oci.NetworkFirewall.NetworkFirewallPolicySecurityRule
Explore with Pulumi AI
This resource provides the Network Firewall Policy Security Rule resource in Oracle Cloud Infrastructure Network Firewall service.
Creates a new Security Rule for the Network Firewall Policy.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as oci from "@pulumi/oci";
const testNetworkFirewallPolicySecurityRule = new oci.networkfirewall.NetworkFirewallPolicySecurityRule("test_network_firewall_policy_security_rule", {
action: networkFirewallPolicySecurityRuleAction,
name: networkFirewallPolicySecurityRuleName,
condition: {
applications: networkFirewallPolicySecurityRuleConditionApplication,
destinationAddresses: networkFirewallPolicySecurityRuleConditionDestinationAddress,
services: networkFirewallPolicySecurityRuleConditionService,
sourceAddresses: networkFirewallPolicySecurityRuleConditionSourceAddress,
urls: networkFirewallPolicySecurityRuleConditionUrl,
},
networkFirewallPolicyId: testNetworkFirewallPolicy.id,
inspection: networkFirewallPolicySecurityRuleInspection,
positions: [{
afterRule: networkFirewallPolicySecurityRulePositionAfterRule,
beforeRule: networkFirewallPolicySecurityRulePositionBeforeRule,
}],
});
import pulumi
import pulumi_oci as oci
test_network_firewall_policy_security_rule = oci.network_firewall.NetworkFirewallPolicySecurityRule("test_network_firewall_policy_security_rule",
action=network_firewall_policy_security_rule_action,
name=network_firewall_policy_security_rule_name,
condition={
"applications": network_firewall_policy_security_rule_condition_application,
"destination_addresses": network_firewall_policy_security_rule_condition_destination_address,
"services": network_firewall_policy_security_rule_condition_service,
"source_addresses": network_firewall_policy_security_rule_condition_source_address,
"urls": network_firewall_policy_security_rule_condition_url,
},
network_firewall_policy_id=test_network_firewall_policy["id"],
inspection=network_firewall_policy_security_rule_inspection,
positions=[{
"after_rule": network_firewall_policy_security_rule_position_after_rule,
"before_rule": network_firewall_policy_security_rule_position_before_rule,
}])
package main
import (
"github.com/pulumi/pulumi-oci/sdk/v2/go/oci/NetworkFirewall"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := NetworkFirewall.NewNetworkFirewallPolicySecurityRule(ctx, "test_network_firewall_policy_security_rule", &NetworkFirewall.NetworkFirewallPolicySecurityRuleArgs{
Action: pulumi.Any(networkFirewallPolicySecurityRuleAction),
Name: pulumi.Any(networkFirewallPolicySecurityRuleName),
Condition: &networkfirewall.NetworkFirewallPolicySecurityRuleConditionArgs{
Applications: pulumi.Any(networkFirewallPolicySecurityRuleConditionApplication),
DestinationAddresses: pulumi.Any(networkFirewallPolicySecurityRuleConditionDestinationAddress),
Services: pulumi.Any(networkFirewallPolicySecurityRuleConditionService),
SourceAddresses: pulumi.Any(networkFirewallPolicySecurityRuleConditionSourceAddress),
Urls: pulumi.Any(networkFirewallPolicySecurityRuleConditionUrl),
},
NetworkFirewallPolicyId: pulumi.Any(testNetworkFirewallPolicy.Id),
Inspection: pulumi.Any(networkFirewallPolicySecurityRuleInspection),
Positions: networkfirewall.NetworkFirewallPolicySecurityRulePositionArray{
&networkfirewall.NetworkFirewallPolicySecurityRulePositionArgs{
AfterRule: pulumi.Any(networkFirewallPolicySecurityRulePositionAfterRule),
BeforeRule: pulumi.Any(networkFirewallPolicySecurityRulePositionBeforeRule),
},
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Oci = Pulumi.Oci;
return await Deployment.RunAsync(() =>
{
var testNetworkFirewallPolicySecurityRule = new Oci.NetworkFirewall.NetworkFirewallPolicySecurityRule("test_network_firewall_policy_security_rule", new()
{
Action = networkFirewallPolicySecurityRuleAction,
Name = networkFirewallPolicySecurityRuleName,
Condition = new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicySecurityRuleConditionArgs
{
Applications = networkFirewallPolicySecurityRuleConditionApplication,
DestinationAddresses = networkFirewallPolicySecurityRuleConditionDestinationAddress,
Services = networkFirewallPolicySecurityRuleConditionService,
SourceAddresses = networkFirewallPolicySecurityRuleConditionSourceAddress,
Urls = networkFirewallPolicySecurityRuleConditionUrl,
},
NetworkFirewallPolicyId = testNetworkFirewallPolicy.Id,
Inspection = networkFirewallPolicySecurityRuleInspection,
Positions = new[]
{
new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicySecurityRulePositionArgs
{
AfterRule = networkFirewallPolicySecurityRulePositionAfterRule,
BeforeRule = networkFirewallPolicySecurityRulePositionBeforeRule,
},
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.oci.NetworkFirewall.NetworkFirewallPolicySecurityRule;
import com.pulumi.oci.NetworkFirewall.NetworkFirewallPolicySecurityRuleArgs;
import com.pulumi.oci.NetworkFirewall.inputs.NetworkFirewallPolicySecurityRuleConditionArgs;
import com.pulumi.oci.NetworkFirewall.inputs.NetworkFirewallPolicySecurityRulePositionArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var testNetworkFirewallPolicySecurityRule = new NetworkFirewallPolicySecurityRule("testNetworkFirewallPolicySecurityRule", NetworkFirewallPolicySecurityRuleArgs.builder()
.action(networkFirewallPolicySecurityRuleAction)
.name(networkFirewallPolicySecurityRuleName)
.condition(NetworkFirewallPolicySecurityRuleConditionArgs.builder()
.applications(networkFirewallPolicySecurityRuleConditionApplication)
.destinationAddresses(networkFirewallPolicySecurityRuleConditionDestinationAddress)
.services(networkFirewallPolicySecurityRuleConditionService)
.sourceAddresses(networkFirewallPolicySecurityRuleConditionSourceAddress)
.urls(networkFirewallPolicySecurityRuleConditionUrl)
.build())
.networkFirewallPolicyId(testNetworkFirewallPolicy.id())
.inspection(networkFirewallPolicySecurityRuleInspection)
.positions(NetworkFirewallPolicySecurityRulePositionArgs.builder()
.afterRule(networkFirewallPolicySecurityRulePositionAfterRule)
.beforeRule(networkFirewallPolicySecurityRulePositionBeforeRule)
.build())
.build());
}
}
resources:
testNetworkFirewallPolicySecurityRule:
type: oci:NetworkFirewall:NetworkFirewallPolicySecurityRule
name: test_network_firewall_policy_security_rule
properties:
action: ${networkFirewallPolicySecurityRuleAction}
name: ${networkFirewallPolicySecurityRuleName}
condition:
applications: ${networkFirewallPolicySecurityRuleConditionApplication}
destinationAddresses: ${networkFirewallPolicySecurityRuleConditionDestinationAddress}
services: ${networkFirewallPolicySecurityRuleConditionService}
sourceAddresses: ${networkFirewallPolicySecurityRuleConditionSourceAddress}
urls: ${networkFirewallPolicySecurityRuleConditionUrl}
networkFirewallPolicyId: ${testNetworkFirewallPolicy.id}
inspection: ${networkFirewallPolicySecurityRuleInspection}
positions:
- afterRule: ${networkFirewallPolicySecurityRulePositionAfterRule}
beforeRule: ${networkFirewallPolicySecurityRulePositionBeforeRule}
Create NetworkFirewallPolicySecurityRule Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new NetworkFirewallPolicySecurityRule(name: string, args: NetworkFirewallPolicySecurityRuleArgs, opts?: CustomResourceOptions);
@overload
def NetworkFirewallPolicySecurityRule(resource_name: str,
args: NetworkFirewallPolicySecurityRuleArgs,
opts: Optional[ResourceOptions] = None)
@overload
def NetworkFirewallPolicySecurityRule(resource_name: str,
opts: Optional[ResourceOptions] = None,
action: Optional[str] = None,
condition: Optional[_networkfirewall.NetworkFirewallPolicySecurityRuleConditionArgs] = None,
network_firewall_policy_id: Optional[str] = None,
inspection: Optional[str] = None,
name: Optional[str] = None,
positions: Optional[Sequence[_networkfirewall.NetworkFirewallPolicySecurityRulePositionArgs]] = None,
priority_order: Optional[str] = None)
func NewNetworkFirewallPolicySecurityRule(ctx *Context, name string, args NetworkFirewallPolicySecurityRuleArgs, opts ...ResourceOption) (*NetworkFirewallPolicySecurityRule, error)
public NetworkFirewallPolicySecurityRule(string name, NetworkFirewallPolicySecurityRuleArgs args, CustomResourceOptions? opts = null)
public NetworkFirewallPolicySecurityRule(String name, NetworkFirewallPolicySecurityRuleArgs args)
public NetworkFirewallPolicySecurityRule(String name, NetworkFirewallPolicySecurityRuleArgs args, CustomResourceOptions options)
type: oci:NetworkFirewall:NetworkFirewallPolicySecurityRule
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args NetworkFirewallPolicySecurityRuleArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args NetworkFirewallPolicySecurityRuleArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args NetworkFirewallPolicySecurityRuleArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args NetworkFirewallPolicySecurityRuleArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args NetworkFirewallPolicySecurityRuleArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var networkFirewallPolicySecurityRuleResource = new Oci.NetworkFirewall.NetworkFirewallPolicySecurityRule("networkFirewallPolicySecurityRuleResource", new()
{
Action = "string",
Condition = new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicySecurityRuleConditionArgs
{
Applications = new[]
{
"string",
},
DestinationAddresses = new[]
{
"string",
},
Services = new[]
{
"string",
},
SourceAddresses = new[]
{
"string",
},
Urls = new[]
{
"string",
},
},
NetworkFirewallPolicyId = "string",
Inspection = "string",
Name = "string",
Positions = new[]
{
new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicySecurityRulePositionArgs
{
AfterRule = "string",
BeforeRule = "string",
},
},
PriorityOrder = "string",
});
example, err := NetworkFirewall.NewNetworkFirewallPolicySecurityRule(ctx, "networkFirewallPolicySecurityRuleResource", &NetworkFirewall.NetworkFirewallPolicySecurityRuleArgs{
Action: pulumi.String("string"),
Condition: &networkfirewall.NetworkFirewallPolicySecurityRuleConditionArgs{
Applications: pulumi.StringArray{
pulumi.String("string"),
},
DestinationAddresses: pulumi.StringArray{
pulumi.String("string"),
},
Services: pulumi.StringArray{
pulumi.String("string"),
},
SourceAddresses: pulumi.StringArray{
pulumi.String("string"),
},
Urls: pulumi.StringArray{
pulumi.String("string"),
},
},
NetworkFirewallPolicyId: pulumi.String("string"),
Inspection: pulumi.String("string"),
Name: pulumi.String("string"),
Positions: networkfirewall.NetworkFirewallPolicySecurityRulePositionArray{
&networkfirewall.NetworkFirewallPolicySecurityRulePositionArgs{
AfterRule: pulumi.String("string"),
BeforeRule: pulumi.String("string"),
},
},
PriorityOrder: pulumi.String("string"),
})
var networkFirewallPolicySecurityRuleResource = new NetworkFirewallPolicySecurityRule("networkFirewallPolicySecurityRuleResource", NetworkFirewallPolicySecurityRuleArgs.builder()
.action("string")
.condition(NetworkFirewallPolicySecurityRuleConditionArgs.builder()
.applications("string")
.destinationAddresses("string")
.services("string")
.sourceAddresses("string")
.urls("string")
.build())
.networkFirewallPolicyId("string")
.inspection("string")
.name("string")
.positions(NetworkFirewallPolicySecurityRulePositionArgs.builder()
.afterRule("string")
.beforeRule("string")
.build())
.priorityOrder("string")
.build());
network_firewall_policy_security_rule_resource = oci.network_firewall.NetworkFirewallPolicySecurityRule("networkFirewallPolicySecurityRuleResource",
action="string",
condition=oci.network_firewall.NetworkFirewallPolicySecurityRuleConditionArgs(
applications=["string"],
destination_addresses=["string"],
services=["string"],
source_addresses=["string"],
urls=["string"],
),
network_firewall_policy_id="string",
inspection="string",
name="string",
positions=[oci.network_firewall.NetworkFirewallPolicySecurityRulePositionArgs(
after_rule="string",
before_rule="string",
)],
priority_order="string")
const networkFirewallPolicySecurityRuleResource = new oci.networkfirewall.NetworkFirewallPolicySecurityRule("networkFirewallPolicySecurityRuleResource", {
action: "string",
condition: {
applications: ["string"],
destinationAddresses: ["string"],
services: ["string"],
sourceAddresses: ["string"],
urls: ["string"],
},
networkFirewallPolicyId: "string",
inspection: "string",
name: "string",
positions: [{
afterRule: "string",
beforeRule: "string",
}],
priorityOrder: "string",
});
type: oci:NetworkFirewall:NetworkFirewallPolicySecurityRule
properties:
action: string
condition:
applications:
- string
destinationAddresses:
- string
services:
- string
sourceAddresses:
- string
urls:
- string
inspection: string
name: string
networkFirewallPolicyId: string
positions:
- afterRule: string
beforeRule: string
priorityOrder: string
NetworkFirewallPolicySecurityRule Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The NetworkFirewallPolicySecurityRule resource accepts the following input properties:
- Action string
- (Updatable) Types of Action on the Traffic flow.
- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in
inspection
, which may result in rejection.
- Condition
Network
Firewall Policy Security Rule Condition - (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
- Network
Firewall stringPolicy Id - Unique Network Firewall Policy identifier
- Inspection string
- (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.
- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in
type
.
- Name string
- Name for the Security rule, must be unique within the policy.
- Positions
List<Network
Firewall Policy Security Rule Position> - (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
- Priority
Order string
- Action string
- (Updatable) Types of Action on the Traffic flow.
- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in
inspection
, which may result in rejection.
- Condition
Network
Firewall Policy Security Rule Condition Args - (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
- Network
Firewall stringPolicy Id - Unique Network Firewall Policy identifier
- Inspection string
- (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.
- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in
type
.
- Name string
- Name for the Security rule, must be unique within the policy.
- Positions
[]Network
Firewall Policy Security Rule Position Args - (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
- Priority
Order string
- action String
- (Updatable) Types of Action on the Traffic flow.
- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in
inspection
, which may result in rejection.
- condition
Policy
Security Rule Condition - (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
- network
Firewall StringPolicy Id - Unique Network Firewall Policy identifier
- inspection String
- (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.
- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in
type
.
- name String
- Name for the Security rule, must be unique within the policy.
- positions
List<Policy
Security Rule Position> - (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
- priority
Order String
- action string
- (Updatable) Types of Action on the Traffic flow.
- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in
inspection
, which may result in rejection.
- condition
Network
Firewall Policy Security Rule Condition - (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
- network
Firewall stringPolicy Id - Unique Network Firewall Policy identifier
- inspection string
- (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.
- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in
type
.
- name string
- Name for the Security rule, must be unique within the policy.
- positions
Network
Firewall Policy Security Rule Position[] - (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
- priority
Order string
- action str
- (Updatable) Types of Action on the Traffic flow.
- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in
inspection
, which may result in rejection.
- condition
networkfirewall.
Network Firewall Policy Security Rule Condition Args - (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
- network_
firewall_ strpolicy_ id - Unique Network Firewall Policy identifier
- inspection str
- (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.
- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in
type
.
- name str
- Name for the Security rule, must be unique within the policy.
- positions
Sequence[networkfirewall.
Network Firewall Policy Security Rule Position Args] - (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
- priority_
order str
- action String
- (Updatable) Types of Action on the Traffic flow.
- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in
inspection
, which may result in rejection.
- condition Property Map
- (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
- network
Firewall StringPolicy Id - Unique Network Firewall Policy identifier
- inspection String
- (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.
- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in
type
.
- name String
- Name for the Security rule, must be unique within the policy.
- positions List<Property Map>
- (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
- priority
Order String
Outputs
All input properties are implicitly available as output properties. Additionally, the NetworkFirewallPolicySecurityRule resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Parent
Resource stringId - OCID of the Network Firewall Policy this security rule belongs to.
- Id string
- The provider-assigned unique ID for this managed resource.
- Parent
Resource stringId - OCID of the Network Firewall Policy this security rule belongs to.
- id String
- The provider-assigned unique ID for this managed resource.
- parent
Resource StringId - OCID of the Network Firewall Policy this security rule belongs to.
- id string
- The provider-assigned unique ID for this managed resource.
- parent
Resource stringId - OCID of the Network Firewall Policy this security rule belongs to.
- id str
- The provider-assigned unique ID for this managed resource.
- parent_
resource_ strid - OCID of the Network Firewall Policy this security rule belongs to.
- id String
- The provider-assigned unique ID for this managed resource.
- parent
Resource StringId - OCID of the Network Firewall Policy this security rule belongs to.
Look up Existing NetworkFirewallPolicySecurityRule Resource
Get an existing NetworkFirewallPolicySecurityRule resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: NetworkFirewallPolicySecurityRuleState, opts?: CustomResourceOptions): NetworkFirewallPolicySecurityRule
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
action: Optional[str] = None,
condition: Optional[_networkfirewall.NetworkFirewallPolicySecurityRuleConditionArgs] = None,
inspection: Optional[str] = None,
name: Optional[str] = None,
network_firewall_policy_id: Optional[str] = None,
parent_resource_id: Optional[str] = None,
positions: Optional[Sequence[_networkfirewall.NetworkFirewallPolicySecurityRulePositionArgs]] = None,
priority_order: Optional[str] = None) -> NetworkFirewallPolicySecurityRule
func GetNetworkFirewallPolicySecurityRule(ctx *Context, name string, id IDInput, state *NetworkFirewallPolicySecurityRuleState, opts ...ResourceOption) (*NetworkFirewallPolicySecurityRule, error)
public static NetworkFirewallPolicySecurityRule Get(string name, Input<string> id, NetworkFirewallPolicySecurityRuleState? state, CustomResourceOptions? opts = null)
public static NetworkFirewallPolicySecurityRule get(String name, Output<String> id, NetworkFirewallPolicySecurityRuleState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Action string
- (Updatable) Types of Action on the Traffic flow.
- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in
inspection
, which may result in rejection.
- Condition
Network
Firewall Policy Security Rule Condition - (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
- Inspection string
- (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.
- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in
type
.
- Name string
- Name for the Security rule, must be unique within the policy.
- Network
Firewall stringPolicy Id - Unique Network Firewall Policy identifier
- Parent
Resource stringId - OCID of the Network Firewall Policy this security rule belongs to.
- Positions
List<Network
Firewall Policy Security Rule Position> - (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
- Priority
Order string
- Action string
- (Updatable) Types of Action on the Traffic flow.
- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in
inspection
, which may result in rejection.
- Condition
Network
Firewall Policy Security Rule Condition Args - (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
- Inspection string
- (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.
- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in
type
.
- Name string
- Name for the Security rule, must be unique within the policy.
- Network
Firewall stringPolicy Id - Unique Network Firewall Policy identifier
- Parent
Resource stringId - OCID of the Network Firewall Policy this security rule belongs to.
- Positions
[]Network
Firewall Policy Security Rule Position Args - (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
- Priority
Order string
- action String
- (Updatable) Types of Action on the Traffic flow.
- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in
inspection
, which may result in rejection.
- condition
Policy
Security Rule Condition - (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
- inspection String
- (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.
- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in
type
.
- name String
- Name for the Security rule, must be unique within the policy.
- network
Firewall StringPolicy Id - Unique Network Firewall Policy identifier
- parent
Resource StringId - OCID of the Network Firewall Policy this security rule belongs to.
- positions
List<Policy
Security Rule Position> - (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
- priority
Order String
- action string
- (Updatable) Types of Action on the Traffic flow.
- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in
inspection
, which may result in rejection.
- condition
Network
Firewall Policy Security Rule Condition - (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
- inspection string
- (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.
- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in
type
.
- name string
- Name for the Security rule, must be unique within the policy.
- network
Firewall stringPolicy Id - Unique Network Firewall Policy identifier
- parent
Resource stringId - OCID of the Network Firewall Policy this security rule belongs to.
- positions
Network
Firewall Policy Security Rule Position[] - (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
- priority
Order string
- action str
- (Updatable) Types of Action on the Traffic flow.
- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in
inspection
, which may result in rejection.
- condition
networkfirewall.
Network Firewall Policy Security Rule Condition Args - (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
- inspection str
- (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.
- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in
type
.
- name str
- Name for the Security rule, must be unique within the policy.
- network_
firewall_ strpolicy_ id - Unique Network Firewall Policy identifier
- parent_
resource_ strid - OCID of the Network Firewall Policy this security rule belongs to.
- positions
Sequence[networkfirewall.
Network Firewall Policy Security Rule Position Args] - (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
- priority_
order str
- action String
- (Updatable) Types of Action on the Traffic flow.
- ALLOW - Allows the traffic.
- DROP - Silently drops the traffic, e.g. without sending a TCP reset.
- REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
- INSPECT - Inspects traffic for vulnerability as specified in
inspection
, which may result in rejection.
- condition Property Map
- (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
- inspection String
- (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.
- INTRUSION_DETECTION - Intrusion Detection.
- INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in
type
.
- name String
- Name for the Security rule, must be unique within the policy.
- network
Firewall StringPolicy Id - Unique Network Firewall Policy identifier
- parent
Resource StringId - OCID of the Network Firewall Policy this security rule belongs to.
- positions List<Property Map>
- (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
- priority
Order String
Supporting Types
NetworkFirewallPolicySecurityRuleCondition, NetworkFirewallPolicySecurityRuleConditionArgs
- Applications List<string>
- (Updatable) An array of application group names to be evaluated against the traffic protocol and protocol-specific parameters.
- Destination
Addresses List<string> - (Updatable) An array of address list names to be evaluated against the traffic destination address.
- Services List<string>
- (Updatable) An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
- Source
Addresses List<string> - (Updatable) An array of address list names to be evaluated against the traffic source address.
- Urls List<string>
- (Updatable) An array of URL list names to be evaluated against the HTTP(S) request target.
- Applications []string
- (Updatable) An array of application group names to be evaluated against the traffic protocol and protocol-specific parameters.
- Destination
Addresses []string - (Updatable) An array of address list names to be evaluated against the traffic destination address.
- Services []string
- (Updatable) An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
- Source
Addresses []string - (Updatable) An array of address list names to be evaluated against the traffic source address.
- Urls []string
- (Updatable) An array of URL list names to be evaluated against the HTTP(S) request target.
- applications List<String>
- (Updatable) An array of application group names to be evaluated against the traffic protocol and protocol-specific parameters.
- destination
Addresses List<String> - (Updatable) An array of address list names to be evaluated against the traffic destination address.
- services List<String>
- (Updatable) An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
- source
Addresses List<String> - (Updatable) An array of address list names to be evaluated against the traffic source address.
- urls List<String>
- (Updatable) An array of URL list names to be evaluated against the HTTP(S) request target.
- applications string[]
- (Updatable) An array of application group names to be evaluated against the traffic protocol and protocol-specific parameters.
- destination
Addresses string[] - (Updatable) An array of address list names to be evaluated against the traffic destination address.
- services string[]
- (Updatable) An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
- source
Addresses string[] - (Updatable) An array of address list names to be evaluated against the traffic source address.
- urls string[]
- (Updatable) An array of URL list names to be evaluated against the HTTP(S) request target.
- applications Sequence[str]
- (Updatable) An array of application group names to be evaluated against the traffic protocol and protocol-specific parameters.
- destination_
addresses Sequence[str] - (Updatable) An array of address list names to be evaluated against the traffic destination address.
- services Sequence[str]
- (Updatable) An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
- source_
addresses Sequence[str] - (Updatable) An array of address list names to be evaluated against the traffic source address.
- urls Sequence[str]
- (Updatable) An array of URL list names to be evaluated against the HTTP(S) request target.
- applications List<String>
- (Updatable) An array of application group names to be evaluated against the traffic protocol and protocol-specific parameters.
- destination
Addresses List<String> - (Updatable) An array of address list names to be evaluated against the traffic destination address.
- services List<String>
- (Updatable) An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
- source
Addresses List<String> - (Updatable) An array of address list names to be evaluated against the traffic source address.
- urls List<String>
- (Updatable) An array of URL list names to be evaluated against the HTTP(S) request target.
NetworkFirewallPolicySecurityRulePosition, NetworkFirewallPolicySecurityRulePositionArgs
- After
Rule string - (Updatable) Identifier for rule after which this rule lies.
- Before
Rule string (Updatable) Identifier for rule before which this rule lies.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- After
Rule string - (Updatable) Identifier for rule after which this rule lies.
- Before
Rule string (Updatable) Identifier for rule before which this rule lies.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- after
Rule String - (Updatable) Identifier for rule after which this rule lies.
- before
Rule String (Updatable) Identifier for rule before which this rule lies.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- after
Rule string - (Updatable) Identifier for rule after which this rule lies.
- before
Rule string (Updatable) Identifier for rule before which this rule lies.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- after_
rule str - (Updatable) Identifier for rule after which this rule lies.
- before_
rule str (Updatable) Identifier for rule before which this rule lies.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- after
Rule String - (Updatable) Identifier for rule after which this rule lies.
- before
Rule String (Updatable) Identifier for rule before which this rule lies.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
Import
NetworkFirewallPolicySecurityRules can be imported using the name
, e.g.
$ pulumi import oci:NetworkFirewall/networkFirewallPolicySecurityRule:NetworkFirewallPolicySecurityRule test_network_firewall_policy_security_rule "networkFirewallPolicies/{networkFirewallPolicyId}/securityRules/{securityRuleName}"
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- oci pulumi/pulumi-oci
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
oci
Terraform Provider.