zia.Firewall.FirewallFilteringRule
The zia_firewall_filtering_rule resource allows the creation and management of ZIA Cloud Firewall filtering rules in the Zscaler Internet Access.
Example Usage
using System.Collections.Generic;
using Pulumi;
using Zia = Pulumi.Zia;
using Zia = zscaler.PulumiPackage.Zia;
return await Deployment.RunAsync(() =>
{
var zscalerProxyNwServices = Zia.Firewall.GetFirewallFilteringNetworkServices.Invoke(new()
{
Name = "ZSCALER_PROXY_NW_SERVICES",
});
var engineering = Zia.Departments.GetDepartmentManagement.Invoke(new()
{
Name = "Engineering",
});
var normalInternet = Zia.Groups.GetGroupManagement.Invoke(new()
{
Name = "Normal_Internet",
});
var workHours = Zia.TimeWindow.GetTimeWindow.Invoke(new()
{
Name = "Work hours",
});
var example = new Zia.Firewall.FirewallFilteringRule("example", new()
{
Description = "Example",
Action = "ALLOW",
State = "ENABLED",
Order = 1,
EnableFullLogging = true,
NwServices = new Zia.Firewall.Inputs.FirewallFilteringRuleNwServicesArgs
{
Ids = new[]
{
zscalerProxyNwServices.Apply(getFirewallFilteringNetworkServicesResult => getFirewallFilteringNetworkServicesResult.Id),
},
},
Departments = new Zia.Firewall.Inputs.FirewallFilteringRuleDepartmentsArgs
{
Ids = new[]
{
engineering.Apply(getDepartmentManagementResult => getDepartmentManagementResult.Id),
},
},
Groups = new Zia.Firewall.Inputs.FirewallFilteringRuleGroupsArgs
{
Ids = new[]
{
normalInternet.Apply(getGroupManagementResult => getGroupManagementResult.Id),
},
},
TimeWindows = new Zia.Firewall.Inputs.FirewallFilteringRuleTimeWindowsArgs
{
Ids = new[]
{
workHours.Apply(getTimeWindowResult => getTimeWindowResult.Id),
},
},
});
});
package main
import (
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
"github.com/zscaler/pulumi-zia/sdk/go/zia/Departments"
"github.com/zscaler/pulumi-zia/sdk/go/zia/Firewall"
"github.com/zscaler/pulumi-zia/sdk/go/zia/Groups"
"github.com/zscaler/pulumi-zia/sdk/go/zia/TimeWindow"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
zscalerProxyNwServices, err := Firewall.GetFirewallFilteringNetworkServices(ctx, &firewall.GetFirewallFilteringNetworkServicesArgs{
Name: pulumi.StringRef("ZSCALER_PROXY_NW_SERVICES"),
}, nil)
if err != nil {
return err
}
engineering, err := Departments.GetDepartmentManagement(ctx, &departments.GetDepartmentManagementArgs{
Name: pulumi.StringRef("Engineering"),
}, nil)
if err != nil {
return err
}
normalInternet, err := Groups.GetGroupManagement(ctx, &groups.GetGroupManagementArgs{
Name: pulumi.StringRef("Normal_Internet"),
}, nil)
if err != nil {
return err
}
workHours, err := TimeWindow.GetTimeWindow(ctx, &timewindow.GetTimeWindowArgs{
Name: pulumi.StringRef("Work hours"),
}, nil)
if err != nil {
return err
}
_, err = Firewall.NewFirewallFilteringRule(ctx, "example", &Firewall.FirewallFilteringRuleArgs{
Description: pulumi.String("Example"),
Action: pulumi.String("ALLOW"),
State: pulumi.String("ENABLED"),
Order: pulumi.Int(1),
EnableFullLogging: pulumi.Bool(true),
NwServices: &firewall.FirewallFilteringRuleNwServicesArgs{
Ids: pulumi.IntArray{
*pulumi.Int(zscalerProxyNwServices.Id),
},
},
Departments: &firewall.FirewallFilteringRuleDepartmentsArgs{
Ids: pulumi.IntArray{
*pulumi.Int(engineering.Id),
},
},
Groups: &firewall.FirewallFilteringRuleGroupsArgs{
Ids: pulumi.IntArray{
*pulumi.Int(normalInternet.Id),
},
},
TimeWindows: &firewall.FirewallFilteringRuleTimeWindowsArgs{
Ids: pulumi.IntArray{
*pulumi.Int(workHours.Id),
},
},
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.zia.Firewall.FirewallFunctions;
import com.pulumi.zia.Firewall.inputs.GetFirewallFilteringNetworkServicesArgs;
import com.pulumi.zia.Departments.DepartmentsFunctions;
import com.pulumi.zia.Departments.inputs.GetDepartmentManagementArgs;
import com.pulumi.zia.Groups.GroupsFunctions;
import com.pulumi.zia.Groups.inputs.GetGroupManagementArgs;
import com.pulumi.zia.TimeWindow.TimeWindowFunctions;
import com.pulumi.zia.TimeWindow.inputs.GetTimeWindowArgs;
import com.pulumi.zia.Firewall.FirewallFilteringRule;
import com.pulumi.zia.Firewall.FirewallFilteringRuleArgs;
import com.pulumi.zia.Firewall.inputs.FirewallFilteringRuleNwServicesArgs;
import com.pulumi.zia.Firewall.inputs.FirewallFilteringRuleDepartmentsArgs;
import com.pulumi.zia.Firewall.inputs.FirewallFilteringRuleGroupsArgs;
import com.pulumi.zia.Firewall.inputs.FirewallFilteringRuleTimeWindowsArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var zscalerProxyNwServices = FirewallFunctions.getFirewallFilteringNetworkServices(GetFirewallFilteringNetworkServicesArgs.builder()
.name("ZSCALER_PROXY_NW_SERVICES")
.build());
final var engineering = DepartmentsFunctions.getDepartmentManagement(GetDepartmentManagementArgs.builder()
.name("Engineering")
.build());
final var normalInternet = GroupsFunctions.getGroupManagement(GetGroupManagementArgs.builder()
.name("Normal_Internet")
.build());
final var workHours = TimeWindowFunctions.getTimeWindow(GetTimeWindowArgs.builder()
.name("Work hours")
.build());
var example = new FirewallFilteringRule("example", FirewallFilteringRuleArgs.builder()
.description("Example")
.action("ALLOW")
.state("ENABLED")
.order(1)
.enableFullLogging(true)
.nwServices(FirewallFilteringRuleNwServicesArgs.builder()
.ids(zscalerProxyNwServices.applyValue(getFirewallFilteringNetworkServicesResult -> getFirewallFilteringNetworkServicesResult.id()))
.build())
.departments(FirewallFilteringRuleDepartmentsArgs.builder()
.ids(engineering.applyValue(getDepartmentManagementResult -> getDepartmentManagementResult.id()))
.build())
.groups(FirewallFilteringRuleGroupsArgs.builder()
.ids(normalInternet.applyValue(getGroupManagementResult -> getGroupManagementResult.id()))
.build())
.timeWindows(FirewallFilteringRuleTimeWindowsArgs.builder()
.ids(workHours.applyValue(getTimeWindowResult -> getTimeWindowResult.id()))
.build())
.build());
}
}
import pulumi
import pulumi_zia as zia
import zscaler_pulumi_zia as zia
zscaler_proxy_nw_services = zia.Firewall.get_firewall_filtering_network_services(name="ZSCALER_PROXY_NW_SERVICES")
engineering = zia.Departments.get_department_management(name="Engineering")
normal_internet = zia.Groups.get_group_management(name="Normal_Internet")
work_hours = zia.TimeWindow.get_time_window(name="Work hours")
example = zia.firewall.FirewallFilteringRule("example",
description="Example",
action="ALLOW",
state="ENABLED",
order=1,
enable_full_logging=True,
nw_services=zia.firewall.FirewallFilteringRuleNwServicesArgs(
ids=[zscaler_proxy_nw_services.id],
),
departments=zia.firewall.FirewallFilteringRuleDepartmentsArgs(
ids=[engineering.id],
),
groups=zia.firewall.FirewallFilteringRuleGroupsArgs(
ids=[normal_internet.id],
),
time_windows=zia.firewall.FirewallFilteringRuleTimeWindowsArgs(
ids=[work_hours.id],
))
import * as pulumi from "@pulumi/pulumi";
import * as zia from "@pulumi/zia";
import * as zia from "@zscaler/pulumi-zia";
const zscalerProxyNwServices = zia.Firewall.getFirewallFilteringNetworkServices({
name: "ZSCALER_PROXY_NW_SERVICES",
});
const engineering = zia.Departments.getDepartmentManagement({
name: "Engineering",
});
const normalInternet = zia.Groups.getGroupManagement({
name: "Normal_Internet",
});
const workHours = zia.TimeWindow.getTimeWindow({
name: "Work hours",
});
const example = new zia.firewall.FirewallFilteringRule("example", {
description: "Example",
action: "ALLOW",
state: "ENABLED",
order: 1,
enableFullLogging: true,
nwServices: {
ids: [zscalerProxyNwServices.then(zscalerProxyNwServices => zscalerProxyNwServices.id)],
},
departments: {
ids: [engineering.then(engineering => engineering.id)],
},
groups: {
ids: [normalInternet.then(normalInternet => normalInternet.id)],
},
timeWindows: {
ids: [workHours.then(workHours => workHours.id)],
},
});
resources:
example:
type: zia:Firewall:FirewallFilteringRule
properties:
description: Example
action: ALLOW
state: ENABLED
order: 1
enableFullLogging: true
nwServices:
ids:
- ${zscalerProxyNwServices.id}
departments:
ids:
- ${engineering.id}
groups:
ids:
- ${normalInternet.id}
timeWindows:
ids:
- ${workHours.id}
variables:
zscalerProxyNwServices:
fn::invoke:
Function: zia:Firewall:getFirewallFilteringNetworkServices
Arguments:
name: ZSCALER_PROXY_NW_SERVICES
engineering:
fn::invoke:
Function: zia:Departments:getDepartmentManagement
Arguments:
name: Engineering
normalInternet:
fn::invoke:
Function: zia:Groups:getGroupManagement
Arguments:
name: Normal_Internet
workHours:
fn::invoke:
Function: zia:TimeWindow:getTimeWindow
Arguments:
name: Work hours
Create FirewallFilteringRule Resource
new FirewallFilteringRule(name: string, args?: FirewallFilteringRuleArgs, opts?: CustomResourceOptions);
@overload
def FirewallFilteringRule(resource_name: str,
opts: Optional[ResourceOptions] = None,
access_control: Optional[str] = None,
action: Optional[str] = None,
app_service_groups: Optional[_firewall.FirewallFilteringRuleAppServiceGroupsArgs] = None,
app_services: Optional[_firewall.FirewallFilteringRuleAppServicesArgs] = None,
default_rule: Optional[bool] = None,
departments: Optional[_firewall.FirewallFilteringRuleDepartmentsArgs] = None,
description: Optional[str] = None,
dest_addresses: Optional[Sequence[str]] = None,
dest_countries: Optional[Sequence[str]] = None,
dest_ip_categories: Optional[Sequence[str]] = None,
dest_ip_groups: Optional[_firewall.FirewallFilteringRuleDestIpGroupsArgs] = None,
enable_full_logging: Optional[bool] = None,
groups: Optional[_firewall.FirewallFilteringRuleGroupsArgs] = None,
labels: Optional[_firewall.FirewallFilteringRuleLabelsArgs] = None,
last_modified_bies: Optional[Sequence[_firewall.FirewallFilteringRuleLastModifiedByArgs]] = None,
last_modified_time: Optional[int] = None,
location_groups: Optional[_firewall.FirewallFilteringRuleLocationGroupsArgs] = None,
locations: Optional[_firewall.FirewallFilteringRuleLocationsArgs] = None,
name: Optional[str] = None,
nw_application_groups: Optional[_firewall.FirewallFilteringRuleNwApplicationGroupsArgs] = None,
nw_applications: Optional[Sequence[str]] = None,
nw_service_groups: Optional[_firewall.FirewallFilteringRuleNwServiceGroupsArgs] = None,
nw_services: Optional[_firewall.FirewallFilteringRuleNwServicesArgs] = None,
order: Optional[int] = None,
predefined: Optional[bool] = None,
rank: Optional[int] = None,
src_ip_groups: Optional[_firewall.FirewallFilteringRuleSrcIpGroupsArgs] = None,
src_ips: Optional[Sequence[str]] = None,
state: Optional[str] = None,
time_windows: Optional[_firewall.FirewallFilteringRuleTimeWindowsArgs] = None,
users: Optional[_firewall.FirewallFilteringRuleUsersArgs] = None)
@overload
def FirewallFilteringRule(resource_name: str,
args: Optional[FirewallFilteringRuleArgs] = None,
opts: Optional[ResourceOptions] = None)
func NewFirewallFilteringRule(ctx *Context, name string, args *FirewallFilteringRuleArgs, opts ...ResourceOption) (*FirewallFilteringRule, error)
public FirewallFilteringRule(string name, FirewallFilteringRuleArgs? args = null, CustomResourceOptions? opts = null)
public FirewallFilteringRule(String name, FirewallFilteringRuleArgs args)
public FirewallFilteringRule(String name, FirewallFilteringRuleArgs args, CustomResourceOptions options)
type: zia:Firewall:FirewallFilteringRule
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args FirewallFilteringRuleArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args FirewallFilteringRuleArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args FirewallFilteringRuleArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args FirewallFilteringRuleArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args FirewallFilteringRuleArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
FirewallFilteringRule Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The FirewallFilteringRule resource accepts the following input properties:
- Access
Control string - Action string
Choose the action of the service when packets match the rule. The following actions are accepted:
ALLOW
,BLOCK_DROP
,BLOCK_RESET
,BLOCK_ICMP
,EVAL_NWAPP
- App
Service zscaler.Groups Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule App Service Groups Args Application service groups on which this rule is applied
- App
Services zscaler.Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule App Services Args Application services on which this rule is applied
- Default
Rule bool If set to true, the default rule is applied
- Departments
zscaler.
Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule Departments Args Apply to any number of departments When not used it implies
Any
to apply the rule to all departments.- Description string
Enter additional notes or information. The description cannot exceed 10,240 characters.
- Dest
Addresses List<string> ** - (Optional) - IP addresses and fully qualified domain names (FQDNs), if the domain has multiple destination IP addresses or if its IP addresses may change. For IP addresses, you can enter individual IP addresses, subnets, or address ranges. If adding multiple items, hit Enter after each entry.
- Dest
Countries List<string> ** - (Optional) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
- Dest
Ip List<string>Categories ** - (Optional) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- Dest
Ip zscaler.Groups Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule Dest Ip Groups Args ** - (Optional) Any number of destination IP address groups that you want to control with this rule.
- Enable
Full boolLogging - Groups
zscaler.
Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule Groups Args You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups.- Labels
zscaler.
Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule Labels Args Labels that are applicable to the rule.
- Last
Modified List<zscaler.Bies Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule Last Modified By Args> - Last
Modified intTime - Location
Groups zscaler.Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule Location Groups Args You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups.- Locations
zscaler.
Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule Locations Args You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups.- Name string
Name of the network service group
- Nw
Application zscaler.Groups Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule Nw Application Groups Args Any number of application groups that you want to control with this rule. The service provides predefined applications that you can group, but not modify
- Nw
Applications List<string> When not used it applies the rule to all applications. The service provides predefined applications, which you can group, but not modify.
- Nw
Service zscaler.Groups Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule Nw Service Groups Args Any number of predefined or custom network service groups to which the rule applies.
- Nw
Services zscaler.Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule Nw Services Args When not used it applies the rule to all network services or you can select specific network services. The Zscaler firewall has predefined services and you can configure up to
1,024
additional custom services.- Order int
Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- Predefined bool
If set to true, a predefined rule is applied
- Rank int
By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
.- Src
Ip zscaler.Groups Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule Src Ip Groups Args Any number of source IP address groups that you want to control with this rule.
- Src
Ips List<string> You can enter individual IP addresses, subnets, or address ranges.
- State string
An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- Time
Windows zscaler.Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule Time Windows Args You can manually select up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals.- Users
zscaler.
Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule Users Args You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users.
- Access
Control string - Action string
Choose the action of the service when packets match the rule. The following actions are accepted:
ALLOW
,BLOCK_DROP
,BLOCK_RESET
,BLOCK_ICMP
,EVAL_NWAPP
- App
Service FirewallGroups Filtering Rule App Service Groups Args Application service groups on which this rule is applied
- App
Services FirewallFiltering Rule App Services Args Application services on which this rule is applied
- Default
Rule bool If set to true, the default rule is applied
- Departments
Firewall
Filtering Rule Departments Args Apply to any number of departments When not used it implies
Any
to apply the rule to all departments.- Description string
Enter additional notes or information. The description cannot exceed 10,240 characters.
- Dest
Addresses []string ** - (Optional) - IP addresses and fully qualified domain names (FQDNs), if the domain has multiple destination IP addresses or if its IP addresses may change. For IP addresses, you can enter individual IP addresses, subnets, or address ranges. If adding multiple items, hit Enter after each entry.
- Dest
Countries []string ** - (Optional) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
- Dest
Ip []stringCategories ** - (Optional) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- Dest
Ip FirewallGroups Filtering Rule Dest Ip Groups Args ** - (Optional) Any number of destination IP address groups that you want to control with this rule.
- Enable
Full boolLogging - Groups
Firewall
Filtering Rule Groups Args You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups.- Labels
Firewall
Filtering Rule Labels Args Labels that are applicable to the rule.
- Last
Modified []FirewallBies Filtering Rule Last Modified By Args - Last
Modified intTime - Location
Groups FirewallFiltering Rule Location Groups Args You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups.- Locations
Firewall
Filtering Rule Locations Args You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups.- Name string
Name of the network service group
- Nw
Application FirewallGroups Filtering Rule Nw Application Groups Args Any number of application groups that you want to control with this rule. The service provides predefined applications that you can group, but not modify
- Nw
Applications []string When not used it applies the rule to all applications. The service provides predefined applications, which you can group, but not modify.
- Nw
Service FirewallGroups Filtering Rule Nw Service Groups Args Any number of predefined or custom network service groups to which the rule applies.
- Nw
Services FirewallFiltering Rule Nw Services Args When not used it applies the rule to all network services or you can select specific network services. The Zscaler firewall has predefined services and you can configure up to
1,024
additional custom services.- Order int
Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- Predefined bool
If set to true, a predefined rule is applied
- Rank int
By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
.- Src
Ip FirewallGroups Filtering Rule Src Ip Groups Args Any number of source IP address groups that you want to control with this rule.
- Src
Ips []string You can enter individual IP addresses, subnets, or address ranges.
- State string
An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- Time
Windows FirewallFiltering Rule Time Windows Args You can manually select up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals.- Users
Firewall
Filtering Rule Users Args You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users.
- access
Control String - action String
Choose the action of the service when packets match the rule. The following actions are accepted:
ALLOW
,BLOCK_DROP
,BLOCK_RESET
,BLOCK_ICMP
,EVAL_NWAPP
- app
Service FilteringGroups Rule App Service Groups Args Application service groups on which this rule is applied
- app
Services FilteringRule App Services Args Application services on which this rule is applied
- default
Rule Boolean If set to true, the default rule is applied
- departments
Filtering
Rule Departments Args Apply to any number of departments When not used it implies
Any
to apply the rule to all departments.- description String
Enter additional notes or information. The description cannot exceed 10,240 characters.
- dest
Addresses List<String> ** - (Optional) - IP addresses and fully qualified domain names (FQDNs), if the domain has multiple destination IP addresses or if its IP addresses may change. For IP addresses, you can enter individual IP addresses, subnets, or address ranges. If adding multiple items, hit Enter after each entry.
- dest
Countries List<String> ** - (Optional) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
- dest
Ip List<String>Categories ** - (Optional) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- dest
Ip FilteringGroups Rule Dest Ip Groups Args ** - (Optional) Any number of destination IP address groups that you want to control with this rule.
- enable
Full BooleanLogging - groups
Filtering
Rule Groups Args You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups.- labels
Filtering
Rule Labels Args Labels that are applicable to the rule.
- last
Modified List<FilteringBies Rule Last Modified By Args> - last
Modified IntegerTime - location
Groups FilteringRule Location Groups Args You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups.- locations
Filtering
Rule Locations Args You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups.- name String
Name of the network service group
- nw
Application FilteringGroups Rule Nw Application Groups Args Any number of application groups that you want to control with this rule. The service provides predefined applications that you can group, but not modify
- nw
Applications List<String> When not used it applies the rule to all applications. The service provides predefined applications, which you can group, but not modify.
- nw
Service FilteringGroups Rule Nw Service Groups Args Any number of predefined or custom network service groups to which the rule applies.
- nw
Services FilteringRule Nw Services Args When not used it applies the rule to all network services or you can select specific network services. The Zscaler firewall has predefined services and you can configure up to
1,024
additional custom services.- order Integer
Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- predefined Boolean
If set to true, a predefined rule is applied
- rank Integer
By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
.- src
Ip FilteringGroups Rule Src Ip Groups Args Any number of source IP address groups that you want to control with this rule.
- src
Ips List<String> You can enter individual IP addresses, subnets, or address ranges.
- state String
An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- time
Windows FilteringRule Time Windows Args You can manually select up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals.- users
Filtering
Rule Users Args You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users.
- access
Control string - action string
Choose the action of the service when packets match the rule. The following actions are accepted:
ALLOW
,BLOCK_DROP
,BLOCK_RESET
,BLOCK_ICMP
,EVAL_NWAPP
- app
Service FirewallGroups Filtering Rule App Service Groups Args Application service groups on which this rule is applied
- app
Services FirewallFiltering Rule App Services Args Application services on which this rule is applied
- default
Rule boolean If set to true, the default rule is applied
- departments
Firewall
Filtering Rule Departments Args Apply to any number of departments When not used it implies
Any
to apply the rule to all departments.- description string
Enter additional notes or information. The description cannot exceed 10,240 characters.
- dest
Addresses string[] ** - (Optional) - IP addresses and fully qualified domain names (FQDNs), if the domain has multiple destination IP addresses or if its IP addresses may change. For IP addresses, you can enter individual IP addresses, subnets, or address ranges. If adding multiple items, hit Enter after each entry.
- dest
Countries string[] ** - (Optional) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
- dest
Ip string[]Categories ** - (Optional) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- dest
Ip FirewallGroups Filtering Rule Dest Ip Groups Args ** - (Optional) Any number of destination IP address groups that you want to control with this rule.
- enable
Full booleanLogging - groups
Firewall
Filtering Rule Groups Args You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups.- labels
Firewall
Filtering Rule Labels Args Labels that are applicable to the rule.
- last
Modified FirewallBies Filtering Rule Last Modified By Args[] - last
Modified numberTime - location
Groups FirewallFiltering Rule Location Groups Args You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups.- locations
Firewall
Filtering Rule Locations Args You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups.- name string
Name of the network service group
- nw
Application FirewallGroups Filtering Rule Nw Application Groups Args Any number of application groups that you want to control with this rule. The service provides predefined applications that you can group, but not modify
- nw
Applications string[] When not used it applies the rule to all applications. The service provides predefined applications, which you can group, but not modify.
- nw
Service FirewallGroups Filtering Rule Nw Service Groups Args Any number of predefined or custom network service groups to which the rule applies.
- nw
Services FirewallFiltering Rule Nw Services Args When not used it applies the rule to all network services or you can select specific network services. The Zscaler firewall has predefined services and you can configure up to
1,024
additional custom services.- order number
Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- predefined boolean
If set to true, a predefined rule is applied
- rank number
By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
.- src
Ip FirewallGroups Filtering Rule Src Ip Groups Args Any number of source IP address groups that you want to control with this rule.
- src
Ips string[] You can enter individual IP addresses, subnets, or address ranges.
- state string
An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- time
Windows FirewallFiltering Rule Time Windows Args You can manually select up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals.- users
Firewall
Filtering Rule Users Args You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users.
- access_
control str - action str
Choose the action of the service when packets match the rule. The following actions are accepted:
ALLOW
,BLOCK_DROP
,BLOCK_RESET
,BLOCK_ICMP
,EVAL_NWAPP
- app_
service_ Firewallgroups Filtering Rule App Service Groups Args Application service groups on which this rule is applied
- app_
services FirewallFiltering Rule App Services Args Application services on which this rule is applied
- default_
rule bool If set to true, the default rule is applied
- departments
Firewall
Filtering Rule Departments Args Apply to any number of departments When not used it implies
Any
to apply the rule to all departments.- description str
Enter additional notes or information. The description cannot exceed 10,240 characters.
- dest_
addresses Sequence[str] ** - (Optional) - IP addresses and fully qualified domain names (FQDNs), if the domain has multiple destination IP addresses or if its IP addresses may change. For IP addresses, you can enter individual IP addresses, subnets, or address ranges. If adding multiple items, hit Enter after each entry.
- dest_
countries Sequence[str] ** - (Optional) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
- dest_
ip_ Sequence[str]categories ** - (Optional) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- dest_
ip_ Firewallgroups Filtering Rule Dest Ip Groups Args ** - (Optional) Any number of destination IP address groups that you want to control with this rule.
- enable_
full_ boollogging - groups
Firewall
Filtering Rule Groups Args You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups.- labels
Firewall
Filtering Rule Labels Args Labels that are applicable to the rule.
- last_
modified_ Firewallbies Filtering Rule Last Modified By Args] - last_
modified_ inttime - location_
groups FirewallFiltering Rule Location Groups Args You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups.- locations
Firewall
Filtering Rule Locations Args You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups.- name str
Name of the network service group
- nw_
application_ Firewallgroups Filtering Rule Nw Application Groups Args Any number of application groups that you want to control with this rule. The service provides predefined applications that you can group, but not modify
- nw_
applications Sequence[str] When not used it applies the rule to all applications. The service provides predefined applications, which you can group, but not modify.
- nw_
service_ Firewallgroups Filtering Rule Nw Service Groups Args Any number of predefined or custom network service groups to which the rule applies.
- nw_
services FirewallFiltering Rule Nw Services Args When not used it applies the rule to all network services or you can select specific network services. The Zscaler firewall has predefined services and you can configure up to
1,024
additional custom services.- order int
Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- predefined bool
If set to true, a predefined rule is applied
- rank int
By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
.- src_
ip_ Firewallgroups Filtering Rule Src Ip Groups Args Any number of source IP address groups that you want to control with this rule.
- src_
ips Sequence[str] You can enter individual IP addresses, subnets, or address ranges.
- state str
An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- time_
windows FirewallFiltering Rule Time Windows Args You can manually select up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals.- users
Firewall
Filtering Rule Users Args You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users.
- access
Control String - action String
Choose the action of the service when packets match the rule. The following actions are accepted:
ALLOW
,BLOCK_DROP
,BLOCK_RESET
,BLOCK_ICMP
,EVAL_NWAPP
- app
Service Property MapGroups Application service groups on which this rule is applied
- app
Services Property Map Application services on which this rule is applied
- default
Rule Boolean If set to true, the default rule is applied
- departments Property Map
Apply to any number of departments When not used it implies
Any
to apply the rule to all departments.- description String
Enter additional notes or information. The description cannot exceed 10,240 characters.
- dest
Addresses List<String> ** - (Optional) - IP addresses and fully qualified domain names (FQDNs), if the domain has multiple destination IP addresses or if its IP addresses may change. For IP addresses, you can enter individual IP addresses, subnets, or address ranges. If adding multiple items, hit Enter after each entry.
- dest
Countries List<String> ** - (Optional) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
- dest
Ip List<String>Categories ** - (Optional) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- dest
Ip Property MapGroups ** - (Optional) Any number of destination IP address groups that you want to control with this rule.
- enable
Full BooleanLogging - groups Property Map
You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups.- labels Property Map
Labels that are applicable to the rule.
- last
Modified List<Property Map>Bies - last
Modified NumberTime - location
Groups Property Map You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups.- locations Property Map
You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups.- name String
Name of the network service group
- nw
Application Property MapGroups Any number of application groups that you want to control with this rule. The service provides predefined applications that you can group, but not modify
- nw
Applications List<String> When not used it applies the rule to all applications. The service provides predefined applications, which you can group, but not modify.
- nw
Service Property MapGroups Any number of predefined or custom network service groups to which the rule applies.
- nw
Services Property Map When not used it applies the rule to all network services or you can select specific network services. The Zscaler firewall has predefined services and you can configure up to
1,024
additional custom services.- order Number
Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- predefined Boolean
If set to true, a predefined rule is applied
- rank Number
By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
.- src
Ip Property MapGroups Any number of source IP address groups that you want to control with this rule.
- src
Ips List<String> You can enter individual IP addresses, subnets, or address ranges.
- state String
An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- time
Windows Property Map You can manually select up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals.- users Property Map
You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users.
Outputs
All input properties are implicitly available as output properties. Additionally, the FirewallFilteringRule resource produces the following output properties:
Look up Existing FirewallFilteringRule Resource
Get an existing FirewallFilteringRule resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: FirewallFilteringRuleState, opts?: CustomResourceOptions): FirewallFilteringRule
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
access_control: Optional[str] = None,
action: Optional[str] = None,
app_service_groups: Optional[_firewall.FirewallFilteringRuleAppServiceGroupsArgs] = None,
app_services: Optional[_firewall.FirewallFilteringRuleAppServicesArgs] = None,
default_rule: Optional[bool] = None,
departments: Optional[_firewall.FirewallFilteringRuleDepartmentsArgs] = None,
description: Optional[str] = None,
dest_addresses: Optional[Sequence[str]] = None,
dest_countries: Optional[Sequence[str]] = None,
dest_ip_categories: Optional[Sequence[str]] = None,
dest_ip_groups: Optional[_firewall.FirewallFilteringRuleDestIpGroupsArgs] = None,
enable_full_logging: Optional[bool] = None,
groups: Optional[_firewall.FirewallFilteringRuleGroupsArgs] = None,
labels: Optional[_firewall.FirewallFilteringRuleLabelsArgs] = None,
last_modified_bies: Optional[Sequence[_firewall.FirewallFilteringRuleLastModifiedByArgs]] = None,
last_modified_time: Optional[int] = None,
location_groups: Optional[_firewall.FirewallFilteringRuleLocationGroupsArgs] = None,
locations: Optional[_firewall.FirewallFilteringRuleLocationsArgs] = None,
name: Optional[str] = None,
nw_application_groups: Optional[_firewall.FirewallFilteringRuleNwApplicationGroupsArgs] = None,
nw_applications: Optional[Sequence[str]] = None,
nw_service_groups: Optional[_firewall.FirewallFilteringRuleNwServiceGroupsArgs] = None,
nw_services: Optional[_firewall.FirewallFilteringRuleNwServicesArgs] = None,
order: Optional[int] = None,
predefined: Optional[bool] = None,
rank: Optional[int] = None,
rule_id: Optional[int] = None,
src_ip_groups: Optional[_firewall.FirewallFilteringRuleSrcIpGroupsArgs] = None,
src_ips: Optional[Sequence[str]] = None,
state: Optional[str] = None,
time_windows: Optional[_firewall.FirewallFilteringRuleTimeWindowsArgs] = None,
users: Optional[_firewall.FirewallFilteringRuleUsersArgs] = None) -> FirewallFilteringRule
func GetFirewallFilteringRule(ctx *Context, name string, id IDInput, state *FirewallFilteringRuleState, opts ...ResourceOption) (*FirewallFilteringRule, error)
public static FirewallFilteringRule Get(string name, Input<string> id, FirewallFilteringRuleState? state, CustomResourceOptions? opts = null)
public static FirewallFilteringRule get(String name, Output<String> id, FirewallFilteringRuleState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Access
Control string - Action string
Choose the action of the service when packets match the rule. The following actions are accepted:
ALLOW
,BLOCK_DROP
,BLOCK_RESET
,BLOCK_ICMP
,EVAL_NWAPP
- App
Service zscaler.Groups Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule App Service Groups Args Application service groups on which this rule is applied
- App
Services zscaler.Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule App Services Args Application services on which this rule is applied
- Default
Rule bool If set to true, the default rule is applied
- Departments
zscaler.
Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule Departments Args Apply to any number of departments When not used it implies
Any
to apply the rule to all departments.- Description string
Enter additional notes or information. The description cannot exceed 10,240 characters.
- Dest
Addresses List<string> ** - (Optional) - IP addresses and fully qualified domain names (FQDNs), if the domain has multiple destination IP addresses or if its IP addresses may change. For IP addresses, you can enter individual IP addresses, subnets, or address ranges. If adding multiple items, hit Enter after each entry.
- Dest
Countries List<string> ** - (Optional) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
- Dest
Ip List<string>Categories ** - (Optional) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- Dest
Ip zscaler.Groups Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule Dest Ip Groups Args ** - (Optional) Any number of destination IP address groups that you want to control with this rule.
- Enable
Full boolLogging - Groups
zscaler.
Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule Groups Args You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups.- Labels
zscaler.
Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule Labels Args Labels that are applicable to the rule.
- Last
Modified List<zscaler.Bies Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule Last Modified By Args> - Last
Modified intTime - Location
Groups zscaler.Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule Location Groups Args You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups.- Locations
zscaler.
Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule Locations Args You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups.- Name string
Name of the network service group
- Nw
Application zscaler.Groups Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule Nw Application Groups Args Any number of application groups that you want to control with this rule. The service provides predefined applications that you can group, but not modify
- Nw
Applications List<string> When not used it applies the rule to all applications. The service provides predefined applications, which you can group, but not modify.
- Nw
Service zscaler.Groups Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule Nw Service Groups Args Any number of predefined or custom network service groups to which the rule applies.
- Nw
Services zscaler.Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule Nw Services Args When not used it applies the rule to all network services or you can select specific network services. The Zscaler firewall has predefined services and you can configure up to
1,024
additional custom services.- Order int
Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- Predefined bool
If set to true, a predefined rule is applied
- Rank int
By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
.- Rule
Id int - Src
Ip zscaler.Groups Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule Src Ip Groups Args Any number of source IP address groups that you want to control with this rule.
- Src
Ips List<string> You can enter individual IP addresses, subnets, or address ranges.
- State string
An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- Time
Windows zscaler.Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule Time Windows Args You can manually select up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals.- Users
zscaler.
Pulumi Package. Zia. Firewall. Inputs. Firewall Filtering Rule Users Args You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users.
- Access
Control string - Action string
Choose the action of the service when packets match the rule. The following actions are accepted:
ALLOW
,BLOCK_DROP
,BLOCK_RESET
,BLOCK_ICMP
,EVAL_NWAPP
- App
Service FirewallGroups Filtering Rule App Service Groups Args Application service groups on which this rule is applied
- App
Services FirewallFiltering Rule App Services Args Application services on which this rule is applied
- Default
Rule bool If set to true, the default rule is applied
- Departments
Firewall
Filtering Rule Departments Args Apply to any number of departments When not used it implies
Any
to apply the rule to all departments.- Description string
Enter additional notes or information. The description cannot exceed 10,240 characters.
- Dest
Addresses []string ** - (Optional) - IP addresses and fully qualified domain names (FQDNs), if the domain has multiple destination IP addresses or if its IP addresses may change. For IP addresses, you can enter individual IP addresses, subnets, or address ranges. If adding multiple items, hit Enter after each entry.
- Dest
Countries []string ** - (Optional) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
- Dest
Ip []stringCategories ** - (Optional) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- Dest
Ip FirewallGroups Filtering Rule Dest Ip Groups Args ** - (Optional) Any number of destination IP address groups that you want to control with this rule.
- Enable
Full boolLogging - Groups
Firewall
Filtering Rule Groups Args You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups.- Labels
Firewall
Filtering Rule Labels Args Labels that are applicable to the rule.
- Last
Modified []FirewallBies Filtering Rule Last Modified By Args - Last
Modified intTime - Location
Groups FirewallFiltering Rule Location Groups Args You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups.- Locations
Firewall
Filtering Rule Locations Args You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups.- Name string
Name of the network service group
- Nw
Application FirewallGroups Filtering Rule Nw Application Groups Args Any number of application groups that you want to control with this rule. The service provides predefined applications that you can group, but not modify
- Nw
Applications []string When not used it applies the rule to all applications. The service provides predefined applications, which you can group, but not modify.
- Nw
Service FirewallGroups Filtering Rule Nw Service Groups Args Any number of predefined or custom network service groups to which the rule applies.
- Nw
Services FirewallFiltering Rule Nw Services Args When not used it applies the rule to all network services or you can select specific network services. The Zscaler firewall has predefined services and you can configure up to
1,024
additional custom services.- Order int
Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- Predefined bool
If set to true, a predefined rule is applied
- Rank int
By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
.- Rule
Id int - Src
Ip FirewallGroups Filtering Rule Src Ip Groups Args Any number of source IP address groups that you want to control with this rule.
- Src
Ips []string You can enter individual IP addresses, subnets, or address ranges.
- State string
An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- Time
Windows FirewallFiltering Rule Time Windows Args You can manually select up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals.- Users
Firewall
Filtering Rule Users Args You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users.
- access
Control String - action String
Choose the action of the service when packets match the rule. The following actions are accepted:
ALLOW
,BLOCK_DROP
,BLOCK_RESET
,BLOCK_ICMP
,EVAL_NWAPP
- app
Service FilteringGroups Rule App Service Groups Args Application service groups on which this rule is applied
- app
Services FilteringRule App Services Args Application services on which this rule is applied
- default
Rule Boolean If set to true, the default rule is applied
- departments
Filtering
Rule Departments Args Apply to any number of departments When not used it implies
Any
to apply the rule to all departments.- description String
Enter additional notes or information. The description cannot exceed 10,240 characters.
- dest
Addresses List<String> ** - (Optional) - IP addresses and fully qualified domain names (FQDNs), if the domain has multiple destination IP addresses or if its IP addresses may change. For IP addresses, you can enter individual IP addresses, subnets, or address ranges. If adding multiple items, hit Enter after each entry.
- dest
Countries List<String> ** - (Optional) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
- dest
Ip List<String>Categories ** - (Optional) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- dest
Ip FilteringGroups Rule Dest Ip Groups Args ** - (Optional) Any number of destination IP address groups that you want to control with this rule.
- enable
Full BooleanLogging - groups
Filtering
Rule Groups Args You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups.- labels
Filtering
Rule Labels Args Labels that are applicable to the rule.
- last
Modified List<FilteringBies Rule Last Modified By Args> - last
Modified IntegerTime - location
Groups FilteringRule Location Groups Args You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups.- locations
Filtering
Rule Locations Args You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups.- name String
Name of the network service group
- nw
Application FilteringGroups Rule Nw Application Groups Args Any number of application groups that you want to control with this rule. The service provides predefined applications that you can group, but not modify
- nw
Applications List<String> When not used it applies the rule to all applications. The service provides predefined applications, which you can group, but not modify.
- nw
Service FilteringGroups Rule Nw Service Groups Args Any number of predefined or custom network service groups to which the rule applies.
- nw
Services FilteringRule Nw Services Args When not used it applies the rule to all network services or you can select specific network services. The Zscaler firewall has predefined services and you can configure up to
1,024
additional custom services.- order Integer
Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- predefined Boolean
If set to true, a predefined rule is applied
- rank Integer
By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
.- rule
Id Integer - src
Ip FilteringGroups Rule Src Ip Groups Args Any number of source IP address groups that you want to control with this rule.
- src
Ips List<String> You can enter individual IP addresses, subnets, or address ranges.
- state String
An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- time
Windows FilteringRule Time Windows Args You can manually select up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals.- users
Filtering
Rule Users Args You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users.
- access
Control string - action string
Choose the action of the service when packets match the rule. The following actions are accepted:
ALLOW
,BLOCK_DROP
,BLOCK_RESET
,BLOCK_ICMP
,EVAL_NWAPP
- app
Service FirewallGroups Filtering Rule App Service Groups Args Application service groups on which this rule is applied
- app
Services FirewallFiltering Rule App Services Args Application services on which this rule is applied
- default
Rule boolean If set to true, the default rule is applied
- departments
Firewall
Filtering Rule Departments Args Apply to any number of departments When not used it implies
Any
to apply the rule to all departments.- description string
Enter additional notes or information. The description cannot exceed 10,240 characters.
- dest
Addresses string[] ** - (Optional) - IP addresses and fully qualified domain names (FQDNs), if the domain has multiple destination IP addresses or if its IP addresses may change. For IP addresses, you can enter individual IP addresses, subnets, or address ranges. If adding multiple items, hit Enter after each entry.
- dest
Countries string[] ** - (Optional) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
- dest
Ip string[]Categories ** - (Optional) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- dest
Ip FirewallGroups Filtering Rule Dest Ip Groups Args ** - (Optional) Any number of destination IP address groups that you want to control with this rule.
- enable
Full booleanLogging - groups
Firewall
Filtering Rule Groups Args You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups.- labels
Firewall
Filtering Rule Labels Args Labels that are applicable to the rule.
- last
Modified FirewallBies Filtering Rule Last Modified By Args[] - last
Modified numberTime - location
Groups FirewallFiltering Rule Location Groups Args You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups.- locations
Firewall
Filtering Rule Locations Args You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups.- name string
Name of the network service group
- nw
Application FirewallGroups Filtering Rule Nw Application Groups Args Any number of application groups that you want to control with this rule. The service provides predefined applications that you can group, but not modify
- nw
Applications string[] When not used it applies the rule to all applications. The service provides predefined applications, which you can group, but not modify.
- nw
Service FirewallGroups Filtering Rule Nw Service Groups Args Any number of predefined or custom network service groups to which the rule applies.
- nw
Services FirewallFiltering Rule Nw Services Args When not used it applies the rule to all network services or you can select specific network services. The Zscaler firewall has predefined services and you can configure up to
1,024
additional custom services.- order number
Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- predefined boolean
If set to true, a predefined rule is applied
- rank number
By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
.- rule
Id number - src
Ip FirewallGroups Filtering Rule Src Ip Groups Args Any number of source IP address groups that you want to control with this rule.
- src
Ips string[] You can enter individual IP addresses, subnets, or address ranges.
- state string
An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- time
Windows FirewallFiltering Rule Time Windows Args You can manually select up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals.- users
Firewall
Filtering Rule Users Args You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users.
- access_
control str - action str
Choose the action of the service when packets match the rule. The following actions are accepted:
ALLOW
,BLOCK_DROP
,BLOCK_RESET
,BLOCK_ICMP
,EVAL_NWAPP
- app_
service_ Firewallgroups Filtering Rule App Service Groups Args Application service groups on which this rule is applied
- app_
services FirewallFiltering Rule App Services Args Application services on which this rule is applied
- default_
rule bool If set to true, the default rule is applied
- departments
Firewall
Filtering Rule Departments Args Apply to any number of departments When not used it implies
Any
to apply the rule to all departments.- description str
Enter additional notes or information. The description cannot exceed 10,240 characters.
- dest_
addresses Sequence[str] ** - (Optional) - IP addresses and fully qualified domain names (FQDNs), if the domain has multiple destination IP addresses or if its IP addresses may change. For IP addresses, you can enter individual IP addresses, subnets, or address ranges. If adding multiple items, hit Enter after each entry.
- dest_
countries Sequence[str] ** - (Optional) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
- dest_
ip_ Sequence[str]categories ** - (Optional) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- dest_
ip_ Firewallgroups Filtering Rule Dest Ip Groups Args ** - (Optional) Any number of destination IP address groups that you want to control with this rule.
- enable_
full_ boollogging - groups
Firewall
Filtering Rule Groups Args You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups.- labels
Firewall
Filtering Rule Labels Args Labels that are applicable to the rule.
- last_
modified_ Firewallbies Filtering Rule Last Modified By Args] - last_
modified_ inttime - location_
groups FirewallFiltering Rule Location Groups Args You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups.- locations
Firewall
Filtering Rule Locations Args You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups.- name str
Name of the network service group
- nw_
application_ Firewallgroups Filtering Rule Nw Application Groups Args Any number of application groups that you want to control with this rule. The service provides predefined applications that you can group, but not modify
- nw_
applications Sequence[str] When not used it applies the rule to all applications. The service provides predefined applications, which you can group, but not modify.
- nw_
service_ Firewallgroups Filtering Rule Nw Service Groups Args Any number of predefined or custom network service groups to which the rule applies.
- nw_
services FirewallFiltering Rule Nw Services Args When not used it applies the rule to all network services or you can select specific network services. The Zscaler firewall has predefined services and you can configure up to
1,024
additional custom services.- order int
Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- predefined bool
If set to true, a predefined rule is applied
- rank int
By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
.- rule_
id int - src_
ip_ Firewallgroups Filtering Rule Src Ip Groups Args Any number of source IP address groups that you want to control with this rule.
- src_
ips Sequence[str] You can enter individual IP addresses, subnets, or address ranges.
- state str
An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- time_
windows FirewallFiltering Rule Time Windows Args You can manually select up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals.- users
Firewall
Filtering Rule Users Args You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users.
- access
Control String - action String
Choose the action of the service when packets match the rule. The following actions are accepted:
ALLOW
,BLOCK_DROP
,BLOCK_RESET
,BLOCK_ICMP
,EVAL_NWAPP
- app
Service Property MapGroups Application service groups on which this rule is applied
- app
Services Property Map Application services on which this rule is applied
- default
Rule Boolean If set to true, the default rule is applied
- departments Property Map
Apply to any number of departments When not used it implies
Any
to apply the rule to all departments.- description String
Enter additional notes or information. The description cannot exceed 10,240 characters.
- dest
Addresses List<String> ** - (Optional) - IP addresses and fully qualified domain names (FQDNs), if the domain has multiple destination IP addresses or if its IP addresses may change. For IP addresses, you can enter individual IP addresses, subnets, or address ranges. If adding multiple items, hit Enter after each entry.
- dest
Countries List<String> ** - (Optional) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
- dest
Ip List<String>Categories ** - (Optional) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- dest
Ip Property MapGroups ** - (Optional) Any number of destination IP address groups that you want to control with this rule.
- enable
Full BooleanLogging - groups Property Map
You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups.- labels Property Map
Labels that are applicable to the rule.
- last
Modified List<Property Map>Bies - last
Modified NumberTime - location
Groups Property Map You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups.- locations Property Map
You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups.- name String
Name of the network service group
- nw
Application Property MapGroups Any number of application groups that you want to control with this rule. The service provides predefined applications that you can group, but not modify
- nw
Applications List<String> When not used it applies the rule to all applications. The service provides predefined applications, which you can group, but not modify.
- nw
Service Property MapGroups Any number of predefined or custom network service groups to which the rule applies.
- nw
Services Property Map When not used it applies the rule to all network services or you can select specific network services. The Zscaler firewall has predefined services and you can configure up to
1,024
additional custom services.- order Number
Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- predefined Boolean
If set to true, a predefined rule is applied
- rank Number
By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
.- rule
Id Number - src
Ip Property MapGroups Any number of source IP address groups that you want to control with this rule.
- src
Ips List<String> You can enter individual IP addresses, subnets, or address ranges.
- state String
An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- time
Windows Property Map You can manually select up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals.- users Property Map
You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users.
Supporting Types
FirewallFilteringRuleAppServiceGroups
- Ids List<int>
Identifier that uniquely identifies an entity
- Ids []int
Identifier that uniquely identifies an entity
- ids List<Integer>
Identifier that uniquely identifies an entity
- ids number[]
Identifier that uniquely identifies an entity
- ids Sequence[int]
Identifier that uniquely identifies an entity
- ids List<Number>
Identifier that uniquely identifies an entity
FirewallFilteringRuleAppServices
- Ids List<int>
Identifier that uniquely identifies an entity
- Ids []int
Identifier that uniquely identifies an entity
- ids List<Integer>
Identifier that uniquely identifies an entity
- ids number[]
Identifier that uniquely identifies an entity
- ids Sequence[int]
Identifier that uniquely identifies an entity
- ids List<Number>
Identifier that uniquely identifies an entity
FirewallFilteringRuleDepartments
- Ids List<int>
Identifier that uniquely identifies an entity
- Ids []int
Identifier that uniquely identifies an entity
- ids List<Integer>
Identifier that uniquely identifies an entity
- ids number[]
Identifier that uniquely identifies an entity
- ids Sequence[int]
Identifier that uniquely identifies an entity
- ids List<Number>
Identifier that uniquely identifies an entity
FirewallFilteringRuleDestIpGroups
- Ids List<int>
Identifier that uniquely identifies an entity
- Ids []int
Identifier that uniquely identifies an entity
- ids List<Integer>
Identifier that uniquely identifies an entity
- ids number[]
Identifier that uniquely identifies an entity
- ids Sequence[int]
Identifier that uniquely identifies an entity
- ids List<Number>
Identifier that uniquely identifies an entity
FirewallFilteringRuleGroups
- Ids List<int>
Identifier that uniquely identifies an entity
- Ids []int
Identifier that uniquely identifies an entity
- ids List<Integer>
Identifier that uniquely identifies an entity
- ids number[]
Identifier that uniquely identifies an entity
- ids Sequence[int]
Identifier that uniquely identifies an entity
- ids List<Number>
Identifier that uniquely identifies an entity
FirewallFilteringRuleLabels
- Ids List<int>
Identifier that uniquely identifies an entity
- Ids []int
Identifier that uniquely identifies an entity
- ids List<Integer>
Identifier that uniquely identifies an entity
- ids number[]
Identifier that uniquely identifies an entity
- ids Sequence[int]
Identifier that uniquely identifies an entity
- ids List<Number>
Identifier that uniquely identifies an entity
FirewallFilteringRuleLastModifiedBy
- Extensions Dictionary<string, string>
- Id int
Identifier that uniquely identifies an entity
- Extensions map[string]string
- Id int
Identifier that uniquely identifies an entity
- extensions Map<String,String>
- id Integer
Identifier that uniquely identifies an entity
- extensions {[key: string]: string}
- id number
Identifier that uniquely identifies an entity
- extensions Mapping[str, str]
- id int
Identifier that uniquely identifies an entity
- extensions Map<String>
- id Number
Identifier that uniquely identifies an entity
FirewallFilteringRuleLocationGroups
- Ids List<int>
Identifier that uniquely identifies an entity
- Ids []int
Identifier that uniquely identifies an entity
- ids List<Integer>
Identifier that uniquely identifies an entity
- ids number[]
Identifier that uniquely identifies an entity
- ids Sequence[int]
Identifier that uniquely identifies an entity
- ids List<Number>
Identifier that uniquely identifies an entity
FirewallFilteringRuleLocations
- Ids List<int>
Identifier that uniquely identifies an entity
- Ids []int
Identifier that uniquely identifies an entity
- ids List<Integer>
Identifier that uniquely identifies an entity
- ids number[]
Identifier that uniquely identifies an entity
- ids Sequence[int]
Identifier that uniquely identifies an entity
- ids List<Number>
Identifier that uniquely identifies an entity
FirewallFilteringRuleNwApplicationGroups
- Ids List<int>
Identifier that uniquely identifies an entity
- Ids []int
Identifier that uniquely identifies an entity
- ids List<Integer>
Identifier that uniquely identifies an entity
- ids number[]
Identifier that uniquely identifies an entity
- ids Sequence[int]
Identifier that uniquely identifies an entity
- ids List<Number>
Identifier that uniquely identifies an entity
FirewallFilteringRuleNwServiceGroups
- Ids List<int>
Identifier that uniquely identifies an entity
- Ids []int
Identifier that uniquely identifies an entity
- ids List<Integer>
Identifier that uniquely identifies an entity
- ids number[]
Identifier that uniquely identifies an entity
- ids Sequence[int]
Identifier that uniquely identifies an entity
- ids List<Number>
Identifier that uniquely identifies an entity
FirewallFilteringRuleNwServices
- Ids List<int>
Identifier that uniquely identifies an entity
- Ids []int
Identifier that uniquely identifies an entity
- ids List<Integer>
Identifier that uniquely identifies an entity
- ids number[]
Identifier that uniquely identifies an entity
- ids Sequence[int]
Identifier that uniquely identifies an entity
- ids List<Number>
Identifier that uniquely identifies an entity
FirewallFilteringRuleSrcIpGroups
- Ids List<int>
Identifier that uniquely identifies an entity
- Ids []int
Identifier that uniquely identifies an entity
- ids List<Integer>
Identifier that uniquely identifies an entity
- ids number[]
Identifier that uniquely identifies an entity
- ids Sequence[int]
Identifier that uniquely identifies an entity
- ids List<Number>
Identifier that uniquely identifies an entity
FirewallFilteringRuleTimeWindows
- Ids List<int>
Identifier that uniquely identifies an entity
- Ids []int
Identifier that uniquely identifies an entity
- ids List<Integer>
Identifier that uniquely identifies an entity
- ids number[]
Identifier that uniquely identifies an entity
- ids Sequence[int]
Identifier that uniquely identifies an entity
- ids List<Number>
Identifier that uniquely identifies an entity
FirewallFilteringRuleUsers
- Ids List<int>
Identifier that uniquely identifies an entity
- Ids []int
Identifier that uniquely identifies an entity
- ids List<Integer>
Identifier that uniquely identifies an entity
- ids number[]
Identifier that uniquely identifies an entity
- ids Sequence[int]
Identifier that uniquely identifies an entity
- ids List<Number>
Identifier that uniquely identifies an entity
Package Details
- Repository
- zia zscaler/pulumi-zia
- License
- MIT
- Notes
This Pulumi package is based on the
zia
Terraform Provider.