1. Packages
  2. Cisco Meraki
  3. API Docs
  4. networks
  5. getApplianceFirewallInboundFirewallRules
Cisco Meraki v0.2.0 published on Friday, May 24, 2024 by Pulumi

meraki.networks.getApplianceFirewallInboundFirewallRules

Explore with Pulumi AI

meraki logo
Cisco Meraki v0.2.0 published on Friday, May 24, 2024 by Pulumi

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as meraki from "@pulumi/meraki";
    
    const example = meraki.networks.getApplianceFirewallInboundFirewallRules({
        networkId: "string",
    });
    export const merakiNetworksApplianceFirewallInboundFirewallRulesExample = example.then(example => example.item);
    
    import pulumi
    import pulumi_meraki as meraki
    
    example = meraki.networks.get_appliance_firewall_inbound_firewall_rules(network_id="string")
    pulumi.export("merakiNetworksApplianceFirewallInboundFirewallRulesExample", example.item)
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-meraki/sdk/go/meraki/networks"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		example, err := networks.LookupApplianceFirewallInboundFirewallRules(ctx, &networks.LookupApplianceFirewallInboundFirewallRulesArgs{
    			NetworkId: "string",
    		}, nil)
    		if err != nil {
    			return err
    		}
    		ctx.Export("merakiNetworksApplianceFirewallInboundFirewallRulesExample", example.Item)
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Meraki = Pulumi.Meraki;
    
    return await Deployment.RunAsync(() => 
    {
        var example = Meraki.Networks.GetApplianceFirewallInboundFirewallRules.Invoke(new()
        {
            NetworkId = "string",
        });
    
        return new Dictionary<string, object?>
        {
            ["merakiNetworksApplianceFirewallInboundFirewallRulesExample"] = example.Apply(getApplianceFirewallInboundFirewallRulesResult => getApplianceFirewallInboundFirewallRulesResult.Item),
        };
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.meraki.networks.NetworksFunctions;
    import com.pulumi.meraki.networks.inputs.GetApplianceFirewallInboundFirewallRulesArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            final var example = NetworksFunctions.getApplianceFirewallInboundFirewallRules(GetApplianceFirewallInboundFirewallRulesArgs.builder()
                .networkId("string")
                .build());
    
            ctx.export("merakiNetworksApplianceFirewallInboundFirewallRulesExample", example.applyValue(getApplianceFirewallInboundFirewallRulesResult -> getApplianceFirewallInboundFirewallRulesResult.item()));
        }
    }
    
    variables:
      example:
        fn::invoke:
          Function: meraki:networks:getApplianceFirewallInboundFirewallRules
          Arguments:
            networkId: string
    outputs:
      merakiNetworksApplianceFirewallInboundFirewallRulesExample: ${example.item}
    

    Using getApplianceFirewallInboundFirewallRules

    Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.

    function getApplianceFirewallInboundFirewallRules(args: GetApplianceFirewallInboundFirewallRulesArgs, opts?: InvokeOptions): Promise<GetApplianceFirewallInboundFirewallRulesResult>
    function getApplianceFirewallInboundFirewallRulesOutput(args: GetApplianceFirewallInboundFirewallRulesOutputArgs, opts?: InvokeOptions): Output<GetApplianceFirewallInboundFirewallRulesResult>
    def get_appliance_firewall_inbound_firewall_rules(network_id: Optional[str] = None,
                                                      opts: Optional[InvokeOptions] = None) -> GetApplianceFirewallInboundFirewallRulesResult
    def get_appliance_firewall_inbound_firewall_rules_output(network_id: Optional[pulumi.Input[str]] = None,
                                                      opts: Optional[InvokeOptions] = None) -> Output[GetApplianceFirewallInboundFirewallRulesResult]
    func LookupApplianceFirewallInboundFirewallRules(ctx *Context, args *LookupApplianceFirewallInboundFirewallRulesArgs, opts ...InvokeOption) (*LookupApplianceFirewallInboundFirewallRulesResult, error)
    func LookupApplianceFirewallInboundFirewallRulesOutput(ctx *Context, args *LookupApplianceFirewallInboundFirewallRulesOutputArgs, opts ...InvokeOption) LookupApplianceFirewallInboundFirewallRulesResultOutput

    > Note: This function is named LookupApplianceFirewallInboundFirewallRules in the Go SDK.

    public static class GetApplianceFirewallInboundFirewallRules 
    {
        public static Task<GetApplianceFirewallInboundFirewallRulesResult> InvokeAsync(GetApplianceFirewallInboundFirewallRulesArgs args, InvokeOptions? opts = null)
        public static Output<GetApplianceFirewallInboundFirewallRulesResult> Invoke(GetApplianceFirewallInboundFirewallRulesInvokeArgs args, InvokeOptions? opts = null)
    }
    public static CompletableFuture<GetApplianceFirewallInboundFirewallRulesResult> getApplianceFirewallInboundFirewallRules(GetApplianceFirewallInboundFirewallRulesArgs args, InvokeOptions options)
    // Output-based functions aren't available in Java yet
    
    fn::invoke:
      function: meraki:networks/getApplianceFirewallInboundFirewallRules:getApplianceFirewallInboundFirewallRules
      arguments:
        # arguments dictionary

    The following arguments are supported:

    NetworkId string
    networkId path parameter. Network ID
    NetworkId string
    networkId path parameter. Network ID
    networkId String
    networkId path parameter. Network ID
    networkId string
    networkId path parameter. Network ID
    network_id str
    networkId path parameter. Network ID
    networkId String
    networkId path parameter. Network ID

    getApplianceFirewallInboundFirewallRules Result

    The following output properties are available:

    Id string
    The provider-assigned unique ID for this managed resource.
    Item GetApplianceFirewallInboundFirewallRulesItem
    NetworkId string
    networkId path parameter. Network ID
    Id string
    The provider-assigned unique ID for this managed resource.
    Item GetApplianceFirewallInboundFirewallRulesItem
    NetworkId string
    networkId path parameter. Network ID
    id String
    The provider-assigned unique ID for this managed resource.
    item GetApplianceFirewallInboundFirewallRulesItem
    networkId String
    networkId path parameter. Network ID
    id string
    The provider-assigned unique ID for this managed resource.
    item GetApplianceFirewallInboundFirewallRulesItem
    networkId string
    networkId path parameter. Network ID
    id str
    The provider-assigned unique ID for this managed resource.
    item GetApplianceFirewallInboundFirewallRulesItem
    network_id str
    networkId path parameter. Network ID
    id String
    The provider-assigned unique ID for this managed resource.
    item Property Map
    networkId String
    networkId path parameter. Network ID

    Supporting Types

    GetApplianceFirewallInboundFirewallRulesItem

    Rules List<GetApplianceFirewallInboundFirewallRulesItemRule>
    An ordered array of the firewall rules (not including the default rule)
    SyslogDefaultRule bool
    Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)
    Rules []GetApplianceFirewallInboundFirewallRulesItemRule
    An ordered array of the firewall rules (not including the default rule)
    SyslogDefaultRule bool
    Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)
    rules List<GetApplianceFirewallInboundFirewallRulesItemRule>
    An ordered array of the firewall rules (not including the default rule)
    syslogDefaultRule Boolean
    Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)
    rules GetApplianceFirewallInboundFirewallRulesItemRule[]
    An ordered array of the firewall rules (not including the default rule)
    syslogDefaultRule boolean
    Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)
    rules Sequence[GetApplianceFirewallInboundFirewallRulesItemRule]
    An ordered array of the firewall rules (not including the default rule)
    syslog_default_rule bool
    Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)
    rules List<Property Map>
    An ordered array of the firewall rules (not including the default rule)
    syslogDefaultRule Boolean
    Log the special default rule (boolean value - enable only if you've configured a syslog server) (optional)

    GetApplianceFirewallInboundFirewallRulesItemRule

    Comment string
    Description of the rule (optional)
    DestCidr string
    Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
    DestPort string
    Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
    Policy string
    'allow' or 'deny' traffic specified by this rule
    Protocol string
    The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
    SrcCidr string
    Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
    SrcPort string
    Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
    SyslogEnabled bool
    Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)
    Comment string
    Description of the rule (optional)
    DestCidr string
    Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
    DestPort string
    Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
    Policy string
    'allow' or 'deny' traffic specified by this rule
    Protocol string
    The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
    SrcCidr string
    Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
    SrcPort string
    Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
    SyslogEnabled bool
    Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)
    comment String
    Description of the rule (optional)
    destCidr String
    Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
    destPort String
    Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
    policy String
    'allow' or 'deny' traffic specified by this rule
    protocol String
    The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
    srcCidr String
    Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
    srcPort String
    Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
    syslogEnabled Boolean
    Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)
    comment string
    Description of the rule (optional)
    destCidr string
    Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
    destPort string
    Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
    policy string
    'allow' or 'deny' traffic specified by this rule
    protocol string
    The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
    srcCidr string
    Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
    srcPort string
    Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
    syslogEnabled boolean
    Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)
    comment str
    Description of the rule (optional)
    dest_cidr str
    Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
    dest_port str
    Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
    policy str
    'allow' or 'deny' traffic specified by this rule
    protocol str
    The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
    src_cidr str
    Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
    src_port str
    Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
    syslog_enabled bool
    Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)
    comment String
    Description of the rule (optional)
    destCidr String
    Comma-separated list of destination IP address(es) (in IP or CIDR notation), fully-qualified domain names (FQDN) or 'any'
    destPort String
    Comma-separated list of destination port(s) (integer in the range 1-65535), or 'any'
    policy String
    'allow' or 'deny' traffic specified by this rule
    protocol String
    The type of protocol (must be 'tcp', 'udp', 'icmp', 'icmp6' or 'any')
    srcCidr String
    Comma-separated list of source IP address(es) (in IP or CIDR notation), or 'any' (note: FQDN not supported for source addresses)
    srcPort String
    Comma-separated list of source port(s) (integer in the range 1-65535), or 'any'
    syslogEnabled Boolean
    Log this rule to syslog (true or false, boolean value) - only applicable if a syslog has been configured (optional)

    Package Details

    Repository
    meraki pulumi/pulumi-meraki
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the meraki Terraform Provider.
    meraki logo
    Cisco Meraki v0.2.0 published on Friday, May 24, 2024 by Pulumi