1. Packages
  2. Aviatrix
  3. API Docs
  4. AviatrixFirewallPolicy
Aviatrix v0.0.11 published on Saturday, Jun 17, 2023 by Aviatrix

aviatrix.AviatrixFirewallPolicy

Explore with Pulumi AI

aviatrix logo
Aviatrix v0.0.11 published on Saturday, Jun 17, 2023 by Aviatrix

    Import

    firewall_policy can be imported using the gw_name, src_ip, dst_ip, protocol, port and action separated by ~, e.g.

     $ pulumi import aviatrix:index/aviatrixFirewallPolicy:AviatrixFirewallPolicy test "gw_name~src_ip~dst_ip~protocol~port~action"
    

    Example Usage

    using System.Collections.Generic;
    using Pulumi;
    using Aviatrix = Pulumi.Aviatrix;
    
    return await Deployment.RunAsync(() => 
    {
        // Create an Aviatrix Stateful Firewall Policy
        var testFirewallPolicy = new Aviatrix.AviatrixFirewallPolicy("testFirewallPolicy", new()
        {
            GwName = aviatrix_firewall.Test_firewall.Gw_name,
            SrcIp = "10.15.0.224/32",
            DstIp = "10.12.0.172/32",
            Protocol = "tcp",
            Port = "0:65535",
            Action = "allow",
            LogEnabled = true,
            Description = "Test policy.",
        });
    
    });
    
    package main
    
    import (
    	"github.com/astipkovits/pulumi-aviatrix/sdk/go/aviatrix"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := aviatrix.NewAviatrixFirewallPolicy(ctx, "testFirewallPolicy", &aviatrix.AviatrixFirewallPolicyArgs{
    			GwName:      pulumi.Any(aviatrix_firewall.Test_firewall.Gw_name),
    			SrcIp:       pulumi.String("10.15.0.224/32"),
    			DstIp:       pulumi.String("10.12.0.172/32"),
    			Protocol:    pulumi.String("tcp"),
    			Port:        pulumi.String("0:65535"),
    			Action:      pulumi.String("allow"),
    			LogEnabled:  pulumi.Bool(true),
    			Description: pulumi.String("Test policy."),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.aviatrix.AviatrixFirewallPolicy;
    import com.pulumi.aviatrix.AviatrixFirewallPolicyArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var testFirewallPolicy = new AviatrixFirewallPolicy("testFirewallPolicy", AviatrixFirewallPolicyArgs.builder()        
                .gwName(aviatrix_firewall.test_firewall().gw_name())
                .srcIp("10.15.0.224/32")
                .dstIp("10.12.0.172/32")
                .protocol("tcp")
                .port("0:65535")
                .action("allow")
                .logEnabled(true)
                .description("Test policy.")
                .build());
    
        }
    }
    
    import pulumi
    import pulumi_aviatrix as aviatrix
    
    # Create an Aviatrix Stateful Firewall Policy
    test_firewall_policy = aviatrix.AviatrixFirewallPolicy("testFirewallPolicy",
        gw_name=aviatrix_firewall["test_firewall"]["gw_name"],
        src_ip="10.15.0.224/32",
        dst_ip="10.12.0.172/32",
        protocol="tcp",
        port="0:65535",
        action="allow",
        log_enabled=True,
        description="Test policy.")
    
    import * as pulumi from "@pulumi/pulumi";
    import * as aviatrix from "@astipkovits/aviatrix";
    
    // Create an Aviatrix Stateful Firewall Policy
    const testFirewallPolicy = new aviatrix.AviatrixFirewallPolicy("testFirewallPolicy", {
        gwName: aviatrix_firewall.test_firewall.gw_name,
        srcIp: "10.15.0.224/32",
        dstIp: "10.12.0.172/32",
        protocol: "tcp",
        port: "0:65535",
        action: "allow",
        logEnabled: true,
        description: "Test policy.",
    });
    
    resources:
      # Create an Aviatrix Stateful Firewall Policy
      testFirewallPolicy:
        type: aviatrix:AviatrixFirewallPolicy
        properties:
          gwName: ${aviatrix_firewall.test_firewall.gw_name}
          srcIp: 10.15.0.224/32
          dstIp: 10.12.0.172/32
          protocol: tcp
          port: 0:65535
          action: allow
          logEnabled: true
          description: Test policy.
    
    using System.Collections.Generic;
    using Pulumi;
    using Aviatrix = Pulumi.Aviatrix;
    
    return await Deployment.RunAsync(() => 
    {
        // Create an Aviatrix Stateful Firewall Policy and insert it to a specific position
        var testFirewallPolicy = new Aviatrix.AviatrixFirewallPolicy("testFirewallPolicy", new()
        {
            GwName = aviatrix_firewall.Test_firewall.Gw_name,
            SrcIp = "10.15.0.225/32",
            DstIp = "10.12.0.173/32",
            Protocol = "tcp",
            Port = "0:65535",
            Action = "allow",
            LogEnabled = true,
            Description = "Test policy.",
            Position = 2,
        });
    
    });
    
    package main
    
    import (
    	"github.com/astipkovits/pulumi-aviatrix/sdk/go/aviatrix"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := aviatrix.NewAviatrixFirewallPolicy(ctx, "testFirewallPolicy", &aviatrix.AviatrixFirewallPolicyArgs{
    			GwName:      pulumi.Any(aviatrix_firewall.Test_firewall.Gw_name),
    			SrcIp:       pulumi.String("10.15.0.225/32"),
    			DstIp:       pulumi.String("10.12.0.173/32"),
    			Protocol:    pulumi.String("tcp"),
    			Port:        pulumi.String("0:65535"),
    			Action:      pulumi.String("allow"),
    			LogEnabled:  pulumi.Bool(true),
    			Description: pulumi.String("Test policy."),
    			Position:    pulumi.Int(2),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.aviatrix.AviatrixFirewallPolicy;
    import com.pulumi.aviatrix.AviatrixFirewallPolicyArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var testFirewallPolicy = new AviatrixFirewallPolicy("testFirewallPolicy", AviatrixFirewallPolicyArgs.builder()        
                .gwName(aviatrix_firewall.test_firewall().gw_name())
                .srcIp("10.15.0.225/32")
                .dstIp("10.12.0.173/32")
                .protocol("tcp")
                .port("0:65535")
                .action("allow")
                .logEnabled(true)
                .description("Test policy.")
                .position(2)
                .build());
    
        }
    }
    
    import pulumi
    import pulumi_aviatrix as aviatrix
    
    # Create an Aviatrix Stateful Firewall Policy and insert it to a specific position
    test_firewall_policy = aviatrix.AviatrixFirewallPolicy("testFirewallPolicy",
        gw_name=aviatrix_firewall["test_firewall"]["gw_name"],
        src_ip="10.15.0.225/32",
        dst_ip="10.12.0.173/32",
        protocol="tcp",
        port="0:65535",
        action="allow",
        log_enabled=True,
        description="Test policy.",
        position=2)
    
    import * as pulumi from "@pulumi/pulumi";
    import * as aviatrix from "@astipkovits/aviatrix";
    
    // Create an Aviatrix Stateful Firewall Policy and insert it to a specific position
    const testFirewallPolicy = new aviatrix.AviatrixFirewallPolicy("testFirewallPolicy", {
        gwName: aviatrix_firewall.test_firewall.gw_name,
        srcIp: "10.15.0.225/32",
        dstIp: "10.12.0.173/32",
        protocol: "tcp",
        port: "0:65535",
        action: "allow",
        logEnabled: true,
        description: "Test policy.",
        position: 2,
    });
    
    resources:
      # Create an Aviatrix Stateful Firewall Policy and insert it to a specific position
      testFirewallPolicy:
        type: aviatrix:AviatrixFirewallPolicy
        properties:
          gwName: ${aviatrix_firewall.test_firewall.gw_name}
          srcIp: 10.15.0.225/32
          dstIp: 10.12.0.173/32
          protocol: tcp
          port: 0:65535
          action: allow
          logEnabled: true
          description: Test policy.
          position: 2
    

    Create AviatrixFirewallPolicy Resource

    new AviatrixFirewallPolicy(name: string, args: AviatrixFirewallPolicyArgs, opts?: CustomResourceOptions);
    @overload
    def AviatrixFirewallPolicy(resource_name: str,
                               opts: Optional[ResourceOptions] = None,
                               action: Optional[str] = None,
                               description: Optional[str] = None,
                               dst_ip: Optional[str] = None,
                               gw_name: Optional[str] = None,
                               log_enabled: Optional[bool] = None,
                               port: Optional[str] = None,
                               position: Optional[int] = None,
                               protocol: Optional[str] = None,
                               src_ip: Optional[str] = None)
    @overload
    def AviatrixFirewallPolicy(resource_name: str,
                               args: AviatrixFirewallPolicyInitArgs,
                               opts: Optional[ResourceOptions] = None)
    func NewAviatrixFirewallPolicy(ctx *Context, name string, args AviatrixFirewallPolicyArgs, opts ...ResourceOption) (*AviatrixFirewallPolicy, error)
    public AviatrixFirewallPolicy(string name, AviatrixFirewallPolicyArgs args, CustomResourceOptions? opts = null)
    public AviatrixFirewallPolicy(String name, AviatrixFirewallPolicyArgs args)
    public AviatrixFirewallPolicy(String name, AviatrixFirewallPolicyArgs args, CustomResourceOptions options)
    
    type: aviatrix:AviatrixFirewallPolicy
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    
    name string
    The unique name of the resource.
    args AviatrixFirewallPolicyArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args AviatrixFirewallPolicyInitArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args AviatrixFirewallPolicyArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args AviatrixFirewallPolicyArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args AviatrixFirewallPolicyArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    AviatrixFirewallPolicy Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    The AviatrixFirewallPolicy resource accepts the following input properties:

    Action string
    Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).
    DstIp string
    CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
    GwName string
    Gateway name to attach firewall policy to.
    Port string
    A single port or a range of port numbers. Example: "25", "25:1024".
    SrcIp string
    CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
    Description string
    Description of the policy. Example: "This is policy no.1".
    LogEnabled bool
    Valid values: true, false. Default value: false.
    Position int
    Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.
    Protocol string
    : "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".
    Action string
    Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).
    DstIp string
    CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
    GwName string
    Gateway name to attach firewall policy to.
    Port string
    A single port or a range of port numbers. Example: "25", "25:1024".
    SrcIp string
    CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
    Description string
    Description of the policy. Example: "This is policy no.1".
    LogEnabled bool
    Valid values: true, false. Default value: false.
    Position int
    Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.
    Protocol string
    : "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".
    action String
    Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).
    dstIp String
    CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
    gwName String
    Gateway name to attach firewall policy to.
    port String
    A single port or a range of port numbers. Example: "25", "25:1024".
    srcIp String
    CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
    description String
    Description of the policy. Example: "This is policy no.1".
    logEnabled Boolean
    Valid values: true, false. Default value: false.
    position Integer
    Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.
    protocol String
    : "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".
    action string
    Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).
    dstIp string
    CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
    gwName string
    Gateway name to attach firewall policy to.
    port string
    A single port or a range of port numbers. Example: "25", "25:1024".
    srcIp string
    CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
    description string
    Description of the policy. Example: "This is policy no.1".
    logEnabled boolean
    Valid values: true, false. Default value: false.
    position number
    Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.
    protocol string
    : "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".
    action str
    Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).
    dst_ip str
    CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
    gw_name str
    Gateway name to attach firewall policy to.
    port str
    A single port or a range of port numbers. Example: "25", "25:1024".
    src_ip str
    CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
    description str
    Description of the policy. Example: "This is policy no.1".
    log_enabled bool
    Valid values: true, false. Default value: false.
    position int
    Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.
    protocol str
    : "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".
    action String
    Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).
    dstIp String
    CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
    gwName String
    Gateway name to attach firewall policy to.
    port String
    A single port or a range of port numbers. Example: "25", "25:1024".
    srcIp String
    CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
    description String
    Description of the policy. Example: "This is policy no.1".
    logEnabled Boolean
    Valid values: true, false. Default value: false.
    position Number
    Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.
    protocol String
    : "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".

    Outputs

    All input properties are implicitly available as output properties. Additionally, the AviatrixFirewallPolicy resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing AviatrixFirewallPolicy Resource

    Get an existing AviatrixFirewallPolicy resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: AviatrixFirewallPolicyState, opts?: CustomResourceOptions): AviatrixFirewallPolicy
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            action: Optional[str] = None,
            description: Optional[str] = None,
            dst_ip: Optional[str] = None,
            gw_name: Optional[str] = None,
            log_enabled: Optional[bool] = None,
            port: Optional[str] = None,
            position: Optional[int] = None,
            protocol: Optional[str] = None,
            src_ip: Optional[str] = None) -> AviatrixFirewallPolicy
    func GetAviatrixFirewallPolicy(ctx *Context, name string, id IDInput, state *AviatrixFirewallPolicyState, opts ...ResourceOption) (*AviatrixFirewallPolicy, error)
    public static AviatrixFirewallPolicy Get(string name, Input<string> id, AviatrixFirewallPolicyState? state, CustomResourceOptions? opts = null)
    public static AviatrixFirewallPolicy get(String name, Output<String> id, AviatrixFirewallPolicyState state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    Action string
    Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).
    Description string
    Description of the policy. Example: "This is policy no.1".
    DstIp string
    CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
    GwName string
    Gateway name to attach firewall policy to.
    LogEnabled bool
    Valid values: true, false. Default value: false.
    Port string
    A single port or a range of port numbers. Example: "25", "25:1024".
    Position int
    Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.
    Protocol string
    : "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".
    SrcIp string
    CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
    Action string
    Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).
    Description string
    Description of the policy. Example: "This is policy no.1".
    DstIp string
    CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
    GwName string
    Gateway name to attach firewall policy to.
    LogEnabled bool
    Valid values: true, false. Default value: false.
    Port string
    A single port or a range of port numbers. Example: "25", "25:1024".
    Position int
    Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.
    Protocol string
    : "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".
    SrcIp string
    CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
    action String
    Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).
    description String
    Description of the policy. Example: "This is policy no.1".
    dstIp String
    CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
    gwName String
    Gateway name to attach firewall policy to.
    logEnabled Boolean
    Valid values: true, false. Default value: false.
    port String
    A single port or a range of port numbers. Example: "25", "25:1024".
    position Integer
    Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.
    protocol String
    : "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".
    srcIp String
    CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
    action string
    Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).
    description string
    Description of the policy. Example: "This is policy no.1".
    dstIp string
    CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
    gwName string
    Gateway name to attach firewall policy to.
    logEnabled boolean
    Valid values: true, false. Default value: false.
    port string
    A single port or a range of port numbers. Example: "25", "25:1024".
    position number
    Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.
    protocol string
    : "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".
    srcIp string
    CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
    action str
    Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).
    description str
    Description of the policy. Example: "This is policy no.1".
    dst_ip str
    CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
    gw_name str
    Gateway name to attach firewall policy to.
    log_enabled bool
    Valid values: true, false. Default value: false.
    port str
    A single port or a range of port numbers. Example: "25", "25:1024".
    position int
    Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.
    protocol str
    : "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".
    src_ip str
    CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
    action String
    Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).
    description String
    Description of the policy. Example: "This is policy no.1".
    dstIp String
    CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.
    gwName String
    Gateway name to attach firewall policy to.
    logEnabled Boolean
    Valid values: true, false. Default value: false.
    port String
    A single port or a range of port numbers. Example: "25", "25:1024".
    position Number
    Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.
    protocol String
    : "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".
    srcIp String
    CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.

    Package Details

    Repository
    aviatrix astipkovits/pulumi-aviatrix
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the aviatrix Terraform Provider.
    aviatrix logo
    Aviatrix v0.0.11 published on Saturday, Jun 17, 2023 by Aviatrix