1. Packages
  2. Tencentcloud Provider
  3. API Docs
  4. CfwEdgePolicy
tencentcloud 1.81.183 published on Wednesday, Apr 16, 2025 by tencentcloudstack

tencentcloud.CfwEdgePolicy

Explore with Pulumi AI

tencentcloud logo
tencentcloud 1.81.183 published on Wednesday, Apr 16, 2025 by tencentcloudstack

    Provides a resource to create a CFW edge policy

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as tencentcloud from "@pulumi/tencentcloud";
    
    const example = new tencentcloud.CfwEdgePolicy("example", {
        description: "policy description.",
        direction: 1,
        enable: "true",
        port: "-1/-1",
        protocol: "TCP",
        ruleAction: "drop",
        scope: "all",
        sourceContent: "1.1.1.1/0",
        sourceType: "net",
        targetContent: "0.0.0.0/0",
        targetType: "net",
    });
    
    import pulumi
    import pulumi_tencentcloud as tencentcloud
    
    example = tencentcloud.CfwEdgePolicy("example",
        description="policy description.",
        direction=1,
        enable="true",
        port="-1/-1",
        protocol="TCP",
        rule_action="drop",
        scope="all",
        source_content="1.1.1.1/0",
        source_type="net",
        target_content="0.0.0.0/0",
        target_type="net")
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/tencentcloud/tencentcloud"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := tencentcloud.NewCfwEdgePolicy(ctx, "example", &tencentcloud.CfwEdgePolicyArgs{
    			Description:   pulumi.String("policy description."),
    			Direction:     pulumi.Float64(1),
    			Enable:        pulumi.String("true"),
    			Port:          pulumi.String("-1/-1"),
    			Protocol:      pulumi.String("TCP"),
    			RuleAction:    pulumi.String("drop"),
    			Scope:         pulumi.String("all"),
    			SourceContent: pulumi.String("1.1.1.1/0"),
    			SourceType:    pulumi.String("net"),
    			TargetContent: pulumi.String("0.0.0.0/0"),
    			TargetType:    pulumi.String("net"),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Tencentcloud = Pulumi.Tencentcloud;
    
    return await Deployment.RunAsync(() => 
    {
        var example = new Tencentcloud.CfwEdgePolicy("example", new()
        {
            Description = "policy description.",
            Direction = 1,
            Enable = "true",
            Port = "-1/-1",
            Protocol = "TCP",
            RuleAction = "drop",
            Scope = "all",
            SourceContent = "1.1.1.1/0",
            SourceType = "net",
            TargetContent = "0.0.0.0/0",
            TargetType = "net",
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.tencentcloud.CfwEdgePolicy;
    import com.pulumi.tencentcloud.CfwEdgePolicyArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var example = new CfwEdgePolicy("example", CfwEdgePolicyArgs.builder()
                .description("policy description.")
                .direction(1)
                .enable("true")
                .port("-1/-1")
                .protocol("TCP")
                .ruleAction("drop")
                .scope("all")
                .sourceContent("1.1.1.1/0")
                .sourceType("net")
                .targetContent("0.0.0.0/0")
                .targetType("net")
                .build());
    
        }
    }
    
    resources:
      example:
        type: tencentcloud:CfwEdgePolicy
        properties:
          description: policy description.
          direction: 1
          enable: 'true'
          port: -1/-1
          protocol: TCP
          ruleAction: drop
          scope: all
          sourceContent: 1.1.1.1/0
          sourceType: net
          targetContent: 0.0.0.0/0
          targetType: net
    

    If target_type is tag

    import * as pulumi from "@pulumi/pulumi";
    import * as tencentcloud from "@pulumi/tencentcloud";
    
    const example = new tencentcloud.CfwEdgePolicy("example", {
        sourceContent: "0.0.0.0/0",
        sourceType: "net",
        targetContent: JSON.stringify({
            Key: "test",
            Value: "dddd",
        }),
        targetType: "tag",
        protocol: "TCP",
        ruleAction: "drop",
        port: "-1/-1",
        direction: 1,
        enable: "true",
        description: "policy description.",
        scope: "all",
    });
    
    import pulumi
    import json
    import pulumi_tencentcloud as tencentcloud
    
    example = tencentcloud.CfwEdgePolicy("example",
        source_content="0.0.0.0/0",
        source_type="net",
        target_content=json.dumps({
            "Key": "test",
            "Value": "dddd",
        }),
        target_type="tag",
        protocol="TCP",
        rule_action="drop",
        port="-1/-1",
        direction=1,
        enable="true",
        description="policy description.",
        scope="all")
    
    package main
    
    import (
    	"encoding/json"
    
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/tencentcloud/tencentcloud"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		tmpJSON0, err := json.Marshal(map[string]interface{}{
    			"Key":   "test",
    			"Value": "dddd",
    		})
    		if err != nil {
    			return err
    		}
    		json0 := string(tmpJSON0)
    		_, err = tencentcloud.NewCfwEdgePolicy(ctx, "example", &tencentcloud.CfwEdgePolicyArgs{
    			SourceContent: pulumi.String("0.0.0.0/0"),
    			SourceType:    pulumi.String("net"),
    			TargetContent: pulumi.String(json0),
    			TargetType:    pulumi.String("tag"),
    			Protocol:      pulumi.String("TCP"),
    			RuleAction:    pulumi.String("drop"),
    			Port:          pulumi.String("-1/-1"),
    			Direction:     pulumi.Float64(1),
    			Enable:        pulumi.String("true"),
    			Description:   pulumi.String("policy description."),
    			Scope:         pulumi.String("all"),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using System.Text.Json;
    using Pulumi;
    using Tencentcloud = Pulumi.Tencentcloud;
    
    return await Deployment.RunAsync(() => 
    {
        var example = new Tencentcloud.CfwEdgePolicy("example", new()
        {
            SourceContent = "0.0.0.0/0",
            SourceType = "net",
            TargetContent = JsonSerializer.Serialize(new Dictionary<string, object?>
            {
                ["Key"] = "test",
                ["Value"] = "dddd",
            }),
            TargetType = "tag",
            Protocol = "TCP",
            RuleAction = "drop",
            Port = "-1/-1",
            Direction = 1,
            Enable = "true",
            Description = "policy description.",
            Scope = "all",
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.tencentcloud.CfwEdgePolicy;
    import com.pulumi.tencentcloud.CfwEdgePolicyArgs;
    import static com.pulumi.codegen.internal.Serialization.*;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var example = new CfwEdgePolicy("example", CfwEdgePolicyArgs.builder()
                .sourceContent("0.0.0.0/0")
                .sourceType("net")
                .targetContent(serializeJson(
                    jsonObject(
                        jsonProperty("Key", "test"),
                        jsonProperty("Value", "dddd")
                    )))
                .targetType("tag")
                .protocol("TCP")
                .ruleAction("drop")
                .port("-1/-1")
                .direction(1)
                .enable("true")
                .description("policy description.")
                .scope("all")
                .build());
    
        }
    }
    
    resources:
      example:
        type: tencentcloud:CfwEdgePolicy
        properties:
          sourceContent: 0.0.0.0/0
          sourceType: net
          targetContent:
            fn::toJSON:
              Key: test
              Value: dddd
          targetType: tag
          protocol: TCP
          ruleAction: drop
          port: -1/-1
          direction: 1
          enable: 'true'
          description: policy description.
          scope: all
    

    Create CfwEdgePolicy Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new CfwEdgePolicy(name: string, args: CfwEdgePolicyArgs, opts?: CustomResourceOptions);
    @overload
    def CfwEdgePolicy(resource_name: str,
                      args: CfwEdgePolicyArgs,
                      opts: Optional[ResourceOptions] = None)
    
    @overload
    def CfwEdgePolicy(resource_name: str,
                      opts: Optional[ResourceOptions] = None,
                      source_content: Optional[str] = None,
                      direction: Optional[float] = None,
                      port: Optional[str] = None,
                      protocol: Optional[str] = None,
                      rule_action: Optional[str] = None,
                      source_type: Optional[str] = None,
                      target_content: Optional[str] = None,
                      target_type: Optional[str] = None,
                      description: Optional[str] = None,
                      enable: Optional[str] = None,
                      param_template_id: Optional[str] = None,
                      scope: Optional[str] = None,
                      cfw_edge_policy_id: Optional[str] = None)
    func NewCfwEdgePolicy(ctx *Context, name string, args CfwEdgePolicyArgs, opts ...ResourceOption) (*CfwEdgePolicy, error)
    public CfwEdgePolicy(string name, CfwEdgePolicyArgs args, CustomResourceOptions? opts = null)
    public CfwEdgePolicy(String name, CfwEdgePolicyArgs args)
    public CfwEdgePolicy(String name, CfwEdgePolicyArgs args, CustomResourceOptions options)
    
    type: tencentcloud:CfwEdgePolicy
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args CfwEdgePolicyArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args CfwEdgePolicyArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args CfwEdgePolicyArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args CfwEdgePolicyArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args CfwEdgePolicyArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    CfwEdgePolicy Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The CfwEdgePolicy resource accepts the following input properties:

    Direction double
    Rule direction: 1, inbound; 0, outbound.
    Port string
    The port for the access control policy. Value: -1/-1: All ports 80: Port 80.
    Protocol string
    Protocol. If Direction=1 && Scope=serial, optional values: TCP UDP ICMP ANY HTTP HTTPS HTTP/HTTPS SMTP SMTPS SMTP/SMTPS FTP DNS; If Direction=1 && Scope!=serial, optional values: TCP; If Direction=0 && Scope=serial, optional values: TCP UDP ICMP ANY HTTP HTTPS HTTP/HTTPS SMTP SMTPS SMTP/SMTPS FTP DNS; If Direction=0 && Scope!=serial, optional values: TCP HTTP/HTTPS TLS/SSL.
    RuleAction string
    How the traffic set in the access control policy passes through the cloud firewall. Values: accept: allow; drop: reject; log: observe.
    SourceContent string
    Access source example: net:IP/CIDR(192.168.0.2).
    SourceType string
    Access source type: for inbound rules, the type can be net, location, vendor, template; for outbound rules, it can be net, instance, tag, template, group.
    TargetContent string
    Example of access purpose: net: IP/CIDR(192.168.0.2) domain: domain name rules, such as *.qq.com.
    TargetType string
    Access purpose type: For inbound rules, the type can be net, instance, tag, template, group; for outbound rules, it can be net, location, vendor, template.
    CfwEdgePolicyId string
    ID of the resource.
    Description string
    Description.
    Enable string
    Rule status, true means enabled, false means disabled. Default is true.
    ParamTemplateId string
    Parameter template id.
    Scope string
    Effective range. serial: serial; side: bypass; all: global, Default is all.
    Direction float64
    Rule direction: 1, inbound; 0, outbound.
    Port string
    The port for the access control policy. Value: -1/-1: All ports 80: Port 80.
    Protocol string
    Protocol. If Direction=1 && Scope=serial, optional values: TCP UDP ICMP ANY HTTP HTTPS HTTP/HTTPS SMTP SMTPS SMTP/SMTPS FTP DNS; If Direction=1 && Scope!=serial, optional values: TCP; If Direction=0 && Scope=serial, optional values: TCP UDP ICMP ANY HTTP HTTPS HTTP/HTTPS SMTP SMTPS SMTP/SMTPS FTP DNS; If Direction=0 && Scope!=serial, optional values: TCP HTTP/HTTPS TLS/SSL.
    RuleAction string
    How the traffic set in the access control policy passes through the cloud firewall. Values: accept: allow; drop: reject; log: observe.
    SourceContent string
    Access source example: net:IP/CIDR(192.168.0.2).
    SourceType string
    Access source type: for inbound rules, the type can be net, location, vendor, template; for outbound rules, it can be net, instance, tag, template, group.
    TargetContent string
    Example of access purpose: net: IP/CIDR(192.168.0.2) domain: domain name rules, such as *.qq.com.
    TargetType string
    Access purpose type: For inbound rules, the type can be net, instance, tag, template, group; for outbound rules, it can be net, location, vendor, template.
    CfwEdgePolicyId string
    ID of the resource.
    Description string
    Description.
    Enable string
    Rule status, true means enabled, false means disabled. Default is true.
    ParamTemplateId string
    Parameter template id.
    Scope string
    Effective range. serial: serial; side: bypass; all: global, Default is all.
    direction Double
    Rule direction: 1, inbound; 0, outbound.
    port String
    The port for the access control policy. Value: -1/-1: All ports 80: Port 80.
    protocol String
    Protocol. If Direction=1 && Scope=serial, optional values: TCP UDP ICMP ANY HTTP HTTPS HTTP/HTTPS SMTP SMTPS SMTP/SMTPS FTP DNS; If Direction=1 && Scope!=serial, optional values: TCP; If Direction=0 && Scope=serial, optional values: TCP UDP ICMP ANY HTTP HTTPS HTTP/HTTPS SMTP SMTPS SMTP/SMTPS FTP DNS; If Direction=0 && Scope!=serial, optional values: TCP HTTP/HTTPS TLS/SSL.
    ruleAction String
    How the traffic set in the access control policy passes through the cloud firewall. Values: accept: allow; drop: reject; log: observe.
    sourceContent String
    Access source example: net:IP/CIDR(192.168.0.2).
    sourceType String
    Access source type: for inbound rules, the type can be net, location, vendor, template; for outbound rules, it can be net, instance, tag, template, group.
    targetContent String
    Example of access purpose: net: IP/CIDR(192.168.0.2) domain: domain name rules, such as *.qq.com.
    targetType String
    Access purpose type: For inbound rules, the type can be net, instance, tag, template, group; for outbound rules, it can be net, location, vendor, template.
    cfwEdgePolicyId String
    ID of the resource.
    description String
    Description.
    enable String
    Rule status, true means enabled, false means disabled. Default is true.
    paramTemplateId String
    Parameter template id.
    scope String
    Effective range. serial: serial; side: bypass; all: global, Default is all.
    direction number
    Rule direction: 1, inbound; 0, outbound.
    port string
    The port for the access control policy. Value: -1/-1: All ports 80: Port 80.
    protocol string
    Protocol. If Direction=1 && Scope=serial, optional values: TCP UDP ICMP ANY HTTP HTTPS HTTP/HTTPS SMTP SMTPS SMTP/SMTPS FTP DNS; If Direction=1 && Scope!=serial, optional values: TCP; If Direction=0 && Scope=serial, optional values: TCP UDP ICMP ANY HTTP HTTPS HTTP/HTTPS SMTP SMTPS SMTP/SMTPS FTP DNS; If Direction=0 && Scope!=serial, optional values: TCP HTTP/HTTPS TLS/SSL.
    ruleAction string
    How the traffic set in the access control policy passes through the cloud firewall. Values: accept: allow; drop: reject; log: observe.
    sourceContent string
    Access source example: net:IP/CIDR(192.168.0.2).
    sourceType string
    Access source type: for inbound rules, the type can be net, location, vendor, template; for outbound rules, it can be net, instance, tag, template, group.
    targetContent string
    Example of access purpose: net: IP/CIDR(192.168.0.2) domain: domain name rules, such as *.qq.com.
    targetType string
    Access purpose type: For inbound rules, the type can be net, instance, tag, template, group; for outbound rules, it can be net, location, vendor, template.
    cfwEdgePolicyId string
    ID of the resource.
    description string
    Description.
    enable string
    Rule status, true means enabled, false means disabled. Default is true.
    paramTemplateId string
    Parameter template id.
    scope string
    Effective range. serial: serial; side: bypass; all: global, Default is all.
    direction float
    Rule direction: 1, inbound; 0, outbound.
    port str
    The port for the access control policy. Value: -1/-1: All ports 80: Port 80.
    protocol str
    Protocol. If Direction=1 && Scope=serial, optional values: TCP UDP ICMP ANY HTTP HTTPS HTTP/HTTPS SMTP SMTPS SMTP/SMTPS FTP DNS; If Direction=1 && Scope!=serial, optional values: TCP; If Direction=0 && Scope=serial, optional values: TCP UDP ICMP ANY HTTP HTTPS HTTP/HTTPS SMTP SMTPS SMTP/SMTPS FTP DNS; If Direction=0 && Scope!=serial, optional values: TCP HTTP/HTTPS TLS/SSL.
    rule_action str
    How the traffic set in the access control policy passes through the cloud firewall. Values: accept: allow; drop: reject; log: observe.
    source_content str
    Access source example: net:IP/CIDR(192.168.0.2).
    source_type str
    Access source type: for inbound rules, the type can be net, location, vendor, template; for outbound rules, it can be net, instance, tag, template, group.
    target_content str
    Example of access purpose: net: IP/CIDR(192.168.0.2) domain: domain name rules, such as *.qq.com.
    target_type str
    Access purpose type: For inbound rules, the type can be net, instance, tag, template, group; for outbound rules, it can be net, location, vendor, template.
    cfw_edge_policy_id str
    ID of the resource.
    description str
    Description.
    enable str
    Rule status, true means enabled, false means disabled. Default is true.
    param_template_id str
    Parameter template id.
    scope str
    Effective range. serial: serial; side: bypass; all: global, Default is all.
    direction Number
    Rule direction: 1, inbound; 0, outbound.
    port String
    The port for the access control policy. Value: -1/-1: All ports 80: Port 80.
    protocol String
    Protocol. If Direction=1 && Scope=serial, optional values: TCP UDP ICMP ANY HTTP HTTPS HTTP/HTTPS SMTP SMTPS SMTP/SMTPS FTP DNS; If Direction=1 && Scope!=serial, optional values: TCP; If Direction=0 && Scope=serial, optional values: TCP UDP ICMP ANY HTTP HTTPS HTTP/HTTPS SMTP SMTPS SMTP/SMTPS FTP DNS; If Direction=0 && Scope!=serial, optional values: TCP HTTP/HTTPS TLS/SSL.
    ruleAction String
    How the traffic set in the access control policy passes through the cloud firewall. Values: accept: allow; drop: reject; log: observe.
    sourceContent String
    Access source example: net:IP/CIDR(192.168.0.2).
    sourceType String
    Access source type: for inbound rules, the type can be net, location, vendor, template; for outbound rules, it can be net, instance, tag, template, group.
    targetContent String
    Example of access purpose: net: IP/CIDR(192.168.0.2) domain: domain name rules, such as *.qq.com.
    targetType String
    Access purpose type: For inbound rules, the type can be net, instance, tag, template, group; for outbound rules, it can be net, location, vendor, template.
    cfwEdgePolicyId String
    ID of the resource.
    description String
    Description.
    enable String
    Rule status, true means enabled, false means disabled. Default is true.
    paramTemplateId String
    Parameter template id.
    scope String
    Effective range. serial: serial; side: bypass; all: global, Default is all.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the CfwEdgePolicy resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Uuid double
    The unique id corresponding to the rule, no need to fill in when creating the rule.
    Id string
    The provider-assigned unique ID for this managed resource.
    Uuid float64
    The unique id corresponding to the rule, no need to fill in when creating the rule.
    id String
    The provider-assigned unique ID for this managed resource.
    uuid Double
    The unique id corresponding to the rule, no need to fill in when creating the rule.
    id string
    The provider-assigned unique ID for this managed resource.
    uuid number
    The unique id corresponding to the rule, no need to fill in when creating the rule.
    id str
    The provider-assigned unique ID for this managed resource.
    uuid float
    The unique id corresponding to the rule, no need to fill in when creating the rule.
    id String
    The provider-assigned unique ID for this managed resource.
    uuid Number
    The unique id corresponding to the rule, no need to fill in when creating the rule.

    Look up Existing CfwEdgePolicy Resource

    Get an existing CfwEdgePolicy resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: CfwEdgePolicyState, opts?: CustomResourceOptions): CfwEdgePolicy
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            cfw_edge_policy_id: Optional[str] = None,
            description: Optional[str] = None,
            direction: Optional[float] = None,
            enable: Optional[str] = None,
            param_template_id: Optional[str] = None,
            port: Optional[str] = None,
            protocol: Optional[str] = None,
            rule_action: Optional[str] = None,
            scope: Optional[str] = None,
            source_content: Optional[str] = None,
            source_type: Optional[str] = None,
            target_content: Optional[str] = None,
            target_type: Optional[str] = None,
            uuid: Optional[float] = None) -> CfwEdgePolicy
    func GetCfwEdgePolicy(ctx *Context, name string, id IDInput, state *CfwEdgePolicyState, opts ...ResourceOption) (*CfwEdgePolicy, error)
    public static CfwEdgePolicy Get(string name, Input<string> id, CfwEdgePolicyState? state, CustomResourceOptions? opts = null)
    public static CfwEdgePolicy get(String name, Output<String> id, CfwEdgePolicyState state, CustomResourceOptions options)
    resources:  _:    type: tencentcloud:CfwEdgePolicy    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    CfwEdgePolicyId string
    ID of the resource.
    Description string
    Description.
    Direction double
    Rule direction: 1, inbound; 0, outbound.
    Enable string
    Rule status, true means enabled, false means disabled. Default is true.
    ParamTemplateId string
    Parameter template id.
    Port string
    The port for the access control policy. Value: -1/-1: All ports 80: Port 80.
    Protocol string
    Protocol. If Direction=1 && Scope=serial, optional values: TCP UDP ICMP ANY HTTP HTTPS HTTP/HTTPS SMTP SMTPS SMTP/SMTPS FTP DNS; If Direction=1 && Scope!=serial, optional values: TCP; If Direction=0 && Scope=serial, optional values: TCP UDP ICMP ANY HTTP HTTPS HTTP/HTTPS SMTP SMTPS SMTP/SMTPS FTP DNS; If Direction=0 && Scope!=serial, optional values: TCP HTTP/HTTPS TLS/SSL.
    RuleAction string
    How the traffic set in the access control policy passes through the cloud firewall. Values: accept: allow; drop: reject; log: observe.
    Scope string
    Effective range. serial: serial; side: bypass; all: global, Default is all.
    SourceContent string
    Access source example: net:IP/CIDR(192.168.0.2).
    SourceType string
    Access source type: for inbound rules, the type can be net, location, vendor, template; for outbound rules, it can be net, instance, tag, template, group.
    TargetContent string
    Example of access purpose: net: IP/CIDR(192.168.0.2) domain: domain name rules, such as *.qq.com.
    TargetType string
    Access purpose type: For inbound rules, the type can be net, instance, tag, template, group; for outbound rules, it can be net, location, vendor, template.
    Uuid double
    The unique id corresponding to the rule, no need to fill in when creating the rule.
    CfwEdgePolicyId string
    ID of the resource.
    Description string
    Description.
    Direction float64
    Rule direction: 1, inbound; 0, outbound.
    Enable string
    Rule status, true means enabled, false means disabled. Default is true.
    ParamTemplateId string
    Parameter template id.
    Port string
    The port for the access control policy. Value: -1/-1: All ports 80: Port 80.
    Protocol string
    Protocol. If Direction=1 && Scope=serial, optional values: TCP UDP ICMP ANY HTTP HTTPS HTTP/HTTPS SMTP SMTPS SMTP/SMTPS FTP DNS; If Direction=1 && Scope!=serial, optional values: TCP; If Direction=0 && Scope=serial, optional values: TCP UDP ICMP ANY HTTP HTTPS HTTP/HTTPS SMTP SMTPS SMTP/SMTPS FTP DNS; If Direction=0 && Scope!=serial, optional values: TCP HTTP/HTTPS TLS/SSL.
    RuleAction string
    How the traffic set in the access control policy passes through the cloud firewall. Values: accept: allow; drop: reject; log: observe.
    Scope string
    Effective range. serial: serial; side: bypass; all: global, Default is all.
    SourceContent string
    Access source example: net:IP/CIDR(192.168.0.2).
    SourceType string
    Access source type: for inbound rules, the type can be net, location, vendor, template; for outbound rules, it can be net, instance, tag, template, group.
    TargetContent string
    Example of access purpose: net: IP/CIDR(192.168.0.2) domain: domain name rules, such as *.qq.com.
    TargetType string
    Access purpose type: For inbound rules, the type can be net, instance, tag, template, group; for outbound rules, it can be net, location, vendor, template.
    Uuid float64
    The unique id corresponding to the rule, no need to fill in when creating the rule.
    cfwEdgePolicyId String
    ID of the resource.
    description String
    Description.
    direction Double
    Rule direction: 1, inbound; 0, outbound.
    enable String
    Rule status, true means enabled, false means disabled. Default is true.
    paramTemplateId String
    Parameter template id.
    port String
    The port for the access control policy. Value: -1/-1: All ports 80: Port 80.
    protocol String
    Protocol. If Direction=1 && Scope=serial, optional values: TCP UDP ICMP ANY HTTP HTTPS HTTP/HTTPS SMTP SMTPS SMTP/SMTPS FTP DNS; If Direction=1 && Scope!=serial, optional values: TCP; If Direction=0 && Scope=serial, optional values: TCP UDP ICMP ANY HTTP HTTPS HTTP/HTTPS SMTP SMTPS SMTP/SMTPS FTP DNS; If Direction=0 && Scope!=serial, optional values: TCP HTTP/HTTPS TLS/SSL.
    ruleAction String
    How the traffic set in the access control policy passes through the cloud firewall. Values: accept: allow; drop: reject; log: observe.
    scope String
    Effective range. serial: serial; side: bypass; all: global, Default is all.
    sourceContent String
    Access source example: net:IP/CIDR(192.168.0.2).
    sourceType String
    Access source type: for inbound rules, the type can be net, location, vendor, template; for outbound rules, it can be net, instance, tag, template, group.
    targetContent String
    Example of access purpose: net: IP/CIDR(192.168.0.2) domain: domain name rules, such as *.qq.com.
    targetType String
    Access purpose type: For inbound rules, the type can be net, instance, tag, template, group; for outbound rules, it can be net, location, vendor, template.
    uuid Double
    The unique id corresponding to the rule, no need to fill in when creating the rule.
    cfwEdgePolicyId string
    ID of the resource.
    description string
    Description.
    direction number
    Rule direction: 1, inbound; 0, outbound.
    enable string
    Rule status, true means enabled, false means disabled. Default is true.
    paramTemplateId string
    Parameter template id.
    port string
    The port for the access control policy. Value: -1/-1: All ports 80: Port 80.
    protocol string
    Protocol. If Direction=1 && Scope=serial, optional values: TCP UDP ICMP ANY HTTP HTTPS HTTP/HTTPS SMTP SMTPS SMTP/SMTPS FTP DNS; If Direction=1 && Scope!=serial, optional values: TCP; If Direction=0 && Scope=serial, optional values: TCP UDP ICMP ANY HTTP HTTPS HTTP/HTTPS SMTP SMTPS SMTP/SMTPS FTP DNS; If Direction=0 && Scope!=serial, optional values: TCP HTTP/HTTPS TLS/SSL.
    ruleAction string
    How the traffic set in the access control policy passes through the cloud firewall. Values: accept: allow; drop: reject; log: observe.
    scope string
    Effective range. serial: serial; side: bypass; all: global, Default is all.
    sourceContent string
    Access source example: net:IP/CIDR(192.168.0.2).
    sourceType string
    Access source type: for inbound rules, the type can be net, location, vendor, template; for outbound rules, it can be net, instance, tag, template, group.
    targetContent string
    Example of access purpose: net: IP/CIDR(192.168.0.2) domain: domain name rules, such as *.qq.com.
    targetType string
    Access purpose type: For inbound rules, the type can be net, instance, tag, template, group; for outbound rules, it can be net, location, vendor, template.
    uuid number
    The unique id corresponding to the rule, no need to fill in when creating the rule.
    cfw_edge_policy_id str
    ID of the resource.
    description str
    Description.
    direction float
    Rule direction: 1, inbound; 0, outbound.
    enable str
    Rule status, true means enabled, false means disabled. Default is true.
    param_template_id str
    Parameter template id.
    port str
    The port for the access control policy. Value: -1/-1: All ports 80: Port 80.
    protocol str
    Protocol. If Direction=1 && Scope=serial, optional values: TCP UDP ICMP ANY HTTP HTTPS HTTP/HTTPS SMTP SMTPS SMTP/SMTPS FTP DNS; If Direction=1 && Scope!=serial, optional values: TCP; If Direction=0 && Scope=serial, optional values: TCP UDP ICMP ANY HTTP HTTPS HTTP/HTTPS SMTP SMTPS SMTP/SMTPS FTP DNS; If Direction=0 && Scope!=serial, optional values: TCP HTTP/HTTPS TLS/SSL.
    rule_action str
    How the traffic set in the access control policy passes through the cloud firewall. Values: accept: allow; drop: reject; log: observe.
    scope str
    Effective range. serial: serial; side: bypass; all: global, Default is all.
    source_content str
    Access source example: net:IP/CIDR(192.168.0.2).
    source_type str
    Access source type: for inbound rules, the type can be net, location, vendor, template; for outbound rules, it can be net, instance, tag, template, group.
    target_content str
    Example of access purpose: net: IP/CIDR(192.168.0.2) domain: domain name rules, such as *.qq.com.
    target_type str
    Access purpose type: For inbound rules, the type can be net, instance, tag, template, group; for outbound rules, it can be net, location, vendor, template.
    uuid float
    The unique id corresponding to the rule, no need to fill in when creating the rule.
    cfwEdgePolicyId String
    ID of the resource.
    description String
    Description.
    direction Number
    Rule direction: 1, inbound; 0, outbound.
    enable String
    Rule status, true means enabled, false means disabled. Default is true.
    paramTemplateId String
    Parameter template id.
    port String
    The port for the access control policy. Value: -1/-1: All ports 80: Port 80.
    protocol String
    Protocol. If Direction=1 && Scope=serial, optional values: TCP UDP ICMP ANY HTTP HTTPS HTTP/HTTPS SMTP SMTPS SMTP/SMTPS FTP DNS; If Direction=1 && Scope!=serial, optional values: TCP; If Direction=0 && Scope=serial, optional values: TCP UDP ICMP ANY HTTP HTTPS HTTP/HTTPS SMTP SMTPS SMTP/SMTPS FTP DNS; If Direction=0 && Scope!=serial, optional values: TCP HTTP/HTTPS TLS/SSL.
    ruleAction String
    How the traffic set in the access control policy passes through the cloud firewall. Values: accept: allow; drop: reject; log: observe.
    scope String
    Effective range. serial: serial; side: bypass; all: global, Default is all.
    sourceContent String
    Access source example: net:IP/CIDR(192.168.0.2).
    sourceType String
    Access source type: for inbound rules, the type can be net, location, vendor, template; for outbound rules, it can be net, instance, tag, template, group.
    targetContent String
    Example of access purpose: net: IP/CIDR(192.168.0.2) domain: domain name rules, such as *.qq.com.
    targetType String
    Access purpose type: For inbound rules, the type can be net, instance, tag, template, group; for outbound rules, it can be net, location, vendor, template.
    uuid Number
    The unique id corresponding to the rule, no need to fill in when creating the rule.

    Import

    CFW edge policy can be imported using the id, e.g.

    $ pulumi import tencentcloud:index/cfwEdgePolicy:CfwEdgePolicy example 1859582
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    tencentcloud tencentcloudstack/terraform-provider-tencentcloud
    License
    Notes
    This Pulumi package is based on the tencentcloud Terraform Provider.
    tencentcloud logo
    tencentcloud 1.81.183 published on Wednesday, Apr 16, 2025 by tencentcloudstack