InlineLbHttpsMonitor1

InlineLbHttpsMonitor1
InlineLbHttpsMonitor1
JSON Example
{
    "certificate_chain_depth": 0,
    "cipher_group_label": "string",
    "ciphers": [
        "string"
    ],
    "client_certificate_id": "string",
    "is_fips": false,
    "is_secure": false,
    "protocols": [
        "string"
    ],
    "request_body": "string",
    "request_headers": [
        {
            "header_name": "string",
            "header_value": "string"
        }
    ],
    "request_method": "string",
    "request_url": "string",
    "request_version": "string",
    "response_body": "string",
    "response_status_codes": [
        0
    ],
    "server_auth": "string",
    "server_auth_ca_ids": [
        "string"
    ],
    "server_auth_crl_ids": [
        "string"
    ]
}
integer As int64 As int64
certificate_chain_depth
Optional
Constraints: minimum: 1 maximum: 2147483647 default: 3

authentication depth is used to set the verification depth in the server certificates chain.

string
cipher_group_label
Optional

It is a label of cipher group which is mostly consumed by GUI.

Possible values are : BALANCED, HIGH_SECURITY, HIGH_COMPATIBILITY, CUSTOM,
array of string
ciphers
Optional

supported SSL cipher list to servers

Possible values are : TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384,
string
client_certificate_id
Optional

client certificate can be specified to support client authentication.

boolean
is_fips
Optional

This flag is set to true when all the ciphers and protocols are FIPS compliant. It is set to false when one of the ciphers or protocols are not FIPS compliant..

boolean
is_secure
Optional

This flag is set to true when all the ciphers and protocols are secure. It is set to false when one of the ciphers or protocols is insecure.

array of string
protocols
Optional

SSL version TLS1.2 is supported and enabled.

Possible values are : SSL_V2, SSL_V3, TLS_V1, TLS_V1_1, TLS_V1_2,
string
request_body
Optional

String to send as part of HTTP health check request body. Valid only for certain HTTP methods like POST.

request_headers
Optional

Array of HTTP request headers

string
request_method
Optional
Constraints: default: GET

the health check method for HTTP monitor type

Possible values are : GET, OPTIONS, POST, HEAD, PUT,
string
request_url
Optional

URL used for HTTP monitor

string
request_version
Optional
Constraints: default: HTTP_VERSION_1_1

HTTP request version

Possible values are : HTTP_VERSION_1_0, HTTP_VERSION_1_1,
string
response_body
Optional

If HTTP response body match string (regular expressions not supported) is specified (using LbHttpMonitor.response_body) then the healthcheck HTTP response body is matched against the specified string and server is considered healthy only if there is a match. If the response body string is not specified, HTTP healthcheck is considered successful if the HTTP response status code is 2xx, but it can be configured to accept other status codes as successful.

array of integer
response_status_codes
Optional
Constraints: maxItems: 64

The HTTP response status code should be a valid HTTP status code.

string
server_auth
Optional
Constraints: default: IGNORE

server authentication mode

Possible values are : REQUIRED, IGNORE,
array of string
server_auth_ca_ids
Optional

If server auth type is REQUIRED, server certificate must be signed by one of the trusted Certificate Authorities (CAs), also referred to as root CAs, whose self signed certificates are specified.

array of string
server_auth_crl_ids
Optional

A Certificate Revocation List (CRL) can be specified in the server-side SSL profile binding to disallow compromised server certificates.