@@ -2316,8 +2316,6 @@ class ApplicationRuleCondition(FirewallPolicyRuleCondition):
23162316 :param protocols: Array of Application Protocols.
23172317 :type protocols:
23182318 list[~azure.mgmt.network.v2020_04_01.models.FirewallPolicyRuleConditionApplicationProtocol]
2319- :param target_urls: List of Urls for this rule condition.
2320- :type target_urls: list[str]
23212319 :param target_fqdns: List of FQDNs for this rule condition.
23222320 :type target_fqdns: list[str]
23232321 :param fqdn_tags: List of FQDN Tags for this rule condition.
@@ -2337,7 +2335,6 @@ class ApplicationRuleCondition(FirewallPolicyRuleCondition):
23372335 'source_addresses': {'key': 'sourceAddresses', 'type': '[str]'},
23382336 'destination_addresses': {'key': 'destinationAddresses', 'type': '[str]'},
23392337 'protocols': {'key': 'protocols', 'type': '[FirewallPolicyRuleConditionApplicationProtocol]'},
2340- 'target_urls': {'key': 'targetUrls', 'type': '[str]'},
23412338 'target_fqdns': {'key': 'targetFqdns', 'type': '[str]'},
23422339 'fqdn_tags': {'key': 'fqdnTags', 'type': '[str]'},
23432340 'source_ip_groups': {'key': 'sourceIpGroups', 'type': '[str]'},
@@ -2348,7 +2345,6 @@ def __init__(self, **kwargs):
23482345 self.source_addresses = kwargs.get('source_addresses', None)
23492346 self.destination_addresses = kwargs.get('destination_addresses', None)
23502347 self.protocols = kwargs.get('protocols', None)
2351- self.target_urls = kwargs.get('target_urls', None)
23522348 self.target_fqdns = kwargs.get('target_fqdns', None)
23532349 self.fqdn_tags = kwargs.get('fqdn_tags', None)
23542350 self.source_ip_groups = kwargs.get('source_ip_groups', None)
@@ -7738,19 +7734,9 @@ class FirewallPolicy(Resource):
77387734 :param threat_intel_whitelist: ThreatIntel Whitelist for Firewall Policy.
77397735 :type threat_intel_whitelist:
77407736 ~azure.mgmt.network.v2020_04_01.models.FirewallPolicyThreatIntelWhitelist
7741- :param intrusion_system_mode: The operation mode for Intrusion system.
7742- Possible values include: 'Enabled', 'Disabled'
7743- :type intrusion_system_mode: str or
7744- ~azure.mgmt.network.v2020_04_01.models.FirewallPolicyIntrusionSystemMode
7745- :param transport_security: TLS Configuration definition.
7746- :type transport_security:
7747- ~azure.mgmt.network.v2020_04_01.models.FirewallPolicyTransportSecurity
77487737 :ivar etag: A unique read-only string that changes whenever the resource
77497738 is updated.
77507739 :vartype etag: str
7751- :param identity: The identity of the firewall policy.
7752- :type identity:
7753- ~azure.mgmt.network.v2020_04_01.models.ManagedServiceIdentity
77547740 """
77557741
77567742 _validation = {
@@ -7776,10 +7762,7 @@ class FirewallPolicy(Resource):
77767762 'child_policies': {'key': 'properties.childPolicies', 'type': '[SubResource]'},
77777763 'threat_intel_mode': {'key': 'properties.threatIntelMode', 'type': 'str'},
77787764 'threat_intel_whitelist': {'key': 'properties.threatIntelWhitelist', 'type': 'FirewallPolicyThreatIntelWhitelist'},
7779- 'intrusion_system_mode': {'key': 'properties.intrusionSystemMode', 'type': 'str'},
7780- 'transport_security': {'key': 'properties.transportSecurity', 'type': 'FirewallPolicyTransportSecurity'},
77817765 'etag': {'key': 'etag', 'type': 'str'},
7782- 'identity': {'key': 'identity', 'type': 'ManagedServiceIdentity'},
77837766 }
77847767
77857768 def __init__(self, **kwargs):
@@ -7791,31 +7774,7 @@ def __init__(self, **kwargs):
77917774 self.child_policies = None
77927775 self.threat_intel_mode = kwargs.get('threat_intel_mode', None)
77937776 self.threat_intel_whitelist = kwargs.get('threat_intel_whitelist', None)
7794- self.intrusion_system_mode = kwargs.get('intrusion_system_mode', None)
7795- self.transport_security = kwargs.get('transport_security', None)
77967777 self.etag = None
7797- self.identity = kwargs.get('identity', None)
7798-
7799-
7800- class FirewallPolicyCertificateAuthority(Model):
7801- """Trusted Root certificates properties for tls.
7802-
7803- :param key_vault_secret_id: Secret Id of (base-64 encoded unencrypted pfx)
7804- 'Secret' or 'Certificate' object stored in KeyVault.
7805- :type key_vault_secret_id: str
7806- :param name: Name of the CA certificate.
7807- :type name: str
7808- """
7809-
7810- _attribute_map = {
7811- 'key_vault_secret_id': {'key': 'properties.keyVaultSecretId', 'type': 'str'},
7812- 'name': {'key': 'name', 'type': 'str'},
7813- }
7814-
7815- def __init__(self, **kwargs):
7816- super(FirewallPolicyCertificateAuthority, self).__init__(**kwargs)
7817- self.key_vault_secret_id = kwargs.get('key_vault_secret_id', None)
7818- self.name = kwargs.get('name', None)
78197778
78207779
78217780class FirewallPolicyRule(Model):
@@ -8077,56 +8036,6 @@ def __init__(self, **kwargs):
80778036 self.fqdns = kwargs.get('fqdns', None)
80788037
80798038
8080- class FirewallPolicyTransportSecurity(Model):
8081- """Configuration needed to perform TLS termination & initiation.
8082-
8083- :param certificate_authority: The CA used for intermediate CA generation.
8084- :type certificate_authority:
8085- ~azure.mgmt.network.v2020_04_01.models.FirewallPolicyCertificateAuthority
8086- :param excluded_domains: List of domains which are excluded from TLS
8087- termination.
8088- :type excluded_domains: list[str]
8089- :param trusted_root_certificates: Certificates which are to be trusted by
8090- the firewall.
8091- :type trusted_root_certificates:
8092- list[~azure.mgmt.network.v2020_04_01.models.FirewallPolicyTrustedRootCertificate]
8093- """
8094-
8095- _attribute_map = {
8096- 'certificate_authority': {'key': 'certificateAuthority', 'type': 'FirewallPolicyCertificateAuthority'},
8097- 'excluded_domains': {'key': 'excludedDomains', 'type': '[str]'},
8098- 'trusted_root_certificates': {'key': 'trustedRootCertificates', 'type': '[FirewallPolicyTrustedRootCertificate]'},
8099- }
8100-
8101- def __init__(self, **kwargs):
8102- super(FirewallPolicyTransportSecurity, self).__init__(**kwargs)
8103- self.certificate_authority = kwargs.get('certificate_authority', None)
8104- self.excluded_domains = kwargs.get('excluded_domains', None)
8105- self.trusted_root_certificates = kwargs.get('trusted_root_certificates', None)
8106-
8107-
8108- class FirewallPolicyTrustedRootCertificate(Model):
8109- """Trusted Root certificates of a firewall policy.
8110-
8111- :param key_vault_secret_id: Secret Id of (base-64 encoded unencrypted pfx)
8112- the public certificate data stored in KeyVault.
8113- :type key_vault_secret_id: str
8114- :param name: Name of the trusted root certificate that is unique within a
8115- firewall policy.
8116- :type name: str
8117- """
8118-
8119- _attribute_map = {
8120- 'key_vault_secret_id': {'key': 'properties.keyVaultSecretId', 'type': 'str'},
8121- 'name': {'key': 'name', 'type': 'str'},
8122- }
8123-
8124- def __init__(self, **kwargs):
8125- super(FirewallPolicyTrustedRootCertificate, self).__init__(**kwargs)
8126- self.key_vault_secret_id = kwargs.get('key_vault_secret_id', None)
8127- self.name = kwargs.get('name', None)
8128-
8129-
81308039class FlowLog(Resource):
81318040 """A flow log resource.
81328041
@@ -10294,8 +10203,6 @@ class NatRuleCondition(FirewallPolicyRuleCondition):
1029410203 :type destination_ports: list[str]
1029510204 :param source_ip_groups: List of source IpGroups for this rule.
1029610205 :type source_ip_groups: list[str]
10297- :param terminate_tls: Terminate TLS connections for this rule.
10298- :type terminate_tls: bool
1029910206 """
1030010207
1030110208 _validation = {
@@ -10311,7 +10218,6 @@ class NatRuleCondition(FirewallPolicyRuleCondition):
1031110218 'destination_addresses': {'key': 'destinationAddresses', 'type': '[str]'},
1031210219 'destination_ports': {'key': 'destinationPorts', 'type': '[str]'},
1031310220 'source_ip_groups': {'key': 'sourceIpGroups', 'type': '[str]'},
10314- 'terminate_tls': {'key': 'terminateTLS', 'type': 'bool'},
1031510221 }
1031610222
1031710223 def __init__(self, **kwargs):
@@ -10321,7 +10227,6 @@ def __init__(self, **kwargs):
1032110227 self.destination_addresses = kwargs.get('destination_addresses', None)
1032210228 self.destination_ports = kwargs.get('destination_ports', None)
1032310229 self.source_ip_groups = kwargs.get('source_ip_groups', None)
10324- self.terminate_tls = kwargs.get('terminate_tls', None)
1032510230 self.rule_condition_type = 'NatRuleCondition'
1032610231
1032710232
0 commit comments