Policy Update Mode Reference
This topic covers properties, parameters, and examples for policy update mode.
Parameters
Parameter | Description | Type | Required |
|---|---|---|---|
| Organization | Integer | Yes |
| Security Policy Version | String | Yes |
| Maximum number of policy objects to return (per type) | Integer | No |
Properties
The current firewall_settings resource specifies a combination of IPsec / IKE authentication method (PSK or certificate) for SecureConnect and Machine Authentication.
Parameter | Description | Type | Required |
|---|---|---|---|
| Type of update | String | Yes |
| Scopes that have static policy application mode Reference to | No | |
| Maximum number of policy objects to return (per type) | Integer | No |
| IKE authentication type to use for IPsec (SecureConnect and Machine Authentication) | String | No |
| Defines whether or not to open the endpoint firewall to all outbound traffic when the VEN discovers a captive portal scenario | Boolean | No |
| A workload that matches the scope will apply the policy it receives to itself and the containers it hosts. Reference to | ||
| Scopes whose blocked connection action will be rejected Reference to | ||
| Workloads that match the scope will apply policy on loopback interfaces and the loopback interface's IPs will be distributed to peers. Reference to |
Draft or Active Policy Update Mode
Variable | Description |
|---|---|
| Allows you to get:
|
Examples
Curl Command Get Active Policy Update Mode
This curl example gets the active (currently provisioned) security settings for your organization, which includes the policy update mode settings.
curl -i -X GET https://pce.my-company.com:8443/api/v2/orgs/7/sec_policy/active/firewall_settings -H "Accept: application/json" -u $KEY:$TOKEN
Response Body
The static_policy_scopes property in the response (in blue ) indicates that two static scopes have been configured for policy update.
Each scope is defined as a JSON array of labels, which includes an Application, Environment, and a Location label. The labels in the scope are identified by their HREFs.
{
"href": "/orgs/7/sec_policy/active/firewall_settings",
"created_at": "2015-10-23T22:01:01.151Z",
"updated_at": "2017-09-02T19:08:55.623Z",
"deleted_at": null,
"created_by": { "href": "/users/0" },
"updated_by": { "href": "/users/14" },
"deleted_by": null,
"update_type": null,
"allow_dhcp_client": true,
"log_dropped_multicast": true,
"log_dropped_broadcast": false,
"allow_traceroute": true,
"allow_ipv6": true,
"allow_igmp": false,
"track_flow": true,
"system_rule_log_flow": false,
"allow_path_mtu_discovery": true,
"network_detection_mode": "single_private_brn",
"static_policy_scopes": [
[
{ "label": { "href": "/orgs/7/labels/83" } },
{ "label": { "href": "/orgs/7/labels/86" } },
{ "label": { "href": "/orgs/7/labels/94" } }
],
[
{ "label": { "href": "/orgs/7/labels/82" } },
{ "label": { "href": "/orgs/7/labels/100" } },
{ "label": { "href": "/orgs/7/labels/89" } },
{ "label": { "href": "/orgs/7/labels/94" } }
]
],
"secure_connect_certs": {
"default_issuer_name_match": "test",
"scoped_certificates": []
}
}Properties to change the policy update.
Property | Description | Type | Required |
|---|---|---|---|
| A set of up to four labels, one or more of the type Application, Environment, Role, and Location. Each label in the policy scope is identified by its HREF, nested in a JSON array. Before updating the organization policy update mode, make sure you have the exact set of labels you want to use and their HREFs. | JSON array of strings | Yes |
Request Body
This example shows the request body for two policy update scopes. The first has a single label scope, and the second scope has a set of three labels.
{
"static_policy_scopes": [
[
{ "label": { "href": "/orgs/1/labels/8" } }
],
[
{ "label": { "href": "/orgs/1/labels/2" } },
{ "label": { "href": "/orgs/1/labels/8" } },
{ "label": { "href": "/orgs/1/labels/11" } }
]
]
}Curl Command to Update Policy Update Mode
curl -i -X PUT https://pce.my-company.com:8443/api/v2/orgs/7/firewall_settings -H "Content-Type: application/json" -u $KEY:$TOKEN -d '{"static_policy_scopes":[[{"label":{"href":"/orgs/1/labels/8"}}],[{"label":{"href":"/orgs/1/labels/2"}},{"label":{"href":"/orgs/1/labels/8"}},{"label":{"href":"/orgs/1/labels/11"}}]]}' Response
The response for a successful change to your policy update mode is an HTTP 204 No Content Operation. No data is returned.
Curl Command to Remove Static Policy Scopes
curl -i -X PUT https://pce.my-company.com:8443/api/v2/orgs/7/firewall_settings -H "Content-Type: application/json" -u $KEY:$TOKEN -d '{"static_policy_scopes":[]}'