1. Packages
  2. Ibm Provider
  3. API Docs
  4. FirewallPolicy
ibm 1.78.0 published on Wednesday, Apr 30, 2025 by ibm-cloud

ibm.FirewallPolicy

Explore with Pulumi AI

ibm logo
ibm 1.78.0 published on Wednesday, Apr 30, 2025 by ibm-cloud

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as ibm from "@pulumi/ibm";
    
    const demofw = new ibm.Firewall("demofw", {
        haEnabled: false,
        publicVlanId: 1234567,
    });
    const rules = new ibm.FirewallPolicy("rules", {
        firewallId: demofw.firewallId,
        rules: [
            {
                action: "permit",
                srcIpAddress: "10.1.1.0",
                srcIpCidr: 24,
                dstIpAddress: "any",
                dstIpCidr: 32,
                dstPortRangeStart: 80,
                dstPortRangeEnd: 80,
                notes: "Permit from 10.1.1.0",
                protocol: "udp",
            },
            {
                action: "deny",
                srcIpAddress: "10.1.1.0",
                srcIpCidr: 24,
                dstIpAddress: "any",
                dstIpCidr: 32,
                dstPortRangeStart: 81,
                dstPortRangeEnd: 81,
                notes: "Permit from 10.1.1.0",
                protocol: "udp",
            },
        ],
    });
    
    import pulumi
    import pulumi_ibm as ibm
    
    demofw = ibm.Firewall("demofw",
        ha_enabled=False,
        public_vlan_id=1234567)
    rules = ibm.FirewallPolicy("rules",
        firewall_id=demofw.firewall_id,
        rules=[
            {
                "action": "permit",
                "src_ip_address": "10.1.1.0",
                "src_ip_cidr": 24,
                "dst_ip_address": "any",
                "dst_ip_cidr": 32,
                "dst_port_range_start": 80,
                "dst_port_range_end": 80,
                "notes": "Permit from 10.1.1.0",
                "protocol": "udp",
            },
            {
                "action": "deny",
                "src_ip_address": "10.1.1.0",
                "src_ip_cidr": 24,
                "dst_ip_address": "any",
                "dst_ip_cidr": 32,
                "dst_port_range_start": 81,
                "dst_port_range_end": 81,
                "notes": "Permit from 10.1.1.0",
                "protocol": "udp",
            },
        ])
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/ibm/ibm"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		demofw, err := ibm.NewFirewall(ctx, "demofw", &ibm.FirewallArgs{
    			HaEnabled:    pulumi.Bool(false),
    			PublicVlanId: pulumi.Float64(1234567),
    		})
    		if err != nil {
    			return err
    		}
    		_, err = ibm.NewFirewallPolicy(ctx, "rules", &ibm.FirewallPolicyArgs{
    			FirewallId: demofw.FirewallId,
    			Rules: ibm.FirewallPolicyRuleArray{
    				&ibm.FirewallPolicyRuleArgs{
    					Action:            pulumi.String("permit"),
    					SrcIpAddress:      pulumi.String("10.1.1.0"),
    					SrcIpCidr:         pulumi.Float64(24),
    					DstIpAddress:      pulumi.String("any"),
    					DstIpCidr:         pulumi.Float64(32),
    					DstPortRangeStart: pulumi.Float64(80),
    					DstPortRangeEnd:   pulumi.Float64(80),
    					Notes:             pulumi.String("Permit from 10.1.1.0"),
    					Protocol:          pulumi.String("udp"),
    				},
    				&ibm.FirewallPolicyRuleArgs{
    					Action:            pulumi.String("deny"),
    					SrcIpAddress:      pulumi.String("10.1.1.0"),
    					SrcIpCidr:         pulumi.Float64(24),
    					DstIpAddress:      pulumi.String("any"),
    					DstIpCidr:         pulumi.Float64(32),
    					DstPortRangeStart: pulumi.Float64(81),
    					DstPortRangeEnd:   pulumi.Float64(81),
    					Notes:             pulumi.String("Permit from 10.1.1.0"),
    					Protocol:          pulumi.String("udp"),
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Ibm = Pulumi.Ibm;
    
    return await Deployment.RunAsync(() => 
    {
        var demofw = new Ibm.Firewall("demofw", new()
        {
            HaEnabled = false,
            PublicVlanId = 1234567,
        });
    
        var rules = new Ibm.FirewallPolicy("rules", new()
        {
            FirewallId = demofw.FirewallId,
            Rules = new[]
            {
                new Ibm.Inputs.FirewallPolicyRuleArgs
                {
                    Action = "permit",
                    SrcIpAddress = "10.1.1.0",
                    SrcIpCidr = 24,
                    DstIpAddress = "any",
                    DstIpCidr = 32,
                    DstPortRangeStart = 80,
                    DstPortRangeEnd = 80,
                    Notes = "Permit from 10.1.1.0",
                    Protocol = "udp",
                },
                new Ibm.Inputs.FirewallPolicyRuleArgs
                {
                    Action = "deny",
                    SrcIpAddress = "10.1.1.0",
                    SrcIpCidr = 24,
                    DstIpAddress = "any",
                    DstIpCidr = 32,
                    DstPortRangeStart = 81,
                    DstPortRangeEnd = 81,
                    Notes = "Permit from 10.1.1.0",
                    Protocol = "udp",
                },
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.ibm.Firewall;
    import com.pulumi.ibm.FirewallArgs;
    import com.pulumi.ibm.FirewallPolicy;
    import com.pulumi.ibm.FirewallPolicyArgs;
    import com.pulumi.ibm.inputs.FirewallPolicyRuleArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var demofw = new Firewall("demofw", FirewallArgs.builder()
                .haEnabled(false)
                .publicVlanId(1234567)
                .build());
    
            var rules = new FirewallPolicy("rules", FirewallPolicyArgs.builder()
                .firewallId(demofw.firewallId())
                .rules(            
                    FirewallPolicyRuleArgs.builder()
                        .action("permit")
                        .srcIpAddress("10.1.1.0")
                        .srcIpCidr(24)
                        .dstIpAddress("any")
                        .dstIpCidr(32)
                        .dstPortRangeStart(80)
                        .dstPortRangeEnd(80)
                        .notes("Permit from 10.1.1.0")
                        .protocol("udp")
                        .build(),
                    FirewallPolicyRuleArgs.builder()
                        .action("deny")
                        .srcIpAddress("10.1.1.0")
                        .srcIpCidr(24)
                        .dstIpAddress("any")
                        .dstIpCidr(32)
                        .dstPortRangeStart(81)
                        .dstPortRangeEnd(81)
                        .notes("Permit from 10.1.1.0")
                        .protocol("udp")
                        .build())
                .build());
    
        }
    }
    
    resources:
      demofw:
        type: ibm:Firewall
        properties:
          haEnabled: false
          publicVlanId: 1.234567e+06
      rules:
        type: ibm:FirewallPolicy
        properties:
          firewallId: ${demofw.firewallId}
          rules:
            - action: permit
              srcIpAddress: 10.1.1.0
              srcIpCidr: 24
              dstIpAddress: any
              dstIpCidr: 32
              dstPortRangeStart: 80
              dstPortRangeEnd: 80
              notes: Permit from 10.1.1.0
              protocol: udp
            - action: deny
              srcIpAddress: 10.1.1.0
              srcIpCidr: 24
              dstIpAddress: any
              dstIpCidr: 32
              dstPortRangeStart: 81
              dstPortRangeEnd: 81
              notes: Permit from 10.1.1.0
              protocol: udp
    

    Create FirewallPolicy Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new FirewallPolicy(name: string, args: FirewallPolicyArgs, opts?: CustomResourceOptions);
    @overload
    def FirewallPolicy(resource_name: str,
                       args: FirewallPolicyArgs,
                       opts: Optional[ResourceOptions] = None)
    
    @overload
    def FirewallPolicy(resource_name: str,
                       opts: Optional[ResourceOptions] = None,
                       firewall_id: Optional[float] = None,
                       rules: Optional[Sequence[FirewallPolicyRuleArgs]] = None,
                       firewall_policy_id: Optional[str] = None,
                       tags: Optional[Sequence[str]] = None)
    func NewFirewallPolicy(ctx *Context, name string, args FirewallPolicyArgs, opts ...ResourceOption) (*FirewallPolicy, error)
    public FirewallPolicy(string name, FirewallPolicyArgs args, CustomResourceOptions? opts = null)
    public FirewallPolicy(String name, FirewallPolicyArgs args)
    public FirewallPolicy(String name, FirewallPolicyArgs args, CustomResourceOptions options)
    
    type: ibm:FirewallPolicy
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args FirewallPolicyArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args FirewallPolicyArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args FirewallPolicyArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args FirewallPolicyArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args FirewallPolicyArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var firewallPolicyResource = new Ibm.FirewallPolicy("firewallPolicyResource", new()
    {
        FirewallId = 0,
        Rules = new[]
        {
            new Ibm.Inputs.FirewallPolicyRuleArgs
            {
                Action = "string",
                DstIpAddress = "string",
                DstIpCidr = 0,
                Protocol = "string",
                SrcIpAddress = "string",
                SrcIpCidr = 0,
                DstPortRangeEnd = 0,
                DstPortRangeStart = 0,
                Notes = "string",
            },
        },
        FirewallPolicyId = "string",
        Tags = new[]
        {
            "string",
        },
    });
    
    example, err := ibm.NewFirewallPolicy(ctx, "firewallPolicyResource", &ibm.FirewallPolicyArgs{
    	FirewallId: pulumi.Float64(0),
    	Rules: ibm.FirewallPolicyRuleArray{
    		&ibm.FirewallPolicyRuleArgs{
    			Action:            pulumi.String("string"),
    			DstIpAddress:      pulumi.String("string"),
    			DstIpCidr:         pulumi.Float64(0),
    			Protocol:          pulumi.String("string"),
    			SrcIpAddress:      pulumi.String("string"),
    			SrcIpCidr:         pulumi.Float64(0),
    			DstPortRangeEnd:   pulumi.Float64(0),
    			DstPortRangeStart: pulumi.Float64(0),
    			Notes:             pulumi.String("string"),
    		},
    	},
    	FirewallPolicyId: pulumi.String("string"),
    	Tags: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    })
    
    var firewallPolicyResource = new FirewallPolicy("firewallPolicyResource", FirewallPolicyArgs.builder()
        .firewallId(0)
        .rules(FirewallPolicyRuleArgs.builder()
            .action("string")
            .dstIpAddress("string")
            .dstIpCidr(0)
            .protocol("string")
            .srcIpAddress("string")
            .srcIpCidr(0)
            .dstPortRangeEnd(0)
            .dstPortRangeStart(0)
            .notes("string")
            .build())
        .firewallPolicyId("string")
        .tags("string")
        .build());
    
    firewall_policy_resource = ibm.FirewallPolicy("firewallPolicyResource",
        firewall_id=0,
        rules=[{
            "action": "string",
            "dst_ip_address": "string",
            "dst_ip_cidr": 0,
            "protocol": "string",
            "src_ip_address": "string",
            "src_ip_cidr": 0,
            "dst_port_range_end": 0,
            "dst_port_range_start": 0,
            "notes": "string",
        }],
        firewall_policy_id="string",
        tags=["string"])
    
    const firewallPolicyResource = new ibm.FirewallPolicy("firewallPolicyResource", {
        firewallId: 0,
        rules: [{
            action: "string",
            dstIpAddress: "string",
            dstIpCidr: 0,
            protocol: "string",
            srcIpAddress: "string",
            srcIpCidr: 0,
            dstPortRangeEnd: 0,
            dstPortRangeStart: 0,
            notes: "string",
        }],
        firewallPolicyId: "string",
        tags: ["string"],
    });
    
    type: ibm:FirewallPolicy
    properties:
        firewallId: 0
        firewallPolicyId: string
        rules:
            - action: string
              dstIpAddress: string
              dstIpCidr: 0
              dstPortRangeEnd: 0
              dstPortRangeStart: 0
              notes: string
              protocol: string
              srcIpAddress: string
              srcIpCidr: 0
        tags:
            - string
    

    FirewallPolicy Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The FirewallPolicy resource accepts the following input properties:

    FirewallId double
    The device ID for the target hardware firewall.
    Rules List<FirewallPolicyRule>

    The firewall rules. At least one rule is required.

    Nested scheme for rules:

    FirewallPolicyId string
    Tags List<string>
    Tags associated with the firewall policy instance. Note Tags are managed locally and not stored on the IBM Cloud Service Endpoint at this moment.
    FirewallId float64
    The device ID for the target hardware firewall.
    Rules []FirewallPolicyRuleArgs

    The firewall rules. At least one rule is required.

    Nested scheme for rules:

    FirewallPolicyId string
    Tags []string
    Tags associated with the firewall policy instance. Note Tags are managed locally and not stored on the IBM Cloud Service Endpoint at this moment.
    firewallId Double
    The device ID for the target hardware firewall.
    rules List<FirewallPolicyRule>

    The firewall rules. At least one rule is required.

    Nested scheme for rules:

    firewallPolicyId String
    tags List<String>
    Tags associated with the firewall policy instance. Note Tags are managed locally and not stored on the IBM Cloud Service Endpoint at this moment.
    firewallId number
    The device ID for the target hardware firewall.
    rules FirewallPolicyRule[]

    The firewall rules. At least one rule is required.

    Nested scheme for rules:

    firewallPolicyId string
    tags string[]
    Tags associated with the firewall policy instance. Note Tags are managed locally and not stored on the IBM Cloud Service Endpoint at this moment.
    firewall_id float
    The device ID for the target hardware firewall.
    rules Sequence[FirewallPolicyRuleArgs]

    The firewall rules. At least one rule is required.

    Nested scheme for rules:

    firewall_policy_id str
    tags Sequence[str]
    Tags associated with the firewall policy instance. Note Tags are managed locally and not stored on the IBM Cloud Service Endpoint at this moment.
    firewallId Number
    The device ID for the target hardware firewall.
    rules List<Property Map>

    The firewall rules. At least one rule is required.

    Nested scheme for rules:

    firewallPolicyId String
    tags List<String>
    Tags associated with the firewall policy instance. Note Tags are managed locally and not stored on the IBM Cloud Service Endpoint at this moment.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the FirewallPolicy resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing FirewallPolicy Resource

    Get an existing FirewallPolicy resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: FirewallPolicyState, opts?: CustomResourceOptions): FirewallPolicy
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            firewall_id: Optional[float] = None,
            firewall_policy_id: Optional[str] = None,
            rules: Optional[Sequence[FirewallPolicyRuleArgs]] = None,
            tags: Optional[Sequence[str]] = None) -> FirewallPolicy
    func GetFirewallPolicy(ctx *Context, name string, id IDInput, state *FirewallPolicyState, opts ...ResourceOption) (*FirewallPolicy, error)
    public static FirewallPolicy Get(string name, Input<string> id, FirewallPolicyState? state, CustomResourceOptions? opts = null)
    public static FirewallPolicy get(String name, Output<String> id, FirewallPolicyState state, CustomResourceOptions options)
    resources:  _:    type: ibm:FirewallPolicy    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    FirewallId double
    The device ID for the target hardware firewall.
    FirewallPolicyId string
    Rules List<FirewallPolicyRule>

    The firewall rules. At least one rule is required.

    Nested scheme for rules:

    Tags List<string>
    Tags associated with the firewall policy instance. Note Tags are managed locally and not stored on the IBM Cloud Service Endpoint at this moment.
    FirewallId float64
    The device ID for the target hardware firewall.
    FirewallPolicyId string
    Rules []FirewallPolicyRuleArgs

    The firewall rules. At least one rule is required.

    Nested scheme for rules:

    Tags []string
    Tags associated with the firewall policy instance. Note Tags are managed locally and not stored on the IBM Cloud Service Endpoint at this moment.
    firewallId Double
    The device ID for the target hardware firewall.
    firewallPolicyId String
    rules List<FirewallPolicyRule>

    The firewall rules. At least one rule is required.

    Nested scheme for rules:

    tags List<String>
    Tags associated with the firewall policy instance. Note Tags are managed locally and not stored on the IBM Cloud Service Endpoint at this moment.
    firewallId number
    The device ID for the target hardware firewall.
    firewallPolicyId string
    rules FirewallPolicyRule[]

    The firewall rules. At least one rule is required.

    Nested scheme for rules:

    tags string[]
    Tags associated with the firewall policy instance. Note Tags are managed locally and not stored on the IBM Cloud Service Endpoint at this moment.
    firewall_id float
    The device ID for the target hardware firewall.
    firewall_policy_id str
    rules Sequence[FirewallPolicyRuleArgs]

    The firewall rules. At least one rule is required.

    Nested scheme for rules:

    tags Sequence[str]
    Tags associated with the firewall policy instance. Note Tags are managed locally and not stored on the IBM Cloud Service Endpoint at this moment.
    firewallId Number
    The device ID for the target hardware firewall.
    firewallPolicyId String
    rules List<Property Map>

    The firewall rules. At least one rule is required.

    Nested scheme for rules:

    tags List<String>
    Tags associated with the firewall policy instance. Note Tags are managed locally and not stored on the IBM Cloud Service Endpoint at this moment.

    Supporting Types

    FirewallPolicyRule, FirewallPolicyRuleArgs

    Action string
    Specifies whether traffic is allowed when rules are matched. Accepted values are permit or deny.
    DstIpAddress string
    Accepted values are any, a specific IP address, or the network address for a specific subnet.
    DstIpCidr double
    Specifies the standard CIDR notation for the selected destination.
    Protocol string
    The protocol for the rule. Accepted values are tcp,udp,icmp,gre,pptp,ah, or esp.
    SrcIpAddress string
    Specifies either a specific IP address or the network address for a specific subnet.
    SrcIpCidr double
    Specifies the standard CIDR notation for the selected source. 32 implements the rule for a single IP while, for example, 24 implements the rule for 256 IP's.
    DstPortRangeEnd double
    The end of the range of ports for TCP and UDP. Accepted values are 1- 65535.
    DstPortRangeStart double
    The start of the range of ports for TCP and UDP. Accepted values are 1- 65535.
    Notes string
    Descriptive text about the rule.
    Action string
    Specifies whether traffic is allowed when rules are matched. Accepted values are permit or deny.
    DstIpAddress string
    Accepted values are any, a specific IP address, or the network address for a specific subnet.
    DstIpCidr float64
    Specifies the standard CIDR notation for the selected destination.
    Protocol string
    The protocol for the rule. Accepted values are tcp,udp,icmp,gre,pptp,ah, or esp.
    SrcIpAddress string
    Specifies either a specific IP address or the network address for a specific subnet.
    SrcIpCidr float64
    Specifies the standard CIDR notation for the selected source. 32 implements the rule for a single IP while, for example, 24 implements the rule for 256 IP's.
    DstPortRangeEnd float64
    The end of the range of ports for TCP and UDP. Accepted values are 1- 65535.
    DstPortRangeStart float64
    The start of the range of ports for TCP and UDP. Accepted values are 1- 65535.
    Notes string
    Descriptive text about the rule.
    action String
    Specifies whether traffic is allowed when rules are matched. Accepted values are permit or deny.
    dstIpAddress String
    Accepted values are any, a specific IP address, or the network address for a specific subnet.
    dstIpCidr Double
    Specifies the standard CIDR notation for the selected destination.
    protocol String
    The protocol for the rule. Accepted values are tcp,udp,icmp,gre,pptp,ah, or esp.
    srcIpAddress String
    Specifies either a specific IP address or the network address for a specific subnet.
    srcIpCidr Double
    Specifies the standard CIDR notation for the selected source. 32 implements the rule for a single IP while, for example, 24 implements the rule for 256 IP's.
    dstPortRangeEnd Double
    The end of the range of ports for TCP and UDP. Accepted values are 1- 65535.
    dstPortRangeStart Double
    The start of the range of ports for TCP and UDP. Accepted values are 1- 65535.
    notes String
    Descriptive text about the rule.
    action string
    Specifies whether traffic is allowed when rules are matched. Accepted values are permit or deny.
    dstIpAddress string
    Accepted values are any, a specific IP address, or the network address for a specific subnet.
    dstIpCidr number
    Specifies the standard CIDR notation for the selected destination.
    protocol string
    The protocol for the rule. Accepted values are tcp,udp,icmp,gre,pptp,ah, or esp.
    srcIpAddress string
    Specifies either a specific IP address or the network address for a specific subnet.
    srcIpCidr number
    Specifies the standard CIDR notation for the selected source. 32 implements the rule for a single IP while, for example, 24 implements the rule for 256 IP's.
    dstPortRangeEnd number
    The end of the range of ports for TCP and UDP. Accepted values are 1- 65535.
    dstPortRangeStart number
    The start of the range of ports for TCP and UDP. Accepted values are 1- 65535.
    notes string
    Descriptive text about the rule.
    action str
    Specifies whether traffic is allowed when rules are matched. Accepted values are permit or deny.
    dst_ip_address str
    Accepted values are any, a specific IP address, or the network address for a specific subnet.
    dst_ip_cidr float
    Specifies the standard CIDR notation for the selected destination.
    protocol str
    The protocol for the rule. Accepted values are tcp,udp,icmp,gre,pptp,ah, or esp.
    src_ip_address str
    Specifies either a specific IP address or the network address for a specific subnet.
    src_ip_cidr float
    Specifies the standard CIDR notation for the selected source. 32 implements the rule for a single IP while, for example, 24 implements the rule for 256 IP's.
    dst_port_range_end float
    The end of the range of ports for TCP and UDP. Accepted values are 1- 65535.
    dst_port_range_start float
    The start of the range of ports for TCP and UDP. Accepted values are 1- 65535.
    notes str
    Descriptive text about the rule.
    action String
    Specifies whether traffic is allowed when rules are matched. Accepted values are permit or deny.
    dstIpAddress String
    Accepted values are any, a specific IP address, or the network address for a specific subnet.
    dstIpCidr Number
    Specifies the standard CIDR notation for the selected destination.
    protocol String
    The protocol for the rule. Accepted values are tcp,udp,icmp,gre,pptp,ah, or esp.
    srcIpAddress String
    Specifies either a specific IP address or the network address for a specific subnet.
    srcIpCidr Number
    Specifies the standard CIDR notation for the selected source. 32 implements the rule for a single IP while, for example, 24 implements the rule for 256 IP's.
    dstPortRangeEnd Number
    The end of the range of ports for TCP and UDP. Accepted values are 1- 65535.
    dstPortRangeStart Number
    The start of the range of ports for TCP and UDP. Accepted values are 1- 65535.
    notes String
    Descriptive text about the rule.

    Package Details

    Repository
    ibm ibm-cloud/terraform-provider-ibm
    License
    Notes
    This Pulumi package is based on the ibm Terraform Provider.
    ibm logo
    ibm 1.78.0 published on Wednesday, Apr 30, 2025 by ibm-cloud