1. Packages
  2. Oracle Cloud Infrastructure
  3. API Docs
  4. NetworkFirewall
  5. NetworkFirewallPolicySecurityRule
Oracle Cloud Infrastructure v1.34.0 published on Friday, May 3, 2024 by Pulumi

oci.NetworkFirewall.NetworkFirewallPolicySecurityRule

Explore with Pulumi AI

oci logo
Oracle Cloud Infrastructure v1.34.0 published on Friday, May 3, 2024 by Pulumi

    This resource provides the Network Firewall Policy Security Rule resource in Oracle Cloud Infrastructure Network Firewall service.

    Creates a new Security Rule for the Network Firewall Policy.

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as oci from "@pulumi/oci";
    
    const testNetworkFirewallPolicySecurityRule = new oci.networkfirewall.NetworkFirewallPolicySecurityRule("test_network_firewall_policy_security_rule", {
        action: networkFirewallPolicySecurityRuleAction,
        name: networkFirewallPolicySecurityRuleName,
        condition: {
            applications: networkFirewallPolicySecurityRuleConditionApplication,
            destinationAddresses: networkFirewallPolicySecurityRuleConditionDestinationAddress,
            services: networkFirewallPolicySecurityRuleConditionService,
            sourceAddresses: networkFirewallPolicySecurityRuleConditionSourceAddress,
            urls: networkFirewallPolicySecurityRuleConditionUrl,
        },
        networkFirewallPolicyId: testNetworkFirewallPolicy.id,
        inspection: networkFirewallPolicySecurityRuleInspection,
        positions: [{
            afterRule: networkFirewallPolicySecurityRulePositionAfterRule,
            beforeRule: networkFirewallPolicySecurityRulePositionBeforeRule,
        }],
    });
    
    import pulumi
    import pulumi_oci as oci
    
    test_network_firewall_policy_security_rule = oci.network_firewall.NetworkFirewallPolicySecurityRule("test_network_firewall_policy_security_rule",
        action=network_firewall_policy_security_rule_action,
        name=network_firewall_policy_security_rule_name,
        condition=oci.network_firewall.NetworkFirewallPolicySecurityRuleConditionArgs(
            applications=network_firewall_policy_security_rule_condition_application,
            destination_addresses=network_firewall_policy_security_rule_condition_destination_address,
            services=network_firewall_policy_security_rule_condition_service,
            source_addresses=network_firewall_policy_security_rule_condition_source_address,
            urls=network_firewall_policy_security_rule_condition_url,
        ),
        network_firewall_policy_id=test_network_firewall_policy["id"],
        inspection=network_firewall_policy_security_rule_inspection,
        positions=[oci.network_firewall.NetworkFirewallPolicySecurityRulePositionArgs(
            after_rule=network_firewall_policy_security_rule_position_after_rule,
            before_rule=network_firewall_policy_security_rule_position_before_rule,
        )])
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-oci/sdk/go/oci/NetworkFirewall"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := NetworkFirewall.NewNetworkFirewallPolicySecurityRule(ctx, "test_network_firewall_policy_security_rule", &NetworkFirewall.NetworkFirewallPolicySecurityRuleArgs{
    			Action: pulumi.Any(networkFirewallPolicySecurityRuleAction),
    			Name:   pulumi.Any(networkFirewallPolicySecurityRuleName),
    			Condition: &networkfirewall.NetworkFirewallPolicySecurityRuleConditionArgs{
    				Applications:         pulumi.Any(networkFirewallPolicySecurityRuleConditionApplication),
    				DestinationAddresses: pulumi.Any(networkFirewallPolicySecurityRuleConditionDestinationAddress),
    				Services:             pulumi.Any(networkFirewallPolicySecurityRuleConditionService),
    				SourceAddresses:      pulumi.Any(networkFirewallPolicySecurityRuleConditionSourceAddress),
    				Urls:                 pulumi.Any(networkFirewallPolicySecurityRuleConditionUrl),
    			},
    			NetworkFirewallPolicyId: pulumi.Any(testNetworkFirewallPolicy.Id),
    			Inspection:              pulumi.Any(networkFirewallPolicySecurityRuleInspection),
    			Positions: networkfirewall.NetworkFirewallPolicySecurityRulePositionArray{
    				&networkfirewall.NetworkFirewallPolicySecurityRulePositionArgs{
    					AfterRule:  pulumi.Any(networkFirewallPolicySecurityRulePositionAfterRule),
    					BeforeRule: pulumi.Any(networkFirewallPolicySecurityRulePositionBeforeRule),
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Oci = Pulumi.Oci;
    
    return await Deployment.RunAsync(() => 
    {
        var testNetworkFirewallPolicySecurityRule = new Oci.NetworkFirewall.NetworkFirewallPolicySecurityRule("test_network_firewall_policy_security_rule", new()
        {
            Action = networkFirewallPolicySecurityRuleAction,
            Name = networkFirewallPolicySecurityRuleName,
            Condition = new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicySecurityRuleConditionArgs
            {
                Applications = networkFirewallPolicySecurityRuleConditionApplication,
                DestinationAddresses = networkFirewallPolicySecurityRuleConditionDestinationAddress,
                Services = networkFirewallPolicySecurityRuleConditionService,
                SourceAddresses = networkFirewallPolicySecurityRuleConditionSourceAddress,
                Urls = networkFirewallPolicySecurityRuleConditionUrl,
            },
            NetworkFirewallPolicyId = testNetworkFirewallPolicy.Id,
            Inspection = networkFirewallPolicySecurityRuleInspection,
            Positions = new[]
            {
                new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicySecurityRulePositionArgs
                {
                    AfterRule = networkFirewallPolicySecurityRulePositionAfterRule,
                    BeforeRule = networkFirewallPolicySecurityRulePositionBeforeRule,
                },
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.oci.NetworkFirewall.NetworkFirewallPolicySecurityRule;
    import com.pulumi.oci.NetworkFirewall.NetworkFirewallPolicySecurityRuleArgs;
    import com.pulumi.oci.NetworkFirewall.inputs.NetworkFirewallPolicySecurityRuleConditionArgs;
    import com.pulumi.oci.NetworkFirewall.inputs.NetworkFirewallPolicySecurityRulePositionArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var testNetworkFirewallPolicySecurityRule = new NetworkFirewallPolicySecurityRule("testNetworkFirewallPolicySecurityRule", NetworkFirewallPolicySecurityRuleArgs.builder()        
                .action(networkFirewallPolicySecurityRuleAction)
                .name(networkFirewallPolicySecurityRuleName)
                .condition(NetworkFirewallPolicySecurityRuleConditionArgs.builder()
                    .applications(networkFirewallPolicySecurityRuleConditionApplication)
                    .destinationAddresses(networkFirewallPolicySecurityRuleConditionDestinationAddress)
                    .services(networkFirewallPolicySecurityRuleConditionService)
                    .sourceAddresses(networkFirewallPolicySecurityRuleConditionSourceAddress)
                    .urls(networkFirewallPolicySecurityRuleConditionUrl)
                    .build())
                .networkFirewallPolicyId(testNetworkFirewallPolicy.id())
                .inspection(networkFirewallPolicySecurityRuleInspection)
                .positions(NetworkFirewallPolicySecurityRulePositionArgs.builder()
                    .afterRule(networkFirewallPolicySecurityRulePositionAfterRule)
                    .beforeRule(networkFirewallPolicySecurityRulePositionBeforeRule)
                    .build())
                .build());
    
        }
    }
    
    resources:
      testNetworkFirewallPolicySecurityRule:
        type: oci:NetworkFirewall:NetworkFirewallPolicySecurityRule
        name: test_network_firewall_policy_security_rule
        properties:
          action: ${networkFirewallPolicySecurityRuleAction}
          name: ${networkFirewallPolicySecurityRuleName}
          condition:
            applications: ${networkFirewallPolicySecurityRuleConditionApplication}
            destinationAddresses: ${networkFirewallPolicySecurityRuleConditionDestinationAddress}
            services: ${networkFirewallPolicySecurityRuleConditionService}
            sourceAddresses: ${networkFirewallPolicySecurityRuleConditionSourceAddress}
            urls: ${networkFirewallPolicySecurityRuleConditionUrl}
          networkFirewallPolicyId: ${testNetworkFirewallPolicy.id}
          inspection: ${networkFirewallPolicySecurityRuleInspection}
          positions:
            - afterRule: ${networkFirewallPolicySecurityRulePositionAfterRule}
              beforeRule: ${networkFirewallPolicySecurityRulePositionBeforeRule}
    

    Create NetworkFirewallPolicySecurityRule Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new NetworkFirewallPolicySecurityRule(name: string, args: NetworkFirewallPolicySecurityRuleArgs, opts?: CustomResourceOptions);
    @overload
    def NetworkFirewallPolicySecurityRule(resource_name: str,
                                          args: NetworkFirewallPolicySecurityRuleArgs,
                                          opts: Optional[ResourceOptions] = None)
    
    @overload
    def NetworkFirewallPolicySecurityRule(resource_name: str,
                                          opts: Optional[ResourceOptions] = None,
                                          action: Optional[str] = None,
                                          condition: Optional[_networkfirewall.NetworkFirewallPolicySecurityRuleConditionArgs] = None,
                                          network_firewall_policy_id: Optional[str] = None,
                                          inspection: Optional[str] = None,
                                          name: Optional[str] = None,
                                          positions: Optional[Sequence[_networkfirewall.NetworkFirewallPolicySecurityRulePositionArgs]] = None,
                                          priority_order: Optional[str] = None)
    func NewNetworkFirewallPolicySecurityRule(ctx *Context, name string, args NetworkFirewallPolicySecurityRuleArgs, opts ...ResourceOption) (*NetworkFirewallPolicySecurityRule, error)
    public NetworkFirewallPolicySecurityRule(string name, NetworkFirewallPolicySecurityRuleArgs args, CustomResourceOptions? opts = null)
    public NetworkFirewallPolicySecurityRule(String name, NetworkFirewallPolicySecurityRuleArgs args)
    public NetworkFirewallPolicySecurityRule(String name, NetworkFirewallPolicySecurityRuleArgs args, CustomResourceOptions options)
    
    type: oci:NetworkFirewall:NetworkFirewallPolicySecurityRule
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args NetworkFirewallPolicySecurityRuleArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args NetworkFirewallPolicySecurityRuleArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args NetworkFirewallPolicySecurityRuleArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args NetworkFirewallPolicySecurityRuleArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args NetworkFirewallPolicySecurityRuleArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Example

    The following reference example uses placeholder values for all input properties.

    var networkFirewallPolicySecurityRuleResource = new Oci.NetworkFirewall.NetworkFirewallPolicySecurityRule("networkFirewallPolicySecurityRuleResource", new()
    {
        Action = "string",
        Condition = new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicySecurityRuleConditionArgs
        {
            Applications = new[]
            {
                "string",
            },
            DestinationAddresses = new[]
            {
                "string",
            },
            Services = new[]
            {
                "string",
            },
            SourceAddresses = new[]
            {
                "string",
            },
            Urls = new[]
            {
                "string",
            },
        },
        NetworkFirewallPolicyId = "string",
        Inspection = "string",
        Name = "string",
        Positions = new[]
        {
            new Oci.NetworkFirewall.Inputs.NetworkFirewallPolicySecurityRulePositionArgs
            {
                AfterRule = "string",
                BeforeRule = "string",
            },
        },
        PriorityOrder = "string",
    });
    
    example, err := NetworkFirewall.NewNetworkFirewallPolicySecurityRule(ctx, "networkFirewallPolicySecurityRuleResource", &NetworkFirewall.NetworkFirewallPolicySecurityRuleArgs{
    	Action: pulumi.String("string"),
    	Condition: &networkfirewall.NetworkFirewallPolicySecurityRuleConditionArgs{
    		Applications: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		DestinationAddresses: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		Services: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		SourceAddresses: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		Urls: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    	},
    	NetworkFirewallPolicyId: pulumi.String("string"),
    	Inspection:              pulumi.String("string"),
    	Name:                    pulumi.String("string"),
    	Positions: networkfirewall.NetworkFirewallPolicySecurityRulePositionArray{
    		&networkfirewall.NetworkFirewallPolicySecurityRulePositionArgs{
    			AfterRule:  pulumi.String("string"),
    			BeforeRule: pulumi.String("string"),
    		},
    	},
    	PriorityOrder: pulumi.String("string"),
    })
    
    var networkFirewallPolicySecurityRuleResource = new NetworkFirewallPolicySecurityRule("networkFirewallPolicySecurityRuleResource", NetworkFirewallPolicySecurityRuleArgs.builder()        
        .action("string")
        .condition(NetworkFirewallPolicySecurityRuleConditionArgs.builder()
            .applications("string")
            .destinationAddresses("string")
            .services("string")
            .sourceAddresses("string")
            .urls("string")
            .build())
        .networkFirewallPolicyId("string")
        .inspection("string")
        .name("string")
        .positions(NetworkFirewallPolicySecurityRulePositionArgs.builder()
            .afterRule("string")
            .beforeRule("string")
            .build())
        .priorityOrder("string")
        .build());
    
    network_firewall_policy_security_rule_resource = oci.network_firewall.NetworkFirewallPolicySecurityRule("networkFirewallPolicySecurityRuleResource",
        action="string",
        condition=oci.network_firewall.NetworkFirewallPolicySecurityRuleConditionArgs(
            applications=["string"],
            destination_addresses=["string"],
            services=["string"],
            source_addresses=["string"],
            urls=["string"],
        ),
        network_firewall_policy_id="string",
        inspection="string",
        name="string",
        positions=[oci.network_firewall.NetworkFirewallPolicySecurityRulePositionArgs(
            after_rule="string",
            before_rule="string",
        )],
        priority_order="string")
    
    const networkFirewallPolicySecurityRuleResource = new oci.networkfirewall.NetworkFirewallPolicySecurityRule("networkFirewallPolicySecurityRuleResource", {
        action: "string",
        condition: {
            applications: ["string"],
            destinationAddresses: ["string"],
            services: ["string"],
            sourceAddresses: ["string"],
            urls: ["string"],
        },
        networkFirewallPolicyId: "string",
        inspection: "string",
        name: "string",
        positions: [{
            afterRule: "string",
            beforeRule: "string",
        }],
        priorityOrder: "string",
    });
    
    type: oci:NetworkFirewall:NetworkFirewallPolicySecurityRule
    properties:
        action: string
        condition:
            applications:
                - string
            destinationAddresses:
                - string
            services:
                - string
            sourceAddresses:
                - string
            urls:
                - string
        inspection: string
        name: string
        networkFirewallPolicyId: string
        positions:
            - afterRule: string
              beforeRule: string
        priorityOrder: string
    

    NetworkFirewallPolicySecurityRule Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    The NetworkFirewallPolicySecurityRule resource accepts the following input properties:

    Action string
    (Updatable) Types of Action on the Traffic flow.

    • ALLOW - Allows the traffic.
    • DROP - Silently drops the traffic, e.g. without sending a TCP reset.
    • REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
    • INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
    Condition NetworkFirewallPolicySecurityRuleCondition
    (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
    NetworkFirewallPolicyId string
    Unique Network Firewall Policy identifier
    Inspection string
    (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.

    • INTRUSION_DETECTION - Intrusion Detection.
    • INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
    Name string
    Name for the Security rule, must be unique within the policy.
    Positions List<NetworkFirewallPolicySecurityRulePosition>
    (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
    PriorityOrder string
    Action string
    (Updatable) Types of Action on the Traffic flow.

    • ALLOW - Allows the traffic.
    • DROP - Silently drops the traffic, e.g. without sending a TCP reset.
    • REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
    • INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
    Condition NetworkFirewallPolicySecurityRuleConditionArgs
    (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
    NetworkFirewallPolicyId string
    Unique Network Firewall Policy identifier
    Inspection string
    (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.

    • INTRUSION_DETECTION - Intrusion Detection.
    • INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
    Name string
    Name for the Security rule, must be unique within the policy.
    Positions []NetworkFirewallPolicySecurityRulePositionArgs
    (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
    PriorityOrder string
    action String
    (Updatable) Types of Action on the Traffic flow.

    • ALLOW - Allows the traffic.
    • DROP - Silently drops the traffic, e.g. without sending a TCP reset.
    • REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
    • INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
    condition PolicySecurityRuleCondition
    (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
    networkFirewallPolicyId String
    Unique Network Firewall Policy identifier
    inspection String
    (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.

    • INTRUSION_DETECTION - Intrusion Detection.
    • INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
    name String
    Name for the Security rule, must be unique within the policy.
    positions List<PolicySecurityRulePosition>
    (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
    priorityOrder String
    action string
    (Updatable) Types of Action on the Traffic flow.

    • ALLOW - Allows the traffic.
    • DROP - Silently drops the traffic, e.g. without sending a TCP reset.
    • REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
    • INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
    condition NetworkFirewallPolicySecurityRuleCondition
    (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
    networkFirewallPolicyId string
    Unique Network Firewall Policy identifier
    inspection string
    (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.

    • INTRUSION_DETECTION - Intrusion Detection.
    • INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
    name string
    Name for the Security rule, must be unique within the policy.
    positions NetworkFirewallPolicySecurityRulePosition[]
    (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
    priorityOrder string
    action str
    (Updatable) Types of Action on the Traffic flow.

    • ALLOW - Allows the traffic.
    • DROP - Silently drops the traffic, e.g. without sending a TCP reset.
    • REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
    • INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
    condition networkfirewall.NetworkFirewallPolicySecurityRuleConditionArgs
    (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
    network_firewall_policy_id str
    Unique Network Firewall Policy identifier
    inspection str
    (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.

    • INTRUSION_DETECTION - Intrusion Detection.
    • INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
    name str
    Name for the Security rule, must be unique within the policy.
    positions Sequence[networkfirewall.NetworkFirewallPolicySecurityRulePositionArgs]
    (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
    priority_order str
    action String
    (Updatable) Types of Action on the Traffic flow.

    • ALLOW - Allows the traffic.
    • DROP - Silently drops the traffic, e.g. without sending a TCP reset.
    • REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
    • INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
    condition Property Map
    (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
    networkFirewallPolicyId String
    Unique Network Firewall Policy identifier
    inspection String
    (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.

    • INTRUSION_DETECTION - Intrusion Detection.
    • INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
    name String
    Name for the Security rule, must be unique within the policy.
    positions List<Property Map>
    (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
    priorityOrder String

    Outputs

    All input properties are implicitly available as output properties. Additionally, the NetworkFirewallPolicySecurityRule resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    ParentResourceId string
    OCID of the Network Firewall Policy this security rule belongs to.
    Id string
    The provider-assigned unique ID for this managed resource.
    ParentResourceId string
    OCID of the Network Firewall Policy this security rule belongs to.
    id String
    The provider-assigned unique ID for this managed resource.
    parentResourceId String
    OCID of the Network Firewall Policy this security rule belongs to.
    id string
    The provider-assigned unique ID for this managed resource.
    parentResourceId string
    OCID of the Network Firewall Policy this security rule belongs to.
    id str
    The provider-assigned unique ID for this managed resource.
    parent_resource_id str
    OCID of the Network Firewall Policy this security rule belongs to.
    id String
    The provider-assigned unique ID for this managed resource.
    parentResourceId String
    OCID of the Network Firewall Policy this security rule belongs to.

    Look up Existing NetworkFirewallPolicySecurityRule Resource

    Get an existing NetworkFirewallPolicySecurityRule resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: NetworkFirewallPolicySecurityRuleState, opts?: CustomResourceOptions): NetworkFirewallPolicySecurityRule
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            action: Optional[str] = None,
            condition: Optional[_networkfirewall.NetworkFirewallPolicySecurityRuleConditionArgs] = None,
            inspection: Optional[str] = None,
            name: Optional[str] = None,
            network_firewall_policy_id: Optional[str] = None,
            parent_resource_id: Optional[str] = None,
            positions: Optional[Sequence[_networkfirewall.NetworkFirewallPolicySecurityRulePositionArgs]] = None,
            priority_order: Optional[str] = None) -> NetworkFirewallPolicySecurityRule
    func GetNetworkFirewallPolicySecurityRule(ctx *Context, name string, id IDInput, state *NetworkFirewallPolicySecurityRuleState, opts ...ResourceOption) (*NetworkFirewallPolicySecurityRule, error)
    public static NetworkFirewallPolicySecurityRule Get(string name, Input<string> id, NetworkFirewallPolicySecurityRuleState? state, CustomResourceOptions? opts = null)
    public static NetworkFirewallPolicySecurityRule get(String name, Output<String> id, NetworkFirewallPolicySecurityRuleState state, CustomResourceOptions options)
    Resource lookup is not supported in YAML
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    Action string
    (Updatable) Types of Action on the Traffic flow.

    • ALLOW - Allows the traffic.
    • DROP - Silently drops the traffic, e.g. without sending a TCP reset.
    • REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
    • INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
    Condition NetworkFirewallPolicySecurityRuleCondition
    (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
    Inspection string
    (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.

    • INTRUSION_DETECTION - Intrusion Detection.
    • INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
    Name string
    Name for the Security rule, must be unique within the policy.
    NetworkFirewallPolicyId string
    Unique Network Firewall Policy identifier
    ParentResourceId string
    OCID of the Network Firewall Policy this security rule belongs to.
    Positions List<NetworkFirewallPolicySecurityRulePosition>
    (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
    PriorityOrder string
    Action string
    (Updatable) Types of Action on the Traffic flow.

    • ALLOW - Allows the traffic.
    • DROP - Silently drops the traffic, e.g. without sending a TCP reset.
    • REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
    • INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
    Condition NetworkFirewallPolicySecurityRuleConditionArgs
    (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
    Inspection string
    (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.

    • INTRUSION_DETECTION - Intrusion Detection.
    • INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
    Name string
    Name for the Security rule, must be unique within the policy.
    NetworkFirewallPolicyId string
    Unique Network Firewall Policy identifier
    ParentResourceId string
    OCID of the Network Firewall Policy this security rule belongs to.
    Positions []NetworkFirewallPolicySecurityRulePositionArgs
    (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
    PriorityOrder string
    action String
    (Updatable) Types of Action on the Traffic flow.

    • ALLOW - Allows the traffic.
    • DROP - Silently drops the traffic, e.g. without sending a TCP reset.
    • REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
    • INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
    condition PolicySecurityRuleCondition
    (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
    inspection String
    (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.

    • INTRUSION_DETECTION - Intrusion Detection.
    • INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
    name String
    Name for the Security rule, must be unique within the policy.
    networkFirewallPolicyId String
    Unique Network Firewall Policy identifier
    parentResourceId String
    OCID of the Network Firewall Policy this security rule belongs to.
    positions List<PolicySecurityRulePosition>
    (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
    priorityOrder String
    action string
    (Updatable) Types of Action on the Traffic flow.

    • ALLOW - Allows the traffic.
    • DROP - Silently drops the traffic, e.g. without sending a TCP reset.
    • REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
    • INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
    condition NetworkFirewallPolicySecurityRuleCondition
    (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
    inspection string
    (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.

    • INTRUSION_DETECTION - Intrusion Detection.
    • INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
    name string
    Name for the Security rule, must be unique within the policy.
    networkFirewallPolicyId string
    Unique Network Firewall Policy identifier
    parentResourceId string
    OCID of the Network Firewall Policy this security rule belongs to.
    positions NetworkFirewallPolicySecurityRulePosition[]
    (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
    priorityOrder string
    action str
    (Updatable) Types of Action on the Traffic flow.

    • ALLOW - Allows the traffic.
    • DROP - Silently drops the traffic, e.g. without sending a TCP reset.
    • REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
    • INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
    condition networkfirewall.NetworkFirewallPolicySecurityRuleConditionArgs
    (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
    inspection str
    (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.

    • INTRUSION_DETECTION - Intrusion Detection.
    • INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
    name str
    Name for the Security rule, must be unique within the policy.
    network_firewall_policy_id str
    Unique Network Firewall Policy identifier
    parent_resource_id str
    OCID of the Network Firewall Policy this security rule belongs to.
    positions Sequence[networkfirewall.NetworkFirewallPolicySecurityRulePositionArgs]
    (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
    priority_order str
    action String
    (Updatable) Types of Action on the Traffic flow.

    • ALLOW - Allows the traffic.
    • DROP - Silently drops the traffic, e.g. without sending a TCP reset.
    • REJECT - Rejects the traffic, sending a TCP reset to client and/or server as applicable.
    • INSPECT - Inspects traffic for vulnerability as specified in inspection, which may result in rejection.
    condition Property Map
    (Updatable) Criteria to evaluate against network traffic. A match occurs when at least one item in the array associated with each specified property corresponds with the relevant aspect of the traffic. The resources mentioned must already be present in the policy before being referenced in the rule.
    inspection String
    (Updatable) Type of inspection to affect the traffic flow. This is only applicable if action is INSPECT.

    • INTRUSION_DETECTION - Intrusion Detection.
    • INTRUSION_PREVENTION - Intrusion Detection and Prevention. Traffic classified as potentially malicious will be rejected as described in type.
    name String
    Name for the Security rule, must be unique within the policy.
    networkFirewallPolicyId String
    Unique Network Firewall Policy identifier
    parentResourceId String
    OCID of the Network Firewall Policy this security rule belongs to.
    positions List<Property Map>
    (Updatable) An object which defines the position of the rule. Only one of the following position references should be provided.
    priorityOrder String

    Supporting Types

    NetworkFirewallPolicySecurityRuleCondition, NetworkFirewallPolicySecurityRuleConditionArgs

    Applications List<string>
    (Updatable) An array of application group names to be evaluated against the traffic protocol and protocol-specific parameters.
    DestinationAddresses List<string>
    (Updatable) An array of address list names to be evaluated against the traffic destination address.
    Services List<string>
    (Updatable) An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
    SourceAddresses List<string>
    (Updatable) An array of address list names to be evaluated against the traffic source address.
    Urls List<string>
    (Updatable) An array of URL list names to be evaluated against the HTTP(S) request target.
    Applications []string
    (Updatable) An array of application group names to be evaluated against the traffic protocol and protocol-specific parameters.
    DestinationAddresses []string
    (Updatable) An array of address list names to be evaluated against the traffic destination address.
    Services []string
    (Updatable) An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
    SourceAddresses []string
    (Updatable) An array of address list names to be evaluated against the traffic source address.
    Urls []string
    (Updatable) An array of URL list names to be evaluated against the HTTP(S) request target.
    applications List<String>
    (Updatable) An array of application group names to be evaluated against the traffic protocol and protocol-specific parameters.
    destinationAddresses List<String>
    (Updatable) An array of address list names to be evaluated against the traffic destination address.
    services List<String>
    (Updatable) An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
    sourceAddresses List<String>
    (Updatable) An array of address list names to be evaluated against the traffic source address.
    urls List<String>
    (Updatable) An array of URL list names to be evaluated against the HTTP(S) request target.
    applications string[]
    (Updatable) An array of application group names to be evaluated against the traffic protocol and protocol-specific parameters.
    destinationAddresses string[]
    (Updatable) An array of address list names to be evaluated against the traffic destination address.
    services string[]
    (Updatable) An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
    sourceAddresses string[]
    (Updatable) An array of address list names to be evaluated against the traffic source address.
    urls string[]
    (Updatable) An array of URL list names to be evaluated against the HTTP(S) request target.
    applications Sequence[str]
    (Updatable) An array of application group names to be evaluated against the traffic protocol and protocol-specific parameters.
    destination_addresses Sequence[str]
    (Updatable) An array of address list names to be evaluated against the traffic destination address.
    services Sequence[str]
    (Updatable) An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
    source_addresses Sequence[str]
    (Updatable) An array of address list names to be evaluated against the traffic source address.
    urls Sequence[str]
    (Updatable) An array of URL list names to be evaluated against the HTTP(S) request target.
    applications List<String>
    (Updatable) An array of application group names to be evaluated against the traffic protocol and protocol-specific parameters.
    destinationAddresses List<String>
    (Updatable) An array of address list names to be evaluated against the traffic destination address.
    services List<String>
    (Updatable) An array of service list names to be evaluated against the traffic protocol and protocol-specific parameters.
    sourceAddresses List<String>
    (Updatable) An array of address list names to be evaluated against the traffic source address.
    urls List<String>
    (Updatable) An array of URL list names to be evaluated against the HTTP(S) request target.

    NetworkFirewallPolicySecurityRulePosition, NetworkFirewallPolicySecurityRulePositionArgs

    AfterRule string
    (Updatable) Identifier for rule after which this rule lies.
    BeforeRule string

    (Updatable) Identifier for rule before which this rule lies.

    ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values

    AfterRule string
    (Updatable) Identifier for rule after which this rule lies.
    BeforeRule string

    (Updatable) Identifier for rule before which this rule lies.

    ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values

    afterRule String
    (Updatable) Identifier for rule after which this rule lies.
    beforeRule String

    (Updatable) Identifier for rule before which this rule lies.

    ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values

    afterRule string
    (Updatable) Identifier for rule after which this rule lies.
    beforeRule string

    (Updatable) Identifier for rule before which this rule lies.

    ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values

    after_rule str
    (Updatable) Identifier for rule after which this rule lies.
    before_rule str

    (Updatable) Identifier for rule before which this rule lies.

    ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values

    afterRule String
    (Updatable) Identifier for rule after which this rule lies.
    beforeRule String

    (Updatable) Identifier for rule before which this rule lies.

    ** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values

    Import

    NetworkFirewallPolicySecurityRules can be imported using the name, e.g.

    $ pulumi import oci:NetworkFirewall/networkFirewallPolicySecurityRule:NetworkFirewallPolicySecurityRule test_network_firewall_policy_security_rule "networkFirewallPolicies/{networkFirewallPolicyId}/securityRules/{securityRuleName}"
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    oci pulumi/pulumi-oci
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the oci Terraform Provider.
    oci logo
    Oracle Cloud Infrastructure v1.34.0 published on Friday, May 3, 2024 by Pulumi