aviatrix logo
Aviatrix v0.0.10, Jan 21 23

aviatrix.AviatrixFirewallPolicy

Import

firewall_policy can be imported using the gw_name, src_ip, dst_ip, protocol, port and action separated by ~, e.g.

 $ pulumi import aviatrix:index/aviatrixFirewallPolicy:AviatrixFirewallPolicy test "gw_name~src_ip~dst_ip~protocol~port~action"

Example Usage

using System.Collections.Generic;
using Pulumi;
using Aviatrix = Pulumi.Aviatrix;

return await Deployment.RunAsync(() => 
{
    // Create an Aviatrix Stateful Firewall Policy
    var testFirewallPolicy = new Aviatrix.AviatrixFirewallPolicy("testFirewallPolicy", new()
    {
        GwName = aviatrix_firewall.Test_firewall.Gw_name,
        SrcIp = "10.15.0.224/32",
        DstIp = "10.12.0.172/32",
        Protocol = "tcp",
        Port = "0:65535",
        Action = "allow",
        LogEnabled = true,
        Description = "Test policy.",
    });

});
package main

import (
	"github.com/astipkovits/pulumi-aviatrix/sdk/go/aviatrix"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)

func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := aviatrix.NewAviatrixFirewallPolicy(ctx, "testFirewallPolicy", &aviatrix.AviatrixFirewallPolicyArgs{
			GwName:      pulumi.Any(aviatrix_firewall.Test_firewall.Gw_name),
			SrcIp:       pulumi.String("10.15.0.224/32"),
			DstIp:       pulumi.String("10.12.0.172/32"),
			Protocol:    pulumi.String("tcp"),
			Port:        pulumi.String("0:65535"),
			Action:      pulumi.String("allow"),
			LogEnabled:  pulumi.Bool(true),
			Description: pulumi.String("Test policy."),
		})
		if err != nil {
			return err
		}
		return nil
	})
}
package generated_program;

import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.aviatrix.AviatrixFirewallPolicy;
import com.pulumi.aviatrix.AviatrixFirewallPolicyArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;

public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }

    public static void stack(Context ctx) {
        var testFirewallPolicy = new AviatrixFirewallPolicy("testFirewallPolicy", AviatrixFirewallPolicyArgs.builder()        
            .gwName(aviatrix_firewall.test_firewall().gw_name())
            .srcIp("10.15.0.224/32")
            .dstIp("10.12.0.172/32")
            .protocol("tcp")
            .port("0:65535")
            .action("allow")
            .logEnabled(true)
            .description("Test policy.")
            .build());

    }
}
import pulumi
import pulumi_aviatrix as aviatrix

# Create an Aviatrix Stateful Firewall Policy
test_firewall_policy = aviatrix.AviatrixFirewallPolicy("testFirewallPolicy",
    gw_name=aviatrix_firewall["test_firewall"]["gw_name"],
    src_ip="10.15.0.224/32",
    dst_ip="10.12.0.172/32",
    protocol="tcp",
    port="0:65535",
    action="allow",
    log_enabled=True,
    description="Test policy.")
import * as pulumi from "@pulumi/pulumi";
import * as aviatrix from "@astipkovits/aviatrix";

// Create an Aviatrix Stateful Firewall Policy
const testFirewallPolicy = new aviatrix.AviatrixFirewallPolicy("testFirewallPolicy", {
    gwName: aviatrix_firewall.test_firewall.gw_name,
    srcIp: "10.15.0.224/32",
    dstIp: "10.12.0.172/32",
    protocol: "tcp",
    port: "0:65535",
    action: "allow",
    logEnabled: true,
    description: "Test policy.",
});
resources:
  # Create an Aviatrix Stateful Firewall Policy
  testFirewallPolicy:
    type: aviatrix:AviatrixFirewallPolicy
    properties:
      gwName: ${aviatrix_firewall.test_firewall.gw_name}
      srcIp: 10.15.0.224/32
      dstIp: 10.12.0.172/32
      protocol: tcp
      port: 0:65535
      action: allow
      logEnabled: true
      description: Test policy.
using System.Collections.Generic;
using Pulumi;
using Aviatrix = Pulumi.Aviatrix;

return await Deployment.RunAsync(() => 
{
    // Create an Aviatrix Stateful Firewall Policy and insert it to a specific position
    var testFirewallPolicy = new Aviatrix.AviatrixFirewallPolicy("testFirewallPolicy", new()
    {
        GwName = aviatrix_firewall.Test_firewall.Gw_name,
        SrcIp = "10.15.0.225/32",
        DstIp = "10.12.0.173/32",
        Protocol = "tcp",
        Port = "0:65535",
        Action = "allow",
        LogEnabled = true,
        Description = "Test policy.",
        Position = 2,
    });

});
package main

import (
	"github.com/astipkovits/pulumi-aviatrix/sdk/go/aviatrix"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)

func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := aviatrix.NewAviatrixFirewallPolicy(ctx, "testFirewallPolicy", &aviatrix.AviatrixFirewallPolicyArgs{
			GwName:      pulumi.Any(aviatrix_firewall.Test_firewall.Gw_name),
			SrcIp:       pulumi.String("10.15.0.225/32"),
			DstIp:       pulumi.String("10.12.0.173/32"),
			Protocol:    pulumi.String("tcp"),
			Port:        pulumi.String("0:65535"),
			Action:      pulumi.String("allow"),
			LogEnabled:  pulumi.Bool(true),
			Description: pulumi.String("Test policy."),
			Position:    pulumi.Int(2),
		})
		if err != nil {
			return err
		}
		return nil
	})
}
package generated_program;

import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.aviatrix.AviatrixFirewallPolicy;
import com.pulumi.aviatrix.AviatrixFirewallPolicyArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;

public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }

    public static void stack(Context ctx) {
        var testFirewallPolicy = new AviatrixFirewallPolicy("testFirewallPolicy", AviatrixFirewallPolicyArgs.builder()        
            .gwName(aviatrix_firewall.test_firewall().gw_name())
            .srcIp("10.15.0.225/32")
            .dstIp("10.12.0.173/32")
            .protocol("tcp")
            .port("0:65535")
            .action("allow")
            .logEnabled(true)
            .description("Test policy.")
            .position(2)
            .build());

    }
}
import pulumi
import pulumi_aviatrix as aviatrix

# Create an Aviatrix Stateful Firewall Policy and insert it to a specific position
test_firewall_policy = aviatrix.AviatrixFirewallPolicy("testFirewallPolicy",
    gw_name=aviatrix_firewall["test_firewall"]["gw_name"],
    src_ip="10.15.0.225/32",
    dst_ip="10.12.0.173/32",
    protocol="tcp",
    port="0:65535",
    action="allow",
    log_enabled=True,
    description="Test policy.",
    position=2)
import * as pulumi from "@pulumi/pulumi";
import * as aviatrix from "@astipkovits/aviatrix";

// Create an Aviatrix Stateful Firewall Policy and insert it to a specific position
const testFirewallPolicy = new aviatrix.AviatrixFirewallPolicy("testFirewallPolicy", {
    gwName: aviatrix_firewall.test_firewall.gw_name,
    srcIp: "10.15.0.225/32",
    dstIp: "10.12.0.173/32",
    protocol: "tcp",
    port: "0:65535",
    action: "allow",
    logEnabled: true,
    description: "Test policy.",
    position: 2,
});
resources:
  # Create an Aviatrix Stateful Firewall Policy and insert it to a specific position
  testFirewallPolicy:
    type: aviatrix:AviatrixFirewallPolicy
    properties:
      gwName: ${aviatrix_firewall.test_firewall.gw_name}
      srcIp: 10.15.0.225/32
      dstIp: 10.12.0.173/32
      protocol: tcp
      port: 0:65535
      action: allow
      logEnabled: true
      description: Test policy.
      position: 2

Create AviatrixFirewallPolicy Resource

new AviatrixFirewallPolicy(name: string, args: AviatrixFirewallPolicyArgs, opts?: CustomResourceOptions);
@overload
def AviatrixFirewallPolicy(resource_name: str,
                           opts: Optional[ResourceOptions] = None,
                           action: Optional[str] = None,
                           description: Optional[str] = None,
                           dst_ip: Optional[str] = None,
                           gw_name: Optional[str] = None,
                           log_enabled: Optional[bool] = None,
                           port: Optional[str] = None,
                           position: Optional[int] = None,
                           protocol: Optional[str] = None,
                           src_ip: Optional[str] = None)
@overload
def AviatrixFirewallPolicy(resource_name: str,
                           args: AviatrixFirewallPolicyInitArgs,
                           opts: Optional[ResourceOptions] = None)
func NewAviatrixFirewallPolicy(ctx *Context, name string, args AviatrixFirewallPolicyArgs, opts ...ResourceOption) (*AviatrixFirewallPolicy, error)
public AviatrixFirewallPolicy(string name, AviatrixFirewallPolicyArgs args, CustomResourceOptions? opts = null)
public AviatrixFirewallPolicy(String name, AviatrixFirewallPolicyArgs args)
public AviatrixFirewallPolicy(String name, AviatrixFirewallPolicyArgs args, CustomResourceOptions options)
type: aviatrix:AviatrixFirewallPolicy
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.

name string
The unique name of the resource.
args AviatrixFirewallPolicyArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
resource_name str
The unique name of the resource.
args AviatrixFirewallPolicyInitArgs
The arguments to resource properties.
opts ResourceOptions
Bag of options to control resource's behavior.
ctx Context
Context object for the current deployment.
name string
The unique name of the resource.
args AviatrixFirewallPolicyArgs
The arguments to resource properties.
opts ResourceOption
Bag of options to control resource's behavior.
name string
The unique name of the resource.
args AviatrixFirewallPolicyArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
name String
The unique name of the resource.
args AviatrixFirewallPolicyArgs
The arguments to resource properties.
options CustomResourceOptions
Bag of options to control resource's behavior.

AviatrixFirewallPolicy Resource Properties

To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

Inputs

The AviatrixFirewallPolicy resource accepts the following input properties:

Action string

Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).

DstIp string

CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.

GwName string

Gateway name to attach firewall policy to.

Port string

A single port or a range of port numbers. Example: "25", "25:1024".

SrcIp string

CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.

Description string

Description of the policy. Example: "This is policy no.1".

LogEnabled bool

Valid values: true, false. Default value: false.

Position int

Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.

Protocol string

: "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".

Action string

Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).

DstIp string

CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.

GwName string

Gateway name to attach firewall policy to.

Port string

A single port or a range of port numbers. Example: "25", "25:1024".

SrcIp string

CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.

Description string

Description of the policy. Example: "This is policy no.1".

LogEnabled bool

Valid values: true, false. Default value: false.

Position int

Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.

Protocol string

: "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".

action String

Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).

dstIp String

CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.

gwName String

Gateway name to attach firewall policy to.

port String

A single port or a range of port numbers. Example: "25", "25:1024".

srcIp String

CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.

description String

Description of the policy. Example: "This is policy no.1".

logEnabled Boolean

Valid values: true, false. Default value: false.

position Integer

Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.

protocol String

: "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".

action string

Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).

dstIp string

CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.

gwName string

Gateway name to attach firewall policy to.

port string

A single port or a range of port numbers. Example: "25", "25:1024".

srcIp string

CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.

description string

Description of the policy. Example: "This is policy no.1".

logEnabled boolean

Valid values: true, false. Default value: false.

position number

Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.

protocol string

: "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".

action str

Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).

dst_ip str

CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.

gw_name str

Gateway name to attach firewall policy to.

port str

A single port or a range of port numbers. Example: "25", "25:1024".

src_ip str

CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.

description str

Description of the policy. Example: "This is policy no.1".

log_enabled bool

Valid values: true, false. Default value: false.

position int

Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.

protocol str

: "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".

action String

Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).

dstIp String

CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.

gwName String

Gateway name to attach firewall policy to.

port String

A single port or a range of port numbers. Example: "25", "25:1024".

srcIp String

CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.

description String

Description of the policy. Example: "This is policy no.1".

logEnabled Boolean

Valid values: true, false. Default value: false.

position Number

Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.

protocol String

: "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".

Outputs

All input properties are implicitly available as output properties. Additionally, the AviatrixFirewallPolicy resource produces the following output properties:

Id string

The provider-assigned unique ID for this managed resource.

Id string

The provider-assigned unique ID for this managed resource.

id String

The provider-assigned unique ID for this managed resource.

id string

The provider-assigned unique ID for this managed resource.

id str

The provider-assigned unique ID for this managed resource.

id String

The provider-assigned unique ID for this managed resource.

Look up Existing AviatrixFirewallPolicy Resource

Get an existing AviatrixFirewallPolicy resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

public static get(name: string, id: Input<ID>, state?: AviatrixFirewallPolicyState, opts?: CustomResourceOptions): AviatrixFirewallPolicy
@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        action: Optional[str] = None,
        description: Optional[str] = None,
        dst_ip: Optional[str] = None,
        gw_name: Optional[str] = None,
        log_enabled: Optional[bool] = None,
        port: Optional[str] = None,
        position: Optional[int] = None,
        protocol: Optional[str] = None,
        src_ip: Optional[str] = None) -> AviatrixFirewallPolicy
func GetAviatrixFirewallPolicy(ctx *Context, name string, id IDInput, state *AviatrixFirewallPolicyState, opts ...ResourceOption) (*AviatrixFirewallPolicy, error)
public static AviatrixFirewallPolicy Get(string name, Input<string> id, AviatrixFirewallPolicyState? state, CustomResourceOptions? opts = null)
public static AviatrixFirewallPolicy get(String name, Output<String> id, AviatrixFirewallPolicyState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
resource_name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
The following state arguments are supported:
Action string

Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).

Description string

Description of the policy. Example: "This is policy no.1".

DstIp string

CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.

GwName string

Gateway name to attach firewall policy to.

LogEnabled bool

Valid values: true, false. Default value: false.

Port string

A single port or a range of port numbers. Example: "25", "25:1024".

Position int

Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.

Protocol string

: "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".

SrcIp string

CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.

Action string

Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).

Description string

Description of the policy. Example: "This is policy no.1".

DstIp string

CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.

GwName string

Gateway name to attach firewall policy to.

LogEnabled bool

Valid values: true, false. Default value: false.

Port string

A single port or a range of port numbers. Example: "25", "25:1024".

Position int

Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.

Protocol string

: "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".

SrcIp string

CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.

action String

Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).

description String

Description of the policy. Example: "This is policy no.1".

dstIp String

CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.

gwName String

Gateway name to attach firewall policy to.

logEnabled Boolean

Valid values: true, false. Default value: false.

port String

A single port or a range of port numbers. Example: "25", "25:1024".

position Integer

Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.

protocol String

: "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".

srcIp String

CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.

action string

Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).

description string

Description of the policy. Example: "This is policy no.1".

dstIp string

CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.

gwName string

Gateway name to attach firewall policy to.

logEnabled boolean

Valid values: true, false. Default value: false.

port string

A single port or a range of port numbers. Example: "25", "25:1024".

position number

Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.

protocol string

: "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".

srcIp string

CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.

action str

Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).

description str

Description of the policy. Example: "This is policy no.1".

dst_ip str

CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.

gw_name str

Gateway name to attach firewall policy to.

log_enabled bool

Valid values: true, false. Default value: false.

port str

A single port or a range of port numbers. Example: "25", "25:1024".

position int

Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.

protocol str

: "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".

src_ip str

CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.

action String

Valid values: "allow", "deny" and "force-drop" (in stateful firewall rule to allow immediate packet dropping on established sessions).

description String

Description of the policy. Example: "This is policy no.1".

dstIp String

CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.

gwName String

Gateway name to attach firewall policy to.

logEnabled Boolean

Valid values: true, false. Default value: false.

port String

A single port or a range of port numbers. Example: "25", "25:1024".

position Number

Position in the policy list, where the firewall policy will be inserted to. Valid values: any positive integer. Example: 2. If it is larger than the size of policy list, the policy will be inserted to the end.

protocol String

: "all", "tcp", "udp", "icmp", "sctp", "rdp", "dccp".

srcIp String

CIDRs separated by comma or tag names such "HR" or "marketing" etc. Example: "10.30.0.0/16,10.45.0.0/20". The aviatrix_firewall_tag resource should be created prior to using the tag name.

Package Details

Repository
aviatrix astipkovits/pulumi-aviatrix
License
Apache-2.0
Notes

This Pulumi package is based on the aviatrix Terraform Provider.