-
Notifications
You must be signed in to change notification settings - Fork 233
/
azure.mgmt.web.v2020_09_01.models.IpSecurityRestriction.yml
151 lines (143 loc) · 6.3 KB
/
azure.mgmt.web.v2020_09_01.models.IpSecurityRestriction.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
### YamlMime:PythonClass
uid: azure.mgmt.web.v2020_09_01.models.IpSecurityRestriction
name: IpSecurityRestriction
fullName: azure.mgmt.web.v2020_09_01.models.IpSecurityRestriction
module: azure.mgmt.web.v2020_09_01.models
inheritances:
- azure.mgmt.web._serialization.Model
summary: IP security restriction on an app.
constructor:
syntax: 'IpSecurityRestriction(*, ip_address: str | None = None, subnet_mask: str
| None = None, vnet_subnet_resource_id: str | None = None, vnet_traffic_tag: int
| None = None, subnet_traffic_tag: int | None = None, action: str | None = None,
tag: str | _models.IpFilterTag | None = None, priority: int | None = None, name:
str | None = None, description: str | None = None, headers: Dict[str, List[str]]
| None = None, **kwargs: Any)'
keywordOnlyParameters:
- name: ip_address
description: 'IP address the security restriction is valid for.
It can be in form of pure ipv4 address (required SubnetMask property) or
CIDR notation such as ipv4/mask (leading bit match). For CIDR,
SubnetMask property must not be specified.'
types:
- <xref:str>
- name: subnet_mask
description: Subnet mask for the range of IP addresses the restriction is valid
for.
types:
- <xref:str>
- name: vnet_subnet_resource_id
description: Virtual network resource id.
types:
- <xref:str>
- name: vnet_traffic_tag
description: (internal) Vnet traffic tag.
types:
- <xref:int>
- name: subnet_traffic_tag
description: (internal) Subnet traffic tag.
types:
- <xref:int>
- name: action
description: Allow or Deny access for this IP range.
types:
- <xref:str>
- name: tag
description: 'Defines what this IP filter will be used for. This is to support
IP filtering on
proxies. Known values are: "Default", "XffProxy", and "ServiceTag".'
types:
- <xref:str>
- <xref:azure.mgmt.web.v2020_09_01.models.IpFilterTag>
- name: priority
description: Priority of IP restriction rule.
types:
- <xref:int>
- name: name
description: IP restriction rule name.
types:
- <xref:str>
- name: description
description: IP restriction rule description.
types:
- <xref:str>
- name: headers
description: "IP restriction rule headers.\nX-Forwarded-Host\n([https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Forwarded-Host#Examples](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Forwarded-Host#Examples)).\n\
The matching logic is ..\n\n* If the property is null or empty (default), all\
\ hosts(or lack of) are allowed. \n\n* A value is compared using ordinal-ignore-case\
\ (excluding port number). \n\n* Subdomain wildcards are permitted but don't\
\ match the root domain. For example, \n\n>>*<<.contoso.com matches the subdomain\
\ foo.contoso.com\n but not the root domain contoso.com or multi-level foo.bar.contoso.com\n\
\n* Unicode host names are allowed but are converted to Punycode for matching.\
\ \n\nX-Forwarded-For\n([https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Forwarded-For#Examples](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Forwarded-For#Examples)).\n\
The matching logic is ..\n\n* If the property is null or empty (default), any\
\ forwarded-for chains (or lack of) are \n\nallowed.\n* If any address (excluding\
\ port number) in the chain (comma separated) matches the CIDR\ndefined by the\
\ property.\n\nX-Azure-FDID and X-FD-HealthProbe.\nThe matching logic is exact\
\ match."
types:
- <xref:dict>[<xref:str>, <xref:list>[<xref:str>]]
variables:
- description: 'IP address the security restriction is valid for.
It can be in form of pure ipv4 address (required SubnetMask property) or
CIDR notation such as ipv4/mask (leading bit match). For CIDR,
SubnetMask property must not be specified.'
name: ip_address
types:
- <xref:str>
- description: Subnet mask for the range of IP addresses the restriction is valid
for.
name: subnet_mask
types:
- <xref:str>
- description: Virtual network resource id.
name: vnet_subnet_resource_id
types:
- <xref:str>
- description: (internal) Vnet traffic tag.
name: vnet_traffic_tag
types:
- <xref:int>
- description: (internal) Subnet traffic tag.
name: subnet_traffic_tag
types:
- <xref:int>
- description: Allow or Deny access for this IP range.
name: action
types:
- <xref:str>
- description: 'Defines what this IP filter will be used for. This is to support IP
filtering on
proxies. Known values are: "Default", "XffProxy", and "ServiceTag".'
name: tag
types:
- <xref:str>
- <xref:azure.mgmt.web.v2020_09_01.models.IpFilterTag>
- description: Priority of IP restriction rule.
name: priority
types:
- <xref:int>
- description: IP restriction rule name.
name: name
types:
- <xref:str>
- description: IP restriction rule description.
name: description
types:
- <xref:str>
- description: "IP restriction rule headers.\nX-Forwarded-Host\n([https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Forwarded-Host#Examples](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Forwarded-Host#Examples)).\n\
The matching logic is ..\n\n* If the property is null or empty (default), all\
\ hosts(or lack of) are allowed. \n\n* A value is compared using ordinal-ignore-case\
\ (excluding port number). \n\n* Subdomain wildcards are permitted but don't match\
\ the root domain. For example, \n\n>>*<<.contoso.com matches the subdomain foo.contoso.com\n\
\ but not the root domain contoso.com or multi-level foo.bar.contoso.com\n\n\
* Unicode host names are allowed but are converted to Punycode for matching. \n\
\nX-Forwarded-For\n([https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Forwarded-For#Examples](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Forwarded-For#Examples)).\n\
The matching logic is ..\n\n* If the property is null or empty (default), any\
\ forwarded-for chains (or lack of) are \n\nallowed.\n* If any address (excluding\
\ port number) in the chain (comma separated) matches the CIDR\ndefined by the\
\ property.\n\nX-Azure-FDID and X-FD-HealthProbe.\nThe matching logic is exact\
\ match."
name: headers
types:
- <xref:dict>[<xref:str>, <xref:list>[<xref:str>]]