts: muACLTable.setDescription("Semantics of this list is directly related to muACLType. Access Control List(ACL) is list of MUs and their access rights. An MU can either belong to 'Blacklist', in that case its association request is denied, or it can belong to 'Whitelist', in that case it is allowed to associate to EWC provided having proper credentials.") mu_acl_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 5, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'muACLMACAddress')) if mibBuilder.loadTexts: muACLEntry.setStatus('current') if mibBuilder.loadTexts: muACLEntry.setDescription('An entry about an MU and its ACL.') mu_aclmac_address = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 5, 1, 1), mac_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: muACLMACAddress.setStatus('current') if mibBuilder.loadTexts: muACLMACAddress.setDescription('MAC address of MU.') mu_acl_row_status = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 5, 1, 2), row_status()).setMaxAccess('readcreate') if mibBuilder.loadTexts: muACLRowStatus.setStatus('current') if mibBuilder.loadTexts: muACLRowStatus.setDescription('An MU can either be added or removed to this list, therefore, allowed set values for this field are: createAndGo, destroy.') mu_access_list_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 6)) if mibBuilder.loadTexts: muAccessListTable.setStatus('current') if mibBuilder.loadTexts: muAccessListTable.setDescription("Semantics of this list is directly related to muACLType. Access List Control(ACL) list of MUs and their access rights. An MU can either belong to 'Blacklist', in that case its association request is denied, or it can belong to 'Whitelist', in that case it is allowed to associate to EWC provided having proper credentials.") mu_access_list_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 6, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'muAccessListMACAddress')) if mibBuilder.loadTexts: muAccessListEntry.setStatus('current') if mibBuilder.loadTexts: muAccessListEntry.setDescription('An entry about about an MU and its ACL.') mu_access_list_mac_address = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 6, 1, 1), mac_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: muAccessListMACAddress.setStatus('current') if mibBuilder.loadTexts: muAccessListMACAddress.setDescription('MAC address of MU.') mu_access_list_bitmask_length = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 6, 1, 2), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(24, 36, 48))).clone(namedValues=named_values(('bits24', 24), ('bits36', 36), ('bits48', 48)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: muAccessListBitmaskLength.setStatus('current') if mibBuilder.loadTexts: muAccessListBitmaskLength.setDescription('Length of bitmask associated to the MAC address in the entry.') mu_access_list_row_status = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 6, 6, 1, 3), row_status()).setMaxAccess('readcreate') if mibBuilder.loadTexts: muAccessListRowStatus.setStatus('current') if mibBuilder.loadTexts: muAccessListRowStatus.setDescription('An MU can either be added or removed to this list, therefore, allowed set values for this field are: createAndGo, destroy.') associations = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 7)) assoc_count = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 7, 1), integer32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: assocCount.setStatus('current') if mibBuilder.loadTexts: assocCount.setDescription('Total number of current client associations to the access point.') assoc_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 7, 2)) if mibBuilder.loadTexts: assocTable.setStatus('current') if mibBuilder.loadTexts: assocTable.setDescription('Table of information about clients associated with the access point.') assoc_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 7, 2, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'assocMUMacAddress'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'apIndex'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'assocStartSysUpTime')) if mibBuilder.loadTexts: assocEntry.setStatus('current') if mibBuilder.loadTexts: assocEntry.setDescription('Information for a single client in the association table.') assoc_mu_mac_address = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 7, 2, 1, 1), mac_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: assocMUMacAddress.setStatus('current') if mibBuilder.loadTexts: assocMUMacAddress.setDescription('MAC address of the client.') assoc_start_sys_up_time = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 7, 2, 1, 2), time_ticks()).setMaxAccess('readonly') if mibBuilder.loadTexts: assocStartSysUpTime.setStatus('current') if mibBuilder.loadTexts: assocStartSysUpTime.setDescription('The system uptime that client became associated with the access point.') assoc_tx_packets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 7, 2, 1, 3), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: assocTxPackets.setStatus('current') if mibBuilder.loadTexts: assocTxPackets.setDescription('Nubmer of tx packets to the client.') assoc_rx_packets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 7, 2, 1, 4), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: assocRxPackets.setStatus('current') if mibBuilder.loadTexts: assocRxPackets.setDescription('Number of received packets from the client.') assoc_tx_octets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 7, 2, 1, 5), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: assocTxOctets.setStatus('current') if mibBuilder.loadTexts: assocTxOctets.setDescription('Number of octets sent to the client.') assoc_rx_octets = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 7, 2, 1, 6), counter64()).setMaxAccess('readonly') if mibBuilder.loadTexts: assocRxOctets.setStatus('current') if mibBuilder.loadTexts: assocRxOctets.setDescription('Number of octets received from the client.') assoc_duration = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 7, 2, 1, 7), integer32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: assocDuration.setStatus('current') if mibBuilder.loadTexts: assocDuration.setDescription('Length of time since last association.') assoc_vns_if_index = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 7, 2, 1, 8), interface_index()).setMaxAccess('readonly') if mibBuilder.loadTexts: assocVnsIfIndex.setStatus('current') if mibBuilder.loadTexts: assocVnsIfIndex.setDescription('Index of VNS to which the MU is associated with.') protocols = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 8)) wassp = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 8, 1)) log_notifications = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 9)) log_event_severity_threshold = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 9, 1), log_event_severity()).setMaxAccess('readwrite') if mibBuilder.loadTexts: logEventSeverityThreshold.setStatus('current') if mibBuilder.loadTexts: logEventSeverityThreshold.setDescription("Specifies the minimum level at which the SNMP agent will send notifications for log events. I.e., setting this value to 'major' will send notifcations for critical and major log events. Setting the threshold to minor will trap critical, major, and minor events.") log_event_severity = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 9, 3), log_event_severity()).setMaxAccess('readonly') if mibBuilder.loadTexts: logEventSeverity.setStatus('current') if mibBuilder.loadTexts: logEventSeverity.setDescription('Contains the severity of the most recently trapped hiPathWirelessLogAlarm notification.') log_event_component = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 9, 4), octet_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: logEventComponent.setStatus('current') if mibBuilder.loadTexts: logEventComponent.setDescription('Contains the component which sent the most recently trapped hiPathWirelessLogAlarm notification.') log_event_description = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 9, 5), octet_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: logEventDescription.setStatus('current') if mibBuilder.loadTexts: logEventDescription.setDescription('Contains the description of the most recently trapped hiPathWirelessLogAlarm.') hi_path_wireless_log_alarm = notification_type((1, 3, 6, 1, 4, 1, 4329, 15, 3, 9, 6)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'logEventSeverity'), ('HIPATH-WIRELESS-HWC-MIB', 'logEventComponent'), ('HIPATH-WIRELESS-HWC-MIB', 'logEventDescription')) if mibBuilder.loadTexts: hiPathWirelessLogAlarm.setStatus('current') if mibBuilder.loadTexts: hiPathWirelessLogAlarm.setDescription('Components of an alarm.') sites = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10)) site_max_entries = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 1), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: siteMaxEntries.setStatus('current') if mibBuilder.loadTexts: siteMaxEntries.setDescription('The maximum number of entries allowed in the siteTable. This value is platform dependent.') site_num_entries = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 2), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: siteNumEntries.setStatus('current') if mibBuilder.loadTexts: siteNumEntries.setDescription('The current number of entries in the siteTable.') site_table_next_available_index = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 3), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: siteTableNextAvailableIndex.setStatus('current') if mibBuilder.loadTexts: siteTableNextAvailableIndex.setDescription('This object indicates the numerically lowest available index within this entity, which may be used for the value of siteID in the creation of a new entry in the siteTable. An index is considered available if the index value falls within the range of 1 to siteMaxEntries value and is not being used to index an existing entry in the siteTable contained within this entity. This value should only be considered a guideline for management creation of siteEntries, there is no requirement on management to create entries based upon this index value.') site_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4)) if mibBuilder.loadTexts: siteTable.setStatus('current') if mibBuilder.loadTexts: siteTable.setDescription('A site is a logical entity that is constituted by collection of APs, CoS rules, policies, Radius server, WLAN, etc. A site is identified by a unique name. ') site_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'siteID')) if mibBuilder.loadTexts: siteEntry.setStatus('current') if mibBuilder.loadTexts: siteEntry.setDescription('Definition of a site.') site_id = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 1), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: siteID.setStatus('current') if mibBuilder.loadTexts: siteID.setDescription('An unique ID, identifying the site in the context of the controller. The site ID can be an integer value from 1 to the maximum number of APs supported by the EWC.') site_row_status = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 2), row_status()).setMaxAccess('readcreate') if mibBuilder.loadTexts: siteRowStatus.setStatus('current') if mibBuilder.loadTexts: siteRowStatus.setDescription('Row status for the entry.') site_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 3), display_string().subtype(subtypeSpec=value_size_constraint(1, 64))).setMaxAccess('readcreate') if mibBuilder.loadTexts: siteName.setStatus('current') if mibBuilder.loadTexts: siteName.setDescription('Textual description to identify the site in the context of the controller.') site_local_radius_authentication = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 4), truth_value()).setMaxAccess('readcreate') if mibBuilder.loadTexts: siteLocalRadiusAuthentication.setStatus('current') if mibBuilder.loadTexts: siteLocalRadiusAuthentication.setDescription('If this value is set to true, then the RADIUS client is on APs, otherwise the RADIUS client is on controller.') site_default_dns_server = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 5), display_string().subtype(subtypeSpec=value_size_constraint(0, 64))).setMaxAccess('readcreate') if mibBuilder.loadTexts: siteDefaultDNSServer.setStatus('current') if mibBuilder.loadTexts: siteDefaultDNSServer.setDescription('If the APs associated to the site uses DHCP, and DHCP server does not assign DNS server, then this entry will be used for that purpose. Otherwise, if AP is configured with static IP address, then this entry will be used for that purpose.') site_enable_secure_tunnel = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 6), truth_value()).setMaxAccess('readcreate') if mibBuilder.loadTexts: siteEnableSecureTunnel.setStatus('current') if mibBuilder.loadTexts: siteEnableSecureTunnel.setDescription('If set to true secure communication key sent to APs to be used to encrypt the traffic between APs within the site and the traffic between controller and APs. However, the encryption itself does not take place unless siteEncryptCommAPtoController and/or siteEncryptCommBetweenAPs set to true.') site_encrypt_comm_a_pto_controller = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 7), truth_value()).setMaxAccess('readcreate') if mibBuilder.loadTexts: siteEncryptCommAPtoController.setStatus('current') if mibBuilder.loadTexts: siteEncryptCommAPtoController.setDescription('If set to true, communication between APs within the site and the controller are encrypted using defined encyption. For details about encryption type, please refer to user manual.') site_encrypt_comm_between_a_ps = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 8), truth_value()).setMaxAccess('readcreate') if mibBuilder.loadTexts: siteEncryptCommBetweenAPs.setStatus('current') if mibBuilder.loadTexts: siteEncryptCommBetweenAPs.setDescription('If set to true, communication between APs within the site are encrypted using defined encyption. For details about encryption type, please refer to user manual.') site_band_preference_enable = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 9), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disable', 0), ('enable', 1)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: siteBandPreferenceEnable.setStatus('current') if mibBuilder.loadTexts: siteBandPreferenceEnable.setDescription('Enabling/disabling band preference for the site and associated APs. By enabling band preference 11a-capable clients can be moved to 11a radio and relieve the congestion on the 11g radio. Band preference provides radio load balancing between 11g and 11a radios.') site_load_control_enable_r1 = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 10), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disable', 0), ('enable', 1)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: siteLoadControlEnableR1.setStatus('current') if mibBuilder.loadTexts: siteLoadControlEnableR1.setDescription('Enabling/disabling load control for the site for this radio. Load control manages the number of clients on the Radio #1 by disallowing additional clients on the radio above the configured radio limit.') site_load_control_enable_r2 = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 11), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disable', 0), ('enable', 1)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: siteLoadControlEnableR2.setStatus('current') if mibBuilder.loadTexts: siteLoadControlEnableR2.setDescription('Enabling/disabling load control for the site for this radio. Load control manages the number of clients on the Radio #2 by disallowing additional clients on the radio above the configured radio limit.') site_max_client_r1 = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 12), unsigned32().subtype(subtypeSpec=value_range_constraint(0, 99))).setMaxAccess('readcreate') if mibBuilder.loadTexts: siteMaxClientR1.setStatus('current') if mibBuilder.loadTexts: siteMaxClientR1.setDescription('Maximum number of clients that are allowed to be associated to this radio (radio #1). If the Load Control is not enabled then the maximum for this radio uses default value.') site_max_client_r2 = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 13), unsigned32().subtype(subtypeSpec=value_range_constraint(0, 99))).setMaxAccess('readcreate') if mibBuilder.loadTexts: siteMaxClientR2.setStatus('current') if mibBuilder.loadTexts: siteMaxClientR2.setDescription('Maximum number of clients that are allowed to be associated to this radio (radio #2). If the Load Control is not enabled then the maximum for this radio uses default value.') site_strict_limit_enable_r1 = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 14), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disable', 0), ('enable', 1)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: siteStrictLimitEnableR1.setStatus('current') if mibBuilder.loadTexts: siteStrictLimitEnableR1.setDescription('Enabling/disabling strict limit of load control for this radio that is assigned to the site. Eanbleing strict limit enforces configured client limit for the radio (radio #1) in any circumstances. Otherwise if this field is disabled then the restriction may not be enforced in all circumstances.') site_strict_limit_enable_r2 = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 15), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disable', 0), ('enable', 1)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: siteStrictLimitEnableR2.setStatus('current') if mibBuilder.loadTexts: siteStrictLimitEnableR2.setDescription('Enabling/disabling strict limit of load control for this radio that is assigned to the site. Eanbleing strict limit enforces configured client limit for the radio (radio #2) in any circumstances. Otherwise if this field is disabled then the restriction may not be enforced in all circumstances.') site_replace_stn_i_dwith_site_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 4, 1, 16), truth_value()).setMaxAccess('readcreate') if mibBuilder.loadTexts: siteReplaceStnIDwithSiteName.setStatus('current') if mibBuilder.loadTexts: siteReplaceStnIDwithSiteName.setDescription('If this value is set to true, then the called station ID will be replaced with the site name.') site_policy_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 5)) if mibBuilder.loadTexts: sitePolicyTable.setStatus('current') if mibBuilder.loadTexts: sitePolicyTable.setDescription('Each site can have zero or more policies assigned to it. All policies associated to a site are pushed to the all APs belonging to the site. This table defines the assignment of various policies to various sites.') site_policy_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 5, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'siteID'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'sitePolicyID')) if mibBuilder.loadTexts: sitePolicyEntry.setStatus('current') if mibBuilder.loadTexts: sitePolicyEntry.setDescription('An entry defining assignment of a policy, identified by sitePolicyID, to a site, identified by siteID.') site_policy_id = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 5, 1, 1), unsigned32()) if mibBuilder.loadTexts: sitePolicyID.setStatus('current') if mibBuilder.loadTexts: sitePolicyID.setDescription('The policy index, as defined ENTERASYS-POLICY-PROFILE-MIB::etsysPolicyProfileIndex.') site_policy_member = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 5, 1, 2), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('notMember', 0), ('isMember', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: sitePolicyMember.setStatus('current') if mibBuilder.loadTexts: sitePolicyMember.setDescription('Indicates whether the policy associated with this row is a member of the zone identified by zoneID.') site_cos_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 6)) if mibBuilder.loadTexts: siteCosTable.setStatus('current') if mibBuilder.loadTexts: siteCosTable.setDescription('Each site can have zero or more CoS assigned to it. All CoS associated to a site are pushed to the all APs belonging to the site. This table defines the assignment of various CoS to various sites.') site_cos_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 6, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'siteID'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'siteCoSID')) if mibBuilder.loadTexts: siteCosEntry.setStatus('current') if mibBuilder.loadTexts: siteCosEntry.setDescription('An entry defining assignment of a CoS, identified by siteCoSID, to a site, identified by siteID.') site_co_sid = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 6, 1, 1), unsigned32()) if mibBuilder.loadTexts: siteCoSID.setStatus('current') if mibBuilder.loadTexts: siteCoSID.setDescription('The CoS index, as defined in ENTERASYS-POLICY-PROFILE-MIB::etsysCosIndex.') site_co_s_member = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 6, 1, 2), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('notMember', 0), ('isMember', 1)))).setMaxAccess('readonly') if mibBuilder.loadTexts: siteCoSMember.setStatus('current') if mibBuilder.loadTexts: siteCoSMember.setDescription('Indicates whether the CoS associated with this row is a member of the site identified by siteID.') site_ap_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 7)) if mibBuilder.loadTexts: siteAPTable.setStatus('current') if mibBuilder.loadTexts: siteAPTable.setDescription('A site can have zero or more Access Points(AP) assigned to it. This table defines the assignment of various APs to various sites.') site_ap_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 7, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'siteID'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'apIndex')) if mibBuilder.loadTexts: siteAPEntry.setStatus('current') if mibBuilder.loadTexts: siteAPEntry.setDescription('An entry defining assignment of an AP, identified by apIndex, to a site, identified by siteID.') site_ap_member = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 7, 1, 1), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('notMember', 0), ('isMember', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: siteAPMember.setStatus('current') if mibBuilder.loadTexts: siteAPMember.setDescription('Indicates whether the AP associated with this row is a member of the site identified by siteID.') site_wlan_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 8)) if mibBuilder.loadTexts: siteWlanTable.setStatus('current') if mibBuilder.loadTexts: siteWlanTable.setDescription('A site can have zero or more WLAN assigned to it. All WLANs that are associated with a site are pushed to the all APs belonging to the site. This table defines the assignment of various WLANs to various sites.') site_wlan_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 8, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'siteID'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'wlanID'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'siteWlanApRadioIndex')) if mibBuilder.loadTexts: siteWlanEntry.setStatus('current') if mibBuilder.loadTexts: siteWlanEntry.setDescription('An entry defining assignment of a WLAN identified by siteWlanID, to a site, identified by siteID.') site_wlan_ap_radio_index = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 8, 1, 1), integer32().subtype(subtypeSpec=value_range_constraint(1, 2))) if mibBuilder.loadTexts: siteWlanApRadioIndex.setStatus('current') if mibBuilder.loadTexts: siteWlanApRadioIndex.setDescription('Description.') site_wlan_ap_radio_assigned = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 10, 8, 1, 2), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('notAssigned', 0), ('assigned', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: siteWlanApRadioAssigned.setStatus('current') if mibBuilder.loadTexts: siteWlanApRadioAssigned.setDescription('Description.') wids_wips = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11)) mitigator_analysis_engine = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 1), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disable', 0), ('enable', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: mitigatorAnalysisEngine.setStatus('current') if mibBuilder.loadTexts: mitigatorAnalysisEngine.setDescription('Mitigator analysis engine can be enabled/disabled using this variable. All mitigator related objects, objects defined in widsWips subtree, can only be accessed using SNMPv3 provided this variable is set to enable(1) on behalf of users with privacy.') scan_group_max_entries = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 2), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: scanGroupMaxEntries.setStatus('current') if mibBuilder.loadTexts: scanGroupMaxEntries.setDescription('Maximum number of scan groups that can be created on the device.') scan_groups_current_entries = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 3), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: scanGroupsCurrentEntries.setStatus('current') if mibBuilder.loadTexts: scanGroupsCurrentEntries.setDescription('Number of scan groups currently have been created on the device.') active_threats_counts = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 4), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: activeThreatsCounts.setStatus('current') if mibBuilder.loadTexts: activeThreatsCounts.setDescription('Number of currently active threats that have been detected.') friendly_ap_counts = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 5), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: friendlyAPCounts.setStatus('current') if mibBuilder.loadTexts: friendlyAPCounts.setDescription('Number of friendly access points that have been discovered at this point.') uncategorized_ap_counts = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 6), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: uncategorizedAPCounts.setStatus('current') if mibBuilder.loadTexts: uncategorizedAPCounts.setDescription('Number of uncategorized access points that have been discovered. This value refers to current number not the historical value.') wids_wips_engine_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 11)) if mibBuilder.loadTexts: widsWipsEngineTable.setStatus('current') if mibBuilder.loadTexts: widsWipsEngineTable.setDescription('Table of Mitigators defined on set of controllers each identified by widsWipsEngineControllerIPAddress. ') wids_wips_engine_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 11, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'widsWipsEngineControllerIPAddress')) if mibBuilder.loadTexts: widsWipsEngineEntry.setStatus('current') if mibBuilder.loadTexts: widsWipsEngineEntry.setDescription('One entry in this table identifying a mitigator engine in a defined controller identified by IP address, widsWipsEngineControllerIPAddress.') wids_wips_engine_row_status = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 11, 1, 1), row_status()).setMaxAccess('readcreate') if mibBuilder.loadTexts: widsWipsEngineRowStatus.setStatus('current') if mibBuilder.loadTexts: widsWipsEngineRowStatus.setDescription('RowStatus for creation/deletion of mitigator engine row.') wids_wips_engine_controller_ip_address = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 11, 1, 2), ip_address()).setMaxAccess('readcreate') if mibBuilder.loadTexts: widsWipsEngineControllerIPAddress.setStatus('current') if mibBuilder.loadTexts: widsWipsEngineControllerIPAddress.setDescription('Ip address of the controller that the defined mitigator in this row will run on.') wids_wips_engine_poll_interval = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 11, 1, 3), integer32().subtype(subtypeSpec=value_range_constraint(3, 60))).setMaxAccess('readcreate') if mibBuilder.loadTexts: widsWipsEnginePollInterval.setStatus('current') if mibBuilder.loadTexts: widsWipsEnginePollInterval.setDescription('Poll interval in seconds between successive keep alive messages between this controller and the mitigator engine to monitor status of mitigator engine. ') wids_wips_engine_poll_retry = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 11, 1, 4), integer32().subtype(subtypeSpec=value_range_constraint(0, 20))).setMaxAccess('readcreate') if mibBuilder.loadTexts: widsWipsEnginePollRetry.setStatus('current') if mibBuilder.loadTexts: widsWipsEnginePollRetry.setDescription('Number of consecutive retries of failed contact to a mitigator agent before declaring mitigator engine dead. ') in_service_scan_group_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 12)) if mibBuilder.loadTexts: inServiceScanGroupTable.setStatus('current') if mibBuilder.loadTexts: inServiceScanGroupTable.setDescription('In service scan group enables the subsystem simultaneously scan for threats and performs wireless bridging based on 37xx-based APs. The threats are discovered and identified in the deployment environment and then classified for further actions. ') in_service_scan_group_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 12, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'scanGroupProfileID')) if mibBuilder.loadTexts: inServiceScanGroupEntry.setStatus('current') if mibBuilder.loadTexts: inServiceScanGroupEntry.setDescription('An entry in this table that defines attributes of a in-service scan group.') scan_group_profile_id = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 12, 1, 1), unsigned32()) if mibBuilder.loadTexts: scanGroupProfileID.setStatus('current') if mibBuilder.loadTexts: scanGroupProfileID.setDescription('A internally unique identifier for a scan group. Each scan group is indexed by this value.') in_srv_scan_grp_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 12, 1, 2), display_string().subtype(subtypeSpec=value_size_constraint(1, 255))).setMaxAccess('readcreate') if mibBuilder.loadTexts: inSrvScanGrpName.setStatus('current') if mibBuilder.loadTexts: inSrvScanGrpName.setDescription('Textual description identifying the scan group.') in_srv_scan_grp_security_threats = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 12, 1, 3), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disable', 0), ('enable', 1)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: inSrvScanGrpSecurityThreats.setStatus('current') if mibBuilder.loadTexts: inSrvScanGrpSecurityThreats.setDescription('Enable/disable security engine to scan for threats.') in_srv_scan_grp_max_concurrent_attacks_per_ap = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 12, 1, 4), integer32().subtype(subtypeSpec=value_range_constraint(0, 6))).setMaxAccess('readcreate') if mibBuilder.loadTexts: inSrvScanGrpMaxConcurrentAttacksPerAP.setStatus('current') if mibBuilder.loadTexts: inSrvScanGrpMaxConcurrentAttacksPerAP.setDescription('Max number of concurrent attacks per AP') in_srv_scan_grp_counter_measures_type = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 12, 1, 5), bits().clone(namedValues=named_values(('externalHoneypotAPs', 0), ('roamingToFriendlyAPs', 1), ('internalHoneypotAPs', 2), ('spoofedAPs', 3), ('dropFloodAttack', 4), ('removeDosAttack', 5), ('adHocModeDevice', 6), ('rogueAP', 7)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: inSrvScanGrpCounterMeasuresType.setStatus('current') if mibBuilder.loadTexts: inSrvScanGrpCounterMeasuresType.setDescription('bit 0: Setting this bit prevents authorized stations from roaming to external honeypot APs. bit 1: Setting this bit prevents authorized stations from roaming to friendly APs. bit 2: Setting this bit prevents any station from using an internal honeypot AP. bit 3: Setting this bit prevents any station from using a spoofed AP. bit 4: Setting this bit drops frames in a controlled fashion during a flood attack. bit 5: Setting this bit removes network access from clients originating DoS attacks. bit 6: Setting this bit prevents any station from using an ad hoc mode device. bit 7: Setting this bit prevents any station from using a rogue AP.') in_srv_scan_grp_scan2400_m_hz_selection = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 12, 1, 6), bits().clone(namedValues=named_values(('frequency2412MHz', 0), ('frequency2417MHz', 1), ('frequency2422MHz', 2), ('frequency2427MHz', 3), ('frequency2432MHz', 4), ('frequency2437MHz', 5), ('frequency2442MHz', 6), ('frequency2447MHz', 7), ('frequency2452MHz', 8), ('frequency2457MHz', 9), ('frequency2462MHz', 10), ('frequency2467MHz', 11), ('frequency2472MHz', 12), ('frequency2484MHz', 13)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: inSrvScanGrpScan2400MHzSelection.setStatus('current') if mibBuilder.loadTexts: inSrvScanGrpScan2400MHzSelection.setDescription('bit 0: by setting this bit scanning is performed on 2412 MHz frequency channel bit 1: by setting this bit scanning is performed on 2417 MHz frequency channel bit 2: by setting this bit scanning is performed on 2422 MHz frequency channel bit 3: by setting this bit scanning is performed on 2427 MHz frequency channel bit 4: by setting this bit scanning is performed on 2432 MHz frequency channel bit 5: by setting this bit scanning is performed on 2437 MHz frequency channel bit 6: by setting this bit scanning is performed on 2442 MHz frequency channel bit 7: by setting this bit scanning is performed on 2447 MHz frequency channel bit 8: by setting this bit scanning is performed on 2452 MHz frequency channel bit 9: by setting this bit scanning is performed on 2457 MHz frequency channel bit 10: by setting this bit scanning is performed on 2462 MHz frequency channel bit 11: by setting this bit scanning is performed on 2467 MHz frequency channel bit 12: by setting this bit scanning is performed on 2472 MHz frequency channel bit 13: by setting this bit scanning is performed on 2484 MHz frequency channel') in_srv_scan_grp_scan5_g_hz_selection = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 12, 1, 7), bits().clone(namedValues=named_values(('frequency5040MHz', 0), ('frequency5060MHz', 1), ('frequency5080MHz', 2), ('frequency5180MHz', 3), ('frequency5200MHz', 4), ('frequency5220MHz', 5), ('frequency5240MHz', 6), ('frequency5260MHz', 7), ('frequency5280MHz', 8), ('frequency5300MHz', 9), ('frequency5320MHz', 10), ('frequency5500MHz', 11), ('frequency5520MHz', 12), ('frequency5540MHz', 13), ('frequency5560MHz', 14), ('frequency5580MHz', 15), ('frequency5600MHz', 16), ('frequency5620MHz', 17), ('frequency5640MHz', 18), ('frequency5660MHz', 19), ('frequency5680MHz', 20), ('frequency5700MHz', 21), ('frequency5745MHz', 22), ('frequency5765MHz', 23), ('frequency5785MHz', 24), ('frequency5805MHz', 25), ('frequency5825MHz', 26), ('frequency4920MHz', 27), ('frequency4940MHz', 28), ('frequency4960MHz', 29), ('frequency4980MHz', 30)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: inSrvScanGrpScan5GHzSelection.setStatus('current') if mibBuilder.loadTexts: inSrvScanGrpScan5GHzSelection.setDescription('bit 0: by setting this bit scanning is performed on 5040 MHz frequency channel bit 1: by setting this bit scanning is performed on 5060 MHz frequency channel bit 2: by setting this bit scanning is performed on 5080 MHz frequency channel bit 3: by setting this bit scanning is performed on 5180 MHz frequency channel bit 4: by setting this bit scanning is performed on 5200 MHz frequency channel bit 5: by setting this bit scanning is performed on 5220 MHz frequency channel bit 6: by setting this bit scanning is performed on 5240 MHz frequency channel bit 7: by setting this bit scanning is performed on 5260 MHz frequency channel bit 8: by setting this bit scanning is performed on 5280 MHz frequency channel bit 9: by setting this bit scanning is performed on 5300 MHz frequency channel bit 10: by setting this bit scanning is performed on 5320 MHz frequency channel bit 11: by setting this bit scanning is performed on 5500 MHz frequency channel bit 12: by setting this bit scanning is performed on 5520 MHz frequency channel bit 13: by setting this bit scanning is performed on 5540 MHz frequency channel bit 14: by setting this bit scanning is performed on 5560 MHz frequency channel bit 15: by setting this bit scanning is performed on 5580 MHz frequency channel bit 16: by setting this bit scanning is performed on 5600 MHz frequency channel bit 17: by setting this bit scanning is performed on 5620 MHz frequency channel bit 18: by setting this bit scanning is performed on 5640 MHz frequency channel bit 19: by setting this bit scanning is performed on 5660 MHz frequency channel bit 20: by setting this bit scanning is performed on 5680 MHz frequency channel bit 21: by setting this bit scanning is performed on 5700 MHz frequency channel bit 22: by setting this bit scanning is performed on 5745 MHz frequency channel bit 23: by setting this bit scanning is performed on 5765 MHz frequency channel bit 24: by setting this bit scanning is performed on 5785 MHz frequency channel bit 25: by setting this bit scanning is performed on 5805 MHz frequency channel bit 26: by setting this bit scanning is performed on 5825 MHz frequency channel bit 27: by setting this bit scanning is performed on 4920 MHz frequency channel bit 28: by setting this bit scanning is performed on 4940 MHz frequency channel bit 29: by setting this bit scanning is performed on 4960 MHz frequency channel bit 30: by setting this bit scanning is performed on 4980 MHz frequency channel') in_srv_scan_grpblock_ad_hoc_clients_period = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 12, 1, 8), integer32()).setMaxAccess('readcreate') if mibBuilder.loadTexts: inSrvScanGrpblockAdHocClientsPeriod.setStatus('current') if mibBuilder.loadTexts: inSrvScanGrpblockAdHocClientsPeriod.setDescription('Number of seconds removing network access to the clients that are in ad hoc mode.') in_srv_scan_grp_classify_source_if = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 12, 1, 9), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disable', 0), ('enable', 1)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: inSrvScanGrpClassifySourceIF.setStatus('current') if mibBuilder.loadTexts: inSrvScanGrpClassifySourceIF.setDescription('This variable allows to enable/disable classify sources of interference') in_srv_scan_grp_row_status = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 12, 1, 10), row_status()).setMaxAccess('readcreate') if mibBuilder.loadTexts: inSrvScanGrpRowStatus.setStatus('current') if mibBuilder.loadTexts: inSrvScanGrpRowStatus.setDescription('RowStatus field for creation/deletion or changing row status.') in_srv_scan_grp_detect_rogue_ap = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 12, 1, 11), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disable', 0), ('enable', 1)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: inSrvScanGrpDetectRogueAP.setStatus('current') if mibBuilder.loadTexts: inSrvScanGrpDetectRogueAP.setDescription('This enables/disables rogue AP detection.') in_srv_scan_grp_listening_port = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 12, 1, 12), integer32()).setMaxAccess('readwrite') if mibBuilder.loadTexts: inSrvScanGrpListeningPort.setStatus('current') if mibBuilder.loadTexts: inSrvScanGrpListeningPort.setDescription('This OID represents the UDP port number that APs are to listen on while performing rogue AP detection. It has meaning only when inSrvScanGrpDetectRogueAP is enabled.') out_of_service_scan_group_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 13)) if mibBuilder.loadTexts: outOfServiceScanGroupTable.setStatus('current') if mibBuilder.loadTexts: outOfServiceScanGroupTable.setDescription('Out of service scan group is used to collect and classify various wireless identifiers that are discovered in the deployment environment. Legacy APs (26xx-based, 36xx-based) can participate in this subsystem if they are configured for out-of-service scanning. The new APs, based on 37xx architecture, can also participate in this subsystem.') out_of_service_scan_group_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 13, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'scanGroupProfileID')) if mibBuilder.loadTexts: outOfServiceScanGroupEntry.setStatus('current') if mibBuilder.loadTexts: outOfServiceScanGroupEntry.setDescription('An entry in this table that defines attributes of a out-of-service scan group.') out_of_srv_scan_grp_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 13, 1, 1), display_string().subtype(subtypeSpec=value_size_constraint(1, 255))).setMaxAccess('readcreate') if mibBuilder.loadTexts: outOfSrvScanGrpName.setStatus('current') if mibBuilder.loadTexts: outOfSrvScanGrpName.setDescription('Human readable textual description identifying scan group.') out_of_srv_scan_grp_radio = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 13, 1, 2), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3))).clone(namedValues=named_values(('radio1', 1), ('radio2', 2), ('both', 3)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: outOfSrvScanGrpRadio.setStatus('current') if mibBuilder.loadTexts: outOfSrvScanGrpRadio.setDescription('Radio selection for the scan group. Selected radio will be used in sacn group.') out_of_srv_scan_grp_channel_list = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 13, 1, 3), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 999))).clone(namedValues=named_values(('allChannel', 0), ('currentChannel', 999)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: outOfSrvScanGrpChannelList.setStatus('current') if mibBuilder.loadTexts: outOfSrvScanGrpChannelList.setDescription('Identifying the channel(s) which will be used for the defined scan group.') out_of_srv_scan_grp_scan_type = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 13, 1, 4), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('active', 0), ('passive', 1)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: outOfSrvScanGrpScanType.setStatus('current') if mibBuilder.loadTexts: outOfSrvScanGrpScanType.setDescription('This field allows to select the type of scanning, active/passive, this scan group will be executing.') out_of_srv_scan_grp_channel_dwell_time = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 13, 1, 5), integer32().subtype(subtypeSpec=value_range_constraint(200, 500))).setMaxAccess('readcreate') if mibBuilder.loadTexts: outOfSrvScanGrpChannelDwellTime.setStatus('current') if mibBuilder.loadTexts: outOfSrvScanGrpChannelDwellTime.setDescription('Dwell time in mili-second for performing scanning.') out_of_srv_scan_grp_scan_time_interval = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 13, 1, 6), integer32().subtype(subtypeSpec=value_range_constraint(10, 120))).setMaxAccess('readcreate') if mibBuilder.loadTexts: outOfSrvScanGrpScanTimeInterval.setStatus('current') if mibBuilder.loadTexts: outOfSrvScanGrpScanTimeInterval.setDescription('Time interval between two sucssive scanning performed for this scan group.') out_of_srv_scan_grp_security_scan = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 13, 1, 7), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disable', 0), ('enable', 1)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: outOfSrvScanGrpSecurityScan.setStatus('current') if mibBuilder.loadTexts: outOfSrvScanGrpSecurityScan.setDescription('This field allows to enable/disable security Scan.') out_of_srv_scan_grp_scan_activity = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 13, 1, 8), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('stop', 0), ('start', 1)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: outOfSrvScanGrpScanActivity.setStatus('current') if mibBuilder.loadTexts: outOfSrvScanGrpScanActivity.setDescription('Scaning can be started or stopped using this field.') out_of_srv_scan_grp_scan_row_status = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 13, 1, 9), integer32()).setMaxAccess('readcreate') if mibBuilder.loadTexts: outOfSrvScanGrpScanRowStatus.setStatus('current') if mibBuilder.loadTexts: outOfSrvScanGrpScanRowStatus.setDescription('RowStatus field for the entry.') scan_group_ap_assignment_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 14)) if mibBuilder.loadTexts: scanGroupAPAssignmentTable.setStatus('current') if mibBuilder.loadTexts: scanGroupAPAssignmentTable.setDescription('The list of APs that have been assigned to a particular scan group, which could include in-service and out-of-service scanning groups.') scan_group_ap_assignment_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 14, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'scanGroupProfileID'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'scanGroupAPAssignApSerial'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'widsWipsEngineControllerIPAddress')) if mibBuilder.loadTexts: scanGroupAPAssignmentEntry.setStatus('current') if mibBuilder.loadTexts: scanGroupAPAssignmentEntry.setDescription('An entry in this table defining an AP assignment to a group, identified by scanGroupProfileID.') scan_group_ap_assign_ap_serial = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 14, 1, 1), octet_string().subtype(subtypeSpec=value_size_constraint(16, 16)).setFixedLength(16)).setMaxAccess('readonly') if mibBuilder.loadTexts: scanGroupAPAssignApSerial.setStatus('current') if mibBuilder.loadTexts: scanGroupAPAssignApSerial.setDescription('Unique string of characters, a 16-character long, serial number of an access point.') scan_group_ap_assign_group_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 14, 1, 2), display_string().subtype(subtypeSpec=value_size_constraint(1, 255))).setMaxAccess('readonly') if mibBuilder.loadTexts: scanGroupAPAssignGroupName.setStatus('current') if mibBuilder.loadTexts: scanGroupAPAssignGroupName.setDescription('Human readable textual description identifying scan group.') scan_group_ap_assign_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 14, 1, 3), display_string().subtype(subtypeSpec=value_size_constraint(1, 255))).setMaxAccess('readonly') if mibBuilder.loadTexts: scanGroupAPAssignName.setStatus('current') if mibBuilder.loadTexts: scanGroupAPAssignName.setDescription('Access Point (AP) name associated to this scan group.') scan_group_ap_assign_radio1 = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 14, 1, 4), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3, 4, 8, 16, 18, 19, 20, 32, 34, 35, 36))).clone(namedValues=named_values(('off', 0), ('b', 1), ('g', 2), ('bg', 3), ('a', 4), ('j', 8), ('n', 16), ('gn', 18), ('bgn', 19), ('an', 20), ('nStrict', 32), ('gnStrict', 34), ('bgnStrict', 35), ('anStrict', 36)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: scanGroupAPAssignRadio1.setStatus('current') if mibBuilder.loadTexts: scanGroupAPAssignRadio1.setDescription('This field allows the radio #1 of the AP to be turned on/off. this field has meaning only the AP assigned to legacy (outOfScan) scan profile') scan_group_ap_assign_radio2 = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 14, 1, 5), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3, 4, 8, 16, 18, 19, 20, 32, 34, 35, 36))).clone(namedValues=named_values(('off', 0), ('b', 1), ('g', 2), ('bg', 3), ('a', 4), ('j', 8), ('n', 16), ('gn', 18), ('bgn', 19), ('an', 20), ('nStrict', 32), ('gnStrict', 34), ('bgnStrict', 35), ('anStrict', 36)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: scanGroupAPAssignRadio2.setStatus('current') if mibBuilder.loadTexts: scanGroupAPAssignRadio2.setDescription('This field allows the radio #2 of the AP to be turned on/off. this field has meaning only the AP assigned to legacy (outOfScan) scan profile') scan_group_ap_assign_inactive_ap = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 14, 1, 6), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('inactive', 0), ('active', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: scanGroupAPAssignInactiveAP.setStatus('current') if mibBuilder.loadTexts: scanGroupAPAssignInactiveAP.setDescription('This field allows to set the AP as active/inactive in scanning activities.') scan_group_ap_assign_allow_scanning = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 14, 1, 7), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('notAllow', 0), ('allow', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: scanGroupAPAssignAllowScanning.setStatus('current') if mibBuilder.loadTexts: scanGroupAPAssignAllowScanning.setDescription('Setting scanning to active/inactive using this AP.') scan_group_ap_assign_allow_spectrum_analysis = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 14, 1, 8), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('notAllow', 0), ('allow', 1)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: scanGroupAPAssignAllowSpectrumAnalysis.setStatus('current') if mibBuilder.loadTexts: scanGroupAPAssignAllowSpectrumAnalysis.setDescription('Setting spectrum analysis to active/inactive using this AP.') scan_group_ap_assign_controller_ip_address = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 14, 1, 9), ip_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: scanGroupAPAssignControllerIPAddress.setStatus('current') if mibBuilder.loadTexts: scanGroupAPAssignControllerIPAddress.setDescription('The IP address of the controller to which the AP is connected currently.') scan_group_ap_assign_fordwarding_service = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 14, 1, 10), bits().clone(namedValues=named_values(('assignedToSite', 0), ('assignedToLoadGroup', 1), ('assignedToWlanService', 2)))).setMaxAccess('readonly') if mibBuilder.loadTexts: scanGroupAPAssignFordwardingService.setStatus('current') if mibBuilder.loadTexts: scanGroupAPAssignFordwardingService.setDescription('This OID lists the types of forwarding services that each Guardian is assigned to. A Guardian will revert to providing these services when it is removed from the Guardian role. The meanings of the individual flags are: bit 0: Set if this AP is a member of a site. bit 1: Set if this AP is assigned to a load group. bit 2: Set if this AP is assigned to at least one WLAN service. This OID is only relevant to APs in the Guardian role.') scan_ap_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 15)) if mibBuilder.loadTexts: scanAPTable.setStatus('current') if mibBuilder.loadTexts: scanAPTable.setDescription('Table of sacn APs on each collector. This table can be viewed only in v3 mode when the mitigator analys engine is enabled.') scan_ap_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 15, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'scanAPControllerIPAddress'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'scanAPSerialNumber')) if mibBuilder.loadTexts: scanAPEntry.setStatus('current') if mibBuilder.loadTexts: scanAPEntry.setDescription('An entry in this table identifying one access point.') scan_ap_controller_ip_address = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 15, 1, 1), ip_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: scanAPControllerIPAddress.setStatus('current') if mibBuilder.loadTexts: scanAPControllerIPAddress.setDescription('IP address of the controller on which the scanning executed.') scan_ap_serial_number = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 15, 1, 2), octet_string().subtype(subtypeSpec=value_size_constraint(16, 16)).setFixedLength(16)).setMaxAccess('readonly') if mibBuilder.loadTexts: scanAPSerialNumber.setStatus('current') if mibBuilder.loadTexts: scanAPSerialNumber.setDescription('Serial number of the access point, 16-character human readable text, that is assigned to this group.') scan_ap_acess_point_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 15, 1, 3), display_string().subtype(subtypeSpec=value_size_constraint(1, 255))).setMaxAccess('readcreate') if mibBuilder.loadTexts: scanAPAcessPointName.setStatus('current') if mibBuilder.loadTexts: scanAPAcessPointName.setDescription('Name of the access point belonging to this group.') scan_ap_row_status = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 15, 1, 4), row_status()).setMaxAccess('readcreate') if mibBuilder.loadTexts: scanAPRowStatus.setStatus('current') if mibBuilder.loadTexts: scanAPRowStatus.setDescription('Row status for the entry.') scan_ap_profile_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 15, 1, 5), display_string().subtype(subtypeSpec=value_size_constraint(1, 255))).setMaxAccess('readcreate') if mibBuilder.loadTexts: scanAPProfileName.setStatus('current') if mibBuilder.loadTexts: scanAPProfileName.setDescription('Name of the scan profile to which this access point is assigned.') scan_ap_profile_type = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 15, 1, 6), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2, 3))).clone(namedValues=named_values(('inServiceScan', 1), ('guardianScan', 2), ('outOfServiceScan', 3)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: scanAPProfileType.setStatus('current') if mibBuilder.loadTexts: scanAPProfileType.setDescription('inServiceScan(1): access point is performed In service Scan. guardianScan(2): access point is performed Guardian Scan. outOfServiceScan(3): access point is performed out of service Scan(Legacy Scan).') friendly_ap_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 16)) if mibBuilder.loadTexts: friendlyAPTable.setStatus('current') if mibBuilder.loadTexts: friendlyAPTable.setDescription('List of Access Points that have been categorized as not being any threat to the wireless network that is managed by EWC. This table can be viewed only in v3 mode when the mitigator analys engine is enabled.') friendly_ap_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 16, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'friendlyAPMacAddress')) if mibBuilder.loadTexts: friendlyAPEntry.setStatus('current') if mibBuilder.loadTexts: friendlyAPEntry.setDescription('An entry in this table identifying an access points and some of its attributes.') friendly_ap_mac_address = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 16, 1, 1), mac_address()).setMaxAccess('readwrite') if mibBuilder.loadTexts: friendlyAPMacAddress.setStatus('current') if mibBuilder.loadTexts: friendlyAPMacAddress.setDescription('Ethernet MAC address of the access point.') friendly_apssid = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 16, 1, 2), display_string().subtype(subtypeSpec=value_size_constraint(1, 32))).setMaxAccess('readwrite') if mibBuilder.loadTexts: friendlyAPSSID.setStatus('current') if mibBuilder.loadTexts: friendlyAPSSID.setDescription('SSID broadcasted by the access point.') friendly_ap_description = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 16, 1, 3), display_string().subtype(subtypeSpec=value_size_constraint(1, 255))).setMaxAccess('readwrite') if mibBuilder.loadTexts: friendlyAPDescription.setStatus('current') if mibBuilder.loadTexts: friendlyAPDescription.setDescription('Textual description that is used to identify the access point.') friendly_ap_manufacturer = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 16, 1, 4), display_string().subtype(subtypeSpec=value_size_constraint(1, 255))).setMaxAccess('readonly') if mibBuilder.loadTexts: friendlyAPManufacturer.setStatus('current') if mibBuilder.loadTexts: friendlyAPManufacturer.setDescription('Textual description identifying the access point manufacturer.') uncategorized_ap_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 17)) if mibBuilder.loadTexts: uncategorizedAPTable.setStatus('current') if mibBuilder.loadTexts: uncategorizedAPTable.setDescription('List of APs that have not been categorized either as friendly, threat or authorized.') uncategorized_ap_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 17, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'uncategorizedAPMAC')) if mibBuilder.loadTexts: uncategorizedAPEntry.setStatus('current') if mibBuilder.loadTexts: uncategorizedAPEntry.setDescription('An entry about an AP in this table.') uncategorized_apmac = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 17, 1, 1), mac_address()) if mibBuilder.loadTexts: uncategorizedAPMAC.setStatus('current') if mibBuilder.loadTexts: uncategorizedAPMAC.setDescription('MAC address of access point.') uncategorized_ap_descption = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 17, 1, 2), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: uncategorizedAPDescption.setStatus('current') if mibBuilder.loadTexts: uncategorizedAPDescption.setDescription('Textual description of access point.') uncategorized_ap_manufacturer = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 17, 1, 3), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: uncategorizedAPManufacturer.setStatus('current') if mibBuilder.loadTexts: uncategorizedAPManufacturer.setDescription('Access point manufacturer.') uncategorized_ap_classify = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 17, 1, 4), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3, 4, 5))).clone(namedValues=named_values(('noAction', 0), ('clasifyAsAuthorized', 1), ('classifyAsFriendlyAP', 2), ('clasifyAsThreatForReport', 3), ('clasifyAsInternalHoneypotThreat', 4), ('clasifyAsExternalHoneypotThreat', 5)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: uncategorizedAPClassify.setStatus('current') if mibBuilder.loadTexts: uncategorizedAPClassify.setDescription('By setting this field, access point can be reclassified and moved to different group.') uncategorized_apssid = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 17, 1, 5), display_string().subtype(subtypeSpec=value_size_constraint(1, 32))).setMaxAccess('readonly') if mibBuilder.loadTexts: uncategorizedAPSSID.setStatus('current') if mibBuilder.loadTexts: uncategorizedAPSSID.setDescription('SSID broadcasted by the access point.') authorized_ap_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 18)) if mibBuilder.loadTexts: authorizedAPTable.setStatus('current') if mibBuilder.loadTexts: authorizedAPTable.setDescription('List of authorized access point.') authorized_ap_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 18, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'authorizedAPMAC')) if mibBuilder.loadTexts: authorizedAPEntry.setStatus('current') if mibBuilder.loadTexts: authorizedAPEntry.setDescription('An entry in this table describing an authorized AP.') authorized_apmac = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 18, 1, 1), mac_address()) if mibBuilder.loadTexts: authorizedAPMAC.setStatus('current') if mibBuilder.loadTexts: authorizedAPMAC.setDescription('MAC address of access point.') authorized_ap_description = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 18, 1, 2), display_string()).setMaxAccess('readcreate') if mibBuilder.loadTexts: authorizedAPDescription.setStatus('current') if mibBuilder.loadTexts: authorizedAPDescription.setDescription('Discription of the access point.') authorized_ap_manufacturer = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 18, 1, 3), display_string()).setMaxAccess('readcreate') if mibBuilder.loadTexts: authorizedAPManufacturer.setStatus('current') if mibBuilder.loadTexts: authorizedAPManufacturer.setDescription("Access point's manufacturer. This field is cannot be set and it is deduced by MAC addressed.") authorized_ap_classify = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 18, 1, 4), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('noAction', 0), ('classifyAsFriendlyAP', 1)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: authorizedAPClassify.setStatus('current') if mibBuilder.loadTexts: authorizedAPClassify.setDescription('By setting this field, access point can be reclassified and moved to different group.') authorized_ap_row_status = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 18, 1, 5), row_status()).setMaxAccess('readcreate') if mibBuilder.loadTexts: authorizedAPRowStatus.setStatus('current') if mibBuilder.loadTexts: authorizedAPRowStatus.setDescription("Action permitted are 'delete/add' row.") prohibited_ap_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 19)) if mibBuilder.loadTexts: prohibitedAPTable.setStatus('current') if mibBuilder.loadTexts: prohibitedAPTable.setDescription('List of prohibited access points.') prohibited_ap_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 19, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'prohibitedAPMAC')) if mibBuilder.loadTexts: prohibitedAPEntry.setStatus('current') if mibBuilder.loadTexts: prohibitedAPEntry.setDescription('An entry in this table describing an access point.') prohibited_apmac = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 19, 1, 1), mac_address()) if mibBuilder.loadTexts: prohibitedAPMAC.setStatus('current') if mibBuilder.loadTexts: prohibitedAPMAC.setDescription('MAC address of access point.') prohibited_ap_category = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 19, 1, 2), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 65529, 65530, 65531, 65532, 65533, 65534))).clone(namedValues=named_values(('notAvailable', 0), ('reportPresenceOnly', 65529), ('externalHoneyPot', 65530), ('internalHoneyPot', 65531), ('friendly', 65532), ('perauthorized', 65533), ('authorized', 65534)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: prohibitedAPCategory.setStatus('current') if mibBuilder.loadTexts: prohibitedAPCategory.setDescription('The category the access point in this row belongs to.') prohibited_ap_description = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 19, 1, 3), display_string()).setMaxAccess('readcreate') if mibBuilder.loadTexts: prohibitedAPDescription.setStatus('current') if mibBuilder.loadTexts: prohibitedAPDescription.setDescription('Description of the access point.') prohibited_ap_manufacturer = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 19, 1, 4), display_string()).setMaxAccess('readcreate') if mibBuilder.loadTexts: prohibitedAPManufacturer.setStatus('current') if mibBuilder.loadTexts: prohibitedAPManufacturer.setDescription("Access point's manufacturer. This field is cannot be set and it is deduced by MAC addressed.") prohibited_ap_classify = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 19, 1, 5), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('classifyAsFriendlyAP', 1), ('noAction', 2)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: prohibitedAPClassify.setStatus('current') if mibBuilder.loadTexts: prohibitedAPClassify.setDescription('By setting this field, access point can be reclassified and moved to different group.') prohibited_ap_row_status = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 19, 1, 6), row_status()).setMaxAccess('readcreate') if mibBuilder.loadTexts: prohibitedAPRowStatus.setStatus('current') if mibBuilder.loadTexts: prohibitedAPRowStatus.setDescription("Action permitted are 'delete/add' row.") dedicated_scan_group_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 20)) if mibBuilder.loadTexts: dedicatedScanGroupTable.setStatus('current') if mibBuilder.loadTexts: dedicatedScanGroupTable.setDescription('dedicated scan group enables the subsystem full time scan for threats based on 37xx-based APs. The threats are discovered and identified in the deployment environment and then classified for further actions. ') dedicated_scan_group_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 20, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'scanGroupProfileID')) if mibBuilder.loadTexts: dedicatedScanGroupEntry.setStatus('current') if mibBuilder.loadTexts: dedicatedScanGroupEntry.setDescription('An entry in this table that defines attributes of a dedicated scan group.') dedicated_scan_grp_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 20, 1, 1), display_string().subtype(subtypeSpec=value_size_constraint(1, 255))).setMaxAccess('readcreate') if mibBuilder.loadTexts: dedicatedScanGrpName.setStatus('current') if mibBuilder.loadTexts: dedicatedScanGrpName.setDescription('Textual description identifying the scan group.') dedicated_scan_grp_security_threats = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 20, 1, 2), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disable', 0), ('enable', 1)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: dedicatedScanGrpSecurityThreats.setStatus('current') if mibBuilder.loadTexts: dedicatedScanGrpSecurityThreats.setDescription('Enable/disable security engine to scan for threats.') dedicated_scan_grp_max_concurrent_attacks_per_ap = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 20, 1, 3), integer32().subtype(subtypeSpec=value_range_constraint(0, 6))).setMaxAccess('readcreate') if mibBuilder.loadTexts: dedicatedScanGrpMaxConcurrentAttacksPerAP.setStatus('current') if mibBuilder.loadTexts: dedicatedScanGrpMaxConcurrentAttacksPerAP.setDescription('Max number of concurrent attacks per AP') dedicated_scan_grp_counter_measures = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 20, 1, 4), bits().clone(namedValues=named_values(('externalHoneypotAPs', 0), ('roamingToFriendlyAPs', 1), ('internalHoneypotAPs', 2), ('spoofedAPs', 3), ('dropFloodAttack', 4), ('removeDosAttack', 5), ('adHocModeDevice', 6), ('rogueAP', 7)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: dedicatedScanGrpCounterMeasures.setStatus('current') if mibBuilder.loadTexts: dedicatedScanGrpCounterMeasures.setDescription('bit 0: Setting this bit prevents authorized stations from roaming to external honeypot APs. bit 1: Setting this bit prevents authorized stations from roaming to friendly APs. bit 2: Setting this bit prevents any station from using an internal honeypot AP. bit 3: Setting this bit prevents any station from using a spoofed AP. bit 4: Setting this bit drops frames in a controlled fashion during a flood attack. bit 5: Setting this bit removes network access from clients originating DoS attacks. bit 6: Setting this bit prevents any station from using an ad hoc mode device. bit 7: Setting this bit prevents any station from using a rogue AP.') dedicated_scan_grp_scan2400_m_hz_freq = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 20, 1, 5), bits().clone(namedValues=named_values(('frequency2412MHz', 0), ('frequency2417MHz', 1), ('frequency2422MHz', 2), ('frequency2427MHz', 3), ('frequency2432MHz', 4), ('frequency2437MHz', 5), ('frequency2442MHz', 6), ('frequency2447MHz', 7), ('frequency2452MHz', 8), ('frequency2457MHz', 9), ('frequency2462MHz', 10), ('frequency2467MHz', 11), ('frequency2472MHz', 12), ('frequency2484MHz', 13)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: dedicatedScanGrpScan2400MHzFreq.setStatus('current') if mibBuilder.loadTexts: dedicatedScanGrpScan2400MHzFreq.setDescription('bit 0: by setting this bit scanning is performed on 2412 MHz frequency channel bit 1: by setting this bit scanning is performed on 2417 MHz frequency channel bit 2: by setting this bit scanning is performed on 2422 MHz frequency channel bit 3: by setting this bit scanning is performed on 2427 MHz frequency channel bit 4: by setting this bit scanning is performed on 2432 MHz frequency channel bit 5: by setting this bit scanning is performed on 2437 MHz frequency channel bit 6: by setting this bit scanning is performed on 2442 MHz frequency channel bit 7: by setting this bit scanning is performed on 2447 MHz frequency channel bit 8: by setting this bit scanning is performed on 2452 MHz frequency channel bit 9: by setting this bit scanning is performed on 2457 MHz frequency channel bit 10: by setting this bit scanning is performed on 2462 MHz frequency channel bit 11: by setting this bit scanning is performed on 2467 MHz frequency channel bit 12: by setting this bit scanning is performed on 2472 MHz frequency channel bit 13: by setting this bit scanning is performed on 2484 MHz frequency channel') dedicated_scan_grp_scan5_g_hz_freq = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 20, 1, 6), bits().clone(namedValues=named_values(('frequency5040MHz', 0), ('frequency5060MHz', 1), ('frequency5080MHz', 2), ('frequency5180MHz', 3), ('frequency5200MHz', 4), ('frequency5220MHz', 5), ('frequency5240MHz', 6), ('frequency5260MHz', 7), ('frequency5280MHz', 8), ('frequency5300MHz', 9), ('frequency5320MHz', 10), ('frequency5500MHz', 11), ('frequency5520MHz', 12), ('frequency5540MHz', 13), ('frequency5560MHz', 14), ('frequency5580MHz', 15), ('frequency5600MHz', 16), ('frequency5620MHz', 17), ('frequency5640MHz', 18), ('frequency5660MHz', 19), ('frequency5680MHz', 20), ('frequency5700MHz', 21), ('frequency5745MHz', 22), ('frequency5765MHz', 23), ('frequency5785MHz', 24), ('frequency5805MHz', 25), ('frequency5825MHz', 26), ('frequency4920MHz', 27), ('frequency4940MHz', 28), ('frequency4960MHz', 29), ('frequency4980MHz', 30)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: dedicatedScanGrpScan5GHzFreq.setStatus('current') if mibBuilder.loadTexts: dedicatedScanGrpScan5GHzFreq.setDescription('bit 0: by setting this bit scanning is performed on 5040 MHz frequency channel bit 1: by setting this bit scanning is performed on 5060 MHz frequency channel bit 2: by setting this bit scanning is performed on 5080 MHz frequency channel bit 3: by setting this bit scanning is performed on 5180 MHz frequency channel bit 4: by setting this bit scanning is performed on 5200 MHz frequency channel bit 5: by setting this bit scanning is performed on 5220 MHz frequency channel bit 6: by setting this bit scanning is performed on 5240 MHz frequency channel bit 7: by setting this bit scanning is performed on 5260 MHz frequency channel bit 8: by setting this bit scanning is performed on 5280 MHz frequency channel bit 9: by setting this bit scanning is performed on 5300 MHz frequency channel bit 10: by setting this bit scanning is performed on 5320 MHz frequency channel bit 11: by setting this bit scanning is performed on 5500 MHz frequency channel bit 12: by setting this bit scanning is performed on 5520 MHz frequency channel bit 13: by setting this bit scanning is performed on 5540 MHz frequency channel bit 14: by setting this bit scanning is performed on 5560 MHz frequency channel bit 15: by setting this bit scanning is performed on 5580 MHz frequency channel bit 16: by setting this bit scanning is performed on 5600 MHz frequency channel bit 17: by setting this bit scanning is performed on 5620 MHz frequency channel bit 18: by setting this bit scanning is performed on 5640 MHz frequency channel bit 19: by setting this bit scanning is performed on 5660 MHz frequency channel bit 20: by setting this bit scanning is performed on 5680 MHz frequency channel bit 21: by setting this bit scanning is performed on 5700 MHz frequency channel bit 22: by setting this bit scanning is performed on 5745 MHz frequency channel bit 23: by setting this bit scanning is performed on 5765 MHz frequency channel bit 24: by setting this bit scanning is performed on 5785 MHz frequency channel bit 25: by setting this bit scanning is performed on 5805 MHz frequency channel bit 26: by setting this bit scanning is performed on 5825 MHz frequency channel bit 27: by setting this bit scanning is performed on 4920 MHz frequency channel bit 28: by setting this bit scanning is performed on 4940 MHz frequency channel bit 29: by setting this bit scanning is performed on 4960 MHz frequency channel bit 30: by setting this bit scanning is performed on 4980 MHz frequency channel') dedicated_scan_grp_block_ad_hoc_period = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 20, 1, 7), integer32()).setMaxAccess('readcreate') if mibBuilder.loadTexts: dedicatedScanGrpBlockAdHocPeriod.setStatus('current') if mibBuilder.loadTexts: dedicatedScanGrpBlockAdHocPeriod.setDescription('Number of seconds removing network access to the clients that are in ad hoc mode.') dedicated_scan_grp_classify_source_if = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 20, 1, 8), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disable', 0), ('enable', 1)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: dedicatedScanGrpClassifySourceIF.setStatus('current') if mibBuilder.loadTexts: dedicatedScanGrpClassifySourceIF.setDescription('This variable allows to enable/disable classify sources of interference') dedicated_scan_grp_row_status = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 20, 1, 9), row_status()).setMaxAccess('readcreate') if mibBuilder.loadTexts: dedicatedScanGrpRowStatus.setStatus('current') if mibBuilder.loadTexts: dedicatedScanGrpRowStatus.setDescription('RowStatus field for creation/deletion or changing row status.') dedicated_scan_grp_detect_rogue_ap = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 20, 1, 10), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1))).clone(namedValues=named_values(('disable', 0), ('enable', 1)))).setMaxAccess('readcreate') if mibBuilder.loadTexts: dedicatedScanGrpDetectRogueAP.setStatus('current') if mibBuilder.loadTexts: dedicatedScanGrpDetectRogueAP.setDescription('This enables/disables rogue AP detection.') dedicated_scan_grp_listening_port = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 20, 1, 11), integer32()).setMaxAccess('readcreate') if mibBuilder.loadTexts: dedicatedScanGrpListeningPort.setStatus('current') if mibBuilder.loadTexts: dedicatedScanGrpListeningPort.setDescription('This variable has meaning only when dedicatedScanGrpDetectRogueAP is enabled. The port number is the port for listening for rogue AP detection.') wids_wips_report = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30)) active_threat_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 1)) if mibBuilder.loadTexts: activeThreatTable.setStatus('current') if mibBuilder.loadTexts: activeThreatTable.setDescription('List of active threats that have been discovered to this point of time.') active_threat_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 1, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'activeThreatIndex')) if mibBuilder.loadTexts: activeThreatEntry.setStatus('current') if mibBuilder.loadTexts: activeThreatEntry.setDescription('An entry in this table describing an idividual threat charactersitics and attributes.') active_threat_index = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 1, 1, 1), unsigned32()) if mibBuilder.loadTexts: activeThreatIndex.setStatus('current') if mibBuilder.loadTexts: activeThreatIndex.setDescription('Internally generated number without any significat meaning except used as indexing in this table.') active_threat_category = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 1, 1, 2), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: activeThreatCategory.setStatus('current') if mibBuilder.loadTexts: activeThreatCategory.setDescription('Textual description describing the type of the threat.') active_threat_device_mac = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 1, 1, 3), mac_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: activeThreatDeviceMAC.setStatus('current') if mibBuilder.loadTexts: activeThreatDeviceMAC.setDescription('MAC address of the device that the threat appears to be originated.') active_threat_date_time = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 1, 1, 4), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: activeThreatDateTime.setStatus('current') if mibBuilder.loadTexts: activeThreatDateTime.setDescription('Date and time the threat was discovered. ') active_threat_counter_measure = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 1, 1, 5), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 4, 8))).clone(namedValues=named_values(('noCounterMeasure', 0), ('rateLimit', 1), ('preventUse', 2), ('preventRoaming', 4), ('blacklisted', 8)))).setMaxAccess('readonly') if mibBuilder.loadTexts: activeThreatCounterMeasure.setStatus('current') if mibBuilder.loadTexts: activeThreatCounterMeasure.setDescription('Counter measure has been taken to tackle the threat.') active_threat_ap_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 1, 1, 6), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: activeThreatAPName.setStatus('current') if mibBuilder.loadTexts: activeThreatAPName.setDescription('Name of the access point.') active_threat_rss = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 1, 1, 7), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: activeThreatRSS.setStatus('current') if mibBuilder.loadTexts: activeThreatRSS.setDescription('Signal strength of the device considered to be a threat.') active_threat_extra_details = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 1, 1, 8), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: activeThreatExtraDetails.setStatus('current') if mibBuilder.loadTexts: activeThreatExtraDetails.setDescription('Extra comments related to the threat.') active_threat_threat = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 1, 1, 9), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: activeThreatThreat.setStatus('current') if mibBuilder.loadTexts: activeThreatThreat.setDescription('Textual description of the threat.') countermeasure_ap_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 2)) if mibBuilder.loadTexts: countermeasureAPTable.setStatus('current') if mibBuilder.loadTexts: countermeasureAPTable.setDescription('List of APs engaged in countermeasure activities to thwart coming threats.') countermeasure_ap_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 2, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'countermeasureAPSerial'), (0, 'HIPATH-WIRELESS-HWC-MIB', 'countermeasureAPThreatIndex')) if mibBuilder.loadTexts: countermeasureAPEntry.setStatus('current') if mibBuilder.loadTexts: countermeasureAPEntry.setDescription('An entry in this table identifying an AP engaged in countermeasure activities.') countermeasure_ap_threat_index = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 2, 1, 1), unsigned32()) if mibBuilder.loadTexts: countermeasureAPThreatIndex.setStatus('current') if mibBuilder.loadTexts: countermeasureAPThreatIndex.setDescription('Internally generated index of the access point taking part in countermeasure.') countermeasure_ap_serial = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 2, 1, 2), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: countermeasureAPSerial.setStatus('current') if mibBuilder.loadTexts: countermeasureAPSerial.setDescription('Serial number of the access point taking part in countermeasure.') countermeasure_ap_name = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 2, 1, 3), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: countermeasureAPName.setStatus('current') if mibBuilder.loadTexts: countermeasureAPName.setDescription('Name of the access point taking part in countermeasure.') countermeasure_ap_threat_category = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 2, 1, 4), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: countermeasureAPThreatCategory.setStatus('current') if mibBuilder.loadTexts: countermeasureAPThreatCategory.setDescription('Textual description of the threat category that countermeasure action is aimed at.') countermeasure_ap_countermeasure = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 2, 1, 5), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: countermeasureAPCountermeasure.setStatus('current') if mibBuilder.loadTexts: countermeasureAPCountermeasure.setDescription('Countermeasure has been taken to thwart the threat.') countermeasure_ap_time = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 2, 1, 6), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: countermeasureAPTime.setStatus('current') if mibBuilder.loadTexts: countermeasureAPTime.setDescription('The time that the countermeasure has started.') blacklisted_client_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 3)) if mibBuilder.loadTexts: blacklistedClientTable.setStatus('current') if mibBuilder.loadTexts: blacklistedClientTable.setDescription('List of clients that have been blacklisted due to preceived threats they may pose to the safe functioning of the operating network.') blacklisted_client_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 3, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'blacklistedClientMAC')) if mibBuilder.loadTexts: blacklistedClientEntry.setStatus('current') if mibBuilder.loadTexts: blacklistedClientEntry.setDescription('An entry in this table pertaining information about the MU that has been blacklisted.') blacklisted_client_mac = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 3, 1, 1), mac_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: blacklistedClientMAC.setStatus('current') if mibBuilder.loadTexts: blacklistedClientMAC.setDescription('MAC address of the client.') blacklisted_client_stat_time = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 3, 1, 2), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: blacklistedClientStatTime.setStatus('current') if mibBuilder.loadTexts: blacklistedClientStatTime.setDescription('The time blacklisting started.') blacklisted_client_end_time = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 3, 1, 3), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: blacklistedClientEndTime.setStatus('current') if mibBuilder.loadTexts: blacklistedClientEndTime.setDescription('The time blacklisting ends.') blacklisted_client_reason = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 3, 1, 4), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: blacklistedClientReason.setStatus('current') if mibBuilder.loadTexts: blacklistedClientReason.setDescription('Reason for blacklisting the client.') threat_summary_table = mib_table((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 4)) if mibBuilder.loadTexts: threatSummaryTable.setStatus('current') if mibBuilder.loadTexts: threatSummaryTable.setDescription('Summary of all threats that have been detected in the network by wireless controller system.') threat_summary_entry = mib_table_row((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 4, 1)).setIndexNames((0, 'HIPATH-WIRELESS-HWC-MIB', 'threatSummaryIndex')) if mibBuilder.loadTexts: threatSummaryEntry.setStatus('current') if mibBuilder.loadTexts: threatSummaryEntry.setDescription('An entry summarizing statistics about a category of a threat.') threat_summary_index = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 4, 1, 1), unsigned32()) if mibBuilder.loadTexts: threatSummaryIndex.setStatus('current') if mibBuilder.loadTexts: threatSummaryIndex.setDescription('Internally generated index.') threat_summary_category = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 4, 1, 2), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: threatSummaryCategory.setStatus('current') if mibBuilder.loadTexts: threatSummaryCategory.setDescription('Textul description identifying the category of a threat.') threat_summary_active_threat = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 4, 1, 3), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: threatSummaryActiveThreat.setStatus('current') if mibBuilder.loadTexts: threatSummaryActiveThreat.setDescription('Counts of threats that are currently active.') threat_summary_historical_counts = mib_table_column((1, 3, 6, 1, 4, 1, 4329, 15, 3, 11, 30, 4, 1, 4), unsigned32()).setMaxAccess('readonly') if mibBuilder.loadTexts: threatSummaryHistoricalCounts.setStatus('current') if mibBuilder.loadTexts: threatSummaryHistoricalCounts.setDescription('Historical counts of such threat that were detected in the past by the wireless controller system.') ap_notifications = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 19)) ap_event_id = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 19, 1), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(1, 2))).clone(namedValues=named_values(('apPollTimeout', 1), ('apRegister', 2)))).setMaxAccess('readwrite') if mibBuilder.loadTexts: apEventId.setStatus('current') if mibBuilder.loadTexts: apEventId.setDescription('Identifies event associated with AP or AP tunnel: apPollTimeout - an event triggered when the AP disconnects from the controller. apRegister - an event triggered when the AP connects to the controller.') ap_event_description = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 19, 2), octet_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: apEventDescription.setStatus('current') if mibBuilder.loadTexts: apEventDescription.setDescription('Contains the description of the most recently triggered event.') ap_event_ap_serial_number = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 19, 3), octet_string().subtype(subtypeSpec=value_size_constraint(16, 16)).setFixedLength(16)).setMaxAccess('readonly') if mibBuilder.loadTexts: apEventAPSerialNumber.setStatus('current') if mibBuilder.loadTexts: apEventAPSerialNumber.setDescription('16-character serial number of the AP.') ap_tunnel_alarm = notification_type((1, 3, 6, 1, 4, 1, 4329, 15, 3, 19, 4)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'apEventId'), ('HIPATH-WIRELESS-HWC-MIB', 'apEventDescription'), ('HIPATH-WIRELESS-HWC-MIB', 'apEventAPSerialNumber')) if mibBuilder.loadTexts: apTunnelAlarm.setStatus('current') if mibBuilder.loadTexts: apTunnelAlarm.setDescription('alarm associated with AP and AP interface.') station_session_notifications = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20)) station_event_type = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20, 1), integer32().subtype(subtypeSpec=constraints_union(single_value_constraint(0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12))).clone(namedValues=named_values(('registration', 0), ('deRegistration', 1), ('stateChange', 2), ('registrationFailed', 3), ('roam', 4), ('mbaTimeout', 5), ('mbaAccepted', 6), ('mbaRejected', 7), ('authorizationChanged', 8), ('authentication', 9), ('authenticationFailed', 10), ('locationUpdate', 11), ('areaChange', 12)))).setMaxAccess('readonly') if mibBuilder.loadTexts: stationEventType.setStatus('current') if mibBuilder.loadTexts: stationEventType.setDescription('station event type include: registration(0): MU registration. deRegistration(1): MU de-registration. stateChange(2): MU state changed. registrationFailed(3): MU registration failure. roam(4): MU roam. mbaTimeout(5): MU MAC-Based-Authentication time out. mbaAccepted(6): MU MAC-Based-Authentication accepted. mbaRejected(7): MU MAC-Based-Authentication rejected. authorizationChanged(8): MU authorization changed. authentication(9): MU authentication. authenticationFailed(10): MU authentication failure. locationUpdate(11): MU location updated. areaChange(12): MU roamed to other area.') station_mac_address = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20, 2), mac_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: stationMacAddress.setStatus('current') if mibBuilder.loadTexts: stationMacAddress.setDescription('MAC address of the station that is the subject of this event report.') station_ip_address = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20, 3), ip_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: stationIPAddress.setStatus('current') if mibBuilder.loadTexts: stationIPAddress.setDescription('IP address of the station that is the subject of this event report.') station_ap_name = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20, 4), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: stationAPName.setStatus('current') if mibBuilder.loadTexts: stationAPName.setDescription('name of the AP which station associated with') station_apssid = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20, 5), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: stationAPSSID.setStatus('current') if mibBuilder.loadTexts: stationAPSSID.setDescription('SSID broadcasted by the access point which station connected to') station_detail_event = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20, 6), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: stationDetailEvent.setStatus('current') if mibBuilder.loadTexts: stationDetailEvent.setDescription('detail description of the station event') station_roamed_ap_name = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20, 7), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: stationRoamedAPName.setStatus('current') if mibBuilder.loadTexts: stationRoamedAPName.setDescription('name of the access point which station roamed from') station_name = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20, 8), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: stationName.setStatus('current') if mibBuilder.loadTexts: stationName.setDescription('name of station') station_bssid = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20, 9), display_string()).setMaxAccess('readonly') if mibBuilder.loadTexts: stationBSSID.setStatus('current') if mibBuilder.loadTexts: stationBSSID.setDescription('the Mac address of the radio which station connect to') station_event_time_stamp = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20, 10), time_ticks()).setMaxAccess('readonly') if mibBuilder.loadTexts: stationEventTimeStamp.setStatus('current') if mibBuilder.loadTexts: stationEventTimeStamp.setDescription('The duration in hundredths of a second from the network agent start time to the time of generation of the station event.') station_event_alarm = notification_type((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20, 11)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'stationEventType'), ('HIPATH-WIRELESS-HWC-MIB', 'stationMacAddress'), ('HIPATH-WIRELESS-HWC-MIB', 'stationIPAddress'), ('HIPATH-WIRELESS-HWC-MIB', 'stationAPName'), ('HIPATH-WIRELESS-HWC-MIB', 'stationAPSSID'), ('HIPATH-WIRELESS-HWC-MIB', 'stationDetailEvent'), ('HIPATH-WIRELESS-HWC-MIB', 'stationRoamedAPName'), ('HIPATH-WIRELESS-HWC-MIB', 'stationName'), ('HIPATH-WIRELESS-HWC-MIB', 'stationBSSID'), ('HIPATH-WIRELESS-HWC-MIB', 'stationEventTimeStamp'), ('HIPATH-WIRELESS-HWC-MIB', 'stationIPv6Address1'), ('HIPATH-WIRELESS-HWC-MIB', 'stationIPv6Address2'), ('HIPATH-WIRELESS-HWC-MIB', 'stationIPv6Address3')) if mibBuilder.loadTexts: stationEventAlarm.setStatus('current') if mibBuilder.loadTexts: stationEventAlarm.setDescription('A trap describing a significant event that happened to a station during a session on the network. A controller can sees hundreds or even thousands of these events every second.') station_i_pv6_address1 = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20, 12), ipv6_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: stationIPv6Address1.setStatus('current') if mibBuilder.loadTexts: stationIPv6Address1.setDescription('One of the IPv6 addresses of the station that is the subject of this event report.') station_i_pv6_address2 = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20, 13), ipv6_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: stationIPv6Address2.setStatus('current') if mibBuilder.loadTexts: stationIPv6Address2.setDescription('One of the IPv6 addresses of the station that is the subject of this event report.') station_i_pv6_address3 = mib_scalar((1, 3, 6, 1, 4, 1, 4329, 15, 3, 20, 14), ipv6_address()).setMaxAccess('readonly') if mibBuilder.loadTexts: stationIPv6Address3.setStatus('current') if mibBuilder.loadTexts: stationIPv6Address3.setDescription('One of the IPv6 addresses of the station that is the subject of this event report.') hi_path_wireless_hwc_conformance = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30)) hi_path_wireless_hwc_module = module_compliance((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 1)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'hiPathWirelessHWCGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'layerTwoPortGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'muGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'apStatsGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'muACLGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'siteGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'sitePolicyGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'siteCosGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'siteAPGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'siteWlanGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'apGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanStatsGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'topologyGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'topologyStatGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'loadGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'outOfServiceScanGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'widsWipsEngineGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'widsWipsObjectsGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'scanGroupAPAssignmentGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'inServiceScanGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanSecurityReportGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'friendlyAPGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'scanAPGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'activeThreatGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'muAccessListGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'apAntennaGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'threatSummaryGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'blaclistedClientGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'countermeasureAPGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'apByChannelGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'stationsByProtocolGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'licensingInformationGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'dedicatedScanGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'prohibitedAPGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'authorizedAPGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'uncategorizedAPGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'radiusFastFailoverEventsGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'dhcpRelayListenersGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'apRadioAntennaGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'authenticationAdvancedGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'radiusExtnsSettingGroup')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): hi_path_wireless_hwc_module = hiPathWirelessHWCModule.setStatus('current') if mibBuilder.loadTexts: hiPathWirelessHWCModule.setDescription('Conformance definition for the EWC MIB.') hi_path_wireless_hwc_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 2)) for _hi_path_wireless_hwc_group_obj in [[('HIPATH-WIRELESS-HWC-MIB', 'sysSoftwareVersion'), ('HIPATH-WIRELESS-HWC-MIB', 'sysCPUType'), ('HIPATH-WIRELESS-HWC-MIB', 'sysLogLevel'), ('HIPATH-WIRELESS-HWC-MIB', 'logEventSeverityThreshold'), ('HIPATH-WIRELESS-HWC-MIB', 'logEventSeverity'), ('HIPATH-WIRELESS-HWC-MIB', 'logEventComponent'), ('HIPATH-WIRELESS-HWC-MIB', 'apLogCollectionEnable'), ('HIPATH-WIRELESS-HWC-MIB', 'apLogFrequency'), ('HIPATH-WIRELESS-HWC-MIB', 'apLogDestination'), ('HIPATH-WIRELESS-HWC-MIB', 'apLogUserId'), ('HIPATH-WIRELESS-HWC-MIB', 'apLogServerIP'), ('HIPATH-WIRELESS-HWC-MIB', 'apLogDirectory'), ('HIPATH-WIRELESS-HWC-MIB', 'apLogPassword'), ('HIPATH-WIRELESS-HWC-MIB', 'apLogFTProtocol'), ('HIPATH-WIRELESS-HWC-MIB', 'select'), ('HIPATH-WIRELESS-HWC-MIB', 'apLogQuickSelectedOption'), ('HIPATH-WIRELESS-HWC-MIB', 'apLogFileCopyDestination'), ('HIPATH-WIRELESS-HWC-MIB', 'apLogFileCopyProtocol'), ('HIPATH-WIRELESS-HWC-MIB', 'apLogFileCopyServerIP'), ('HIPATH-WIRELESS-HWC-MIB', 'apLogFileCopyUserID'), ('HIPATH-WIRELESS-HWC-MIB', 'apLogFileCopyPassword'), ('HIPATH-WIRELESS-HWC-MIB', 'apLogFileCopyServerDirectory'), ('HIPATH-WIRELESS-HWC-MIB', 'apLogFileCopyOperation'), ('HIPATH-WIRELESS-HWC-MIB', 'apLogFileCopyOperationStatus'), ('HIPATH-WIRELESS-HWC-MIB', 'apLogFileCopyRowStatus'), ('HIPATH-WIRELESS-HWC-MIB', 'apLogFileUtilityLimit'), ('HIPATH-WIRELESS-HWC-MIB', 'apLogFileUtilityCurrent'), ('HIPATH-WIRELESS-HWC-MIB', 'logEventDescription'), ('HIPATH-WIRELESS-HWC-MIB', 'apEventId'), ('HIPATH-WIRELESS-HWC-MIB', 'apEventDescription'), ('HIPATH-WIRELESS-HWC-MIB', 'apEventAPSerialNumber'), ('HIPATH-WIRELESS-HWC-MIB', 'assocTxPackets'), ('HIPATH-WIRELESS-HWC-MIB', 'assocRxPackets'), ('HIPATH-WIRELESS-HWC-MIB', 'assocTxOctets'), ('HIPATH-WIRELESS-HWC-MIB', 'assocRxOctets'), ('HIPATH-WIRELESS-HWC-MIB', 'assocDuration'), ('HIPATH-WIRELESS-HWC-MIB', 'assocCount'), ('HIPATH-WIRELESS-HWC-MIB', 'assocMUMacAddress'), ('HIPATH-WIRELESS-HWC-MIB', 'assocStartSysUpTime'), ('HIPATH-WIRELESS-HWC-MIB', 'mobileUnitCount'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsIfIndex'), ('HIPATH-WIRELESS-HWC-MIB', 'radioVNSRowStatus'), ('HIPATH-WIRELESS-HWC-MIB', 'radioIfIndex'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsFilterRulePortLow'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsFilterRulePortHigh'), ('HIPATH-WIRELESS-HWC-MIB', 'cpURL'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsDHCPRangeIndex'), ('HIPATH-WIRELESS-HWC-MIB', 'vns3rdPartyAP'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsUseDHCPRelay'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsMgmtTrafficEnable'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsAuthModel'), ('HIPATH-WIRELESS-HWC-MIB', 'physicalPortCount'), ('HIPATH-WIRELESS-HWC-MIB', 'mgmtPortIfIndex'), ('HIPATH-WIRELESS-HWC-MIB', 'mgmtPortHostname'), ('HIPATH-WIRELESS-HWC-MIB', 'mgmtPortDomain'), ('HIPATH-WIRELESS-HWC-MIB', 'vnRole'), ('HIPATH-WIRELESS-HWC-MIB', 'vnIfIndex'), ('HIPATH-WIRELESS-HWC-MIB', 'vnHeartbeatInterval'), ('HIPATH-WIRELESS-HWC-MIB', 'ntpEnabled'), ('HIPATH-WIRELESS-HWC-MIB', 'ntpTimezone'), ('HIPATH-WIRELESS-HWC-MIB', 'ntpTimeServer1'), ('HIPATH-WIRELESS-HWC-MIB', 'ntpTimeServer2'), ('HIPATH-WIRELESS-HWC-MIB', 'ntpTimeServer3'), ('HIPATH-WIRELESS-HWC-MIB', 'tunnelCount'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsCount'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsDescription'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsMUSessionTimeout'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsAllowMulticast'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsSSID'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsDomain'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsDNSServers'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsWINSServers'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsStatus'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsDHCPRangeStart'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsDHCPRangeEnd'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsDHCPRangeType'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsDHCPRangeStatus'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsRadiusServerPort'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsRadiusServerRetries'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsRadiusServerTimeout'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsRadiusServerSharedSecret'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsRadiusServerNASIdentifier'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsRadiusServerAuthType'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsRadiusServerRowStatus'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsFilterID'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsFilterIDStatus'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsFilterRuleOrder'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsFilterRuleDirection'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsFilterRuleAction'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsFilterRuleIPAddress'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsFilterRuleProtocol'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsFilterRuleEtherType'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsFilterRuleStatus'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsPrivWEPKeyType'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsPrivDynamicRekeyFrequency'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsPrivWEPKeyLength'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsPrivWPA1Enabled'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsPrivUseSharedKey'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsPrivWPASharedKey'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsWEPKeyIndex'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsWEPKeyValue'), ('HIPATH-WIRELESS-HWC-MIB', 'activeVNSSessionCount'), ('HIPATH-WIRELESS-HWC-MIB', 'apCount'), ('HIPATH-WIRELESS-HWC-MIB', 'cpReplaceGatewayWithFQDN'), ('HIPATH-WIRELESS-HWC-MIB', 'cpDefaultRedirectionURL'), ('HIPATH-WIRELESS-HWC-MIB', 'cpConnectionIP'), ('HIPATH-WIRELESS-HWC-MIB', 'cpConnectionPort'), ('HIPATH-WIRELESS-HWC-MIB', 'cpSharedSecret'), ('HIPATH-WIRELESS-HWC-MIB', 'cpLogOff'), ('HIPATH-WIRELESS-HWC-MIB', 'cpStatusCheck'), ('HIPATH-WIRELESS-HWC-MIB', 'cpType'), ('HIPATH-WIRELESS-HWC-MIB', 'apMacAddress'), ('HIPATH-WIRELESS-HWC-MIB', 'serviceLogFacility'), ('HIPATH-WIRELESS-HWC-MIB', 'sysLogServerIP'), ('HIPATH-WIRELESS-HWC-MIB', 'sysLogServerPort'), ('HIPATH-WIRELESS-HWC-MIB', 'sysLogServerRowStatus'), ('HIPATH-WIRELESS-HWC-MIB', 'sysLogServerIndex'), ('HIPATH-WIRELESS-HWC-MIB', 'apActiveCount'), ('HIPATH-WIRELESS-HWC-MIB', 'sysLogServerEnabled'), ('HIPATH-WIRELESS-HWC-MIB', 'assocVnsIfIndex'), ('HIPATH-WIRELESS-HWC-MIB', 'apRadioFrequency'), ('HIPATH-WIRELESS-HWC-MIB', 'includeAllServiceMessages'), ('HIPATH-WIRELESS-HWC-MIB', 'tunnelStartIP'), ('HIPATH-WIRELESS-HWC-MIB', 'tunnelStartHWC'), ('HIPATH-WIRELESS-HWC-MIB', 'tunnelEndIP'), ('HIPATH-WIRELESS-HWC-MIB', 'tunnelEndHWC'), ('HIPATH-WIRELESS-HWC-MIB', 'apBroadcastDisassociate'), ('HIPATH-WIRELESS-HWC-MIB', 'sysSerialNo'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsPrivWPA2Enabled'), ('HIPATH-WIRELESS-HWC-MIB', 'tunnelStatus'), ('HIPATH-WIRELESS-HWC-MIB', 'hiPathWirelessAppLogFacility'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsVlanID'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsMgmIpAddress'), ('HIPATH-WIRELESS-HWC-MIB', 'maxVoiceBWforReassociation'), ('HIPATH-WIRELESS-HWC-MIB', 'maxVoiceBWforAssociation'), ('HIPATH-WIRELESS-HWC-MIB', 'maxVideoBWforReassociation'), ('HIPATH-WIRELESS-HWC-MIB', 'maxVideoBWforAssociation'), ('HIPATH-WIRELESS-HWC-MIB', 'maxBestEffortBWforReassociation'), ('HIPATH-WIRELESS-HWC-MIB', 'maxBestEffortBWforAssociation'), ('HIPATH-WIRELESS-HWC-MIB', 'maxBackgroundBWforReassociation'), ('HIPATH-WIRELESS-HWC-MIB', 'maxBackgroundBWforAssociation'), ('HIPATH-WIRELESS-HWC-MIB', 'physicalPortsInternalVlanID'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsMode'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsQoSPriorityOverrideFlag'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsQoSPriorityOverrideSC'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsQoSPriorityOverrideDSCP'), ('HIPATH-WIRELESS-HWC-MIB', 'netflowDestinationIP'), ('HIPATH-WIRELESS-HWC-MIB', 'netflowInterval'), ('HIPATH-WIRELESS-HWC-MIB', 'mirrorFirstN'), ('HIPATH-WIRELESS-HWC-MIB', 'mirrorL2Ports'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsQoSClassificationServiceClass'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsQoSWirelessLegacyFlag'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsQoSWirelessWMMFlag'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsQoSWireless80211eFlag'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsQoSWirelessTurboVoiceFlag'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsQoSWirelessEnableUAPSD'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsQoSWirelessUseAdmControlVoice'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsSuppressSSID'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsEnable11hSupport'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsApplyPowerBackOff'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsProcessClientIEReq'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsQoSWirelessUseAdmControlVideo'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsInterfaceName'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsQoSWirelessULPolicerAction'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsQoSWirelessDLPolicerAction'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsQoSWirelessUseAdmControlBestEffort'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsQoSWirelessUseAdmControlBackground'), ('HIPATH-WIRELESS-HWC-MIB', 'tspecMuMACAddress'), ('HIPATH-WIRELESS-HWC-MIB', 'tspecAC'), ('HIPATH-WIRELESS-HWC-MIB', 'tspecDirection'), ('HIPATH-WIRELESS-HWC-MIB', 'tspecApSerialNumber'), ('HIPATH-WIRELESS-HWC-MIB', 'tspecMuIPAddress'), ('HIPATH-WIRELESS-HWC-MIB', 'tspecBssMac'), ('HIPATH-WIRELESS-HWC-MIB', 'tspecSsid'), ('HIPATH-WIRELESS-HWC-MIB', 'tspecMDR'), ('HIPATH-WIRELESS-HWC-MIB', 'tspecNMS'), ('HIPATH-WIRELESS-HWC-MIB', 'tspecSBA'), ('HIPATH-WIRELESS-HWC-MIB', 'tspecDlRate'), ('HIPATH-WIRELESS-HWC-MIB', 'tspecUlRate'), ('HIPATH-WIRELESS-HWC-MIB', 'tspecDlViolations'), ('HIPATH-WIRELESS-HWC-MIB', 'tspecUlViolations'), ('HIPATH-WIRELESS-HWC-MIB', 'tspecProtocol'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsDLSSupportEnable'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsDLSAddress'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsDLSPort'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsSessionAvailabilityEnable'), ('HIPATH-WIRELESS-HWC-MIB', 'ntpServerEnabled'), ('HIPATH-WIRELESS-HWC-MIB', 'primaryDNS'), ('HIPATH-WIRELESS-HWC-MIB', 'secondaryDNS'), ('HIPATH-WIRELESS-HWC-MIB', 'tertiaryDNS'), ('HIPATH-WIRELESS-HWC-MIB', 'physicalFlash'), ('HIPATH-WIRELESS-HWC-MIB', 'jumboFrames'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsRadiusServerName'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsRadiusServerNasAddress'), ('HIPATH-WIRELESS-HWC-MIB', 'dasReplayInterval'), ('HIPATH-WIRELESS-HWC-MIB', 'dasPort'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsEnabled'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsAPFilterRuleOrder'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsAPFilterRuleDirection'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsAPFilterAction'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsAPFilterIPAddress'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsAPFilterMask'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsAPFilterPortLow'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsAPFilterPortHigh'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsAPFilterProtocol'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsAPFilterEtherType'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsAPFilterRowStatus'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsStrictSubnetAdherence'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsSLPEnabled'), ('HIPATH-WIRELESS-HWC-MIB', 'imagePath36xx'), ('HIPATH-WIRELESS-HWC-MIB', 'imagePath26xx'), ('HIPATH-WIRELESS-HWC-MIB', 'tftpSever'), ('HIPATH-WIRELESS-HWC-MIB', 'imageVersionOfap26xx'), ('HIPATH-WIRELESS-HWC-MIB', 'imageVersionOfngap36xx'), ('HIPATH-WIRELESS-HWC-MIB', 'topoExceptionFiterName'), ('HIPATH-WIRELESS-HWC-MIB', 'topoExceptionStatPktsDenied'), ('HIPATH-WIRELESS-HWC-MIB', 'topoExceptionStatPktsAllowed'), ('HIPATH-WIRELESS-HWC-MIB', 'synchronizeSystemConfig'), ('HIPATH-WIRELESS-HWC-MIB', 'availabilityStatus'), ('HIPATH-WIRELESS-HWC-MIB', 'pairIPAddress'), ('HIPATH-WIRELESS-HWC-MIB', 'hwcAvailabilityRank'), ('HIPATH-WIRELESS-HWC-MIB', 'fastFailover'), ('HIPATH-WIRELESS-HWC-MIB', 'synchronizeGuestPort'), ('HIPATH-WIRELESS-HWC-MIB', 'tunnelStatsTxBytes'), ('HIPATH-WIRELESS-HWC-MIB', 'apRegistrationRequests'), ('HIPATH-WIRELESS-HWC-MIB', 'vnForeignClients'), ('HIPATH-WIRELESS-HWC-MIB', 'vnLocalClients'), ('HIPATH-WIRELESS-HWC-MIB', 'apStatsSessionDuration'), ('HIPATH-WIRELESS-HWC-MIB', 'detectLinkFailure'), ('HIPATH-WIRELESS-HWC-MIB', 'apRegUseClusterEncryption'), ('HIPATH-WIRELESS-HWC-MIB', 'apRegClusterSharedSecret'), ('HIPATH-WIRELESS-HWC-MIB', 'apRegDiscoveryRetries'), ('HIPATH-WIRELESS-HWC-MIB', 'apRegDiscoveryInterval'), ('HIPATH-WIRELESS-HWC-MIB', 'apRegTelnetPassword'), ('HIPATH-WIRELESS-HWC-MIB', 'apRegSSHPassword'), ('HIPATH-WIRELESS-HWC-MIB', 'apRegSecurityMode'), ('HIPATH-WIRELESS-HWC-MIB', 'vnTotalClients'), ('HIPATH-WIRELESS-HWC-MIB', 'tunnelStatsRxBytes'), ('HIPATH-WIRELESS-HWC-MIB', 'tunnelStatsTxRxBytes'), ('HIPATH-WIRELESS-HWC-MIB', 'tunnelsTxRxBytes'), ('HIPATH-WIRELESS-HWC-MIB', 'clearAccessRejectMsg'), ('HIPATH-WIRELESS-HWC-MIB', 'armCount'), ('HIPATH-WIRELESS-HWC-MIB', 'armReplyMessage'), ('HIPATH-WIRELESS-HWC-MIB', 'apLinkTimeout'), ('HIPATH-WIRELESS-HWC-MIB', 'apFastFailoverEnable'), ('HIPATH-WIRELESS-HWC-MIB', 'topoStatFrameTooLongErrors'), ('HIPATH-WIRELESS-HWC-MIB', 'topoStatFrameChkSeqErrors'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsConfigWLANID'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanVNSID'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanPrivPrivacyType'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanPrivWEPKeyIndex'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanPrivWEPKeyLength'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanPrivWEPKey'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanPrivWPAv1EncryptionType'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanPrivWPAv2EncryptionType')], [('HIPATH-WIRELESS-HWC-MIB', 'wlanPrivKeyManagement'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanPrivBroadcastRekeying'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanPrivRekeyInterval'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanPrivGroupKPSR'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanPrivWPAPSK'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanPrivWPAversion'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanPrivfastTransition'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanPrivManagementFrameProtection'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanAuthType'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanAuthMacBasedAuth'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanAuthMACBasedAuthOnRoam'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanAuthAutoAuthAuthorizedUser'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanAuthAllowUnauthorizedUser'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanAuthRadiusIncludeAP'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanAuthRadiusIncludeVNS'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanAuthRadiusIncludeSSID'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanAuthRadiusIncludePolicy'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanAuthRadiusIncludeTopology'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanAuthRadiusIncludeIngressRC'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanAuthRadiusIncludeEgressRC'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanAuthCollectAcctInformation'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanAuthReplaceCalledStationIDWithZone'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanAuthRadiusAcctAfterMacBaseAuthorization'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanAuthRadiusTimeoutRole'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanAuthRadiusOperatorNameSpace'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanAuthRadiusOperatorName'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanAuthMACBasedAuthReAuthOnAreaRoam'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusName'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusUsage'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusPriority'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusPort'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusRetries'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusTimeout'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusNASUseVnsIP'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusNASIP'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusNASIDUseVNSName'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusNASID'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusAuthType'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanCPAuthType'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanCP802HttpRedirect'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanCPExtConnection'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanCPExtPort'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanCPExtEnableHttps'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanCPExtSharedSecret'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanCPExtTosOverride'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanCPExtTosValue'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanCPGuestAccLifetime'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanCPGuestSessionLifetime'), ('HIPATH-WIRELESS-HWC-MIB', 'loadGrpRadiosRadio1'), ('HIPATH-WIRELESS-HWC-MIB', 'loadGrpRadiosRadio2'), ('HIPATH-WIRELESS-HWC-MIB', 'loadGrpWlanAssigned'), ('HIPATH-WIRELESS-HWC-MIB', 'schedule'), ('HIPATH-WIRELESS-HWC-MIB', 'startHour'), ('HIPATH-WIRELESS-HWC-MIB', 'startMinute'), ('HIPATH-WIRELESS-HWC-MIB', 'duration'), ('HIPATH-WIRELESS-HWC-MIB', 'recurrenceDaily'), ('HIPATH-WIRELESS-HWC-MIB', 'recurrenceWeekly'), ('HIPATH-WIRELESS-HWC-MIB', 'recurrenceMonthly'), ('HIPATH-WIRELESS-HWC-MIB', 'apPlatforms'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanCPIntLogoffButton'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanCPIntStatusCheckButton'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanCPRedirectURL'), ('HIPATH-WIRELESS-HWC-MIB', 'apRadioProtocol'), ('HIPATH-WIRELESS-HWC-MIB', 'apRadioNumber'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanCPReplaceIPwithFQDN'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanCPSendLoginTo'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanCPGuestAllowedLifetimeAcct'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanCPGuestIDPrefix'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanCPGuestMinPassLength'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanCPGuestMaxConcurrentSession'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanCPExtAddIPtoURL'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanCPUseHTTPSforConnection'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanCPIdentity'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanCPCustomSpecificURL'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanCPSelectionOption'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanCPExtEncryption'), ('HIPATH-WIRELESS-HWC-MIB', 'radiusStrictMode'), ('HIPATH-WIRELESS-HWC-MIB', 'advancedFilteringMode'), ('HIPATH-WIRELESS-HWC-MIB', 'weakCipherEnable'), ('HIPATH-WIRELESS-HWC-MIB', 'stationEventType'), ('HIPATH-WIRELESS-HWC-MIB', 'stationMacAddress'), ('HIPATH-WIRELESS-HWC-MIB', 'stationIPAddress'), ('HIPATH-WIRELESS-HWC-MIB', 'stationAPName'), ('HIPATH-WIRELESS-HWC-MIB', 'stationAPSSID'), ('HIPATH-WIRELESS-HWC-MIB', 'stationDetailEvent'), ('HIPATH-WIRELESS-HWC-MIB', 'stationRoamedAPName'), ('HIPATH-WIRELESS-HWC-MIB', 'stationName'), ('HIPATH-WIRELESS-HWC-MIB', 'stationBSSID'), ('HIPATH-WIRELESS-HWC-MIB', 'stationEventTimeStamp'), ('HIPATH-WIRELESS-HWC-MIB', 'stationIPv6Address1'), ('HIPATH-WIRELESS-HWC-MIB', 'stationIPv6Address2'), ('HIPATH-WIRELESS-HWC-MIB', 'stationIPv6Address3'), ('HIPATH-WIRELESS-HWC-MIB', 'clientAutologinOption'), ('HIPATH-WIRELESS-HWC-MIB', 'radiusMacAddressFormatOption'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusServerName'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusServerUse'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusServerUsage'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusServerAuthNASIP'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusServerAuthNASId'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusServerAuthAuthType'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusServerAcctNASIP'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusServerAcctNASId'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusServerAcctSIAR'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusServerMacNASIP'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusServerMacNASId'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusServerMacAuthType'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusServerMacPW'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusServerAuthUseVNSIPAddr'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusServerAuthUseVNSName'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusServerAcctUseVNSIPAddr'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusServerAcctUseVNSName'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusServerMacUseVNSIPAddr'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadiusServerMacUseVNSName')]]: if getattr(mibBuilder, 'version', 0) < (4, 4, 2): hi_path_wireless_hwc_group = hiPathWirelessHWCGroup.setObjects(*_hiPathWirelessHWCGroup_obj) else: hi_path_wireless_hwc_group = hiPathWirelessHWCGroup.setObjects(*_hiPathWirelessHWCGroup_obj, **dict(append=True)) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): hi_path_wireless_hwc_group = hiPathWirelessHWCGroup.setStatus('current') if mibBuilder.loadTexts: hiPathWirelessHWCGroup.setDescription('Conformance groups.') hi_path_wireless_hwc_alarms = notification_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 3)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'hiPathWirelessLogAlarm'), ('HIPATH-WIRELESS-HWC-MIB', 'stationEventAlarm'), ('HIPATH-WIRELESS-HWC-MIB', 'apTunnelAlarm')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): hi_path_wireless_hwc_alarms = hiPathWirelessHWCAlarms.setStatus('current') if mibBuilder.loadTexts: hiPathWirelessHWCAlarms.setDescription('Conformance information for the alarm groups.') hi_path_wireless_hwc_obsolete = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 4)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'vnsWDSRFAPName'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsWDSRFbgService'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsWDSRFaService'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsWDSRFPreferredParent'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsWDSRFBackupParent'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsWDSRFBridge'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsRateControlProfInd'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsRateControlProfName'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsRateControlCIR'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsRateControlCBS'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsExceptionFiterName'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsExceptionStatPktsDenied'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsExceptionStatPktsAllowed'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsWDSStatAPName'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsWDSStatAPRole'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsWDSStatAPRadio'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsWDSStatAPParent'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsWDSStatSSID'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsWDSStatRxFrame'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsWDSStatTxFrame'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsWDSStatRxError'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsWDSStatTxError'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsWDSStatRxRSSI'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsWDSStatRxRate'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsAssignmentMode'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsParentIfIndex'), ('HIPATH-WIRELESS-HWC-MIB', 'externalRadiusServerName'), ('HIPATH-WIRELESS-HWC-MIB', 'externalRadiusServerAddress'), ('HIPATH-WIRELESS-HWC-MIB', 'externalRadiusServerSharedSecret'), ('HIPATH-WIRELESS-HWC-MIB', 'externalRadiusServerRowStatus'), ('HIPATH-WIRELESS-HWC-MIB', 'cpLoginLabel'), ('HIPATH-WIRELESS-HWC-MIB', 'cpPasswordLabel'), ('HIPATH-WIRELESS-HWC-MIB', 'cpHeaderURL'), ('HIPATH-WIRELESS-HWC-MIB', 'cpFooterURL'), ('HIPATH-WIRELESS-HWC-MIB', 'cpMessage'), ('HIPATH-WIRELESS-HWC-MIB', 'cpURL'), ('HIPATH-WIRELESS-HWC-MIB', 'loadGroupLoadControl'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsWDSStatTxRate'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsRateControlProfile'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsStatName'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsStatTxPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsStatRxPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsStatTxOctects'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsStatRxOctects'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsStatMulticastTxPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsStatMulticastRxPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsStatBroadcastTxPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsStatBroadcastRxPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsStatRadiusTotRequests'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsStatRadiusReqFailed'), ('HIPATH-WIRELESS-HWC-MIB', 'vnsStatRadiusReqRejected')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): hi_path_wireless_hwc_obsolete = hiPathWirelessHWCObsolete.setStatus('obsolete') if mibBuilder.loadTexts: hiPathWirelessHWCObsolete.setDescription('List of object that EWC does not anymore support.') wireless_ewc_groups = mib_identifier((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5)) physical_ports_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 1)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'portMgmtTrafficEnable'), ('HIPATH-WIRELESS-HWC-MIB', 'portDuplexMode'), ('HIPATH-WIRELESS-HWC-MIB', 'portFunction'), ('HIPATH-WIRELESS-HWC-MIB', 'portName'), ('HIPATH-WIRELESS-HWC-MIB', 'portIpAddress'), ('HIPATH-WIRELESS-HWC-MIB', 'portMask'), ('HIPATH-WIRELESS-HWC-MIB', 'portVlanID'), ('HIPATH-WIRELESS-HWC-MIB', 'portDHCPEnable'), ('HIPATH-WIRELESS-HWC-MIB', 'portDHCPGateway'), ('HIPATH-WIRELESS-HWC-MIB', 'portDHCPDomain'), ('HIPATH-WIRELESS-HWC-MIB', 'portDHCPDefaultLease'), ('HIPATH-WIRELESS-HWC-MIB', 'portDHCPMaxLease'), ('HIPATH-WIRELESS-HWC-MIB', 'portDHCPDnsServers'), ('HIPATH-WIRELESS-HWC-MIB', 'portDHCPWins'), ('HIPATH-WIRELESS-HWC-MIB', 'portEnabled'), ('HIPATH-WIRELESS-HWC-MIB', 'portMacAddress')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): physical_ports_group = physicalPortsGroup.setStatus('deprecated') if mibBuilder.loadTexts: physicalPortsGroup.setDescription('Physical ports and their attributes. ') phy_dhcp_range_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 2)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'phyDHCPRangeIndex'), ('HIPATH-WIRELESS-HWC-MIB', 'phyDHCPRangeStart'), ('HIPATH-WIRELESS-HWC-MIB', 'phyDHCPRangeEnd'), ('HIPATH-WIRELESS-HWC-MIB', 'phyDHCPRangeType'), ('HIPATH-WIRELESS-HWC-MIB', 'phyDHCPRangeStatus')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): phy_dhcp_range_group = phyDHCPRangeGroup.setStatus('deprecated') if mibBuilder.loadTexts: phyDHCPRangeGroup.setDescription('DHCP objects and attributes associated to physical ports. ') layer_two_port_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 3)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'layerTwoPortName'), ('HIPATH-WIRELESS-HWC-MIB', 'layerTwoPortMacAddress'), ('HIPATH-WIRELESS-HWC-MIB', 'layerTwoPortMgmtState')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): layer_two_port_group = layerTwoPortGroup.setStatus('current') if mibBuilder.loadTexts: layerTwoPortGroup.setDescription('Collection of layer two ports objects.') mu_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 4)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'muMACAddress'), ('HIPATH-WIRELESS-HWC-MIB', 'muIPAddress'), ('HIPATH-WIRELESS-HWC-MIB', 'muUser'), ('HIPATH-WIRELESS-HWC-MIB', 'muState'), ('HIPATH-WIRELESS-HWC-MIB', 'muAPSerialNo'), ('HIPATH-WIRELESS-HWC-MIB', 'muVnsSSID'), ('HIPATH-WIRELESS-HWC-MIB', 'muTxPackets'), ('HIPATH-WIRELESS-HWC-MIB', 'muRxPackets'), ('HIPATH-WIRELESS-HWC-MIB', 'muTxOctets'), ('HIPATH-WIRELESS-HWC-MIB', 'muRxOctets'), ('HIPATH-WIRELESS-HWC-MIB', 'muDuration'), ('HIPATH-WIRELESS-HWC-MIB', 'muAPName'), ('HIPATH-WIRELESS-HWC-MIB', 'muWLANID'), ('HIPATH-WIRELESS-HWC-MIB', 'muConnectionProtocol'), ('HIPATH-WIRELESS-HWC-MIB', 'muTopologyName'), ('HIPATH-WIRELESS-HWC-MIB', 'muPolicyName'), ('HIPATH-WIRELESS-HWC-MIB', 'muDefaultCoS'), ('HIPATH-WIRELESS-HWC-MIB', 'muConnectionCapability'), ('HIPATH-WIRELESS-HWC-MIB', 'muBSSIDMac'), ('HIPATH-WIRELESS-HWC-MIB', 'muDot11ConnectionCapability')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): mu_group = muGroup.setStatus('current') if mibBuilder.loadTexts: muGroup.setDescription('MU attributes associated to EWC.') ap_stats_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 5)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'apInUcastPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'apInNUcastPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'apInOctets'), ('HIPATH-WIRELESS-HWC-MIB', 'apInErrors'), ('HIPATH-WIRELESS-HWC-MIB', 'apInDiscards'), ('HIPATH-WIRELESS-HWC-MIB', 'apOutUcastPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'apOutNUcastPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'apOutOctets'), ('HIPATH-WIRELESS-HWC-MIB', 'apOutErrors'), ('HIPATH-WIRELESS-HWC-MIB', 'apOutDiscards'), ('HIPATH-WIRELESS-HWC-MIB', 'apUpTime'), ('HIPATH-WIRELESS-HWC-MIB', 'apCredentialType'), ('HIPATH-WIRELESS-HWC-MIB', 'apCertificateExpiry'), ('HIPATH-WIRELESS-HWC-MIB', 'apStatsMuCounts'), ('HIPATH-WIRELESS-HWC-MIB', 'apStatsSessionDuration'), ('HIPATH-WIRELESS-HWC-MIB', 'apTotalStationsA'), ('HIPATH-WIRELESS-HWC-MIB', 'apTotalStationsB'), ('HIPATH-WIRELESS-HWC-MIB', 'apTotalStationsG'), ('HIPATH-WIRELESS-HWC-MIB', 'apTotalStationsN50'), ('HIPATH-WIRELESS-HWC-MIB', 'apTotalStationsN24'), ('HIPATH-WIRELESS-HWC-MIB', 'apInvalidPolicyCount'), ('HIPATH-WIRELESS-HWC-MIB', 'apInterfaceMTU'), ('HIPATH-WIRELESS-HWC-MIB', 'apEffectiveTunnelMTU'), ('HIPATH-WIRELESS-HWC-MIB', 'apTotalStationsAC'), ('HIPATH-WIRELESS-HWC-MIB', 'apTotalStationsAInOctets'), ('HIPATH-WIRELESS-HWC-MIB', 'apTotalStationsAOutOctets'), ('HIPATH-WIRELESS-HWC-MIB', 'apTotalStationsBInOctets'), ('HIPATH-WIRELESS-HWC-MIB', 'apTotalStationsBOutOctets'), ('HIPATH-WIRELESS-HWC-MIB', 'apTotalStationsGInOctets'), ('HIPATH-WIRELESS-HWC-MIB', 'apTotalStationsGOutOctets'), ('HIPATH-WIRELESS-HWC-MIB', 'apTotalStationsN50InOctets'), ('HIPATH-WIRELESS-HWC-MIB', 'apTotalStationsN50OutOctets'), ('HIPATH-WIRELESS-HWC-MIB', 'apTotalStationsN24InOctets'), ('HIPATH-WIRELESS-HWC-MIB', 'apTotalStationsN24OutOctets'), ('HIPATH-WIRELESS-HWC-MIB', 'apTotalStationsACInOctets'), ('HIPATH-WIRELESS-HWC-MIB', 'apTotalStationsACOutOctets'), ('HIPATH-WIRELESS-HWC-MIB', 'apRadioStatusChannel'), ('HIPATH-WIRELESS-HWC-MIB', 'apRadioStatusChannelWidth'), ('HIPATH-WIRELESS-HWC-MIB', 'apRadioStatusChannelOffset'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfRadioPrevPeakChannelUtilization'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfRadioCurPeakChannelUtilization'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfRadioAverageChannelUtilization'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfRadioCurrentChannelUtilization'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfRadioPrevPeakRSS'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfRadioCurPeakRSS'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfRadioAverageRSS'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfRadioCurrentRSS'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfRadioPrevPeakSNR'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfRadioCurPeakSNR'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfRadioAverageSNR'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfRadioCurrentSNR'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfRadioPrevPeakPktRetx'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfRadioCurPeakPktRetx'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfRadioAveragePktRetx'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfRadioCurrentPktRetx'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfRadioPktRetx'), ('HIPATH-WIRELESS-HWC-MIB', 'apAccPrevPeakAssocReqRx'), ('HIPATH-WIRELESS-HWC-MIB', 'apAccCurPeakAssocReqRx'), ('HIPATH-WIRELESS-HWC-MIB', 'apAccAverageAssocReqRx'), ('HIPATH-WIRELESS-HWC-MIB', 'apAccCurrentAssocReqRx'), ('HIPATH-WIRELESS-HWC-MIB', 'apAccAssocReqRx'), ('HIPATH-WIRELESS-HWC-MIB', 'apAccPrevPeakReassocReqRx'), ('HIPATH-WIRELESS-HWC-MIB', 'apAccCurPeakReassocReqRx'), ('HIPATH-WIRELESS-HWC-MIB', 'apAccAverageReassocReqRx'), ('HIPATH-WIRELESS-HWC-MIB', 'apAccCurrentReassocReqRx'), ('HIPATH-WIRELESS-HWC-MIB', 'apAccReassocReqRx'), ('HIPATH-WIRELESS-HWC-MIB', 'apAccPrevPeakDisassocDeauthReqTx'), ('HIPATH-WIRELESS-HWC-MIB', 'apAccCurPeakDisassocDeauthReqTx'), ('HIPATH-WIRELESS-HWC-MIB', 'apAccAverageDisassocDeauthReqTx'), ('HIPATH-WIRELESS-HWC-MIB', 'apAccCurrentDisassocDeauthReqTx'), ('HIPATH-WIRELESS-HWC-MIB', 'apAccDisassocDeauthReqTx'), ('HIPATH-WIRELESS-HWC-MIB', 'apAccPrevPeakDisassocDeauthReqRx'), ('HIPATH-WIRELESS-HWC-MIB', 'apAccCurPeakDisassocDeauthReqRx'), ('HIPATH-WIRELESS-HWC-MIB', 'apAccAverageDisassocDeauthReqRx'), ('HIPATH-WIRELESS-HWC-MIB', 'apAccCurrentDisassocDeauthReqRx'), ('HIPATH-WIRELESS-HWC-MIB', 'apAccDisassocDeauthReqRx'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfWlanPrevPeakClientsPerSec'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfWlanCurPeakClientsPerSec'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfWlanAverageClientsPerSec'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfWlanCurrentClientsPerSec'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfWlanPrevPeakULOctetsPerSec'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfWlanCurPeakULOctetsPerSec'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfWlanAverageULOctetsPerSec'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfWlanCurrentULOctetsPerSec'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfWlanULOctets'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfWlanPrevPeakULPktsPerSec'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfWlanCurPeakULPktsPerSec'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfWlanAverageULPktsPerSec'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfWlanCurrentULPktsPerSec'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfWlanULPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfWlanPrevPeakDLOctetsPerSec'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfWlanCurPeakDLOctetsPerSec'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfWlanAverageDLOctetsPerSec'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfWlanCurrentDLOctetsPerSec'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfWlanDLOctets'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfWlanPrevPeakDLPktsPerSec'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfWlanCurPeakDLPktsPerSec'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfWlanAverageDLPktsPerSec'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfWlanCurrentDLPktsPerSec'), ('HIPATH-WIRELESS-HWC-MIB', 'apPerfWlanDLPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'apChnlUtilPrevPeakUtilization'), ('HIPATH-WIRELESS-HWC-MIB', 'apChnlUtilCurPeakUtilization'), ('HIPATH-WIRELESS-HWC-MIB', 'apChnlUtilAverageUtilization'), ('HIPATH-WIRELESS-HWC-MIB', 'apChnlUtilCurrentUtilization'), ('HIPATH-WIRELESS-HWC-MIB', 'nearbyApInfo'), ('HIPATH-WIRELESS-HWC-MIB', 'nearbyApBSSID'), ('HIPATH-WIRELESS-HWC-MIB', 'nearbyApChannel'), ('HIPATH-WIRELESS-HWC-MIB', 'nearbyApRSS')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): ap_stats_group = apStatsGroup.setStatus('current') if mibBuilder.loadTexts: apStatsGroup.setDescription('Collection of objects and attributes related to AP statistics.') mu_acl_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 6)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'muACLRowStatus'), ('HIPATH-WIRELESS-HWC-MIB', 'muACLMACAddress'), ('HIPATH-WIRELESS-HWC-MIB', 'muACLType')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): mu_acl_group = muACLGroup.setStatus('current') if mibBuilder.loadTexts: muACLGroup.setDescription('List of objects for creation of blacklist/whitelist.') site_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 7)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'siteID'), ('HIPATH-WIRELESS-HWC-MIB', 'siteName'), ('HIPATH-WIRELESS-HWC-MIB', 'siteLocalRadiusAuthentication'), ('HIPATH-WIRELESS-HWC-MIB', 'siteDefaultDNSServer'), ('HIPATH-WIRELESS-HWC-MIB', 'siteMaxEntries'), ('HIPATH-WIRELESS-HWC-MIB', 'siteNumEntries'), ('HIPATH-WIRELESS-HWC-MIB', 'siteTableNextAvailableIndex'), ('HIPATH-WIRELESS-HWC-MIB', 'siteEnableSecureTunnel'), ('HIPATH-WIRELESS-HWC-MIB', 'siteReplaceStnIDwithSiteName'), ('HIPATH-WIRELESS-HWC-MIB', 'siteRowStatus'), ('HIPATH-WIRELESS-HWC-MIB', 'siteEncryptCommAPtoController'), ('HIPATH-WIRELESS-HWC-MIB', 'siteEncryptCommBetweenAPs'), ('HIPATH-WIRELESS-HWC-MIB', 'siteBandPreferenceEnable'), ('HIPATH-WIRELESS-HWC-MIB', 'siteLoadControlEnableR1'), ('HIPATH-WIRELESS-HWC-MIB', 'siteLoadControlEnableR2'), ('HIPATH-WIRELESS-HWC-MIB', 'siteMaxClientR1'), ('HIPATH-WIRELESS-HWC-MIB', 'siteMaxClientR2'), ('HIPATH-WIRELESS-HWC-MIB', 'siteStrictLimitEnableR1'), ('HIPATH-WIRELESS-HWC-MIB', 'siteStrictLimitEnableR2')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): site_group = siteGroup.setStatus('current') if mibBuilder.loadTexts: siteGroup.setDescription('A collection of objects providing Site creation and its attributes.') site_policy_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 8)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'sitePolicyMember')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): site_policy_group = sitePolicyGroup.setStatus('current') if mibBuilder.loadTexts: sitePolicyGroup.setDescription('Objects defining the association of policies to sites.') site_cos_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 9)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'siteCoSMember')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): site_cos_group = siteCosGroup.setStatus('current') if mibBuilder.loadTexts: siteCosGroup.setDescription('Objects defining the association of policies to sites.') site_ap_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 10)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'siteAPMember')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): site_ap_group = siteAPGroup.setStatus('current') if mibBuilder.loadTexts: siteAPGroup.setDescription('Objects defining the association of policies to sites.') site_wlan_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 11)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'siteWlanApRadioAssigned')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): site_wlan_group = siteWlanGroup.setStatus('current') if mibBuilder.loadTexts: siteWlanGroup.setDescription('Objects defining the association of policies to sites.') ap_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 12)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'apIndex'), ('HIPATH-WIRELESS-HWC-MIB', 'apName'), ('HIPATH-WIRELESS-HWC-MIB', 'apDesc'), ('HIPATH-WIRELESS-HWC-MIB', 'apSerialNumber'), ('HIPATH-WIRELESS-HWC-MIB', 'apPortifIndex'), ('HIPATH-WIRELESS-HWC-MIB', 'apWiredIfIndex'), ('HIPATH-WIRELESS-HWC-MIB', 'apSoftwareVersion'), ('HIPATH-WIRELESS-HWC-MIB', 'apSpecific'), ('HIPATH-WIRELESS-HWC-MIB', 'apBroadcastDisassociate'), ('HIPATH-WIRELESS-HWC-MIB', 'apRowStatus'), ('HIPATH-WIRELESS-HWC-MIB', 'apVlanID'), ('HIPATH-WIRELESS-HWC-MIB', 'apIpAssignmentType'), ('HIPATH-WIRELESS-HWC-MIB', 'apIfMAC'), ('HIPATH-WIRELESS-HWC-MIB', 'apHwVersion'), ('HIPATH-WIRELESS-HWC-MIB', 'apSwVersion'), ('HIPATH-WIRELESS-HWC-MIB', 'apEnvironment'), ('HIPATH-WIRELESS-HWC-MIB', 'apHome'), ('HIPATH-WIRELESS-HWC-MIB', 'apRole'), ('HIPATH-WIRELESS-HWC-MIB', 'apState'), ('HIPATH-WIRELESS-HWC-MIB', 'apStatus'), ('HIPATH-WIRELESS-HWC-MIB', 'apPollTimeout'), ('HIPATH-WIRELESS-HWC-MIB', 'apPollInterval'), ('HIPATH-WIRELESS-HWC-MIB', 'apTelnetAccess'), ('HIPATH-WIRELESS-HWC-MIB', 'apMaintainClientSession'), ('HIPATH-WIRELESS-HWC-MIB', 'apRestartServiceContAbsent'), ('HIPATH-WIRELESS-HWC-MIB', 'apHostname'), ('HIPATH-WIRELESS-HWC-MIB', 'apLocation'), ('HIPATH-WIRELESS-HWC-MIB', 'apStaticMTUsize'), ('HIPATH-WIRELESS-HWC-MIB', 'apSiteID'), ('HIPATH-WIRELESS-HWC-MIB', 'apZone'), ('HIPATH-WIRELESS-HWC-MIB', 'apLLDP'), ('HIPATH-WIRELESS-HWC-MIB', 'apLEDMode'), ('HIPATH-WIRELESS-HWC-MIB', 'apLocationbasedService'), ('HIPATH-WIRELESS-HWC-MIB', 'apSecureTunnel'), ('HIPATH-WIRELESS-HWC-MIB', 'apEncryptCntTraffic'), ('HIPATH-WIRELESS-HWC-MIB', 'apIpAddress'), ('HIPATH-WIRELESS-HWC-MIB', 'apMICErrorWarning'), ('HIPATH-WIRELESS-HWC-MIB', 'apIPAddress'), ('HIPATH-WIRELESS-HWC-MIB', 'apSecureDataTunnelType'), ('HIPATH-WIRELESS-HWC-MIB', 'apIPMulticastAssembly'), ('HIPATH-WIRELESS-HWC-MIB', 'apSSHConnection')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): ap_group = apGroup.setStatus('current') if mibBuilder.loadTexts: apGroup.setDescription('List of objects defining configuration attributes of an AP.') wlan_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 13)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'wlanID'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRowStatus'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanServiceType'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanName'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanSSID'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanSynchronize'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanEnabled'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanDefaultTopologyID'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanSessionTimeout'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanIdleTimeoutPreAuth'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanIdleSessionPostAuth'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanSupressSSID'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanDot11hSupport'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanDot11hClientPowerReduction'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanProcessClientIE'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanEngerySaveMode'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanBlockMuToMuTraffic'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRemoteable'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanVNSID'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanMaxEntries'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanRadioManagement11k'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanBeaconReport'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanQuietIE'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanMirrorN'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanNetFlow'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanAppVisibility'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanNumEntries'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanTableNextAvailableIndex')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): wlan_group = wlanGroup.setStatus('current') if mibBuilder.loadTexts: wlanGroup.setDescription('List of objects defining configuration attributes of a WLAN.') wlan_stats_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 14)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'wlanStatsAssociatedClients'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanStatsRadiusTotRequests'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanStatsRadiusReqFailed'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanStatsRadiusReqRejected'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanStatsID')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): wlan_stats_group = wlanStatsGroup.setStatus('current') if mibBuilder.loadTexts: wlanStatsGroup.setDescription('List of objects defining configuration attributes of a WLAN.') topology_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 15)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'topologyName'), ('HIPATH-WIRELESS-HWC-MIB', 'topologyMode'), ('HIPATH-WIRELESS-HWC-MIB', 'topologyTagged'), ('HIPATH-WIRELESS-HWC-MIB', 'topologyVlanID'), ('HIPATH-WIRELESS-HWC-MIB', 'topologyEgressPort'), ('HIPATH-WIRELESS-HWC-MIB', 'topologyLayer3'), ('HIPATH-WIRELESS-HWC-MIB', 'topologyIPAddress'), ('HIPATH-WIRELESS-HWC-MIB', 'topologyIPMask'), ('HIPATH-WIRELESS-HWC-MIB', 'topologyMTUsize'), ('HIPATH-WIRELESS-HWC-MIB', 'topologyGateway'), ('HIPATH-WIRELESS-HWC-MIB', 'topologyDHCPUsage'), ('HIPATH-WIRELESS-HWC-MIB', 'topologyAPRegistration'), ('HIPATH-WIRELESS-HWC-MIB', 'topologyManagementTraffic'), ('HIPATH-WIRELESS-HWC-MIB', 'topologySynchronize'), ('HIPATH-WIRELESS-HWC-MIB', 'topologySyncGateway'), ('HIPATH-WIRELESS-HWC-MIB', 'topologySyncMask'), ('HIPATH-WIRELESS-HWC-MIB', 'topologySyncIPStart'), ('HIPATH-WIRELESS-HWC-MIB', 'topologySyncIPEnd'), ('HIPATH-WIRELESS-HWC-MIB', 'topologyStaticIPv6Address'), ('HIPATH-WIRELESS-HWC-MIB', 'topologyLinkLocalIPv6Address'), ('HIPATH-WIRELESS-HWC-MIB', 'topologyPreFixLength'), ('HIPATH-WIRELESS-HWC-MIB', 'topologyIPv6Gateway'), ('HIPATH-WIRELESS-HWC-MIB', 'topologyDynamicEgress'), ('HIPATH-WIRELESS-HWC-MIB', 'topologyIsGroup'), ('HIPATH-WIRELESS-HWC-MIB', 'topologyGroupMembers'), ('HIPATH-WIRELESS-HWC-MIB', 'topologyMemberId')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): topology_group = topologyGroup.setStatus('current') if mibBuilder.loadTexts: topologyGroup.setDescription('List of objects defining configuration attributes of a WLAN.') topology_stat_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 16)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'topologyName'), ('HIPATH-WIRELESS-HWC-MIB', 'topoStatName'), ('HIPATH-WIRELESS-HWC-MIB', 'topoStatTxPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'topoStatRxPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'topoStatTxOctets'), ('HIPATH-WIRELESS-HWC-MIB', 'topoStatRxOctets'), ('HIPATH-WIRELESS-HWC-MIB', 'topoStatMulticastTxPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'topoStatMulticastRxPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'topoStatBroadcastTxPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'topoStatBroadcastRxPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'topoStatFrameChkSeqErrors'), ('HIPATH-WIRELESS-HWC-MIB', 'topoStatFrameTooLongErrors'), ('HIPATH-WIRELESS-HWC-MIB', 'topoWireStatName'), ('HIPATH-WIRELESS-HWC-MIB', 'topoWireStatTxPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'topoWireStatRxPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'topoWireStatTxOctets'), ('HIPATH-WIRELESS-HWC-MIB', 'topoWireStatRxOctets'), ('HIPATH-WIRELESS-HWC-MIB', 'topoWireStatMulticastTxPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'topoWireStatMulticastRxPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'topoWireStatBroadcastTxPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'topoWireStatBroadcastRxPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'topoWireStatFrameChkSeqErrors'), ('HIPATH-WIRELESS-HWC-MIB', 'topoWireStatFrameTooLongErrors'), ('HIPATH-WIRELESS-HWC-MIB', 'topoCompleteStatName'), ('HIPATH-WIRELESS-HWC-MIB', 'topoCompleteStatTxPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'topoCompleteStatRxPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'topoCompleteStatTxOctets'), ('HIPATH-WIRELESS-HWC-MIB', 'topoCompleteStatRxOctets'), ('HIPATH-WIRELESS-HWC-MIB', 'topoCompleteStatMulticastTxPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'topoCompleteStatMulticastRxPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'topoCompleteStatBroadcastTxPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'topoCompleteStatBroadcastRxPkts'), ('HIPATH-WIRELESS-HWC-MIB', 'topoCompleteStatFrameChkSeqErrors'), ('HIPATH-WIRELESS-HWC-MIB', 'topoCompleteStatFrameTooLongErrors')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): topology_stat_group = topologyStatGroup.setStatus('current') if mibBuilder.loadTexts: topologyStatGroup.setDescription('List of objects for defining topology statics. ') load_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 17)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'loadGroupID'), ('HIPATH-WIRELESS-HWC-MIB', 'loadGroupName'), ('HIPATH-WIRELESS-HWC-MIB', 'loadGroupType'), ('HIPATH-WIRELESS-HWC-MIB', 'loadGroupBandPreference'), ('HIPATH-WIRELESS-HWC-MIB', 'loadGroupClientCountRadio1'), ('HIPATH-WIRELESS-HWC-MIB', 'loadGroupClientCountRadio2'), ('HIPATH-WIRELESS-HWC-MIB', 'loadGroupLoadControlEnableR1'), ('HIPATH-WIRELESS-HWC-MIB', 'loadGroupLoadControlEnableR2'), ('HIPATH-WIRELESS-HWC-MIB', 'loadGroupLoadControlStrictLimitR1'), ('HIPATH-WIRELESS-HWC-MIB', 'loadGroupLoadControlStrictLimitR2')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): load_group = loadGroup.setStatus('current') if mibBuilder.loadTexts: loadGroup.setDescription('A collection of objects providing Load Group creation and its attributes.') wids_wips_objects_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 18)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'mitigatorAnalysisEngine'), ('HIPATH-WIRELESS-HWC-MIB', 'activeThreatsCounts'), ('HIPATH-WIRELESS-HWC-MIB', 'uncategorizedAPCounts'), ('HIPATH-WIRELESS-HWC-MIB', 'friendlyAPCounts'), ('HIPATH-WIRELESS-HWC-MIB', 'scanGroupMaxEntries'), ('HIPATH-WIRELESS-HWC-MIB', 'scanGroupsCurrentEntries')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): wids_wips_objects_group = widsWipsObjectsGroup.setStatus('current') if mibBuilder.loadTexts: widsWipsObjectsGroup.setDescription('Objects defining the state of WIDS-WIPS for the controller.') wids_wips_engine_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 19)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'widsWipsEngineRowStatus'), ('HIPATH-WIRELESS-HWC-MIB', 'widsWipsEngineControllerIPAddress'), ('HIPATH-WIRELESS-HWC-MIB', 'widsWipsEnginePollInterval'), ('HIPATH-WIRELESS-HWC-MIB', 'widsWipsEnginePollRetry')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): wids_wips_engine_group = widsWipsEngineGroup.setStatus('current') if mibBuilder.loadTexts: widsWipsEngineGroup.setDescription('Set of objects defining attributes of a WIDS-WIPS engine.') out_of_service_scan_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 20)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'outOfSrvScanGrpName'), ('HIPATH-WIRELESS-HWC-MIB', 'outOfSrvScanGrpRadio'), ('HIPATH-WIRELESS-HWC-MIB', 'outOfSrvScanGrpChannelList'), ('HIPATH-WIRELESS-HWC-MIB', 'outOfSrvScanGrpScanType'), ('HIPATH-WIRELESS-HWC-MIB', 'outOfSrvScanGrpChannelDwellTime'), ('HIPATH-WIRELESS-HWC-MIB', 'outOfSrvScanGrpScanTimeInterval'), ('HIPATH-WIRELESS-HWC-MIB', 'outOfSrvScanGrpSecurityScan'), ('HIPATH-WIRELESS-HWC-MIB', 'outOfSrvScanGrpScanActivity'), ('HIPATH-WIRELESS-HWC-MIB', 'outOfSrvScanGrpScanRowStatus')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): out_of_service_scan_group = outOfServiceScanGroup.setStatus('current') if mibBuilder.loadTexts: outOfServiceScanGroup.setDescription('List of objects for defining out-of-service scan group.') in_service_scan_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 21)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'inSrvScanGrpName'), ('HIPATH-WIRELESS-HWC-MIB', 'inSrvScanGrpMaxConcurrentAttacksPerAP'), ('HIPATH-WIRELESS-HWC-MIB', 'inSrvScanGrpCounterMeasuresType'), ('HIPATH-WIRELESS-HWC-MIB', 'inSrvScanGrpScan2400MHzSelection'), ('HIPATH-WIRELESS-HWC-MIB', 'inSrvScanGrpScan5GHzSelection'), ('HIPATH-WIRELESS-HWC-MIB', 'inSrvScanGrpRowStatus'), ('HIPATH-WIRELESS-HWC-MIB', 'inSrvScanGrpSecurityThreats'), ('HIPATH-WIRELESS-HWC-MIB', 'inSrvScanGrpblockAdHocClientsPeriod'), ('HIPATH-WIRELESS-HWC-MIB', 'inSrvScanGrpClassifySourceIF'), ('HIPATH-WIRELESS-HWC-MIB', 'inSrvScanGrpDetectRogueAP'), ('HIPATH-WIRELESS-HWC-MIB', 'inSrvScanGrpListeningPort')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): in_service_scan_group = inServiceScanGroup.setStatus('current') if mibBuilder.loadTexts: inServiceScanGroup.setDescription('List of objects for defining in-service scan group.') scan_group_ap_assignment_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 22)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'scanGroupAPAssignApSerial'), ('HIPATH-WIRELESS-HWC-MIB', 'scanGroupAPAssignName'), ('HIPATH-WIRELESS-HWC-MIB', 'scanGroupAPAssignRadio1'), ('HIPATH-WIRELESS-HWC-MIB', 'scanGroupAPAssignRadio2'), ('HIPATH-WIRELESS-HWC-MIB', 'scanGroupAPAssignInactiveAP'), ('HIPATH-WIRELESS-HWC-MIB', 'scanGroupAPAssignAllowScanning'), ('HIPATH-WIRELESS-HWC-MIB', 'scanGroupAPAssignGroupName'), ('HIPATH-WIRELESS-HWC-MIB', 'scanGroupAPAssignAllowSpectrumAnalysis'), ('HIPATH-WIRELESS-HWC-MIB', 'scanGroupAPAssignControllerIPAddress'), ('HIPATH-WIRELESS-HWC-MIB', 'scanGroupAPAssignFordwardingService')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): scan_group_ap_assignment_group = scanGroupAPAssignmentGroup.setStatus('current') if mibBuilder.loadTexts: scanGroupAPAssignmentGroup.setDescription('List of objects for assignment of AP to scan group.') scan_ap_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 23)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'scanAPSerialNumber'), ('HIPATH-WIRELESS-HWC-MIB', 'scanAPControllerIPAddress'), ('HIPATH-WIRELESS-HWC-MIB', 'scanAPRowStatus'), ('HIPATH-WIRELESS-HWC-MIB', 'scanAPAcessPointName'), ('HIPATH-WIRELESS-HWC-MIB', 'scanAPProfileName'), ('HIPATH-WIRELESS-HWC-MIB', 'scanAPProfileType')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): scan_ap_group = scanAPGroup.setStatus('current') if mibBuilder.loadTexts: scanAPGroup.setDescription('List of objects for defining AP scan groups in EWC.') friendly_ap_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 24)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'friendlyAPMacAddress'), ('HIPATH-WIRELESS-HWC-MIB', 'friendlyAPSSID'), ('HIPATH-WIRELESS-HWC-MIB', 'friendlyAPDescription'), ('HIPATH-WIRELESS-HWC-MIB', 'friendlyAPManufacturer')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): friendly_ap_group = friendlyAPGroup.setStatus('current') if mibBuilder.loadTexts: friendlyAPGroup.setDescription('List of objects defining friendly APs identified during scanning time.') wlan_security_report_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 25)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'wlanSecurityReportFlag'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanSecurityReportUnsecureType'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanSecurityReportNotes'), ('HIPATH-WIRELESS-HWC-MIB', 'wlanUnsecuredWlanCounts')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): wlan_security_report_group = wlanSecurityReportGroup.setStatus('current') if mibBuilder.loadTexts: wlanSecurityReportGroup.setDescription('Set of objects defining attributes of security group report.') ap_antenna_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 26)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'apAntennanName'), ('HIPATH-WIRELESS-HWC-MIB', 'apAntennaType')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): ap_antenna_group = apAntennaGroup.setStatus('current') if mibBuilder.loadTexts: apAntennaGroup.setDescription('A collection of objects defining an antenna attributes for an AP.') mu_access_list_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 27)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'muAccessListMACAddress'), ('HIPATH-WIRELESS-HWC-MIB', 'muAccessListBitmaskLength'), ('HIPATH-WIRELESS-HWC-MIB', 'muAccessListRowStatus')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): mu_access_list_group = muAccessListGroup.setStatus('current') if mibBuilder.loadTexts: muAccessListGroup.setDescription('List of objects for creation of MU access list to block MU access, case of black list, or allow access, case of white list to wireless controller resources.') active_threat_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 28)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'activeThreatCategory'), ('HIPATH-WIRELESS-HWC-MIB', 'activeThreatDeviceMAC'), ('HIPATH-WIRELESS-HWC-MIB', 'activeThreatDateTime'), ('HIPATH-WIRELESS-HWC-MIB', 'activeThreatCounterMeasure'), ('HIPATH-WIRELESS-HWC-MIB', 'activeThreatAPName'), ('HIPATH-WIRELESS-HWC-MIB', 'activeThreatRSS'), ('HIPATH-WIRELESS-HWC-MIB', 'activeThreatExtraDetails'), ('HIPATH-WIRELESS-HWC-MIB', 'activeThreatThreat')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): active_threat_group = activeThreatGroup.setStatus('current') if mibBuilder.loadTexts: activeThreatGroup.setDescription('List of objects defining a discovered security threat.') countermeasure_ap_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 29)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'countermeasureAPName'), ('HIPATH-WIRELESS-HWC-MIB', 'countermeasureAPThreatCategory'), ('HIPATH-WIRELESS-HWC-MIB', 'countermeasureAPCountermeasure'), ('HIPATH-WIRELESS-HWC-MIB', 'countermeasureAPTime'), ('HIPATH-WIRELESS-HWC-MIB', 'countermeasureAPSerial')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): countermeasure_ap_group = countermeasureAPGroup.setStatus('current') if mibBuilder.loadTexts: countermeasureAPGroup.setDescription('List of objects defining APs taking part in countermeasure activities to thwart incoming threats.') blaclisted_client_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 30)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'blacklistedClientMAC'), ('HIPATH-WIRELESS-HWC-MIB', 'blacklistedClientStatTime'), ('HIPATH-WIRELESS-HWC-MIB', 'blacklistedClientEndTime'), ('HIPATH-WIRELESS-HWC-MIB', 'blacklistedClientReason')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): blaclisted_client_group = blaclistedClientGroup.setStatus('current') if mibBuilder.loadTexts: blaclistedClientGroup.setDescription('List of objects identifying blacklisted clients.') threat_summary_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 31)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'threatSummaryCategory'), ('HIPATH-WIRELESS-HWC-MIB', 'threatSummaryActiveThreat'), ('HIPATH-WIRELESS-HWC-MIB', 'threatSummaryHistoricalCounts')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): threat_summary_group = threatSummaryGroup.setStatus('current') if mibBuilder.loadTexts: threatSummaryGroup.setDescription('List of objects defining attributes of known discovered threat.') licensing_information_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 32)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'licenseRegulatoryDomain'), ('HIPATH-WIRELESS-HWC-MIB', 'licenseType'), ('HIPATH-WIRELESS-HWC-MIB', 'licenseDaysRemaining'), ('HIPATH-WIRELESS-HWC-MIB', 'licenseAvailableAP'), ('HIPATH-WIRELESS-HWC-MIB', 'licenseInServiceRadarAP'), ('HIPATH-WIRELESS-HWC-MIB', 'licenseMode'), ('HIPATH-WIRELESS-HWC-MIB', 'licenseLocalAP'), ('HIPATH-WIRELESS-HWC-MIB', 'licenseForeignAP'), ('HIPATH-WIRELESS-HWC-MIB', 'licenseLocalRadarAP'), ('HIPATH-WIRELESS-HWC-MIB', 'licenseForeignRadarAP')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): licensing_information_group = licensingInformationGroup.setStatus('current') if mibBuilder.loadTexts: licensingInformationGroup.setDescription('List of objects providing licensing information for the controller system.') stations_by_protocol_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 33)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'stationsByProtocolA'), ('HIPATH-WIRELESS-HWC-MIB', 'stationsByProtocolB'), ('HIPATH-WIRELESS-HWC-MIB', 'stationsByProtocolG'), ('HIPATH-WIRELESS-HWC-MIB', 'stationsByProtocolN24'), ('HIPATH-WIRELESS-HWC-MIB', 'stationsByProtocolN5'), ('HIPATH-WIRELESS-HWC-MIB', 'stationsByProtocolUnavailable'), ('HIPATH-WIRELESS-HWC-MIB', 'stationsByProtocolError'), ('HIPATH-WIRELESS-HWC-MIB', 'stationsByProtocolAC')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): stations_by_protocol_group = stationsByProtocolGroup.setStatus('current') if mibBuilder.loadTexts: stationsByProtocolGroup.setDescription('List of objects for aggregated MUs on a specific wireless channel.') ap_by_channel_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 34)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'apByChannelAPs')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): ap_by_channel_group = apByChannelGroup.setStatus('current') if mibBuilder.loadTexts: apByChannelGroup.setDescription('List of objects for aggregated access points on a wireless channel.') uncategorized_ap_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 35)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'uncategorizedAPDescption'), ('HIPATH-WIRELESS-HWC-MIB', 'uncategorizedAPManufacturer'), ('HIPATH-WIRELESS-HWC-MIB', 'uncategorizedAPClassify'), ('HIPATH-WIRELESS-HWC-MIB', 'uncategorizedAPSSID')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): uncategorized_ap_group = uncategorizedAPGroup.setStatus('current') if mibBuilder.loadTexts: uncategorizedAPGroup.setDescription('Objects defining uncategorized access points discovered by Radar application.') authorized_ap_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 36)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'authorizedAPDescription'), ('HIPATH-WIRELESS-HWC-MIB', 'authorizedAPManufacturer'), ('HIPATH-WIRELESS-HWC-MIB', 'authorizedAPClassify'), ('HIPATH-WIRELESS-HWC-MIB', 'authorizedAPRowStatus')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): authorized_ap_group = authorizedAPGroup.setStatus('current') if mibBuilder.loadTexts: authorizedAPGroup.setDescription('Objects defining authorized access points discovered by Radar application.') prohibited_ap_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 37)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'prohibitedAPCategory'), ('HIPATH-WIRELESS-HWC-MIB', 'prohibitedAPDescription'), ('HIPATH-WIRELESS-HWC-MIB', 'prohibitedAPManufacturer'), ('HIPATH-WIRELESS-HWC-MIB', 'prohibitedAPClassify'), ('HIPATH-WIRELESS-HWC-MIB', 'prohibitedAPRowStatus')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): prohibited_ap_group = prohibitedAPGroup.setStatus('current') if mibBuilder.loadTexts: prohibitedAPGroup.setDescription('Objects defining prohibited access points discovered by Radar application.') dedicated_scan_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 38)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'dedicatedScanGrpName'), ('HIPATH-WIRELESS-HWC-MIB', 'dedicatedScanGrpMaxConcurrentAttacksPerAP'), ('HIPATH-WIRELESS-HWC-MIB', 'dedicatedScanGrpCounterMeasures'), ('HIPATH-WIRELESS-HWC-MIB', 'dedicatedScanGrpScan2400MHzFreq'), ('HIPATH-WIRELESS-HWC-MIB', 'dedicatedScanGrpScan5GHzFreq'), ('HIPATH-WIRELESS-HWC-MIB', 'dedicatedScanGrpRowStatus'), ('HIPATH-WIRELESS-HWC-MIB', 'dedicatedScanGrpSecurityThreats'), ('HIPATH-WIRELESS-HWC-MIB', 'dedicatedScanGrpBlockAdHocPeriod'), ('HIPATH-WIRELESS-HWC-MIB', 'dedicatedScanGrpClassifySourceIF'), ('HIPATH-WIRELESS-HWC-MIB', 'dedicatedScanGrpDetectRogueAP'), ('HIPATH-WIRELESS-HWC-MIB', 'dedicatedScanGrpListeningPort')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): dedicated_scan_group = dedicatedScanGroup.setStatus('current') if mibBuilder.loadTexts: dedicatedScanGroup.setDescription('List of objects for defining dedicated scan group.') ap_radio_antenna_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 39)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'apRadioAntennaType'), ('HIPATH-WIRELESS-HWC-MIB', 'apRadioAntennaModel'), ('HIPATH-WIRELESS-HWC-MIB', 'apRadioAttenuation')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): ap_radio_antenna_group = apRadioAntennaGroup.setStatus('current') if mibBuilder.loadTexts: apRadioAntennaGroup.setDescription('A collection of objects defining an antenna attributes for an AP.') radius_fast_failover_events_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 40)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'fastFailoverEvents')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): radius_fast_failover_events_group = radiusFastFailoverEventsGroup.setStatus('current') if mibBuilder.loadTexts: radiusFastFailoverEventsGroup.setDescription('List of objects for defining radius FastFailoverEvents.') dhcp_relay_listeners_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 41)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'dhcpRelayListenersRowStatus'), ('HIPATH-WIRELESS-HWC-MIB', 'destinationName'), ('HIPATH-WIRELESS-HWC-MIB', 'destinationIP'), ('HIPATH-WIRELESS-HWC-MIB', 'dhcpRelayListenersMaxEntries'), ('HIPATH-WIRELESS-HWC-MIB', 'dhcpRelayListenersNextIndex'), ('HIPATH-WIRELESS-HWC-MIB', 'dhcpRelayListenersNumEntries')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): dhcp_relay_listeners_group = dhcpRelayListenersGroup.setStatus('current') if mibBuilder.loadTexts: dhcpRelayListenersGroup.setDescription('List of objects for defining dhcpRelayListeners.') authentication_advanced_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 42)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'includeServiceType'), ('HIPATH-WIRELESS-HWC-MIB', 'clientMessageDelayTime'), ('HIPATH-WIRELESS-HWC-MIB', 'radiusAccounting'), ('HIPATH-WIRELESS-HWC-MIB', 'serverUsageModel'), ('HIPATH-WIRELESS-HWC-MIB', 'radacctStartOnIPAddr'), ('HIPATH-WIRELESS-HWC-MIB', 'clientServiceTypeLogin'), ('HIPATH-WIRELESS-HWC-MIB', 'applyMacAddressFormat')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): authentication_advanced_group = authenticationAdvancedGroup.setStatus('current') if mibBuilder.loadTexts: authenticationAdvancedGroup.setDescription('List of objects for defining authenticationAdvanced.') radius_extns_setting_group = object_group((1, 3, 6, 1, 4, 1, 4329, 15, 3, 30, 5, 43)).setObjects(('HIPATH-WIRELESS-HWC-MIB', 'pollingMechanism'), ('HIPATH-WIRELESS-HWC-MIB', 'serverPollingInterval')) if getattr(mibBuilder, 'version', (0, 0, 0)) > (4, 4, 0): radius_extns_setting_group = radiusExtnsSettingGroup.setStatus('current') if mibBuilder.loadTexts: radiusExtnsSettingGroup.setDescription('List of objects for defining radiusExtnsSetting.') mibBuilder.exportSymbols('HIPATH-WIRELESS-HWC-MIB', loadGroupName=loadGroupName, stationMacAddress=stationMacAddress, licensingInformation=licensingInformation, dhcpRelayListenersTable=dhcpRelayListenersTable, apPerfWlanCurPeakClientsPerSec=apPerfWlanCurPeakClientsPerSec, apTotalStationsBInOctets=apTotalStationsBInOctets, vnsAPFilterRuleDirection=vnsAPFilterRuleDirection, wlanSSID=wlanSSID, topoExceptionStatPktsAllowed=topoExceptionStatPktsAllowed, apLogManagement=apLogManagement, apPerfRadioPrevPeakSNR=apPerfRadioPrevPeakSNR, apLogSelectedAPsEntry=apLogSelectedAPsEntry, siteStrictLimitEnableR1=siteStrictLimitEnableR1, topoStatName=topoStatName, licenseForeignRadarAP=licenseForeignRadarAP, topologyGroupMembers=topologyGroupMembers, wlanRadiusServerAcctSIAR=wlanRadiusServerAcctSIAR, apIPAddress=apIPAddress, phyDHCPRangeEnd=phyDHCPRangeEnd, apPollInterval=apPollInterval, vnsSLPEnabled=vnsSLPEnabled, scanGroupAPAssignAllowScanning=scanGroupAPAssignAllowScanning, apPerfWlanCurrentClientsPerSec=apPerfWlanCurrentClientsPerSec, vns3rdPartyAPTable=vns3rdPartyAPTable, apChannelUtilizationEntry=apChannelUtilizationEntry, wlanPrivWEPKeyLength=wlanPrivWEPKeyLength, wlanRadiusServerMacUseVNSName=wlanRadiusServerMacUseVNSName, loadGroupID=loadGroupID, cpConnectionIP=cpConnectionIP, dedicatedScanGrpSecurityThreats=dedicatedScanGrpSecurityThreats, tertiaryDNS=tertiaryDNS, topoCompleteStatName=topoCompleteStatName, vnsAPFilterPortLow=vnsAPFilterPortLow, loadGroupLoadControlEnableR1=loadGroupLoadControlEnableR1, siteLocalRadiusAuthentication=siteLocalRadiusAuthentication, wlanRadiusServerEntry=wlanRadiusServerEntry, dedicatedScanGroup=dedicatedScanGroup, vnsStatBroadcastTxPkts=vnsStatBroadcastTxPkts, topologyPreFixLength=topologyPreFixLength, mitigatorAnalysisEngine=mitigatorAnalysisEngine, wlanCPExtTosOverride=wlanCPExtTosOverride, vnsDLSPort=vnsDLSPort, stationIPAddress=stationIPAddress, vnsMgmtTrafficEnable=vnsMgmtTrafficEnable, tspecAC=tspecAC, apNotifications=apNotifications, vnsQoSWirelessULPolicerAction=vnsQoSWirelessULPolicerAction, apTotalStationsB=apTotalStationsB, wlanAuthRadiusAcctAfterMacBaseAuthorization=wlanAuthRadiusAcctAfterMacBaseAuthorization, apEventAPSerialNumber=apEventAPSerialNumber, vnsDHCPRangeEnd=vnsDHCPRangeEnd, vnsStatMulticastTxPkts=vnsStatMulticastTxPkts, loadGroupLoadControlEnableR2=loadGroupLoadControlEnableR2, muAPSerialNo=muAPSerialNo, topoStatTxOctets=topoStatTxOctets, activeThreatGroup=activeThreatGroup, wlanRadiusIndex=wlanRadiusIndex, apInNUcastPkts=apInNUcastPkts, phyDHCPRangeEntry=phyDHCPRangeEntry, cpType=cpType, netflowDestinationIP=netflowDestinationIP, apRadioAntennaTable=apRadioAntennaTable, wlanUnsecuredWlanCounts=wlanUnsecuredWlanCounts, muAccessListMACAddress=muAccessListMACAddress, topoStatBroadcastRxPkts=topoStatBroadcastRxPkts, activeThreatCategory=activeThreatCategory, wlanRadiusServerAcctUseVNSIPAddr=wlanRadiusServerAcctUseVNSIPAddr, loadGroupLoadControl=loadGroupLoadControl, dedicatedScanGrpScan5GHzFreq=dedicatedScanGrpScan5GHzFreq, loadGroupLoadControlStrictLimitR1=loadGroupLoadControlStrictLimitR1, muACLRowStatus=muACLRowStatus, dedicatedScanGrpClassifySourceIF=dedicatedScanGrpClassifySourceIF, tspecUlViolations=tspecUlViolations, dedicatedScanGroupEntry=dedicatedScanGroupEntry, stationsByProtocolN5=stationsByProtocolN5, PYSNMP_MODULE_ID=hiPathWirelessControllerMib, physicalPortsInternalVlanID=physicalPortsInternalVlanID, vnsRateControlCBS=vnsRateControlCBS, wlanStatsRadiusReqFailed=wlanStatsRadiusReqFailed, recurrenceDaily=recurrenceDaily, apAccPrevPeakReassocReqRx=apAccPrevPeakReassocReqRx, vnsStatsObjects=vnsStatsObjects, portDuplexMode=portDuplexMode, siteStrictLimitEnableR2=siteStrictLimitEnableR2, vnsWDSStatTxRate=vnsWDSStatTxRate, licenseDaysRemaining=licenseDaysRemaining, wlanPrivKeyManagement=wlanPrivKeyManagement, wlanAuthRadiusIncludeIngressRC=wlanAuthRadiusIncludeIngressRC, HundredthOfGauge64=HundredthOfGauge64, vnsStatTable=vnsStatTable, maxVideoBWforAssociation=maxVideoBWforAssociation, apPerfRadioAverageChannelUtilization=apPerfRadioAverageChannelUtilization, stationsByProtocolB=stationsByProtocolB, apMaintenanceCycle=apMaintenanceCycle, vnsFilterRuleIPAddress=vnsFilterRuleIPAddress, vnsWDSStatSSID=vnsWDSStatSSID, vnsWDSRFEntry=vnsWDSRFEntry, apPlatforms=apPlatforms, sysCPUType=sysCPUType, authorizedAPTable=authorizedAPTable, apRegSecurityMode=apRegSecurityMode, HundredthOfGauge32=HundredthOfGauge32, activeThreatIndex=activeThreatIndex, vnsQoSEntry=vnsQoSEntry, authenticationAdvanced=authenticationAdvanced, dhcpRelayListenersNextIndex=dhcpRelayListenersNextIndex, vnsAuthModel=vnsAuthModel, cpLoginLabel=cpLoginLabel, siteTable=siteTable, apCredentialType=apCredentialType, topologyMemberId=topologyMemberId, siteRowStatus=siteRowStatus, muGroup=muGroup, portDHCPDefaultLease=portDHCPDefaultLease, outOfSrvScanGrpChannelList=outOfSrvScanGrpChannelList, wlanCPReplaceIPwithFQDN=wlanCPReplaceIPwithFQDN, wlanRadiusName=wlanRadiusName, topologyVlanID=topologyVlanID, topoStatBroadcastTxPkts=topoStatBroadcastTxPkts, muPolicyName=muPolicyName, siteCoSMember=siteCoSMember, sysLogServerPort=sysLogServerPort, wlanRadiusPort=wlanRadiusPort, apWiredIfIndex=apWiredIfIndex, vnsFilterRuleStatus=vnsFilterRuleStatus, stationRoamedAPName=stationRoamedAPName, apGroup=apGroup, wlanCPIntLogoffButton=wlanCPIntLogoffButton, tspecNMS=tspecNMS, apRadioNumber=apRadioNumber, apPerfWlanDLPkts=apPerfWlanDLPkts, licenseForeignAP=licenseForeignAP, siteEnableSecureTunnel=siteEnableSecureTunnel, radiusExtnsSettingGroup=radiusExtnsSettingGroup, inSrvScanGrpDetectRogueAP=inSrvScanGrpDetectRogueAP, wlanNetFlow=wlanNetFlow, muACLType=muACLType, vnsFilterRuleEntry=vnsFilterRuleEntry, dasPort=dasPort, apAccDisassocDeauthReqRx=apAccDisassocDeauthReqRx, apAccAverageDisassocDeauthReqTx=apAccAverageDisassocDeauthReqTx, vnsExceptionStatTable=vnsExceptionStatTable, apStatsObjects=apStatsObjects, scanAPEntry=scanAPEntry, dhcpRelayListenersGroup=dhcpRelayListenersGroup, muDefaultCoS=muDefaultCoS, topologyTable=topologyTable, licenseLocalRadarAP=licenseLocalRadarAP, mobileUnitCount=mobileUnitCount, scanGroupAPAssignFordwardingService=scanGroupAPAssignFordwardingService, friendlyAPGroup=friendlyAPGroup, inSrvScanGrpSecurityThreats=inSrvScanGrpSecurityThreats, radiusInfo=radiusInfo, apTotalStationsN24=apTotalStationsN24, inServiceScanGroupTable=inServiceScanGroupTable, hiPathWirelessAppLogFacility=hiPathWirelessAppLogFacility, wlanSecurityReportTable=wlanSecurityReportTable, cpHeaderURL=cpHeaderURL, imagePath36xx=imagePath36xx, wlanCPExtEnableHttps=wlanCPExtEnableHttps, vnsFilterIDTable=vnsFilterIDTable, muConnectionCapability=muConnectionCapability, widsWipsEngineGroup=widsWipsEngineGroup, wlanAuthType=wlanAuthType, wlanRadiusNASUseVnsIP=wlanRadiusNASUseVnsIP, apAccPrevPeakAssocReqRx=apAccPrevPeakAssocReqRx, apLogFrequency=apLogFrequency, dhcpRelayListenersEntry=dhcpRelayListenersEntry, stationsByProtocolUnavailable=stationsByProtocolUnavailable, topoStatRxPkts=topoStatRxPkts, siteNumEntries=siteNumEntries, radioVNSTable=radioVNSTable, vnsWDSRFBackupParent=vnsWDSRFBackupParent, apInvalidPolicyCount=apInvalidPolicyCount, sysLogServerEnabled=sysLogServerEnabled, destinationName=destinationName, destinationIP=destinationIP, wlanProcessClientIE=wlanProcessClientIE, apTelnetAccess=apTelnetAccess, apUpTime=apUpTime, muConnectionProtocol=muConnectionProtocol, topoWireStatRxPkts=topoWireStatRxPkts, apLogFileCopyRowStatus=apLogFileCopyRowStatus, topoCompleteStatFrameChkSeqErrors=topoCompleteStatFrameChkSeqErrors, vnsWDSStatRxError=vnsWDSStatRxError, apLogUserId=apLogUserId, topologyIPMask=topologyIPMask, vnsRadiusServerNasAddress=vnsRadiusServerNasAddress, vnsFilterID=vnsFilterID, apPerfRadioCurPeakPktRetx=apPerfRadioCurPeakPktRetx, topologyIPAddress=topologyIPAddress, apLogFileCopyTable=apLogFileCopyTable, apAccCurPeakAssocReqRx=apAccCurPeakAssocReqRx, apStaticMTUsize=apStaticMTUsize, apPerformanceReportByRadioTable=apPerformanceReportByRadioTable, topoStatTable=topoStatTable, apLogFileCopyServerIP=apLogFileCopyServerIP, apHwVersion=apHwVersion, apRegTelnetPassword=apRegTelnetPassword, inSrvScanGrpblockAdHocClientsPeriod=inSrvScanGrpblockAdHocClientsPeriod, topoCompleteStatFrameTooLongErrors=topoCompleteStatFrameTooLongErrors, apPerfWlanULOctets=apPerfWlanULOctets, assocDuration=assocDuration, assocTxOctets=assocTxOctets, wlanCPSelectionOption=wlanCPSelectionOption, prohibitedAPMAC=prohibitedAPMAC, tspecBssMac=tspecBssMac, tspecMuIPAddress=tspecMuIPAddress, apRadioTable=apRadioTable, apByChannelTable=apByChannelTable, nearbyApIndex=nearbyApIndex, tunnelStatsTxBytes=tunnelStatsTxBytes, dedicatedScanGrpRowStatus=dedicatedScanGrpRowStatus, apOutDiscards=apOutDiscards, friendlyAPDescription=friendlyAPDescription, phyDHCPRangeStatus=phyDHCPRangeStatus, apFastFailoverEnable=apFastFailoverEnable, ntpObjects=ntpObjects, cpMessage=cpMessage, portIpAddress=portIpAddress, physicalPortsTable=physicalPortsTable, apTotalStationsACOutOctets=apTotalStationsACOutOctets, apAntennaGroup=apAntennaGroup, topoStatRxOctets=topoStatRxOctets, dasInfo=dasInfo, wlanCPIntStatusCheckButton=wlanCPIntStatusCheckButton, dedicatedScanGrpDetectRogueAP=dedicatedScanGrpDetectRogueAP, siteBandPreferenceEnable=siteBandPreferenceEnable, controllerStats=controllerStats, vnsQoSTable=vnsQoSTable, sitePolicyID=sitePolicyID, logEventComponent=logEventComponent, sysSoftwareVersion=sysSoftwareVersion, layerTwoPortEntry=layerTwoPortEntry, wlanSecurityReportFlag=wlanSecurityReportFlag, vnsCount=vnsCount, radiusId=radiusId, outOfSrvScanGrpSecurityScan=outOfSrvScanGrpSecurityScan, ntpTimeServer3=ntpTimeServer3, apAccPrevPeakDisassocDeauthReqRx=apAccPrevPeakDisassocDeauthReqRx, wlanAuthEntry=wlanAuthEntry, apLogFileCopyPassword=apLogFileCopyPassword, apRadioStatusEntry=apRadioStatusEntry, apPerfWlanCurPeakDLPktsPerSec=apPerfWlanCurPeakDLPktsPerSec, wlanAuthRadiusIncludeTopology=wlanAuthRadiusIncludeTopology, apRegUseClusterEncryption=apRegUseClusterEncryption, loadGroupType=loadGroupType, dhcpRelayListenersRowStatus=dhcpRelayListenersRowStatus, apInOctets=apInOctets, muTable=muTable, wlanPrivTable=wlanPrivTable, muTxOctets=muTxOctets, phyDHCPRangeType=phyDHCPRangeType, radiusFastFailoverEventsEntry=radiusFastFailoverEventsEntry) mibBuilder.exportSymbols('HIPATH-WIRELESS-HWC-MIB', layerTwoPortTable=layerTwoPortTable, topologyLinkLocalIPv6Address=topologyLinkLocalIPv6Address, widsWipsEngineEntry=widsWipsEngineEntry, topologyEntry=topologyEntry, includeAllServiceMessages=includeAllServiceMessages, apByChannelNumber=apByChannelNumber, prohibitedAPCategory=prohibitedAPCategory, muAPName=muAPName, apRadioAntennaGroup=apRadioAntennaGroup, inSrvScanGrpScan5GHzSelection=inSrvScanGrpScan5GHzSelection, sites=sites, ntpTimezone=ntpTimezone, tspecSBA=tspecSBA, siteMaxEntries=siteMaxEntries, cpSharedSecret=cpSharedSecret, wlanAuthRadiusTimeoutRole=wlanAuthRadiusTimeoutRole, stationsByProtocolN24=stationsByProtocolN24, topoWireStatFrameTooLongErrors=topoWireStatFrameTooLongErrors, topologyStatGroup=topologyStatGroup, phyDHCPRangeStart=phyDHCPRangeStart, dasReplayInterval=dasReplayInterval, topoExceptionStatPktsDenied=topoExceptionStatPktsDenied, vnsDescription=vnsDescription, activeThreatsCounts=activeThreatsCounts, stationEventType=stationEventType, wlanPrivWPAversion=wlanPrivWPAversion, hwcAvailabilityRank=hwcAvailabilityRank, vnForeignClients=vnForeignClients, vnsRadiusServerTimeout=vnsRadiusServerTimeout, apSSHConnection=apSSHConnection, vnsPrivacyTable=vnsPrivacyTable, apByChannelGroup=apByChannelGroup, wlanAuthRadiusOperatorNameSpace=wlanAuthRadiusOperatorNameSpace, vnsPrivWEPKeyType=vnsPrivWEPKeyType, vnsRadiusServerEntry=vnsRadiusServerEntry, apMacAddress=apMacAddress, apIpAddress=apIpAddress, vnsPrivDynamicRekeyFrequency=vnsPrivDynamicRekeyFrequency, topoCompleteStatBroadcastRxPkts=topoCompleteStatBroadcastRxPkts, vnsDHCPRangeEntry=vnsDHCPRangeEntry, accessRejectMsgEntry=accessRejectMsgEntry, apRegistration=apRegistration, countermeasureAPThreatIndex=countermeasureAPThreatIndex, apInErrors=apInErrors, wlanVNSID=wlanVNSID, wlanRadiusServerAuthAuthType=wlanRadiusServerAuthAuthType, stationBSSID=stationBSSID, dedicatedScanGrpBlockAdHocPeriod=dedicatedScanGrpBlockAdHocPeriod, wlanIdleTimeoutPreAuth=wlanIdleTimeoutPreAuth, vnsQoSWirelessEnableUAPSD=vnsQoSWirelessEnableUAPSD, wlanStatsID=wlanStatsID, vnsStatus=vnsStatus, wlanRadiusServerAuthUseVNSName=wlanRadiusServerAuthUseVNSName, muACLTable=muACLTable, vnsAPFilterTable=vnsAPFilterTable, topoWireStatMulticastRxPkts=topoWireStatMulticastRxPkts, inServiceScanGroupEntry=inServiceScanGroupEntry, wlanSynchronize=wlanSynchronize, apRowStatus=apRowStatus, wlanAuthRadiusIncludeAP=wlanAuthRadiusIncludeAP, sensorManagement=sensorManagement, vnsExceptionFiterName=vnsExceptionFiterName, portMgmtTrafficEnable=portMgmtTrafficEnable, ntpTimeServer1=ntpTimeServer1, vnsPrivUseSharedKey=vnsPrivUseSharedKey, wlanIdleSessionPostAuth=wlanIdleSessionPostAuth, vnsQoSWirelessUseAdmControlVoice=vnsQoSWirelessUseAdmControlVoice, physicalFlash=physicalFlash, vnsProcessClientIEReq=vnsProcessClientIEReq, apRadioAttenuation=apRadioAttenuation, countermeasureAPThreatCategory=countermeasureAPThreatCategory, stationIPv6Address2=stationIPv6Address2, wlanAuthRadiusIncludePolicy=wlanAuthRadiusIncludePolicy, dedicatedScanGroupTable=dedicatedScanGroupTable, siteWlanGroup=siteWlanGroup, mgmtPortObjects=mgmtPortObjects, apState=apState, apAccAssocReqRx=apAccAssocReqRx, virtualNetworks=virtualNetworks, apAccDisassocDeauthReqTx=apAccDisassocDeauthReqTx, wlanPrivWEPKeyIndex=wlanPrivWEPKeyIndex, apAccCurPeakDisassocDeauthReqTx=apAccCurPeakDisassocDeauthReqTx, armCount=armCount, tspecMuMACAddress=tspecMuMACAddress, wlanPrivEntry=wlanPrivEntry, loadGroup=loadGroup, apCount=apCount, wlanSecurityReportNotes=wlanSecurityReportNotes, apRadioAntennaModel=apRadioAntennaModel, uncategorizedAPDescption=uncategorizedAPDescption, vnsStatRadiusTotRequests=vnsStatRadiusTotRequests, authorizedAPGroup=authorizedAPGroup, siteMaxClientR1=siteMaxClientR1, topoExceptionFiterName=topoExceptionFiterName, tspecDirection=tspecDirection, logEventSeverity=logEventSeverity, loadGrpWlanEntry=loadGrpWlanEntry, stationDetailEvent=stationDetailEvent, maxVoiceBWforAssociation=maxVoiceBWforAssociation, wlanTableNextAvailableIndex=wlanTableNextAvailableIndex, apOutErrors=apOutErrors, muACLGroup=muACLGroup, wlanRadiusServerAuthUseVNSIPAddr=wlanRadiusServerAuthUseVNSIPAddr, topoCompleteStatTxOctets=topoCompleteStatTxOctets, portDHCPEnable=portDHCPEnable, vnsAPFilterEntry=vnsAPFilterEntry, apIfMAC=apIfMAC, vnsAssignmentMode=vnsAssignmentMode, vnsDLSAddress=vnsDLSAddress, vnsRadiusServerSharedSecret=vnsRadiusServerSharedSecret, apCertificateExpiry=apCertificateExpiry, jumboFrames=jumboFrames, vnsFilterRuleDirection=vnsFilterRuleDirection, vnsAPFilterRowStatus=vnsAPFilterRowStatus, vnManagerObjects=vnManagerObjects, weakCipherEnable=weakCipherEnable, radiusStrictMode=radiusStrictMode, wlanCPRedirectURL=wlanCPRedirectURL, assocStartSysUpTime=assocStartSysUpTime, scanGroupAPAssignAllowSpectrumAnalysis=scanGroupAPAssignAllowSpectrumAnalysis, scanAPRowStatus=scanAPRowStatus, siteAPEntry=siteAPEntry, externalRadiusServerName=externalRadiusServerName, apChnlUtilCurrentUtilization=apChnlUtilCurrentUtilization, portVlanID=portVlanID, vnsDHCPRangeStatus=vnsDHCPRangeStatus, cpPasswordLabel=cpPasswordLabel, cpReplaceGatewayWithFQDN=cpReplaceGatewayWithFQDN, apAccCurPeakReassocReqRx=apAccCurPeakReassocReqRx, assocMUMacAddress=assocMUMacAddress, authorizedAPMAC=authorizedAPMAC, apLogPassword=apLogPassword, wlanEntry=wlanEntry, dedicatedScanGrpMaxConcurrentAttacksPerAP=dedicatedScanGrpMaxConcurrentAttacksPerAP, wlanAuthRadiusOperatorName=wlanAuthRadiusOperatorName, externalRadiusServerSharedSecret=externalRadiusServerSharedSecret, vnsSessionAvailabilityEnable=vnsSessionAvailabilityEnable, apAntennaEntry=apAntennaEntry, sysLogServerIP=sysLogServerIP, wlanSecurityReportUnsecureType=wlanSecurityReportUnsecureType, apName=apName, apPortifIndex=apPortifIndex, sitePolicyGroup=sitePolicyGroup, licenseInServiceRadarAP=licenseInServiceRadarAP, apBroadcastDisassociate=apBroadcastDisassociate, vnsWDSRFAPName=vnsWDSRFAPName, cpFooterURL=cpFooterURL, wlanStatsAssociatedClients=wlanStatsAssociatedClients, hiPathWirelessHWCModule=hiPathWirelessHWCModule, muWLANID=muWLANID, vnsConfigEntry=vnsConfigEntry, apAntennanName=apAntennanName, recurrenceWeekly=recurrenceWeekly, scanGroupAPAssignmentEntry=scanGroupAPAssignmentEntry, phyDHCPRangeIndex=phyDHCPRangeIndex, armReplyMessage=armReplyMessage, vnsStatRxPkts=vnsStatRxPkts, apAccPrevPeakDisassocDeauthReqTx=apAccPrevPeakDisassocDeauthReqTx, apPerfRadioAverageSNR=apPerfRadioAverageSNR, mirrorL2Ports=mirrorL2Ports, vnsFilterRuleOrder=vnsFilterRuleOrder, vnsPrivWPA1Enabled=vnsPrivWPA1Enabled, apPerfRadioPrevPeakRSS=apPerfRadioPrevPeakRSS, tunnelEndHWC=tunnelEndHWC, wlanRadiusEntry=wlanRadiusEntry, vnsWDSStatRxFrame=vnsWDSStatRxFrame, logNotifications=logNotifications, apSecureTunnel=apSecureTunnel, activeThreatAPName=activeThreatAPName, threatSummaryActiveThreat=threatSummaryActiveThreat, vnsInterfaceName=vnsInterfaceName, vnsWDSRFTable=vnsWDSRFTable, siteCoSID=siteCoSID, vnsWDSRFbgService=vnsWDSRFbgService, siteCosTable=siteCosTable, nearbyApRSS=nearbyApRSS, wlanPrivWEPKey=wlanPrivWEPKey, licenseMode=licenseMode, licenseRegulatoryDomain=licenseRegulatoryDomain, wlanPrivPrivacyType=wlanPrivPrivacyType, apEventDescription=apEventDescription, stationsByProtocolGroup=stationsByProtocolGroup, wlanPrivRekeyInterval=wlanPrivRekeyInterval, licenseLocalAP=licenseLocalAP, maxVideoBWforReassociation=maxVideoBWforReassociation, radiusExtnsSettingTable=radiusExtnsSettingTable, wlanCPSendLoginTo=wlanCPSendLoginTo, vnsRateControlProfEntry=vnsRateControlProfEntry, apChnlUtilCurPeakUtilization=apChnlUtilCurPeakUtilization, apPerfRadioAveragePktRetx=apPerfRadioAveragePktRetx, serviceLogFacility=serviceLogFacility, hiPathWirelessControllerMib=hiPathWirelessControllerMib, vnsWDSStatRxRate=vnsWDSStatRxRate, topologyGateway=topologyGateway, apSSHAccess=apSSHAccess, prohibitedAPClassify=prohibitedAPClassify, loadGrpRadiosEntry=loadGrpRadiosEntry, loadGroupLoadControlStrictLimitR2=loadGroupLoadControlStrictLimitR2, phyDHCPRangeGroup=phyDHCPRangeGroup, vnsGlobalSetting=vnsGlobalSetting, wlanAuthAutoAuthAuthorizedUser=wlanAuthAutoAuthAuthorizedUser, siteEncryptCommBetweenAPs=siteEncryptCommBetweenAPs, apPerfRadioCurPeakSNR=apPerfRadioCurPeakSNR, assocRxPackets=assocRxPackets, widsWipsEnginePollRetry=widsWipsEnginePollRetry, vnsRadiusServerPort=vnsRadiusServerPort, apNeighboursEntry=apNeighboursEntry, muMACAddress=muMACAddress, wlanPrivfastTransition=wlanPrivfastTransition, apDesc=apDesc, channel=channel, wlanRadiusTable=wlanRadiusTable, apOutOctets=apOutOctets, vnsPrivWEPKeyLength=vnsPrivWEPKeyLength, apPerfRadioAverageRSS=apPerfRadioAverageRSS, siteWlanApRadioAssigned=siteWlanApRadioAssigned, wlanRadiusServerUsage=wlanRadiusServerUsage, muTxPackets=muTxPackets, topoWireStatFrameChkSeqErrors=topoWireStatFrameChkSeqErrors, siteCosEntry=siteCosEntry, apTunnelAlarm=apTunnelAlarm, vnsParentIfIndex=vnsParentIfIndex, tspecSsid=tspecSsid, wlanRadiusServerAuthNASId=wlanRadiusServerAuthNASId, wlanRowStatus=wlanRowStatus, wlanRadiusServerMacNASIP=wlanRadiusServerMacNASIP, wlanRadiusNASIDUseVNSName=wlanRadiusNASIDUseVNSName, nearbyApChannel=nearbyApChannel, wlanAuthRadiusIncludeEgressRC=wlanAuthRadiusIncludeEgressRC, apByChannelEntry=apByChannelEntry, vnsMgmIpAddress=vnsMgmIpAddress, vnsDHCPRangeStart=vnsDHCPRangeStart, apChannelUtilizationTable=apChannelUtilizationTable, vnTotalClients=vnTotalClients, wlanDot11hSupport=wlanDot11hSupport, apInterfaceMTU=apInterfaceMTU, hiPathWirelessLogAlarm=hiPathWirelessLogAlarm, apRadioType=apRadioType, dedicatedScanGrpListeningPort=dedicatedScanGrpListeningPort, wlanStatsTable=wlanStatsTable, vnsFilterRulePortHigh=vnsFilterRulePortHigh, vnsQoSWirelessLegacyFlag=vnsQoSWirelessLegacyFlag, wlanRadiusRetries=wlanRadiusRetries, topologySyncMask=topologySyncMask, apStatsTable=apStatsTable, outOfSrvScanGrpScanType=outOfSrvScanGrpScanType, muACLEntry=muACLEntry, imageVersionOfngap36xx=imageVersionOfngap36xx, siteDefaultDNSServer=siteDefaultDNSServer, tftpSever=tftpSever, startHour=startHour, sitePolicyTable=sitePolicyTable, wlanSupressSSID=wlanSupressSSID, topologySyncIPStart=topologySyncIPStart) mibBuilder.exportSymbols('HIPATH-WIRELESS-HWC-MIB', topologyIsGroup=topologyIsGroup, associations=associations, blacklistedClientMAC=blacklistedClientMAC, vnIfIndex=vnIfIndex, tunnelCount=tunnelCount, vnsUseDHCPRelay=vnsUseDHCPRelay, scanAPGroup=scanAPGroup, apMICErrorWarning=apMICErrorWarning, topologyStat=topologyStat, loadGroupTable=loadGroupTable, apTotalStationsA=apTotalStationsA, vnsRateControlProfInd=vnsRateControlProfInd, widsWipsEngineControllerIPAddress=widsWipsEngineControllerIPAddress, vnsQoSWirelessUseAdmControlBackground=vnsQoSWirelessUseAdmControlBackground, topoWireStatBroadcastRxPkts=topoWireStatBroadcastRxPkts, imageVersionOfap26xx=imageVersionOfap26xx, vnsWDSStatAPRadio=vnsWDSStatAPRadio, topoCompleteStatTxPkts=topoCompleteStatTxPkts, apRadioAntennaEntry=apRadioAntennaEntry, muAccessListBitmaskLength=muAccessListBitmaskLength, scanGroupsCurrentEntries=scanGroupsCurrentEntries, outOfSrvScanGrpScanRowStatus=outOfSrvScanGrpScanRowStatus, wlanAppVisibility=wlanAppVisibility, apTotalStationsBOutOctets=apTotalStationsBOutOctets, tspecProtocol=tspecProtocol, muACLMACAddress=muACLMACAddress, topoWireStatName=topoWireStatName, activeThreatDateTime=activeThreatDateTime, vnsWEPKeyValue=vnsWEPKeyValue, applyMacAddressFormat=applyMacAddressFormat, wlanCP802HttpRedirect=wlanCP802HttpRedirect, topoStatTxPkts=topoStatTxPkts, apRegDiscoveryInterval=apRegDiscoveryInterval, wlanStatsEntry=wlanStatsEntry, countermeasureAPTime=countermeasureAPTime, apRadioStatusChannel=apRadioStatusChannel, radiusMacAddressFormatOption=radiusMacAddressFormatOption, topoWireStatMulticastTxPkts=topoWireStatMulticastTxPkts, hiPathWirelessHWCObsolete=hiPathWirelessHWCObsolete, authorizedAPRowStatus=authorizedAPRowStatus, apPerfWlanPrevPeakULOctetsPerSec=apPerfWlanPrevPeakULOctetsPerSec, friendlyAPMacAddress=friendlyAPMacAddress, licenseAvailableAP=licenseAvailableAP, apPerfWlanPrevPeakDLOctetsPerSec=apPerfWlanPrevPeakDLOctetsPerSec, apLogFileCopyServerDirectory=apLogFileCopyServerDirectory, logEventSeverityThreshold=logEventSeverityThreshold, tunnelsTxRxBytes=tunnelsTxRxBytes, vnsAllowMulticast=vnsAllowMulticast, select=select, scanGroupAPAssignName=scanGroupAPAssignName, vnLocalClients=vnLocalClients, vnsSSID=vnsSSID, siteEncryptCommAPtoController=siteEncryptCommAPtoController, wlanTable=wlanTable, portMask=portMask, accessPoints=accessPoints, maxBackgroundBWforReassociation=maxBackgroundBWforReassociation, wlanEngerySaveMode=wlanEngerySaveMode, apRegistrationRequests=apRegistrationRequests, vnsRadiusServerAuthType=vnsRadiusServerAuthType, apSpecific=apSpecific, wlanRadiusServerMacNASId=wlanRadiusServerMacNASId, tunnelStatsTable=tunnelStatsTable, apPerfWlanDLOctets=apPerfWlanDLOctets, siteAPTable=siteAPTable, apEnvironment=apEnvironment, externalRadiusServerRowStatus=externalRadiusServerRowStatus, vnsWDSStatAPRole=vnsWDSStatAPRole, dhcpRelayListenersNumEntries=dhcpRelayListenersNumEntries, portDHCPWins=portDHCPWins, vnsCaptivePortalEntry=vnsCaptivePortalEntry, vnsRadiusServerTable=vnsRadiusServerTable, apLocationbasedService=apLocationbasedService, blacklistedClientStatTime=blacklistedClientStatTime, scanGroupAPAssignApSerial=scanGroupAPAssignApSerial, wlanDefaultTopologyID=wlanDefaultTopologyID, mobileUnits=mobileUnits, outOfSrvScanGrpScanActivity=outOfSrvScanGrpScanActivity, loadGrpRadiosRadio2=loadGrpRadiosRadio2, apSerialNo=apSerialNo, wlanSecurityReportEntry=wlanSecurityReportEntry, wlanCPGuestIDPrefix=wlanCPGuestIDPrefix, apPerfWlanCurPeakULOctetsPerSec=apPerfWlanCurPeakULOctetsPerSec, uncategorizedAPCounts=uncategorizedAPCounts, inServiceScanGroup=inServiceScanGroup, siteAPMember=siteAPMember, activeThreatExtraDetails=activeThreatExtraDetails, countermeasureAPName=countermeasureAPName, apAccAverageDisassocDeauthReqRx=apAccAverageDisassocDeauthReqRx, vnsStatRadiusReqFailed=vnsStatRadiusReqFailed, wlanGroup=wlanGroup, apEncryptCntTraffic=apEncryptCntTraffic, apLogDirectory=apLogDirectory, friendlyAPCounts=friendlyAPCounts, vnsWDSStatTxFrame=vnsWDSStatTxFrame, threatSummaryIndex=threatSummaryIndex, vnsDomain=vnsDomain, wlanRadiusServerAcctNASId=wlanRadiusServerAcctNASId, apPerfWlanCurPeakULPktsPerSec=apPerfWlanCurPeakULPktsPerSec, wlanID=wlanID, apPerfWlanAverageULPktsPerSec=apPerfWlanAverageULPktsPerSec, loadGrpRadiosRadio1=loadGrpRadiosRadio1, countermeasureAPSerial=countermeasureAPSerial, radiusFastFailoverEventsGroup=radiusFastFailoverEventsGroup, wlanPrivGroupKPSR=wlanPrivGroupKPSR, wlanCPGuestAccLifetime=wlanCPGuestAccLifetime, armIndex=armIndex, vnsStatMulticastRxPkts=vnsStatMulticastRxPkts, apLogFileCopyOperationStatus=apLogFileCopyOperationStatus, wlanStatsRadiusTotRequests=wlanStatsRadiusTotRequests, widsWipsEngineRowStatus=widsWipsEngineRowStatus, physicalPortCount=physicalPortCount, vnsDHCPRangeType=vnsDHCPRangeType, fastFailoverEvents=fastFailoverEvents, vnsFilterRuleAction=vnsFilterRuleAction, apTotalStationsN24OutOctets=apTotalStationsN24OutOctets, topoStatFrameChkSeqErrors=topoStatFrameChkSeqErrors, prohibitedAPEntry=prohibitedAPEntry, vnsMode=vnsMode, wlanDot11hClientPowerReduction=wlanDot11hClientPowerReduction, mgmtPortHostname=mgmtPortHostname, vnsAPFilterRuleOrder=vnsAPFilterRuleOrder, wlanAuthAllowUnauthorizedUser=wlanAuthAllowUnauthorizedUser, apPerformanceReportByRadioEntry=apPerformanceReportByRadioEntry, apLogDestination=apLogDestination, topoExceptionStatEntry=topoExceptionStatEntry, authorizedAPClassify=authorizedAPClassify, tunnelStartHWC=tunnelStartHWC, prohibitedAPRowStatus=prohibitedAPRowStatus, scanAPSerialNumber=scanAPSerialNumber, muAccessListRowStatus=muAccessListRowStatus, prohibitedAPManufacturer=prohibitedAPManufacturer, vnsIfIndex=vnsIfIndex, vnsStatRxOctects=vnsStatRxOctects, wlanRadiusServerMacUseVNSIPAddr=wlanRadiusServerMacUseVNSIPAddr, wlanRadiusServerAcctUseVNSName=wlanRadiusServerAcctUseVNSName, threatSummaryCategory=threatSummaryCategory, activeThreatDeviceMAC=activeThreatDeviceMAC, apByChannelAPs=apByChannelAPs, vns3rdPartyAP=vns3rdPartyAP, vns3rdPartyAPEntry=vns3rdPartyAPEntry, wlanAuthCollectAcctInformation=wlanAuthCollectAcctInformation, topoCompleteStatBroadcastTxPkts=topoCompleteStatBroadcastTxPkts, siteID=siteID, wlanCPExtTosValue=wlanCPExtTosValue, apPerfWlanAverageDLOctetsPerSec=apPerfWlanAverageDLOctetsPerSec, hiPathWirelessHWCGroup=hiPathWirelessHWCGroup, vnsQoSWirelessUseAdmControlBestEffort=vnsQoSWirelessUseAdmControlBestEffort, apRadioProtocol=apRadioProtocol, wlanRadiusPriority=wlanRadiusPriority, vnsExceptionStatPktsDenied=vnsExceptionStatPktsDenied, topoCompleteStatRxPkts=topoCompleteStatRxPkts, startMinute=startMinute, apPerfRadioPktRetx=apPerfRadioPktRetx, blaclistedClientGroup=blaclistedClientGroup, wlanCPTable=wlanCPTable, topologyIPv6Gateway=topologyIPv6Gateway, vnsPrivWPASharedKey=vnsPrivWPASharedKey, apPerfWlanAverageULOctetsPerSec=apPerfWlanAverageULOctetsPerSec, wlanRadiusServerAcctNASIP=wlanRadiusServerAcctNASIP, stationsByProtocolAC=stationsByProtocolAC, vnsWDSRFBridge=vnsWDSRFBridge, muUser=muUser, muDot11ConnectionCapability=muDot11ConnectionCapability, apLogFileUtility=apLogFileUtility, portDHCPDomain=portDHCPDomain, sysLogServersEntry=sysLogServersEntry, vnsQoSClassificationServiceClass=vnsQoSClassificationServiceClass, serverPollingInterval=serverPollingInterval, apSwVersion=apSwVersion, vnsStatName=vnsStatName, stationsByProtocolError=stationsByProtocolError, tunnelStatus=tunnelStatus, topoCompleteStatEntry=topoCompleteStatEntry, vnsStatTxOctects=vnsStatTxOctects, apAccCurrentDisassocDeauthReqRx=apAccCurrentDisassocDeauthReqRx, ntpEnabled=ntpEnabled, inSrvScanGrpListeningPort=inSrvScanGrpListeningPort, scanGroupAPAssignmentGroup=scanGroupAPAssignmentGroup, apIpAssignmentType=apIpAssignmentType, apTable=apTable, vnsQoSWirelessTurboVoiceFlag=vnsQoSWirelessTurboVoiceFlag, apRole=apRole, vnsApplyPowerBackOff=vnsApplyPowerBackOff, vnsWDSStatTxError=vnsWDSStatTxError, wlanCPUseHTTPSforConnection=wlanCPUseHTTPSforConnection, apRadioFrequency=apRadioFrequency, apInDiscards=apInDiscards, stationAPSSID=stationAPSSID, phyDHCPRangeTable=phyDHCPRangeTable, siteMaxClientR2=siteMaxClientR2, wlanAuthMacBasedAuth=wlanAuthMacBasedAuth, vnsPrivWPA2Enabled=vnsPrivWPA2Enabled, secureConnection=secureConnection, availability=availability, apAntennaIndex=apAntennaIndex, scanGroupAPAssignRadio1=scanGroupAPAssignRadio1, authorizedAPManufacturer=authorizedAPManufacturer, siteReplaceStnIDwithSiteName=siteReplaceStnIDwithSiteName, apStatsGroup=apStatsGroup, hiPathWirelessHWCAlarms=hiPathWirelessHWCAlarms, portDHCPMaxLease=portDHCPMaxLease, tunnelStatsRxBytes=tunnelStatsRxBytes, wlanRadiusUsage=wlanRadiusUsage, stationEventAlarm=stationEventAlarm, countermeasureAPGroup=countermeasureAPGroup, apActiveCount=apActiveCount, licensingInformationGroup=licensingInformationGroup, activeVNSSessionCount=activeVNSSessionCount, portDHCPGateway=portDHCPGateway, topoWireStatTxPkts=topoWireStatTxPkts, tspecApSerialNumber=tspecApSerialNumber, siteEntry=siteEntry, physicalPortsGroup=physicalPortsGroup, assocRxOctets=assocRxOctets, dhcpRelayListenersID=dhcpRelayListenersID, wlanCPEntry=wlanCPEntry, vnsQoSWirelessWMMFlag=vnsQoSWirelessWMMFlag, apRadioAntennaType=apRadioAntennaType, apRadioStatusTable=apRadioStatusTable, apPerfWlanAverageClientsPerSec=apPerfWlanAverageClientsPerSec, uncategorizedAPTable=uncategorizedAPTable, assocTable=assocTable, apStatsSessionDuration=apStatsSessionDuration, wlanName=wlanName, widsWipsReport=widsWipsReport, wlanAuthMACBasedAuthReAuthOnAreaRoam=wlanAuthMACBasedAuthReAuthOnAreaRoam, apPerfRadioCurrentPktRetx=apPerfRadioCurrentPktRetx, dashboard=dashboard, apAccReassocReqRx=apAccReassocReqRx, apTotalStationsN50InOctets=apTotalStationsN50InOctets, synchronizeGuestPort=synchronizeGuestPort, topologyGroup=topologyGroup, apPollTimeout=apPollTimeout, detectLinkFailure=detectLinkFailure, vnsWEPKeyIndex=vnsWEPKeyIndex, wlanAuthRadiusIncludeSSID=wlanAuthRadiusIncludeSSID, vnsQoSWirelessUseAdmControlVideo=vnsQoSWirelessUseAdmControlVideo, radioVNSRowStatus=radioVNSRowStatus, apTotalStationsN50=apTotalStationsN50, apAccessibilityTable=apAccessibilityTable, apAccessibilityEntry=apAccessibilityEntry, apPerfWlanULPkts=apPerfWlanULPkts, loadGroupClientCountRadio2=loadGroupClientCountRadio2, tunnelEndIP=tunnelEndIP, apInUcastPkts=apInUcastPkts, scanGroupAPAssignGroupName=scanGroupAPAssignGroupName, topologyLayer3=topologyLayer3, layerTwoPortMacAddress=layerTwoPortMacAddress, stationIPv6Address3=stationIPv6Address3, outOfServiceScanGroupTable=outOfServiceScanGroupTable, apTotalStationsGInOctets=apTotalStationsGInOctets, apChnlUtilAverageUtilization=apChnlUtilAverageUtilization, muRxOctets=muRxOctets) mibBuilder.exportSymbols('HIPATH-WIRELESS-HWC-MIB', wlanRadiusServerUse=wlanRadiusServerUse, siteWlanApRadioIndex=siteWlanApRadioIndex, vnsWDSStatAPParent=vnsWDSStatAPParent, maxBestEffortBWforReassociation=maxBestEffortBWforReassociation, muTSPECEntry=muTSPECEntry, muDuration=muDuration, sitePolicyEntry=sitePolicyEntry, vnsQoSPriorityOverrideDSCP=vnsQoSPriorityOverrideDSCP, inSrvScanGrpScan2400MHzSelection=inSrvScanGrpScan2400MHzSelection, imagePath26xx=imagePath26xx, siteGroup=siteGroup, physicalPortObjects=physicalPortObjects, cpConnectionPort=cpConnectionPort, maxBackgroundBWforAssociation=maxBackgroundBWforAssociation, apLLDP=apLLDP, threatSummaryGroup=threatSummaryGroup, loadGrpRadiosTable=loadGrpRadiosTable, vnsWDSStatEntry=vnsWDSStatEntry, apLogFileCopyProtocol=apLogFileCopyProtocol, stationsByProtocolA=stationsByProtocolA, maxVoiceBWforReassociation=maxVoiceBWforReassociation, wlanCPGuestAllowedLifetimeAcct=wlanCPGuestAllowedLifetimeAcct, apNeighboursTable=apNeighboursTable, apRadioStatusChannelOffset=apRadioStatusChannelOffset, apPerfRadioCurrentSNR=apPerfRadioCurrentSNR, loadGrpWlanTable=loadGrpWlanTable, mgmtPortIfIndex=mgmtPortIfIndex, topoStatEntry=topoStatEntry, portName=portName, topologySynchronize=topologySynchronize, apLogCollectionEnable=apLogCollectionEnable, vnsRateControlCIR=vnsRateControlCIR, vnsAPFilterProtocol=vnsAPFilterProtocol, advancedFilteringMode=advancedFilteringMode, apAccCurrentDisassocDeauthReqTx=apAccCurrentDisassocDeauthReqTx, wirelessQoS=wirelessQoS, radiusFastFailoverEvents=radiusFastFailoverEvents, radiusFastFailoverEventsTable=radiusFastFailoverEventsTable, topologyDHCPUsage=topologyDHCPUsage, apRadioStatusChannelWidth=apRadioStatusChannelWidth, muIPAddress=muIPAddress, inSrvScanGrpMaxConcurrentAttacksPerAP=inSrvScanGrpMaxConcurrentAttacksPerAP, loadGroupBandPreference=loadGroupBandPreference, vnsPrivacyEntry=vnsPrivacyEntry, authorizedAPEntry=authorizedAPEntry, apLogFTProtocol=apLogFTProtocol, vnsFilterRuleProtocol=vnsFilterRuleProtocol, vnsConfigWLANID=vnsConfigWLANID, netflowInterval=netflowInterval, loadBalancing=loadBalancing, wlanServiceType=wlanServiceType, topology=topology, vnsExceptionStatPktsAllowed=vnsExceptionStatPktsAllowed, muEntry=muEntry, topoCompleteStatRxOctets=topoCompleteStatRxOctets, vnsDNSServers=vnsDNSServers, outOfSrvScanGrpChannelDwellTime=outOfSrvScanGrpChannelDwellTime, vnsRadiusServerName=vnsRadiusServerName, ntpTimeServer2=ntpTimeServer2, apAccAverageAssocReqRx=apAccAverageAssocReqRx, blacklistedClientTable=blacklistedClientTable, apSoftwareVersion=apSoftwareVersion, apAccCurPeakDisassocDeauthReqRx=apAccCurPeakDisassocDeauthReqRx, vnsFilterIDEntry=vnsFilterIDEntry, apPerfWlanCurrentDLPktsPerSec=apPerfWlanCurrentDLPktsPerSec, activeThreatTable=activeThreatTable, radiusAccounting=radiusAccounting, LogEventSeverity=LogEventSeverity, apLogFileCopyOperation=apLogFileCopyOperation, apSecureDataTunnelType=apSecureDataTunnelType, topologyTagged=topologyTagged, apEventId=apEventId, siteLoadControlEnableR2=siteLoadControlEnableR2, vnsWEPKeyTable=vnsWEPKeyTable, pairIPAddress=pairIPAddress, vnsConfigObjects=vnsConfigObjects, threatSummaryHistoricalCounts=threatSummaryHistoricalCounts, apLogFileCopyIndex=apLogFileCopyIndex, scanAPTable=scanAPTable, topoStatMulticastRxPkts=topoStatMulticastRxPkts, radioVNSEntry=radioVNSEntry, radioIfIndex=radioIfIndex, externalRadiusServerEntry=externalRadiusServerEntry, apAccAverageReassocReqRx=apAccAverageReassocReqRx, wlanPrivManagementFrameProtection=wlanPrivManagementFrameProtection, apPerfWlanCurPeakDLOctetsPerSec=apPerfWlanCurPeakDLOctetsPerSec, siteCosGroup=siteCosGroup, wlanRadiusServerMacPW=wlanRadiusServerMacPW, apEntry=apEntry, vnsQoSPriorityOverrideSC=vnsQoSPriorityOverrideSC, clearAccessRejectMsg=clearAccessRejectMsg, apHome=apHome, apTotalStationsGOutOctets=apTotalStationsGOutOctets, apTotalStationsACInOctets=apTotalStationsACInOctets, siteTableNextAvailableIndex=siteTableNextAvailableIndex, topologyMode=topologyMode, wlanAuthRadiusIncludeVNS=wlanAuthRadiusIncludeVNS, topoStatMulticastTxPkts=topoStatMulticastTxPkts, apHostname=apHostname, wassp=wassp, scanGroupAPAssignRadio2=scanGroupAPAssignRadio2, vnsWDSRFaService=vnsWDSRFaService, radiusExtnsSettingEntry=radiusExtnsSettingEntry, wlanRemoteable=wlanRemoteable, externalRadiusServerAddress=externalRadiusServerAddress, stationName=stationName, tspecUlRate=tspecUlRate, uncategorizedAPClassify=uncategorizedAPClassify, apIndex=apIndex, apPerformanceReportbyRadioAndWlanTable=apPerformanceReportbyRadioAndWlanTable, wlanBlockMuToMuTraffic=wlanBlockMuToMuTraffic, wlanAuthReplaceCalledStationIDWithZone=wlanAuthReplaceCalledStationIDWithZone, apPerfWlanCurrentULPktsPerSec=apPerfWlanCurrentULPktsPerSec, sysSerialNo=sysSerialNo, widsWipsEngineTable=widsWipsEngineTable, wlan=wlan, vnsDHCPRangeIndex=vnsDHCPRangeIndex, synchronizeSystemConfig=synchronizeSystemConfig, apZone=apZone, radiusExtnsIndex=radiusExtnsIndex, scanGroupProfileID=scanGroupProfileID, prohibitedAPTable=prohibitedAPTable, wlanStatsGroup=wlanStatsGroup, apTotalStationsN50OutOctets=apTotalStationsN50OutOctets, wlanAuthMACBasedAuthOnRoam=wlanAuthMACBasedAuthOnRoam, wlanCPExtAddIPtoURL=wlanCPExtAddIPtoURL, vnsStatTxPkts=vnsStatTxPkts, muTSPECTable=muTSPECTable, vnsAPFilterAction=vnsAPFilterAction, cpURL=cpURL, wlanCPExtConnection=wlanCPExtConnection, assocVnsIfIndex=assocVnsIfIndex, outOfSrvScanGrpRadio=outOfSrvScanGrpRadio, blacklistedClientReason=blacklistedClientReason, muAccessListGroup=muAccessListGroup, vnsMUSessionTimeout=vnsMUSessionTimeout, uncategorizedAPEntry=uncategorizedAPEntry, wlanRadiusAuthType=wlanRadiusAuthType, apTotalStationsAC=apTotalStationsAC, apLogSelectedAPsTable=apLogSelectedAPsTable, threatSummaryEntry=threatSummaryEntry, wlanStatsRadiusReqRejected=wlanStatsRadiusReqRejected, vnsEnabled=vnsEnabled, activeThreatEntry=activeThreatEntry, apRegDiscoveryRetries=apRegDiscoveryRetries, wlanCPExtSharedSecret=wlanCPExtSharedSecret, radiusFFOEid=radiusFFOEid, topoWireStatTxOctets=topoWireStatTxOctets, sysLogServersTable=sysLogServersTable, apAccCurrentAssocReqRx=apAccCurrentAssocReqRx, uncategorizedAPSSID=uncategorizedAPSSID, muAccessListEntry=muAccessListEntry, dedicatedScanGrpCounterMeasures=dedicatedScanGrpCounterMeasures, topoCompleteStatMulticastRxPkts=topoCompleteStatMulticastRxPkts, layerTwoPortGroup=layerTwoPortGroup, apLogFileUtilityCurrent=apLogFileUtilityCurrent, friendlyAPEntry=friendlyAPEntry, stationIPv6Address1=stationIPv6Address1, prohibitedAPDescription=prohibitedAPDescription, wlanCPExtEncryption=wlanCPExtEncryption, availabilityStatus=availabilityStatus, countermeasureAPEntry=countermeasureAPEntry, topoExceptionStatTable=topoExceptionStatTable, vnsVlanID=vnsVlanID, apPerfRadioCurPeakRSS=apPerfRadioCurPeakRSS, mgmtPortDomain=mgmtPortDomain, apRegSSHPassword=apRegSSHPassword, vnsRadiusServerRowStatus=vnsRadiusServerRowStatus, muState=muState, tunnelStartIP=tunnelStartIP, vnsQoSPriorityOverrideFlag=vnsQoSPriorityOverrideFlag, tspecMDR=tspecMDR, apOutUcastPkts=apOutUcastPkts, ntpServerEnabled=ntpServerEnabled, radiusExtnsSetting=radiusExtnsSetting, tspecDlRate=tspecDlRate, topologySyncGateway=topologySyncGateway, apIPMulticastAssembly=apIPMulticastAssembly, vnsWDSStatAPName=vnsWDSStatAPName, assocTxPackets=assocTxPackets, outOfSrvScanGrpScanTimeInterval=outOfSrvScanGrpScanTimeInterval, vnsAPFilterEtherType=vnsAPFilterEtherType, vnsRateControlProfile=vnsRateControlProfile, hiPathWirelessHWCConformance=hiPathWirelessHWCConformance, dedicatedScanGrpName=dedicatedScanGrpName, tspecDlViolations=tspecDlViolations, muBSSIDMac=muBSSIDMac, assocCount=assocCount, topologyManagementTraffic=topologyManagementTraffic, cpLogOff=cpLogOff, accessRejectMsgTable=accessRejectMsgTable, hiPathWirelessController=hiPathWirelessController, apPerfWlanPrevPeakClientsPerSec=apPerfWlanPrevPeakClientsPerSec, apLogFileCopyUserID=apLogFileCopyUserID, apVlanID=apVlanID, scanGroupMaxEntries=scanGroupMaxEntries, wlanCPGuestSessionLifetime=wlanCPGuestSessionLifetime, vnsQoSWireless80211eFlag=vnsQoSWireless80211eFlag, widsWipsObjectsGroup=widsWipsObjectsGroup, activeThreatThreat=activeThreatThreat, apPerfWlanPrevPeakDLPktsPerSec=apPerfWlanPrevPeakDLPktsPerSec, apAntennaTable=apAntennaTable, wlanCPIdentity=wlanCPIdentity, vnsCaptivePortalTable=vnsCaptivePortalTable, vnsFilterIDStatus=vnsFilterIDStatus, clientMessageDelayTime=clientMessageDelayTime, vnsWDSStatRxRSSI=vnsWDSStatRxRSSI, vnsRateControlProfName=vnsRateControlProfName, apTotalStationsG=apTotalStationsG, apTotalStationsN24InOctets=apTotalStationsN24InOctets, inSrvScanGrpCounterMeasuresType=inSrvScanGrpCounterMeasuresType, scanAPAcessPointName=scanAPAcessPointName, vnsWDSStatTable=vnsWDSStatTable, friendlyAPManufacturer=friendlyAPManufacturer, cpDefaultRedirectionURL=cpDefaultRedirectionURL, vnsRateControlProfTable=vnsRateControlProfTable, vnsDLSSupportEnable=vnsDLSSupportEnable, wlanRadiusServerMacAuthType=wlanRadiusServerMacAuthType, topologySyncIPEnd=topologySyncIPEnd, apPerfWlanPrevPeakULPktsPerSec=apPerfWlanPrevPeakULPktsPerSec, vnsAPFilterPortHigh=vnsAPFilterPortHigh, topologyMTUsize=topologyMTUsize, protocols=protocols, recurrenceMonthly=recurrenceMonthly, clientServiceTypeLogin=clientServiceTypeLogin, inSrvScanGrpName=inSrvScanGrpName, radacctStartOnIPAddr=radacctStartOnIPAddr, siteWlanEntry=siteWlanEntry, systemObjects=systemObjects, wlanCPExtPort=wlanCPExtPort, topologyAPRegistration=topologyAPRegistration, apPerfRadioCurPeakChannelUtilization=apPerfRadioCurPeakChannelUtilization, prohibitedAPGroup=prohibitedAPGroup, vnsAPFilterIPAddress=vnsAPFilterIPAddress, topologyStaticIPv6Address=topologyStaticIPv6Address, uncategorizedAPManufacturer=uncategorizedAPManufacturer, cpStatusCheck=cpStatusCheck, apLEDMode=apLEDMode, apTotalStationsAOutOctets=apTotalStationsAOutOctets, loadGrpWlanAssigned=loadGrpWlanAssigned, stationSessionNotifications=stationSessionNotifications, vnHeartbeatInterval=vnHeartbeatInterval, layerTwoPortName=layerTwoPortName, licenseType=licenseType, topoWireStatTable=topoWireStatTable, apLogServerIP=apLogServerIP, sysLogServerRowStatus=sysLogServerRowStatus, wlanCPGuestMinPassLength=wlanCPGuestMinPassLength, loadGroupEntry=loadGroupEntry, inSrvScanGrpRowStatus=inSrvScanGrpRowStatus, activeThreatCounterMeasure=activeThreatCounterMeasure, topoCompleteStatMulticastTxPkts=topoCompleteStatMulticastTxPkts, primaryDNS=primaryDNS, tunnelStatsEntry=tunnelStatsEntry) mibBuilder.exportSymbols('HIPATH-WIRELESS-HWC-MIB', muVnsSSID=muVnsSSID, netflowAndMirrorN=netflowAndMirrorN, wlanRadiusTimeout=wlanRadiusTimeout, wlanEnabled=wlanEnabled, apLogFileCopyDestination=apLogFileCopyDestination, fastFailover=fastFailover, apPerfWlanCurrentDLOctetsPerSec=apPerfWlanCurrentDLOctetsPerSec, vnsWEPKeyEntry=vnsWEPKeyEntry, countermeasureAPTable=countermeasureAPTable, scanAPControllerIPAddress=scanAPControllerIPAddress, vnsStatBroadcastRxPkts=vnsStatBroadcastRxPkts, wlanCPAuthType=wlanCPAuthType, vnsWINSServers=vnsWINSServers, sitePolicyMember=sitePolicyMember, wlanSecurityReportGroup=wlanSecurityReportGroup, vnsRadiusServerRetries=vnsRadiusServerRetries, wlanCPCustomSpecificURL=wlanCPCustomSpecificURL, vnsFilterRuleTable=vnsFilterRuleTable, vnsConfigTable=vnsConfigTable, topologyName=topologyName, assocEntry=assocEntry, tunnelStatsTxRxBytes=tunnelStatsTxRxBytes, topologyID=topologyID, nearbyApInfo=nearbyApInfo, inSrvScanGrpClassifySourceIF=inSrvScanGrpClassifySourceIF, wlanAuthTable=wlanAuthTable, apRestartServiceContAbsent=apRestartServiceContAbsent, stationEventTimeStamp=stationEventTimeStamp, wlanRadiusServerName=wlanRadiusServerName, includeServiceType=includeServiceType, topoWireStatEntry=topoWireStatEntry, nearbyApBSSID=nearbyApBSSID, vnsStatRadiusReqRejected=vnsStatRadiusReqRejected, authenticationAdvancedGroup=authenticationAdvancedGroup, portMacAddress=portMacAddress, stationAPName=stationAPName, apPerfRadioCurrentChannelUtilization=apPerfRadioCurrentChannelUtilization, wlanMaxEntries=wlanMaxEntries, friendlyAPTable=friendlyAPTable, portEnabled=portEnabled, wlanPrivWPAv2EncryptionType=wlanPrivWPAv2EncryptionType, apLinkTimeout=apLinkTimeout, scanAPProfileType=scanAPProfileType, uncategorizedAPGroup=uncategorizedAPGroup, vnsWDSRFPreferredParent=vnsWDSRFPreferredParent, layerTwoPortMgmtState=layerTwoPortMgmtState, apLocation=apLocation, widsWips=widsWips, stationsByProtocol=stationsByProtocol, scanGroupAPAssignInactiveAP=scanGroupAPAssignInactiveAP, dhcpRelayListeners=dhcpRelayListeners, siteName=siteName, wlanQuietIE=wlanQuietIE, topoWireStatBroadcastTxPkts=topoWireStatBroadcastTxPkts, wlanRadioManagement11k=wlanRadioManagement11k, apRadioEntry=apRadioEntry, countermeasureAPCountermeasure=countermeasureAPCountermeasure, siteLoadControlEnableR1=siteLoadControlEnableR1, wirelessEWCGroups=wirelessEWCGroups, blacklistedClientEndTime=blacklistedClientEndTime, wlanRadiusServerAuthNASIP=wlanRadiusServerAuthNASIP, authorizedAPDescription=authorizedAPDescription, vnsSuppressSSID=vnsSuppressSSID, topoStatFrameTooLongErrors=topoStatFrameTooLongErrors, apPerfWlanCurrentULOctetsPerSec=apPerfWlanCurrentULOctetsPerSec, apChnlUtilPrevPeakUtilization=apChnlUtilPrevPeakUtilization, maxBestEffortBWforAssociation=maxBestEffortBWforAssociation, apSerialNumber=apSerialNumber, portDHCPDnsServers=portDHCPDnsServers, serverUsageModel=serverUsageModel, apStatus=apStatus, wlanPrivWPAPSK=wlanPrivWPAPSK, scanGroupAPAssignmentTable=scanGroupAPAssignmentTable, vnsQoSWirelessDLPolicerAction=vnsQoSWirelessDLPolicerAction, wlanMirrorN=wlanMirrorN, apStatsMuCounts=apStatsMuCounts, stationsByProtocolG=stationsByProtocolG, clientAutologinOption=clientAutologinOption, vnsStrictSubnetAdherence=vnsStrictSubnetAdherence, vnsExceptionStatEntry=vnsExceptionStatEntry, vnRole=vnRole, apPerformanceReportbyRadioAndWlanEntry=apPerformanceReportbyRadioAndWlanEntry, dedicatedScanGrpScan2400MHzFreq=dedicatedScanGrpScan2400MHzFreq, wlanPrivBroadcastRekeying=wlanPrivBroadcastRekeying, duration=duration, vnsStatEntry=vnsStatEntry, vnsDHCPRangeTable=vnsDHCPRangeTable, threatSummaryTable=threatSummaryTable, apAccCurrentReassocReqRx=apAccCurrentReassocReqRx, widsWipsEnginePollInterval=widsWipsEnginePollInterval, apMaintainClientSession=apMaintainClientSession, wlanRadiusNASID=wlanRadiusNASID, vnsFilterRulePortLow=vnsFilterRulePortLow, logEventDescription=logEventDescription, topoWireStatRxOctets=topoWireStatRxOctets, outOfServiceScanGroup=outOfServiceScanGroup, apLogFileUtilityLimit=apLogFileUtilityLimit, vnsAPFilterMask=vnsAPFilterMask, apLogFileCopyEntry=apLogFileCopyEntry, sysLogServerIndex=sysLogServerIndex, wlanCPGuestMaxConcurrentSession=wlanCPGuestMaxConcurrentSession, apEffectiveTunnelMTU=apEffectiveTunnelMTU, apLogQuickSelectedOption=apLogQuickSelectedOption, externalRadiusServerTable=externalRadiusServerTable, apOutNUcastPkts=apOutNUcastPkts, apRadioIndex=apRadioIndex, schedule=schedule, muAccessListTable=muAccessListTable, outOfServiceScanGroupEntry=outOfServiceScanGroupEntry, apSiteID=apSiteID, siteWlanTable=siteWlanTable, sysLogLevel=sysLogLevel, scanGroupAPAssignControllerIPAddress=scanGroupAPAssignControllerIPAddress, wlanNumEntries=wlanNumEntries, apAntennaType=apAntennaType, vnsFilterRuleEtherType=vnsFilterRuleEtherType, apStatsEntry=apStatsEntry, apPerfRadioCurrentRSS=apPerfRadioCurrentRSS, muRxPackets=muRxPackets, dnsObjects=dnsObjects, apRegClusterSharedSecret=apRegClusterSharedSecret, apPerfRadioPrevPeakChannelUtilization=apPerfRadioPrevPeakChannelUtilization, apPerfWlanAverageDLPktsPerSec=apPerfWlanAverageDLPktsPerSec, secondaryDNS=secondaryDNS, topologyEgressPort=topologyEgressPort, mirrorFirstN=mirrorFirstN, topoCompleteStatTable=topoCompleteStatTable, uncategorizedAPMAC=uncategorizedAPMAC, wlanRadiusNASIP=wlanRadiusNASIP, activeThreatRSS=activeThreatRSS, loadGroupClientCountRadio1=loadGroupClientCountRadio1, wlanPrivWPAv1EncryptionType=wlanPrivWPAv1EncryptionType, muTopologyName=muTopologyName, wlanBeaconReport=wlanBeaconReport, friendlyAPSSID=friendlyAPSSID, topologyConfig=topologyConfig, scanAPProfileName=scanAPProfileName, siteAPGroup=siteAPGroup, physicalPortsEntry=physicalPortsEntry, portFunction=portFunction, vnsRadiusServerNASIdentifier=vnsRadiusServerNASIdentifier, topologyDynamicEgress=topologyDynamicEgress, wlanSessionTimeout=wlanSessionTimeout, dhcpRelayListenersMaxEntries=dhcpRelayListenersMaxEntries, apConfigObjects=apConfigObjects, pollingMechanism=pollingMechanism, blacklistedClientEntry=blacklistedClientEntry, sysLogSupport=sysLogSupport, apTotalStationsAInOctets=apTotalStationsAInOctets, apPerfRadioPrevPeakPktRetx=apPerfRadioPrevPeakPktRetx, wlanRadiusServerTable=wlanRadiusServerTable, outOfSrvScanGrpName=outOfSrvScanGrpName, vnsEnable11hSupport=vnsEnable11hSupport, HundredthOfInt32=HundredthOfInt32)
"""Contains the methods for reading and writing of files. All modules and classes involved in the reading or writing of files are included within this module. Default methods used for writing files (such as images) do not need to have further definition here, but it is recommended to obtain the path used for writing through a method in this module. """
"""Contains the methods for reading and writing of files. All modules and classes involved in the reading or writing of files are included within this module. Default methods used for writing files (such as images) do not need to have further definition here, but it is recommended to obtain the path used for writing through a method in this module. """
ans = [] while True: a, b = list(map(int, input().split())) if a == 0 and b == 0: break ans.append(a + b) for a in ans: print(a)
ans = [] while True: (a, b) = list(map(int, input().split())) if a == 0 and b == 0: break ans.append(a + b) for a in ans: print(a)
# -*- coding: utf-8 -*- major = 0 minor = 0 patch = 1 semantic = '{}.{}.{}'.format(major, minor, patch)
major = 0 minor = 0 patch = 1 semantic = '{}.{}.{}'.format(major, minor, patch)
#Ermittle alle denkbaren Sequenzen mit den vier Basenpaaren AT, TA, CG, GC paare="AT","TA","CG","GC" for a in paare: for b in paare: for c in paare: for d in paare: print(a+b+c+d,end=" ")
paare = ('AT', 'TA', 'CG', 'GC') for a in paare: for b in paare: for c in paare: for d in paare: print(a + b + c + d, end=' ')
class QuotaExceptionExceeded(Exception): pass class QuotaMaxSimultaneousExceeded(QuotaExceptionExceeded): pass class QuotaCpuExceeded(QuotaExceptionExceeded): pass class QuotaMemoryExceeded(QuotaExceptionExceeded): pass class QuotaHddExceeded(QuotaExceptionExceeded): pass class ResourceAlreadyLaunched(Exception): pass class DockerExceptionNotFound(Exception): pass
class Quotaexceptionexceeded(Exception): pass class Quotamaxsimultaneousexceeded(QuotaExceptionExceeded): pass class Quotacpuexceeded(QuotaExceptionExceeded): pass class Quotamemoryexceeded(QuotaExceptionExceeded): pass class Quotahddexceeded(QuotaExceptionExceeded): pass class Resourcealreadylaunched(Exception): pass class Dockerexceptionnotfound(Exception): pass
class QueryReader: def __init__(self, delim="\t"): self.delim = delim def __call__(self, query_path, include_relevancy=False): with open(query_path, "r") as fp: for line in fp: if include_relevancy == True: line = line.strip() query_id, query, relevancy = line.split(sep=self.delim) relevant, irrelevant = self._get_relevant(relevancy) yield (query_id, query, relevant, irrelevant) else: query_id, query = line.split(sep=self.delim) yield (query_id, query) def _get_relevant(self, relevancy): relevancy = relevancy.split(sep="-") if len(relevancy) == 2: relevant, irrelevant = relevancy irrelevant = set(irrelevant.split(sep=',')) else: relevant = relevancy[0] irrelevant = set() if relevant == '': relevant = set() else: relevant = set(relevant.split(sep=',')) return relevant, irrelevant class TRECReader: def __call__(self, judgement_path): mapping = {} with open(judgement_path, "r") as fp: for line in fp: query, _, doc_id, relevance = line.strip().split() if int(relevance) == 0: continue if query not in mapping: mapping[query] = set() mapping[query].add(doc_id) return mapping
class Queryreader: def __init__(self, delim='\t'): self.delim = delim def __call__(self, query_path, include_relevancy=False): with open(query_path, 'r') as fp: for line in fp: if include_relevancy == True: line = line.strip() (query_id, query, relevancy) = line.split(sep=self.delim) (relevant, irrelevant) = self._get_relevant(relevancy) yield (query_id, query, relevant, irrelevant) else: (query_id, query) = line.split(sep=self.delim) yield (query_id, query) def _get_relevant(self, relevancy): relevancy = relevancy.split(sep='-') if len(relevancy) == 2: (relevant, irrelevant) = relevancy irrelevant = set(irrelevant.split(sep=',')) else: relevant = relevancy[0] irrelevant = set() if relevant == '': relevant = set() else: relevant = set(relevant.split(sep=',')) return (relevant, irrelevant) class Trecreader: def __call__(self, judgement_path): mapping = {} with open(judgement_path, 'r') as fp: for line in fp: (query, _, doc_id, relevance) = line.strip().split() if int(relevance) == 0: continue if query not in mapping: mapping[query] = set() mapping[query].add(doc_id) return mapping
# Definition for a binary tree node. # class TreeNode(object): # def __init__(self, x): # self.val = x # self.left = None # self.right = None class Codec: def __init__(self): self.array = [] def serialize(self, root): """Encodes a tree to a single string. :type root: TreeNode :rtype: str """ def helper(node): if not node: self.array.append("#") else: self.array.append(str(node.val)) helper(node.left) helper(node.right) helper(root) return ",".join(self.array) def deserialize(self, data): """Decodes your encoded data to tree. :type data: str :rtype: TreeNode """ data = data.split(",") # print(data) def helper(encoded): # print(encoded) value = encoded.pop(0) if value == "#": return None node = TreeNode(int(value)) node.left = helper(encoded) node.right = helper(encoded) return node return helper(data) # Your Codec object will be instantiated and called as such: # codec = Codec() # codec.deserialize(codec.serialize(root))
class Codec: def __init__(self): self.array = [] def serialize(self, root): """Encodes a tree to a single string. :type root: TreeNode :rtype: str """ def helper(node): if not node: self.array.append('#') else: self.array.append(str(node.val)) helper(node.left) helper(node.right) helper(root) return ','.join(self.array) def deserialize(self, data): """Decodes your encoded data to tree. :type data: str :rtype: TreeNode """ data = data.split(',') def helper(encoded): value = encoded.pop(0) if value == '#': return None node = tree_node(int(value)) node.left = helper(encoded) node.right = helper(encoded) return node return helper(data)
def gangs(divisors,k): res=set() for i in range(1, k+1): res.add(helper(divisors, i)) return len(res) def helper(divisors, n): res=tuple() for i in divisors: if n%i==0: res+=(i, ) return res
def gangs(divisors, k): res = set() for i in range(1, k + 1): res.add(helper(divisors, i)) return len(res) def helper(divisors, n): res = tuple() for i in divisors: if n % i == 0: res += (i,) return res
"""Rules for importing a Go toolchain from Nixpkgs. **NOTE: The following rules must be loaded from `@io_tweag_rules_nixpkgs//nixpkgs:toolchains/go.bzl` to avoid unnecessary dependencies on rules_go for those who don't need go toolchain. `io_bazel_rules_go` must be available for loading before loading of `@io_tweag_rules_nixpkgs//nixpkgs:toolchains/go.bzl`.** """ load( "@io_bazel_rules_go//go:deps.bzl", "go_wrap_sdk", ) load( "//nixpkgs:nixpkgs.bzl", "nixpkgs_package", ) def nixpkgs_go_configure( sdk_name = "go_sdk", repository = None, repositories = {}, nix_file = None, nix_file_deps = None, nix_file_content = None, nixopts = []): """Use go toolchain from Nixpkgs. Will fail if not a nix-based platform. By default rules_go configures the go toolchain to be downloaded as binaries (which doesn't work on NixOS), there is a way to tell rules_go to look into environment and find local go binary which is not hermetic. This command allows to setup hermetic go sdk from Nixpkgs, which should be considerate as best practice. Note that the nix package must provide a full go sdk at the root of the package instead of in `$out/share/go`, and also provide an empty normal file named `PACKAGE_ROOT` at the root of package. #### Example ```bzl nixpkgs_go_configure(repository = "@nixpkgs//:default.nix") ``` Example (optional nix support when go is a transitive dependency): ```bzl # .bazel-lib/nixos-support.bzl def _has_nix(ctx): return ctx.which("nix-build") != None def _gen_imports_impl(ctx): ctx.file("BUILD", "") imports_for_nix = \""" load("@io_tweag_rules_nixpkgs//nixpkgs:toolchains/go.bzl", "nixpkgs_go_toolchain") def fix_go(): nixpkgs_go_toolchain(repository = "@nixpkgs") \""" imports_for_non_nix = \""" def fix_go(): # if go isn't transitive you'll need to add call to go_register_toolchains here pass \""" if _has_nix(ctx): ctx.file("imports.bzl", imports_for_nix) else: ctx.file("imports.bzl", imports_for_non_nix) _gen_imports = repository_rule( implementation = _gen_imports_impl, attrs = dict(), ) def gen_imports(): _gen_imports( name = "nixos_support", ) # WORKSPACE // ... http_archive(name = "io_tweag_rules_nixpkgs", ...) // ... local_repository( name = "bazel_lib", path = ".bazel-lib", ) load("@bazel_lib//:nixos-support.bzl", "gen_imports") gen_imports() load("@nixos_support//:imports.bzl", "fix_go") fix_go() ``` Args: sdk_name: Go sdk name to pass to rules_go nix_file: An expression for a Nix environment derivation. The environment should expose the whole go SDK (`bin`, `src`, ...) at the root of package. It also must contain a `PACKAGE_ROOT` file in the root of pacakge. nix_file_deps: Dependencies of `nix_file` if any. nix_file_content: An expression for a Nix environment derivation. repository: A repository label identifying which Nixpkgs to use. Equivalent to `repositories = { "nixpkgs": ...}`. repositories: A dictionary mapping `NIX_PATH` entries to repository labels. Setting it to ``` repositories = { "myrepo" : "//:myrepo" } ``` for example would replace all instances of `<myrepo>` in the called nix code by the path to the target `"//:myrepo"`. See the [relevant section in the nix manual](https://nixos.org/nix/manual/#env-NIX_PATH) in the nix manual for more information. Specify one of `path` or `repositories`. """ if not nix_file and not nix_file_content: nix_file_content = """ with import <nixpkgs> { config = {}; overlays = []; }; buildEnv { name = "bazel-go-toolchain"; paths = [ go ]; postBuild = '' touch $out/PACKAGE_ROOT ln -s $out/share/go/{api,doc,lib,misc,pkg,src} $out/ ''; } """ nixpkgs_package( name = "nixpkgs_go_toolchain", repository = repository, repositories = repositories, nix_file = nix_file, nix_file_deps = nix_file_deps, nix_file_content = nix_file_content, build_file_content = """exports_files(glob(["**/*"]))""", nixopts = nixopts, ) go_wrap_sdk(name = sdk_name, root_file = "@nixpkgs_go_toolchain//:PACKAGE_ROOT")
"""Rules for importing a Go toolchain from Nixpkgs. **NOTE: The following rules must be loaded from `@io_tweag_rules_nixpkgs//nixpkgs:toolchains/go.bzl` to avoid unnecessary dependencies on rules_go for those who don't need go toolchain. `io_bazel_rules_go` must be available for loading before loading of `@io_tweag_rules_nixpkgs//nixpkgs:toolchains/go.bzl`.** """ load('@io_bazel_rules_go//go:deps.bzl', 'go_wrap_sdk') load('//nixpkgs:nixpkgs.bzl', 'nixpkgs_package') def nixpkgs_go_configure(sdk_name='go_sdk', repository=None, repositories={}, nix_file=None, nix_file_deps=None, nix_file_content=None, nixopts=[]): '''Use go toolchain from Nixpkgs. Will fail if not a nix-based platform. By default rules_go configures the go toolchain to be downloaded as binaries (which doesn't work on NixOS), there is a way to tell rules_go to look into environment and find local go binary which is not hermetic. This command allows to setup hermetic go sdk from Nixpkgs, which should be considerate as best practice. Note that the nix package must provide a full go sdk at the root of the package instead of in `$out/share/go`, and also provide an empty normal file named `PACKAGE_ROOT` at the root of package. #### Example ```bzl nixpkgs_go_configure(repository = "@nixpkgs//:default.nix") ``` Example (optional nix support when go is a transitive dependency): ```bzl # .bazel-lib/nixos-support.bzl def _has_nix(ctx): return ctx.which("nix-build") != None def _gen_imports_impl(ctx): ctx.file("BUILD", "") imports_for_nix = """ load("@io_tweag_rules_nixpkgs//nixpkgs:toolchains/go.bzl", "nixpkgs_go_toolchain") def fix_go(): nixpkgs_go_toolchain(repository = "@nixpkgs") """ imports_for_non_nix = """ def fix_go(): # if go isn't transitive you'll need to add call to go_register_toolchains here pass """ if _has_nix(ctx): ctx.file("imports.bzl", imports_for_nix) else: ctx.file("imports.bzl", imports_for_non_nix) _gen_imports = repository_rule( implementation = _gen_imports_impl, attrs = dict(), ) def gen_imports(): _gen_imports( name = "nixos_support", ) # WORKSPACE // ... http_archive(name = "io_tweag_rules_nixpkgs", ...) // ... local_repository( name = "bazel_lib", path = ".bazel-lib", ) load("@bazel_lib//:nixos-support.bzl", "gen_imports") gen_imports() load("@nixos_support//:imports.bzl", "fix_go") fix_go() ``` Args: sdk_name: Go sdk name to pass to rules_go nix_file: An expression for a Nix environment derivation. The environment should expose the whole go SDK (`bin`, `src`, ...) at the root of package. It also must contain a `PACKAGE_ROOT` file in the root of pacakge. nix_file_deps: Dependencies of `nix_file` if any. nix_file_content: An expression for a Nix environment derivation. repository: A repository label identifying which Nixpkgs to use. Equivalent to `repositories = { "nixpkgs": ...}`. repositories: A dictionary mapping `NIX_PATH` entries to repository labels. Setting it to ``` repositories = { "myrepo" : "//:myrepo" } ``` for example would replace all instances of `<myrepo>` in the called nix code by the path to the target `"//:myrepo"`. See the [relevant section in the nix manual](https://nixos.org/nix/manual/#env-NIX_PATH) in the nix manual for more information. Specify one of `path` or `repositories`. ''' if not nix_file and (not nix_file_content): nix_file_content = '\n with import <nixpkgs> { config = {}; overlays = []; }; buildEnv {\n name = "bazel-go-toolchain";\n paths = [\n go\n ];\n postBuild = \'\'\n touch $out/PACKAGE_ROOT\n ln -s $out/share/go/{api,doc,lib,misc,pkg,src} $out/\n \'\';\n }\n ' nixpkgs_package(name='nixpkgs_go_toolchain', repository=repository, repositories=repositories, nix_file=nix_file, nix_file_deps=nix_file_deps, nix_file_content=nix_file_content, build_file_content='exports_files(glob(["**/*"]))', nixopts=nixopts) go_wrap_sdk(name=sdk_name, root_file='@nixpkgs_go_toolchain//:PACKAGE_ROOT')
def word_break2(s, word_dict): """ :type s: str :type goal: str :rtype: bool """ dp = [] for i in range(0, len(s)): # print(i, s[:i+1] , dp) if s[:i+1] in word_dict: dp.append(i+1) else: for j in dp: if s[j:i+1] in word_dict: dp.append(i+1) if len(s) in dp: return True return False #12:30 a working solution by 12:45 #Tests def word_break2_test(): input_s1 = "leetcode" input_s2 = "applepenapple" input_s3 = "catsandog" input_word_dict1 = ["leet","code"] input_word_dict2 = ["apple","pen"] input_word_dict3 = ["cats","dog","sand","and","cat"] expected_output1 = True expected_output2 = True expected_output3 = False actual_output1 = word_break2(input_s1, input_word_dict1) actual_output2 = word_break2(input_s2, input_word_dict2) actual_output3 = word_break2(input_s3, input_word_dict3) return ( expected_output1 == actual_output1, expected_output2 == actual_output2, expected_output3 == actual_output3 ) print(word_break2_test())
def word_break2(s, word_dict): """ :type s: str :type goal: str :rtype: bool """ dp = [] for i in range(0, len(s)): if s[:i + 1] in word_dict: dp.append(i + 1) else: for j in dp: if s[j:i + 1] in word_dict: dp.append(i + 1) if len(s) in dp: return True return False def word_break2_test(): input_s1 = 'leetcode' input_s2 = 'applepenapple' input_s3 = 'catsandog' input_word_dict1 = ['leet', 'code'] input_word_dict2 = ['apple', 'pen'] input_word_dict3 = ['cats', 'dog', 'sand', 'and', 'cat'] expected_output1 = True expected_output2 = True expected_output3 = False actual_output1 = word_break2(input_s1, input_word_dict1) actual_output2 = word_break2(input_s2, input_word_dict2) actual_output3 = word_break2(input_s3, input_word_dict3) return (expected_output1 == actual_output1, expected_output2 == actual_output2, expected_output3 == actual_output3) print(word_break2_test())
#!/usr/bin/env python3 # ***************************************** # PiFire Display Prototype Interface Library # ***************************************** # # Description: This library simulates a display. # # ***************************************** # ***************************************** # Imported Libraries # ***************************************** class Display: def __init__(self): self.DisplaySplash() def DisplayStatus(self, in_data, status_data): print('====[Display]=====') print('* Grill Temp: ' + str(in_data['GrillTemp'])[:5] + 'F') print('* Grill SetPoint: ' + str(in_data['GrillSetPoint']) + 'F') print('* Probe1 Temp: ' + str(in_data['Probe1Temp'])[:5] + 'F') print('* Probe1 SetPoint: ' + str(in_data['Probe1SetPoint']) + 'F') print('* Probe2 Temp: ' + str(in_data['Probe2Temp'])[:5] + 'F') print('* Probe2 SetPoint: ' + str(in_data['Probe2SetPoint']) + 'F') print('* Mode: ' + str(status_data['mode'])) notification = False for item in status_data['notify_req']: if status_data['notify_req'][item] == True: notification = True if notification == True: print('* Notifications: True') for item in status_data['outpins']: if status_data['outpins'][item] == 0: print('* ' + str(item) + ' ON') print('==================') def DisplaySplash(self): print(' ( (') print(' )\ ) )\ )') print(' (()/( ( (()/( ( ( (') print(' /(_)))\ /(_)) )\ )( ))\ ') print(' (_)) ((_)(_))_|((_)(()\ /((_) ') print(' | _ \ (_)| |_ (_) ((_)(_)) ') print(' | _/ | || __| | || \'_|/ -_) ') print(' |_| |_||_| |_||_| \___| ') def ClearDisplay(self): print('[Display] Clear Display Command Sent') def DisplayText(self, text): print('====[Display]=====') print('* Text: ' + str(text)) print('==================') def EventDetect(self): return()
class Display: def __init__(self): self.DisplaySplash() def display_status(self, in_data, status_data): print('====[Display]=====') print('* Grill Temp: ' + str(in_data['GrillTemp'])[:5] + 'F') print('* Grill SetPoint: ' + str(in_data['GrillSetPoint']) + 'F') print('* Probe1 Temp: ' + str(in_data['Probe1Temp'])[:5] + 'F') print('* Probe1 SetPoint: ' + str(in_data['Probe1SetPoint']) + 'F') print('* Probe2 Temp: ' + str(in_data['Probe2Temp'])[:5] + 'F') print('* Probe2 SetPoint: ' + str(in_data['Probe2SetPoint']) + 'F') print('* Mode: ' + str(status_data['mode'])) notification = False for item in status_data['notify_req']: if status_data['notify_req'][item] == True: notification = True if notification == True: print('* Notifications: True') for item in status_data['outpins']: if status_data['outpins'][item] == 0: print('* ' + str(item) + ' ON') print('==================') def display_splash(self): print(' ( (') print(' )\\ ) )\\ )') print(' (()/( ( (()/( ( ( (') print(' /(_)))\\ /(_)) )\\ )( ))\\ ') print(' (_)) ((_)(_))_|((_)(()\\ /((_) ') print(' | _ \\ (_)| |_ (_) ((_)(_)) ') print(" | _/ | || __| | || '_|/ -_) ") print(' |_| |_||_| |_||_| \\___| ') def clear_display(self): print('[Display] Clear Display Command Sent') def display_text(self, text): print('====[Display]=====') print('* Text: ' + str(text)) print('==================') def event_detect(self): return ()
# 4-6. Odd Numbers odd_numbers = list(range(1,21,2)) print(odd_numbers)
odd_numbers = list(range(1, 21, 2)) print(odd_numbers)
def proCategorization(pros, preferences): pref_dict = {} for i in range(len(pros)): name = pros[i] prefs = preferences[i] for j in range(len(prefs)): p = prefs[j] if p not in pref_dict: pref_dict[p] = [name] else: pref_dict[p] += [name] out_list = [] for k in sorted(pref_dict): tmp = [[k], pref_dict[k]] out_list += [tmp] return out_list
def pro_categorization(pros, preferences): pref_dict = {} for i in range(len(pros)): name = pros[i] prefs = preferences[i] for j in range(len(prefs)): p = prefs[j] if p not in pref_dict: pref_dict[p] = [name] else: pref_dict[p] += [name] out_list = [] for k in sorted(pref_dict): tmp = [[k], pref_dict[k]] out_list += [tmp] return out_list
def app(): # pragma: no cover return None def returns_app(): # pragma: no cover return app
def app(): return None def returns_app(): return app
def test_success(): assert True def add_and_del(startnum, addnum, delnum): return startnum + addnum - delnum
def test_success(): assert True def add_and_del(startnum, addnum, delnum): return startnum + addnum - delnum
# dp + recursion (top to down) # Runtime: 688 ms, faster than 26.38% of Python3 online submissions for Burst Balloons. # Memory Usage: 13.6 MB, less than 55.82% of Python3 online submissions for Burst Balloons. class Solution: def maxCoins(self, nums: List[int]) -> int: nums = [1] + nums + [1] n = len(nums) dp = [[0 for _ in range(n)] for _ in range(n)] def calculate(nums, dp, left, right): if dp[left][right] or right == left + 1: return dp[left][right] coins = 0 for mid in range(left + 1, right): coins = max(coins, nums[left] * nums[mid] * nums[right] + calculate(nums, dp, left, mid) + calculate(nums, dp, mid, right)) dp[left][right] = coins return coins return calculate(nums, dp, 0, n - 1) # dp + three for (down to top) # Runtime: 424 ms, faster than 76.29% of Python3 online submissions for Burst Balloons. # Memory Usage: 13.5 MB, less than 65.96% of Python3 online submissions for Burst Balloons. class Solution: def maxCoins(self, nums: List[int]) -> int: nums = [1] + nums + [1] n = len(nums) dp = [[0 for _ in range(n)] for _ in range(n)] for gap in range(2, n): for left in range(n - gap): right = left + gap for mid in range(left + 1, right): dp[left][right] = max(dp[left][right], nums[left] * nums[mid] * nums[right] + dp[left][mid] + dp[mid][right]) return dp[0][-1] # dp: row is left, column is right
class Solution: def max_coins(self, nums: List[int]) -> int: nums = [1] + nums + [1] n = len(nums) dp = [[0 for _ in range(n)] for _ in range(n)] def calculate(nums, dp, left, right): if dp[left][right] or right == left + 1: return dp[left][right] coins = 0 for mid in range(left + 1, right): coins = max(coins, nums[left] * nums[mid] * nums[right] + calculate(nums, dp, left, mid) + calculate(nums, dp, mid, right)) dp[left][right] = coins return coins return calculate(nums, dp, 0, n - 1) class Solution: def max_coins(self, nums: List[int]) -> int: nums = [1] + nums + [1] n = len(nums) dp = [[0 for _ in range(n)] for _ in range(n)] for gap in range(2, n): for left in range(n - gap): right = left + gap for mid in range(left + 1, right): dp[left][right] = max(dp[left][right], nums[left] * nums[mid] * nums[right] + dp[left][mid] + dp[mid][right]) return dp[0][-1]
"""Constants for Skoda Connect library.""" BASE_SESSION = 'https://msg.volkswagen.de' BASE_AUTH = 'https://identity.vwgroup.io' BRAND = 'skoda' COUNTRY = 'CZ' # Headers used in communication CLIENT_ID = '7f045eee-7003-4379-9968-9355ed2adb06%40apps_vw-dilab_com' XCLIENT_ID = '28cd30c6-dee7-4529-a0e6-b1e07ff90b79' XAPPVERSION = '3.2.6' XAPPNAME = 'cz.skodaauto.connect' USER_AGENT = 'okhttp/3.14.7' APP_URI = 'skodaconnect://oidc.login/' # Used when fetching data HEADERS_SESSION = { 'Connection': 'keep-alive', 'Content-Type': 'application/json', 'Accept-charset': 'UTF-8', 'Accept': 'application/json', 'X-Client-Id': XCLIENT_ID, 'X-App-Version': XAPPVERSION, 'X-App-Name': XAPPNAME, 'User-Agent': USER_AGENT } # Used for authentication HEADERS_AUTH = { 'Connection': 'keep-alive', 'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8', 'Accept-Encoding': 'gzip, deflate', 'Content-Type': 'application/x-www-form-urlencoded', 'x-requested-with': XAPPNAME, 'User-Agent': USER_AGENT, 'X-App-Name': XAPPNAME } # Different parameters used in authentication SCOPE = 'openid mbb profile address cars email birthdate badge phone driversLicense dealers' TOKEN_TYPES = 'code id_token token'
"""Constants for Skoda Connect library.""" base_session = 'https://msg.volkswagen.de' base_auth = 'https://identity.vwgroup.io' brand = 'skoda' country = 'CZ' client_id = '7f045eee-7003-4379-9968-9355ed2adb06%40apps_vw-dilab_com' xclient_id = '28cd30c6-dee7-4529-a0e6-b1e07ff90b79' xappversion = '3.2.6' xappname = 'cz.skodaauto.connect' user_agent = 'okhttp/3.14.7' app_uri = 'skodaconnect://oidc.login/' headers_session = {'Connection': 'keep-alive', 'Content-Type': 'application/json', 'Accept-charset': 'UTF-8', 'Accept': 'application/json', 'X-Client-Id': XCLIENT_ID, 'X-App-Version': XAPPVERSION, 'X-App-Name': XAPPNAME, 'User-Agent': USER_AGENT} headers_auth = {'Connection': 'keep-alive', 'Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8', 'Accept-Encoding': 'gzip, deflate', 'Content-Type': 'application/x-www-form-urlencoded', 'x-requested-with': XAPPNAME, 'User-Agent': USER_AGENT, 'X-App-Name': XAPPNAME} scope = 'openid mbb profile address cars email birthdate badge phone driversLicense dealers' token_types = 'code id_token token'
class Solution(object): def repeatedSubstringPattern(self, s): for l in range(1, len(s)//2+1): if len(s)%l == 0: str_sub = s[:l] n = len(s)//l if str_sub * n == s: return True return False print(Solution().repeatedSubstringPattern("aba"))
class Solution(object): def repeated_substring_pattern(self, s): for l in range(1, len(s) // 2 + 1): if len(s) % l == 0: str_sub = s[:l] n = len(s) // l if str_sub * n == s: return True return False print(solution().repeatedSubstringPattern('aba'))
# AutoRead Configuration File default """ AUTOREAD CONFIG File Author: James Cooper Contact: [email protected] Description: Shared code for many parts of AutoRead. This project was made for the Guildhall School of Music and Drama. Developed with the Milton Court TAIT eChameleon Automation installation in mind. """ """Leave these first sections alone :)""" class LightType: def __init__(self, type_name, total_pan, total_tilt, yoke_offset): self.type_name = type_name self.total_pan = total_pan self.total_tilt = total_tilt self.yoke_offset = yoke_offset def print_me(self): print("type_name:\t\t", self.type_name) print("total_pan:\t\t", self.total_pan) print("total_tilt:\t\t", self.total_tilt) print("yoke_offset\t\t", self.yoke_offset) def GenerateNewLightList(): """You should use this function to generate a new light configuration. Note, adaptations will need to be made if you want to add more LightTypes.""" Lights = [] NumberToMake = int(input("How many lights would you like to have in the system?")) for UnitID in range(NumberToMake): ThisLightType = str(input("What type of light is this? (\"TW1\" or \"ETC_REV\")")) CentreOffset = int(input("What is it's X value, based on your origin?\n\t-\tNote: Anything Stage Right of 0 should be negative.")) ThisItemAxis = int(input("What axis is the light on? Enter a number only.")) Lights.append([ThisLightType,(CentreOffset, None, None), ThisItemAxis, UnitID+1]) print("Lights = [{0}]".format(",\n".join([str(x) for x in Lights]))) return Lights """AUTO READ CONFIG FILE - READ FROM HERE DOWN""" """ _ _ _______ ____ _____ ______ _____ /\ | | | |__ __/ __ \| __ \| ____| /\ | __ \ / \ | | | | | | | | | | |__) | |__ / \ | | | | / /\ \| | | | | | | | | | _ /| __| / /\ \ | | | | / ____ \ |__| | | | | |__| | | \ \| |____ / ____ \| |__| | /_/ \_\____/ |_| \____/|_| \_\______/_/ \_\_____/ """ """If this system is installed, with an automation network, set this to False""" _offline_test_ = True #_offline_test_ = False """AutoRead Track functions""" """Set Up GPIO LED Pins""" LED_def = {"led1":16,"led2":18} """ AutoRead (Read) Settings """ # The broadcast IP for your Simotion Automation input UDP_IP = "172.16.1.255" # Port being used for Simotion output UDP_PORT = 30501 LENGTH_HEADER = 24 # How many bytes long is the head1..head4 section of the simotion packet. ATTR_PER_AXIS = 5 # How many data points are being sent per axis? Important because of how we interpret the packet. # Map your eCham Axis to the Node/Channel format. # Format: Node,Channel,Axis axisNodeChannels = [ [1, 1, 20],[1, 2, 22],[1, 3, 24],[1, 4, 26], [1, 5, 28],[1, 6, 30],[1, 7, 32],[1, 8, 35], [1, 9, 41],[1, 10, 42],[1, 11, 43],[1, 12, 44], [1, 13, 45],[1, 14, 46],[1, 15, 91],[1, 16, 92], [1, 17, 93],[2, 1, 1],[2, 2, 2],[2, 3, 5], [2, 4, 7],[2, 5, 9],[2, 6, 11],[2, 7, 13], [2, 8, 15],[2, 9, 17],[2, 10, 19],[2, 11, 21], [2, 12, 23],[2, 13, 25],[2, 14, 27],[2, 15, 29], [2, 16, 31],[2, 17, 33],[2, 18, 34],[2, 19, 3], [2, 20, 4],[2, 21, 6],[2, 22, 8],[2, 23, 10], [2, 24, 12],[2, 25, 14],[2, 26, 16],[2, 27, 18], [3, 1, 81],[3, 2, 82]] # This saves on computing time - if the starting axis in eCham is nowhere near 1 FirstEChamAxis = 1 #Default should be 1 though. # Copy and paste this to make sure you have the right number of nodes in the system. Node1 = { "Name": "1A0", "IP": "172.16.1.51", "recv": False, } Node2 = { "Name": "2A0", "IP": "172.16.1.52", "recv": False, } Nodes = [Node1,Node2] NumberOfNodes = len(Nodes) """AutoRead (Track) Settings""" # Define AxisYValues based on CAD plan AxisYValues = [200,500,800,1200,1400,1600,1800,2000,2200,2400,2600,2800,3000, 3200,3400,3600,3800,4000,4200,4400,4600,4800,5000,5200,5400,5600,5800,6000,6200, 6400,6600,6800,7000] # Update Axis status and Z value here - this is because we're not connected to Auto Network. axisDict = { 1: (3871,0,0), 2: (10709,0,0), 3: (2550,0,0), 4: (5811,0,0), 5: (4108,0,0), 6: (3701,0,0), 7: (1549,0,0), 8: (6750,0,0), 9: (4127,0,0), 10: (6479,0,0), 11: (6214,0,0), 12: (7136,0,0), 13: (12364,0,0), 14: (3541,0,0), 15: (12606,0,0), 16: (3872,0,0), 17: (4360,0,0), 18: (12200,0,0), 19: (12768,0,0), 20: (2815,0,0), 21: (9137,0,0), 22: (10100,0,0), 23: (9172,0,0), 24: (7573,0,0), 25: (5697,0,0), 26: (13667,0,0), 27: (6386,0,0), 28: (5740,0,0), 29: (7080,0,0), 30: (13992,0,0), 31: (6000,0,0), 32: (3248,0,0), 33: (3869,0,0), } LightTypeObjects = [LightType("TW1", 540, 242, 454), # YOKE OFFSET OF 454 does not account for clamps LightType("ETC_REV", 540, 270, 713)] # 713 accounts to pipe - but measure it ## Format: [ [LightType Name, (X coordinate, None, None), AxisNumber, unitID], ] Lights = [['ETC_REV', (0, None, None), 8, 1], ['TW1', (-3628, None, None), 8, 2], ['TW1', (-4342, None, None), 22, 3], ['TW1', (-3000, None, None), 31, 4], ['TW1', (145, None, None), 22, 5], ['TW1', (3000, None, None), 31, 6], ['TW1', (3288, None, None), 22, 7], ['TW1', (4328, None, None), 8, 8], #['TW1', (-4320, 6000, 10000), None, 9], ] #Lights = [['TW1', (3000, None, None), 10, 1], #['TW1', (-3000, None, None), 24, 2],] #Format: # [ [ UnitID, Univ, AddrPanCoarse, AddrPanFine,AddrTiltCoarse,AddrTiltFine] ] LightsUniverseAddr=[ [1, 1, 2,3,4,5], [2, 1, 45,46,47,48], [3, 1, 65,66,67,68], [4, 1, 85,86,87,88], [5, 1, 105,106,107,108], [6, 1, 125,126,127,128], [7, 1, 145,146,147,148], [8, 1, 165,166,167,168],] # Format per point: # [ ((X,Y,Z), "Name", ID - should be unique), ... ] TrackingPoints = [((0,0,0),"Tracking Point 1", 1), ((-2500,1500,0), "Mid Stage Centre Track", 2), ((300,6742,100), "Upstage Left Tracking Point", 3), ((0,4000,3000), "Above CS", 4), ((1521,1400,2000), "Man DSR", 5), ((3000,3000,3000), "3m Square", 6), ((-1569,3313,1000), "Table", 7), ] # Format: [[Light.unitID, TrackingPoint.ID],...] LightsTracking = [[1,1],[2,1],[3,7],[4,5],[5,5],[6,7],[7,5],[8,5], [9,5]] #LightsTracking = [[1,6],[2,6]] """AutoRead (Control) Settings""" sACNPriority = 150 """ # Axis Definitions - Describe Node per Axis definitions here, retrofit into AR_read file """ def main(): print(""" COM_CONFIG.py - AUTOREAD CONFIG FILE Sorry chief. This file is just common constant variables. You'll want to edit this file though:\nuse a text editor, or \"nano\" on the command line JRC 27APR2020 Support at [email protected] if you're stuck. Uncomment the last line in this file to help you generate a new "Lights" list, which you can use to replace the one in this file. """) if __name__ == "__main__": main() GenerateNewLightList()
""" AUTOREAD CONFIG File Author: James Cooper Contact: [email protected] Description: Shared code for many parts of AutoRead. This project was made for the Guildhall School of Music and Drama. Developed with the Milton Court TAIT eChameleon Automation installation in mind. """ 'Leave these first sections alone :)' class Lighttype: def __init__(self, type_name, total_pan, total_tilt, yoke_offset): self.type_name = type_name self.total_pan = total_pan self.total_tilt = total_tilt self.yoke_offset = yoke_offset def print_me(self): print('type_name:\t\t', self.type_name) print('total_pan:\t\t', self.total_pan) print('total_tilt:\t\t', self.total_tilt) print('yoke_offset\t\t', self.yoke_offset) def generate_new_light_list(): """You should use this function to generate a new light configuration. Note, adaptations will need to be made if you want to add more LightTypes.""" lights = [] number_to_make = int(input('How many lights would you like to have in the system?')) for unit_id in range(NumberToMake): this_light_type = str(input('What type of light is this? ("TW1" or "ETC_REV")')) centre_offset = int(input("What is it's X value, based on your origin?\n\t-\tNote: Anything Stage Right of 0 should be negative.")) this_item_axis = int(input('What axis is the light on? Enter a number only.')) Lights.append([ThisLightType, (CentreOffset, None, None), ThisItemAxis, UnitID + 1]) print('Lights = [{0}]'.format(',\n'.join([str(x) for x in Lights]))) return Lights 'AUTO READ CONFIG FILE - READ FROM HERE DOWN' '\n _ _ _______ ____ _____ ______ _____\n /\\ | | | |__ __/ __ \\| __ \\| ____| /\\ | __ / \\ | | | | | | | | | | |__) | |__ / \\ | | | |\n / /\\ \\| | | | | | | | | | _ /| __| / /\\ \\ | | | |\n / ____ \\ |__| | | | | |__| | | \\ \\| |____ / ____ \\| |__| |\n /_/ \\_\\____/ |_| \\____/|_| \\_\\______/_/ \\_\\_____/\n\n\n' 'If this system is installed, with an automation network, set this to False' _offline_test_ = True 'AutoRead Track functions' 'Set Up GPIO LED Pins' led_def = {'led1': 16, 'led2': 18} ' AutoRead (Read) Settings ' udp_ip = '172.16.1.255' udp_port = 30501 length_header = 24 attr_per_axis = 5 axis_node_channels = [[1, 1, 20], [1, 2, 22], [1, 3, 24], [1, 4, 26], [1, 5, 28], [1, 6, 30], [1, 7, 32], [1, 8, 35], [1, 9, 41], [1, 10, 42], [1, 11, 43], [1, 12, 44], [1, 13, 45], [1, 14, 46], [1, 15, 91], [1, 16, 92], [1, 17, 93], [2, 1, 1], [2, 2, 2], [2, 3, 5], [2, 4, 7], [2, 5, 9], [2, 6, 11], [2, 7, 13], [2, 8, 15], [2, 9, 17], [2, 10, 19], [2, 11, 21], [2, 12, 23], [2, 13, 25], [2, 14, 27], [2, 15, 29], [2, 16, 31], [2, 17, 33], [2, 18, 34], [2, 19, 3], [2, 20, 4], [2, 21, 6], [2, 22, 8], [2, 23, 10], [2, 24, 12], [2, 25, 14], [2, 26, 16], [2, 27, 18], [3, 1, 81], [3, 2, 82]] first_e_cham_axis = 1 node1 = {'Name': '1A0', 'IP': '172.16.1.51', 'recv': False} node2 = {'Name': '2A0', 'IP': '172.16.1.52', 'recv': False} nodes = [Node1, Node2] number_of_nodes = len(Nodes) 'AutoRead (Track) Settings' axis_y_values = [200, 500, 800, 1200, 1400, 1600, 1800, 2000, 2200, 2400, 2600, 2800, 3000, 3200, 3400, 3600, 3800, 4000, 4200, 4400, 4600, 4800, 5000, 5200, 5400, 5600, 5800, 6000, 6200, 6400, 6600, 6800, 7000] axis_dict = {1: (3871, 0, 0), 2: (10709, 0, 0), 3: (2550, 0, 0), 4: (5811, 0, 0), 5: (4108, 0, 0), 6: (3701, 0, 0), 7: (1549, 0, 0), 8: (6750, 0, 0), 9: (4127, 0, 0), 10: (6479, 0, 0), 11: (6214, 0, 0), 12: (7136, 0, 0), 13: (12364, 0, 0), 14: (3541, 0, 0), 15: (12606, 0, 0), 16: (3872, 0, 0), 17: (4360, 0, 0), 18: (12200, 0, 0), 19: (12768, 0, 0), 20: (2815, 0, 0), 21: (9137, 0, 0), 22: (10100, 0, 0), 23: (9172, 0, 0), 24: (7573, 0, 0), 25: (5697, 0, 0), 26: (13667, 0, 0), 27: (6386, 0, 0), 28: (5740, 0, 0), 29: (7080, 0, 0), 30: (13992, 0, 0), 31: (6000, 0, 0), 32: (3248, 0, 0), 33: (3869, 0, 0)} light_type_objects = [light_type('TW1', 540, 242, 454), light_type('ETC_REV', 540, 270, 713)] lights = [['ETC_REV', (0, None, None), 8, 1], ['TW1', (-3628, None, None), 8, 2], ['TW1', (-4342, None, None), 22, 3], ['TW1', (-3000, None, None), 31, 4], ['TW1', (145, None, None), 22, 5], ['TW1', (3000, None, None), 31, 6], ['TW1', (3288, None, None), 22, 7], ['TW1', (4328, None, None), 8, 8]] lights_universe_addr = [[1, 1, 2, 3, 4, 5], [2, 1, 45, 46, 47, 48], [3, 1, 65, 66, 67, 68], [4, 1, 85, 86, 87, 88], [5, 1, 105, 106, 107, 108], [6, 1, 125, 126, 127, 128], [7, 1, 145, 146, 147, 148], [8, 1, 165, 166, 167, 168]] tracking_points = [((0, 0, 0), 'Tracking Point 1', 1), ((-2500, 1500, 0), 'Mid Stage Centre Track', 2), ((300, 6742, 100), 'Upstage Left Tracking Point', 3), ((0, 4000, 3000), 'Above CS', 4), ((1521, 1400, 2000), 'Man DSR', 5), ((3000, 3000, 3000), '3m Square', 6), ((-1569, 3313, 1000), 'Table', 7)] lights_tracking = [[1, 1], [2, 1], [3, 7], [4, 5], [5, 5], [6, 7], [7, 5], [8, 5], [9, 5]] 'AutoRead (Control) Settings' s_acn_priority = 150 '\n# Axis Definitions\n- Describe Node per Axis definitions here, retrofit into AR_read file\n' def main(): print('\nCOM_CONFIG.py - AUTOREAD CONFIG FILE\n\nSorry chief. This file is just common constant variables.\nYou\'ll want to edit this file though:\nuse a text editor, or "nano" on the command line\nJRC 27APR2020\n\nSupport at [email protected] if you\'re stuck.\n\nUncomment the last line in this file to help you generate a new "Lights" list,\nwhich you can use to replace the one in this file.\n') if __name__ == '__main__': main() generate_new_light_list()
# n = A.length # time = O(n) # space = O(n) # done time = 30m class Solution: def prefixesDivBy5(self, A: List[int]) -> List[bool]: num = 0 ret = [] for a in A: num = (num << 1) + a ret.append(num % 5 == 0) return ret
class Solution: def prefixes_div_by5(self, A: List[int]) -> List[bool]: num = 0 ret = [] for a in A: num = (num << 1) + a ret.append(num % 5 == 0) return ret
# -*- coding: utf-8 -*- """ Wanini's Python Sample Project ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ wPyProj is a template of Python project. :copyright: (c) 2021 by Ting-Hsu Chang. :license: MIT, see LICENSE for more details. """
""" Wanini's Python Sample Project ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ wPyProj is a template of Python project. :copyright: (c) 2021 by Ting-Hsu Chang. :license: MIT, see LICENSE for more details. """
""" We are given an array containing n distinct numbers taken from the range 0 to n. Since the array has only n numbers out of the total n+1 numbers, find the missing number.""" def find_missing_number(nums): i = 0 while i < len(nums): j = nums[i] if j < len(nums) and i != nums[i]: nums[i], nums[j] = nums[j], nums[i] else: i+=1 missing = -1 for i, val in enumerate(nums): if i != val: missing = i return missing print('2: ', find_missing_number([4, 0, 3, 1])) print('7: ', find_missing_number([8, 3, 5, 2, 4, 6, 0, 1]))
""" We are given an array containing n distinct numbers taken from the range 0 to n. Since the array has only n numbers out of the total n+1 numbers, find the missing number.""" def find_missing_number(nums): i = 0 while i < len(nums): j = nums[i] if j < len(nums) and i != nums[i]: (nums[i], nums[j]) = (nums[j], nums[i]) else: i += 1 missing = -1 for (i, val) in enumerate(nums): if i != val: missing = i return missing print('2: ', find_missing_number([4, 0, 3, 1])) print('7: ', find_missing_number([8, 3, 5, 2, 4, 6, 0, 1]))
author_activate = ''' mutation { upsertAuthor(name: "Paulinna", author: { active: true }) { successful messages { field message } result { name active } } } ''' author_set_active = ''' mutation SetActive($active: Boolean!){ upsertAuthor(name: "Paulinna", author: { active: $active }) { successful messages { field message } result { name active } } } ''' update_any_author_active = ''' mutation SetActive( $name: String! $active: Boolean! ){ updateAuthor( findBy: { name: $name } author: { active: $active } ) { successful messages { field message } result { id name lastName active dateOfBirth updatedAt } } } ''' create_author = ''' mutation CreateAuthor( $name: String! $lastName: String! $active: Boolean ){ createAuthor( name: $name lastName: $lastName active: $active ){ successful messages{ field message } result{ id name lastName active } } } ''' bad_author_create = 'mutation {createAuthor(name:"Baruc"){succ}}'
author_activate = '\n mutation {\n upsertAuthor(name: "Paulinna", author: { active: true }) {\n successful\n messages {\n field\n message\n }\n result {\n name\n active\n }\n }\n }\n' author_set_active = '\n mutation SetActive($active: Boolean!){\n upsertAuthor(name: "Paulinna", author: { active: $active }) {\n successful\n messages {\n field\n message\n }\n result {\n name\n active\n }\n }\n }\n' update_any_author_active = '\n mutation SetActive(\n $name: String!\n $active: Boolean!\n ){\n updateAuthor(\n findBy: { name: $name }\n author: { active: $active }\n ) {\n successful\n messages {\n field\n message\n }\n result {\n id\n name\n lastName\n active\n dateOfBirth\n updatedAt\n }\n }\n }\n' create_author = '\n mutation CreateAuthor(\n $name: String!\n $lastName: String!\n $active: Boolean\n ){\n createAuthor(\n name: $name\n lastName: $lastName\n active: $active\n ){\n successful\n messages{\n field\n message\n }\n result{\n id\n name\n lastName\n active\n }\n }\n }\n' bad_author_create = 'mutation {createAuthor(name:"Baruc"){succ}}'
class Solution: def minDistance(self, word1: str, word2: str) -> int: m, n = len(word1), len(word2) if m * n == 0: return max(m, n) dp = [[0] * (n + 1) for _ in range(m + 1)] for i in range(1, m + 1): dp[i][0] = i for i in range(1, n + 1): dp[0][i] = i for i in range(1, m + 1): for j in range(1, n + 1): left = dp[i][j - 1] + 1 down = dp[i - 1][j] + 1 left_down = dp[i - 1][j - 1] if word1[i - 1] != word2[j - 1]: left_down += 1 dp[i][j] = min(left, down, left_down) return dp[m][n] slu = Solution() print(slu.minDistance("horse", "ros"))
class Solution: def min_distance(self, word1: str, word2: str) -> int: (m, n) = (len(word1), len(word2)) if m * n == 0: return max(m, n) dp = [[0] * (n + 1) for _ in range(m + 1)] for i in range(1, m + 1): dp[i][0] = i for i in range(1, n + 1): dp[0][i] = i for i in range(1, m + 1): for j in range(1, n + 1): left = dp[i][j - 1] + 1 down = dp[i - 1][j] + 1 left_down = dp[i - 1][j - 1] if word1[i - 1] != word2[j - 1]: left_down += 1 dp[i][j] = min(left, down, left_down) return dp[m][n] slu = solution() print(slu.minDistance('horse', 'ros'))
"""Factories for the redirect_plus app.""" # import factory # from ..models import YourModel
"""Factories for the redirect_plus app."""
''' SNMP Device Defines ''' BMCSTATUS = { 1: 'ok', 2: 'minor', 3: 'major', 4: 'critical', 5: 'absence', 6: 'unknown', } BMCPRESENCE = { 1: 'absence', 2: 'presence', 3: 'unknown', } BMCPCESTATUS = { 1: 'disable', 2: 'enable', } BMCPCFA = { 1: 'eventlog(1)', 2: 'eventlogAndPowerOff(2)', } BMCBOOTSTR = { 1: 'No override', 2: 'PXE', 3: 'Hard Drive', 4: 'DVD ROM', 5: 'FDD Removable Device', 6: 'Unspecified', 7: 'Bios Setup', } BMCBOOTSEQUENCE = { 1: 'noOverride(1)', 2: 'pxe(2)', 3: 'hdd(3)', 4: 'cdDvd(4)', 5: 'floppyPrimaryRemovableMedia(5)', 6: 'unspecified(6)', 7: 'biossetup(7)', } BMCFPCSTR = { 1: 'Power Off', 2: 'Power On', 3: 'Forced System Reset', 4: 'Forced Power Cycle', 5: 'Forced Power Off', } BMCFRUPOWERCONTROL = { 1: 'normalPowerOff(1)', 2: 'powerOn(2)', 3: 'forcedSystemReset(3)', 4: 'forcedPowerCycle(4)', } HMMPRESENCE = { 0: 'not present', 1: 'present', 2: 'indeterminate', } HMMPCE = { 0: 'disable', 1: 'enable', } HMMHEALTH = { 0: 'ok', 1: 'minor', 2: 'major', 3: 'majorandminor', 4: 'critical', 5: 'criticalandminor', 6: 'criticalandmajor', 7: 'criticalandmajorandminor', } HMMCPUHEALTH = { 1: 'normal', 2: 'minor', 3: 'major', 4: 'critical', 5: 'unknown', } HMMPOWERMODE = { '0': 'AC', '1': 'DC', '2': 'AC and DC', '3': 'HVDC', '4': 'unknown', } HMMBIOSBOOTOPTION = { 0: 'No override', 1: 'Force PXE', 2: 'Force boot from default Hard-drive[2]', 3: 'Force boot from default Hard-drive, request Safe Mode[2]', 4: 'Force boot from default Diagnostic Partition[2]', 5: 'Force boot from default CD/DVD[2]', 6: 'Force boot into BIOS Setup', 15: 'Force boot from Floppy/primary removable media', } HMMFRUCONTROL = { '0': 'Force System Reset', '1': 'power off', '2': 'Force Power Cycle', '3': 'NMI', '4': 'power on', } HMMLOCATION = { 1: 'PSU1', 2: 'PSU2', 3: 'PSU3', 4: 'PSU4', 5: 'PSU5', 6: 'PSU6', } HMMSTATUS = { 1: 'normal', 2: 'minor', 3: 'major', 4: 'critical', } HMMNEWSTATUS = { 0: 'reset', 2: 'power off then on', 3: 'interrupt control', }
""" SNMP Device Defines """ bmcstatus = {1: 'ok', 2: 'minor', 3: 'major', 4: 'critical', 5: 'absence', 6: 'unknown'} bmcpresence = {1: 'absence', 2: 'presence', 3: 'unknown'} bmcpcestatus = {1: 'disable', 2: 'enable'} bmcpcfa = {1: 'eventlog(1)', 2: 'eventlogAndPowerOff(2)'} bmcbootstr = {1: 'No override', 2: 'PXE', 3: 'Hard Drive', 4: 'DVD ROM', 5: 'FDD Removable Device', 6: 'Unspecified', 7: 'Bios Setup'} bmcbootsequence = {1: 'noOverride(1)', 2: 'pxe(2)', 3: 'hdd(3)', 4: 'cdDvd(4)', 5: 'floppyPrimaryRemovableMedia(5)', 6: 'unspecified(6)', 7: 'biossetup(7)'} bmcfpcstr = {1: 'Power Off', 2: 'Power On', 3: 'Forced System Reset', 4: 'Forced Power Cycle', 5: 'Forced Power Off'} bmcfrupowercontrol = {1: 'normalPowerOff(1)', 2: 'powerOn(2)', 3: 'forcedSystemReset(3)', 4: 'forcedPowerCycle(4)'} hmmpresence = {0: 'not present', 1: 'present', 2: 'indeterminate'} hmmpce = {0: 'disable', 1: 'enable'} hmmhealth = {0: 'ok', 1: 'minor', 2: 'major', 3: 'majorandminor', 4: 'critical', 5: 'criticalandminor', 6: 'criticalandmajor', 7: 'criticalandmajorandminor'} hmmcpuhealth = {1: 'normal', 2: 'minor', 3: 'major', 4: 'critical', 5: 'unknown'} hmmpowermode = {'0': 'AC', '1': 'DC', '2': 'AC and DC', '3': 'HVDC', '4': 'unknown'} hmmbiosbootoption = {0: 'No override', 1: 'Force PXE', 2: 'Force boot from default Hard-drive[2]', 3: 'Force boot from default Hard-drive, request Safe Mode[2]', 4: 'Force boot from default Diagnostic Partition[2]', 5: 'Force boot from default CD/DVD[2]', 6: 'Force boot into BIOS Setup', 15: 'Force boot from Floppy/primary removable media'} hmmfrucontrol = {'0': 'Force System Reset', '1': 'power off', '2': 'Force Power Cycle', '3': 'NMI', '4': 'power on'} hmmlocation = {1: 'PSU1', 2: 'PSU2', 3: 'PSU3', 4: 'PSU4', 5: 'PSU5', 6: 'PSU6'} hmmstatus = {1: 'normal', 2: 'minor', 3: 'major', 4: 'critical'} hmmnewstatus = {0: 'reset', 2: 'power off then on', 3: 'interrupt control'}
""" @file @brief Shortcut to *algorithms*. """
""" @file @brief Shortcut to *algorithms*. """
def getData(): dataset = pd.read_csv('FUTURES MINUTE.txt', header = None) dataset.columns = ['Date','time',"1. open","2. high",'3. low','4. close','5. volume'] dataset['date'] = dataset['Date'] +" "+ dataset['time'] dataset.drop('Date', axis=1, inplace=True) dataset.drop('time', axis=1, inplace=True) dataset['date'] = dataset['date'].apply(lambda x: pd.to_datetime(x, errors='ignore')) dataset['date'] = dataset['date'].apply(lambda x: datetime.datetime.strftime(x, '%Y-%m-%d %H:%M:%S')) dataset.set_index(dataset.index.map(lambda x: pd.to_datetime(x, errors='ignore'))) dataset.set_index('date',inplace=True) return dataset
def get_data(): dataset = pd.read_csv('FUTURES MINUTE.txt', header=None) dataset.columns = ['Date', 'time', '1. open', '2. high', '3. low', '4. close', '5. volume'] dataset['date'] = dataset['Date'] + ' ' + dataset['time'] dataset.drop('Date', axis=1, inplace=True) dataset.drop('time', axis=1, inplace=True) dataset['date'] = dataset['date'].apply(lambda x: pd.to_datetime(x, errors='ignore')) dataset['date'] = dataset['date'].apply(lambda x: datetime.datetime.strftime(x, '%Y-%m-%d %H:%M:%S')) dataset.set_index(dataset.index.map(lambda x: pd.to_datetime(x, errors='ignore'))) dataset.set_index('date', inplace=True) return dataset
class DataOwnerPrediction: def __init__(self, model_id, model_public_key, public_key, encrypted_prediction): self.id = encrypted_prediction.id self.model_id = model_id self.model_public_key = model_public_key self.public_key = public_key self.encrypted_prediction = encrypted_prediction self.confirmed = False self.is_valid = False def update(self, valid_status): self.is_valid = valid_status self.confirmed = True def get_data(self): return {'model_id': self.model_id, 'prediction_id': self.id, 'encrypted_prediction': self.encrypted_prediction.get_values(), 'public_key': self.public_key} class PredictionService: def __init__(self, encryption_service): self.predictions = dict() self.encryption_service = encryption_service def add(self, prediction_data): prediction = self._make_prediction(prediction_data) self.predictions[prediction.id] = prediction def get(self, prediction_id=None): return self.predictions.get(prediction_id) if prediction_id else self.predictions.values() def _make_prediction(self, prediction_data): return DataOwnerPrediction(model_id=prediction_data["model"]["model_id"], model_public_key=prediction_data["model"]["public_key"], public_key=self.encryption_service.get_public_key(), encrypted_prediction=prediction_data["encrypted_prediction"]) def check_consistency(self, prediction_id, prediction_data): """ :param prediction_id: :param prediction_data: :return: """ prediction = self.get(prediction_id) # 1) Decrypt -> (7) decrypted_prediction = self.encryption_service.decrypt_collection(prediction_data) # 2) Encrypt with PK MB (8) encrypted_prediction = self.encryption_service.encrypt_collection(decrypted_prediction, prediction.model_public_key) # 3) Compare 2) with (1) comparision = encrypted_prediction == prediction.encrypted_prediction prediction.update(prediction_data, comparision) return comparision
class Dataownerprediction: def __init__(self, model_id, model_public_key, public_key, encrypted_prediction): self.id = encrypted_prediction.id self.model_id = model_id self.model_public_key = model_public_key self.public_key = public_key self.encrypted_prediction = encrypted_prediction self.confirmed = False self.is_valid = False def update(self, valid_status): self.is_valid = valid_status self.confirmed = True def get_data(self): return {'model_id': self.model_id, 'prediction_id': self.id, 'encrypted_prediction': self.encrypted_prediction.get_values(), 'public_key': self.public_key} class Predictionservice: def __init__(self, encryption_service): self.predictions = dict() self.encryption_service = encryption_service def add(self, prediction_data): prediction = self._make_prediction(prediction_data) self.predictions[prediction.id] = prediction def get(self, prediction_id=None): return self.predictions.get(prediction_id) if prediction_id else self.predictions.values() def _make_prediction(self, prediction_data): return data_owner_prediction(model_id=prediction_data['model']['model_id'], model_public_key=prediction_data['model']['public_key'], public_key=self.encryption_service.get_public_key(), encrypted_prediction=prediction_data['encrypted_prediction']) def check_consistency(self, prediction_id, prediction_data): """ :param prediction_id: :param prediction_data: :return: """ prediction = self.get(prediction_id) decrypted_prediction = self.encryption_service.decrypt_collection(prediction_data) encrypted_prediction = self.encryption_service.encrypt_collection(decrypted_prediction, prediction.model_public_key) comparision = encrypted_prediction == prediction.encrypted_prediction prediction.update(prediction_data, comparision) return comparision
class SegmentEndsPath(list): """ a list containing {gfapy.SegmentEnd} elements, which defines a path in the graph """ def reverse(self): """ Reverses the direction of the path in place """ self[:] = list(reversed(self)) def __reversed__(self): """ Iterator over the reverse-direction path """ for elem in SegmentEndsPath(reversed([segment_end.inverted() for segment_end in self])): yield elem
class Segmentendspath(list): """ a list containing {gfapy.SegmentEnd} elements, which defines a path in the graph """ def reverse(self): """ Reverses the direction of the path in place """ self[:] = list(reversed(self)) def __reversed__(self): """ Iterator over the reverse-direction path """ for elem in segment_ends_path(reversed([segment_end.inverted() for segment_end in self])): yield elem
n = input() s = set(map(int, input().split())) q=int(input()) for x in range(q): t=input().split() try: if(t[0]=="pop"): s.pop() elif(t[0]=="remove"): s.remove(int(t[1])) else: s.discard(int(t[1])) except: continue print(sum(s))
n = input() s = set(map(int, input().split())) q = int(input()) for x in range(q): t = input().split() try: if t[0] == 'pop': s.pop() elif t[0] == 'remove': s.remove(int(t[1])) else: s.discard(int(t[1])) except: continue print(sum(s))
def isIncreasingDigitsSequence(n): s = str(n) for i in range(len(s)-1): if s[i] >= s[i+1]: return False return True """ Call an integer an increasing digits sequence if its digits considered from left to right form a strictly increasing sequence. Given an integer, check if it is an increasing digits sequence. Example For n = 12345, the output should be isIncreasingDigitsSequence(n) = true; For n = 2446, the output should be isIncreasingDigitsSequence(n) = false; For n = 543, the output should be isIncreasingDigitsSequence(n) = false. """
def is_increasing_digits_sequence(n): s = str(n) for i in range(len(s) - 1): if s[i] >= s[i + 1]: return False return True '\nCall an integer an increasing digits sequence if its digits considered from left to right form a strictly increasing sequence.\n\nGiven an integer, check if it is an increasing digits sequence.\n\nExample\n\nFor n = 12345, the output should be\nisIncreasingDigitsSequence(n) = true;\nFor n = 2446, the output should be\nisIncreasingDigitsSequence(n) = false;\nFor n = 543, the output should be\nisIncreasingDigitsSequence(n) = false.\n'
load("//scala:scala.bzl", "scala_test") def analyzer_tests_scala_2(): common_jvm_flags = [ "-Dplugin.jar.location=$(execpath //third_party/dependency_analyzer/src/main:dependency_analyzer)", "-Dscala.library.location=$(rootpath @io_bazel_rules_scala_scala_library)", "-Dscala.reflect.location=$(rootpath @io_bazel_rules_scala_scala_reflect)", ] scala_test( name = "ast_used_jar_finder_test", size = "small", srcs = [ "io/bazel/rulesscala/dependencyanalyzer/AstUsedJarFinderTest.scala", ], jvm_flags = common_jvm_flags, deps = [ "//src/java/io/bazel/rulesscala/io_utils", "//third_party/dependency_analyzer/src/main:dependency_analyzer", "//third_party/dependency_analyzer/src/main:scala_version", "//third_party/utils/src/test:test_util", "@io_bazel_rules_scala_scala_compiler", "@io_bazel_rules_scala_scala_library", "@io_bazel_rules_scala_scala_reflect", ], ) scala_test( name = "scala_version_test", size = "small", srcs = [ "io/bazel/rulesscala/dependencyanalyzer/ScalaVersionTest.scala", ], deps = [ "//third_party/dependency_analyzer/src/main:scala_version", "@io_bazel_rules_scala_scala_library", "@io_bazel_rules_scala_scala_reflect", ], ) scala_test( name = "scalac_dependency_test", size = "small", srcs = [ "io/bazel/rulesscala/dependencyanalyzer/ScalacDependencyTest.scala", ], jvm_flags = common_jvm_flags, unused_dependency_checker_mode = "off", deps = [ "//src/java/io/bazel/rulesscala/io_utils", "//third_party/dependency_analyzer/src/main:dependency_analyzer", "//third_party/utils/src/test:test_util", "@io_bazel_rules_scala_scala_compiler", "@io_bazel_rules_scala_scala_library", "@io_bazel_rules_scala_scala_reflect", ], ) scala_test( name = "strict_deps_test", size = "small", srcs = [ "io/bazel/rulesscala/dependencyanalyzer/StrictDepsTest.scala", ], jvm_flags = common_jvm_flags + [ "-Dguava.jar.location=$(rootpath @com_google_guava_guava_21_0_with_file//jar)", "-Dapache.commons.jar.location=$(location @org_apache_commons_commons_lang_3_5_without_file//:linkable_org_apache_commons_commons_lang_3_5_without_file)", ], unused_dependency_checker_mode = "off", deps = [ "//third_party/dependency_analyzer/src/main:dependency_analyzer", "//third_party/utils/src/test:test_util", "@com_google_guava_guava_21_0_with_file//jar", "@io_bazel_rules_scala_scala_compiler", "@io_bazel_rules_scala_scala_library", "@io_bazel_rules_scala_scala_reflect", "@org_apache_commons_commons_lang_3_5_without_file//:linkable_org_apache_commons_commons_lang_3_5_without_file", ], ) scala_test( name = "unused_dependency_checker_test", size = "small", srcs = [ "io/bazel/rulesscala/dependencyanalyzer/UnusedDependencyCheckerTest.scala", ], jvm_flags = common_jvm_flags + [ "-Dapache.commons.jar.location=$(location @org_apache_commons_commons_lang_3_5_without_file//:linkable_org_apache_commons_commons_lang_3_5_without_file)", ], unused_dependency_checker_mode = "off", deps = [ "//third_party/dependency_analyzer/src/main:dependency_analyzer", "//third_party/utils/src/test:test_util", "@io_bazel_rules_scala_scala_compiler", "@io_bazel_rules_scala_scala_library", "@io_bazel_rules_scala_scala_reflect", "@org_apache_commons_commons_lang_3_5_without_file//:linkable_org_apache_commons_commons_lang_3_5_without_file", ], )
load('//scala:scala.bzl', 'scala_test') def analyzer_tests_scala_2(): common_jvm_flags = ['-Dplugin.jar.location=$(execpath //third_party/dependency_analyzer/src/main:dependency_analyzer)', '-Dscala.library.location=$(rootpath @io_bazel_rules_scala_scala_library)', '-Dscala.reflect.location=$(rootpath @io_bazel_rules_scala_scala_reflect)'] scala_test(name='ast_used_jar_finder_test', size='small', srcs=['io/bazel/rulesscala/dependencyanalyzer/AstUsedJarFinderTest.scala'], jvm_flags=common_jvm_flags, deps=['//src/java/io/bazel/rulesscala/io_utils', '//third_party/dependency_analyzer/src/main:dependency_analyzer', '//third_party/dependency_analyzer/src/main:scala_version', '//third_party/utils/src/test:test_util', '@io_bazel_rules_scala_scala_compiler', '@io_bazel_rules_scala_scala_library', '@io_bazel_rules_scala_scala_reflect']) scala_test(name='scala_version_test', size='small', srcs=['io/bazel/rulesscala/dependencyanalyzer/ScalaVersionTest.scala'], deps=['//third_party/dependency_analyzer/src/main:scala_version', '@io_bazel_rules_scala_scala_library', '@io_bazel_rules_scala_scala_reflect']) scala_test(name='scalac_dependency_test', size='small', srcs=['io/bazel/rulesscala/dependencyanalyzer/ScalacDependencyTest.scala'], jvm_flags=common_jvm_flags, unused_dependency_checker_mode='off', deps=['//src/java/io/bazel/rulesscala/io_utils', '//third_party/dependency_analyzer/src/main:dependency_analyzer', '//third_party/utils/src/test:test_util', '@io_bazel_rules_scala_scala_compiler', '@io_bazel_rules_scala_scala_library', '@io_bazel_rules_scala_scala_reflect']) scala_test(name='strict_deps_test', size='small', srcs=['io/bazel/rulesscala/dependencyanalyzer/StrictDepsTest.scala'], jvm_flags=common_jvm_flags + ['-Dguava.jar.location=$(rootpath @com_google_guava_guava_21_0_with_file//jar)', '-Dapache.commons.jar.location=$(location @org_apache_commons_commons_lang_3_5_without_file//:linkable_org_apache_commons_commons_lang_3_5_without_file)'], unused_dependency_checker_mode='off', deps=['//third_party/dependency_analyzer/src/main:dependency_analyzer', '//third_party/utils/src/test:test_util', '@com_google_guava_guava_21_0_with_file//jar', '@io_bazel_rules_scala_scala_compiler', '@io_bazel_rules_scala_scala_library', '@io_bazel_rules_scala_scala_reflect', '@org_apache_commons_commons_lang_3_5_without_file//:linkable_org_apache_commons_commons_lang_3_5_without_file']) scala_test(name='unused_dependency_checker_test', size='small', srcs=['io/bazel/rulesscala/dependencyanalyzer/UnusedDependencyCheckerTest.scala'], jvm_flags=common_jvm_flags + ['-Dapache.commons.jar.location=$(location @org_apache_commons_commons_lang_3_5_without_file//:linkable_org_apache_commons_commons_lang_3_5_without_file)'], unused_dependency_checker_mode='off', deps=['//third_party/dependency_analyzer/src/main:dependency_analyzer', '//third_party/utils/src/test:test_util', '@io_bazel_rules_scala_scala_compiler', '@io_bazel_rules_scala_scala_library', '@io_bazel_rules_scala_scala_reflect', '@org_apache_commons_commons_lang_3_5_without_file//:linkable_org_apache_commons_commons_lang_3_5_without_file'])
NER_LABEL_TO_ID = { "O": 0, "B-ORG": 1, "I-ORG": 2, "B-PER": 3, "I-PER": 4, "B-LOC": 5, "I-LOC": 6, } ID_TO_NER_LABEL = {value: key for key, value in NER_LABEL_TO_ID.items()} def clean_label(ner_label: str) -> str: """ Clean the ner label from whitespaces :param ner_label: takes a ner label :type ner_label: str :return: a cleaned label is returned :rtype: str """ if "B-ORG" in ner_label: return "B-ORG" elif "I-ORG" in ner_label: return "I-ORG" elif "B-PER" in ner_label: return "B-PER" elif "I-PER" in ner_label: return "I-PER" elif "B-LOC" in ner_label: return "B-LOC" elif "I-LOC" in ner_label: return "I-LOC" elif "O" in ner_label: return "O" def ner_label_to_id(ner_label: str) -> int: """ return the id of the ner label :param ner_label: ner label :type ner_label: str :return: id of the ner label :rtype: int """ return NER_LABEL_TO_ID[ner_label] def id_to_ner_label(id: int) -> str: """ return the ner label of the id :param id: id of the ner label :type id: int :return: ner label :rtype: str """ return ID_TO_NER_LABEL[id]
ner_label_to_id = {'O': 0, 'B-ORG': 1, 'I-ORG': 2, 'B-PER': 3, 'I-PER': 4, 'B-LOC': 5, 'I-LOC': 6} id_to_ner_label = {value: key for (key, value) in NER_LABEL_TO_ID.items()} def clean_label(ner_label: str) -> str: """ Clean the ner label from whitespaces :param ner_label: takes a ner label :type ner_label: str :return: a cleaned label is returned :rtype: str """ if 'B-ORG' in ner_label: return 'B-ORG' elif 'I-ORG' in ner_label: return 'I-ORG' elif 'B-PER' in ner_label: return 'B-PER' elif 'I-PER' in ner_label: return 'I-PER' elif 'B-LOC' in ner_label: return 'B-LOC' elif 'I-LOC' in ner_label: return 'I-LOC' elif 'O' in ner_label: return 'O' def ner_label_to_id(ner_label: str) -> int: """ return the id of the ner label :param ner_label: ner label :type ner_label: str :return: id of the ner label :rtype: int """ return NER_LABEL_TO_ID[ner_label] def id_to_ner_label(id: int) -> str: """ return the ner label of the id :param id: id of the ner label :type id: int :return: ner label :rtype: str """ return ID_TO_NER_LABEL[id]
# This __about__.py file for storing project metadata is inspired by # - github.com/delph-in/pydelphin/blob/master/delphin/__about__.py # referencing (apud) # - github.com/pypa/warehouse/blob/master/warehouse/__about__.py __name__ = "Delphin RDF" __summary__ = "DELPH-IN formats in RDF" __version__ = "1.0.4" __author__ = "foo" __email__ = "foo" __url__ = "foo" __license__ = "MIT"
__name__ = 'Delphin RDF' __summary__ = 'DELPH-IN formats in RDF' __version__ = '1.0.4' __author__ = 'foo' __email__ = 'foo' __url__ = 'foo' __license__ = 'MIT'
#### USEFUL FUNCTIONS FOR CLAUSES AND LITERALS #### # Return true if the clause is unit, false otherwise. def is_unit_clause(clause): return len(clause) == 1 # Return true if the clause is empty, false otherwise. def is_empty_clause(clause): return len(clause) == 0 # Return true if the literal is positive, false otherwise def is_positive_literal(lit): return lit > 0 # Return the variable associated to a given literal def lit_to_var(lit): return abs(lit) #### MAIN #### if __name__ == "__main__": # Read the DIMACS header unused1, unused2, V, C = input().split() V = int(V) # Number of variables C = int(C) # Number of clauses # Declaration of the structures lit_to_cls = { i : [] for i in range(-V, V + 1) } # Index of clauses containing a literal clauses = [None] * C # The formula represented by a list of clauses model = [None] * (V + 1) # The current assignement units = [] # All literals that should be propagated sat = True # Is the formula satisfiable? # Read the clauses for id_cls in range(C): # Read the clause and do not forget to remove the '0' clause = [int(lit) for lit in input().split()[:-1]] # Update the structures clauses[id_cls] = clause # Update reference from lit to clause index for lit in clause: lit_to_cls[lit] += [id_cls] if is_unit_clause(clause): # The clause is unit and is added for propafgation units += [clause[0]] elif is_empty_clause(clause): # The formula contains an empty clause sat = False # it is then unsatisfiable # Until there is propagation to do and the formula is not unsatisfiable while len(units) and sat: lit = units.pop() var = lit_to_var(lit) value = is_positive_literal(lit) if model[var] == None: # The variable as not a value yet model[var] = value elif model[var] != value: # There is a conflict => unsatisfaible sat = False break else: # Already been assigned to this value continue # Manage clauses containing the literal for id_cls in lit_to_cls[lit]: clauses[id_cls] = None # The clause is satisfied and can be forgotten # Manage clauses containing the inverted literal for id_cls in lit_to_cls[-lit]: clause = clauses[id_cls] if clause == None: # The clause has already been satisfied continue clause.remove(-lit) # The literal is false, it is deleted from the clause if is_unit_clause(clause): # The clause has became unit units += [clause[0]] elif is_empty_clause(clause): # The clause has became empty sat = False # The formula is then unsatisfiable break # Print the coresponding answer in DIMACS format if sat: # SAT print("s SATISFIABLE") for var in range(1, V + 1): if model[var] == None: model[var] = False out_model = ["v"] for var in range(1, V + 1): if not model[var]: var = -var out_model += [var] out_model += [0] print(*out_model) else: # UNSAT print("s UNSATISFIABLE")
def is_unit_clause(clause): return len(clause) == 1 def is_empty_clause(clause): return len(clause) == 0 def is_positive_literal(lit): return lit > 0 def lit_to_var(lit): return abs(lit) if __name__ == '__main__': (unused1, unused2, v, c) = input().split() v = int(V) c = int(C) lit_to_cls = {i: [] for i in range(-V, V + 1)} clauses = [None] * C model = [None] * (V + 1) units = [] sat = True for id_cls in range(C): clause = [int(lit) for lit in input().split()[:-1]] clauses[id_cls] = clause for lit in clause: lit_to_cls[lit] += [id_cls] if is_unit_clause(clause): units += [clause[0]] elif is_empty_clause(clause): sat = False while len(units) and sat: lit = units.pop() var = lit_to_var(lit) value = is_positive_literal(lit) if model[var] == None: model[var] = value elif model[var] != value: sat = False break else: continue for id_cls in lit_to_cls[lit]: clauses[id_cls] = None for id_cls in lit_to_cls[-lit]: clause = clauses[id_cls] if clause == None: continue clause.remove(-lit) if is_unit_clause(clause): units += [clause[0]] elif is_empty_clause(clause): sat = False break if sat: print('s SATISFIABLE') for var in range(1, V + 1): if model[var] == None: model[var] = False out_model = ['v'] for var in range(1, V + 1): if not model[var]: var = -var out_model += [var] out_model += [0] print(*out_model) else: print('s UNSATISFIABLE')
if __name__ == "__main__": s = input() new_s = "" for i in range(len(s)-1, -1, -1): new_s += s[i] print(new_s) if s == new_s: print("haha got ya !") else: print("NOpe")
if __name__ == '__main__': s = input() new_s = '' for i in range(len(s) - 1, -1, -1): new_s += s[i] print(new_s) if s == new_s: print('haha got ya !') else: print('NOpe')
n = int(input()) total = [] for i in range(n): a = [int(item) for item in input().split()] temp = 0 for j in range(a[0]): temp +=a[j + 1] temp -= (a[0] - 1) total.append(temp) a = [] for i in total: print(i)
n = int(input()) total = [] for i in range(n): a = [int(item) for item in input().split()] temp = 0 for j in range(a[0]): temp += a[j + 1] temp -= a[0] - 1 total.append(temp) a = [] for i in total: print(i)
class main: def __init__(self): pass def draw(self): print("Welcome to Friend_Tracker_2.0") print("-----------------------------") print("Type in read if you want to read a profile,\nand write if you want to add something to the profile,\nor type in help if you need help. Type in exit if you want ot exit.\n\nNOTE: The profile files are in the Data folder.") self.A = input(">>> ") if "ead" in self.A: self.readF() elif "rite" in self.A: self.writeF() elif "el" in self.A: self.help() elif "exit" in self.A: exit() else: print("Not correspondingly...") self.draw() def readF(self): self.name = input("Name: ") self.f = "Data/" + self.name + ".txt" with open(self.f, "r") as f: print(f.read()) f.close() self.A = input("Go back? y: ") if "y" in self.A: self.draw() def writeF(self): global f self.name = input("Name: ") self.f = "Data/" + self.name + ".txt" self.item = input("Item: ") self.deff = input("Definition: ") with open(self.f, "a") as f: f.write(self.item + " : " + self.deff + "\n") f.close() self.A = input("Do you want to write more? y/n: ") if "y" in self.A: self.writeFM("yes") else: self.draw() def writeFM(self, y): while y: self.item = input("Item: ") self.deff = input("Definition: ") with open(self.f, "a") as f: f.write(self.item + " : " + self.deff + "\n") f.close() self.A = input("Do you want to write more? y/n: ") if "y" in self.A: self.writeFM(y) else: self.draw() def help(self): print("If you type in read it will ask you to type in the profile or persons name (Name of the file) like this: if i typed in write and i put in Fred to make a new profile, then i will type in Fred when i deside to read the file. If you wrote write it will ask you the persons name, after you have type in the name, type into the Item and write like there name or age or something like that but dont write the other part like this name is Fred, dont do that just type in name or something and then press enter, after you press enter it will ask you for definition and that is where you will type in the persons name like Fred or the age like 15, lastly it will ask do you want to write more. NOTE: If you type in the name wrong it will make another profile for that name! Make sure you type in the name correctly before you press enter.") self.A = input("Go back? y: ") if "y" in self.A: self.draw() if __name__ == "__main__": app = main() app.draw()
class Main: def __init__(self): pass def draw(self): print('Welcome to Friend_Tracker_2.0') print('-----------------------------') print('Type in read if you want to read a profile,\nand write if you want to add something to the profile,\nor type in help if you need help. Type in exit if you want ot exit.\n\nNOTE: The profile files are in the Data folder.') self.A = input('>>> ') if 'ead' in self.A: self.readF() elif 'rite' in self.A: self.writeF() elif 'el' in self.A: self.help() elif 'exit' in self.A: exit() else: print('Not correspondingly...') self.draw() def read_f(self): self.name = input('Name: ') self.f = 'Data/' + self.name + '.txt' with open(self.f, 'r') as f: print(f.read()) f.close() self.A = input('Go back? y: ') if 'y' in self.A: self.draw() def write_f(self): global f self.name = input('Name: ') self.f = 'Data/' + self.name + '.txt' self.item = input('Item: ') self.deff = input('Definition: ') with open(self.f, 'a') as f: f.write(self.item + ' : ' + self.deff + '\n') f.close() self.A = input('Do you want to write more? y/n: ') if 'y' in self.A: self.writeFM('yes') else: self.draw() def write_fm(self, y): while y: self.item = input('Item: ') self.deff = input('Definition: ') with open(self.f, 'a') as f: f.write(self.item + ' : ' + self.deff + '\n') f.close() self.A = input('Do you want to write more? y/n: ') if 'y' in self.A: self.writeFM(y) else: self.draw() def help(self): print('If you type in read it will ask you to type in the profile or persons name (Name of the file) like this: if i typed in write and i put in Fred to make a new profile, then i will type in Fred when i deside to read the file. If you wrote write it will ask you the persons name, after you have type in the name, type into the Item and write like there name or age or something like that but dont write the other part like this name is Fred, dont do that just type in name or something and then press enter, after you press enter it will ask you for definition and that is where you will type in the persons name like Fred or the age like 15, lastly it will ask do you want to write more. NOTE: If you type in the name wrong it will make another profile for that name! Make sure you type in the name correctly before you press enter.') self.A = input('Go back? y: ') if 'y' in self.A: self.draw() if __name__ == '__main__': app = main() app.draw()
# !/usr/bin/env python3 # -*- coding: utf-8 -*- """ Common helper functions. This will represent the bread and butter of the application. """ def add_two_numbers(x_val: int, y_val: int) -> int: """Just adds two numbers together.""" return x_val + y_val def return_string() -> str: """Return the string doggo.""" return "string"
""" Common helper functions. This will represent the bread and butter of the application. """ def add_two_numbers(x_val: int, y_val: int) -> int: """Just adds two numbers together.""" return x_val + y_val def return_string() -> str: """Return the string doggo.""" return 'string'
''' The MIT License (MIT) Copyright (c) 2016 WavyCloud Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. ''' def associate_web_acl(WebACLId=None, ResourceArn=None): """ Associates a web ACL with a resource, either an application load balancer or Amazon API Gateway stage. See also: AWS API Documentation Exceptions :example: response = client.associate_web_acl( WebACLId='string', ResourceArn='string' ) :type WebACLId: string :param WebACLId: [REQUIRED]\nA unique identifier (ID) for the web ACL.\n :type ResourceArn: string :param ResourceArn: [REQUIRED]\nThe ARN (Amazon Resource Name) of the resource to be protected, either an application load balancer or Amazon API Gateway stage.\nThe ARN should be in one of the following formats:\n\nFor an Application Load Balancer: ``arn:aws:elasticloadbalancing:region :account-id :loadbalancer/app/load-balancer-name /load-balancer-id ``\nFor an Amazon API Gateway stage: ``arn:aws:apigateway:region ::/restapis/api-id /stages/stage-name ``\n\n :rtype: dict ReturnsResponse Syntax {} Response Structure (dict) -- Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFUnavailableEntityException :return: {} :returns: (dict) -- """ pass def can_paginate(operation_name=None): """ Check if an operation can be paginated. :type operation_name: string :param operation_name: The operation name. This is the same name\nas the method name on the client. For example, if the\nmethod name is create_foo, and you\'d normally invoke the\noperation as client.create_foo(**kwargs), if the\ncreate_foo operation can be paginated, you can use the\ncall client.get_paginator('create_foo'). """ pass def create_byte_match_set(Name=None, ChangeToken=None): """ Creates a ByteMatchSet . You then use UpdateByteMatchSet to identify the part of a web request that you want AWS WAF to inspect, such as the values of the User-Agent header or the query string. For example, you can create a ByteMatchSet that matches any requests with User-Agent headers that contain the string BadBot . You can then configure AWS WAF to reject those requests. To create and configure a ByteMatchSet , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions :example: response = client.create_byte_match_set( Name='string', ChangeToken='string' ) :type Name: string :param Name: [REQUIRED]\nA friendly name or description of the ByteMatchSet . You can\'t change Name after you create a ByteMatchSet .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :rtype: dict ReturnsResponse Syntax { 'ByteMatchSet': { 'ByteMatchSetId': 'string', 'Name': 'string', 'ByteMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TargetString': b'bytes', 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'PositionalConstraint': 'EXACTLY'|'STARTS_WITH'|'ENDS_WITH'|'CONTAINS'|'CONTAINS_WORD' }, ] }, 'ChangeToken': 'string' } Response Structure (dict) -- ByteMatchSet (dict) -- A ByteMatchSet that contains no ByteMatchTuple objects. ByteMatchSetId (string) -- The ByteMatchSetId for a ByteMatchSet . You use ByteMatchSetId to get information about a ByteMatchSet (see GetByteMatchSet ), update a ByteMatchSet (see UpdateByteMatchSet ), insert a ByteMatchSet into a Rule or delete one from a Rule (see UpdateRule ), and delete a ByteMatchSet from AWS WAF (see DeleteByteMatchSet ). ByteMatchSetId is returned by CreateByteMatchSet and by ListByteMatchSets . Name (string) -- A friendly name or description of the ByteMatchSet . You can\'t change Name after you create a ByteMatchSet . ByteMatchTuples (list) -- Specifies the bytes (typically a string that corresponds with ASCII characters) that you want AWS WAF to search for in web requests, the location in requests that you want AWS WAF to search, and other settings. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The bytes (typically a string that corresponds with ASCII characters) that you want AWS WAF to search for in web requests, the location in requests that you want AWS WAF to search, and other settings. FieldToMatch (dict) -- The part of a web request that you want AWS WAF to search, such as a specified header or a query string. For more information, see FieldToMatch . Type (string) -- The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) -- When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . TargetString (bytes) -- The value that you want AWS WAF to search for. AWS WAF searches for the specified string in the part of web requests that you specified in FieldToMatch . The maximum length of the value is 50 bytes. Valid values depend on the values that you specified for FieldToMatch : HEADER : The value that you want AWS WAF to search for in the request header that you specified in FieldToMatch , for example, the value of the User-Agent or Referer header. METHOD : The HTTP method, which indicates the type of operation specified in the request. CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : The value that you want AWS WAF to search for in the query string, which is the part of a URL that appears after a ? character. URI : The value that you want AWS WAF to search for in the part of a URL that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but instead of inspecting a single parameter, AWS WAF inspects all parameters within the query string for the value or regex pattern that you specify in TargetString . If TargetString includes alphabetic characters A-Z and a-z, note that the value is case sensitive. If you\'re using the AWS WAF API Specify a base64-encoded version of the value. The maximum length of the value before you base64-encode it is 50 bytes. For example, suppose the value of Type is HEADER and the value of Data is User-Agent . If you want to search the User-Agent header for the value BadBot , you base64-encode BadBot using MIME base64-encoding and include the resulting value, QmFkQm90 , in the value of TargetString . If you\'re using the AWS CLI or one of the AWS SDKs The value that you want AWS WAF to search for. The SDK automatically base64 encodes the value. TextTransformation (string) -- Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on FieldToMatch before inspecting it for a match. You can only specify a single type of TextTransformation. CMD_LINE When you\'re concerned that attackers are injecting an operating system command line command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations: Delete the following characters: " \' ^ Delete spaces before the following characters: / ( Replace the following characters with a space: , ; Replace multiple spaces with one space Convert uppercase letters (A-Z) to lowercase (a-z) COMPRESS_WHITE_SPACE Use this option to replace the following characters with a space character (decimal 32): f, formfeed, decimal 12 t, tab, decimal 9 n, newline, decimal 10 r, carriage return, decimal 13 v, vertical tab, decimal 11 non-breaking space, decimal 160 COMPRESS_WHITE_SPACE also replaces multiple spaces with one space. HTML_ENTITY_DECODE Use this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations: Replaces (ampersand)quot; with " Replaces (ampersand)nbsp; with a non-breaking space, decimal 160 Replaces (ampersand)lt; with a "less than" symbol Replaces (ampersand)gt; with > Replaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters Replaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters LOWERCASE Use this option to convert uppercase letters (A-Z) to lowercase (a-z). URL_DECODE Use this option to decode a URL-encoded value. NONE Specify NONE if you don\'t want to perform any text transformations. PositionalConstraint (string) -- Within the portion of a web request that you want to search (for example, in the query string, if any), specify where you want AWS WAF to search. Valid values include the following: CONTAINS The specified part of the web request must include the value of TargetString , but the location doesn\'t matter. CONTAINS_WORD The specified part of the web request must include the value of TargetString , and TargetString must contain only alphanumeric characters or underscore (A-Z, a-z, 0-9, or _). In addition, TargetString must be a word, which means one of the following: TargetString exactly matches the value of the specified part of the web request, such as the value of a header. TargetString is at the beginning of the specified part of the web request and is followed by a character other than an alphanumeric character or underscore (_), for example, BadBot; . TargetString is at the end of the specified part of the web request and is preceded by a character other than an alphanumeric character or underscore (_), for example, ;BadBot . TargetString is in the middle of the specified part of the web request and is preceded and followed by characters other than alphanumeric characters or underscore (_), for example, -BadBot; . EXACTLY The value of the specified part of the web request must exactly match the value of TargetString . STARTS_WITH The value of TargetString must appear at the beginning of the specified part of the web request. ENDS_WITH The value of TargetString must appear at the end of the specified part of the web request. ChangeToken (string) -- The ChangeToken that you used to submit the CreateByteMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFDisallowedNameException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFLimitsExceededException :return: { 'ByteMatchSet': { 'ByteMatchSetId': 'string', 'Name': 'string', 'ByteMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TargetString': b'bytes', 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'PositionalConstraint': 'EXACTLY'|'STARTS_WITH'|'ENDS_WITH'|'CONTAINS'|'CONTAINS_WORD' }, ] }, 'ChangeToken': 'string' } :returns: Name (string) -- [REQUIRED] A friendly name or description of the ByteMatchSet . You can\'t change Name after you create a ByteMatchSet . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def create_geo_match_set(Name=None, ChangeToken=None): """ Creates an GeoMatchSet , which you use to specify which web requests you want to allow or block based on the country that the requests originate from. For example, if you\'re receiving a lot of requests from one or more countries and you want to block the requests, you can create an GeoMatchSet that contains those countries and then configure AWS WAF to block the requests. To create and configure a GeoMatchSet , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions :example: response = client.create_geo_match_set( Name='string', ChangeToken='string' ) :type Name: string :param Name: [REQUIRED]\nA friendly name or description of the GeoMatchSet . You can\'t change Name after you create the GeoMatchSet .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :rtype: dict ReturnsResponse Syntax { 'GeoMatchSet': { 'GeoMatchSetId': 'string', 'Name': 'string', 'GeoMatchConstraints': [ { 'Type': 'Country', 'Value': 'AF'|'AX'|'AL'|'DZ'|'AS'|'AD'|'AO'|'AI'|'AQ'|'AG'|'AR'|'AM'|'AW'|'AU'|'AT'|'AZ'|'BS'|'BH'|'BD'|'BB'|'BY'|'BE'|'BZ'|'BJ'|'BM'|'BT'|'BO'|'BQ'|'BA'|'BW'|'BV'|'BR'|'IO'|'BN'|'BG'|'BF'|'BI'|'KH'|'CM'|'CA'|'CV'|'KY'|'CF'|'TD'|'CL'|'CN'|'CX'|'CC'|'CO'|'KM'|'CG'|'CD'|'CK'|'CR'|'CI'|'HR'|'CU'|'CW'|'CY'|'CZ'|'DK'|'DJ'|'DM'|'DO'|'EC'|'EG'|'SV'|'GQ'|'ER'|'EE'|'ET'|'FK'|'FO'|'FJ'|'FI'|'FR'|'GF'|'PF'|'TF'|'GA'|'GM'|'GE'|'DE'|'GH'|'GI'|'GR'|'GL'|'GD'|'GP'|'GU'|'GT'|'GG'|'GN'|'GW'|'GY'|'HT'|'HM'|'VA'|'HN'|'HK'|'HU'|'IS'|'IN'|'ID'|'IR'|'IQ'|'IE'|'IM'|'IL'|'IT'|'JM'|'JP'|'JE'|'JO'|'KZ'|'KE'|'KI'|'KP'|'KR'|'KW'|'KG'|'LA'|'LV'|'LB'|'LS'|'LR'|'LY'|'LI'|'LT'|'LU'|'MO'|'MK'|'MG'|'MW'|'MY'|'MV'|'ML'|'MT'|'MH'|'MQ'|'MR'|'MU'|'YT'|'MX'|'FM'|'MD'|'MC'|'MN'|'ME'|'MS'|'MA'|'MZ'|'MM'|'NA'|'NR'|'NP'|'NL'|'NC'|'NZ'|'NI'|'NE'|'NG'|'NU'|'NF'|'MP'|'NO'|'OM'|'PK'|'PW'|'PS'|'PA'|'PG'|'PY'|'PE'|'PH'|'PN'|'PL'|'PT'|'PR'|'QA'|'RE'|'RO'|'RU'|'RW'|'BL'|'SH'|'KN'|'LC'|'MF'|'PM'|'VC'|'WS'|'SM'|'ST'|'SA'|'SN'|'RS'|'SC'|'SL'|'SG'|'SX'|'SK'|'SI'|'SB'|'SO'|'ZA'|'GS'|'SS'|'ES'|'LK'|'SD'|'SR'|'SJ'|'SZ'|'SE'|'CH'|'SY'|'TW'|'TJ'|'TZ'|'TH'|'TL'|'TG'|'TK'|'TO'|'TT'|'TN'|'TR'|'TM'|'TC'|'TV'|'UG'|'UA'|'AE'|'GB'|'US'|'UM'|'UY'|'UZ'|'VU'|'VE'|'VN'|'VG'|'VI'|'WF'|'EH'|'YE'|'ZM'|'ZW' }, ] }, 'ChangeToken': 'string' } Response Structure (dict) -- GeoMatchSet (dict) -- The GeoMatchSet returned in the CreateGeoMatchSet response. The GeoMatchSet contains no GeoMatchConstraints . GeoMatchSetId (string) -- The GeoMatchSetId for an GeoMatchSet . You use GeoMatchSetId to get information about a GeoMatchSet (see GeoMatchSet ), update a GeoMatchSet (see UpdateGeoMatchSet ), insert a GeoMatchSet into a Rule or delete one from a Rule (see UpdateRule ), and delete a GeoMatchSet from AWS WAF (see DeleteGeoMatchSet ). GeoMatchSetId is returned by CreateGeoMatchSet and by ListGeoMatchSets . Name (string) -- A friendly name or description of the GeoMatchSet . You can\'t change the name of an GeoMatchSet after you create it. GeoMatchConstraints (list) -- An array of GeoMatchConstraint objects, which contain the country that you want AWS WAF to search for. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The country from which web requests originate that you want AWS WAF to search for. Type (string) -- The type of geographical area you want AWS WAF to search for. Currently Country is the only valid value. Value (string) -- The country that you want AWS WAF to search for. ChangeToken (string) -- The ChangeToken that you used to submit the CreateGeoMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFDisallowedNameException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFLimitsExceededException :return: { 'GeoMatchSet': { 'GeoMatchSetId': 'string', 'Name': 'string', 'GeoMatchConstraints': [ { 'Type': 'Country', 'Value': 'AF'|'AX'|'AL'|'DZ'|'AS'|'AD'|'AO'|'AI'|'AQ'|'AG'|'AR'|'AM'|'AW'|'AU'|'AT'|'AZ'|'BS'|'BH'|'BD'|'BB'|'BY'|'BE'|'BZ'|'BJ'|'BM'|'BT'|'BO'|'BQ'|'BA'|'BW'|'BV'|'BR'|'IO'|'BN'|'BG'|'BF'|'BI'|'KH'|'CM'|'CA'|'CV'|'KY'|'CF'|'TD'|'CL'|'CN'|'CX'|'CC'|'CO'|'KM'|'CG'|'CD'|'CK'|'CR'|'CI'|'HR'|'CU'|'CW'|'CY'|'CZ'|'DK'|'DJ'|'DM'|'DO'|'EC'|'EG'|'SV'|'GQ'|'ER'|'EE'|'ET'|'FK'|'FO'|'FJ'|'FI'|'FR'|'GF'|'PF'|'TF'|'GA'|'GM'|'GE'|'DE'|'GH'|'GI'|'GR'|'GL'|'GD'|'GP'|'GU'|'GT'|'GG'|'GN'|'GW'|'GY'|'HT'|'HM'|'VA'|'HN'|'HK'|'HU'|'IS'|'IN'|'ID'|'IR'|'IQ'|'IE'|'IM'|'IL'|'IT'|'JM'|'JP'|'JE'|'JO'|'KZ'|'KE'|'KI'|'KP'|'KR'|'KW'|'KG'|'LA'|'LV'|'LB'|'LS'|'LR'|'LY'|'LI'|'LT'|'LU'|'MO'|'MK'|'MG'|'MW'|'MY'|'MV'|'ML'|'MT'|'MH'|'MQ'|'MR'|'MU'|'YT'|'MX'|'FM'|'MD'|'MC'|'MN'|'ME'|'MS'|'MA'|'MZ'|'MM'|'NA'|'NR'|'NP'|'NL'|'NC'|'NZ'|'NI'|'NE'|'NG'|'NU'|'NF'|'MP'|'NO'|'OM'|'PK'|'PW'|'PS'|'PA'|'PG'|'PY'|'PE'|'PH'|'PN'|'PL'|'PT'|'PR'|'QA'|'RE'|'RO'|'RU'|'RW'|'BL'|'SH'|'KN'|'LC'|'MF'|'PM'|'VC'|'WS'|'SM'|'ST'|'SA'|'SN'|'RS'|'SC'|'SL'|'SG'|'SX'|'SK'|'SI'|'SB'|'SO'|'ZA'|'GS'|'SS'|'ES'|'LK'|'SD'|'SR'|'SJ'|'SZ'|'SE'|'CH'|'SY'|'TW'|'TJ'|'TZ'|'TH'|'TL'|'TG'|'TK'|'TO'|'TT'|'TN'|'TR'|'TM'|'TC'|'TV'|'UG'|'UA'|'AE'|'GB'|'US'|'UM'|'UY'|'UZ'|'VU'|'VE'|'VN'|'VG'|'VI'|'WF'|'EH'|'YE'|'ZM'|'ZW' }, ] }, 'ChangeToken': 'string' } :returns: Name (string) -- [REQUIRED] A friendly name or description of the GeoMatchSet . You can\'t change Name after you create the GeoMatchSet . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def create_ip_set(Name=None, ChangeToken=None): """ Creates an IPSet , which you use to specify which web requests that you want to allow or block based on the IP addresses that the requests originate from. For example, if you\'re receiving a lot of requests from one or more individual IP addresses or one or more ranges of IP addresses and you want to block the requests, you can create an IPSet that contains those IP addresses and then configure AWS WAF to block the requests. To create and configure an IPSet , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions Examples The following example creates an IP match set named MyIPSetFriendlyName. Expected Output: :example: response = client.create_ip_set( Name='string', ChangeToken='string' ) :type Name: string :param Name: [REQUIRED]\nA friendly name or description of the IPSet . You can\'t change Name after you create the IPSet .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :rtype: dict ReturnsResponse Syntax { 'IPSet': { 'IPSetId': 'string', 'Name': 'string', 'IPSetDescriptors': [ { 'Type': 'IPV4'|'IPV6', 'Value': 'string' }, ] }, 'ChangeToken': 'string' } Response Structure (dict) -- IPSet (dict) -- The IPSet returned in the CreateIPSet response. IPSetId (string) -- The IPSetId for an IPSet . You use IPSetId to get information about an IPSet (see GetIPSet ), update an IPSet (see UpdateIPSet ), insert an IPSet into a Rule or delete one from a Rule (see UpdateRule ), and delete an IPSet from AWS WAF (see DeleteIPSet ). IPSetId is returned by CreateIPSet and by ListIPSets . Name (string) -- A friendly name or description of the IPSet . You can\'t change the name of an IPSet after you create it. IPSetDescriptors (list) -- The IP address type (IPV4 or IPV6 ) and the IP address range (in CIDR notation) that web requests originate from. If the WebACL is associated with a CloudFront distribution and the viewer did not use an HTTP proxy or a load balancer to send the request, this is the value of the c-ip field in the CloudFront access logs. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies the IP address type (IPV4 or IPV6 ) and the IP address range (in CIDR format) that web requests originate from. Type (string) -- Specify IPV4 or IPV6 . Value (string) -- Specify an IPv4 address by using CIDR notation. For example: To configure AWS WAF to allow, block, or count requests that originated from the IP address 192.0.2.44, specify 192.0.2.44/32 . To configure AWS WAF to allow, block, or count requests that originated from IP addresses from 192.0.2.0 to 192.0.2.255, specify 192.0.2.0/24 . For more information about CIDR notation, see the Wikipedia entry Classless Inter-Domain Routing . Specify an IPv6 address by using CIDR notation. For example: To configure AWS WAF to allow, block, or count requests that originated from the IP address 1111:0000:0000:0000:0000:0000:0000:0111, specify 1111:0000:0000:0000:0000:0000:0000:0111/128 . To configure AWS WAF to allow, block, or count requests that originated from IP addresses 1111:0000:0000:0000:0000:0000:0000:0000 to 1111:0000:0000:0000:ffff:ffff:ffff:ffff, specify 1111:0000:0000:0000:0000:0000:0000:0000/64 . ChangeToken (string) -- The ChangeToken that you used to submit the CreateIPSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFDisallowedNameException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFLimitsExceededException Examples The following example creates an IP match set named MyIPSetFriendlyName. response = client.create_ip_set( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', Name='MyIPSetFriendlyName', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'IPSet': { 'IPSetDescriptors': [ { 'Type': 'IPV4', 'Value': '192.0.2.44/32', }, ], 'IPSetId': 'example1ds3t-46da-4fdb-b8d5-abc321j569j5', 'Name': 'MyIPSetFriendlyName', }, 'ResponseMetadata': { '...': '...', }, } :return: { 'IPSet': { 'IPSetId': 'string', 'Name': 'string', 'IPSetDescriptors': [ { 'Type': 'IPV4'|'IPV6', 'Value': 'string' }, ] }, 'ChangeToken': 'string' } :returns: Name (string) -- [REQUIRED] A friendly name or description of the IPSet . You can\'t change Name after you create the IPSet . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def create_rate_based_rule(Name=None, MetricName=None, RateKey=None, RateLimit=None, ChangeToken=None, Tags=None): """ Creates a RateBasedRule . The RateBasedRule contains a RateLimit , which specifies the maximum number of requests that AWS WAF allows from a specified IP address in a five-minute period. The RateBasedRule also contains the IPSet objects, ByteMatchSet objects, and other predicates that identify the requests that you want to count or block if these requests exceed the RateLimit . If you add more than one predicate to a RateBasedRule , a request not only must exceed the RateLimit , but it also must match all the conditions to be counted or blocked. For example, suppose you add the following to a RateBasedRule : Further, you specify a RateLimit of 1,000. You then add the RateBasedRule to a WebACL and specify that you want to block requests that meet the conditions in the rule. For a request to be blocked, it must come from the IP address 192.0.2.44 and the User-Agent header in the request must contain the value BadBot . Further, requests that match these two conditions must be received at a rate of more than 1,000 requests every five minutes. If both conditions are met and the rate is exceeded, AWS WAF blocks the requests. If the rate drops below 1,000 for a five-minute period, AWS WAF no longer blocks the requests. As a second example, suppose you want to limit requests to a particular page on your site. To do this, you could add the following to a RateBasedRule : Further, you specify a RateLimit of 1,000. By adding this RateBasedRule to a WebACL , you could limit requests to your login page without affecting the rest of your site. To create and configure a RateBasedRule , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions :example: response = client.create_rate_based_rule( Name='string', MetricName='string', RateKey='IP', RateLimit=123, ChangeToken='string', Tags=[ { 'Key': 'string', 'Value': 'string' }, ] ) :type Name: string :param Name: [REQUIRED]\nA friendly name or description of the RateBasedRule . You can\'t change the name of a RateBasedRule after you create it.\n :type MetricName: string :param MetricName: [REQUIRED]\nA friendly name or description for the metrics for this RateBasedRule . The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can\'t contain whitespace or metric names reserved for AWS WAF, including 'All' and 'Default_Action.' You can\'t change the name of the metric after you create the RateBasedRule .\n :type RateKey: string :param RateKey: [REQUIRED]\nThe field that AWS WAF uses to determine if requests are likely arriving from a single source and thus subject to rate monitoring. The only valid value for RateKey is IP . IP indicates that requests that arrive from the same IP address are subject to the RateLimit that is specified in the RateBasedRule .\n :type RateLimit: integer :param RateLimit: [REQUIRED]\nThe maximum number of requests, which have an identical value in the field that is specified by RateKey , allowed in a five-minute period. If the number of requests exceeds the RateLimit and the other predicates specified in the rule are also met, AWS WAF triggers the action that is specified for this rule.\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe ChangeToken that you used to submit the CreateRateBasedRule request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus .\n :type Tags: list :param Tags: \n(dict) --\nNote\nThis is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.\n\nFor the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use.\n\nA tag associated with an AWS resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to 'customer' and the value to the customer name or ID. You can specify one or more tags to add to each AWS resource, up to 50 tags for a resource.\nTagging is only available through the API, SDKs, and CLI. You can\'t manage or view tags through the AWS WAF Classic console. You can tag the AWS resources that you manage through AWS WAF Classic: web ACLs, rule groups, and rules.\n\nKey (string) -- [REQUIRED]\nValue (string) -- [REQUIRED]\n\n\n\n :rtype: dict ReturnsResponse Syntax { 'Rule': { 'RuleId': 'string', 'Name': 'string', 'MetricName': 'string', 'MatchPredicates': [ { 'Negated': True|False, 'Type': 'IPMatch'|'ByteMatch'|'SqlInjectionMatch'|'GeoMatch'|'SizeConstraint'|'XssMatch'|'RegexMatch', 'DataId': 'string' }, ], 'RateKey': 'IP', 'RateLimit': 123 }, 'ChangeToken': 'string' } Response Structure (dict) -- Rule (dict) -- The RateBasedRule that is returned in the CreateRateBasedRule response. RuleId (string) -- A unique identifier for a RateBasedRule . You use RuleId to get more information about a RateBasedRule (see GetRateBasedRule ), update a RateBasedRule (see UpdateRateBasedRule ), insert a RateBasedRule into a WebACL or delete one from a WebACL (see UpdateWebACL ), or delete a RateBasedRule from AWS WAF (see DeleteRateBasedRule ). Name (string) -- A friendly name or description for a RateBasedRule . You can\'t change the name of a RateBasedRule after you create it. MetricName (string) -- A friendly name or description for the metrics for a RateBasedRule . The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can\'t contain whitespace or metric names reserved for AWS WAF, including "All" and "Default_Action." You can\'t change the name of the metric after you create the RateBasedRule . MatchPredicates (list) -- The Predicates object contains one Predicate element for each ByteMatchSet , IPSet , or SqlInjectionMatchSet object that you want to include in a RateBasedRule . (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies the ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , and SizeConstraintSet objects that you want to add to a Rule and, for each object, indicates whether you want to negate the settings, for example, requests that do NOT originate from the IP address 192.0.2.44. Negated (boolean) -- Set Negated to False if you want AWS WAF to allow, block, or count requests based on the settings in the specified ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , or SizeConstraintSet . For example, if an IPSet includes the IP address 192.0.2.44 , AWS WAF will allow or block requests based on that IP address. Set Negated to True if you want AWS WAF to allow or block a request based on the negation of the settings in the ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , or SizeConstraintSet . For example, if an IPSet includes the IP address 192.0.2.44 , AWS WAF will allow, block, or count requests based on all IP addresses except 192.0.2.44 . Type (string) -- The type of predicate in a Rule , such as ByteMatch or IPSet . DataId (string) -- A unique identifier for a predicate in a Rule , such as ByteMatchSetId or IPSetId . The ID is returned by the corresponding Create or List command. RateKey (string) -- The field that AWS WAF uses to determine if requests are likely arriving from single source and thus subject to rate monitoring. The only valid value for RateKey is IP . IP indicates that requests arriving from the same IP address are subject to the RateLimit that is specified in the RateBasedRule . RateLimit (integer) -- The maximum number of requests, which have an identical value in the field specified by the RateKey , allowed in a five-minute period. If the number of requests exceeds the RateLimit and the other predicates specified in the rule are also met, AWS WAF triggers the action that is specified for this rule. ChangeToken (string) -- The ChangeToken that you used to submit the CreateRateBasedRule request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFDisallowedNameException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFLimitsExceededException WAFRegional.Client.exceptions.WAFTagOperationException WAFRegional.Client.exceptions.WAFTagOperationInternalErrorException WAFRegional.Client.exceptions.WAFBadRequestException :return: { 'Rule': { 'RuleId': 'string', 'Name': 'string', 'MetricName': 'string', 'MatchPredicates': [ { 'Negated': True|False, 'Type': 'IPMatch'|'ByteMatch'|'SqlInjectionMatch'|'GeoMatch'|'SizeConstraint'|'XssMatch'|'RegexMatch', 'DataId': 'string' }, ], 'RateKey': 'IP', 'RateLimit': 123 }, 'ChangeToken': 'string' } :returns: A ByteMatchSet with FieldToMatch of URI A PositionalConstraint of STARTS_WITH A TargetString of login """ pass def create_regex_match_set(Name=None, ChangeToken=None): """ Creates a RegexMatchSet . You then use UpdateRegexMatchSet to identify the part of a web request that you want AWS WAF to inspect, such as the values of the User-Agent header or the query string. For example, you can create a RegexMatchSet that contains a RegexMatchTuple that looks for any requests with User-Agent headers that match a RegexPatternSet with pattern B[a@]dB[o0]t . You can then configure AWS WAF to reject those requests. To create and configure a RegexMatchSet , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions :example: response = client.create_regex_match_set( Name='string', ChangeToken='string' ) :type Name: string :param Name: [REQUIRED]\nA friendly name or description of the RegexMatchSet . You can\'t change Name after you create a RegexMatchSet .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :rtype: dict ReturnsResponse Syntax { 'RegexMatchSet': { 'RegexMatchSetId': 'string', 'Name': 'string', 'RegexMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'RegexPatternSetId': 'string' }, ] }, 'ChangeToken': 'string' } Response Structure (dict) -- RegexMatchSet (dict) -- A RegexMatchSet that contains no RegexMatchTuple objects. RegexMatchSetId (string) -- The RegexMatchSetId for a RegexMatchSet . You use RegexMatchSetId to get information about a RegexMatchSet (see GetRegexMatchSet ), update a RegexMatchSet (see UpdateRegexMatchSet ), insert a RegexMatchSet into a Rule or delete one from a Rule (see UpdateRule ), and delete a RegexMatchSet from AWS WAF (see DeleteRegexMatchSet ). RegexMatchSetId is returned by CreateRegexMatchSet and by ListRegexMatchSets . Name (string) -- A friendly name or description of the RegexMatchSet . You can\'t change Name after you create a RegexMatchSet . RegexMatchTuples (list) -- Contains an array of RegexMatchTuple objects. Each RegexMatchTuple object contains: The part of a web request that you want AWS WAF to inspect, such as a query string or the value of the User-Agent header. The identifier of the pattern (a regular expression) that you want AWS WAF to look for. For more information, see RegexPatternSet . Whether to perform any conversions on the request, such as converting it to lowercase, before inspecting it for the specified string. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The regular expression pattern that you want AWS WAF to search for in web requests, the location in requests that you want AWS WAF to search, and other settings. Each RegexMatchTuple object contains: The part of a web request that you want AWS WAF to inspect, such as a query string or the value of the User-Agent header. The identifier of the pattern (a regular expression) that you want AWS WAF to look for. For more information, see RegexPatternSet . Whether to perform any conversions on the request, such as converting it to lowercase, before inspecting it for the specified string. FieldToMatch (dict) -- Specifies where in a web request to look for the RegexPatternSet . Type (string) -- The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) -- When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . TextTransformation (string) -- Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on RegexPatternSet before inspecting a request for a match. You can only specify a single type of TextTransformation. CMD_LINE When you\'re concerned that attackers are injecting an operating system commandline command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations: Delete the following characters: " \' ^ Delete spaces before the following characters: / ( Replace the following characters with a space: , ; Replace multiple spaces with one space Convert uppercase letters (A-Z) to lowercase (a-z) COMPRESS_WHITE_SPACE Use this option to replace the following characters with a space character (decimal 32): f, formfeed, decimal 12 t, tab, decimal 9 n, newline, decimal 10 r, carriage return, decimal 13 v, vertical tab, decimal 11 non-breaking space, decimal 160 COMPRESS_WHITE_SPACE also replaces multiple spaces with one space. HTML_ENTITY_DECODE Use this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations: Replaces (ampersand)quot; with " Replaces (ampersand)nbsp; with a non-breaking space, decimal 160 Replaces (ampersand)lt; with a "less than" symbol Replaces (ampersand)gt; with > Replaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters Replaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters LOWERCASE Use this option to convert uppercase letters (A-Z) to lowercase (a-z). URL_DECODE Use this option to decode a URL-encoded value. NONE Specify NONE if you don\'t want to perform any text transformations. RegexPatternSetId (string) -- The RegexPatternSetId for a RegexPatternSet . You use RegexPatternSetId to get information about a RegexPatternSet (see GetRegexPatternSet ), update a RegexPatternSet (see UpdateRegexPatternSet ), insert a RegexPatternSet into a RegexMatchSet or delete one from a RegexMatchSet (see UpdateRegexMatchSet ), and delete an RegexPatternSet from AWS WAF (see DeleteRegexPatternSet ). RegexPatternSetId is returned by CreateRegexPatternSet and by ListRegexPatternSets . ChangeToken (string) -- The ChangeToken that you used to submit the CreateRegexMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFDisallowedNameException WAFRegional.Client.exceptions.WAFLimitsExceededException :return: { 'RegexMatchSet': { 'RegexMatchSetId': 'string', 'Name': 'string', 'RegexMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'RegexPatternSetId': 'string' }, ] }, 'ChangeToken': 'string' } :returns: Name (string) -- [REQUIRED] A friendly name or description of the RegexMatchSet . You can\'t change Name after you create a RegexMatchSet . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def create_regex_pattern_set(Name=None, ChangeToken=None): """ Creates a RegexPatternSet . You then use UpdateRegexPatternSet to specify the regular expression (regex) pattern that you want AWS WAF to search for, such as B[a@]dB[o0]t . You can then configure AWS WAF to reject those requests. To create and configure a RegexPatternSet , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions :example: response = client.create_regex_pattern_set( Name='string', ChangeToken='string' ) :type Name: string :param Name: [REQUIRED]\nA friendly name or description of the RegexPatternSet . You can\'t change Name after you create a RegexPatternSet .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :rtype: dict ReturnsResponse Syntax { 'RegexPatternSet': { 'RegexPatternSetId': 'string', 'Name': 'string', 'RegexPatternStrings': [ 'string', ] }, 'ChangeToken': 'string' } Response Structure (dict) -- RegexPatternSet (dict) -- A RegexPatternSet that contains no objects. RegexPatternSetId (string) -- The identifier for the RegexPatternSet . You use RegexPatternSetId to get information about a RegexPatternSet , update a RegexPatternSet , remove a RegexPatternSet from a RegexMatchSet , and delete a RegexPatternSet from AWS WAF. RegexMatchSetId is returned by CreateRegexPatternSet and by ListRegexPatternSets . Name (string) -- A friendly name or description of the RegexPatternSet . You can\'t change Name after you create a RegexPatternSet . RegexPatternStrings (list) -- Specifies the regular expression (regex) patterns that you want AWS WAF to search for, such as B[a@]dB[o0]t . (string) -- ChangeToken (string) -- The ChangeToken that you used to submit the CreateRegexPatternSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFDisallowedNameException WAFRegional.Client.exceptions.WAFLimitsExceededException :return: { 'RegexPatternSet': { 'RegexPatternSetId': 'string', 'Name': 'string', 'RegexPatternStrings': [ 'string', ] }, 'ChangeToken': 'string' } :returns: Name (string) -- [REQUIRED] A friendly name or description of the RegexPatternSet . You can\'t change Name after you create a RegexPatternSet . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def create_rule(Name=None, MetricName=None, ChangeToken=None, Tags=None): """ Creates a Rule , which contains the IPSet objects, ByteMatchSet objects, and other predicates that identify the requests that you want to block. If you add more than one predicate to a Rule , a request must match all of the specifications to be allowed or blocked. For example, suppose that you add the following to a Rule : You then add the Rule to a WebACL and specify that you want to blocks requests that satisfy the Rule . For a request to be blocked, it must come from the IP address 192.0.2.44 and the User-Agent header in the request must contain the value BadBot . To create and configure a Rule , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions Examples The following example creates a rule named WAFByteHeaderRule. Expected Output: :example: response = client.create_rule( Name='string', MetricName='string', ChangeToken='string', Tags=[ { 'Key': 'string', 'Value': 'string' }, ] ) :type Name: string :param Name: [REQUIRED]\nA friendly name or description of the Rule . You can\'t change the name of a Rule after you create it.\n :type MetricName: string :param MetricName: [REQUIRED]\nA friendly name or description for the metrics for this Rule . The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can\'t contain whitespace or metric names reserved for AWS WAF, including 'All' and 'Default_Action.' You can\'t change the name of the metric after you create the Rule .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :type Tags: list :param Tags: \n(dict) --\nNote\nThis is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.\n\nFor the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use.\n\nA tag associated with an AWS resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to 'customer' and the value to the customer name or ID. You can specify one or more tags to add to each AWS resource, up to 50 tags for a resource.\nTagging is only available through the API, SDKs, and CLI. You can\'t manage or view tags through the AWS WAF Classic console. You can tag the AWS resources that you manage through AWS WAF Classic: web ACLs, rule groups, and rules.\n\nKey (string) -- [REQUIRED]\nValue (string) -- [REQUIRED]\n\n\n\n :rtype: dict ReturnsResponse Syntax { 'Rule': { 'RuleId': 'string', 'Name': 'string', 'MetricName': 'string', 'Predicates': [ { 'Negated': True|False, 'Type': 'IPMatch'|'ByteMatch'|'SqlInjectionMatch'|'GeoMatch'|'SizeConstraint'|'XssMatch'|'RegexMatch', 'DataId': 'string' }, ] }, 'ChangeToken': 'string' } Response Structure (dict) -- Rule (dict) -- The Rule returned in the CreateRule response. RuleId (string) -- A unique identifier for a Rule . You use RuleId to get more information about a Rule (see GetRule ), update a Rule (see UpdateRule ), insert a Rule into a WebACL or delete a one from a WebACL (see UpdateWebACL ), or delete a Rule from AWS WAF (see DeleteRule ). RuleId is returned by CreateRule and by ListRules . Name (string) -- The friendly name or description for the Rule . You can\'t change the name of a Rule after you create it. MetricName (string) -- A friendly name or description for the metrics for this Rule . The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can\'t contain whitespace or metric names reserved for AWS WAF, including "All" and "Default_Action." You can\'t change MetricName after you create the Rule . Predicates (list) -- The Predicates object contains one Predicate element for each ByteMatchSet , IPSet , or SqlInjectionMatchSet object that you want to include in a Rule . (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies the ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , and SizeConstraintSet objects that you want to add to a Rule and, for each object, indicates whether you want to negate the settings, for example, requests that do NOT originate from the IP address 192.0.2.44. Negated (boolean) -- Set Negated to False if you want AWS WAF to allow, block, or count requests based on the settings in the specified ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , or SizeConstraintSet . For example, if an IPSet includes the IP address 192.0.2.44 , AWS WAF will allow or block requests based on that IP address. Set Negated to True if you want AWS WAF to allow or block a request based on the negation of the settings in the ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , or SizeConstraintSet . For example, if an IPSet includes the IP address 192.0.2.44 , AWS WAF will allow, block, or count requests based on all IP addresses except 192.0.2.44 . Type (string) -- The type of predicate in a Rule , such as ByteMatch or IPSet . DataId (string) -- A unique identifier for a predicate in a Rule , such as ByteMatchSetId or IPSetId . The ID is returned by the corresponding Create or List command. ChangeToken (string) -- The ChangeToken that you used to submit the CreateRule request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFDisallowedNameException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFLimitsExceededException WAFRegional.Client.exceptions.WAFTagOperationException WAFRegional.Client.exceptions.WAFTagOperationInternalErrorException WAFRegional.Client.exceptions.WAFBadRequestException Examples The following example creates a rule named WAFByteHeaderRule. response = client.create_rule( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', MetricName='WAFByteHeaderRule', Name='WAFByteHeaderRule', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'Rule': { 'MetricName': 'WAFByteHeaderRule', 'Name': 'WAFByteHeaderRule', 'Predicates': [ { 'DataId': 'MyByteMatchSetID', 'Negated': False, 'Type': 'ByteMatch', }, ], 'RuleId': 'WAFRule-1-Example', }, 'ResponseMetadata': { '...': '...', }, } :return: { 'Rule': { 'RuleId': 'string', 'Name': 'string', 'MetricName': 'string', 'Predicates': [ { 'Negated': True|False, 'Type': 'IPMatch'|'ByteMatch'|'SqlInjectionMatch'|'GeoMatch'|'SizeConstraint'|'XssMatch'|'RegexMatch', 'DataId': 'string' }, ] }, 'ChangeToken': 'string' } :returns: Create and update the predicates that you want to include in the Rule . For more information, see CreateByteMatchSet , CreateIPSet , and CreateSqlInjectionMatchSet . Use GetChangeToken to get the change token that you provide in the ChangeToken parameter of a CreateRule request. Submit a CreateRule request. Use GetChangeToken to get the change token that you provide in the ChangeToken parameter of an UpdateRule request. Submit an UpdateRule request to specify the predicates that you want to include in the Rule . Create and update a WebACL that contains the Rule . For more information, see CreateWebACL . """ pass def create_rule_group(Name=None, MetricName=None, ChangeToken=None, Tags=None): """ Creates a RuleGroup . A rule group is a collection of predefined rules that you add to a web ACL. You use UpdateRuleGroup to add rules to the rule group. Rule groups are subject to the following limits: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions :example: response = client.create_rule_group( Name='string', MetricName='string', ChangeToken='string', Tags=[ { 'Key': 'string', 'Value': 'string' }, ] ) :type Name: string :param Name: [REQUIRED]\nA friendly name or description of the RuleGroup . You can\'t change Name after you create a RuleGroup .\n :type MetricName: string :param MetricName: [REQUIRED]\nA friendly name or description for the metrics for this RuleGroup . The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can\'t contain whitespace or metric names reserved for AWS WAF, including 'All' and 'Default_Action.' You can\'t change the name of the metric after you create the RuleGroup .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :type Tags: list :param Tags: \n(dict) --\nNote\nThis is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.\n\nFor the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use.\n\nA tag associated with an AWS resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to 'customer' and the value to the customer name or ID. You can specify one or more tags to add to each AWS resource, up to 50 tags for a resource.\nTagging is only available through the API, SDKs, and CLI. You can\'t manage or view tags through the AWS WAF Classic console. You can tag the AWS resources that you manage through AWS WAF Classic: web ACLs, rule groups, and rules.\n\nKey (string) -- [REQUIRED]\nValue (string) -- [REQUIRED]\n\n\n\n :rtype: dict ReturnsResponse Syntax { 'RuleGroup': { 'RuleGroupId': 'string', 'Name': 'string', 'MetricName': 'string' }, 'ChangeToken': 'string' } Response Structure (dict) -- RuleGroup (dict) -- An empty RuleGroup . RuleGroupId (string) -- A unique identifier for a RuleGroup . You use RuleGroupId to get more information about a RuleGroup (see GetRuleGroup ), update a RuleGroup (see UpdateRuleGroup ), insert a RuleGroup into a WebACL or delete a one from a WebACL (see UpdateWebACL ), or delete a RuleGroup from AWS WAF (see DeleteRuleGroup ). RuleGroupId is returned by CreateRuleGroup and by ListRuleGroups . Name (string) -- The friendly name or description for the RuleGroup . You can\'t change the name of a RuleGroup after you create it. MetricName (string) -- A friendly name or description for the metrics for this RuleGroup . The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can\'t contain whitespace or metric names reserved for AWS WAF, including "All" and "Default_Action." You can\'t change the name of the metric after you create the RuleGroup . ChangeToken (string) -- The ChangeToken that you used to submit the CreateRuleGroup request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFDisallowedNameException WAFRegional.Client.exceptions.WAFLimitsExceededException WAFRegional.Client.exceptions.WAFTagOperationException WAFRegional.Client.exceptions.WAFTagOperationInternalErrorException WAFRegional.Client.exceptions.WAFBadRequestException :return: { 'RuleGroup': { 'RuleGroupId': 'string', 'Name': 'string', 'MetricName': 'string' }, 'ChangeToken': 'string' } :returns: Name (string) -- [REQUIRED] A friendly name or description of the RuleGroup . You can\'t change Name after you create a RuleGroup . MetricName (string) -- [REQUIRED] A friendly name or description for the metrics for this RuleGroup . The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can\'t contain whitespace or metric names reserved for AWS WAF, including "All" and "Default_Action." You can\'t change the name of the metric after you create the RuleGroup . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . Tags (list) -- (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. A tag associated with an AWS resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to "customer" and the value to the customer name or ID. You can specify one or more tags to add to each AWS resource, up to 50 tags for a resource. Tagging is only available through the API, SDKs, and CLI. You can\'t manage or view tags through the AWS WAF Classic console. You can tag the AWS resources that you manage through AWS WAF Classic: web ACLs, rule groups, and rules. Key (string) -- [REQUIRED] Value (string) -- [REQUIRED] """ pass def create_size_constraint_set(Name=None, ChangeToken=None): """ Creates a SizeConstraintSet . You then use UpdateSizeConstraintSet to identify the part of a web request that you want AWS WAF to check for length, such as the length of the User-Agent header or the length of the query string. For example, you can create a SizeConstraintSet that matches any requests that have a query string that is longer than 100 bytes. You can then configure AWS WAF to reject those requests. To create and configure a SizeConstraintSet , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions Examples The following example creates size constraint set named MySampleSizeConstraintSet. Expected Output: :example: response = client.create_size_constraint_set( Name='string', ChangeToken='string' ) :type Name: string :param Name: [REQUIRED]\nA friendly name or description of the SizeConstraintSet . You can\'t change Name after you create a SizeConstraintSet .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :rtype: dict ReturnsResponse Syntax { 'SizeConstraintSet': { 'SizeConstraintSetId': 'string', 'Name': 'string', 'SizeConstraints': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'ComparisonOperator': 'EQ'|'NE'|'LE'|'LT'|'GE'|'GT', 'Size': 123 }, ] }, 'ChangeToken': 'string' } Response Structure (dict) -- SizeConstraintSet (dict) -- A SizeConstraintSet that contains no SizeConstraint objects. SizeConstraintSetId (string) -- A unique identifier for a SizeConstraintSet . You use SizeConstraintSetId to get information about a SizeConstraintSet (see GetSizeConstraintSet ), update a SizeConstraintSet (see UpdateSizeConstraintSet ), insert a SizeConstraintSet into a Rule or delete one from a Rule (see UpdateRule ), and delete a SizeConstraintSet from AWS WAF (see DeleteSizeConstraintSet ). SizeConstraintSetId is returned by CreateSizeConstraintSet and by ListSizeConstraintSets . Name (string) -- The name, if any, of the SizeConstraintSet . SizeConstraints (list) -- Specifies the parts of web requests that you want to inspect the size of. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies a constraint on the size of a part of the web request. AWS WAF uses the Size , ComparisonOperator , and FieldToMatch to build an expression in the form of "Size ComparisonOperator size in bytes of FieldToMatch ". If that expression is true, the SizeConstraint is considered to match. FieldToMatch (dict) -- Specifies where in a web request to look for the size constraint. Type (string) -- The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) -- When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . TextTransformation (string) -- Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on FieldToMatch before inspecting it for a match. You can only specify a single type of TextTransformation. Note that if you choose BODY for the value of Type , you must choose NONE for TextTransformation because CloudFront forwards only the first 8192 bytes for inspection. NONE Specify NONE if you don\'t want to perform any text transformations. CMD_LINE When you\'re concerned that attackers are injecting an operating system command line command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations: Delete the following characters: " \' ^ Delete spaces before the following characters: / ( Replace the following characters with a space: , ; Replace multiple spaces with one space Convert uppercase letters (A-Z) to lowercase (a-z) COMPRESS_WHITE_SPACE Use this option to replace the following characters with a space character (decimal 32): f, formfeed, decimal 12 t, tab, decimal 9 n, newline, decimal 10 r, carriage return, decimal 13 v, vertical tab, decimal 11 non-breaking space, decimal 160 COMPRESS_WHITE_SPACE also replaces multiple spaces with one space. HTML_ENTITY_DECODE Use this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations: Replaces (ampersand)quot; with " Replaces (ampersand)nbsp; with a non-breaking space, decimal 160 Replaces (ampersand)lt; with a "less than" symbol Replaces (ampersand)gt; with > Replaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters Replaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters LOWERCASE Use this option to convert uppercase letters (A-Z) to lowercase (a-z). URL_DECODE Use this option to decode a URL-encoded value. ComparisonOperator (string) -- The type of comparison you want AWS WAF to perform. AWS WAF uses this in combination with the provided Size and FieldToMatch to build an expression in the form of "Size ComparisonOperator size in bytes of FieldToMatch ". If that expression is true, the SizeConstraint is considered to match. EQ : Used to test if the Size is equal to the size of the FieldToMatch NE : Used to test if the Size is not equal to the size of the FieldToMatch LE : Used to test if the Size is less than or equal to the size of the FieldToMatch LT : Used to test if the Size is strictly less than the size of the FieldToMatch GE : Used to test if the Size is greater than or equal to the size of the FieldToMatch GT : Used to test if the Size is strictly greater than the size of the FieldToMatch Size (integer) -- The size in bytes that you want AWS WAF to compare against the size of the specified FieldToMatch . AWS WAF uses this in combination with ComparisonOperator and FieldToMatch to build an expression in the form of "Size ComparisonOperator size in bytes of FieldToMatch ". If that expression is true, the SizeConstraint is considered to match. Valid values for size are 0 - 21474836480 bytes (0 - 20 GB). If you specify URI for the value of Type , the / in the URI counts as one character. For example, the URI /logo.jpg is nine characters long. ChangeToken (string) -- The ChangeToken that you used to submit the CreateSizeConstraintSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFDisallowedNameException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFLimitsExceededException Examples The following example creates size constraint set named MySampleSizeConstraintSet. response = client.create_size_constraint_set( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', Name='MySampleSizeConstraintSet', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'SizeConstraintSet': { 'Name': 'MySampleSizeConstraintSet', 'SizeConstraintSetId': 'example1ds3t-46da-4fdb-b8d5-abc321j569j5', 'SizeConstraints': [ { 'ComparisonOperator': 'GT', 'FieldToMatch': { 'Type': 'QUERY_STRING', }, 'Size': 0, 'TextTransformation': 'NONE', }, ], }, 'ResponseMetadata': { '...': '...', }, } :return: { 'SizeConstraintSet': { 'SizeConstraintSetId': 'string', 'Name': 'string', 'SizeConstraints': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'ComparisonOperator': 'EQ'|'NE'|'LE'|'LT'|'GE'|'GT', 'Size': 123 }, ] }, 'ChangeToken': 'string' } :returns: Name (string) -- [REQUIRED] A friendly name or description of the SizeConstraintSet . You can\'t change Name after you create a SizeConstraintSet . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def create_sql_injection_match_set(Name=None, ChangeToken=None): """ Creates a SqlInjectionMatchSet , which you use to allow, block, or count requests that contain snippets of SQL code in a specified part of web requests. AWS WAF searches for character sequences that are likely to be malicious strings. To create and configure a SqlInjectionMatchSet , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions Examples The following example creates a SQL injection match set named MySQLInjectionMatchSet. Expected Output: :example: response = client.create_sql_injection_match_set( Name='string', ChangeToken='string' ) :type Name: string :param Name: [REQUIRED]\nA friendly name or description for the SqlInjectionMatchSet that you\'re creating. You can\'t change Name after you create the SqlInjectionMatchSet .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :rtype: dict ReturnsResponse Syntax { 'SqlInjectionMatchSet': { 'SqlInjectionMatchSetId': 'string', 'Name': 'string', 'SqlInjectionMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE' }, ] }, 'ChangeToken': 'string' } Response Structure (dict) -- The response to a CreateSqlInjectionMatchSet request. SqlInjectionMatchSet (dict) -- A SqlInjectionMatchSet . SqlInjectionMatchSetId (string) -- A unique identifier for a SqlInjectionMatchSet . You use SqlInjectionMatchSetId to get information about a SqlInjectionMatchSet (see GetSqlInjectionMatchSet ), update a SqlInjectionMatchSet (see UpdateSqlInjectionMatchSet ), insert a SqlInjectionMatchSet into a Rule or delete one from a Rule (see UpdateRule ), and delete a SqlInjectionMatchSet from AWS WAF (see DeleteSqlInjectionMatchSet ). SqlInjectionMatchSetId is returned by CreateSqlInjectionMatchSet and by ListSqlInjectionMatchSets . Name (string) -- The name, if any, of the SqlInjectionMatchSet . SqlInjectionMatchTuples (list) -- Specifies the parts of web requests that you want to inspect for snippets of malicious SQL code. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies the part of a web request that you want AWS WAF to inspect for snippets of malicious SQL code and, if you want AWS WAF to inspect a header, the name of the header. FieldToMatch (dict) -- Specifies where in a web request to look for snippets of malicious SQL code. Type (string) -- The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) -- When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . TextTransformation (string) -- Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on FieldToMatch before inspecting it for a match. You can only specify a single type of TextTransformation. CMD_LINE When you\'re concerned that attackers are injecting an operating system command line command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations: Delete the following characters: " \' ^ Delete spaces before the following characters: / ( Replace the following characters with a space: , ; Replace multiple spaces with one space Convert uppercase letters (A-Z) to lowercase (a-z) COMPRESS_WHITE_SPACE Use this option to replace the following characters with a space character (decimal 32): f, formfeed, decimal 12 t, tab, decimal 9 n, newline, decimal 10 r, carriage return, decimal 13 v, vertical tab, decimal 11 non-breaking space, decimal 160 COMPRESS_WHITE_SPACE also replaces multiple spaces with one space. HTML_ENTITY_DECODE Use this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations: Replaces (ampersand)quot; with " Replaces (ampersand)nbsp; with a non-breaking space, decimal 160 Replaces (ampersand)lt; with a "less than" symbol Replaces (ampersand)gt; with > Replaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters Replaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters LOWERCASE Use this option to convert uppercase letters (A-Z) to lowercase (a-z). URL_DECODE Use this option to decode a URL-encoded value. NONE Specify NONE if you don\'t want to perform any text transformations. ChangeToken (string) -- The ChangeToken that you used to submit the CreateSqlInjectionMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFDisallowedNameException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFLimitsExceededException Examples The following example creates a SQL injection match set named MySQLInjectionMatchSet. response = client.create_sql_injection_match_set( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', Name='MySQLInjectionMatchSet', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'SqlInjectionMatchSet': { 'Name': 'MySQLInjectionMatchSet', 'SqlInjectionMatchSetId': 'example1ds3t-46da-4fdb-b8d5-abc321j569j5', 'SqlInjectionMatchTuples': [ { 'FieldToMatch': { 'Type': 'QUERY_STRING', }, 'TextTransformation': 'URL_DECODE', }, ], }, 'ResponseMetadata': { '...': '...', }, } :return: { 'SqlInjectionMatchSet': { 'SqlInjectionMatchSetId': 'string', 'Name': 'string', 'SqlInjectionMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE' }, ] }, 'ChangeToken': 'string' } :returns: Name (string) -- [REQUIRED] A friendly name or description for the SqlInjectionMatchSet that you\'re creating. You can\'t change Name after you create the SqlInjectionMatchSet . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def create_web_acl(Name=None, MetricName=None, DefaultAction=None, ChangeToken=None, Tags=None): """ Creates a WebACL , which contains the Rules that identify the CloudFront web requests that you want to allow, block, or count. AWS WAF evaluates Rules in order based on the value of Priority for each Rule . You also specify a default action, either ALLOW or BLOCK . If a web request doesn\'t match any of the Rules in a WebACL , AWS WAF responds to the request with the default action. To create and configure a WebACL , perform the following steps: For more information about how to use the AWS WAF API, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions Examples The following example creates a web ACL named CreateExample. Expected Output: :example: response = client.create_web_acl( Name='string', MetricName='string', DefaultAction={ 'Type': 'BLOCK'|'ALLOW'|'COUNT' }, ChangeToken='string', Tags=[ { 'Key': 'string', 'Value': 'string' }, ] ) :type Name: string :param Name: [REQUIRED]\nA friendly name or description of the WebACL . You can\'t change Name after you create the WebACL .\n :type MetricName: string :param MetricName: [REQUIRED]\nA friendly name or description for the metrics for this WebACL .The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can\'t contain whitespace or metric names reserved for AWS WAF, including 'All' and 'Default_Action.' You can\'t change MetricName after you create the WebACL .\n :type DefaultAction: dict :param DefaultAction: [REQUIRED]\nThe action that you want AWS WAF to take when a request doesn\'t match the criteria specified in any of the Rule objects that are associated with the WebACL .\n\nType (string) -- [REQUIRED]Specifies how you want AWS WAF to respond to requests that match the settings in a Rule . Valid settings include the following:\n\nALLOW : AWS WAF allows requests\nBLOCK : AWS WAF blocks requests\nCOUNT : AWS WAF increments a counter of the requests that match all of the conditions in the rule. AWS WAF then continues to inspect the web request based on the remaining rules in the web ACL. You can\'t specify COUNT for the default action for a WebACL .\n\n\n\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :type Tags: list :param Tags: \n(dict) --\nNote\nThis is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.\n\nFor the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use.\n\nA tag associated with an AWS resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to 'customer' and the value to the customer name or ID. You can specify one or more tags to add to each AWS resource, up to 50 tags for a resource.\nTagging is only available through the API, SDKs, and CLI. You can\'t manage or view tags through the AWS WAF Classic console. You can tag the AWS resources that you manage through AWS WAF Classic: web ACLs, rule groups, and rules.\n\nKey (string) -- [REQUIRED]\nValue (string) -- [REQUIRED]\n\n\n\n :rtype: dict ReturnsResponse Syntax { 'WebACL': { 'WebACLId': 'string', 'Name': 'string', 'MetricName': 'string', 'DefaultAction': { 'Type': 'BLOCK'|'ALLOW'|'COUNT' }, 'Rules': [ { 'Priority': 123, 'RuleId': 'string', 'Action': { 'Type': 'BLOCK'|'ALLOW'|'COUNT' }, 'OverrideAction': { 'Type': 'NONE'|'COUNT' }, 'Type': 'REGULAR'|'RATE_BASED'|'GROUP', 'ExcludedRules': [ { 'RuleId': 'string' }, ] }, ], 'WebACLArn': 'string' }, 'ChangeToken': 'string' } Response Structure (dict) -- WebACL (dict) -- The WebACL returned in the CreateWebACL response. WebACLId (string) -- A unique identifier for a WebACL . You use WebACLId to get information about a WebACL (see GetWebACL ), update a WebACL (see UpdateWebACL ), and delete a WebACL from AWS WAF (see DeleteWebACL ). WebACLId is returned by CreateWebACL and by ListWebACLs . Name (string) -- A friendly name or description of the WebACL . You can\'t change the name of a WebACL after you create it. MetricName (string) -- A friendly name or description for the metrics for this WebACL . The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can\'t contain whitespace or metric names reserved for AWS WAF, including "All" and "Default_Action." You can\'t change MetricName after you create the WebACL . DefaultAction (dict) -- The action to perform if none of the Rules contained in the WebACL match. The action is specified by the WafAction object. Type (string) -- Specifies how you want AWS WAF to respond to requests that match the settings in a Rule . Valid settings include the following: ALLOW : AWS WAF allows requests BLOCK : AWS WAF blocks requests COUNT : AWS WAF increments a counter of the requests that match all of the conditions in the rule. AWS WAF then continues to inspect the web request based on the remaining rules in the web ACL. You can\'t specify COUNT for the default action for a WebACL . Rules (list) -- An array that contains the action for each Rule in a WebACL , the priority of the Rule , and the ID of the Rule . (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The ActivatedRule object in an UpdateWebACL request specifies a Rule that you want to insert or delete, the priority of the Rule in the WebACL , and the action that you want AWS WAF to take when a web request matches the Rule (ALLOW , BLOCK , or COUNT ). To specify whether to insert or delete a Rule , use the Action parameter in the WebACLUpdate data type. Priority (integer) -- Specifies the order in which the Rules in a WebACL are evaluated. Rules with a lower value for Priority are evaluated before Rules with a higher value. The value must be a unique integer. If you add multiple Rules to a WebACL , the values don\'t need to be consecutive. RuleId (string) -- The RuleId for a Rule . You use RuleId to get more information about a Rule (see GetRule ), update a Rule (see UpdateRule ), insert a Rule into a WebACL or delete a one from a WebACL (see UpdateWebACL ), or delete a Rule from AWS WAF (see DeleteRule ). RuleId is returned by CreateRule and by ListRules . Action (dict) -- Specifies the action that CloudFront or AWS WAF takes when a web request matches the conditions in the Rule . Valid values for Action include the following: ALLOW : CloudFront responds with the requested object. BLOCK : CloudFront responds with an HTTP 403 (Forbidden) status code. COUNT : AWS WAF increments a counter of requests that match the conditions in the rule and then continues to inspect the web request based on the remaining rules in the web ACL. ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case, you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction . Type (string) -- Specifies how you want AWS WAF to respond to requests that match the settings in a Rule . Valid settings include the following: ALLOW : AWS WAF allows requests BLOCK : AWS WAF blocks requests COUNT : AWS WAF increments a counter of the requests that match all of the conditions in the rule. AWS WAF then continues to inspect the web request based on the remaining rules in the web ACL. You can\'t specify COUNT for the default action for a WebACL . OverrideAction (dict) -- Use the OverrideAction to test your RuleGroup . Any rule in a RuleGroup can potentially block a request. If you set the OverrideAction to None , the RuleGroup will block a request if any individual rule in the RuleGroup matches the request and is configured to block that request. However if you first want to test the RuleGroup , set the OverrideAction to Count . The RuleGroup will then override any block action specified by individual rules contained within the group. Instead of blocking matching requests, those requests will be counted. You can view a record of counted requests using GetSampledRequests . ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction . Type (string) -- COUNT overrides the action specified by the individual rule within a RuleGroup . If set to NONE , the rule\'s action will take place. Type (string) -- The rule type, either REGULAR , as defined by Rule , RATE_BASED , as defined by RateBasedRule , or GROUP , as defined by RuleGroup . The default is REGULAR. Although this field is optional, be aware that if you try to add a RATE_BASED rule to a web ACL without setting the type, the UpdateWebACL request will fail because the request tries to add a REGULAR rule with the specified ID, which does not exist. ExcludedRules (list) -- An array of rules to exclude from a rule group. This is applicable only when the ActivatedRule refers to a RuleGroup . Sometimes it is necessary to troubleshoot rule groups that are blocking traffic unexpectedly (false positives). One troubleshooting technique is to identify the specific rule within the rule group that is blocking the legitimate traffic and then disable (exclude) that particular rule. You can exclude rules from both your own rule groups and AWS Marketplace rule groups that have been associated with a web ACL. Specifying ExcludedRules does not remove those rules from the rule group. Rather, it changes the action for the rules to COUNT . Therefore, requests that match an ExcludedRule are counted but not blocked. The RuleGroup owner will receive COUNT metrics for each ExcludedRule . If you want to exclude rules from a rule group that is already associated with a web ACL, perform the following steps: Use the AWS WAF logs to identify the IDs of the rules that you want to exclude. For more information about the logs, see Logging Web ACL Traffic Information . Submit an UpdateWebACL request that has two actions: The first action deletes the existing rule group from the web ACL. That is, in the UpdateWebACL request, the first Updates:Action should be DELETE and Updates:ActivatedRule:RuleId should be the rule group that contains the rules that you want to exclude. The second action inserts the same rule group back in, but specifying the rules to exclude. That is, the second Updates:Action should be INSERT , Updates:ActivatedRule:RuleId should be the rule group that you just removed, and ExcludedRules should contain the rules that you want to exclude. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The rule to exclude from a rule group. This is applicable only when the ActivatedRule refers to a RuleGroup . The rule must belong to the RuleGroup that is specified by the ActivatedRule . RuleId (string) -- The unique identifier for the rule to exclude from the rule group. WebACLArn (string) -- Tha Amazon Resource Name (ARN) of the web ACL. ChangeToken (string) -- The ChangeToken that you used to submit the CreateWebACL request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFDisallowedNameException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFLimitsExceededException WAFRegional.Client.exceptions.WAFTagOperationException WAFRegional.Client.exceptions.WAFTagOperationInternalErrorException WAFRegional.Client.exceptions.WAFBadRequestException Examples The following example creates a web ACL named CreateExample. response = client.create_web_acl( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', DefaultAction={ 'Type': 'ALLOW', }, MetricName='CreateExample', Name='CreateExample', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'WebACL': { 'DefaultAction': { 'Type': 'ALLOW', }, 'MetricName': 'CreateExample', 'Name': 'CreateExample', 'Rules': [ { 'Action': { 'Type': 'ALLOW', }, 'Priority': 1, 'RuleId': 'WAFRule-1-Example', }, ], 'WebACLId': 'example-46da-4444-5555-example', }, 'ResponseMetadata': { '...': '...', }, } :return: { 'WebACL': { 'WebACLId': 'string', 'Name': 'string', 'MetricName': 'string', 'DefaultAction': { 'Type': 'BLOCK'|'ALLOW'|'COUNT' }, 'Rules': [ { 'Priority': 123, 'RuleId': 'string', 'Action': { 'Type': 'BLOCK'|'ALLOW'|'COUNT' }, 'OverrideAction': { 'Type': 'NONE'|'COUNT' }, 'Type': 'REGULAR'|'RATE_BASED'|'GROUP', 'ExcludedRules': [ { 'RuleId': 'string' }, ] }, ], 'WebACLArn': 'string' }, 'ChangeToken': 'string' } :returns: Name (string) -- [REQUIRED] A friendly name or description of the WebACL . You can\'t change Name after you create the WebACL . MetricName (string) -- [REQUIRED] A friendly name or description for the metrics for this WebACL .The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can\'t contain whitespace or metric names reserved for AWS WAF, including "All" and "Default_Action." You can\'t change MetricName after you create the WebACL . DefaultAction (dict) -- [REQUIRED] The action that you want AWS WAF to take when a request doesn\'t match the criteria specified in any of the Rule objects that are associated with the WebACL . Type (string) -- [REQUIRED]Specifies how you want AWS WAF to respond to requests that match the settings in a Rule . Valid settings include the following: ALLOW : AWS WAF allows requests BLOCK : AWS WAF blocks requests COUNT : AWS WAF increments a counter of the requests that match all of the conditions in the rule. AWS WAF then continues to inspect the web request based on the remaining rules in the web ACL. You can\'t specify COUNT for the default action for a WebACL . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . Tags (list) -- (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. A tag associated with an AWS resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to "customer" and the value to the customer name or ID. You can specify one or more tags to add to each AWS resource, up to 50 tags for a resource. Tagging is only available through the API, SDKs, and CLI. You can\'t manage or view tags through the AWS WAF Classic console. You can tag the AWS resources that you manage through AWS WAF Classic: web ACLs, rule groups, and rules. Key (string) -- [REQUIRED] Value (string) -- [REQUIRED] """ pass def create_web_acl_migration_stack(WebACLId=None, S3BucketName=None, IgnoreUnsupportedType=None): """ Creates an AWS CloudFormation WAFV2 template for the specified web ACL in the specified Amazon S3 bucket. Then, in CloudFormation, you create a stack from the template, to create the web ACL and its resources in AWS WAFV2. Use this to migrate your AWS WAF Classic web ACL to the latest version of AWS WAF. This is part of a larger migration procedure for web ACLs from AWS WAF Classic to the latest version of AWS WAF. For the full procedure, including caveats and manual steps to complete the migration and switch over to the new web ACL, see Migrating your AWS WAF Classic resources to AWS WAF in the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions :example: response = client.create_web_acl_migration_stack( WebACLId='string', S3BucketName='string', IgnoreUnsupportedType=True|False ) :type WebACLId: string :param WebACLId: [REQUIRED]\nThe UUID of the WAF Classic web ACL that you want to migrate to WAF v2.\n :type S3BucketName: string :param S3BucketName: [REQUIRED]\nThe name of the Amazon S3 bucket to store the CloudFormation template in. The S3 bucket must be configured as follows for the migration:\n\nThe bucket name must start with aws-waf-migration- . For example, aws-waf-migration-my-web-acl .\nThe bucket must be in the Region where you are deploying the template. For example, for a web ACL in us-west-2, you must use an Amazon S3 bucket in us-west-2 and you must deploy the template stack to us-west-2.\nThe bucket policies must permit the migration process to write data. For listings of the bucket policies, see the Examples section.\n\n :type IgnoreUnsupportedType: boolean :param IgnoreUnsupportedType: [REQUIRED]\nIndicates whether to exclude entities that can\'t be migrated or to stop the migration. Set this to true to ignore unsupported entities in the web ACL during the migration. Otherwise, if AWS WAF encounters unsupported entities, it stops the process and throws an exception.\n :rtype: dict ReturnsResponse Syntax { 'S3ObjectUrl': 'string' } Response Structure (dict) -- S3ObjectUrl (string) -- The URL of the template created in Amazon S3. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFEntityMigrationException :return: { 'S3ObjectUrl': 'string' } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFEntityMigrationException """ pass def create_xss_match_set(Name=None, ChangeToken=None): """ Creates an XssMatchSet , which you use to allow, block, or count requests that contain cross-site scripting attacks in the specified part of web requests. AWS WAF searches for character sequences that are likely to be malicious strings. To create and configure an XssMatchSet , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions Examples The following example creates an XSS match set named MySampleXssMatchSet. Expected Output: :example: response = client.create_xss_match_set( Name='string', ChangeToken='string' ) :type Name: string :param Name: [REQUIRED]\nA friendly name or description for the XssMatchSet that you\'re creating. You can\'t change Name after you create the XssMatchSet .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :rtype: dict ReturnsResponse Syntax { 'XssMatchSet': { 'XssMatchSetId': 'string', 'Name': 'string', 'XssMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE' }, ] }, 'ChangeToken': 'string' } Response Structure (dict) -- The response to a CreateXssMatchSet request. XssMatchSet (dict) -- An XssMatchSet . XssMatchSetId (string) -- A unique identifier for an XssMatchSet . You use XssMatchSetId to get information about an XssMatchSet (see GetXssMatchSet ), update an XssMatchSet (see UpdateXssMatchSet ), insert an XssMatchSet into a Rule or delete one from a Rule (see UpdateRule ), and delete an XssMatchSet from AWS WAF (see DeleteXssMatchSet ). XssMatchSetId is returned by CreateXssMatchSet and by ListXssMatchSets . Name (string) -- The name, if any, of the XssMatchSet . XssMatchTuples (list) -- Specifies the parts of web requests that you want to inspect for cross-site scripting attacks. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies the part of a web request that you want AWS WAF to inspect for cross-site scripting attacks and, if you want AWS WAF to inspect a header, the name of the header. FieldToMatch (dict) -- Specifies where in a web request to look for cross-site scripting attacks. Type (string) -- The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) -- When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . TextTransformation (string) -- Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on FieldToMatch before inspecting it for a match. You can only specify a single type of TextTransformation. CMD_LINE When you\'re concerned that attackers are injecting an operating system command line command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations: Delete the following characters: " \' ^ Delete spaces before the following characters: / ( Replace the following characters with a space: , ; Replace multiple spaces with one space Convert uppercase letters (A-Z) to lowercase (a-z) COMPRESS_WHITE_SPACE Use this option to replace the following characters with a space character (decimal 32): f, formfeed, decimal 12 t, tab, decimal 9 n, newline, decimal 10 r, carriage return, decimal 13 v, vertical tab, decimal 11 non-breaking space, decimal 160 COMPRESS_WHITE_SPACE also replaces multiple spaces with one space. HTML_ENTITY_DECODE Use this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations: Replaces (ampersand)quot; with " Replaces (ampersand)nbsp; with a non-breaking space, decimal 160 Replaces (ampersand)lt; with a "less than" symbol Replaces (ampersand)gt; with > Replaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters Replaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters LOWERCASE Use this option to convert uppercase letters (A-Z) to lowercase (a-z). URL_DECODE Use this option to decode a URL-encoded value. NONE Specify NONE if you don\'t want to perform any text transformations. ChangeToken (string) -- The ChangeToken that you used to submit the CreateXssMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFDisallowedNameException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFLimitsExceededException Examples The following example creates an XSS match set named MySampleXssMatchSet. response = client.create_xss_match_set( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', Name='MySampleXssMatchSet', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'XssMatchSet': { 'Name': 'MySampleXssMatchSet', 'XssMatchSetId': 'example1ds3t-46da-4fdb-b8d5-abc321j569j5', 'XssMatchTuples': [ { 'FieldToMatch': { 'Type': 'QUERY_STRING', }, 'TextTransformation': 'URL_DECODE', }, ], }, 'ResponseMetadata': { '...': '...', }, } :return: { 'XssMatchSet': { 'XssMatchSetId': 'string', 'Name': 'string', 'XssMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE' }, ] }, 'ChangeToken': 'string' } :returns: Name (string) -- [REQUIRED] A friendly name or description for the XssMatchSet that you\'re creating. You can\'t change Name after you create the XssMatchSet . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def delete_byte_match_set(ByteMatchSetId=None, ChangeToken=None): """ Permanently deletes a ByteMatchSet . You can\'t delete a ByteMatchSet if it\'s still used in any Rules or if it still includes any ByteMatchTuple objects (any filters). If you just want to remove a ByteMatchSet from a Rule , use UpdateRule . To permanently delete a ByteMatchSet , perform the following steps: See also: AWS API Documentation Exceptions Examples The following example deletes a byte match set with the ID exampleIDs3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.delete_byte_match_set( ByteMatchSetId='string', ChangeToken='string' ) :type ByteMatchSetId: string :param ByteMatchSetId: [REQUIRED]\nThe ByteMatchSetId of the ByteMatchSet that you want to delete. ByteMatchSetId is returned by CreateByteMatchSet and by ListByteMatchSets .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the DeleteByteMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFNonEmptyEntityException Examples The following example deletes a byte match set with the ID exampleIDs3t-46da-4fdb-b8d5-abc321j569j5. response = client.delete_byte_match_set( ByteMatchSetId='exampleIDs3t-46da-4fdb-b8d5-abc321j569j5', ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } :returns: ByteMatchSetId (string) -- [REQUIRED] The ByteMatchSetId of the ByteMatchSet that you want to delete. ByteMatchSetId is returned by CreateByteMatchSet and by ListByteMatchSets . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def delete_geo_match_set(GeoMatchSetId=None, ChangeToken=None): """ Permanently deletes a GeoMatchSet . You can\'t delete a GeoMatchSet if it\'s still used in any Rules or if it still includes any countries. If you just want to remove a GeoMatchSet from a Rule , use UpdateRule . To permanently delete a GeoMatchSet from AWS WAF, perform the following steps: See also: AWS API Documentation Exceptions :example: response = client.delete_geo_match_set( GeoMatchSetId='string', ChangeToken='string' ) :type GeoMatchSetId: string :param GeoMatchSetId: [REQUIRED]\nThe GeoMatchSetID of the GeoMatchSet that you want to delete. GeoMatchSetId is returned by CreateGeoMatchSet and by ListGeoMatchSets .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the DeleteGeoMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFNonEmptyEntityException :return: { 'ChangeToken': 'string' } :returns: GeoMatchSetId (string) -- [REQUIRED] The GeoMatchSetID of the GeoMatchSet that you want to delete. GeoMatchSetId is returned by CreateGeoMatchSet and by ListGeoMatchSets . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def delete_ip_set(IPSetId=None, ChangeToken=None): """ Permanently deletes an IPSet . You can\'t delete an IPSet if it\'s still used in any Rules or if it still includes any IP addresses. If you just want to remove an IPSet from a Rule , use UpdateRule . To permanently delete an IPSet from AWS WAF, perform the following steps: See also: AWS API Documentation Exceptions Examples The following example deletes an IP match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.delete_ip_set( IPSetId='string', ChangeToken='string' ) :type IPSetId: string :param IPSetId: [REQUIRED]\nThe IPSetId of the IPSet that you want to delete. IPSetId is returned by CreateIPSet and by ListIPSets .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the DeleteIPSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFNonEmptyEntityException Examples The following example deletes an IP match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. response = client.delete_ip_set( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', IPSetId='example1ds3t-46da-4fdb-b8d5-abc321j569j5', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } :returns: IPSetId (string) -- [REQUIRED] The IPSetId of the IPSet that you want to delete. IPSetId is returned by CreateIPSet and by ListIPSets . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def delete_logging_configuration(ResourceArn=None): """ Permanently deletes the LoggingConfiguration from the specified web ACL. See also: AWS API Documentation Exceptions :example: response = client.delete_logging_configuration( ResourceArn='string' ) :type ResourceArn: string :param ResourceArn: [REQUIRED]\nThe Amazon Resource Name (ARN) of the web ACL from which you want to delete the LoggingConfiguration .\n :rtype: dict ReturnsResponse Syntax{} Response Structure (dict) -- Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFStaleDataException :return: {} :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFStaleDataException """ pass def delete_permission_policy(ResourceArn=None): """ Permanently deletes an IAM policy from the specified RuleGroup. The user making the request must be the owner of the RuleGroup. See also: AWS API Documentation Exceptions :example: response = client.delete_permission_policy( ResourceArn='string' ) :type ResourceArn: string :param ResourceArn: [REQUIRED]\nThe Amazon Resource Name (ARN) of the RuleGroup from which you want to delete the policy.\nThe user making the request must be the owner of the RuleGroup.\n :rtype: dict ReturnsResponse Syntax{} Response Structure (dict) -- Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFNonexistentItemException :return: {} :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFNonexistentItemException """ pass def delete_rate_based_rule(RuleId=None, ChangeToken=None): """ Permanently deletes a RateBasedRule . You can\'t delete a rule if it\'s still used in any WebACL objects or if it still includes any predicates, such as ByteMatchSet objects. If you just want to remove a rule from a WebACL , use UpdateWebACL . To permanently delete a RateBasedRule from AWS WAF, perform the following steps: See also: AWS API Documentation Exceptions :example: response = client.delete_rate_based_rule( RuleId='string', ChangeToken='string' ) :type RuleId: string :param RuleId: [REQUIRED]\nThe RuleId of the RateBasedRule that you want to delete. RuleId is returned by CreateRateBasedRule and by ListRateBasedRules .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the DeleteRateBasedRule request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFNonEmptyEntityException WAFRegional.Client.exceptions.WAFTagOperationException WAFRegional.Client.exceptions.WAFTagOperationInternalErrorException :return: { 'ChangeToken': 'string' } :returns: RuleId (string) -- [REQUIRED] The RuleId of the RateBasedRule that you want to delete. RuleId is returned by CreateRateBasedRule and by ListRateBasedRules . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def delete_regex_match_set(RegexMatchSetId=None, ChangeToken=None): """ Permanently deletes a RegexMatchSet . You can\'t delete a RegexMatchSet if it\'s still used in any Rules or if it still includes any RegexMatchTuples objects (any filters). If you just want to remove a RegexMatchSet from a Rule , use UpdateRule . To permanently delete a RegexMatchSet , perform the following steps: See also: AWS API Documentation Exceptions :example: response = client.delete_regex_match_set( RegexMatchSetId='string', ChangeToken='string' ) :type RegexMatchSetId: string :param RegexMatchSetId: [REQUIRED]\nThe RegexMatchSetId of the RegexMatchSet that you want to delete. RegexMatchSetId is returned by CreateRegexMatchSet and by ListRegexMatchSets .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the DeleteRegexMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFNonEmptyEntityException :return: { 'ChangeToken': 'string' } :returns: RegexMatchSetId (string) -- [REQUIRED] The RegexMatchSetId of the RegexMatchSet that you want to delete. RegexMatchSetId is returned by CreateRegexMatchSet and by ListRegexMatchSets . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def delete_regex_pattern_set(RegexPatternSetId=None, ChangeToken=None): """ Permanently deletes a RegexPatternSet . You can\'t delete a RegexPatternSet if it\'s still used in any RegexMatchSet or if the RegexPatternSet is not empty. See also: AWS API Documentation Exceptions :example: response = client.delete_regex_pattern_set( RegexPatternSetId='string', ChangeToken='string' ) :type RegexPatternSetId: string :param RegexPatternSetId: [REQUIRED]\nThe RegexPatternSetId of the RegexPatternSet that you want to delete. RegexPatternSetId is returned by CreateRegexPatternSet and by ListRegexPatternSets .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the DeleteRegexPatternSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFNonEmptyEntityException :return: { 'ChangeToken': 'string' } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFNonEmptyEntityException """ pass def delete_rule(RuleId=None, ChangeToken=None): """ Permanently deletes a Rule . You can\'t delete a Rule if it\'s still used in any WebACL objects or if it still includes any predicates, such as ByteMatchSet objects. If you just want to remove a Rule from a WebACL , use UpdateWebACL . To permanently delete a Rule from AWS WAF, perform the following steps: See also: AWS API Documentation Exceptions Examples The following example deletes a rule with the ID WAFRule-1-Example. Expected Output: :example: response = client.delete_rule( RuleId='string', ChangeToken='string' ) :type RuleId: string :param RuleId: [REQUIRED]\nThe RuleId of the Rule that you want to delete. RuleId is returned by CreateRule and by ListRules .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the DeleteRule request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFNonEmptyEntityException WAFRegional.Client.exceptions.WAFTagOperationException WAFRegional.Client.exceptions.WAFTagOperationInternalErrorException Examples The following example deletes a rule with the ID WAFRule-1-Example. response = client.delete_rule( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', RuleId='WAFRule-1-Example', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } :returns: RuleId (string) -- [REQUIRED] The RuleId of the Rule that you want to delete. RuleId is returned by CreateRule and by ListRules . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def delete_rule_group(RuleGroupId=None, ChangeToken=None): """ Permanently deletes a RuleGroup . You can\'t delete a RuleGroup if it\'s still used in any WebACL objects or if it still includes any rules. If you just want to remove a RuleGroup from a WebACL , use UpdateWebACL . To permanently delete a RuleGroup from AWS WAF, perform the following steps: See also: AWS API Documentation Exceptions :example: response = client.delete_rule_group( RuleGroupId='string', ChangeToken='string' ) :type RuleGroupId: string :param RuleGroupId: [REQUIRED]\nThe RuleGroupId of the RuleGroup that you want to delete. RuleGroupId is returned by CreateRuleGroup and by ListRuleGroups .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the DeleteRuleGroup request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFNonEmptyEntityException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFTagOperationException WAFRegional.Client.exceptions.WAFTagOperationInternalErrorException :return: { 'ChangeToken': 'string' } :returns: RuleGroupId (string) -- [REQUIRED] The RuleGroupId of the RuleGroup that you want to delete. RuleGroupId is returned by CreateRuleGroup and by ListRuleGroups . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def delete_size_constraint_set(SizeConstraintSetId=None, ChangeToken=None): """ Permanently deletes a SizeConstraintSet . You can\'t delete a SizeConstraintSet if it\'s still used in any Rules or if it still includes any SizeConstraint objects (any filters). If you just want to remove a SizeConstraintSet from a Rule , use UpdateRule . To permanently delete a SizeConstraintSet , perform the following steps: See also: AWS API Documentation Exceptions Examples The following example deletes a size constraint set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.delete_size_constraint_set( SizeConstraintSetId='string', ChangeToken='string' ) :type SizeConstraintSetId: string :param SizeConstraintSetId: [REQUIRED]\nThe SizeConstraintSetId of the SizeConstraintSet that you want to delete. SizeConstraintSetId is returned by CreateSizeConstraintSet and by ListSizeConstraintSets .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the DeleteSizeConstraintSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFNonEmptyEntityException Examples The following example deletes a size constraint set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. response = client.delete_size_constraint_set( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', SizeConstraintSetId='example1ds3t-46da-4fdb-b8d5-abc321j569j5', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } :returns: SizeConstraintSetId (string) -- [REQUIRED] The SizeConstraintSetId of the SizeConstraintSet that you want to delete. SizeConstraintSetId is returned by CreateSizeConstraintSet and by ListSizeConstraintSets . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def delete_sql_injection_match_set(SqlInjectionMatchSetId=None, ChangeToken=None): """ Permanently deletes a SqlInjectionMatchSet . You can\'t delete a SqlInjectionMatchSet if it\'s still used in any Rules or if it still contains any SqlInjectionMatchTuple objects. If you just want to remove a SqlInjectionMatchSet from a Rule , use UpdateRule . To permanently delete a SqlInjectionMatchSet from AWS WAF, perform the following steps: See also: AWS API Documentation Exceptions Examples The following example deletes a SQL injection match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.delete_sql_injection_match_set( SqlInjectionMatchSetId='string', ChangeToken='string' ) :type SqlInjectionMatchSetId: string :param SqlInjectionMatchSetId: [REQUIRED]\nThe SqlInjectionMatchSetId of the SqlInjectionMatchSet that you want to delete. SqlInjectionMatchSetId is returned by CreateSqlInjectionMatchSet and by ListSqlInjectionMatchSets .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- The response to a request to delete a SqlInjectionMatchSet from AWS WAF. ChangeToken (string) -- The ChangeToken that you used to submit the DeleteSqlInjectionMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFNonEmptyEntityException Examples The following example deletes a SQL injection match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. response = client.delete_sql_injection_match_set( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', SqlInjectionMatchSetId='example1ds3t-46da-4fdb-b8d5-abc321j569j5', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } :returns: SqlInjectionMatchSetId (string) -- [REQUIRED] The SqlInjectionMatchSetId of the SqlInjectionMatchSet that you want to delete. SqlInjectionMatchSetId is returned by CreateSqlInjectionMatchSet and by ListSqlInjectionMatchSets . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def delete_web_acl(WebACLId=None, ChangeToken=None): """ Permanently deletes a WebACL . You can\'t delete a WebACL if it still contains any Rules . To delete a WebACL , perform the following steps: See also: AWS API Documentation Exceptions Examples The following example deletes a web ACL with the ID example-46da-4444-5555-example. Expected Output: :example: response = client.delete_web_acl( WebACLId='string', ChangeToken='string' ) :type WebACLId: string :param WebACLId: [REQUIRED]\nThe WebACLId of the WebACL that you want to delete. WebACLId is returned by CreateWebACL and by ListWebACLs .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the DeleteWebACL request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFNonEmptyEntityException WAFRegional.Client.exceptions.WAFTagOperationException WAFRegional.Client.exceptions.WAFTagOperationInternalErrorException Examples The following example deletes a web ACL with the ID example-46da-4444-5555-example. response = client.delete_web_acl( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', WebACLId='example-46da-4444-5555-example', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } :returns: WebACLId (string) -- [REQUIRED] The WebACLId of the WebACL that you want to delete. WebACLId is returned by CreateWebACL and by ListWebACLs . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def delete_xss_match_set(XssMatchSetId=None, ChangeToken=None): """ Permanently deletes an XssMatchSet . You can\'t delete an XssMatchSet if it\'s still used in any Rules or if it still contains any XssMatchTuple objects. If you just want to remove an XssMatchSet from a Rule , use UpdateRule . To permanently delete an XssMatchSet from AWS WAF, perform the following steps: See also: AWS API Documentation Exceptions Examples The following example deletes an XSS match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.delete_xss_match_set( XssMatchSetId='string', ChangeToken='string' ) :type XssMatchSetId: string :param XssMatchSetId: [REQUIRED]\nThe XssMatchSetId of the XssMatchSet that you want to delete. XssMatchSetId is returned by CreateXssMatchSet and by ListXssMatchSets .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- The response to a request to delete an XssMatchSet from AWS WAF. ChangeToken (string) -- The ChangeToken that you used to submit the DeleteXssMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFNonEmptyEntityException Examples The following example deletes an XSS match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. response = client.delete_xss_match_set( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', XssMatchSetId='example1ds3t-46da-4fdb-b8d5-abc321j569j5', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } :returns: XssMatchSetId (string) -- [REQUIRED] The XssMatchSetId of the XssMatchSet that you want to delete. XssMatchSetId is returned by CreateXssMatchSet and by ListXssMatchSets . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def disassociate_web_acl(ResourceArn=None): """ Removes a web ACL from the specified resource, either an application load balancer or Amazon API Gateway stage. See also: AWS API Documentation Exceptions :example: response = client.disassociate_web_acl( ResourceArn='string' ) :type ResourceArn: string :param ResourceArn: [REQUIRED]\nThe ARN (Amazon Resource Name) of the resource from which the web ACL is being removed, either an application load balancer or Amazon API Gateway stage.\nThe ARN should be in one of the following formats:\n\nFor an Application Load Balancer: ``arn:aws:elasticloadbalancing:region :account-id :loadbalancer/app/load-balancer-name /load-balancer-id ``\nFor an Amazon API Gateway stage: ``arn:aws:apigateway:region ::/restapis/api-id /stages/stage-name ``\n\n :rtype: dict ReturnsResponse Syntax{} Response Structure (dict) -- Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFNonexistentItemException :return: {} :returns: (dict) -- """ pass def generate_presigned_url(ClientMethod=None, Params=None, ExpiresIn=None, HttpMethod=None): """ Generate a presigned url given a client, its method, and arguments :type ClientMethod: string :param ClientMethod: The client method to presign for :type Params: dict :param Params: The parameters normally passed to\nClientMethod. :type ExpiresIn: int :param ExpiresIn: The number of seconds the presigned url is valid\nfor. By default it expires in an hour (3600 seconds) :type HttpMethod: string :param HttpMethod: The http method to use on the generated url. By\ndefault, the http method is whatever is used in the method\'s model. """ pass def get_byte_match_set(ByteMatchSetId=None): """ Returns the ByteMatchSet specified by ByteMatchSetId . See also: AWS API Documentation Exceptions Examples The following example returns the details of a byte match set with the ID exampleIDs3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.get_byte_match_set( ByteMatchSetId='string' ) :type ByteMatchSetId: string :param ByteMatchSetId: [REQUIRED]\nThe ByteMatchSetId of the ByteMatchSet that you want to get. ByteMatchSetId is returned by CreateByteMatchSet and by ListByteMatchSets .\n :rtype: dict ReturnsResponse Syntax{ 'ByteMatchSet': { 'ByteMatchSetId': 'string', 'Name': 'string', 'ByteMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TargetString': b'bytes', 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'PositionalConstraint': 'EXACTLY'|'STARTS_WITH'|'ENDS_WITH'|'CONTAINS'|'CONTAINS_WORD' }, ] } } Response Structure (dict) -- ByteMatchSet (dict) --Information about the ByteMatchSet that you specified in the GetByteMatchSet request. For more information, see the following topics: ByteMatchSet : Contains ByteMatchSetId , ByteMatchTuples , and Name ByteMatchTuples : Contains an array of ByteMatchTuple objects. Each ByteMatchTuple object contains FieldToMatch , PositionalConstraint , TargetString , and TextTransformation FieldToMatch : Contains Data and Type ByteMatchSetId (string) --The ByteMatchSetId for a ByteMatchSet . You use ByteMatchSetId to get information about a ByteMatchSet (see GetByteMatchSet ), update a ByteMatchSet (see UpdateByteMatchSet ), insert a ByteMatchSet into a Rule or delete one from a Rule (see UpdateRule ), and delete a ByteMatchSet from AWS WAF (see DeleteByteMatchSet ). ByteMatchSetId is returned by CreateByteMatchSet and by ListByteMatchSets . Name (string) --A friendly name or description of the ByteMatchSet . You can\'t change Name after you create a ByteMatchSet . ByteMatchTuples (list) --Specifies the bytes (typically a string that corresponds with ASCII characters) that you want AWS WAF to search for in web requests, the location in requests that you want AWS WAF to search, and other settings. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The bytes (typically a string that corresponds with ASCII characters) that you want AWS WAF to search for in web requests, the location in requests that you want AWS WAF to search, and other settings. FieldToMatch (dict) --The part of a web request that you want AWS WAF to search, such as a specified header or a query string. For more information, see FieldToMatch . Type (string) --The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) --When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . TargetString (bytes) --The value that you want AWS WAF to search for. AWS WAF searches for the specified string in the part of web requests that you specified in FieldToMatch . The maximum length of the value is 50 bytes. Valid values depend on the values that you specified for FieldToMatch : HEADER : The value that you want AWS WAF to search for in the request header that you specified in FieldToMatch , for example, the value of the User-Agent or Referer header. METHOD : The HTTP method, which indicates the type of operation specified in the request. CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : The value that you want AWS WAF to search for in the query string, which is the part of a URL that appears after a ? character. URI : The value that you want AWS WAF to search for in the part of a URL that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but instead of inspecting a single parameter, AWS WAF inspects all parameters within the query string for the value or regex pattern that you specify in TargetString . If TargetString includes alphabetic characters A-Z and a-z, note that the value is case sensitive. If you\'re using the AWS WAF API Specify a base64-encoded version of the value. The maximum length of the value before you base64-encode it is 50 bytes. For example, suppose the value of Type is HEADER and the value of Data is User-Agent . If you want to search the User-Agent header for the value BadBot , you base64-encode BadBot using MIME base64-encoding and include the resulting value, QmFkQm90 , in the value of TargetString . If you\'re using the AWS CLI or one of the AWS SDKs The value that you want AWS WAF to search for. The SDK automatically base64 encodes the value. TextTransformation (string) --Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on FieldToMatch before inspecting it for a match. You can only specify a single type of TextTransformation. CMD_LINE When you\'re concerned that attackers are injecting an operating system command line command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations: Delete the following characters: " \' ^ Delete spaces before the following characters: / ( Replace the following characters with a space: , ; Replace multiple spaces with one space Convert uppercase letters (A-Z) to lowercase (a-z) COMPRESS_WHITE_SPACE Use this option to replace the following characters with a space character (decimal 32): f, formfeed, decimal 12 t, tab, decimal 9 n, newline, decimal 10 r, carriage return, decimal 13 v, vertical tab, decimal 11 non-breaking space, decimal 160 COMPRESS_WHITE_SPACE also replaces multiple spaces with one space.HTML_ENTITY_DECODE Use this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations: Replaces (ampersand)quot; with " Replaces (ampersand)nbsp; with a non-breaking space, decimal 160 Replaces (ampersand)lt; with a "less than" symbol Replaces (ampersand)gt; with > Replaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters Replaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters LOWERCASE Use this option to convert uppercase letters (A-Z) to lowercase (a-z). URL_DECODE Use this option to decode a URL-encoded value. NONE Specify NONE if you don\'t want to perform any text transformations. PositionalConstraint (string) --Within the portion of a web request that you want to search (for example, in the query string, if any), specify where you want AWS WAF to search. Valid values include the following: CONTAINS The specified part of the web request must include the value of TargetString , but the location doesn\'t matter. CONTAINS_WORD The specified part of the web request must include the value of TargetString , and TargetString must contain only alphanumeric characters or underscore (A-Z, a-z, 0-9, or _). In addition, TargetString must be a word, which means one of the following: TargetString exactly matches the value of the specified part of the web request, such as the value of a header. TargetString is at the beginning of the specified part of the web request and is followed by a character other than an alphanumeric character or underscore (_), for example, BadBot; . TargetString is at the end of the specified part of the web request and is preceded by a character other than an alphanumeric character or underscore (_), for example, ;BadBot . TargetString is in the middle of the specified part of the web request and is preceded and followed by characters other than alphanumeric characters or underscore (_), for example, -BadBot; . EXACTLY The value of the specified part of the web request must exactly match the value of TargetString . STARTS_WITH The value of TargetString must appear at the beginning of the specified part of the web request. ENDS_WITH The value of TargetString must appear at the end of the specified part of the web request. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException Examples The following example returns the details of a byte match set with the ID exampleIDs3t-46da-4fdb-b8d5-abc321j569j5. response = client.get_byte_match_set( ByteMatchSetId='exampleIDs3t-46da-4fdb-b8d5-abc321j569j5', ) print(response) Expected Output: { 'ByteMatchSet': { 'ByteMatchSetId': 'exampleIDs3t-46da-4fdb-b8d5-abc321j569j5', 'ByteMatchTuples': [ { 'FieldToMatch': { 'Data': 'referer', 'Type': 'HEADER', }, 'PositionalConstraint': 'CONTAINS', 'TargetString': 'badrefer1', 'TextTransformation': 'NONE', }, ], 'Name': 'ByteMatchNameExample', }, 'ResponseMetadata': { '...': '...', }, } :return: { 'ByteMatchSet': { 'ByteMatchSetId': 'string', 'Name': 'string', 'ByteMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TargetString': b'bytes', 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'PositionalConstraint': 'EXACTLY'|'STARTS_WITH'|'ENDS_WITH'|'CONTAINS'|'CONTAINS_WORD' }, ] } } :returns: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . """ pass def get_change_token(): """ When you want to create, update, or delete AWS WAF objects, get a change token and include the change token in the create, update, or delete request. Change tokens ensure that your application doesn\'t submit conflicting requests to AWS WAF. Each create, update, or delete request must use a unique change token. If your application submits a GetChangeToken request and then submits a second GetChangeToken request before submitting a create, update, or delete request, the second GetChangeToken request returns the same value as the first GetChangeToken request. When you use a change token in a create, update, or delete request, the status of the change token changes to PENDING , which indicates that AWS WAF is propagating the change to all AWS WAF servers. Use GetChangeTokenStatus to determine the status of your change token. See also: AWS API Documentation Exceptions Examples The following example returns a change token to use for a create, update or delete operation. Expected Output: :example: response = client.get_change_token() :rtype: dict ReturnsResponse Syntax{ 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) --The ChangeToken that you used in the request. Use this value in a GetChangeTokenStatus request to get the current status of the request. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException Examples The following example returns a change token to use for a create, update or delete operation. response = client.get_change_token( ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } """ pass def get_change_token_status(ChangeToken=None): """ Returns the status of a ChangeToken that you got by calling GetChangeToken . ChangeTokenStatus is one of the following values: See also: AWS API Documentation Exceptions Examples The following example returns the status of a change token with the ID abcd12f2-46da-4fdb-b8d5-fbd4c466928f. Expected Output: :example: response = client.get_change_token_status( ChangeToken='string' ) :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe change token for which you want to get the status. This change token was previously returned in the GetChangeToken response.\n :rtype: dict ReturnsResponse Syntax{ 'ChangeTokenStatus': 'PROVISIONED'|'PENDING'|'INSYNC' } Response Structure (dict) -- ChangeTokenStatus (string) --The status of the change token. Exceptions WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFInternalErrorException Examples The following example returns the status of a change token with the ID abcd12f2-46da-4fdb-b8d5-fbd4c466928f. response = client.get_change_token_status( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', ) print(response) Expected Output: { 'ChangeTokenStatus': 'PENDING', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeTokenStatus': 'PROVISIONED'|'PENDING'|'INSYNC' } :returns: WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFInternalErrorException """ pass def get_geo_match_set(GeoMatchSetId=None): """ Returns the GeoMatchSet that is specified by GeoMatchSetId . See also: AWS API Documentation Exceptions :example: response = client.get_geo_match_set( GeoMatchSetId='string' ) :type GeoMatchSetId: string :param GeoMatchSetId: [REQUIRED]\nThe GeoMatchSetId of the GeoMatchSet that you want to get. GeoMatchSetId is returned by CreateGeoMatchSet and by ListGeoMatchSets .\n :rtype: dict ReturnsResponse Syntax{ 'GeoMatchSet': { 'GeoMatchSetId': 'string', 'Name': 'string', 'GeoMatchConstraints': [ { 'Type': 'Country', 'Value': 'AF'|'AX'|'AL'|'DZ'|'AS'|'AD'|'AO'|'AI'|'AQ'|'AG'|'AR'|'AM'|'AW'|'AU'|'AT'|'AZ'|'BS'|'BH'|'BD'|'BB'|'BY'|'BE'|'BZ'|'BJ'|'BM'|'BT'|'BO'|'BQ'|'BA'|'BW'|'BV'|'BR'|'IO'|'BN'|'BG'|'BF'|'BI'|'KH'|'CM'|'CA'|'CV'|'KY'|'CF'|'TD'|'CL'|'CN'|'CX'|'CC'|'CO'|'KM'|'CG'|'CD'|'CK'|'CR'|'CI'|'HR'|'CU'|'CW'|'CY'|'CZ'|'DK'|'DJ'|'DM'|'DO'|'EC'|'EG'|'SV'|'GQ'|'ER'|'EE'|'ET'|'FK'|'FO'|'FJ'|'FI'|'FR'|'GF'|'PF'|'TF'|'GA'|'GM'|'GE'|'DE'|'GH'|'GI'|'GR'|'GL'|'GD'|'GP'|'GU'|'GT'|'GG'|'GN'|'GW'|'GY'|'HT'|'HM'|'VA'|'HN'|'HK'|'HU'|'IS'|'IN'|'ID'|'IR'|'IQ'|'IE'|'IM'|'IL'|'IT'|'JM'|'JP'|'JE'|'JO'|'KZ'|'KE'|'KI'|'KP'|'KR'|'KW'|'KG'|'LA'|'LV'|'LB'|'LS'|'LR'|'LY'|'LI'|'LT'|'LU'|'MO'|'MK'|'MG'|'MW'|'MY'|'MV'|'ML'|'MT'|'MH'|'MQ'|'MR'|'MU'|'YT'|'MX'|'FM'|'MD'|'MC'|'MN'|'ME'|'MS'|'MA'|'MZ'|'MM'|'NA'|'NR'|'NP'|'NL'|'NC'|'NZ'|'NI'|'NE'|'NG'|'NU'|'NF'|'MP'|'NO'|'OM'|'PK'|'PW'|'PS'|'PA'|'PG'|'PY'|'PE'|'PH'|'PN'|'PL'|'PT'|'PR'|'QA'|'RE'|'RO'|'RU'|'RW'|'BL'|'SH'|'KN'|'LC'|'MF'|'PM'|'VC'|'WS'|'SM'|'ST'|'SA'|'SN'|'RS'|'SC'|'SL'|'SG'|'SX'|'SK'|'SI'|'SB'|'SO'|'ZA'|'GS'|'SS'|'ES'|'LK'|'SD'|'SR'|'SJ'|'SZ'|'SE'|'CH'|'SY'|'TW'|'TJ'|'TZ'|'TH'|'TL'|'TG'|'TK'|'TO'|'TT'|'TN'|'TR'|'TM'|'TC'|'TV'|'UG'|'UA'|'AE'|'GB'|'US'|'UM'|'UY'|'UZ'|'VU'|'VE'|'VN'|'VG'|'VI'|'WF'|'EH'|'YE'|'ZM'|'ZW' }, ] } } Response Structure (dict) -- GeoMatchSet (dict) --Information about the GeoMatchSet that you specified in the GetGeoMatchSet request. This includes the Type , which for a GeoMatchContraint is always Country , as well as the Value , which is the identifier for a specific country. GeoMatchSetId (string) --The GeoMatchSetId for an GeoMatchSet . You use GeoMatchSetId to get information about a GeoMatchSet (see GeoMatchSet ), update a GeoMatchSet (see UpdateGeoMatchSet ), insert a GeoMatchSet into a Rule or delete one from a Rule (see UpdateRule ), and delete a GeoMatchSet from AWS WAF (see DeleteGeoMatchSet ). GeoMatchSetId is returned by CreateGeoMatchSet and by ListGeoMatchSets . Name (string) --A friendly name or description of the GeoMatchSet . You can\'t change the name of an GeoMatchSet after you create it. GeoMatchConstraints (list) --An array of GeoMatchConstraint objects, which contain the country that you want AWS WAF to search for. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The country from which web requests originate that you want AWS WAF to search for. Type (string) --The type of geographical area you want AWS WAF to search for. Currently Country is the only valid value. Value (string) --The country that you want AWS WAF to search for. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException :return: { 'GeoMatchSet': { 'GeoMatchSetId': 'string', 'Name': 'string', 'GeoMatchConstraints': [ { 'Type': 'Country', 'Value': 'AF'|'AX'|'AL'|'DZ'|'AS'|'AD'|'AO'|'AI'|'AQ'|'AG'|'AR'|'AM'|'AW'|'AU'|'AT'|'AZ'|'BS'|'BH'|'BD'|'BB'|'BY'|'BE'|'BZ'|'BJ'|'BM'|'BT'|'BO'|'BQ'|'BA'|'BW'|'BV'|'BR'|'IO'|'BN'|'BG'|'BF'|'BI'|'KH'|'CM'|'CA'|'CV'|'KY'|'CF'|'TD'|'CL'|'CN'|'CX'|'CC'|'CO'|'KM'|'CG'|'CD'|'CK'|'CR'|'CI'|'HR'|'CU'|'CW'|'CY'|'CZ'|'DK'|'DJ'|'DM'|'DO'|'EC'|'EG'|'SV'|'GQ'|'ER'|'EE'|'ET'|'FK'|'FO'|'FJ'|'FI'|'FR'|'GF'|'PF'|'TF'|'GA'|'GM'|'GE'|'DE'|'GH'|'GI'|'GR'|'GL'|'GD'|'GP'|'GU'|'GT'|'GG'|'GN'|'GW'|'GY'|'HT'|'HM'|'VA'|'HN'|'HK'|'HU'|'IS'|'IN'|'ID'|'IR'|'IQ'|'IE'|'IM'|'IL'|'IT'|'JM'|'JP'|'JE'|'JO'|'KZ'|'KE'|'KI'|'KP'|'KR'|'KW'|'KG'|'LA'|'LV'|'LB'|'LS'|'LR'|'LY'|'LI'|'LT'|'LU'|'MO'|'MK'|'MG'|'MW'|'MY'|'MV'|'ML'|'MT'|'MH'|'MQ'|'MR'|'MU'|'YT'|'MX'|'FM'|'MD'|'MC'|'MN'|'ME'|'MS'|'MA'|'MZ'|'MM'|'NA'|'NR'|'NP'|'NL'|'NC'|'NZ'|'NI'|'NE'|'NG'|'NU'|'NF'|'MP'|'NO'|'OM'|'PK'|'PW'|'PS'|'PA'|'PG'|'PY'|'PE'|'PH'|'PN'|'PL'|'PT'|'PR'|'QA'|'RE'|'RO'|'RU'|'RW'|'BL'|'SH'|'KN'|'LC'|'MF'|'PM'|'VC'|'WS'|'SM'|'ST'|'SA'|'SN'|'RS'|'SC'|'SL'|'SG'|'SX'|'SK'|'SI'|'SB'|'SO'|'ZA'|'GS'|'SS'|'ES'|'LK'|'SD'|'SR'|'SJ'|'SZ'|'SE'|'CH'|'SY'|'TW'|'TJ'|'TZ'|'TH'|'TL'|'TG'|'TK'|'TO'|'TT'|'TN'|'TR'|'TM'|'TC'|'TV'|'UG'|'UA'|'AE'|'GB'|'US'|'UM'|'UY'|'UZ'|'VU'|'VE'|'VN'|'VG'|'VI'|'WF'|'EH'|'YE'|'ZM'|'ZW' }, ] } } """ pass def get_ip_set(IPSetId=None): """ Returns the IPSet that is specified by IPSetId . See also: AWS API Documentation Exceptions Examples The following example returns the details of an IP match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.get_ip_set( IPSetId='string' ) :type IPSetId: string :param IPSetId: [REQUIRED]\nThe IPSetId of the IPSet that you want to get. IPSetId is returned by CreateIPSet and by ListIPSets .\n :rtype: dict ReturnsResponse Syntax{ 'IPSet': { 'IPSetId': 'string', 'Name': 'string', 'IPSetDescriptors': [ { 'Type': 'IPV4'|'IPV6', 'Value': 'string' }, ] } } Response Structure (dict) -- IPSet (dict) --Information about the IPSet that you specified in the GetIPSet request. For more information, see the following topics: IPSet : Contains IPSetDescriptors , IPSetId , and Name IPSetDescriptors : Contains an array of IPSetDescriptor objects. Each IPSetDescriptor object contains Type and Value IPSetId (string) --The IPSetId for an IPSet . You use IPSetId to get information about an IPSet (see GetIPSet ), update an IPSet (see UpdateIPSet ), insert an IPSet into a Rule or delete one from a Rule (see UpdateRule ), and delete an IPSet from AWS WAF (see DeleteIPSet ). IPSetId is returned by CreateIPSet and by ListIPSets . Name (string) --A friendly name or description of the IPSet . You can\'t change the name of an IPSet after you create it. IPSetDescriptors (list) --The IP address type (IPV4 or IPV6 ) and the IP address range (in CIDR notation) that web requests originate from. If the WebACL is associated with a CloudFront distribution and the viewer did not use an HTTP proxy or a load balancer to send the request, this is the value of the c-ip field in the CloudFront access logs. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies the IP address type (IPV4 or IPV6 ) and the IP address range (in CIDR format) that web requests originate from. Type (string) --Specify IPV4 or IPV6 . Value (string) --Specify an IPv4 address by using CIDR notation. For example: To configure AWS WAF to allow, block, or count requests that originated from the IP address 192.0.2.44, specify 192.0.2.44/32 . To configure AWS WAF to allow, block, or count requests that originated from IP addresses from 192.0.2.0 to 192.0.2.255, specify 192.0.2.0/24 . For more information about CIDR notation, see the Wikipedia entry Classless Inter-Domain Routing . Specify an IPv6 address by using CIDR notation. For example: To configure AWS WAF to allow, block, or count requests that originated from the IP address 1111:0000:0000:0000:0000:0000:0000:0111, specify 1111:0000:0000:0000:0000:0000:0000:0111/128 . To configure AWS WAF to allow, block, or count requests that originated from IP addresses 1111:0000:0000:0000:0000:0000:0000:0000 to 1111:0000:0000:0000:ffff:ffff:ffff:ffff, specify 1111:0000:0000:0000:0000:0000:0000:0000/64 . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException Examples The following example returns the details of an IP match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. response = client.get_ip_set( IPSetId='example1ds3t-46da-4fdb-b8d5-abc321j569j5', ) print(response) Expected Output: { 'IPSet': { 'IPSetDescriptors': [ { 'Type': 'IPV4', 'Value': '192.0.2.44/32', }, ], 'IPSetId': 'example1ds3t-46da-4fdb-b8d5-abc321j569j5', 'Name': 'MyIPSetFriendlyName', }, 'ResponseMetadata': { '...': '...', }, } :return: { 'IPSet': { 'IPSetId': 'string', 'Name': 'string', 'IPSetDescriptors': [ { 'Type': 'IPV4'|'IPV6', 'Value': 'string' }, ] } } :returns: To configure AWS WAF to allow, block, or count requests that originated from the IP address 192.0.2.44, specify 192.0.2.44/32 . To configure AWS WAF to allow, block, or count requests that originated from IP addresses from 192.0.2.0 to 192.0.2.255, specify 192.0.2.0/24 . """ pass def get_logging_configuration(ResourceArn=None): """ Returns the LoggingConfiguration for the specified web ACL. See also: AWS API Documentation Exceptions :example: response = client.get_logging_configuration( ResourceArn='string' ) :type ResourceArn: string :param ResourceArn: [REQUIRED]\nThe Amazon Resource Name (ARN) of the web ACL for which you want to get the LoggingConfiguration .\n :rtype: dict ReturnsResponse Syntax{ 'LoggingConfiguration': { 'ResourceArn': 'string', 'LogDestinationConfigs': [ 'string', ], 'RedactedFields': [ { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, ] } } Response Structure (dict) -- LoggingConfiguration (dict) --The LoggingConfiguration for the specified web ACL. ResourceArn (string) --The Amazon Resource Name (ARN) of the web ACL that you want to associate with LogDestinationConfigs . LogDestinationConfigs (list) --An array of Amazon Kinesis Data Firehose ARNs. (string) -- RedactedFields (list) --The parts of the request that you want redacted from the logs. For example, if you redact the cookie field, the cookie field in the firehose will be xxx . (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies where in a web request to look for TargetString . Type (string) --The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) --When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFNonexistentItemException :return: { 'LoggingConfiguration': { 'ResourceArn': 'string', 'LogDestinationConfigs': [ 'string', ], 'RedactedFields': [ { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, ] } } :returns: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . """ pass def get_paginator(operation_name=None): """ Create a paginator for an operation. :type operation_name: string :param operation_name: The operation name. This is the same name\nas the method name on the client. For example, if the\nmethod name is create_foo, and you\'d normally invoke the\noperation as client.create_foo(**kwargs), if the\ncreate_foo operation can be paginated, you can use the\ncall client.get_paginator('create_foo'). :rtype: L{botocore.paginate.Paginator} ReturnsA paginator object. """ pass def get_permission_policy(ResourceArn=None): """ Returns the IAM policy attached to the RuleGroup. See also: AWS API Documentation Exceptions :example: response = client.get_permission_policy( ResourceArn='string' ) :type ResourceArn: string :param ResourceArn: [REQUIRED]\nThe Amazon Resource Name (ARN) of the RuleGroup for which you want to get the policy.\n :rtype: dict ReturnsResponse Syntax{ 'Policy': 'string' } Response Structure (dict) -- Policy (string) --The IAM policy attached to the specified RuleGroup. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFNonexistentItemException :return: { 'Policy': 'string' } """ pass def get_rate_based_rule(RuleId=None): """ Returns the RateBasedRule that is specified by the RuleId that you included in the GetRateBasedRule request. See also: AWS API Documentation Exceptions :example: response = client.get_rate_based_rule( RuleId='string' ) :type RuleId: string :param RuleId: [REQUIRED]\nThe RuleId of the RateBasedRule that you want to get. RuleId is returned by CreateRateBasedRule and by ListRateBasedRules .\n :rtype: dict ReturnsResponse Syntax{ 'Rule': { 'RuleId': 'string', 'Name': 'string', 'MetricName': 'string', 'MatchPredicates': [ { 'Negated': True|False, 'Type': 'IPMatch'|'ByteMatch'|'SqlInjectionMatch'|'GeoMatch'|'SizeConstraint'|'XssMatch'|'RegexMatch', 'DataId': 'string' }, ], 'RateKey': 'IP', 'RateLimit': 123 } } Response Structure (dict) -- Rule (dict) --Information about the RateBasedRule that you specified in the GetRateBasedRule request. RuleId (string) --A unique identifier for a RateBasedRule . You use RuleId to get more information about a RateBasedRule (see GetRateBasedRule ), update a RateBasedRule (see UpdateRateBasedRule ), insert a RateBasedRule into a WebACL or delete one from a WebACL (see UpdateWebACL ), or delete a RateBasedRule from AWS WAF (see DeleteRateBasedRule ). Name (string) --A friendly name or description for a RateBasedRule . You can\'t change the name of a RateBasedRule after you create it. MetricName (string) --A friendly name or description for the metrics for a RateBasedRule . The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can\'t contain whitespace or metric names reserved for AWS WAF, including "All" and "Default_Action." You can\'t change the name of the metric after you create the RateBasedRule . MatchPredicates (list) --The Predicates object contains one Predicate element for each ByteMatchSet , IPSet , or SqlInjectionMatchSet object that you want to include in a RateBasedRule . (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies the ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , and SizeConstraintSet objects that you want to add to a Rule and, for each object, indicates whether you want to negate the settings, for example, requests that do NOT originate from the IP address 192.0.2.44. Negated (boolean) --Set Negated to False if you want AWS WAF to allow, block, or count requests based on the settings in the specified ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , or SizeConstraintSet . For example, if an IPSet includes the IP address 192.0.2.44 , AWS WAF will allow or block requests based on that IP address. Set Negated to True if you want AWS WAF to allow or block a request based on the negation of the settings in the ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , or SizeConstraintSet . For example, if an IPSet includes the IP address 192.0.2.44 , AWS WAF will allow, block, or count requests based on all IP addresses except 192.0.2.44 . Type (string) --The type of predicate in a Rule , such as ByteMatch or IPSet . DataId (string) --A unique identifier for a predicate in a Rule , such as ByteMatchSetId or IPSetId . The ID is returned by the corresponding Create or List command. RateKey (string) --The field that AWS WAF uses to determine if requests are likely arriving from single source and thus subject to rate monitoring. The only valid value for RateKey is IP . IP indicates that requests arriving from the same IP address are subject to the RateLimit that is specified in the RateBasedRule . RateLimit (integer) --The maximum number of requests, which have an identical value in the field specified by the RateKey , allowed in a five-minute period. If the number of requests exceeds the RateLimit and the other predicates specified in the rule are also met, AWS WAF triggers the action that is specified for this rule. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException :return: { 'Rule': { 'RuleId': 'string', 'Name': 'string', 'MetricName': 'string', 'MatchPredicates': [ { 'Negated': True|False, 'Type': 'IPMatch'|'ByteMatch'|'SqlInjectionMatch'|'GeoMatch'|'SizeConstraint'|'XssMatch'|'RegexMatch', 'DataId': 'string' }, ], 'RateKey': 'IP', 'RateLimit': 123 } } """ pass def get_rate_based_rule_managed_keys(RuleId=None, NextMarker=None): """ Returns an array of IP addresses currently being blocked by the RateBasedRule that is specified by the RuleId . The maximum number of managed keys that will be blocked is 10,000. If more than 10,000 addresses exceed the rate limit, the 10,000 addresses with the highest rates will be blocked. See also: AWS API Documentation Exceptions :example: response = client.get_rate_based_rule_managed_keys( RuleId='string', NextMarker='string' ) :type RuleId: string :param RuleId: [REQUIRED]\nThe RuleId of the RateBasedRule for which you want to get a list of ManagedKeys . RuleId is returned by CreateRateBasedRule and by ListRateBasedRules .\n :type NextMarker: string :param NextMarker: A null value and not currently used. Do not include this in your request. :rtype: dict ReturnsResponse Syntax { 'ManagedKeys': [ 'string', ], 'NextMarker': 'string' } Response Structure (dict) -- ManagedKeys (list) -- An array of IP addresses that currently are blocked by the specified RateBasedRule . (string) -- NextMarker (string) -- A null value and not currently used. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFInvalidParameterException :return: { 'ManagedKeys': [ 'string', ], 'NextMarker': 'string' } :returns: (string) -- """ pass def get_regex_match_set(RegexMatchSetId=None): """ Returns the RegexMatchSet specified by RegexMatchSetId . See also: AWS API Documentation Exceptions :example: response = client.get_regex_match_set( RegexMatchSetId='string' ) :type RegexMatchSetId: string :param RegexMatchSetId: [REQUIRED]\nThe RegexMatchSetId of the RegexMatchSet that you want to get. RegexMatchSetId is returned by CreateRegexMatchSet and by ListRegexMatchSets .\n :rtype: dict ReturnsResponse Syntax{ 'RegexMatchSet': { 'RegexMatchSetId': 'string', 'Name': 'string', 'RegexMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'RegexPatternSetId': 'string' }, ] } } Response Structure (dict) -- RegexMatchSet (dict) --Information about the RegexMatchSet that you specified in the GetRegexMatchSet request. For more information, see RegexMatchTuple . RegexMatchSetId (string) --The RegexMatchSetId for a RegexMatchSet . You use RegexMatchSetId to get information about a RegexMatchSet (see GetRegexMatchSet ), update a RegexMatchSet (see UpdateRegexMatchSet ), insert a RegexMatchSet into a Rule or delete one from a Rule (see UpdateRule ), and delete a RegexMatchSet from AWS WAF (see DeleteRegexMatchSet ). RegexMatchSetId is returned by CreateRegexMatchSet and by ListRegexMatchSets . Name (string) --A friendly name or description of the RegexMatchSet . You can\'t change Name after you create a RegexMatchSet . RegexMatchTuples (list) --Contains an array of RegexMatchTuple objects. Each RegexMatchTuple object contains: The part of a web request that you want AWS WAF to inspect, such as a query string or the value of the User-Agent header. The identifier of the pattern (a regular expression) that you want AWS WAF to look for. For more information, see RegexPatternSet . Whether to perform any conversions on the request, such as converting it to lowercase, before inspecting it for the specified string. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The regular expression pattern that you want AWS WAF to search for in web requests, the location in requests that you want AWS WAF to search, and other settings. Each RegexMatchTuple object contains: The part of a web request that you want AWS WAF to inspect, such as a query string or the value of the User-Agent header. The identifier of the pattern (a regular expression) that you want AWS WAF to look for. For more information, see RegexPatternSet . Whether to perform any conversions on the request, such as converting it to lowercase, before inspecting it for the specified string. FieldToMatch (dict) --Specifies where in a web request to look for the RegexPatternSet . Type (string) --The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) --When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . TextTransformation (string) --Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on RegexPatternSet before inspecting a request for a match. You can only specify a single type of TextTransformation. CMD_LINE When you\'re concerned that attackers are injecting an operating system commandline command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations: Delete the following characters: " \' ^ Delete spaces before the following characters: / ( Replace the following characters with a space: , ; Replace multiple spaces with one space Convert uppercase letters (A-Z) to lowercase (a-z) COMPRESS_WHITE_SPACE Use this option to replace the following characters with a space character (decimal 32): f, formfeed, decimal 12 t, tab, decimal 9 n, newline, decimal 10 r, carriage return, decimal 13 v, vertical tab, decimal 11 non-breaking space, decimal 160 COMPRESS_WHITE_SPACE also replaces multiple spaces with one space.HTML_ENTITY_DECODE Use this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations: Replaces (ampersand)quot; with " Replaces (ampersand)nbsp; with a non-breaking space, decimal 160 Replaces (ampersand)lt; with a "less than" symbol Replaces (ampersand)gt; with > Replaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters Replaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters LOWERCASE Use this option to convert uppercase letters (A-Z) to lowercase (a-z). URL_DECODE Use this option to decode a URL-encoded value. NONE Specify NONE if you don\'t want to perform any text transformations. RegexPatternSetId (string) --The RegexPatternSetId for a RegexPatternSet . You use RegexPatternSetId to get information about a RegexPatternSet (see GetRegexPatternSet ), update a RegexPatternSet (see UpdateRegexPatternSet ), insert a RegexPatternSet into a RegexMatchSet or delete one from a RegexMatchSet (see UpdateRegexMatchSet ), and delete an RegexPatternSet from AWS WAF (see DeleteRegexPatternSet ). RegexPatternSetId is returned by CreateRegexPatternSet and by ListRegexPatternSets . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException :return: { 'RegexMatchSet': { 'RegexMatchSetId': 'string', 'Name': 'string', 'RegexMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'RegexPatternSetId': 'string' }, ] } } :returns: The part of a web request that you want AWS WAF to inspect, such as a query string or the value of the User-Agent header. The identifier of the pattern (a regular expression) that you want AWS WAF to look for. For more information, see RegexPatternSet . Whether to perform any conversions on the request, such as converting it to lowercase, before inspecting it for the specified string. """ pass def get_regex_pattern_set(RegexPatternSetId=None): """ Returns the RegexPatternSet specified by RegexPatternSetId . See also: AWS API Documentation Exceptions :example: response = client.get_regex_pattern_set( RegexPatternSetId='string' ) :type RegexPatternSetId: string :param RegexPatternSetId: [REQUIRED]\nThe RegexPatternSetId of the RegexPatternSet that you want to get. RegexPatternSetId is returned by CreateRegexPatternSet and by ListRegexPatternSets .\n :rtype: dict ReturnsResponse Syntax{ 'RegexPatternSet': { 'RegexPatternSetId': 'string', 'Name': 'string', 'RegexPatternStrings': [ 'string', ] } } Response Structure (dict) -- RegexPatternSet (dict) --Information about the RegexPatternSet that you specified in the GetRegexPatternSet request, including the identifier of the pattern set and the regular expression patterns you want AWS WAF to search for. RegexPatternSetId (string) --The identifier for the RegexPatternSet . You use RegexPatternSetId to get information about a RegexPatternSet , update a RegexPatternSet , remove a RegexPatternSet from a RegexMatchSet , and delete a RegexPatternSet from AWS WAF. RegexMatchSetId is returned by CreateRegexPatternSet and by ListRegexPatternSets . Name (string) --A friendly name or description of the RegexPatternSet . You can\'t change Name after you create a RegexPatternSet . RegexPatternStrings (list) --Specifies the regular expression (regex) patterns that you want AWS WAF to search for, such as B[a@]dB[o0]t . (string) -- Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException :return: { 'RegexPatternSet': { 'RegexPatternSetId': 'string', 'Name': 'string', 'RegexPatternStrings': [ 'string', ] } } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException """ pass def get_rule(RuleId=None): """ Returns the Rule that is specified by the RuleId that you included in the GetRule request. See also: AWS API Documentation Exceptions Examples The following example returns the details of a rule with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.get_rule( RuleId='string' ) :type RuleId: string :param RuleId: [REQUIRED]\nThe RuleId of the Rule that you want to get. RuleId is returned by CreateRule and by ListRules .\n :rtype: dict ReturnsResponse Syntax{ 'Rule': { 'RuleId': 'string', 'Name': 'string', 'MetricName': 'string', 'Predicates': [ { 'Negated': True|False, 'Type': 'IPMatch'|'ByteMatch'|'SqlInjectionMatch'|'GeoMatch'|'SizeConstraint'|'XssMatch'|'RegexMatch', 'DataId': 'string' }, ] } } Response Structure (dict) -- Rule (dict) --Information about the Rule that you specified in the GetRule request. For more information, see the following topics: Rule : Contains MetricName , Name , an array of Predicate objects, and RuleId Predicate : Each Predicate object contains DataId , Negated , and Type RuleId (string) --A unique identifier for a Rule . You use RuleId to get more information about a Rule (see GetRule ), update a Rule (see UpdateRule ), insert a Rule into a WebACL or delete a one from a WebACL (see UpdateWebACL ), or delete a Rule from AWS WAF (see DeleteRule ). RuleId is returned by CreateRule and by ListRules . Name (string) --The friendly name or description for the Rule . You can\'t change the name of a Rule after you create it. MetricName (string) --A friendly name or description for the metrics for this Rule . The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can\'t contain whitespace or metric names reserved for AWS WAF, including "All" and "Default_Action." You can\'t change MetricName after you create the Rule . Predicates (list) --The Predicates object contains one Predicate element for each ByteMatchSet , IPSet , or SqlInjectionMatchSet object that you want to include in a Rule . (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies the ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , and SizeConstraintSet objects that you want to add to a Rule and, for each object, indicates whether you want to negate the settings, for example, requests that do NOT originate from the IP address 192.0.2.44. Negated (boolean) --Set Negated to False if you want AWS WAF to allow, block, or count requests based on the settings in the specified ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , or SizeConstraintSet . For example, if an IPSet includes the IP address 192.0.2.44 , AWS WAF will allow or block requests based on that IP address. Set Negated to True if you want AWS WAF to allow or block a request based on the negation of the settings in the ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , or SizeConstraintSet . For example, if an IPSet includes the IP address 192.0.2.44 , AWS WAF will allow, block, or count requests based on all IP addresses except 192.0.2.44 . Type (string) --The type of predicate in a Rule , such as ByteMatch or IPSet . DataId (string) --A unique identifier for a predicate in a Rule , such as ByteMatchSetId or IPSetId . The ID is returned by the corresponding Create or List command. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException Examples The following example returns the details of a rule with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. response = client.get_rule( RuleId='example1ds3t-46da-4fdb-b8d5-abc321j569j5', ) print(response) Expected Output: { 'Rule': { 'MetricName': 'WAFByteHeaderRule', 'Name': 'WAFByteHeaderRule', 'Predicates': [ { 'DataId': 'MyByteMatchSetID', 'Negated': False, 'Type': 'ByteMatch', }, ], 'RuleId': 'example1ds3t-46da-4fdb-b8d5-abc321j569j5', }, 'ResponseMetadata': { '...': '...', }, } :return: { 'Rule': { 'RuleId': 'string', 'Name': 'string', 'MetricName': 'string', 'Predicates': [ { 'Negated': True|False, 'Type': 'IPMatch'|'ByteMatch'|'SqlInjectionMatch'|'GeoMatch'|'SizeConstraint'|'XssMatch'|'RegexMatch', 'DataId': 'string' }, ] } } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException """ pass def get_rule_group(RuleGroupId=None): """ Returns the RuleGroup that is specified by the RuleGroupId that you included in the GetRuleGroup request. To view the rules in a rule group, use ListActivatedRulesInRuleGroup . See also: AWS API Documentation Exceptions :example: response = client.get_rule_group( RuleGroupId='string' ) :type RuleGroupId: string :param RuleGroupId: [REQUIRED]\nThe RuleGroupId of the RuleGroup that you want to get. RuleGroupId is returned by CreateRuleGroup and by ListRuleGroups .\n :rtype: dict ReturnsResponse Syntax{ 'RuleGroup': { 'RuleGroupId': 'string', 'Name': 'string', 'MetricName': 'string' } } Response Structure (dict) -- RuleGroup (dict) --Information about the RuleGroup that you specified in the GetRuleGroup request. RuleGroupId (string) --A unique identifier for a RuleGroup . You use RuleGroupId to get more information about a RuleGroup (see GetRuleGroup ), update a RuleGroup (see UpdateRuleGroup ), insert a RuleGroup into a WebACL or delete a one from a WebACL (see UpdateWebACL ), or delete a RuleGroup from AWS WAF (see DeleteRuleGroup ). RuleGroupId is returned by CreateRuleGroup and by ListRuleGroups . Name (string) --The friendly name or description for the RuleGroup . You can\'t change the name of a RuleGroup after you create it. MetricName (string) --A friendly name or description for the metrics for this RuleGroup . The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can\'t contain whitespace or metric names reserved for AWS WAF, including "All" and "Default_Action." You can\'t change the name of the metric after you create the RuleGroup . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFNonexistentItemException :return: { 'RuleGroup': { 'RuleGroupId': 'string', 'Name': 'string', 'MetricName': 'string' } } """ pass def get_sampled_requests(WebAclId=None, RuleId=None, TimeWindow=None, MaxItems=None): """ Gets detailed information about a specified number of requests--a sample--that AWS WAF randomly selects from among the first 5,000 requests that your AWS resource received during a time range that you choose. You can specify a sample size of up to 500 requests, and you can specify any time range in the previous three hours. See also: AWS API Documentation Exceptions Examples The following example returns detailed information about 100 requests --a sample-- that AWS WAF randomly selects from among the first 5,000 requests that your AWS resource received between the time period 2016-09-27T15:50Z to 2016-09-27T15:50Z. Expected Output: :example: response = client.get_sampled_requests( WebAclId='string', RuleId='string', TimeWindow={ 'StartTime': datetime(2015, 1, 1), 'EndTime': datetime(2015, 1, 1) }, MaxItems=123 ) :type WebAclId: string :param WebAclId: [REQUIRED]\nThe WebACLId of the WebACL for which you want GetSampledRequests to return a sample of requests.\n :type RuleId: string :param RuleId: [REQUIRED]\n\nRuleId is one of three values:\n\nThe RuleId of the Rule or the RuleGroupId of the RuleGroup for which you want GetSampledRequests to return a sample of requests.\nDefault_Action , which causes GetSampledRequests to return a sample of the requests that didn\'t match any of the rules in the specified WebACL .\n\n :type TimeWindow: dict :param TimeWindow: [REQUIRED]\nThe start date and time and the end date and time of the range for which you want GetSampledRequests to return a sample of requests. You must specify the times in Coordinated Universal Time (UTC) format. UTC format includes the special designator, Z . For example, '2016-09-27T14:50Z' . You can specify any time range in the previous three hours.\n\nStartTime (datetime) -- [REQUIRED]The beginning of the time range from which you want GetSampledRequests to return a sample of the requests that your AWS resource received. You must specify the date and time in Coordinated Universal Time (UTC) format. UTC format includes the special designator, Z . For example, '2016-09-27T14:50Z' . You can specify any time range in the previous three hours.\n\nEndTime (datetime) -- [REQUIRED]The end of the time range from which you want GetSampledRequests to return a sample of the requests that your AWS resource received. You must specify the date and time in Coordinated Universal Time (UTC) format. UTC format includes the special designator, Z . For example, '2016-09-27T14:50Z' . You can specify any time range in the previous three hours.\n\n\n :type MaxItems: integer :param MaxItems: [REQUIRED]\nThe number of requests that you want AWS WAF to return from among the first 5,000 requests that your AWS resource received during the time range. If your resource received fewer requests than the value of MaxItems , GetSampledRequests returns information about all of them.\n :rtype: dict ReturnsResponse Syntax { 'SampledRequests': [ { 'Request': { 'ClientIP': 'string', 'Country': 'string', 'URI': 'string', 'Method': 'string', 'HTTPVersion': 'string', 'Headers': [ { 'Name': 'string', 'Value': 'string' }, ] }, 'Weight': 123, 'Timestamp': datetime(2015, 1, 1), 'Action': 'string', 'RuleWithinRuleGroup': 'string' }, ], 'PopulationSize': 123, 'TimeWindow': { 'StartTime': datetime(2015, 1, 1), 'EndTime': datetime(2015, 1, 1) } } Response Structure (dict) -- SampledRequests (list) -- A complex type that contains detailed information about each of the requests in the sample. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The response from a GetSampledRequests request includes a SampledHTTPRequests complex type that appears as SampledRequests in the response syntax. SampledHTTPRequests contains one SampledHTTPRequest object for each web request that is returned by GetSampledRequests . Request (dict) -- A complex type that contains detailed information about the request. ClientIP (string) -- The IP address that the request originated from. If the WebACL is associated with a CloudFront distribution, this is the value of one of the following fields in CloudFront access logs: c-ip , if the viewer did not use an HTTP proxy or a load balancer to send the request x-forwarded-for , if the viewer did use an HTTP proxy or a load balancer to send the request Country (string) -- The two-letter country code for the country that the request originated from. For a current list of country codes, see the Wikipedia entry ISO 3166-1 alpha-2 . URI (string) -- The part of a web request that identifies the resource, for example, /images/daily-ad.jpg . Method (string) -- The HTTP method specified in the sampled web request. CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . HTTPVersion (string) -- The HTTP version specified in the sampled web request, for example, HTTP/1.1 . Headers (list) -- A complex type that contains two values for each header in the sampled web request: the name of the header and the value of the header. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The response from a GetSampledRequests request includes an HTTPHeader complex type that appears as Headers in the response syntax. HTTPHeader contains the names and values of all of the headers that appear in one of the web requests that were returned by GetSampledRequests . Name (string) -- The name of one of the headers in the sampled web request. Value (string) -- The value of one of the headers in the sampled web request. Weight (integer) -- A value that indicates how one result in the response relates proportionally to other results in the response. A result that has a weight of 2 represents roughly twice as many CloudFront web requests as a result that has a weight of 1 . Timestamp (datetime) -- The time at which AWS WAF received the request from your AWS resource, in Unix time format (in seconds). Action (string) -- The action for the Rule that the request matched: ALLOW , BLOCK , or COUNT . RuleWithinRuleGroup (string) -- This value is returned if the GetSampledRequests request specifies the ID of a RuleGroup rather than the ID of an individual rule. RuleWithinRuleGroup is the rule within the specified RuleGroup that matched the request listed in the response. PopulationSize (integer) -- The total number of requests from which GetSampledRequests got a sample of MaxItems requests. If PopulationSize is less than MaxItems , the sample includes every request that your AWS resource received during the specified time range. TimeWindow (dict) -- Usually, TimeWindow is the time range that you specified in the GetSampledRequests request. However, if your AWS resource received more than 5,000 requests during the time range that you specified in the request, GetSampledRequests returns the time range for the first 5,000 requests. Times are in Coordinated Universal Time (UTC) format. StartTime (datetime) -- The beginning of the time range from which you want GetSampledRequests to return a sample of the requests that your AWS resource received. You must specify the date and time in Coordinated Universal Time (UTC) format. UTC format includes the special designator, Z . For example, "2016-09-27T14:50Z" . You can specify any time range in the previous three hours. EndTime (datetime) -- The end of the time range from which you want GetSampledRequests to return a sample of the requests that your AWS resource received. You must specify the date and time in Coordinated Universal Time (UTC) format. UTC format includes the special designator, Z . For example, "2016-09-27T14:50Z" . You can specify any time range in the previous three hours. Exceptions WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFInternalErrorException Examples The following example returns detailed information about 100 requests --a sample-- that AWS WAF randomly selects from among the first 5,000 requests that your AWS resource received between the time period 2016-09-27T15:50Z to 2016-09-27T15:50Z. response = client.get_sampled_requests( MaxItems=100, RuleId='WAFRule-1-Example', TimeWindow={ 'EndTime': datetime(2016, 9, 27, 15, 50, 0, 1, 271, 0), 'StartTime': datetime(2016, 9, 27, 15, 50, 0, 1, 271, 0), }, WebAclId='createwebacl-1472061481310', ) print(response) Expected Output: { 'PopulationSize': 50, 'SampledRequests': [ { 'Action': 'BLOCK', 'Request': { 'ClientIP': '192.0.2.44', 'Country': 'US', 'HTTPVersion': 'HTTP/1.1', 'Headers': [ { 'Name': 'User-Agent', 'Value': 'BadBot ', }, ], 'Method': 'HEAD', }, 'Timestamp': datetime(2016, 9, 27, 14, 55, 0, 1, 271, 0), 'Weight': 1, }, ], 'TimeWindow': { 'EndTime': datetime(2016, 9, 27, 15, 50, 0, 1, 271, 0), 'StartTime': datetime(2016, 9, 27, 14, 50, 0, 1, 271, 0), }, 'ResponseMetadata': { '...': '...', }, } :return: { 'SampledRequests': [ { 'Request': { 'ClientIP': 'string', 'Country': 'string', 'URI': 'string', 'Method': 'string', 'HTTPVersion': 'string', 'Headers': [ { 'Name': 'string', 'Value': 'string' }, ] }, 'Weight': 123, 'Timestamp': datetime(2015, 1, 1), 'Action': 'string', 'RuleWithinRuleGroup': 'string' }, ], 'PopulationSize': 123, 'TimeWindow': { 'StartTime': datetime(2015, 1, 1), 'EndTime': datetime(2015, 1, 1) } } :returns: c-ip , if the viewer did not use an HTTP proxy or a load balancer to send the request x-forwarded-for , if the viewer did use an HTTP proxy or a load balancer to send the request """ pass def get_size_constraint_set(SizeConstraintSetId=None): """ Returns the SizeConstraintSet specified by SizeConstraintSetId . See also: AWS API Documentation Exceptions Examples The following example returns the details of a size constraint match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.get_size_constraint_set( SizeConstraintSetId='string' ) :type SizeConstraintSetId: string :param SizeConstraintSetId: [REQUIRED]\nThe SizeConstraintSetId of the SizeConstraintSet that you want to get. SizeConstraintSetId is returned by CreateSizeConstraintSet and by ListSizeConstraintSets .\n :rtype: dict ReturnsResponse Syntax{ 'SizeConstraintSet': { 'SizeConstraintSetId': 'string', 'Name': 'string', 'SizeConstraints': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'ComparisonOperator': 'EQ'|'NE'|'LE'|'LT'|'GE'|'GT', 'Size': 123 }, ] } } Response Structure (dict) -- SizeConstraintSet (dict) --Information about the SizeConstraintSet that you specified in the GetSizeConstraintSet request. For more information, see the following topics: SizeConstraintSet : Contains SizeConstraintSetId , SizeConstraints , and Name SizeConstraints : Contains an array of SizeConstraint objects. Each SizeConstraint object contains FieldToMatch , TextTransformation , ComparisonOperator , and Size FieldToMatch : Contains Data and Type SizeConstraintSetId (string) --A unique identifier for a SizeConstraintSet . You use SizeConstraintSetId to get information about a SizeConstraintSet (see GetSizeConstraintSet ), update a SizeConstraintSet (see UpdateSizeConstraintSet ), insert a SizeConstraintSet into a Rule or delete one from a Rule (see UpdateRule ), and delete a SizeConstraintSet from AWS WAF (see DeleteSizeConstraintSet ). SizeConstraintSetId is returned by CreateSizeConstraintSet and by ListSizeConstraintSets . Name (string) --The name, if any, of the SizeConstraintSet . SizeConstraints (list) --Specifies the parts of web requests that you want to inspect the size of. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies a constraint on the size of a part of the web request. AWS WAF uses the Size , ComparisonOperator , and FieldToMatch to build an expression in the form of "Size ComparisonOperator size in bytes of FieldToMatch ". If that expression is true, the SizeConstraint is considered to match. FieldToMatch (dict) --Specifies where in a web request to look for the size constraint. Type (string) --The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) --When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . TextTransformation (string) --Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on FieldToMatch before inspecting it for a match. You can only specify a single type of TextTransformation. Note that if you choose BODY for the value of Type , you must choose NONE for TextTransformation because CloudFront forwards only the first 8192 bytes for inspection. NONE Specify NONE if you don\'t want to perform any text transformations. CMD_LINE When you\'re concerned that attackers are injecting an operating system command line command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations: Delete the following characters: " \' ^ Delete spaces before the following characters: / ( Replace the following characters with a space: , ; Replace multiple spaces with one space Convert uppercase letters (A-Z) to lowercase (a-z) COMPRESS_WHITE_SPACE Use this option to replace the following characters with a space character (decimal 32): f, formfeed, decimal 12 t, tab, decimal 9 n, newline, decimal 10 r, carriage return, decimal 13 v, vertical tab, decimal 11 non-breaking space, decimal 160 COMPRESS_WHITE_SPACE also replaces multiple spaces with one space.HTML_ENTITY_DECODE Use this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations: Replaces (ampersand)quot; with " Replaces (ampersand)nbsp; with a non-breaking space, decimal 160 Replaces (ampersand)lt; with a "less than" symbol Replaces (ampersand)gt; with > Replaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters Replaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters LOWERCASE Use this option to convert uppercase letters (A-Z) to lowercase (a-z). URL_DECODE Use this option to decode a URL-encoded value. ComparisonOperator (string) --The type of comparison you want AWS WAF to perform. AWS WAF uses this in combination with the provided Size and FieldToMatch to build an expression in the form of "Size ComparisonOperator size in bytes of FieldToMatch ". If that expression is true, the SizeConstraint is considered to match. EQ : Used to test if the Size is equal to the size of the FieldToMatchNE : Used to test if the Size is not equal to the size of the FieldToMatch LE : Used to test if the Size is less than or equal to the size of the FieldToMatch LT : Used to test if the Size is strictly less than the size of the FieldToMatch GE : Used to test if the Size is greater than or equal to the size of the FieldToMatch GT : Used to test if the Size is strictly greater than the size of the FieldToMatch Size (integer) --The size in bytes that you want AWS WAF to compare against the size of the specified FieldToMatch . AWS WAF uses this in combination with ComparisonOperator and FieldToMatch to build an expression in the form of "Size ComparisonOperator size in bytes of FieldToMatch ". If that expression is true, the SizeConstraint is considered to match. Valid values for size are 0 - 21474836480 bytes (0 - 20 GB). If you specify URI for the value of Type , the / in the URI counts as one character. For example, the URI /logo.jpg is nine characters long. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException Examples The following example returns the details of a size constraint match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. response = client.get_size_constraint_set( SizeConstraintSetId='example1ds3t-46da-4fdb-b8d5-abc321j569j5', ) print(response) Expected Output: { 'SizeConstraintSet': { 'Name': 'MySampleSizeConstraintSet', 'SizeConstraintSetId': 'example1ds3t-46da-4fdb-b8d5-abc321j569j5', 'SizeConstraints': [ { 'ComparisonOperator': 'GT', 'FieldToMatch': { 'Type': 'QUERY_STRING', }, 'Size': 0, 'TextTransformation': 'NONE', }, ], }, 'ResponseMetadata': { '...': '...', }, } :return: { 'SizeConstraintSet': { 'SizeConstraintSetId': 'string', 'Name': 'string', 'SizeConstraints': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'ComparisonOperator': 'EQ'|'NE'|'LE'|'LT'|'GE'|'GT', 'Size': 123 }, ] } } :returns: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . """ pass def get_sql_injection_match_set(SqlInjectionMatchSetId=None): """ Returns the SqlInjectionMatchSet that is specified by SqlInjectionMatchSetId . See also: AWS API Documentation Exceptions Examples The following example returns the details of a SQL injection match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.get_sql_injection_match_set( SqlInjectionMatchSetId='string' ) :type SqlInjectionMatchSetId: string :param SqlInjectionMatchSetId: [REQUIRED]\nThe SqlInjectionMatchSetId of the SqlInjectionMatchSet that you want to get. SqlInjectionMatchSetId is returned by CreateSqlInjectionMatchSet and by ListSqlInjectionMatchSets .\n :rtype: dict ReturnsResponse Syntax{ 'SqlInjectionMatchSet': { 'SqlInjectionMatchSetId': 'string', 'Name': 'string', 'SqlInjectionMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE' }, ] } } Response Structure (dict) --The response to a GetSqlInjectionMatchSet request. SqlInjectionMatchSet (dict) --Information about the SqlInjectionMatchSet that you specified in the GetSqlInjectionMatchSet request. For more information, see the following topics: SqlInjectionMatchSet : Contains Name , SqlInjectionMatchSetId , and an array of SqlInjectionMatchTuple objects SqlInjectionMatchTuple : Each SqlInjectionMatchTuple object contains FieldToMatch and TextTransformation FieldToMatch : Contains Data and Type SqlInjectionMatchSetId (string) --A unique identifier for a SqlInjectionMatchSet . You use SqlInjectionMatchSetId to get information about a SqlInjectionMatchSet (see GetSqlInjectionMatchSet ), update a SqlInjectionMatchSet (see UpdateSqlInjectionMatchSet ), insert a SqlInjectionMatchSet into a Rule or delete one from a Rule (see UpdateRule ), and delete a SqlInjectionMatchSet from AWS WAF (see DeleteSqlInjectionMatchSet ). SqlInjectionMatchSetId is returned by CreateSqlInjectionMatchSet and by ListSqlInjectionMatchSets . Name (string) --The name, if any, of the SqlInjectionMatchSet . SqlInjectionMatchTuples (list) --Specifies the parts of web requests that you want to inspect for snippets of malicious SQL code. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies the part of a web request that you want AWS WAF to inspect for snippets of malicious SQL code and, if you want AWS WAF to inspect a header, the name of the header. FieldToMatch (dict) --Specifies where in a web request to look for snippets of malicious SQL code. Type (string) --The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) --When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . TextTransformation (string) --Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on FieldToMatch before inspecting it for a match. You can only specify a single type of TextTransformation. CMD_LINE When you\'re concerned that attackers are injecting an operating system command line command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations: Delete the following characters: " \' ^ Delete spaces before the following characters: / ( Replace the following characters with a space: , ; Replace multiple spaces with one space Convert uppercase letters (A-Z) to lowercase (a-z) COMPRESS_WHITE_SPACE Use this option to replace the following characters with a space character (decimal 32): f, formfeed, decimal 12 t, tab, decimal 9 n, newline, decimal 10 r, carriage return, decimal 13 v, vertical tab, decimal 11 non-breaking space, decimal 160 COMPRESS_WHITE_SPACE also replaces multiple spaces with one space.HTML_ENTITY_DECODE Use this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations: Replaces (ampersand)quot; with " Replaces (ampersand)nbsp; with a non-breaking space, decimal 160 Replaces (ampersand)lt; with a "less than" symbol Replaces (ampersand)gt; with > Replaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters Replaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters LOWERCASE Use this option to convert uppercase letters (A-Z) to lowercase (a-z). URL_DECODE Use this option to decode a URL-encoded value. NONE Specify NONE if you don\'t want to perform any text transformations. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException Examples The following example returns the details of a SQL injection match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. response = client.get_sql_injection_match_set( SqlInjectionMatchSetId='example1ds3t-46da-4fdb-b8d5-abc321j569j5', ) print(response) Expected Output: { 'SqlInjectionMatchSet': { 'Name': 'MySQLInjectionMatchSet', 'SqlInjectionMatchSetId': 'example1ds3t-46da-4fdb-b8d5-abc321j569j5', 'SqlInjectionMatchTuples': [ { 'FieldToMatch': { 'Type': 'QUERY_STRING', }, 'TextTransformation': 'URL_DECODE', }, ], }, 'ResponseMetadata': { '...': '...', }, } :return: { 'SqlInjectionMatchSet': { 'SqlInjectionMatchSetId': 'string', 'Name': 'string', 'SqlInjectionMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE' }, ] } } :returns: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . """ pass def get_waiter(waiter_name=None): """ Returns an object that can wait for some condition. :type waiter_name: str :param waiter_name: The name of the waiter to get. See the waiters\nsection of the service docs for a list of available waiters. :rtype: botocore.waiter.Waiter """ pass def get_web_acl(WebACLId=None): """ Returns the WebACL that is specified by WebACLId . See also: AWS API Documentation Exceptions Examples The following example returns the details of a web ACL with the ID createwebacl-1472061481310. Expected Output: :example: response = client.get_web_acl( WebACLId='string' ) :type WebACLId: string :param WebACLId: [REQUIRED]\nThe WebACLId of the WebACL that you want to get. WebACLId is returned by CreateWebACL and by ListWebACLs .\n :rtype: dict ReturnsResponse Syntax{ 'WebACL': { 'WebACLId': 'string', 'Name': 'string', 'MetricName': 'string', 'DefaultAction': { 'Type': 'BLOCK'|'ALLOW'|'COUNT' }, 'Rules': [ { 'Priority': 123, 'RuleId': 'string', 'Action': { 'Type': 'BLOCK'|'ALLOW'|'COUNT' }, 'OverrideAction': { 'Type': 'NONE'|'COUNT' }, 'Type': 'REGULAR'|'RATE_BASED'|'GROUP', 'ExcludedRules': [ { 'RuleId': 'string' }, ] }, ], 'WebACLArn': 'string' } } Response Structure (dict) -- WebACL (dict) --Information about the WebACL that you specified in the GetWebACL request. For more information, see the following topics: WebACL : Contains DefaultAction , MetricName , Name , an array of Rule objects, and WebACLId DefaultAction (Data type is WafAction ): Contains Type Rules : Contains an array of ActivatedRule objects, which contain Action , Priority , and RuleId Action : Contains Type WebACLId (string) --A unique identifier for a WebACL . You use WebACLId to get information about a WebACL (see GetWebACL ), update a WebACL (see UpdateWebACL ), and delete a WebACL from AWS WAF (see DeleteWebACL ). WebACLId is returned by CreateWebACL and by ListWebACLs . Name (string) --A friendly name or description of the WebACL . You can\'t change the name of a WebACL after you create it. MetricName (string) --A friendly name or description for the metrics for this WebACL . The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can\'t contain whitespace or metric names reserved for AWS WAF, including "All" and "Default_Action." You can\'t change MetricName after you create the WebACL . DefaultAction (dict) --The action to perform if none of the Rules contained in the WebACL match. The action is specified by the WafAction object. Type (string) --Specifies how you want AWS WAF to respond to requests that match the settings in a Rule . Valid settings include the following: ALLOW : AWS WAF allows requests BLOCK : AWS WAF blocks requests COUNT : AWS WAF increments a counter of the requests that match all of the conditions in the rule. AWS WAF then continues to inspect the web request based on the remaining rules in the web ACL. You can\'t specify COUNT for the default action for a WebACL . Rules (list) --An array that contains the action for each Rule in a WebACL , the priority of the Rule , and the ID of the Rule . (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The ActivatedRule object in an UpdateWebACL request specifies a Rule that you want to insert or delete, the priority of the Rule in the WebACL , and the action that you want AWS WAF to take when a web request matches the Rule (ALLOW , BLOCK , or COUNT ). To specify whether to insert or delete a Rule , use the Action parameter in the WebACLUpdate data type. Priority (integer) --Specifies the order in which the Rules in a WebACL are evaluated. Rules with a lower value for Priority are evaluated before Rules with a higher value. The value must be a unique integer. If you add multiple Rules to a WebACL , the values don\'t need to be consecutive. RuleId (string) --The RuleId for a Rule . You use RuleId to get more information about a Rule (see GetRule ), update a Rule (see UpdateRule ), insert a Rule into a WebACL or delete a one from a WebACL (see UpdateWebACL ), or delete a Rule from AWS WAF (see DeleteRule ). RuleId is returned by CreateRule and by ListRules . Action (dict) --Specifies the action that CloudFront or AWS WAF takes when a web request matches the conditions in the Rule . Valid values for Action include the following: ALLOW : CloudFront responds with the requested object. BLOCK : CloudFront responds with an HTTP 403 (Forbidden) status code. COUNT : AWS WAF increments a counter of requests that match the conditions in the rule and then continues to inspect the web request based on the remaining rules in the web ACL. ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case, you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction . Type (string) --Specifies how you want AWS WAF to respond to requests that match the settings in a Rule . Valid settings include the following: ALLOW : AWS WAF allows requests BLOCK : AWS WAF blocks requests COUNT : AWS WAF increments a counter of the requests that match all of the conditions in the rule. AWS WAF then continues to inspect the web request based on the remaining rules in the web ACL. You can\'t specify COUNT for the default action for a WebACL . OverrideAction (dict) --Use the OverrideAction to test your RuleGroup . Any rule in a RuleGroup can potentially block a request. If you set the OverrideAction to None , the RuleGroup will block a request if any individual rule in the RuleGroup matches the request and is configured to block that request. However if you first want to test the RuleGroup , set the OverrideAction to Count . The RuleGroup will then override any block action specified by individual rules contained within the group. Instead of blocking matching requests, those requests will be counted. You can view a record of counted requests using GetSampledRequests . ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction . Type (string) -- COUNT overrides the action specified by the individual rule within a RuleGroup . If set to NONE , the rule\'s action will take place. Type (string) --The rule type, either REGULAR , as defined by Rule , RATE_BASED , as defined by RateBasedRule , or GROUP , as defined by RuleGroup . The default is REGULAR. Although this field is optional, be aware that if you try to add a RATE_BASED rule to a web ACL without setting the type, the UpdateWebACL request will fail because the request tries to add a REGULAR rule with the specified ID, which does not exist. ExcludedRules (list) --An array of rules to exclude from a rule group. This is applicable only when the ActivatedRule refers to a RuleGroup . Sometimes it is necessary to troubleshoot rule groups that are blocking traffic unexpectedly (false positives). One troubleshooting technique is to identify the specific rule within the rule group that is blocking the legitimate traffic and then disable (exclude) that particular rule. You can exclude rules from both your own rule groups and AWS Marketplace rule groups that have been associated with a web ACL. Specifying ExcludedRules does not remove those rules from the rule group. Rather, it changes the action for the rules to COUNT . Therefore, requests that match an ExcludedRule are counted but not blocked. The RuleGroup owner will receive COUNT metrics for each ExcludedRule . If you want to exclude rules from a rule group that is already associated with a web ACL, perform the following steps: Use the AWS WAF logs to identify the IDs of the rules that you want to exclude. For more information about the logs, see Logging Web ACL Traffic Information . Submit an UpdateWebACL request that has two actions: The first action deletes the existing rule group from the web ACL. That is, in the UpdateWebACL request, the first Updates:Action should be DELETE and Updates:ActivatedRule:RuleId should be the rule group that contains the rules that you want to exclude. The second action inserts the same rule group back in, but specifying the rules to exclude. That is, the second Updates:Action should be INSERT , Updates:ActivatedRule:RuleId should be the rule group that you just removed, and ExcludedRules should contain the rules that you want to exclude. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The rule to exclude from a rule group. This is applicable only when the ActivatedRule refers to a RuleGroup . The rule must belong to the RuleGroup that is specified by the ActivatedRule . RuleId (string) --The unique identifier for the rule to exclude from the rule group. WebACLArn (string) --Tha Amazon Resource Name (ARN) of the web ACL. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException Examples The following example returns the details of a web ACL with the ID createwebacl-1472061481310. response = client.get_web_acl( WebACLId='createwebacl-1472061481310', ) print(response) Expected Output: { 'WebACL': { 'DefaultAction': { 'Type': 'ALLOW', }, 'MetricName': 'CreateExample', 'Name': 'CreateExample', 'Rules': [ { 'Action': { 'Type': 'ALLOW', }, 'Priority': 1, 'RuleId': 'WAFRule-1-Example', }, ], 'WebACLId': 'createwebacl-1472061481310', }, 'ResponseMetadata': { '...': '...', }, } :return: { 'WebACL': { 'WebACLId': 'string', 'Name': 'string', 'MetricName': 'string', 'DefaultAction': { 'Type': 'BLOCK'|'ALLOW'|'COUNT' }, 'Rules': [ { 'Priority': 123, 'RuleId': 'string', 'Action': { 'Type': 'BLOCK'|'ALLOW'|'COUNT' }, 'OverrideAction': { 'Type': 'NONE'|'COUNT' }, 'Type': 'REGULAR'|'RATE_BASED'|'GROUP', 'ExcludedRules': [ { 'RuleId': 'string' }, ] }, ], 'WebACLArn': 'string' } } :returns: ALLOW : AWS WAF allows requests BLOCK : AWS WAF blocks requests COUNT : AWS WAF increments a counter of the requests that match all of the conditions in the rule. AWS WAF then continues to inspect the web request based on the remaining rules in the web ACL. You can\'t specify COUNT for the default action for a WebACL . """ pass def get_web_acl_for_resource(ResourceArn=None): """ Returns the web ACL for the specified resource, either an application load balancer or Amazon API Gateway stage. See also: AWS API Documentation Exceptions :example: response = client.get_web_acl_for_resource( ResourceArn='string' ) :type ResourceArn: string :param ResourceArn: [REQUIRED]\nThe ARN (Amazon Resource Name) of the resource for which to get the web ACL, either an application load balancer or Amazon API Gateway stage.\nThe ARN should be in one of the following formats:\n\nFor an Application Load Balancer: ``arn:aws:elasticloadbalancing:region :account-id :loadbalancer/app/load-balancer-name /load-balancer-id ``\nFor an Amazon API Gateway stage: ``arn:aws:apigateway:region ::/restapis/api-id /stages/stage-name ``\n\n :rtype: dict ReturnsResponse Syntax{ 'WebACLSummary': { 'WebACLId': 'string', 'Name': 'string' } } Response Structure (dict) -- WebACLSummary (dict) --Information about the web ACL that you specified in the GetWebACLForResource request. If there is no associated resource, a null WebACLSummary is returned. WebACLId (string) --A unique identifier for a WebACL . You use WebACLId to get information about a WebACL (see GetWebACL ), update a WebACL (see UpdateWebACL ), and delete a WebACL from AWS WAF (see DeleteWebACL ). WebACLId is returned by CreateWebACL and by ListWebACLs . Name (string) --A friendly name or description of the WebACL . You can\'t change the name of a WebACL after you create it. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFUnavailableEntityException :return: { 'WebACLSummary': { 'WebACLId': 'string', 'Name': 'string' } } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFUnavailableEntityException """ pass def get_xss_match_set(XssMatchSetId=None): """ Returns the XssMatchSet that is specified by XssMatchSetId . See also: AWS API Documentation Exceptions Examples The following example returns the details of an XSS match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.get_xss_match_set( XssMatchSetId='string' ) :type XssMatchSetId: string :param XssMatchSetId: [REQUIRED]\nThe XssMatchSetId of the XssMatchSet that you want to get. XssMatchSetId is returned by CreateXssMatchSet and by ListXssMatchSets .\n :rtype: dict ReturnsResponse Syntax{ 'XssMatchSet': { 'XssMatchSetId': 'string', 'Name': 'string', 'XssMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE' }, ] } } Response Structure (dict) --The response to a GetXssMatchSet request. XssMatchSet (dict) --Information about the XssMatchSet that you specified in the GetXssMatchSet request. For more information, see the following topics: XssMatchSet : Contains Name , XssMatchSetId , and an array of XssMatchTuple objects XssMatchTuple : Each XssMatchTuple object contains FieldToMatch and TextTransformation FieldToMatch : Contains Data and Type XssMatchSetId (string) --A unique identifier for an XssMatchSet . You use XssMatchSetId to get information about an XssMatchSet (see GetXssMatchSet ), update an XssMatchSet (see UpdateXssMatchSet ), insert an XssMatchSet into a Rule or delete one from a Rule (see UpdateRule ), and delete an XssMatchSet from AWS WAF (see DeleteXssMatchSet ). XssMatchSetId is returned by CreateXssMatchSet and by ListXssMatchSets . Name (string) --The name, if any, of the XssMatchSet . XssMatchTuples (list) --Specifies the parts of web requests that you want to inspect for cross-site scripting attacks. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies the part of a web request that you want AWS WAF to inspect for cross-site scripting attacks and, if you want AWS WAF to inspect a header, the name of the header. FieldToMatch (dict) --Specifies where in a web request to look for cross-site scripting attacks. Type (string) --The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) --When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . TextTransformation (string) --Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on FieldToMatch before inspecting it for a match. You can only specify a single type of TextTransformation. CMD_LINE When you\'re concerned that attackers are injecting an operating system command line command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations: Delete the following characters: " \' ^ Delete spaces before the following characters: / ( Replace the following characters with a space: , ; Replace multiple spaces with one space Convert uppercase letters (A-Z) to lowercase (a-z) COMPRESS_WHITE_SPACE Use this option to replace the following characters with a space character (decimal 32): f, formfeed, decimal 12 t, tab, decimal 9 n, newline, decimal 10 r, carriage return, decimal 13 v, vertical tab, decimal 11 non-breaking space, decimal 160 COMPRESS_WHITE_SPACE also replaces multiple spaces with one space.HTML_ENTITY_DECODE Use this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations: Replaces (ampersand)quot; with " Replaces (ampersand)nbsp; with a non-breaking space, decimal 160 Replaces (ampersand)lt; with a "less than" symbol Replaces (ampersand)gt; with > Replaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters Replaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters LOWERCASE Use this option to convert uppercase letters (A-Z) to lowercase (a-z). URL_DECODE Use this option to decode a URL-encoded value. NONE Specify NONE if you don\'t want to perform any text transformations. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException Examples The following example returns the details of an XSS match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. response = client.get_xss_match_set( XssMatchSetId='example1ds3t-46da-4fdb-b8d5-abc321j569j5', ) print(response) Expected Output: { 'XssMatchSet': { 'Name': 'MySampleXssMatchSet', 'XssMatchSetId': 'example1ds3t-46da-4fdb-b8d5-abc321j569j5', 'XssMatchTuples': [ { 'FieldToMatch': { 'Type': 'QUERY_STRING', }, 'TextTransformation': 'URL_DECODE', }, ], }, 'ResponseMetadata': { '...': '...', }, } :return: { 'XssMatchSet': { 'XssMatchSetId': 'string', 'Name': 'string', 'XssMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE' }, ] } } :returns: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . """ pass def list_activated_rules_in_rule_group(RuleGroupId=None, NextMarker=None, Limit=None): """ Returns an array of ActivatedRule objects. See also: AWS API Documentation Exceptions :example: response = client.list_activated_rules_in_rule_group( RuleGroupId='string', NextMarker='string', Limit=123 ) :type RuleGroupId: string :param RuleGroupId: The RuleGroupId of the RuleGroup for which you want to get a list of ActivatedRule objects. :type NextMarker: string :param NextMarker: If you specify a value for Limit and you have more ActivatedRules than the value of Limit , AWS WAF returns a NextMarker value in the response that allows you to list another group of ActivatedRules . For the second and subsequent ListActivatedRulesInRuleGroup requests, specify the value of NextMarker from the previous response to get information about another batch of ActivatedRules . :type Limit: integer :param Limit: Specifies the number of ActivatedRules that you want AWS WAF to return for this request. If you have more ActivatedRules than the number that you specify for Limit , the response includes a NextMarker value that you can use to get another batch of ActivatedRules . :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'ActivatedRules': [ { 'Priority': 123, 'RuleId': 'string', 'Action': { 'Type': 'BLOCK'|'ALLOW'|'COUNT' }, 'OverrideAction': { 'Type': 'NONE'|'COUNT' }, 'Type': 'REGULAR'|'RATE_BASED'|'GROUP', 'ExcludedRules': [ { 'RuleId': 'string' }, ] }, ] } Response Structure (dict) -- NextMarker (string) -- If you have more ActivatedRules than the number that you specified for Limit in the request, the response includes a NextMarker value. To list more ActivatedRules , submit another ListActivatedRulesInRuleGroup request, and specify the NextMarker value from the response in the NextMarker value in the next request. ActivatedRules (list) -- An array of ActivatedRules objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The ActivatedRule object in an UpdateWebACL request specifies a Rule that you want to insert or delete, the priority of the Rule in the WebACL , and the action that you want AWS WAF to take when a web request matches the Rule (ALLOW , BLOCK , or COUNT ). To specify whether to insert or delete a Rule , use the Action parameter in the WebACLUpdate data type. Priority (integer) -- Specifies the order in which the Rules in a WebACL are evaluated. Rules with a lower value for Priority are evaluated before Rules with a higher value. The value must be a unique integer. If you add multiple Rules to a WebACL , the values don\'t need to be consecutive. RuleId (string) -- The RuleId for a Rule . You use RuleId to get more information about a Rule (see GetRule ), update a Rule (see UpdateRule ), insert a Rule into a WebACL or delete a one from a WebACL (see UpdateWebACL ), or delete a Rule from AWS WAF (see DeleteRule ). RuleId is returned by CreateRule and by ListRules . Action (dict) -- Specifies the action that CloudFront or AWS WAF takes when a web request matches the conditions in the Rule . Valid values for Action include the following: ALLOW : CloudFront responds with the requested object. BLOCK : CloudFront responds with an HTTP 403 (Forbidden) status code. COUNT : AWS WAF increments a counter of requests that match the conditions in the rule and then continues to inspect the web request based on the remaining rules in the web ACL. ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case, you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction . Type (string) -- Specifies how you want AWS WAF to respond to requests that match the settings in a Rule . Valid settings include the following: ALLOW : AWS WAF allows requests BLOCK : AWS WAF blocks requests COUNT : AWS WAF increments a counter of the requests that match all of the conditions in the rule. AWS WAF then continues to inspect the web request based on the remaining rules in the web ACL. You can\'t specify COUNT for the default action for a WebACL . OverrideAction (dict) -- Use the OverrideAction to test your RuleGroup . Any rule in a RuleGroup can potentially block a request. If you set the OverrideAction to None , the RuleGroup will block a request if any individual rule in the RuleGroup matches the request and is configured to block that request. However if you first want to test the RuleGroup , set the OverrideAction to Count . The RuleGroup will then override any block action specified by individual rules contained within the group. Instead of blocking matching requests, those requests will be counted. You can view a record of counted requests using GetSampledRequests . ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction . Type (string) -- COUNT overrides the action specified by the individual rule within a RuleGroup . If set to NONE , the rule\'s action will take place. Type (string) -- The rule type, either REGULAR , as defined by Rule , RATE_BASED , as defined by RateBasedRule , or GROUP , as defined by RuleGroup . The default is REGULAR. Although this field is optional, be aware that if you try to add a RATE_BASED rule to a web ACL without setting the type, the UpdateWebACL request will fail because the request tries to add a REGULAR rule with the specified ID, which does not exist. ExcludedRules (list) -- An array of rules to exclude from a rule group. This is applicable only when the ActivatedRule refers to a RuleGroup . Sometimes it is necessary to troubleshoot rule groups that are blocking traffic unexpectedly (false positives). One troubleshooting technique is to identify the specific rule within the rule group that is blocking the legitimate traffic and then disable (exclude) that particular rule. You can exclude rules from both your own rule groups and AWS Marketplace rule groups that have been associated with a web ACL. Specifying ExcludedRules does not remove those rules from the rule group. Rather, it changes the action for the rules to COUNT . Therefore, requests that match an ExcludedRule are counted but not blocked. The RuleGroup owner will receive COUNT metrics for each ExcludedRule . If you want to exclude rules from a rule group that is already associated with a web ACL, perform the following steps: Use the AWS WAF logs to identify the IDs of the rules that you want to exclude. For more information about the logs, see Logging Web ACL Traffic Information . Submit an UpdateWebACL request that has two actions: The first action deletes the existing rule group from the web ACL. That is, in the UpdateWebACL request, the first Updates:Action should be DELETE and Updates:ActivatedRule:RuleId should be the rule group that contains the rules that you want to exclude. The second action inserts the same rule group back in, but specifying the rules to exclude. That is, the second Updates:Action should be INSERT , Updates:ActivatedRule:RuleId should be the rule group that you just removed, and ExcludedRules should contain the rules that you want to exclude. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The rule to exclude from a rule group. This is applicable only when the ActivatedRule refers to a RuleGroup . The rule must belong to the RuleGroup that is specified by the ActivatedRule . RuleId (string) -- The unique identifier for the rule to exclude from the rule group. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFInvalidParameterException :return: { 'NextMarker': 'string', 'ActivatedRules': [ { 'Priority': 123, 'RuleId': 'string', 'Action': { 'Type': 'BLOCK'|'ALLOW'|'COUNT' }, 'OverrideAction': { 'Type': 'NONE'|'COUNT' }, 'Type': 'REGULAR'|'RATE_BASED'|'GROUP', 'ExcludedRules': [ { 'RuleId': 'string' }, ] }, ] } :returns: ALLOW : CloudFront responds with the requested object. BLOCK : CloudFront responds with an HTTP 403 (Forbidden) status code. COUNT : AWS WAF increments a counter of requests that match the conditions in the rule and then continues to inspect the web request based on the remaining rules in the web ACL. """ pass def list_byte_match_sets(NextMarker=None, Limit=None): """ Returns an array of ByteMatchSetSummary objects. See also: AWS API Documentation Exceptions :example: response = client.list_byte_match_sets( NextMarker='string', Limit=123 ) :type NextMarker: string :param NextMarker: If you specify a value for Limit and you have more ByteMatchSets than the value of Limit , AWS WAF returns a NextMarker value in the response that allows you to list another group of ByteMatchSets . For the second and subsequent ListByteMatchSets requests, specify the value of NextMarker from the previous response to get information about another batch of ByteMatchSets . :type Limit: integer :param Limit: Specifies the number of ByteMatchSet objects that you want AWS WAF to return for this request. If you have more ByteMatchSets objects than the number you specify for Limit , the response includes a NextMarker value that you can use to get another batch of ByteMatchSet objects. :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'ByteMatchSets': [ { 'ByteMatchSetId': 'string', 'Name': 'string' }, ] } Response Structure (dict) -- NextMarker (string) -- If you have more ByteMatchSet objects than the number that you specified for Limit in the request, the response includes a NextMarker value. To list more ByteMatchSet objects, submit another ListByteMatchSets request, and specify the NextMarker value from the response in the NextMarker value in the next request. ByteMatchSets (list) -- An array of ByteMatchSetSummary objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Returned by ListByteMatchSets . Each ByteMatchSetSummary object includes the Name and ByteMatchSetId for one ByteMatchSet . ByteMatchSetId (string) -- The ByteMatchSetId for a ByteMatchSet . You use ByteMatchSetId to get information about a ByteMatchSet , update a ByteMatchSet , remove a ByteMatchSet from a Rule , and delete a ByteMatchSet from AWS WAF. ByteMatchSetId is returned by CreateByteMatchSet and by ListByteMatchSets . Name (string) -- A friendly name or description of the ByteMatchSet . You can\'t change Name after you create a ByteMatchSet . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException :return: { 'NextMarker': 'string', 'ByteMatchSets': [ { 'ByteMatchSetId': 'string', 'Name': 'string' }, ] } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException """ pass def list_geo_match_sets(NextMarker=None, Limit=None): """ Returns an array of GeoMatchSetSummary objects in the response. See also: AWS API Documentation Exceptions :example: response = client.list_geo_match_sets( NextMarker='string', Limit=123 ) :type NextMarker: string :param NextMarker: If you specify a value for Limit and you have more GeoMatchSet s than the value of Limit , AWS WAF returns a NextMarker value in the response that allows you to list another group of GeoMatchSet objects. For the second and subsequent ListGeoMatchSets requests, specify the value of NextMarker from the previous response to get information about another batch of GeoMatchSet objects. :type Limit: integer :param Limit: Specifies the number of GeoMatchSet objects that you want AWS WAF to return for this request. If you have more GeoMatchSet objects than the number you specify for Limit , the response includes a NextMarker value that you can use to get another batch of GeoMatchSet objects. :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'GeoMatchSets': [ { 'GeoMatchSetId': 'string', 'Name': 'string' }, ] } Response Structure (dict) -- NextMarker (string) -- If you have more GeoMatchSet objects than the number that you specified for Limit in the request, the response includes a NextMarker value. To list more GeoMatchSet objects, submit another ListGeoMatchSets request, and specify the NextMarker value from the response in the NextMarker value in the next request. GeoMatchSets (list) -- An array of GeoMatchSetSummary objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Contains the identifier and the name of the GeoMatchSet . GeoMatchSetId (string) -- The GeoMatchSetId for an GeoMatchSet . You can use GeoMatchSetId in a GetGeoMatchSet request to get detailed information about an GeoMatchSet . Name (string) -- A friendly name or description of the GeoMatchSet . You can\'t change the name of an GeoMatchSet after you create it. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException :return: { 'NextMarker': 'string', 'GeoMatchSets': [ { 'GeoMatchSetId': 'string', 'Name': 'string' }, ] } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException """ pass def list_ip_sets(NextMarker=None, Limit=None): """ Returns an array of IPSetSummary objects in the response. See also: AWS API Documentation Exceptions Examples The following example returns an array of up to 100 IP match sets. Expected Output: :example: response = client.list_ip_sets( NextMarker='string', Limit=123 ) :type NextMarker: string :param NextMarker: AWS WAF returns a NextMarker value in the response that allows you to list another group of IPSets . For the second and subsequent ListIPSets requests, specify the value of NextMarker from the previous response to get information about another batch of IPSets . :type Limit: integer :param Limit: Specifies the number of IPSet objects that you want AWS WAF to return for this request. If you have more IPSet objects than the number you specify for Limit , the response includes a NextMarker value that you can use to get another batch of IPSet objects. :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'IPSets': [ { 'IPSetId': 'string', 'Name': 'string' }, ] } Response Structure (dict) -- NextMarker (string) -- To list more IPSet objects, submit another ListIPSets request, and in the next request use the NextMarker response value as the NextMarker value. IPSets (list) -- An array of IPSetSummary objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Contains the identifier and the name of the IPSet . IPSetId (string) -- The IPSetId for an IPSet . You can use IPSetId in a GetIPSet request to get detailed information about an IPSet . Name (string) -- A friendly name or description of the IPSet . You can\'t change the name of an IPSet after you create it. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException Examples The following example returns an array of up to 100 IP match sets. response = client.list_ip_sets( Limit=100, ) print(response) Expected Output: { 'IPSets': [ { 'IPSetId': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'Name': 'MyIPSetFriendlyName', }, ], 'ResponseMetadata': { '...': '...', }, } :return: { 'NextMarker': 'string', 'IPSets': [ { 'IPSetId': 'string', 'Name': 'string' }, ] } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException """ pass def list_logging_configurations(NextMarker=None, Limit=None): """ Returns an array of LoggingConfiguration objects. See also: AWS API Documentation Exceptions :example: response = client.list_logging_configurations( NextMarker='string', Limit=123 ) :type NextMarker: string :param NextMarker: If you specify a value for Limit and you have more LoggingConfigurations than the value of Limit , AWS WAF returns a NextMarker value in the response that allows you to list another group of LoggingConfigurations . For the second and subsequent ListLoggingConfigurations requests, specify the value of NextMarker from the previous response to get information about another batch of ListLoggingConfigurations . :type Limit: integer :param Limit: Specifies the number of LoggingConfigurations that you want AWS WAF to return for this request. If you have more LoggingConfigurations than the number that you specify for Limit , the response includes a NextMarker value that you can use to get another batch of LoggingConfigurations . :rtype: dict ReturnsResponse Syntax { 'LoggingConfigurations': [ { 'ResourceArn': 'string', 'LogDestinationConfigs': [ 'string', ], 'RedactedFields': [ { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, ] }, ], 'NextMarker': 'string' } Response Structure (dict) -- LoggingConfigurations (list) -- An array of LoggingConfiguration objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The Amazon Kinesis Data Firehose, RedactedFields information, and the web ACL Amazon Resource Name (ARN). ResourceArn (string) -- The Amazon Resource Name (ARN) of the web ACL that you want to associate with LogDestinationConfigs . LogDestinationConfigs (list) -- An array of Amazon Kinesis Data Firehose ARNs. (string) -- RedactedFields (list) -- The parts of the request that you want redacted from the logs. For example, if you redact the cookie field, the cookie field in the firehose will be xxx . (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies where in a web request to look for TargetString . Type (string) -- The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) -- When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . NextMarker (string) -- If you have more LoggingConfigurations than the number that you specified for Limit in the request, the response includes a NextMarker value. To list more LoggingConfigurations , submit another ListLoggingConfigurations request, and specify the NextMarker value from the response in the NextMarker value in the next request. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFInvalidParameterException :return: { 'LoggingConfigurations': [ { 'ResourceArn': 'string', 'LogDestinationConfigs': [ 'string', ], 'RedactedFields': [ { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, ] }, ], 'NextMarker': 'string' } :returns: (string) -- """ pass def list_rate_based_rules(NextMarker=None, Limit=None): """ Returns an array of RuleSummary objects. See also: AWS API Documentation Exceptions :example: response = client.list_rate_based_rules( NextMarker='string', Limit=123 ) :type NextMarker: string :param NextMarker: If you specify a value for Limit and you have more Rules than the value of Limit , AWS WAF returns a NextMarker value in the response that allows you to list another group of Rules . For the second and subsequent ListRateBasedRules requests, specify the value of NextMarker from the previous response to get information about another batch of Rules . :type Limit: integer :param Limit: Specifies the number of Rules that you want AWS WAF to return for this request. If you have more Rules than the number that you specify for Limit , the response includes a NextMarker value that you can use to get another batch of Rules . :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'Rules': [ { 'RuleId': 'string', 'Name': 'string' }, ] } Response Structure (dict) -- NextMarker (string) -- If you have more Rules than the number that you specified for Limit in the request, the response includes a NextMarker value. To list more Rules , submit another ListRateBasedRules request, and specify the NextMarker value from the response in the NextMarker value in the next request. Rules (list) -- An array of RuleSummary objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Contains the identifier and the friendly name or description of the Rule . RuleId (string) -- A unique identifier for a Rule . You use RuleId to get more information about a Rule (see GetRule ), update a Rule (see UpdateRule ), insert a Rule into a WebACL or delete one from a WebACL (see UpdateWebACL ), or delete a Rule from AWS WAF (see DeleteRule ). RuleId is returned by CreateRule and by ListRules . Name (string) -- A friendly name or description of the Rule . You can\'t change the name of a Rule after you create it. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException :return: { 'NextMarker': 'string', 'Rules': [ { 'RuleId': 'string', 'Name': 'string' }, ] } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException """ pass def list_regex_match_sets(NextMarker=None, Limit=None): """ Returns an array of RegexMatchSetSummary objects. See also: AWS API Documentation Exceptions :example: response = client.list_regex_match_sets( NextMarker='string', Limit=123 ) :type NextMarker: string :param NextMarker: If you specify a value for Limit and you have more RegexMatchSet objects than the value of Limit , AWS WAF returns a NextMarker value in the response that allows you to list another group of ByteMatchSets . For the second and subsequent ListRegexMatchSets requests, specify the value of NextMarker from the previous response to get information about another batch of RegexMatchSet objects. :type Limit: integer :param Limit: Specifies the number of RegexMatchSet objects that you want AWS WAF to return for this request. If you have more RegexMatchSet objects than the number you specify for Limit , the response includes a NextMarker value that you can use to get another batch of RegexMatchSet objects. :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'RegexMatchSets': [ { 'RegexMatchSetId': 'string', 'Name': 'string' }, ] } Response Structure (dict) -- NextMarker (string) -- If you have more RegexMatchSet objects than the number that you specified for Limit in the request, the response includes a NextMarker value. To list more RegexMatchSet objects, submit another ListRegexMatchSets request, and specify the NextMarker value from the response in the NextMarker value in the next request. RegexMatchSets (list) -- An array of RegexMatchSetSummary objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Returned by ListRegexMatchSets . Each RegexMatchSetSummary object includes the Name and RegexMatchSetId for one RegexMatchSet . RegexMatchSetId (string) -- The RegexMatchSetId for a RegexMatchSet . You use RegexMatchSetId to get information about a RegexMatchSet , update a RegexMatchSet , remove a RegexMatchSet from a Rule , and delete a RegexMatchSet from AWS WAF. RegexMatchSetId is returned by CreateRegexMatchSet and by ListRegexMatchSets . Name (string) -- A friendly name or description of the RegexMatchSet . You can\'t change Name after you create a RegexMatchSet . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException :return: { 'NextMarker': 'string', 'RegexMatchSets': [ { 'RegexMatchSetId': 'string', 'Name': 'string' }, ] } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException """ pass def list_regex_pattern_sets(NextMarker=None, Limit=None): """ Returns an array of RegexPatternSetSummary objects. See also: AWS API Documentation Exceptions :example: response = client.list_regex_pattern_sets( NextMarker='string', Limit=123 ) :type NextMarker: string :param NextMarker: If you specify a value for Limit and you have more RegexPatternSet objects than the value of Limit , AWS WAF returns a NextMarker value in the response that allows you to list another group of RegexPatternSet objects. For the second and subsequent ListRegexPatternSets requests, specify the value of NextMarker from the previous response to get information about another batch of RegexPatternSet objects. :type Limit: integer :param Limit: Specifies the number of RegexPatternSet objects that you want AWS WAF to return for this request. If you have more RegexPatternSet objects than the number you specify for Limit , the response includes a NextMarker value that you can use to get another batch of RegexPatternSet objects. :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'RegexPatternSets': [ { 'RegexPatternSetId': 'string', 'Name': 'string' }, ] } Response Structure (dict) -- NextMarker (string) -- If you have more RegexPatternSet objects than the number that you specified for Limit in the request, the response includes a NextMarker value. To list more RegexPatternSet objects, submit another ListRegexPatternSets request, and specify the NextMarker value from the response in the NextMarker value in the next request. RegexPatternSets (list) -- An array of RegexPatternSetSummary objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Returned by ListRegexPatternSets . Each RegexPatternSetSummary object includes the Name and RegexPatternSetId for one RegexPatternSet . RegexPatternSetId (string) -- The RegexPatternSetId for a RegexPatternSet . You use RegexPatternSetId to get information about a RegexPatternSet , update a RegexPatternSet , remove a RegexPatternSet from a RegexMatchSet , and delete a RegexPatternSet from AWS WAF. RegexPatternSetId is returned by CreateRegexPatternSet and by ListRegexPatternSets . Name (string) -- A friendly name or description of the RegexPatternSet . You can\'t change Name after you create a RegexPatternSet . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException :return: { 'NextMarker': 'string', 'RegexPatternSets': [ { 'RegexPatternSetId': 'string', 'Name': 'string' }, ] } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException """ pass def list_resources_for_web_acl(WebACLId=None, ResourceType=None): """ Returns an array of resources associated with the specified web ACL. See also: AWS API Documentation Exceptions :example: response = client.list_resources_for_web_acl( WebACLId='string', ResourceType='APPLICATION_LOAD_BALANCER'|'API_GATEWAY' ) :type WebACLId: string :param WebACLId: [REQUIRED]\nThe unique identifier (ID) of the web ACL for which to list the associated resources.\n :type ResourceType: string :param ResourceType: The type of resource to list, either an application load balancer or Amazon API Gateway. :rtype: dict ReturnsResponse Syntax { 'ResourceArns': [ 'string', ] } Response Structure (dict) -- ResourceArns (list) -- An array of ARNs (Amazon Resource Names) of the resources associated with the specified web ACL. An array with zero elements is returned if there are no resources associated with the web ACL. (string) -- Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFInvalidParameterException :return: { 'ResourceArns': [ 'string', ] } :returns: (string) -- """ pass def list_rule_groups(NextMarker=None, Limit=None): """ Returns an array of RuleGroup objects. See also: AWS API Documentation Exceptions :example: response = client.list_rule_groups( NextMarker='string', Limit=123 ) :type NextMarker: string :param NextMarker: If you specify a value for Limit and you have more RuleGroups than the value of Limit , AWS WAF returns a NextMarker value in the response that allows you to list another group of RuleGroups . For the second and subsequent ListRuleGroups requests, specify the value of NextMarker from the previous response to get information about another batch of RuleGroups . :type Limit: integer :param Limit: Specifies the number of RuleGroups that you want AWS WAF to return for this request. If you have more RuleGroups than the number that you specify for Limit , the response includes a NextMarker value that you can use to get another batch of RuleGroups . :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'RuleGroups': [ { 'RuleGroupId': 'string', 'Name': 'string' }, ] } Response Structure (dict) -- NextMarker (string) -- If you have more RuleGroups than the number that you specified for Limit in the request, the response includes a NextMarker value. To list more RuleGroups , submit another ListRuleGroups request, and specify the NextMarker value from the response in the NextMarker value in the next request. RuleGroups (list) -- An array of RuleGroup objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Contains the identifier and the friendly name or description of the RuleGroup . RuleGroupId (string) -- A unique identifier for a RuleGroup . You use RuleGroupId to get more information about a RuleGroup (see GetRuleGroup ), update a RuleGroup (see UpdateRuleGroup ), insert a RuleGroup into a WebACL or delete one from a WebACL (see UpdateWebACL ), or delete a RuleGroup from AWS WAF (see DeleteRuleGroup ). RuleGroupId is returned by CreateRuleGroup and by ListRuleGroups . Name (string) -- A friendly name or description of the RuleGroup . You can\'t change the name of a RuleGroup after you create it. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException :return: { 'NextMarker': 'string', 'RuleGroups': [ { 'RuleGroupId': 'string', 'Name': 'string' }, ] } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException """ pass def list_rules(NextMarker=None, Limit=None): """ Returns an array of RuleSummary objects. See also: AWS API Documentation Exceptions Examples The following example returns an array of up to 100 rules. Expected Output: :example: response = client.list_rules( NextMarker='string', Limit=123 ) :type NextMarker: string :param NextMarker: If you specify a value for Limit and you have more Rules than the value of Limit , AWS WAF returns a NextMarker value in the response that allows you to list another group of Rules . For the second and subsequent ListRules requests, specify the value of NextMarker from the previous response to get information about another batch of Rules . :type Limit: integer :param Limit: Specifies the number of Rules that you want AWS WAF to return for this request. If you have more Rules than the number that you specify for Limit , the response includes a NextMarker value that you can use to get another batch of Rules . :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'Rules': [ { 'RuleId': 'string', 'Name': 'string' }, ] } Response Structure (dict) -- NextMarker (string) -- If you have more Rules than the number that you specified for Limit in the request, the response includes a NextMarker value. To list more Rules , submit another ListRules request, and specify the NextMarker value from the response in the NextMarker value in the next request. Rules (list) -- An array of RuleSummary objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Contains the identifier and the friendly name or description of the Rule . RuleId (string) -- A unique identifier for a Rule . You use RuleId to get more information about a Rule (see GetRule ), update a Rule (see UpdateRule ), insert a Rule into a WebACL or delete one from a WebACL (see UpdateWebACL ), or delete a Rule from AWS WAF (see DeleteRule ). RuleId is returned by CreateRule and by ListRules . Name (string) -- A friendly name or description of the Rule . You can\'t change the name of a Rule after you create it. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException Examples The following example returns an array of up to 100 rules. response = client.list_rules( Limit=100, ) print(response) Expected Output: { 'Rules': [ { 'Name': 'WAFByteHeaderRule', 'RuleId': 'WAFRule-1-Example', }, ], 'ResponseMetadata': { '...': '...', }, } :return: { 'NextMarker': 'string', 'Rules': [ { 'RuleId': 'string', 'Name': 'string' }, ] } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException """ pass def list_size_constraint_sets(NextMarker=None, Limit=None): """ Returns an array of SizeConstraintSetSummary objects. See also: AWS API Documentation Exceptions Examples The following example returns an array of up to 100 size contraint match sets. Expected Output: :example: response = client.list_size_constraint_sets( NextMarker='string', Limit=123 ) :type NextMarker: string :param NextMarker: If you specify a value for Limit and you have more SizeConstraintSets than the value of Limit , AWS WAF returns a NextMarker value in the response that allows you to list another group of SizeConstraintSets . For the second and subsequent ListSizeConstraintSets requests, specify the value of NextMarker from the previous response to get information about another batch of SizeConstraintSets . :type Limit: integer :param Limit: Specifies the number of SizeConstraintSet objects that you want AWS WAF to return for this request. If you have more SizeConstraintSets objects than the number you specify for Limit , the response includes a NextMarker value that you can use to get another batch of SizeConstraintSet objects. :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'SizeConstraintSets': [ { 'SizeConstraintSetId': 'string', 'Name': 'string' }, ] } Response Structure (dict) -- NextMarker (string) -- If you have more SizeConstraintSet objects than the number that you specified for Limit in the request, the response includes a NextMarker value. To list more SizeConstraintSet objects, submit another ListSizeConstraintSets request, and specify the NextMarker value from the response in the NextMarker value in the next request. SizeConstraintSets (list) -- An array of SizeConstraintSetSummary objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The Id and Name of a SizeConstraintSet . SizeConstraintSetId (string) -- A unique identifier for a SizeConstraintSet . You use SizeConstraintSetId to get information about a SizeConstraintSet (see GetSizeConstraintSet ), update a SizeConstraintSet (see UpdateSizeConstraintSet ), insert a SizeConstraintSet into a Rule or delete one from a Rule (see UpdateRule ), and delete a SizeConstraintSet from AWS WAF (see DeleteSizeConstraintSet ). SizeConstraintSetId is returned by CreateSizeConstraintSet and by ListSizeConstraintSets . Name (string) -- The name of the SizeConstraintSet , if any. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException Examples The following example returns an array of up to 100 size contraint match sets. response = client.list_size_constraint_sets( Limit=100, ) print(response) Expected Output: { 'SizeConstraintSets': [ { 'Name': 'MySampleSizeConstraintSet', 'SizeConstraintSetId': 'example1ds3t-46da-4fdb-b8d5-abc321j569j5', }, ], 'ResponseMetadata': { '...': '...', }, } :return: { 'NextMarker': 'string', 'SizeConstraintSets': [ { 'SizeConstraintSetId': 'string', 'Name': 'string' }, ] } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException """ pass def list_sql_injection_match_sets(NextMarker=None, Limit=None): """ Returns an array of SqlInjectionMatchSet objects. See also: AWS API Documentation Exceptions Examples The following example returns an array of up to 100 SQL injection match sets. Expected Output: :example: response = client.list_sql_injection_match_sets( NextMarker='string', Limit=123 ) :type NextMarker: string :param NextMarker: If you specify a value for Limit and you have more SqlInjectionMatchSet objects than the value of Limit , AWS WAF returns a NextMarker value in the response that allows you to list another group of SqlInjectionMatchSets . For the second and subsequent ListSqlInjectionMatchSets requests, specify the value of NextMarker from the previous response to get information about another batch of SqlInjectionMatchSets . :type Limit: integer :param Limit: Specifies the number of SqlInjectionMatchSet objects that you want AWS WAF to return for this request. If you have more SqlInjectionMatchSet objects than the number you specify for Limit , the response includes a NextMarker value that you can use to get another batch of Rules . :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'SqlInjectionMatchSets': [ { 'SqlInjectionMatchSetId': 'string', 'Name': 'string' }, ] } Response Structure (dict) -- The response to a ListSqlInjectionMatchSets request. NextMarker (string) -- If you have more SqlInjectionMatchSet objects than the number that you specified for Limit in the request, the response includes a NextMarker value. To list more SqlInjectionMatchSet objects, submit another ListSqlInjectionMatchSets request, and specify the NextMarker value from the response in the NextMarker value in the next request. SqlInjectionMatchSets (list) -- An array of SqlInjectionMatchSetSummary objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The Id and Name of a SqlInjectionMatchSet . SqlInjectionMatchSetId (string) -- A unique identifier for a SqlInjectionMatchSet . You use SqlInjectionMatchSetId to get information about a SqlInjectionMatchSet (see GetSqlInjectionMatchSet ), update a SqlInjectionMatchSet (see UpdateSqlInjectionMatchSet ), insert a SqlInjectionMatchSet into a Rule or delete one from a Rule (see UpdateRule ), and delete a SqlInjectionMatchSet from AWS WAF (see DeleteSqlInjectionMatchSet ). SqlInjectionMatchSetId is returned by CreateSqlInjectionMatchSet and by ListSqlInjectionMatchSets . Name (string) -- The name of the SqlInjectionMatchSet , if any, specified by Id . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException Examples The following example returns an array of up to 100 SQL injection match sets. response = client.list_sql_injection_match_sets( Limit=100, ) print(response) Expected Output: { 'SqlInjectionMatchSets': [ { 'Name': 'MySQLInjectionMatchSet', 'SqlInjectionMatchSetId': 'example1ds3t-46da-4fdb-b8d5-abc321j569j5', }, ], 'ResponseMetadata': { '...': '...', }, } :return: { 'NextMarker': 'string', 'SqlInjectionMatchSets': [ { 'SqlInjectionMatchSetId': 'string', 'Name': 'string' }, ] } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException """ pass def list_subscribed_rule_groups(NextMarker=None, Limit=None): """ Returns an array of RuleGroup objects that you are subscribed to. See also: AWS API Documentation Exceptions :example: response = client.list_subscribed_rule_groups( NextMarker='string', Limit=123 ) :type NextMarker: string :param NextMarker: If you specify a value for Limit and you have more ByteMatchSets subscribed rule groups than the value of Limit , AWS WAF returns a NextMarker value in the response that allows you to list another group of subscribed rule groups. For the second and subsequent ListSubscribedRuleGroupsRequest requests, specify the value of NextMarker from the previous response to get information about another batch of subscribed rule groups. :type Limit: integer :param Limit: Specifies the number of subscribed rule groups that you want AWS WAF to return for this request. If you have more objects than the number you specify for Limit , the response includes a NextMarker value that you can use to get another batch of objects. :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'RuleGroups': [ { 'RuleGroupId': 'string', 'Name': 'string', 'MetricName': 'string' }, ] } Response Structure (dict) -- NextMarker (string) -- If you have more objects than the number that you specified for Limit in the request, the response includes a NextMarker value. To list more objects, submit another ListSubscribedRuleGroups request, and specify the NextMarker value from the response in the NextMarker value in the next request. RuleGroups (list) -- An array of RuleGroup objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. A summary of the rule groups you are subscribed to. RuleGroupId (string) -- A unique identifier for a RuleGroup . Name (string) -- A friendly name or description of the RuleGroup . You can\'t change the name of a RuleGroup after you create it. MetricName (string) -- A friendly name or description for the metrics for this RuleGroup . The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can\'t contain whitespace or metric names reserved for AWS WAF, including "All" and "Default_Action." You can\'t change the name of the metric after you create the RuleGroup . Exceptions WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFInternalErrorException :return: { 'NextMarker': 'string', 'RuleGroups': [ { 'RuleGroupId': 'string', 'Name': 'string', 'MetricName': 'string' }, ] } :returns: WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFInternalErrorException """ pass def list_tags_for_resource(NextMarker=None, Limit=None, ResourceARN=None): """ Retrieves the tags associated with the specified AWS resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to "customer" and the value to the customer name or ID. You can specify one or more tags to add to each AWS resource, up to 50 tags for a resource. Tagging is only available through the API, SDKs, and CLI. You can\'t manage or view tags through the AWS WAF Classic console. You can tag the AWS resources that you manage through AWS WAF Classic: web ACLs, rule groups, and rules. See also: AWS API Documentation Exceptions :example: response = client.list_tags_for_resource( NextMarker='string', Limit=123, ResourceARN='string' ) :type NextMarker: string :param NextMarker: :type Limit: integer :param Limit: :type ResourceARN: string :param ResourceARN: [REQUIRED] :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'TagInfoForResource': { 'ResourceARN': 'string', 'TagList': [ { 'Key': 'string', 'Value': 'string' }, ] } } Response Structure (dict) -- NextMarker (string) -- TagInfoForResource (dict) -- ResourceARN (string) -- TagList (list) -- (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. A tag associated with an AWS resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to "customer" and the value to the customer name or ID. You can specify one or more tags to add to each AWS resource, up to 50 tags for a resource. Tagging is only available through the API, SDKs, and CLI. You can\'t manage or view tags through the AWS WAF Classic console. You can tag the AWS resources that you manage through AWS WAF Classic: web ACLs, rule groups, and rules. Key (string) -- Value (string) -- Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFBadRequestException WAFRegional.Client.exceptions.WAFTagOperationException WAFRegional.Client.exceptions.WAFTagOperationInternalErrorException :return: { 'NextMarker': 'string', 'TagInfoForResource': { 'ResourceARN': 'string', 'TagList': [ { 'Key': 'string', 'Value': 'string' }, ] } } :returns: Key (string) -- Value (string) -- """ pass def list_web_acls(NextMarker=None, Limit=None): """ Returns an array of WebACLSummary objects in the response. See also: AWS API Documentation Exceptions Examples The following example returns an array of up to 100 web ACLs. Expected Output: :example: response = client.list_web_acls( NextMarker='string', Limit=123 ) :type NextMarker: string :param NextMarker: If you specify a value for Limit and you have more WebACL objects than the number that you specify for Limit , AWS WAF returns a NextMarker value in the response that allows you to list another group of WebACL objects. For the second and subsequent ListWebACLs requests, specify the value of NextMarker from the previous response to get information about another batch of WebACL objects. :type Limit: integer :param Limit: Specifies the number of WebACL objects that you want AWS WAF to return for this request. If you have more WebACL objects than the number that you specify for Limit , the response includes a NextMarker value that you can use to get another batch of WebACL objects. :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'WebACLs': [ { 'WebACLId': 'string', 'Name': 'string' }, ] } Response Structure (dict) -- NextMarker (string) -- If you have more WebACL objects than the number that you specified for Limit in the request, the response includes a NextMarker value. To list more WebACL objects, submit another ListWebACLs request, and specify the NextMarker value from the response in the NextMarker value in the next request. WebACLs (list) -- An array of WebACLSummary objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Contains the identifier and the name or description of the WebACL . WebACLId (string) -- A unique identifier for a WebACL . You use WebACLId to get information about a WebACL (see GetWebACL ), update a WebACL (see UpdateWebACL ), and delete a WebACL from AWS WAF (see DeleteWebACL ). WebACLId is returned by CreateWebACL and by ListWebACLs . Name (string) -- A friendly name or description of the WebACL . You can\'t change the name of a WebACL after you create it. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException Examples The following example returns an array of up to 100 web ACLs. response = client.list_web_acls( Limit=100, ) print(response) Expected Output: { 'WebACLs': [ { 'Name': 'WebACLexample', 'WebACLId': 'webacl-1472061481310', }, ], 'ResponseMetadata': { '...': '...', }, } :return: { 'NextMarker': 'string', 'WebACLs': [ { 'WebACLId': 'string', 'Name': 'string' }, ] } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException """ pass def list_xss_match_sets(NextMarker=None, Limit=None): """ Returns an array of XssMatchSet objects. See also: AWS API Documentation Exceptions Examples The following example returns an array of up to 100 XSS match sets. Expected Output: :example: response = client.list_xss_match_sets( NextMarker='string', Limit=123 ) :type NextMarker: string :param NextMarker: If you specify a value for Limit and you have more XssMatchSet objects than the value of Limit , AWS WAF returns a NextMarker value in the response that allows you to list another group of XssMatchSets . For the second and subsequent ListXssMatchSets requests, specify the value of NextMarker from the previous response to get information about another batch of XssMatchSets . :type Limit: integer :param Limit: Specifies the number of XssMatchSet objects that you want AWS WAF to return for this request. If you have more XssMatchSet objects than the number you specify for Limit , the response includes a NextMarker value that you can use to get another batch of Rules . :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'XssMatchSets': [ { 'XssMatchSetId': 'string', 'Name': 'string' }, ] } Response Structure (dict) -- The response to a ListXssMatchSets request. NextMarker (string) -- If you have more XssMatchSet objects than the number that you specified for Limit in the request, the response includes a NextMarker value. To list more XssMatchSet objects, submit another ListXssMatchSets request, and specify the NextMarker value from the response in the NextMarker value in the next request. XssMatchSets (list) -- An array of XssMatchSetSummary objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The Id and Name of an XssMatchSet . XssMatchSetId (string) -- A unique identifier for an XssMatchSet . You use XssMatchSetId to get information about a XssMatchSet (see GetXssMatchSet ), update an XssMatchSet (see UpdateXssMatchSet ), insert an XssMatchSet into a Rule or delete one from a Rule (see UpdateRule ), and delete an XssMatchSet from AWS WAF (see DeleteXssMatchSet ). XssMatchSetId is returned by CreateXssMatchSet and by ListXssMatchSets . Name (string) -- The name of the XssMatchSet , if any, specified by Id . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException Examples The following example returns an array of up to 100 XSS match sets. response = client.list_xss_match_sets( Limit=100, ) print(response) Expected Output: { 'XssMatchSets': [ { 'Name': 'MySampleXssMatchSet', 'XssMatchSetId': 'example1ds3t-46da-4fdb-b8d5-abc321j569j5', }, ], 'ResponseMetadata': { '...': '...', }, } :return: { 'NextMarker': 'string', 'XssMatchSets': [ { 'XssMatchSetId': 'string', 'Name': 'string' }, ] } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException """ pass def put_logging_configuration(LoggingConfiguration=None): """ Associates a LoggingConfiguration with a specified web ACL. You can access information about all traffic that AWS WAF inspects using the following steps: When you successfully enable logging using a PutLoggingConfiguration request, AWS WAF will create a service linked role with the necessary permissions to write logs to the Amazon Kinesis Data Firehose. For more information, see Logging Web ACL Traffic Information in the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions :example: response = client.put_logging_configuration( LoggingConfiguration={ 'ResourceArn': 'string', 'LogDestinationConfigs': [ 'string', ], 'RedactedFields': [ { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, ] } ) :type LoggingConfiguration: dict :param LoggingConfiguration: [REQUIRED]\nThe Amazon Kinesis Data Firehose that contains the inspected traffic information, the redacted fields details, and the Amazon Resource Name (ARN) of the web ACL to monitor.\n\nNote\nWhen specifying Type in RedactedFields , you must use one of the following values: URI , QUERY_STRING , HEADER , or METHOD .\n\n\nResourceArn (string) -- [REQUIRED]The Amazon Resource Name (ARN) of the web ACL that you want to associate with LogDestinationConfigs .\n\nLogDestinationConfigs (list) -- [REQUIRED]An array of Amazon Kinesis Data Firehose ARNs.\n\n(string) --\n\n\nRedactedFields (list) --The parts of the request that you want redacted from the logs. For example, if you redact the cookie field, the cookie field in the firehose will be xxx .\n\n(dict) --\nNote\nThis is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.\n\nFor the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use.\n\nSpecifies where in a web request to look for TargetString .\n\nType (string) -- [REQUIRED]The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following:\n\nHEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data .\nMETHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT .\nQUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any.\nURI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg .\nBODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet .\nSINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters.\nALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString .\n\n\nData (string) --When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive.\nWhen the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive.\nIf the value of Type is any other value, omit Data .\n\n\n\n\n\n\n :rtype: dict ReturnsResponse Syntax{ 'LoggingConfiguration': { 'ResourceArn': 'string', 'LogDestinationConfigs': [ 'string', ], 'RedactedFields': [ { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, ] } } Response Structure (dict) -- LoggingConfiguration (dict) --The LoggingConfiguration that you submitted in the request. ResourceArn (string) --The Amazon Resource Name (ARN) of the web ACL that you want to associate with LogDestinationConfigs . LogDestinationConfigs (list) --An array of Amazon Kinesis Data Firehose ARNs. (string) -- RedactedFields (list) --The parts of the request that you want redacted from the logs. For example, if you redact the cookie field, the cookie field in the firehose will be xxx . (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies where in a web request to look for TargetString . Type (string) --The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) --When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFServiceLinkedRoleErrorException :return: { 'LoggingConfiguration': { 'ResourceArn': 'string', 'LogDestinationConfigs': [ 'string', ], 'RedactedFields': [ { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, ] } } :returns: Associate that firehose to your web ACL using a PutLoggingConfiguration request. """ pass def put_permission_policy(ResourceArn=None, Policy=None): """ Attaches an IAM policy to the specified resource. The only supported use for this action is to share a RuleGroup across accounts. The PutPermissionPolicy is subject to the following restrictions: For more information, see IAM Policies . An example of a valid policy parameter is shown in the Examples section below. See also: AWS API Documentation Exceptions :example: response = client.put_permission_policy( ResourceArn='string', Policy='string' ) :type ResourceArn: string :param ResourceArn: [REQUIRED]\nThe Amazon Resource Name (ARN) of the RuleGroup to which you want to attach the policy.\n :type Policy: string :param Policy: [REQUIRED]\nThe policy to attach to the specified RuleGroup.\n :rtype: dict ReturnsResponse Syntax {} Response Structure (dict) -- Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFInvalidPermissionPolicyException :return: {} :returns: ResourceArn (string) -- [REQUIRED] The Amazon Resource Name (ARN) of the RuleGroup to which you want to attach the policy. Policy (string) -- [REQUIRED] The policy to attach to the specified RuleGroup. """ pass def tag_resource(ResourceARN=None, Tags=None): """ Associates tags with the specified AWS resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to "customer" and the value to the customer name or ID. You can specify one or more tags to add to each AWS resource, up to 50 tags for a resource. Tagging is only available through the API, SDKs, and CLI. You can\'t manage or view tags through the AWS WAF Classic console. You can use this action to tag the AWS resources that you manage through AWS WAF Classic: web ACLs, rule groups, and rules. See also: AWS API Documentation Exceptions :example: response = client.tag_resource( ResourceARN='string', Tags=[ { 'Key': 'string', 'Value': 'string' }, ] ) :type ResourceARN: string :param ResourceARN: [REQUIRED] :type Tags: list :param Tags: [REQUIRED]\n\n(dict) --\nNote\nThis is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.\n\nFor the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use.\n\nA tag associated with an AWS resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to 'customer' and the value to the customer name or ID. You can specify one or more tags to add to each AWS resource, up to 50 tags for a resource.\nTagging is only available through the API, SDKs, and CLI. You can\'t manage or view tags through the AWS WAF Classic console. You can tag the AWS resources that you manage through AWS WAF Classic: web ACLs, rule groups, and rules.\n\nKey (string) -- [REQUIRED]\nValue (string) -- [REQUIRED]\n\n\n\n :rtype: dict ReturnsResponse Syntax {} Response Structure (dict) -- Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFLimitsExceededException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFBadRequestException WAFRegional.Client.exceptions.WAFTagOperationException WAFRegional.Client.exceptions.WAFTagOperationInternalErrorException :return: {} :returns: (dict) -- """ pass def untag_resource(ResourceARN=None, TagKeys=None): """ See also: AWS API Documentation Exceptions :example: response = client.untag_resource( ResourceARN='string', TagKeys=[ 'string', ] ) :type ResourceARN: string :param ResourceARN: [REQUIRED] :type TagKeys: list :param TagKeys: [REQUIRED]\n\n(string) --\n\n :rtype: dict ReturnsResponse Syntax {} Response Structure (dict) -- Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFBadRequestException WAFRegional.Client.exceptions.WAFTagOperationException WAFRegional.Client.exceptions.WAFTagOperationInternalErrorException :return: {} :returns: (dict) -- """ pass def update_byte_match_set(ByteMatchSetId=None, ChangeToken=None, Updates=None): """ Inserts or deletes ByteMatchTuple objects (filters) in a ByteMatchSet . For each ByteMatchTuple object, you specify the following values: For example, you can add a ByteMatchSetUpdate object that matches web requests in which User-Agent headers contain the string BadBot . You can then configure AWS WAF to block those requests. To create and configure a ByteMatchSet , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions Examples The following example deletes a ByteMatchTuple object (filters) in an byte match set with the ID exampleIDs3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.update_byte_match_set( ByteMatchSetId='string', ChangeToken='string', Updates=[ { 'Action': 'INSERT'|'DELETE', 'ByteMatchTuple': { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TargetString': b'bytes', 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'PositionalConstraint': 'EXACTLY'|'STARTS_WITH'|'ENDS_WITH'|'CONTAINS'|'CONTAINS_WORD' } }, ] ) :type ByteMatchSetId: string :param ByteMatchSetId: [REQUIRED]\nThe ByteMatchSetId of the ByteMatchSet that you want to update. ByteMatchSetId is returned by CreateByteMatchSet and by ListByteMatchSets .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :type Updates: list :param Updates: [REQUIRED]\nAn array of ByteMatchSetUpdate objects that you want to insert into or delete from a ByteMatchSet . For more information, see the applicable data types:\n\nByteMatchSetUpdate : Contains Action and ByteMatchTuple\nByteMatchTuple : Contains FieldToMatch , PositionalConstraint , TargetString , and TextTransformation\nFieldToMatch : Contains Data and Type\n\n\n(dict) --\nNote\nThis is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.\n\nFor the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use.\n\nIn an UpdateByteMatchSet request, ByteMatchSetUpdate specifies whether to insert or delete a ByteMatchTuple and includes the settings for the ByteMatchTuple .\n\nAction (string) -- [REQUIRED]Specifies whether to insert or delete a ByteMatchTuple .\n\nByteMatchTuple (dict) -- [REQUIRED]Information about the part of a web request that you want AWS WAF to inspect and the value that you want AWS WAF to search for. If you specify DELETE for the value of Action , the ByteMatchTuple values must exactly match the values in the ByteMatchTuple that you want to delete from the ByteMatchSet .\n\nFieldToMatch (dict) -- [REQUIRED]The part of a web request that you want AWS WAF to search, such as a specified header or a query string. For more information, see FieldToMatch .\n\nType (string) -- [REQUIRED]The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following:\n\nHEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data .\nMETHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT .\nQUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any.\nURI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg .\nBODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet .\nSINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters.\nALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString .\n\n\nData (string) --When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive.\nWhen the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive.\nIf the value of Type is any other value, omit Data .\n\n\n\nTargetString (bytes) -- [REQUIRED]The value that you want AWS WAF to search for. AWS WAF searches for the specified string in the part of web requests that you specified in FieldToMatch . The maximum length of the value is 50 bytes.\nValid values depend on the values that you specified for FieldToMatch :\n\nHEADER : The value that you want AWS WAF to search for in the request header that you specified in FieldToMatch , for example, the value of the User-Agent or Referer header.\nMETHOD : The HTTP method, which indicates the type of operation specified in the request. CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT .\nQUERY_STRING : The value that you want AWS WAF to search for in the query string, which is the part of a URL that appears after a ? character.\nURI : The value that you want AWS WAF to search for in the part of a URL that identifies a resource, for example, /images/daily-ad.jpg .\nBODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet .\nSINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters.\nALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but instead of inspecting a single parameter, AWS WAF inspects all parameters within the query string for the value or regex pattern that you specify in TargetString .\n\nIf TargetString includes alphabetic characters A-Z and a-z, note that the value is case sensitive.\n\nIf you\'re using the AWS WAF API\nSpecify a base64-encoded version of the value. The maximum length of the value before you base64-encode it is 50 bytes.\nFor example, suppose the value of Type is HEADER and the value of Data is User-Agent . If you want to search the User-Agent header for the value BadBot , you base64-encode BadBot using MIME base64-encoding and include the resulting value, QmFkQm90 , in the value of TargetString .\n\nIf you\'re using the AWS CLI or one of the AWS SDKs\nThe value that you want AWS WAF to search for. The SDK automatically base64 encodes the value.\n\nTextTransformation (string) -- [REQUIRED]Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on FieldToMatch before inspecting it for a match.\nYou can only specify a single type of TextTransformation.\n\nCMD_LINE\nWhen you\'re concerned that attackers are injecting an operating system command line command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations:\n\nDelete the following characters: ' \' ^\nDelete spaces before the following characters: / (\nReplace the following characters with a space: , ;\nReplace multiple spaces with one space\nConvert uppercase letters (A-Z) to lowercase (a-z)\n\n\nCOMPRESS_WHITE_SPACE\nUse this option to replace the following characters with a space character (decimal 32):\n\nf, formfeed, decimal 12\nt, tab, decimal 9\nn, newline, decimal 10\nr, carriage return, decimal 13\nv, vertical tab, decimal 11\nnon-breaking space, decimal 160\n\n\nCOMPRESS_WHITE_SPACE also replaces multiple spaces with one space.HTML_ENTITY_DECODE\n\nUse this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations:\n\nReplaces (ampersand)quot; with '\nReplaces (ampersand)nbsp; with a non-breaking space, decimal 160\nReplaces (ampersand)lt; with a 'less than' symbol\nReplaces (ampersand)gt; with >\nReplaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters\nReplaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters\n\n\nLOWERCASE\nUse this option to convert uppercase letters (A-Z) to lowercase (a-z).\n\nURL_DECODE\nUse this option to decode a URL-encoded value.\n\nNONE\nSpecify NONE if you don\'t want to perform any text transformations.\n\nPositionalConstraint (string) -- [REQUIRED]Within the portion of a web request that you want to search (for example, in the query string, if any), specify where you want AWS WAF to search. Valid values include the following:\n\nCONTAINS\nThe specified part of the web request must include the value of TargetString , but the location doesn\'t matter.\n\nCONTAINS_WORD\nThe specified part of the web request must include the value of TargetString , and TargetString must contain only alphanumeric characters or underscore (A-Z, a-z, 0-9, or _). In addition, TargetString must be a word, which means one of the following:\n\nTargetString exactly matches the value of the specified part of the web request, such as the value of a header.\nTargetString is at the beginning of the specified part of the web request and is followed by a character other than an alphanumeric character or underscore (_), for example, BadBot; .\nTargetString is at the end of the specified part of the web request and is preceded by a character other than an alphanumeric character or underscore (_), for example, ;BadBot .\nTargetString is in the middle of the specified part of the web request and is preceded and followed by characters other than alphanumeric characters or underscore (_), for example, -BadBot; .\n\n\nEXACTLY\nThe value of the specified part of the web request must exactly match the value of TargetString .\n\nSTARTS_WITH\nThe value of TargetString must appear at the beginning of the specified part of the web request.\n\nENDS_WITH\nThe value of TargetString must appear at the end of the specified part of the web request.\n\n\n\n\n\n\n :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the UpdateByteMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFNonexistentContainerException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFLimitsExceededException Examples The following example deletes a ByteMatchTuple object (filters) in an byte match set with the ID exampleIDs3t-46da-4fdb-b8d5-abc321j569j5. response = client.update_byte_match_set( ByteMatchSetId='exampleIDs3t-46da-4fdb-b8d5-abc321j569j5', ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', Updates=[ { 'Action': 'DELETE', 'ByteMatchTuple': { 'FieldToMatch': { 'Data': 'referer', 'Type': 'HEADER', }, 'PositionalConstraint': 'CONTAINS', 'TargetString': 'badrefer1', 'TextTransformation': 'NONE', }, }, ], ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } :returns: Create a ByteMatchSet. For more information, see CreateByteMatchSet . Use GetChangeToken to get the change token that you provide in the ChangeToken parameter of an UpdateByteMatchSet request. Submit an UpdateByteMatchSet request to specify the part of the request that you want AWS WAF to inspect (for example, the header or the URI) and the value that you want AWS WAF to watch for. """ pass def update_geo_match_set(GeoMatchSetId=None, ChangeToken=None, Updates=None): """ Inserts or deletes GeoMatchConstraint objects in an GeoMatchSet . For each GeoMatchConstraint object, you specify the following values: To create and configure an GeoMatchSet , perform the following steps: When you update an GeoMatchSet , you specify the country that you want to add and/or the country that you want to delete. If you want to change a country, you delete the existing country and add the new one. For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions :example: response = client.update_geo_match_set( GeoMatchSetId='string', ChangeToken='string', Updates=[ { 'Action': 'INSERT'|'DELETE', 'GeoMatchConstraint': { 'Type': 'Country', 'Value': 'AF'|'AX'|'AL'|'DZ'|'AS'|'AD'|'AO'|'AI'|'AQ'|'AG'|'AR'|'AM'|'AW'|'AU'|'AT'|'AZ'|'BS'|'BH'|'BD'|'BB'|'BY'|'BE'|'BZ'|'BJ'|'BM'|'BT'|'BO'|'BQ'|'BA'|'BW'|'BV'|'BR'|'IO'|'BN'|'BG'|'BF'|'BI'|'KH'|'CM'|'CA'|'CV'|'KY'|'CF'|'TD'|'CL'|'CN'|'CX'|'CC'|'CO'|'KM'|'CG'|'CD'|'CK'|'CR'|'CI'|'HR'|'CU'|'CW'|'CY'|'CZ'|'DK'|'DJ'|'DM'|'DO'|'EC'|'EG'|'SV'|'GQ'|'ER'|'EE'|'ET'|'FK'|'FO'|'FJ'|'FI'|'FR'|'GF'|'PF'|'TF'|'GA'|'GM'|'GE'|'DE'|'GH'|'GI'|'GR'|'GL'|'GD'|'GP'|'GU'|'GT'|'GG'|'GN'|'GW'|'GY'|'HT'|'HM'|'VA'|'HN'|'HK'|'HU'|'IS'|'IN'|'ID'|'IR'|'IQ'|'IE'|'IM'|'IL'|'IT'|'JM'|'JP'|'JE'|'JO'|'KZ'|'KE'|'KI'|'KP'|'KR'|'KW'|'KG'|'LA'|'LV'|'LB'|'LS'|'LR'|'LY'|'LI'|'LT'|'LU'|'MO'|'MK'|'MG'|'MW'|'MY'|'MV'|'ML'|'MT'|'MH'|'MQ'|'MR'|'MU'|'YT'|'MX'|'FM'|'MD'|'MC'|'MN'|'ME'|'MS'|'MA'|'MZ'|'MM'|'NA'|'NR'|'NP'|'NL'|'NC'|'NZ'|'NI'|'NE'|'NG'|'NU'|'NF'|'MP'|'NO'|'OM'|'PK'|'PW'|'PS'|'PA'|'PG'|'PY'|'PE'|'PH'|'PN'|'PL'|'PT'|'PR'|'QA'|'RE'|'RO'|'RU'|'RW'|'BL'|'SH'|'KN'|'LC'|'MF'|'PM'|'VC'|'WS'|'SM'|'ST'|'SA'|'SN'|'RS'|'SC'|'SL'|'SG'|'SX'|'SK'|'SI'|'SB'|'SO'|'ZA'|'GS'|'SS'|'ES'|'LK'|'SD'|'SR'|'SJ'|'SZ'|'SE'|'CH'|'SY'|'TW'|'TJ'|'TZ'|'TH'|'TL'|'TG'|'TK'|'TO'|'TT'|'TN'|'TR'|'TM'|'TC'|'TV'|'UG'|'UA'|'AE'|'GB'|'US'|'UM'|'UY'|'UZ'|'VU'|'VE'|'VN'|'VG'|'VI'|'WF'|'EH'|'YE'|'ZM'|'ZW' } }, ] ) :type GeoMatchSetId: string :param GeoMatchSetId: [REQUIRED]\nThe GeoMatchSetId of the GeoMatchSet that you want to update. GeoMatchSetId is returned by CreateGeoMatchSet and by ListGeoMatchSets .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :type Updates: list :param Updates: [REQUIRED]\nAn array of GeoMatchSetUpdate objects that you want to insert into or delete from an GeoMatchSet . For more information, see the applicable data types:\n\nGeoMatchSetUpdate : Contains Action and GeoMatchConstraint\nGeoMatchConstraint : Contains Type and Value You can have only one Type and Value per GeoMatchConstraint . To add multiple countries, include multiple GeoMatchSetUpdate objects in your request.\n\n\n(dict) --\nNote\nThis is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.\n\nFor the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use.\n\nSpecifies the type of update to perform to an GeoMatchSet with UpdateGeoMatchSet .\n\nAction (string) -- [REQUIRED]Specifies whether to insert or delete a country with UpdateGeoMatchSet .\n\nGeoMatchConstraint (dict) -- [REQUIRED]The country from which web requests originate that you want AWS WAF to search for.\n\nType (string) -- [REQUIRED]The type of geographical area you want AWS WAF to search for. Currently Country is the only valid value.\n\nValue (string) -- [REQUIRED]The country that you want AWS WAF to search for.\n\n\n\n\n\n\n :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the UpdateGeoMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFNonexistentContainerException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFLimitsExceededException :return: { 'ChangeToken': 'string' } :returns: Submit a CreateGeoMatchSet request. Use GetChangeToken to get the change token that you provide in the ChangeToken parameter of an UpdateGeoMatchSet request. Submit an UpdateGeoMatchSet request to specify the country that you want AWS WAF to watch for. """ pass def update_ip_set(IPSetId=None, ChangeToken=None, Updates=None): """ Inserts or deletes IPSetDescriptor objects in an IPSet . For each IPSetDescriptor object, you specify the following values: AWS WAF supports IPv4 address ranges: /8 and any range between /16 through /32. AWS WAF supports IPv6 address ranges: /24, /32, /48, /56, /64, and /128. For more information about CIDR notation, see the Wikipedia entry Classless Inter-Domain Routing . IPv6 addresses can be represented using any of the following formats: You use an IPSet to specify which web requests you want to allow or block based on the IP addresses that the requests originated from. For example, if you\'re receiving a lot of requests from one or a small number of IP addresses and you want to block the requests, you can create an IPSet that specifies those IP addresses, and then configure AWS WAF to block the requests. To create and configure an IPSet , perform the following steps: When you update an IPSet , you specify the IP addresses that you want to add and/or the IP addresses that you want to delete. If you want to change an IP address, you delete the existing IP address and add the new one. You can insert a maximum of 1000 addresses in a single request. For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions Examples The following example deletes an IPSetDescriptor object in an IP match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.update_ip_set( IPSetId='string', ChangeToken='string', Updates=[ { 'Action': 'INSERT'|'DELETE', 'IPSetDescriptor': { 'Type': 'IPV4'|'IPV6', 'Value': 'string' } }, ] ) :type IPSetId: string :param IPSetId: [REQUIRED]\nThe IPSetId of the IPSet that you want to update. IPSetId is returned by CreateIPSet and by ListIPSets .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :type Updates: list :param Updates: [REQUIRED]\nAn array of IPSetUpdate objects that you want to insert into or delete from an IPSet . For more information, see the applicable data types:\n\nIPSetUpdate : Contains Action and IPSetDescriptor\nIPSetDescriptor : Contains Type and Value\n\nYou can insert a maximum of 1000 addresses in a single request.\n\n(dict) --\nNote\nThis is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.\n\nFor the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use.\n\nSpecifies the type of update to perform to an IPSet with UpdateIPSet .\n\nAction (string) -- [REQUIRED]Specifies whether to insert or delete an IP address with UpdateIPSet .\n\nIPSetDescriptor (dict) -- [REQUIRED]The IP address type (IPV4 or IPV6 ) and the IP address range (in CIDR notation) that web requests originate from.\n\nType (string) -- [REQUIRED]Specify IPV4 or IPV6 .\n\nValue (string) -- [REQUIRED]Specify an IPv4 address by using CIDR notation. For example:\n\nTo configure AWS WAF to allow, block, or count requests that originated from the IP address 192.0.2.44, specify 192.0.2.44/32 .\nTo configure AWS WAF to allow, block, or count requests that originated from IP addresses from 192.0.2.0 to 192.0.2.255, specify 192.0.2.0/24 .\n\nFor more information about CIDR notation, see the Wikipedia entry Classless Inter-Domain Routing .\nSpecify an IPv6 address by using CIDR notation. For example:\n\nTo configure AWS WAF to allow, block, or count requests that originated from the IP address 1111:0000:0000:0000:0000:0000:0000:0111, specify 1111:0000:0000:0000:0000:0000:0000:0111/128 .\nTo configure AWS WAF to allow, block, or count requests that originated from IP addresses 1111:0000:0000:0000:0000:0000:0000:0000 to 1111:0000:0000:0000:ffff:ffff:ffff:ffff, specify 1111:0000:0000:0000:0000:0000:0000:0000/64 .\n\n\n\n\n\n\n\n :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the UpdateIPSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFNonexistentContainerException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFLimitsExceededException Examples The following example deletes an IPSetDescriptor object in an IP match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. response = client.update_ip_set( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', IPSetId='example1ds3t-46da-4fdb-b8d5-abc321j569j5', Updates=[ { 'Action': 'DELETE', 'IPSetDescriptor': { 'Type': 'IPV4', 'Value': '192.0.2.44/32', }, }, ], ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } :returns: 1111:0000:0000:0000:0000:0000:0000:0111/128 1111:0:0:0:0:0:0:0111/128 1111::0111/128 1111::111/128 """ pass def update_rate_based_rule(RuleId=None, ChangeToken=None, Updates=None, RateLimit=None): """ Inserts or deletes Predicate objects in a rule and updates the RateLimit in the rule. Each Predicate object identifies a predicate, such as a ByteMatchSet or an IPSet , that specifies the web requests that you want to block or count. The RateLimit specifies the number of requests every five minutes that triggers the rule. If you add more than one predicate to a RateBasedRule , a request must match all the predicates and exceed the RateLimit to be counted or blocked. For example, suppose you add the following to a RateBasedRule : Further, you specify a RateLimit of 1,000. You then add the RateBasedRule to a WebACL and specify that you want to block requests that satisfy the rule. For a request to be blocked, it must come from the IP address 192.0.2.44 and the User-Agent header in the request must contain the value BadBot . Further, requests that match these two conditions much be received at a rate of more than 1,000 every five minutes. If the rate drops below this limit, AWS WAF no longer blocks the requests. As a second example, suppose you want to limit requests to a particular page on your site. To do this, you could add the following to a RateBasedRule : Further, you specify a RateLimit of 1,000. By adding this RateBasedRule to a WebACL , you could limit requests to your login page without affecting the rest of your site. See also: AWS API Documentation Exceptions :example: response = client.update_rate_based_rule( RuleId='string', ChangeToken='string', Updates=[ { 'Action': 'INSERT'|'DELETE', 'Predicate': { 'Negated': True|False, 'Type': 'IPMatch'|'ByteMatch'|'SqlInjectionMatch'|'GeoMatch'|'SizeConstraint'|'XssMatch'|'RegexMatch', 'DataId': 'string' } }, ], RateLimit=123 ) :type RuleId: string :param RuleId: [REQUIRED]\nThe RuleId of the RateBasedRule that you want to update. RuleId is returned by CreateRateBasedRule and by ListRateBasedRules .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :type Updates: list :param Updates: [REQUIRED]\nAn array of RuleUpdate objects that you want to insert into or delete from a RateBasedRule .\n\n(dict) --\nNote\nThis is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.\n\nFor the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use.\n\nSpecifies a Predicate (such as an IPSet ) and indicates whether you want to add it to a Rule or delete it from a Rule .\n\nAction (string) -- [REQUIRED]Specify INSERT to add a Predicate to a Rule . Use DELETE to remove a Predicate from a Rule .\n\nPredicate (dict) -- [REQUIRED]The ID of the Predicate (such as an IPSet ) that you want to add to a Rule .\n\nNegated (boolean) -- [REQUIRED]Set Negated to False if you want AWS WAF to allow, block, or count requests based on the settings in the specified ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , or SizeConstraintSet . For example, if an IPSet includes the IP address 192.0.2.44 , AWS WAF will allow or block requests based on that IP address.\nSet Negated to True if you want AWS WAF to allow or block a request based on the negation of the settings in the ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , or SizeConstraintSet . For example, if an IPSet includes the IP address 192.0.2.44 , AWS WAF will allow, block, or count requests based on all IP addresses except 192.0.2.44 .\n\nType (string) -- [REQUIRED]The type of predicate in a Rule , such as ByteMatch or IPSet .\n\nDataId (string) -- [REQUIRED]A unique identifier for a predicate in a Rule , such as ByteMatchSetId or IPSetId . The ID is returned by the corresponding Create or List command.\n\n\n\n\n\n\n :type RateLimit: integer :param RateLimit: [REQUIRED]\nThe maximum number of requests, which have an identical value in the field specified by the RateKey , allowed in a five-minute period. If the number of requests exceeds the RateLimit and the other predicates specified in the rule are also met, AWS WAF triggers the action that is specified for this rule.\n :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the UpdateRateBasedRule request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFNonexistentContainerException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFLimitsExceededException :return: { 'ChangeToken': 'string' } :returns: A ByteMatchSet with FieldToMatch of URI A PositionalConstraint of STARTS_WITH A TargetString of login """ pass def update_regex_match_set(RegexMatchSetId=None, Updates=None, ChangeToken=None): """ Inserts or deletes RegexMatchTuple objects (filters) in a RegexMatchSet . For each RegexMatchSetUpdate object, you specify the following values: For example, you can create a RegexPatternSet that matches any requests with User-Agent headers that contain the string B[a@]dB[o0]t . You can then configure AWS WAF to reject those requests. To create and configure a RegexMatchSet , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions :example: response = client.update_regex_match_set( RegexMatchSetId='string', Updates=[ { 'Action': 'INSERT'|'DELETE', 'RegexMatchTuple': { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'RegexPatternSetId': 'string' } }, ], ChangeToken='string' ) :type RegexMatchSetId: string :param RegexMatchSetId: [REQUIRED]\nThe RegexMatchSetId of the RegexMatchSet that you want to update. RegexMatchSetId is returned by CreateRegexMatchSet and by ListRegexMatchSets .\n :type Updates: list :param Updates: [REQUIRED]\nAn array of RegexMatchSetUpdate objects that you want to insert into or delete from a RegexMatchSet . For more information, see RegexMatchTuple .\n\n(dict) --\nNote\nThis is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.\n\nFor the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use.\n\nIn an UpdateRegexMatchSet request, RegexMatchSetUpdate specifies whether to insert or delete a RegexMatchTuple and includes the settings for the RegexMatchTuple .\n\nAction (string) -- [REQUIRED]Specifies whether to insert or delete a RegexMatchTuple .\n\nRegexMatchTuple (dict) -- [REQUIRED]Information about the part of a web request that you want AWS WAF to inspect and the identifier of the regular expression (regex) pattern that you want AWS WAF to search for. If you specify DELETE for the value of Action , the RegexMatchTuple values must exactly match the values in the RegexMatchTuple that you want to delete from the RegexMatchSet .\n\nFieldToMatch (dict) -- [REQUIRED]Specifies where in a web request to look for the RegexPatternSet .\n\nType (string) -- [REQUIRED]The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following:\n\nHEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data .\nMETHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT .\nQUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any.\nURI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg .\nBODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet .\nSINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters.\nALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString .\n\n\nData (string) --When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive.\nWhen the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive.\nIf the value of Type is any other value, omit Data .\n\n\n\nTextTransformation (string) -- [REQUIRED]Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on RegexPatternSet before inspecting a request for a match.\nYou can only specify a single type of TextTransformation.\n\nCMD_LINE\nWhen you\'re concerned that attackers are injecting an operating system commandline command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations:\n\nDelete the following characters: ' \' ^\nDelete spaces before the following characters: / (\nReplace the following characters with a space: , ;\nReplace multiple spaces with one space\nConvert uppercase letters (A-Z) to lowercase (a-z)\n\n\nCOMPRESS_WHITE_SPACE\nUse this option to replace the following characters with a space character (decimal 32):\n\nf, formfeed, decimal 12\nt, tab, decimal 9\nn, newline, decimal 10\nr, carriage return, decimal 13\nv, vertical tab, decimal 11\nnon-breaking space, decimal 160\n\n\nCOMPRESS_WHITE_SPACE also replaces multiple spaces with one space.HTML_ENTITY_DECODE\n\nUse this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations:\n\nReplaces (ampersand)quot; with '\nReplaces (ampersand)nbsp; with a non-breaking space, decimal 160\nReplaces (ampersand)lt; with a 'less than' symbol\nReplaces (ampersand)gt; with >\nReplaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters\nReplaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters\n\n\nLOWERCASE\nUse this option to convert uppercase letters (A-Z) to lowercase (a-z).\n\nURL_DECODE\nUse this option to decode a URL-encoded value.\n\nNONE\nSpecify NONE if you don\'t want to perform any text transformations.\n\nRegexPatternSetId (string) -- [REQUIRED]The RegexPatternSetId for a RegexPatternSet . You use RegexPatternSetId to get information about a RegexPatternSet (see GetRegexPatternSet ), update a RegexPatternSet (see UpdateRegexPatternSet ), insert a RegexPatternSet into a RegexMatchSet or delete one from a RegexMatchSet (see UpdateRegexMatchSet ), and delete an RegexPatternSet from AWS WAF (see DeleteRegexPatternSet ).\n\nRegexPatternSetId is returned by CreateRegexPatternSet and by ListRegexPatternSets .\n\n\n\n\n\n\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the UpdateRegexMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFDisallowedNameException WAFRegional.Client.exceptions.WAFLimitsExceededException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFNonexistentContainerException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFInvalidAccountException :return: { 'ChangeToken': 'string' } :returns: Create a RegexMatchSet. For more information, see CreateRegexMatchSet . Use GetChangeToken to get the change token that you provide in the ChangeToken parameter of an UpdateRegexMatchSet request. Submit an UpdateRegexMatchSet request to specify the part of the request that you want AWS WAF to inspect (for example, the header or the URI) and the identifier of the RegexPatternSet that contain the regular expression patters you want AWS WAF to watch for. """ pass def update_regex_pattern_set(RegexPatternSetId=None, Updates=None, ChangeToken=None): """ Inserts or deletes RegexPatternString objects in a RegexPatternSet . For each RegexPatternString object, you specify the following values: For example, you can create a RegexPatternString such as B[a@]dB[o0]t . AWS WAF will match this RegexPatternString to: To create and configure a RegexPatternSet , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions :example: response = client.update_regex_pattern_set( RegexPatternSetId='string', Updates=[ { 'Action': 'INSERT'|'DELETE', 'RegexPatternString': 'string' }, ], ChangeToken='string' ) :type RegexPatternSetId: string :param RegexPatternSetId: [REQUIRED]\nThe RegexPatternSetId of the RegexPatternSet that you want to update. RegexPatternSetId is returned by CreateRegexPatternSet and by ListRegexPatternSets .\n :type Updates: list :param Updates: [REQUIRED]\nAn array of RegexPatternSetUpdate objects that you want to insert into or delete from a RegexPatternSet .\n\n(dict) --\nNote\nThis is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.\n\nFor the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use.\n\nIn an UpdateRegexPatternSet request, RegexPatternSetUpdate specifies whether to insert or delete a RegexPatternString and includes the settings for the RegexPatternString .\n\nAction (string) -- [REQUIRED]Specifies whether to insert or delete a RegexPatternString .\n\nRegexPatternString (string) -- [REQUIRED]Specifies the regular expression (regex) pattern that you want AWS WAF to search for, such as B[a@]dB[o0]t .\n\n\n\n\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the UpdateRegexPatternSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFLimitsExceededException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFNonexistentContainerException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidRegexPatternException :return: { 'ChangeToken': 'string' } :returns: BadBot BadB0t B@dBot B@dB0t """ pass def update_rule(RuleId=None, ChangeToken=None, Updates=None): """ Inserts or deletes Predicate objects in a Rule . Each Predicate object identifies a predicate, such as a ByteMatchSet or an IPSet , that specifies the web requests that you want to allow, block, or count. If you add more than one predicate to a Rule , a request must match all of the specifications to be allowed, blocked, or counted. For example, suppose that you add the following to a Rule : You then add the Rule to a WebACL and specify that you want to block requests that satisfy the Rule . For a request to be blocked, the User-Agent header in the request must contain the value BadBot and the request must originate from the IP address 192.0.2.44. To create and configure a Rule , perform the following steps: If you want to replace one ByteMatchSet or IPSet with another, you delete the existing one and add the new one. For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions Examples The following example deletes a Predicate object in a rule with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.update_rule( RuleId='string', ChangeToken='string', Updates=[ { 'Action': 'INSERT'|'DELETE', 'Predicate': { 'Negated': True|False, 'Type': 'IPMatch'|'ByteMatch'|'SqlInjectionMatch'|'GeoMatch'|'SizeConstraint'|'XssMatch'|'RegexMatch', 'DataId': 'string' } }, ] ) :type RuleId: string :param RuleId: [REQUIRED]\nThe RuleId of the Rule that you want to update. RuleId is returned by CreateRule and by ListRules .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :type Updates: list :param Updates: [REQUIRED]\nAn array of RuleUpdate objects that you want to insert into or delete from a Rule . For more information, see the applicable data types:\n\nRuleUpdate : Contains Action and Predicate\nPredicate : Contains DataId , Negated , and Type\nFieldToMatch : Contains Data and Type\n\n\n(dict) --\nNote\nThis is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.\n\nFor the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use.\n\nSpecifies a Predicate (such as an IPSet ) and indicates whether you want to add it to a Rule or delete it from a Rule .\n\nAction (string) -- [REQUIRED]Specify INSERT to add a Predicate to a Rule . Use DELETE to remove a Predicate from a Rule .\n\nPredicate (dict) -- [REQUIRED]The ID of the Predicate (such as an IPSet ) that you want to add to a Rule .\n\nNegated (boolean) -- [REQUIRED]Set Negated to False if you want AWS WAF to allow, block, or count requests based on the settings in the specified ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , or SizeConstraintSet . For example, if an IPSet includes the IP address 192.0.2.44 , AWS WAF will allow or block requests based on that IP address.\nSet Negated to True if you want AWS WAF to allow or block a request based on the negation of the settings in the ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , or SizeConstraintSet . For example, if an IPSet includes the IP address 192.0.2.44 , AWS WAF will allow, block, or count requests based on all IP addresses except 192.0.2.44 .\n\nType (string) -- [REQUIRED]The type of predicate in a Rule , such as ByteMatch or IPSet .\n\nDataId (string) -- [REQUIRED]A unique identifier for a predicate in a Rule , such as ByteMatchSetId or IPSetId . The ID is returned by the corresponding Create or List command.\n\n\n\n\n\n\n :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the UpdateRule request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFNonexistentContainerException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFLimitsExceededException Examples The following example deletes a Predicate object in a rule with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. response = client.update_rule( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', RuleId='example1ds3t-46da-4fdb-b8d5-abc321j569j5', Updates=[ { 'Action': 'DELETE', 'Predicate': { 'DataId': 'MyByteMatchSetID', 'Negated': False, 'Type': 'ByteMatch', }, }, ], ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } :returns: Create and update the predicates that you want to include in the Rule . Create the Rule . See CreateRule . Use GetChangeToken to get the change token that you provide in the ChangeToken parameter of an UpdateRule request. Submit an UpdateRule request to add predicates to the Rule . Create and update a WebACL that contains the Rule . See CreateWebACL . """ pass def update_rule_group(RuleGroupId=None, Updates=None, ChangeToken=None): """ Inserts or deletes ActivatedRule objects in a RuleGroup . You can only insert REGULAR rules into a rule group. You can have a maximum of ten rules per rule group. To create and configure a RuleGroup , perform the following steps: If you want to replace one Rule with another, you delete the existing one and add the new one. For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions :example: response = client.update_rule_group( RuleGroupId='string', Updates=[ { 'Action': 'INSERT'|'DELETE', 'ActivatedRule': { 'Priority': 123, 'RuleId': 'string', 'Action': { 'Type': 'BLOCK'|'ALLOW'|'COUNT' }, 'OverrideAction': { 'Type': 'NONE'|'COUNT' }, 'Type': 'REGULAR'|'RATE_BASED'|'GROUP', 'ExcludedRules': [ { 'RuleId': 'string' }, ] } }, ], ChangeToken='string' ) :type RuleGroupId: string :param RuleGroupId: [REQUIRED]\nThe RuleGroupId of the RuleGroup that you want to update. RuleGroupId is returned by CreateRuleGroup and by ListRuleGroups .\n :type Updates: list :param Updates: [REQUIRED]\nAn array of RuleGroupUpdate objects that you want to insert into or delete from a RuleGroup .\nYou can only insert REGULAR rules into a rule group.\n\nActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction .\n\n(dict) --\nNote\nThis is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.\n\nFor the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use.\n\nSpecifies an ActivatedRule and indicates whether you want to add it to a RuleGroup or delete it from a RuleGroup .\n\nAction (string) -- [REQUIRED]Specify INSERT to add an ActivatedRule to a RuleGroup . Use DELETE to remove an ActivatedRule from a RuleGroup .\n\nActivatedRule (dict) -- [REQUIRED]The ActivatedRule object specifies a Rule that you want to insert or delete, the priority of the Rule in the WebACL , and the action that you want AWS WAF to take when a web request matches the Rule (ALLOW , BLOCK , or COUNT ).\n\nPriority (integer) -- [REQUIRED]Specifies the order in which the Rules in a WebACL are evaluated. Rules with a lower value for Priority are evaluated before Rules with a higher value. The value must be a unique integer. If you add multiple Rules to a WebACL , the values don\'t need to be consecutive.\n\nRuleId (string) -- [REQUIRED]The RuleId for a Rule . You use RuleId to get more information about a Rule (see GetRule ), update a Rule (see UpdateRule ), insert a Rule into a WebACL or delete a one from a WebACL (see UpdateWebACL ), or delete a Rule from AWS WAF (see DeleteRule ).\n\nRuleId is returned by CreateRule and by ListRules .\n\nAction (dict) --Specifies the action that CloudFront or AWS WAF takes when a web request matches the conditions in the Rule . Valid values for Action include the following:\n\nALLOW : CloudFront responds with the requested object.\nBLOCK : CloudFront responds with an HTTP 403 (Forbidden) status code.\nCOUNT : AWS WAF increments a counter of requests that match the conditions in the rule and then continues to inspect the web request based on the remaining rules in the web ACL.\n\n\nActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case, you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction .\n\nType (string) -- [REQUIRED]Specifies how you want AWS WAF to respond to requests that match the settings in a Rule . Valid settings include the following:\n\nALLOW : AWS WAF allows requests\nBLOCK : AWS WAF blocks requests\nCOUNT : AWS WAF increments a counter of the requests that match all of the conditions in the rule. AWS WAF then continues to inspect the web request based on the remaining rules in the web ACL. You can\'t specify COUNT for the default action for a WebACL .\n\n\n\n\nOverrideAction (dict) --Use the OverrideAction to test your RuleGroup .\nAny rule in a RuleGroup can potentially block a request. If you set the OverrideAction to None , the RuleGroup will block a request if any individual rule in the RuleGroup matches the request and is configured to block that request. However if you first want to test the RuleGroup , set the OverrideAction to Count . The RuleGroup will then override any block action specified by individual rules contained within the group. Instead of blocking matching requests, those requests will be counted. You can view a record of counted requests using GetSampledRequests .\n\nActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction .\n\nType (string) -- [REQUIRED]\nCOUNT overrides the action specified by the individual rule within a RuleGroup . If set to NONE , the rule\'s action will take place.\n\n\n\nType (string) --The rule type, either REGULAR , as defined by Rule , RATE_BASED , as defined by RateBasedRule , or GROUP , as defined by RuleGroup . The default is REGULAR. Although this field is optional, be aware that if you try to add a RATE_BASED rule to a web ACL without setting the type, the UpdateWebACL request will fail because the request tries to add a REGULAR rule with the specified ID, which does not exist.\n\nExcludedRules (list) --An array of rules to exclude from a rule group. This is applicable only when the ActivatedRule refers to a RuleGroup .\nSometimes it is necessary to troubleshoot rule groups that are blocking traffic unexpectedly (false positives). One troubleshooting technique is to identify the specific rule within the rule group that is blocking the legitimate traffic and then disable (exclude) that particular rule. You can exclude rules from both your own rule groups and AWS Marketplace rule groups that have been associated with a web ACL.\nSpecifying ExcludedRules does not remove those rules from the rule group. Rather, it changes the action for the rules to COUNT . Therefore, requests that match an ExcludedRule are counted but not blocked. The RuleGroup owner will receive COUNT metrics for each ExcludedRule .\nIf you want to exclude rules from a rule group that is already associated with a web ACL, perform the following steps:\n\nUse the AWS WAF logs to identify the IDs of the rules that you want to exclude. For more information about the logs, see Logging Web ACL Traffic Information .\nSubmit an UpdateWebACL request that has two actions:\nThe first action deletes the existing rule group from the web ACL. That is, in the UpdateWebACL request, the first Updates:Action should be DELETE and Updates:ActivatedRule:RuleId should be the rule group that contains the rules that you want to exclude.\nThe second action inserts the same rule group back in, but specifying the rules to exclude. That is, the second Updates:Action should be INSERT , Updates:ActivatedRule:RuleId should be the rule group that you just removed, and ExcludedRules should contain the rules that you want to exclude.\n\n\n\n\n(dict) --\nNote\nThis is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.\n\nFor the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use.\n\nThe rule to exclude from a rule group. This is applicable only when the ActivatedRule refers to a RuleGroup . The rule must belong to the RuleGroup that is specified by the ActivatedRule .\n\nRuleId (string) -- [REQUIRED]The unique identifier for the rule to exclude from the rule group.\n\n\n\n\n\n\n\n\n\n\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the UpdateRuleGroup request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFNonexistentContainerException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFLimitsExceededException WAFRegional.Client.exceptions.WAFInvalidParameterException :return: { 'ChangeToken': 'string' } :returns: RuleGroupId (string) -- [REQUIRED] The RuleGroupId of the RuleGroup that you want to update. RuleGroupId is returned by CreateRuleGroup and by ListRuleGroups . Updates (list) -- [REQUIRED] An array of RuleGroupUpdate objects that you want to insert into or delete from a RuleGroup . You can only insert REGULAR rules into a rule group. ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction . (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies an ActivatedRule and indicates whether you want to add it to a RuleGroup or delete it from a RuleGroup . Action (string) -- [REQUIRED]Specify INSERT to add an ActivatedRule to a RuleGroup . Use DELETE to remove an ActivatedRule from a RuleGroup . ActivatedRule (dict) -- [REQUIRED]The ActivatedRule object specifies a Rule that you want to insert or delete, the priority of the Rule in the WebACL , and the action that you want AWS WAF to take when a web request matches the Rule (ALLOW , BLOCK , or COUNT ). Priority (integer) -- [REQUIRED]Specifies the order in which the Rules in a WebACL are evaluated. Rules with a lower value for Priority are evaluated before Rules with a higher value. The value must be a unique integer. If you add multiple Rules to a WebACL , the values don\'t need to be consecutive. RuleId (string) -- [REQUIRED]The RuleId for a Rule . You use RuleId to get more information about a Rule (see GetRule ), update a Rule (see UpdateRule ), insert a Rule into a WebACL or delete a one from a WebACL (see UpdateWebACL ), or delete a Rule from AWS WAF (see DeleteRule ). RuleId is returned by CreateRule and by ListRules . Action (dict) --Specifies the action that CloudFront or AWS WAF takes when a web request matches the conditions in the Rule . Valid values for Action include the following: ALLOW : CloudFront responds with the requested object. BLOCK : CloudFront responds with an HTTP 403 (Forbidden) status code. COUNT : AWS WAF increments a counter of requests that match the conditions in the rule and then continues to inspect the web request based on the remaining rules in the web ACL. ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case, you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction . Type (string) -- [REQUIRED]Specifies how you want AWS WAF to respond to requests that match the settings in a Rule . Valid settings include the following: ALLOW : AWS WAF allows requests BLOCK : AWS WAF blocks requests COUNT : AWS WAF increments a counter of the requests that match all of the conditions in the rule. AWS WAF then continues to inspect the web request based on the remaining rules in the web ACL. You can\'t specify COUNT for the default action for a WebACL . OverrideAction (dict) --Use the OverrideAction to test your RuleGroup . Any rule in a RuleGroup can potentially block a request. If you set the OverrideAction to None , the RuleGroup will block a request if any individual rule in the RuleGroup matches the request and is configured to block that request. However if you first want to test the RuleGroup , set the OverrideAction to Count . The RuleGroup will then override any block action specified by individual rules contained within the group. Instead of blocking matching requests, those requests will be counted. You can view a record of counted requests using GetSampledRequests . ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction . Type (string) -- [REQUIRED] COUNT overrides the action specified by the individual rule within a RuleGroup . If set to NONE , the rule\'s action will take place. Type (string) --The rule type, either REGULAR , as defined by Rule , RATE_BASED , as defined by RateBasedRule , or GROUP , as defined by RuleGroup . The default is REGULAR. Although this field is optional, be aware that if you try to add a RATE_BASED rule to a web ACL without setting the type, the UpdateWebACL request will fail because the request tries to add a REGULAR rule with the specified ID, which does not exist. ExcludedRules (list) --An array of rules to exclude from a rule group. This is applicable only when the ActivatedRule refers to a RuleGroup . Sometimes it is necessary to troubleshoot rule groups that are blocking traffic unexpectedly (false positives). One troubleshooting technique is to identify the specific rule within the rule group that is blocking the legitimate traffic and then disable (exclude) that particular rule. You can exclude rules from both your own rule groups and AWS Marketplace rule groups that have been associated with a web ACL. Specifying ExcludedRules does not remove those rules from the rule group. Rather, it changes the action for the rules to COUNT . Therefore, requests that match an ExcludedRule are counted but not blocked. The RuleGroup owner will receive COUNT metrics for each ExcludedRule . If you want to exclude rules from a rule group that is already associated with a web ACL, perform the following steps: Use the AWS WAF logs to identify the IDs of the rules that you want to exclude. For more information about the logs, see Logging Web ACL Traffic Information . Submit an UpdateWebACL request that has two actions: The first action deletes the existing rule group from the web ACL. That is, in the UpdateWebACL request, the first Updates:Action should be DELETE and Updates:ActivatedRule:RuleId should be the rule group that contains the rules that you want to exclude. The second action inserts the same rule group back in, but specifying the rules to exclude. That is, the second Updates:Action should be INSERT , Updates:ActivatedRule:RuleId should be the rule group that you just removed, and ExcludedRules should contain the rules that you want to exclude. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The rule to exclude from a rule group. This is applicable only when the ActivatedRule refers to a RuleGroup . The rule must belong to the RuleGroup that is specified by the ActivatedRule . RuleId (string) -- [REQUIRED]The unique identifier for the rule to exclude from the rule group. ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def update_size_constraint_set(SizeConstraintSetId=None, ChangeToken=None, Updates=None): """ Inserts or deletes SizeConstraint objects (filters) in a SizeConstraintSet . For each SizeConstraint object, you specify the following values: For example, you can add a SizeConstraintSetUpdate object that matches web requests in which the length of the User-Agent header is greater than 100 bytes. You can then configure AWS WAF to block those requests. To create and configure a SizeConstraintSet , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions Examples The following example deletes a SizeConstraint object (filters) in a size constraint set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.update_size_constraint_set( SizeConstraintSetId='string', ChangeToken='string', Updates=[ { 'Action': 'INSERT'|'DELETE', 'SizeConstraint': { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'ComparisonOperator': 'EQ'|'NE'|'LE'|'LT'|'GE'|'GT', 'Size': 123 } }, ] ) :type SizeConstraintSetId: string :param SizeConstraintSetId: [REQUIRED]\nThe SizeConstraintSetId of the SizeConstraintSet that you want to update. SizeConstraintSetId is returned by CreateSizeConstraintSet and by ListSizeConstraintSets .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :type Updates: list :param Updates: [REQUIRED]\nAn array of SizeConstraintSetUpdate objects that you want to insert into or delete from a SizeConstraintSet . For more information, see the applicable data types:\n\nSizeConstraintSetUpdate : Contains Action and SizeConstraint\nSizeConstraint : Contains FieldToMatch , TextTransformation , ComparisonOperator , and Size\nFieldToMatch : Contains Data and Type\n\n\n(dict) --\nNote\nThis is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.\n\nFor the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use.\n\nSpecifies the part of a web request that you want to inspect the size of and indicates whether you want to add the specification to a SizeConstraintSet or delete it from a SizeConstraintSet .\n\nAction (string) -- [REQUIRED]Specify INSERT to add a SizeConstraintSetUpdate to a SizeConstraintSet . Use DELETE to remove a SizeConstraintSetUpdate from a SizeConstraintSet .\n\nSizeConstraint (dict) -- [REQUIRED]Specifies a constraint on the size of a part of the web request. AWS WAF uses the Size , ComparisonOperator , and FieldToMatch to build an expression in the form of 'Size ComparisonOperator size in bytes of FieldToMatch '. If that expression is true, the SizeConstraint is considered to match.\n\nFieldToMatch (dict) -- [REQUIRED]Specifies where in a web request to look for the size constraint.\n\nType (string) -- [REQUIRED]The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following:\n\nHEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data .\nMETHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT .\nQUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any.\nURI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg .\nBODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet .\nSINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters.\nALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString .\n\n\nData (string) --When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive.\nWhen the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive.\nIf the value of Type is any other value, omit Data .\n\n\n\nTextTransformation (string) -- [REQUIRED]Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on FieldToMatch before inspecting it for a match.\nYou can only specify a single type of TextTransformation.\nNote that if you choose BODY for the value of Type , you must choose NONE for TextTransformation because CloudFront forwards only the first 8192 bytes for inspection.\n\nNONE\nSpecify NONE if you don\'t want to perform any text transformations.\n\nCMD_LINE\nWhen you\'re concerned that attackers are injecting an operating system command line command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations:\n\nDelete the following characters: ' \' ^\nDelete spaces before the following characters: / (\nReplace the following characters with a space: , ;\nReplace multiple spaces with one space\nConvert uppercase letters (A-Z) to lowercase (a-z)\n\n\nCOMPRESS_WHITE_SPACE\nUse this option to replace the following characters with a space character (decimal 32):\n\nf, formfeed, decimal 12\nt, tab, decimal 9\nn, newline, decimal 10\nr, carriage return, decimal 13\nv, vertical tab, decimal 11\nnon-breaking space, decimal 160\n\n\nCOMPRESS_WHITE_SPACE also replaces multiple spaces with one space.HTML_ENTITY_DECODE\n\nUse this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations:\n\nReplaces (ampersand)quot; with '\nReplaces (ampersand)nbsp; with a non-breaking space, decimal 160\nReplaces (ampersand)lt; with a 'less than' symbol\nReplaces (ampersand)gt; with >\nReplaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters\nReplaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters\n\n\nLOWERCASE\nUse this option to convert uppercase letters (A-Z) to lowercase (a-z).\n\nURL_DECODE\nUse this option to decode a URL-encoded value.\n\nComparisonOperator (string) -- [REQUIRED]The type of comparison you want AWS WAF to perform. AWS WAF uses this in combination with the provided Size and FieldToMatch to build an expression in the form of 'Size ComparisonOperator size in bytes of FieldToMatch '. If that expression is true, the SizeConstraint is considered to match.\n\nEQ : Used to test if the Size is equal to the size of the FieldToMatchNE : Used to test if the Size is not equal to the size of the FieldToMatch\nLE : Used to test if the Size is less than or equal to the size of the FieldToMatch\nLT : Used to test if the Size is strictly less than the size of the FieldToMatch\nGE : Used to test if the Size is greater than or equal to the size of the FieldToMatch\nGT : Used to test if the Size is strictly greater than the size of the FieldToMatch\n\n\nSize (integer) -- [REQUIRED]The size in bytes that you want AWS WAF to compare against the size of the specified FieldToMatch . AWS WAF uses this in combination with ComparisonOperator and FieldToMatch to build an expression in the form of 'Size ComparisonOperator size in bytes of FieldToMatch '. If that expression is true, the SizeConstraint is considered to match.\nValid values for size are 0 - 21474836480 bytes (0 - 20 GB).\nIf you specify URI for the value of Type , the / in the URI counts as one character. For example, the URI /logo.jpg is nine characters long.\n\n\n\n\n\n\n :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the UpdateSizeConstraintSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFNonexistentContainerException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFLimitsExceededException Examples The following example deletes a SizeConstraint object (filters) in a size constraint set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. response = client.update_size_constraint_set( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', SizeConstraintSetId='example1ds3t-46da-4fdb-b8d5-abc321j569j5', Updates=[ { 'Action': 'DELETE', 'SizeConstraint': { 'ComparisonOperator': 'GT', 'FieldToMatch': { 'Type': 'QUERY_STRING', }, 'Size': 0, 'TextTransformation': 'NONE', }, }, ], ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } :returns: Create a SizeConstraintSet. For more information, see CreateSizeConstraintSet . Use GetChangeToken to get the change token that you provide in the ChangeToken parameter of an UpdateSizeConstraintSet request. Submit an UpdateSizeConstraintSet request to specify the part of the request that you want AWS WAF to inspect (for example, the header or the URI) and the value that you want AWS WAF to watch for. """ pass def update_sql_injection_match_set(SqlInjectionMatchSetId=None, ChangeToken=None, Updates=None): """ Inserts or deletes SqlInjectionMatchTuple objects (filters) in a SqlInjectionMatchSet . For each SqlInjectionMatchTuple object, you specify the following values: You use SqlInjectionMatchSet objects to specify which CloudFront requests that you want to allow, block, or count. For example, if you\'re receiving requests that contain snippets of SQL code in the query string and you want to block the requests, you can create a SqlInjectionMatchSet with the applicable settings, and then configure AWS WAF to block the requests. To create and configure a SqlInjectionMatchSet , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions Examples The following example deletes a SqlInjectionMatchTuple object (filters) in a SQL injection match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.update_sql_injection_match_set( SqlInjectionMatchSetId='string', ChangeToken='string', Updates=[ { 'Action': 'INSERT'|'DELETE', 'SqlInjectionMatchTuple': { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE' } }, ] ) :type SqlInjectionMatchSetId: string :param SqlInjectionMatchSetId: [REQUIRED]\nThe SqlInjectionMatchSetId of the SqlInjectionMatchSet that you want to update. SqlInjectionMatchSetId is returned by CreateSqlInjectionMatchSet and by ListSqlInjectionMatchSets .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :type Updates: list :param Updates: [REQUIRED]\nAn array of SqlInjectionMatchSetUpdate objects that you want to insert into or delete from a SqlInjectionMatchSet . For more information, see the applicable data types:\n\nSqlInjectionMatchSetUpdate : Contains Action and SqlInjectionMatchTuple\nSqlInjectionMatchTuple : Contains FieldToMatch and TextTransformation\nFieldToMatch : Contains Data and Type\n\n\n(dict) --\nNote\nThis is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.\n\nFor the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use.\n\nSpecifies the part of a web request that you want to inspect for snippets of malicious SQL code and indicates whether you want to add the specification to a SqlInjectionMatchSet or delete it from a SqlInjectionMatchSet .\n\nAction (string) -- [REQUIRED]Specify INSERT to add a SqlInjectionMatchSetUpdate to a SqlInjectionMatchSet . Use DELETE to remove a SqlInjectionMatchSetUpdate from a SqlInjectionMatchSet .\n\nSqlInjectionMatchTuple (dict) -- [REQUIRED]Specifies the part of a web request that you want AWS WAF to inspect for snippets of malicious SQL code and, if you want AWS WAF to inspect a header, the name of the header.\n\nFieldToMatch (dict) -- [REQUIRED]Specifies where in a web request to look for snippets of malicious SQL code.\n\nType (string) -- [REQUIRED]The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following:\n\nHEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data .\nMETHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT .\nQUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any.\nURI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg .\nBODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet .\nSINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters.\nALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString .\n\n\nData (string) --When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive.\nWhen the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive.\nIf the value of Type is any other value, omit Data .\n\n\n\nTextTransformation (string) -- [REQUIRED]Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on FieldToMatch before inspecting it for a match.\nYou can only specify a single type of TextTransformation.\n\nCMD_LINE\nWhen you\'re concerned that attackers are injecting an operating system command line command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations:\n\nDelete the following characters: ' \' ^\nDelete spaces before the following characters: / (\nReplace the following characters with a space: , ;\nReplace multiple spaces with one space\nConvert uppercase letters (A-Z) to lowercase (a-z)\n\n\nCOMPRESS_WHITE_SPACE\nUse this option to replace the following characters with a space character (decimal 32):\n\nf, formfeed, decimal 12\nt, tab, decimal 9\nn, newline, decimal 10\nr, carriage return, decimal 13\nv, vertical tab, decimal 11\nnon-breaking space, decimal 160\n\n\nCOMPRESS_WHITE_SPACE also replaces multiple spaces with one space.HTML_ENTITY_DECODE\n\nUse this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations:\n\nReplaces (ampersand)quot; with '\nReplaces (ampersand)nbsp; with a non-breaking space, decimal 160\nReplaces (ampersand)lt; with a 'less than' symbol\nReplaces (ampersand)gt; with >\nReplaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters\nReplaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters\n\n\nLOWERCASE\nUse this option to convert uppercase letters (A-Z) to lowercase (a-z).\n\nURL_DECODE\nUse this option to decode a URL-encoded value.\n\nNONE\nSpecify NONE if you don\'t want to perform any text transformations.\n\n\n\n\n\n\n :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- The response to an UpdateSqlInjectionMatchSets request. ChangeToken (string) -- The ChangeToken that you used to submit the UpdateSqlInjectionMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFNonexistentContainerException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFLimitsExceededException Examples The following example deletes a SqlInjectionMatchTuple object (filters) in a SQL injection match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. response = client.update_sql_injection_match_set( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', SqlInjectionMatchSetId='example1ds3t-46da-4fdb-b8d5-abc321j569j5', Updates=[ { 'Action': 'DELETE', 'SqlInjectionMatchTuple': { 'FieldToMatch': { 'Type': 'QUERY_STRING', }, 'TextTransformation': 'URL_DECODE', }, }, ], ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } :returns: Submit a CreateSqlInjectionMatchSet request. Use GetChangeToken to get the change token that you provide in the ChangeToken parameter of an UpdateIPSet request. Submit an UpdateSqlInjectionMatchSet request to specify the parts of web requests that you want AWS WAF to inspect for snippets of SQL code. """ pass def update_web_acl(WebACLId=None, ChangeToken=None, Updates=None, DefaultAction=None): """ Inserts or deletes ActivatedRule objects in a WebACL . Each Rule identifies web requests that you want to allow, block, or count. When you update a WebACL , you specify the following values: To create and configure a WebACL , perform the following steps: Be aware that if you try to add a RATE_BASED rule to a web ACL without setting the rule type when first creating the rule, the UpdateWebACL request will fail because the request tries to add a REGULAR rule (the default rule type) with the specified ID, which does not exist. For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions Examples The following example deletes an ActivatedRule object in a WebACL with the ID webacl-1472061481310. Expected Output: :example: response = client.update_web_acl( WebACLId='string', ChangeToken='string', Updates=[ { 'Action': 'INSERT'|'DELETE', 'ActivatedRule': { 'Priority': 123, 'RuleId': 'string', 'Action': { 'Type': 'BLOCK'|'ALLOW'|'COUNT' }, 'OverrideAction': { 'Type': 'NONE'|'COUNT' }, 'Type': 'REGULAR'|'RATE_BASED'|'GROUP', 'ExcludedRules': [ { 'RuleId': 'string' }, ] } }, ], DefaultAction={ 'Type': 'BLOCK'|'ALLOW'|'COUNT' } ) :type WebACLId: string :param WebACLId: [REQUIRED]\nThe WebACLId of the WebACL that you want to update. WebACLId is returned by CreateWebACL and by ListWebACLs .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :type Updates: list :param Updates: An array of updates to make to the WebACL .\nAn array of WebACLUpdate objects that you want to insert into or delete from a WebACL . For more information, see the applicable data types:\n\nWebACLUpdate : Contains Action and ActivatedRule\nActivatedRule : Contains Action , OverrideAction , Priority , RuleId , and Type . ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case, you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction .\nWafAction : Contains Type\n\n\n(dict) --\nNote\nThis is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.\n\nFor the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use.\n\nSpecifies whether to insert a Rule into or delete a Rule from a WebACL .\n\nAction (string) -- [REQUIRED]Specifies whether to insert a Rule into or delete a Rule from a WebACL .\n\nActivatedRule (dict) -- [REQUIRED]The ActivatedRule object in an UpdateWebACL request specifies a Rule that you want to insert or delete, the priority of the Rule in the WebACL , and the action that you want AWS WAF to take when a web request matches the Rule (ALLOW , BLOCK , or COUNT ).\n\nPriority (integer) -- [REQUIRED]Specifies the order in which the Rules in a WebACL are evaluated. Rules with a lower value for Priority are evaluated before Rules with a higher value. The value must be a unique integer. If you add multiple Rules to a WebACL , the values don\'t need to be consecutive.\n\nRuleId (string) -- [REQUIRED]The RuleId for a Rule . You use RuleId to get more information about a Rule (see GetRule ), update a Rule (see UpdateRule ), insert a Rule into a WebACL or delete a one from a WebACL (see UpdateWebACL ), or delete a Rule from AWS WAF (see DeleteRule ).\n\nRuleId is returned by CreateRule and by ListRules .\n\nAction (dict) --Specifies the action that CloudFront or AWS WAF takes when a web request matches the conditions in the Rule . Valid values for Action include the following:\n\nALLOW : CloudFront responds with the requested object.\nBLOCK : CloudFront responds with an HTTP 403 (Forbidden) status code.\nCOUNT : AWS WAF increments a counter of requests that match the conditions in the rule and then continues to inspect the web request based on the remaining rules in the web ACL.\n\n\nActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case, you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction .\n\nType (string) -- [REQUIRED]Specifies how you want AWS WAF to respond to requests that match the settings in a Rule . Valid settings include the following:\n\nALLOW : AWS WAF allows requests\nBLOCK : AWS WAF blocks requests\nCOUNT : AWS WAF increments a counter of the requests that match all of the conditions in the rule. AWS WAF then continues to inspect the web request based on the remaining rules in the web ACL. You can\'t specify COUNT for the default action for a WebACL .\n\n\n\n\nOverrideAction (dict) --Use the OverrideAction to test your RuleGroup .\nAny rule in a RuleGroup can potentially block a request. If you set the OverrideAction to None , the RuleGroup will block a request if any individual rule in the RuleGroup matches the request and is configured to block that request. However if you first want to test the RuleGroup , set the OverrideAction to Count . The RuleGroup will then override any block action specified by individual rules contained within the group. Instead of blocking matching requests, those requests will be counted. You can view a record of counted requests using GetSampledRequests .\n\nActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction .\n\nType (string) -- [REQUIRED]\nCOUNT overrides the action specified by the individual rule within a RuleGroup . If set to NONE , the rule\'s action will take place.\n\n\n\nType (string) --The rule type, either REGULAR , as defined by Rule , RATE_BASED , as defined by RateBasedRule , or GROUP , as defined by RuleGroup . The default is REGULAR. Although this field is optional, be aware that if you try to add a RATE_BASED rule to a web ACL without setting the type, the UpdateWebACL request will fail because the request tries to add a REGULAR rule with the specified ID, which does not exist.\n\nExcludedRules (list) --An array of rules to exclude from a rule group. This is applicable only when the ActivatedRule refers to a RuleGroup .\nSometimes it is necessary to troubleshoot rule groups that are blocking traffic unexpectedly (false positives). One troubleshooting technique is to identify the specific rule within the rule group that is blocking the legitimate traffic and then disable (exclude) that particular rule. You can exclude rules from both your own rule groups and AWS Marketplace rule groups that have been associated with a web ACL.\nSpecifying ExcludedRules does not remove those rules from the rule group. Rather, it changes the action for the rules to COUNT . Therefore, requests that match an ExcludedRule are counted but not blocked. The RuleGroup owner will receive COUNT metrics for each ExcludedRule .\nIf you want to exclude rules from a rule group that is already associated with a web ACL, perform the following steps:\n\nUse the AWS WAF logs to identify the IDs of the rules that you want to exclude. For more information about the logs, see Logging Web ACL Traffic Information .\nSubmit an UpdateWebACL request that has two actions:\nThe first action deletes the existing rule group from the web ACL. That is, in the UpdateWebACL request, the first Updates:Action should be DELETE and Updates:ActivatedRule:RuleId should be the rule group that contains the rules that you want to exclude.\nThe second action inserts the same rule group back in, but specifying the rules to exclude. That is, the second Updates:Action should be INSERT , Updates:ActivatedRule:RuleId should be the rule group that you just removed, and ExcludedRules should contain the rules that you want to exclude.\n\n\n\n\n(dict) --\nNote\nThis is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.\n\nFor the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use.\n\nThe rule to exclude from a rule group. This is applicable only when the ActivatedRule refers to a RuleGroup . The rule must belong to the RuleGroup that is specified by the ActivatedRule .\n\nRuleId (string) -- [REQUIRED]The unique identifier for the rule to exclude from the rule group.\n\n\n\n\n\n\n\n\n\n\n :type DefaultAction: dict :param DefaultAction: A default action for the web ACL, either ALLOW or BLOCK. AWS WAF performs the default action if a request doesn\'t match the criteria in any of the rules in a web ACL.\n\nType (string) -- [REQUIRED]Specifies how you want AWS WAF to respond to requests that match the settings in a Rule . Valid settings include the following:\n\nALLOW : AWS WAF allows requests\nBLOCK : AWS WAF blocks requests\nCOUNT : AWS WAF increments a counter of the requests that match all of the conditions in the rule. AWS WAF then continues to inspect the web request based on the remaining rules in the web ACL. You can\'t specify COUNT for the default action for a WebACL .\n\n\n\n :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the UpdateWebACL request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFNonexistentContainerException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFLimitsExceededException WAFRegional.Client.exceptions.WAFSubscriptionNotFoundException Examples The following example deletes an ActivatedRule object in a WebACL with the ID webacl-1472061481310. response = client.update_web_acl( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', DefaultAction={ 'Type': 'ALLOW', }, Updates=[ { 'Action': 'DELETE', 'ActivatedRule': { 'Action': { 'Type': 'ALLOW', }, 'Priority': 1, 'RuleId': 'WAFRule-1-Example', }, }, ], WebACLId='webacl-1472061481310', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } :returns: Create and update the predicates that you want to include in Rules . For more information, see CreateByteMatchSet , UpdateByteMatchSet , CreateIPSet , UpdateIPSet , CreateSqlInjectionMatchSet , and UpdateSqlInjectionMatchSet . Create and update the Rules that you want to include in the WebACL . For more information, see CreateRule and UpdateRule . Create a WebACL . See CreateWebACL . Use GetChangeToken to get the change token that you provide in the ChangeToken parameter of an UpdateWebACL request. Submit an UpdateWebACL request to specify the Rules that you want to include in the WebACL , to specify the default action, and to associate the WebACL with a CloudFront distribution. The ActivatedRule can be a rule group. If you specify a rule group as your ActivatedRule , you can exclude specific rules from that rule group. If you already have a rule group associated with a web ACL and want to submit an UpdateWebACL request to exclude certain rules from that rule group, you must first remove the rule group from the web ACL, the re-insert it again, specifying the excluded rules. For details, see ActivatedRule$ExcludedRules . """ pass def update_xss_match_set(XssMatchSetId=None, ChangeToken=None, Updates=None): """ Inserts or deletes XssMatchTuple objects (filters) in an XssMatchSet . For each XssMatchTuple object, you specify the following values: You use XssMatchSet objects to specify which CloudFront requests that you want to allow, block, or count. For example, if you\'re receiving requests that contain cross-site scripting attacks in the request body and you want to block the requests, you can create an XssMatchSet with the applicable settings, and then configure AWS WAF to block the requests. To create and configure an XssMatchSet , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions Examples The following example deletes an XssMatchTuple object (filters) in an XssMatchSet with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.update_xss_match_set( XssMatchSetId='string', ChangeToken='string', Updates=[ { 'Action': 'INSERT'|'DELETE', 'XssMatchTuple': { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE' } }, ] ) :type XssMatchSetId: string :param XssMatchSetId: [REQUIRED]\nThe XssMatchSetId of the XssMatchSet that you want to update. XssMatchSetId is returned by CreateXssMatchSet and by ListXssMatchSets .\n :type ChangeToken: string :param ChangeToken: [REQUIRED]\nThe value returned by the most recent call to GetChangeToken .\n :type Updates: list :param Updates: [REQUIRED]\nAn array of XssMatchSetUpdate objects that you want to insert into or delete from an XssMatchSet . For more information, see the applicable data types:\n\nXssMatchSetUpdate : Contains Action and XssMatchTuple\nXssMatchTuple : Contains FieldToMatch and TextTransformation\nFieldToMatch : Contains Data and Type\n\n\n(dict) --\nNote\nThis is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.\n\nFor the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use.\n\nSpecifies the part of a web request that you want to inspect for cross-site scripting attacks and indicates whether you want to add the specification to an XssMatchSet or delete it from an XssMatchSet .\n\nAction (string) -- [REQUIRED]Specify INSERT to add an XssMatchSetUpdate to an XssMatchSet . Use DELETE to remove an XssMatchSetUpdate from an XssMatchSet .\n\nXssMatchTuple (dict) -- [REQUIRED]Specifies the part of a web request that you want AWS WAF to inspect for cross-site scripting attacks and, if you want AWS WAF to inspect a header, the name of the header.\n\nFieldToMatch (dict) -- [REQUIRED]Specifies where in a web request to look for cross-site scripting attacks.\n\nType (string) -- [REQUIRED]The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following:\n\nHEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data .\nMETHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT .\nQUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any.\nURI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg .\nBODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet .\nSINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters.\nALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString .\n\n\nData (string) --When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive.\nWhen the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive.\nIf the value of Type is any other value, omit Data .\n\n\n\nTextTransformation (string) -- [REQUIRED]Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on FieldToMatch before inspecting it for a match.\nYou can only specify a single type of TextTransformation.\n\nCMD_LINE\nWhen you\'re concerned that attackers are injecting an operating system command line command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations:\n\nDelete the following characters: ' \' ^\nDelete spaces before the following characters: / (\nReplace the following characters with a space: , ;\nReplace multiple spaces with one space\nConvert uppercase letters (A-Z) to lowercase (a-z)\n\n\nCOMPRESS_WHITE_SPACE\nUse this option to replace the following characters with a space character (decimal 32):\n\nf, formfeed, decimal 12\nt, tab, decimal 9\nn, newline, decimal 10\nr, carriage return, decimal 13\nv, vertical tab, decimal 11\nnon-breaking space, decimal 160\n\n\nCOMPRESS_WHITE_SPACE also replaces multiple spaces with one space.HTML_ENTITY_DECODE\n\nUse this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations:\n\nReplaces (ampersand)quot; with '\nReplaces (ampersand)nbsp; with a non-breaking space, decimal 160\nReplaces (ampersand)lt; with a 'less than' symbol\nReplaces (ampersand)gt; with >\nReplaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters\nReplaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters\n\n\nLOWERCASE\nUse this option to convert uppercase letters (A-Z) to lowercase (a-z).\n\nURL_DECODE\nUse this option to decode a URL-encoded value.\n\nNONE\nSpecify NONE if you don\'t want to perform any text transformations.\n\n\n\n\n\n\n :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- The response to an UpdateXssMatchSets request. ChangeToken (string) -- The ChangeToken that you used to submit the UpdateXssMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFNonexistentContainerException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFLimitsExceededException Examples The following example deletes an XssMatchTuple object (filters) in an XssMatchSet with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. response = client.update_xss_match_set( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', Updates=[ { 'Action': 'DELETE', 'XssMatchTuple': { 'FieldToMatch': { 'Type': 'QUERY_STRING', }, 'TextTransformation': 'URL_DECODE', }, }, ], XssMatchSetId='example1ds3t-46da-4fdb-b8d5-abc321j569j5', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } :returns: Submit a CreateXssMatchSet request. Use GetChangeToken to get the change token that you provide in the ChangeToken parameter of an UpdateIPSet request. Submit an UpdateXssMatchSet request to specify the parts of web requests that you want AWS WAF to inspect for cross-site scripting attacks. """ pass
""" The MIT License (MIT) Copyright (c) 2016 WavyCloud Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. """ def associate_web_acl(WebACLId=None, ResourceArn=None): """ Associates a web ACL with a resource, either an application load balancer or Amazon API Gateway stage. See also: AWS API Documentation Exceptions :example: response = client.associate_web_acl( WebACLId='string', ResourceArn='string' ) :type WebACLId: string :param WebACLId: [REQUIRED] A unique identifier (ID) for the web ACL. :type ResourceArn: string :param ResourceArn: [REQUIRED] The ARN (Amazon Resource Name) of the resource to be protected, either an application load balancer or Amazon API Gateway stage. The ARN should be in one of the following formats: For an Application Load Balancer: ``arn:aws:elasticloadbalancing:region :account-id :loadbalancer/app/load-balancer-name /load-balancer-id `` For an Amazon API Gateway stage: ``arn:aws:apigateway:region ::/restapis/api-id /stages/stage-name `` :rtype: dict ReturnsResponse Syntax {} Response Structure (dict) -- Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFUnavailableEntityException :return: {} :returns: (dict) -- """ pass def can_paginate(operation_name=None): """ Check if an operation can be paginated. :type operation_name: string :param operation_name: The operation name. This is the same name as the method name on the client. For example, if the method name is create_foo, and you'd normally invoke the operation as client.create_foo(**kwargs), if the create_foo operation can be paginated, you can use the call client.get_paginator('create_foo'). """ pass def create_byte_match_set(Name=None, ChangeToken=None): """ Creates a ByteMatchSet . You then use UpdateByteMatchSet to identify the part of a web request that you want AWS WAF to inspect, such as the values of the User-Agent header or the query string. For example, you can create a ByteMatchSet that matches any requests with User-Agent headers that contain the string BadBot . You can then configure AWS WAF to reject those requests. To create and configure a ByteMatchSet , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions :example: response = client.create_byte_match_set( Name='string', ChangeToken='string' ) :type Name: string :param Name: [REQUIRED] A friendly name or description of the ByteMatchSet . You can't change Name after you create a ByteMatchSet . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :rtype: dict ReturnsResponse Syntax { 'ByteMatchSet': { 'ByteMatchSetId': 'string', 'Name': 'string', 'ByteMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TargetString': b'bytes', 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'PositionalConstraint': 'EXACTLY'|'STARTS_WITH'|'ENDS_WITH'|'CONTAINS'|'CONTAINS_WORD' }, ] }, 'ChangeToken': 'string' } Response Structure (dict) -- ByteMatchSet (dict) -- A ByteMatchSet that contains no ByteMatchTuple objects. ByteMatchSetId (string) -- The ByteMatchSetId for a ByteMatchSet . You use ByteMatchSetId to get information about a ByteMatchSet (see GetByteMatchSet ), update a ByteMatchSet (see UpdateByteMatchSet ), insert a ByteMatchSet into a Rule or delete one from a Rule (see UpdateRule ), and delete a ByteMatchSet from AWS WAF (see DeleteByteMatchSet ). ByteMatchSetId is returned by CreateByteMatchSet and by ListByteMatchSets . Name (string) -- A friendly name or description of the ByteMatchSet . You can't change Name after you create a ByteMatchSet . ByteMatchTuples (list) -- Specifies the bytes (typically a string that corresponds with ASCII characters) that you want AWS WAF to search for in web requests, the location in requests that you want AWS WAF to search, and other settings. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The bytes (typically a string that corresponds with ASCII characters) that you want AWS WAF to search for in web requests, the location in requests that you want AWS WAF to search, and other settings. FieldToMatch (dict) -- The part of a web request that you want AWS WAF to search, such as a specified header or a query string. For more information, see FieldToMatch . Type (string) -- The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) -- When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . TargetString (bytes) -- The value that you want AWS WAF to search for. AWS WAF searches for the specified string in the part of web requests that you specified in FieldToMatch . The maximum length of the value is 50 bytes. Valid values depend on the values that you specified for FieldToMatch : HEADER : The value that you want AWS WAF to search for in the request header that you specified in FieldToMatch , for example, the value of the User-Agent or Referer header. METHOD : The HTTP method, which indicates the type of operation specified in the request. CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : The value that you want AWS WAF to search for in the query string, which is the part of a URL that appears after a ? character. URI : The value that you want AWS WAF to search for in the part of a URL that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but instead of inspecting a single parameter, AWS WAF inspects all parameters within the query string for the value or regex pattern that you specify in TargetString . If TargetString includes alphabetic characters A-Z and a-z, note that the value is case sensitive. If you're using the AWS WAF API Specify a base64-encoded version of the value. The maximum length of the value before you base64-encode it is 50 bytes. For example, suppose the value of Type is HEADER and the value of Data is User-Agent . If you want to search the User-Agent header for the value BadBot , you base64-encode BadBot using MIME base64-encoding and include the resulting value, QmFkQm90 , in the value of TargetString . If you're using the AWS CLI or one of the AWS SDKs The value that you want AWS WAF to search for. The SDK automatically base64 encodes the value. TextTransformation (string) -- Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on FieldToMatch before inspecting it for a match. You can only specify a single type of TextTransformation. CMD_LINE When you're concerned that attackers are injecting an operating system command line command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations: Delete the following characters: " ' ^ Delete spaces before the following characters: / ( Replace the following characters with a space: , ; Replace multiple spaces with one space Convert uppercase letters (A-Z) to lowercase (a-z) COMPRESS_WHITE_SPACE Use this option to replace the following characters with a space character (decimal 32): f, formfeed, decimal 12 t, tab, decimal 9 n, newline, decimal 10 r, carriage return, decimal 13 v, vertical tab, decimal 11 non-breaking space, decimal 160 COMPRESS_WHITE_SPACE also replaces multiple spaces with one space. HTML_ENTITY_DECODE Use this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations: Replaces (ampersand)quot; with " Replaces (ampersand)nbsp; with a non-breaking space, decimal 160 Replaces (ampersand)lt; with a "less than" symbol Replaces (ampersand)gt; with > Replaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters Replaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters LOWERCASE Use this option to convert uppercase letters (A-Z) to lowercase (a-z). URL_DECODE Use this option to decode a URL-encoded value. NONE Specify NONE if you don't want to perform any text transformations. PositionalConstraint (string) -- Within the portion of a web request that you want to search (for example, in the query string, if any), specify where you want AWS WAF to search. Valid values include the following: CONTAINS The specified part of the web request must include the value of TargetString , but the location doesn't matter. CONTAINS_WORD The specified part of the web request must include the value of TargetString , and TargetString must contain only alphanumeric characters or underscore (A-Z, a-z, 0-9, or _). In addition, TargetString must be a word, which means one of the following: TargetString exactly matches the value of the specified part of the web request, such as the value of a header. TargetString is at the beginning of the specified part of the web request and is followed by a character other than an alphanumeric character or underscore (_), for example, BadBot; . TargetString is at the end of the specified part of the web request and is preceded by a character other than an alphanumeric character or underscore (_), for example, ;BadBot . TargetString is in the middle of the specified part of the web request and is preceded and followed by characters other than alphanumeric characters or underscore (_), for example, -BadBot; . EXACTLY The value of the specified part of the web request must exactly match the value of TargetString . STARTS_WITH The value of TargetString must appear at the beginning of the specified part of the web request. ENDS_WITH The value of TargetString must appear at the end of the specified part of the web request. ChangeToken (string) -- The ChangeToken that you used to submit the CreateByteMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFDisallowedNameException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFLimitsExceededException :return: { 'ByteMatchSet': { 'ByteMatchSetId': 'string', 'Name': 'string', 'ByteMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TargetString': b'bytes', 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'PositionalConstraint': 'EXACTLY'|'STARTS_WITH'|'ENDS_WITH'|'CONTAINS'|'CONTAINS_WORD' }, ] }, 'ChangeToken': 'string' } :returns: Name (string) -- [REQUIRED] A friendly name or description of the ByteMatchSet . You can't change Name after you create a ByteMatchSet . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def create_geo_match_set(Name=None, ChangeToken=None): """ Creates an GeoMatchSet , which you use to specify which web requests you want to allow or block based on the country that the requests originate from. For example, if you're receiving a lot of requests from one or more countries and you want to block the requests, you can create an GeoMatchSet that contains those countries and then configure AWS WAF to block the requests. To create and configure a GeoMatchSet , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions :example: response = client.create_geo_match_set( Name='string', ChangeToken='string' ) :type Name: string :param Name: [REQUIRED] A friendly name or description of the GeoMatchSet . You can't change Name after you create the GeoMatchSet . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :rtype: dict ReturnsResponse Syntax { 'GeoMatchSet': { 'GeoMatchSetId': 'string', 'Name': 'string', 'GeoMatchConstraints': [ { 'Type': 'Country', 'Value': 'AF'|'AX'|'AL'|'DZ'|'AS'|'AD'|'AO'|'AI'|'AQ'|'AG'|'AR'|'AM'|'AW'|'AU'|'AT'|'AZ'|'BS'|'BH'|'BD'|'BB'|'BY'|'BE'|'BZ'|'BJ'|'BM'|'BT'|'BO'|'BQ'|'BA'|'BW'|'BV'|'BR'|'IO'|'BN'|'BG'|'BF'|'BI'|'KH'|'CM'|'CA'|'CV'|'KY'|'CF'|'TD'|'CL'|'CN'|'CX'|'CC'|'CO'|'KM'|'CG'|'CD'|'CK'|'CR'|'CI'|'HR'|'CU'|'CW'|'CY'|'CZ'|'DK'|'DJ'|'DM'|'DO'|'EC'|'EG'|'SV'|'GQ'|'ER'|'EE'|'ET'|'FK'|'FO'|'FJ'|'FI'|'FR'|'GF'|'PF'|'TF'|'GA'|'GM'|'GE'|'DE'|'GH'|'GI'|'GR'|'GL'|'GD'|'GP'|'GU'|'GT'|'GG'|'GN'|'GW'|'GY'|'HT'|'HM'|'VA'|'HN'|'HK'|'HU'|'IS'|'IN'|'ID'|'IR'|'IQ'|'IE'|'IM'|'IL'|'IT'|'JM'|'JP'|'JE'|'JO'|'KZ'|'KE'|'KI'|'KP'|'KR'|'KW'|'KG'|'LA'|'LV'|'LB'|'LS'|'LR'|'LY'|'LI'|'LT'|'LU'|'MO'|'MK'|'MG'|'MW'|'MY'|'MV'|'ML'|'MT'|'MH'|'MQ'|'MR'|'MU'|'YT'|'MX'|'FM'|'MD'|'MC'|'MN'|'ME'|'MS'|'MA'|'MZ'|'MM'|'NA'|'NR'|'NP'|'NL'|'NC'|'NZ'|'NI'|'NE'|'NG'|'NU'|'NF'|'MP'|'NO'|'OM'|'PK'|'PW'|'PS'|'PA'|'PG'|'PY'|'PE'|'PH'|'PN'|'PL'|'PT'|'PR'|'QA'|'RE'|'RO'|'RU'|'RW'|'BL'|'SH'|'KN'|'LC'|'MF'|'PM'|'VC'|'WS'|'SM'|'ST'|'SA'|'SN'|'RS'|'SC'|'SL'|'SG'|'SX'|'SK'|'SI'|'SB'|'SO'|'ZA'|'GS'|'SS'|'ES'|'LK'|'SD'|'SR'|'SJ'|'SZ'|'SE'|'CH'|'SY'|'TW'|'TJ'|'TZ'|'TH'|'TL'|'TG'|'TK'|'TO'|'TT'|'TN'|'TR'|'TM'|'TC'|'TV'|'UG'|'UA'|'AE'|'GB'|'US'|'UM'|'UY'|'UZ'|'VU'|'VE'|'VN'|'VG'|'VI'|'WF'|'EH'|'YE'|'ZM'|'ZW' }, ] }, 'ChangeToken': 'string' } Response Structure (dict) -- GeoMatchSet (dict) -- The GeoMatchSet returned in the CreateGeoMatchSet response. The GeoMatchSet contains no GeoMatchConstraints . GeoMatchSetId (string) -- The GeoMatchSetId for an GeoMatchSet . You use GeoMatchSetId to get information about a GeoMatchSet (see GeoMatchSet ), update a GeoMatchSet (see UpdateGeoMatchSet ), insert a GeoMatchSet into a Rule or delete one from a Rule (see UpdateRule ), and delete a GeoMatchSet from AWS WAF (see DeleteGeoMatchSet ). GeoMatchSetId is returned by CreateGeoMatchSet and by ListGeoMatchSets . Name (string) -- A friendly name or description of the GeoMatchSet . You can't change the name of an GeoMatchSet after you create it. GeoMatchConstraints (list) -- An array of GeoMatchConstraint objects, which contain the country that you want AWS WAF to search for. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The country from which web requests originate that you want AWS WAF to search for. Type (string) -- The type of geographical area you want AWS WAF to search for. Currently Country is the only valid value. Value (string) -- The country that you want AWS WAF to search for. ChangeToken (string) -- The ChangeToken that you used to submit the CreateGeoMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFDisallowedNameException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFLimitsExceededException :return: { 'GeoMatchSet': { 'GeoMatchSetId': 'string', 'Name': 'string', 'GeoMatchConstraints': [ { 'Type': 'Country', 'Value': 'AF'|'AX'|'AL'|'DZ'|'AS'|'AD'|'AO'|'AI'|'AQ'|'AG'|'AR'|'AM'|'AW'|'AU'|'AT'|'AZ'|'BS'|'BH'|'BD'|'BB'|'BY'|'BE'|'BZ'|'BJ'|'BM'|'BT'|'BO'|'BQ'|'BA'|'BW'|'BV'|'BR'|'IO'|'BN'|'BG'|'BF'|'BI'|'KH'|'CM'|'CA'|'CV'|'KY'|'CF'|'TD'|'CL'|'CN'|'CX'|'CC'|'CO'|'KM'|'CG'|'CD'|'CK'|'CR'|'CI'|'HR'|'CU'|'CW'|'CY'|'CZ'|'DK'|'DJ'|'DM'|'DO'|'EC'|'EG'|'SV'|'GQ'|'ER'|'EE'|'ET'|'FK'|'FO'|'FJ'|'FI'|'FR'|'GF'|'PF'|'TF'|'GA'|'GM'|'GE'|'DE'|'GH'|'GI'|'GR'|'GL'|'GD'|'GP'|'GU'|'GT'|'GG'|'GN'|'GW'|'GY'|'HT'|'HM'|'VA'|'HN'|'HK'|'HU'|'IS'|'IN'|'ID'|'IR'|'IQ'|'IE'|'IM'|'IL'|'IT'|'JM'|'JP'|'JE'|'JO'|'KZ'|'KE'|'KI'|'KP'|'KR'|'KW'|'KG'|'LA'|'LV'|'LB'|'LS'|'LR'|'LY'|'LI'|'LT'|'LU'|'MO'|'MK'|'MG'|'MW'|'MY'|'MV'|'ML'|'MT'|'MH'|'MQ'|'MR'|'MU'|'YT'|'MX'|'FM'|'MD'|'MC'|'MN'|'ME'|'MS'|'MA'|'MZ'|'MM'|'NA'|'NR'|'NP'|'NL'|'NC'|'NZ'|'NI'|'NE'|'NG'|'NU'|'NF'|'MP'|'NO'|'OM'|'PK'|'PW'|'PS'|'PA'|'PG'|'PY'|'PE'|'PH'|'PN'|'PL'|'PT'|'PR'|'QA'|'RE'|'RO'|'RU'|'RW'|'BL'|'SH'|'KN'|'LC'|'MF'|'PM'|'VC'|'WS'|'SM'|'ST'|'SA'|'SN'|'RS'|'SC'|'SL'|'SG'|'SX'|'SK'|'SI'|'SB'|'SO'|'ZA'|'GS'|'SS'|'ES'|'LK'|'SD'|'SR'|'SJ'|'SZ'|'SE'|'CH'|'SY'|'TW'|'TJ'|'TZ'|'TH'|'TL'|'TG'|'TK'|'TO'|'TT'|'TN'|'TR'|'TM'|'TC'|'TV'|'UG'|'UA'|'AE'|'GB'|'US'|'UM'|'UY'|'UZ'|'VU'|'VE'|'VN'|'VG'|'VI'|'WF'|'EH'|'YE'|'ZM'|'ZW' }, ] }, 'ChangeToken': 'string' } :returns: Name (string) -- [REQUIRED] A friendly name or description of the GeoMatchSet . You can't change Name after you create the GeoMatchSet . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def create_ip_set(Name=None, ChangeToken=None): """ Creates an IPSet , which you use to specify which web requests that you want to allow or block based on the IP addresses that the requests originate from. For example, if you're receiving a lot of requests from one or more individual IP addresses or one or more ranges of IP addresses and you want to block the requests, you can create an IPSet that contains those IP addresses and then configure AWS WAF to block the requests. To create and configure an IPSet , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions Examples The following example creates an IP match set named MyIPSetFriendlyName. Expected Output: :example: response = client.create_ip_set( Name='string', ChangeToken='string' ) :type Name: string :param Name: [REQUIRED] A friendly name or description of the IPSet . You can't change Name after you create the IPSet . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :rtype: dict ReturnsResponse Syntax { 'IPSet': { 'IPSetId': 'string', 'Name': 'string', 'IPSetDescriptors': [ { 'Type': 'IPV4'|'IPV6', 'Value': 'string' }, ] }, 'ChangeToken': 'string' } Response Structure (dict) -- IPSet (dict) -- The IPSet returned in the CreateIPSet response. IPSetId (string) -- The IPSetId for an IPSet . You use IPSetId to get information about an IPSet (see GetIPSet ), update an IPSet (see UpdateIPSet ), insert an IPSet into a Rule or delete one from a Rule (see UpdateRule ), and delete an IPSet from AWS WAF (see DeleteIPSet ). IPSetId is returned by CreateIPSet and by ListIPSets . Name (string) -- A friendly name or description of the IPSet . You can't change the name of an IPSet after you create it. IPSetDescriptors (list) -- The IP address type (IPV4 or IPV6 ) and the IP address range (in CIDR notation) that web requests originate from. If the WebACL is associated with a CloudFront distribution and the viewer did not use an HTTP proxy or a load balancer to send the request, this is the value of the c-ip field in the CloudFront access logs. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies the IP address type (IPV4 or IPV6 ) and the IP address range (in CIDR format) that web requests originate from. Type (string) -- Specify IPV4 or IPV6 . Value (string) -- Specify an IPv4 address by using CIDR notation. For example: To configure AWS WAF to allow, block, or count requests that originated from the IP address 192.0.2.44, specify 192.0.2.44/32 . To configure AWS WAF to allow, block, or count requests that originated from IP addresses from 192.0.2.0 to 192.0.2.255, specify 192.0.2.0/24 . For more information about CIDR notation, see the Wikipedia entry Classless Inter-Domain Routing . Specify an IPv6 address by using CIDR notation. For example: To configure AWS WAF to allow, block, or count requests that originated from the IP address 1111:0000:0000:0000:0000:0000:0000:0111, specify 1111:0000:0000:0000:0000:0000:0000:0111/128 . To configure AWS WAF to allow, block, or count requests that originated from IP addresses 1111:0000:0000:0000:0000:0000:0000:0000 to 1111:0000:0000:0000:ffff:ffff:ffff:ffff, specify 1111:0000:0000:0000:0000:0000:0000:0000/64 . ChangeToken (string) -- The ChangeToken that you used to submit the CreateIPSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFDisallowedNameException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFLimitsExceededException Examples The following example creates an IP match set named MyIPSetFriendlyName. response = client.create_ip_set( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', Name='MyIPSetFriendlyName', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'IPSet': { 'IPSetDescriptors': [ { 'Type': 'IPV4', 'Value': '192.0.2.44/32', }, ], 'IPSetId': 'example1ds3t-46da-4fdb-b8d5-abc321j569j5', 'Name': 'MyIPSetFriendlyName', }, 'ResponseMetadata': { '...': '...', }, } :return: { 'IPSet': { 'IPSetId': 'string', 'Name': 'string', 'IPSetDescriptors': [ { 'Type': 'IPV4'|'IPV6', 'Value': 'string' }, ] }, 'ChangeToken': 'string' } :returns: Name (string) -- [REQUIRED] A friendly name or description of the IPSet . You can't change Name after you create the IPSet . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def create_rate_based_rule(Name=None, MetricName=None, RateKey=None, RateLimit=None, ChangeToken=None, Tags=None): """ Creates a RateBasedRule . The RateBasedRule contains a RateLimit , which specifies the maximum number of requests that AWS WAF allows from a specified IP address in a five-minute period. The RateBasedRule also contains the IPSet objects, ByteMatchSet objects, and other predicates that identify the requests that you want to count or block if these requests exceed the RateLimit . If you add more than one predicate to a RateBasedRule , a request not only must exceed the RateLimit , but it also must match all the conditions to be counted or blocked. For example, suppose you add the following to a RateBasedRule : Further, you specify a RateLimit of 1,000. You then add the RateBasedRule to a WebACL and specify that you want to block requests that meet the conditions in the rule. For a request to be blocked, it must come from the IP address 192.0.2.44 and the User-Agent header in the request must contain the value BadBot . Further, requests that match these two conditions must be received at a rate of more than 1,000 requests every five minutes. If both conditions are met and the rate is exceeded, AWS WAF blocks the requests. If the rate drops below 1,000 for a five-minute period, AWS WAF no longer blocks the requests. As a second example, suppose you want to limit requests to a particular page on your site. To do this, you could add the following to a RateBasedRule : Further, you specify a RateLimit of 1,000. By adding this RateBasedRule to a WebACL , you could limit requests to your login page without affecting the rest of your site. To create and configure a RateBasedRule , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions :example: response = client.create_rate_based_rule( Name='string', MetricName='string', RateKey='IP', RateLimit=123, ChangeToken='string', Tags=[ { 'Key': 'string', 'Value': 'string' }, ] ) :type Name: string :param Name: [REQUIRED] A friendly name or description of the RateBasedRule . You can't change the name of a RateBasedRule after you create it. :type MetricName: string :param MetricName: [REQUIRED] A friendly name or description for the metrics for this RateBasedRule . The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can't contain whitespace or metric names reserved for AWS WAF, including 'All' and 'Default_Action.' You can't change the name of the metric after you create the RateBasedRule . :type RateKey: string :param RateKey: [REQUIRED] The field that AWS WAF uses to determine if requests are likely arriving from a single source and thus subject to rate monitoring. The only valid value for RateKey is IP . IP indicates that requests that arrive from the same IP address are subject to the RateLimit that is specified in the RateBasedRule . :type RateLimit: integer :param RateLimit: [REQUIRED] The maximum number of requests, which have an identical value in the field that is specified by RateKey , allowed in a five-minute period. If the number of requests exceeds the RateLimit and the other predicates specified in the rule are also met, AWS WAF triggers the action that is specified for this rule. :type ChangeToken: string :param ChangeToken: [REQUIRED] The ChangeToken that you used to submit the CreateRateBasedRule request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . :type Tags: list :param Tags: (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. A tag associated with an AWS resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to 'customer' and the value to the customer name or ID. You can specify one or more tags to add to each AWS resource, up to 50 tags for a resource. Tagging is only available through the API, SDKs, and CLI. You can't manage or view tags through the AWS WAF Classic console. You can tag the AWS resources that you manage through AWS WAF Classic: web ACLs, rule groups, and rules. Key (string) -- [REQUIRED] Value (string) -- [REQUIRED] :rtype: dict ReturnsResponse Syntax { 'Rule': { 'RuleId': 'string', 'Name': 'string', 'MetricName': 'string', 'MatchPredicates': [ { 'Negated': True|False, 'Type': 'IPMatch'|'ByteMatch'|'SqlInjectionMatch'|'GeoMatch'|'SizeConstraint'|'XssMatch'|'RegexMatch', 'DataId': 'string' }, ], 'RateKey': 'IP', 'RateLimit': 123 }, 'ChangeToken': 'string' } Response Structure (dict) -- Rule (dict) -- The RateBasedRule that is returned in the CreateRateBasedRule response. RuleId (string) -- A unique identifier for a RateBasedRule . You use RuleId to get more information about a RateBasedRule (see GetRateBasedRule ), update a RateBasedRule (see UpdateRateBasedRule ), insert a RateBasedRule into a WebACL or delete one from a WebACL (see UpdateWebACL ), or delete a RateBasedRule from AWS WAF (see DeleteRateBasedRule ). Name (string) -- A friendly name or description for a RateBasedRule . You can't change the name of a RateBasedRule after you create it. MetricName (string) -- A friendly name or description for the metrics for a RateBasedRule . The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can't contain whitespace or metric names reserved for AWS WAF, including "All" and "Default_Action." You can't change the name of the metric after you create the RateBasedRule . MatchPredicates (list) -- The Predicates object contains one Predicate element for each ByteMatchSet , IPSet , or SqlInjectionMatchSet object that you want to include in a RateBasedRule . (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies the ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , and SizeConstraintSet objects that you want to add to a Rule and, for each object, indicates whether you want to negate the settings, for example, requests that do NOT originate from the IP address 192.0.2.44. Negated (boolean) -- Set Negated to False if you want AWS WAF to allow, block, or count requests based on the settings in the specified ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , or SizeConstraintSet . For example, if an IPSet includes the IP address 192.0.2.44 , AWS WAF will allow or block requests based on that IP address. Set Negated to True if you want AWS WAF to allow or block a request based on the negation of the settings in the ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , or SizeConstraintSet . For example, if an IPSet includes the IP address 192.0.2.44 , AWS WAF will allow, block, or count requests based on all IP addresses except 192.0.2.44 . Type (string) -- The type of predicate in a Rule , such as ByteMatch or IPSet . DataId (string) -- A unique identifier for a predicate in a Rule , such as ByteMatchSetId or IPSetId . The ID is returned by the corresponding Create or List command. RateKey (string) -- The field that AWS WAF uses to determine if requests are likely arriving from single source and thus subject to rate monitoring. The only valid value for RateKey is IP . IP indicates that requests arriving from the same IP address are subject to the RateLimit that is specified in the RateBasedRule . RateLimit (integer) -- The maximum number of requests, which have an identical value in the field specified by the RateKey , allowed in a five-minute period. If the number of requests exceeds the RateLimit and the other predicates specified in the rule are also met, AWS WAF triggers the action that is specified for this rule. ChangeToken (string) -- The ChangeToken that you used to submit the CreateRateBasedRule request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFDisallowedNameException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFLimitsExceededException WAFRegional.Client.exceptions.WAFTagOperationException WAFRegional.Client.exceptions.WAFTagOperationInternalErrorException WAFRegional.Client.exceptions.WAFBadRequestException :return: { 'Rule': { 'RuleId': 'string', 'Name': 'string', 'MetricName': 'string', 'MatchPredicates': [ { 'Negated': True|False, 'Type': 'IPMatch'|'ByteMatch'|'SqlInjectionMatch'|'GeoMatch'|'SizeConstraint'|'XssMatch'|'RegexMatch', 'DataId': 'string' }, ], 'RateKey': 'IP', 'RateLimit': 123 }, 'ChangeToken': 'string' } :returns: A ByteMatchSet with FieldToMatch of URI A PositionalConstraint of STARTS_WITH A TargetString of login """ pass def create_regex_match_set(Name=None, ChangeToken=None): """ Creates a RegexMatchSet . You then use UpdateRegexMatchSet to identify the part of a web request that you want AWS WAF to inspect, such as the values of the User-Agent header or the query string. For example, you can create a RegexMatchSet that contains a RegexMatchTuple that looks for any requests with User-Agent headers that match a RegexPatternSet with pattern B[a@]dB[o0]t . You can then configure AWS WAF to reject those requests. To create and configure a RegexMatchSet , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions :example: response = client.create_regex_match_set( Name='string', ChangeToken='string' ) :type Name: string :param Name: [REQUIRED] A friendly name or description of the RegexMatchSet . You can't change Name after you create a RegexMatchSet . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :rtype: dict ReturnsResponse Syntax { 'RegexMatchSet': { 'RegexMatchSetId': 'string', 'Name': 'string', 'RegexMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'RegexPatternSetId': 'string' }, ] }, 'ChangeToken': 'string' } Response Structure (dict) -- RegexMatchSet (dict) -- A RegexMatchSet that contains no RegexMatchTuple objects. RegexMatchSetId (string) -- The RegexMatchSetId for a RegexMatchSet . You use RegexMatchSetId to get information about a RegexMatchSet (see GetRegexMatchSet ), update a RegexMatchSet (see UpdateRegexMatchSet ), insert a RegexMatchSet into a Rule or delete one from a Rule (see UpdateRule ), and delete a RegexMatchSet from AWS WAF (see DeleteRegexMatchSet ). RegexMatchSetId is returned by CreateRegexMatchSet and by ListRegexMatchSets . Name (string) -- A friendly name or description of the RegexMatchSet . You can't change Name after you create a RegexMatchSet . RegexMatchTuples (list) -- Contains an array of RegexMatchTuple objects. Each RegexMatchTuple object contains: The part of a web request that you want AWS WAF to inspect, such as a query string or the value of the User-Agent header. The identifier of the pattern (a regular expression) that you want AWS WAF to look for. For more information, see RegexPatternSet . Whether to perform any conversions on the request, such as converting it to lowercase, before inspecting it for the specified string. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The regular expression pattern that you want AWS WAF to search for in web requests, the location in requests that you want AWS WAF to search, and other settings. Each RegexMatchTuple object contains: The part of a web request that you want AWS WAF to inspect, such as a query string or the value of the User-Agent header. The identifier of the pattern (a regular expression) that you want AWS WAF to look for. For more information, see RegexPatternSet . Whether to perform any conversions on the request, such as converting it to lowercase, before inspecting it for the specified string. FieldToMatch (dict) -- Specifies where in a web request to look for the RegexPatternSet . Type (string) -- The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) -- When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . TextTransformation (string) -- Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on RegexPatternSet before inspecting a request for a match. You can only specify a single type of TextTransformation. CMD_LINE When you're concerned that attackers are injecting an operating system commandline command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations: Delete the following characters: " ' ^ Delete spaces before the following characters: / ( Replace the following characters with a space: , ; Replace multiple spaces with one space Convert uppercase letters (A-Z) to lowercase (a-z) COMPRESS_WHITE_SPACE Use this option to replace the following characters with a space character (decimal 32): f, formfeed, decimal 12 t, tab, decimal 9 n, newline, decimal 10 r, carriage return, decimal 13 v, vertical tab, decimal 11 non-breaking space, decimal 160 COMPRESS_WHITE_SPACE also replaces multiple spaces with one space. HTML_ENTITY_DECODE Use this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations: Replaces (ampersand)quot; with " Replaces (ampersand)nbsp; with a non-breaking space, decimal 160 Replaces (ampersand)lt; with a "less than" symbol Replaces (ampersand)gt; with > Replaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters Replaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters LOWERCASE Use this option to convert uppercase letters (A-Z) to lowercase (a-z). URL_DECODE Use this option to decode a URL-encoded value. NONE Specify NONE if you don't want to perform any text transformations. RegexPatternSetId (string) -- The RegexPatternSetId for a RegexPatternSet . You use RegexPatternSetId to get information about a RegexPatternSet (see GetRegexPatternSet ), update a RegexPatternSet (see UpdateRegexPatternSet ), insert a RegexPatternSet into a RegexMatchSet or delete one from a RegexMatchSet (see UpdateRegexMatchSet ), and delete an RegexPatternSet from AWS WAF (see DeleteRegexPatternSet ). RegexPatternSetId is returned by CreateRegexPatternSet and by ListRegexPatternSets . ChangeToken (string) -- The ChangeToken that you used to submit the CreateRegexMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFDisallowedNameException WAFRegional.Client.exceptions.WAFLimitsExceededException :return: { 'RegexMatchSet': { 'RegexMatchSetId': 'string', 'Name': 'string', 'RegexMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'RegexPatternSetId': 'string' }, ] }, 'ChangeToken': 'string' } :returns: Name (string) -- [REQUIRED] A friendly name or description of the RegexMatchSet . You can't change Name after you create a RegexMatchSet . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def create_regex_pattern_set(Name=None, ChangeToken=None): """ Creates a RegexPatternSet . You then use UpdateRegexPatternSet to specify the regular expression (regex) pattern that you want AWS WAF to search for, such as B[a@]dB[o0]t . You can then configure AWS WAF to reject those requests. To create and configure a RegexPatternSet , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions :example: response = client.create_regex_pattern_set( Name='string', ChangeToken='string' ) :type Name: string :param Name: [REQUIRED] A friendly name or description of the RegexPatternSet . You can't change Name after you create a RegexPatternSet . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :rtype: dict ReturnsResponse Syntax { 'RegexPatternSet': { 'RegexPatternSetId': 'string', 'Name': 'string', 'RegexPatternStrings': [ 'string', ] }, 'ChangeToken': 'string' } Response Structure (dict) -- RegexPatternSet (dict) -- A RegexPatternSet that contains no objects. RegexPatternSetId (string) -- The identifier for the RegexPatternSet . You use RegexPatternSetId to get information about a RegexPatternSet , update a RegexPatternSet , remove a RegexPatternSet from a RegexMatchSet , and delete a RegexPatternSet from AWS WAF. RegexMatchSetId is returned by CreateRegexPatternSet and by ListRegexPatternSets . Name (string) -- A friendly name or description of the RegexPatternSet . You can't change Name after you create a RegexPatternSet . RegexPatternStrings (list) -- Specifies the regular expression (regex) patterns that you want AWS WAF to search for, such as B[a@]dB[o0]t . (string) -- ChangeToken (string) -- The ChangeToken that you used to submit the CreateRegexPatternSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFDisallowedNameException WAFRegional.Client.exceptions.WAFLimitsExceededException :return: { 'RegexPatternSet': { 'RegexPatternSetId': 'string', 'Name': 'string', 'RegexPatternStrings': [ 'string', ] }, 'ChangeToken': 'string' } :returns: Name (string) -- [REQUIRED] A friendly name or description of the RegexPatternSet . You can't change Name after you create a RegexPatternSet . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def create_rule(Name=None, MetricName=None, ChangeToken=None, Tags=None): """ Creates a Rule , which contains the IPSet objects, ByteMatchSet objects, and other predicates that identify the requests that you want to block. If you add more than one predicate to a Rule , a request must match all of the specifications to be allowed or blocked. For example, suppose that you add the following to a Rule : You then add the Rule to a WebACL and specify that you want to blocks requests that satisfy the Rule . For a request to be blocked, it must come from the IP address 192.0.2.44 and the User-Agent header in the request must contain the value BadBot . To create and configure a Rule , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions Examples The following example creates a rule named WAFByteHeaderRule. Expected Output: :example: response = client.create_rule( Name='string', MetricName='string', ChangeToken='string', Tags=[ { 'Key': 'string', 'Value': 'string' }, ] ) :type Name: string :param Name: [REQUIRED] A friendly name or description of the Rule . You can't change the name of a Rule after you create it. :type MetricName: string :param MetricName: [REQUIRED] A friendly name or description for the metrics for this Rule . The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can't contain whitespace or metric names reserved for AWS WAF, including 'All' and 'Default_Action.' You can't change the name of the metric after you create the Rule . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :type Tags: list :param Tags: (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. A tag associated with an AWS resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to 'customer' and the value to the customer name or ID. You can specify one or more tags to add to each AWS resource, up to 50 tags for a resource. Tagging is only available through the API, SDKs, and CLI. You can't manage or view tags through the AWS WAF Classic console. You can tag the AWS resources that you manage through AWS WAF Classic: web ACLs, rule groups, and rules. Key (string) -- [REQUIRED] Value (string) -- [REQUIRED] :rtype: dict ReturnsResponse Syntax { 'Rule': { 'RuleId': 'string', 'Name': 'string', 'MetricName': 'string', 'Predicates': [ { 'Negated': True|False, 'Type': 'IPMatch'|'ByteMatch'|'SqlInjectionMatch'|'GeoMatch'|'SizeConstraint'|'XssMatch'|'RegexMatch', 'DataId': 'string' }, ] }, 'ChangeToken': 'string' } Response Structure (dict) -- Rule (dict) -- The Rule returned in the CreateRule response. RuleId (string) -- A unique identifier for a Rule . You use RuleId to get more information about a Rule (see GetRule ), update a Rule (see UpdateRule ), insert a Rule into a WebACL or delete a one from a WebACL (see UpdateWebACL ), or delete a Rule from AWS WAF (see DeleteRule ). RuleId is returned by CreateRule and by ListRules . Name (string) -- The friendly name or description for the Rule . You can't change the name of a Rule after you create it. MetricName (string) -- A friendly name or description for the metrics for this Rule . The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can't contain whitespace or metric names reserved for AWS WAF, including "All" and "Default_Action." You can't change MetricName after you create the Rule . Predicates (list) -- The Predicates object contains one Predicate element for each ByteMatchSet , IPSet , or SqlInjectionMatchSet object that you want to include in a Rule . (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies the ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , and SizeConstraintSet objects that you want to add to a Rule and, for each object, indicates whether you want to negate the settings, for example, requests that do NOT originate from the IP address 192.0.2.44. Negated (boolean) -- Set Negated to False if you want AWS WAF to allow, block, or count requests based on the settings in the specified ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , or SizeConstraintSet . For example, if an IPSet includes the IP address 192.0.2.44 , AWS WAF will allow or block requests based on that IP address. Set Negated to True if you want AWS WAF to allow or block a request based on the negation of the settings in the ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , or SizeConstraintSet . For example, if an IPSet includes the IP address 192.0.2.44 , AWS WAF will allow, block, or count requests based on all IP addresses except 192.0.2.44 . Type (string) -- The type of predicate in a Rule , such as ByteMatch or IPSet . DataId (string) -- A unique identifier for a predicate in a Rule , such as ByteMatchSetId or IPSetId . The ID is returned by the corresponding Create or List command. ChangeToken (string) -- The ChangeToken that you used to submit the CreateRule request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFDisallowedNameException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFLimitsExceededException WAFRegional.Client.exceptions.WAFTagOperationException WAFRegional.Client.exceptions.WAFTagOperationInternalErrorException WAFRegional.Client.exceptions.WAFBadRequestException Examples The following example creates a rule named WAFByteHeaderRule. response = client.create_rule( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', MetricName='WAFByteHeaderRule', Name='WAFByteHeaderRule', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'Rule': { 'MetricName': 'WAFByteHeaderRule', 'Name': 'WAFByteHeaderRule', 'Predicates': [ { 'DataId': 'MyByteMatchSetID', 'Negated': False, 'Type': 'ByteMatch', }, ], 'RuleId': 'WAFRule-1-Example', }, 'ResponseMetadata': { '...': '...', }, } :return: { 'Rule': { 'RuleId': 'string', 'Name': 'string', 'MetricName': 'string', 'Predicates': [ { 'Negated': True|False, 'Type': 'IPMatch'|'ByteMatch'|'SqlInjectionMatch'|'GeoMatch'|'SizeConstraint'|'XssMatch'|'RegexMatch', 'DataId': 'string' }, ] }, 'ChangeToken': 'string' } :returns: Create and update the predicates that you want to include in the Rule . For more information, see CreateByteMatchSet , CreateIPSet , and CreateSqlInjectionMatchSet . Use GetChangeToken to get the change token that you provide in the ChangeToken parameter of a CreateRule request. Submit a CreateRule request. Use GetChangeToken to get the change token that you provide in the ChangeToken parameter of an UpdateRule request. Submit an UpdateRule request to specify the predicates that you want to include in the Rule . Create and update a WebACL that contains the Rule . For more information, see CreateWebACL . """ pass def create_rule_group(Name=None, MetricName=None, ChangeToken=None, Tags=None): """ Creates a RuleGroup . A rule group is a collection of predefined rules that you add to a web ACL. You use UpdateRuleGroup to add rules to the rule group. Rule groups are subject to the following limits: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions :example: response = client.create_rule_group( Name='string', MetricName='string', ChangeToken='string', Tags=[ { 'Key': 'string', 'Value': 'string' }, ] ) :type Name: string :param Name: [REQUIRED] A friendly name or description of the RuleGroup . You can't change Name after you create a RuleGroup . :type MetricName: string :param MetricName: [REQUIRED] A friendly name or description for the metrics for this RuleGroup . The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can't contain whitespace or metric names reserved for AWS WAF, including 'All' and 'Default_Action.' You can't change the name of the metric after you create the RuleGroup . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :type Tags: list :param Tags: (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. A tag associated with an AWS resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to 'customer' and the value to the customer name or ID. You can specify one or more tags to add to each AWS resource, up to 50 tags for a resource. Tagging is only available through the API, SDKs, and CLI. You can't manage or view tags through the AWS WAF Classic console. You can tag the AWS resources that you manage through AWS WAF Classic: web ACLs, rule groups, and rules. Key (string) -- [REQUIRED] Value (string) -- [REQUIRED] :rtype: dict ReturnsResponse Syntax { 'RuleGroup': { 'RuleGroupId': 'string', 'Name': 'string', 'MetricName': 'string' }, 'ChangeToken': 'string' } Response Structure (dict) -- RuleGroup (dict) -- An empty RuleGroup . RuleGroupId (string) -- A unique identifier for a RuleGroup . You use RuleGroupId to get more information about a RuleGroup (see GetRuleGroup ), update a RuleGroup (see UpdateRuleGroup ), insert a RuleGroup into a WebACL or delete a one from a WebACL (see UpdateWebACL ), or delete a RuleGroup from AWS WAF (see DeleteRuleGroup ). RuleGroupId is returned by CreateRuleGroup and by ListRuleGroups . Name (string) -- The friendly name or description for the RuleGroup . You can't change the name of a RuleGroup after you create it. MetricName (string) -- A friendly name or description for the metrics for this RuleGroup . The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can't contain whitespace or metric names reserved for AWS WAF, including "All" and "Default_Action." You can't change the name of the metric after you create the RuleGroup . ChangeToken (string) -- The ChangeToken that you used to submit the CreateRuleGroup request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFDisallowedNameException WAFRegional.Client.exceptions.WAFLimitsExceededException WAFRegional.Client.exceptions.WAFTagOperationException WAFRegional.Client.exceptions.WAFTagOperationInternalErrorException WAFRegional.Client.exceptions.WAFBadRequestException :return: { 'RuleGroup': { 'RuleGroupId': 'string', 'Name': 'string', 'MetricName': 'string' }, 'ChangeToken': 'string' } :returns: Name (string) -- [REQUIRED] A friendly name or description of the RuleGroup . You can't change Name after you create a RuleGroup . MetricName (string) -- [REQUIRED] A friendly name or description for the metrics for this RuleGroup . The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can't contain whitespace or metric names reserved for AWS WAF, including "All" and "Default_Action." You can't change the name of the metric after you create the RuleGroup . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . Tags (list) -- (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. A tag associated with an AWS resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to "customer" and the value to the customer name or ID. You can specify one or more tags to add to each AWS resource, up to 50 tags for a resource. Tagging is only available through the API, SDKs, and CLI. You can't manage or view tags through the AWS WAF Classic console. You can tag the AWS resources that you manage through AWS WAF Classic: web ACLs, rule groups, and rules. Key (string) -- [REQUIRED] Value (string) -- [REQUIRED] """ pass def create_size_constraint_set(Name=None, ChangeToken=None): """ Creates a SizeConstraintSet . You then use UpdateSizeConstraintSet to identify the part of a web request that you want AWS WAF to check for length, such as the length of the User-Agent header or the length of the query string. For example, you can create a SizeConstraintSet that matches any requests that have a query string that is longer than 100 bytes. You can then configure AWS WAF to reject those requests. To create and configure a SizeConstraintSet , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions Examples The following example creates size constraint set named MySampleSizeConstraintSet. Expected Output: :example: response = client.create_size_constraint_set( Name='string', ChangeToken='string' ) :type Name: string :param Name: [REQUIRED] A friendly name or description of the SizeConstraintSet . You can't change Name after you create a SizeConstraintSet . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :rtype: dict ReturnsResponse Syntax { 'SizeConstraintSet': { 'SizeConstraintSetId': 'string', 'Name': 'string', 'SizeConstraints': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'ComparisonOperator': 'EQ'|'NE'|'LE'|'LT'|'GE'|'GT', 'Size': 123 }, ] }, 'ChangeToken': 'string' } Response Structure (dict) -- SizeConstraintSet (dict) -- A SizeConstraintSet that contains no SizeConstraint objects. SizeConstraintSetId (string) -- A unique identifier for a SizeConstraintSet . You use SizeConstraintSetId to get information about a SizeConstraintSet (see GetSizeConstraintSet ), update a SizeConstraintSet (see UpdateSizeConstraintSet ), insert a SizeConstraintSet into a Rule or delete one from a Rule (see UpdateRule ), and delete a SizeConstraintSet from AWS WAF (see DeleteSizeConstraintSet ). SizeConstraintSetId is returned by CreateSizeConstraintSet and by ListSizeConstraintSets . Name (string) -- The name, if any, of the SizeConstraintSet . SizeConstraints (list) -- Specifies the parts of web requests that you want to inspect the size of. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies a constraint on the size of a part of the web request. AWS WAF uses the Size , ComparisonOperator , and FieldToMatch to build an expression in the form of "Size ComparisonOperator size in bytes of FieldToMatch ". If that expression is true, the SizeConstraint is considered to match. FieldToMatch (dict) -- Specifies where in a web request to look for the size constraint. Type (string) -- The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) -- When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . TextTransformation (string) -- Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on FieldToMatch before inspecting it for a match. You can only specify a single type of TextTransformation. Note that if you choose BODY for the value of Type , you must choose NONE for TextTransformation because CloudFront forwards only the first 8192 bytes for inspection. NONE Specify NONE if you don't want to perform any text transformations. CMD_LINE When you're concerned that attackers are injecting an operating system command line command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations: Delete the following characters: " ' ^ Delete spaces before the following characters: / ( Replace the following characters with a space: , ; Replace multiple spaces with one space Convert uppercase letters (A-Z) to lowercase (a-z) COMPRESS_WHITE_SPACE Use this option to replace the following characters with a space character (decimal 32): f, formfeed, decimal 12 t, tab, decimal 9 n, newline, decimal 10 r, carriage return, decimal 13 v, vertical tab, decimal 11 non-breaking space, decimal 160 COMPRESS_WHITE_SPACE also replaces multiple spaces with one space. HTML_ENTITY_DECODE Use this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations: Replaces (ampersand)quot; with " Replaces (ampersand)nbsp; with a non-breaking space, decimal 160 Replaces (ampersand)lt; with a "less than" symbol Replaces (ampersand)gt; with > Replaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters Replaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters LOWERCASE Use this option to convert uppercase letters (A-Z) to lowercase (a-z). URL_DECODE Use this option to decode a URL-encoded value. ComparisonOperator (string) -- The type of comparison you want AWS WAF to perform. AWS WAF uses this in combination with the provided Size and FieldToMatch to build an expression in the form of "Size ComparisonOperator size in bytes of FieldToMatch ". If that expression is true, the SizeConstraint is considered to match. EQ : Used to test if the Size is equal to the size of the FieldToMatch NE : Used to test if the Size is not equal to the size of the FieldToMatch LE : Used to test if the Size is less than or equal to the size of the FieldToMatch LT : Used to test if the Size is strictly less than the size of the FieldToMatch GE : Used to test if the Size is greater than or equal to the size of the FieldToMatch GT : Used to test if the Size is strictly greater than the size of the FieldToMatch Size (integer) -- The size in bytes that you want AWS WAF to compare against the size of the specified FieldToMatch . AWS WAF uses this in combination with ComparisonOperator and FieldToMatch to build an expression in the form of "Size ComparisonOperator size in bytes of FieldToMatch ". If that expression is true, the SizeConstraint is considered to match. Valid values for size are 0 - 21474836480 bytes (0 - 20 GB). If you specify URI for the value of Type , the / in the URI counts as one character. For example, the URI /logo.jpg is nine characters long. ChangeToken (string) -- The ChangeToken that you used to submit the CreateSizeConstraintSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFDisallowedNameException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFLimitsExceededException Examples The following example creates size constraint set named MySampleSizeConstraintSet. response = client.create_size_constraint_set( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', Name='MySampleSizeConstraintSet', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'SizeConstraintSet': { 'Name': 'MySampleSizeConstraintSet', 'SizeConstraintSetId': 'example1ds3t-46da-4fdb-b8d5-abc321j569j5', 'SizeConstraints': [ { 'ComparisonOperator': 'GT', 'FieldToMatch': { 'Type': 'QUERY_STRING', }, 'Size': 0, 'TextTransformation': 'NONE', }, ], }, 'ResponseMetadata': { '...': '...', }, } :return: { 'SizeConstraintSet': { 'SizeConstraintSetId': 'string', 'Name': 'string', 'SizeConstraints': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'ComparisonOperator': 'EQ'|'NE'|'LE'|'LT'|'GE'|'GT', 'Size': 123 }, ] }, 'ChangeToken': 'string' } :returns: Name (string) -- [REQUIRED] A friendly name or description of the SizeConstraintSet . You can't change Name after you create a SizeConstraintSet . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def create_sql_injection_match_set(Name=None, ChangeToken=None): """ Creates a SqlInjectionMatchSet , which you use to allow, block, or count requests that contain snippets of SQL code in a specified part of web requests. AWS WAF searches for character sequences that are likely to be malicious strings. To create and configure a SqlInjectionMatchSet , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions Examples The following example creates a SQL injection match set named MySQLInjectionMatchSet. Expected Output: :example: response = client.create_sql_injection_match_set( Name='string', ChangeToken='string' ) :type Name: string :param Name: [REQUIRED] A friendly name or description for the SqlInjectionMatchSet that you're creating. You can't change Name after you create the SqlInjectionMatchSet . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :rtype: dict ReturnsResponse Syntax { 'SqlInjectionMatchSet': { 'SqlInjectionMatchSetId': 'string', 'Name': 'string', 'SqlInjectionMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE' }, ] }, 'ChangeToken': 'string' } Response Structure (dict) -- The response to a CreateSqlInjectionMatchSet request. SqlInjectionMatchSet (dict) -- A SqlInjectionMatchSet . SqlInjectionMatchSetId (string) -- A unique identifier for a SqlInjectionMatchSet . You use SqlInjectionMatchSetId to get information about a SqlInjectionMatchSet (see GetSqlInjectionMatchSet ), update a SqlInjectionMatchSet (see UpdateSqlInjectionMatchSet ), insert a SqlInjectionMatchSet into a Rule or delete one from a Rule (see UpdateRule ), and delete a SqlInjectionMatchSet from AWS WAF (see DeleteSqlInjectionMatchSet ). SqlInjectionMatchSetId is returned by CreateSqlInjectionMatchSet and by ListSqlInjectionMatchSets . Name (string) -- The name, if any, of the SqlInjectionMatchSet . SqlInjectionMatchTuples (list) -- Specifies the parts of web requests that you want to inspect for snippets of malicious SQL code. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies the part of a web request that you want AWS WAF to inspect for snippets of malicious SQL code and, if you want AWS WAF to inspect a header, the name of the header. FieldToMatch (dict) -- Specifies where in a web request to look for snippets of malicious SQL code. Type (string) -- The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) -- When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . TextTransformation (string) -- Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on FieldToMatch before inspecting it for a match. You can only specify a single type of TextTransformation. CMD_LINE When you're concerned that attackers are injecting an operating system command line command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations: Delete the following characters: " ' ^ Delete spaces before the following characters: / ( Replace the following characters with a space: , ; Replace multiple spaces with one space Convert uppercase letters (A-Z) to lowercase (a-z) COMPRESS_WHITE_SPACE Use this option to replace the following characters with a space character (decimal 32): f, formfeed, decimal 12 t, tab, decimal 9 n, newline, decimal 10 r, carriage return, decimal 13 v, vertical tab, decimal 11 non-breaking space, decimal 160 COMPRESS_WHITE_SPACE also replaces multiple spaces with one space. HTML_ENTITY_DECODE Use this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations: Replaces (ampersand)quot; with " Replaces (ampersand)nbsp; with a non-breaking space, decimal 160 Replaces (ampersand)lt; with a "less than" symbol Replaces (ampersand)gt; with > Replaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters Replaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters LOWERCASE Use this option to convert uppercase letters (A-Z) to lowercase (a-z). URL_DECODE Use this option to decode a URL-encoded value. NONE Specify NONE if you don't want to perform any text transformations. ChangeToken (string) -- The ChangeToken that you used to submit the CreateSqlInjectionMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFDisallowedNameException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFLimitsExceededException Examples The following example creates a SQL injection match set named MySQLInjectionMatchSet. response = client.create_sql_injection_match_set( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', Name='MySQLInjectionMatchSet', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'SqlInjectionMatchSet': { 'Name': 'MySQLInjectionMatchSet', 'SqlInjectionMatchSetId': 'example1ds3t-46da-4fdb-b8d5-abc321j569j5', 'SqlInjectionMatchTuples': [ { 'FieldToMatch': { 'Type': 'QUERY_STRING', }, 'TextTransformation': 'URL_DECODE', }, ], }, 'ResponseMetadata': { '...': '...', }, } :return: { 'SqlInjectionMatchSet': { 'SqlInjectionMatchSetId': 'string', 'Name': 'string', 'SqlInjectionMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE' }, ] }, 'ChangeToken': 'string' } :returns: Name (string) -- [REQUIRED] A friendly name or description for the SqlInjectionMatchSet that you're creating. You can't change Name after you create the SqlInjectionMatchSet . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def create_web_acl(Name=None, MetricName=None, DefaultAction=None, ChangeToken=None, Tags=None): """ Creates a WebACL , which contains the Rules that identify the CloudFront web requests that you want to allow, block, or count. AWS WAF evaluates Rules in order based on the value of Priority for each Rule . You also specify a default action, either ALLOW or BLOCK . If a web request doesn't match any of the Rules in a WebACL , AWS WAF responds to the request with the default action. To create and configure a WebACL , perform the following steps: For more information about how to use the AWS WAF API, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions Examples The following example creates a web ACL named CreateExample. Expected Output: :example: response = client.create_web_acl( Name='string', MetricName='string', DefaultAction={ 'Type': 'BLOCK'|'ALLOW'|'COUNT' }, ChangeToken='string', Tags=[ { 'Key': 'string', 'Value': 'string' }, ] ) :type Name: string :param Name: [REQUIRED] A friendly name or description of the WebACL . You can't change Name after you create the WebACL . :type MetricName: string :param MetricName: [REQUIRED] A friendly name or description for the metrics for this WebACL .The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can't contain whitespace or metric names reserved for AWS WAF, including 'All' and 'Default_Action.' You can't change MetricName after you create the WebACL . :type DefaultAction: dict :param DefaultAction: [REQUIRED] The action that you want AWS WAF to take when a request doesn't match the criteria specified in any of the Rule objects that are associated with the WebACL . Type (string) -- [REQUIRED]Specifies how you want AWS WAF to respond to requests that match the settings in a Rule . Valid settings include the following: ALLOW : AWS WAF allows requests BLOCK : AWS WAF blocks requests COUNT : AWS WAF increments a counter of the requests that match all of the conditions in the rule. AWS WAF then continues to inspect the web request based on the remaining rules in the web ACL. You can't specify COUNT for the default action for a WebACL . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :type Tags: list :param Tags: (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. A tag associated with an AWS resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to 'customer' and the value to the customer name or ID. You can specify one or more tags to add to each AWS resource, up to 50 tags for a resource. Tagging is only available through the API, SDKs, and CLI. You can't manage or view tags through the AWS WAF Classic console. You can tag the AWS resources that you manage through AWS WAF Classic: web ACLs, rule groups, and rules. Key (string) -- [REQUIRED] Value (string) -- [REQUIRED] :rtype: dict ReturnsResponse Syntax { 'WebACL': { 'WebACLId': 'string', 'Name': 'string', 'MetricName': 'string', 'DefaultAction': { 'Type': 'BLOCK'|'ALLOW'|'COUNT' }, 'Rules': [ { 'Priority': 123, 'RuleId': 'string', 'Action': { 'Type': 'BLOCK'|'ALLOW'|'COUNT' }, 'OverrideAction': { 'Type': 'NONE'|'COUNT' }, 'Type': 'REGULAR'|'RATE_BASED'|'GROUP', 'ExcludedRules': [ { 'RuleId': 'string' }, ] }, ], 'WebACLArn': 'string' }, 'ChangeToken': 'string' } Response Structure (dict) -- WebACL (dict) -- The WebACL returned in the CreateWebACL response. WebACLId (string) -- A unique identifier for a WebACL . You use WebACLId to get information about a WebACL (see GetWebACL ), update a WebACL (see UpdateWebACL ), and delete a WebACL from AWS WAF (see DeleteWebACL ). WebACLId is returned by CreateWebACL and by ListWebACLs . Name (string) -- A friendly name or description of the WebACL . You can't change the name of a WebACL after you create it. MetricName (string) -- A friendly name or description for the metrics for this WebACL . The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can't contain whitespace or metric names reserved for AWS WAF, including "All" and "Default_Action." You can't change MetricName after you create the WebACL . DefaultAction (dict) -- The action to perform if none of the Rules contained in the WebACL match. The action is specified by the WafAction object. Type (string) -- Specifies how you want AWS WAF to respond to requests that match the settings in a Rule . Valid settings include the following: ALLOW : AWS WAF allows requests BLOCK : AWS WAF blocks requests COUNT : AWS WAF increments a counter of the requests that match all of the conditions in the rule. AWS WAF then continues to inspect the web request based on the remaining rules in the web ACL. You can't specify COUNT for the default action for a WebACL . Rules (list) -- An array that contains the action for each Rule in a WebACL , the priority of the Rule , and the ID of the Rule . (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The ActivatedRule object in an UpdateWebACL request specifies a Rule that you want to insert or delete, the priority of the Rule in the WebACL , and the action that you want AWS WAF to take when a web request matches the Rule (ALLOW , BLOCK , or COUNT ). To specify whether to insert or delete a Rule , use the Action parameter in the WebACLUpdate data type. Priority (integer) -- Specifies the order in which the Rules in a WebACL are evaluated. Rules with a lower value for Priority are evaluated before Rules with a higher value. The value must be a unique integer. If you add multiple Rules to a WebACL , the values don't need to be consecutive. RuleId (string) -- The RuleId for a Rule . You use RuleId to get more information about a Rule (see GetRule ), update a Rule (see UpdateRule ), insert a Rule into a WebACL or delete a one from a WebACL (see UpdateWebACL ), or delete a Rule from AWS WAF (see DeleteRule ). RuleId is returned by CreateRule and by ListRules . Action (dict) -- Specifies the action that CloudFront or AWS WAF takes when a web request matches the conditions in the Rule . Valid values for Action include the following: ALLOW : CloudFront responds with the requested object. BLOCK : CloudFront responds with an HTTP 403 (Forbidden) status code. COUNT : AWS WAF increments a counter of requests that match the conditions in the rule and then continues to inspect the web request based on the remaining rules in the web ACL. ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case, you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction . Type (string) -- Specifies how you want AWS WAF to respond to requests that match the settings in a Rule . Valid settings include the following: ALLOW : AWS WAF allows requests BLOCK : AWS WAF blocks requests COUNT : AWS WAF increments a counter of the requests that match all of the conditions in the rule. AWS WAF then continues to inspect the web request based on the remaining rules in the web ACL. You can't specify COUNT for the default action for a WebACL . OverrideAction (dict) -- Use the OverrideAction to test your RuleGroup . Any rule in a RuleGroup can potentially block a request. If you set the OverrideAction to None , the RuleGroup will block a request if any individual rule in the RuleGroup matches the request and is configured to block that request. However if you first want to test the RuleGroup , set the OverrideAction to Count . The RuleGroup will then override any block action specified by individual rules contained within the group. Instead of blocking matching requests, those requests will be counted. You can view a record of counted requests using GetSampledRequests . ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction . Type (string) -- COUNT overrides the action specified by the individual rule within a RuleGroup . If set to NONE , the rule's action will take place. Type (string) -- The rule type, either REGULAR , as defined by Rule , RATE_BASED , as defined by RateBasedRule , or GROUP , as defined by RuleGroup . The default is REGULAR. Although this field is optional, be aware that if you try to add a RATE_BASED rule to a web ACL without setting the type, the UpdateWebACL request will fail because the request tries to add a REGULAR rule with the specified ID, which does not exist. ExcludedRules (list) -- An array of rules to exclude from a rule group. This is applicable only when the ActivatedRule refers to a RuleGroup . Sometimes it is necessary to troubleshoot rule groups that are blocking traffic unexpectedly (false positives). One troubleshooting technique is to identify the specific rule within the rule group that is blocking the legitimate traffic and then disable (exclude) that particular rule. You can exclude rules from both your own rule groups and AWS Marketplace rule groups that have been associated with a web ACL. Specifying ExcludedRules does not remove those rules from the rule group. Rather, it changes the action for the rules to COUNT . Therefore, requests that match an ExcludedRule are counted but not blocked. The RuleGroup owner will receive COUNT metrics for each ExcludedRule . If you want to exclude rules from a rule group that is already associated with a web ACL, perform the following steps: Use the AWS WAF logs to identify the IDs of the rules that you want to exclude. For more information about the logs, see Logging Web ACL Traffic Information . Submit an UpdateWebACL request that has two actions: The first action deletes the existing rule group from the web ACL. That is, in the UpdateWebACL request, the first Updates:Action should be DELETE and Updates:ActivatedRule:RuleId should be the rule group that contains the rules that you want to exclude. The second action inserts the same rule group back in, but specifying the rules to exclude. That is, the second Updates:Action should be INSERT , Updates:ActivatedRule:RuleId should be the rule group that you just removed, and ExcludedRules should contain the rules that you want to exclude. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The rule to exclude from a rule group. This is applicable only when the ActivatedRule refers to a RuleGroup . The rule must belong to the RuleGroup that is specified by the ActivatedRule . RuleId (string) -- The unique identifier for the rule to exclude from the rule group. WebACLArn (string) -- Tha Amazon Resource Name (ARN) of the web ACL. ChangeToken (string) -- The ChangeToken that you used to submit the CreateWebACL request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFDisallowedNameException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFLimitsExceededException WAFRegional.Client.exceptions.WAFTagOperationException WAFRegional.Client.exceptions.WAFTagOperationInternalErrorException WAFRegional.Client.exceptions.WAFBadRequestException Examples The following example creates a web ACL named CreateExample. response = client.create_web_acl( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', DefaultAction={ 'Type': 'ALLOW', }, MetricName='CreateExample', Name='CreateExample', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'WebACL': { 'DefaultAction': { 'Type': 'ALLOW', }, 'MetricName': 'CreateExample', 'Name': 'CreateExample', 'Rules': [ { 'Action': { 'Type': 'ALLOW', }, 'Priority': 1, 'RuleId': 'WAFRule-1-Example', }, ], 'WebACLId': 'example-46da-4444-5555-example', }, 'ResponseMetadata': { '...': '...', }, } :return: { 'WebACL': { 'WebACLId': 'string', 'Name': 'string', 'MetricName': 'string', 'DefaultAction': { 'Type': 'BLOCK'|'ALLOW'|'COUNT' }, 'Rules': [ { 'Priority': 123, 'RuleId': 'string', 'Action': { 'Type': 'BLOCK'|'ALLOW'|'COUNT' }, 'OverrideAction': { 'Type': 'NONE'|'COUNT' }, 'Type': 'REGULAR'|'RATE_BASED'|'GROUP', 'ExcludedRules': [ { 'RuleId': 'string' }, ] }, ], 'WebACLArn': 'string' }, 'ChangeToken': 'string' } :returns: Name (string) -- [REQUIRED] A friendly name or description of the WebACL . You can't change Name after you create the WebACL . MetricName (string) -- [REQUIRED] A friendly name or description for the metrics for this WebACL .The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can't contain whitespace or metric names reserved for AWS WAF, including "All" and "Default_Action." You can't change MetricName after you create the WebACL . DefaultAction (dict) -- [REQUIRED] The action that you want AWS WAF to take when a request doesn't match the criteria specified in any of the Rule objects that are associated with the WebACL . Type (string) -- [REQUIRED]Specifies how you want AWS WAF to respond to requests that match the settings in a Rule . Valid settings include the following: ALLOW : AWS WAF allows requests BLOCK : AWS WAF blocks requests COUNT : AWS WAF increments a counter of the requests that match all of the conditions in the rule. AWS WAF then continues to inspect the web request based on the remaining rules in the web ACL. You can't specify COUNT for the default action for a WebACL . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . Tags (list) -- (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. A tag associated with an AWS resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to "customer" and the value to the customer name or ID. You can specify one or more tags to add to each AWS resource, up to 50 tags for a resource. Tagging is only available through the API, SDKs, and CLI. You can't manage or view tags through the AWS WAF Classic console. You can tag the AWS resources that you manage through AWS WAF Classic: web ACLs, rule groups, and rules. Key (string) -- [REQUIRED] Value (string) -- [REQUIRED] """ pass def create_web_acl_migration_stack(WebACLId=None, S3BucketName=None, IgnoreUnsupportedType=None): """ Creates an AWS CloudFormation WAFV2 template for the specified web ACL in the specified Amazon S3 bucket. Then, in CloudFormation, you create a stack from the template, to create the web ACL and its resources in AWS WAFV2. Use this to migrate your AWS WAF Classic web ACL to the latest version of AWS WAF. This is part of a larger migration procedure for web ACLs from AWS WAF Classic to the latest version of AWS WAF. For the full procedure, including caveats and manual steps to complete the migration and switch over to the new web ACL, see Migrating your AWS WAF Classic resources to AWS WAF in the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions :example: response = client.create_web_acl_migration_stack( WebACLId='string', S3BucketName='string', IgnoreUnsupportedType=True|False ) :type WebACLId: string :param WebACLId: [REQUIRED] The UUID of the WAF Classic web ACL that you want to migrate to WAF v2. :type S3BucketName: string :param S3BucketName: [REQUIRED] The name of the Amazon S3 bucket to store the CloudFormation template in. The S3 bucket must be configured as follows for the migration: The bucket name must start with aws-waf-migration- . For example, aws-waf-migration-my-web-acl . The bucket must be in the Region where you are deploying the template. For example, for a web ACL in us-west-2, you must use an Amazon S3 bucket in us-west-2 and you must deploy the template stack to us-west-2. The bucket policies must permit the migration process to write data. For listings of the bucket policies, see the Examples section. :type IgnoreUnsupportedType: boolean :param IgnoreUnsupportedType: [REQUIRED] Indicates whether to exclude entities that can't be migrated or to stop the migration. Set this to true to ignore unsupported entities in the web ACL during the migration. Otherwise, if AWS WAF encounters unsupported entities, it stops the process and throws an exception. :rtype: dict ReturnsResponse Syntax { 'S3ObjectUrl': 'string' } Response Structure (dict) -- S3ObjectUrl (string) -- The URL of the template created in Amazon S3. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFEntityMigrationException :return: { 'S3ObjectUrl': 'string' } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFEntityMigrationException """ pass def create_xss_match_set(Name=None, ChangeToken=None): """ Creates an XssMatchSet , which you use to allow, block, or count requests that contain cross-site scripting attacks in the specified part of web requests. AWS WAF searches for character sequences that are likely to be malicious strings. To create and configure an XssMatchSet , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions Examples The following example creates an XSS match set named MySampleXssMatchSet. Expected Output: :example: response = client.create_xss_match_set( Name='string', ChangeToken='string' ) :type Name: string :param Name: [REQUIRED] A friendly name or description for the XssMatchSet that you're creating. You can't change Name after you create the XssMatchSet . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :rtype: dict ReturnsResponse Syntax { 'XssMatchSet': { 'XssMatchSetId': 'string', 'Name': 'string', 'XssMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE' }, ] }, 'ChangeToken': 'string' } Response Structure (dict) -- The response to a CreateXssMatchSet request. XssMatchSet (dict) -- An XssMatchSet . XssMatchSetId (string) -- A unique identifier for an XssMatchSet . You use XssMatchSetId to get information about an XssMatchSet (see GetXssMatchSet ), update an XssMatchSet (see UpdateXssMatchSet ), insert an XssMatchSet into a Rule or delete one from a Rule (see UpdateRule ), and delete an XssMatchSet from AWS WAF (see DeleteXssMatchSet ). XssMatchSetId is returned by CreateXssMatchSet and by ListXssMatchSets . Name (string) -- The name, if any, of the XssMatchSet . XssMatchTuples (list) -- Specifies the parts of web requests that you want to inspect for cross-site scripting attacks. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies the part of a web request that you want AWS WAF to inspect for cross-site scripting attacks and, if you want AWS WAF to inspect a header, the name of the header. FieldToMatch (dict) -- Specifies where in a web request to look for cross-site scripting attacks. Type (string) -- The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) -- When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . TextTransformation (string) -- Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on FieldToMatch before inspecting it for a match. You can only specify a single type of TextTransformation. CMD_LINE When you're concerned that attackers are injecting an operating system command line command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations: Delete the following characters: " ' ^ Delete spaces before the following characters: / ( Replace the following characters with a space: , ; Replace multiple spaces with one space Convert uppercase letters (A-Z) to lowercase (a-z) COMPRESS_WHITE_SPACE Use this option to replace the following characters with a space character (decimal 32): f, formfeed, decimal 12 t, tab, decimal 9 n, newline, decimal 10 r, carriage return, decimal 13 v, vertical tab, decimal 11 non-breaking space, decimal 160 COMPRESS_WHITE_SPACE also replaces multiple spaces with one space. HTML_ENTITY_DECODE Use this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations: Replaces (ampersand)quot; with " Replaces (ampersand)nbsp; with a non-breaking space, decimal 160 Replaces (ampersand)lt; with a "less than" symbol Replaces (ampersand)gt; with > Replaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters Replaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters LOWERCASE Use this option to convert uppercase letters (A-Z) to lowercase (a-z). URL_DECODE Use this option to decode a URL-encoded value. NONE Specify NONE if you don't want to perform any text transformations. ChangeToken (string) -- The ChangeToken that you used to submit the CreateXssMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFDisallowedNameException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFLimitsExceededException Examples The following example creates an XSS match set named MySampleXssMatchSet. response = client.create_xss_match_set( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', Name='MySampleXssMatchSet', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'XssMatchSet': { 'Name': 'MySampleXssMatchSet', 'XssMatchSetId': 'example1ds3t-46da-4fdb-b8d5-abc321j569j5', 'XssMatchTuples': [ { 'FieldToMatch': { 'Type': 'QUERY_STRING', }, 'TextTransformation': 'URL_DECODE', }, ], }, 'ResponseMetadata': { '...': '...', }, } :return: { 'XssMatchSet': { 'XssMatchSetId': 'string', 'Name': 'string', 'XssMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE' }, ] }, 'ChangeToken': 'string' } :returns: Name (string) -- [REQUIRED] A friendly name or description for the XssMatchSet that you're creating. You can't change Name after you create the XssMatchSet . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def delete_byte_match_set(ByteMatchSetId=None, ChangeToken=None): """ Permanently deletes a ByteMatchSet . You can't delete a ByteMatchSet if it's still used in any Rules or if it still includes any ByteMatchTuple objects (any filters). If you just want to remove a ByteMatchSet from a Rule , use UpdateRule . To permanently delete a ByteMatchSet , perform the following steps: See also: AWS API Documentation Exceptions Examples The following example deletes a byte match set with the ID exampleIDs3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.delete_byte_match_set( ByteMatchSetId='string', ChangeToken='string' ) :type ByteMatchSetId: string :param ByteMatchSetId: [REQUIRED] The ByteMatchSetId of the ByteMatchSet that you want to delete. ByteMatchSetId is returned by CreateByteMatchSet and by ListByteMatchSets . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the DeleteByteMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFNonEmptyEntityException Examples The following example deletes a byte match set with the ID exampleIDs3t-46da-4fdb-b8d5-abc321j569j5. response = client.delete_byte_match_set( ByteMatchSetId='exampleIDs3t-46da-4fdb-b8d5-abc321j569j5', ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } :returns: ByteMatchSetId (string) -- [REQUIRED] The ByteMatchSetId of the ByteMatchSet that you want to delete. ByteMatchSetId is returned by CreateByteMatchSet and by ListByteMatchSets . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def delete_geo_match_set(GeoMatchSetId=None, ChangeToken=None): """ Permanently deletes a GeoMatchSet . You can't delete a GeoMatchSet if it's still used in any Rules or if it still includes any countries. If you just want to remove a GeoMatchSet from a Rule , use UpdateRule . To permanently delete a GeoMatchSet from AWS WAF, perform the following steps: See also: AWS API Documentation Exceptions :example: response = client.delete_geo_match_set( GeoMatchSetId='string', ChangeToken='string' ) :type GeoMatchSetId: string :param GeoMatchSetId: [REQUIRED] The GeoMatchSetID of the GeoMatchSet that you want to delete. GeoMatchSetId is returned by CreateGeoMatchSet and by ListGeoMatchSets . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the DeleteGeoMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFNonEmptyEntityException :return: { 'ChangeToken': 'string' } :returns: GeoMatchSetId (string) -- [REQUIRED] The GeoMatchSetID of the GeoMatchSet that you want to delete. GeoMatchSetId is returned by CreateGeoMatchSet and by ListGeoMatchSets . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def delete_ip_set(IPSetId=None, ChangeToken=None): """ Permanently deletes an IPSet . You can't delete an IPSet if it's still used in any Rules or if it still includes any IP addresses. If you just want to remove an IPSet from a Rule , use UpdateRule . To permanently delete an IPSet from AWS WAF, perform the following steps: See also: AWS API Documentation Exceptions Examples The following example deletes an IP match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.delete_ip_set( IPSetId='string', ChangeToken='string' ) :type IPSetId: string :param IPSetId: [REQUIRED] The IPSetId of the IPSet that you want to delete. IPSetId is returned by CreateIPSet and by ListIPSets . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the DeleteIPSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFNonEmptyEntityException Examples The following example deletes an IP match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. response = client.delete_ip_set( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', IPSetId='example1ds3t-46da-4fdb-b8d5-abc321j569j5', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } :returns: IPSetId (string) -- [REQUIRED] The IPSetId of the IPSet that you want to delete. IPSetId is returned by CreateIPSet and by ListIPSets . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def delete_logging_configuration(ResourceArn=None): """ Permanently deletes the LoggingConfiguration from the specified web ACL. See also: AWS API Documentation Exceptions :example: response = client.delete_logging_configuration( ResourceArn='string' ) :type ResourceArn: string :param ResourceArn: [REQUIRED] The Amazon Resource Name (ARN) of the web ACL from which you want to delete the LoggingConfiguration . :rtype: dict ReturnsResponse Syntax{} Response Structure (dict) -- Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFStaleDataException :return: {} :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFStaleDataException """ pass def delete_permission_policy(ResourceArn=None): """ Permanently deletes an IAM policy from the specified RuleGroup. The user making the request must be the owner of the RuleGroup. See also: AWS API Documentation Exceptions :example: response = client.delete_permission_policy( ResourceArn='string' ) :type ResourceArn: string :param ResourceArn: [REQUIRED] The Amazon Resource Name (ARN) of the RuleGroup from which you want to delete the policy. The user making the request must be the owner of the RuleGroup. :rtype: dict ReturnsResponse Syntax{} Response Structure (dict) -- Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFNonexistentItemException :return: {} :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFNonexistentItemException """ pass def delete_rate_based_rule(RuleId=None, ChangeToken=None): """ Permanently deletes a RateBasedRule . You can't delete a rule if it's still used in any WebACL objects or if it still includes any predicates, such as ByteMatchSet objects. If you just want to remove a rule from a WebACL , use UpdateWebACL . To permanently delete a RateBasedRule from AWS WAF, perform the following steps: See also: AWS API Documentation Exceptions :example: response = client.delete_rate_based_rule( RuleId='string', ChangeToken='string' ) :type RuleId: string :param RuleId: [REQUIRED] The RuleId of the RateBasedRule that you want to delete. RuleId is returned by CreateRateBasedRule and by ListRateBasedRules . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the DeleteRateBasedRule request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFNonEmptyEntityException WAFRegional.Client.exceptions.WAFTagOperationException WAFRegional.Client.exceptions.WAFTagOperationInternalErrorException :return: { 'ChangeToken': 'string' } :returns: RuleId (string) -- [REQUIRED] The RuleId of the RateBasedRule that you want to delete. RuleId is returned by CreateRateBasedRule and by ListRateBasedRules . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def delete_regex_match_set(RegexMatchSetId=None, ChangeToken=None): """ Permanently deletes a RegexMatchSet . You can't delete a RegexMatchSet if it's still used in any Rules or if it still includes any RegexMatchTuples objects (any filters). If you just want to remove a RegexMatchSet from a Rule , use UpdateRule . To permanently delete a RegexMatchSet , perform the following steps: See also: AWS API Documentation Exceptions :example: response = client.delete_regex_match_set( RegexMatchSetId='string', ChangeToken='string' ) :type RegexMatchSetId: string :param RegexMatchSetId: [REQUIRED] The RegexMatchSetId of the RegexMatchSet that you want to delete. RegexMatchSetId is returned by CreateRegexMatchSet and by ListRegexMatchSets . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the DeleteRegexMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFNonEmptyEntityException :return: { 'ChangeToken': 'string' } :returns: RegexMatchSetId (string) -- [REQUIRED] The RegexMatchSetId of the RegexMatchSet that you want to delete. RegexMatchSetId is returned by CreateRegexMatchSet and by ListRegexMatchSets . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def delete_regex_pattern_set(RegexPatternSetId=None, ChangeToken=None): """ Permanently deletes a RegexPatternSet . You can't delete a RegexPatternSet if it's still used in any RegexMatchSet or if the RegexPatternSet is not empty. See also: AWS API Documentation Exceptions :example: response = client.delete_regex_pattern_set( RegexPatternSetId='string', ChangeToken='string' ) :type RegexPatternSetId: string :param RegexPatternSetId: [REQUIRED] The RegexPatternSetId of the RegexPatternSet that you want to delete. RegexPatternSetId is returned by CreateRegexPatternSet and by ListRegexPatternSets . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the DeleteRegexPatternSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFNonEmptyEntityException :return: { 'ChangeToken': 'string' } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFNonEmptyEntityException """ pass def delete_rule(RuleId=None, ChangeToken=None): """ Permanently deletes a Rule . You can't delete a Rule if it's still used in any WebACL objects or if it still includes any predicates, such as ByteMatchSet objects. If you just want to remove a Rule from a WebACL , use UpdateWebACL . To permanently delete a Rule from AWS WAF, perform the following steps: See also: AWS API Documentation Exceptions Examples The following example deletes a rule with the ID WAFRule-1-Example. Expected Output: :example: response = client.delete_rule( RuleId='string', ChangeToken='string' ) :type RuleId: string :param RuleId: [REQUIRED] The RuleId of the Rule that you want to delete. RuleId is returned by CreateRule and by ListRules . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the DeleteRule request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFNonEmptyEntityException WAFRegional.Client.exceptions.WAFTagOperationException WAFRegional.Client.exceptions.WAFTagOperationInternalErrorException Examples The following example deletes a rule with the ID WAFRule-1-Example. response = client.delete_rule( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', RuleId='WAFRule-1-Example', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } :returns: RuleId (string) -- [REQUIRED] The RuleId of the Rule that you want to delete. RuleId is returned by CreateRule and by ListRules . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def delete_rule_group(RuleGroupId=None, ChangeToken=None): """ Permanently deletes a RuleGroup . You can't delete a RuleGroup if it's still used in any WebACL objects or if it still includes any rules. If you just want to remove a RuleGroup from a WebACL , use UpdateWebACL . To permanently delete a RuleGroup from AWS WAF, perform the following steps: See also: AWS API Documentation Exceptions :example: response = client.delete_rule_group( RuleGroupId='string', ChangeToken='string' ) :type RuleGroupId: string :param RuleGroupId: [REQUIRED] The RuleGroupId of the RuleGroup that you want to delete. RuleGroupId is returned by CreateRuleGroup and by ListRuleGroups . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the DeleteRuleGroup request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFNonEmptyEntityException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFTagOperationException WAFRegional.Client.exceptions.WAFTagOperationInternalErrorException :return: { 'ChangeToken': 'string' } :returns: RuleGroupId (string) -- [REQUIRED] The RuleGroupId of the RuleGroup that you want to delete. RuleGroupId is returned by CreateRuleGroup and by ListRuleGroups . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def delete_size_constraint_set(SizeConstraintSetId=None, ChangeToken=None): """ Permanently deletes a SizeConstraintSet . You can't delete a SizeConstraintSet if it's still used in any Rules or if it still includes any SizeConstraint objects (any filters). If you just want to remove a SizeConstraintSet from a Rule , use UpdateRule . To permanently delete a SizeConstraintSet , perform the following steps: See also: AWS API Documentation Exceptions Examples The following example deletes a size constraint set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.delete_size_constraint_set( SizeConstraintSetId='string', ChangeToken='string' ) :type SizeConstraintSetId: string :param SizeConstraintSetId: [REQUIRED] The SizeConstraintSetId of the SizeConstraintSet that you want to delete. SizeConstraintSetId is returned by CreateSizeConstraintSet and by ListSizeConstraintSets . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the DeleteSizeConstraintSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFNonEmptyEntityException Examples The following example deletes a size constraint set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. response = client.delete_size_constraint_set( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', SizeConstraintSetId='example1ds3t-46da-4fdb-b8d5-abc321j569j5', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } :returns: SizeConstraintSetId (string) -- [REQUIRED] The SizeConstraintSetId of the SizeConstraintSet that you want to delete. SizeConstraintSetId is returned by CreateSizeConstraintSet and by ListSizeConstraintSets . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def delete_sql_injection_match_set(SqlInjectionMatchSetId=None, ChangeToken=None): """ Permanently deletes a SqlInjectionMatchSet . You can't delete a SqlInjectionMatchSet if it's still used in any Rules or if it still contains any SqlInjectionMatchTuple objects. If you just want to remove a SqlInjectionMatchSet from a Rule , use UpdateRule . To permanently delete a SqlInjectionMatchSet from AWS WAF, perform the following steps: See also: AWS API Documentation Exceptions Examples The following example deletes a SQL injection match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.delete_sql_injection_match_set( SqlInjectionMatchSetId='string', ChangeToken='string' ) :type SqlInjectionMatchSetId: string :param SqlInjectionMatchSetId: [REQUIRED] The SqlInjectionMatchSetId of the SqlInjectionMatchSet that you want to delete. SqlInjectionMatchSetId is returned by CreateSqlInjectionMatchSet and by ListSqlInjectionMatchSets . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- The response to a request to delete a SqlInjectionMatchSet from AWS WAF. ChangeToken (string) -- The ChangeToken that you used to submit the DeleteSqlInjectionMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFNonEmptyEntityException Examples The following example deletes a SQL injection match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. response = client.delete_sql_injection_match_set( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', SqlInjectionMatchSetId='example1ds3t-46da-4fdb-b8d5-abc321j569j5', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } :returns: SqlInjectionMatchSetId (string) -- [REQUIRED] The SqlInjectionMatchSetId of the SqlInjectionMatchSet that you want to delete. SqlInjectionMatchSetId is returned by CreateSqlInjectionMatchSet and by ListSqlInjectionMatchSets . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def delete_web_acl(WebACLId=None, ChangeToken=None): """ Permanently deletes a WebACL . You can't delete a WebACL if it still contains any Rules . To delete a WebACL , perform the following steps: See also: AWS API Documentation Exceptions Examples The following example deletes a web ACL with the ID example-46da-4444-5555-example. Expected Output: :example: response = client.delete_web_acl( WebACLId='string', ChangeToken='string' ) :type WebACLId: string :param WebACLId: [REQUIRED] The WebACLId of the WebACL that you want to delete. WebACLId is returned by CreateWebACL and by ListWebACLs . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the DeleteWebACL request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFNonEmptyEntityException WAFRegional.Client.exceptions.WAFTagOperationException WAFRegional.Client.exceptions.WAFTagOperationInternalErrorException Examples The following example deletes a web ACL with the ID example-46da-4444-5555-example. response = client.delete_web_acl( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', WebACLId='example-46da-4444-5555-example', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } :returns: WebACLId (string) -- [REQUIRED] The WebACLId of the WebACL that you want to delete. WebACLId is returned by CreateWebACL and by ListWebACLs . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def delete_xss_match_set(XssMatchSetId=None, ChangeToken=None): """ Permanently deletes an XssMatchSet . You can't delete an XssMatchSet if it's still used in any Rules or if it still contains any XssMatchTuple objects. If you just want to remove an XssMatchSet from a Rule , use UpdateRule . To permanently delete an XssMatchSet from AWS WAF, perform the following steps: See also: AWS API Documentation Exceptions Examples The following example deletes an XSS match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.delete_xss_match_set( XssMatchSetId='string', ChangeToken='string' ) :type XssMatchSetId: string :param XssMatchSetId: [REQUIRED] The XssMatchSetId of the XssMatchSet that you want to delete. XssMatchSetId is returned by CreateXssMatchSet and by ListXssMatchSets . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- The response to a request to delete an XssMatchSet from AWS WAF. ChangeToken (string) -- The ChangeToken that you used to submit the DeleteXssMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFNonEmptyEntityException Examples The following example deletes an XSS match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. response = client.delete_xss_match_set( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', XssMatchSetId='example1ds3t-46da-4fdb-b8d5-abc321j569j5', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } :returns: XssMatchSetId (string) -- [REQUIRED] The XssMatchSetId of the XssMatchSet that you want to delete. XssMatchSetId is returned by CreateXssMatchSet and by ListXssMatchSets . ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def disassociate_web_acl(ResourceArn=None): """ Removes a web ACL from the specified resource, either an application load balancer or Amazon API Gateway stage. See also: AWS API Documentation Exceptions :example: response = client.disassociate_web_acl( ResourceArn='string' ) :type ResourceArn: string :param ResourceArn: [REQUIRED] The ARN (Amazon Resource Name) of the resource from which the web ACL is being removed, either an application load balancer or Amazon API Gateway stage. The ARN should be in one of the following formats: For an Application Load Balancer: ``arn:aws:elasticloadbalancing:region :account-id :loadbalancer/app/load-balancer-name /load-balancer-id `` For an Amazon API Gateway stage: ``arn:aws:apigateway:region ::/restapis/api-id /stages/stage-name `` :rtype: dict ReturnsResponse Syntax{} Response Structure (dict) -- Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFNonexistentItemException :return: {} :returns: (dict) -- """ pass def generate_presigned_url(ClientMethod=None, Params=None, ExpiresIn=None, HttpMethod=None): """ Generate a presigned url given a client, its method, and arguments :type ClientMethod: string :param ClientMethod: The client method to presign for :type Params: dict :param Params: The parameters normally passed to ClientMethod. :type ExpiresIn: int :param ExpiresIn: The number of seconds the presigned url is valid for. By default it expires in an hour (3600 seconds) :type HttpMethod: string :param HttpMethod: The http method to use on the generated url. By default, the http method is whatever is used in the method's model. """ pass def get_byte_match_set(ByteMatchSetId=None): """ Returns the ByteMatchSet specified by ByteMatchSetId . See also: AWS API Documentation Exceptions Examples The following example returns the details of a byte match set with the ID exampleIDs3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.get_byte_match_set( ByteMatchSetId='string' ) :type ByteMatchSetId: string :param ByteMatchSetId: [REQUIRED] The ByteMatchSetId of the ByteMatchSet that you want to get. ByteMatchSetId is returned by CreateByteMatchSet and by ListByteMatchSets . :rtype: dict ReturnsResponse Syntax{ 'ByteMatchSet': { 'ByteMatchSetId': 'string', 'Name': 'string', 'ByteMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TargetString': b'bytes', 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'PositionalConstraint': 'EXACTLY'|'STARTS_WITH'|'ENDS_WITH'|'CONTAINS'|'CONTAINS_WORD' }, ] } } Response Structure (dict) -- ByteMatchSet (dict) --Information about the ByteMatchSet that you specified in the GetByteMatchSet request. For more information, see the following topics: ByteMatchSet : Contains ByteMatchSetId , ByteMatchTuples , and Name ByteMatchTuples : Contains an array of ByteMatchTuple objects. Each ByteMatchTuple object contains FieldToMatch , PositionalConstraint , TargetString , and TextTransformation FieldToMatch : Contains Data and Type ByteMatchSetId (string) --The ByteMatchSetId for a ByteMatchSet . You use ByteMatchSetId to get information about a ByteMatchSet (see GetByteMatchSet ), update a ByteMatchSet (see UpdateByteMatchSet ), insert a ByteMatchSet into a Rule or delete one from a Rule (see UpdateRule ), and delete a ByteMatchSet from AWS WAF (see DeleteByteMatchSet ). ByteMatchSetId is returned by CreateByteMatchSet and by ListByteMatchSets . Name (string) --A friendly name or description of the ByteMatchSet . You can't change Name after you create a ByteMatchSet . ByteMatchTuples (list) --Specifies the bytes (typically a string that corresponds with ASCII characters) that you want AWS WAF to search for in web requests, the location in requests that you want AWS WAF to search, and other settings. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The bytes (typically a string that corresponds with ASCII characters) that you want AWS WAF to search for in web requests, the location in requests that you want AWS WAF to search, and other settings. FieldToMatch (dict) --The part of a web request that you want AWS WAF to search, such as a specified header or a query string. For more information, see FieldToMatch . Type (string) --The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) --When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . TargetString (bytes) --The value that you want AWS WAF to search for. AWS WAF searches for the specified string in the part of web requests that you specified in FieldToMatch . The maximum length of the value is 50 bytes. Valid values depend on the values that you specified for FieldToMatch : HEADER : The value that you want AWS WAF to search for in the request header that you specified in FieldToMatch , for example, the value of the User-Agent or Referer header. METHOD : The HTTP method, which indicates the type of operation specified in the request. CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : The value that you want AWS WAF to search for in the query string, which is the part of a URL that appears after a ? character. URI : The value that you want AWS WAF to search for in the part of a URL that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but instead of inspecting a single parameter, AWS WAF inspects all parameters within the query string for the value or regex pattern that you specify in TargetString . If TargetString includes alphabetic characters A-Z and a-z, note that the value is case sensitive. If you're using the AWS WAF API Specify a base64-encoded version of the value. The maximum length of the value before you base64-encode it is 50 bytes. For example, suppose the value of Type is HEADER and the value of Data is User-Agent . If you want to search the User-Agent header for the value BadBot , you base64-encode BadBot using MIME base64-encoding and include the resulting value, QmFkQm90 , in the value of TargetString . If you're using the AWS CLI or one of the AWS SDKs The value that you want AWS WAF to search for. The SDK automatically base64 encodes the value. TextTransformation (string) --Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on FieldToMatch before inspecting it for a match. You can only specify a single type of TextTransformation. CMD_LINE When you're concerned that attackers are injecting an operating system command line command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations: Delete the following characters: " ' ^ Delete spaces before the following characters: / ( Replace the following characters with a space: , ; Replace multiple spaces with one space Convert uppercase letters (A-Z) to lowercase (a-z) COMPRESS_WHITE_SPACE Use this option to replace the following characters with a space character (decimal 32): f, formfeed, decimal 12 t, tab, decimal 9 n, newline, decimal 10 r, carriage return, decimal 13 v, vertical tab, decimal 11 non-breaking space, decimal 160 COMPRESS_WHITE_SPACE also replaces multiple spaces with one space.HTML_ENTITY_DECODE Use this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations: Replaces (ampersand)quot; with " Replaces (ampersand)nbsp; with a non-breaking space, decimal 160 Replaces (ampersand)lt; with a "less than" symbol Replaces (ampersand)gt; with > Replaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters Replaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters LOWERCASE Use this option to convert uppercase letters (A-Z) to lowercase (a-z). URL_DECODE Use this option to decode a URL-encoded value. NONE Specify NONE if you don't want to perform any text transformations. PositionalConstraint (string) --Within the portion of a web request that you want to search (for example, in the query string, if any), specify where you want AWS WAF to search. Valid values include the following: CONTAINS The specified part of the web request must include the value of TargetString , but the location doesn't matter. CONTAINS_WORD The specified part of the web request must include the value of TargetString , and TargetString must contain only alphanumeric characters or underscore (A-Z, a-z, 0-9, or _). In addition, TargetString must be a word, which means one of the following: TargetString exactly matches the value of the specified part of the web request, such as the value of a header. TargetString is at the beginning of the specified part of the web request and is followed by a character other than an alphanumeric character or underscore (_), for example, BadBot; . TargetString is at the end of the specified part of the web request and is preceded by a character other than an alphanumeric character or underscore (_), for example, ;BadBot . TargetString is in the middle of the specified part of the web request and is preceded and followed by characters other than alphanumeric characters or underscore (_), for example, -BadBot; . EXACTLY The value of the specified part of the web request must exactly match the value of TargetString . STARTS_WITH The value of TargetString must appear at the beginning of the specified part of the web request. ENDS_WITH The value of TargetString must appear at the end of the specified part of the web request. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException Examples The following example returns the details of a byte match set with the ID exampleIDs3t-46da-4fdb-b8d5-abc321j569j5. response = client.get_byte_match_set( ByteMatchSetId='exampleIDs3t-46da-4fdb-b8d5-abc321j569j5', ) print(response) Expected Output: { 'ByteMatchSet': { 'ByteMatchSetId': 'exampleIDs3t-46da-4fdb-b8d5-abc321j569j5', 'ByteMatchTuples': [ { 'FieldToMatch': { 'Data': 'referer', 'Type': 'HEADER', }, 'PositionalConstraint': 'CONTAINS', 'TargetString': 'badrefer1', 'TextTransformation': 'NONE', }, ], 'Name': 'ByteMatchNameExample', }, 'ResponseMetadata': { '...': '...', }, } :return: { 'ByteMatchSet': { 'ByteMatchSetId': 'string', 'Name': 'string', 'ByteMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TargetString': b'bytes', 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'PositionalConstraint': 'EXACTLY'|'STARTS_WITH'|'ENDS_WITH'|'CONTAINS'|'CONTAINS_WORD' }, ] } } :returns: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . """ pass def get_change_token(): """ When you want to create, update, or delete AWS WAF objects, get a change token and include the change token in the create, update, or delete request. Change tokens ensure that your application doesn't submit conflicting requests to AWS WAF. Each create, update, or delete request must use a unique change token. If your application submits a GetChangeToken request and then submits a second GetChangeToken request before submitting a create, update, or delete request, the second GetChangeToken request returns the same value as the first GetChangeToken request. When you use a change token in a create, update, or delete request, the status of the change token changes to PENDING , which indicates that AWS WAF is propagating the change to all AWS WAF servers. Use GetChangeTokenStatus to determine the status of your change token. See also: AWS API Documentation Exceptions Examples The following example returns a change token to use for a create, update or delete operation. Expected Output: :example: response = client.get_change_token() :rtype: dict ReturnsResponse Syntax{ 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) --The ChangeToken that you used in the request. Use this value in a GetChangeTokenStatus request to get the current status of the request. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException Examples The following example returns a change token to use for a create, update or delete operation. response = client.get_change_token( ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } """ pass def get_change_token_status(ChangeToken=None): """ Returns the status of a ChangeToken that you got by calling GetChangeToken . ChangeTokenStatus is one of the following values: See also: AWS API Documentation Exceptions Examples The following example returns the status of a change token with the ID abcd12f2-46da-4fdb-b8d5-fbd4c466928f. Expected Output: :example: response = client.get_change_token_status( ChangeToken='string' ) :type ChangeToken: string :param ChangeToken: [REQUIRED] The change token for which you want to get the status. This change token was previously returned in the GetChangeToken response. :rtype: dict ReturnsResponse Syntax{ 'ChangeTokenStatus': 'PROVISIONED'|'PENDING'|'INSYNC' } Response Structure (dict) -- ChangeTokenStatus (string) --The status of the change token. Exceptions WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFInternalErrorException Examples The following example returns the status of a change token with the ID abcd12f2-46da-4fdb-b8d5-fbd4c466928f. response = client.get_change_token_status( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', ) print(response) Expected Output: { 'ChangeTokenStatus': 'PENDING', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeTokenStatus': 'PROVISIONED'|'PENDING'|'INSYNC' } :returns: WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFInternalErrorException """ pass def get_geo_match_set(GeoMatchSetId=None): """ Returns the GeoMatchSet that is specified by GeoMatchSetId . See also: AWS API Documentation Exceptions :example: response = client.get_geo_match_set( GeoMatchSetId='string' ) :type GeoMatchSetId: string :param GeoMatchSetId: [REQUIRED] The GeoMatchSetId of the GeoMatchSet that you want to get. GeoMatchSetId is returned by CreateGeoMatchSet and by ListGeoMatchSets . :rtype: dict ReturnsResponse Syntax{ 'GeoMatchSet': { 'GeoMatchSetId': 'string', 'Name': 'string', 'GeoMatchConstraints': [ { 'Type': 'Country', 'Value': 'AF'|'AX'|'AL'|'DZ'|'AS'|'AD'|'AO'|'AI'|'AQ'|'AG'|'AR'|'AM'|'AW'|'AU'|'AT'|'AZ'|'BS'|'BH'|'BD'|'BB'|'BY'|'BE'|'BZ'|'BJ'|'BM'|'BT'|'BO'|'BQ'|'BA'|'BW'|'BV'|'BR'|'IO'|'BN'|'BG'|'BF'|'BI'|'KH'|'CM'|'CA'|'CV'|'KY'|'CF'|'TD'|'CL'|'CN'|'CX'|'CC'|'CO'|'KM'|'CG'|'CD'|'CK'|'CR'|'CI'|'HR'|'CU'|'CW'|'CY'|'CZ'|'DK'|'DJ'|'DM'|'DO'|'EC'|'EG'|'SV'|'GQ'|'ER'|'EE'|'ET'|'FK'|'FO'|'FJ'|'FI'|'FR'|'GF'|'PF'|'TF'|'GA'|'GM'|'GE'|'DE'|'GH'|'GI'|'GR'|'GL'|'GD'|'GP'|'GU'|'GT'|'GG'|'GN'|'GW'|'GY'|'HT'|'HM'|'VA'|'HN'|'HK'|'HU'|'IS'|'IN'|'ID'|'IR'|'IQ'|'IE'|'IM'|'IL'|'IT'|'JM'|'JP'|'JE'|'JO'|'KZ'|'KE'|'KI'|'KP'|'KR'|'KW'|'KG'|'LA'|'LV'|'LB'|'LS'|'LR'|'LY'|'LI'|'LT'|'LU'|'MO'|'MK'|'MG'|'MW'|'MY'|'MV'|'ML'|'MT'|'MH'|'MQ'|'MR'|'MU'|'YT'|'MX'|'FM'|'MD'|'MC'|'MN'|'ME'|'MS'|'MA'|'MZ'|'MM'|'NA'|'NR'|'NP'|'NL'|'NC'|'NZ'|'NI'|'NE'|'NG'|'NU'|'NF'|'MP'|'NO'|'OM'|'PK'|'PW'|'PS'|'PA'|'PG'|'PY'|'PE'|'PH'|'PN'|'PL'|'PT'|'PR'|'QA'|'RE'|'RO'|'RU'|'RW'|'BL'|'SH'|'KN'|'LC'|'MF'|'PM'|'VC'|'WS'|'SM'|'ST'|'SA'|'SN'|'RS'|'SC'|'SL'|'SG'|'SX'|'SK'|'SI'|'SB'|'SO'|'ZA'|'GS'|'SS'|'ES'|'LK'|'SD'|'SR'|'SJ'|'SZ'|'SE'|'CH'|'SY'|'TW'|'TJ'|'TZ'|'TH'|'TL'|'TG'|'TK'|'TO'|'TT'|'TN'|'TR'|'TM'|'TC'|'TV'|'UG'|'UA'|'AE'|'GB'|'US'|'UM'|'UY'|'UZ'|'VU'|'VE'|'VN'|'VG'|'VI'|'WF'|'EH'|'YE'|'ZM'|'ZW' }, ] } } Response Structure (dict) -- GeoMatchSet (dict) --Information about the GeoMatchSet that you specified in the GetGeoMatchSet request. This includes the Type , which for a GeoMatchContraint is always Country , as well as the Value , which is the identifier for a specific country. GeoMatchSetId (string) --The GeoMatchSetId for an GeoMatchSet . You use GeoMatchSetId to get information about a GeoMatchSet (see GeoMatchSet ), update a GeoMatchSet (see UpdateGeoMatchSet ), insert a GeoMatchSet into a Rule or delete one from a Rule (see UpdateRule ), and delete a GeoMatchSet from AWS WAF (see DeleteGeoMatchSet ). GeoMatchSetId is returned by CreateGeoMatchSet and by ListGeoMatchSets . Name (string) --A friendly name or description of the GeoMatchSet . You can't change the name of an GeoMatchSet after you create it. GeoMatchConstraints (list) --An array of GeoMatchConstraint objects, which contain the country that you want AWS WAF to search for. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The country from which web requests originate that you want AWS WAF to search for. Type (string) --The type of geographical area you want AWS WAF to search for. Currently Country is the only valid value. Value (string) --The country that you want AWS WAF to search for. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException :return: { 'GeoMatchSet': { 'GeoMatchSetId': 'string', 'Name': 'string', 'GeoMatchConstraints': [ { 'Type': 'Country', 'Value': 'AF'|'AX'|'AL'|'DZ'|'AS'|'AD'|'AO'|'AI'|'AQ'|'AG'|'AR'|'AM'|'AW'|'AU'|'AT'|'AZ'|'BS'|'BH'|'BD'|'BB'|'BY'|'BE'|'BZ'|'BJ'|'BM'|'BT'|'BO'|'BQ'|'BA'|'BW'|'BV'|'BR'|'IO'|'BN'|'BG'|'BF'|'BI'|'KH'|'CM'|'CA'|'CV'|'KY'|'CF'|'TD'|'CL'|'CN'|'CX'|'CC'|'CO'|'KM'|'CG'|'CD'|'CK'|'CR'|'CI'|'HR'|'CU'|'CW'|'CY'|'CZ'|'DK'|'DJ'|'DM'|'DO'|'EC'|'EG'|'SV'|'GQ'|'ER'|'EE'|'ET'|'FK'|'FO'|'FJ'|'FI'|'FR'|'GF'|'PF'|'TF'|'GA'|'GM'|'GE'|'DE'|'GH'|'GI'|'GR'|'GL'|'GD'|'GP'|'GU'|'GT'|'GG'|'GN'|'GW'|'GY'|'HT'|'HM'|'VA'|'HN'|'HK'|'HU'|'IS'|'IN'|'ID'|'IR'|'IQ'|'IE'|'IM'|'IL'|'IT'|'JM'|'JP'|'JE'|'JO'|'KZ'|'KE'|'KI'|'KP'|'KR'|'KW'|'KG'|'LA'|'LV'|'LB'|'LS'|'LR'|'LY'|'LI'|'LT'|'LU'|'MO'|'MK'|'MG'|'MW'|'MY'|'MV'|'ML'|'MT'|'MH'|'MQ'|'MR'|'MU'|'YT'|'MX'|'FM'|'MD'|'MC'|'MN'|'ME'|'MS'|'MA'|'MZ'|'MM'|'NA'|'NR'|'NP'|'NL'|'NC'|'NZ'|'NI'|'NE'|'NG'|'NU'|'NF'|'MP'|'NO'|'OM'|'PK'|'PW'|'PS'|'PA'|'PG'|'PY'|'PE'|'PH'|'PN'|'PL'|'PT'|'PR'|'QA'|'RE'|'RO'|'RU'|'RW'|'BL'|'SH'|'KN'|'LC'|'MF'|'PM'|'VC'|'WS'|'SM'|'ST'|'SA'|'SN'|'RS'|'SC'|'SL'|'SG'|'SX'|'SK'|'SI'|'SB'|'SO'|'ZA'|'GS'|'SS'|'ES'|'LK'|'SD'|'SR'|'SJ'|'SZ'|'SE'|'CH'|'SY'|'TW'|'TJ'|'TZ'|'TH'|'TL'|'TG'|'TK'|'TO'|'TT'|'TN'|'TR'|'TM'|'TC'|'TV'|'UG'|'UA'|'AE'|'GB'|'US'|'UM'|'UY'|'UZ'|'VU'|'VE'|'VN'|'VG'|'VI'|'WF'|'EH'|'YE'|'ZM'|'ZW' }, ] } } """ pass def get_ip_set(IPSetId=None): """ Returns the IPSet that is specified by IPSetId . See also: AWS API Documentation Exceptions Examples The following example returns the details of an IP match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.get_ip_set( IPSetId='string' ) :type IPSetId: string :param IPSetId: [REQUIRED] The IPSetId of the IPSet that you want to get. IPSetId is returned by CreateIPSet and by ListIPSets . :rtype: dict ReturnsResponse Syntax{ 'IPSet': { 'IPSetId': 'string', 'Name': 'string', 'IPSetDescriptors': [ { 'Type': 'IPV4'|'IPV6', 'Value': 'string' }, ] } } Response Structure (dict) -- IPSet (dict) --Information about the IPSet that you specified in the GetIPSet request. For more information, see the following topics: IPSet : Contains IPSetDescriptors , IPSetId , and Name IPSetDescriptors : Contains an array of IPSetDescriptor objects. Each IPSetDescriptor object contains Type and Value IPSetId (string) --The IPSetId for an IPSet . You use IPSetId to get information about an IPSet (see GetIPSet ), update an IPSet (see UpdateIPSet ), insert an IPSet into a Rule or delete one from a Rule (see UpdateRule ), and delete an IPSet from AWS WAF (see DeleteIPSet ). IPSetId is returned by CreateIPSet and by ListIPSets . Name (string) --A friendly name or description of the IPSet . You can't change the name of an IPSet after you create it. IPSetDescriptors (list) --The IP address type (IPV4 or IPV6 ) and the IP address range (in CIDR notation) that web requests originate from. If the WebACL is associated with a CloudFront distribution and the viewer did not use an HTTP proxy or a load balancer to send the request, this is the value of the c-ip field in the CloudFront access logs. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies the IP address type (IPV4 or IPV6 ) and the IP address range (in CIDR format) that web requests originate from. Type (string) --Specify IPV4 or IPV6 . Value (string) --Specify an IPv4 address by using CIDR notation. For example: To configure AWS WAF to allow, block, or count requests that originated from the IP address 192.0.2.44, specify 192.0.2.44/32 . To configure AWS WAF to allow, block, or count requests that originated from IP addresses from 192.0.2.0 to 192.0.2.255, specify 192.0.2.0/24 . For more information about CIDR notation, see the Wikipedia entry Classless Inter-Domain Routing . Specify an IPv6 address by using CIDR notation. For example: To configure AWS WAF to allow, block, or count requests that originated from the IP address 1111:0000:0000:0000:0000:0000:0000:0111, specify 1111:0000:0000:0000:0000:0000:0000:0111/128 . To configure AWS WAF to allow, block, or count requests that originated from IP addresses 1111:0000:0000:0000:0000:0000:0000:0000 to 1111:0000:0000:0000:ffff:ffff:ffff:ffff, specify 1111:0000:0000:0000:0000:0000:0000:0000/64 . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException Examples The following example returns the details of an IP match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. response = client.get_ip_set( IPSetId='example1ds3t-46da-4fdb-b8d5-abc321j569j5', ) print(response) Expected Output: { 'IPSet': { 'IPSetDescriptors': [ { 'Type': 'IPV4', 'Value': '192.0.2.44/32', }, ], 'IPSetId': 'example1ds3t-46da-4fdb-b8d5-abc321j569j5', 'Name': 'MyIPSetFriendlyName', }, 'ResponseMetadata': { '...': '...', }, } :return: { 'IPSet': { 'IPSetId': 'string', 'Name': 'string', 'IPSetDescriptors': [ { 'Type': 'IPV4'|'IPV6', 'Value': 'string' }, ] } } :returns: To configure AWS WAF to allow, block, or count requests that originated from the IP address 192.0.2.44, specify 192.0.2.44/32 . To configure AWS WAF to allow, block, or count requests that originated from IP addresses from 192.0.2.0 to 192.0.2.255, specify 192.0.2.0/24 . """ pass def get_logging_configuration(ResourceArn=None): """ Returns the LoggingConfiguration for the specified web ACL. See also: AWS API Documentation Exceptions :example: response = client.get_logging_configuration( ResourceArn='string' ) :type ResourceArn: string :param ResourceArn: [REQUIRED] The Amazon Resource Name (ARN) of the web ACL for which you want to get the LoggingConfiguration . :rtype: dict ReturnsResponse Syntax{ 'LoggingConfiguration': { 'ResourceArn': 'string', 'LogDestinationConfigs': [ 'string', ], 'RedactedFields': [ { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, ] } } Response Structure (dict) -- LoggingConfiguration (dict) --The LoggingConfiguration for the specified web ACL. ResourceArn (string) --The Amazon Resource Name (ARN) of the web ACL that you want to associate with LogDestinationConfigs . LogDestinationConfigs (list) --An array of Amazon Kinesis Data Firehose ARNs. (string) -- RedactedFields (list) --The parts of the request that you want redacted from the logs. For example, if you redact the cookie field, the cookie field in the firehose will be xxx . (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies where in a web request to look for TargetString . Type (string) --The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) --When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFNonexistentItemException :return: { 'LoggingConfiguration': { 'ResourceArn': 'string', 'LogDestinationConfigs': [ 'string', ], 'RedactedFields': [ { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, ] } } :returns: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . """ pass def get_paginator(operation_name=None): """ Create a paginator for an operation. :type operation_name: string :param operation_name: The operation name. This is the same name as the method name on the client. For example, if the method name is create_foo, and you'd normally invoke the operation as client.create_foo(**kwargs), if the create_foo operation can be paginated, you can use the call client.get_paginator('create_foo'). :rtype: L{botocore.paginate.Paginator} ReturnsA paginator object. """ pass def get_permission_policy(ResourceArn=None): """ Returns the IAM policy attached to the RuleGroup. See also: AWS API Documentation Exceptions :example: response = client.get_permission_policy( ResourceArn='string' ) :type ResourceArn: string :param ResourceArn: [REQUIRED] The Amazon Resource Name (ARN) of the RuleGroup for which you want to get the policy. :rtype: dict ReturnsResponse Syntax{ 'Policy': 'string' } Response Structure (dict) -- Policy (string) --The IAM policy attached to the specified RuleGroup. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFNonexistentItemException :return: { 'Policy': 'string' } """ pass def get_rate_based_rule(RuleId=None): """ Returns the RateBasedRule that is specified by the RuleId that you included in the GetRateBasedRule request. See also: AWS API Documentation Exceptions :example: response = client.get_rate_based_rule( RuleId='string' ) :type RuleId: string :param RuleId: [REQUIRED] The RuleId of the RateBasedRule that you want to get. RuleId is returned by CreateRateBasedRule and by ListRateBasedRules . :rtype: dict ReturnsResponse Syntax{ 'Rule': { 'RuleId': 'string', 'Name': 'string', 'MetricName': 'string', 'MatchPredicates': [ { 'Negated': True|False, 'Type': 'IPMatch'|'ByteMatch'|'SqlInjectionMatch'|'GeoMatch'|'SizeConstraint'|'XssMatch'|'RegexMatch', 'DataId': 'string' }, ], 'RateKey': 'IP', 'RateLimit': 123 } } Response Structure (dict) -- Rule (dict) --Information about the RateBasedRule that you specified in the GetRateBasedRule request. RuleId (string) --A unique identifier for a RateBasedRule . You use RuleId to get more information about a RateBasedRule (see GetRateBasedRule ), update a RateBasedRule (see UpdateRateBasedRule ), insert a RateBasedRule into a WebACL or delete one from a WebACL (see UpdateWebACL ), or delete a RateBasedRule from AWS WAF (see DeleteRateBasedRule ). Name (string) --A friendly name or description for a RateBasedRule . You can't change the name of a RateBasedRule after you create it. MetricName (string) --A friendly name or description for the metrics for a RateBasedRule . The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can't contain whitespace or metric names reserved for AWS WAF, including "All" and "Default_Action." You can't change the name of the metric after you create the RateBasedRule . MatchPredicates (list) --The Predicates object contains one Predicate element for each ByteMatchSet , IPSet , or SqlInjectionMatchSet object that you want to include in a RateBasedRule . (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies the ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , and SizeConstraintSet objects that you want to add to a Rule and, for each object, indicates whether you want to negate the settings, for example, requests that do NOT originate from the IP address 192.0.2.44. Negated (boolean) --Set Negated to False if you want AWS WAF to allow, block, or count requests based on the settings in the specified ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , or SizeConstraintSet . For example, if an IPSet includes the IP address 192.0.2.44 , AWS WAF will allow or block requests based on that IP address. Set Negated to True if you want AWS WAF to allow or block a request based on the negation of the settings in the ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , or SizeConstraintSet . For example, if an IPSet includes the IP address 192.0.2.44 , AWS WAF will allow, block, or count requests based on all IP addresses except 192.0.2.44 . Type (string) --The type of predicate in a Rule , such as ByteMatch or IPSet . DataId (string) --A unique identifier for a predicate in a Rule , such as ByteMatchSetId or IPSetId . The ID is returned by the corresponding Create or List command. RateKey (string) --The field that AWS WAF uses to determine if requests are likely arriving from single source and thus subject to rate monitoring. The only valid value for RateKey is IP . IP indicates that requests arriving from the same IP address are subject to the RateLimit that is specified in the RateBasedRule . RateLimit (integer) --The maximum number of requests, which have an identical value in the field specified by the RateKey , allowed in a five-minute period. If the number of requests exceeds the RateLimit and the other predicates specified in the rule are also met, AWS WAF triggers the action that is specified for this rule. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException :return: { 'Rule': { 'RuleId': 'string', 'Name': 'string', 'MetricName': 'string', 'MatchPredicates': [ { 'Negated': True|False, 'Type': 'IPMatch'|'ByteMatch'|'SqlInjectionMatch'|'GeoMatch'|'SizeConstraint'|'XssMatch'|'RegexMatch', 'DataId': 'string' }, ], 'RateKey': 'IP', 'RateLimit': 123 } } """ pass def get_rate_based_rule_managed_keys(RuleId=None, NextMarker=None): """ Returns an array of IP addresses currently being blocked by the RateBasedRule that is specified by the RuleId . The maximum number of managed keys that will be blocked is 10,000. If more than 10,000 addresses exceed the rate limit, the 10,000 addresses with the highest rates will be blocked. See also: AWS API Documentation Exceptions :example: response = client.get_rate_based_rule_managed_keys( RuleId='string', NextMarker='string' ) :type RuleId: string :param RuleId: [REQUIRED] The RuleId of the RateBasedRule for which you want to get a list of ManagedKeys . RuleId is returned by CreateRateBasedRule and by ListRateBasedRules . :type NextMarker: string :param NextMarker: A null value and not currently used. Do not include this in your request. :rtype: dict ReturnsResponse Syntax { 'ManagedKeys': [ 'string', ], 'NextMarker': 'string' } Response Structure (dict) -- ManagedKeys (list) -- An array of IP addresses that currently are blocked by the specified RateBasedRule . (string) -- NextMarker (string) -- A null value and not currently used. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFInvalidParameterException :return: { 'ManagedKeys': [ 'string', ], 'NextMarker': 'string' } :returns: (string) -- """ pass def get_regex_match_set(RegexMatchSetId=None): """ Returns the RegexMatchSet specified by RegexMatchSetId . See also: AWS API Documentation Exceptions :example: response = client.get_regex_match_set( RegexMatchSetId='string' ) :type RegexMatchSetId: string :param RegexMatchSetId: [REQUIRED] The RegexMatchSetId of the RegexMatchSet that you want to get. RegexMatchSetId is returned by CreateRegexMatchSet and by ListRegexMatchSets . :rtype: dict ReturnsResponse Syntax{ 'RegexMatchSet': { 'RegexMatchSetId': 'string', 'Name': 'string', 'RegexMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'RegexPatternSetId': 'string' }, ] } } Response Structure (dict) -- RegexMatchSet (dict) --Information about the RegexMatchSet that you specified in the GetRegexMatchSet request. For more information, see RegexMatchTuple . RegexMatchSetId (string) --The RegexMatchSetId for a RegexMatchSet . You use RegexMatchSetId to get information about a RegexMatchSet (see GetRegexMatchSet ), update a RegexMatchSet (see UpdateRegexMatchSet ), insert a RegexMatchSet into a Rule or delete one from a Rule (see UpdateRule ), and delete a RegexMatchSet from AWS WAF (see DeleteRegexMatchSet ). RegexMatchSetId is returned by CreateRegexMatchSet and by ListRegexMatchSets . Name (string) --A friendly name or description of the RegexMatchSet . You can't change Name after you create a RegexMatchSet . RegexMatchTuples (list) --Contains an array of RegexMatchTuple objects. Each RegexMatchTuple object contains: The part of a web request that you want AWS WAF to inspect, such as a query string or the value of the User-Agent header. The identifier of the pattern (a regular expression) that you want AWS WAF to look for. For more information, see RegexPatternSet . Whether to perform any conversions on the request, such as converting it to lowercase, before inspecting it for the specified string. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The regular expression pattern that you want AWS WAF to search for in web requests, the location in requests that you want AWS WAF to search, and other settings. Each RegexMatchTuple object contains: The part of a web request that you want AWS WAF to inspect, such as a query string or the value of the User-Agent header. The identifier of the pattern (a regular expression) that you want AWS WAF to look for. For more information, see RegexPatternSet . Whether to perform any conversions on the request, such as converting it to lowercase, before inspecting it for the specified string. FieldToMatch (dict) --Specifies where in a web request to look for the RegexPatternSet . Type (string) --The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) --When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . TextTransformation (string) --Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on RegexPatternSet before inspecting a request for a match. You can only specify a single type of TextTransformation. CMD_LINE When you're concerned that attackers are injecting an operating system commandline command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations: Delete the following characters: " ' ^ Delete spaces before the following characters: / ( Replace the following characters with a space: , ; Replace multiple spaces with one space Convert uppercase letters (A-Z) to lowercase (a-z) COMPRESS_WHITE_SPACE Use this option to replace the following characters with a space character (decimal 32): f, formfeed, decimal 12 t, tab, decimal 9 n, newline, decimal 10 r, carriage return, decimal 13 v, vertical tab, decimal 11 non-breaking space, decimal 160 COMPRESS_WHITE_SPACE also replaces multiple spaces with one space.HTML_ENTITY_DECODE Use this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations: Replaces (ampersand)quot; with " Replaces (ampersand)nbsp; with a non-breaking space, decimal 160 Replaces (ampersand)lt; with a "less than" symbol Replaces (ampersand)gt; with > Replaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters Replaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters LOWERCASE Use this option to convert uppercase letters (A-Z) to lowercase (a-z). URL_DECODE Use this option to decode a URL-encoded value. NONE Specify NONE if you don't want to perform any text transformations. RegexPatternSetId (string) --The RegexPatternSetId for a RegexPatternSet . You use RegexPatternSetId to get information about a RegexPatternSet (see GetRegexPatternSet ), update a RegexPatternSet (see UpdateRegexPatternSet ), insert a RegexPatternSet into a RegexMatchSet or delete one from a RegexMatchSet (see UpdateRegexMatchSet ), and delete an RegexPatternSet from AWS WAF (see DeleteRegexPatternSet ). RegexPatternSetId is returned by CreateRegexPatternSet and by ListRegexPatternSets . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException :return: { 'RegexMatchSet': { 'RegexMatchSetId': 'string', 'Name': 'string', 'RegexMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'RegexPatternSetId': 'string' }, ] } } :returns: The part of a web request that you want AWS WAF to inspect, such as a query string or the value of the User-Agent header. The identifier of the pattern (a regular expression) that you want AWS WAF to look for. For more information, see RegexPatternSet . Whether to perform any conversions on the request, such as converting it to lowercase, before inspecting it for the specified string. """ pass def get_regex_pattern_set(RegexPatternSetId=None): """ Returns the RegexPatternSet specified by RegexPatternSetId . See also: AWS API Documentation Exceptions :example: response = client.get_regex_pattern_set( RegexPatternSetId='string' ) :type RegexPatternSetId: string :param RegexPatternSetId: [REQUIRED] The RegexPatternSetId of the RegexPatternSet that you want to get. RegexPatternSetId is returned by CreateRegexPatternSet and by ListRegexPatternSets . :rtype: dict ReturnsResponse Syntax{ 'RegexPatternSet': { 'RegexPatternSetId': 'string', 'Name': 'string', 'RegexPatternStrings': [ 'string', ] } } Response Structure (dict) -- RegexPatternSet (dict) --Information about the RegexPatternSet that you specified in the GetRegexPatternSet request, including the identifier of the pattern set and the regular expression patterns you want AWS WAF to search for. RegexPatternSetId (string) --The identifier for the RegexPatternSet . You use RegexPatternSetId to get information about a RegexPatternSet , update a RegexPatternSet , remove a RegexPatternSet from a RegexMatchSet , and delete a RegexPatternSet from AWS WAF. RegexMatchSetId is returned by CreateRegexPatternSet and by ListRegexPatternSets . Name (string) --A friendly name or description of the RegexPatternSet . You can't change Name after you create a RegexPatternSet . RegexPatternStrings (list) --Specifies the regular expression (regex) patterns that you want AWS WAF to search for, such as B[a@]dB[o0]t . (string) -- Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException :return: { 'RegexPatternSet': { 'RegexPatternSetId': 'string', 'Name': 'string', 'RegexPatternStrings': [ 'string', ] } } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException """ pass def get_rule(RuleId=None): """ Returns the Rule that is specified by the RuleId that you included in the GetRule request. See also: AWS API Documentation Exceptions Examples The following example returns the details of a rule with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.get_rule( RuleId='string' ) :type RuleId: string :param RuleId: [REQUIRED] The RuleId of the Rule that you want to get. RuleId is returned by CreateRule and by ListRules . :rtype: dict ReturnsResponse Syntax{ 'Rule': { 'RuleId': 'string', 'Name': 'string', 'MetricName': 'string', 'Predicates': [ { 'Negated': True|False, 'Type': 'IPMatch'|'ByteMatch'|'SqlInjectionMatch'|'GeoMatch'|'SizeConstraint'|'XssMatch'|'RegexMatch', 'DataId': 'string' }, ] } } Response Structure (dict) -- Rule (dict) --Information about the Rule that you specified in the GetRule request. For more information, see the following topics: Rule : Contains MetricName , Name , an array of Predicate objects, and RuleId Predicate : Each Predicate object contains DataId , Negated , and Type RuleId (string) --A unique identifier for a Rule . You use RuleId to get more information about a Rule (see GetRule ), update a Rule (see UpdateRule ), insert a Rule into a WebACL or delete a one from a WebACL (see UpdateWebACL ), or delete a Rule from AWS WAF (see DeleteRule ). RuleId is returned by CreateRule and by ListRules . Name (string) --The friendly name or description for the Rule . You can't change the name of a Rule after you create it. MetricName (string) --A friendly name or description for the metrics for this Rule . The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can't contain whitespace or metric names reserved for AWS WAF, including "All" and "Default_Action." You can't change MetricName after you create the Rule . Predicates (list) --The Predicates object contains one Predicate element for each ByteMatchSet , IPSet , or SqlInjectionMatchSet object that you want to include in a Rule . (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies the ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , and SizeConstraintSet objects that you want to add to a Rule and, for each object, indicates whether you want to negate the settings, for example, requests that do NOT originate from the IP address 192.0.2.44. Negated (boolean) --Set Negated to False if you want AWS WAF to allow, block, or count requests based on the settings in the specified ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , or SizeConstraintSet . For example, if an IPSet includes the IP address 192.0.2.44 , AWS WAF will allow or block requests based on that IP address. Set Negated to True if you want AWS WAF to allow or block a request based on the negation of the settings in the ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , or SizeConstraintSet . For example, if an IPSet includes the IP address 192.0.2.44 , AWS WAF will allow, block, or count requests based on all IP addresses except 192.0.2.44 . Type (string) --The type of predicate in a Rule , such as ByteMatch or IPSet . DataId (string) --A unique identifier for a predicate in a Rule , such as ByteMatchSetId or IPSetId . The ID is returned by the corresponding Create or List command. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException Examples The following example returns the details of a rule with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. response = client.get_rule( RuleId='example1ds3t-46da-4fdb-b8d5-abc321j569j5', ) print(response) Expected Output: { 'Rule': { 'MetricName': 'WAFByteHeaderRule', 'Name': 'WAFByteHeaderRule', 'Predicates': [ { 'DataId': 'MyByteMatchSetID', 'Negated': False, 'Type': 'ByteMatch', }, ], 'RuleId': 'example1ds3t-46da-4fdb-b8d5-abc321j569j5', }, 'ResponseMetadata': { '...': '...', }, } :return: { 'Rule': { 'RuleId': 'string', 'Name': 'string', 'MetricName': 'string', 'Predicates': [ { 'Negated': True|False, 'Type': 'IPMatch'|'ByteMatch'|'SqlInjectionMatch'|'GeoMatch'|'SizeConstraint'|'XssMatch'|'RegexMatch', 'DataId': 'string' }, ] } } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException """ pass def get_rule_group(RuleGroupId=None): """ Returns the RuleGroup that is specified by the RuleGroupId that you included in the GetRuleGroup request. To view the rules in a rule group, use ListActivatedRulesInRuleGroup . See also: AWS API Documentation Exceptions :example: response = client.get_rule_group( RuleGroupId='string' ) :type RuleGroupId: string :param RuleGroupId: [REQUIRED] The RuleGroupId of the RuleGroup that you want to get. RuleGroupId is returned by CreateRuleGroup and by ListRuleGroups . :rtype: dict ReturnsResponse Syntax{ 'RuleGroup': { 'RuleGroupId': 'string', 'Name': 'string', 'MetricName': 'string' } } Response Structure (dict) -- RuleGroup (dict) --Information about the RuleGroup that you specified in the GetRuleGroup request. RuleGroupId (string) --A unique identifier for a RuleGroup . You use RuleGroupId to get more information about a RuleGroup (see GetRuleGroup ), update a RuleGroup (see UpdateRuleGroup ), insert a RuleGroup into a WebACL or delete a one from a WebACL (see UpdateWebACL ), or delete a RuleGroup from AWS WAF (see DeleteRuleGroup ). RuleGroupId is returned by CreateRuleGroup and by ListRuleGroups . Name (string) --The friendly name or description for the RuleGroup . You can't change the name of a RuleGroup after you create it. MetricName (string) --A friendly name or description for the metrics for this RuleGroup . The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can't contain whitespace or metric names reserved for AWS WAF, including "All" and "Default_Action." You can't change the name of the metric after you create the RuleGroup . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFNonexistentItemException :return: { 'RuleGroup': { 'RuleGroupId': 'string', 'Name': 'string', 'MetricName': 'string' } } """ pass def get_sampled_requests(WebAclId=None, RuleId=None, TimeWindow=None, MaxItems=None): """ Gets detailed information about a specified number of requests--a sample--that AWS WAF randomly selects from among the first 5,000 requests that your AWS resource received during a time range that you choose. You can specify a sample size of up to 500 requests, and you can specify any time range in the previous three hours. See also: AWS API Documentation Exceptions Examples The following example returns detailed information about 100 requests --a sample-- that AWS WAF randomly selects from among the first 5,000 requests that your AWS resource received between the time period 2016-09-27T15:50Z to 2016-09-27T15:50Z. Expected Output: :example: response = client.get_sampled_requests( WebAclId='string', RuleId='string', TimeWindow={ 'StartTime': datetime(2015, 1, 1), 'EndTime': datetime(2015, 1, 1) }, MaxItems=123 ) :type WebAclId: string :param WebAclId: [REQUIRED] The WebACLId of the WebACL for which you want GetSampledRequests to return a sample of requests. :type RuleId: string :param RuleId: [REQUIRED] RuleId is one of three values: The RuleId of the Rule or the RuleGroupId of the RuleGroup for which you want GetSampledRequests to return a sample of requests. Default_Action , which causes GetSampledRequests to return a sample of the requests that didn't match any of the rules in the specified WebACL . :type TimeWindow: dict :param TimeWindow: [REQUIRED] The start date and time and the end date and time of the range for which you want GetSampledRequests to return a sample of requests. You must specify the times in Coordinated Universal Time (UTC) format. UTC format includes the special designator, Z . For example, '2016-09-27T14:50Z' . You can specify any time range in the previous three hours. StartTime (datetime) -- [REQUIRED]The beginning of the time range from which you want GetSampledRequests to return a sample of the requests that your AWS resource received. You must specify the date and time in Coordinated Universal Time (UTC) format. UTC format includes the special designator, Z . For example, '2016-09-27T14:50Z' . You can specify any time range in the previous three hours. EndTime (datetime) -- [REQUIRED]The end of the time range from which you want GetSampledRequests to return a sample of the requests that your AWS resource received. You must specify the date and time in Coordinated Universal Time (UTC) format. UTC format includes the special designator, Z . For example, '2016-09-27T14:50Z' . You can specify any time range in the previous three hours. :type MaxItems: integer :param MaxItems: [REQUIRED] The number of requests that you want AWS WAF to return from among the first 5,000 requests that your AWS resource received during the time range. If your resource received fewer requests than the value of MaxItems , GetSampledRequests returns information about all of them. :rtype: dict ReturnsResponse Syntax { 'SampledRequests': [ { 'Request': { 'ClientIP': 'string', 'Country': 'string', 'URI': 'string', 'Method': 'string', 'HTTPVersion': 'string', 'Headers': [ { 'Name': 'string', 'Value': 'string' }, ] }, 'Weight': 123, 'Timestamp': datetime(2015, 1, 1), 'Action': 'string', 'RuleWithinRuleGroup': 'string' }, ], 'PopulationSize': 123, 'TimeWindow': { 'StartTime': datetime(2015, 1, 1), 'EndTime': datetime(2015, 1, 1) } } Response Structure (dict) -- SampledRequests (list) -- A complex type that contains detailed information about each of the requests in the sample. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The response from a GetSampledRequests request includes a SampledHTTPRequests complex type that appears as SampledRequests in the response syntax. SampledHTTPRequests contains one SampledHTTPRequest object for each web request that is returned by GetSampledRequests . Request (dict) -- A complex type that contains detailed information about the request. ClientIP (string) -- The IP address that the request originated from. If the WebACL is associated with a CloudFront distribution, this is the value of one of the following fields in CloudFront access logs: c-ip , if the viewer did not use an HTTP proxy or a load balancer to send the request x-forwarded-for , if the viewer did use an HTTP proxy or a load balancer to send the request Country (string) -- The two-letter country code for the country that the request originated from. For a current list of country codes, see the Wikipedia entry ISO 3166-1 alpha-2 . URI (string) -- The part of a web request that identifies the resource, for example, /images/daily-ad.jpg . Method (string) -- The HTTP method specified in the sampled web request. CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . HTTPVersion (string) -- The HTTP version specified in the sampled web request, for example, HTTP/1.1 . Headers (list) -- A complex type that contains two values for each header in the sampled web request: the name of the header and the value of the header. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The response from a GetSampledRequests request includes an HTTPHeader complex type that appears as Headers in the response syntax. HTTPHeader contains the names and values of all of the headers that appear in one of the web requests that were returned by GetSampledRequests . Name (string) -- The name of one of the headers in the sampled web request. Value (string) -- The value of one of the headers in the sampled web request. Weight (integer) -- A value that indicates how one result in the response relates proportionally to other results in the response. A result that has a weight of 2 represents roughly twice as many CloudFront web requests as a result that has a weight of 1 . Timestamp (datetime) -- The time at which AWS WAF received the request from your AWS resource, in Unix time format (in seconds). Action (string) -- The action for the Rule that the request matched: ALLOW , BLOCK , or COUNT . RuleWithinRuleGroup (string) -- This value is returned if the GetSampledRequests request specifies the ID of a RuleGroup rather than the ID of an individual rule. RuleWithinRuleGroup is the rule within the specified RuleGroup that matched the request listed in the response. PopulationSize (integer) -- The total number of requests from which GetSampledRequests got a sample of MaxItems requests. If PopulationSize is less than MaxItems , the sample includes every request that your AWS resource received during the specified time range. TimeWindow (dict) -- Usually, TimeWindow is the time range that you specified in the GetSampledRequests request. However, if your AWS resource received more than 5,000 requests during the time range that you specified in the request, GetSampledRequests returns the time range for the first 5,000 requests. Times are in Coordinated Universal Time (UTC) format. StartTime (datetime) -- The beginning of the time range from which you want GetSampledRequests to return a sample of the requests that your AWS resource received. You must specify the date and time in Coordinated Universal Time (UTC) format. UTC format includes the special designator, Z . For example, "2016-09-27T14:50Z" . You can specify any time range in the previous three hours. EndTime (datetime) -- The end of the time range from which you want GetSampledRequests to return a sample of the requests that your AWS resource received. You must specify the date and time in Coordinated Universal Time (UTC) format. UTC format includes the special designator, Z . For example, "2016-09-27T14:50Z" . You can specify any time range in the previous three hours. Exceptions WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFInternalErrorException Examples The following example returns detailed information about 100 requests --a sample-- that AWS WAF randomly selects from among the first 5,000 requests that your AWS resource received between the time period 2016-09-27T15:50Z to 2016-09-27T15:50Z. response = client.get_sampled_requests( MaxItems=100, RuleId='WAFRule-1-Example', TimeWindow={ 'EndTime': datetime(2016, 9, 27, 15, 50, 0, 1, 271, 0), 'StartTime': datetime(2016, 9, 27, 15, 50, 0, 1, 271, 0), }, WebAclId='createwebacl-1472061481310', ) print(response) Expected Output: { 'PopulationSize': 50, 'SampledRequests': [ { 'Action': 'BLOCK', 'Request': { 'ClientIP': '192.0.2.44', 'Country': 'US', 'HTTPVersion': 'HTTP/1.1', 'Headers': [ { 'Name': 'User-Agent', 'Value': 'BadBot ', }, ], 'Method': 'HEAD', }, 'Timestamp': datetime(2016, 9, 27, 14, 55, 0, 1, 271, 0), 'Weight': 1, }, ], 'TimeWindow': { 'EndTime': datetime(2016, 9, 27, 15, 50, 0, 1, 271, 0), 'StartTime': datetime(2016, 9, 27, 14, 50, 0, 1, 271, 0), }, 'ResponseMetadata': { '...': '...', }, } :return: { 'SampledRequests': [ { 'Request': { 'ClientIP': 'string', 'Country': 'string', 'URI': 'string', 'Method': 'string', 'HTTPVersion': 'string', 'Headers': [ { 'Name': 'string', 'Value': 'string' }, ] }, 'Weight': 123, 'Timestamp': datetime(2015, 1, 1), 'Action': 'string', 'RuleWithinRuleGroup': 'string' }, ], 'PopulationSize': 123, 'TimeWindow': { 'StartTime': datetime(2015, 1, 1), 'EndTime': datetime(2015, 1, 1) } } :returns: c-ip , if the viewer did not use an HTTP proxy or a load balancer to send the request x-forwarded-for , if the viewer did use an HTTP proxy or a load balancer to send the request """ pass def get_size_constraint_set(SizeConstraintSetId=None): """ Returns the SizeConstraintSet specified by SizeConstraintSetId . See also: AWS API Documentation Exceptions Examples The following example returns the details of a size constraint match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.get_size_constraint_set( SizeConstraintSetId='string' ) :type SizeConstraintSetId: string :param SizeConstraintSetId: [REQUIRED] The SizeConstraintSetId of the SizeConstraintSet that you want to get. SizeConstraintSetId is returned by CreateSizeConstraintSet and by ListSizeConstraintSets . :rtype: dict ReturnsResponse Syntax{ 'SizeConstraintSet': { 'SizeConstraintSetId': 'string', 'Name': 'string', 'SizeConstraints': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'ComparisonOperator': 'EQ'|'NE'|'LE'|'LT'|'GE'|'GT', 'Size': 123 }, ] } } Response Structure (dict) -- SizeConstraintSet (dict) --Information about the SizeConstraintSet that you specified in the GetSizeConstraintSet request. For more information, see the following topics: SizeConstraintSet : Contains SizeConstraintSetId , SizeConstraints , and Name SizeConstraints : Contains an array of SizeConstraint objects. Each SizeConstraint object contains FieldToMatch , TextTransformation , ComparisonOperator , and Size FieldToMatch : Contains Data and Type SizeConstraintSetId (string) --A unique identifier for a SizeConstraintSet . You use SizeConstraintSetId to get information about a SizeConstraintSet (see GetSizeConstraintSet ), update a SizeConstraintSet (see UpdateSizeConstraintSet ), insert a SizeConstraintSet into a Rule or delete one from a Rule (see UpdateRule ), and delete a SizeConstraintSet from AWS WAF (see DeleteSizeConstraintSet ). SizeConstraintSetId is returned by CreateSizeConstraintSet and by ListSizeConstraintSets . Name (string) --The name, if any, of the SizeConstraintSet . SizeConstraints (list) --Specifies the parts of web requests that you want to inspect the size of. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies a constraint on the size of a part of the web request. AWS WAF uses the Size , ComparisonOperator , and FieldToMatch to build an expression in the form of "Size ComparisonOperator size in bytes of FieldToMatch ". If that expression is true, the SizeConstraint is considered to match. FieldToMatch (dict) --Specifies where in a web request to look for the size constraint. Type (string) --The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) --When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . TextTransformation (string) --Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on FieldToMatch before inspecting it for a match. You can only specify a single type of TextTransformation. Note that if you choose BODY for the value of Type , you must choose NONE for TextTransformation because CloudFront forwards only the first 8192 bytes for inspection. NONE Specify NONE if you don't want to perform any text transformations. CMD_LINE When you're concerned that attackers are injecting an operating system command line command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations: Delete the following characters: " ' ^ Delete spaces before the following characters: / ( Replace the following characters with a space: , ; Replace multiple spaces with one space Convert uppercase letters (A-Z) to lowercase (a-z) COMPRESS_WHITE_SPACE Use this option to replace the following characters with a space character (decimal 32): f, formfeed, decimal 12 t, tab, decimal 9 n, newline, decimal 10 r, carriage return, decimal 13 v, vertical tab, decimal 11 non-breaking space, decimal 160 COMPRESS_WHITE_SPACE also replaces multiple spaces with one space.HTML_ENTITY_DECODE Use this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations: Replaces (ampersand)quot; with " Replaces (ampersand)nbsp; with a non-breaking space, decimal 160 Replaces (ampersand)lt; with a "less than" symbol Replaces (ampersand)gt; with > Replaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters Replaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters LOWERCASE Use this option to convert uppercase letters (A-Z) to lowercase (a-z). URL_DECODE Use this option to decode a URL-encoded value. ComparisonOperator (string) --The type of comparison you want AWS WAF to perform. AWS WAF uses this in combination with the provided Size and FieldToMatch to build an expression in the form of "Size ComparisonOperator size in bytes of FieldToMatch ". If that expression is true, the SizeConstraint is considered to match. EQ : Used to test if the Size is equal to the size of the FieldToMatchNE : Used to test if the Size is not equal to the size of the FieldToMatch LE : Used to test if the Size is less than or equal to the size of the FieldToMatch LT : Used to test if the Size is strictly less than the size of the FieldToMatch GE : Used to test if the Size is greater than or equal to the size of the FieldToMatch GT : Used to test if the Size is strictly greater than the size of the FieldToMatch Size (integer) --The size in bytes that you want AWS WAF to compare against the size of the specified FieldToMatch . AWS WAF uses this in combination with ComparisonOperator and FieldToMatch to build an expression in the form of "Size ComparisonOperator size in bytes of FieldToMatch ". If that expression is true, the SizeConstraint is considered to match. Valid values for size are 0 - 21474836480 bytes (0 - 20 GB). If you specify URI for the value of Type , the / in the URI counts as one character. For example, the URI /logo.jpg is nine characters long. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException Examples The following example returns the details of a size constraint match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. response = client.get_size_constraint_set( SizeConstraintSetId='example1ds3t-46da-4fdb-b8d5-abc321j569j5', ) print(response) Expected Output: { 'SizeConstraintSet': { 'Name': 'MySampleSizeConstraintSet', 'SizeConstraintSetId': 'example1ds3t-46da-4fdb-b8d5-abc321j569j5', 'SizeConstraints': [ { 'ComparisonOperator': 'GT', 'FieldToMatch': { 'Type': 'QUERY_STRING', }, 'Size': 0, 'TextTransformation': 'NONE', }, ], }, 'ResponseMetadata': { '...': '...', }, } :return: { 'SizeConstraintSet': { 'SizeConstraintSetId': 'string', 'Name': 'string', 'SizeConstraints': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'ComparisonOperator': 'EQ'|'NE'|'LE'|'LT'|'GE'|'GT', 'Size': 123 }, ] } } :returns: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . """ pass def get_sql_injection_match_set(SqlInjectionMatchSetId=None): """ Returns the SqlInjectionMatchSet that is specified by SqlInjectionMatchSetId . See also: AWS API Documentation Exceptions Examples The following example returns the details of a SQL injection match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.get_sql_injection_match_set( SqlInjectionMatchSetId='string' ) :type SqlInjectionMatchSetId: string :param SqlInjectionMatchSetId: [REQUIRED] The SqlInjectionMatchSetId of the SqlInjectionMatchSet that you want to get. SqlInjectionMatchSetId is returned by CreateSqlInjectionMatchSet and by ListSqlInjectionMatchSets . :rtype: dict ReturnsResponse Syntax{ 'SqlInjectionMatchSet': { 'SqlInjectionMatchSetId': 'string', 'Name': 'string', 'SqlInjectionMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE' }, ] } } Response Structure (dict) --The response to a GetSqlInjectionMatchSet request. SqlInjectionMatchSet (dict) --Information about the SqlInjectionMatchSet that you specified in the GetSqlInjectionMatchSet request. For more information, see the following topics: SqlInjectionMatchSet : Contains Name , SqlInjectionMatchSetId , and an array of SqlInjectionMatchTuple objects SqlInjectionMatchTuple : Each SqlInjectionMatchTuple object contains FieldToMatch and TextTransformation FieldToMatch : Contains Data and Type SqlInjectionMatchSetId (string) --A unique identifier for a SqlInjectionMatchSet . You use SqlInjectionMatchSetId to get information about a SqlInjectionMatchSet (see GetSqlInjectionMatchSet ), update a SqlInjectionMatchSet (see UpdateSqlInjectionMatchSet ), insert a SqlInjectionMatchSet into a Rule or delete one from a Rule (see UpdateRule ), and delete a SqlInjectionMatchSet from AWS WAF (see DeleteSqlInjectionMatchSet ). SqlInjectionMatchSetId is returned by CreateSqlInjectionMatchSet and by ListSqlInjectionMatchSets . Name (string) --The name, if any, of the SqlInjectionMatchSet . SqlInjectionMatchTuples (list) --Specifies the parts of web requests that you want to inspect for snippets of malicious SQL code. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies the part of a web request that you want AWS WAF to inspect for snippets of malicious SQL code and, if you want AWS WAF to inspect a header, the name of the header. FieldToMatch (dict) --Specifies where in a web request to look for snippets of malicious SQL code. Type (string) --The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) --When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . TextTransformation (string) --Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on FieldToMatch before inspecting it for a match. You can only specify a single type of TextTransformation. CMD_LINE When you're concerned that attackers are injecting an operating system command line command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations: Delete the following characters: " ' ^ Delete spaces before the following characters: / ( Replace the following characters with a space: , ; Replace multiple spaces with one space Convert uppercase letters (A-Z) to lowercase (a-z) COMPRESS_WHITE_SPACE Use this option to replace the following characters with a space character (decimal 32): f, formfeed, decimal 12 t, tab, decimal 9 n, newline, decimal 10 r, carriage return, decimal 13 v, vertical tab, decimal 11 non-breaking space, decimal 160 COMPRESS_WHITE_SPACE also replaces multiple spaces with one space.HTML_ENTITY_DECODE Use this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations: Replaces (ampersand)quot; with " Replaces (ampersand)nbsp; with a non-breaking space, decimal 160 Replaces (ampersand)lt; with a "less than" symbol Replaces (ampersand)gt; with > Replaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters Replaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters LOWERCASE Use this option to convert uppercase letters (A-Z) to lowercase (a-z). URL_DECODE Use this option to decode a URL-encoded value. NONE Specify NONE if you don't want to perform any text transformations. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException Examples The following example returns the details of a SQL injection match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. response = client.get_sql_injection_match_set( SqlInjectionMatchSetId='example1ds3t-46da-4fdb-b8d5-abc321j569j5', ) print(response) Expected Output: { 'SqlInjectionMatchSet': { 'Name': 'MySQLInjectionMatchSet', 'SqlInjectionMatchSetId': 'example1ds3t-46da-4fdb-b8d5-abc321j569j5', 'SqlInjectionMatchTuples': [ { 'FieldToMatch': { 'Type': 'QUERY_STRING', }, 'TextTransformation': 'URL_DECODE', }, ], }, 'ResponseMetadata': { '...': '...', }, } :return: { 'SqlInjectionMatchSet': { 'SqlInjectionMatchSetId': 'string', 'Name': 'string', 'SqlInjectionMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE' }, ] } } :returns: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . """ pass def get_waiter(waiter_name=None): """ Returns an object that can wait for some condition. :type waiter_name: str :param waiter_name: The name of the waiter to get. See the waiters section of the service docs for a list of available waiters. :rtype: botocore.waiter.Waiter """ pass def get_web_acl(WebACLId=None): """ Returns the WebACL that is specified by WebACLId . See also: AWS API Documentation Exceptions Examples The following example returns the details of a web ACL with the ID createwebacl-1472061481310. Expected Output: :example: response = client.get_web_acl( WebACLId='string' ) :type WebACLId: string :param WebACLId: [REQUIRED] The WebACLId of the WebACL that you want to get. WebACLId is returned by CreateWebACL and by ListWebACLs . :rtype: dict ReturnsResponse Syntax{ 'WebACL': { 'WebACLId': 'string', 'Name': 'string', 'MetricName': 'string', 'DefaultAction': { 'Type': 'BLOCK'|'ALLOW'|'COUNT' }, 'Rules': [ { 'Priority': 123, 'RuleId': 'string', 'Action': { 'Type': 'BLOCK'|'ALLOW'|'COUNT' }, 'OverrideAction': { 'Type': 'NONE'|'COUNT' }, 'Type': 'REGULAR'|'RATE_BASED'|'GROUP', 'ExcludedRules': [ { 'RuleId': 'string' }, ] }, ], 'WebACLArn': 'string' } } Response Structure (dict) -- WebACL (dict) --Information about the WebACL that you specified in the GetWebACL request. For more information, see the following topics: WebACL : Contains DefaultAction , MetricName , Name , an array of Rule objects, and WebACLId DefaultAction (Data type is WafAction ): Contains Type Rules : Contains an array of ActivatedRule objects, which contain Action , Priority , and RuleId Action : Contains Type WebACLId (string) --A unique identifier for a WebACL . You use WebACLId to get information about a WebACL (see GetWebACL ), update a WebACL (see UpdateWebACL ), and delete a WebACL from AWS WAF (see DeleteWebACL ). WebACLId is returned by CreateWebACL and by ListWebACLs . Name (string) --A friendly name or description of the WebACL . You can't change the name of a WebACL after you create it. MetricName (string) --A friendly name or description for the metrics for this WebACL . The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can't contain whitespace or metric names reserved for AWS WAF, including "All" and "Default_Action." You can't change MetricName after you create the WebACL . DefaultAction (dict) --The action to perform if none of the Rules contained in the WebACL match. The action is specified by the WafAction object. Type (string) --Specifies how you want AWS WAF to respond to requests that match the settings in a Rule . Valid settings include the following: ALLOW : AWS WAF allows requests BLOCK : AWS WAF blocks requests COUNT : AWS WAF increments a counter of the requests that match all of the conditions in the rule. AWS WAF then continues to inspect the web request based on the remaining rules in the web ACL. You can't specify COUNT for the default action for a WebACL . Rules (list) --An array that contains the action for each Rule in a WebACL , the priority of the Rule , and the ID of the Rule . (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The ActivatedRule object in an UpdateWebACL request specifies a Rule that you want to insert or delete, the priority of the Rule in the WebACL , and the action that you want AWS WAF to take when a web request matches the Rule (ALLOW , BLOCK , or COUNT ). To specify whether to insert or delete a Rule , use the Action parameter in the WebACLUpdate data type. Priority (integer) --Specifies the order in which the Rules in a WebACL are evaluated. Rules with a lower value for Priority are evaluated before Rules with a higher value. The value must be a unique integer. If you add multiple Rules to a WebACL , the values don't need to be consecutive. RuleId (string) --The RuleId for a Rule . You use RuleId to get more information about a Rule (see GetRule ), update a Rule (see UpdateRule ), insert a Rule into a WebACL or delete a one from a WebACL (see UpdateWebACL ), or delete a Rule from AWS WAF (see DeleteRule ). RuleId is returned by CreateRule and by ListRules . Action (dict) --Specifies the action that CloudFront or AWS WAF takes when a web request matches the conditions in the Rule . Valid values for Action include the following: ALLOW : CloudFront responds with the requested object. BLOCK : CloudFront responds with an HTTP 403 (Forbidden) status code. COUNT : AWS WAF increments a counter of requests that match the conditions in the rule and then continues to inspect the web request based on the remaining rules in the web ACL. ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case, you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction . Type (string) --Specifies how you want AWS WAF to respond to requests that match the settings in a Rule . Valid settings include the following: ALLOW : AWS WAF allows requests BLOCK : AWS WAF blocks requests COUNT : AWS WAF increments a counter of the requests that match all of the conditions in the rule. AWS WAF then continues to inspect the web request based on the remaining rules in the web ACL. You can't specify COUNT for the default action for a WebACL . OverrideAction (dict) --Use the OverrideAction to test your RuleGroup . Any rule in a RuleGroup can potentially block a request. If you set the OverrideAction to None , the RuleGroup will block a request if any individual rule in the RuleGroup matches the request and is configured to block that request. However if you first want to test the RuleGroup , set the OverrideAction to Count . The RuleGroup will then override any block action specified by individual rules contained within the group. Instead of blocking matching requests, those requests will be counted. You can view a record of counted requests using GetSampledRequests . ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction . Type (string) -- COUNT overrides the action specified by the individual rule within a RuleGroup . If set to NONE , the rule's action will take place. Type (string) --The rule type, either REGULAR , as defined by Rule , RATE_BASED , as defined by RateBasedRule , or GROUP , as defined by RuleGroup . The default is REGULAR. Although this field is optional, be aware that if you try to add a RATE_BASED rule to a web ACL without setting the type, the UpdateWebACL request will fail because the request tries to add a REGULAR rule with the specified ID, which does not exist. ExcludedRules (list) --An array of rules to exclude from a rule group. This is applicable only when the ActivatedRule refers to a RuleGroup . Sometimes it is necessary to troubleshoot rule groups that are blocking traffic unexpectedly (false positives). One troubleshooting technique is to identify the specific rule within the rule group that is blocking the legitimate traffic and then disable (exclude) that particular rule. You can exclude rules from both your own rule groups and AWS Marketplace rule groups that have been associated with a web ACL. Specifying ExcludedRules does not remove those rules from the rule group. Rather, it changes the action for the rules to COUNT . Therefore, requests that match an ExcludedRule are counted but not blocked. The RuleGroup owner will receive COUNT metrics for each ExcludedRule . If you want to exclude rules from a rule group that is already associated with a web ACL, perform the following steps: Use the AWS WAF logs to identify the IDs of the rules that you want to exclude. For more information about the logs, see Logging Web ACL Traffic Information . Submit an UpdateWebACL request that has two actions: The first action deletes the existing rule group from the web ACL. That is, in the UpdateWebACL request, the first Updates:Action should be DELETE and Updates:ActivatedRule:RuleId should be the rule group that contains the rules that you want to exclude. The second action inserts the same rule group back in, but specifying the rules to exclude. That is, the second Updates:Action should be INSERT , Updates:ActivatedRule:RuleId should be the rule group that you just removed, and ExcludedRules should contain the rules that you want to exclude. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The rule to exclude from a rule group. This is applicable only when the ActivatedRule refers to a RuleGroup . The rule must belong to the RuleGroup that is specified by the ActivatedRule . RuleId (string) --The unique identifier for the rule to exclude from the rule group. WebACLArn (string) --Tha Amazon Resource Name (ARN) of the web ACL. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException Examples The following example returns the details of a web ACL with the ID createwebacl-1472061481310. response = client.get_web_acl( WebACLId='createwebacl-1472061481310', ) print(response) Expected Output: { 'WebACL': { 'DefaultAction': { 'Type': 'ALLOW', }, 'MetricName': 'CreateExample', 'Name': 'CreateExample', 'Rules': [ { 'Action': { 'Type': 'ALLOW', }, 'Priority': 1, 'RuleId': 'WAFRule-1-Example', }, ], 'WebACLId': 'createwebacl-1472061481310', }, 'ResponseMetadata': { '...': '...', }, } :return: { 'WebACL': { 'WebACLId': 'string', 'Name': 'string', 'MetricName': 'string', 'DefaultAction': { 'Type': 'BLOCK'|'ALLOW'|'COUNT' }, 'Rules': [ { 'Priority': 123, 'RuleId': 'string', 'Action': { 'Type': 'BLOCK'|'ALLOW'|'COUNT' }, 'OverrideAction': { 'Type': 'NONE'|'COUNT' }, 'Type': 'REGULAR'|'RATE_BASED'|'GROUP', 'ExcludedRules': [ { 'RuleId': 'string' }, ] }, ], 'WebACLArn': 'string' } } :returns: ALLOW : AWS WAF allows requests BLOCK : AWS WAF blocks requests COUNT : AWS WAF increments a counter of the requests that match all of the conditions in the rule. AWS WAF then continues to inspect the web request based on the remaining rules in the web ACL. You can't specify COUNT for the default action for a WebACL . """ pass def get_web_acl_for_resource(ResourceArn=None): """ Returns the web ACL for the specified resource, either an application load balancer or Amazon API Gateway stage. See also: AWS API Documentation Exceptions :example: response = client.get_web_acl_for_resource( ResourceArn='string' ) :type ResourceArn: string :param ResourceArn: [REQUIRED] The ARN (Amazon Resource Name) of the resource for which to get the web ACL, either an application load balancer or Amazon API Gateway stage. The ARN should be in one of the following formats: For an Application Load Balancer: ``arn:aws:elasticloadbalancing:region :account-id :loadbalancer/app/load-balancer-name /load-balancer-id `` For an Amazon API Gateway stage: ``arn:aws:apigateway:region ::/restapis/api-id /stages/stage-name `` :rtype: dict ReturnsResponse Syntax{ 'WebACLSummary': { 'WebACLId': 'string', 'Name': 'string' } } Response Structure (dict) -- WebACLSummary (dict) --Information about the web ACL that you specified in the GetWebACLForResource request. If there is no associated resource, a null WebACLSummary is returned. WebACLId (string) --A unique identifier for a WebACL . You use WebACLId to get information about a WebACL (see GetWebACL ), update a WebACL (see UpdateWebACL ), and delete a WebACL from AWS WAF (see DeleteWebACL ). WebACLId is returned by CreateWebACL and by ListWebACLs . Name (string) --A friendly name or description of the WebACL . You can't change the name of a WebACL after you create it. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFUnavailableEntityException :return: { 'WebACLSummary': { 'WebACLId': 'string', 'Name': 'string' } } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFUnavailableEntityException """ pass def get_xss_match_set(XssMatchSetId=None): """ Returns the XssMatchSet that is specified by XssMatchSetId . See also: AWS API Documentation Exceptions Examples The following example returns the details of an XSS match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.get_xss_match_set( XssMatchSetId='string' ) :type XssMatchSetId: string :param XssMatchSetId: [REQUIRED] The XssMatchSetId of the XssMatchSet that you want to get. XssMatchSetId is returned by CreateXssMatchSet and by ListXssMatchSets . :rtype: dict ReturnsResponse Syntax{ 'XssMatchSet': { 'XssMatchSetId': 'string', 'Name': 'string', 'XssMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE' }, ] } } Response Structure (dict) --The response to a GetXssMatchSet request. XssMatchSet (dict) --Information about the XssMatchSet that you specified in the GetXssMatchSet request. For more information, see the following topics: XssMatchSet : Contains Name , XssMatchSetId , and an array of XssMatchTuple objects XssMatchTuple : Each XssMatchTuple object contains FieldToMatch and TextTransformation FieldToMatch : Contains Data and Type XssMatchSetId (string) --A unique identifier for an XssMatchSet . You use XssMatchSetId to get information about an XssMatchSet (see GetXssMatchSet ), update an XssMatchSet (see UpdateXssMatchSet ), insert an XssMatchSet into a Rule or delete one from a Rule (see UpdateRule ), and delete an XssMatchSet from AWS WAF (see DeleteXssMatchSet ). XssMatchSetId is returned by CreateXssMatchSet and by ListXssMatchSets . Name (string) --The name, if any, of the XssMatchSet . XssMatchTuples (list) --Specifies the parts of web requests that you want to inspect for cross-site scripting attacks. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies the part of a web request that you want AWS WAF to inspect for cross-site scripting attacks and, if you want AWS WAF to inspect a header, the name of the header. FieldToMatch (dict) --Specifies where in a web request to look for cross-site scripting attacks. Type (string) --The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) --When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . TextTransformation (string) --Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on FieldToMatch before inspecting it for a match. You can only specify a single type of TextTransformation. CMD_LINE When you're concerned that attackers are injecting an operating system command line command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations: Delete the following characters: " ' ^ Delete spaces before the following characters: / ( Replace the following characters with a space: , ; Replace multiple spaces with one space Convert uppercase letters (A-Z) to lowercase (a-z) COMPRESS_WHITE_SPACE Use this option to replace the following characters with a space character (decimal 32): f, formfeed, decimal 12 t, tab, decimal 9 n, newline, decimal 10 r, carriage return, decimal 13 v, vertical tab, decimal 11 non-breaking space, decimal 160 COMPRESS_WHITE_SPACE also replaces multiple spaces with one space.HTML_ENTITY_DECODE Use this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations: Replaces (ampersand)quot; with " Replaces (ampersand)nbsp; with a non-breaking space, decimal 160 Replaces (ampersand)lt; with a "less than" symbol Replaces (ampersand)gt; with > Replaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters Replaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters LOWERCASE Use this option to convert uppercase letters (A-Z) to lowercase (a-z). URL_DECODE Use this option to decode a URL-encoded value. NONE Specify NONE if you don't want to perform any text transformations. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException Examples The following example returns the details of an XSS match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. response = client.get_xss_match_set( XssMatchSetId='example1ds3t-46da-4fdb-b8d5-abc321j569j5', ) print(response) Expected Output: { 'XssMatchSet': { 'Name': 'MySampleXssMatchSet', 'XssMatchSetId': 'example1ds3t-46da-4fdb-b8d5-abc321j569j5', 'XssMatchTuples': [ { 'FieldToMatch': { 'Type': 'QUERY_STRING', }, 'TextTransformation': 'URL_DECODE', }, ], }, 'ResponseMetadata': { '...': '...', }, } :return: { 'XssMatchSet': { 'XssMatchSetId': 'string', 'Name': 'string', 'XssMatchTuples': [ { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE' }, ] } } :returns: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . """ pass def list_activated_rules_in_rule_group(RuleGroupId=None, NextMarker=None, Limit=None): """ Returns an array of ActivatedRule objects. See also: AWS API Documentation Exceptions :example: response = client.list_activated_rules_in_rule_group( RuleGroupId='string', NextMarker='string', Limit=123 ) :type RuleGroupId: string :param RuleGroupId: The RuleGroupId of the RuleGroup for which you want to get a list of ActivatedRule objects. :type NextMarker: string :param NextMarker: If you specify a value for Limit and you have more ActivatedRules than the value of Limit , AWS WAF returns a NextMarker value in the response that allows you to list another group of ActivatedRules . For the second and subsequent ListActivatedRulesInRuleGroup requests, specify the value of NextMarker from the previous response to get information about another batch of ActivatedRules . :type Limit: integer :param Limit: Specifies the number of ActivatedRules that you want AWS WAF to return for this request. If you have more ActivatedRules than the number that you specify for Limit , the response includes a NextMarker value that you can use to get another batch of ActivatedRules . :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'ActivatedRules': [ { 'Priority': 123, 'RuleId': 'string', 'Action': { 'Type': 'BLOCK'|'ALLOW'|'COUNT' }, 'OverrideAction': { 'Type': 'NONE'|'COUNT' }, 'Type': 'REGULAR'|'RATE_BASED'|'GROUP', 'ExcludedRules': [ { 'RuleId': 'string' }, ] }, ] } Response Structure (dict) -- NextMarker (string) -- If you have more ActivatedRules than the number that you specified for Limit in the request, the response includes a NextMarker value. To list more ActivatedRules , submit another ListActivatedRulesInRuleGroup request, and specify the NextMarker value from the response in the NextMarker value in the next request. ActivatedRules (list) -- An array of ActivatedRules objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The ActivatedRule object in an UpdateWebACL request specifies a Rule that you want to insert or delete, the priority of the Rule in the WebACL , and the action that you want AWS WAF to take when a web request matches the Rule (ALLOW , BLOCK , or COUNT ). To specify whether to insert or delete a Rule , use the Action parameter in the WebACLUpdate data type. Priority (integer) -- Specifies the order in which the Rules in a WebACL are evaluated. Rules with a lower value for Priority are evaluated before Rules with a higher value. The value must be a unique integer. If you add multiple Rules to a WebACL , the values don't need to be consecutive. RuleId (string) -- The RuleId for a Rule . You use RuleId to get more information about a Rule (see GetRule ), update a Rule (see UpdateRule ), insert a Rule into a WebACL or delete a one from a WebACL (see UpdateWebACL ), or delete a Rule from AWS WAF (see DeleteRule ). RuleId is returned by CreateRule and by ListRules . Action (dict) -- Specifies the action that CloudFront or AWS WAF takes when a web request matches the conditions in the Rule . Valid values for Action include the following: ALLOW : CloudFront responds with the requested object. BLOCK : CloudFront responds with an HTTP 403 (Forbidden) status code. COUNT : AWS WAF increments a counter of requests that match the conditions in the rule and then continues to inspect the web request based on the remaining rules in the web ACL. ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case, you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction . Type (string) -- Specifies how you want AWS WAF to respond to requests that match the settings in a Rule . Valid settings include the following: ALLOW : AWS WAF allows requests BLOCK : AWS WAF blocks requests COUNT : AWS WAF increments a counter of the requests that match all of the conditions in the rule. AWS WAF then continues to inspect the web request based on the remaining rules in the web ACL. You can't specify COUNT for the default action for a WebACL . OverrideAction (dict) -- Use the OverrideAction to test your RuleGroup . Any rule in a RuleGroup can potentially block a request. If you set the OverrideAction to None , the RuleGroup will block a request if any individual rule in the RuleGroup matches the request and is configured to block that request. However if you first want to test the RuleGroup , set the OverrideAction to Count . The RuleGroup will then override any block action specified by individual rules contained within the group. Instead of blocking matching requests, those requests will be counted. You can view a record of counted requests using GetSampledRequests . ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction . Type (string) -- COUNT overrides the action specified by the individual rule within a RuleGroup . If set to NONE , the rule's action will take place. Type (string) -- The rule type, either REGULAR , as defined by Rule , RATE_BASED , as defined by RateBasedRule , or GROUP , as defined by RuleGroup . The default is REGULAR. Although this field is optional, be aware that if you try to add a RATE_BASED rule to a web ACL without setting the type, the UpdateWebACL request will fail because the request tries to add a REGULAR rule with the specified ID, which does not exist. ExcludedRules (list) -- An array of rules to exclude from a rule group. This is applicable only when the ActivatedRule refers to a RuleGroup . Sometimes it is necessary to troubleshoot rule groups that are blocking traffic unexpectedly (false positives). One troubleshooting technique is to identify the specific rule within the rule group that is blocking the legitimate traffic and then disable (exclude) that particular rule. You can exclude rules from both your own rule groups and AWS Marketplace rule groups that have been associated with a web ACL. Specifying ExcludedRules does not remove those rules from the rule group. Rather, it changes the action for the rules to COUNT . Therefore, requests that match an ExcludedRule are counted but not blocked. The RuleGroup owner will receive COUNT metrics for each ExcludedRule . If you want to exclude rules from a rule group that is already associated with a web ACL, perform the following steps: Use the AWS WAF logs to identify the IDs of the rules that you want to exclude. For more information about the logs, see Logging Web ACL Traffic Information . Submit an UpdateWebACL request that has two actions: The first action deletes the existing rule group from the web ACL. That is, in the UpdateWebACL request, the first Updates:Action should be DELETE and Updates:ActivatedRule:RuleId should be the rule group that contains the rules that you want to exclude. The second action inserts the same rule group back in, but specifying the rules to exclude. That is, the second Updates:Action should be INSERT , Updates:ActivatedRule:RuleId should be the rule group that you just removed, and ExcludedRules should contain the rules that you want to exclude. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The rule to exclude from a rule group. This is applicable only when the ActivatedRule refers to a RuleGroup . The rule must belong to the RuleGroup that is specified by the ActivatedRule . RuleId (string) -- The unique identifier for the rule to exclude from the rule group. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFInvalidParameterException :return: { 'NextMarker': 'string', 'ActivatedRules': [ { 'Priority': 123, 'RuleId': 'string', 'Action': { 'Type': 'BLOCK'|'ALLOW'|'COUNT' }, 'OverrideAction': { 'Type': 'NONE'|'COUNT' }, 'Type': 'REGULAR'|'RATE_BASED'|'GROUP', 'ExcludedRules': [ { 'RuleId': 'string' }, ] }, ] } :returns: ALLOW : CloudFront responds with the requested object. BLOCK : CloudFront responds with an HTTP 403 (Forbidden) status code. COUNT : AWS WAF increments a counter of requests that match the conditions in the rule and then continues to inspect the web request based on the remaining rules in the web ACL. """ pass def list_byte_match_sets(NextMarker=None, Limit=None): """ Returns an array of ByteMatchSetSummary objects. See also: AWS API Documentation Exceptions :example: response = client.list_byte_match_sets( NextMarker='string', Limit=123 ) :type NextMarker: string :param NextMarker: If you specify a value for Limit and you have more ByteMatchSets than the value of Limit , AWS WAF returns a NextMarker value in the response that allows you to list another group of ByteMatchSets . For the second and subsequent ListByteMatchSets requests, specify the value of NextMarker from the previous response to get information about another batch of ByteMatchSets . :type Limit: integer :param Limit: Specifies the number of ByteMatchSet objects that you want AWS WAF to return for this request. If you have more ByteMatchSets objects than the number you specify for Limit , the response includes a NextMarker value that you can use to get another batch of ByteMatchSet objects. :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'ByteMatchSets': [ { 'ByteMatchSetId': 'string', 'Name': 'string' }, ] } Response Structure (dict) -- NextMarker (string) -- If you have more ByteMatchSet objects than the number that you specified for Limit in the request, the response includes a NextMarker value. To list more ByteMatchSet objects, submit another ListByteMatchSets request, and specify the NextMarker value from the response in the NextMarker value in the next request. ByteMatchSets (list) -- An array of ByteMatchSetSummary objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Returned by ListByteMatchSets . Each ByteMatchSetSummary object includes the Name and ByteMatchSetId for one ByteMatchSet . ByteMatchSetId (string) -- The ByteMatchSetId for a ByteMatchSet . You use ByteMatchSetId to get information about a ByteMatchSet , update a ByteMatchSet , remove a ByteMatchSet from a Rule , and delete a ByteMatchSet from AWS WAF. ByteMatchSetId is returned by CreateByteMatchSet and by ListByteMatchSets . Name (string) -- A friendly name or description of the ByteMatchSet . You can't change Name after you create a ByteMatchSet . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException :return: { 'NextMarker': 'string', 'ByteMatchSets': [ { 'ByteMatchSetId': 'string', 'Name': 'string' }, ] } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException """ pass def list_geo_match_sets(NextMarker=None, Limit=None): """ Returns an array of GeoMatchSetSummary objects in the response. See also: AWS API Documentation Exceptions :example: response = client.list_geo_match_sets( NextMarker='string', Limit=123 ) :type NextMarker: string :param NextMarker: If you specify a value for Limit and you have more GeoMatchSet s than the value of Limit , AWS WAF returns a NextMarker value in the response that allows you to list another group of GeoMatchSet objects. For the second and subsequent ListGeoMatchSets requests, specify the value of NextMarker from the previous response to get information about another batch of GeoMatchSet objects. :type Limit: integer :param Limit: Specifies the number of GeoMatchSet objects that you want AWS WAF to return for this request. If you have more GeoMatchSet objects than the number you specify for Limit , the response includes a NextMarker value that you can use to get another batch of GeoMatchSet objects. :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'GeoMatchSets': [ { 'GeoMatchSetId': 'string', 'Name': 'string' }, ] } Response Structure (dict) -- NextMarker (string) -- If you have more GeoMatchSet objects than the number that you specified for Limit in the request, the response includes a NextMarker value. To list more GeoMatchSet objects, submit another ListGeoMatchSets request, and specify the NextMarker value from the response in the NextMarker value in the next request. GeoMatchSets (list) -- An array of GeoMatchSetSummary objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Contains the identifier and the name of the GeoMatchSet . GeoMatchSetId (string) -- The GeoMatchSetId for an GeoMatchSet . You can use GeoMatchSetId in a GetGeoMatchSet request to get detailed information about an GeoMatchSet . Name (string) -- A friendly name or description of the GeoMatchSet . You can't change the name of an GeoMatchSet after you create it. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException :return: { 'NextMarker': 'string', 'GeoMatchSets': [ { 'GeoMatchSetId': 'string', 'Name': 'string' }, ] } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException """ pass def list_ip_sets(NextMarker=None, Limit=None): """ Returns an array of IPSetSummary objects in the response. See also: AWS API Documentation Exceptions Examples The following example returns an array of up to 100 IP match sets. Expected Output: :example: response = client.list_ip_sets( NextMarker='string', Limit=123 ) :type NextMarker: string :param NextMarker: AWS WAF returns a NextMarker value in the response that allows you to list another group of IPSets . For the second and subsequent ListIPSets requests, specify the value of NextMarker from the previous response to get information about another batch of IPSets . :type Limit: integer :param Limit: Specifies the number of IPSet objects that you want AWS WAF to return for this request. If you have more IPSet objects than the number you specify for Limit , the response includes a NextMarker value that you can use to get another batch of IPSet objects. :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'IPSets': [ { 'IPSetId': 'string', 'Name': 'string' }, ] } Response Structure (dict) -- NextMarker (string) -- To list more IPSet objects, submit another ListIPSets request, and in the next request use the NextMarker response value as the NextMarker value. IPSets (list) -- An array of IPSetSummary objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Contains the identifier and the name of the IPSet . IPSetId (string) -- The IPSetId for an IPSet . You can use IPSetId in a GetIPSet request to get detailed information about an IPSet . Name (string) -- A friendly name or description of the IPSet . You can't change the name of an IPSet after you create it. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException Examples The following example returns an array of up to 100 IP match sets. response = client.list_ip_sets( Limit=100, ) print(response) Expected Output: { 'IPSets': [ { 'IPSetId': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'Name': 'MyIPSetFriendlyName', }, ], 'ResponseMetadata': { '...': '...', }, } :return: { 'NextMarker': 'string', 'IPSets': [ { 'IPSetId': 'string', 'Name': 'string' }, ] } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException """ pass def list_logging_configurations(NextMarker=None, Limit=None): """ Returns an array of LoggingConfiguration objects. See also: AWS API Documentation Exceptions :example: response = client.list_logging_configurations( NextMarker='string', Limit=123 ) :type NextMarker: string :param NextMarker: If you specify a value for Limit and you have more LoggingConfigurations than the value of Limit , AWS WAF returns a NextMarker value in the response that allows you to list another group of LoggingConfigurations . For the second and subsequent ListLoggingConfigurations requests, specify the value of NextMarker from the previous response to get information about another batch of ListLoggingConfigurations . :type Limit: integer :param Limit: Specifies the number of LoggingConfigurations that you want AWS WAF to return for this request. If you have more LoggingConfigurations than the number that you specify for Limit , the response includes a NextMarker value that you can use to get another batch of LoggingConfigurations . :rtype: dict ReturnsResponse Syntax { 'LoggingConfigurations': [ { 'ResourceArn': 'string', 'LogDestinationConfigs': [ 'string', ], 'RedactedFields': [ { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, ] }, ], 'NextMarker': 'string' } Response Structure (dict) -- LoggingConfigurations (list) -- An array of LoggingConfiguration objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The Amazon Kinesis Data Firehose, RedactedFields information, and the web ACL Amazon Resource Name (ARN). ResourceArn (string) -- The Amazon Resource Name (ARN) of the web ACL that you want to associate with LogDestinationConfigs . LogDestinationConfigs (list) -- An array of Amazon Kinesis Data Firehose ARNs. (string) -- RedactedFields (list) -- The parts of the request that you want redacted from the logs. For example, if you redact the cookie field, the cookie field in the firehose will be xxx . (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies where in a web request to look for TargetString . Type (string) -- The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) -- When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . NextMarker (string) -- If you have more LoggingConfigurations than the number that you specified for Limit in the request, the response includes a NextMarker value. To list more LoggingConfigurations , submit another ListLoggingConfigurations request, and specify the NextMarker value from the response in the NextMarker value in the next request. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFInvalidParameterException :return: { 'LoggingConfigurations': [ { 'ResourceArn': 'string', 'LogDestinationConfigs': [ 'string', ], 'RedactedFields': [ { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, ] }, ], 'NextMarker': 'string' } :returns: (string) -- """ pass def list_rate_based_rules(NextMarker=None, Limit=None): """ Returns an array of RuleSummary objects. See also: AWS API Documentation Exceptions :example: response = client.list_rate_based_rules( NextMarker='string', Limit=123 ) :type NextMarker: string :param NextMarker: If you specify a value for Limit and you have more Rules than the value of Limit , AWS WAF returns a NextMarker value in the response that allows you to list another group of Rules . For the second and subsequent ListRateBasedRules requests, specify the value of NextMarker from the previous response to get information about another batch of Rules . :type Limit: integer :param Limit: Specifies the number of Rules that you want AWS WAF to return for this request. If you have more Rules than the number that you specify for Limit , the response includes a NextMarker value that you can use to get another batch of Rules . :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'Rules': [ { 'RuleId': 'string', 'Name': 'string' }, ] } Response Structure (dict) -- NextMarker (string) -- If you have more Rules than the number that you specified for Limit in the request, the response includes a NextMarker value. To list more Rules , submit another ListRateBasedRules request, and specify the NextMarker value from the response in the NextMarker value in the next request. Rules (list) -- An array of RuleSummary objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Contains the identifier and the friendly name or description of the Rule . RuleId (string) -- A unique identifier for a Rule . You use RuleId to get more information about a Rule (see GetRule ), update a Rule (see UpdateRule ), insert a Rule into a WebACL or delete one from a WebACL (see UpdateWebACL ), or delete a Rule from AWS WAF (see DeleteRule ). RuleId is returned by CreateRule and by ListRules . Name (string) -- A friendly name or description of the Rule . You can't change the name of a Rule after you create it. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException :return: { 'NextMarker': 'string', 'Rules': [ { 'RuleId': 'string', 'Name': 'string' }, ] } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException """ pass def list_regex_match_sets(NextMarker=None, Limit=None): """ Returns an array of RegexMatchSetSummary objects. See also: AWS API Documentation Exceptions :example: response = client.list_regex_match_sets( NextMarker='string', Limit=123 ) :type NextMarker: string :param NextMarker: If you specify a value for Limit and you have more RegexMatchSet objects than the value of Limit , AWS WAF returns a NextMarker value in the response that allows you to list another group of ByteMatchSets . For the second and subsequent ListRegexMatchSets requests, specify the value of NextMarker from the previous response to get information about another batch of RegexMatchSet objects. :type Limit: integer :param Limit: Specifies the number of RegexMatchSet objects that you want AWS WAF to return for this request. If you have more RegexMatchSet objects than the number you specify for Limit , the response includes a NextMarker value that you can use to get another batch of RegexMatchSet objects. :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'RegexMatchSets': [ { 'RegexMatchSetId': 'string', 'Name': 'string' }, ] } Response Structure (dict) -- NextMarker (string) -- If you have more RegexMatchSet objects than the number that you specified for Limit in the request, the response includes a NextMarker value. To list more RegexMatchSet objects, submit another ListRegexMatchSets request, and specify the NextMarker value from the response in the NextMarker value in the next request. RegexMatchSets (list) -- An array of RegexMatchSetSummary objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Returned by ListRegexMatchSets . Each RegexMatchSetSummary object includes the Name and RegexMatchSetId for one RegexMatchSet . RegexMatchSetId (string) -- The RegexMatchSetId for a RegexMatchSet . You use RegexMatchSetId to get information about a RegexMatchSet , update a RegexMatchSet , remove a RegexMatchSet from a Rule , and delete a RegexMatchSet from AWS WAF. RegexMatchSetId is returned by CreateRegexMatchSet and by ListRegexMatchSets . Name (string) -- A friendly name or description of the RegexMatchSet . You can't change Name after you create a RegexMatchSet . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException :return: { 'NextMarker': 'string', 'RegexMatchSets': [ { 'RegexMatchSetId': 'string', 'Name': 'string' }, ] } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException """ pass def list_regex_pattern_sets(NextMarker=None, Limit=None): """ Returns an array of RegexPatternSetSummary objects. See also: AWS API Documentation Exceptions :example: response = client.list_regex_pattern_sets( NextMarker='string', Limit=123 ) :type NextMarker: string :param NextMarker: If you specify a value for Limit and you have more RegexPatternSet objects than the value of Limit , AWS WAF returns a NextMarker value in the response that allows you to list another group of RegexPatternSet objects. For the second and subsequent ListRegexPatternSets requests, specify the value of NextMarker from the previous response to get information about another batch of RegexPatternSet objects. :type Limit: integer :param Limit: Specifies the number of RegexPatternSet objects that you want AWS WAF to return for this request. If you have more RegexPatternSet objects than the number you specify for Limit , the response includes a NextMarker value that you can use to get another batch of RegexPatternSet objects. :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'RegexPatternSets': [ { 'RegexPatternSetId': 'string', 'Name': 'string' }, ] } Response Structure (dict) -- NextMarker (string) -- If you have more RegexPatternSet objects than the number that you specified for Limit in the request, the response includes a NextMarker value. To list more RegexPatternSet objects, submit another ListRegexPatternSets request, and specify the NextMarker value from the response in the NextMarker value in the next request. RegexPatternSets (list) -- An array of RegexPatternSetSummary objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Returned by ListRegexPatternSets . Each RegexPatternSetSummary object includes the Name and RegexPatternSetId for one RegexPatternSet . RegexPatternSetId (string) -- The RegexPatternSetId for a RegexPatternSet . You use RegexPatternSetId to get information about a RegexPatternSet , update a RegexPatternSet , remove a RegexPatternSet from a RegexMatchSet , and delete a RegexPatternSet from AWS WAF. RegexPatternSetId is returned by CreateRegexPatternSet and by ListRegexPatternSets . Name (string) -- A friendly name or description of the RegexPatternSet . You can't change Name after you create a RegexPatternSet . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException :return: { 'NextMarker': 'string', 'RegexPatternSets': [ { 'RegexPatternSetId': 'string', 'Name': 'string' }, ] } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException """ pass def list_resources_for_web_acl(WebACLId=None, ResourceType=None): """ Returns an array of resources associated with the specified web ACL. See also: AWS API Documentation Exceptions :example: response = client.list_resources_for_web_acl( WebACLId='string', ResourceType='APPLICATION_LOAD_BALANCER'|'API_GATEWAY' ) :type WebACLId: string :param WebACLId: [REQUIRED] The unique identifier (ID) of the web ACL for which to list the associated resources. :type ResourceType: string :param ResourceType: The type of resource to list, either an application load balancer or Amazon API Gateway. :rtype: dict ReturnsResponse Syntax { 'ResourceArns': [ 'string', ] } Response Structure (dict) -- ResourceArns (list) -- An array of ARNs (Amazon Resource Names) of the resources associated with the specified web ACL. An array with zero elements is returned if there are no resources associated with the web ACL. (string) -- Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFInvalidParameterException :return: { 'ResourceArns': [ 'string', ] } :returns: (string) -- """ pass def list_rule_groups(NextMarker=None, Limit=None): """ Returns an array of RuleGroup objects. See also: AWS API Documentation Exceptions :example: response = client.list_rule_groups( NextMarker='string', Limit=123 ) :type NextMarker: string :param NextMarker: If you specify a value for Limit and you have more RuleGroups than the value of Limit , AWS WAF returns a NextMarker value in the response that allows you to list another group of RuleGroups . For the second and subsequent ListRuleGroups requests, specify the value of NextMarker from the previous response to get information about another batch of RuleGroups . :type Limit: integer :param Limit: Specifies the number of RuleGroups that you want AWS WAF to return for this request. If you have more RuleGroups than the number that you specify for Limit , the response includes a NextMarker value that you can use to get another batch of RuleGroups . :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'RuleGroups': [ { 'RuleGroupId': 'string', 'Name': 'string' }, ] } Response Structure (dict) -- NextMarker (string) -- If you have more RuleGroups than the number that you specified for Limit in the request, the response includes a NextMarker value. To list more RuleGroups , submit another ListRuleGroups request, and specify the NextMarker value from the response in the NextMarker value in the next request. RuleGroups (list) -- An array of RuleGroup objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Contains the identifier and the friendly name or description of the RuleGroup . RuleGroupId (string) -- A unique identifier for a RuleGroup . You use RuleGroupId to get more information about a RuleGroup (see GetRuleGroup ), update a RuleGroup (see UpdateRuleGroup ), insert a RuleGroup into a WebACL or delete one from a WebACL (see UpdateWebACL ), or delete a RuleGroup from AWS WAF (see DeleteRuleGroup ). RuleGroupId is returned by CreateRuleGroup and by ListRuleGroups . Name (string) -- A friendly name or description of the RuleGroup . You can't change the name of a RuleGroup after you create it. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException :return: { 'NextMarker': 'string', 'RuleGroups': [ { 'RuleGroupId': 'string', 'Name': 'string' }, ] } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException """ pass def list_rules(NextMarker=None, Limit=None): """ Returns an array of RuleSummary objects. See also: AWS API Documentation Exceptions Examples The following example returns an array of up to 100 rules. Expected Output: :example: response = client.list_rules( NextMarker='string', Limit=123 ) :type NextMarker: string :param NextMarker: If you specify a value for Limit and you have more Rules than the value of Limit , AWS WAF returns a NextMarker value in the response that allows you to list another group of Rules . For the second and subsequent ListRules requests, specify the value of NextMarker from the previous response to get information about another batch of Rules . :type Limit: integer :param Limit: Specifies the number of Rules that you want AWS WAF to return for this request. If you have more Rules than the number that you specify for Limit , the response includes a NextMarker value that you can use to get another batch of Rules . :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'Rules': [ { 'RuleId': 'string', 'Name': 'string' }, ] } Response Structure (dict) -- NextMarker (string) -- If you have more Rules than the number that you specified for Limit in the request, the response includes a NextMarker value. To list more Rules , submit another ListRules request, and specify the NextMarker value from the response in the NextMarker value in the next request. Rules (list) -- An array of RuleSummary objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Contains the identifier and the friendly name or description of the Rule . RuleId (string) -- A unique identifier for a Rule . You use RuleId to get more information about a Rule (see GetRule ), update a Rule (see UpdateRule ), insert a Rule into a WebACL or delete one from a WebACL (see UpdateWebACL ), or delete a Rule from AWS WAF (see DeleteRule ). RuleId is returned by CreateRule and by ListRules . Name (string) -- A friendly name or description of the Rule . You can't change the name of a Rule after you create it. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException Examples The following example returns an array of up to 100 rules. response = client.list_rules( Limit=100, ) print(response) Expected Output: { 'Rules': [ { 'Name': 'WAFByteHeaderRule', 'RuleId': 'WAFRule-1-Example', }, ], 'ResponseMetadata': { '...': '...', }, } :return: { 'NextMarker': 'string', 'Rules': [ { 'RuleId': 'string', 'Name': 'string' }, ] } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException """ pass def list_size_constraint_sets(NextMarker=None, Limit=None): """ Returns an array of SizeConstraintSetSummary objects. See also: AWS API Documentation Exceptions Examples The following example returns an array of up to 100 size contraint match sets. Expected Output: :example: response = client.list_size_constraint_sets( NextMarker='string', Limit=123 ) :type NextMarker: string :param NextMarker: If you specify a value for Limit and you have more SizeConstraintSets than the value of Limit , AWS WAF returns a NextMarker value in the response that allows you to list another group of SizeConstraintSets . For the second and subsequent ListSizeConstraintSets requests, specify the value of NextMarker from the previous response to get information about another batch of SizeConstraintSets . :type Limit: integer :param Limit: Specifies the number of SizeConstraintSet objects that you want AWS WAF to return for this request. If you have more SizeConstraintSets objects than the number you specify for Limit , the response includes a NextMarker value that you can use to get another batch of SizeConstraintSet objects. :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'SizeConstraintSets': [ { 'SizeConstraintSetId': 'string', 'Name': 'string' }, ] } Response Structure (dict) -- NextMarker (string) -- If you have more SizeConstraintSet objects than the number that you specified for Limit in the request, the response includes a NextMarker value. To list more SizeConstraintSet objects, submit another ListSizeConstraintSets request, and specify the NextMarker value from the response in the NextMarker value in the next request. SizeConstraintSets (list) -- An array of SizeConstraintSetSummary objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The Id and Name of a SizeConstraintSet . SizeConstraintSetId (string) -- A unique identifier for a SizeConstraintSet . You use SizeConstraintSetId to get information about a SizeConstraintSet (see GetSizeConstraintSet ), update a SizeConstraintSet (see UpdateSizeConstraintSet ), insert a SizeConstraintSet into a Rule or delete one from a Rule (see UpdateRule ), and delete a SizeConstraintSet from AWS WAF (see DeleteSizeConstraintSet ). SizeConstraintSetId is returned by CreateSizeConstraintSet and by ListSizeConstraintSets . Name (string) -- The name of the SizeConstraintSet , if any. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException Examples The following example returns an array of up to 100 size contraint match sets. response = client.list_size_constraint_sets( Limit=100, ) print(response) Expected Output: { 'SizeConstraintSets': [ { 'Name': 'MySampleSizeConstraintSet', 'SizeConstraintSetId': 'example1ds3t-46da-4fdb-b8d5-abc321j569j5', }, ], 'ResponseMetadata': { '...': '...', }, } :return: { 'NextMarker': 'string', 'SizeConstraintSets': [ { 'SizeConstraintSetId': 'string', 'Name': 'string' }, ] } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException """ pass def list_sql_injection_match_sets(NextMarker=None, Limit=None): """ Returns an array of SqlInjectionMatchSet objects. See also: AWS API Documentation Exceptions Examples The following example returns an array of up to 100 SQL injection match sets. Expected Output: :example: response = client.list_sql_injection_match_sets( NextMarker='string', Limit=123 ) :type NextMarker: string :param NextMarker: If you specify a value for Limit and you have more SqlInjectionMatchSet objects than the value of Limit , AWS WAF returns a NextMarker value in the response that allows you to list another group of SqlInjectionMatchSets . For the second and subsequent ListSqlInjectionMatchSets requests, specify the value of NextMarker from the previous response to get information about another batch of SqlInjectionMatchSets . :type Limit: integer :param Limit: Specifies the number of SqlInjectionMatchSet objects that you want AWS WAF to return for this request. If you have more SqlInjectionMatchSet objects than the number you specify for Limit , the response includes a NextMarker value that you can use to get another batch of Rules . :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'SqlInjectionMatchSets': [ { 'SqlInjectionMatchSetId': 'string', 'Name': 'string' }, ] } Response Structure (dict) -- The response to a ListSqlInjectionMatchSets request. NextMarker (string) -- If you have more SqlInjectionMatchSet objects than the number that you specified for Limit in the request, the response includes a NextMarker value. To list more SqlInjectionMatchSet objects, submit another ListSqlInjectionMatchSets request, and specify the NextMarker value from the response in the NextMarker value in the next request. SqlInjectionMatchSets (list) -- An array of SqlInjectionMatchSetSummary objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The Id and Name of a SqlInjectionMatchSet . SqlInjectionMatchSetId (string) -- A unique identifier for a SqlInjectionMatchSet . You use SqlInjectionMatchSetId to get information about a SqlInjectionMatchSet (see GetSqlInjectionMatchSet ), update a SqlInjectionMatchSet (see UpdateSqlInjectionMatchSet ), insert a SqlInjectionMatchSet into a Rule or delete one from a Rule (see UpdateRule ), and delete a SqlInjectionMatchSet from AWS WAF (see DeleteSqlInjectionMatchSet ). SqlInjectionMatchSetId is returned by CreateSqlInjectionMatchSet and by ListSqlInjectionMatchSets . Name (string) -- The name of the SqlInjectionMatchSet , if any, specified by Id . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException Examples The following example returns an array of up to 100 SQL injection match sets. response = client.list_sql_injection_match_sets( Limit=100, ) print(response) Expected Output: { 'SqlInjectionMatchSets': [ { 'Name': 'MySQLInjectionMatchSet', 'SqlInjectionMatchSetId': 'example1ds3t-46da-4fdb-b8d5-abc321j569j5', }, ], 'ResponseMetadata': { '...': '...', }, } :return: { 'NextMarker': 'string', 'SqlInjectionMatchSets': [ { 'SqlInjectionMatchSetId': 'string', 'Name': 'string' }, ] } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException """ pass def list_subscribed_rule_groups(NextMarker=None, Limit=None): """ Returns an array of RuleGroup objects that you are subscribed to. See also: AWS API Documentation Exceptions :example: response = client.list_subscribed_rule_groups( NextMarker='string', Limit=123 ) :type NextMarker: string :param NextMarker: If you specify a value for Limit and you have more ByteMatchSets subscribed rule groups than the value of Limit , AWS WAF returns a NextMarker value in the response that allows you to list another group of subscribed rule groups. For the second and subsequent ListSubscribedRuleGroupsRequest requests, specify the value of NextMarker from the previous response to get information about another batch of subscribed rule groups. :type Limit: integer :param Limit: Specifies the number of subscribed rule groups that you want AWS WAF to return for this request. If you have more objects than the number you specify for Limit , the response includes a NextMarker value that you can use to get another batch of objects. :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'RuleGroups': [ { 'RuleGroupId': 'string', 'Name': 'string', 'MetricName': 'string' }, ] } Response Structure (dict) -- NextMarker (string) -- If you have more objects than the number that you specified for Limit in the request, the response includes a NextMarker value. To list more objects, submit another ListSubscribedRuleGroups request, and specify the NextMarker value from the response in the NextMarker value in the next request. RuleGroups (list) -- An array of RuleGroup objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. A summary of the rule groups you are subscribed to. RuleGroupId (string) -- A unique identifier for a RuleGroup . Name (string) -- A friendly name or description of the RuleGroup . You can't change the name of a RuleGroup after you create it. MetricName (string) -- A friendly name or description for the metrics for this RuleGroup . The name can contain only alphanumeric characters (A-Z, a-z, 0-9), with maximum length 128 and minimum length one. It can't contain whitespace or metric names reserved for AWS WAF, including "All" and "Default_Action." You can't change the name of the metric after you create the RuleGroup . Exceptions WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFInternalErrorException :return: { 'NextMarker': 'string', 'RuleGroups': [ { 'RuleGroupId': 'string', 'Name': 'string', 'MetricName': 'string' }, ] } :returns: WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFInternalErrorException """ pass def list_tags_for_resource(NextMarker=None, Limit=None, ResourceARN=None): """ Retrieves the tags associated with the specified AWS resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to "customer" and the value to the customer name or ID. You can specify one or more tags to add to each AWS resource, up to 50 tags for a resource. Tagging is only available through the API, SDKs, and CLI. You can't manage or view tags through the AWS WAF Classic console. You can tag the AWS resources that you manage through AWS WAF Classic: web ACLs, rule groups, and rules. See also: AWS API Documentation Exceptions :example: response = client.list_tags_for_resource( NextMarker='string', Limit=123, ResourceARN='string' ) :type NextMarker: string :param NextMarker: :type Limit: integer :param Limit: :type ResourceARN: string :param ResourceARN: [REQUIRED] :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'TagInfoForResource': { 'ResourceARN': 'string', 'TagList': [ { 'Key': 'string', 'Value': 'string' }, ] } } Response Structure (dict) -- NextMarker (string) -- TagInfoForResource (dict) -- ResourceARN (string) -- TagList (list) -- (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. A tag associated with an AWS resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to "customer" and the value to the customer name or ID. You can specify one or more tags to add to each AWS resource, up to 50 tags for a resource. Tagging is only available through the API, SDKs, and CLI. You can't manage or view tags through the AWS WAF Classic console. You can tag the AWS resources that you manage through AWS WAF Classic: web ACLs, rule groups, and rules. Key (string) -- Value (string) -- Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFBadRequestException WAFRegional.Client.exceptions.WAFTagOperationException WAFRegional.Client.exceptions.WAFTagOperationInternalErrorException :return: { 'NextMarker': 'string', 'TagInfoForResource': { 'ResourceARN': 'string', 'TagList': [ { 'Key': 'string', 'Value': 'string' }, ] } } :returns: Key (string) -- Value (string) -- """ pass def list_web_acls(NextMarker=None, Limit=None): """ Returns an array of WebACLSummary objects in the response. See also: AWS API Documentation Exceptions Examples The following example returns an array of up to 100 web ACLs. Expected Output: :example: response = client.list_web_acls( NextMarker='string', Limit=123 ) :type NextMarker: string :param NextMarker: If you specify a value for Limit and you have more WebACL objects than the number that you specify for Limit , AWS WAF returns a NextMarker value in the response that allows you to list another group of WebACL objects. For the second and subsequent ListWebACLs requests, specify the value of NextMarker from the previous response to get information about another batch of WebACL objects. :type Limit: integer :param Limit: Specifies the number of WebACL objects that you want AWS WAF to return for this request. If you have more WebACL objects than the number that you specify for Limit , the response includes a NextMarker value that you can use to get another batch of WebACL objects. :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'WebACLs': [ { 'WebACLId': 'string', 'Name': 'string' }, ] } Response Structure (dict) -- NextMarker (string) -- If you have more WebACL objects than the number that you specified for Limit in the request, the response includes a NextMarker value. To list more WebACL objects, submit another ListWebACLs request, and specify the NextMarker value from the response in the NextMarker value in the next request. WebACLs (list) -- An array of WebACLSummary objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Contains the identifier and the name or description of the WebACL . WebACLId (string) -- A unique identifier for a WebACL . You use WebACLId to get information about a WebACL (see GetWebACL ), update a WebACL (see UpdateWebACL ), and delete a WebACL from AWS WAF (see DeleteWebACL ). WebACLId is returned by CreateWebACL and by ListWebACLs . Name (string) -- A friendly name or description of the WebACL . You can't change the name of a WebACL after you create it. Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException Examples The following example returns an array of up to 100 web ACLs. response = client.list_web_acls( Limit=100, ) print(response) Expected Output: { 'WebACLs': [ { 'Name': 'WebACLexample', 'WebACLId': 'webacl-1472061481310', }, ], 'ResponseMetadata': { '...': '...', }, } :return: { 'NextMarker': 'string', 'WebACLs': [ { 'WebACLId': 'string', 'Name': 'string' }, ] } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException """ pass def list_xss_match_sets(NextMarker=None, Limit=None): """ Returns an array of XssMatchSet objects. See also: AWS API Documentation Exceptions Examples The following example returns an array of up to 100 XSS match sets. Expected Output: :example: response = client.list_xss_match_sets( NextMarker='string', Limit=123 ) :type NextMarker: string :param NextMarker: If you specify a value for Limit and you have more XssMatchSet objects than the value of Limit , AWS WAF returns a NextMarker value in the response that allows you to list another group of XssMatchSets . For the second and subsequent ListXssMatchSets requests, specify the value of NextMarker from the previous response to get information about another batch of XssMatchSets . :type Limit: integer :param Limit: Specifies the number of XssMatchSet objects that you want AWS WAF to return for this request. If you have more XssMatchSet objects than the number you specify for Limit , the response includes a NextMarker value that you can use to get another batch of Rules . :rtype: dict ReturnsResponse Syntax { 'NextMarker': 'string', 'XssMatchSets': [ { 'XssMatchSetId': 'string', 'Name': 'string' }, ] } Response Structure (dict) -- The response to a ListXssMatchSets request. NextMarker (string) -- If you have more XssMatchSet objects than the number that you specified for Limit in the request, the response includes a NextMarker value. To list more XssMatchSet objects, submit another ListXssMatchSets request, and specify the NextMarker value from the response in the NextMarker value in the next request. XssMatchSets (list) -- An array of XssMatchSetSummary objects. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The Id and Name of an XssMatchSet . XssMatchSetId (string) -- A unique identifier for an XssMatchSet . You use XssMatchSetId to get information about a XssMatchSet (see GetXssMatchSet ), update an XssMatchSet (see UpdateXssMatchSet ), insert an XssMatchSet into a Rule or delete one from a Rule (see UpdateRule ), and delete an XssMatchSet from AWS WAF (see DeleteXssMatchSet ). XssMatchSetId is returned by CreateXssMatchSet and by ListXssMatchSets . Name (string) -- The name of the XssMatchSet , if any, specified by Id . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException Examples The following example returns an array of up to 100 XSS match sets. response = client.list_xss_match_sets( Limit=100, ) print(response) Expected Output: { 'XssMatchSets': [ { 'Name': 'MySampleXssMatchSet', 'XssMatchSetId': 'example1ds3t-46da-4fdb-b8d5-abc321j569j5', }, ], 'ResponseMetadata': { '...': '...', }, } :return: { 'NextMarker': 'string', 'XssMatchSets': [ { 'XssMatchSetId': 'string', 'Name': 'string' }, ] } :returns: WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException """ pass def put_logging_configuration(LoggingConfiguration=None): """ Associates a LoggingConfiguration with a specified web ACL. You can access information about all traffic that AWS WAF inspects using the following steps: When you successfully enable logging using a PutLoggingConfiguration request, AWS WAF will create a service linked role with the necessary permissions to write logs to the Amazon Kinesis Data Firehose. For more information, see Logging Web ACL Traffic Information in the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions :example: response = client.put_logging_configuration( LoggingConfiguration={ 'ResourceArn': 'string', 'LogDestinationConfigs': [ 'string', ], 'RedactedFields': [ { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, ] } ) :type LoggingConfiguration: dict :param LoggingConfiguration: [REQUIRED] The Amazon Kinesis Data Firehose that contains the inspected traffic information, the redacted fields details, and the Amazon Resource Name (ARN) of the web ACL to monitor. Note When specifying Type in RedactedFields , you must use one of the following values: URI , QUERY_STRING , HEADER , or METHOD . ResourceArn (string) -- [REQUIRED]The Amazon Resource Name (ARN) of the web ACL that you want to associate with LogDestinationConfigs . LogDestinationConfigs (list) -- [REQUIRED]An array of Amazon Kinesis Data Firehose ARNs. (string) -- RedactedFields (list) --The parts of the request that you want redacted from the logs. For example, if you redact the cookie field, the cookie field in the firehose will be xxx . (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies where in a web request to look for TargetString . Type (string) -- [REQUIRED]The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) --When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . :rtype: dict ReturnsResponse Syntax{ 'LoggingConfiguration': { 'ResourceArn': 'string', 'LogDestinationConfigs': [ 'string', ], 'RedactedFields': [ { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, ] } } Response Structure (dict) -- LoggingConfiguration (dict) --The LoggingConfiguration that you submitted in the request. ResourceArn (string) --The Amazon Resource Name (ARN) of the web ACL that you want to associate with LogDestinationConfigs . LogDestinationConfigs (list) --An array of Amazon Kinesis Data Firehose ARNs. (string) -- RedactedFields (list) --The parts of the request that you want redacted from the logs. For example, if you redact the cookie field, the cookie field in the firehose will be xxx . (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies where in a web request to look for TargetString . Type (string) --The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) --When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFServiceLinkedRoleErrorException :return: { 'LoggingConfiguration': { 'ResourceArn': 'string', 'LogDestinationConfigs': [ 'string', ], 'RedactedFields': [ { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, ] } } :returns: Associate that firehose to your web ACL using a PutLoggingConfiguration request. """ pass def put_permission_policy(ResourceArn=None, Policy=None): """ Attaches an IAM policy to the specified resource. The only supported use for this action is to share a RuleGroup across accounts. The PutPermissionPolicy is subject to the following restrictions: For more information, see IAM Policies . An example of a valid policy parameter is shown in the Examples section below. See also: AWS API Documentation Exceptions :example: response = client.put_permission_policy( ResourceArn='string', Policy='string' ) :type ResourceArn: string :param ResourceArn: [REQUIRED] The Amazon Resource Name (ARN) of the RuleGroup to which you want to attach the policy. :type Policy: string :param Policy: [REQUIRED] The policy to attach to the specified RuleGroup. :rtype: dict ReturnsResponse Syntax {} Response Structure (dict) -- Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFInvalidPermissionPolicyException :return: {} :returns: ResourceArn (string) -- [REQUIRED] The Amazon Resource Name (ARN) of the RuleGroup to which you want to attach the policy. Policy (string) -- [REQUIRED] The policy to attach to the specified RuleGroup. """ pass def tag_resource(ResourceARN=None, Tags=None): """ Associates tags with the specified AWS resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to "customer" and the value to the customer name or ID. You can specify one or more tags to add to each AWS resource, up to 50 tags for a resource. Tagging is only available through the API, SDKs, and CLI. You can't manage or view tags through the AWS WAF Classic console. You can use this action to tag the AWS resources that you manage through AWS WAF Classic: web ACLs, rule groups, and rules. See also: AWS API Documentation Exceptions :example: response = client.tag_resource( ResourceARN='string', Tags=[ { 'Key': 'string', 'Value': 'string' }, ] ) :type ResourceARN: string :param ResourceARN: [REQUIRED] :type Tags: list :param Tags: [REQUIRED] (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. A tag associated with an AWS resource. Tags are key:value pairs that you can use to categorize and manage your resources, for purposes like billing. For example, you might set the tag key to 'customer' and the value to the customer name or ID. You can specify one or more tags to add to each AWS resource, up to 50 tags for a resource. Tagging is only available through the API, SDKs, and CLI. You can't manage or view tags through the AWS WAF Classic console. You can tag the AWS resources that you manage through AWS WAF Classic: web ACLs, rule groups, and rules. Key (string) -- [REQUIRED] Value (string) -- [REQUIRED] :rtype: dict ReturnsResponse Syntax {} Response Structure (dict) -- Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFLimitsExceededException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFBadRequestException WAFRegional.Client.exceptions.WAFTagOperationException WAFRegional.Client.exceptions.WAFTagOperationInternalErrorException :return: {} :returns: (dict) -- """ pass def untag_resource(ResourceARN=None, TagKeys=None): """ See also: AWS API Documentation Exceptions :example: response = client.untag_resource( ResourceARN='string', TagKeys=[ 'string', ] ) :type ResourceARN: string :param ResourceARN: [REQUIRED] :type TagKeys: list :param TagKeys: [REQUIRED] (string) -- :rtype: dict ReturnsResponse Syntax {} Response Structure (dict) -- Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFBadRequestException WAFRegional.Client.exceptions.WAFTagOperationException WAFRegional.Client.exceptions.WAFTagOperationInternalErrorException :return: {} :returns: (dict) -- """ pass def update_byte_match_set(ByteMatchSetId=None, ChangeToken=None, Updates=None): """ Inserts or deletes ByteMatchTuple objects (filters) in a ByteMatchSet . For each ByteMatchTuple object, you specify the following values: For example, you can add a ByteMatchSetUpdate object that matches web requests in which User-Agent headers contain the string BadBot . You can then configure AWS WAF to block those requests. To create and configure a ByteMatchSet , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions Examples The following example deletes a ByteMatchTuple object (filters) in an byte match set with the ID exampleIDs3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.update_byte_match_set( ByteMatchSetId='string', ChangeToken='string', Updates=[ { 'Action': 'INSERT'|'DELETE', 'ByteMatchTuple': { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TargetString': b'bytes', 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'PositionalConstraint': 'EXACTLY'|'STARTS_WITH'|'ENDS_WITH'|'CONTAINS'|'CONTAINS_WORD' } }, ] ) :type ByteMatchSetId: string :param ByteMatchSetId: [REQUIRED] The ByteMatchSetId of the ByteMatchSet that you want to update. ByteMatchSetId is returned by CreateByteMatchSet and by ListByteMatchSets . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :type Updates: list :param Updates: [REQUIRED] An array of ByteMatchSetUpdate objects that you want to insert into or delete from a ByteMatchSet . For more information, see the applicable data types: ByteMatchSetUpdate : Contains Action and ByteMatchTuple ByteMatchTuple : Contains FieldToMatch , PositionalConstraint , TargetString , and TextTransformation FieldToMatch : Contains Data and Type (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. In an UpdateByteMatchSet request, ByteMatchSetUpdate specifies whether to insert or delete a ByteMatchTuple and includes the settings for the ByteMatchTuple . Action (string) -- [REQUIRED]Specifies whether to insert or delete a ByteMatchTuple . ByteMatchTuple (dict) -- [REQUIRED]Information about the part of a web request that you want AWS WAF to inspect and the value that you want AWS WAF to search for. If you specify DELETE for the value of Action , the ByteMatchTuple values must exactly match the values in the ByteMatchTuple that you want to delete from the ByteMatchSet . FieldToMatch (dict) -- [REQUIRED]The part of a web request that you want AWS WAF to search, such as a specified header or a query string. For more information, see FieldToMatch . Type (string) -- [REQUIRED]The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) --When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . TargetString (bytes) -- [REQUIRED]The value that you want AWS WAF to search for. AWS WAF searches for the specified string in the part of web requests that you specified in FieldToMatch . The maximum length of the value is 50 bytes. Valid values depend on the values that you specified for FieldToMatch : HEADER : The value that you want AWS WAF to search for in the request header that you specified in FieldToMatch , for example, the value of the User-Agent or Referer header. METHOD : The HTTP method, which indicates the type of operation specified in the request. CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : The value that you want AWS WAF to search for in the query string, which is the part of a URL that appears after a ? character. URI : The value that you want AWS WAF to search for in the part of a URL that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but instead of inspecting a single parameter, AWS WAF inspects all parameters within the query string for the value or regex pattern that you specify in TargetString . If TargetString includes alphabetic characters A-Z and a-z, note that the value is case sensitive. If you're using the AWS WAF API Specify a base64-encoded version of the value. The maximum length of the value before you base64-encode it is 50 bytes. For example, suppose the value of Type is HEADER and the value of Data is User-Agent . If you want to search the User-Agent header for the value BadBot , you base64-encode BadBot using MIME base64-encoding and include the resulting value, QmFkQm90 , in the value of TargetString . If you're using the AWS CLI or one of the AWS SDKs The value that you want AWS WAF to search for. The SDK automatically base64 encodes the value. TextTransformation (string) -- [REQUIRED]Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on FieldToMatch before inspecting it for a match. You can only specify a single type of TextTransformation. CMD_LINE When you're concerned that attackers are injecting an operating system command line command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations: Delete the following characters: ' ' ^ Delete spaces before the following characters: / ( Replace the following characters with a space: , ; Replace multiple spaces with one space Convert uppercase letters (A-Z) to lowercase (a-z) COMPRESS_WHITE_SPACE Use this option to replace the following characters with a space character (decimal 32): f, formfeed, decimal 12 t, tab, decimal 9 n, newline, decimal 10 r, carriage return, decimal 13 v, vertical tab, decimal 11 non-breaking space, decimal 160 COMPRESS_WHITE_SPACE also replaces multiple spaces with one space.HTML_ENTITY_DECODE Use this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations: Replaces (ampersand)quot; with ' Replaces (ampersand)nbsp; with a non-breaking space, decimal 160 Replaces (ampersand)lt; with a 'less than' symbol Replaces (ampersand)gt; with > Replaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters Replaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters LOWERCASE Use this option to convert uppercase letters (A-Z) to lowercase (a-z). URL_DECODE Use this option to decode a URL-encoded value. NONE Specify NONE if you don't want to perform any text transformations. PositionalConstraint (string) -- [REQUIRED]Within the portion of a web request that you want to search (for example, in the query string, if any), specify where you want AWS WAF to search. Valid values include the following: CONTAINS The specified part of the web request must include the value of TargetString , but the location doesn't matter. CONTAINS_WORD The specified part of the web request must include the value of TargetString , and TargetString must contain only alphanumeric characters or underscore (A-Z, a-z, 0-9, or _). In addition, TargetString must be a word, which means one of the following: TargetString exactly matches the value of the specified part of the web request, such as the value of a header. TargetString is at the beginning of the specified part of the web request and is followed by a character other than an alphanumeric character or underscore (_), for example, BadBot; . TargetString is at the end of the specified part of the web request and is preceded by a character other than an alphanumeric character or underscore (_), for example, ;BadBot . TargetString is in the middle of the specified part of the web request and is preceded and followed by characters other than alphanumeric characters or underscore (_), for example, -BadBot; . EXACTLY The value of the specified part of the web request must exactly match the value of TargetString . STARTS_WITH The value of TargetString must appear at the beginning of the specified part of the web request. ENDS_WITH The value of TargetString must appear at the end of the specified part of the web request. :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the UpdateByteMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFNonexistentContainerException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFLimitsExceededException Examples The following example deletes a ByteMatchTuple object (filters) in an byte match set with the ID exampleIDs3t-46da-4fdb-b8d5-abc321j569j5. response = client.update_byte_match_set( ByteMatchSetId='exampleIDs3t-46da-4fdb-b8d5-abc321j569j5', ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', Updates=[ { 'Action': 'DELETE', 'ByteMatchTuple': { 'FieldToMatch': { 'Data': 'referer', 'Type': 'HEADER', }, 'PositionalConstraint': 'CONTAINS', 'TargetString': 'badrefer1', 'TextTransformation': 'NONE', }, }, ], ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } :returns: Create a ByteMatchSet. For more information, see CreateByteMatchSet . Use GetChangeToken to get the change token that you provide in the ChangeToken parameter of an UpdateByteMatchSet request. Submit an UpdateByteMatchSet request to specify the part of the request that you want AWS WAF to inspect (for example, the header or the URI) and the value that you want AWS WAF to watch for. """ pass def update_geo_match_set(GeoMatchSetId=None, ChangeToken=None, Updates=None): """ Inserts or deletes GeoMatchConstraint objects in an GeoMatchSet . For each GeoMatchConstraint object, you specify the following values: To create and configure an GeoMatchSet , perform the following steps: When you update an GeoMatchSet , you specify the country that you want to add and/or the country that you want to delete. If you want to change a country, you delete the existing country and add the new one. For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions :example: response = client.update_geo_match_set( GeoMatchSetId='string', ChangeToken='string', Updates=[ { 'Action': 'INSERT'|'DELETE', 'GeoMatchConstraint': { 'Type': 'Country', 'Value': 'AF'|'AX'|'AL'|'DZ'|'AS'|'AD'|'AO'|'AI'|'AQ'|'AG'|'AR'|'AM'|'AW'|'AU'|'AT'|'AZ'|'BS'|'BH'|'BD'|'BB'|'BY'|'BE'|'BZ'|'BJ'|'BM'|'BT'|'BO'|'BQ'|'BA'|'BW'|'BV'|'BR'|'IO'|'BN'|'BG'|'BF'|'BI'|'KH'|'CM'|'CA'|'CV'|'KY'|'CF'|'TD'|'CL'|'CN'|'CX'|'CC'|'CO'|'KM'|'CG'|'CD'|'CK'|'CR'|'CI'|'HR'|'CU'|'CW'|'CY'|'CZ'|'DK'|'DJ'|'DM'|'DO'|'EC'|'EG'|'SV'|'GQ'|'ER'|'EE'|'ET'|'FK'|'FO'|'FJ'|'FI'|'FR'|'GF'|'PF'|'TF'|'GA'|'GM'|'GE'|'DE'|'GH'|'GI'|'GR'|'GL'|'GD'|'GP'|'GU'|'GT'|'GG'|'GN'|'GW'|'GY'|'HT'|'HM'|'VA'|'HN'|'HK'|'HU'|'IS'|'IN'|'ID'|'IR'|'IQ'|'IE'|'IM'|'IL'|'IT'|'JM'|'JP'|'JE'|'JO'|'KZ'|'KE'|'KI'|'KP'|'KR'|'KW'|'KG'|'LA'|'LV'|'LB'|'LS'|'LR'|'LY'|'LI'|'LT'|'LU'|'MO'|'MK'|'MG'|'MW'|'MY'|'MV'|'ML'|'MT'|'MH'|'MQ'|'MR'|'MU'|'YT'|'MX'|'FM'|'MD'|'MC'|'MN'|'ME'|'MS'|'MA'|'MZ'|'MM'|'NA'|'NR'|'NP'|'NL'|'NC'|'NZ'|'NI'|'NE'|'NG'|'NU'|'NF'|'MP'|'NO'|'OM'|'PK'|'PW'|'PS'|'PA'|'PG'|'PY'|'PE'|'PH'|'PN'|'PL'|'PT'|'PR'|'QA'|'RE'|'RO'|'RU'|'RW'|'BL'|'SH'|'KN'|'LC'|'MF'|'PM'|'VC'|'WS'|'SM'|'ST'|'SA'|'SN'|'RS'|'SC'|'SL'|'SG'|'SX'|'SK'|'SI'|'SB'|'SO'|'ZA'|'GS'|'SS'|'ES'|'LK'|'SD'|'SR'|'SJ'|'SZ'|'SE'|'CH'|'SY'|'TW'|'TJ'|'TZ'|'TH'|'TL'|'TG'|'TK'|'TO'|'TT'|'TN'|'TR'|'TM'|'TC'|'TV'|'UG'|'UA'|'AE'|'GB'|'US'|'UM'|'UY'|'UZ'|'VU'|'VE'|'VN'|'VG'|'VI'|'WF'|'EH'|'YE'|'ZM'|'ZW' } }, ] ) :type GeoMatchSetId: string :param GeoMatchSetId: [REQUIRED] The GeoMatchSetId of the GeoMatchSet that you want to update. GeoMatchSetId is returned by CreateGeoMatchSet and by ListGeoMatchSets . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :type Updates: list :param Updates: [REQUIRED] An array of GeoMatchSetUpdate objects that you want to insert into or delete from an GeoMatchSet . For more information, see the applicable data types: GeoMatchSetUpdate : Contains Action and GeoMatchConstraint GeoMatchConstraint : Contains Type and Value You can have only one Type and Value per GeoMatchConstraint . To add multiple countries, include multiple GeoMatchSetUpdate objects in your request. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies the type of update to perform to an GeoMatchSet with UpdateGeoMatchSet . Action (string) -- [REQUIRED]Specifies whether to insert or delete a country with UpdateGeoMatchSet . GeoMatchConstraint (dict) -- [REQUIRED]The country from which web requests originate that you want AWS WAF to search for. Type (string) -- [REQUIRED]The type of geographical area you want AWS WAF to search for. Currently Country is the only valid value. Value (string) -- [REQUIRED]The country that you want AWS WAF to search for. :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the UpdateGeoMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFNonexistentContainerException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFLimitsExceededException :return: { 'ChangeToken': 'string' } :returns: Submit a CreateGeoMatchSet request. Use GetChangeToken to get the change token that you provide in the ChangeToken parameter of an UpdateGeoMatchSet request. Submit an UpdateGeoMatchSet request to specify the country that you want AWS WAF to watch for. """ pass def update_ip_set(IPSetId=None, ChangeToken=None, Updates=None): """ Inserts or deletes IPSetDescriptor objects in an IPSet . For each IPSetDescriptor object, you specify the following values: AWS WAF supports IPv4 address ranges: /8 and any range between /16 through /32. AWS WAF supports IPv6 address ranges: /24, /32, /48, /56, /64, and /128. For more information about CIDR notation, see the Wikipedia entry Classless Inter-Domain Routing . IPv6 addresses can be represented using any of the following formats: You use an IPSet to specify which web requests you want to allow or block based on the IP addresses that the requests originated from. For example, if you're receiving a lot of requests from one or a small number of IP addresses and you want to block the requests, you can create an IPSet that specifies those IP addresses, and then configure AWS WAF to block the requests. To create and configure an IPSet , perform the following steps: When you update an IPSet , you specify the IP addresses that you want to add and/or the IP addresses that you want to delete. If you want to change an IP address, you delete the existing IP address and add the new one. You can insert a maximum of 1000 addresses in a single request. For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions Examples The following example deletes an IPSetDescriptor object in an IP match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.update_ip_set( IPSetId='string', ChangeToken='string', Updates=[ { 'Action': 'INSERT'|'DELETE', 'IPSetDescriptor': { 'Type': 'IPV4'|'IPV6', 'Value': 'string' } }, ] ) :type IPSetId: string :param IPSetId: [REQUIRED] The IPSetId of the IPSet that you want to update. IPSetId is returned by CreateIPSet and by ListIPSets . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :type Updates: list :param Updates: [REQUIRED] An array of IPSetUpdate objects that you want to insert into or delete from an IPSet . For more information, see the applicable data types: IPSetUpdate : Contains Action and IPSetDescriptor IPSetDescriptor : Contains Type and Value You can insert a maximum of 1000 addresses in a single request. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies the type of update to perform to an IPSet with UpdateIPSet . Action (string) -- [REQUIRED]Specifies whether to insert or delete an IP address with UpdateIPSet . IPSetDescriptor (dict) -- [REQUIRED]The IP address type (IPV4 or IPV6 ) and the IP address range (in CIDR notation) that web requests originate from. Type (string) -- [REQUIRED]Specify IPV4 or IPV6 . Value (string) -- [REQUIRED]Specify an IPv4 address by using CIDR notation. For example: To configure AWS WAF to allow, block, or count requests that originated from the IP address 192.0.2.44, specify 192.0.2.44/32 . To configure AWS WAF to allow, block, or count requests that originated from IP addresses from 192.0.2.0 to 192.0.2.255, specify 192.0.2.0/24 . For more information about CIDR notation, see the Wikipedia entry Classless Inter-Domain Routing . Specify an IPv6 address by using CIDR notation. For example: To configure AWS WAF to allow, block, or count requests that originated from the IP address 1111:0000:0000:0000:0000:0000:0000:0111, specify 1111:0000:0000:0000:0000:0000:0000:0111/128 . To configure AWS WAF to allow, block, or count requests that originated from IP addresses 1111:0000:0000:0000:0000:0000:0000:0000 to 1111:0000:0000:0000:ffff:ffff:ffff:ffff, specify 1111:0000:0000:0000:0000:0000:0000:0000/64 . :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the UpdateIPSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFNonexistentContainerException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFLimitsExceededException Examples The following example deletes an IPSetDescriptor object in an IP match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. response = client.update_ip_set( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', IPSetId='example1ds3t-46da-4fdb-b8d5-abc321j569j5', Updates=[ { 'Action': 'DELETE', 'IPSetDescriptor': { 'Type': 'IPV4', 'Value': '192.0.2.44/32', }, }, ], ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } :returns: 1111:0000:0000:0000:0000:0000:0000:0111/128 1111:0:0:0:0:0:0:0111/128 1111::0111/128 1111::111/128 """ pass def update_rate_based_rule(RuleId=None, ChangeToken=None, Updates=None, RateLimit=None): """ Inserts or deletes Predicate objects in a rule and updates the RateLimit in the rule. Each Predicate object identifies a predicate, such as a ByteMatchSet or an IPSet , that specifies the web requests that you want to block or count. The RateLimit specifies the number of requests every five minutes that triggers the rule. If you add more than one predicate to a RateBasedRule , a request must match all the predicates and exceed the RateLimit to be counted or blocked. For example, suppose you add the following to a RateBasedRule : Further, you specify a RateLimit of 1,000. You then add the RateBasedRule to a WebACL and specify that you want to block requests that satisfy the rule. For a request to be blocked, it must come from the IP address 192.0.2.44 and the User-Agent header in the request must contain the value BadBot . Further, requests that match these two conditions much be received at a rate of more than 1,000 every five minutes. If the rate drops below this limit, AWS WAF no longer blocks the requests. As a second example, suppose you want to limit requests to a particular page on your site. To do this, you could add the following to a RateBasedRule : Further, you specify a RateLimit of 1,000. By adding this RateBasedRule to a WebACL , you could limit requests to your login page without affecting the rest of your site. See also: AWS API Documentation Exceptions :example: response = client.update_rate_based_rule( RuleId='string', ChangeToken='string', Updates=[ { 'Action': 'INSERT'|'DELETE', 'Predicate': { 'Negated': True|False, 'Type': 'IPMatch'|'ByteMatch'|'SqlInjectionMatch'|'GeoMatch'|'SizeConstraint'|'XssMatch'|'RegexMatch', 'DataId': 'string' } }, ], RateLimit=123 ) :type RuleId: string :param RuleId: [REQUIRED] The RuleId of the RateBasedRule that you want to update. RuleId is returned by CreateRateBasedRule and by ListRateBasedRules . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :type Updates: list :param Updates: [REQUIRED] An array of RuleUpdate objects that you want to insert into or delete from a RateBasedRule . (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies a Predicate (such as an IPSet ) and indicates whether you want to add it to a Rule or delete it from a Rule . Action (string) -- [REQUIRED]Specify INSERT to add a Predicate to a Rule . Use DELETE to remove a Predicate from a Rule . Predicate (dict) -- [REQUIRED]The ID of the Predicate (such as an IPSet ) that you want to add to a Rule . Negated (boolean) -- [REQUIRED]Set Negated to False if you want AWS WAF to allow, block, or count requests based on the settings in the specified ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , or SizeConstraintSet . For example, if an IPSet includes the IP address 192.0.2.44 , AWS WAF will allow or block requests based on that IP address. Set Negated to True if you want AWS WAF to allow or block a request based on the negation of the settings in the ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , or SizeConstraintSet . For example, if an IPSet includes the IP address 192.0.2.44 , AWS WAF will allow, block, or count requests based on all IP addresses except 192.0.2.44 . Type (string) -- [REQUIRED]The type of predicate in a Rule , such as ByteMatch or IPSet . DataId (string) -- [REQUIRED]A unique identifier for a predicate in a Rule , such as ByteMatchSetId or IPSetId . The ID is returned by the corresponding Create or List command. :type RateLimit: integer :param RateLimit: [REQUIRED] The maximum number of requests, which have an identical value in the field specified by the RateKey , allowed in a five-minute period. If the number of requests exceeds the RateLimit and the other predicates specified in the rule are also met, AWS WAF triggers the action that is specified for this rule. :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the UpdateRateBasedRule request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFNonexistentContainerException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFLimitsExceededException :return: { 'ChangeToken': 'string' } :returns: A ByteMatchSet with FieldToMatch of URI A PositionalConstraint of STARTS_WITH A TargetString of login """ pass def update_regex_match_set(RegexMatchSetId=None, Updates=None, ChangeToken=None): """ Inserts or deletes RegexMatchTuple objects (filters) in a RegexMatchSet . For each RegexMatchSetUpdate object, you specify the following values: For example, you can create a RegexPatternSet that matches any requests with User-Agent headers that contain the string B[a@]dB[o0]t . You can then configure AWS WAF to reject those requests. To create and configure a RegexMatchSet , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions :example: response = client.update_regex_match_set( RegexMatchSetId='string', Updates=[ { 'Action': 'INSERT'|'DELETE', 'RegexMatchTuple': { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'RegexPatternSetId': 'string' } }, ], ChangeToken='string' ) :type RegexMatchSetId: string :param RegexMatchSetId: [REQUIRED] The RegexMatchSetId of the RegexMatchSet that you want to update. RegexMatchSetId is returned by CreateRegexMatchSet and by ListRegexMatchSets . :type Updates: list :param Updates: [REQUIRED] An array of RegexMatchSetUpdate objects that you want to insert into or delete from a RegexMatchSet . For more information, see RegexMatchTuple . (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. In an UpdateRegexMatchSet request, RegexMatchSetUpdate specifies whether to insert or delete a RegexMatchTuple and includes the settings for the RegexMatchTuple . Action (string) -- [REQUIRED]Specifies whether to insert or delete a RegexMatchTuple . RegexMatchTuple (dict) -- [REQUIRED]Information about the part of a web request that you want AWS WAF to inspect and the identifier of the regular expression (regex) pattern that you want AWS WAF to search for. If you specify DELETE for the value of Action , the RegexMatchTuple values must exactly match the values in the RegexMatchTuple that you want to delete from the RegexMatchSet . FieldToMatch (dict) -- [REQUIRED]Specifies where in a web request to look for the RegexPatternSet . Type (string) -- [REQUIRED]The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) --When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . TextTransformation (string) -- [REQUIRED]Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on RegexPatternSet before inspecting a request for a match. You can only specify a single type of TextTransformation. CMD_LINE When you're concerned that attackers are injecting an operating system commandline command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations: Delete the following characters: ' ' ^ Delete spaces before the following characters: / ( Replace the following characters with a space: , ; Replace multiple spaces with one space Convert uppercase letters (A-Z) to lowercase (a-z) COMPRESS_WHITE_SPACE Use this option to replace the following characters with a space character (decimal 32): f, formfeed, decimal 12 t, tab, decimal 9 n, newline, decimal 10 r, carriage return, decimal 13 v, vertical tab, decimal 11 non-breaking space, decimal 160 COMPRESS_WHITE_SPACE also replaces multiple spaces with one space.HTML_ENTITY_DECODE Use this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations: Replaces (ampersand)quot; with ' Replaces (ampersand)nbsp; with a non-breaking space, decimal 160 Replaces (ampersand)lt; with a 'less than' symbol Replaces (ampersand)gt; with > Replaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters Replaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters LOWERCASE Use this option to convert uppercase letters (A-Z) to lowercase (a-z). URL_DECODE Use this option to decode a URL-encoded value. NONE Specify NONE if you don't want to perform any text transformations. RegexPatternSetId (string) -- [REQUIRED]The RegexPatternSetId for a RegexPatternSet . You use RegexPatternSetId to get information about a RegexPatternSet (see GetRegexPatternSet ), update a RegexPatternSet (see UpdateRegexPatternSet ), insert a RegexPatternSet into a RegexMatchSet or delete one from a RegexMatchSet (see UpdateRegexMatchSet ), and delete an RegexPatternSet from AWS WAF (see DeleteRegexPatternSet ). RegexPatternSetId is returned by CreateRegexPatternSet and by ListRegexPatternSets . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the UpdateRegexMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFDisallowedNameException WAFRegional.Client.exceptions.WAFLimitsExceededException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFNonexistentContainerException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFInvalidAccountException :return: { 'ChangeToken': 'string' } :returns: Create a RegexMatchSet. For more information, see CreateRegexMatchSet . Use GetChangeToken to get the change token that you provide in the ChangeToken parameter of an UpdateRegexMatchSet request. Submit an UpdateRegexMatchSet request to specify the part of the request that you want AWS WAF to inspect (for example, the header or the URI) and the identifier of the RegexPatternSet that contain the regular expression patters you want AWS WAF to watch for. """ pass def update_regex_pattern_set(RegexPatternSetId=None, Updates=None, ChangeToken=None): """ Inserts or deletes RegexPatternString objects in a RegexPatternSet . For each RegexPatternString object, you specify the following values: For example, you can create a RegexPatternString such as B[a@]dB[o0]t . AWS WAF will match this RegexPatternString to: To create and configure a RegexPatternSet , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions :example: response = client.update_regex_pattern_set( RegexPatternSetId='string', Updates=[ { 'Action': 'INSERT'|'DELETE', 'RegexPatternString': 'string' }, ], ChangeToken='string' ) :type RegexPatternSetId: string :param RegexPatternSetId: [REQUIRED] The RegexPatternSetId of the RegexPatternSet that you want to update. RegexPatternSetId is returned by CreateRegexPatternSet and by ListRegexPatternSets . :type Updates: list :param Updates: [REQUIRED] An array of RegexPatternSetUpdate objects that you want to insert into or delete from a RegexPatternSet . (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. In an UpdateRegexPatternSet request, RegexPatternSetUpdate specifies whether to insert or delete a RegexPatternString and includes the settings for the RegexPatternString . Action (string) -- [REQUIRED]Specifies whether to insert or delete a RegexPatternString . RegexPatternString (string) -- [REQUIRED]Specifies the regular expression (regex) pattern that you want AWS WAF to search for, such as B[a@]dB[o0]t . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the UpdateRegexPatternSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFLimitsExceededException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFNonexistentContainerException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidRegexPatternException :return: { 'ChangeToken': 'string' } :returns: BadBot BadB0t B@dBot B@dB0t """ pass def update_rule(RuleId=None, ChangeToken=None, Updates=None): """ Inserts or deletes Predicate objects in a Rule . Each Predicate object identifies a predicate, such as a ByteMatchSet or an IPSet , that specifies the web requests that you want to allow, block, or count. If you add more than one predicate to a Rule , a request must match all of the specifications to be allowed, blocked, or counted. For example, suppose that you add the following to a Rule : You then add the Rule to a WebACL and specify that you want to block requests that satisfy the Rule . For a request to be blocked, the User-Agent header in the request must contain the value BadBot and the request must originate from the IP address 192.0.2.44. To create and configure a Rule , perform the following steps: If you want to replace one ByteMatchSet or IPSet with another, you delete the existing one and add the new one. For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions Examples The following example deletes a Predicate object in a rule with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.update_rule( RuleId='string', ChangeToken='string', Updates=[ { 'Action': 'INSERT'|'DELETE', 'Predicate': { 'Negated': True|False, 'Type': 'IPMatch'|'ByteMatch'|'SqlInjectionMatch'|'GeoMatch'|'SizeConstraint'|'XssMatch'|'RegexMatch', 'DataId': 'string' } }, ] ) :type RuleId: string :param RuleId: [REQUIRED] The RuleId of the Rule that you want to update. RuleId is returned by CreateRule and by ListRules . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :type Updates: list :param Updates: [REQUIRED] An array of RuleUpdate objects that you want to insert into or delete from a Rule . For more information, see the applicable data types: RuleUpdate : Contains Action and Predicate Predicate : Contains DataId , Negated , and Type FieldToMatch : Contains Data and Type (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies a Predicate (such as an IPSet ) and indicates whether you want to add it to a Rule or delete it from a Rule . Action (string) -- [REQUIRED]Specify INSERT to add a Predicate to a Rule . Use DELETE to remove a Predicate from a Rule . Predicate (dict) -- [REQUIRED]The ID of the Predicate (such as an IPSet ) that you want to add to a Rule . Negated (boolean) -- [REQUIRED]Set Negated to False if you want AWS WAF to allow, block, or count requests based on the settings in the specified ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , or SizeConstraintSet . For example, if an IPSet includes the IP address 192.0.2.44 , AWS WAF will allow or block requests based on that IP address. Set Negated to True if you want AWS WAF to allow or block a request based on the negation of the settings in the ByteMatchSet , IPSet , SqlInjectionMatchSet , XssMatchSet , RegexMatchSet , GeoMatchSet , or SizeConstraintSet . For example, if an IPSet includes the IP address 192.0.2.44 , AWS WAF will allow, block, or count requests based on all IP addresses except 192.0.2.44 . Type (string) -- [REQUIRED]The type of predicate in a Rule , such as ByteMatch or IPSet . DataId (string) -- [REQUIRED]A unique identifier for a predicate in a Rule , such as ByteMatchSetId or IPSetId . The ID is returned by the corresponding Create or List command. :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the UpdateRule request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFNonexistentContainerException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFLimitsExceededException Examples The following example deletes a Predicate object in a rule with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. response = client.update_rule( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', RuleId='example1ds3t-46da-4fdb-b8d5-abc321j569j5', Updates=[ { 'Action': 'DELETE', 'Predicate': { 'DataId': 'MyByteMatchSetID', 'Negated': False, 'Type': 'ByteMatch', }, }, ], ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } :returns: Create and update the predicates that you want to include in the Rule . Create the Rule . See CreateRule . Use GetChangeToken to get the change token that you provide in the ChangeToken parameter of an UpdateRule request. Submit an UpdateRule request to add predicates to the Rule . Create and update a WebACL that contains the Rule . See CreateWebACL . """ pass def update_rule_group(RuleGroupId=None, Updates=None, ChangeToken=None): """ Inserts or deletes ActivatedRule objects in a RuleGroup . You can only insert REGULAR rules into a rule group. You can have a maximum of ten rules per rule group. To create and configure a RuleGroup , perform the following steps: If you want to replace one Rule with another, you delete the existing one and add the new one. For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions :example: response = client.update_rule_group( RuleGroupId='string', Updates=[ { 'Action': 'INSERT'|'DELETE', 'ActivatedRule': { 'Priority': 123, 'RuleId': 'string', 'Action': { 'Type': 'BLOCK'|'ALLOW'|'COUNT' }, 'OverrideAction': { 'Type': 'NONE'|'COUNT' }, 'Type': 'REGULAR'|'RATE_BASED'|'GROUP', 'ExcludedRules': [ { 'RuleId': 'string' }, ] } }, ], ChangeToken='string' ) :type RuleGroupId: string :param RuleGroupId: [REQUIRED] The RuleGroupId of the RuleGroup that you want to update. RuleGroupId is returned by CreateRuleGroup and by ListRuleGroups . :type Updates: list :param Updates: [REQUIRED] An array of RuleGroupUpdate objects that you want to insert into or delete from a RuleGroup . You can only insert REGULAR rules into a rule group. ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction . (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies an ActivatedRule and indicates whether you want to add it to a RuleGroup or delete it from a RuleGroup . Action (string) -- [REQUIRED]Specify INSERT to add an ActivatedRule to a RuleGroup . Use DELETE to remove an ActivatedRule from a RuleGroup . ActivatedRule (dict) -- [REQUIRED]The ActivatedRule object specifies a Rule that you want to insert or delete, the priority of the Rule in the WebACL , and the action that you want AWS WAF to take when a web request matches the Rule (ALLOW , BLOCK , or COUNT ). Priority (integer) -- [REQUIRED]Specifies the order in which the Rules in a WebACL are evaluated. Rules with a lower value for Priority are evaluated before Rules with a higher value. The value must be a unique integer. If you add multiple Rules to a WebACL , the values don't need to be consecutive. RuleId (string) -- [REQUIRED]The RuleId for a Rule . You use RuleId to get more information about a Rule (see GetRule ), update a Rule (see UpdateRule ), insert a Rule into a WebACL or delete a one from a WebACL (see UpdateWebACL ), or delete a Rule from AWS WAF (see DeleteRule ). RuleId is returned by CreateRule and by ListRules . Action (dict) --Specifies the action that CloudFront or AWS WAF takes when a web request matches the conditions in the Rule . Valid values for Action include the following: ALLOW : CloudFront responds with the requested object. BLOCK : CloudFront responds with an HTTP 403 (Forbidden) status code. COUNT : AWS WAF increments a counter of requests that match the conditions in the rule and then continues to inspect the web request based on the remaining rules in the web ACL. ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case, you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction . Type (string) -- [REQUIRED]Specifies how you want AWS WAF to respond to requests that match the settings in a Rule . Valid settings include the following: ALLOW : AWS WAF allows requests BLOCK : AWS WAF blocks requests COUNT : AWS WAF increments a counter of the requests that match all of the conditions in the rule. AWS WAF then continues to inspect the web request based on the remaining rules in the web ACL. You can't specify COUNT for the default action for a WebACL . OverrideAction (dict) --Use the OverrideAction to test your RuleGroup . Any rule in a RuleGroup can potentially block a request. If you set the OverrideAction to None , the RuleGroup will block a request if any individual rule in the RuleGroup matches the request and is configured to block that request. However if you first want to test the RuleGroup , set the OverrideAction to Count . The RuleGroup will then override any block action specified by individual rules contained within the group. Instead of blocking matching requests, those requests will be counted. You can view a record of counted requests using GetSampledRequests . ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction . Type (string) -- [REQUIRED] COUNT overrides the action specified by the individual rule within a RuleGroup . If set to NONE , the rule's action will take place. Type (string) --The rule type, either REGULAR , as defined by Rule , RATE_BASED , as defined by RateBasedRule , or GROUP , as defined by RuleGroup . The default is REGULAR. Although this field is optional, be aware that if you try to add a RATE_BASED rule to a web ACL without setting the type, the UpdateWebACL request will fail because the request tries to add a REGULAR rule with the specified ID, which does not exist. ExcludedRules (list) --An array of rules to exclude from a rule group. This is applicable only when the ActivatedRule refers to a RuleGroup . Sometimes it is necessary to troubleshoot rule groups that are blocking traffic unexpectedly (false positives). One troubleshooting technique is to identify the specific rule within the rule group that is blocking the legitimate traffic and then disable (exclude) that particular rule. You can exclude rules from both your own rule groups and AWS Marketplace rule groups that have been associated with a web ACL. Specifying ExcludedRules does not remove those rules from the rule group. Rather, it changes the action for the rules to COUNT . Therefore, requests that match an ExcludedRule are counted but not blocked. The RuleGroup owner will receive COUNT metrics for each ExcludedRule . If you want to exclude rules from a rule group that is already associated with a web ACL, perform the following steps: Use the AWS WAF logs to identify the IDs of the rules that you want to exclude. For more information about the logs, see Logging Web ACL Traffic Information . Submit an UpdateWebACL request that has two actions: The first action deletes the existing rule group from the web ACL. That is, in the UpdateWebACL request, the first Updates:Action should be DELETE and Updates:ActivatedRule:RuleId should be the rule group that contains the rules that you want to exclude. The second action inserts the same rule group back in, but specifying the rules to exclude. That is, the second Updates:Action should be INSERT , Updates:ActivatedRule:RuleId should be the rule group that you just removed, and ExcludedRules should contain the rules that you want to exclude. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The rule to exclude from a rule group. This is applicable only when the ActivatedRule refers to a RuleGroup . The rule must belong to the RuleGroup that is specified by the ActivatedRule . RuleId (string) -- [REQUIRED]The unique identifier for the rule to exclude from the rule group. :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the UpdateRuleGroup request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFNonexistentContainerException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFLimitsExceededException WAFRegional.Client.exceptions.WAFInvalidParameterException :return: { 'ChangeToken': 'string' } :returns: RuleGroupId (string) -- [REQUIRED] The RuleGroupId of the RuleGroup that you want to update. RuleGroupId is returned by CreateRuleGroup and by ListRuleGroups . Updates (list) -- [REQUIRED] An array of RuleGroupUpdate objects that you want to insert into or delete from a RuleGroup . You can only insert REGULAR rules into a rule group. ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction . (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies an ActivatedRule and indicates whether you want to add it to a RuleGroup or delete it from a RuleGroup . Action (string) -- [REQUIRED]Specify INSERT to add an ActivatedRule to a RuleGroup . Use DELETE to remove an ActivatedRule from a RuleGroup . ActivatedRule (dict) -- [REQUIRED]The ActivatedRule object specifies a Rule that you want to insert or delete, the priority of the Rule in the WebACL , and the action that you want AWS WAF to take when a web request matches the Rule (ALLOW , BLOCK , or COUNT ). Priority (integer) -- [REQUIRED]Specifies the order in which the Rules in a WebACL are evaluated. Rules with a lower value for Priority are evaluated before Rules with a higher value. The value must be a unique integer. If you add multiple Rules to a WebACL , the values don't need to be consecutive. RuleId (string) -- [REQUIRED]The RuleId for a Rule . You use RuleId to get more information about a Rule (see GetRule ), update a Rule (see UpdateRule ), insert a Rule into a WebACL or delete a one from a WebACL (see UpdateWebACL ), or delete a Rule from AWS WAF (see DeleteRule ). RuleId is returned by CreateRule and by ListRules . Action (dict) --Specifies the action that CloudFront or AWS WAF takes when a web request matches the conditions in the Rule . Valid values for Action include the following: ALLOW : CloudFront responds with the requested object. BLOCK : CloudFront responds with an HTTP 403 (Forbidden) status code. COUNT : AWS WAF increments a counter of requests that match the conditions in the rule and then continues to inspect the web request based on the remaining rules in the web ACL. ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case, you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction . Type (string) -- [REQUIRED]Specifies how you want AWS WAF to respond to requests that match the settings in a Rule . Valid settings include the following: ALLOW : AWS WAF allows requests BLOCK : AWS WAF blocks requests COUNT : AWS WAF increments a counter of the requests that match all of the conditions in the rule. AWS WAF then continues to inspect the web request based on the remaining rules in the web ACL. You can't specify COUNT for the default action for a WebACL . OverrideAction (dict) --Use the OverrideAction to test your RuleGroup . Any rule in a RuleGroup can potentially block a request. If you set the OverrideAction to None , the RuleGroup will block a request if any individual rule in the RuleGroup matches the request and is configured to block that request. However if you first want to test the RuleGroup , set the OverrideAction to Count . The RuleGroup will then override any block action specified by individual rules contained within the group. Instead of blocking matching requests, those requests will be counted. You can view a record of counted requests using GetSampledRequests . ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction . Type (string) -- [REQUIRED] COUNT overrides the action specified by the individual rule within a RuleGroup . If set to NONE , the rule's action will take place. Type (string) --The rule type, either REGULAR , as defined by Rule , RATE_BASED , as defined by RateBasedRule , or GROUP , as defined by RuleGroup . The default is REGULAR. Although this field is optional, be aware that if you try to add a RATE_BASED rule to a web ACL without setting the type, the UpdateWebACL request will fail because the request tries to add a REGULAR rule with the specified ID, which does not exist. ExcludedRules (list) --An array of rules to exclude from a rule group. This is applicable only when the ActivatedRule refers to a RuleGroup . Sometimes it is necessary to troubleshoot rule groups that are blocking traffic unexpectedly (false positives). One troubleshooting technique is to identify the specific rule within the rule group that is blocking the legitimate traffic and then disable (exclude) that particular rule. You can exclude rules from both your own rule groups and AWS Marketplace rule groups that have been associated with a web ACL. Specifying ExcludedRules does not remove those rules from the rule group. Rather, it changes the action for the rules to COUNT . Therefore, requests that match an ExcludedRule are counted but not blocked. The RuleGroup owner will receive COUNT metrics for each ExcludedRule . If you want to exclude rules from a rule group that is already associated with a web ACL, perform the following steps: Use the AWS WAF logs to identify the IDs of the rules that you want to exclude. For more information about the logs, see Logging Web ACL Traffic Information . Submit an UpdateWebACL request that has two actions: The first action deletes the existing rule group from the web ACL. That is, in the UpdateWebACL request, the first Updates:Action should be DELETE and Updates:ActivatedRule:RuleId should be the rule group that contains the rules that you want to exclude. The second action inserts the same rule group back in, but specifying the rules to exclude. That is, the second Updates:Action should be INSERT , Updates:ActivatedRule:RuleId should be the rule group that you just removed, and ExcludedRules should contain the rules that you want to exclude. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The rule to exclude from a rule group. This is applicable only when the ActivatedRule refers to a RuleGroup . The rule must belong to the RuleGroup that is specified by the ActivatedRule . RuleId (string) -- [REQUIRED]The unique identifier for the rule to exclude from the rule group. ChangeToken (string) -- [REQUIRED] The value returned by the most recent call to GetChangeToken . """ pass def update_size_constraint_set(SizeConstraintSetId=None, ChangeToken=None, Updates=None): """ Inserts or deletes SizeConstraint objects (filters) in a SizeConstraintSet . For each SizeConstraint object, you specify the following values: For example, you can add a SizeConstraintSetUpdate object that matches web requests in which the length of the User-Agent header is greater than 100 bytes. You can then configure AWS WAF to block those requests. To create and configure a SizeConstraintSet , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions Examples The following example deletes a SizeConstraint object (filters) in a size constraint set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.update_size_constraint_set( SizeConstraintSetId='string', ChangeToken='string', Updates=[ { 'Action': 'INSERT'|'DELETE', 'SizeConstraint': { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE', 'ComparisonOperator': 'EQ'|'NE'|'LE'|'LT'|'GE'|'GT', 'Size': 123 } }, ] ) :type SizeConstraintSetId: string :param SizeConstraintSetId: [REQUIRED] The SizeConstraintSetId of the SizeConstraintSet that you want to update. SizeConstraintSetId is returned by CreateSizeConstraintSet and by ListSizeConstraintSets . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :type Updates: list :param Updates: [REQUIRED] An array of SizeConstraintSetUpdate objects that you want to insert into or delete from a SizeConstraintSet . For more information, see the applicable data types: SizeConstraintSetUpdate : Contains Action and SizeConstraint SizeConstraint : Contains FieldToMatch , TextTransformation , ComparisonOperator , and Size FieldToMatch : Contains Data and Type (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies the part of a web request that you want to inspect the size of and indicates whether you want to add the specification to a SizeConstraintSet or delete it from a SizeConstraintSet . Action (string) -- [REQUIRED]Specify INSERT to add a SizeConstraintSetUpdate to a SizeConstraintSet . Use DELETE to remove a SizeConstraintSetUpdate from a SizeConstraintSet . SizeConstraint (dict) -- [REQUIRED]Specifies a constraint on the size of a part of the web request. AWS WAF uses the Size , ComparisonOperator , and FieldToMatch to build an expression in the form of 'Size ComparisonOperator size in bytes of FieldToMatch '. If that expression is true, the SizeConstraint is considered to match. FieldToMatch (dict) -- [REQUIRED]Specifies where in a web request to look for the size constraint. Type (string) -- [REQUIRED]The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) --When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . TextTransformation (string) -- [REQUIRED]Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on FieldToMatch before inspecting it for a match. You can only specify a single type of TextTransformation. Note that if you choose BODY for the value of Type , you must choose NONE for TextTransformation because CloudFront forwards only the first 8192 bytes for inspection. NONE Specify NONE if you don't want to perform any text transformations. CMD_LINE When you're concerned that attackers are injecting an operating system command line command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations: Delete the following characters: ' ' ^ Delete spaces before the following characters: / ( Replace the following characters with a space: , ; Replace multiple spaces with one space Convert uppercase letters (A-Z) to lowercase (a-z) COMPRESS_WHITE_SPACE Use this option to replace the following characters with a space character (decimal 32): f, formfeed, decimal 12 t, tab, decimal 9 n, newline, decimal 10 r, carriage return, decimal 13 v, vertical tab, decimal 11 non-breaking space, decimal 160 COMPRESS_WHITE_SPACE also replaces multiple spaces with one space.HTML_ENTITY_DECODE Use this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations: Replaces (ampersand)quot; with ' Replaces (ampersand)nbsp; with a non-breaking space, decimal 160 Replaces (ampersand)lt; with a 'less than' symbol Replaces (ampersand)gt; with > Replaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters Replaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters LOWERCASE Use this option to convert uppercase letters (A-Z) to lowercase (a-z). URL_DECODE Use this option to decode a URL-encoded value. ComparisonOperator (string) -- [REQUIRED]The type of comparison you want AWS WAF to perform. AWS WAF uses this in combination with the provided Size and FieldToMatch to build an expression in the form of 'Size ComparisonOperator size in bytes of FieldToMatch '. If that expression is true, the SizeConstraint is considered to match. EQ : Used to test if the Size is equal to the size of the FieldToMatchNE : Used to test if the Size is not equal to the size of the FieldToMatch LE : Used to test if the Size is less than or equal to the size of the FieldToMatch LT : Used to test if the Size is strictly less than the size of the FieldToMatch GE : Used to test if the Size is greater than or equal to the size of the FieldToMatch GT : Used to test if the Size is strictly greater than the size of the FieldToMatch Size (integer) -- [REQUIRED]The size in bytes that you want AWS WAF to compare against the size of the specified FieldToMatch . AWS WAF uses this in combination with ComparisonOperator and FieldToMatch to build an expression in the form of 'Size ComparisonOperator size in bytes of FieldToMatch '. If that expression is true, the SizeConstraint is considered to match. Valid values for size are 0 - 21474836480 bytes (0 - 20 GB). If you specify URI for the value of Type , the / in the URI counts as one character. For example, the URI /logo.jpg is nine characters long. :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the UpdateSizeConstraintSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFNonexistentContainerException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFLimitsExceededException Examples The following example deletes a SizeConstraint object (filters) in a size constraint set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. response = client.update_size_constraint_set( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', SizeConstraintSetId='example1ds3t-46da-4fdb-b8d5-abc321j569j5', Updates=[ { 'Action': 'DELETE', 'SizeConstraint': { 'ComparisonOperator': 'GT', 'FieldToMatch': { 'Type': 'QUERY_STRING', }, 'Size': 0, 'TextTransformation': 'NONE', }, }, ], ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } :returns: Create a SizeConstraintSet. For more information, see CreateSizeConstraintSet . Use GetChangeToken to get the change token that you provide in the ChangeToken parameter of an UpdateSizeConstraintSet request. Submit an UpdateSizeConstraintSet request to specify the part of the request that you want AWS WAF to inspect (for example, the header or the URI) and the value that you want AWS WAF to watch for. """ pass def update_sql_injection_match_set(SqlInjectionMatchSetId=None, ChangeToken=None, Updates=None): """ Inserts or deletes SqlInjectionMatchTuple objects (filters) in a SqlInjectionMatchSet . For each SqlInjectionMatchTuple object, you specify the following values: You use SqlInjectionMatchSet objects to specify which CloudFront requests that you want to allow, block, or count. For example, if you're receiving requests that contain snippets of SQL code in the query string and you want to block the requests, you can create a SqlInjectionMatchSet with the applicable settings, and then configure AWS WAF to block the requests. To create and configure a SqlInjectionMatchSet , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions Examples The following example deletes a SqlInjectionMatchTuple object (filters) in a SQL injection match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.update_sql_injection_match_set( SqlInjectionMatchSetId='string', ChangeToken='string', Updates=[ { 'Action': 'INSERT'|'DELETE', 'SqlInjectionMatchTuple': { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE' } }, ] ) :type SqlInjectionMatchSetId: string :param SqlInjectionMatchSetId: [REQUIRED] The SqlInjectionMatchSetId of the SqlInjectionMatchSet that you want to update. SqlInjectionMatchSetId is returned by CreateSqlInjectionMatchSet and by ListSqlInjectionMatchSets . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :type Updates: list :param Updates: [REQUIRED] An array of SqlInjectionMatchSetUpdate objects that you want to insert into or delete from a SqlInjectionMatchSet . For more information, see the applicable data types: SqlInjectionMatchSetUpdate : Contains Action and SqlInjectionMatchTuple SqlInjectionMatchTuple : Contains FieldToMatch and TextTransformation FieldToMatch : Contains Data and Type (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies the part of a web request that you want to inspect for snippets of malicious SQL code and indicates whether you want to add the specification to a SqlInjectionMatchSet or delete it from a SqlInjectionMatchSet . Action (string) -- [REQUIRED]Specify INSERT to add a SqlInjectionMatchSetUpdate to a SqlInjectionMatchSet . Use DELETE to remove a SqlInjectionMatchSetUpdate from a SqlInjectionMatchSet . SqlInjectionMatchTuple (dict) -- [REQUIRED]Specifies the part of a web request that you want AWS WAF to inspect for snippets of malicious SQL code and, if you want AWS WAF to inspect a header, the name of the header. FieldToMatch (dict) -- [REQUIRED]Specifies where in a web request to look for snippets of malicious SQL code. Type (string) -- [REQUIRED]The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) --When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . TextTransformation (string) -- [REQUIRED]Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on FieldToMatch before inspecting it for a match. You can only specify a single type of TextTransformation. CMD_LINE When you're concerned that attackers are injecting an operating system command line command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations: Delete the following characters: ' ' ^ Delete spaces before the following characters: / ( Replace the following characters with a space: , ; Replace multiple spaces with one space Convert uppercase letters (A-Z) to lowercase (a-z) COMPRESS_WHITE_SPACE Use this option to replace the following characters with a space character (decimal 32): f, formfeed, decimal 12 t, tab, decimal 9 n, newline, decimal 10 r, carriage return, decimal 13 v, vertical tab, decimal 11 non-breaking space, decimal 160 COMPRESS_WHITE_SPACE also replaces multiple spaces with one space.HTML_ENTITY_DECODE Use this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations: Replaces (ampersand)quot; with ' Replaces (ampersand)nbsp; with a non-breaking space, decimal 160 Replaces (ampersand)lt; with a 'less than' symbol Replaces (ampersand)gt; with > Replaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters Replaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters LOWERCASE Use this option to convert uppercase letters (A-Z) to lowercase (a-z). URL_DECODE Use this option to decode a URL-encoded value. NONE Specify NONE if you don't want to perform any text transformations. :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- The response to an UpdateSqlInjectionMatchSets request. ChangeToken (string) -- The ChangeToken that you used to submit the UpdateSqlInjectionMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFNonexistentContainerException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFLimitsExceededException Examples The following example deletes a SqlInjectionMatchTuple object (filters) in a SQL injection match set with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. response = client.update_sql_injection_match_set( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', SqlInjectionMatchSetId='example1ds3t-46da-4fdb-b8d5-abc321j569j5', Updates=[ { 'Action': 'DELETE', 'SqlInjectionMatchTuple': { 'FieldToMatch': { 'Type': 'QUERY_STRING', }, 'TextTransformation': 'URL_DECODE', }, }, ], ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } :returns: Submit a CreateSqlInjectionMatchSet request. Use GetChangeToken to get the change token that you provide in the ChangeToken parameter of an UpdateIPSet request. Submit an UpdateSqlInjectionMatchSet request to specify the parts of web requests that you want AWS WAF to inspect for snippets of SQL code. """ pass def update_web_acl(WebACLId=None, ChangeToken=None, Updates=None, DefaultAction=None): """ Inserts or deletes ActivatedRule objects in a WebACL . Each Rule identifies web requests that you want to allow, block, or count. When you update a WebACL , you specify the following values: To create and configure a WebACL , perform the following steps: Be aware that if you try to add a RATE_BASED rule to a web ACL without setting the rule type when first creating the rule, the UpdateWebACL request will fail because the request tries to add a REGULAR rule (the default rule type) with the specified ID, which does not exist. For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions Examples The following example deletes an ActivatedRule object in a WebACL with the ID webacl-1472061481310. Expected Output: :example: response = client.update_web_acl( WebACLId='string', ChangeToken='string', Updates=[ { 'Action': 'INSERT'|'DELETE', 'ActivatedRule': { 'Priority': 123, 'RuleId': 'string', 'Action': { 'Type': 'BLOCK'|'ALLOW'|'COUNT' }, 'OverrideAction': { 'Type': 'NONE'|'COUNT' }, 'Type': 'REGULAR'|'RATE_BASED'|'GROUP', 'ExcludedRules': [ { 'RuleId': 'string' }, ] } }, ], DefaultAction={ 'Type': 'BLOCK'|'ALLOW'|'COUNT' } ) :type WebACLId: string :param WebACLId: [REQUIRED] The WebACLId of the WebACL that you want to update. WebACLId is returned by CreateWebACL and by ListWebACLs . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :type Updates: list :param Updates: An array of updates to make to the WebACL . An array of WebACLUpdate objects that you want to insert into or delete from a WebACL . For more information, see the applicable data types: WebACLUpdate : Contains Action and ActivatedRule ActivatedRule : Contains Action , OverrideAction , Priority , RuleId , and Type . ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case, you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction . WafAction : Contains Type (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies whether to insert a Rule into or delete a Rule from a WebACL . Action (string) -- [REQUIRED]Specifies whether to insert a Rule into or delete a Rule from a WebACL . ActivatedRule (dict) -- [REQUIRED]The ActivatedRule object in an UpdateWebACL request specifies a Rule that you want to insert or delete, the priority of the Rule in the WebACL , and the action that you want AWS WAF to take when a web request matches the Rule (ALLOW , BLOCK , or COUNT ). Priority (integer) -- [REQUIRED]Specifies the order in which the Rules in a WebACL are evaluated. Rules with a lower value for Priority are evaluated before Rules with a higher value. The value must be a unique integer. If you add multiple Rules to a WebACL , the values don't need to be consecutive. RuleId (string) -- [REQUIRED]The RuleId for a Rule . You use RuleId to get more information about a Rule (see GetRule ), update a Rule (see UpdateRule ), insert a Rule into a WebACL or delete a one from a WebACL (see UpdateWebACL ), or delete a Rule from AWS WAF (see DeleteRule ). RuleId is returned by CreateRule and by ListRules . Action (dict) --Specifies the action that CloudFront or AWS WAF takes when a web request matches the conditions in the Rule . Valid values for Action include the following: ALLOW : CloudFront responds with the requested object. BLOCK : CloudFront responds with an HTTP 403 (Forbidden) status code. COUNT : AWS WAF increments a counter of requests that match the conditions in the rule and then continues to inspect the web request based on the remaining rules in the web ACL. ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case, you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction . Type (string) -- [REQUIRED]Specifies how you want AWS WAF to respond to requests that match the settings in a Rule . Valid settings include the following: ALLOW : AWS WAF allows requests BLOCK : AWS WAF blocks requests COUNT : AWS WAF increments a counter of the requests that match all of the conditions in the rule. AWS WAF then continues to inspect the web request based on the remaining rules in the web ACL. You can't specify COUNT for the default action for a WebACL . OverrideAction (dict) --Use the OverrideAction to test your RuleGroup . Any rule in a RuleGroup can potentially block a request. If you set the OverrideAction to None , the RuleGroup will block a request if any individual rule in the RuleGroup matches the request and is configured to block that request. However if you first want to test the RuleGroup , set the OverrideAction to Count . The RuleGroup will then override any block action specified by individual rules contained within the group. Instead of blocking matching requests, those requests will be counted. You can view a record of counted requests using GetSampledRequests . ActivatedRule|OverrideAction applies only when updating or adding a RuleGroup to a WebACL . In this case you do not use ActivatedRule|Action . For all other update requests, ActivatedRule|Action is used instead of ActivatedRule|OverrideAction . Type (string) -- [REQUIRED] COUNT overrides the action specified by the individual rule within a RuleGroup . If set to NONE , the rule's action will take place. Type (string) --The rule type, either REGULAR , as defined by Rule , RATE_BASED , as defined by RateBasedRule , or GROUP , as defined by RuleGroup . The default is REGULAR. Although this field is optional, be aware that if you try to add a RATE_BASED rule to a web ACL without setting the type, the UpdateWebACL request will fail because the request tries to add a REGULAR rule with the specified ID, which does not exist. ExcludedRules (list) --An array of rules to exclude from a rule group. This is applicable only when the ActivatedRule refers to a RuleGroup . Sometimes it is necessary to troubleshoot rule groups that are blocking traffic unexpectedly (false positives). One troubleshooting technique is to identify the specific rule within the rule group that is blocking the legitimate traffic and then disable (exclude) that particular rule. You can exclude rules from both your own rule groups and AWS Marketplace rule groups that have been associated with a web ACL. Specifying ExcludedRules does not remove those rules from the rule group. Rather, it changes the action for the rules to COUNT . Therefore, requests that match an ExcludedRule are counted but not blocked. The RuleGroup owner will receive COUNT metrics for each ExcludedRule . If you want to exclude rules from a rule group that is already associated with a web ACL, perform the following steps: Use the AWS WAF logs to identify the IDs of the rules that you want to exclude. For more information about the logs, see Logging Web ACL Traffic Information . Submit an UpdateWebACL request that has two actions: The first action deletes the existing rule group from the web ACL. That is, in the UpdateWebACL request, the first Updates:Action should be DELETE and Updates:ActivatedRule:RuleId should be the rule group that contains the rules that you want to exclude. The second action inserts the same rule group back in, but specifying the rules to exclude. That is, the second Updates:Action should be INSERT , Updates:ActivatedRule:RuleId should be the rule group that you just removed, and ExcludedRules should contain the rules that you want to exclude. (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. The rule to exclude from a rule group. This is applicable only when the ActivatedRule refers to a RuleGroup . The rule must belong to the RuleGroup that is specified by the ActivatedRule . RuleId (string) -- [REQUIRED]The unique identifier for the rule to exclude from the rule group. :type DefaultAction: dict :param DefaultAction: A default action for the web ACL, either ALLOW or BLOCK. AWS WAF performs the default action if a request doesn't match the criteria in any of the rules in a web ACL. Type (string) -- [REQUIRED]Specifies how you want AWS WAF to respond to requests that match the settings in a Rule . Valid settings include the following: ALLOW : AWS WAF allows requests BLOCK : AWS WAF blocks requests COUNT : AWS WAF increments a counter of the requests that match all of the conditions in the rule. AWS WAF then continues to inspect the web request based on the remaining rules in the web ACL. You can't specify COUNT for the default action for a WebACL . :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- ChangeToken (string) -- The ChangeToken that you used to submit the UpdateWebACL request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFNonexistentContainerException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFReferencedItemException WAFRegional.Client.exceptions.WAFLimitsExceededException WAFRegional.Client.exceptions.WAFSubscriptionNotFoundException Examples The following example deletes an ActivatedRule object in a WebACL with the ID webacl-1472061481310. response = client.update_web_acl( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', DefaultAction={ 'Type': 'ALLOW', }, Updates=[ { 'Action': 'DELETE', 'ActivatedRule': { 'Action': { 'Type': 'ALLOW', }, 'Priority': 1, 'RuleId': 'WAFRule-1-Example', }, }, ], WebACLId='webacl-1472061481310', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } :returns: Create and update the predicates that you want to include in Rules . For more information, see CreateByteMatchSet , UpdateByteMatchSet , CreateIPSet , UpdateIPSet , CreateSqlInjectionMatchSet , and UpdateSqlInjectionMatchSet . Create and update the Rules that you want to include in the WebACL . For more information, see CreateRule and UpdateRule . Create a WebACL . See CreateWebACL . Use GetChangeToken to get the change token that you provide in the ChangeToken parameter of an UpdateWebACL request. Submit an UpdateWebACL request to specify the Rules that you want to include in the WebACL , to specify the default action, and to associate the WebACL with a CloudFront distribution. The ActivatedRule can be a rule group. If you specify a rule group as your ActivatedRule , you can exclude specific rules from that rule group. If you already have a rule group associated with a web ACL and want to submit an UpdateWebACL request to exclude certain rules from that rule group, you must first remove the rule group from the web ACL, the re-insert it again, specifying the excluded rules. For details, see ActivatedRule$ExcludedRules . """ pass def update_xss_match_set(XssMatchSetId=None, ChangeToken=None, Updates=None): """ Inserts or deletes XssMatchTuple objects (filters) in an XssMatchSet . For each XssMatchTuple object, you specify the following values: You use XssMatchSet objects to specify which CloudFront requests that you want to allow, block, or count. For example, if you're receiving requests that contain cross-site scripting attacks in the request body and you want to block the requests, you can create an XssMatchSet with the applicable settings, and then configure AWS WAF to block the requests. To create and configure an XssMatchSet , perform the following steps: For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide . See also: AWS API Documentation Exceptions Examples The following example deletes an XssMatchTuple object (filters) in an XssMatchSet with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. Expected Output: :example: response = client.update_xss_match_set( XssMatchSetId='string', ChangeToken='string', Updates=[ { 'Action': 'INSERT'|'DELETE', 'XssMatchTuple': { 'FieldToMatch': { 'Type': 'URI'|'QUERY_STRING'|'HEADER'|'METHOD'|'BODY'|'SINGLE_QUERY_ARG'|'ALL_QUERY_ARGS', 'Data': 'string' }, 'TextTransformation': 'NONE'|'COMPRESS_WHITE_SPACE'|'HTML_ENTITY_DECODE'|'LOWERCASE'|'CMD_LINE'|'URL_DECODE' } }, ] ) :type XssMatchSetId: string :param XssMatchSetId: [REQUIRED] The XssMatchSetId of the XssMatchSet that you want to update. XssMatchSetId is returned by CreateXssMatchSet and by ListXssMatchSets . :type ChangeToken: string :param ChangeToken: [REQUIRED] The value returned by the most recent call to GetChangeToken . :type Updates: list :param Updates: [REQUIRED] An array of XssMatchSetUpdate objects that you want to insert into or delete from an XssMatchSet . For more information, see the applicable data types: XssMatchSetUpdate : Contains Action and XssMatchTuple XssMatchTuple : Contains FieldToMatch and TextTransformation FieldToMatch : Contains Data and Type (dict) -- Note This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use. Specifies the part of a web request that you want to inspect for cross-site scripting attacks and indicates whether you want to add the specification to an XssMatchSet or delete it from an XssMatchSet . Action (string) -- [REQUIRED]Specify INSERT to add an XssMatchSetUpdate to an XssMatchSet . Use DELETE to remove an XssMatchSetUpdate from an XssMatchSet . XssMatchTuple (dict) -- [REQUIRED]Specifies the part of a web request that you want AWS WAF to inspect for cross-site scripting attacks and, if you want AWS WAF to inspect a header, the name of the header. FieldToMatch (dict) -- [REQUIRED]Specifies where in a web request to look for cross-site scripting attacks. Type (string) -- [REQUIRED]The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following: HEADER : A specified request header, for example, the value of the User-Agent or Referer header. If you choose HEADER for the type, specify the name of the header in Data . METHOD : The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods: DELETE , GET , HEAD , OPTIONS , PATCH , POST , and PUT . QUERY_STRING : A query string, which is the part of a URL that appears after a ? character, if any. URI : The part of a web request that identifies a resource, for example, /images/daily-ad.jpg . BODY : The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first 8192 bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet . SINGLE_QUERY_ARG : The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length for SINGLE_QUERY_ARG is 30 characters. ALL_QUERY_ARGS : Similar to SINGLE_QUERY_ARG , but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify in TargetString . Data (string) --When the value of Type is HEADER , enter the name of the header that you want AWS WAF to search, for example, User-Agent or Referer . The name of the header is not case sensitive. When the value of Type is SINGLE_QUERY_ARG , enter the name of the parameter that you want AWS WAF to search, for example, UserName or SalesRegion . The parameter name is not case sensitive. If the value of Type is any other value, omit Data . TextTransformation (string) -- [REQUIRED]Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on FieldToMatch before inspecting it for a match. You can only specify a single type of TextTransformation. CMD_LINE When you're concerned that attackers are injecting an operating system command line command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations: Delete the following characters: ' ' ^ Delete spaces before the following characters: / ( Replace the following characters with a space: , ; Replace multiple spaces with one space Convert uppercase letters (A-Z) to lowercase (a-z) COMPRESS_WHITE_SPACE Use this option to replace the following characters with a space character (decimal 32): f, formfeed, decimal 12 t, tab, decimal 9 n, newline, decimal 10 r, carriage return, decimal 13 v, vertical tab, decimal 11 non-breaking space, decimal 160 COMPRESS_WHITE_SPACE also replaces multiple spaces with one space.HTML_ENTITY_DECODE Use this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE performs the following operations: Replaces (ampersand)quot; with ' Replaces (ampersand)nbsp; with a non-breaking space, decimal 160 Replaces (ampersand)lt; with a 'less than' symbol Replaces (ampersand)gt; with > Replaces characters that are represented in hexadecimal format, (ampersand)#xhhhh; , with the corresponding characters Replaces characters that are represented in decimal format, (ampersand)#nnnn; , with the corresponding characters LOWERCASE Use this option to convert uppercase letters (A-Z) to lowercase (a-z). URL_DECODE Use this option to decode a URL-encoded value. NONE Specify NONE if you don't want to perform any text transformations. :rtype: dict ReturnsResponse Syntax { 'ChangeToken': 'string' } Response Structure (dict) -- The response to an UpdateXssMatchSets request. ChangeToken (string) -- The ChangeToken that you used to submit the UpdateXssMatchSet request. You can also use this value to query the status of the request. For more information, see GetChangeTokenStatus . Exceptions WAFRegional.Client.exceptions.WAFInternalErrorException WAFRegional.Client.exceptions.WAFInvalidAccountException WAFRegional.Client.exceptions.WAFInvalidOperationException WAFRegional.Client.exceptions.WAFInvalidParameterException WAFRegional.Client.exceptions.WAFNonexistentContainerException WAFRegional.Client.exceptions.WAFNonexistentItemException WAFRegional.Client.exceptions.WAFStaleDataException WAFRegional.Client.exceptions.WAFLimitsExceededException Examples The following example deletes an XssMatchTuple object (filters) in an XssMatchSet with the ID example1ds3t-46da-4fdb-b8d5-abc321j569j5. response = client.update_xss_match_set( ChangeToken='abcd12f2-46da-4fdb-b8d5-fbd4c466928f', Updates=[ { 'Action': 'DELETE', 'XssMatchTuple': { 'FieldToMatch': { 'Type': 'QUERY_STRING', }, 'TextTransformation': 'URL_DECODE', }, }, ], XssMatchSetId='example1ds3t-46da-4fdb-b8d5-abc321j569j5', ) print(response) Expected Output: { 'ChangeToken': 'abcd12f2-46da-4fdb-b8d5-fbd4c466928f', 'ResponseMetadata': { '...': '...', }, } :return: { 'ChangeToken': 'string' } :returns: Submit a CreateXssMatchSet request. Use GetChangeToken to get the change token that you provide in the ChangeToken parameter of an UpdateIPSet request. Submit an UpdateXssMatchSet request to specify the parts of web requests that you want AWS WAF to inspect for cross-site scripting attacks. """ pass
""" 0489. Robot Room Cleaner Given a robot cleaner in a room modeled as a grid. Each cell in the grid can be empty or blocked. The robot cleaner with 4 given APIs can move forward, turn left or turn right. Each turn it made is 90 degrees. When it tries to move into a blocked cell, its bumper sensor detects the obstacle and it stays on the current cell. Design an algorithm to clean the entire room using only the 4 given APIs shown below. interface Robot { // returns true if next cell is open and robot moves into the cell. // returns false if next cell is obstacle and robot stays on the current cell. boolean move(); // Robot will stay on the same cell after calling turnLeft/turnRight. // Each turn will be 90 degrees. void turnLeft(); void turnRight(); // Clean the current cell. void clean(); } Example: Input: room = [ [1,1,1,1,1,0,1,1], [1,1,1,1,1,0,1,1], [1,0,1,1,1,1,1,1], [0,0,0,1,0,0,0,0], [1,1,1,1,1,1,1,1] ], row = 1, col = 3 Explanation: All grids in the room are marked by either 0 or 1. 0 means the cell is blocked, while 1 means the cell is accessible. The robot initially starts at the position of row=1, col=3. From the top left corner, its position is one row below and three columns right. Notes: The input is only given to initialize the room and the robot's position internally. You must solve this problem "blindfolded". In other words, you must control the robot using only the mentioned 4 APIs, without knowing the room layout and the initial robot's position. The robot's initial position will always be in an accessible cell. The initial direction of the robot will be facing up. All accessible cells are connected, which means the all cells marked as 1 will be accessible by the robot. Assume all four edges of the grid are all surrounded by wall. """ # """ # This is the robot's control interface. # You should not implement it, or speculate about its implementation # """ #class Robot: # def move(self): # """ # Returns true if the cell in front is open and robot moves into the cell. # Returns false if the cell in front is blocked and robot stays in the current cell. # :rtype bool # """ # # def turnLeft(self): # """ # Robot will stay in the same cell after calling turnLeft/turnRight. # Each turn will be 90 degrees. # :rtype void # """ # # def turnRight(self): # """ # Robot will stay in the same cell after calling turnLeft/turnRight. # Each turn will be 90 degrees. # :rtype void # """ # # def clean(self): # """ # Clean the current cell. # :rtype void # """ class Solution: def cleanRoom(self, robot): def dfs(robot, i, j, d, cleaned): robot.clean() cleaned.add((i, j)) left = True for nd in ((d + k) % 4 for k in (3, 0, 1, 2)): robot.turnLeft() if left else robot.turnRight() di, dj = ((-1, 0), (0, 1), (1, 0), (0, -1))[nd] if (i + di, j + dj) not in cleaned and robot.move(): dfs(robot, i + di, j + dj, nd, cleaned) robot.move() left = True else: left = False dfs(robot, 0, 0, 0, set()) class Solution: def cleanRoom(self, robot, move=[(-1, 0), (0, -1), (1, 0), (0, 1)]): """ :type robot: Robot :rtype: None """ def helper(i, j, cleaned, ind): robot.clean() cleaned.add((i, j)) for k in range(4): x, y = move[(ind + k) % 4] if (i + x, j + y) not in cleaned and robot.move(): helper(i + x, j + y, cleaned, (ind + k) % 4) robot.turnLeft() robot.turnLeft() robot.move() robot.turnRight() robot.turnRight() robot.turnLeft() helper(0, 0, set(), 0)
""" 0489. Robot Room Cleaner Given a robot cleaner in a room modeled as a grid. Each cell in the grid can be empty or blocked. The robot cleaner with 4 given APIs can move forward, turn left or turn right. Each turn it made is 90 degrees. When it tries to move into a blocked cell, its bumper sensor detects the obstacle and it stays on the current cell. Design an algorithm to clean the entire room using only the 4 given APIs shown below. interface Robot { // returns true if next cell is open and robot moves into the cell. // returns false if next cell is obstacle and robot stays on the current cell. boolean move(); // Robot will stay on the same cell after calling turnLeft/turnRight. // Each turn will be 90 degrees. void turnLeft(); void turnRight(); // Clean the current cell. void clean(); } Example: Input: room = [ [1,1,1,1,1,0,1,1], [1,1,1,1,1,0,1,1], [1,0,1,1,1,1,1,1], [0,0,0,1,0,0,0,0], [1,1,1,1,1,1,1,1] ], row = 1, col = 3 Explanation: All grids in the room are marked by either 0 or 1. 0 means the cell is blocked, while 1 means the cell is accessible. The robot initially starts at the position of row=1, col=3. From the top left corner, its position is one row below and three columns right. Notes: The input is only given to initialize the room and the robot's position internally. You must solve this problem "blindfolded". In other words, you must control the robot using only the mentioned 4 APIs, without knowing the room layout and the initial robot's position. The robot's initial position will always be in an accessible cell. The initial direction of the robot will be facing up. All accessible cells are connected, which means the all cells marked as 1 will be accessible by the robot. Assume all four edges of the grid are all surrounded by wall. """ class Solution: def clean_room(self, robot): def dfs(robot, i, j, d, cleaned): robot.clean() cleaned.add((i, j)) left = True for nd in ((d + k) % 4 for k in (3, 0, 1, 2)): robot.turnLeft() if left else robot.turnRight() (di, dj) = ((-1, 0), (0, 1), (1, 0), (0, -1))[nd] if (i + di, j + dj) not in cleaned and robot.move(): dfs(robot, i + di, j + dj, nd, cleaned) robot.move() left = True else: left = False dfs(robot, 0, 0, 0, set()) class Solution: def clean_room(self, robot, move=[(-1, 0), (0, -1), (1, 0), (0, 1)]): """ :type robot: Robot :rtype: None """ def helper(i, j, cleaned, ind): robot.clean() cleaned.add((i, j)) for k in range(4): (x, y) = move[(ind + k) % 4] if (i + x, j + y) not in cleaned and robot.move(): helper(i + x, j + y, cleaned, (ind + k) % 4) robot.turnLeft() robot.turnLeft() robot.move() robot.turnRight() robot.turnRight() robot.turnLeft() helper(0, 0, set(), 0)
# microbit.py 15/01/2021 D.J.Whale # Simulator for a micro:bit - will be replaced with BITIO class Radio(): # RCNNABGRR+SS (12 chars) # 0123456789AB TESTDATA = ( "RC0000F99+00", None, None, "RC0000F00+99", "RC0000F99-99", "RC0000S00+00", "RC0000B99+00", "RC0000B99-99", "RC0000B99+99" ) def __init__(self): self._index = 0 def receive(self): v = self.TESTDATA[self._index] self._index += 1 if self._index >= len(self.TESTDATA): self._index = 0 return v radio = Radio() # END
class Radio: testdata = ('RC0000F99+00', None, None, 'RC0000F00+99', 'RC0000F99-99', 'RC0000S00+00', 'RC0000B99+00', 'RC0000B99-99', 'RC0000B99+99') def __init__(self): self._index = 0 def receive(self): v = self.TESTDATA[self._index] self._index += 1 if self._index >= len(self.TESTDATA): self._index = 0 return v radio = radio()
class Solution: def pivotIndex(self, nums): left = 0 right = 0 left_sum = 0 right_sum = sum(nums) while right < len(nums): right_sum -= nums[right] right += 1 if right_sum == left_sum: return left else: left_sum += nums[left] left += 1 return -1
class Solution: def pivot_index(self, nums): left = 0 right = 0 left_sum = 0 right_sum = sum(nums) while right < len(nums): right_sum -= nums[right] right += 1 if right_sum == left_sum: return left else: left_sum += nums[left] left += 1 return -1
A, B = map(int, input().split()) diff = abs(A - B) ans = diff // 10 diff %= 10 ans = ans + [0, 1, 2, 3, 2, 1, 2, 3, 3, 2][diff] print(ans)
(a, b) = map(int, input().split()) diff = abs(A - B) ans = diff // 10 diff %= 10 ans = ans + [0, 1, 2, 3, 2, 1, 2, 3, 3, 2][diff] print(ans)
# https://www.hackerrank.com/challenges/python-quest-1/problem # Condition # 1 <= int(input()) <= 9 # String is not allowed. # More than 1 for-statement is not allowed. # More than 2 lines are not allowed. (Do not leave a blank line also.) """ Mathmatical Answer for i in range(1, int(input())): print(10**i // 9 * i) """ """ Cheating Answer for i in range(1, int(input())): print([0, 1, 22, 333, 4444, 55555, 666666, 7777777, 88888888, 999999999][i]) """ for i in range(1, int(input())): print(sum(map(lambda num: i * 10 ** num, range(i)))) # 5 # 1 # 22 # 333 # 4444 """ Note for i in range(1, int(input())): print(*map(lambda num: i * 10 ** num, range(i))) # 5 # 1 # 2 20 # 3 30 300 # 4 40 400 4000 """
""" Mathmatical Answer for i in range(1, int(input())): print(10**i // 9 * i) """ ' Cheating Answer\n\nfor i in range(1, int(input())):\n print([0, 1, 22, 333, 4444, 55555, 666666, 7777777, 88888888, 999999999][i])\n' for i in range(1, int(input())): print(sum(map(lambda num: i * 10 ** num, range(i)))) ' Note\n\nfor i in range(1, int(input())):\n print(*map(lambda num: i * 10 ** num, range(i)))\n\n# 5\n# 1\n# 2 20\n# 3 30 300\n# 4 40 400 4000\n'
class RobotException(Exception): pass class UnitGuardCollision(RobotException): def __init__(self, other_robot): self.other_robot = other_robot class UnitMoveCollision(RobotException): def __init__(self, other_robots): self.other_robots = other_robots class UnitBlockCollision(RobotException): def __init__(self, other_robot): self.other_robot = other_robot
class Robotexception(Exception): pass class Unitguardcollision(RobotException): def __init__(self, other_robot): self.other_robot = other_robot class Unitmovecollision(RobotException): def __init__(self, other_robots): self.other_robots = other_robots class Unitblockcollision(RobotException): def __init__(self, other_robot): self.other_robot = other_robot
""" Asked by: Apple [Medium]. Gray code is a binary code where each successive value differ in only one bit, as well as when wrapping around. Gray code is common in hardware so that we don't see temporary spurious values during transitions. Given a number of bits n, generate a possible gray code for it. For example, for n = 2, one gray code would be [00, 01, 11, 10]. """
""" Asked by: Apple [Medium]. Gray code is a binary code where each successive value differ in only one bit, as well as when wrapping around. Gray code is common in hardware so that we don't see temporary spurious values during transitions. Given a number of bits n, generate a possible gray code for it. For example, for n = 2, one gray code would be [00, 01, 11, 10]. """
class Solution: def findPairs(self, nums: List[int], k: int) -> int: result, frequencyMap = 0, Counter(nums) for i in frequencyMap: if k == 0 and frequencyMap[i] > 1: result += 1 elif k > 0 and i + k in frequencyMap: result += 1 return result
class Solution: def find_pairs(self, nums: List[int], k: int) -> int: (result, frequency_map) = (0, counter(nums)) for i in frequencyMap: if k == 0 and frequencyMap[i] > 1: result += 1 elif k > 0 and i + k in frequencyMap: result += 1 return result
class Scorer(object): def __init__(self, cards): self.cards = cards def flush(self): suits = [card.suit for card in self.cards] if len(set(suits)) == 1: return True return False def straight(self): values = [card.value for card in self.cards] values.sort() if not len(set(values)) == 5: return False if values[4] == 14 and values[0] == 2 and values[1] == 3 and values[2] == 4 and values[3] == 5: return 5 else: if not values[0] + 1 == values[1]: return False if not values[1] + 1 == values[2]: return False if not values[2] + 1 == values[3]: return False if not values[3] + 1 == values[4]: return False return values[4] def high_card(self): values = [card.value for card in self.cards] high_card = None for card in self.cards: if high_card is None: high_card = card elif high_card.value < card.value: high_card = card return high_card def highest_count(self): count = 0 values = [card.value for card in self.cards] for value in values: if values.count(value) > count: count = values.count(value) return count def pairs(self): pairs = [] values = [card.value for card in self.cards] for value in values: if values.count(value) == 2 and value not in pairs: pairs.append(value) return pairs def four_kind(self): values = [card.value for card in self.cards] for value in values: if values.count(value) == 4: return True def full_house(self): two = False three = False values = [card.value for card in self.cards] if values.count(values) == 2: two = True elif values.count(values) == 3: three = True if two and three: return True return False
class Scorer(object): def __init__(self, cards): self.cards = cards def flush(self): suits = [card.suit for card in self.cards] if len(set(suits)) == 1: return True return False def straight(self): values = [card.value for card in self.cards] values.sort() if not len(set(values)) == 5: return False if values[4] == 14 and values[0] == 2 and (values[1] == 3) and (values[2] == 4) and (values[3] == 5): return 5 else: if not values[0] + 1 == values[1]: return False if not values[1] + 1 == values[2]: return False if not values[2] + 1 == values[3]: return False if not values[3] + 1 == values[4]: return False return values[4] def high_card(self): values = [card.value for card in self.cards] high_card = None for card in self.cards: if high_card is None: high_card = card elif high_card.value < card.value: high_card = card return high_card def highest_count(self): count = 0 values = [card.value for card in self.cards] for value in values: if values.count(value) > count: count = values.count(value) return count def pairs(self): pairs = [] values = [card.value for card in self.cards] for value in values: if values.count(value) == 2 and value not in pairs: pairs.append(value) return pairs def four_kind(self): values = [card.value for card in self.cards] for value in values: if values.count(value) == 4: return True def full_house(self): two = False three = False values = [card.value for card in self.cards] if values.count(values) == 2: two = True elif values.count(values) == 3: three = True if two and three: return True return False
class Solution(object): def canJump(self, nums): """ :type nums: List[int] :rtype: bool """ n = len(nums) if n < 2: return True target_i = n - 1 for i in range(n - 2, -1, -1): if nums[i] >= target_i - i: target_i = i return target_i == 0 def test_can_jump(): s = Solution() assert s.canJump([2, 3, 1, 1, 4]) is True assert s.canJump([3, 2, 1, 0, 4]) is False
class Solution(object): def can_jump(self, nums): """ :type nums: List[int] :rtype: bool """ n = len(nums) if n < 2: return True target_i = n - 1 for i in range(n - 2, -1, -1): if nums[i] >= target_i - i: target_i = i return target_i == 0 def test_can_jump(): s = solution() assert s.canJump([2, 3, 1, 1, 4]) is True assert s.canJump([3, 2, 1, 0, 4]) is False
class InvalidPhoneNumber(Exception): def __init__(self, phone_number): self.phone_number = phone_number self.message = phone_number + ' is an invalid phone number' super().__init__(self.message)
class Invalidphonenumber(Exception): def __init__(self, phone_number): self.phone_number = phone_number self.message = phone_number + ' is an invalid phone number' super().__init__(self.message)
def list(): '''Returns a list of streams ''' return 'TO BE IMPLEMENTED' def add(): '''Set an stream ''' return 'TO BE IMPLEMENTED' def find_by_name(name): '''Returns the named stream Params: name - The name of the stream ''' return 'TO BE IMPLEMENTED' def delete_by_name(name): '''Deletes the named stream Params: name - The name of the stream ''' return 'TO BE IMPLEMENTED'
def list(): """Returns a list of streams """ return 'TO BE IMPLEMENTED' def add(): """Set an stream """ return 'TO BE IMPLEMENTED' def find_by_name(name): """Returns the named stream Params: name - The name of the stream """ return 'TO BE IMPLEMENTED' def delete_by_name(name): """Deletes the named stream Params: name - The name of the stream """ return 'TO BE IMPLEMENTED'
# -*- coding: utf-8 -*- """ Created on Thu Jun 20 21:16:13 2019 @author: CLIENTE """ def fatorial(n): if n == 1: return 1 else: return n*fatorial(n-1)
""" Created on Thu Jun 20 21:16:13 2019 @author: CLIENTE """ def fatorial(n): if n == 1: return 1 else: return n * fatorial(n - 1)
# Count Substrings That Differ by One Character class Solution: def countSubstrings(self, s, t): # brute force slen = len(s) tlen = len(t) count = 0 for si in range(slen): for ti in range(tlen): index = 0 diffCount = 0 while si + index < slen and ti + index < tlen: if s[si + index] != t[ti + index]: if diffCount == 1: break diffCount += 1 if diffCount == 1: count += 1 index += 1 return count if __name__ == "__main__": sol = Solution() s = "abbab" t = "bbbbb" print(sol.countSubstrings(s, t))
class Solution: def count_substrings(self, s, t): slen = len(s) tlen = len(t) count = 0 for si in range(slen): for ti in range(tlen): index = 0 diff_count = 0 while si + index < slen and ti + index < tlen: if s[si + index] != t[ti + index]: if diffCount == 1: break diff_count += 1 if diffCount == 1: count += 1 index += 1 return count if __name__ == '__main__': sol = solution() s = 'abbab' t = 'bbbbb' print(sol.countSubstrings(s, t))
#!/usr/bin/python3 """ Given a non-negative integer N, find the largest number that is less than or equal to N with monotone increasing digits. (Recall that an integer has monotone increasing digits if and only if each pair of adjacent digits x and y satisfy x <= y.) Example 1: Input: N = 10 Output: 9 Example 2: Input: N = 1234 Output: 1234 Example 3: Input: N = 332 Output: 299 Note: N is an integer in the range [0, 10^9]. """ class Solution: def monotoneIncreasingDigits(self, N: int) -> int: """ 332 322 222 fill 9 299 """ digits = [int(e) for e in str(N)] pointer = len(digits) for i in range(len(digits) - 1, 0, -1): if digits[i - 1] > digits[i]: pointer = i digits[i - 1] -= 1 for i in range(pointer, len(digits)): digits[i] = 9 return int("".join(map(str, digits))) if __name__ == "__main__": assert Solution().monotoneIncreasingDigits(10) == 9 assert Solution().monotoneIncreasingDigits(332) == 299
""" Given a non-negative integer N, find the largest number that is less than or equal to N with monotone increasing digits. (Recall that an integer has monotone increasing digits if and only if each pair of adjacent digits x and y satisfy x <= y.) Example 1: Input: N = 10 Output: 9 Example 2: Input: N = 1234 Output: 1234 Example 3: Input: N = 332 Output: 299 Note: N is an integer in the range [0, 10^9]. """ class Solution: def monotone_increasing_digits(self, N: int) -> int: """ 332 322 222 fill 9 299 """ digits = [int(e) for e in str(N)] pointer = len(digits) for i in range(len(digits) - 1, 0, -1): if digits[i - 1] > digits[i]: pointer = i digits[i - 1] -= 1 for i in range(pointer, len(digits)): digits[i] = 9 return int(''.join(map(str, digits))) if __name__ == '__main__': assert solution().monotoneIncreasingDigits(10) == 9 assert solution().monotoneIncreasingDigits(332) == 299
# Copyright 2020 Cognite AS # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. """ A module containing utilities meant for use inside the extractor-utils package """ def _resolve_log_level(level: str) -> int: return {"NOTSET": 0, "DEBUG": 10, "INFO": 20, "WARNING": 30, "ERROR": 40, "CRITICAL": 50}[level.upper()]
""" A module containing utilities meant for use inside the extractor-utils package """ def _resolve_log_level(level: str) -> int: return {'NOTSET': 0, 'DEBUG': 10, 'INFO': 20, 'WARNING': 30, 'ERROR': 40, 'CRITICAL': 50}[level.upper()]
#! /usr/bin/env python class Template: """invite templates""" def __init__(self): self.profile_templates = { 'th invite templates' : u"{{{{subst:Wikipedia:Teahouse/HostBot_Invitation|personal=The Teahouse is a friendly space where new editors can ask questions about contributing to Wikipedia and get help from experienced editors like {{{{noping|{inviter:s}}}}} ([[User_talk:{inviter:s}|talk]]). |bot={{{{noping|HostBot}}}}|timestamp=~~~~~}}}}", 'test invite templates' : u"{{{{subst:User:HostBot/Invitation|personal=The Teahouse is a friendly space where new editors can ask questions about contributing to Wikipedia and get help from experienced editors like {{{{noping|{inviter:s}}}}} ([[User_talk:{inviter:s}|talk]]). |bot={{{{noping|HostBot}}}}|timestamp=~~~~~}}}}", #only use when hostbot_settings urls set to testwiki 'tm invite template' : "{{{{subst:Training_modules_invitation|signed=~~~~}}}}", } def getTemplate(self, member): tmplt = self.profile_templates[member] return tmplt
class Template: """invite templates""" def __init__(self): self.profile_templates = {'th invite templates': u'{{{{subst:Wikipedia:Teahouse/HostBot_Invitation|personal=The Teahouse is a friendly space where new editors can ask questions about contributing to Wikipedia and get help from experienced editors like {{{{noping|{inviter:s}}}}} ([[User_talk:{inviter:s}|talk]]). |bot={{{{noping|HostBot}}}}|timestamp=~~~~~}}}}', 'test invite templates': u'{{{{subst:User:HostBot/Invitation|personal=The Teahouse is a friendly space where new editors can ask questions about contributing to Wikipedia and get help from experienced editors like {{{{noping|{inviter:s}}}}} ([[User_talk:{inviter:s}|talk]]). |bot={{{{noping|HostBot}}}}|timestamp=~~~~~}}}}', 'tm invite template': '{{{{subst:Training_modules_invitation|signed=~~~~}}}}'} def get_template(self, member): tmplt = self.profile_templates[member] return tmplt