zia.Firewall.getFirewallFilteringRule
Use the zia_firewall_filtering_rule data source to get information about a cloud firewall rule available in the Zscaler Internet Access cloud firewall.
Example Usage
using System.Collections.Generic;
using Pulumi;
using Zia = Pulumi.Zia;
return await Deployment.RunAsync(() =>
{
var example = Zia.Firewall.GetFirewallFilteringRule.Invoke(new()
{
Name = "Office 365 One Click Rule",
});
});
package main
import (
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
"github.com/zscaler/pulumi-zia/sdk/go/zia/Firewall"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := Firewall.GetFirewallFilteringRule(ctx, &firewall.GetFirewallFilteringRuleArgs{
Name: pulumi.StringRef("Office 365 One Click Rule"),
}, nil)
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.zia.Firewall.FirewallFunctions;
import com.pulumi.zia.Firewall.inputs.GetFirewallFilteringRuleArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var example = FirewallFunctions.getFirewallFilteringRule(GetFirewallFilteringRuleArgs.builder()
.name("Office 365 One Click Rule")
.build());
}
}
import pulumi
import pulumi_zia as zia
example = zia.Firewall.get_firewall_filtering_rule(name="Office 365 One Click Rule")
import * as pulumi from "@pulumi/pulumi";
import * as zia from "@pulumi/zia";
const example = zia.Firewall.getFirewallFilteringRule({
name: "Office 365 One Click Rule",
});
variables:
example:
fn::invoke:
Function: zia:Firewall:getFirewallFilteringRule
Arguments:
name: Office 365 One Click Rule
Using getFirewallFilteringRule
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getFirewallFilteringRule(args: GetFirewallFilteringRuleArgs, opts?: InvokeOptions): Promise<GetFirewallFilteringRuleResult>
function getFirewallFilteringRuleOutput(args: GetFirewallFilteringRuleOutputArgs, opts?: InvokeOptions): Output<GetFirewallFilteringRuleResult>
def get_firewall_filtering_rule(action: Optional[str] = None,
description: Optional[str] = None,
id: Optional[int] = None,
last_modified_time: Optional[int] = None,
name: Optional[str] = None,
state: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetFirewallFilteringRuleResult
def get_firewall_filtering_rule_output(action: Optional[pulumi.Input[str]] = None,
description: Optional[pulumi.Input[str]] = None,
id: Optional[pulumi.Input[int]] = None,
last_modified_time: Optional[pulumi.Input[int]] = None,
name: Optional[pulumi.Input[str]] = None,
state: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetFirewallFilteringRuleResult]
func GetFirewallFilteringRule(ctx *Context, args *GetFirewallFilteringRuleArgs, opts ...InvokeOption) (*GetFirewallFilteringRuleResult, error)
func GetFirewallFilteringRuleOutput(ctx *Context, args *GetFirewallFilteringRuleOutputArgs, opts ...InvokeOption) GetFirewallFilteringRuleResultOutput
> Note: This function is named GetFirewallFilteringRule
in the Go SDK.
public static class GetFirewallFilteringRule
{
public static Task<GetFirewallFilteringRuleResult> InvokeAsync(GetFirewallFilteringRuleArgs args, InvokeOptions? opts = null)
public static Output<GetFirewallFilteringRuleResult> Invoke(GetFirewallFilteringRuleInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetFirewallFilteringRuleResult> getFirewallFilteringRule(GetFirewallFilteringRuleArgs args, InvokeOptions options)
// Output-based functions aren't available in Java yet
fn::invoke:
function: zia:Firewall/getFirewallFilteringRule:getFirewallFilteringRule
arguments:
# arguments dictionary
The following arguments are supported:
- Action string
(Optional) Choose the action of the service when packets match the rule. The following actions are accepted:
ALLOW
,BLOCK_DROP
,BLOCK_RESET
,BLOCK_ICMP
,EVAL_NWAPP
- Description string
(Optional) Enter additional notes or information. The description cannot exceed 10,240 characters.
- Id int
Unique identifier for the Firewall Filtering policy rule
- Last
Modified intTime (Number)
- Name string
Name of the Firewall Filtering policy rule
- State string
(Optional) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- Action string
(Optional) Choose the action of the service when packets match the rule. The following actions are accepted:
ALLOW
,BLOCK_DROP
,BLOCK_RESET
,BLOCK_ICMP
,EVAL_NWAPP
- Description string
(Optional) Enter additional notes or information. The description cannot exceed 10,240 characters.
- Id int
Unique identifier for the Firewall Filtering policy rule
- Last
Modified intTime (Number)
- Name string
Name of the Firewall Filtering policy rule
- State string
(Optional) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- action String
(Optional) Choose the action of the service when packets match the rule. The following actions are accepted:
ALLOW
,BLOCK_DROP
,BLOCK_RESET
,BLOCK_ICMP
,EVAL_NWAPP
- description String
(Optional) Enter additional notes or information. The description cannot exceed 10,240 characters.
- id Integer
Unique identifier for the Firewall Filtering policy rule
- last
Modified IntegerTime (Number)
- name String
Name of the Firewall Filtering policy rule
- state String
(Optional) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- action string
(Optional) Choose the action of the service when packets match the rule. The following actions are accepted:
ALLOW
,BLOCK_DROP
,BLOCK_RESET
,BLOCK_ICMP
,EVAL_NWAPP
- description string
(Optional) Enter additional notes or information. The description cannot exceed 10,240 characters.
- id number
Unique identifier for the Firewall Filtering policy rule
- last
Modified numberTime (Number)
- name string
Name of the Firewall Filtering policy rule
- state string
(Optional) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- action str
(Optional) Choose the action of the service when packets match the rule. The following actions are accepted:
ALLOW
,BLOCK_DROP
,BLOCK_RESET
,BLOCK_ICMP
,EVAL_NWAPP
- description str
(Optional) Enter additional notes or information. The description cannot exceed 10,240 characters.
- id int
Unique identifier for the Firewall Filtering policy rule
- last_
modified_ inttime (Number)
- name str
Name of the Firewall Filtering policy rule
- state str
(Optional) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- action String
(Optional) Choose the action of the service when packets match the rule. The following actions are accepted:
ALLOW
,BLOCK_DROP
,BLOCK_RESET
,BLOCK_ICMP
,EVAL_NWAPP
- description String
(Optional) Enter additional notes or information. The description cannot exceed 10,240 characters.
- id Number
Unique identifier for the Firewall Filtering policy rule
- last
Modified NumberTime (Number)
- name String
Name of the Firewall Filtering policy rule
- state String
(Optional) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
getFirewallFilteringRule Result
The following output properties are available:
- Access
Control string (String)
- App
Service List<zscaler.Groups Pulumi Package. Zia. Firewall. Outputs. Get Firewall Filtering Rule App Service Group> Application service groups on which this rule is applied
- App
Services List<zscaler.Pulumi Package. Zia. Firewall. Outputs. Get Firewall Filtering Rule App Service> Application services on which this rule is applied
- Default
Rule bool (Boolean)
- Departments
List<zscaler.
Pulumi Package. Zia. Firewall. Outputs. Get Firewall Filtering Rule Department> (Optional) Apply to any number of departments When not used it implies
Any
to apply the rule to all departments.- Dest
Addresses List<string> ** - (Optional) - IP addresses and fully qualified domain names (FQDNs), if the domain has multiple destination IP addresses or if its IP addresses may change. For IP addresses, you can enter individual IP addresses, subnets, or address ranges. If adding multiple items, hit Enter after each entry.
- Dest
Countries List<string> ** - (Optional) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
- Dest
Ip List<string>Categories ** - (Optional) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- Dest
Ip List<string>Groups ** - (Optional) Any number of destination IP address groups that you want to control with this rule.
- Enable
Full boolLogging (Boolean)
- Groups
List<zscaler.
Pulumi Package. Zia. Firewall. Outputs. Get Firewall Filtering Rule Group> (Optional) You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups.- Id int
(Number) The ID of this resource.
- Labels
List<zscaler.
Pulumi Package. Zia. Firewall. Outputs. Get Firewall Filtering Rule Label> Labels that are applicable to the rule.
- Last
Modified List<zscaler.Bies Pulumi Package. Zia. Firewall. Outputs. Get Firewall Filtering Rule Last Modified By> - Location
Groups List<zscaler.Pulumi Package. Zia. Firewall. Outputs. Get Firewall Filtering Rule Location Group> (Optional) You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups.- Locations
List<zscaler.
Pulumi Package. Zia. Firewall. Outputs. Get Firewall Filtering Rule Location> (Optional) You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups.- Name string
(String) The configured name of the entity
- Nw
Application List<zscaler.Groups Pulumi Package. Zia. Firewall. Outputs. Get Firewall Filtering Rule Nw Application Group> (Optional) Any number of application groups that you want to control with this rule. The service provides predefined applications that you can group, but not modify
- Nw
Applications List<string> (Optional) When not used it applies the rule to all applications. The service provides predefined applications, which you can group, but not modify.
- Nw
Service List<zscaler.Groups Pulumi Package. Zia. Firewall. Outputs. Get Firewall Filtering Rule Nw Service Group> (Optional) Any number of predefined or custom network service groups to which the rule applies.
- Nw
Services List<zscaler.Pulumi Package. Zia. Firewall. Outputs. Get Firewall Filtering Rule Nw Service> (Optional) When not used it applies the rule to all network services or you can select specific network services. The Zscaler firewall has predefined services and you can configure up to
1,024
additional custom services.- Order int
(Required) Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- Predefined bool
(Boolean)
- Rank int
(Optional) By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
.- Src
Ip List<string>Groups (Optional) Any number of source IP address groups that you want to control with this rule.
- Src
Ips List<string> (Optional) You can enter individual IP addresses, subnets, or address ranges.
- Time
Windows List<zscaler.Pulumi Package. Zia. Firewall. Outputs. Get Firewall Filtering Rule Time Window> (Optional) You can manually select up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals.- Users
List<zscaler.
Pulumi Package. Zia. Firewall. Outputs. Get Firewall Filtering Rule User> (Optional) You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users.- Action string
(Optional) Choose the action of the service when packets match the rule. The following actions are accepted:
ALLOW
,BLOCK_DROP
,BLOCK_RESET
,BLOCK_ICMP
,EVAL_NWAPP
- Description string
(Optional) Enter additional notes or information. The description cannot exceed 10,240 characters.
- Last
Modified intTime (Number)
- State string
(Optional) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- Access
Control string (String)
- App
Service []GetGroups Firewall Filtering Rule App Service Group Application service groups on which this rule is applied
- App
Services []GetFirewall Filtering Rule App Service Application services on which this rule is applied
- Default
Rule bool (Boolean)
- Departments
[]Get
Firewall Filtering Rule Department (Optional) Apply to any number of departments When not used it implies
Any
to apply the rule to all departments.- Dest
Addresses []string ** - (Optional) - IP addresses and fully qualified domain names (FQDNs), if the domain has multiple destination IP addresses or if its IP addresses may change. For IP addresses, you can enter individual IP addresses, subnets, or address ranges. If adding multiple items, hit Enter after each entry.
- Dest
Countries []string ** - (Optional) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
- Dest
Ip []stringCategories ** - (Optional) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- Dest
Ip []stringGroups ** - (Optional) Any number of destination IP address groups that you want to control with this rule.
- Enable
Full boolLogging (Boolean)
- Groups
[]Get
Firewall Filtering Rule Group (Optional) You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups.- Id int
(Number) The ID of this resource.
- Labels
[]Get
Firewall Filtering Rule Label Labels that are applicable to the rule.
- Last
Modified []GetBies Firewall Filtering Rule Last Modified By - Location
Groups []GetFirewall Filtering Rule Location Group (Optional) You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups.- Locations
[]Get
Firewall Filtering Rule Location (Optional) You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups.- Name string
(String) The configured name of the entity
- Nw
Application []GetGroups Firewall Filtering Rule Nw Application Group (Optional) Any number of application groups that you want to control with this rule. The service provides predefined applications that you can group, but not modify
- Nw
Applications []string (Optional) When not used it applies the rule to all applications. The service provides predefined applications, which you can group, but not modify.
- Nw
Service []GetGroups Firewall Filtering Rule Nw Service Group (Optional) Any number of predefined or custom network service groups to which the rule applies.
- Nw
Services []GetFirewall Filtering Rule Nw Service (Optional) When not used it applies the rule to all network services or you can select specific network services. The Zscaler firewall has predefined services and you can configure up to
1,024
additional custom services.- Order int
(Required) Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- Predefined bool
(Boolean)
- Rank int
(Optional) By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
.- Src
Ip []stringGroups (Optional) Any number of source IP address groups that you want to control with this rule.
- Src
Ips []string (Optional) You can enter individual IP addresses, subnets, or address ranges.
- Time
Windows []GetFirewall Filtering Rule Time Window (Optional) You can manually select up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals.- Users
[]Get
Firewall Filtering Rule User (Optional) You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users.- Action string
(Optional) Choose the action of the service when packets match the rule. The following actions are accepted:
ALLOW
,BLOCK_DROP
,BLOCK_RESET
,BLOCK_ICMP
,EVAL_NWAPP
- Description string
(Optional) Enter additional notes or information. The description cannot exceed 10,240 characters.
- Last
Modified intTime (Number)
- State string
(Optional) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- access
Control String (String)
- app
Service List<GetGroups Filtering Rule App Service Group> Application service groups on which this rule is applied
- app
Services List<GetFiltering Rule App Service> Application services on which this rule is applied
- default
Rule Boolean (Boolean)
- departments
List<Get
Filtering Rule Department> (Optional) Apply to any number of departments When not used it implies
Any
to apply the rule to all departments.- dest
Addresses List<String> ** - (Optional) - IP addresses and fully qualified domain names (FQDNs), if the domain has multiple destination IP addresses or if its IP addresses may change. For IP addresses, you can enter individual IP addresses, subnets, or address ranges. If adding multiple items, hit Enter after each entry.
- dest
Countries List<String> ** - (Optional) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
- dest
Ip List<String>Categories ** - (Optional) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- dest
Ip List<String>Groups ** - (Optional) Any number of destination IP address groups that you want to control with this rule.
- enable
Full BooleanLogging (Boolean)
- groups
List<Get
Filtering Rule Group> (Optional) You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups.- id Integer
(Number) The ID of this resource.
- labels
List<Get
Filtering Rule Label> Labels that are applicable to the rule.
- last
Modified List<GetBies Filtering Rule Last Modified By> - location
Groups List<GetFiltering Rule Location Group> (Optional) You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups.- locations
List<Get
Filtering Rule Location> (Optional) You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups.- name String
(String) The configured name of the entity
- nw
Application List<GetGroups Filtering Rule Nw Application Group> (Optional) Any number of application groups that you want to control with this rule. The service provides predefined applications that you can group, but not modify
- nw
Applications List<String> (Optional) When not used it applies the rule to all applications. The service provides predefined applications, which you can group, but not modify.
- nw
Service List<GetGroups Filtering Rule Nw Service Group> (Optional) Any number of predefined or custom network service groups to which the rule applies.
- nw
Services List<GetFiltering Rule Nw Service> (Optional) When not used it applies the rule to all network services or you can select specific network services. The Zscaler firewall has predefined services and you can configure up to
1,024
additional custom services.- order Integer
(Required) Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- predefined Boolean
(Boolean)
- rank Integer
(Optional) By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
.- src
Ip List<String>Groups (Optional) Any number of source IP address groups that you want to control with this rule.
- src
Ips List<String> (Optional) You can enter individual IP addresses, subnets, or address ranges.
- time
Windows List<GetFiltering Rule Time Window> (Optional) You can manually select up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals.- users
List<Get
Filtering Rule User> (Optional) You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users.- action String
(Optional) Choose the action of the service when packets match the rule. The following actions are accepted:
ALLOW
,BLOCK_DROP
,BLOCK_RESET
,BLOCK_ICMP
,EVAL_NWAPP
- description String
(Optional) Enter additional notes or information. The description cannot exceed 10,240 characters.
- last
Modified IntegerTime (Number)
- state String
(Optional) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- access
Control string (String)
- app
Service GetGroups Firewall Filtering Rule App Service Group[] Application service groups on which this rule is applied
- app
Services GetFirewall Filtering Rule App Service[] Application services on which this rule is applied
- default
Rule boolean (Boolean)
- departments
Get
Firewall Filtering Rule Department[] (Optional) Apply to any number of departments When not used it implies
Any
to apply the rule to all departments.- dest
Addresses string[] ** - (Optional) - IP addresses and fully qualified domain names (FQDNs), if the domain has multiple destination IP addresses or if its IP addresses may change. For IP addresses, you can enter individual IP addresses, subnets, or address ranges. If adding multiple items, hit Enter after each entry.
- dest
Countries string[] ** - (Optional) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
- dest
Ip string[]Categories ** - (Optional) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- dest
Ip string[]Groups ** - (Optional) Any number of destination IP address groups that you want to control with this rule.
- enable
Full booleanLogging (Boolean)
- groups
Get
Firewall Filtering Rule Group[] (Optional) You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups.- id number
(Number) The ID of this resource.
- labels
Get
Firewall Filtering Rule Label[] Labels that are applicable to the rule.
- last
Modified GetBies Firewall Filtering Rule Last Modified By[] - location
Groups GetFirewall Filtering Rule Location Group[] (Optional) You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups.- locations
Get
Firewall Filtering Rule Location[] (Optional) You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups.- name string
(String) The configured name of the entity
- nw
Application GetGroups Firewall Filtering Rule Nw Application Group[] (Optional) Any number of application groups that you want to control with this rule. The service provides predefined applications that you can group, but not modify
- nw
Applications string[] (Optional) When not used it applies the rule to all applications. The service provides predefined applications, which you can group, but not modify.
- nw
Service GetGroups Firewall Filtering Rule Nw Service Group[] (Optional) Any number of predefined or custom network service groups to which the rule applies.
- nw
Services GetFirewall Filtering Rule Nw Service[] (Optional) When not used it applies the rule to all network services or you can select specific network services. The Zscaler firewall has predefined services and you can configure up to
1,024
additional custom services.- order number
(Required) Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- predefined boolean
(Boolean)
- rank number
(Optional) By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
.- src
Ip string[]Groups (Optional) Any number of source IP address groups that you want to control with this rule.
- src
Ips string[] (Optional) You can enter individual IP addresses, subnets, or address ranges.
- time
Windows GetFirewall Filtering Rule Time Window[] (Optional) You can manually select up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals.- users
Get
Firewall Filtering Rule User[] (Optional) You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users.- action string
(Optional) Choose the action of the service when packets match the rule. The following actions are accepted:
ALLOW
,BLOCK_DROP
,BLOCK_RESET
,BLOCK_ICMP
,EVAL_NWAPP
- description string
(Optional) Enter additional notes or information. The description cannot exceed 10,240 characters.
- last
Modified numberTime (Number)
- state string
(Optional) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- access_
control str (String)
- app_
service_ Getgroups Firewall Filtering Rule App Service Group] Application service groups on which this rule is applied
- app_
services GetFirewall Filtering Rule App Service] Application services on which this rule is applied
- default_
rule bool (Boolean)
- departments
Get
Firewall Filtering Rule Department] (Optional) Apply to any number of departments When not used it implies
Any
to apply the rule to all departments.- dest_
addresses Sequence[str] ** - (Optional) - IP addresses and fully qualified domain names (FQDNs), if the domain has multiple destination IP addresses or if its IP addresses may change. For IP addresses, you can enter individual IP addresses, subnets, or address ranges. If adding multiple items, hit Enter after each entry.
- dest_
countries Sequence[str] ** - (Optional) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
- dest_
ip_ Sequence[str]categories ** - (Optional) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- dest_
ip_ Sequence[str]groups ** - (Optional) Any number of destination IP address groups that you want to control with this rule.
- enable_
full_ boollogging (Boolean)
- groups
Get
Firewall Filtering Rule Group] (Optional) You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups.- id int
(Number) The ID of this resource.
- labels
Get
Firewall Filtering Rule Label] Labels that are applicable to the rule.
- last_
modified_ Getbies Firewall Filtering Rule Last Modified By] - location_
groups GetFirewall Filtering Rule Location Group] (Optional) You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups.- locations
Get
Firewall Filtering Rule Location] (Optional) You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups.- name str
(String) The configured name of the entity
- nw_
application_ Getgroups Firewall Filtering Rule Nw Application Group] (Optional) Any number of application groups that you want to control with this rule. The service provides predefined applications that you can group, but not modify
- nw_
applications Sequence[str] (Optional) When not used it applies the rule to all applications. The service provides predefined applications, which you can group, but not modify.
- nw_
service_ Getgroups Firewall Filtering Rule Nw Service Group] (Optional) Any number of predefined or custom network service groups to which the rule applies.
- nw_
services GetFirewall Filtering Rule Nw Service] (Optional) When not used it applies the rule to all network services or you can select specific network services. The Zscaler firewall has predefined services and you can configure up to
1,024
additional custom services.- order int
(Required) Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- predefined bool
(Boolean)
- rank int
(Optional) By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
.- src_
ip_ Sequence[str]groups (Optional) Any number of source IP address groups that you want to control with this rule.
- src_
ips Sequence[str] (Optional) You can enter individual IP addresses, subnets, or address ranges.
- time_
windows GetFirewall Filtering Rule Time Window] (Optional) You can manually select up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals.- users
Get
Firewall Filtering Rule User] (Optional) You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users.- action str
(Optional) Choose the action of the service when packets match the rule. The following actions are accepted:
ALLOW
,BLOCK_DROP
,BLOCK_RESET
,BLOCK_ICMP
,EVAL_NWAPP
- description str
(Optional) Enter additional notes or information. The description cannot exceed 10,240 characters.
- last_
modified_ inttime (Number)
- state str
(Optional) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- access
Control String (String)
- app
Service List<Property Map>Groups Application service groups on which this rule is applied
- app
Services List<Property Map> Application services on which this rule is applied
- default
Rule Boolean (Boolean)
- departments List<Property Map>
(Optional) Apply to any number of departments When not used it implies
Any
to apply the rule to all departments.- dest
Addresses List<String> ** - (Optional) - IP addresses and fully qualified domain names (FQDNs), if the domain has multiple destination IP addresses or if its IP addresses may change. For IP addresses, you can enter individual IP addresses, subnets, or address ranges. If adding multiple items, hit Enter after each entry.
- dest
Countries List<String> ** - (Optional) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
- dest
Ip List<String>Categories ** - (Optional) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- dest
Ip List<String>Groups ** - (Optional) Any number of destination IP address groups that you want to control with this rule.
- enable
Full BooleanLogging (Boolean)
- groups List<Property Map>
(Optional) You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups.- id Number
(Number) The ID of this resource.
- labels List<Property Map>
Labels that are applicable to the rule.
- last
Modified List<Property Map>Bies - location
Groups List<Property Map> (Optional) You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups.- locations List<Property Map>
(Optional) You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups.- name String
(String) The configured name of the entity
- nw
Application List<Property Map>Groups (Optional) Any number of application groups that you want to control with this rule. The service provides predefined applications that you can group, but not modify
- nw
Applications List<String> (Optional) When not used it applies the rule to all applications. The service provides predefined applications, which you can group, but not modify.
- nw
Service List<Property Map>Groups (Optional) Any number of predefined or custom network service groups to which the rule applies.
- nw
Services List<Property Map> (Optional) When not used it applies the rule to all network services or you can select specific network services. The Zscaler firewall has predefined services and you can configure up to
1,024
additional custom services.- order Number
(Required) Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- predefined Boolean
(Boolean)
- rank Number
(Optional) By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
.- src
Ip List<String>Groups (Optional) Any number of source IP address groups that you want to control with this rule.
- src
Ips List<String> (Optional) You can enter individual IP addresses, subnets, or address ranges.
- time
Windows List<Property Map> (Optional) You can manually select up to
2
time intervals. When not used it impliesalways
to apply the rule to all time intervals.- users List<Property Map>
(Optional) You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users.- action String
(Optional) Choose the action of the service when packets match the rule. The following actions are accepted:
ALLOW
,BLOCK_DROP
,BLOCK_RESET
,BLOCK_ICMP
,EVAL_NWAPP
- description String
(Optional) Enter additional notes or information. The description cannot exceed 10,240 characters.
- last
Modified NumberTime (Number)
- state String
(Optional) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
Supporting Types
GetFirewallFilteringRuleAppService
- Extensions Dictionary<string, string>
(Map of String)
- Id int
Unique identifier for the Firewall Filtering policy rule
- Name string
Name of the Firewall Filtering policy rule
- Extensions map[string]string
(Map of String)
- Id int
Unique identifier for the Firewall Filtering policy rule
- Name string
Name of the Firewall Filtering policy rule
- extensions Map<String,String>
(Map of String)
- id Integer
Unique identifier for the Firewall Filtering policy rule
- name String
Name of the Firewall Filtering policy rule
- extensions {[key: string]: string}
(Map of String)
- id number
Unique identifier for the Firewall Filtering policy rule
- name string
Name of the Firewall Filtering policy rule
- extensions Mapping[str, str]
(Map of String)
- id int
Unique identifier for the Firewall Filtering policy rule
- name str
Name of the Firewall Filtering policy rule
- extensions Map<String>
(Map of String)
- id Number
Unique identifier for the Firewall Filtering policy rule
- name String
Name of the Firewall Filtering policy rule
GetFirewallFilteringRuleAppServiceGroup
- Extensions Dictionary<string, string>
(Map of String)
- Id int
Unique identifier for the Firewall Filtering policy rule
- Name string
Name of the Firewall Filtering policy rule
- Extensions map[string]string
(Map of String)
- Id int
Unique identifier for the Firewall Filtering policy rule
- Name string
Name of the Firewall Filtering policy rule
- extensions Map<String,String>
(Map of String)
- id Integer
Unique identifier for the Firewall Filtering policy rule
- name String
Name of the Firewall Filtering policy rule
- extensions {[key: string]: string}
(Map of String)
- id number
Unique identifier for the Firewall Filtering policy rule
- name string
Name of the Firewall Filtering policy rule
- extensions Mapping[str, str]
(Map of String)
- id int
Unique identifier for the Firewall Filtering policy rule
- name str
Name of the Firewall Filtering policy rule
- extensions Map<String>
(Map of String)
- id Number
Unique identifier for the Firewall Filtering policy rule
- name String
Name of the Firewall Filtering policy rule
GetFirewallFilteringRuleDepartment
- Extensions Dictionary<string, string>
(Map of String)
- Id int
Unique identifier for the Firewall Filtering policy rule
- Name string
Name of the Firewall Filtering policy rule
- Extensions map[string]string
(Map of String)
- Id int
Unique identifier for the Firewall Filtering policy rule
- Name string
Name of the Firewall Filtering policy rule
- extensions Map<String,String>
(Map of String)
- id Integer
Unique identifier for the Firewall Filtering policy rule
- name String
Name of the Firewall Filtering policy rule
- extensions {[key: string]: string}
(Map of String)
- id number
Unique identifier for the Firewall Filtering policy rule
- name string
Name of the Firewall Filtering policy rule
- extensions Mapping[str, str]
(Map of String)
- id int
Unique identifier for the Firewall Filtering policy rule
- name str
Name of the Firewall Filtering policy rule
- extensions Map<String>
(Map of String)
- id Number
Unique identifier for the Firewall Filtering policy rule
- name String
Name of the Firewall Filtering policy rule
GetFirewallFilteringRuleGroup
- Extensions Dictionary<string, string>
(Map of String)
- Id int
Unique identifier for the Firewall Filtering policy rule
- Name string
Name of the Firewall Filtering policy rule
- Extensions map[string]string
(Map of String)
- Id int
Unique identifier for the Firewall Filtering policy rule
- Name string
Name of the Firewall Filtering policy rule
- extensions Map<String,String>
(Map of String)
- id Integer
Unique identifier for the Firewall Filtering policy rule
- name String
Name of the Firewall Filtering policy rule
- extensions {[key: string]: string}
(Map of String)
- id number
Unique identifier for the Firewall Filtering policy rule
- name string
Name of the Firewall Filtering policy rule
- extensions Mapping[str, str]
(Map of String)
- id int
Unique identifier for the Firewall Filtering policy rule
- name str
Name of the Firewall Filtering policy rule
- extensions Map<String>
(Map of String)
- id Number
Unique identifier for the Firewall Filtering policy rule
- name String
Name of the Firewall Filtering policy rule
GetFirewallFilteringRuleLabel
- Extensions Dictionary<string, string>
(Map of String)
- Id int
Unique identifier for the Firewall Filtering policy rule
- Name string
Name of the Firewall Filtering policy rule
- Extensions map[string]string
(Map of String)
- Id int
Unique identifier for the Firewall Filtering policy rule
- Name string
Name of the Firewall Filtering policy rule
- extensions Map<String,String>
(Map of String)
- id Integer
Unique identifier for the Firewall Filtering policy rule
- name String
Name of the Firewall Filtering policy rule
- extensions {[key: string]: string}
(Map of String)
- id number
Unique identifier for the Firewall Filtering policy rule
- name string
Name of the Firewall Filtering policy rule
- extensions Mapping[str, str]
(Map of String)
- id int
Unique identifier for the Firewall Filtering policy rule
- name str
Name of the Firewall Filtering policy rule
- extensions Map<String>
(Map of String)
- id Number
Unique identifier for the Firewall Filtering policy rule
- name String
Name of the Firewall Filtering policy rule
GetFirewallFilteringRuleLastModifiedBy
- Extensions Dictionary<string, string>
(Map of String)
- Id int
Unique identifier for the Firewall Filtering policy rule
- Name string
Name of the Firewall Filtering policy rule
- Extensions map[string]string
(Map of String)
- Id int
Unique identifier for the Firewall Filtering policy rule
- Name string
Name of the Firewall Filtering policy rule
- extensions Map<String,String>
(Map of String)
- id Integer
Unique identifier for the Firewall Filtering policy rule
- name String
Name of the Firewall Filtering policy rule
- extensions {[key: string]: string}
(Map of String)
- id number
Unique identifier for the Firewall Filtering policy rule
- name string
Name of the Firewall Filtering policy rule
- extensions Mapping[str, str]
(Map of String)
- id int
Unique identifier for the Firewall Filtering policy rule
- name str
Name of the Firewall Filtering policy rule
- extensions Map<String>
(Map of String)
- id Number
Unique identifier for the Firewall Filtering policy rule
- name String
Name of the Firewall Filtering policy rule
GetFirewallFilteringRuleLocation
- Extensions Dictionary<string, string>
(Map of String)
- Id int
Unique identifier for the Firewall Filtering policy rule
- Name string
Name of the Firewall Filtering policy rule
- Extensions map[string]string
(Map of String)
- Id int
Unique identifier for the Firewall Filtering policy rule
- Name string
Name of the Firewall Filtering policy rule
- extensions Map<String,String>
(Map of String)
- id Integer
Unique identifier for the Firewall Filtering policy rule
- name String
Name of the Firewall Filtering policy rule
- extensions {[key: string]: string}
(Map of String)
- id number
Unique identifier for the Firewall Filtering policy rule
- name string
Name of the Firewall Filtering policy rule
- extensions Mapping[str, str]
(Map of String)
- id int
Unique identifier for the Firewall Filtering policy rule
- name str
Name of the Firewall Filtering policy rule
- extensions Map<String>
(Map of String)
- id Number
Unique identifier for the Firewall Filtering policy rule
- name String
Name of the Firewall Filtering policy rule
GetFirewallFilteringRuleLocationGroup
- Extensions Dictionary<string, string>
(Map of String)
- Id int
Unique identifier for the Firewall Filtering policy rule
- Name string
Name of the Firewall Filtering policy rule
- Extensions map[string]string
(Map of String)
- Id int
Unique identifier for the Firewall Filtering policy rule
- Name string
Name of the Firewall Filtering policy rule
- extensions Map<String,String>
(Map of String)
- id Integer
Unique identifier for the Firewall Filtering policy rule
- name String
Name of the Firewall Filtering policy rule
- extensions {[key: string]: string}
(Map of String)
- id number
Unique identifier for the Firewall Filtering policy rule
- name string
Name of the Firewall Filtering policy rule
- extensions Mapping[str, str]
(Map of String)
- id int
Unique identifier for the Firewall Filtering policy rule
- name str
Name of the Firewall Filtering policy rule
- extensions Map<String>
(Map of String)
- id Number
Unique identifier for the Firewall Filtering policy rule
- name String
Name of the Firewall Filtering policy rule
GetFirewallFilteringRuleNwApplicationGroup
- Extensions Dictionary<string, string>
(Map of String)
- Id int
Unique identifier for the Firewall Filtering policy rule
- Name string
Name of the Firewall Filtering policy rule
- Extensions map[string]string
(Map of String)
- Id int
Unique identifier for the Firewall Filtering policy rule
- Name string
Name of the Firewall Filtering policy rule
- extensions Map<String,String>
(Map of String)
- id Integer
Unique identifier for the Firewall Filtering policy rule
- name String
Name of the Firewall Filtering policy rule
- extensions {[key: string]: string}
(Map of String)
- id number
Unique identifier for the Firewall Filtering policy rule
- name string
Name of the Firewall Filtering policy rule
- extensions Mapping[str, str]
(Map of String)
- id int
Unique identifier for the Firewall Filtering policy rule
- name str
Name of the Firewall Filtering policy rule
- extensions Map<String>
(Map of String)
- id Number
Unique identifier for the Firewall Filtering policy rule
- name String
Name of the Firewall Filtering policy rule
GetFirewallFilteringRuleNwService
- Extensions Dictionary<string, string>
(Map of String)
- Id int
Unique identifier for the Firewall Filtering policy rule
- Name string
Name of the Firewall Filtering policy rule
- Extensions map[string]string
(Map of String)
- Id int
Unique identifier for the Firewall Filtering policy rule
- Name string
Name of the Firewall Filtering policy rule
- extensions Map<String,String>
(Map of String)
- id Integer
Unique identifier for the Firewall Filtering policy rule
- name String
Name of the Firewall Filtering policy rule
- extensions {[key: string]: string}
(Map of String)
- id number
Unique identifier for the Firewall Filtering policy rule
- name string
Name of the Firewall Filtering policy rule
- extensions Mapping[str, str]
(Map of String)
- id int
Unique identifier for the Firewall Filtering policy rule
- name str
Name of the Firewall Filtering policy rule
- extensions Map<String>
(Map of String)
- id Number
Unique identifier for the Firewall Filtering policy rule
- name String
Name of the Firewall Filtering policy rule
GetFirewallFilteringRuleNwServiceGroup
- Extensions Dictionary<string, string>
(Map of String)
- Id int
Unique identifier for the Firewall Filtering policy rule
- Name string
Name of the Firewall Filtering policy rule
- Extensions map[string]string
(Map of String)
- Id int
Unique identifier for the Firewall Filtering policy rule
- Name string
Name of the Firewall Filtering policy rule
- extensions Map<String,String>
(Map of String)
- id Integer
Unique identifier for the Firewall Filtering policy rule
- name String
Name of the Firewall Filtering policy rule
- extensions {[key: string]: string}
(Map of String)
- id number
Unique identifier for the Firewall Filtering policy rule
- name string
Name of the Firewall Filtering policy rule
- extensions Mapping[str, str]
(Map of String)
- id int
Unique identifier for the Firewall Filtering policy rule
- name str
Name of the Firewall Filtering policy rule
- extensions Map<String>
(Map of String)
- id Number
Unique identifier for the Firewall Filtering policy rule
- name String
Name of the Firewall Filtering policy rule
GetFirewallFilteringRuleTimeWindow
- Extensions Dictionary<string, string>
(Map of String)
- Id int
Unique identifier for the Firewall Filtering policy rule
- Name string
Name of the Firewall Filtering policy rule
- Extensions map[string]string
(Map of String)
- Id int
Unique identifier for the Firewall Filtering policy rule
- Name string
Name of the Firewall Filtering policy rule
- extensions Map<String,String>
(Map of String)
- id Integer
Unique identifier for the Firewall Filtering policy rule
- name String
Name of the Firewall Filtering policy rule
- extensions {[key: string]: string}
(Map of String)
- id number
Unique identifier for the Firewall Filtering policy rule
- name string
Name of the Firewall Filtering policy rule
- extensions Mapping[str, str]
(Map of String)
- id int
Unique identifier for the Firewall Filtering policy rule
- name str
Name of the Firewall Filtering policy rule
- extensions Map<String>
(Map of String)
- id Number
Unique identifier for the Firewall Filtering policy rule
- name String
Name of the Firewall Filtering policy rule
GetFirewallFilteringRuleUser
- Extensions Dictionary<string, string>
(Map of String)
- Id int
Unique identifier for the Firewall Filtering policy rule
- Name string
Name of the Firewall Filtering policy rule
- Extensions map[string]string
(Map of String)
- Id int
Unique identifier for the Firewall Filtering policy rule
- Name string
Name of the Firewall Filtering policy rule
- extensions Map<String,String>
(Map of String)
- id Integer
Unique identifier for the Firewall Filtering policy rule
- name String
Name of the Firewall Filtering policy rule
- extensions {[key: string]: string}
(Map of String)
- id number
Unique identifier for the Firewall Filtering policy rule
- name string
Name of the Firewall Filtering policy rule
- extensions Mapping[str, str]
(Map of String)
- id int
Unique identifier for the Firewall Filtering policy rule
- name str
Name of the Firewall Filtering policy rule
- extensions Map<String>
(Map of String)
- id Number
Unique identifier for the Firewall Filtering policy rule
- name String
Name of the Firewall Filtering policy rule
Package Details
- Repository
- zia zscaler/pulumi-zia
- License
- MIT
- Notes
This Pulumi package is based on the
zia
Terraform Provider.