1. Packages
  2. Fortios
  3. API Docs
  4. firewall
  5. Identitybasedroute
Fortios v0.0.5 published on Tuesday, Apr 9, 2024 by pulumiverse

fortios.firewall.Identitybasedroute

Explore with Pulumi AI

fortios logo
Fortios v0.0.5 published on Tuesday, Apr 9, 2024 by pulumiverse

    Configure identity based routing.

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as fortios from "@pulumiverse/fortios";
    
    const trname = new fortios.firewall.Identitybasedroute("trname", {comments: "test"});
    
    import pulumi
    import pulumiverse_fortios as fortios
    
    trname = fortios.firewall.Identitybasedroute("trname", comments="test")
    
    package main
    
    import (
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    	"github.com/pulumiverse/pulumi-fortios/sdk/go/fortios/firewall"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := firewall.NewIdentitybasedroute(ctx, "trname", &firewall.IdentitybasedrouteArgs{
    			Comments: pulumi.String("test"),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Fortios = Pulumiverse.Fortios;
    
    return await Deployment.RunAsync(() => 
    {
        var trname = new Fortios.Firewall.Identitybasedroute("trname", new()
        {
            Comments = "test",
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.fortios.firewall.Identitybasedroute;
    import com.pulumi.fortios.firewall.IdentitybasedrouteArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var trname = new Identitybasedroute("trname", IdentitybasedrouteArgs.builder()        
                .comments("test")
                .build());
    
        }
    }
    
    resources:
      trname:
        type: fortios:firewall:Identitybasedroute
        properties:
          comments: test
    

    Create Identitybasedroute Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new Identitybasedroute(name: string, args?: IdentitybasedrouteArgs, opts?: CustomResourceOptions);
    @overload
    def Identitybasedroute(resource_name: str,
                           args: Optional[IdentitybasedrouteArgs] = None,
                           opts: Optional[ResourceOptions] = None)
    
    @overload
    def Identitybasedroute(resource_name: str,
                           opts: Optional[ResourceOptions] = None,
                           comments: Optional[str] = None,
                           dynamic_sort_subtable: Optional[str] = None,
                           get_all_tables: Optional[str] = None,
                           name: Optional[str] = None,
                           rules: Optional[Sequence[IdentitybasedrouteRuleArgs]] = None,
                           vdomparam: Optional[str] = None)
    func NewIdentitybasedroute(ctx *Context, name string, args *IdentitybasedrouteArgs, opts ...ResourceOption) (*Identitybasedroute, error)
    public Identitybasedroute(string name, IdentitybasedrouteArgs? args = null, CustomResourceOptions? opts = null)
    public Identitybasedroute(String name, IdentitybasedrouteArgs args)
    public Identitybasedroute(String name, IdentitybasedrouteArgs args, CustomResourceOptions options)
    
    type: fortios:firewall:Identitybasedroute
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args IdentitybasedrouteArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args IdentitybasedrouteArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args IdentitybasedrouteArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args IdentitybasedrouteArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args IdentitybasedrouteArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Example

    The following reference example uses placeholder values for all input properties.

    var identitybasedrouteResource = new Fortios.Firewall.Identitybasedroute("identitybasedrouteResource", new()
    {
        Comments = "string",
        DynamicSortSubtable = "string",
        GetAllTables = "string",
        Name = "string",
        Rules = new[]
        {
            new Fortios.Firewall.Inputs.IdentitybasedrouteRuleArgs
            {
                Device = "string",
                Gateway = "string",
                Groups = new[]
                {
                    new Fortios.Firewall.Inputs.IdentitybasedrouteRuleGroupArgs
                    {
                        Name = "string",
                    },
                },
                Id = 0,
            },
        },
        Vdomparam = "string",
    });
    
    example, err := firewall.NewIdentitybasedroute(ctx, "identitybasedrouteResource", &firewall.IdentitybasedrouteArgs{
    	Comments:            pulumi.String("string"),
    	DynamicSortSubtable: pulumi.String("string"),
    	GetAllTables:        pulumi.String("string"),
    	Name:                pulumi.String("string"),
    	Rules: firewall.IdentitybasedrouteRuleArray{
    		&firewall.IdentitybasedrouteRuleArgs{
    			Device:  pulumi.String("string"),
    			Gateway: pulumi.String("string"),
    			Groups: firewall.IdentitybasedrouteRuleGroupArray{
    				&firewall.IdentitybasedrouteRuleGroupArgs{
    					Name: pulumi.String("string"),
    				},
    			},
    			Id: pulumi.Int(0),
    		},
    	},
    	Vdomparam: pulumi.String("string"),
    })
    
    var identitybasedrouteResource = new Identitybasedroute("identitybasedrouteResource", IdentitybasedrouteArgs.builder()
        .comments("string")
        .dynamicSortSubtable("string")
        .getAllTables("string")
        .name("string")
        .rules(IdentitybasedrouteRuleArgs.builder()
            .device("string")
            .gateway("string")
            .groups(IdentitybasedrouteRuleGroupArgs.builder()
                .name("string")
                .build())
            .id(0)
            .build())
        .vdomparam("string")
        .build());
    
    identitybasedroute_resource = fortios.firewall.Identitybasedroute("identitybasedrouteResource",
        comments="string",
        dynamic_sort_subtable="string",
        get_all_tables="string",
        name="string",
        rules=[fortios.firewall.IdentitybasedrouteRuleArgs(
            device="string",
            gateway="string",
            groups=[fortios.firewall.IdentitybasedrouteRuleGroupArgs(
                name="string",
            )],
            id=0,
        )],
        vdomparam="string")
    
    const identitybasedrouteResource = new fortios.firewall.Identitybasedroute("identitybasedrouteResource", {
        comments: "string",
        dynamicSortSubtable: "string",
        getAllTables: "string",
        name: "string",
        rules: [{
            device: "string",
            gateway: "string",
            groups: [{
                name: "string",
            }],
            id: 0,
        }],
        vdomparam: "string",
    });
    
    type: fortios:firewall:Identitybasedroute
    properties:
        comments: string
        dynamicSortSubtable: string
        getAllTables: string
        name: string
        rules:
            - device: string
              gateway: string
              groups:
                - name: string
              id: 0
        vdomparam: string
    

    Identitybasedroute Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    The Identitybasedroute resource accepts the following input properties:

    Comments string
    Comments.
    DynamicSortSubtable string
    Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
    GetAllTables string
    Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
    Name string
    Name.
    Rules List<Pulumiverse.Fortios.Firewall.Inputs.IdentitybasedrouteRule>
    Rule. The structure of rule block is documented below.
    Vdomparam string
    Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
    Comments string
    Comments.
    DynamicSortSubtable string
    Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
    GetAllTables string
    Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
    Name string
    Name.
    Rules []IdentitybasedrouteRuleArgs
    Rule. The structure of rule block is documented below.
    Vdomparam string
    Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
    comments String
    Comments.
    dynamicSortSubtable String
    Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
    getAllTables String
    Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
    name String
    Name.
    rules List<IdentitybasedrouteRule>
    Rule. The structure of rule block is documented below.
    vdomparam String
    Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
    comments string
    Comments.
    dynamicSortSubtable string
    Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
    getAllTables string
    Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
    name string
    Name.
    rules IdentitybasedrouteRule[]
    Rule. The structure of rule block is documented below.
    vdomparam string
    Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
    comments str
    Comments.
    dynamic_sort_subtable str
    Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
    get_all_tables str
    Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
    name str
    Name.
    rules Sequence[IdentitybasedrouteRuleArgs]
    Rule. The structure of rule block is documented below.
    vdomparam str
    Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
    comments String
    Comments.
    dynamicSortSubtable String
    Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
    getAllTables String
    Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
    name String
    Name.
    rules List<Property Map>
    Rule. The structure of rule block is documented below.
    vdomparam String
    Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the Identitybasedroute resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing Identitybasedroute Resource

    Get an existing Identitybasedroute resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: IdentitybasedrouteState, opts?: CustomResourceOptions): Identitybasedroute
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            comments: Optional[str] = None,
            dynamic_sort_subtable: Optional[str] = None,
            get_all_tables: Optional[str] = None,
            name: Optional[str] = None,
            rules: Optional[Sequence[IdentitybasedrouteRuleArgs]] = None,
            vdomparam: Optional[str] = None) -> Identitybasedroute
    func GetIdentitybasedroute(ctx *Context, name string, id IDInput, state *IdentitybasedrouteState, opts ...ResourceOption) (*Identitybasedroute, error)
    public static Identitybasedroute Get(string name, Input<string> id, IdentitybasedrouteState? state, CustomResourceOptions? opts = null)
    public static Identitybasedroute get(String name, Output<String> id, IdentitybasedrouteState state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    Comments string
    Comments.
    DynamicSortSubtable string
    Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
    GetAllTables string
    Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
    Name string
    Name.
    Rules List<Pulumiverse.Fortios.Firewall.Inputs.IdentitybasedrouteRule>
    Rule. The structure of rule block is documented below.
    Vdomparam string
    Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
    Comments string
    Comments.
    DynamicSortSubtable string
    Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
    GetAllTables string
    Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
    Name string
    Name.
    Rules []IdentitybasedrouteRuleArgs
    Rule. The structure of rule block is documented below.
    Vdomparam string
    Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
    comments String
    Comments.
    dynamicSortSubtable String
    Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
    getAllTables String
    Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
    name String
    Name.
    rules List<IdentitybasedrouteRule>
    Rule. The structure of rule block is documented below.
    vdomparam String
    Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
    comments string
    Comments.
    dynamicSortSubtable string
    Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
    getAllTables string
    Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
    name string
    Name.
    rules IdentitybasedrouteRule[]
    Rule. The structure of rule block is documented below.
    vdomparam string
    Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
    comments str
    Comments.
    dynamic_sort_subtable str
    Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
    get_all_tables str
    Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
    name str
    Name.
    rules Sequence[IdentitybasedrouteRuleArgs]
    Rule. The structure of rule block is documented below.
    vdomparam str
    Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.
    comments String
    Comments.
    dynamicSortSubtable String
    Sort sub-tables, please do not set this parameter when configuring static sub-tables. Options: [ false, true, natural, alphabetical ]. false: Default value, do not sort tables; true/natural: sort tables in natural order. For example: [ a10, a2 ] -> [ a2, a10 ]; alphabetical: sort tables in alphabetical order. For example: [ a10, a2 ] -> [ a10, a2 ].
    getAllTables String
    Get all sub-tables including unconfigured tables. Do not set this variable to true if you configure sub-table in another resource, otherwish conflicts and overwrite will occur. Options: [ false, true ]. false: Default value, do not get unconfigured tables; true: get all tables including unconfigured tables.
    name String
    Name.
    rules List<Property Map>
    Rule. The structure of rule block is documented below.
    vdomparam String
    Specifies the vdom to which the resource will be applied when the FortiGate unit is running in VDOM mode. Only one vdom can be specified. If you want to inherit the vdom configuration of the provider, please do not set this parameter.

    Supporting Types

    IdentitybasedrouteRule, IdentitybasedrouteRuleArgs

    Device string
    Outgoing interface for the rule.
    Gateway string
    IPv4 address of the gateway (Format: xxx.xxx.xxx.xxx , Default: 0.0.0.0).
    Groups List<Pulumiverse.Fortios.Firewall.Inputs.IdentitybasedrouteRuleGroup>
    Select one or more group(s) from available groups that are allowed to use this route. Separate group names with a space. The structure of groups block is documented below.
    Id int
    Rule ID.
    Device string
    Outgoing interface for the rule.
    Gateway string
    IPv4 address of the gateway (Format: xxx.xxx.xxx.xxx , Default: 0.0.0.0).
    Groups []IdentitybasedrouteRuleGroup
    Select one or more group(s) from available groups that are allowed to use this route. Separate group names with a space. The structure of groups block is documented below.
    Id int
    Rule ID.
    device String
    Outgoing interface for the rule.
    gateway String
    IPv4 address of the gateway (Format: xxx.xxx.xxx.xxx , Default: 0.0.0.0).
    groups List<IdentitybasedrouteRuleGroup>
    Select one or more group(s) from available groups that are allowed to use this route. Separate group names with a space. The structure of groups block is documented below.
    id Integer
    Rule ID.
    device string
    Outgoing interface for the rule.
    gateway string
    IPv4 address of the gateway (Format: xxx.xxx.xxx.xxx , Default: 0.0.0.0).
    groups IdentitybasedrouteRuleGroup[]
    Select one or more group(s) from available groups that are allowed to use this route. Separate group names with a space. The structure of groups block is documented below.
    id number
    Rule ID.
    device str
    Outgoing interface for the rule.
    gateway str
    IPv4 address of the gateway (Format: xxx.xxx.xxx.xxx , Default: 0.0.0.0).
    groups Sequence[IdentitybasedrouteRuleGroup]
    Select one or more group(s) from available groups that are allowed to use this route. Separate group names with a space. The structure of groups block is documented below.
    id int
    Rule ID.
    device String
    Outgoing interface for the rule.
    gateway String
    IPv4 address of the gateway (Format: xxx.xxx.xxx.xxx , Default: 0.0.0.0).
    groups List<Property Map>
    Select one or more group(s) from available groups that are allowed to use this route. Separate group names with a space. The structure of groups block is documented below.
    id Number
    Rule ID.

    IdentitybasedrouteRuleGroup, IdentitybasedrouteRuleGroupArgs

    Name string
    Group name.
    Name string
    Group name.
    name String
    Group name.
    name string
    Group name.
    name str
    Group name.
    name String
    Group name.

    Import

    Firewall IdentityBasedRoute can be imported using any of these accepted formats:

    $ pulumi import fortios:firewall/identitybasedroute:Identitybasedroute labelname {{name}}
    

    If you do not want to import arguments of block:

    $ export “FORTIOS_IMPORT_TABLE”=“false”

    $ pulumi import fortios:firewall/identitybasedroute:Identitybasedroute labelname {{name}}
    

    $ unset “FORTIOS_IMPORT_TABLE”

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    fortios pulumiverse/pulumi-fortios
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the fortios Terraform Provider.
    fortios logo
    Fortios v0.0.5 published on Tuesday, Apr 9, 2024 by pulumiverse