1. Packages
  2. Ibm Provider
  3. API Docs
  4. CisFirewall
ibm 1.78.0 published on Wednesday, Apr 30, 2025 by ibm-cloud

ibm.CisFirewall

Explore with Pulumi AI

ibm logo
ibm 1.78.0 published on Wednesday, Apr 30, 2025 by ibm-cloud

    Create, update, or delete a firewall for a domain that you included in your IBM Cloud Internet Services instance and a CIS domain resource. For more information, about CIS firewall resource, see using fields, functions, and expressions.

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as ibm from "@pulumi/ibm";
    
    // Add a firewall to the domain
    const lockdown = new ibm.CisFirewall("lockdown", {
        cisId: ibm_cis.instance.id,
        domainId: ibm_cis_domain.example.id,
        firewallType: "lockdowns",
        lockdown: {
            paused: false,
            description: "test",
            urls: ["www.cis-terraform.com"],
            configurations: [{
                target: "ip",
                value: "127.0.0.2",
            }],
            priority: 1,
        },
    });
    const accessRules = new ibm.CisFirewall("accessRules", {
        cisId: ibm_cis.instance.id,
        domainId: ibm_cis_domain.example.id,
        firewallType: "access_rules",
        accessRule: {
            mode: "block",
            notes: "access rule notes",
            configuration: {
                target: "asn",
                value: "AS12346",
            },
        },
    });
    const uaRules = new ibm.CisFirewall("uaRules", {
        cisId: ibm_cis.instance.id,
        domainId: ibm_cis_domain.example.id,
        firewallType: "ua_rules",
        uaRule: {
            mode: "challenge",
            configuration: {
                target: "ua",
                value: "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_5) AppleWebKit/603.2.4 (KHTML, like Gecko) Version/10.1.1 Safari/603.2.4",
            },
        },
    });
    
    import pulumi
    import pulumi_ibm as ibm
    
    # Add a firewall to the domain
    lockdown = ibm.CisFirewall("lockdown",
        cis_id=ibm_cis["instance"]["id"],
        domain_id=ibm_cis_domain["example"]["id"],
        firewall_type="lockdowns",
        lockdown={
            "paused": False,
            "description": "test",
            "urls": ["www.cis-terraform.com"],
            "configurations": [{
                "target": "ip",
                "value": "127.0.0.2",
            }],
            "priority": 1,
        })
    access_rules = ibm.CisFirewall("accessRules",
        cis_id=ibm_cis["instance"]["id"],
        domain_id=ibm_cis_domain["example"]["id"],
        firewall_type="access_rules",
        access_rule={
            "mode": "block",
            "notes": "access rule notes",
            "configuration": {
                "target": "asn",
                "value": "AS12346",
            },
        })
    ua_rules = ibm.CisFirewall("uaRules",
        cis_id=ibm_cis["instance"]["id"],
        domain_id=ibm_cis_domain["example"]["id"],
        firewall_type="ua_rules",
        ua_rule={
            "mode": "challenge",
            "configuration": {
                "target": "ua",
                "value": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_5) AppleWebKit/603.2.4 (KHTML, like Gecko) Version/10.1.1 Safari/603.2.4",
            },
        })
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/ibm/ibm"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		// Add a firewall to the domain
    		_, err := ibm.NewCisFirewall(ctx, "lockdown", &ibm.CisFirewallArgs{
    			CisId:        pulumi.Any(ibm_cis.Instance.Id),
    			DomainId:     pulumi.Any(ibm_cis_domain.Example.Id),
    			FirewallType: pulumi.String("lockdowns"),
    			Lockdown: &ibm.CisFirewallLockdownArgs{
    				Paused:      pulumi.Bool(false),
    				Description: pulumi.String("test"),
    				Urls: pulumi.StringArray{
    					pulumi.String("www.cis-terraform.com"),
    				},
    				Configurations: ibm.CisFirewallLockdownConfigurationArray{
    					&ibm.CisFirewallLockdownConfigurationArgs{
    						Target: pulumi.String("ip"),
    						Value:  pulumi.String("127.0.0.2"),
    					},
    				},
    				Priority: pulumi.Float64(1),
    			},
    		})
    		if err != nil {
    			return err
    		}
    		_, err = ibm.NewCisFirewall(ctx, "accessRules", &ibm.CisFirewallArgs{
    			CisId:        pulumi.Any(ibm_cis.Instance.Id),
    			DomainId:     pulumi.Any(ibm_cis_domain.Example.Id),
    			FirewallType: pulumi.String("access_rules"),
    			AccessRule: &ibm.CisFirewallAccessRuleArgs{
    				Mode:  pulumi.String("block"),
    				Notes: pulumi.String("access rule notes"),
    				Configuration: &ibm.CisFirewallAccessRuleConfigurationArgs{
    					Target: pulumi.String("asn"),
    					Value:  pulumi.String("AS12346"),
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		_, err = ibm.NewCisFirewall(ctx, "uaRules", &ibm.CisFirewallArgs{
    			CisId:        pulumi.Any(ibm_cis.Instance.Id),
    			DomainId:     pulumi.Any(ibm_cis_domain.Example.Id),
    			FirewallType: pulumi.String("ua_rules"),
    			UaRule: &ibm.CisFirewallUaRuleArgs{
    				Mode: pulumi.String("challenge"),
    				Configuration: &ibm.CisFirewallUaRuleConfigurationArgs{
    					Target: pulumi.String("ua"),
    					Value:  pulumi.String("Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_5) AppleWebKit/603.2.4 (KHTML, like Gecko) Version/10.1.1 Safari/603.2.4"),
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Ibm = Pulumi.Ibm;
    
    return await Deployment.RunAsync(() => 
    {
        // Add a firewall to the domain
        var lockdown = new Ibm.CisFirewall("lockdown", new()
        {
            CisId = ibm_cis.Instance.Id,
            DomainId = ibm_cis_domain.Example.Id,
            FirewallType = "lockdowns",
            Lockdown = new Ibm.Inputs.CisFirewallLockdownArgs
            {
                Paused = false,
                Description = "test",
                Urls = new[]
                {
                    "www.cis-terraform.com",
                },
                Configurations = new[]
                {
                    new Ibm.Inputs.CisFirewallLockdownConfigurationArgs
                    {
                        Target = "ip",
                        Value = "127.0.0.2",
                    },
                },
                Priority = 1,
            },
        });
    
        var accessRules = new Ibm.CisFirewall("accessRules", new()
        {
            CisId = ibm_cis.Instance.Id,
            DomainId = ibm_cis_domain.Example.Id,
            FirewallType = "access_rules",
            AccessRule = new Ibm.Inputs.CisFirewallAccessRuleArgs
            {
                Mode = "block",
                Notes = "access rule notes",
                Configuration = new Ibm.Inputs.CisFirewallAccessRuleConfigurationArgs
                {
                    Target = "asn",
                    Value = "AS12346",
                },
            },
        });
    
        var uaRules = new Ibm.CisFirewall("uaRules", new()
        {
            CisId = ibm_cis.Instance.Id,
            DomainId = ibm_cis_domain.Example.Id,
            FirewallType = "ua_rules",
            UaRule = new Ibm.Inputs.CisFirewallUaRuleArgs
            {
                Mode = "challenge",
                Configuration = new Ibm.Inputs.CisFirewallUaRuleConfigurationArgs
                {
                    Target = "ua",
                    Value = "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_5) AppleWebKit/603.2.4 (KHTML, like Gecko) Version/10.1.1 Safari/603.2.4",
                },
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.ibm.CisFirewall;
    import com.pulumi.ibm.CisFirewallArgs;
    import com.pulumi.ibm.inputs.CisFirewallLockdownArgs;
    import com.pulumi.ibm.inputs.CisFirewallAccessRuleArgs;
    import com.pulumi.ibm.inputs.CisFirewallAccessRuleConfigurationArgs;
    import com.pulumi.ibm.inputs.CisFirewallUaRuleArgs;
    import com.pulumi.ibm.inputs.CisFirewallUaRuleConfigurationArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            // Add a firewall to the domain
            var lockdown = new CisFirewall("lockdown", CisFirewallArgs.builder()
                .cisId(ibm_cis.instance().id())
                .domainId(ibm_cis_domain.example().id())
                .firewallType("lockdowns")
                .lockdown(CisFirewallLockdownArgs.builder()
                    .paused("false")
                    .description("test")
                    .urls("www.cis-terraform.com")
                    .configurations(CisFirewallLockdownConfigurationArgs.builder()
                        .target("ip")
                        .value("127.0.0.2")
                        .build())
                    .priority(1)
                    .build())
                .build());
    
            var accessRules = new CisFirewall("accessRules", CisFirewallArgs.builder()
                .cisId(ibm_cis.instance().id())
                .domainId(ibm_cis_domain.example().id())
                .firewallType("access_rules")
                .accessRule(CisFirewallAccessRuleArgs.builder()
                    .mode("block")
                    .notes("access rule notes")
                    .configuration(CisFirewallAccessRuleConfigurationArgs.builder()
                        .target("asn")
                        .value("AS12346")
                        .build())
                    .build())
                .build());
    
            var uaRules = new CisFirewall("uaRules", CisFirewallArgs.builder()
                .cisId(ibm_cis.instance().id())
                .domainId(ibm_cis_domain.example().id())
                .firewallType("ua_rules")
                .uaRule(CisFirewallUaRuleArgs.builder()
                    .mode("challenge")
                    .configuration(CisFirewallUaRuleConfigurationArgs.builder()
                        .target("ua")
                        .value("Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_5) AppleWebKit/603.2.4 (KHTML, like Gecko) Version/10.1.1 Safari/603.2.4")
                        .build())
                    .build())
                .build());
    
        }
    }
    
    resources:
      # Add a firewall to the domain
      lockdown:
        type: ibm:CisFirewall
        properties:
          cisId: ${ibm_cis.instance.id}
          domainId: ${ibm_cis_domain.example.id}
          firewallType: lockdowns
          lockdown:
            paused: 'false'
            description: test
            urls:
              - www.cis-terraform.com
            configurations:
              - target: ip
                value: 127.0.0.2
            priority: 1
      accessRules:
        type: ibm:CisFirewall
        properties:
          cisId: ${ibm_cis.instance.id}
          domainId: ${ibm_cis_domain.example.id}
          firewallType: access_rules
          accessRule:
            mode: block
            notes: access rule notes
            configuration:
              target: asn
              value: AS12346
      uaRules:
        type: ibm:CisFirewall
        properties:
          cisId: ${ibm_cis.instance.id}
          domainId: ${ibm_cis_domain.example.id}
          firewallType: ua_rules
          uaRule:
            mode: challenge
            configuration:
              target: ua
              value: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_5) AppleWebKit/603.2.4 (KHTML, like Gecko) Version/10.1.1 Safari/603.2.4
    

    Create CisFirewall Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new CisFirewall(name: string, args: CisFirewallArgs, opts?: CustomResourceOptions);
    @overload
    def CisFirewall(resource_name: str,
                    args: CisFirewallArgs,
                    opts: Optional[ResourceOptions] = None)
    
    @overload
    def CisFirewall(resource_name: str,
                    opts: Optional[ResourceOptions] = None,
                    cis_id: Optional[str] = None,
                    domain_id: Optional[str] = None,
                    firewall_type: Optional[str] = None,
                    access_rule: Optional[CisFirewallAccessRuleArgs] = None,
                    cis_firewall_id: Optional[str] = None,
                    lockdown: Optional[CisFirewallLockdownArgs] = None,
                    ua_rule: Optional[CisFirewallUaRuleArgs] = None)
    func NewCisFirewall(ctx *Context, name string, args CisFirewallArgs, opts ...ResourceOption) (*CisFirewall, error)
    public CisFirewall(string name, CisFirewallArgs args, CustomResourceOptions? opts = null)
    public CisFirewall(String name, CisFirewallArgs args)
    public CisFirewall(String name, CisFirewallArgs args, CustomResourceOptions options)
    
    type: ibm:CisFirewall
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args CisFirewallArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args CisFirewallArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args CisFirewallArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args CisFirewallArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args CisFirewallArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var cisFirewallResource = new Ibm.CisFirewall("cisFirewallResource", new()
    {
        CisId = "string",
        DomainId = "string",
        FirewallType = "string",
        AccessRule = new Ibm.Inputs.CisFirewallAccessRuleArgs
        {
            Configuration = new Ibm.Inputs.CisFirewallAccessRuleConfigurationArgs
            {
                Target = "string",
                Value = "string",
            },
            Mode = "string",
            AccessRuleId = "string",
            Notes = "string",
        },
        CisFirewallId = "string",
        Lockdown = new Ibm.Inputs.CisFirewallLockdownArgs
        {
            Configurations = new[]
            {
                new Ibm.Inputs.CisFirewallLockdownConfigurationArgs
                {
                    Target = "string",
                    Value = "string",
                },
            },
            Urls = new[]
            {
                "string",
            },
            Description = "string",
            LockdownId = "string",
            Paused = false,
            Priority = 0,
        },
        UaRule = new Ibm.Inputs.CisFirewallUaRuleArgs
        {
            Configuration = new Ibm.Inputs.CisFirewallUaRuleConfigurationArgs
            {
                Target = "string",
                Value = "string",
            },
            Mode = "string",
            Description = "string",
            Paused = false,
            UaRuleId = "string",
        },
    });
    
    example, err := ibm.NewCisFirewall(ctx, "cisFirewallResource", &ibm.CisFirewallArgs{
    	CisId:        pulumi.String("string"),
    	DomainId:     pulumi.String("string"),
    	FirewallType: pulumi.String("string"),
    	AccessRule: &ibm.CisFirewallAccessRuleArgs{
    		Configuration: &ibm.CisFirewallAccessRuleConfigurationArgs{
    			Target: pulumi.String("string"),
    			Value:  pulumi.String("string"),
    		},
    		Mode:         pulumi.String("string"),
    		AccessRuleId: pulumi.String("string"),
    		Notes:        pulumi.String("string"),
    	},
    	CisFirewallId: pulumi.String("string"),
    	Lockdown: &ibm.CisFirewallLockdownArgs{
    		Configurations: ibm.CisFirewallLockdownConfigurationArray{
    			&ibm.CisFirewallLockdownConfigurationArgs{
    				Target: pulumi.String("string"),
    				Value:  pulumi.String("string"),
    			},
    		},
    		Urls: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		Description: pulumi.String("string"),
    		LockdownId:  pulumi.String("string"),
    		Paused:      pulumi.Bool(false),
    		Priority:    pulumi.Float64(0),
    	},
    	UaRule: &ibm.CisFirewallUaRuleArgs{
    		Configuration: &ibm.CisFirewallUaRuleConfigurationArgs{
    			Target: pulumi.String("string"),
    			Value:  pulumi.String("string"),
    		},
    		Mode:        pulumi.String("string"),
    		Description: pulumi.String("string"),
    		Paused:      pulumi.Bool(false),
    		UaRuleId:    pulumi.String("string"),
    	},
    })
    
    var cisFirewallResource = new CisFirewall("cisFirewallResource", CisFirewallArgs.builder()
        .cisId("string")
        .domainId("string")
        .firewallType("string")
        .accessRule(CisFirewallAccessRuleArgs.builder()
            .configuration(CisFirewallAccessRuleConfigurationArgs.builder()
                .target("string")
                .value("string")
                .build())
            .mode("string")
            .accessRuleId("string")
            .notes("string")
            .build())
        .cisFirewallId("string")
        .lockdown(CisFirewallLockdownArgs.builder()
            .configurations(CisFirewallLockdownConfigurationArgs.builder()
                .target("string")
                .value("string")
                .build())
            .urls("string")
            .description("string")
            .lockdownId("string")
            .paused(false)
            .priority(0)
            .build())
        .uaRule(CisFirewallUaRuleArgs.builder()
            .configuration(CisFirewallUaRuleConfigurationArgs.builder()
                .target("string")
                .value("string")
                .build())
            .mode("string")
            .description("string")
            .paused(false)
            .uaRuleId("string")
            .build())
        .build());
    
    cis_firewall_resource = ibm.CisFirewall("cisFirewallResource",
        cis_id="string",
        domain_id="string",
        firewall_type="string",
        access_rule={
            "configuration": {
                "target": "string",
                "value": "string",
            },
            "mode": "string",
            "access_rule_id": "string",
            "notes": "string",
        },
        cis_firewall_id="string",
        lockdown={
            "configurations": [{
                "target": "string",
                "value": "string",
            }],
            "urls": ["string"],
            "description": "string",
            "lockdown_id": "string",
            "paused": False,
            "priority": 0,
        },
        ua_rule={
            "configuration": {
                "target": "string",
                "value": "string",
            },
            "mode": "string",
            "description": "string",
            "paused": False,
            "ua_rule_id": "string",
        })
    
    const cisFirewallResource = new ibm.CisFirewall("cisFirewallResource", {
        cisId: "string",
        domainId: "string",
        firewallType: "string",
        accessRule: {
            configuration: {
                target: "string",
                value: "string",
            },
            mode: "string",
            accessRuleId: "string",
            notes: "string",
        },
        cisFirewallId: "string",
        lockdown: {
            configurations: [{
                target: "string",
                value: "string",
            }],
            urls: ["string"],
            description: "string",
            lockdownId: "string",
            paused: false,
            priority: 0,
        },
        uaRule: {
            configuration: {
                target: "string",
                value: "string",
            },
            mode: "string",
            description: "string",
            paused: false,
            uaRuleId: "string",
        },
    });
    
    type: ibm:CisFirewall
    properties:
        accessRule:
            accessRuleId: string
            configuration:
                target: string
                value: string
            mode: string
            notes: string
        cisFirewallId: string
        cisId: string
        domainId: string
        firewallType: string
        lockdown:
            configurations:
                - target: string
                  value: string
            description: string
            lockdownId: string
            paused: false
            priority: 0
            urls:
                - string
        uaRule:
            configuration:
                target: string
                value: string
            description: string
            mode: string
            paused: false
            uaRuleId: string
    

    CisFirewall Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The CisFirewall resource accepts the following input properties:

    CisId string
    The ID of the IBM Cloud Internet Services instance where you want to create the firewall.
    DomainId string
    The ID of the domain where you want to apply the firewall rules.
    FirewallType string
    The type of firewall that you want to create for your domain. Supported values are lockdowns, access_rules, and ua_rules. Consider the following information when choosing your firewall type: access_rules: Access rules allow, challenge, or block requests to your website. You can apply access rules to one domain only or all domains in the same service instance.ua_rules: Apply firewall rules only if the user agent that is used by the client matches the user agent that you defined. lockdowns: Allow access to your domain for specific IP addresses or IP address ranges only. If you choose this firewall type, you must define your firewall rules in the lockdown input parameter..
    AccessRule CisFirewallAccessRule

    Create the data the describing access rule. (Maximum item is 1).

    Nested scheme for access_rules:

    CisFirewallId string
    (String) The ID of the record. The ID is composed of <firewall_type>,<lockdown_id/access_rule_id/ua_rule_id>,<domain_ID>,<cis_crn>. Attributes are concatenated with :.
    Lockdown CisFirewallLockdown

    A list of firewall rules that you want to create for your lockdowns firewall. You can specify one item in this list only.

    Nested scheme for lockdown:

    UaRule CisFirewallUaRule

    Create the data describing the user agent rule. (Maximum item is 1).

    Nested scheme for ua_rule:

    CisId string
    The ID of the IBM Cloud Internet Services instance where you want to create the firewall.
    DomainId string
    The ID of the domain where you want to apply the firewall rules.
    FirewallType string
    The type of firewall that you want to create for your domain. Supported values are lockdowns, access_rules, and ua_rules. Consider the following information when choosing your firewall type: access_rules: Access rules allow, challenge, or block requests to your website. You can apply access rules to one domain only or all domains in the same service instance.ua_rules: Apply firewall rules only if the user agent that is used by the client matches the user agent that you defined. lockdowns: Allow access to your domain for specific IP addresses or IP address ranges only. If you choose this firewall type, you must define your firewall rules in the lockdown input parameter..
    AccessRule CisFirewallAccessRuleArgs

    Create the data the describing access rule. (Maximum item is 1).

    Nested scheme for access_rules:

    CisFirewallId string
    (String) The ID of the record. The ID is composed of <firewall_type>,<lockdown_id/access_rule_id/ua_rule_id>,<domain_ID>,<cis_crn>. Attributes are concatenated with :.
    Lockdown CisFirewallLockdownArgs

    A list of firewall rules that you want to create for your lockdowns firewall. You can specify one item in this list only.

    Nested scheme for lockdown:

    UaRule CisFirewallUaRuleArgs

    Create the data describing the user agent rule. (Maximum item is 1).

    Nested scheme for ua_rule:

    cisId String
    The ID of the IBM Cloud Internet Services instance where you want to create the firewall.
    domainId String
    The ID of the domain where you want to apply the firewall rules.
    firewallType String
    The type of firewall that you want to create for your domain. Supported values are lockdowns, access_rules, and ua_rules. Consider the following information when choosing your firewall type: access_rules: Access rules allow, challenge, or block requests to your website. You can apply access rules to one domain only or all domains in the same service instance.ua_rules: Apply firewall rules only if the user agent that is used by the client matches the user agent that you defined. lockdowns: Allow access to your domain for specific IP addresses or IP address ranges only. If you choose this firewall type, you must define your firewall rules in the lockdown input parameter..
    accessRule CisFirewallAccessRule

    Create the data the describing access rule. (Maximum item is 1).

    Nested scheme for access_rules:

    cisFirewallId String
    (String) The ID of the record. The ID is composed of <firewall_type>,<lockdown_id/access_rule_id/ua_rule_id>,<domain_ID>,<cis_crn>. Attributes are concatenated with :.
    lockdown CisFirewallLockdown

    A list of firewall rules that you want to create for your lockdowns firewall. You can specify one item in this list only.

    Nested scheme for lockdown:

    uaRule CisFirewallUaRule

    Create the data describing the user agent rule. (Maximum item is 1).

    Nested scheme for ua_rule:

    cisId string
    The ID of the IBM Cloud Internet Services instance where you want to create the firewall.
    domainId string
    The ID of the domain where you want to apply the firewall rules.
    firewallType string
    The type of firewall that you want to create for your domain. Supported values are lockdowns, access_rules, and ua_rules. Consider the following information when choosing your firewall type: access_rules: Access rules allow, challenge, or block requests to your website. You can apply access rules to one domain only or all domains in the same service instance.ua_rules: Apply firewall rules only if the user agent that is used by the client matches the user agent that you defined. lockdowns: Allow access to your domain for specific IP addresses or IP address ranges only. If you choose this firewall type, you must define your firewall rules in the lockdown input parameter..
    accessRule CisFirewallAccessRule

    Create the data the describing access rule. (Maximum item is 1).

    Nested scheme for access_rules:

    cisFirewallId string
    (String) The ID of the record. The ID is composed of <firewall_type>,<lockdown_id/access_rule_id/ua_rule_id>,<domain_ID>,<cis_crn>. Attributes are concatenated with :.
    lockdown CisFirewallLockdown

    A list of firewall rules that you want to create for your lockdowns firewall. You can specify one item in this list only.

    Nested scheme for lockdown:

    uaRule CisFirewallUaRule

    Create the data describing the user agent rule. (Maximum item is 1).

    Nested scheme for ua_rule:

    cis_id str
    The ID of the IBM Cloud Internet Services instance where you want to create the firewall.
    domain_id str
    The ID of the domain where you want to apply the firewall rules.
    firewall_type str
    The type of firewall that you want to create for your domain. Supported values are lockdowns, access_rules, and ua_rules. Consider the following information when choosing your firewall type: access_rules: Access rules allow, challenge, or block requests to your website. You can apply access rules to one domain only or all domains in the same service instance.ua_rules: Apply firewall rules only if the user agent that is used by the client matches the user agent that you defined. lockdowns: Allow access to your domain for specific IP addresses or IP address ranges only. If you choose this firewall type, you must define your firewall rules in the lockdown input parameter..
    access_rule CisFirewallAccessRuleArgs

    Create the data the describing access rule. (Maximum item is 1).

    Nested scheme for access_rules:

    cis_firewall_id str
    (String) The ID of the record. The ID is composed of <firewall_type>,<lockdown_id/access_rule_id/ua_rule_id>,<domain_ID>,<cis_crn>. Attributes are concatenated with :.
    lockdown CisFirewallLockdownArgs

    A list of firewall rules that you want to create for your lockdowns firewall. You can specify one item in this list only.

    Nested scheme for lockdown:

    ua_rule CisFirewallUaRuleArgs

    Create the data describing the user agent rule. (Maximum item is 1).

    Nested scheme for ua_rule:

    cisId String
    The ID of the IBM Cloud Internet Services instance where you want to create the firewall.
    domainId String
    The ID of the domain where you want to apply the firewall rules.
    firewallType String
    The type of firewall that you want to create for your domain. Supported values are lockdowns, access_rules, and ua_rules. Consider the following information when choosing your firewall type: access_rules: Access rules allow, challenge, or block requests to your website. You can apply access rules to one domain only or all domains in the same service instance.ua_rules: Apply firewall rules only if the user agent that is used by the client matches the user agent that you defined. lockdowns: Allow access to your domain for specific IP addresses or IP address ranges only. If you choose this firewall type, you must define your firewall rules in the lockdown input parameter..
    accessRule Property Map

    Create the data the describing access rule. (Maximum item is 1).

    Nested scheme for access_rules:

    cisFirewallId String
    (String) The ID of the record. The ID is composed of <firewall_type>,<lockdown_id/access_rule_id/ua_rule_id>,<domain_ID>,<cis_crn>. Attributes are concatenated with :.
    lockdown Property Map

    A list of firewall rules that you want to create for your lockdowns firewall. You can specify one item in this list only.

    Nested scheme for lockdown:

    uaRule Property Map

    Create the data describing the user agent rule. (Maximum item is 1).

    Nested scheme for ua_rule:

    Outputs

    All input properties are implicitly available as output properties. Additionally, the CisFirewall resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing CisFirewall Resource

    Get an existing CisFirewall resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: CisFirewallState, opts?: CustomResourceOptions): CisFirewall
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            access_rule: Optional[CisFirewallAccessRuleArgs] = None,
            cis_firewall_id: Optional[str] = None,
            cis_id: Optional[str] = None,
            domain_id: Optional[str] = None,
            firewall_type: Optional[str] = None,
            lockdown: Optional[CisFirewallLockdownArgs] = None,
            ua_rule: Optional[CisFirewallUaRuleArgs] = None) -> CisFirewall
    func GetCisFirewall(ctx *Context, name string, id IDInput, state *CisFirewallState, opts ...ResourceOption) (*CisFirewall, error)
    public static CisFirewall Get(string name, Input<string> id, CisFirewallState? state, CustomResourceOptions? opts = null)
    public static CisFirewall get(String name, Output<String> id, CisFirewallState state, CustomResourceOptions options)
    resources:  _:    type: ibm:CisFirewall    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    AccessRule CisFirewallAccessRule

    Create the data the describing access rule. (Maximum item is 1).

    Nested scheme for access_rules:

    CisFirewallId string
    (String) The ID of the record. The ID is composed of <firewall_type>,<lockdown_id/access_rule_id/ua_rule_id>,<domain_ID>,<cis_crn>. Attributes are concatenated with :.
    CisId string
    The ID of the IBM Cloud Internet Services instance where you want to create the firewall.
    DomainId string
    The ID of the domain where you want to apply the firewall rules.
    FirewallType string
    The type of firewall that you want to create for your domain. Supported values are lockdowns, access_rules, and ua_rules. Consider the following information when choosing your firewall type: access_rules: Access rules allow, challenge, or block requests to your website. You can apply access rules to one domain only or all domains in the same service instance.ua_rules: Apply firewall rules only if the user agent that is used by the client matches the user agent that you defined. lockdowns: Allow access to your domain for specific IP addresses or IP address ranges only. If you choose this firewall type, you must define your firewall rules in the lockdown input parameter..
    Lockdown CisFirewallLockdown

    A list of firewall rules that you want to create for your lockdowns firewall. You can specify one item in this list only.

    Nested scheme for lockdown:

    UaRule CisFirewallUaRule

    Create the data describing the user agent rule. (Maximum item is 1).

    Nested scheme for ua_rule:

    AccessRule CisFirewallAccessRuleArgs

    Create the data the describing access rule. (Maximum item is 1).

    Nested scheme for access_rules:

    CisFirewallId string
    (String) The ID of the record. The ID is composed of <firewall_type>,<lockdown_id/access_rule_id/ua_rule_id>,<domain_ID>,<cis_crn>. Attributes are concatenated with :.
    CisId string
    The ID of the IBM Cloud Internet Services instance where you want to create the firewall.
    DomainId string
    The ID of the domain where you want to apply the firewall rules.
    FirewallType string
    The type of firewall that you want to create for your domain. Supported values are lockdowns, access_rules, and ua_rules. Consider the following information when choosing your firewall type: access_rules: Access rules allow, challenge, or block requests to your website. You can apply access rules to one domain only or all domains in the same service instance.ua_rules: Apply firewall rules only if the user agent that is used by the client matches the user agent that you defined. lockdowns: Allow access to your domain for specific IP addresses or IP address ranges only. If you choose this firewall type, you must define your firewall rules in the lockdown input parameter..
    Lockdown CisFirewallLockdownArgs

    A list of firewall rules that you want to create for your lockdowns firewall. You can specify one item in this list only.

    Nested scheme for lockdown:

    UaRule CisFirewallUaRuleArgs

    Create the data describing the user agent rule. (Maximum item is 1).

    Nested scheme for ua_rule:

    accessRule CisFirewallAccessRule

    Create the data the describing access rule. (Maximum item is 1).

    Nested scheme for access_rules:

    cisFirewallId String
    (String) The ID of the record. The ID is composed of <firewall_type>,<lockdown_id/access_rule_id/ua_rule_id>,<domain_ID>,<cis_crn>. Attributes are concatenated with :.
    cisId String
    The ID of the IBM Cloud Internet Services instance where you want to create the firewall.
    domainId String
    The ID of the domain where you want to apply the firewall rules.
    firewallType String
    The type of firewall that you want to create for your domain. Supported values are lockdowns, access_rules, and ua_rules. Consider the following information when choosing your firewall type: access_rules: Access rules allow, challenge, or block requests to your website. You can apply access rules to one domain only or all domains in the same service instance.ua_rules: Apply firewall rules only if the user agent that is used by the client matches the user agent that you defined. lockdowns: Allow access to your domain for specific IP addresses or IP address ranges only. If you choose this firewall type, you must define your firewall rules in the lockdown input parameter..
    lockdown CisFirewallLockdown

    A list of firewall rules that you want to create for your lockdowns firewall. You can specify one item in this list only.

    Nested scheme for lockdown:

    uaRule CisFirewallUaRule

    Create the data describing the user agent rule. (Maximum item is 1).

    Nested scheme for ua_rule:

    accessRule CisFirewallAccessRule

    Create the data the describing access rule. (Maximum item is 1).

    Nested scheme for access_rules:

    cisFirewallId string
    (String) The ID of the record. The ID is composed of <firewall_type>,<lockdown_id/access_rule_id/ua_rule_id>,<domain_ID>,<cis_crn>. Attributes are concatenated with :.
    cisId string
    The ID of the IBM Cloud Internet Services instance where you want to create the firewall.
    domainId string
    The ID of the domain where you want to apply the firewall rules.
    firewallType string
    The type of firewall that you want to create for your domain. Supported values are lockdowns, access_rules, and ua_rules. Consider the following information when choosing your firewall type: access_rules: Access rules allow, challenge, or block requests to your website. You can apply access rules to one domain only or all domains in the same service instance.ua_rules: Apply firewall rules only if the user agent that is used by the client matches the user agent that you defined. lockdowns: Allow access to your domain for specific IP addresses or IP address ranges only. If you choose this firewall type, you must define your firewall rules in the lockdown input parameter..
    lockdown CisFirewallLockdown

    A list of firewall rules that you want to create for your lockdowns firewall. You can specify one item in this list only.

    Nested scheme for lockdown:

    uaRule CisFirewallUaRule

    Create the data describing the user agent rule. (Maximum item is 1).

    Nested scheme for ua_rule:

    access_rule CisFirewallAccessRuleArgs

    Create the data the describing access rule. (Maximum item is 1).

    Nested scheme for access_rules:

    cis_firewall_id str
    (String) The ID of the record. The ID is composed of <firewall_type>,<lockdown_id/access_rule_id/ua_rule_id>,<domain_ID>,<cis_crn>. Attributes are concatenated with :.
    cis_id str
    The ID of the IBM Cloud Internet Services instance where you want to create the firewall.
    domain_id str
    The ID of the domain where you want to apply the firewall rules.
    firewall_type str
    The type of firewall that you want to create for your domain. Supported values are lockdowns, access_rules, and ua_rules. Consider the following information when choosing your firewall type: access_rules: Access rules allow, challenge, or block requests to your website. You can apply access rules to one domain only or all domains in the same service instance.ua_rules: Apply firewall rules only if the user agent that is used by the client matches the user agent that you defined. lockdowns: Allow access to your domain for specific IP addresses or IP address ranges only. If you choose this firewall type, you must define your firewall rules in the lockdown input parameter..
    lockdown CisFirewallLockdownArgs

    A list of firewall rules that you want to create for your lockdowns firewall. You can specify one item in this list only.

    Nested scheme for lockdown:

    ua_rule CisFirewallUaRuleArgs

    Create the data describing the user agent rule. (Maximum item is 1).

    Nested scheme for ua_rule:

    accessRule Property Map

    Create the data the describing access rule. (Maximum item is 1).

    Nested scheme for access_rules:

    cisFirewallId String
    (String) The ID of the record. The ID is composed of <firewall_type>,<lockdown_id/access_rule_id/ua_rule_id>,<domain_ID>,<cis_crn>. Attributes are concatenated with :.
    cisId String
    The ID of the IBM Cloud Internet Services instance where you want to create the firewall.
    domainId String
    The ID of the domain where you want to apply the firewall rules.
    firewallType String
    The type of firewall that you want to create for your domain. Supported values are lockdowns, access_rules, and ua_rules. Consider the following information when choosing your firewall type: access_rules: Access rules allow, challenge, or block requests to your website. You can apply access rules to one domain only or all domains in the same service instance.ua_rules: Apply firewall rules only if the user agent that is used by the client matches the user agent that you defined. lockdowns: Allow access to your domain for specific IP addresses or IP address ranges only. If you choose this firewall type, you must define your firewall rules in the lockdown input parameter..
    lockdown Property Map

    A list of firewall rules that you want to create for your lockdowns firewall. You can specify one item in this list only.

    Nested scheme for lockdown:

    uaRule Property Map

    Create the data describing the user agent rule. (Maximum item is 1).

    Nested scheme for ua_rule:

    Supporting Types

    CisFirewallAccessRule, CisFirewallAccessRuleArgs

    Configuration CisFirewallAccessRuleConfiguration

    The Configuration of firewall. (Maximum items is 1).

    Nested scheme for configuration:

    Mode string
    The mode of access rule. The valid modes are block, challenge, whitelist, js_challenge.
    AccessRuleId string
    (String) The access rule ID.
    Notes string
    The free text for notes.
    Configuration CisFirewallAccessRuleConfiguration

    The Configuration of firewall. (Maximum items is 1).

    Nested scheme for configuration:

    Mode string
    The mode of access rule. The valid modes are block, challenge, whitelist, js_challenge.
    AccessRuleId string
    (String) The access rule ID.
    Notes string
    The free text for notes.
    configuration CisFirewallAccessRuleConfiguration

    The Configuration of firewall. (Maximum items is 1).

    Nested scheme for configuration:

    mode String
    The mode of access rule. The valid modes are block, challenge, whitelist, js_challenge.
    accessRuleId String
    (String) The access rule ID.
    notes String
    The free text for notes.
    configuration CisFirewallAccessRuleConfiguration

    The Configuration of firewall. (Maximum items is 1).

    Nested scheme for configuration:

    mode string
    The mode of access rule. The valid modes are block, challenge, whitelist, js_challenge.
    accessRuleId string
    (String) The access rule ID.
    notes string
    The free text for notes.
    configuration CisFirewallAccessRuleConfiguration

    The Configuration of firewall. (Maximum items is 1).

    Nested scheme for configuration:

    mode str
    The mode of access rule. The valid modes are block, challenge, whitelist, js_challenge.
    access_rule_id str
    (String) The access rule ID.
    notes str
    The free text for notes.
    configuration Property Map

    The Configuration of firewall. (Maximum items is 1).

    Nested scheme for configuration:

    mode String
    The mode of access rule. The valid modes are block, challenge, whitelist, js_challenge.
    accessRuleId String
    (String) The access rule ID.
    notes String
    The free text for notes.

    CisFirewallAccessRuleConfiguration, CisFirewallAccessRuleConfigurationArgs

    Target string
    The request property to target. Valid values are ip, ip_range, asn, country.
    Value string
    IP address or CIDR or Autonomous or Country code.
    Target string
    The request property to target. Valid values are ip, ip_range, asn, country.
    Value string
    IP address or CIDR or Autonomous or Country code.
    target String
    The request property to target. Valid values are ip, ip_range, asn, country.
    value String
    IP address or CIDR or Autonomous or Country code.
    target string
    The request property to target. Valid values are ip, ip_range, asn, country.
    value string
    IP address or CIDR or Autonomous or Country code.
    target str
    The request property to target. Valid values are ip, ip_range, asn, country.
    value str
    IP address or CIDR or Autonomous or Country code.
    target String
    The request property to target. Valid values are ip, ip_range, asn, country.
    value String
    IP address or CIDR or Autonomous or Country code.

    CisFirewallLockdown, CisFirewallLockdownArgs

    Configurations List<CisFirewallLockdownConfiguration>

    A list of IP address or CIDR ranges that you want to allow access to the URLs that you defined in urls.

    Nested scheme for configurations:

    Urls List<string>
    A list of URLs that you want to include in your firewall rule. You can specify wildcard URLs. The URL pattern is escaped before use.
    Description string
    A description for your firewall rule.
    LockdownId string
    (String) The lock down ID.
    Paused bool
    If set to true, the firewall rule is disabled. If set to false, the firewall rule is enabled.
    Priority double
    The priority of the firewall rule. A low number is associated with a high priority.
    Configurations []CisFirewallLockdownConfiguration

    A list of IP address or CIDR ranges that you want to allow access to the URLs that you defined in urls.

    Nested scheme for configurations:

    Urls []string
    A list of URLs that you want to include in your firewall rule. You can specify wildcard URLs. The URL pattern is escaped before use.
    Description string
    A description for your firewall rule.
    LockdownId string
    (String) The lock down ID.
    Paused bool
    If set to true, the firewall rule is disabled. If set to false, the firewall rule is enabled.
    Priority float64
    The priority of the firewall rule. A low number is associated with a high priority.
    configurations List<CisFirewallLockdownConfiguration>

    A list of IP address or CIDR ranges that you want to allow access to the URLs that you defined in urls.

    Nested scheme for configurations:

    urls List<String>
    A list of URLs that you want to include in your firewall rule. You can specify wildcard URLs. The URL pattern is escaped before use.
    description String
    A description for your firewall rule.
    lockdownId String
    (String) The lock down ID.
    paused Boolean
    If set to true, the firewall rule is disabled. If set to false, the firewall rule is enabled.
    priority Double
    The priority of the firewall rule. A low number is associated with a high priority.
    configurations CisFirewallLockdownConfiguration[]

    A list of IP address or CIDR ranges that you want to allow access to the URLs that you defined in urls.

    Nested scheme for configurations:

    urls string[]
    A list of URLs that you want to include in your firewall rule. You can specify wildcard URLs. The URL pattern is escaped before use.
    description string
    A description for your firewall rule.
    lockdownId string
    (String) The lock down ID.
    paused boolean
    If set to true, the firewall rule is disabled. If set to false, the firewall rule is enabled.
    priority number
    The priority of the firewall rule. A low number is associated with a high priority.
    configurations Sequence[CisFirewallLockdownConfiguration]

    A list of IP address or CIDR ranges that you want to allow access to the URLs that you defined in urls.

    Nested scheme for configurations:

    urls Sequence[str]
    A list of URLs that you want to include in your firewall rule. You can specify wildcard URLs. The URL pattern is escaped before use.
    description str
    A description for your firewall rule.
    lockdown_id str
    (String) The lock down ID.
    paused bool
    If set to true, the firewall rule is disabled. If set to false, the firewall rule is enabled.
    priority float
    The priority of the firewall rule. A low number is associated with a high priority.
    configurations List<Property Map>

    A list of IP address or CIDR ranges that you want to allow access to the URLs that you defined in urls.

    Nested scheme for configurations:

    urls List<String>
    A list of URLs that you want to include in your firewall rule. You can specify wildcard URLs. The URL pattern is escaped before use.
    description String
    A description for your firewall rule.
    lockdownId String
    (String) The lock down ID.
    paused Boolean
    If set to true, the firewall rule is disabled. If set to false, the firewall rule is enabled.
    priority Number
    The priority of the firewall rule. A low number is associated with a high priority.

    CisFirewallLockdownConfiguration, CisFirewallLockdownConfigurationArgs

    Target string
    Specify if you want to target an IP or ip_range.
    Value string
    The IP address or IP address range that you want to target. Make sure that the value that you enter here matches the type of target that you specified in lockdown.configurations.target.
    Target string
    Specify if you want to target an IP or ip_range.
    Value string
    The IP address or IP address range that you want to target. Make sure that the value that you enter here matches the type of target that you specified in lockdown.configurations.target.
    target String
    Specify if you want to target an IP or ip_range.
    value String
    The IP address or IP address range that you want to target. Make sure that the value that you enter here matches the type of target that you specified in lockdown.configurations.target.
    target string
    Specify if you want to target an IP or ip_range.
    value string
    The IP address or IP address range that you want to target. Make sure that the value that you enter here matches the type of target that you specified in lockdown.configurations.target.
    target str
    Specify if you want to target an IP or ip_range.
    value str
    The IP address or IP address range that you want to target. Make sure that the value that you enter here matches the type of target that you specified in lockdown.configurations.target.
    target String
    Specify if you want to target an IP or ip_range.
    value String
    The IP address or IP address range that you want to target. Make sure that the value that you enter here matches the type of target that you specified in lockdown.configurations.target.

    CisFirewallUaRule, CisFirewallUaRuleArgs

    Configuration CisFirewallUaRuleConfiguration

    The Configuration of firewall. (Maximum item is 1).

    Nested scheme for configuration:

    Mode string
    The mode of access rule. The valid modes are block, challenge, js_challenge.
    Description string
    description
    Paused bool

    Whether the rule is currently disabled.

    Note

    Exactly one of lockdown, access_rule, and ua_rule is allowed for the firewall types lockdowns, access_rules, and ua_rules.

    UaRuleId string
    (String) The user agent rule ID.
    Configuration CisFirewallUaRuleConfiguration

    The Configuration of firewall. (Maximum item is 1).

    Nested scheme for configuration:

    Mode string
    The mode of access rule. The valid modes are block, challenge, js_challenge.
    Description string
    description
    Paused bool

    Whether the rule is currently disabled.

    Note

    Exactly one of lockdown, access_rule, and ua_rule is allowed for the firewall types lockdowns, access_rules, and ua_rules.

    UaRuleId string
    (String) The user agent rule ID.
    configuration CisFirewallUaRuleConfiguration

    The Configuration of firewall. (Maximum item is 1).

    Nested scheme for configuration:

    mode String
    The mode of access rule. The valid modes are block, challenge, js_challenge.
    description String
    description
    paused Boolean

    Whether the rule is currently disabled.

    Note

    Exactly one of lockdown, access_rule, and ua_rule is allowed for the firewall types lockdowns, access_rules, and ua_rules.

    uaRuleId String
    (String) The user agent rule ID.
    configuration CisFirewallUaRuleConfiguration

    The Configuration of firewall. (Maximum item is 1).

    Nested scheme for configuration:

    mode string
    The mode of access rule. The valid modes are block, challenge, js_challenge.
    description string
    description
    paused boolean

    Whether the rule is currently disabled.

    Note

    Exactly one of lockdown, access_rule, and ua_rule is allowed for the firewall types lockdowns, access_rules, and ua_rules.

    uaRuleId string
    (String) The user agent rule ID.
    configuration CisFirewallUaRuleConfiguration

    The Configuration of firewall. (Maximum item is 1).

    Nested scheme for configuration:

    mode str
    The mode of access rule. The valid modes are block, challenge, js_challenge.
    description str
    description
    paused bool

    Whether the rule is currently disabled.

    Note

    Exactly one of lockdown, access_rule, and ua_rule is allowed for the firewall types lockdowns, access_rules, and ua_rules.

    ua_rule_id str
    (String) The user agent rule ID.
    configuration Property Map

    The Configuration of firewall. (Maximum item is 1).

    Nested scheme for configuration:

    mode String
    The mode of access rule. The valid modes are block, challenge, js_challenge.
    description String
    description
    paused Boolean

    Whether the rule is currently disabled.

    Note

    Exactly one of lockdown, access_rule, and ua_rule is allowed for the firewall types lockdowns, access_rules, and ua_rules.

    uaRuleId String
    (String) The user agent rule ID.

    CisFirewallUaRuleConfiguration, CisFirewallUaRuleConfigurationArgs

    Target string
    The request property to target. Valid values are ua.
    Value string
    The exact user agent string to match the rule.

    • description - (Optional, String) The free text for description.
    Target string
    The request property to target. Valid values are ua.
    Value string
    The exact user agent string to match the rule.

    • description - (Optional, String) The free text for description.
    target String
    The request property to target. Valid values are ua.
    value String
    The exact user agent string to match the rule.

    • description - (Optional, String) The free text for description.
    target string
    The request property to target. Valid values are ua.
    value string
    The exact user agent string to match the rule.

    • description - (Optional, String) The free text for description.
    target str
    The request property to target. Valid values are ua.
    value str
    The exact user agent string to match the rule.

    • description - (Optional, String) The free text for description.
    target String
    The request property to target. Valid values are ua.
    value String
    The exact user agent string to match the rule.

    • description - (Optional, String) The free text for description.

    Import

    The ibm_cis_firewall resource is imported by using the ID. The ID is formed from the firewall type, the firewall ID, the domain ID of the domain and the CRN (Cloud Resource Name) concatenated using a : character.

    The domain ID and CRN is located on the overview page of the internet services instance of the domain heading of the console, or by using the ibm cis command line commands.

    • Domain ID is a 32 digit character string of the form: 9caf68812ae9b3f0377fdf986751a78f.

    • CRN is a 120 digit character string of the form: crn:v1:bluemix:public:internet-svcs:global:a/4ea1882a2d3401ed1e459979941966ea:31fa970d-51d0-4b05-893e-251cba75a7b3::.

    • Firewall ID is a 32 digit character string of the form: 489d96f0da6ed76251b475971b097205c.

    • Firewall type is a string. It can be either of lockdowns, access_rules, ua_rules.

    Syntax

    $ pulumi import ibm:index/cisFirewall:CisFirewall myorg <firewall_type>:<firewall_id>:<domain-id>:<crn>
    

    Example

    $ pulumi import ibm:index/cisFirewall:CisFirewall myorg lockdowns lockdowns:48996f0da6ed76251b475971b097205c:9caf68812ae9b3f0377fdf986751a78f:crn:v1:bluemix:public:internet-svcs:global:a/4ea1882a2d3401ed1e459979941966ea:31fa970d-51d0-4b05-893e-251cba75a7b3::
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    ibm ibm-cloud/terraform-provider-ibm
    License
    Notes
    This Pulumi package is based on the ibm Terraform Provider.
    ibm logo
    ibm 1.78.0 published on Wednesday, Apr 30, 2025 by ibm-cloud