mirror of
https://github.com/Telecominfraproject/ols-ucentral-schema.git
synced 2026-03-20 03:39:31 +00:00
Compare commits
7 Commits
v3.2.7
...
OLS-556-Sp
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
76cc0646e0 | ||
|
|
ffe61ea929 | ||
|
|
078c2021eb | ||
|
|
6bc313b440 | ||
|
|
69bc3a60b7 | ||
|
|
4f2a23741b | ||
|
|
44c07718e3 |
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
@@ -368,6 +368,31 @@ properties:
|
||||
type: boolean
|
||||
description: Enables the transmission of SNMP trap notifications about LLDP changes.
|
||||
default: false
|
||||
ip-source-guard-port:
|
||||
type: object
|
||||
description: Configuration of IP Source Guard (IPSG) on a physical interface in a Layer 2 switch.
|
||||
properties:
|
||||
rule:
|
||||
type: string
|
||||
description: Configures the switch to filter inbound traffic based on source IP address only,
|
||||
or source IP address and corresponding MAC address combined.
|
||||
enum:
|
||||
- sip
|
||||
- sip-mac
|
||||
mode:
|
||||
type: string
|
||||
description: Specifies the learning mode to use for validation, either MAC address table or ACL table.
|
||||
The system searches for source addresses in the specified table.
|
||||
enum:
|
||||
- mac
|
||||
- acl
|
||||
max-binding:
|
||||
type: integer
|
||||
description: Sets the maximum number of address entries that can be mapped to an interface
|
||||
in the binding table. Includes both static entries and dynamically learned entries
|
||||
via DHCP Snooping.
|
||||
minimum: 1
|
||||
maximum: 65535
|
||||
acl:
|
||||
description: A collection of access control entries that define the rules for filtering traffic through a network port.
|
||||
type: array
|
||||
@@ -447,4 +472,4 @@ properties:
|
||||
description: Specifies DHCP Option 82 circuit ID suboption information. Often including information like the interface number and VLAN ID, this can be useful for network management and troubleshooting
|
||||
type: string
|
||||
minLength: 1
|
||||
maxLength: 32
|
||||
maxLength: 32
|
||||
|
||||
29
schema/switch.ip-source-guard.yml
Normal file
29
schema/switch.ip-source-guard.yml
Normal file
@@ -0,0 +1,29 @@
|
||||
type: object
|
||||
description: Configuration for IP Source Guard global static bindings in a Layer 2 switch.
|
||||
properties:
|
||||
bindings:
|
||||
type: array
|
||||
description: List of static bindings for IP Source Guard.
|
||||
items:
|
||||
type: object
|
||||
properties:
|
||||
binding-mode:
|
||||
type: string
|
||||
description: Specifies the mode for adding a static address to the Source Guard ACL or MAC address binding table. It determines whether the binding is based on MAC addresses or ACLs.
|
||||
enum:
|
||||
- mac
|
||||
- acl
|
||||
binding-mac:
|
||||
type: string
|
||||
format: uc-mac
|
||||
description: A valid unicast MAC address for binding to the Source Guard filtering table.
|
||||
binding-vlans:
|
||||
type: integer
|
||||
description: The VLAN ID associated with the static binding for Source Guard filtering. Must be a valid, configured VLAN on the switch.
|
||||
binding-ip:
|
||||
type: string
|
||||
format: ipv4
|
||||
description: A valid unicast IPv4 address to associate with the Source Guard filtering table.
|
||||
binding-port:
|
||||
type: string
|
||||
description: The physical interface (e.g., ethernet0, ethernet1) where the Source Guard binding applies.
|
||||
162
schema/switch.rtevent.yml
Normal file
162
schema/switch.rtevent.yml
Normal file
@@ -0,0 +1,162 @@
|
||||
description: Configuration for enabling or disabling specific event categories and their sub-events.
|
||||
type: object
|
||||
properties:
|
||||
port-status:
|
||||
description: Enable/Disable Port Status events.
|
||||
type: object
|
||||
properties:
|
||||
enabled:
|
||||
description: Enable/Disable Port Status category.
|
||||
type: boolean
|
||||
default: false
|
||||
sub-events:
|
||||
type: object
|
||||
properties:
|
||||
wired.carrier-down:
|
||||
type: boolean
|
||||
description: Enable/Disable carrier down event.
|
||||
default: false
|
||||
wired.carrier-up:
|
||||
type: boolean
|
||||
description: Enable/Disable carrier up event.
|
||||
default: false
|
||||
module:
|
||||
description: Enable/Disable Module events.
|
||||
type: object
|
||||
properties:
|
||||
enabled:
|
||||
type: boolean
|
||||
description: Enable/Disable Module category.
|
||||
default: false
|
||||
sub-events:
|
||||
type: object
|
||||
properties:
|
||||
module.plugout:
|
||||
type: boolean
|
||||
description: Enable/Disable module plugout event.
|
||||
default: false
|
||||
module.plugin:
|
||||
type: boolean
|
||||
description: Enable/Disable module plugin event.
|
||||
default: false
|
||||
stp:
|
||||
description: Enable/Disable STP events.
|
||||
type: object
|
||||
properties:
|
||||
enabled:
|
||||
type: boolean
|
||||
description: Enable/Disable STP category.
|
||||
default: false
|
||||
sub-events:
|
||||
type: object
|
||||
properties:
|
||||
stp.loop-detected:
|
||||
type: boolean
|
||||
description: Enable/Disable loop detected event.
|
||||
default: false
|
||||
stp.loop-cleared:
|
||||
type: boolean
|
||||
description: Enable/Disable loop cleared event.
|
||||
default: false
|
||||
stp.state-change:
|
||||
type: boolean
|
||||
description: Enable/Disable state change event.
|
||||
default: false
|
||||
rstp:
|
||||
description: Enable/Disable RSTP events.
|
||||
type: object
|
||||
properties:
|
||||
enabled:
|
||||
type: boolean
|
||||
description: Enable/Disable RSTP category.
|
||||
default: false
|
||||
sub-events:
|
||||
type: object
|
||||
properties:
|
||||
rstp.loop-detected:
|
||||
type: boolean
|
||||
description: Enable/Disable loop detected event.
|
||||
default: false
|
||||
rstp.loop-cleared:
|
||||
type: boolean
|
||||
description: Enable/Disable loop cleared event.
|
||||
default: false
|
||||
rstp.state-change:
|
||||
type: boolean
|
||||
description: Enable/Disable state change event.
|
||||
default: false
|
||||
fw-upgrade:
|
||||
description: Enable/Disable Firmware Upgrade events.
|
||||
type: object
|
||||
properties:
|
||||
enabled:
|
||||
type: boolean
|
||||
description: Enable/Disable Firmware Upgrade category.
|
||||
default: false
|
||||
sub-events:
|
||||
type: object
|
||||
properties:
|
||||
upg.download-start:
|
||||
type: boolean
|
||||
description: Enable/Disable download start event.
|
||||
default: false
|
||||
upg.download-in-progress:
|
||||
type: boolean
|
||||
description: Enable/Disable download in progress event.
|
||||
default: false
|
||||
upg.download-failed:
|
||||
type: boolean
|
||||
description: Enable/Disable download failed event.
|
||||
default: false
|
||||
upg.validation-start:
|
||||
type: boolean
|
||||
description: Enable/Disable validation start event.
|
||||
default: false
|
||||
upg.validation-success:
|
||||
type: boolean
|
||||
description: Enable/Disable validation success event.
|
||||
default: false
|
||||
upg.validation-failed:
|
||||
type: boolean
|
||||
description: Enable/Disable validation failed event.
|
||||
default: false
|
||||
upg.backup-current-firmware:
|
||||
type: boolean
|
||||
description: Enable/Disable firmware backup event.
|
||||
default: false
|
||||
upg.install-start:
|
||||
type: boolean
|
||||
description: Enable/Disable install start event.
|
||||
default: false
|
||||
upg.install-failed:
|
||||
type: boolean
|
||||
description: Enable/Disable install failed event.
|
||||
default: false
|
||||
upg.reboot-start:
|
||||
type: boolean
|
||||
description: Enable/Disable reboot start event.
|
||||
default: false
|
||||
upg.success:
|
||||
type: boolean
|
||||
description: Enable/Disable upgrade success event.
|
||||
default: false
|
||||
dhcp-snooping:
|
||||
description: Enable/Disable DHCP Snooping events.
|
||||
type: object
|
||||
properties:
|
||||
enabled:
|
||||
type: boolean
|
||||
description: Enable/Disable DHCP Snooping category.
|
||||
default: false
|
||||
sub-events:
|
||||
type: object
|
||||
properties:
|
||||
dhcp-snooping.violation-detected:
|
||||
type: boolean
|
||||
description: Enable/Disable DHCP Snooping violation detected event.
|
||||
default: false
|
||||
dhcp-snooping.violation-cleared:
|
||||
type: boolean
|
||||
description: Enable/Disable DHCP Snooping violation cleared event.
|
||||
default: false
|
||||
# Continue similarly for ARP Inspection, IPSG, PoE Status, PoE Fault, and Device Events.
|
||||
@@ -1,4 +1,4 @@
|
||||
description:
|
||||
description:
|
||||
This section defines the switch fabric specific features of a physical switch.
|
||||
type: object
|
||||
properties:
|
||||
@@ -537,5 +537,9 @@ properties:
|
||||
minLength: 1
|
||||
examples:
|
||||
- "A VoIP Phone"
|
||||
ip-source-guard:
|
||||
$ref: "https://ucentral.io/schema/v1/switch/ip-source-guard/"
|
||||
rt-events:
|
||||
$ref: "https://ucentral.io/schema/v1/switch/rtevent/"
|
||||
acl:
|
||||
$ref: "https://ucentral.io/schema/v1/switch/acl/"
|
||||
$ref: "https://ucentral.io/schema/v1/switch/acl/"
|
||||
|
||||
@@ -60,3 +60,29 @@ properties:
|
||||
type: string
|
||||
description:
|
||||
Current interface that serves as the Uplink. Example Ethernet2.
|
||||
ip-source-guard:
|
||||
type: object
|
||||
description: Represents the configuration and state of IP Source Guard.
|
||||
properties:
|
||||
blocked-entries:
|
||||
type: array
|
||||
description: Displays a list of entries that are currently blocked by IP Source Guard (IPSG).
|
||||
items:
|
||||
type: object
|
||||
properties:
|
||||
blocked-mac:
|
||||
type: string
|
||||
description: The MAC address that has been blocked by IP Source Guard.
|
||||
format: "mac-address"
|
||||
blocked-ip:
|
||||
type: string
|
||||
description: The IP address that has been blocked by IP Source Guard.
|
||||
format: "ipv4"
|
||||
blocked-vlan:
|
||||
type: integer
|
||||
description: The VLAN ID associated with the blocked IP/MAC entry.
|
||||
minimum: 1
|
||||
maximum: 4095
|
||||
blocked-interface:
|
||||
type: string
|
||||
description: The interface (e.g., port) where the blocked entry was detected.
|
||||
@@ -589,6 +589,34 @@
|
||||
}
|
||||
}
|
||||
},
|
||||
"ip-source-guard-port": {
|
||||
"type": "object",
|
||||
"description": "Configuration of IP Source Guard (IPSG) on a physical interface in a Layer 2 switch.",
|
||||
"properties": {
|
||||
"rule": {
|
||||
"type": "string",
|
||||
"description": "Configures the switch to filter inbound traffic based on source IP address only, or source IP address and corresponding MAC address combined.",
|
||||
"enum": [
|
||||
"sip",
|
||||
"sip-mac"
|
||||
]
|
||||
},
|
||||
"mode": {
|
||||
"type": "string",
|
||||
"description": "Specifies the learning mode to use for validation, either MAC address table or ACL table. The system searches for source addresses in the specified table.",
|
||||
"enum": [
|
||||
"mac",
|
||||
"acl"
|
||||
]
|
||||
},
|
||||
"max-binding": {
|
||||
"type": "integer",
|
||||
"description": "Sets the maximum number of address entries that can be mapped to an interface in the binding table. Includes both static entries and dynamically learned entries via DHCP Snooping.",
|
||||
"minimum": 1,
|
||||
"maximum": 65535
|
||||
}
|
||||
}
|
||||
},
|
||||
"acl": {
|
||||
"description": "A collection of access control entries that define the rules for filtering traffic through a network port.",
|
||||
"type": "array",
|
||||
@@ -1317,6 +1345,264 @@
|
||||
}
|
||||
}
|
||||
},
|
||||
"ip-source-guard": {
|
||||
"type": "object",
|
||||
"description": "Configuration for IP Source Guard global static bindings in a Layer 2 switch.",
|
||||
"properties": {
|
||||
"bindings": {
|
||||
"type": "array",
|
||||
"description": "List of static bindings for IP Source Guard.",
|
||||
"items": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"binding-mode": {
|
||||
"type": "string",
|
||||
"description": "Specifies the mode for adding a static address to the Source Guard ACL or MAC address binding table. It determines whether the binding is based on MAC addresses or ACLs.",
|
||||
"enum": [
|
||||
"mac",
|
||||
"acl"
|
||||
]
|
||||
},
|
||||
"binding-mac": {
|
||||
"type": "string",
|
||||
"format": "uc-mac",
|
||||
"description": "A valid unicast MAC address for binding to the Source Guard filtering table."
|
||||
},
|
||||
"binding-vlans": {
|
||||
"type": "integer",
|
||||
"description": "The VLAN ID associated with the static binding for Source Guard filtering. Must be a valid, configured VLAN on the switch."
|
||||
},
|
||||
"binding-ip": {
|
||||
"type": "string",
|
||||
"format": "ipv4",
|
||||
"description": "A valid unicast IPv4 address to associate with the Source Guard filtering table."
|
||||
},
|
||||
"binding-port": {
|
||||
"type": "string",
|
||||
"description": "The physical interface (e.g., ethernet0, ethernet1) where the Source Guard binding applies."
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"rt-events": {
|
||||
"description": "Configuration for enabling or disabling specific event categories and their sub-events.",
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"port-status": {
|
||||
"description": "Enable/Disable Port Status events.",
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"enabled": {
|
||||
"description": "Enable/Disable Port Status category.",
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
},
|
||||
"sub-events": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"wired.carrier-down": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable carrier down event.",
|
||||
"default": false
|
||||
},
|
||||
"wired.carrier-up": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable carrier up event.",
|
||||
"default": false
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"module": {
|
||||
"description": "Enable/Disable Module events.",
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"enabled": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable Module category.",
|
||||
"default": false
|
||||
},
|
||||
"sub-events": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"module.plugout": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable module plugout event.",
|
||||
"default": false
|
||||
},
|
||||
"module.plugin": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable module plugin event.",
|
||||
"default": false
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"stp": {
|
||||
"description": "Enable/Disable STP events.",
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"enabled": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable STP category.",
|
||||
"default": false
|
||||
},
|
||||
"sub-events": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"stp.loop-detected": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable loop detected event.",
|
||||
"default": false
|
||||
},
|
||||
"stp.loop-cleared": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable loop cleared event.",
|
||||
"default": false
|
||||
},
|
||||
"stp.state-change": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable state change event.",
|
||||
"default": false
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"rstp": {
|
||||
"description": "Enable/Disable RSTP events.",
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"enabled": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable RSTP category.",
|
||||
"default": false
|
||||
},
|
||||
"sub-events": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"rstp.loop-detected": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable loop detected event.",
|
||||
"default": false
|
||||
},
|
||||
"rstp.loop-cleared": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable loop cleared event.",
|
||||
"default": false
|
||||
},
|
||||
"rstp.state-change": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable state change event.",
|
||||
"default": false
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"fw-upgrade": {
|
||||
"description": "Enable/Disable Firmware Upgrade events.",
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"enabled": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable Firmware Upgrade category.",
|
||||
"default": false
|
||||
},
|
||||
"sub-events": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"upg.download-start": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable download start event.",
|
||||
"default": false
|
||||
},
|
||||
"upg.download-in-progress": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable download in progress event.",
|
||||
"default": false
|
||||
},
|
||||
"upg.download-failed": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable download failed event.",
|
||||
"default": false
|
||||
},
|
||||
"upg.validation-start": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable validation start event.",
|
||||
"default": false
|
||||
},
|
||||
"upg.validation-success": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable validation success event.",
|
||||
"default": false
|
||||
},
|
||||
"upg.validation-failed": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable validation failed event.",
|
||||
"default": false
|
||||
},
|
||||
"upg.backup-current-firmware": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable firmware backup event.",
|
||||
"default": false
|
||||
},
|
||||
"upg.install-start": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable install start event.",
|
||||
"default": false
|
||||
},
|
||||
"upg.install-failed": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable install failed event.",
|
||||
"default": false
|
||||
},
|
||||
"upg.reboot-start": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable reboot start event.",
|
||||
"default": false
|
||||
},
|
||||
"upg.success": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable upgrade success event.",
|
||||
"default": false
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"dhcp-snooping": {
|
||||
"description": "Enable/Disable DHCP Snooping events.",
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"enabled": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable DHCP Snooping category.",
|
||||
"default": false
|
||||
},
|
||||
"sub-events": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"dhcp-snooping.violation-detected": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable DHCP Snooping violation detected event.",
|
||||
"default": false
|
||||
},
|
||||
"dhcp-snooping.violation-cleared": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable DHCP Snooping violation cleared event.",
|
||||
"default": false
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"acl": {
|
||||
"description": "Contains all the access control rule definitions",
|
||||
"type": "array",
|
||||
|
||||
@@ -529,6 +529,30 @@
|
||||
}
|
||||
}
|
||||
},
|
||||
"ip-source-guard-port": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"rule": {
|
||||
"type": "string",
|
||||
"enum": [
|
||||
"sip",
|
||||
"sip-mac"
|
||||
]
|
||||
},
|
||||
"mode": {
|
||||
"type": "string",
|
||||
"enum": [
|
||||
"mac",
|
||||
"acl"
|
||||
]
|
||||
},
|
||||
"max-binding": {
|
||||
"type": "integer",
|
||||
"minimum": 1,
|
||||
"maximum": 65535
|
||||
}
|
||||
}
|
||||
},
|
||||
"acl": {
|
||||
"type": "array",
|
||||
"items": {
|
||||
@@ -619,6 +643,221 @@
|
||||
}
|
||||
}
|
||||
},
|
||||
"switch.ip-source-guard": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"bindings": {
|
||||
"type": "array",
|
||||
"items": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"binding-mode": {
|
||||
"type": "string",
|
||||
"enum": [
|
||||
"mac",
|
||||
"acl"
|
||||
]
|
||||
},
|
||||
"binding-mac": {
|
||||
"type": "string",
|
||||
"format": "uc-mac"
|
||||
},
|
||||
"binding-vlans": {
|
||||
"type": "integer"
|
||||
},
|
||||
"binding-ip": {
|
||||
"type": "string",
|
||||
"format": "ipv4"
|
||||
},
|
||||
"binding-port": {
|
||||
"type": "string"
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"switch.rtevent": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"port-status": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"enabled": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
},
|
||||
"sub-events": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"wired.carrier-down": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
},
|
||||
"wired.carrier-up": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"module": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"enabled": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
},
|
||||
"sub-events": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"module.plugout": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
},
|
||||
"module.plugin": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"stp": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"enabled": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
},
|
||||
"sub-events": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"stp.loop-detected": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
},
|
||||
"stp.loop-cleared": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
},
|
||||
"stp.state-change": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"rstp": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"enabled": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
},
|
||||
"sub-events": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"rstp.loop-detected": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
},
|
||||
"rstp.loop-cleared": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
},
|
||||
"rstp.state-change": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"fw-upgrade": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"enabled": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
},
|
||||
"sub-events": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"upg.download-start": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
},
|
||||
"upg.download-in-progress": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
},
|
||||
"upg.download-failed": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
},
|
||||
"upg.validation-start": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
},
|
||||
"upg.validation-success": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
},
|
||||
"upg.validation-failed": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
},
|
||||
"upg.backup-current-firmware": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
},
|
||||
"upg.install-start": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
},
|
||||
"upg.install-failed": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
},
|
||||
"upg.reboot-start": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
},
|
||||
"upg.success": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"dhcp-snooping": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"enabled": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
},
|
||||
"sub-events": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"dhcp-snooping.violation-detected": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
},
|
||||
"dhcp-snooping.violation-cleared": {
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"switch.acl": {
|
||||
"type": "array",
|
||||
"uniqueItems": true,
|
||||
@@ -1265,6 +1504,12 @@
|
||||
}
|
||||
}
|
||||
},
|
||||
"ip-source-guard": {
|
||||
"$ref": "#/$defs/switch.ip-source-guard"
|
||||
},
|
||||
"rt-events": {
|
||||
"$ref": "#/$defs/switch.rtevent"
|
||||
},
|
||||
"acl": {
|
||||
"$ref": "#/$defs/switch.acl"
|
||||
}
|
||||
|
||||
@@ -623,6 +623,34 @@
|
||||
}
|
||||
}
|
||||
},
|
||||
"ip-source-guard-port": {
|
||||
"type": "object",
|
||||
"description": "Configuration of IP Source Guard (IPSG) on a physical interface in a Layer 2 switch.",
|
||||
"properties": {
|
||||
"rule": {
|
||||
"type": "string",
|
||||
"description": "Configures the switch to filter inbound traffic based on source IP address only, or source IP address and corresponding MAC address combined.",
|
||||
"enum": [
|
||||
"sip",
|
||||
"sip-mac"
|
||||
]
|
||||
},
|
||||
"mode": {
|
||||
"type": "string",
|
||||
"description": "Specifies the learning mode to use for validation, either MAC address table or ACL table. The system searches for source addresses in the specified table.",
|
||||
"enum": [
|
||||
"mac",
|
||||
"acl"
|
||||
]
|
||||
},
|
||||
"max-binding": {
|
||||
"type": "integer",
|
||||
"description": "Sets the maximum number of address entries that can be mapped to an interface in the binding table. Includes both static entries and dynamically learned entries via DHCP Snooping.",
|
||||
"minimum": 1,
|
||||
"maximum": 65535
|
||||
}
|
||||
}
|
||||
},
|
||||
"acl": {
|
||||
"description": "A collection of access control entries that define the rules for filtering traffic through a network port.",
|
||||
"type": "array",
|
||||
@@ -728,6 +756,264 @@
|
||||
}
|
||||
}
|
||||
},
|
||||
"switch.ip-source-guard": {
|
||||
"type": "object",
|
||||
"description": "Configuration for IP Source Guard global static bindings in a Layer 2 switch.",
|
||||
"properties": {
|
||||
"bindings": {
|
||||
"type": "array",
|
||||
"description": "List of static bindings for IP Source Guard.",
|
||||
"items": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"binding-mode": {
|
||||
"type": "string",
|
||||
"description": "Specifies the mode for adding a static address to the Source Guard ACL or MAC address binding table. It determines whether the binding is based on MAC addresses or ACLs.",
|
||||
"enum": [
|
||||
"mac",
|
||||
"acl"
|
||||
]
|
||||
},
|
||||
"binding-mac": {
|
||||
"type": "string",
|
||||
"format": "uc-mac",
|
||||
"description": "A valid unicast MAC address for binding to the Source Guard filtering table."
|
||||
},
|
||||
"binding-vlans": {
|
||||
"type": "integer",
|
||||
"description": "The VLAN ID associated with the static binding for Source Guard filtering. Must be a valid, configured VLAN on the switch."
|
||||
},
|
||||
"binding-ip": {
|
||||
"type": "string",
|
||||
"format": "ipv4",
|
||||
"description": "A valid unicast IPv4 address to associate with the Source Guard filtering table."
|
||||
},
|
||||
"binding-port": {
|
||||
"type": "string",
|
||||
"description": "The physical interface (e.g., ethernet0, ethernet1) where the Source Guard binding applies."
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"switch.rtevent": {
|
||||
"description": "Configuration for enabling or disabling specific event categories and their sub-events.",
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"port-status": {
|
||||
"description": "Enable/Disable Port Status events.",
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"enabled": {
|
||||
"description": "Enable/Disable Port Status category.",
|
||||
"type": "boolean",
|
||||
"default": false
|
||||
},
|
||||
"sub-events": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"wired.carrier-down": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable carrier down event.",
|
||||
"default": false
|
||||
},
|
||||
"wired.carrier-up": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable carrier up event.",
|
||||
"default": false
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"module": {
|
||||
"description": "Enable/Disable Module events.",
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"enabled": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable Module category.",
|
||||
"default": false
|
||||
},
|
||||
"sub-events": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"module.plugout": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable module plugout event.",
|
||||
"default": false
|
||||
},
|
||||
"module.plugin": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable module plugin event.",
|
||||
"default": false
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"stp": {
|
||||
"description": "Enable/Disable STP events.",
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"enabled": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable STP category.",
|
||||
"default": false
|
||||
},
|
||||
"sub-events": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"stp.loop-detected": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable loop detected event.",
|
||||
"default": false
|
||||
},
|
||||
"stp.loop-cleared": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable loop cleared event.",
|
||||
"default": false
|
||||
},
|
||||
"stp.state-change": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable state change event.",
|
||||
"default": false
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"rstp": {
|
||||
"description": "Enable/Disable RSTP events.",
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"enabled": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable RSTP category.",
|
||||
"default": false
|
||||
},
|
||||
"sub-events": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"rstp.loop-detected": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable loop detected event.",
|
||||
"default": false
|
||||
},
|
||||
"rstp.loop-cleared": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable loop cleared event.",
|
||||
"default": false
|
||||
},
|
||||
"rstp.state-change": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable state change event.",
|
||||
"default": false
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"fw-upgrade": {
|
||||
"description": "Enable/Disable Firmware Upgrade events.",
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"enabled": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable Firmware Upgrade category.",
|
||||
"default": false
|
||||
},
|
||||
"sub-events": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"upg.download-start": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable download start event.",
|
||||
"default": false
|
||||
},
|
||||
"upg.download-in-progress": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable download in progress event.",
|
||||
"default": false
|
||||
},
|
||||
"upg.download-failed": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable download failed event.",
|
||||
"default": false
|
||||
},
|
||||
"upg.validation-start": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable validation start event.",
|
||||
"default": false
|
||||
},
|
||||
"upg.validation-success": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable validation success event.",
|
||||
"default": false
|
||||
},
|
||||
"upg.validation-failed": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable validation failed event.",
|
||||
"default": false
|
||||
},
|
||||
"upg.backup-current-firmware": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable firmware backup event.",
|
||||
"default": false
|
||||
},
|
||||
"upg.install-start": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable install start event.",
|
||||
"default": false
|
||||
},
|
||||
"upg.install-failed": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable install failed event.",
|
||||
"default": false
|
||||
},
|
||||
"upg.reboot-start": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable reboot start event.",
|
||||
"default": false
|
||||
},
|
||||
"upg.success": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable upgrade success event.",
|
||||
"default": false
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"dhcp-snooping": {
|
||||
"description": "Enable/Disable DHCP Snooping events.",
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"enabled": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable DHCP Snooping category.",
|
||||
"default": false
|
||||
},
|
||||
"sub-events": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"dhcp-snooping.violation-detected": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable DHCP Snooping violation detected event.",
|
||||
"default": false
|
||||
},
|
||||
"dhcp-snooping.violation-cleared": {
|
||||
"type": "boolean",
|
||||
"description": "Enable/Disable DHCP Snooping violation cleared event.",
|
||||
"default": false
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"switch.acl": {
|
||||
"description": "Contains all the access control rule definitions",
|
||||
"type": "array",
|
||||
@@ -1490,6 +1776,12 @@
|
||||
}
|
||||
}
|
||||
},
|
||||
"ip-source-guard": {
|
||||
"$ref": "#/$defs/switch.ip-source-guard"
|
||||
},
|
||||
"rt-events": {
|
||||
"$ref": "#/$defs/switch.rtevent"
|
||||
},
|
||||
"acl": {
|
||||
"$ref": "#/$defs/switch.acl"
|
||||
}
|
||||
|
||||
@@ -85,6 +85,41 @@
|
||||
"uplink_interface": {
|
||||
"type": "string",
|
||||
"description": "Current interface that serves as the Uplink. Example Ethernet2."
|
||||
},
|
||||
"ip-source-guard": {
|
||||
"type": "object",
|
||||
"description": "Represents the configuration and state of IP Source Guard.",
|
||||
"properties": {
|
||||
"blocked-entries": {
|
||||
"type": "array",
|
||||
"description": "Displays a list of entries that are currently blocked by IP Source Guard (IPSG).",
|
||||
"items": {
|
||||
"type": "object",
|
||||
"properties": {
|
||||
"blocked-mac": {
|
||||
"type": "string",
|
||||
"description": "The MAC address that has been blocked by IP Source Guard.",
|
||||
"format": "mac-address"
|
||||
},
|
||||
"blocked-ip": {
|
||||
"type": "string",
|
||||
"description": "The IP address that has been blocked by IP Source Guard.",
|
||||
"format": "ipv4"
|
||||
},
|
||||
"blocked-vlan": {
|
||||
"type": "integer",
|
||||
"description": "The VLAN ID associated with the blocked IP/MAC entry.",
|
||||
"minimum": 1,
|
||||
"maximum": 4095
|
||||
},
|
||||
"blocked-interface": {
|
||||
"type": "string",
|
||||
"description": "The interface (e.g., port) where the blocked entry was detected."
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
},
|
||||
"$defs": {
|
||||
|
||||
Reference in New Issue
Block a user