zia.FirewallDNSRule
Explore with Pulumi AI
Example Usage
Create Firewall DNS Rules - Redirect Action
data "zia_department_management" "engineering" {
name = "Engineering"
}
data "zia_group_management" "normal_internet" {
name = "Normal_Internet"
}
data "zia_firewall_filtering_time_window" "work_hours" {
name = "Work hours"
}
resource "zia_firewall_dns_rule" "this" {
name = "Example_DNS_Rule01"
description = "Example_DNS_Rule01"
action = "REDIR_REQ"
state = "ENABLED"
order = 10
rank = 7
redirect_ip = "8.8.8.8"
dest_countries = ["CA", "US"]
source_countries = ["CA", "US"]
protocols = ["ANY_RULE"]
departments {
id = [ data.zia_department_management.engineering.id ]
}
groups {
id = [ data.zia_group_management.normal_internet.id ]
}
time_windows {
id = [ data.zia_firewall_filtering_time_window.work_hours.id ]
}
}
Create Firewall DNS Rules - Redirect Request DOH
resource "zia_firewall_dns_rule" "this2" {
name = "Example_DNS_Rule02"
description = "Example_DNS_Rule02"
action = "REDIR_REQ_DOH"
state = "ENABLED"
order = 12
rank = 7
dest_countries = ["CA", "US"]
source_countries = ["CA", "US"]
protocols = ["ANY_RULE"]
dns_gateway {
id = 18207342
name = "DNS_GW01"
}
}
Create Firewall DNS Rules - Redirect TCP Request
resource “zia.FirewallDNSRule” “this3” { name = “Example_DNS_Rule03” description = “Example_DNS_Rule03” action = “REDIR_REQ_TCP” state = “ENABLED” order = 13 rank = 7 dest_countries = [“CA”, “US”] source_countries = [“CA”, “US”] protocols = [“ANY_RULE”] dns_gateway { id = 18207342 name = “DNS_GW01” } }
Create FirewallDNSRule Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new FirewallDNSRule(name: string, args: FirewallDNSRuleArgs, opts?: CustomResourceOptions);
@overload
def FirewallDNSRule(resource_name: str,
args: FirewallDNSRuleArgs,
opts: Optional[ResourceOptions] = None)
@overload
def FirewallDNSRule(resource_name: str,
opts: Optional[ResourceOptions] = None,
order: Optional[int] = None,
groups: Optional[FirewallDNSRuleGroupsArgs] = None,
applications: Optional[Sequence[str]] = None,
block_response_code: Optional[str] = None,
capture_pcap: Optional[bool] = None,
default_rule: Optional[bool] = None,
departments: Optional[FirewallDNSRuleDepartmentsArgs] = None,
description: Optional[str] = None,
dest_addresses: Optional[Sequence[str]] = None,
dest_countries: Optional[Sequence[str]] = None,
dest_ip_categories: Optional[Sequence[str]] = None,
dest_ip_groups: Optional[FirewallDNSRuleDestIpGroupsArgs] = None,
dest_ipv6_groups: Optional[FirewallDNSRuleDestIpv6GroupsArgs] = None,
device_groups: Optional[FirewallDNSRuleDeviceGroupsArgs] = None,
devices: Optional[FirewallDNSRuleDevicesArgs] = None,
dns_gateway: Optional[FirewallDNSRuleDnsGatewayArgs] = None,
dns_rule_request_types: Optional[Sequence[str]] = None,
action: Optional[str] = None,
edns_ecs_object: Optional[FirewallDNSRuleEdnsEcsObjectArgs] = None,
source_countries: Optional[Sequence[str]] = None,
location_groups: Optional[FirewallDNSRuleLocationGroupsArgs] = None,
locations: Optional[FirewallDNSRuleLocationsArgs] = None,
name: Optional[str] = None,
application_groups: Optional[FirewallDNSRuleApplicationGroupsArgs] = None,
predefined: Optional[bool] = None,
protocols: Optional[Sequence[str]] = None,
rank: Optional[int] = None,
redirect_ip: Optional[str] = None,
res_categories: Optional[Sequence[str]] = None,
labels: Optional[FirewallDNSRuleLabelsArgs] = None,
src_ip_groups: Optional[FirewallDNSRuleSrcIpGroupsArgs] = None,
src_ips: Optional[Sequence[str]] = None,
src_ipv6_groups: Optional[FirewallDNSRuleSrcIpv6GroupsArgs] = None,
state: Optional[str] = None,
time_windows: Optional[FirewallDNSRuleTimeWindowsArgs] = None,
users: Optional[FirewallDNSRuleUsersArgs] = None,
zpa_ip_group: Optional[FirewallDNSRuleZpaIpGroupArgs] = None)
func NewFirewallDNSRule(ctx *Context, name string, args FirewallDNSRuleArgs, opts ...ResourceOption) (*FirewallDNSRule, error)
public FirewallDNSRule(string name, FirewallDNSRuleArgs args, CustomResourceOptions? opts = null)
public FirewallDNSRule(String name, FirewallDNSRuleArgs args)
public FirewallDNSRule(String name, FirewallDNSRuleArgs args, CustomResourceOptions options)
type: zia:FirewallDNSRule
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args FirewallDNSRuleArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args FirewallDNSRuleArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args FirewallDNSRuleArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args FirewallDNSRuleArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args FirewallDNSRuleArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var firewallDNSRuleResource = new Zia.FirewallDNSRule("firewallDNSRuleResource", new()
{
Order = 0,
Groups = new Zia.Inputs.FirewallDNSRuleGroupsArgs
{
Ids = new[]
{
0,
},
},
Applications = new[]
{
"string",
},
BlockResponseCode = "string",
CapturePcap = false,
DefaultRule = false,
Departments = new Zia.Inputs.FirewallDNSRuleDepartmentsArgs
{
Ids = new[]
{
0,
},
},
Description = "string",
DestAddresses = new[]
{
"string",
},
DestCountries = new[]
{
"string",
},
DestIpCategories = new[]
{
"string",
},
DestIpGroups = new Zia.Inputs.FirewallDNSRuleDestIpGroupsArgs
{
Ids = new[]
{
0,
},
},
DestIpv6Groups = new Zia.Inputs.FirewallDNSRuleDestIpv6GroupsArgs
{
Ids = new[]
{
0,
},
},
DeviceGroups = new Zia.Inputs.FirewallDNSRuleDeviceGroupsArgs
{
Ids = new[]
{
0,
},
},
Devices = new Zia.Inputs.FirewallDNSRuleDevicesArgs
{
Ids = new[]
{
0,
},
},
DnsGateway = new Zia.Inputs.FirewallDNSRuleDnsGatewayArgs
{
Id = 0,
Name = "string",
},
DnsRuleRequestTypes = new[]
{
"string",
},
Action = "string",
EdnsEcsObject = new Zia.Inputs.FirewallDNSRuleEdnsEcsObjectArgs
{
Id = 0,
Name = "string",
},
SourceCountries = new[]
{
"string",
},
LocationGroups = new Zia.Inputs.FirewallDNSRuleLocationGroupsArgs
{
Ids = new[]
{
0,
},
},
Locations = new Zia.Inputs.FirewallDNSRuleLocationsArgs
{
Ids = new[]
{
0,
},
},
Name = "string",
ApplicationGroups = new Zia.Inputs.FirewallDNSRuleApplicationGroupsArgs
{
Ids = new[]
{
0,
},
},
Predefined = false,
Protocols = new[]
{
"string",
},
Rank = 0,
RedirectIp = "string",
ResCategories = new[]
{
"string",
},
Labels = new Zia.Inputs.FirewallDNSRuleLabelsArgs
{
Id = 0,
},
SrcIpGroups = new Zia.Inputs.FirewallDNSRuleSrcIpGroupsArgs
{
Ids = new[]
{
0,
},
},
SrcIps = new[]
{
"string",
},
SrcIpv6Groups = new Zia.Inputs.FirewallDNSRuleSrcIpv6GroupsArgs
{
Ids = new[]
{
0,
},
},
State = "string",
TimeWindows = new Zia.Inputs.FirewallDNSRuleTimeWindowsArgs
{
Ids = new[]
{
0,
},
},
Users = new Zia.Inputs.FirewallDNSRuleUsersArgs
{
Ids = new[]
{
0,
},
},
ZpaIpGroup = new Zia.Inputs.FirewallDNSRuleZpaIpGroupArgs
{
Id = 0,
Name = "string",
},
});
example, err := zia.NewFirewallDNSRule(ctx, "firewallDNSRuleResource", &zia.FirewallDNSRuleArgs{
Order: pulumi.Int(0),
Groups: &zia.FirewallDNSRuleGroupsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
Applications: pulumi.StringArray{
pulumi.String("string"),
},
BlockResponseCode: pulumi.String("string"),
CapturePcap: pulumi.Bool(false),
DefaultRule: pulumi.Bool(false),
Departments: &zia.FirewallDNSRuleDepartmentsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
Description: pulumi.String("string"),
DestAddresses: pulumi.StringArray{
pulumi.String("string"),
},
DestCountries: pulumi.StringArray{
pulumi.String("string"),
},
DestIpCategories: pulumi.StringArray{
pulumi.String("string"),
},
DestIpGroups: &zia.FirewallDNSRuleDestIpGroupsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
DestIpv6Groups: &zia.FirewallDNSRuleDestIpv6GroupsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
DeviceGroups: &zia.FirewallDNSRuleDeviceGroupsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
Devices: &zia.FirewallDNSRuleDevicesArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
DnsGateway: &zia.FirewallDNSRuleDnsGatewayArgs{
Id: pulumi.Int(0),
Name: pulumi.String("string"),
},
DnsRuleRequestTypes: pulumi.StringArray{
pulumi.String("string"),
},
Action: pulumi.String("string"),
EdnsEcsObject: &zia.FirewallDNSRuleEdnsEcsObjectArgs{
Id: pulumi.Int(0),
Name: pulumi.String("string"),
},
SourceCountries: pulumi.StringArray{
pulumi.String("string"),
},
LocationGroups: &zia.FirewallDNSRuleLocationGroupsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
Locations: &zia.FirewallDNSRuleLocationsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
Name: pulumi.String("string"),
ApplicationGroups: &zia.FirewallDNSRuleApplicationGroupsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
Predefined: pulumi.Bool(false),
Protocols: pulumi.StringArray{
pulumi.String("string"),
},
Rank: pulumi.Int(0),
RedirectIp: pulumi.String("string"),
ResCategories: pulumi.StringArray{
pulumi.String("string"),
},
Labels: &zia.FirewallDNSRuleLabelsArgs{
Id: pulumi.Int(0),
},
SrcIpGroups: &zia.FirewallDNSRuleSrcIpGroupsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
SrcIps: pulumi.StringArray{
pulumi.String("string"),
},
SrcIpv6Groups: &zia.FirewallDNSRuleSrcIpv6GroupsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
State: pulumi.String("string"),
TimeWindows: &zia.FirewallDNSRuleTimeWindowsArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
Users: &zia.FirewallDNSRuleUsersArgs{
Ids: pulumi.IntArray{
pulumi.Int(0),
},
},
ZpaIpGroup: &zia.FirewallDNSRuleZpaIpGroupArgs{
Id: pulumi.Int(0),
Name: pulumi.String("string"),
},
})
var firewallDNSRuleResource = new FirewallDNSRule("firewallDNSRuleResource", FirewallDNSRuleArgs.builder()
.order(0)
.groups(FirewallDNSRuleGroupsArgs.builder()
.ids(0)
.build())
.applications("string")
.blockResponseCode("string")
.capturePcap(false)
.defaultRule(false)
.departments(FirewallDNSRuleDepartmentsArgs.builder()
.ids(0)
.build())
.description("string")
.destAddresses("string")
.destCountries("string")
.destIpCategories("string")
.destIpGroups(FirewallDNSRuleDestIpGroupsArgs.builder()
.ids(0)
.build())
.destIpv6Groups(FirewallDNSRuleDestIpv6GroupsArgs.builder()
.ids(0)
.build())
.deviceGroups(FirewallDNSRuleDeviceGroupsArgs.builder()
.ids(0)
.build())
.devices(FirewallDNSRuleDevicesArgs.builder()
.ids(0)
.build())
.dnsGateway(FirewallDNSRuleDnsGatewayArgs.builder()
.id(0)
.name("string")
.build())
.dnsRuleRequestTypes("string")
.action("string")
.ednsEcsObject(FirewallDNSRuleEdnsEcsObjectArgs.builder()
.id(0)
.name("string")
.build())
.sourceCountries("string")
.locationGroups(FirewallDNSRuleLocationGroupsArgs.builder()
.ids(0)
.build())
.locations(FirewallDNSRuleLocationsArgs.builder()
.ids(0)
.build())
.name("string")
.applicationGroups(FirewallDNSRuleApplicationGroupsArgs.builder()
.ids(0)
.build())
.predefined(false)
.protocols("string")
.rank(0)
.redirectIp("string")
.resCategories("string")
.labels(FirewallDNSRuleLabelsArgs.builder()
.id(0)
.build())
.srcIpGroups(FirewallDNSRuleSrcIpGroupsArgs.builder()
.ids(0)
.build())
.srcIps("string")
.srcIpv6Groups(FirewallDNSRuleSrcIpv6GroupsArgs.builder()
.ids(0)
.build())
.state("string")
.timeWindows(FirewallDNSRuleTimeWindowsArgs.builder()
.ids(0)
.build())
.users(FirewallDNSRuleUsersArgs.builder()
.ids(0)
.build())
.zpaIpGroup(FirewallDNSRuleZpaIpGroupArgs.builder()
.id(0)
.name("string")
.build())
.build());
firewall_dns_rule_resource = zia.FirewallDNSRule("firewallDNSRuleResource",
order=0,
groups={
"ids": [0],
},
applications=["string"],
block_response_code="string",
capture_pcap=False,
default_rule=False,
departments={
"ids": [0],
},
description="string",
dest_addresses=["string"],
dest_countries=["string"],
dest_ip_categories=["string"],
dest_ip_groups={
"ids": [0],
},
dest_ipv6_groups={
"ids": [0],
},
device_groups={
"ids": [0],
},
devices={
"ids": [0],
},
dns_gateway={
"id": 0,
"name": "string",
},
dns_rule_request_types=["string"],
action="string",
edns_ecs_object={
"id": 0,
"name": "string",
},
source_countries=["string"],
location_groups={
"ids": [0],
},
locations={
"ids": [0],
},
name="string",
application_groups={
"ids": [0],
},
predefined=False,
protocols=["string"],
rank=0,
redirect_ip="string",
res_categories=["string"],
labels={
"id": 0,
},
src_ip_groups={
"ids": [0],
},
src_ips=["string"],
src_ipv6_groups={
"ids": [0],
},
state="string",
time_windows={
"ids": [0],
},
users={
"ids": [0],
},
zpa_ip_group={
"id": 0,
"name": "string",
})
const firewallDNSRuleResource = new zia.FirewallDNSRule("firewallDNSRuleResource", {
order: 0,
groups: {
ids: [0],
},
applications: ["string"],
blockResponseCode: "string",
capturePcap: false,
defaultRule: false,
departments: {
ids: [0],
},
description: "string",
destAddresses: ["string"],
destCountries: ["string"],
destIpCategories: ["string"],
destIpGroups: {
ids: [0],
},
destIpv6Groups: {
ids: [0],
},
deviceGroups: {
ids: [0],
},
devices: {
ids: [0],
},
dnsGateway: {
id: 0,
name: "string",
},
dnsRuleRequestTypes: ["string"],
action: "string",
ednsEcsObject: {
id: 0,
name: "string",
},
sourceCountries: ["string"],
locationGroups: {
ids: [0],
},
locations: {
ids: [0],
},
name: "string",
applicationGroups: {
ids: [0],
},
predefined: false,
protocols: ["string"],
rank: 0,
redirectIp: "string",
resCategories: ["string"],
labels: {
id: 0,
},
srcIpGroups: {
ids: [0],
},
srcIps: ["string"],
srcIpv6Groups: {
ids: [0],
},
state: "string",
timeWindows: {
ids: [0],
},
users: {
ids: [0],
},
zpaIpGroup: {
id: 0,
name: "string",
},
});
type: zia:FirewallDNSRule
properties:
action: string
applicationGroups:
ids:
- 0
applications:
- string
blockResponseCode: string
capturePcap: false
defaultRule: false
departments:
ids:
- 0
description: string
destAddresses:
- string
destCountries:
- string
destIpCategories:
- string
destIpGroups:
ids:
- 0
destIpv6Groups:
ids:
- 0
deviceGroups:
ids:
- 0
devices:
ids:
- 0
dnsGateway:
id: 0
name: string
dnsRuleRequestTypes:
- string
ednsEcsObject:
id: 0
name: string
groups:
ids:
- 0
labels:
id: 0
locationGroups:
ids:
- 0
locations:
ids:
- 0
name: string
order: 0
predefined: false
protocols:
- string
rank: 0
redirectIp: string
resCategories:
- string
sourceCountries:
- string
srcIpGroups:
ids:
- 0
srcIps:
- string
srcIpv6Groups:
ids:
- 0
state: string
timeWindows:
ids:
- 0
users:
ids:
- 0
zpaIpGroup:
id: 0
name: string
FirewallDNSRule Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The FirewallDNSRule resource accepts the following input properties:
- Order int
- (Integer) Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- Action string
- (String) The action configured for the rule that must take place if the traffic matches the rule criteria, such as allowing or blocking the traffic or bypassing the rule. The following actions are accepted:
ALLOW
,BLOCK
,REDIR_REQ
,REDIR_RES
,REDIR_ZPA
,REDIR_REQ_DOH
,REDIR_REQ_KEEP_SENDER
,REDIR_REQ_TCP
,REDIR_REQ_UDP
,BLOCK_WITH_RESPONSE
- Application
Groups zscaler.Pulumi Package. Zia. Inputs. Firewall DNSRule Application Groups - (List of Objects) DNS application groups to which the rule applies
- Applications List<string>
- (Set of Strings) DNS tunnels and network applications to which the rule applies. To retrieve the available list of DNS tunnels applications use the data source:
zia.getCloudApplications
with theapp_class
valueDNS_OVER_HTTPS
. See example: - Block
Response stringCode - (String) Specifies the DNS response code to be sent to the client when the action is configured to block and send response code. Supported values are:
ANY
,NONE
,FORMERR
,SERVFAIL
,NXDOMAIN
,NOTIMP
,REFUSED
,YXDOMAIN
,YXRRSET
,NXRRSET
,NOTAUTH
,NOTZONE
,BADVERS
,BADKEY
,BADTIME
,BADMODE
,BADNAME
,BADALG
,BADTRUNC
,UNSUPPORTED
,BYPASS
,INT_ERROR
,SRV_TIMEOUT
,EMPTY_RESP
,REQ_BLOCKED
,ADMIN_DROP
,WCDN_TIMEOUT
,IPS_BLOCK
,FQDN_RESOLV_FAIL
- Capture
Pcap bool - (Boolean) Value that indicates whether packet capture (PCAP) is enabled or not
- Default
Rule bool - (Boolean) Value that indicates whether the rule is the Default Cloud DNS Rule or not
- Departments
zscaler.
Pulumi Package. Zia. Inputs. Firewall DNSRule Departments - (List of Objects) Apply to any number of departments When not used it implies
Any
to apply the rule to all departments. - Description string
- (String) Enter additional notes or information. The description cannot exceed 10,240 characters.
- Dest
Addresses List<string> - (Set of String) Destination IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific destination IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- Dest
Countries List<string> - (Set of String) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- Dest
Ip List<string>Categories - (Set of String) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- Dest
Ip zscaler.Groups Pulumi Package. Zia. Inputs. Firewall DNSRule Dest Ip Groups - ** - (List of Objects) Any number of destination IP address groups that you want to control with this rule.
- Dest
Ipv6Groups zscaler.Pulumi Package. Zia. Inputs. Firewall DNSRule Dest Ipv6Groups - list of destination ip groups
- Device
Groups zscaler.Pulumi Package. Zia. Inputs. Firewall DNSRule Device Groups - (List of Objects) Device groups to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- Devices
zscaler.
Pulumi Package. Zia. Inputs. Firewall DNSRule Devices - (List of Objects) Devices to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- Dns
Gateway zscaler.Pulumi Package. Zia. Inputs. Firewall DNSRule Dns Gateway - (Set of Objects) The DNS gateway used to redirect traffic, specified when the rule action is to redirect DNS request to an external DNS service. Only one DNS Gateway is supported.
- Dns
Rule List<string>Request Types - (Set of Strings) DNS request types to which the rule applies. Supportedn values are:
A
,NS
,MD
,MF
,CNAME
,SOA
,MB
,MG
,MR
,NULL
,WKS
,PTR
,HINFO
,MINFO
,MX
,TXT
,RP
,AFSDB
,X25
,ISDN
,RT
,NSAP
,NSAP_PTR
,SIG
,KEY
,PX
,GPOS
,AAAA
,LOC
,NXT
,EID
,NIMLOC
,SRV
,ATMA
,NAPTR
,KX
,CERT
,A6
,DNAME
,SINK
,OPT
,APL
,DS
,SSHFP
,PSECKEF
,RRSIG
,NSEC
,DNSKEY
,DHCID
,NSEC3
,NSEC3PARAM
,TLSA
,HIP
,NINFO
,RKEY
,TALINK
,CDS
,CDNSKEY
,OPENPGPKEY
,CSYNC
,ZONEMD
,SVCB
,HTTPS
, - Edns
Ecs zscaler.Object Pulumi Package. Zia. Inputs. Firewall DNSRule Edns Ecs Object - (List of Objects) The EDNS ECS object which resolves DNS request. Only one object is supported.
- Groups
zscaler.
Pulumi Package. Zia. Inputs. Firewall DNSRule Groups - (List of Objects) You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - Labels
zscaler.
Pulumi Package. Zia. Inputs. Firewall DNSRule Labels - (List of Objects) Labels that are applicable to the rule.
- Location
Groups zscaler.Pulumi Package. Zia. Inputs. Firewall DNSRule Location Groups - (List of Objects)You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - Locations
zscaler.
Pulumi Package. Zia. Inputs. Firewall DNSRule Locations - (List of Objects) You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups. - Name string
- Name of the Firewall Filtering policy rule
- Predefined bool
- (Boolean) A Boolean field that indicates that the rule is predefined by using a true value
- Protocols List<string>
- (Set of Strings) The protocols to which the rules applies. Supported Values:
ANY_RULE
,SMRULEF_CASCADING_ALLOWED
,TCP_RULE
,UDP_RULE
,DOHTTPS_RULE
- Rank int
- (Integer) By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
. - Redirect
Ip string - (String) The IP address to which the traffic will be redirected to when the DNAT rule is triggered. If not set, no redirection is done to specific IP addresses. Only supported when the
action
isREDIR_REQ
- Res
Categories List<string> - (Set of String) URL categories associated with resolved IP addresses to which the rule applies. If not set, the rule is not restricted to a specific URL category.
- Source
Countries List<string> - (Set of String) The countries of origin of traffic for which the rule is applicable. If not set, the rule is not restricted to specific source countries.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- Src
Ip zscaler.Groups Pulumi Package. Zia. Inputs. Firewall DNSRule Src Ip Groups - (List of Objects)Source IP address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address group.
- Src
Ips List<string> - (Set of String) Source IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific source IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- Src
Ipv6Groups zscaler.Pulumi Package. Zia. Inputs. Firewall DNSRule Src Ipv6Groups - (List of Objects) Source IPv6 address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IPv6 address group.
- State string
- (String) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- Time
Windows zscaler.Pulumi Package. Zia. Inputs. Firewall DNSRule Time Windows - (List of Objects) You can manually select up to
1
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - Users
zscaler.
Pulumi Package. Zia. Inputs. Firewall DNSRule Users - (List of Objects) You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users. - Zpa
Ip zscaler.Group Pulumi Package. Zia. Inputs. Firewall DNSRule Zpa Ip Group - (Set of Objects) The ZPA IP pool specified when the rule action is to resolve domain names of ZPA applications to an ephemeral IP address from a preconfigured IP pool. Only one object is supported.
- Order int
- (Integer) Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- Action string
- (String) The action configured for the rule that must take place if the traffic matches the rule criteria, such as allowing or blocking the traffic or bypassing the rule. The following actions are accepted:
ALLOW
,BLOCK
,REDIR_REQ
,REDIR_RES
,REDIR_ZPA
,REDIR_REQ_DOH
,REDIR_REQ_KEEP_SENDER
,REDIR_REQ_TCP
,REDIR_REQ_UDP
,BLOCK_WITH_RESPONSE
- Application
Groups FirewallDNSRule Application Groups Args - (List of Objects) DNS application groups to which the rule applies
- Applications []string
- (Set of Strings) DNS tunnels and network applications to which the rule applies. To retrieve the available list of DNS tunnels applications use the data source:
zia.getCloudApplications
with theapp_class
valueDNS_OVER_HTTPS
. See example: - Block
Response stringCode - (String) Specifies the DNS response code to be sent to the client when the action is configured to block and send response code. Supported values are:
ANY
,NONE
,FORMERR
,SERVFAIL
,NXDOMAIN
,NOTIMP
,REFUSED
,YXDOMAIN
,YXRRSET
,NXRRSET
,NOTAUTH
,NOTZONE
,BADVERS
,BADKEY
,BADTIME
,BADMODE
,BADNAME
,BADALG
,BADTRUNC
,UNSUPPORTED
,BYPASS
,INT_ERROR
,SRV_TIMEOUT
,EMPTY_RESP
,REQ_BLOCKED
,ADMIN_DROP
,WCDN_TIMEOUT
,IPS_BLOCK
,FQDN_RESOLV_FAIL
- Capture
Pcap bool - (Boolean) Value that indicates whether packet capture (PCAP) is enabled or not
- Default
Rule bool - (Boolean) Value that indicates whether the rule is the Default Cloud DNS Rule or not
- Departments
Firewall
DNSRule Departments Args - (List of Objects) Apply to any number of departments When not used it implies
Any
to apply the rule to all departments. - Description string
- (String) Enter additional notes or information. The description cannot exceed 10,240 characters.
- Dest
Addresses []string - (Set of String) Destination IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific destination IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- Dest
Countries []string - (Set of String) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- Dest
Ip []stringCategories - (Set of String) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- Dest
Ip FirewallGroups DNSRule Dest Ip Groups Args - ** - (List of Objects) Any number of destination IP address groups that you want to control with this rule.
- Dest
Ipv6Groups FirewallDNSRule Dest Ipv6Groups Args - list of destination ip groups
- Device
Groups FirewallDNSRule Device Groups Args - (List of Objects) Device groups to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- Devices
Firewall
DNSRule Devices Args - (List of Objects) Devices to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- Dns
Gateway FirewallDNSRule Dns Gateway Args - (Set of Objects) The DNS gateway used to redirect traffic, specified when the rule action is to redirect DNS request to an external DNS service. Only one DNS Gateway is supported.
- Dns
Rule []stringRequest Types - (Set of Strings) DNS request types to which the rule applies. Supportedn values are:
A
,NS
,MD
,MF
,CNAME
,SOA
,MB
,MG
,MR
,NULL
,WKS
,PTR
,HINFO
,MINFO
,MX
,TXT
,RP
,AFSDB
,X25
,ISDN
,RT
,NSAP
,NSAP_PTR
,SIG
,KEY
,PX
,GPOS
,AAAA
,LOC
,NXT
,EID
,NIMLOC
,SRV
,ATMA
,NAPTR
,KX
,CERT
,A6
,DNAME
,SINK
,OPT
,APL
,DS
,SSHFP
,PSECKEF
,RRSIG
,NSEC
,DNSKEY
,DHCID
,NSEC3
,NSEC3PARAM
,TLSA
,HIP
,NINFO
,RKEY
,TALINK
,CDS
,CDNSKEY
,OPENPGPKEY
,CSYNC
,ZONEMD
,SVCB
,HTTPS
, - Edns
Ecs FirewallObject DNSRule Edns Ecs Object Args - (List of Objects) The EDNS ECS object which resolves DNS request. Only one object is supported.
- Groups
Firewall
DNSRule Groups Args - (List of Objects) You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - Labels
Firewall
DNSRule Labels Args - (List of Objects) Labels that are applicable to the rule.
- Location
Groups FirewallDNSRule Location Groups Args - (List of Objects)You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - Locations
Firewall
DNSRule Locations Args - (List of Objects) You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups. - Name string
- Name of the Firewall Filtering policy rule
- Predefined bool
- (Boolean) A Boolean field that indicates that the rule is predefined by using a true value
- Protocols []string
- (Set of Strings) The protocols to which the rules applies. Supported Values:
ANY_RULE
,SMRULEF_CASCADING_ALLOWED
,TCP_RULE
,UDP_RULE
,DOHTTPS_RULE
- Rank int
- (Integer) By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
. - Redirect
Ip string - (String) The IP address to which the traffic will be redirected to when the DNAT rule is triggered. If not set, no redirection is done to specific IP addresses. Only supported when the
action
isREDIR_REQ
- Res
Categories []string - (Set of String) URL categories associated with resolved IP addresses to which the rule applies. If not set, the rule is not restricted to a specific URL category.
- Source
Countries []string - (Set of String) The countries of origin of traffic for which the rule is applicable. If not set, the rule is not restricted to specific source countries.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- Src
Ip FirewallGroups DNSRule Src Ip Groups Args - (List of Objects)Source IP address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address group.
- Src
Ips []string - (Set of String) Source IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific source IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- Src
Ipv6Groups FirewallDNSRule Src Ipv6Groups Args - (List of Objects) Source IPv6 address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IPv6 address group.
- State string
- (String) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- Time
Windows FirewallDNSRule Time Windows Args - (List of Objects) You can manually select up to
1
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - Users
Firewall
DNSRule Users Args - (List of Objects) You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users. - Zpa
Ip FirewallGroup DNSRule Zpa Ip Group Args - (Set of Objects) The ZPA IP pool specified when the rule action is to resolve domain names of ZPA applications to an ephemeral IP address from a preconfigured IP pool. Only one object is supported.
- order Integer
- (Integer) Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- action String
- (String) The action configured for the rule that must take place if the traffic matches the rule criteria, such as allowing or blocking the traffic or bypassing the rule. The following actions are accepted:
ALLOW
,BLOCK
,REDIR_REQ
,REDIR_RES
,REDIR_ZPA
,REDIR_REQ_DOH
,REDIR_REQ_KEEP_SENDER
,REDIR_REQ_TCP
,REDIR_REQ_UDP
,BLOCK_WITH_RESPONSE
- application
Groups FirewallDNSRule Application Groups - (List of Objects) DNS application groups to which the rule applies
- applications List<String>
- (Set of Strings) DNS tunnels and network applications to which the rule applies. To retrieve the available list of DNS tunnels applications use the data source:
zia.getCloudApplications
with theapp_class
valueDNS_OVER_HTTPS
. See example: - block
Response StringCode - (String) Specifies the DNS response code to be sent to the client when the action is configured to block and send response code. Supported values are:
ANY
,NONE
,FORMERR
,SERVFAIL
,NXDOMAIN
,NOTIMP
,REFUSED
,YXDOMAIN
,YXRRSET
,NXRRSET
,NOTAUTH
,NOTZONE
,BADVERS
,BADKEY
,BADTIME
,BADMODE
,BADNAME
,BADALG
,BADTRUNC
,UNSUPPORTED
,BYPASS
,INT_ERROR
,SRV_TIMEOUT
,EMPTY_RESP
,REQ_BLOCKED
,ADMIN_DROP
,WCDN_TIMEOUT
,IPS_BLOCK
,FQDN_RESOLV_FAIL
- capture
Pcap Boolean - (Boolean) Value that indicates whether packet capture (PCAP) is enabled or not
- default
Rule Boolean - (Boolean) Value that indicates whether the rule is the Default Cloud DNS Rule or not
- departments
Firewall
DNSRule Departments - (List of Objects) Apply to any number of departments When not used it implies
Any
to apply the rule to all departments. - description String
- (String) Enter additional notes or information. The description cannot exceed 10,240 characters.
- dest
Addresses List<String> - (Set of String) Destination IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific destination IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- dest
Countries List<String> - (Set of String) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- dest
Ip List<String>Categories - (Set of String) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- dest
Ip FirewallGroups DNSRule Dest Ip Groups - ** - (List of Objects) Any number of destination IP address groups that you want to control with this rule.
- dest
Ipv6Groups FirewallDNSRule Dest Ipv6Groups - list of destination ip groups
- device
Groups FirewallDNSRule Device Groups - (List of Objects) Device groups to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- devices
Firewall
DNSRule Devices - (List of Objects) Devices to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- dns
Gateway FirewallDNSRule Dns Gateway - (Set of Objects) The DNS gateway used to redirect traffic, specified when the rule action is to redirect DNS request to an external DNS service. Only one DNS Gateway is supported.
- dns
Rule List<String>Request Types - (Set of Strings) DNS request types to which the rule applies. Supportedn values are:
A
,NS
,MD
,MF
,CNAME
,SOA
,MB
,MG
,MR
,NULL
,WKS
,PTR
,HINFO
,MINFO
,MX
,TXT
,RP
,AFSDB
,X25
,ISDN
,RT
,NSAP
,NSAP_PTR
,SIG
,KEY
,PX
,GPOS
,AAAA
,LOC
,NXT
,EID
,NIMLOC
,SRV
,ATMA
,NAPTR
,KX
,CERT
,A6
,DNAME
,SINK
,OPT
,APL
,DS
,SSHFP
,PSECKEF
,RRSIG
,NSEC
,DNSKEY
,DHCID
,NSEC3
,NSEC3PARAM
,TLSA
,HIP
,NINFO
,RKEY
,TALINK
,CDS
,CDNSKEY
,OPENPGPKEY
,CSYNC
,ZONEMD
,SVCB
,HTTPS
, - edns
Ecs FirewallObject DNSRule Edns Ecs Object - (List of Objects) The EDNS ECS object which resolves DNS request. Only one object is supported.
- groups
Firewall
DNSRule Groups - (List of Objects) You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - labels
Firewall
DNSRule Labels - (List of Objects) Labels that are applicable to the rule.
- location
Groups FirewallDNSRule Location Groups - (List of Objects)You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - locations
Firewall
DNSRule Locations - (List of Objects) You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups. - name String
- Name of the Firewall Filtering policy rule
- predefined Boolean
- (Boolean) A Boolean field that indicates that the rule is predefined by using a true value
- protocols List<String>
- (Set of Strings) The protocols to which the rules applies. Supported Values:
ANY_RULE
,SMRULEF_CASCADING_ALLOWED
,TCP_RULE
,UDP_RULE
,DOHTTPS_RULE
- rank Integer
- (Integer) By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
. - redirect
Ip String - (String) The IP address to which the traffic will be redirected to when the DNAT rule is triggered. If not set, no redirection is done to specific IP addresses. Only supported when the
action
isREDIR_REQ
- res
Categories List<String> - (Set of String) URL categories associated with resolved IP addresses to which the rule applies. If not set, the rule is not restricted to a specific URL category.
- source
Countries List<String> - (Set of String) The countries of origin of traffic for which the rule is applicable. If not set, the rule is not restricted to specific source countries.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- src
Ip FirewallGroups DNSRule Src Ip Groups - (List of Objects)Source IP address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address group.
- src
Ips List<String> - (Set of String) Source IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific source IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- src
Ipv6Groups FirewallDNSRule Src Ipv6Groups - (List of Objects) Source IPv6 address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IPv6 address group.
- state String
- (String) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- time
Windows FirewallDNSRule Time Windows - (List of Objects) You can manually select up to
1
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - users
Firewall
DNSRule Users - (List of Objects) You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users. - zpa
Ip FirewallGroup DNSRule Zpa Ip Group - (Set of Objects) The ZPA IP pool specified when the rule action is to resolve domain names of ZPA applications to an ephemeral IP address from a preconfigured IP pool. Only one object is supported.
- order number
- (Integer) Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- action string
- (String) The action configured for the rule that must take place if the traffic matches the rule criteria, such as allowing or blocking the traffic or bypassing the rule. The following actions are accepted:
ALLOW
,BLOCK
,REDIR_REQ
,REDIR_RES
,REDIR_ZPA
,REDIR_REQ_DOH
,REDIR_REQ_KEEP_SENDER
,REDIR_REQ_TCP
,REDIR_REQ_UDP
,BLOCK_WITH_RESPONSE
- application
Groups FirewallDNSRule Application Groups - (List of Objects) DNS application groups to which the rule applies
- applications string[]
- (Set of Strings) DNS tunnels and network applications to which the rule applies. To retrieve the available list of DNS tunnels applications use the data source:
zia.getCloudApplications
with theapp_class
valueDNS_OVER_HTTPS
. See example: - block
Response stringCode - (String) Specifies the DNS response code to be sent to the client when the action is configured to block and send response code. Supported values are:
ANY
,NONE
,FORMERR
,SERVFAIL
,NXDOMAIN
,NOTIMP
,REFUSED
,YXDOMAIN
,YXRRSET
,NXRRSET
,NOTAUTH
,NOTZONE
,BADVERS
,BADKEY
,BADTIME
,BADMODE
,BADNAME
,BADALG
,BADTRUNC
,UNSUPPORTED
,BYPASS
,INT_ERROR
,SRV_TIMEOUT
,EMPTY_RESP
,REQ_BLOCKED
,ADMIN_DROP
,WCDN_TIMEOUT
,IPS_BLOCK
,FQDN_RESOLV_FAIL
- capture
Pcap boolean - (Boolean) Value that indicates whether packet capture (PCAP) is enabled or not
- default
Rule boolean - (Boolean) Value that indicates whether the rule is the Default Cloud DNS Rule or not
- departments
Firewall
DNSRule Departments - (List of Objects) Apply to any number of departments When not used it implies
Any
to apply the rule to all departments. - description string
- (String) Enter additional notes or information. The description cannot exceed 10,240 characters.
- dest
Addresses string[] - (Set of String) Destination IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific destination IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- dest
Countries string[] - (Set of String) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- dest
Ip string[]Categories - (Set of String) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- dest
Ip FirewallGroups DNSRule Dest Ip Groups - ** - (List of Objects) Any number of destination IP address groups that you want to control with this rule.
- dest
Ipv6Groups FirewallDNSRule Dest Ipv6Groups - list of destination ip groups
- device
Groups FirewallDNSRule Device Groups - (List of Objects) Device groups to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- devices
Firewall
DNSRule Devices - (List of Objects) Devices to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- dns
Gateway FirewallDNSRule Dns Gateway - (Set of Objects) The DNS gateway used to redirect traffic, specified when the rule action is to redirect DNS request to an external DNS service. Only one DNS Gateway is supported.
- dns
Rule string[]Request Types - (Set of Strings) DNS request types to which the rule applies. Supportedn values are:
A
,NS
,MD
,MF
,CNAME
,SOA
,MB
,MG
,MR
,NULL
,WKS
,PTR
,HINFO
,MINFO
,MX
,TXT
,RP
,AFSDB
,X25
,ISDN
,RT
,NSAP
,NSAP_PTR
,SIG
,KEY
,PX
,GPOS
,AAAA
,LOC
,NXT
,EID
,NIMLOC
,SRV
,ATMA
,NAPTR
,KX
,CERT
,A6
,DNAME
,SINK
,OPT
,APL
,DS
,SSHFP
,PSECKEF
,RRSIG
,NSEC
,DNSKEY
,DHCID
,NSEC3
,NSEC3PARAM
,TLSA
,HIP
,NINFO
,RKEY
,TALINK
,CDS
,CDNSKEY
,OPENPGPKEY
,CSYNC
,ZONEMD
,SVCB
,HTTPS
, - edns
Ecs FirewallObject DNSRule Edns Ecs Object - (List of Objects) The EDNS ECS object which resolves DNS request. Only one object is supported.
- groups
Firewall
DNSRule Groups - (List of Objects) You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - labels
Firewall
DNSRule Labels - (List of Objects) Labels that are applicable to the rule.
- location
Groups FirewallDNSRule Location Groups - (List of Objects)You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - locations
Firewall
DNSRule Locations - (List of Objects) You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups. - name string
- Name of the Firewall Filtering policy rule
- predefined boolean
- (Boolean) A Boolean field that indicates that the rule is predefined by using a true value
- protocols string[]
- (Set of Strings) The protocols to which the rules applies. Supported Values:
ANY_RULE
,SMRULEF_CASCADING_ALLOWED
,TCP_RULE
,UDP_RULE
,DOHTTPS_RULE
- rank number
- (Integer) By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
. - redirect
Ip string - (String) The IP address to which the traffic will be redirected to when the DNAT rule is triggered. If not set, no redirection is done to specific IP addresses. Only supported when the
action
isREDIR_REQ
- res
Categories string[] - (Set of String) URL categories associated with resolved IP addresses to which the rule applies. If not set, the rule is not restricted to a specific URL category.
- source
Countries string[] - (Set of String) The countries of origin of traffic for which the rule is applicable. If not set, the rule is not restricted to specific source countries.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- src
Ip FirewallGroups DNSRule Src Ip Groups - (List of Objects)Source IP address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address group.
- src
Ips string[] - (Set of String) Source IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific source IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- src
Ipv6Groups FirewallDNSRule Src Ipv6Groups - (List of Objects) Source IPv6 address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IPv6 address group.
- state string
- (String) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- time
Windows FirewallDNSRule Time Windows - (List of Objects) You can manually select up to
1
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - users
Firewall
DNSRule Users - (List of Objects) You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users. - zpa
Ip FirewallGroup DNSRule Zpa Ip Group - (Set of Objects) The ZPA IP pool specified when the rule action is to resolve domain names of ZPA applications to an ephemeral IP address from a preconfigured IP pool. Only one object is supported.
- order int
- (Integer) Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- action str
- (String) The action configured for the rule that must take place if the traffic matches the rule criteria, such as allowing or blocking the traffic or bypassing the rule. The following actions are accepted:
ALLOW
,BLOCK
,REDIR_REQ
,REDIR_RES
,REDIR_ZPA
,REDIR_REQ_DOH
,REDIR_REQ_KEEP_SENDER
,REDIR_REQ_TCP
,REDIR_REQ_UDP
,BLOCK_WITH_RESPONSE
- application_
groups FirewallDNSRule Application Groups Args - (List of Objects) DNS application groups to which the rule applies
- applications Sequence[str]
- (Set of Strings) DNS tunnels and network applications to which the rule applies. To retrieve the available list of DNS tunnels applications use the data source:
zia.getCloudApplications
with theapp_class
valueDNS_OVER_HTTPS
. See example: - block_
response_ strcode - (String) Specifies the DNS response code to be sent to the client when the action is configured to block and send response code. Supported values are:
ANY
,NONE
,FORMERR
,SERVFAIL
,NXDOMAIN
,NOTIMP
,REFUSED
,YXDOMAIN
,YXRRSET
,NXRRSET
,NOTAUTH
,NOTZONE
,BADVERS
,BADKEY
,BADTIME
,BADMODE
,BADNAME
,BADALG
,BADTRUNC
,UNSUPPORTED
,BYPASS
,INT_ERROR
,SRV_TIMEOUT
,EMPTY_RESP
,REQ_BLOCKED
,ADMIN_DROP
,WCDN_TIMEOUT
,IPS_BLOCK
,FQDN_RESOLV_FAIL
- capture_
pcap bool - (Boolean) Value that indicates whether packet capture (PCAP) is enabled or not
- default_
rule bool - (Boolean) Value that indicates whether the rule is the Default Cloud DNS Rule or not
- departments
Firewall
DNSRule Departments Args - (List of Objects) Apply to any number of departments When not used it implies
Any
to apply the rule to all departments. - description str
- (String) Enter additional notes or information. The description cannot exceed 10,240 characters.
- dest_
addresses Sequence[str] - (Set of String) Destination IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific destination IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- dest_
countries Sequence[str] - (Set of String) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- dest_
ip_ Sequence[str]categories - (Set of String) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- dest_
ip_ Firewallgroups DNSRule Dest Ip Groups Args - ** - (List of Objects) Any number of destination IP address groups that you want to control with this rule.
- dest_
ipv6_ Firewallgroups DNSRule Dest Ipv6Groups Args - list of destination ip groups
- device_
groups FirewallDNSRule Device Groups Args - (List of Objects) Device groups to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- devices
Firewall
DNSRule Devices Args - (List of Objects) Devices to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- dns_
gateway FirewallDNSRule Dns Gateway Args - (Set of Objects) The DNS gateway used to redirect traffic, specified when the rule action is to redirect DNS request to an external DNS service. Only one DNS Gateway is supported.
- dns_
rule_ Sequence[str]request_ types - (Set of Strings) DNS request types to which the rule applies. Supportedn values are:
A
,NS
,MD
,MF
,CNAME
,SOA
,MB
,MG
,MR
,NULL
,WKS
,PTR
,HINFO
,MINFO
,MX
,TXT
,RP
,AFSDB
,X25
,ISDN
,RT
,NSAP
,NSAP_PTR
,SIG
,KEY
,PX
,GPOS
,AAAA
,LOC
,NXT
,EID
,NIMLOC
,SRV
,ATMA
,NAPTR
,KX
,CERT
,A6
,DNAME
,SINK
,OPT
,APL
,DS
,SSHFP
,PSECKEF
,RRSIG
,NSEC
,DNSKEY
,DHCID
,NSEC3
,NSEC3PARAM
,TLSA
,HIP
,NINFO
,RKEY
,TALINK
,CDS
,CDNSKEY
,OPENPGPKEY
,CSYNC
,ZONEMD
,SVCB
,HTTPS
, - edns_
ecs_ Firewallobject DNSRule Edns Ecs Object Args - (List of Objects) The EDNS ECS object which resolves DNS request. Only one object is supported.
- groups
Firewall
DNSRule Groups Args - (List of Objects) You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - labels
Firewall
DNSRule Labels Args - (List of Objects) Labels that are applicable to the rule.
- location_
groups FirewallDNSRule Location Groups Args - (List of Objects)You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - locations
Firewall
DNSRule Locations Args - (List of Objects) You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups. - name str
- Name of the Firewall Filtering policy rule
- predefined bool
- (Boolean) A Boolean field that indicates that the rule is predefined by using a true value
- protocols Sequence[str]
- (Set of Strings) The protocols to which the rules applies. Supported Values:
ANY_RULE
,SMRULEF_CASCADING_ALLOWED
,TCP_RULE
,UDP_RULE
,DOHTTPS_RULE
- rank int
- (Integer) By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
. - redirect_
ip str - (String) The IP address to which the traffic will be redirected to when the DNAT rule is triggered. If not set, no redirection is done to specific IP addresses. Only supported when the
action
isREDIR_REQ
- res_
categories Sequence[str] - (Set of String) URL categories associated with resolved IP addresses to which the rule applies. If not set, the rule is not restricted to a specific URL category.
- source_
countries Sequence[str] - (Set of String) The countries of origin of traffic for which the rule is applicable. If not set, the rule is not restricted to specific source countries.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- src_
ip_ Firewallgroups DNSRule Src Ip Groups Args - (List of Objects)Source IP address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address group.
- src_
ips Sequence[str] - (Set of String) Source IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific source IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- src_
ipv6_ Firewallgroups DNSRule Src Ipv6Groups Args - (List of Objects) Source IPv6 address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IPv6 address group.
- state str
- (String) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- time_
windows FirewallDNSRule Time Windows Args - (List of Objects) You can manually select up to
1
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - users
Firewall
DNSRule Users Args - (List of Objects) You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users. - zpa_
ip_ Firewallgroup DNSRule Zpa Ip Group Args - (Set of Objects) The ZPA IP pool specified when the rule action is to resolve domain names of ZPA applications to an ephemeral IP address from a preconfigured IP pool. Only one object is supported.
- order Number
- (Integer) Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- action String
- (String) The action configured for the rule that must take place if the traffic matches the rule criteria, such as allowing or blocking the traffic or bypassing the rule. The following actions are accepted:
ALLOW
,BLOCK
,REDIR_REQ
,REDIR_RES
,REDIR_ZPA
,REDIR_REQ_DOH
,REDIR_REQ_KEEP_SENDER
,REDIR_REQ_TCP
,REDIR_REQ_UDP
,BLOCK_WITH_RESPONSE
- application
Groups Property Map - (List of Objects) DNS application groups to which the rule applies
- applications List<String>
- (Set of Strings) DNS tunnels and network applications to which the rule applies. To retrieve the available list of DNS tunnels applications use the data source:
zia.getCloudApplications
with theapp_class
valueDNS_OVER_HTTPS
. See example: - block
Response StringCode - (String) Specifies the DNS response code to be sent to the client when the action is configured to block and send response code. Supported values are:
ANY
,NONE
,FORMERR
,SERVFAIL
,NXDOMAIN
,NOTIMP
,REFUSED
,YXDOMAIN
,YXRRSET
,NXRRSET
,NOTAUTH
,NOTZONE
,BADVERS
,BADKEY
,BADTIME
,BADMODE
,BADNAME
,BADALG
,BADTRUNC
,UNSUPPORTED
,BYPASS
,INT_ERROR
,SRV_TIMEOUT
,EMPTY_RESP
,REQ_BLOCKED
,ADMIN_DROP
,WCDN_TIMEOUT
,IPS_BLOCK
,FQDN_RESOLV_FAIL
- capture
Pcap Boolean - (Boolean) Value that indicates whether packet capture (PCAP) is enabled or not
- default
Rule Boolean - (Boolean) Value that indicates whether the rule is the Default Cloud DNS Rule or not
- departments Property Map
- (List of Objects) Apply to any number of departments When not used it implies
Any
to apply the rule to all departments. - description String
- (String) Enter additional notes or information. The description cannot exceed 10,240 characters.
- dest
Addresses List<String> - (Set of String) Destination IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific destination IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- dest
Countries List<String> - (Set of String) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- dest
Ip List<String>Categories - (Set of String) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- dest
Ip Property MapGroups - ** - (List of Objects) Any number of destination IP address groups that you want to control with this rule.
- dest
Ipv6Groups Property Map - list of destination ip groups
- device
Groups Property Map - (List of Objects) Device groups to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- devices Property Map
- (List of Objects) Devices to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- dns
Gateway Property Map - (Set of Objects) The DNS gateway used to redirect traffic, specified when the rule action is to redirect DNS request to an external DNS service. Only one DNS Gateway is supported.
- dns
Rule List<String>Request Types - (Set of Strings) DNS request types to which the rule applies. Supportedn values are:
A
,NS
,MD
,MF
,CNAME
,SOA
,MB
,MG
,MR
,NULL
,WKS
,PTR
,HINFO
,MINFO
,MX
,TXT
,RP
,AFSDB
,X25
,ISDN
,RT
,NSAP
,NSAP_PTR
,SIG
,KEY
,PX
,GPOS
,AAAA
,LOC
,NXT
,EID
,NIMLOC
,SRV
,ATMA
,NAPTR
,KX
,CERT
,A6
,DNAME
,SINK
,OPT
,APL
,DS
,SSHFP
,PSECKEF
,RRSIG
,NSEC
,DNSKEY
,DHCID
,NSEC3
,NSEC3PARAM
,TLSA
,HIP
,NINFO
,RKEY
,TALINK
,CDS
,CDNSKEY
,OPENPGPKEY
,CSYNC
,ZONEMD
,SVCB
,HTTPS
, - edns
Ecs Property MapObject - (List of Objects) The EDNS ECS object which resolves DNS request. Only one object is supported.
- groups Property Map
- (List of Objects) You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - labels Property Map
- (List of Objects) Labels that are applicable to the rule.
- location
Groups Property Map - (List of Objects)You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - locations Property Map
- (List of Objects) You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups. - name String
- Name of the Firewall Filtering policy rule
- predefined Boolean
- (Boolean) A Boolean field that indicates that the rule is predefined by using a true value
- protocols List<String>
- (Set of Strings) The protocols to which the rules applies. Supported Values:
ANY_RULE
,SMRULEF_CASCADING_ALLOWED
,TCP_RULE
,UDP_RULE
,DOHTTPS_RULE
- rank Number
- (Integer) By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
. - redirect
Ip String - (String) The IP address to which the traffic will be redirected to when the DNAT rule is triggered. If not set, no redirection is done to specific IP addresses. Only supported when the
action
isREDIR_REQ
- res
Categories List<String> - (Set of String) URL categories associated with resolved IP addresses to which the rule applies. If not set, the rule is not restricted to a specific URL category.
- source
Countries List<String> - (Set of String) The countries of origin of traffic for which the rule is applicable. If not set, the rule is not restricted to specific source countries.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- src
Ip Property MapGroups - (List of Objects)Source IP address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address group.
- src
Ips List<String> - (Set of String) Source IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific source IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- src
Ipv6Groups Property Map - (List of Objects) Source IPv6 address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IPv6 address group.
- state String
- (String) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- time
Windows Property Map - (List of Objects) You can manually select up to
1
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - users Property Map
- (List of Objects) You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users. - zpa
Ip Property MapGroup - (Set of Objects) The ZPA IP pool specified when the rule action is to resolve domain names of ZPA applications to an ephemeral IP address from a preconfigured IP pool. Only one object is supported.
Outputs
All input properties are implicitly available as output properties. Additionally, the FirewallDNSRule resource produces the following output properties:
Look up Existing FirewallDNSRule Resource
Get an existing FirewallDNSRule resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: FirewallDNSRuleState, opts?: CustomResourceOptions): FirewallDNSRule
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
action: Optional[str] = None,
application_groups: Optional[FirewallDNSRuleApplicationGroupsArgs] = None,
applications: Optional[Sequence[str]] = None,
block_response_code: Optional[str] = None,
capture_pcap: Optional[bool] = None,
default_rule: Optional[bool] = None,
departments: Optional[FirewallDNSRuleDepartmentsArgs] = None,
description: Optional[str] = None,
dest_addresses: Optional[Sequence[str]] = None,
dest_countries: Optional[Sequence[str]] = None,
dest_ip_categories: Optional[Sequence[str]] = None,
dest_ip_groups: Optional[FirewallDNSRuleDestIpGroupsArgs] = None,
dest_ipv6_groups: Optional[FirewallDNSRuleDestIpv6GroupsArgs] = None,
device_groups: Optional[FirewallDNSRuleDeviceGroupsArgs] = None,
devices: Optional[FirewallDNSRuleDevicesArgs] = None,
dns_gateway: Optional[FirewallDNSRuleDnsGatewayArgs] = None,
dns_rule_request_types: Optional[Sequence[str]] = None,
edns_ecs_object: Optional[FirewallDNSRuleEdnsEcsObjectArgs] = None,
groups: Optional[FirewallDNSRuleGroupsArgs] = None,
labels: Optional[FirewallDNSRuleLabelsArgs] = None,
location_groups: Optional[FirewallDNSRuleLocationGroupsArgs] = None,
locations: Optional[FirewallDNSRuleLocationsArgs] = None,
name: Optional[str] = None,
order: Optional[int] = None,
predefined: Optional[bool] = None,
protocols: Optional[Sequence[str]] = None,
rank: Optional[int] = None,
redirect_ip: Optional[str] = None,
res_categories: Optional[Sequence[str]] = None,
rule_id: Optional[int] = None,
source_countries: Optional[Sequence[str]] = None,
src_ip_groups: Optional[FirewallDNSRuleSrcIpGroupsArgs] = None,
src_ips: Optional[Sequence[str]] = None,
src_ipv6_groups: Optional[FirewallDNSRuleSrcIpv6GroupsArgs] = None,
state: Optional[str] = None,
time_windows: Optional[FirewallDNSRuleTimeWindowsArgs] = None,
users: Optional[FirewallDNSRuleUsersArgs] = None,
zpa_ip_group: Optional[FirewallDNSRuleZpaIpGroupArgs] = None) -> FirewallDNSRule
func GetFirewallDNSRule(ctx *Context, name string, id IDInput, state *FirewallDNSRuleState, opts ...ResourceOption) (*FirewallDNSRule, error)
public static FirewallDNSRule Get(string name, Input<string> id, FirewallDNSRuleState? state, CustomResourceOptions? opts = null)
public static FirewallDNSRule get(String name, Output<String> id, FirewallDNSRuleState state, CustomResourceOptions options)
resources: _: type: zia:FirewallDNSRule get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Action string
- (String) The action configured for the rule that must take place if the traffic matches the rule criteria, such as allowing or blocking the traffic or bypassing the rule. The following actions are accepted:
ALLOW
,BLOCK
,REDIR_REQ
,REDIR_RES
,REDIR_ZPA
,REDIR_REQ_DOH
,REDIR_REQ_KEEP_SENDER
,REDIR_REQ_TCP
,REDIR_REQ_UDP
,BLOCK_WITH_RESPONSE
- Application
Groups zscaler.Pulumi Package. Zia. Inputs. Firewall DNSRule Application Groups - (List of Objects) DNS application groups to which the rule applies
- Applications List<string>
- (Set of Strings) DNS tunnels and network applications to which the rule applies. To retrieve the available list of DNS tunnels applications use the data source:
zia.getCloudApplications
with theapp_class
valueDNS_OVER_HTTPS
. See example: - Block
Response stringCode - (String) Specifies the DNS response code to be sent to the client when the action is configured to block and send response code. Supported values are:
ANY
,NONE
,FORMERR
,SERVFAIL
,NXDOMAIN
,NOTIMP
,REFUSED
,YXDOMAIN
,YXRRSET
,NXRRSET
,NOTAUTH
,NOTZONE
,BADVERS
,BADKEY
,BADTIME
,BADMODE
,BADNAME
,BADALG
,BADTRUNC
,UNSUPPORTED
,BYPASS
,INT_ERROR
,SRV_TIMEOUT
,EMPTY_RESP
,REQ_BLOCKED
,ADMIN_DROP
,WCDN_TIMEOUT
,IPS_BLOCK
,FQDN_RESOLV_FAIL
- Capture
Pcap bool - (Boolean) Value that indicates whether packet capture (PCAP) is enabled or not
- Default
Rule bool - (Boolean) Value that indicates whether the rule is the Default Cloud DNS Rule or not
- Departments
zscaler.
Pulumi Package. Zia. Inputs. Firewall DNSRule Departments - (List of Objects) Apply to any number of departments When not used it implies
Any
to apply the rule to all departments. - Description string
- (String) Enter additional notes or information. The description cannot exceed 10,240 characters.
- Dest
Addresses List<string> - (Set of String) Destination IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific destination IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- Dest
Countries List<string> - (Set of String) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- Dest
Ip List<string>Categories - (Set of String) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- Dest
Ip zscaler.Groups Pulumi Package. Zia. Inputs. Firewall DNSRule Dest Ip Groups - ** - (List of Objects) Any number of destination IP address groups that you want to control with this rule.
- Dest
Ipv6Groups zscaler.Pulumi Package. Zia. Inputs. Firewall DNSRule Dest Ipv6Groups - list of destination ip groups
- Device
Groups zscaler.Pulumi Package. Zia. Inputs. Firewall DNSRule Device Groups - (List of Objects) Device groups to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- Devices
zscaler.
Pulumi Package. Zia. Inputs. Firewall DNSRule Devices - (List of Objects) Devices to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- Dns
Gateway zscaler.Pulumi Package. Zia. Inputs. Firewall DNSRule Dns Gateway - (Set of Objects) The DNS gateway used to redirect traffic, specified when the rule action is to redirect DNS request to an external DNS service. Only one DNS Gateway is supported.
- Dns
Rule List<string>Request Types - (Set of Strings) DNS request types to which the rule applies. Supportedn values are:
A
,NS
,MD
,MF
,CNAME
,SOA
,MB
,MG
,MR
,NULL
,WKS
,PTR
,HINFO
,MINFO
,MX
,TXT
,RP
,AFSDB
,X25
,ISDN
,RT
,NSAP
,NSAP_PTR
,SIG
,KEY
,PX
,GPOS
,AAAA
,LOC
,NXT
,EID
,NIMLOC
,SRV
,ATMA
,NAPTR
,KX
,CERT
,A6
,DNAME
,SINK
,OPT
,APL
,DS
,SSHFP
,PSECKEF
,RRSIG
,NSEC
,DNSKEY
,DHCID
,NSEC3
,NSEC3PARAM
,TLSA
,HIP
,NINFO
,RKEY
,TALINK
,CDS
,CDNSKEY
,OPENPGPKEY
,CSYNC
,ZONEMD
,SVCB
,HTTPS
, - Edns
Ecs zscaler.Object Pulumi Package. Zia. Inputs. Firewall DNSRule Edns Ecs Object - (List of Objects) The EDNS ECS object which resolves DNS request. Only one object is supported.
- Groups
zscaler.
Pulumi Package. Zia. Inputs. Firewall DNSRule Groups - (List of Objects) You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - Labels
zscaler.
Pulumi Package. Zia. Inputs. Firewall DNSRule Labels - (List of Objects) Labels that are applicable to the rule.
- Location
Groups zscaler.Pulumi Package. Zia. Inputs. Firewall DNSRule Location Groups - (List of Objects)You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - Locations
zscaler.
Pulumi Package. Zia. Inputs. Firewall DNSRule Locations - (List of Objects) You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups. - Name string
- Name of the Firewall Filtering policy rule
- Order int
- (Integer) Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- Predefined bool
- (Boolean) A Boolean field that indicates that the rule is predefined by using a true value
- Protocols List<string>
- (Set of Strings) The protocols to which the rules applies. Supported Values:
ANY_RULE
,SMRULEF_CASCADING_ALLOWED
,TCP_RULE
,UDP_RULE
,DOHTTPS_RULE
- Rank int
- (Integer) By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
. - Redirect
Ip string - (String) The IP address to which the traffic will be redirected to when the DNAT rule is triggered. If not set, no redirection is done to specific IP addresses. Only supported when the
action
isREDIR_REQ
- Res
Categories List<string> - (Set of String) URL categories associated with resolved IP addresses to which the rule applies. If not set, the rule is not restricted to a specific URL category.
- Rule
Id int - Source
Countries List<string> - (Set of String) The countries of origin of traffic for which the rule is applicable. If not set, the rule is not restricted to specific source countries.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- Src
Ip zscaler.Groups Pulumi Package. Zia. Inputs. Firewall DNSRule Src Ip Groups - (List of Objects)Source IP address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address group.
- Src
Ips List<string> - (Set of String) Source IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific source IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- Src
Ipv6Groups zscaler.Pulumi Package. Zia. Inputs. Firewall DNSRule Src Ipv6Groups - (List of Objects) Source IPv6 address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IPv6 address group.
- State string
- (String) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- Time
Windows zscaler.Pulumi Package. Zia. Inputs. Firewall DNSRule Time Windows - (List of Objects) You can manually select up to
1
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - Users
zscaler.
Pulumi Package. Zia. Inputs. Firewall DNSRule Users - (List of Objects) You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users. - Zpa
Ip zscaler.Group Pulumi Package. Zia. Inputs. Firewall DNSRule Zpa Ip Group - (Set of Objects) The ZPA IP pool specified when the rule action is to resolve domain names of ZPA applications to an ephemeral IP address from a preconfigured IP pool. Only one object is supported.
- Action string
- (String) The action configured for the rule that must take place if the traffic matches the rule criteria, such as allowing or blocking the traffic or bypassing the rule. The following actions are accepted:
ALLOW
,BLOCK
,REDIR_REQ
,REDIR_RES
,REDIR_ZPA
,REDIR_REQ_DOH
,REDIR_REQ_KEEP_SENDER
,REDIR_REQ_TCP
,REDIR_REQ_UDP
,BLOCK_WITH_RESPONSE
- Application
Groups FirewallDNSRule Application Groups Args - (List of Objects) DNS application groups to which the rule applies
- Applications []string
- (Set of Strings) DNS tunnels and network applications to which the rule applies. To retrieve the available list of DNS tunnels applications use the data source:
zia.getCloudApplications
with theapp_class
valueDNS_OVER_HTTPS
. See example: - Block
Response stringCode - (String) Specifies the DNS response code to be sent to the client when the action is configured to block and send response code. Supported values are:
ANY
,NONE
,FORMERR
,SERVFAIL
,NXDOMAIN
,NOTIMP
,REFUSED
,YXDOMAIN
,YXRRSET
,NXRRSET
,NOTAUTH
,NOTZONE
,BADVERS
,BADKEY
,BADTIME
,BADMODE
,BADNAME
,BADALG
,BADTRUNC
,UNSUPPORTED
,BYPASS
,INT_ERROR
,SRV_TIMEOUT
,EMPTY_RESP
,REQ_BLOCKED
,ADMIN_DROP
,WCDN_TIMEOUT
,IPS_BLOCK
,FQDN_RESOLV_FAIL
- Capture
Pcap bool - (Boolean) Value that indicates whether packet capture (PCAP) is enabled or not
- Default
Rule bool - (Boolean) Value that indicates whether the rule is the Default Cloud DNS Rule or not
- Departments
Firewall
DNSRule Departments Args - (List of Objects) Apply to any number of departments When not used it implies
Any
to apply the rule to all departments. - Description string
- (String) Enter additional notes or information. The description cannot exceed 10,240 characters.
- Dest
Addresses []string - (Set of String) Destination IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific destination IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- Dest
Countries []string - (Set of String) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- Dest
Ip []stringCategories - (Set of String) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- Dest
Ip FirewallGroups DNSRule Dest Ip Groups Args - ** - (List of Objects) Any number of destination IP address groups that you want to control with this rule.
- Dest
Ipv6Groups FirewallDNSRule Dest Ipv6Groups Args - list of destination ip groups
- Device
Groups FirewallDNSRule Device Groups Args - (List of Objects) Device groups to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- Devices
Firewall
DNSRule Devices Args - (List of Objects) Devices to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- Dns
Gateway FirewallDNSRule Dns Gateway Args - (Set of Objects) The DNS gateway used to redirect traffic, specified when the rule action is to redirect DNS request to an external DNS service. Only one DNS Gateway is supported.
- Dns
Rule []stringRequest Types - (Set of Strings) DNS request types to which the rule applies. Supportedn values are:
A
,NS
,MD
,MF
,CNAME
,SOA
,MB
,MG
,MR
,NULL
,WKS
,PTR
,HINFO
,MINFO
,MX
,TXT
,RP
,AFSDB
,X25
,ISDN
,RT
,NSAP
,NSAP_PTR
,SIG
,KEY
,PX
,GPOS
,AAAA
,LOC
,NXT
,EID
,NIMLOC
,SRV
,ATMA
,NAPTR
,KX
,CERT
,A6
,DNAME
,SINK
,OPT
,APL
,DS
,SSHFP
,PSECKEF
,RRSIG
,NSEC
,DNSKEY
,DHCID
,NSEC3
,NSEC3PARAM
,TLSA
,HIP
,NINFO
,RKEY
,TALINK
,CDS
,CDNSKEY
,OPENPGPKEY
,CSYNC
,ZONEMD
,SVCB
,HTTPS
, - Edns
Ecs FirewallObject DNSRule Edns Ecs Object Args - (List of Objects) The EDNS ECS object which resolves DNS request. Only one object is supported.
- Groups
Firewall
DNSRule Groups Args - (List of Objects) You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - Labels
Firewall
DNSRule Labels Args - (List of Objects) Labels that are applicable to the rule.
- Location
Groups FirewallDNSRule Location Groups Args - (List of Objects)You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - Locations
Firewall
DNSRule Locations Args - (List of Objects) You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups. - Name string
- Name of the Firewall Filtering policy rule
- Order int
- (Integer) Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- Predefined bool
- (Boolean) A Boolean field that indicates that the rule is predefined by using a true value
- Protocols []string
- (Set of Strings) The protocols to which the rules applies. Supported Values:
ANY_RULE
,SMRULEF_CASCADING_ALLOWED
,TCP_RULE
,UDP_RULE
,DOHTTPS_RULE
- Rank int
- (Integer) By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
. - Redirect
Ip string - (String) The IP address to which the traffic will be redirected to when the DNAT rule is triggered. If not set, no redirection is done to specific IP addresses. Only supported when the
action
isREDIR_REQ
- Res
Categories []string - (Set of String) URL categories associated with resolved IP addresses to which the rule applies. If not set, the rule is not restricted to a specific URL category.
- Rule
Id int - Source
Countries []string - (Set of String) The countries of origin of traffic for which the rule is applicable. If not set, the rule is not restricted to specific source countries.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- Src
Ip FirewallGroups DNSRule Src Ip Groups Args - (List of Objects)Source IP address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address group.
- Src
Ips []string - (Set of String) Source IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific source IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- Src
Ipv6Groups FirewallDNSRule Src Ipv6Groups Args - (List of Objects) Source IPv6 address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IPv6 address group.
- State string
- (String) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- Time
Windows FirewallDNSRule Time Windows Args - (List of Objects) You can manually select up to
1
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - Users
Firewall
DNSRule Users Args - (List of Objects) You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users. - Zpa
Ip FirewallGroup DNSRule Zpa Ip Group Args - (Set of Objects) The ZPA IP pool specified when the rule action is to resolve domain names of ZPA applications to an ephemeral IP address from a preconfigured IP pool. Only one object is supported.
- action String
- (String) The action configured for the rule that must take place if the traffic matches the rule criteria, such as allowing or blocking the traffic or bypassing the rule. The following actions are accepted:
ALLOW
,BLOCK
,REDIR_REQ
,REDIR_RES
,REDIR_ZPA
,REDIR_REQ_DOH
,REDIR_REQ_KEEP_SENDER
,REDIR_REQ_TCP
,REDIR_REQ_UDP
,BLOCK_WITH_RESPONSE
- application
Groups FirewallDNSRule Application Groups - (List of Objects) DNS application groups to which the rule applies
- applications List<String>
- (Set of Strings) DNS tunnels and network applications to which the rule applies. To retrieve the available list of DNS tunnels applications use the data source:
zia.getCloudApplications
with theapp_class
valueDNS_OVER_HTTPS
. See example: - block
Response StringCode - (String) Specifies the DNS response code to be sent to the client when the action is configured to block and send response code. Supported values are:
ANY
,NONE
,FORMERR
,SERVFAIL
,NXDOMAIN
,NOTIMP
,REFUSED
,YXDOMAIN
,YXRRSET
,NXRRSET
,NOTAUTH
,NOTZONE
,BADVERS
,BADKEY
,BADTIME
,BADMODE
,BADNAME
,BADALG
,BADTRUNC
,UNSUPPORTED
,BYPASS
,INT_ERROR
,SRV_TIMEOUT
,EMPTY_RESP
,REQ_BLOCKED
,ADMIN_DROP
,WCDN_TIMEOUT
,IPS_BLOCK
,FQDN_RESOLV_FAIL
- capture
Pcap Boolean - (Boolean) Value that indicates whether packet capture (PCAP) is enabled or not
- default
Rule Boolean - (Boolean) Value that indicates whether the rule is the Default Cloud DNS Rule or not
- departments
Firewall
DNSRule Departments - (List of Objects) Apply to any number of departments When not used it implies
Any
to apply the rule to all departments. - description String
- (String) Enter additional notes or information. The description cannot exceed 10,240 characters.
- dest
Addresses List<String> - (Set of String) Destination IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific destination IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- dest
Countries List<String> - (Set of String) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- dest
Ip List<String>Categories - (Set of String) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- dest
Ip FirewallGroups DNSRule Dest Ip Groups - ** - (List of Objects) Any number of destination IP address groups that you want to control with this rule.
- dest
Ipv6Groups FirewallDNSRule Dest Ipv6Groups - list of destination ip groups
- device
Groups FirewallDNSRule Device Groups - (List of Objects) Device groups to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- devices
Firewall
DNSRule Devices - (List of Objects) Devices to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- dns
Gateway FirewallDNSRule Dns Gateway - (Set of Objects) The DNS gateway used to redirect traffic, specified when the rule action is to redirect DNS request to an external DNS service. Only one DNS Gateway is supported.
- dns
Rule List<String>Request Types - (Set of Strings) DNS request types to which the rule applies. Supportedn values are:
A
,NS
,MD
,MF
,CNAME
,SOA
,MB
,MG
,MR
,NULL
,WKS
,PTR
,HINFO
,MINFO
,MX
,TXT
,RP
,AFSDB
,X25
,ISDN
,RT
,NSAP
,NSAP_PTR
,SIG
,KEY
,PX
,GPOS
,AAAA
,LOC
,NXT
,EID
,NIMLOC
,SRV
,ATMA
,NAPTR
,KX
,CERT
,A6
,DNAME
,SINK
,OPT
,APL
,DS
,SSHFP
,PSECKEF
,RRSIG
,NSEC
,DNSKEY
,DHCID
,NSEC3
,NSEC3PARAM
,TLSA
,HIP
,NINFO
,RKEY
,TALINK
,CDS
,CDNSKEY
,OPENPGPKEY
,CSYNC
,ZONEMD
,SVCB
,HTTPS
, - edns
Ecs FirewallObject DNSRule Edns Ecs Object - (List of Objects) The EDNS ECS object which resolves DNS request. Only one object is supported.
- groups
Firewall
DNSRule Groups - (List of Objects) You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - labels
Firewall
DNSRule Labels - (List of Objects) Labels that are applicable to the rule.
- location
Groups FirewallDNSRule Location Groups - (List of Objects)You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - locations
Firewall
DNSRule Locations - (List of Objects) You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups. - name String
- Name of the Firewall Filtering policy rule
- order Integer
- (Integer) Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- predefined Boolean
- (Boolean) A Boolean field that indicates that the rule is predefined by using a true value
- protocols List<String>
- (Set of Strings) The protocols to which the rules applies. Supported Values:
ANY_RULE
,SMRULEF_CASCADING_ALLOWED
,TCP_RULE
,UDP_RULE
,DOHTTPS_RULE
- rank Integer
- (Integer) By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
. - redirect
Ip String - (String) The IP address to which the traffic will be redirected to when the DNAT rule is triggered. If not set, no redirection is done to specific IP addresses. Only supported when the
action
isREDIR_REQ
- res
Categories List<String> - (Set of String) URL categories associated with resolved IP addresses to which the rule applies. If not set, the rule is not restricted to a specific URL category.
- rule
Id Integer - source
Countries List<String> - (Set of String) The countries of origin of traffic for which the rule is applicable. If not set, the rule is not restricted to specific source countries.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- src
Ip FirewallGroups DNSRule Src Ip Groups - (List of Objects)Source IP address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address group.
- src
Ips List<String> - (Set of String) Source IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific source IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- src
Ipv6Groups FirewallDNSRule Src Ipv6Groups - (List of Objects) Source IPv6 address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IPv6 address group.
- state String
- (String) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- time
Windows FirewallDNSRule Time Windows - (List of Objects) You can manually select up to
1
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - users
Firewall
DNSRule Users - (List of Objects) You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users. - zpa
Ip FirewallGroup DNSRule Zpa Ip Group - (Set of Objects) The ZPA IP pool specified when the rule action is to resolve domain names of ZPA applications to an ephemeral IP address from a preconfigured IP pool. Only one object is supported.
- action string
- (String) The action configured for the rule that must take place if the traffic matches the rule criteria, such as allowing or blocking the traffic or bypassing the rule. The following actions are accepted:
ALLOW
,BLOCK
,REDIR_REQ
,REDIR_RES
,REDIR_ZPA
,REDIR_REQ_DOH
,REDIR_REQ_KEEP_SENDER
,REDIR_REQ_TCP
,REDIR_REQ_UDP
,BLOCK_WITH_RESPONSE
- application
Groups FirewallDNSRule Application Groups - (List of Objects) DNS application groups to which the rule applies
- applications string[]
- (Set of Strings) DNS tunnels and network applications to which the rule applies. To retrieve the available list of DNS tunnels applications use the data source:
zia.getCloudApplications
with theapp_class
valueDNS_OVER_HTTPS
. See example: - block
Response stringCode - (String) Specifies the DNS response code to be sent to the client when the action is configured to block and send response code. Supported values are:
ANY
,NONE
,FORMERR
,SERVFAIL
,NXDOMAIN
,NOTIMP
,REFUSED
,YXDOMAIN
,YXRRSET
,NXRRSET
,NOTAUTH
,NOTZONE
,BADVERS
,BADKEY
,BADTIME
,BADMODE
,BADNAME
,BADALG
,BADTRUNC
,UNSUPPORTED
,BYPASS
,INT_ERROR
,SRV_TIMEOUT
,EMPTY_RESP
,REQ_BLOCKED
,ADMIN_DROP
,WCDN_TIMEOUT
,IPS_BLOCK
,FQDN_RESOLV_FAIL
- capture
Pcap boolean - (Boolean) Value that indicates whether packet capture (PCAP) is enabled or not
- default
Rule boolean - (Boolean) Value that indicates whether the rule is the Default Cloud DNS Rule or not
- departments
Firewall
DNSRule Departments - (List of Objects) Apply to any number of departments When not used it implies
Any
to apply the rule to all departments. - description string
- (String) Enter additional notes or information. The description cannot exceed 10,240 characters.
- dest
Addresses string[] - (Set of String) Destination IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific destination IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- dest
Countries string[] - (Set of String) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- dest
Ip string[]Categories - (Set of String) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- dest
Ip FirewallGroups DNSRule Dest Ip Groups - ** - (List of Objects) Any number of destination IP address groups that you want to control with this rule.
- dest
Ipv6Groups FirewallDNSRule Dest Ipv6Groups - list of destination ip groups
- device
Groups FirewallDNSRule Device Groups - (List of Objects) Device groups to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- devices
Firewall
DNSRule Devices - (List of Objects) Devices to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- dns
Gateway FirewallDNSRule Dns Gateway - (Set of Objects) The DNS gateway used to redirect traffic, specified when the rule action is to redirect DNS request to an external DNS service. Only one DNS Gateway is supported.
- dns
Rule string[]Request Types - (Set of Strings) DNS request types to which the rule applies. Supportedn values are:
A
,NS
,MD
,MF
,CNAME
,SOA
,MB
,MG
,MR
,NULL
,WKS
,PTR
,HINFO
,MINFO
,MX
,TXT
,RP
,AFSDB
,X25
,ISDN
,RT
,NSAP
,NSAP_PTR
,SIG
,KEY
,PX
,GPOS
,AAAA
,LOC
,NXT
,EID
,NIMLOC
,SRV
,ATMA
,NAPTR
,KX
,CERT
,A6
,DNAME
,SINK
,OPT
,APL
,DS
,SSHFP
,PSECKEF
,RRSIG
,NSEC
,DNSKEY
,DHCID
,NSEC3
,NSEC3PARAM
,TLSA
,HIP
,NINFO
,RKEY
,TALINK
,CDS
,CDNSKEY
,OPENPGPKEY
,CSYNC
,ZONEMD
,SVCB
,HTTPS
, - edns
Ecs FirewallObject DNSRule Edns Ecs Object - (List of Objects) The EDNS ECS object which resolves DNS request. Only one object is supported.
- groups
Firewall
DNSRule Groups - (List of Objects) You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - labels
Firewall
DNSRule Labels - (List of Objects) Labels that are applicable to the rule.
- location
Groups FirewallDNSRule Location Groups - (List of Objects)You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - locations
Firewall
DNSRule Locations - (List of Objects) You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups. - name string
- Name of the Firewall Filtering policy rule
- order number
- (Integer) Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- predefined boolean
- (Boolean) A Boolean field that indicates that the rule is predefined by using a true value
- protocols string[]
- (Set of Strings) The protocols to which the rules applies. Supported Values:
ANY_RULE
,SMRULEF_CASCADING_ALLOWED
,TCP_RULE
,UDP_RULE
,DOHTTPS_RULE
- rank number
- (Integer) By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
. - redirect
Ip string - (String) The IP address to which the traffic will be redirected to when the DNAT rule is triggered. If not set, no redirection is done to specific IP addresses. Only supported when the
action
isREDIR_REQ
- res
Categories string[] - (Set of String) URL categories associated with resolved IP addresses to which the rule applies. If not set, the rule is not restricted to a specific URL category.
- rule
Id number - source
Countries string[] - (Set of String) The countries of origin of traffic for which the rule is applicable. If not set, the rule is not restricted to specific source countries.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- src
Ip FirewallGroups DNSRule Src Ip Groups - (List of Objects)Source IP address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address group.
- src
Ips string[] - (Set of String) Source IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific source IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- src
Ipv6Groups FirewallDNSRule Src Ipv6Groups - (List of Objects) Source IPv6 address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IPv6 address group.
- state string
- (String) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- time
Windows FirewallDNSRule Time Windows - (List of Objects) You can manually select up to
1
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - users
Firewall
DNSRule Users - (List of Objects) You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users. - zpa
Ip FirewallGroup DNSRule Zpa Ip Group - (Set of Objects) The ZPA IP pool specified when the rule action is to resolve domain names of ZPA applications to an ephemeral IP address from a preconfigured IP pool. Only one object is supported.
- action str
- (String) The action configured for the rule that must take place if the traffic matches the rule criteria, such as allowing or blocking the traffic or bypassing the rule. The following actions are accepted:
ALLOW
,BLOCK
,REDIR_REQ
,REDIR_RES
,REDIR_ZPA
,REDIR_REQ_DOH
,REDIR_REQ_KEEP_SENDER
,REDIR_REQ_TCP
,REDIR_REQ_UDP
,BLOCK_WITH_RESPONSE
- application_
groups FirewallDNSRule Application Groups Args - (List of Objects) DNS application groups to which the rule applies
- applications Sequence[str]
- (Set of Strings) DNS tunnels and network applications to which the rule applies. To retrieve the available list of DNS tunnels applications use the data source:
zia.getCloudApplications
with theapp_class
valueDNS_OVER_HTTPS
. See example: - block_
response_ strcode - (String) Specifies the DNS response code to be sent to the client when the action is configured to block and send response code. Supported values are:
ANY
,NONE
,FORMERR
,SERVFAIL
,NXDOMAIN
,NOTIMP
,REFUSED
,YXDOMAIN
,YXRRSET
,NXRRSET
,NOTAUTH
,NOTZONE
,BADVERS
,BADKEY
,BADTIME
,BADMODE
,BADNAME
,BADALG
,BADTRUNC
,UNSUPPORTED
,BYPASS
,INT_ERROR
,SRV_TIMEOUT
,EMPTY_RESP
,REQ_BLOCKED
,ADMIN_DROP
,WCDN_TIMEOUT
,IPS_BLOCK
,FQDN_RESOLV_FAIL
- capture_
pcap bool - (Boolean) Value that indicates whether packet capture (PCAP) is enabled or not
- default_
rule bool - (Boolean) Value that indicates whether the rule is the Default Cloud DNS Rule or not
- departments
Firewall
DNSRule Departments Args - (List of Objects) Apply to any number of departments When not used it implies
Any
to apply the rule to all departments. - description str
- (String) Enter additional notes or information. The description cannot exceed 10,240 characters.
- dest_
addresses Sequence[str] - (Set of String) Destination IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific destination IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- dest_
countries Sequence[str] - (Set of String) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- dest_
ip_ Sequence[str]categories - (Set of String) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- dest_
ip_ Firewallgroups DNSRule Dest Ip Groups Args - ** - (List of Objects) Any number of destination IP address groups that you want to control with this rule.
- dest_
ipv6_ Firewallgroups DNSRule Dest Ipv6Groups Args - list of destination ip groups
- device_
groups FirewallDNSRule Device Groups Args - (List of Objects) Device groups to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- devices
Firewall
DNSRule Devices Args - (List of Objects) Devices to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- dns_
gateway FirewallDNSRule Dns Gateway Args - (Set of Objects) The DNS gateway used to redirect traffic, specified when the rule action is to redirect DNS request to an external DNS service. Only one DNS Gateway is supported.
- dns_
rule_ Sequence[str]request_ types - (Set of Strings) DNS request types to which the rule applies. Supportedn values are:
A
,NS
,MD
,MF
,CNAME
,SOA
,MB
,MG
,MR
,NULL
,WKS
,PTR
,HINFO
,MINFO
,MX
,TXT
,RP
,AFSDB
,X25
,ISDN
,RT
,NSAP
,NSAP_PTR
,SIG
,KEY
,PX
,GPOS
,AAAA
,LOC
,NXT
,EID
,NIMLOC
,SRV
,ATMA
,NAPTR
,KX
,CERT
,A6
,DNAME
,SINK
,OPT
,APL
,DS
,SSHFP
,PSECKEF
,RRSIG
,NSEC
,DNSKEY
,DHCID
,NSEC3
,NSEC3PARAM
,TLSA
,HIP
,NINFO
,RKEY
,TALINK
,CDS
,CDNSKEY
,OPENPGPKEY
,CSYNC
,ZONEMD
,SVCB
,HTTPS
, - edns_
ecs_ Firewallobject DNSRule Edns Ecs Object Args - (List of Objects) The EDNS ECS object which resolves DNS request. Only one object is supported.
- groups
Firewall
DNSRule Groups Args - (List of Objects) You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - labels
Firewall
DNSRule Labels Args - (List of Objects) Labels that are applicable to the rule.
- location_
groups FirewallDNSRule Location Groups Args - (List of Objects)You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - locations
Firewall
DNSRule Locations Args - (List of Objects) You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups. - name str
- Name of the Firewall Filtering policy rule
- order int
- (Integer) Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- predefined bool
- (Boolean) A Boolean field that indicates that the rule is predefined by using a true value
- protocols Sequence[str]
- (Set of Strings) The protocols to which the rules applies. Supported Values:
ANY_RULE
,SMRULEF_CASCADING_ALLOWED
,TCP_RULE
,UDP_RULE
,DOHTTPS_RULE
- rank int
- (Integer) By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
. - redirect_
ip str - (String) The IP address to which the traffic will be redirected to when the DNAT rule is triggered. If not set, no redirection is done to specific IP addresses. Only supported when the
action
isREDIR_REQ
- res_
categories Sequence[str] - (Set of String) URL categories associated with resolved IP addresses to which the rule applies. If not set, the rule is not restricted to a specific URL category.
- rule_
id int - source_
countries Sequence[str] - (Set of String) The countries of origin of traffic for which the rule is applicable. If not set, the rule is not restricted to specific source countries.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- src_
ip_ Firewallgroups DNSRule Src Ip Groups Args - (List of Objects)Source IP address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address group.
- src_
ips Sequence[str] - (Set of String) Source IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific source IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- src_
ipv6_ Firewallgroups DNSRule Src Ipv6Groups Args - (List of Objects) Source IPv6 address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IPv6 address group.
- state str
- (String) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- time_
windows FirewallDNSRule Time Windows Args - (List of Objects) You can manually select up to
1
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - users
Firewall
DNSRule Users Args - (List of Objects) You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users. - zpa_
ip_ Firewallgroup DNSRule Zpa Ip Group Args - (Set of Objects) The ZPA IP pool specified when the rule action is to resolve domain names of ZPA applications to an ephemeral IP address from a preconfigured IP pool. Only one object is supported.
- action String
- (String) The action configured for the rule that must take place if the traffic matches the rule criteria, such as allowing or blocking the traffic or bypassing the rule. The following actions are accepted:
ALLOW
,BLOCK
,REDIR_REQ
,REDIR_RES
,REDIR_ZPA
,REDIR_REQ_DOH
,REDIR_REQ_KEEP_SENDER
,REDIR_REQ_TCP
,REDIR_REQ_UDP
,BLOCK_WITH_RESPONSE
- application
Groups Property Map - (List of Objects) DNS application groups to which the rule applies
- applications List<String>
- (Set of Strings) DNS tunnels and network applications to which the rule applies. To retrieve the available list of DNS tunnels applications use the data source:
zia.getCloudApplications
with theapp_class
valueDNS_OVER_HTTPS
. See example: - block
Response StringCode - (String) Specifies the DNS response code to be sent to the client when the action is configured to block and send response code. Supported values are:
ANY
,NONE
,FORMERR
,SERVFAIL
,NXDOMAIN
,NOTIMP
,REFUSED
,YXDOMAIN
,YXRRSET
,NXRRSET
,NOTAUTH
,NOTZONE
,BADVERS
,BADKEY
,BADTIME
,BADMODE
,BADNAME
,BADALG
,BADTRUNC
,UNSUPPORTED
,BYPASS
,INT_ERROR
,SRV_TIMEOUT
,EMPTY_RESP
,REQ_BLOCKED
,ADMIN_DROP
,WCDN_TIMEOUT
,IPS_BLOCK
,FQDN_RESOLV_FAIL
- capture
Pcap Boolean - (Boolean) Value that indicates whether packet capture (PCAP) is enabled or not
- default
Rule Boolean - (Boolean) Value that indicates whether the rule is the Default Cloud DNS Rule or not
- departments Property Map
- (List of Objects) Apply to any number of departments When not used it implies
Any
to apply the rule to all departments. - description String
- (String) Enter additional notes or information. The description cannot exceed 10,240 characters.
- dest
Addresses List<String> - (Set of String) Destination IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific destination IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- dest
Countries List<String> - (Set of String) Identify destinations based on the location of a server, select Any to apply the rule to all countries or select the countries to which you want to control traffic.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- dest
Ip List<String>Categories - (Set of String) identify destinations based on the URL category of the domain, select Any to apply the rule to all categories or select the specific categories you want to control.
- dest
Ip Property MapGroups - ** - (List of Objects) Any number of destination IP address groups that you want to control with this rule.
- dest
Ipv6Groups Property Map - list of destination ip groups
- device
Groups Property Map - (List of Objects) Device groups to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- devices Property Map
- (List of Objects) Devices to which the rule applies. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation.
- dns
Gateway Property Map - (Set of Objects) The DNS gateway used to redirect traffic, specified when the rule action is to redirect DNS request to an external DNS service. Only one DNS Gateway is supported.
- dns
Rule List<String>Request Types - (Set of Strings) DNS request types to which the rule applies. Supportedn values are:
A
,NS
,MD
,MF
,CNAME
,SOA
,MB
,MG
,MR
,NULL
,WKS
,PTR
,HINFO
,MINFO
,MX
,TXT
,RP
,AFSDB
,X25
,ISDN
,RT
,NSAP
,NSAP_PTR
,SIG
,KEY
,PX
,GPOS
,AAAA
,LOC
,NXT
,EID
,NIMLOC
,SRV
,ATMA
,NAPTR
,KX
,CERT
,A6
,DNAME
,SINK
,OPT
,APL
,DS
,SSHFP
,PSECKEF
,RRSIG
,NSEC
,DNSKEY
,DHCID
,NSEC3
,NSEC3PARAM
,TLSA
,HIP
,NINFO
,RKEY
,TALINK
,CDS
,CDNSKEY
,OPENPGPKEY
,CSYNC
,ZONEMD
,SVCB
,HTTPS
, - edns
Ecs Property MapObject - (List of Objects) The EDNS ECS object which resolves DNS request. Only one object is supported.
- groups Property Map
- (List of Objects) You can manually select up to
8
groups. When not used it impliesAny
to apply the rule to all groups. - labels Property Map
- (List of Objects) Labels that are applicable to the rule.
- location
Groups Property Map - (List of Objects)You can manually select up to
32
location groups. When not used it impliesAny
to apply the rule to all location groups. - locations Property Map
- (List of Objects) You can manually select up to
8
locations. When not used it impliesAny
to apply the rule to all groups. - name String
- Name of the Firewall Filtering policy rule
- order Number
- (Integer) Policy rules are evaluated in ascending numerical order (Rule 1 before Rule 2, and so on), and the Rule Order reflects this rule's place in the order.
- predefined Boolean
- (Boolean) A Boolean field that indicates that the rule is predefined by using a true value
- protocols List<String>
- (Set of Strings) The protocols to which the rules applies. Supported Values:
ANY_RULE
,SMRULEF_CASCADING_ALLOWED
,TCP_RULE
,UDP_RULE
,DOHTTPS_RULE
- rank Number
- (Integer) By default, the admin ranking is disabled. To use this feature, you must enable admin rank. The default value is
7
. - redirect
Ip String - (String) The IP address to which the traffic will be redirected to when the DNAT rule is triggered. If not set, no redirection is done to specific IP addresses. Only supported when the
action
isREDIR_REQ
- res
Categories List<String> - (Set of String) URL categories associated with resolved IP addresses to which the rule applies. If not set, the rule is not restricted to a specific URL category.
- rule
Id Number - source
Countries List<String> - (Set of String) The countries of origin of traffic for which the rule is applicable. If not set, the rule is not restricted to specific source countries.
NOTE: Provide a 2 letter ISO3166 Alpha2 Country code. i.e
"US"
,"CA"
- src
Ip Property MapGroups - (List of Objects)Source IP address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address group.
- src
Ips List<String> - (Set of String) Source IP addresses or FQDNs to which the rule applies. If not set, the rule is not restricted to a specific source IP address. Each IP entry can be a single IP address, CIDR (e.g., 10.10.33.0/24), or an IP range (e.g., 10.10.33.1-10.10.33.10).
- src
Ipv6Groups Property Map - (List of Objects) Source IPv6 address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IPv6 address group.
- state String
- (String) An enabled rule is actively enforced. A disabled rule is not actively enforced but does not lose its place in the Rule Order. The service skips it and moves to the next rule.
- time
Windows Property Map - (List of Objects) You can manually select up to
1
time intervals. When not used it impliesalways
to apply the rule to all time intervals. - users Property Map
- (List of Objects) You can manually select up to
4
general and/or special users. When not used it impliesAny
to apply the rule to all users. - zpa
Ip Property MapGroup - (Set of Objects) The ZPA IP pool specified when the rule action is to resolve domain names of ZPA applications to an ephemeral IP address from a preconfigured IP pool. Only one object is supported.
Supporting Types
FirewallDNSRuleApplicationGroups, FirewallDNSRuleApplicationGroupsArgs
- Ids List<int>
- Unique identifier for the Firewall Filtering policy rule
- Ids []int
- Unique identifier for the Firewall Filtering policy rule
- ids List<Integer>
- Unique identifier for the Firewall Filtering policy rule
- ids number[]
- Unique identifier for the Firewall Filtering policy rule
- ids Sequence[int]
- Unique identifier for the Firewall Filtering policy rule
- ids List<Number>
- Unique identifier for the Firewall Filtering policy rule
FirewallDNSRuleDepartments, FirewallDNSRuleDepartmentsArgs
- Ids List<int>
- Unique identifier for the Firewall Filtering policy rule
- Ids []int
- Unique identifier for the Firewall Filtering policy rule
- ids List<Integer>
- Unique identifier for the Firewall Filtering policy rule
- ids number[]
- Unique identifier for the Firewall Filtering policy rule
- ids Sequence[int]
- Unique identifier for the Firewall Filtering policy rule
- ids List<Number>
- Unique identifier for the Firewall Filtering policy rule
FirewallDNSRuleDestIpGroups, FirewallDNSRuleDestIpGroupsArgs
- Ids List<int>
- Unique identifier for the Firewall Filtering policy rule
- Ids []int
- Unique identifier for the Firewall Filtering policy rule
- ids List<Integer>
- Unique identifier for the Firewall Filtering policy rule
- ids number[]
- Unique identifier for the Firewall Filtering policy rule
- ids Sequence[int]
- Unique identifier for the Firewall Filtering policy rule
- ids List<Number>
- Unique identifier for the Firewall Filtering policy rule
FirewallDNSRuleDestIpv6Groups, FirewallDNSRuleDestIpv6GroupsArgs
- Ids List<int>
- Unique identifier for the Firewall Filtering policy rule
- Ids []int
- Unique identifier for the Firewall Filtering policy rule
- ids List<Integer>
- Unique identifier for the Firewall Filtering policy rule
- ids number[]
- Unique identifier for the Firewall Filtering policy rule
- ids Sequence[int]
- Unique identifier for the Firewall Filtering policy rule
- ids List<Number>
- Unique identifier for the Firewall Filtering policy rule
FirewallDNSRuleDeviceGroups, FirewallDNSRuleDeviceGroupsArgs
- Ids List<int>
- Unique identifier for the Firewall Filtering policy rule
- Ids []int
- Unique identifier for the Firewall Filtering policy rule
- ids List<Integer>
- Unique identifier for the Firewall Filtering policy rule
- ids number[]
- Unique identifier for the Firewall Filtering policy rule
- ids Sequence[int]
- Unique identifier for the Firewall Filtering policy rule
- ids List<Number>
- Unique identifier for the Firewall Filtering policy rule
FirewallDNSRuleDevices, FirewallDNSRuleDevicesArgs
- Ids List<int>
- Unique identifier for the Firewall Filtering policy rule
- Ids []int
- Unique identifier for the Firewall Filtering policy rule
- ids List<Integer>
- Unique identifier for the Firewall Filtering policy rule
- ids number[]
- Unique identifier for the Firewall Filtering policy rule
- ids Sequence[int]
- Unique identifier for the Firewall Filtering policy rule
- ids List<Number>
- Unique identifier for the Firewall Filtering policy rule
FirewallDNSRuleDnsGateway, FirewallDNSRuleDnsGatewayArgs
FirewallDNSRuleEdnsEcsObject, FirewallDNSRuleEdnsEcsObjectArgs
FirewallDNSRuleGroups, FirewallDNSRuleGroupsArgs
- Ids List<int>
- Unique identifier for the Firewall Filtering policy rule
- Ids []int
- Unique identifier for the Firewall Filtering policy rule
- ids List<Integer>
- Unique identifier for the Firewall Filtering policy rule
- ids number[]
- Unique identifier for the Firewall Filtering policy rule
- ids Sequence[int]
- Unique identifier for the Firewall Filtering policy rule
- ids List<Number>
- Unique identifier for the Firewall Filtering policy rule
FirewallDNSRuleLabels, FirewallDNSRuleLabelsArgs
- Id int
- Unique identifier for the Firewall Filtering policy rule
- Id int
- Unique identifier for the Firewall Filtering policy rule
- id Integer
- Unique identifier for the Firewall Filtering policy rule
- id number
- Unique identifier for the Firewall Filtering policy rule
- id int
- Unique identifier for the Firewall Filtering policy rule
- id Number
- Unique identifier for the Firewall Filtering policy rule
FirewallDNSRuleLocationGroups, FirewallDNSRuleLocationGroupsArgs
- Ids List<int>
- Unique identifier for the Firewall Filtering policy rule
- Ids []int
- Unique identifier for the Firewall Filtering policy rule
- ids List<Integer>
- Unique identifier for the Firewall Filtering policy rule
- ids number[]
- Unique identifier for the Firewall Filtering policy rule
- ids Sequence[int]
- Unique identifier for the Firewall Filtering policy rule
- ids List<Number>
- Unique identifier for the Firewall Filtering policy rule
FirewallDNSRuleLocations, FirewallDNSRuleLocationsArgs
- Ids List<int>
- Unique identifier for the Firewall Filtering policy rule
- Ids []int
- Unique identifier for the Firewall Filtering policy rule
- ids List<Integer>
- Unique identifier for the Firewall Filtering policy rule
- ids number[]
- Unique identifier for the Firewall Filtering policy rule
- ids Sequence[int]
- Unique identifier for the Firewall Filtering policy rule
- ids List<Number>
- Unique identifier for the Firewall Filtering policy rule
FirewallDNSRuleSrcIpGroups, FirewallDNSRuleSrcIpGroupsArgs
- Ids List<int>
- Unique identifier for the Firewall Filtering policy rule
- Ids []int
- Unique identifier for the Firewall Filtering policy rule
- ids List<Integer>
- Unique identifier for the Firewall Filtering policy rule
- ids number[]
- Unique identifier for the Firewall Filtering policy rule
- ids Sequence[int]
- Unique identifier for the Firewall Filtering policy rule
- ids List<Number>
- Unique identifier for the Firewall Filtering policy rule
FirewallDNSRuleSrcIpv6Groups, FirewallDNSRuleSrcIpv6GroupsArgs
- Ids List<int>
- Unique identifier for the Firewall Filtering policy rule
- Ids []int
- Unique identifier for the Firewall Filtering policy rule
- ids List<Integer>
- Unique identifier for the Firewall Filtering policy rule
- ids number[]
- Unique identifier for the Firewall Filtering policy rule
- ids Sequence[int]
- Unique identifier for the Firewall Filtering policy rule
- ids List<Number>
- Unique identifier for the Firewall Filtering policy rule
FirewallDNSRuleTimeWindows, FirewallDNSRuleTimeWindowsArgs
- Ids List<int>
- Unique identifier for the Firewall Filtering policy rule
- Ids []int
- Unique identifier for the Firewall Filtering policy rule
- ids List<Integer>
- Unique identifier for the Firewall Filtering policy rule
- ids number[]
- Unique identifier for the Firewall Filtering policy rule
- ids Sequence[int]
- Unique identifier for the Firewall Filtering policy rule
- ids List<Number>
- Unique identifier for the Firewall Filtering policy rule
FirewallDNSRuleUsers, FirewallDNSRuleUsersArgs
- Ids List<int>
- Unique identifier for the Firewall Filtering policy rule
- Ids []int
- Unique identifier for the Firewall Filtering policy rule
- ids List<Integer>
- Unique identifier for the Firewall Filtering policy rule
- ids number[]
- Unique identifier for the Firewall Filtering policy rule
- ids Sequence[int]
- Unique identifier for the Firewall Filtering policy rule
- ids List<Number>
- Unique identifier for the Firewall Filtering policy rule
FirewallDNSRuleZpaIpGroup, FirewallDNSRuleZpaIpGroupArgs
Package Details
- Repository
- zia zscaler/pulumi-zia
- License
- MIT
- Notes
- This Pulumi package is based on the
zia
Terraform Provider.